By Topic

Communication Technology Proceedings, 1998. ICCT '98. 1998 International Conference on

Date 22-24 Oct. 1998

Go

Filter Results

Displaying Results 1 - 25 of 165
  • 1998 International Conference on Communication Technology Proceedings [front matter]

    Publication Year: 1998, Page(s):0_2 - 26
    Request permission for commercial reuse | PDF file iconPDF (1227 KB)
    Freely Available from IEEE
  • Author index

    Publication Year: 1998, Page(s):27 - 31
    Request permission for commercial reuse | PDF file iconPDF (321 KB)
    Freely Available from IEEE
  • A robust 800 bps MBE coder with VQ and MLP

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (208 KB)

    A speech coding algorithm for a robust 800 bps coder has been developed based on the multi-band excitation (MBE) model. The techniques of smoothing the pitch period by dynamic programming, LPC all-pole model to approximate the MBE spectral shape, formant enhancement, interpolation, vector quantizer (VQ), and multilayer perception of neural networks (MLP), etc. are adopted to improve the performanc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An Application Architecture for Interactive Communication over the World Wide Web

    Publication Year: 1998, Page(s):S48-03-1 - S48-03-3
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (212 KB)

    First Page of the Article
    View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Globally optimized dynamic channel assignment for cellular radio systems

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    This paper presents a new channel assignment strategy named globally optimized dynamic channel assignment (GODCA). The GODCA differs from other strategies by consistently keeping the system in the utmost optimal state. The algorithm is simple and straightforward. It employs the Hopfield neural network for optimization which avoids the complicated assessment of channel compactness and guarantees op... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • SIMUL language and its application in communication network simulation

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (336 KB)

    In this paper, we first present a new system-level specification language for the simulation of communication networks. It fuses together features of SDL and BONeS and is intended to model communication networks. At the same time, it is also a simulation language supporting reusability well. It has a textural representation and a graphical representation. A complete example which models a M/M/1 qu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Generation executable test sequences based on Petri-net for combined control and data flow of communication protocol

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    Protocol conformance testing plays an important role in communication developments. A new approach for generating executable test sequences is reported in this paper. Firstly, we select the operational coverage criterion for control flow and all-defs, all-uses, maximal I/O-df chains criteria for data flow. Secondly, based on the Petri-net which is obtained from a LOTOS specification, a new approac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Universal service in China

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB)

    During the late 1980s and 1990s, China's telecommunication industry has achieved significant progress. Stimulated by regulatory reforms and guided by policies encouraging investment in the telecommunication sector, China has broken and set new world records for the speed of telecommunication development. However, as China is still a developing country, the imbalance in the telecommunication servic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-organizing neural network domain classification for fractal image coding

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB)

    This paper presents a scheme for improving encoding times for fractal image compression. The approach combines feature extraction with domain classification using a self-organizing neural network. Feature extraction reduces the dimensionality of the problem and enables the neural network to be trained on an image separate from the test image. The self-organizing network introduces a neighborhood t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 2 kbps-2.4 kbps low complexity interpolative vocoder

    Publication Year: 1998
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    In this paper a 2 kbps-2.4 kbps low complexity interpolative speech coding algorithm is presented. This speech coder takes the good ideal of waveform interpolation, but adopts a different framework to simplify the system complexity. Band pass analysis is made to estimate the random component in the speech excitation and used to estimate contour of the random prototype in the synthesis procedure. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A dynamic frame PRMA protocol for wireless ATM networks

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (808 KB)

    This paper presents a new reservation-based medium access control protocol-dynamic frame packet reservation multiple access (DF-PRMA)-for wireless ATM network, in which the various types of service traffic are statistically multiplexed over the air interface while guaranteeing their individual QoS. One of the key features in the proposed protocol is the variable frame length, which allows for the ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Supporting distributed behaviours in shared workspace

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (324 KB)

    Distributed behaviours provide users with the sensation of cooperation, which is desirable to collaborative and interactive computing. We present a formal model of a shared workspace and distributed behaviours to describe and analyse collaborative working. The workspace is implemented in a purely replicated architecture. Our approach to analyzing a disconnecting-tolerant system is by dividing coll... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Specification, verification and implementation of OSI X.25/FR gateway based on high-level Petri nets

