7th International Multi Topic Conference, 2003. INMIC 2003.

8-9 Dec. 2003

Filter Results

Displaying Results 1 - 25 of 103
  • Proceedings INMIC 2003. 7th International Multi-Topic Conference (IEEE Cat. No.03EX757)

    Publication Year: 2003
    Request permission for commercial reuse | PDF file iconPDF (185 KB)
    Freely Available from IEEE
  • Copyright

    Publication Year: 2003, Page(s): 0_2
    Request permission for commercial reuse | PDF file iconPDF (36 KB)
    Freely Available from IEEE
  • Proceedings INMIC 2003 - IEEE (Islamabad Section) 7th International Multi Topic Conference - Title Page

    Publication Year: 2003, Page(s): 0_3
    Request permission for commercial reuse | PDF file iconPDF (19 KB)
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2003, Page(s): 0_4
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE
  • Conference Committee

    Publication Year: 2003, Page(s): i
    Request permission for commercial reuse | PDF file iconPDF (16 KB)
    Freely Available from IEEE
  • IEEE-GIKI Chapter

    Publication Year: 2003, Page(s): ii
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • Preface

    Publication Year: 2003, Page(s): iii
    Request permission for commercial reuse | PDF file iconPDF (55 KB) | HTML iconHTML
    Freely Available from IEEE
  • [Blank page]

    Publication Year: 2003, Page(s): iv
    Request permission for commercial reuse | PDF file iconPDF (3 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2003, Page(s):v - x
    Request permission for commercial reuse | PDF file iconPDF (201 KB)
    Freely Available from IEEE
  • Novel Wiener sub-band processing schemes for binaural adaptive speech-enhancement

    Publication Year: 2003, Page(s):1 - 6
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (387 KB) | HTML iconHTML

    A novel application of Wiener filtering is proposed for processing band-limited noisy signals in a binaural adaptive speech-enhancement scheme. Two different Weiner filtering based implementations have been developed, both with the aim of further reducing residual incoherent noise components resulting from application of conventional adaptive sub-band noise cancellers. Initial comparative results ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Message encryption with image processing

    Publication Year: 2003, Page(s):7 - 15
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (596 KB) | HTML iconHTML

    The paper proposes a new steganographic model for secret data communication. A stack of four modules is used. The "compression module" gives the benefit of entropy coding. The "cryptographic module" provides confidentiality in the communication. To preserve integrity of data, the "hash module" is used with a shared secret key. A technique is proposed in which it is not required that the receiver s... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Machine vision toolbox for three-dimensional structure estimation from images

    Publication Year: 2003, Page(s):16 - 20
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (227 KB) | HTML iconHTML

    The paper discusses a machine vision toolbox using Matlab. which is being developed at PIEAS (Pakistan Institute of Engineering and Applied Sciences) in order to acquire 3D information about a scene from images taken by a moving camera. The recovery of structure is based on the properties of an essential matrix. Experimental results show that the reconstruction appears to be visually correct View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new algorithm of stereo matching using epipolar geometry

    Publication Year: 2003, Page(s):21 - 24
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (231 KB) | HTML iconHTML

    We present a new stereo matching algorithm using epipolar geometry. The proposed algorithm does not completely rely on the fundamental matrix for the identification of the corresponding pairs. In fact, it uses epipolar geometry to locate the corresponding epipolar line in the other image in order to reduce the search space from the whole image plane to just one-dimension. A search window around th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Optimum window-size computation for moment based texture segmentation

    Publication Year: 2003, Page(s):25 - 31
    Cited by:  Papers (3)  |  Patents (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    The quality of texture segmentation depends on extracted features. Most statistical feature extraction techniques require an optimum region size, called a window, to capture a better texture feature. The literature shows that window-size selection is primarily done by visual inspection based on experience or trial and error. The paper investigates the issue and attempts to formulate a framework ba... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D reconstruction and model acquisition of objects in real world scenes using stereo imagery

    Publication Year: 2003, Page(s):32 - 37
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (396 KB) | HTML iconHTML

    Recently, the use of three dimensional computer models has greatly increased, in part due to the availability of fast, inexpensive hardware and technologies like VRML-ready Internet browsers. These models often represent objects in real world scenes and are typically built by hand using CAD software, an error-prone and time consuming process. The paper outlines a simple and efficient method based ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wavelet based segmentation of hyperspectral colon tissue imagery

    Publication Year: 2003, Page(s):38 - 43
    Cited by:  Papers (7)  |  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (359 KB) | HTML iconHTML

