Search Results - "2008 2nd International Conference on Signal Processing and Communication Systems"

Refine Results
  1. 1

    Design, implementation and applications of low-complexity LDPC codes by Honary, B., Heravi, B. M., Kariyawasam, S., Pandya, N.

    “…Structured LDPC codes enable low-complexity decoding as well as efficient implementation of encoder reducing the complexity downto the order of the number of…”
    Get full text
    Conference Proceeding
  2. 2

    Power aware wireless receiver design utilizing carrier sensing based on cross-correlation by Il-Gu Lee, Yun-Joo Kim, Sok-Kyu Lee

    “…Advancing technology has made it possible to integrate millions of transistors on a very small die and to clock these transistors at very high speeds. Power…”
    Get full text
    Conference Proceeding
  3. 3

    Secure key distribution for Wireless Sensor Networks by Safavi-Naini, R.

    “…A wireless sensor network (WSN) consists of a large number of small sensor nodes that collect data and send it to a base station, with the help of other nodes…”
    Get full text
    Conference Proceeding
  4. 4

    Naïve Bayes classification of adaptive broadband wireless modulation schemes with higher order cumulants by Wong, M.L.D., Sie King Ting, Nandi, A.K.

    “…Adaptive modulation schemes have been proposed to optimize Shannon's channel capacity in recent orthogonal frequency division multiplexing (OFDM) based…”
    Get full text
    Conference Proceeding
  5. 5

    Impulse response measurement with sine sweeps and amplitude modulation schemes by Meng, Q., Sen, D., Wang, S., Hayes, L.

    “…Sine sweeps used as excitation signals provide a way to measure linear impulse response and harmonic distortion simultaneously. This technique is applicable to…”
    Get full text
    Conference Proceeding
  6. 6

    LTE spectral efficiency using spatial multiplexing MIMO for macro-cells by Vieira, P., Queluz, P., Rodrigues, A.

    “…This paper considers the Multiple Input Multiple Output (MIMO) capacity enhancement considering the Universal Mobile Telecommunication System (UMTS) Long Term…”
    Get full text
    Conference Proceeding
  7. 7

    Mobile ad-hoc network key management with certificateless cryptography by Zhenfei Zhang, Susilo, W., Raad, R.

    “…In this paper, we present an idea of adopting certificateless public key encryption (CL-PKE) schemes over mobile ad hoc network (MANET), which has not been…”
    Get full text
    Conference Proceeding
  8. 8

    Local-DCT features for facial recognition by Schwerin, B., Paliwal, K.

    “…This paper presents the results of a project investigating the use of discrete-cosine transform (DCT) to represent facial images of an identity recognition…”
    Get full text
    Conference Proceeding
  9. 9

    A pattern recognition system for environmental sound classification based on MFCCs and neural networks by Beritelli, F., Grasso, R.

    “…The paper proposes a study of a background noise classifier based on a pattern recognition approach using a neural network. The signals submitted to the neural…”
    Get full text
    Conference Proceeding
  10. 10

    Automatic audio segmentation using the Generalized Likelihood Ratio by Wang, D., Vogt, R., Mason, M., Sridharan, S.

    “…This paper presents a novel technique for segmenting an audio stream into homogeneous regions according to speaker identities, background noise, music,…”
    Get full text
    Conference Proceeding
  11. 11

    The Phase-based Gabor Fisher Classifier and its application to face recognition under varying illumination conditions by Struc, V., Vesnicer, B., Pavesic, N.

    “…The paper introduces a feature extraction technique for face recognition called the phase-based Gabor Fisher classifier (PBGFC). The PBGFC method constructs an…”
    Get full text
    Conference Proceeding
  12. 12

    Study on multi-channel receiver based on polyphase filter bank by Iwabuchi, M., Sakaguchi, K., Araki, K.

    “…Recently, mutli-channel aggregation has been considered, e.q. in IEEE 802.20 (MBTDD 625 k-MC mode), to achieve higher throughput on legacy wireless systems. To…”
    Get full text
    Conference Proceeding
  13. 13

    Securing wireless mesh networks with ticket-based authentication by Qazi, S., Yi Mu, Susilo, W.

    “…A wireless mesh network (WMN) comprises of mesh access points (MAPs), mesh routers and mesh clients (MCs), where MAPs are almost static and form the back-bone…”
    Get full text
    Conference Proceeding
  14. 14

    Connectivity of ad hoc networks: Is fading good or bad? by Xiangyun Zhou, Durrani, S., Jones, H.M.

    “…In this paper, we investigate the effect of Rayleigh fading on the connectivity of wireless ad hoc networks. We consider static nodes that are equipped with…”
    Get full text
    Conference Proceeding
  15. 15

    FPGA implementation of spectral subtraction for in-car speech enhancement and recognition by Whittington, J., Deo, K., Kleinschmidt, T., Mason, M.

    “…The use of speech recognition in noisy environments requires the use of speech enhancement algorithms in order to improve recognition performance. Deploying…”
    Get full text
    Conference Proceeding
  16. 16

    Spherical harmonic analysis and model-limited extrapolation on the sphere: Integral equation formulation by Kennedy, R.A., Wen Zhang, Abhayapala, T.D.

    “…The classical problem of extrapolation of a bandlimited signal from limited time domain data is revisited for signals defined on the sphere. That is, given…”
    Get full text
    Conference Proceeding
  17. 17

    Relay selection utilizing power control for decode-and-forward wireless relay networks by Yong Zhang, Youyun Xu, Yueming Cai

    “…In this paper, we consider a 2-hop wireless relay network where more than one relay is available. We explore optimal relay selection for decode-and-forward…”
    Get full text
    Conference Proceeding
  18. 18

    Reduced set support vector machines: Application for 2-dimensional datasets by Hussain, A., Shahbudin, S., Husain, H., Samad, S.A., Tahir, N.M.

    “…This paper presents the performance of the reduced set (RS) method to approximate the decision boundary for standard support vector machines (SVM) classifier…”
    Get full text
    Conference Proceeding
  19. 19

    Wireless interactive system for patient healthcare monitoring using mobile computing devices by Ros, M., D'Souza, M., Postula, A.

    “…Recently there has been a need to incorporate the use of mobile computing devices in hospital or clinical applications, to enhance patient care. The…”
    Get full text
    Conference Proceeding
  20. 20

    Route optimization for Proxy Mobile IPv6 in IMS network by Chiba, T., Yokota, H., Dutta, A., Chee, D., Schulzrinne, H.

    “…Localized mobility protocols are designed to address many of the drawbacks such as additional signaling and over-the-air tunnel overhead associated with global…”
    Get full text
    Conference Proceeding