1999 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 1999). Conference Proceedings (Cat. No.99CH36368)

22-24 Aug. 1999

Filter Results

Displaying Results 1 - 25 of 153
  • 1999 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 1999). Conference Proceedings (Cat. No.99CH36368)

    Publication Year: 1999
    Request permission for commercial reuse | PDF file iconPDF (584 KB)
    Freely Available from IEEE
  • Author's index

    Publication Year: 1999, Page(s):0_3 - 0_5
    Request permission for commercial reuse | PDF file iconPDF (173 KB)
    Freely Available from IEEE
  • ABR rate-based control scheme with background VBR traffic

    Publication Year: 1999, Page(s):115 - 118
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    The ABR service is mainly designed for data transmission in the ATM network and ABR congestion control is an active research area. We propose a control algorithm that is simple to implement and it does not require much network resource for its operation. Both the load factor and the change of queue length are incorporated in the control, based upon which traffic is adjusted. In underload, the incr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance driven coefficient optimization for high throughput energy efficient digital matched filter design

    Publication Year: 1999, Page(s):321 - 324
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    A high throughput energy efficient digital matched filter design method for low power communication systems is presented. The filter coefficients are designed to optimize spectral concentration in the transmission bandwidth of the channel with zero intersymbol interference while minimizing the energy dissipation. The optimum matched filter coefficients are searched from the discrete powers-of-two ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design and application of an optimum orthogonal wavelet filter for echo cancellation

    Publication Year: 1999, Page(s):79 - 82
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (288 KB)

    Filter banks used for subband decomposition in echo cancellation need to be perfect reconstruction filter banks, and to achieve better performance of the echo canceller, the filters need to be perfect half-band filters. A method of designing filter banks for use in echo cancellation is proposed. This method is based on linear parametrization of half-band filters. The main advantage of using this m... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Application of new Chinese remainder theorems to RNS with two pairs of conjugate moduli

    Publication Year: 1999, Page(s):165 - 168
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (312 KB)

    The two most important considerations when designing RNS systems are the choices of the moduli sets and the conversion from the residue to the weighted binary system. In this paper, we unite the new progresses in both issues by applying a new general conversion algorithm, the New Chinese Remainder Theorem III, to the recently proposed conjugate moduli sets, which results in a more efficient design... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A self-restored current-mode CMOS multiple-valued logic design architecture

    Publication Year: 1999, Page(s):436 - 439
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (380 KB)

    This paper discusses a self-restored architecture for current-mode CMOS multiple-valued logic (MVL) design. The self-restored architecture is characterized by using both current-mode MVL circuits and voltage-mode binary circuits to implement MVL functions and to restore output signals simultaneously. Binary gates are used within the design architecture so that MVL-binary or binary-MVL conversion c... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An adaptive control mechanism for the DQDB CO data service

    Publication Year: 1999, Page(s):111 - 114
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (328 KB)

    The connection oriented data service (CO service) has been defined by the IEEE 802.6 committee to support variable-bit-rate (VBR) data services over DQDB MANs. The main aim of the CO service is to be able to guarantee the QoS required by a wide variety of VBR services. We derive an adaptive bandwidth allocation control mechanism for the DQDB CO data service. Simulation results demonstrate the effe... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved architecture and implementation of cascaded integrator-comb decimation filters

    Publication Year: 1999, Page(s):317 - 320
    Cited by:  Papers (2)  |  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB)

    In this paper an improved version of the nonrecursive carry-save-adder-based structure for CIC (cascaded-integrator-comb) decimation filters is proposed for high speed applications. By employing parallel processing techniques, the improved structure can further increase the sampling rate of CIC filters. Low-complexity implementation of the parallel stages is also discussed View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blocking artifacts removal with a successive structure analysis using wavelet transform

    Publication Year: 1999, Page(s):75 - 78
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (408 KB)

    A successive structural analysis using the wavelet is proposed to remove the block artifacts associated with block-based coding such as JPEG. The analysis is based on the different responses of block boundaries (constrained by quantization), and the structural information about an image in wavelet domain. In particular, information about an image is divided into a few bands according to their resp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance evaluation of a multicast packet switch employing dynamic random early detection

    Publication Year: 1999, Page(s):349 - 352
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (256 KB)

    This paper proposes a multicast packet switching architecture that employs input/output buffers, and internal bandwidth expansion to reduce blocking substantially. Internal buffers enhance switch robustness under transient bursty traffic conditions. The switch regulates packet loss and delay using link-capacity back-pressure in conjunction with dynamic random early detection (or D-RED) algorithm. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On page blocks in distributed virtual memory systems

    Publication Year: 1999, Page(s):605 - 607
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (196 KB)

    We introduce the concept of working set-based page block in distributed virtual memory systems. We show that hit ratio is significantly better than that of conventional systems, where page blocks are formed from neighboring contiguous pages on the disk. Moreover, the choice of some relevant virtual memory parameters, which is usually made by the system manager and is riskier and may affect the eff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reconstruction of missing blocks in JPEG picture transmission

    Publication Year: 1999, Page(s):288 - 291
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (756 KB)

    The paper deals with error concealment in block-coded image transmission over noisy channels. In particular, it proposes a novel algorithm for missing block reconstruction in the frequency domain. In fact, damaged blocks are recovered by interpolating the DCT coefficients of available neighboring blocks. Coefficient interpolation is investigated in four different variants; median and edge-based in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On disjoint covers and ROBDD size

