By Topic

Proceedings of the IEEE Symposium on Emerging Technologies, 2005.

18-18 Sept. 2005

Filter Results

Displaying Results 1 - 25 of 108
  • Proceedings 2005 International Conference on Emerging Technologies

    Publication Year: 2005, Page(s): 0_1
    Request permission for commercial reuse | PDF file iconPDF (712 KB)
    Freely Available from IEEE
  • Proceedings 2005 International Conference on Emerging Technologies

    Publication Year: 2005, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (331 KB)
    Freely Available from IEEE
  • Copyright page

    Publication Year: 2005, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (110 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2005, Page(s):iii - x
    Request permission for commercial reuse | PDF file iconPDF (920 KB)
    Freely Available from IEEE
  • Foreword

    Publication Year: 2005, Page(s): xi
    Request permission for commercial reuse | PDF file iconPDF (131 KB) | HTML iconHTML
    Freely Available from IEEE
  • Conference organization

    Publication Year: 2005, Page(s): xii
    Request permission for commercial reuse | PDF file iconPDF (89 KB)
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2005, Page(s): xiii
    Request permission for commercial reuse | PDF file iconPDF (61 KB)
    Freely Available from IEEE
  • [Breaker page]

    Publication Year: 2005, Page(s): xv
    Request permission for commercial reuse | PDF file iconPDF (26 KB)
    Freely Available from IEEE
  • Restoration routing in multi-protocol label switching (MPLS) networks

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (125 KB) | HTML iconHTML

    Summary form only given. MPLS Networks are known to provide flexibility of IP networks without compromising scalability. Guaranteed QoS in an MPLS network requires backup paths to be preset in the network. This tutorial introduces the single-layer restoration routing by placing primary as well as backup paths in MPLS networks. Our focus is on characterizing the fault models, computing and establis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low noise microwave amplifier design

    Publication Year: 2005
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (106 KB)

    Summary form only given. Microwave amplifiers are one of the key building blocks of radar and communication systems. The modern communication systems place stringent requirements on the performance of the amplifiers, which in turn impacts the overall system performance. This tutorial presents the theory and technique of designing microwave amplifiers. The design of a low noise amplifier for wirele... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A novel statistical distortion model of mpeg-4 FGS

    Publication Year: 2005, Page(s):1 - 6
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1006 KB) | HTML iconHTML

    Laplacian distribution has been widely used to characterize the distribution of DCT coefficients. But in our research, we found that there are big discrepancy between the real data and the distortion model based on Laplacian distribution. And what's more, the higher the rate is, the larger the distortion is. In this paper, we proposed a new distortion model based on mixed Laplacian and uniform dis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Correction technique for velocity and position error of inertial navigation system by celestial observations

    Publication Year: 2005, Page(s):7 - 12
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1090 KB) | HTML iconHTML

    The residual sensor errors and misalignment of an inertial navigation system cause deviation from the true navigation solution. The navigation errors grow as function of time, sensor errors and vehicle dynamics. A celestial aided inertial navigation system (INS), carried on a space vehicle, has to rely on the independent INS output until the vehicle gets out of the dense atmospheric layer. The mis... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Detection of period-3 behavior in genomic sequences using singular value decomposition

    Publication Year: 2005, Page(s):13 - 17
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1987 KB) | HTML iconHTML

    Many digital signal processing techniques have been used to automatically distinguish the protein coding regions (exons) from non-coding regions (introns) in a DNA sequence. Recently, autoregressive (AR) technique has been used for the detection of 3-periodicty present in protein coding regions of genomic sequences. The sequence length, average spacing between coding regions, and average coding re... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Slope hold image interpolation using fan filters

    Publication Year: 2005, Page(s):18 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2160 KB) | HTML iconHTML

    This paper presents a new method for nonlinear image interpolation. Previous directional interpolation methods only take the edges along a certain direction and then perform interpolation on such images. Our proposed method in its first step decomposes the image into its directional components based on fan filters presented in R.H. Bamberger (1990). These outputs differ from previous methods as it... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Effect of buffer length on rate distortion bound for different PLC methods

    Publication Year: 2005, Page(s):21 - 26
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1269 KB) | HTML iconHTML

    Real-time multimedia communication due to its stringent delay requirements needs low delay PLC (packet loss concealment) methods to reduce the effect of lost packets. For audiovisual communications several PLC methods are utilized such as zero substitution or waveform substitution, we compare zero substitution and waveform repetition for a Gaussian source on the Gilbert-Elliott channel model. This... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Urdu online handwriting recognition

    Publication Year: 2005, Page(s):27 - 31
    Cited by:  Papers (8)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (881 KB) | HTML iconHTML

