2007 International Conference on Communications, Circuits and Systems

11-13 July 2007

Filter Results

Displaying Results 1 - 25 of 298
  • [Conference front matter]

    Publication Year: 2007, Page(s):1 - 9
    Request permission for commercial reuse | PDF file iconPDF (1599 KB)
    Freely Available from IEEE
  • Contents of Proceedings of ICCCAS 2007

    Publication Year: 2007, Page(s):1 - 17
    Request permission for commercial reuse | PDF file iconPDF (967 KB)
    Freely Available from IEEE
  • Cassinian Waveguides [Keynote Speeches: Speech 1]

    Publication Year: 2007, Page(s): 18
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (700 KB)

    Summary form only given. Cassinian curve as shown below has been in existence for quite a long time yet not used in applications of practical interest since engineers do not know them well. No hand book gives the result of K (1//spl sqrt/2) as the perimeter of the Cassinian when β = 1. Greenhill discusses this curve five times in his book [1892] and gives different results that might have confused... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Next Generation Networks - Solutions or Challenges? [Keynote Speeches. Speech 2]

    Publication Year: 2007, Page(s): 19
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (918 KB)

    Summary form only given, as follows. Telecommunication networks are providing real-time-base services with guaranteed QoS (Quality of Services) based on the connection-oriented networks. The IP based networks are, based on connectionless networks, providing non-real-time and non-guaranteed QoS services, such as e-mail, ftp and WWW. Internet is being enhanced to support connection-oriented emulatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Layered Segmentation Algorithm of Fingerprint

    Publication Year: 2007, Page(s):583 - 587
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2963 KB)

    Fingerprint image segmentation heavily influences the performance of fingerprint verification systems. The task of generic segmentation algorithm is only to find the background and the foreground. But the layered segmentation method in this paper is not only to distinguish the background and the foreground but also to be helpful for the matching of fingerprint by endowing different weight to the m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A New Image Watermarking Algorithm Using BEMD Method

    Publication Year: 2007, Page(s):588 - 592
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (4413 KB) | HTML iconHTML

    A new image adaptive watermarking algorithm based on Bidimension Empirical Mode Decomposition (BEMD) is proposed. As a new two-dimensional signal processing tool, BEMD is first introduced into the image watermarking field in this paper. In the proposed algorithm, the cover image is decomposed into several intrinsic mode functions (IMFs) based on its local feature adaptively. Then the human visual ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A High Robust Video Digital Watermark Algorithm Based on Embedding and Extracting in Random Frames

    Publication Year: 2007, Page(s):593 - 597
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2825 KB) | HTML iconHTML

    Two classifications of robustness were given in video digital watermark. Then extracting watermark was deduced to sample overlap in two random samplings. With the help of "two thirty" conclusion, a new algorithm was proposed with high reliability and robustness. The proposed algorithm can resist frame-edit attacks efficiently which are familiar and hard to solve. And it supplies an important techn... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Dual Digital Watermarking Used in Product Casing

    Publication Year: 2007, Page(s):598 - 601
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2215 KB) | HTML iconHTML

    In this paper, it is proposed an invisible dual digital watermarking scheme based on DCT domain, which can be used in the product casing. By embedding fragile and robust watermark simultaneously, the scheme can both prevent the product from forgery and take the information of its serial number. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • UEP Schemes for Multimedia Transmission in Space-Time Coded Systems

    Publication Year: 2007, Page(s):602 - 606
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2045 KB) | HTML iconHTML

    A system model based on multilayered space-time trellis codes (ML-STTC) is constructed for multimedia transmission over wireless communication systems with multiple antennas both at the transmitter and the receiver. In this model, Space-time Trellis Code (STTC) and Layered Space-time (LST) architecture are combined to achieve diversity and multiplexing gains provided by multiple-input and multiple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Speaker Change Detection Algorithm

    Publication Year: 2007, Page(s):607 - 610
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1287 KB) | HTML iconHTML

    To cope with the problem of speaker voice change detection, a novel speaker change detection algorithm is proposed in this paper. The new algorithm is developed based on traditional BIC algorithm in order to choose the voice segmentation point firstly, and then analyze the BIC change trend to decide which point is the real speaker voice change point. To compare with the normal BIC detection algori... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Content-based Rate Control Algorithm for 1.264

    Publication Year: 2007, Page(s):611 - 615
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2987 KB) | HTML iconHTML

    Rate control plays a very important role in bandwidth limited multimedia communication systems. In H.264/AVC, since the drawbacks in the GOP layer and frame layer rate control algorithms, the bits can not be allocated reasonably, sometimes flicker effects will occur and the video coding quality will be degraded. In this paper, a novel rate control algorithm for H.264/AVC is proposed, which integra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Algorithm of Iris Image Quality Evaluation

    Publication Year: 2007, Page(s):616 - 619
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2084 KB) | HTML iconHTML

    In this paper, we judge whether an iris image has quality problem from two aspects. On one hand, we analyze the higher spatial frequency sub-band image of the original iris normalization image and determine whether this image has eyelid and lash occlusion problem according to the number of high value pixels. On the other hand, we determine whether an iris image is clear enough though computing the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Distributed Arithmetic for FIR Filter Design on FPGA

    Publication Year: 2007, Page(s):620 - 623
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3694 KB) | HTML iconHTML

    This paper presents a distributed arithmetic (DA) for highly efficient multiplier-less FIR filter designed on FPGA. First, the theory of the distributed arithmetic is described. Furthermore, a modification of the DA based on the look up table (LUT) and filter structure to implement the high-order filter hardware-efficient on FPGA is introduced. The proposed filter has been designed and synthesized... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evaluation of Several FIR Fractional Delay Filters in Element-Interpolation DPCA

    Publication Year: 2007, Page(s):624 - 627
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2937 KB) | HTML iconHTML

