Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ISSPIT
ISSPIT 2007
Generate Citations
2007 IEEE International Symposium on Signal Processing and Information Technology
Dec. 15 2007 to Dec. 18 2007
Giza
Table of Contents
Table of contents
Freely available from IEEE.
Contributor listings
Freely available from IEEE.
[Commentary]
Freely available from IEEE.
[Opinion]
Freely available from IEEE.
Effect of Time Correlation of Sources at the Output of Time Based Burst Assembler in Optical Burst Switched Network
Full-text access may be available. Sign in or learn about subscription options.
by
S Choudhury
,
S. Ponda
,
J Debnath
,
N C Debnath
OCL Expressions and their Context: Transformation Rules for the Semantic Integration of OCL and RSL
Full-text access may be available. Sign in or learn about subscription options.
by
N. Debnath
,
A. Funes
,
A. Dasso
,
R. Uzal
,
G. Montejano
,
D. Riesco
Types and Operations: Transformation Rules for the Semantic Integration of OCL and RSL
Full-text access may be available. Sign in or learn about subscription options.
by
N. Debnath
,
A. Funes
,
A. Dasso
,
D. Riesco
,
R. Uzal
,
G. Montejano
Multi-object Tracking Based on Region Corresponding and Improved Color-Histogram Matching
Full-text access may be available. Sign in or learn about subscription options.
by
Ying Fang
,
Huiyuan Wang
,
Shuang Mao
,
Xiaojuan Wu
iWDSS-Tender: Intelligent Web-based Decision Support System for Tender Evaluation
Full-text access may be available. Sign in or learn about subscription options.
by
N. M. Mohamad Noor
,
N. H. Abdul Samat
,
M. Yazid M. Saman
,
M. Suzuri Hitam
,
M. Man
Bounds on Minimal Energy Spent on Computations
Full-text access may be available. Sign in or learn about subscription options.
by
Jacek Izydorczyk
Asymptotic analysis of large MIMO wire-tap channel via replica method
Full-text access may be available. Sign in or learn about subscription options.
by
H.S. Wang
,
G.H. Zeng
A statistical-mechanics approach to analyzing effect of imperfect channel state information on multiuser channel capacity
Full-text access may be available. Sign in or learn about subscription options.
by
H.S. Wang
,
G.H. Zeng
Distribution of a Stochastic Control Algorithm Applied to Gas Storage Valuation
Full-text access may be available. Sign in or learn about subscription options.
by
Constantinos Makassikis
,
Stephane Vialle
,
Xavier Warin
A Radon Transform and PCA Hybrid for High Performance Face Recognition
Full-text access may be available. Sign in or learn about subscription options.
by
Laika Karsili
,
Adnan Acan
A multi-class classification with a probabilistic localized decoder
Full-text access may be available. Sign in or learn about subscription options.
by
Takashi Takenouchi
,
Shin Ishii
Fuzzy design of a video-on-demand network
Full-text access may be available. Sign in or learn about subscription options.
by
Arash Abadpour
,
Attahiru Sule Alfa
,
Jeff Diamond
Estimating geodesic distances on locally linear patches
Full-text access may be available. Sign in or learn about subscription options.
by
Deyu Meng
,
Zongben Xu
,
Nannan Gu
,
Mingwei Dai
Path Selection Diversity for Packet Delivery in Wireless Single-Hop Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Yahya S. Al-Harthi
Data Hiding with Image Decomposition Based on General Spectrum Pyramid
Full-text access may be available. Sign in or learn about subscription options.
by
Mariofanna Milanova
,
Roumen Kountchev
,
Vladimir Todorov
,
Roumiana Kountcheva
Invariant range image multi - pose face recognition using Fuzzy ant algorithm and membership matching score
Full-text access may be available. Sign in or learn about subscription options.
by
Supawee Makdee
,
Chom Kimpan
,
Seri Pansang
Routing Optimlzation using Genetic Algorithm in Ad Hoc Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Mustafa Al-Ghazal
,
Ayman El-Sayed
,
Hamedy Kelash
Advanced Motion Estimation Techniques for VC-1
Full-text access may be available. Sign in or learn about subscription options.
by
Michael J. Tammen
,
Mohamed El-Sharkawy
,
Hisham Sliman
,
Maher Rizkalla
Using End-to-End Data to Infer Sensor Network Topology
Full-text access may be available. Sign in or learn about subscription options.
by
Tao Zhao
,
Wangdong Cai
,
Yongjun Li
DSS for Tendering Process: Integrating Statistical Single-Criteria Model with MCDM Models
Full-text access may be available. Sign in or learn about subscription options.