    Handwriting has continued to persist as a mean of communication and recording information in day-to-day life even with the introduction of new technologies. Handwritten information can be used as computer input once it is converted to digital form. This paper focus on Urdu online handwriting recognition system that converts user hand written information into Urdu text. The working of recognition s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Time frequency distribution using neural networks

    Publication Year: 2005, Page(s):32 - 35
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (641 KB) | HTML iconHTML

    In this paper we present a method of obtaining a time frequency distribution (TFD) of a signal whose frequency components vary with time. The method employs neural networks (NN) which are trained by using the spectrograms of several training signals as input and TFDs that are highly concentrated along the instantaneous frequencies of the individual components present in the signal as targets. The ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new method for fuzzy hidden Markov models in speech recognition

    Publication Year: 2005, Page(s):36 - 40
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (874 KB) | HTML iconHTML

    This paper proposes a fuzzy approach to the hidden Markov model (HMM). This method celled the fuzzy HMM for speech and speaker recognition as an application of fuzzy expectation maximizing algorithm in HMM. The fuzzy HMM algorithm is regarded as an application of the fuzzy expectation-maximization (EM) algorithm to the Baum-Welch algorithm in the HMM. The Texas Instruments p4 used speech and speak... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Cooley-Tukey FFT method for zero padded signals

    Publication Year: 2005, Page(s):41 - 45
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (690 KB) | HTML iconHTML

    The classical Cooley-Tukey fast Fourier transform (FFT) algorithm has the computational cost of O(Nlog2N) where N is the length of the discrete signal. Spectrum resolution is improved through padding zeros at the tail of the discrete signal, if (p -1)N zeros are padded (where p is an integer) at the tail of the data sequence, the computational cost through FFT becomes O(pNlog... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved laplacian distortion model of Mpeg-4 FGS

    Publication Year: 2005, Page(s):46 - 51
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1119 KB) | HTML iconHTML

    In this paper, we did research on the relationship between rate and distortion for mpeg-4 FGS enhancement layer. During the course of research on the relationship between rate and distortion of meg-4 FGS enhancement layer, we found that there are big discrepancy between the real data and the RD model based on Laplacian distribution. And what's more, the higher the rate is, the larger the error is.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobility vs. predictive MPR selection for mobile ad hoc networks using OLSR

    Publication Year: 2005, Page(s):52 - 57
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2823 KB) | HTML iconHTML

    Mobility drastically decreases the connectivity of ad hoc networks as compared to a network with consistent dispersed nodes. A network can be simulated for routing protocol performance using different available mobility models. But for our scenario development under non-deterministic dynamic movement of nodes, none of the already existing models provides adequate functionality. Therefore the focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The statistical average carrier-to-interference ratio (CIR) of an ad hoc CSMA/CA wireless network providing multiple service-classes

    Publication Year: 2005, Page(s):58 - 62
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1687 KB) | HTML iconHTML

    This work characterizes the statistically expected carrier-to-interference ratio (CIR, C/R) of an ad hoc CSMA/CA wireless communication network, via Monte Carlo simulations. This paper is first in the open literature to model an ad hoc network accounting for all these following factors: (1) more realistic modeling of the network nodes' spatial distribution us via a two-dimensional Poisson process,... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-aware fuzzy routing for wireless sensor networks

    Publication Year: 2005, Page(s):63 - 69
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1363 KB) | HTML iconHTML

    In recent years, many approaches and techniques have been explored for the optimization of energy usage in wireless sensor networks. Routing is one of these areas in which attempts for efficient utilization of energy have been made. These attempts use fixed (crisp) metrics for making energy-aware routing decisions. In this paper, we present a novel generalized fuzzy logic based approach for energy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • High speed data transmitters for wireless applications

    Publication Year: 2005, Page(s):70 - 73
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2049 KB) | HTML iconHTML

    In this work the high speed data transmitters for wireless applications has been investigated. The work reviews concepts and techniques related to the effect of modulation accuracy on high speed downlink packet access (HSDPA) radio link performance. The error vector magnitude (EVM) results are simulated and discussed by using the test models without HSDPA (test model 1) and with HSDPA (test model ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A multi - priority application framework for heterogeneous ad hoc networks

    Publication Year: 2005, Page(s):74 - 79
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4274 KB) | HTML iconHTML

    Mobile ad hoc networks have become, quite common nowadays. The usage of voice and video applications over these networks has created various challenges for research community. Real-time applications require certain guarantees in terms of throughput, delay, jitter and packet loss ratio from the underlying network. Legacy MAC layers do not provide service/traffic differentiation and treat both real-... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.