The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we propose applying an adaptive context tree weighting method with a forbidden symbol in the H.264 coder. Arithmetic codes with a forbidden symbol and a trellis search techniques are employed on an order to estimate the best transmitted codeword. Instead of using the context modeling defined in the H.264 standard, the arithmetic code with a forbidden symbol uses a CTW method. The CABAC...
This paper proposes a novel SoC design based on parallel-pipelined multiplier less FFT architecture targeting multimedia applications. The proposed architecture has the advantages of less complexity, more speed, high throughput, and low cost and high power efficiency. This demands use of system level design methodologies from behavior level to fabrication level like software and hardware co-design,...
This paper is concerned with the problem of non-uniform sampling and reconstruction of data. A fast and robust method for approximation of contour from a set of non-uniformly distributed sample points is described here. Data is represented by irregular samples distributed in space. The samples are chosen along the contour with spacing determined by the error between the original contour and the contour...
The performance of a character recognition system depends heavily on what features are being used. Though many kinds of features have been developed and their test performances on standard database have been reported, there is still room to improve the recognition rate by developing improved features. In this paper, we propose a novel system based on radon transform for handwritten digit recognition...
Mobile phone can serve as powerful tool for world-wide communication for even roaming user. A system is developed to extend the capability of mobile phone for remote monitoring and control of devices. One mobile in this system is dedicated for receiving and executing commands from authentic users and informing status about change in input to the user through SMS. Mobile phone model 6610 is used for...
A novel methodology for testing all digital systems fused onto the FPGA has been developed in this paper. This methodology does not require any hook-up and input/output (I/O) interfacing card. This methodology uses the NIOS processor core to configure system onto the FPGA. HDL code of the digital system along with NIOS core is downloaded onto the FPGA. The NIOS processor can be programmed, to supply...
In underwater an observer pre-processes the noisy bearing measurements available from passive sonar and then the data is used by Kalman filter to find out target motion parameters. The pre-processing reduces the amplitude of the noise, replaces the missed bearings with estimated bearings, supplies the estimated bearings if the bearing measurement is not available or incorrect and finally it finds...
In this paper, we propose a hybrid soft computing technique called adaptive neuro-fuzzy inference system (ANFIS) to estimate the interference and to separate the electroencephalogram (EEG) signal from its electrooculogram (EOG), electrocardiogram (ECG) and electromyogram (EMG) artifacts. This paper shows that the proposed method successfully removes the artifacts and extracts the desired EEG signal
The advanced encryption standard (AES) algorithm has become the default choice for various security services in numerous applications. In this paper, we propose a high speed, non-pipelined FPGA implementation of the AES-CCMP (counter-mode/CBC-MAC protocol) cipher for wireless LAN using Xilinx development tools and Virtex-II Pro FPGA circuits. IEEE 802.11i defines the AES-based cipher system, which...
In this article, we have tried to explore a new hybrid approach which well integrates the advantages of structural and statistical approaches and avoids their weaknesses. In the proposed approach, the graphic symbols are first segmented into high-level primitive like quadrilaterals. Then, a graph is built by utilizing these quadrilaterals as nodes and their spatial relationships as edges. Additional...
The latest tremendous growth of the Internet has opened up a vast market for high-speed broadband data services to the home. Broadband network services have created great opportunities for new multimedia applications at both home and businesses. Data over cable service interface specification (DOCSIS) is the leading standard for data over cable networks. DOCSIS is developed to support IP flows with...
Video shot boundary (VSB) detection plays an important role in modern video archiving and summarization applications. The classical linear approach towards VSB detection is basically a sequential search, however this approach is computationally very expensive for large databases. In this work we propose a non-linear approach for VSB detection, which is an improvement of existing adaptive skip. The...
Cursive word recognition requires tilt correction before extraction of features such as ascenders and descenders. Skew and slant are the two types of tilts found in cursive word images. This paper presents new algorithms for skew and slant correction using geometric model and image projections. A new algorithm for extraction of ascenders/descenders based on fitting top line and base line references...
Network security can be increased by filtering packets at a firewall. Packet filtering examines network packets and decides whether to accept or deny them, and these decisions are made according to policies that are established by the network administrator and implemented by specific filters. An administrator who finds it hard to understand and maintain a policy, will not easily find problems that...
Most intrusion detection systems for mobile ad hoc networks are focusing on either routing protocols or MAC layer traffic. This paper focuses on the design of a new anomaly detection system for each node of the network, which contains detection subsystem for MAC layer, routing layer and application layer. Audit data taken from MAC level/network level/application level from the traces in Glomosim and...
A novel adaptive noise cancellation algorithm using cascaded correlation neural networks is described. In the proposed algorithm the objective is to filter out an interference component by identifying the non-linear model between a measurable noise source and the corresponding immeasurable interference. In many situations a linear model performs outstandingly. However a linear model does not perform...
A comprehensive simulation on the optimization of the management of the non linear effects in long haul light wave systems has been carried out by chirped RZ format as the format has significant advantages over the NRZ modulation format in WDM systems We have tried to demonstrate that a system reach of long-haul light wave link could be significantly improved by optimizing the dispersion map in transmission...
Remote sensing satellites orbit around the Earth around 600-900 kilometers in sun synchronous polar orbit. Each satellite transmits the image data in X-band and the data reception is carried out through a parabolic antenna along with the associated systems. The entire data acquisition system is complex and expensive as it has to meet the requirements of the fast orbiting remote sensing satellites...
A new approach for the systolic implementation of FFT algorithms is presented, the proposed approach is based on the fundamental principle of 1-dimensional DFT can be decomposed efficiently with less number of twiddle values and also the computation burden involved with multipliers is reduced considerably, the FFT can be computed efficiently with 1-D systolic array, the essence of 1D systolic array...
Microstrip patch antennas are very popular due to their numerous advantages. This paper presents the design of a log periodic toothed planer trapezoid microstrip antenna. In this structure the dimensions of the successive sections were increased in geometric progression. A bandwidth of 18.18 percentage for voltage standing wave ratio less than two (VSWR<2) has been obtained from the proposed antenna...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.