Proceedings of ICICS, 1997 International Conference on Information, Communications and Signal Processing. Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications (Cat.

12-12 Sept. 1997

Go

Filter Results

Displaying Results 1 - 25 of 124
  • 1997 International Conference on Information, Communications and Signal Processing Theme: Trends in Information Systems Engineering and Wireless Multimedia Communications

    Publication Year: 1997, Page(s):i - xxxiv
    Request permission for commercial reuse | PDF file iconPDF (1891 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1997, Page(s):0_3 - 0_7
    Request permission for commercial reuse | PDF file iconPDF (487 KB)
    Freely Available from IEEE
  • Implementation of silence compression scheme for G.723.1 speech coder using TI TMS320C51 DSP chip

    Publication Year: 1997, Page(s):1284 - 1287 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    The International Telecommunication Union (ITU) silence compression scheme for dual rate speech coder for multimedia communications transmitting at 5.3 and 6.3 kbit/s (Annex A) was designed for the ITU G.723.1 speech coder. Silence compression techniques are used to reduce the transmitted bit rate during silent intervals of speech. This paper describes the algorithm of voice activity detector (VAD... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fuzzy multi-step ahead prediction of VBR video sources

    Publication Year: 1997, Page(s):1623 - 1626 vol.3
    Cited by:  Papers (1)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (304 KB)

    This paper describes some investigation made into multi-step ahead prediction on the traffic intensity of digital video sources coded with hybrid motion compensation/differential pulse code modulation/discrete cosine transform (MC/DPCM/DCT) method. Although current coding standards recommend constant bit rate (CBR) output by means of a smoothing buffer, the method inherently produces variable bit ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel processing in LIPS

    Publication Year: 1997, Page(s):1480 - 1483 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    Major problems with parallel languages are concerned with the complexity and lack of expressive power which makes it difficult to produce efficient code and the ease of mapping onto parallel hardware. Also, a parallel language must be independent of specific hardware features as well as the underlying run-time support for it to be manned efficiently on a range of hardware. This paper presents a pa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Real-time implementation of a scaleable channel coding scheme for mobile transmission of G.723.1 speech bitstream

    Publication Year: 1997, Page(s):1279 - 1283 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    This paper describes the implementation of the scaleable channel coding scheme (Annex C) for ITU-T G.723.1 speech coder. Speech parameter bits from the encoded frame are reordered and allocated to bit classes of differing sensitivity. Each class is then coded by a rate compatible punctured convolutional code. A rate control algorithm provides scaleability by determining the number of bits and the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Equivalent bandwidth of VBR video traffic

    Publication Year: 1997, Page(s):1618 - 1622 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    The B-ISDN is designed to support various classes of traffic. Traffic with wide range of bandwidth, delay, loss requirements are expected to be carried by the network and match the expected grade of service (GoS). The inherent problems of large bandwidth, bursty and real-time requirements of variable bit rate (VBR) have attracted attentions of researchers in the past. We propose an equivalent band... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Branch prediction methods used in modern superscalar processors

    Publication Year: 1997, Page(s):1475 - 1479 vol.3
    Cited by:  Papers (2)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (508 KB)

    Branch prediction is crucial to maintaining high performance in modern superscalar processors. Conditional branches can occur as frequently as one in every 5 or 6 instructions in nonnumeric programs, leading to heavy mis-prediction penalties in current superpipelined, superscalar architectures. Realization of this fact has lead to an upsurge in the number of recent research publications in this ar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Queueing priority channel assignment scheme for handoff in CDMA cellular system

    Publication Year: 1997, Page(s):1766 - 1770 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (420 KB)

    A new queueing priority channel assignment scheme for handoff in the CDMA cellular system is proposed and analyzed. The proposed scheme employs a dynamic priority queueing discipline instead of first-in first-out (FIFO), which differs from the previous ones. Also, the performance of this scheme is evaluated by computer simulation, and it is compared with that of the non-prioritized call handling a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design patterns for parallel computations of master-slave model

    Publication Year: 1997, Page(s):1508 - 1512 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    This paper presents two design patterns useful for parallel computations of master-slave model. These patterns are concerned with task management and parallel and distributed data structures. They can be used to help address the issues of data partition and mapping, dynamic task allocation, and load balancing in parallel programming with the benefit of less programming efforts and better program s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • DSP implementation of very low bit rate videoconferencing system

    Publication Year: 1997, Page(s):1275 - 1278 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    A real-time full-duplex videoconferencing system using parallel DSPs is described. Effective strategies for H.263 video coding have been developed to improve the efficiency of the system. Further speed-up is achieved by utilising multiple DSP processors. The video codec is integrated with a G.723.1 speech codec to form an H.324 compliant bitstream, using H.223 multiplex and H.245 control protocols View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Subjective coding of best basis wavelet coefficients for multiresolution analysis

    Publication Year: 1997, Page(s):1363 - 1367 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (764 KB)

    This paper presents a wavelet based image compression algorithm using subjective thresholding and quantization of the wavelet coefficients. subjective compression techniques use the properties of the human visual system (HVS) to eliminate redundant information in an image. By combining the wavelet transform coefficients with psychovisual thresholding and quantization schemes, a coding result of 0.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance study of a nonblocking space-division packet switch with window policy

