Scheduled Maintenance on August 31st, 2016:
IEEE Xplore will undergo system maintenance from 1:00 - 3:00 PM EDT. During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Signal Acquisition and Processing, 2010. ICSAP '10. International Conference on

Date 9-10 Feb. 2010

Filter Results

Displaying Results 1 - 25 of 88
  • [Front cover]

    Publication Year: 2010, Page(s): C1
    Request permission for commercial reuse | PDF file iconPDF (392 KB)
    Freely Available from IEEE
  • [Title page i]

    Publication Year: 2010, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (25 KB)
    Freely Available from IEEE
  • [Title page iii]

    Publication Year: 2010, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (123 KB)
    Freely Available from IEEE
  • [Copyright notice]

    Publication Year: 2010, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (147 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2010, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (163 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2010, Page(s):xi - xii
    Request permission for commercial reuse | PDF file iconPDF (58 KB) | HTML iconHTML
    Freely Available from IEEE
  • Organizing Committee

    Publication Year: 2010, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (80 KB) | HTML iconHTML
    Freely Available from IEEE
  • Reviewers

    Publication Year: 2010, Page(s):xiv - xv
    Request permission for commercial reuse | PDF file iconPDF (87 KB)
    Freely Available from IEEE
  • A Novel Method for Information Prediction

    Publication Year: 2010, Page(s):3 - 7
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (713 KB) | HTML iconHTML

    Many interpolation methods were proposed to predict or reconstruct unknown information. However, when the conditional data are quite few or even there are no conditional data, predicted results are often poor. Originally, a method called multiple-point geostatistics (MPS) originated from geostatistical fields and it allows extracting multiple-point structures from training images, after that MPS c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and Simulation of Multi-operation Microcode-Based Built-In Self Test for Memory Faults

    Publication Year: 2010, Page(s):8 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (281 KB) | HTML iconHTML

    As embedded memory area on-chip is increasing and memory density is growing, problem of faults is growing exponentially. This necessitates defining of novel test algorithms which can detect these new faults. March Tests belong to the newer line of testing algorithms which offer to detect these exponentially escalating faults. Most of these new March algorithms consist of as many as five or six ope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved Particle Swarm Optimization for Dual-Channel Speech Enhancement

    Publication Year: 2010, Page(s):13 - 17
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (285 KB) | HTML iconHTML

    This paper, proposes an improved particle swarm optimization algorithm for speech enhancement. In the proposed algorithm, the population is divided into two subgroups. One of the subgroups searches the space globally, whereas the other one explores the problem space locally. The proposed algorithm surpasses the standard PSO, by stimulating the inactive particles and local search around the global ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Highly Linear Operational Transconductance Amplifier (OTA) with High Common Mode Rejection Ratio

    Publication Year: 2010, Page(s):18 - 22
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (369 KB) | HTML iconHTML

    This paper presents a highly linear Operational Transconductance Amplifier (OTA) that combines two linearization techniques, one with adaptive biasing of differential pairs and second with using of resistive source degeneration. OTA has ±0.9 v power supply and consumes 456 ¿w. Improvement of adaptive bias circuit has enhanced the CMRR to 135 dB in DC. OTA has been simulated with TSMC 0.18 ¿m te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • BiCMOS Implementation of Cell Signaling for Cell Survival/Death

    Publication Year: 2010, Page(s):23 - 26
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (450 KB) | HTML iconHTML

    A well-structured and controlled design methodology, along with a supporting hierarchical design system, has been developed to optimally support the development effort on several programs requiring gate array and semi custom Very Large Scale Integration (VLSI) design. In this paper, we will present an application of VLSI in System Biology. This work examines signaling networks that control the sur... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel High Performance Atto-Ampere Current Mirror

    Publication Year: 2010, Page(s):27 - 30
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    In this paper is proposed a novel atto-ampere current mirror (AACM) which reaches the minimum yet reported current range of 0.4aA. Operation of this circuit is based on source voltage modulation instead of conventionally used gate voltage modulation which interestingly prevents usage of commonly required voltage shifting in those circuits. The proposed circuit has a simple structure prohibiting la... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • MOS Modelling and Simulation of Human Glottis

    Publication Year: 2010, Page(s):31 - 35
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (289 KB) | HTML iconHTML

    The problem of representing speech events with robust and compact signals that describe the salient features of speech is an important area of speech communication. The Glottal Source is an important component of voice as it can be considered as the excitation signal to the voice apparatus. Nowadays, new techniques of speech processing such as speech recognition and speech synthesis use the glotta... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research and Implement of Digital Receiver

    Publication Year: 2010, Page(s):36 - 39
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (642 KB) | HTML iconHTML

