By Topic

Information Technology: Coding and Computing, 2000. Proceedings. International Conference on

Date 27-29 March 2000

Filter Results

Displaying Results 1 - 25 of 87
  • Proceedings International Conference on Information Technology: Coding and Computing (Cat. No.PR00540)

    Publication Year: 2000
    Request permission for commercial reuse | PDF file iconPDF (410 KB)
    Freely Available from IEEE
  • Index of authors

    Publication Year: 2000, Page(s):527 - 530
    Request permission for commercial reuse | PDF file iconPDF (12 KB)
    Freely Available from IEEE
  • QoS management at the transport layer

    Publication Year: 2000, Page(s):312 - 317
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (136 KB)

    This work reports on further implementation and testing of the Application Oriented Transport Protocol (AOTP). AOTP is an experimental protocol above IP that provides end-to-end transport service with functionality to trade off reliability, throughput and/or jitter in order to support the application layer with the required quality of service. Our protocol, based on QoS tradeoffs, can favor applic... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The development of a betting system on the Internet

    Publication Year: 2000, Page(s):308 - 311
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    This paper describes the development of a betting system for horse-racing on the Internet. The system is set up by using Java Web Server to run on the Windows NT platform. The server uses Java Servlets to handle the requests from customers, to connect the database server, and to generate dynamic content for the Web browser. HTTP (Hypertext Transfer Protocol) is combined with SSL (Secure Sockets La... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards knowledge discovery from WWW log data

    Publication Year: 2000, Page(s):302 - 307
    Cited by:  Papers (3)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (44 KB)

    As the result of interactions between visitors and a Web site, an http log file contains very rich knowledge about users' on-site behavior, which, if fully exploited, can better customer services and site performance. Different to most of the existing log analysis tools which use statistical counting summaries on pages, hosts, etc., we propose a transaction model to represent users' access history... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Simulation of hardware support for OpenGL graphics architecture

    Publication Year: 2000, Page(s):295 - 300
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    The growing number of applications for 3D graphics and imaging systems in the mass market requires the customized approach to the design of high-performance 3D graphics and imaging system architectures. That fact coupled with the strong trends to industrial standardization of graphics API, such as OpenGL, leads to enhanced portability for imaging and graphics applications. The progress on the hard... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Segmentation and validation of commercial documents logical structure

    Publication Year: 2000, Page(s):242 - 246
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The main objective of the work is to present an approach to extract and validate the logical structure from the images that compose a commercial document. The nearest neighbor rule algorithm was used for labeling the elements, and the Run Length Smoothing Algorithm (RLSA) was used to segment the image of a commercial document of the type letter, official letter or memo. The most common classes con... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • QoS oriented bandwidth management scheme for stable multimedia services on the IMT-2000 networks

    Publication Year: 2000, Page(s):289 - 294
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    We propose a bandwidth management scheme to efficiently guarantee the QoS of various services on IMT-2000 networks. The proposed bandwidth management scheme consists of the call admission control based on the guard channel and the time slot scheduling in wireless links. For the call admission control the preemption and deprivation method are used to overcome the problems in the previous guard chan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Empirically derived design issues in auditory information processing for mobile telephony

    Publication Year: 2000, Page(s):462 - 469
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    This paper investigates empirically design issues in auditory information processing, relevant to interfaces for mobile telephony. This investigation forms the initial part of a larger experimental programme, which aims to investigate design methodologies for auditory-multimedia interfaces. Structured musical and environmental audio was used to communicate simple and complex (i.e., larger amounts)... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transparent and robust audio data hiding in subband domain

    Publication Year: 2000, Page(s):74 - 79
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (80 KB)

    Data hiding embeds extra information into digital media for the purpose of authentication, annotation and copyright protection. Transparency and robustness are two contradictory requirements for any data hiding scheme. This paper studies audio data hiding using the spread spectrum (SS) technique in the subband domain. On the transparency part, we propose a novel method of tuning psycho-acoustic mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic adaptive forward error control framework for image transmission over lossy networks

    Publication Year: 2000, Page(s):402 - 407
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (148 KB)

    We address the problem of transmitting JPEG compressed image over a lossy network. We introduce a combination of block level triangular interleaving scheme (TRII), and variable and selective forward error correction scheme (VS-FEC) to make the transmitted data more resilient while using the network bandwidth more efficiently in the presence of bursty losses. Our results show that TRII barely affec... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dynamic bandwidth allocation for VBR video traffic based on scene change identification

    Publication Year: 2000, Page(s):284 - 288
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (156 KB)

    To guarantee quality of service (QoS), the requirements of video transmission, such as delay and cell loss rate (CLR), are very stringent. These constraints are difficult to meet if high network utilization is desired. In this paper, dynamic bandwidth allocation algorithms, in which scene change identification is incorporated, are proposed to improve the bandwidth utilization. The bandwidth alloca... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise detection and cleaning by hypergraph model

    Publication Year: 2000, Page(s):416 - 419
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    This paper introduces a new algorithm for visual reconstruction of digital images which have been corrupted by mixed noise. From an image hypergraph model we introduce a combinatorial definition of noisy data. A detection procedure is used to classify the hyperedges either as noisy or clean data. Similar to other techniques, the proposed algorithm uses then an estimation procedure to remove the ef... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A unified derivation of operational matrices for integration in systems analysis

