By Topic

Signal Processing and Information Technology, 2008. ISSPIT 2008. IEEE International Symposium on

Date 16-19 Dec. 2008

Filter Results

Displaying Results 1 - 25 of 99
  • [Front cover]

    Page(s): C1
    Save to Project icon | Request Permissions | PDF file iconPDF (548 KB)  
    Freely Available from IEEE
  • [Commentary]

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (732 KB)  
    Freely Available from IEEE
  • Staff or Society listings

    Page(s): 1 - 2
    Save to Project icon | Request Permissions | PDF file iconPDF (1334 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1 - 8
    Save to Project icon | Request Permissions | PDF file iconPDF (6792 KB)  
    Freely Available from IEEE
  • Proceedings of abstracts

    Page(s): 1 - 51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5060 KB)  

    Presents abstracts for the articles comprising the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisements]

    Page(s): 1 - 14
    Save to Project icon | Request Permissions | PDF file iconPDF (928 KB)  
    Freely Available from IEEE
  • Evidence of bias towards buffered codons in human transcripts

    Page(s): 29 - 34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3492 KB) |  | HTML iconHTML  

    Codon usage bias is well established in different species from bacteria to mammals. A number of models have been proposed to show this bias as a balance between mutation and selection. Most of these models emphasize controlling the speed of protein translation from the mRNA and increasing the accuracy where this bias is dependent on the abundance and properties of the available tRNA. In this work, codon usage bias in general is considered from a different angle based on a new hypothesis where selection is expected to act in a direction to favor codons that are more buffered, or protected, from mutation than those more sensitive to mutation. It is anticipated that the more buffered the original coding sequence, the higher the survival chance for the whole organism since the resulting protein sequence remains unchanged. Two different complementary measures are developed to compute the average buffering capacity in a given sequence. We show that the buffering capacity of coding sequences in humans is in general higher than that of randomly generated sequences and that of shifted reading frames. Highly expressed genes are shown to have an even higher buffering capacity than non-housekeeping genes. This result is to be expected due to the necessity of housekeeping genes. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Prediction of Temporal Lobe Seizures Using the Singular Spectrum Analysis

    Page(s): 35 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2471 KB) |  | HTML iconHTML  

    At present, one goal of the seizure predictions is to use the linear methods to make the prediction simple. In the paper, a linear method called the singular spectrum analysis (SSA) is employed to the prediction of the seizures onset based on the scalp EEG recordings from the epilepsy patients whose focus are in the temporal lobe as well as from the healthy humans. Different from other prediction methods, it doesn't need large scale data and complex algorithm to make it beneficial to the clinical practice. According to the computing experience, about 4 seconds data is enough to make the prediction more efficient and more convenient. In order to evaluate the method, a radial basis function (RBF) neural network model is used to the classification effectively. It is concluded that the healthy people's SSA decreases rapidly and has a 'platform' in the end, but the epileptic patient's SSA decreases gradually, no obvious 'platform' occurs in the end. It is possible for the phenomenon to be available in the temporal lobe seizure predictions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in Multicast Networks

    Page(s): 352 - 356
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (517 KB) |  | HTML iconHTML  

    Multicast networking support is becoming an increasingly important future technology area for group-based applications. Although the deployment of multicast networks has been picking up, the area of multicast security has not received much attention. The few proposals for securing multicast communication do not address the unique requirements arising from the multicast group communication model. Integrating a multicast security solution involves numerous engineering tradeoffs. The end goal of effective operational performance and scalability over a heterogeneous internetwork is of primary interest for widescale adoption and application of such a capability. In this paper, various techniques that have been proposed to support multicast security are discussed and their relative merits are explored. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Chaotic Neural Network for Robust Phoneme Recognition

    Page(s): 106 - 110
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4896 KB) |  | HTML iconHTML  

    Recent developments in nonlinear dynamics and the theory of chaos have shown the existence of deterministic chaotic property in processing behavior of biological processing systems and human voice production. According to the natural selection theory a good problem-solver should have two main properties: The ability of emerging various solutions for problem and existence of a rule (or intelligence) to guide this evolution and variety to become close to the goal. We used chaotic nodes with logistic map to make the ability of emerging various solutions. We designed a rule using RBNN In order to control the evolution of chaotic nodes intelligently. The performance of proposed chaotic neural network is 66% whereas the performance of RBNN is 25% in the same noisy condition. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Notice of Violation of IEEE Publication Principles
    Integration of Spatial Data with Business Intelligence Systems

    Page(s): 447 - 452
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (7027 KB) |  | HTML iconHTML  

    Notice of Violation of IEEE Publication Principles

    "Integration of Spatial Data with Business Intelligence Systems"
    by Muracevic Dzenana and Fahrudin Orcevic
    in the Proceedings of the IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), December 2008, pp. 447-452

    After careful and considered review of the content and authorship of this paper by a duly constituted expert committee, this paper has been found to be in violation of IEEE's Publication Principles.

