By Topic

Signal Processing Systems (ICSPS), 2010 2nd International Conference on

Date 5-7 July 2010

Go

Filter Results

Displaying Results 1 - 25 of 192
  • [Front cover]

    Publication Year: 2010 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (594 KB)  
    Freely Available from IEEE
  • [Front matter]

    Publication Year: 2010 , Page(s): i - xviii
    Save to Project icon | Request Permissions | PDF file iconPDF (292 KB)  
    Freely Available from IEEE
  • GDP prediction by support vector machine trained with genetic algorithm

    Publication Year: 2010 , Page(s): V3-1 - V3-3
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (222 KB) |  | HTML iconHTML  

    In the study, support vector machine trained with genetic algorithm is applied in GDP forecasting. Genetic algorithm can get optimal solution in short time, which is an excellent method in parameters selection of support vector machine. Then, genetic algorithm is introduced to simultaneously optimize the SVM parameters. The total GDP data of Anhui province from 1989 to 2007 are employed to compare the forecasting performance of the proposed GA-SVM model and RBF neural network GDP forecasting model. It is indicated that GDP prediction performance of the proposed GA-SVM is better than that of RBFNN. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind watermarking scheme based on remainder of distance vector of wavelet coefficients

    Publication Year: 2010 , Page(s): V3-4 - V3-8
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (765 KB) |  | HTML iconHTML  

    This paper introduces a blind watermarking scheme based on remainder of distance vector between two wavelet blocks. In the proposed scheme, the wavelet coefficients from frequency sub-band LH3 and HL3 have been grouped into two blocks for invisible watermark embedding and extraction. In the next stage, the distance vectors between two blocks are computed and then remainder after division calculated. For embedding 0 and 1 bit, the remainder of distance vectors fixed up to specific values. By increasing divisor, it is possible to embed watermark bits in the host image with more energy; however, this will lead to PSNR reduction. The proposed method, takes advantage of considerable robustness against prevalent attacks and another profit have wide range trade off between watermark embedding energy and the quality of watermarked image with select suitable value of divisor. The experimental results show that the proposed algorithm is robust against image processing attacks and also the comparison analysis indicates that has better performance than the other blind watermarking methods. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • RC-Cache: Soft error mitigation techniques for low-leakage on-chip caches

    Publication Year: 2010 , Page(s): V3-9 - V3-13
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (290 KB) |  | HTML iconHTML  

    This paper presents a kind of reliable low-leakage cache - RC-Cache, to solve the problem of high soft error rate in low-leakage on-chip caches. The proposed structure combines circuit technique and micro-architecture technique, and can reduce impacts of soft errors on leakage power optimization technique of caches. At circuit level, we improve the soft error immune of SRAM through specially designed soft error immune SRAM cell - SI-SRAM; at microarchitecture level, we reduce the soft error vulnerability of low-leakage caches by burst-based access prediction and early write-back operation. Experimental results show that in normal mode, soft error rate of RC-Cache is only 1/7 of the conventional cache, and in drowsy mode it is just 2/5. The techniques significantly improve the reliability of caches and, to a certain extent, mitigate soft error problem of low-leakage on-chip caches. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new time-delay echo jamming style to SAR

    Publication Year: 2010 , Page(s): V3-14 - V3-17
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (288 KB) |  | HTML iconHTML  

    This work is concerned with developing the time-delay-based jamming technology against SAR. Traditional time-delay echo jamming can only get a point or a line false imaging when through the SAR system, which can't protect distributed targets. This paper presents a modified time-delay echo jamming style, Time-delay Inter-pulse Jitter Echo jamming (TDIJEJ). The theoretic analysis and simulation show that this interference can obtain the fast time matched processing gain of SAR thus deduce the jamming power requirement, and generate a jamming swath output for the purpose of protecting distributed targets. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Modeling and forecasting short-term electricity load based on multi adaptive neural-fuzzy inference system by using temperature

    Publication Year: 2010 , Page(s): V3-18 - V3-22
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (287 KB) |  | HTML iconHTML  

    In this paper, the use of Adaptive Neural-Fuzzy Inference System (ANFIS) to study the design of Short-Term Load Forecasting (STLF) systems for the east of Iran was explored. While reviewing the probability of chaos and predictability of electricity load curve by Lyapunov exponent, this paper forecasts consumed load by using multi ANFIS. Entries of the presented model are into the multi ANFIS including the date of the day, temperature maximum and minimum, climate condition and the previous days consumed load and its exit is forecasting of power load consumption of every season. The results show that temperature has an important role in load forecast. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An image encryption system by indefinite cellular Automata and chaos