    Publication Year: 1999, Page(s):162 - 164
    Cited by:  Papers (5)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (224 KB)

    The relation between the number of nodes in a ROBDD and the number of implicants in the disjoint cover of the function represented by that ROBDD is studied. We identify a class of functions for which there are disjoint covers such that a cover of a larger size can be represented by a ROBDD with a smaller number of nodes. This shows that the size of a ROBDD is not a monotonically increasing functio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A systolic array architecture for 2-D inverse wavelet transform

    Publication Year: 1999, Page(s):193 - 196
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (284 KB)

    A systolic array architecture for computing the 2-D inverse discrete wavelet transform is proposed. The architecture is derived by performing a thorough data dependence and localization analysis for the 2-D inverse discrete wavelet transform. The design is modular, and can easily be scaled for different levels of wavelet decomposition and filter lengths. The derived architecture for an 8×8 i... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A VHDL library for current-mode CMOS multiple-valued logic

    Publication Year: 1999, Page(s):432 - 435
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    This paper discusses the design and use of a VHDL library for current-mode CMOS multiple-valued logic (MVL) simulation. The library has basic MVL entities, complex MVL entities as well as standard binary logic gates. A bus resolution function working cooperatively with the basic MVL entities allows MVL logic levels (currents) in individual connections to be output. Design examples of a quaternary ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Arabic/English automatic spoken language identification

    Publication Year: 1999, Page(s):400 - 403
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (296 KB)

    Arabic/English language identification system for short duration, telephone quality speech utterances based on speaker identification, vowel spotting, and continuous hidden Markov models is presented. The effect of vowel spotting on both speaker identification and language identification accuracy is also studied. Three different designs and implementations of this system are introduced in this stu... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Library issues in the implementation of fast R2W converters

    Publication Year: 1999, Page(s):464 - 467
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (172 KB)

    Properly choosing tire type and functionality of the cells being included in a technology library is essential to obtain efficient physical-level implementations of digital circuits; this is particularly true when the circuits are characterized by asymmetric logic structures and unbalanced input-to-output paths. In this paper, we report the results of an exploration we have conducted on the implem... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of a superscalar processor based on queue machine computation model

    Publication Year: 1999, Page(s):151 - 154
    Cited by:  Papers (6)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (280 KB)

    The queue machine computation model is an evaluation scheme for expression trees, in which the input operands of operations are taken from head of a queue, and its result is put onto tail of the same queue. A series of operations for this model are generated by traversing the expression tree(s) from its leaf nodes in reverse of the breadth-first ordering. Since nodes with the same level in an expr... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An improved wavelet-packet-division multiple access system

    Publication Year: 1999, Page(s):495 - 498
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (268 KB)

    An improved wavelet-packet-division multiple access (WPDMA) system is presented. In a WPDMA environment, each message signal is waveform coded onto a wavelet function to enhance the immunity of the system against interference. We propose a wavelet design method based on numerical optimization to mitigate the effects of asynchronism in the system. In brief, the algorithm consists of two parts: (a) ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Performance analysis of a wireless multiple access scheme with network assisted diversity and ARQ control

    Publication Year: 1999, Page(s):107 - 110
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (332 KB)

    Network-assisted diversity multiple access (NDMA) is a previously proposed multiple media access method, which provides excellent throughput efficiency for multiplexing variable-bit-rate data sources. It exploits diversity combining and signal separation techniques borrowed from the signal processing problem to recycle the information in those collided data packets, so as not to introduce throughp... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Network efficiency for wireless Internet access

    Publication Year: 1999, Page(s):225 - 229
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (392 KB)

    It is foreseeable that more and more data traffic generated by interactive application will be carried by the current mobile cellular networks, which is currently dominated by circuit based voice calls. In this paper we propose to use network efficiency, which considers both revenue and network cost as criteria to dimension bandwidth between real-time service and best effort service. Optimized net... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new DS/CDMA code acquisition scheme for reducing the effect of residual code phase offset

    Publication Year: 1999, Page(s):576 - 579
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (308 KB)

    When the code phase offset between two sequences is within one chip duration, the sum of two successive matched filter outputs has a constant value regardless of the residual code phase offset if the noise is absent. Based on this observation, we propose a new code acquisition scheme, which is robust to the variation of the residual code phase offset and outperforms the conventional scheme. Numeri... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • New design approach for polynomial-based interpolation

    Publication Year: 1999, Page(s):544 - 547
    Cited by:  Patents (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (228 KB)

    Polynomial-based interpolation techniques are an attractive approach for discrete-time processing of continuous-time signals. These techniques are employing discrete time filters for enabling arbitrary resampling of a time series, and have been used in several applications. In this contribution we investigate and analyze some new design methods and possible applications of this polynomial-based in... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Suppression of ringing artifacts with an adaptive shrinkage algorithm

    Publication Year: 1999, Page(s):181 - 184
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (348 KB)

    A non-iterative wavelet-based algorithm was proposed to reduce the ringing artifacts associated with a lossy compressed image. The proposed algorithm is based on the fact that increases in magnitude of the quantized wavelet coefficients lead to decreases in visual smoothness. Thus a shrinkage algorithm is applied to maintain visual smoothness. The proposed algorithm is, however, adaptive in nature... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.