    Segmentation is an early stage for the automated classification of tissue cells between normal and malignant types. We present an algorithm for unsupervised segmentation of images of hyperspectral human colon tissue cells into their constituent parts by exploiting the spatial relationship between these constituent parts. This is done by employing a modification of the conventional wavelet based te... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frequency-domain speech scrambling/descrambling techniques implementation and evaluation on DSP

    Publication Year: 2003, Page(s):44 - 48
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (210 KB) | HTML iconHTML

    Speech scrambling/descrambling has always been a key component in secure communication systems. The paper describes the real-time implementation of frequency-domain speech scrambling/descrambling techniques on Texas Instruments' TMS320C6711 DSP. Three techniques, frequency-inversion, frequency hopping inversion and rolling code inversion, have been successfully implemented. Subsequently, the resul... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Improved fingerprint identification using directional filter banks

    Publication Year: 2003, Page(s):49 - 54
    Cited by:  Patents (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (343 KB) | HTML iconHTML

    In the finger print area, the majority of approaches are based on bitwise directional analysis. However, several approaches employ filter-based directional analysis (Sarbadhikari, S. et al., 1998; Sherlock, B.G., 1994; Hong, L. et al., 1998). The directional image can be thought of as an image transform, where each pixel of an image represents a direction of the local gray level uniformity. The st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind image restoration using multilayer backpropagator

    Publication Year: 2003, Page(s):55 - 58
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (230 KB) | HTML iconHTML

    We describe the problem of restoring a blurred and noisy image without any prior knowledge of the blurring function and the statistics of additive noise. A multilayer feed-forward neural network based on backpropagation algorithm is used for image restoration. The neural network is trained by applying backpropagation with momentum for fast convergence. The results of the backpropagation neural net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gender classification using discrete cosine transformation: a comparison of different classifiers

    Publication Year: 2003, Page(s):59 - 64
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (360 KB) | HTML iconHTML

    We have investigated the problem of gender classification using a library of four hundred standard frontal facial images employing five classifiers, namely k-means, k-nearest neighbors, linear discriminant analysis (LDA), Mahalanobis distance based (MDB) classifiers and our modified KNN classifier. The image data independent discrete cosine transformation (DCT) basis is used for facial feature ext... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a 64-point FFT/IFFT block designed for OFDM technique used in WLANs

    Publication Year: 2003, Page(s):65 - 71
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (292 KB) | HTML iconHTML

    In this paper, the architecture of a 64-point FFT for the OFDM technique used in WLAN standards is proposed. FFT is a complex function whose computational accuracy, hardware size and processing speed depends on the type of arithmetic format used to implement it. Due to the non-linearity of FFT, its computational accuracy is not easy to calculate theoretically. Therefore statistical or simulation m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and implementation of E1 stream analyzer for CCSS7 protocol

    Publication Year: 2003, Page(s):72 - 77
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (347 KB) | HTML iconHTML

    The E1 (PCM-30) stream is a European telecommunication standard for communication of data/voice channels in a digital network. This paper deals with the design and implementation of a transparent stream analyzer, capable of handling (up to 2 Mbps) E1 stream and analyzing 30 voice/data channels using an out-of-band common channel signaling system number 7 (CCSS7) protocol. The analyzer is capable o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Deterministic simulations of spatial fading correlation for MIMO communication channels

    Publication Year: 2003, Page(s):78 - 83
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (283 KB) | HTML iconHTML

    An analytical space-time fading correlation for the multi-input-multi-output (MIMO) channel, as a function of antenna spacing, angle spread, and Doppler spread, is derived and is verified with deterministic simulations. We investigate the performance of the uplink spatial fading correlation of a MIMO channel. We consider four uniform circular array (UCA) elements at both mobile station and base st... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Discrete multi-tone (DMT) transceiver with dynamic rate adaptive water-filling bit-loading technique for in-home power line communication networks

    Publication Year: 2003, Page(s):84 - 89
    Cited by:  Papers (1)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (349 KB) | HTML iconHTML

    Power line based home networking is an emerging technology that allows consumers, using their existing electrical wiring system, to get their computers and other home-electronics devices communicating among themselves, and also share the Internet bandwidth. Discrete multi-tone (DMT), a variant of OFDM, for wired channels is adopted as a multiplexing technique that has the inherent flexibility to a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Hardware implementation of shortened (48,38) Reed Solomon forward error correcting code

    Publication Year: 2003, Page(s):90 - 95
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (327 KB) | HTML iconHTML

    Transmitting information with accuracy is vital in any communication system. For this reason, forward error correction schemes are widely used to lower the error probability and hence increase the transmission accuracy. Reed Solomon is one of the most widely used forward error correcting block codes, and is capable of detecting and correcting multiple errors, particularly focusing on burst errors.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.