    Publication Year: 2010 , Page(s): V3-23 - V3-27
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (555 KB) |  | HTML iconHTML  

    In this paper a new image encryption system based on replacement of pixels values by using Indefinite Cellular Automata and chaos mapping is proposed. Cellular Automata rules are defined based on chaos mapping and stored in private key. Proposed system have some advantages such as confusion, diffusion, symmetric private key, very large number of secret keys, key-dependent pixel value replacement and increasing system complexity with the impact of indefinite rules and chaos mapping. Simulation results obtained from the some images at the USC-SIPI database, demonstrate the strong performance of the proposed image encryption system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An image compression scheme based fusion and disassemble

    Publication Year: 2010 , Page(s): V3-28 - V3-30
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (615 KB) |  | HTML iconHTML  

    In this paper, a new image compression scheme is proposed. The self similarity of a static image is analyzed in order to implement image compression on basis of similarity and fusion rather than redundancy removal since the former is more similar to visual characteristic of people. Experimental result shows the scheme presented in the paper can has a potential performance on image and video coding. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reversible data hiding by using modified difference expansion

    Publication Year: 2010 , Page(s): V3-31 - V3-34
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1138 KB) |  | HTML iconHTML  

    In this paper, we propose a reversible data hiding method with low time complexity and high embedding capacity for gray-scale images. This method presents a block-based lossless data hiding schema to utilize the similarity between neighborhood pixels in the block to improve the marked-image quality. The experimental results show that our method has increased the hiding capacity with keeping acceptable marked-image quality. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new HR-tree index based on hash address

    Publication Year: 2010 , Page(s): V3-35 - V3-38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (192 KB) |  | HTML iconHTML  

    R-tree spatial index is a very common database index tree, R-tree has a wide application system as a common spatial index with a dynamic data structure in GIS. In this paper, based on the establishment method of the traditional R-tree, carry on hash address sorting to the MBR of the each node in every level of the R-tree, hash address is determined by the location of the MBR, it can well implement the inserting, deleting, querying operation in the new HR-tree, and has a good use value in practical applications. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An effective video anti-error algorithm for H.264

    Publication Year: 2010 , Page(s): V3-39 - V3-42
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (356 KB) |  | HTML iconHTML  

    A known problem in video streaming is that loss of a packet usually results into loss of a whole video frame. Error concealment is an effective way to solve this problem. A fast interactive anti-error algorithm based on motion tracking which suits for H.264 is proposed. In this algorithm, decoder firstly detects the error, and position of error blocks is feed back to encoder. Then encoder decides the areas that error possibly spread to with a motion tracking strategy. The possible areas are encoded in specific mode to avoid further propagation of error. The simulation result shows that error propagation can be prevented using proposed method of fast interactive anti-error algorithm based on motion tracking. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fault diagnosis method of automobile engine based on least squares support vector machine

    Publication Year: 2010 , Page(s): V3-43 - V3-46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (214 KB) |  | HTML iconHTML  

    In order to improve diagnostic accuracy and quality of maintenance, it is very important to study fault diagnosis method for automobile engine. Least-squares support vector machine called LSSVM is a modified SVM, which use a set of linear equations instead of a quadratic programming problem. In the paper, least-squares support vector machine is proposed to fault diagnosis of automobile engine. The LSSVM diagnostic model includes two LSSVMs which are used to recognize the three states of automobile engine including normal state, low-grade accidental fire and serious accidental fire. The experimental data of the relation between waste gas discharge and different accidental fire degree are presented to prove the diagnostic ability of the proposed method. The obtained results indicate that the used LSSVM method can make an effective interpretation in fault diagnosis of automobile engine. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An energy balanced multihop adaptive clustering protocol for wireless sensor networks

    Publication Year: 2010 , Page(s): V3-47 - V3-51
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (298 KB) |  | HTML iconHTML  

    In clustering wireless sensor networks, balancing the consumed energy and increasing the life time is the primary purpose of the routing protocol design. An Energy Balanced Multi-hop Adaptive Clustering protocol (EBMA) for wireless sensor network is presented in this paper, using the multi-hop mode to format a number of sub-networks, which like trees. Each sub-network is a cluster. In this paper, each parent node's residual energy is larger than its child nodes' in the cluster, thus the node with largest residual energy becomes the cluster head. Experimental results show that the proposed protocol effectively save the energy costs, balance the node energy consumption and prolong the lifetime of the network. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improve numerical efficiency of three-dimensional seismic migration by compressing traveltime table