    Publication Year: 2000, Page(s):436 - 442
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (200 KB)

    Using the operational matrix of an orthogonal function to perform integration for solving, identifying and optimizing a linear dynamic system has several advantages: (1) the method is computer oriented, thus solving higher order differential equations becomes a matter of dimension increasing; (2) the solution is a multi-resolution type; (3) the answer is convergent, even the size of increment is v... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A simulation for real time data compression

    Publication Year: 2000, Page(s):455 - 460
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB)

    This paper presents one new basic step in real time data compression. The data under compression are random sequence of variable Y which at time t:y0, y1, ..., yt have occurred. Y-random integer-{0, 1, ..., N-1}. So, at time t, if we produce Y¯t+1 to be really a subset to Y so that yt+1∈Y¯t+1 then we can write or send... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A spatial digital video watermark that survives MPEG

    Publication Year: 2000, Page(s):68 - 73
    Cited by:  Papers (9)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2904 KB)

    Spatial watermarks are simple and quick to embed but vulnerable to intentional attacks or benign transformation such as compression. Watermarking of compressed video is often performed in the compressed domain. In this paper we show that by exploiting the inherent processing gain of direct sequence spread spectrum, it is possible to embed a watermark in raw video and still recover it from an MPEG ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Probability of miscorrection for Reed-Solomon codes

    Publication Year: 2000, Page(s):398 - 401
    Cited by:  Papers (1)  |  Patents (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (32 KB)

    The decoder fails to correct an erroneous message to its original untainted version when the number of errors exceeds half the number of appended Reed-Solomon characters. In most cases, the Reed-Solomon algorithm can detect the presence of an excess of errors through built-in filters. However, in a few cases, the message may be corrected to a different code word in which case it is said to be misc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A robust parallel architecture for adaptive color quantization

    Publication Year: 2000, Page(s):164 - 169
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (72 KB)

    Adaptive color quantization (ACQ) as described here is one method of color image compression employed for image storage and display in low cost monitors. Due to the nature of the palette based mapping employed in ACQ, it is prone to large errors due to noises introduced in transmission or additional lossy compression. This paper proposes a robust method of ACQ using a three dimensional self organi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data placement scheme on continuous media servers with ZBR disks

    Publication Year: 2000, Page(s):278 - 283
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (56 KB)

    Recent advances in computer technologies have made it feasible to provide multimedia services. As a result, the research and development of continuous media servers has received more attention in recent years. In general, these servers consist of multiple zone-bit recording (ZBR) disks or multiple storage nodes connected through the high-speed network to construct a distributed server. One key iss... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Recursive depth estimation from a sequence of images

    Publication Year: 2000, Page(s):201 - 206
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (128 KB)

    This paper gives the theoretical framework for recursively estimating the depth and motion parameters from the image motion equation derived using the spherical projection. An extended Kalman filter is employed for estimation. Results have been found to be encouraging in some cases when applied on two case studies involving vase and cube respectively View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A probabilistic image model for smoothing and compression

    Publication Year: 2000, Page(s):36 - 41
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (96 KB)

    In this paper, the problem of edge preserving smoothing in image processing is tackled by combining a noise corruption model and a region and edge image model. The derivation of the probability model for the first order difference in the gray levels of the region pixels and edge pixels leads to a non-linear filter with coefficients as functions of the estimated noise variance and edge intensity. S... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Self-adaptive masking method for automatic shape recognition and motion correction of thallium-201 myocardial perfusion SPECT imaging

    Publication Year: 2000, Page(s):477 - 482
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (168 KB)

    We introduce a new self-adaptive masking method for shape detection of low signal to noise ratio (SNR) images to improve the tracking capabilities of the motion correction in nuclear cardiac imaging. The method is developed using two-dimensional fast Fourier transform, ideal filtering in the frequency domain, recursive thresholding, and region recognition. This method is independent of the correla... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Overview of interference cancellation for CDMA wireless systems

    Publication Year: 2000, Page(s):86 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (100 KB)

    The paper gives an overview of interference cancellation (IC) methods, in terms of implementation and performance, for third generation CDMA communications systems. The signal processing of each method is outlined and the advantages and challenges are discussed. An exemplary IC application at the mobile receiver and its performance are presented for the WCDMA system setup View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A general interleaver for equal and unequal error protections of turbo codes with short frames

    Publication Year: 2000, Page(s):412 - 415
    Cited by:  Papers (4)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (60 KB)

    The key to the efficient operation of turbo codes is the interleaver design. With proper design, the pairing of low-weight sequences to the input of the encoders can be avoided. Circular shift interleavers can be used to ensure that the minimum distance due to weight-2 input sequences grows roughly as √2N, where N is the block length. We generalized the mapping function of the circular shift... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel real-time numerical computation: beyond speedup. III

    Publication Year: 2000, Page(s):428 - 435
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (112 KB)

    For pt. II see Technical Report No. 99-423, Dept. of Comput. and Inf. Sci., Queen's University, Kingston, Ontario, May 1999. Parallel computers can do more than simply speed up sequential computations. They are capable of finding solutions that are far better in quality than those obtained by sequential computers. This fact is demonstrated by analyzing sequential and parallel solutions to numerica... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.