    This paper duplicates original text from the papers cited below. The original text was copied without attribution (including appropriate references to the original author(s) and/or paper title) and without permission.

    "Location Intelligence Gets Smarter", S. Aase, Teradata Magazine Online, Vol 7, No 1, 2008
    "ESRI GIS/SAP Integration Helps Utilities Execute Business Processes", geoplace.com, March 2007
    "Innovative GIS Technology in the Defense and Intelligence Communities" ERSI, 2007
    "Developing GIS Visualization Web Services for Geophysical Applications," A. Sayar, ISPRS International Society for Photogrammetry and Remote Sensing Workshop Commission II WG/2 METU, November 2005
    "Oracle for SAP", Oracle, No.14, April 2005
    "SAP and ESRI Collaborate on Enterprise Services", ArcNews Online, Fall 2006
    "Business Intelligence" M. Lamza-Maroni, Poslovni Informacijski Sustavi (PIS), 2007
    "GIS Best Practices: Essays on Geography and GIS" ESRI, September 2008

    This paper proposes and discusses a GIS that integrates geographic resources with business intelligence data from SAP, TIS and other systems. Location is a unifying theme in business. Location can be an address, a service boundary, a sales territory, or a delivery route. All these things can be visualized and interactively managed and analyzed in a GIS. Spatial relationships, patterns and trends reveal invaluable business intelligence and bring easy-to-understand visualiza- ion to business applications. Use GIS to answer basic or sophisticated question on how to improve businesses workflow, management, and ROI (Return on Invest). To be able to integrate GIS system with other business systems and processes, it is necessary that spatial and non-spatial data are "no different". In presentation I will present GIS application which demonstrates concept of integrating data and systems with spatial and non spatial data. The application integrates data from different systems: traditional GIS data, TIS and SAP. Data integration enabling easier and more effective control of telecommunication networks, supervising and effect solutions of failures on element telecommunications systems, access networks and networks features, better controlling systems, witch we afford to end users. Goal is faster and more quality solutions of user's request. Present solutions in this paper based on OpenGIS standards and interfaces to geospatial information providers, Oracle Database and Application Server. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Streaming Media Transport Protocols On Basis Of Next Generation Internet

    Page(s): 357 - 362
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (4730 KB) |  | HTML iconHTML  

    Internet's rapid growth promoted the evolutoin of network based applications. Since a particular network application has its special requirements for network topology, many different protocols have been introduced over the last couple of years. Most of these protocols overlap and are redundant in function, which results in bad overall performance of the application and the network. This paper presents an IPv6 QoS-based simple streaming transport protocol (SSTP), which enables the next generation networks to perform better and takes into account the feature of multimedia stream transmission. The protocol has been implemented and deployed in various multimedia based implementations. This paper will not only introduce the background and design thinking behind SSTP, but also describe the SSTP in detail. At last, the paper compares the performance of SSTP and RTP/RTCP, and gives the considerations about improvement of SSTP. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Comparison of Interleaved Polling with adaptive Cycle Time and Cyclic Demand Proportionality Algorithms

    Page(s): 464 - 468
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2959 KB) |  | HTML iconHTML  

    Ethernet passive optical network (EPON) is an access network that delivers essential services of voice, video, and data communications reliably, while at the same time providing expected guarantees of the delivery of those services in terms of defined quality of service measures (QOS). This paper compares performance criteria such as delay, queue size, and packet loss ratio for two dynamic bandwidth allocation (DBA) algorithms: interleaved polling with adaptive cycle time (IPACT), and a new cyclic demand proportionality algorithm (CDP). CDP gives the best performances in terms delay vs. offered load, queue size vs. offered load and packet loss ratio vs. offered load compared to IPACT with the Fixed Allocation Window size for transmission. Improvement is seen for these three parameters when CDP is compared with IPACT with limited allocation window size. A traffic generator that gives traffic with self-similar and long range dependency properties is used in the simulations. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Advanced Bandwidth Brokering Architecture in PLC Networks