    Publication Year: 2010 , Page(s): V3-52 - V3-56
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (733 KB) |  | HTML iconHTML  

    Traveltime data of seismic waves are indispensable for many seismic migration methods. Three-dimensional (3D) traveltime table is 3D scattered data, which has a large amount of data points. In process of 3D seismic migration, the enormous traveltime table file is frequently read, which significantly degrades the numerical efficiency. Research work has rarely been published to solve this problem by far. We propose a method to improve the calculation efficiency of 3D seismic migration by compressing the traveltime table: At first, we construct a least cuboidal region with regular grids in 3D space where all the traveltime data points are included. Then, the 3D cubic B-spline function is selected as a basal function to fit a curved surface body which covers all the 3D scattered traveltime data, and the values of the finite regular grids can be calculated using least square method, and then be stored into the memory. When the scattered traveltime data are needed by migration, they can be decompressed from the regular grids' data by linear interpolation of 3D cubic B-spline function. Because of having sparse character, the least-square coefficient matrix is stored into the memory by Compressed Sparse Column method, which saves the memory greatly. Application to real seismic data shows the method can compress the traveltime table with compressing ratio more than 270 and local relative errors as little as 0.0002. Additionally, because of the enormous traveltime table file needn't be read any more, the numerical efficiency of seismic migration can be enhanced by twice without any influence on the precision. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Research of chaotic synchronization based on Lorenz mode

    Publication Year: 2010 , Page(s): V3-57 - V3-61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (354 KB) |  | HTML iconHTML  

    In order to realize chaotic synchronization with less time and better capability, a method which combining linear feedback control and response system is studied in this paper based on Lorenz chaotic model. First of all, chaotic synchronization is realized by a driver-response model. Next, on the basis of this model, a method of linear feedback control is proposed to reduce the synchronization time. And then, the range of control parameters is given to achieve the Lorenz chaotic system synchronization, and furthermore, based on theoretic analysis, simulation results had shown its capability is satisfying and will have a perfect application prospect when applied in the fields of chaotic communication due to its perfect performance, and finally one of its application of this model is given. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Study of estimating method for actual size of underwater moving objects

    Publication Year: 2010 , Page(s): V3-62 - V3-65
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (407 KB) |  | HTML iconHTML  

    A novel method to estimate actual size of underwater moving objects on condition of no any references was proposed. Defocusing effect resulted from different distance between moving objects and lens was analyzed. Blurred edge width in out-of-focus image was detected by using wavelet transformation. The relations between blurred edge width and real distance between objects and lens were deduced based on optical principles. The actual size of the moving object was derived from Gauss formula and lateral magnification expression. The results show that the method gives the actual size of objects and avoids visual error. The method had been applied in the certain international tournament and its effect was excellent. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Indication position estimation by the homography of planes

    Publication Year: 2010 , Page(s): V3-66 - V3-69
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (360 KB) |  | HTML iconHTML  

    To get a rapid estimation of the user's indication position in computer vision based noncontact human-computer interaction (HCI) system, an indication position estimation method without explicitly calculating the cameras' parameters. The homography matrix is calculated using the known points on the target plane and their corresponding points imaged by the cameras. By this homography relationship, the two lines which intersect at the indication point on the target plane are related with their corresponding lines on the image plane, thus the position of the indication point is estimated by detecting specific lines from images. Experimental results show that the average error of the homographic mapping is 0.726 mm at the distance of 2.5 m; meanwhile, the amplitude of errors rises by 2.6% from the center to the fringe of the screen (size of the screen is 2500 mm ×1800 mm). The precision and consistency of this method can satisfy the requirement of most applications in human-computer interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Using ways of the trust, entrepreneurial orientation and the performance of venture enterprise

    Publication Year: 2010 , Page(s): V3-70 - V3-73
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (228 KB) |  | HTML iconHTML  

    Drawing on the related literature, the using ways of the trust between an entrepreneur and an venture capitalist are firstly divided into the exploiting and the exploratory; and then the paper empirically investigates its relationship with the entrepreneurial orientation and the entrepreneurial performance. Our results shows: (1) the using way of the trust and entrepreneurial orientation take positive effects on entrepreneurial performance of new ventures directly; (2) entrepreneurial orientation has the mediating effect between the using way of the trust and entrepreneurial performance, so enhancing entrepreneur's self-efficacy can improving the performance of the new ventures. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Artistic style generation by image analogy using ant algorithm based on the comprehensive area feathers