    In order to detect weak signal in complex background, the paper studies and realizes six-channel digital receiver. Receiver is designed as much digital structure as possible, the basic hardware parameters of receiver can be adjust to meet different needs of specific applications by calling the corresponding software packages. Compared with the conventional receivers, the receiver has virtues of hi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Sensor Set Selecting Algorithm Based on Confidence Detection in Cognitive Radio

    Publication Year: 2010, Page(s):40 - 44
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (185 KB) | HTML iconHTML

    Although the method of cooperative spectrum sensing can greatly improve the sensing performance, the consumption of system resources will increase as the number of cooperative sensors increases, therefore, the number of cooperative sensors to use is a compromise between sensing performance and consumption of system resources. Firstly, based on the expression for the probability of detection, a sen... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secured Backup Routing Protocol for Ad Hoc Networks

    Publication Year: 2010, Page(s):45 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (330 KB) | HTML iconHTML

    Adhoc mobile networks are very dynamic, self organizing, self healing distributed networks which support data networking without an infrastructure. The user can use the network services efficiently and securely while moving, by using our proposed protocol. This protocol is used to store secured backup routes from multiple routes available between source and destination, in order to provide the nex... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Comparison of Kekre's Fast Search and Exhaustive Search for Various Grid Sizes Used for Colouring a Greyscale Image

    Publication Year: 2010, Page(s):53 - 57
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (379 KB) | HTML iconHTML

    There are various techniques using various colour spaces that can be used to colour a greyscale image such as those described in,, and. In this paper we focus on the procedure described in extended to seven different colour spaces - RGB, LUV, YCgCb, YCbCr, YUV, XYZ and YIQ. We also vary the grid (pixel window) sizes used in the aforementioned procedure and apply both the exhaustive search (ES) alg... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Iris Recognition Using Vector Quantization

    Publication Year: 2010, Page(s):58 - 62
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (501 KB) | HTML iconHTML

    In today's world, where terrorist attacks are on the rise, employment of infallible security systems is a must. Iris recognition enjoys universality, high degree of uniqueness and moderate user co-operation. This makes Iris recognition systems unavoidable in emerging security & authentication mechanisms. We propose an iris recognition system based on vector quantization. The proposed system do... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data Transmission over GSM Adaptive Multi Rate Voice Channel Using Speech-Like Symbols

    Publication Year: 2010, Page(s):63 - 67
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (358 KB) | HTML iconHTML

    This paper introduces a new method to transmit digital data through Global System for Mobile communications (GSM) voice channel. A novel algorithm is proposed to design a set of Speech-Like (SL) symbols which leads to design a GSM voice channel data modem to modulate and demodulate data on GSM Adaptive Multi Rate (AMR) voice codec which consist of different bit-rates. Designing a set of time-symbo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Content Dependent Data Hiding on GSM Full Rate Encoded Speech

    Publication Year: 2010, Page(s):68 - 72
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (278 KB) | HTML iconHTML

    This paper introduces a steganographic approach to embed data on compressed speech bit stream in order to hide secret data. This method may be used by any kind of encoded bit stream, but this research concentrates on full rate (GSM 6.10) encoded bit stream. This method allows user to adjust embedded data bit-rate or speech quality. Speech quality is determined by Perceptual Evaluation of Speech Qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Abnormality Detection from Medical Thermographs in Human Using Euclidean Distance Based Color Image Segmentation

    Publication Year: 2010, Page(s):73 - 75
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB) | HTML iconHTML

    Infrared thermography is recently widely accepted as a medical diagnostic tool. Thermographs are acquired for the whole body or the region of interest. Thermographs are processed for abnormality detection and quantification. As temperature variations are not normally visible to naked eye it is necessary to develop and analyze the feature extraction algorithms for abnormality detection. This paper ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • G-Filter's Gaussianization Function for Interference Background

    Publication Year: 2010, Page(s):76 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB) | HTML iconHTML

    By weakening the bigger and strengthening the smaller, gaussianization can enhance the gaussianity of samples and improve performance of subsequent correlation test. Firstly, an explicit definition on gaussianizing filter and a practical method to evaluate the filtering performance are given. Secondly, based on the cumulative distribution function and its inverse, one typical gaussianizing filters... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Method of DOA Estimation Based on Subarray Beamforming for Uniform Circular Arrays

    Publication Year: 2010, Page(s):80 - 84
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    A novel method of direction-of-arrival (DOA) estimation based on subarray beamforming for uniform circular arrays is proposed. In this method, the beamform manifold of uniform circular arrays is transformed via virtual structure, and then the virtual arrays are divided into two subarrrays. The target DOA is estimated from the phase shift between the reference signal and its phase-shifted version b... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.