    Publication Year: 1997, Page(s):1410 - 1412 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    In a nonblocking space-division packet switch (such as ATM) with input queueing, head-of-line (HOL) blocking affects significantly the maximum throughput of the switch. We study the performance of a window policy which allows each input queue to scan up to a fixed number of packets, called the window size, to select for transmission on the outputs. The performance of the window policy is character... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimization of array geometry for identifiable high resolution parameter estimation in sensor array signal processing

    Publication Year: 1997, Page(s):1613 - 1617 vol.3
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (424 KB)

    This paper is concerned with the optimization of array geometry using genetic algorithms as the optimization tool. Recent advances in array processing have been focused on developing high resolution algorithms for estimating signal parameters. The problem of optimal design of the array geometry has been neglected and therefore addressed in this paper. An optimal array geometry will correspond to o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scheduling algorithms for multiprocessor real-time systems

    Publication Year: 1997, Page(s):1470 - 1474 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (452 KB)

    Real-time systems are subject to fundamental user requirements, such as correctness of the systems, taking into account timeliness and simultaneity, a high degree of predictability. This means that the scheduling algorithm is an important component of these systems. A scheduling algorithm is used to determine a schedule for a set of tasks so that the task's deadlines and resource requirements are ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Predictable architecture for real-time systems

    Publication Year: 1997, Page(s):1761 - 1765 vol.3
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    Architecture used to support real-time applications must have the ability to achieve predictability. This paper surveys the problems and solutions related to conventional architectures for predictable real-time systems. Issues covered include caches, pipelines, context switches, real-time clock and hardware queues. This paper, also proposes the approaches in a constructive way that it is possible ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computer, multimedia and television

    Publication Year: 1997, Page(s):1741 - 1745 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    This paper analyses the architecture features of PCs. Three levels of multimedia definition are proposed. The performances and platform features of PCs and TV for multimedia communication are compared. This results in a proposal of a digital TV (DTV) architecture that retains the good features of a PC but enhances the real-time bit stream processing capability. The key conclusion is that DTV is fo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Least required bandwidth in VP-based ATM networks

    Publication Year: 1997, Page(s):1504 - 1507 vol.3
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (240 KB)

    In an ATM network, a virtual path (VP) is a labeled path which can be used to transport a bundle of virtual connections (VCs) and to manage the resources used by these connections. The ATM multimedia leased line service is provided across user-to-user VPs. The customers can increase/decrease the VP bandwidth according to their demand. This paper proposes a method to derive the least required bandw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of fast antenna tuners for HF radio systems

    Publication Year: 1997, Page(s):1722 - 1726 vol.3
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (584 KB)

    A description of fast HF antenna tuners from the functional and implementation standpoint is presented. The realized fast antenna tuner is specially useful for mobile or transportable HF radio system applications, including adaptive communications, frequency hopping and electronic countermeasures. This study comprises: the equipment design requirements, the basic configuration of the fast antenna ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of perfect reconstruction filter banks using transformation of variables and re-factorization

    Publication Year: 1997, Page(s):1349 - 1352 vol.3
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    In this paper we present a technique to design 2-channel perfect reconstruction filter banks by using a combination of transformation of variables and re-factorization. The transformation of variables technique was initially formulated for the design of M-D (multidimensional) filter banks. With this technique the factorization of M-D polynomials (product filter) is avoided and high quality linear ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using location and environment awareness in mobile communications

    Publication Year: 1997, Page(s):1781 - 1785 vol.3
    Cited by:  Papers (7)  |  Patents (23)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (680 KB)

    We are investigating the use of badge based wearable computers to create highly mobile location and environment aware systems. When coupled to intelligent servers the badges provide an unparalleled platform for human centred information environments. This paper describes the architecture of the badge, its distributed computing environment, and presents initial results of application development tr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The EMMA multimedia conference service

    Publication Year: 1997, Page(s):1691 - 1695 vol.3
    Cited by:  Patents (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (784 KB)

    The complexity and diversity of novel telecommunication services require experimental systems for the exploration of research areas such as resource allocation and management. The aim of the paper is to introduce a multimedia conferencing service and to summarize its main benefits. This service is based on an experimental system, which deals with research issues both on the network and terminal si... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Software simulation and real-time implementation of acoustic echo cancelling

    Publication Year: 1997, Page(s):1270 - 1274 vol.3
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    Acoustic echo cancellation using various adaptive algorithms have been suggested by many researchers. A particularly interesting approach uses a new implementation of the LMS/Newton algorithm. It is reported that software simulations show good results of acoustic echo cancellation in a teleconferencing setup. Based on this new implementation of the LMS/Newton algorithm, software simulations and re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Joint frequency offset and delay profile estimation technique for maximum-likelihood sequence estimation

    Publication Year: 1997, Page(s):1327 - 1330 vol.3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    TDMA data transmission is used in various radio communication systems. Receivers for TDMA systems require the estimation of some parameters. In the system considered, the delay profile is acquired at the beginning of each burst, while the frequency offset between modulation and demodulation is tracked from burst to burst. A joint frequency offset and delay profile estimation technique for maximum-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive early video slice discard (A-ESD) scheme for non-guaranteed ATM services

    Publication Year: 1997, Page(s):1632 - 1637 vol.3
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (444 KB)

    A novel cell dropping mechanism named adaptive early slice discard (adaptive-ESD) scheme is proposed to minimize the video quality degradation in a situation of losses due to buffer overflow. The mechanism runs at the video slice level and adaptively and selectively adjusts the discard level to switch buffer occupancy and video cell payload types. To evaluate its performance, we have designed an e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.