Telecommunications Symposium, 1998. ITS '98 Proceedings. SBT/IEEE International

9-13 Aug. 1998

Go

Filter Results

Displaying Results 1 - 25 of 59
  • ITS/98 Proceedings-SBT/IEEE International Telecommunications Symposium [front matter]

    Publication Year: 1998, Page(s):i - xxiv
    Request permission for commercial reuse | PDF file iconPDF (1003 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):676 - 677
    Request permission for commercial reuse | PDF file iconPDF (154 KB)
    Freely Available from IEEE
  • An alarm correlation system for SDH networks

    Publication Year: 1998, Page(s):492 - 497 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The alarm correlation in SDH digital transmission networks is up to date, complex and a very important solution to telecommunications systems operation. The alarm correlation in networks can use several techniques and computer science methods. This paper presents the development of an alarm correlation system for SDH networks, in which, from the studies and the choice of appropriate method, can be... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Telecommunications services management with computational reflection, using CORBA and JAVA

    Publication Year: 1998, Page(s):486 - 491 vol.2
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (500 KB)

    Currently, telecommunications management systems are powerful, however, they maintain centralized and proprietary platforms, limiting in this way, the growth of these telecommunications networks. This factor generates the need for scalable and open systems, stimulating the sectors of the telecommunications area to seek for solutions to problems in distributed, heterogeneous and totally scalable en... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new iterative method to solve a volume integral equation

    Publication Year: 1998, Page(s):410 - 414 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (244 KB)

    A new iterative method for solving a volume integral equation is developed. The method consists of the division of the domain into subdomains, every subdomain characterized by a moment matrix that determines the field induced by the excitation. The entire solution is built by interaction among the subdomains, with the incident field as the initial excitation View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A recognition algorithm of printed or handwritten digits of the ZIP code

    Publication Year: 1998, Page(s):671 - 676 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    This paper describes an algorithm that carries out the recognition of printed or handwritten digits through the verification of intrinsic and common characteristics. Verifying such characteristics the algorithm tries to come close to the recognition process used by the human being. This algorithm carries out the segmentation of the overlapped digits, scanning the entire digit and copying the pixel... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Runlength-limited error control codes from binary expansions of Reed-Solomon codes

    Publication Year: 1998, Page(s):539 - 541 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (176 KB)

    Two examples are presented to find runlength-limited error control codes from linear transparent binary expansions of Reed-Solomon codes. The codes obtained can correct burst and random errors and are suitable for digital transmission and recording systems View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of synchronisation errors for the G.728 decoder

    Publication Year: 1998, Page(s):454 - 457 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB)

    A new method for the fast detection of frame synchronisation errors inside the G.728 speech decoder is described. The proposed algorithm uses a priori knowledge about internal decoder parameters. The G.728 frame synchronisation fails, if an octet slip in the transmission system occurs. This error type causes a shift of the word boundaries in the G.728 data stream. The decoder produces in this case... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Two-scale transmission of DCT-coded video over lossy packet networks

    Publication Year: 1998, Page(s):510 - 515 vol.2
    Cited by:  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper discusses the development and results of a simulation package for two-scale transmission of discrete cosine transform (DCT)-coded video over lossy packet networks. The considered scalability of coded video sequences is based on variations of data partitioning and requantization techniques. These variations contemplate situations in which the reference signal used in predicted (P-type) o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Implementing a distributed Web-based management system in Java

    Publication Year: 1998, Page(s):554 - 559 vol.2
    Cited by:  Papers (3)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (496 KB)

    The distribution requirement of current and future networked environments has led to a shift from traditional centralized towards distributed management approaches. A distributed architecture for network management is presented The architecture implementation is based on an extensive use of emerging client/server, Web and Java technologies, the pursued objective being to promote flexibility, openn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast thinning algorithm

    Publication Year: 1998, Page(s):594 - 599 vol.2
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (480 KB)

    This paper describes a fast thinning algorithm (FTA). This algorithm possesses two main steps, that are repeated until the obtained image approaches the medium axis of the original image. In the first step the contour of the image is marked and in the second step the contour marked is analysed to verify which pixels-on belonging to this contour should be deleted. The FTA algorithm maintains the co... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • NetTrouble: a TTS for network management

    Publication Year: 1998, Page(s):480 - 485 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (472 KB)

    Current information systems need tools that are able to register the variety of problems that occur in the system, co-ordinating the efforts for resolution and keeping the experience gained in those efforts. These applications are traditionally called trouble ticket systems (TTS). The network management (NM) environment involves several issues not yet addressed by current systems, namely the heter... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient tree construction for the multicast problem

    Publication Year: 1998, Page(s):632 - 637 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (604 KB)

    A new heuristic for the Steiner minimal tree problem is presented. The method described is based on the detection of particular sets of nodes in networks, the “hot spot” sets, which are used to obtain better approximations of the optimal solutions. An algorithm is also proposed which is capable of improving the solutions obtained by classical heuristics, by means of a stirring process ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonlinear switching recovery in planar directional coupler with loss