    Publication Year: 2010 , Page(s): V3-74 - V3-77
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (277 KB) |  | HTML iconHTML  

    This paper presents a robust scheme for texture synthesis in the process of artistic style learning based on the comprehensive area feathers of the segmented image blobs, which speeds up the process by exploiting the ant colony algorithm for the texture blobs matching firstly. The scheme also ensures the artistic style transition by the parameter setting of different sample images weights and shortens the time cost in the style generation process, which can transit the styles of several images to the targets. The preliminary experiments illustrate the scheme's good performance. Above all, the random algorithms just like the ant colony searching algorithm can enhance the comprehensive performance of the artistic style generation system. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind adaptive scheme for joint frequency offset and channel estimation in OFDM systems

    Publication Year: 2010 , Page(s): V3-78 - V3-82
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (417 KB) |  | HTML iconHTML  

    OFDM systems are very sensitive to frequency offset. This frequency offset results in inter-carrier interference (ICI) and, as a result, the performance of the OFDM system degrades drastically. In this paper, a blind adaptive method for joint frequency offset and channel estimation is proposed to reduce ICI effects and estimate frequency offset and channel. Adaptive technique is used to suppress these ICI effects. The channel impulse response (CIR) affected by frequency offset is tracked by a channel tracker in frequency domain. The result of the tracker is used to estimate the frequency offset and the channel. Then the frequency offset estimate is feedback to compensate the receipt signal. A blind estimation method is used, in consequence the efficiency and security of system are not reduced. The simulated results show that this scheme can reduce ICI effects significantly and the frequency and channel can be estimated effectually. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel single-channel SAR-GMTI method based on defocusing shifted difference

    Publication Year: 2010 , Page(s): V3-83 - V3-86
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (272 KB) |  | HTML iconHTML  

    A novel single channel SAR-GMTI method is proposed in this paper. When the azimuth mismatch filter performs compression, it induces shifted difference between the stationary and moving targets because of having different Doppler center. The proposed method employs this character to separate moving targets from stationary targets. It can produce two images by pulse compression which make use of two symmetrical mismatch filters in azimuth direction, and then cancel stationary and retain moving targets by subtracting one image from another. Compared with traditional methods, it is applicable to both low and high squint case and the detection capability is significantly improved. The simulation results validate the effectiveness of the proposed method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The algorithm optimization on artificial fish-swarm for the target area on simulation robots

    Publication Year: 2010 , Page(s): V3-87 - V3-89
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (479 KB) |  | HTML iconHTML  

    In this paper, we use an improved algorithm of artificial fish, and did the optimization in setting the border in the simulation platform, especially in the field of choosing ways of the robots, we use the Multi-threshold to reduce the uncontrollable actions when robots are in the game. And this method gives us an acceptable way to solve the issue. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of cross-layer design in satellite communication networks

    Publication Year: 2010 , Page(s): V3-90 - V3-94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (190 KB) |  | HTML iconHTML  

    With the development of communication technologies, various multi-media applications have been introduced into wireless and satellite networks. However, as wireless channels and satellite channels are not ideal and the traditional layering design method has its deficiencies, another network design method - cross-layer design has attracted more attention in recent years. In this article, the origin and methodology of cross-layer design are first presented. Then present efforts on cross-layer design for satellite networks are reviewed. Last the costs and tradeoffs in cross-layer design are analyzed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved adaptive stereo matching using double dynamic programming with correlation of row and column

    Publication Year: 2010 , Page(s): V3-95 - V3-100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (511 KB) |  | HTML iconHTML  

    In a variety of stereo matching algorithms using dynamic programming algorithm can effectively improve the speed and accuracy with good real-time performance and easy realization. In this paper, with advantages of dynamic programming, we presents a stereo matching algorithm using double dynamic programming with correlation of row and column, which uses improved adaptive support-weight approach and energy minimization model to solve the optimization problem. In the solving process, different constructed values of data items given based on characters of variation in the column direction using row dynamic programming and the values of smoothness item in the column direction, to reduce apparent defective stripes, are used to get the final result using column dynamic programming. Experimental results used Middlebury database show that the proposed algorithm can reduce the overall matching error rates and apparent defective stripes and get a better stereo matching effect. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.