by
Fadhilah Ahmad
,
M Yazid M Saman
,
N. M. Mohamad Noor
,
Aida Othman
A High-Speed, High-Radix, Processor Array Architecture for Real-Time Elliptic Curve Cryptography Over GF(2m)
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed A. Fayed
,
M. Watheq El-Kharashi
,
Fayez Gebali
Wavelet Compression of Multiview Video with Disparity-Compensated Lifting
Full-text access may be available. Sign in or learn about subscription options.
by
Li Li
,
Zhengxin Hou
,
Chang Sun
A Leaf Recognition Algorithm for Plant Classification Using Probabilistic Neural Network
Full-text access may be available. Sign in or learn about subscription options.
by
Stephen Gang Wu
,
Forrest Sheng Bao
,
Eric You Xu
,
Yu-Xuan Wang
,
Yi-Fan Chang
,
Qiao-Liang Xiang
Closed frequent itemsets mining and structuring association rules based on Q-analysis
Full-text access may be available. Sign in or learn about subscription options.
by
Azedine Boulmakoul
,
Abdelfatah Idri
,
Rabia Marghoubi
Mapping Distributed Object-Oriented Software to Architecture with Limited Number of Processors
Full-text access may be available. Sign in or learn about subscription options.
by
Safwat H. Hamad
,
Tahany Fergany
,
Reda A. Ammar
,
Sayed Solit
A Preemptive Version of the Min-Min Heuristic for Dynamically Mapping Meta-Tasks on a Distributed Heterogeneous Environment
Full-text access may be available. Sign in or learn about subscription options.
by
Amal S. Khalifa
,
Reda A. Ammar
,
Tahany A. Fegrany
,
Mohamed E. Khalifa
A MLP-SOM Combination to Select Relevant Genes from High-dimensional DNA Microarray Data
Full-text access may be available. Sign in or learn about subscription options.
by
Goutam Chakraborty
,
Jagdish Patra
,
Seiryo Noda
,
Basabi Chakraborty
Detecting Digital Image Forgeries Through Weighted Local Entropy
Full-text access may be available. Sign in or learn about subscription options.
by
Chi Zhang
,
Hongbin Zhang
Performance Analysis of the IEEE 802.11 DCF
Full-text access may be available. Sign in or learn about subscription options.
by
Khalid M.J. Khayyat
,
Fayez Gebali
,
Esam Abdel-Raheem
The Oil-Gas Prediction of Seismic Reservoir Based on Rough Set and PSO Algorithm
Full-text access may be available. Sign in or learn about subscription options.
by
Hongjie Liu
,
Boqin Feng
,
Jianjie Wei
,
Wenjie Li
Use of Simulation and Random Matrix Theory to Identify the State of Network Traffic
Full-text access may be available. Sign in or learn about subscription options.
by
Viktoria Rojkova
,
Yehia Khalil
,
Adel Elmaghraby
,
Mehmed Kantardzic
Fluid Flow Model of HSTCP
Full-text access may be available. Sign in or learn about subscription options.
by
Yang Xiaogang
,
Zhou gang
,
Chen peng
,
Shan Baosong
Selectively Weighted Multicast Scheduling Designs For Input-Queued Switches
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammed Shoaib
Sonar Localization Using Ubiquitous Sensor Network for Water Pollution Monitoring Fish Robots
Full-text access may be available. Sign in or learn about subscription options.
by
Daejung Shin
,
Seung You Na
,
Jin Young Kim
,
Seong-Joon Baek
A Framework for Implicit Surfaces Reconstruction form Large Clouds of Points
Full-text access may be available. Sign in or learn about subscription options.
by
Ashraf S. Hussein
,
Amr H. Abdel-Aziz
Subtract on Negative Add on Positive (SNAP) Estimation Algorithm for Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Michalis P. Michaelides
,
Christos G. Panayiotou
A Middleware Based Network Hot Swapping Solution for SCA Compliant Radio
Full-text access may be available. Sign in or learn about subscription options.
by
Md. Kamrul Hasan
,
Lenin Mehedy
,
Salahuddin Muhammad Salim Zabir
,
Sungyoung Lee
,
Sang-chul Oh
A Quantization Scheme for Lattice-Reduction Aided MIMO Detection
Full-text access may be available. Sign in or learn about subscription options.
by
Tien Duc Nguyen
,
Tadashi Fujino
,
Xuan Nam Tran
Face Recognition Using Combination of Wavelet Packets, PCA and LDA
Full-text access may be available. Sign in or learn about subscription options.
by
Strahil Sokolov
,
Ognian Boumbarov
,
Georgi Gluhchev
A 1.45Gb/s (576,288) LDPC Decoder for 802.16e standard
Full-text access may be available. Sign in or learn about subscription options.
by
Jui-Hui Hung
,
Sau-Gee Chen
A Systematic Optimized Comparison Algorithm for Fast LDPC Decoding
Full-text access may be available. Sign in or learn about subscription options.