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    The X.25/FR gateway is constructed according to the corresponding OSI protocols. A high-level Petri net called EPr/TN is introduced as a formal specification tool to establish the system model of the gateway. The specification, analysis and verification of the protocol conversion and data transmission are given. Based on the model, the gateway is implemented View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Analytical methods to evaluate the performance of computer and communication networks for commercial business

    Publication Year: 1998
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (456 KB)

    The universal executing computer and communication networks for commercial business (CCNCB) are larger computer and communication systems that have one or a number of host computer systems with main frames providing information processing services. Terminals of such computer systems include workstations, personal computers, commercial POS servers and various subsystems. The purpose of this paper i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Resource management in MPLS applied ATM network

    Publication Year: 1998
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (320 KB)

    When an IP packet travels in the network, the packet header always carries excess information for routing. To improve the efficiency of packet routing and QoS requirement, MPLS technology is put forward. It can be applied to different network environments and the ATM network is just one of them. Due to the features of MPLS, resource management has its own characteristics. There have been proposed ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Properties and constructions of nonlinear resilient function over rings Zm

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    This paper investigates a decomposition formula of Chrestenson spectrum of a class of m-valued logical functions. On the basis of the formula, we give some methods for construction of nonlinear resilient functions over rings Zm View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A wavelet filter optimization algorithm for speech recognition

    Publication Year: 1998
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (344 KB)

    A wavelet filter optimization algorithm is proposed. The proposed algorithm is based on wavelet matrix parameterization, through which wavelet filters can be factorized to a smaller set of parameters. Based on the cross validation cost function defined in this paper, Monte Carlo simulation is used to search the optimal wavelet filters for speech recognition. Using this wavelet filter optimization ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance improvement of ATM data transmission over wireless links

    Publication Year: 1998
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (488 KB)

    We describe an investigation of ATM over wireless links. We first analyze the ATM header error correction (HEC) mechanism and calculate ATM quality of service (QoS) parameters such as the cell loss ratio (CLR), and the cell error rate (CER) for a wireless link. We suggest possible error control method to improve the performance degradation caused by burst errors. The error control methods consider... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient, fast handoff schemes for multiple traffic classes in wireless ATM networks

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (428 KB)

    Chang, Sung, Chang and Kim (see ICCT'98, 1998) proposed a dynamic wireline resource management scheme, called a cell based sequential reservation (CBSR) scheme. In this paper, the CBSR scheme is extended to multiple connection environments with complete sharing and complete partitioning resource management policies. For multiple connection environments with two resource management policies the pro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Internet traffic control and management architecture

    Publication Year: 1998
    Cited by:  Patents (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (372 KB)

    Internet traffic control and management can be used to serve many different purposes. Congestion control in routing and resource reservation is such an example. Admission control for quality of service is another. Despite the different goals that Internet traffic control and management is trying to achieve, there could be one common architecture that serves as the framework. In this paper, we pres... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Apply CSCW into the Internet

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (412 KB)

    With the Internet and “information highway” being established, CSCW finds a new application. We first discuss the three fields of the combination of CSCW and the Internet, and then illustrate how to apply the cooperation effects to the Internet and make the Internet elements, including cache servers and Web servers, work cooperatively, to improve the functionality of the Internet. For ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effects of trellis coded 16QAM with pilot tone in time selective fading environment

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    A mobile radio signal with time selective fading is analysed concerning possibilities for its transmission quality improvements. For that purpose trellis coding is combined with QAM in the transmitter signal processing unit. Using a previously developed analytical model, the effects of the processing method are evaluated through bit error rate calculations View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A system dynamics model for pricing telecommunication services

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    In this paper, pricing telecommunication services is considered as a non-linear, multi-feedback, time-variable and sophisticated system which has a close relation and interaction with social economic systems. On the basis of analyzing the influence of tariff level on the whole social economic system and the telecommunication service itself, we designed the cause-effect relation diagram model, buil... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Technical and economic analysis of access networks in China

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    China is making rapid progress in telecommunication development. In order to keep sustain development, it is very important and difficult to select suitable solutions for developing access networks in China from so many possible technologies. Based on investigation of access networks in China, various subscriber access technologies are discussed and evaluated by using the dynamic capital analysis ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance of binary tree collision resolution algorithm of random access channels

    Publication Year: 1998
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    This paper employs the average cycle analysis method and binary tree collision resolution algorithm to analyze the performance of a random access system. It studies the packet collision resolution in a random multiple access system. The formula in which the colliding packets are resolved successfully is obtained. Also, the formulae of the throughput of two systems are given, one system employs the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.