By Topic

2009 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT)

Date 14-17 Dec. 2009

Filter Results

Displaying Results 1 - 25 of 118
  • [Front cover]

    Publication Year: 2009, Page(s): c1
    Request permission for commercial reuse | PDF file iconPDF (3662 KB)
    Freely Available from IEEE
  • Welcome message from the technical program chair

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (2316 KB)
    Freely Available from IEEE
  • Organizers

    Publication Year: 2009
    Request permission for commercial reuse | PDF file iconPDF (2122 KB)
    Freely Available from IEEE
  • Program committee members

    Publication Year: 2009, Page(s):1 - 2
    Request permission for commercial reuse | PDF file iconPDF (2224 KB)
    Freely Available from IEEE
  • Table of content

    Publication Year: 2009, Page(s):1 - 5
    Request permission for commercial reuse | PDF file iconPDF (241 KB)
    Freely Available from IEEE
  • Quick invariant signature extraction from binary images

    Publication Year: 2009, Page(s):172 - 177
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2319 KB) | HTML iconHTML

    It is shown how basic geometric notions can be used to extract an image signature independently of position, orientation and size. Simple primitives as lengths and slopes remain invariant by affine 2D similarity transformations. They can easily be used to define the invariant signature of an image. Contrary to the previous work in this area, images can be directly analyzed. This means that the ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessment of CELP codecs quality in multi-lingual environment

    Publication Year: 2009, Page(s):55 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB) | HTML iconHTML

    This paper investigates the performance of CELP speech codecs over different languages. The English language has had a dominating influence in the advance of telecommunications. With many of the major developments coming from primarily English speaking areas there is the risk that these advances may not be linguistically robust. It is noted that quality of a speech produced by voice codecs mainly ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic approach to reliable mobile agents systems using group communication services.

    Publication Year: 2009, Page(s):71 - 76
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2292 KB) | HTML iconHTML

    Mobile agent is a process that can transport its state from one environment to another, with its data intact, and be capable of performing appropriately in the new environment. Fault tolerance support of mobile agent execution is essential for achieving a high and reliable performance for the computing process executed by the agent in distributed systems. Most of existing mobile agent systems cons... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust two-stage lip tracker

    Publication Year: 2009, Page(s):265 - 270
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (619 KB) | HTML iconHTML

    We propose a novel two-stage lip tracking method. A model-based inverse compositional (MIC) feature tracker is first used to track the outer lip, and a fast block matching algorithm is then used to track the inner lip. The proposed two-stage lip tracker outperforms single stage lip trackers such as AAM lip tracker and MIC lip tracker in terms of lower RMS fitting error and faster lip fitting speed... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An E-learning model based on dynamic qualitative constraint networks

    Publication Year: 2009, Page(s):77 - 82
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3097 KB) | HTML iconHTML

    This paper presents a new approach to model the core part of an e-learning process. The formal modeling we use relies on Allen's Interval Algebra to build the qualitative constraints networks. With the corresponding intervals, we could represent the conditional sequence of activities the learner is expected to conduct in order to complete a particular course. We propose temporal representation of ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generic multi-document summarization using cluster refinement and NMF

    Publication Year: 2009, Page(s):65 - 70
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2290 KB) | HTML iconHTML

    In this paper, a generic summarization method that uses cluster refinement and NMF is introduced to extract meaningful sentences from documents. The proposed method uses cluster refinement to improve the quality of document clustering since it helps us to remove dissimilarity information easily and avoid biased inherent semantics of documents to be reflected in clusters by NMF. In addition, it use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Online Social Networks - An interface requirements analysis

    Publication Year: 2009, Page(s):550 - 556
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3226 KB) | HTML iconHTML

    Online Social Networking (OSN) Sites are virtual places that cater to a specific population in which people of similar interest gather to communicate, share and discuss ideas. Many researchers have studied the effects of these networks and most have inferred that they foster relationship building and communications among those involved. This research is a study aimed at identifying the interface f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic fuzzy clustering using Harmony Search with application to image segmentation

    Publication Year: 2009, Page(s):538 - 543
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1361 KB) | HTML iconHTML

    In this paper, a new dynamic clustering approach based on the harmony search algorithm (HS) called DCHS is proposed. In this algorithm, the capability of standard HS is modified to automatically evolve the appropriate number of clusters as well as the locations of cluster centers. By incorporating the concept of variable length in each harmony memory vector, DCHS is able to encode variable numbers... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time-weighted quantitative testing of image segmentation with a genetic algorithm

    Publication Year: 2009, Page(s):271 - 276
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1641 KB) | HTML iconHTML

    Automatic parameter selection for image segmentation is accelerated by means of a genetic algorithm (GA). Issues remain in selecting the population size, number of generations, and termination of the search. As evaluation time and subsequent image batch-processing time, when the algorithm is applied in practice, are important considerations, this paper introduces a time factor into the GA cost fun... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Source geography estimation for web pages