    Page(s): 158 - 163
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5498 KB) |  | HTML iconHTML  

    The bandwidth broker is a management instance inside a PLC system, which has the complete overview about the network topology, the actual reserved bandwidth on each link inside its domain and should ideally have also a real-time view of the available bandwidth on each link. The bandwidth broker acts as an intermediate unit for call setups in a way that a call with ensured quality has to send a signaling packet to the broker which then manages each node taking part in this connection and reserves the bandwidth percentage and delay constraints necessary for the requested quality. The signaling between the routers and the bandwidth broker is at the moment very rudimental and consists of simple UDP packets containing a string with the desired quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multilingual Names Database Searching Enhancement

    Page(s): 474 - 479
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3520 KB) |  | HTML iconHTML  

    In this paper some aspects are presented for multilingual names database searching enhancement. They should help to find some balance between the execution time and the relevance of the results obtained. Structured form of the information used, two different structures of the database and a general algorithm for the searching are suggested. As experimental results investigation of the groupings of the most popular Romanized Bulgarian own names produced by the Soundex and Daitch-Mokotoff Soundex (D-M Soundex) algorithms are given. Then conclusion is made for their applicability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New Method for Lossless Compression of Medical Records

    Page(s): 23 - 28
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2268 KB) |  | HTML iconHTML  

    In the paper is presented new method for lossless compression of biomedical signals, aimed at telemedicine applications and efficient data storage with content protection. The method is based on data compression algorithm developed by the authors. The high compression ratio obtained permits efficient data transfer via communication channels and enhances the distance monitoring of patients. The presented approach is suitable for the processing of various biomedical signals. The relatively low computational complexity permits real time hardware and software applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Image Pyramidal Representation

    Page(s): 441 - 446
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (7011 KB) |  | HTML iconHTML  

    New adaptive method for image compression based on pyramid decomposition with neural networks with error back propagation (BPNN) is presented in this paper. The processed image is divided in blocks and then each is compressed in the space of the hidden layers of 3-layer BPNNs, which build the so-called inverse difference pyramid. The results of the new method modeling are compared with these, obtained using the image compression standards JPEG and JPEG2000. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Seamless Connectivity Scheme for Heterogeneous Wireless Networks

    Page(s): 363 - 368
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5441 KB) |  | HTML iconHTML  

    The demand for the wireless Internet requiring broadband is expected to increase in a dramatic way due to popularity of tri player applications including voice, video, and data transmission. The existing wireless technologies UMTS, WiFi, WiMax, may not satisfy the customer requirements, for many reasons including availability, coverage, cost and most importantly mobility. Each technologies has it is own limitations related to the above characteristics. We present a seamless connectivity scheme for a mobile user, by aggregating different wireless technologies, to make the network transparent for the running applications on the mobile devices and satisfy wide range of services including voice, data, multimedia, and Web browsing. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Automatic Detection and Recognition of Shop Name in Outdoor Signboard Images

    Page(s): 111 - 116
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3234 KB) |  | HTML iconHTML  

    In this paper, a system for automatic detection and recognition of Korean texts or shop names in outdoor signboard images is described. The system includes detection, binarization and extraction of text in a signboard image captured by a camera of a mobile phone for the recognition of the shop name. It can deal with different font styles and sizes as well as illumination changes. Individual characters detected by connected component analysis are recognized by using nonlinear mesh, in which feature vectors of vertical and horizontal components are extracted from the binarized image. Proposed methods have been applied to a Korean text translation system, which can automatically detect and recognize Korean texts and generate the translation result. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer-Based Systems in Society (CbSyS)

    Page(s): 459 - 463
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (3368 KB) |  | HTML iconHTML  