    Element-interpolation DPCA (Displaced Phase Center Antenna) employs a fractional delay filter to get good GMTI(Ground Moving Target Indication) performance while conventional DPCA conditions cannot be met. Its GMTI performance seriously depends on the adopted filter. This paper evaluates 4 fractional delay filters in element-interpolation DPCA, and provides guidelines for choosing an appropriate f... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Novel Wavelet Transform Modulus Maxima Based Method of Measuring Lipschitz Exponent

    Publication Year: 2007, Page(s):628 - 632
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3887 KB) | HTML iconHTML

    Singularities and irregular structures typically characterize the content of signals. The Lipschitz Exponent (LE) is the most popular measure of the singularity behavior of a signal. Most of the existing methods of measuring LE using wavelet transform are derived from the previous work of Mallat and Hwang in [1], which equals LE to the maximum slope of straight lines that remain above the wavelet ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of Perfect Reconstruction Cosine Modulated Filter Banks with Linear Phase

    Publication Year: 2007, Page(s):633 - 636
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3435 KB) | HTML iconHTML

    This paper proposes an efficient iterative linearization method for designing a class of cosine modulated filter banks (CMFBs) with linear phase (LP) property satisfying perfect reconstruction (PR). In this paper, the design of the prototype filter is formulated as a quadratic-constrained optimization function of the prototype filter coefficients whose minimum point can be obtained using the Lagra... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Generalized Sidelobe Canceller Architecture for Reduced-rank Beamspace Post-Doppler STAP

    Publication Year: 2007, Page(s):637 - 640
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2592 KB) | HTML iconHTML

    Based on the generalized sidelobe canceller (GSC), we propose a novel reduced-rank beamspace post-Doppler adaptive beamformer, where the blocking matrix are replaced by an architecture that consists of the novel combination of space-time channels. The number of space-time channels required by the new method is very small. Simulation results in ideal situations and with limited sample are presented... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive Space-time-waveform Processing for MIMO Radar

    Publication Year: 2007, Page(s):641 - 643
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1142 KB) | HTML iconHTML

    This paper presents a preliminary investigation into space-time-waveform adaptive for multiple input multiple output (MIMO) radar. Existing space-time adaptive processing (STAP) algorithms are extended to the waveform-time-space adaptive processing (WTSAP) case. We develop the signal model required to generate simulated data. Simulation results show a significant improvement in processor performan... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Noise-Linear Frequency Modulation Shared Waveform for Integrated Radar and Jammer System

    Publication Year: 2007, Page(s):644 - 648
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (404 KB) | HTML iconHTML

    This paper presents an integration of radar and Electronic Warfare (EW) utilizing Noise-Linear Frequency Modulation (NLFM) waveform, which is capable of simultaneous operation of radar and EW function for target detection and jamming against the Linear Frequency Modulation (LFM) Pulse Compression (PC) radar. The basic properties, detection and jamming capability of the NLFM waveform are investigat... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Diagonal Loading Techniques to Relax Sample Support Requirement in Airborne Bistatic STAP

    Publication Year: 2007, Page(s):649 - 652
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (3952 KB) | HTML iconHTML

    In this paper, we concentrate on the employment of diagonal loading to relax sample size requirement of airborne bistatic STAP. Due to the independent motion effects of the receiver and transmitter, bistatic clutter generally appears more severely nonstationary in the range dimension than the counterpart of monostatic system. This leads to the shortage of IID training data samples and inadequate e... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Robust Method for Censoring the Interference-targets

    Publication Year: 2007, Page(s):653 - 657
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (367 KB) | HTML iconHTML

    To avoid target signal cancellation, which decreases the output signal-to-interference-plus-noise ratio (SINK) of space-time adaptive processing ( STAP ) significantly, it is necessary to eliminate the data vectors contaminated by interference-targets from the training data vectors set. There often exist errors between the actual steering vector and the assumed desired one for interference-targets... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motive Parameters Estimation Using Narrow-band Passive Acoustical Measurements

    Publication Year: 2007, Page(s):662 - 666
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1748 KB) | HTML iconHTML

    This paper develops a method for estimating the flying trajectory of a turboprop or rotary-wing aircraft based on narrow-band passive acoustical technique, which measures the instantaneous frequency of the acoustical signal emitted by the target and received by three stationary sensors placed on the ground. The received instantaneous frequency varies due to the acoustical Doppler effect. Under the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Acoustic Localization in Multi-path Aware Environments

    Publication Year: 2007, Page(s):667 - 670
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (800 KB) | HTML iconHTML

    A novel acoustic source localization approach utilizing multi-path information in a reverberant environment is proposed. Making use of multi-path information, virtual sensors can be constructed. In this case, time difference of arrival (TDOA) caused by multi-path can be used for localization, and a closed-form solution to the acoustic source location can be obtained by only two sensors. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved analog AGC for TD-SCDMA receiver

    Publication Year: 2007, Page(s):103 - 106
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1207 KB) | HTML iconHTML

    A method for ballistic trajectory detection based on multiscale morphological reconstruction is presented. The morphological gray reconstruction algorithm is used for background estimation, and the image is binarized to extract suspicious objects in single frame firstly. Then according to the shell's agglomeration characteristics, the multiscale morphological binary reconstruction could be applied... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New beamforming method based on radial- basis function neural network processing in SαSG distribution noise environments

    Publication Year: 2007, Page(s):107 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (633 KB) | HTML iconHTML

    The under-determined problem of the blind source separation (BSS) for chaotic signals is intractable. A BSS algorithm is proposed and realized in this paper, which is also applied into a secret communication scheme. Both theoretical analysis and numerical simulations demonstrate that the proposed method is of higher security and precision for recovered source signals even when channel noise is ver... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.