    Publication Year: 2009, Page(s):457 - 462
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (368 KB) | HTML iconHTML

    The problem of inferring geographical information associated to web pages and identifying the geographic scope of their content is gaining increasing attention. However, geographic scope is a concept that can be interpreted in many different ways, ranging from the expected target scope of a specific content to the country where the content originated. The latter, in particular, albeit difficult to... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Flooding Zone Control Protocol (FZCP): enhancing the reliability of real-time multimedia delivery in WSNs

    Publication Year: 2009, Page(s):451 - 456
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (448 KB) | HTML iconHTML

    The flooding zone initialization protocol (FZIP) was proposed as a mechanism to provide power efficient flooding for real-time multimedia data over wireless sensor networks (WSNs). FZIP can initialize different FZ sizes with different performance levels (i.e. loss rate, latency, and overhead). Increasing the FZ size increases redundancy which in turn reduces packet loss but consumes extra power ov... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improving the performance of the instantaneous Blind audio Source Separation algorithms

    Publication Year: 2009, Page(s):519 - 526
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (6104 KB) | HTML iconHTML

    Several algorithms for instantaneous blind source separation (BSS) have been introduced in the past years. The performance of these algorithms needs to be evaluated and assessed to study their merits and choose the best of them for a given application. In this paper, a new adaptive approach is presented to evaluate different blind source separation algorithms. In this new approach, three new evalu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible blind watermarking for medical images based on wavelet histogram shifting

    Publication Year: 2009, Page(s):31 - 36
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (609 KB) | HTML iconHTML

    This paper proposes a blind reversible watermarking approach for medical images based on histogram shifting in wavelet domain. An integer wavelet transform is applied to map the integer host image components to integer wavelet coefficients. The watermark information is inserted into the high frequency subband regions of the transformed image. According to the capacity required for the watermark, t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Intuitive fuzzy c-means algorithm

    Publication Year: 2009, Page(s):83 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2328 KB) | HTML iconHTML

    Fuzzy C-means (FCM) is one of the most widely used clustering algorithms and assigns memberships to which are inversely related to the relative distance to the point prototypes that are cluster centers in the FCM model. In order to overcome the problem of outliers in data, several models including possibilistic C-means (PCM) and possibilistic-fuzzy C-means (PFCM) models have been proposed. A new m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Classification of video data using Centroid Neural Network

    Publication Year: 2009, Page(s):408 - 411
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2080 KB) | HTML iconHTML

    A classification method of video data using centroid neural network is proposed in this paper. The CNN algorithm is used for clustering the MPEG video data. In comparison with other conventional algorithms, The CNN requires neither a predetermined schedule for learning gain nor the total number of iterations for clustering. It always converges to sub-optimal solutions while conventional algorithms... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Speech recognition system for embedded real-time applications

    Publication Year: 2009, Page(s):118 - 122
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB) | HTML iconHTML

    In this paper, a hardware/software co-processing speech recognizer for embedded applications is proposed. The system mainly consists of a softcore processor and a hardware accelerator. The accelerator is responsible for GMM emission probability calculation, which is the major computational bottleneck. To alleviate the memory bandwidth issue, the hardware accelerator uses double-buffering, which al... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Partitioned Feature-based Classifier model

    Publication Year: 2009, Page(s):412 - 417
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (5397 KB) | HTML iconHTML

    The Partitioned Feature-based Classifier (PFC) is proposed in this paper. PFC does not use entire feature vectors extracted from the original data at once to classify each datum, but use only groups of features related to each feature vector to classify data separately. In the training stage, the contribution rate calculated from each feature vector group is drawn throughout the accuracy of each f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic path selection using access control lists via border gateway protocol

    Publication Year: 2009, Page(s): 1
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (50 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new psycho-acoustic model For MPEG1 layer 3 coder using A dynamic Gammachirp wavelet

    Publication Year: 2009, Page(s):123 - 128
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (8255 KB) | HTML iconHTML

    In this paper, we present an approach for the psycho-acoustic analysis of musical signals based on the gamma chirp wavelet packet transform following the model used in the standard MPEG-1 audio layer 3. The proposed method mimics the multiresolution properties of the human ear closer than other techniques and it includes simultaneous and temporal auditory masking. Its important characteristic is t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High throughput multiple-precision GCD on the CUDA architecture

    Publication Year: 2009, Page(s):507 - 512
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3967 KB) | HTML iconHTML

    Investigation of the cryptanalytic strength of RSA cryptography requires computing many GCDs of two long integers (e.g., of length 1024 bits). This paper presents a high throughput parallel algorithm to perform many GCD computations concurrently on a GPU based on the CUDA architecture. The experiments with an NVIDIA GeForce GTX285 GPU and a single core of 3.0 GHz Intel Core2 Duo E6850 CPU show tha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.