    Publication Year: 1998, Page(s):405 - 409 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    Twin-core nonlinear directional couplers that include loss and nonlinear refractive index are examined. The inclusion of loss results in the increase of the critical power of the coupler while the switching characteristics deteriorate. To compensate for this behavior associated with the loss, we investigate the effect of the nonlinearity profile on the performance of an increasing nonlinearity cou... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Compressing images using edges and textures separately

    Publication Year: 1998, Page(s):577 - 581 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1012 KB)

    This paper presents an image compression technique that codifies edges and textures of a given image separately using the wavelet transform. The proposed method has been developed in order to improve a low bit-rate scheme for still images. This kind of approach produces image contours that are well-defined and are not destroyed by the compression process, which is what usually happens on most codi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A scalable Khoros neural network toolbox

    Publication Year: 1998, Page(s):667 - 670 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (580 KB)

    Three problems limit neural network simulation environments. First, the computational complexity of neural network simulation imposes a practical constraint on the size of simulated neural networks. Second, neural network simulation environments are usually designed to accommodate a confined set of neural network models. Third, most neural network simulation environments do not facilitate interope... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New unit-memory codes obtained by puncturing periodically time-varying convolutional codes

    Publication Year: 1998, Page(s):534 - 538 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    New good high-rate punctured convolutional codes (PCC) are presented. While any previously known PCC was derived by puncturing a low-rate time-invariant mother code, the new PCC are shown to be derived by puncturing a periodically time-varying convolutional code (PTVCC) acting as the mother code. To find the new PCC, we first show that any PTVCC (hence, any PCC) is equivalent to a type of time-inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Complex algorithm in frequency domain optimization using first order linear transversal filters in parallel and prefiltering in input signal

    Publication Year: 1998, Page(s):448 - 453 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    This paper presents the adaptive IIR filtering with a parallel form realization in a system identification application using a prefiltering algorithm and distinct initialization for each section of the parallel filter. The frequency domain implementation and a recursive frequency sampling structure was used in computer simulation and the results present gains in convergence speed and in the stabil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A supervised neural constant bit rate video controller for MPEG2 encoders

    Publication Year: 1998, Page(s):504 - 509 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (400 KB)

    A supervised training algorithm is used in a radial basis function neural network in order to improve the performance of a recently introduced nonlinear predictive rate controller for MPEG2 encoders. The algorithm, which is based on the stochastic gradient method, is used for updating the radial basis centers. By means of extensive computer simulation with standard video sequences, practical desig... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Enhancing an optical access network with ADSL technology

    Publication Year: 1998, Page(s):548 - 553 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    This paper gives a short overview on narrowband access networks and the need for enhancing these networks with ADSL transmission techniques. After a short introduction to ADSL, the current status of the standardization process for ADSL is reflected. A major open topic in the physical layer is ADSL over ISDN transmission. There are many other open issues for higher layers. The work of the ADSL Foru... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multistage decoding of block multidimensional M-PSK modulation codes

    Publication Year: 1998, Page(s):462 - 467 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB)

    A class of block multidimensional M-PSK modulation codes was proposed by Portugeis (1991) and some 8-PSK codes were constructed. In comparison with codes using two-dimensional modulation, the constructed codes showed better phase symmetry properties and lower first error coefficients with multistage decoding. However, the trade-off between performance and decoding complexity was not thoroughly inv... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile code implementation of the RTP protocol in Java: design choices and evaluation

    Publication Year: 1998, Page(s):644 - 649 vol.2
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (384 KB)

    The use of a mobile code, partly interpreted language such as Java is investigated as a tool to build highly portable implementations of multimedia communication protocols. In particular, we concentrate on the implementation of the real-time protocol and focus our attention on three main issues: first, we evaluate the quality and accuracy of the services offered by some relevant primitive operatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Image coding with low blocking effects using discrete sine transform with axis rotation

    Publication Year: 1998, Page(s):588 - 593 vol.2
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB)

    The blocking effect is a problem that is always present in image coding by blocking transform. A simple method for image coding, with low blocking effect, using pre- and post-axis rotation and the discrete sine transform, is presented. The method was implemented, and the results obtained by simulation in the image coding are compared with image coding by DCT and LOT View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A meta-signalling management implementation for public ATM networks

    Publication Year: 1998, Page(s):474 - 479 vol.2
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (512 KB)

    The objective of this paper is the study of the broadband-integrated services digital network (B-ISDN) meta-signalling protocol. The new paradigm that will be introduced to the service offered to the user and to his environment is discussed, and the meta-signalling protocol is described, as an important part of this new paradigm. An implementation of the meta-signalling management for a B-ISDN use... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An authentication server in Java implementation of an encryption framework model and DES algorithm in Java

    Publication Year: 1998, Page(s):627 - 631 vol.2
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (432 KB)

    The present work presents a framework model for communication channel encryption with functions similar to JCE (Java cryptography extensions) of Java, which allows any encryption algorithm to be codified and used in a simple and standard way. Through this proposed framework model, it is possible to insert cryptography in a transparent way in communication channels like conventional TCP/IP sockets.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.