    In this paper, we introduce a new field of systems applications, that of Computer-based Systems in Society (CbSyS). In this context, factors as topologies & architectures, sensor grids & networks, information processing etc., are combined in order to solve social problems as for instance to assist handicaps. As an introductory paradigm we develop a sensor-based system designed for the assistance of blinds, entitled B-light. This is a navigation system, object-oriented, sensor-based, which enables embedded configuration as well as networking perspective. The overall system can be composed by a multifaceted assembly of components of software and hardware. We cite herein the generic context of implementation. The analysis and presentation is vertical, beginning from the theoretical grounding of the application framework and reaching the representative implementation of an ad-hoc system. Elements of embedded systems, of sensor networks, of signal, image & information processing can be combined into any specific implementation. The anticipated benefits of the herein presented system, as well as of the general framework of CbSyS are vital since they offer solutions and improvements in critical problems in Society. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Contribution to Experimental Performance Evaluation of Point-to-Point WiMAX Links

    Page(s): 150 - 153
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1335 KB) |  | HTML iconHTML  

    Rapidly growing communication networks and high requirement applications have led to increasing demands on bandwidth. This development has been a motivation for the study of new technologies. It is the case of e.g. WiMAX (based on IEEE 802.16) that can be used to simply and quickly extend medium and long distance backbones at very competitive prices. In the present work an initial evaluation is made of this technology for point-to-point links, using Alvarion equipments. Several results are presented and discussed at OSI levels 3 and 4. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving Click Fraud Detection by Real Time Data Fusion

    Page(s): 69 - 74
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (6404 KB) |  | HTML iconHTML  

    Click fraud is a type of Internet crime that occurs in pay per click online advertising when a person, automated script, or computer program imitates a legitimate user of a Web browser clicking on an ad, for the purpose of generating a charge per click without having actual interest in the target of the ad's link. Most of the available commercial solutions are just click fraud reporting systems, not real-time click fraud detection and prevention systems. A new solution is proposed in this paper that will analyze the detailed user click activities based on data collected form different sources. More information about each click enables better evaluation of the quality of click traffic. We utilize the multi source data fusion to merge client side and server side activities. Proposed solution is integrated in our CCFDP V1.0 system for a real-time detection and prevention of click fraud. We have tested the system with real world data from an actual ad campaign where the results show that additional real-time information about clicks improve the quality of click fraud analysis. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Randomized Algorithms for Mapping Clustered Object-Oriented Software onto Distributed Architectures

    Page(s): 426 - 431
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2615 KB)  

    Distributed Object Oriented (DOO) applications have been developed for solving complex problems in various scientific fields. One of the most important aspects of the DOO systems is the efficient distribution of software classes among different nodes in order to solve the mismatch problem that may appear when the software structure does not match up the available hardware organization. We have proposed a multistep approach for restructuring DOO software. According to this approach, the OO system is partitioned into clusters that are then merged into larger groups forming what we call Merged Cluster Graph. The last step in this approach is concerned by mapping these merged clusters onto the target distributed architecture. Generally, the mapping problem is intractable thus allowing only for efficient heuristics. This paper presents two algorithms to solve the mapping problem using a randomized approach. The proposed algorithms has proved to be efficient, Simple and easy to understand and implement. Furthermore, the performance of the proposed algorithms was tested against some existing deterministic techniques. The experimental results showed an outstanding performance of the proposed algorithms in minimizing the overall mapping cost of the produced assignments. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Experimental Performance Study of a Very High Speed Free Space Optics Link at the University of Beira Interior Campus: a Case Study

    Page(s): 154 - 157
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2435 KB) |  | HTML iconHTML  

    A very high speed FSO (free space optics) link has been successfully implemented for purposes of high requirement applications, at the University Campus. An experimental performance evaluation of this link has been carried out at various OSI levels (1, 4, and 7). Several results are presented and discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Binarization by Local K-means Clustering for Korean Text Extraction

    Page(s): 117 - 122
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (5992 KB) |  | HTML iconHTML  

    Text information in a natural scene is very useful and important for understanding images. Detection and extraction of text information in such natural images have been used in many applications. Many conditions of natural scene make the problem of text segmentation quite intractable. In this paper, an effective method for the segmentation and binarization of Korean texts from signboard images is proposed, which is robust in blurred images, uneven illumination and strong boundary text images. The proposed approach is based on local K-means clustering on separate words in text region. Firstly, detected text region is divided into local areas with relatively uniform illumination, and then using 3-means clustering with Euclidean distance has been applied to segment text from the background. By dividing the region of interest into local areas, the effect of uneven lighting has been minimized. The comparison with Otsu's method and 2-means clustering based on intensity will be representation in some metrics. Natural images from the test database, collected from mobile devices, are used in the experiment and the results show the performance of the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.