by
Jui-Hui Hung
,
Sau-Gee Chen
Monitoring of Oil Pollution by GIS and Remote-Sensing case Of West Algeria Harbours
Full-text access may be available. Sign in or learn about subscription options.
by
Aicha Benmecheta
,
Abdeljallil Lansari
Solving Classification Problems Using Supervised Self-Organizing Map
Full-text access may be available. Sign in or learn about subscription options.
by
Arit Thammano
,
Jiraporn Kiatwuthiamorn
A Modified Fast Vector Quantization Algorithm Based on Nearest Partition Set Search
Full-text access may be available. Sign in or learn about subscription options.
by
Mohsen M. Tantawy
,
M. F. Abu El-Yazeed
,
Nemat S. Abdel Kader
,
M. M. El-Henawy
Evaluating Adaptive Prediction Filters for Efficient Data Gathering in Wireless Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
Michael Sessinghaus
,
Holger Karl
Transmitting Encrypted Data by Wavelet Transform and Neural Network
Full-text access may be available. Sign in or learn about subscription options.
by
Meghdad Ashtiyani
,
Soroor Behbahani
,
Saeed Asadi
,
Parmida Moradi Birgani
Bus Transactions in Microprocessor-based Systems using the Second-order Extened Physical Addressing
Full-text access may be available. Sign in or learn about subscription options.
by
Mountassar Maamoun
,
Abdelhalim Benbelkacem
,
Daoud Berkani
Information retrieval from a phoneme time series database
Full-text access may be available. Sign in or learn about subscription options.
by
Radhakrishnan Nagarajan
,
Anand Nagarajan
,
Mariofanna Milanova
Spatial Clustering of Wireless Sensor Network Nodes Based on Packet Loss
Full-text access may be available. Sign in or learn about subscription options.
by
Ahmed Y. Tawfik
,
Randa El-Marakby
AES-128 Implementation on a Virtex-4 FPGA
Full-text access may be available. Sign in or learn about subscription options.
by
James H. Wiebe
Security and privacy protection for automated video surveillance
Full-text access may be available. Sign in or learn about subscription options.
by
Nadia Baaziz
,
Nathalie Lolo
,
Oscar Padilla
,
Felix Petngang
Key-Joined Block Ciphers with Input-Output Pseudorandom Shuffling Applied to Remotely Keyed Authenticated Encryption
Full-text access may be available. Sign in or learn about subscription options.
by
Yassin M. Y. Hasan
VANET-DSRC Protocol for Reliable Broadcasting of Life Safety Messages
Full-text access may be available. Sign in or learn about subscription options.
by
Mostafa M. I. Taha
,
Yassin M. Y. Hasan
Multi Stage Vector Quantization for the Compression of Surface and Volumetric Point Cloud Data
Full-text access may be available. Sign in or learn about subscription options.
by
R. A Siddiqui
,
S Eroksuz
,
I Celasun
CAPTCHA for Blind People
Full-text access may be available. Sign in or learn about subscription options.
by
Mohammad Shirali-Shahreza
,
Sajad Shirali-Shahreza
A Class of Prior Distributions on Context Tree Models and an Efficient Algorithm of the Bayes Codes Assuming It
Full-text access may be available. Sign in or learn about subscription options.
by
Toshiyasu Matsushima
,
Shigeich Hirasawa
Blind Adaptive Constant Modulus RAKE Receiver for Downlink CDMA
Full-text access may be available. Sign in or learn about subscription options.
by
Suprava Patnaik
,
Anamika Upadhyay
Towards Evaluation of Phonics Method for Teaching of Reading Using Artificial Neural Networks (A Cognitive Modeling Approach)
Full-text access may be available. Sign in or learn about subscription options.
by
Hassan M. Hassan
,
Ayoub K. Al-Hamadi
,
Saleh M. Al-Saleem
Efficient Intra Mode Decision for AVS to H.264/AVC Transcoding
Full-text access may be available. Sign in or learn about subscription options.
by
Wang Minyue
,
Sun Guangmin
,
Wu Qiang
Interpolation with Sigmoid Functions for Spatial Error Concealment
Full-text access may be available. Sign in or learn about subscription options.
by
Toan Nguyen Dinh
,
Nguyen Trung Kien
,
GueeSang Lee
Fourier Descriptor for Pedestrian Shape Recognition using Support Vector Machine
Full-text access may be available. Sign in or learn about subscription options.
by
Nooritawati Md Tahir
,
Aini Hussain
,
Mohd Marzuki Mustafa
,
Salina Abdul Samad
,
Hafizah Husin
Development System for Video and Audio Algorithms
Full-text access may be available. Sign in or learn about subscription options.
by
Angel R. Kanchev
,
Antoaneta A. Popova
Combined Data Partitioning and FMO in Distortion Modeling for Video Trace Generation with Lossy Network Parameters
Full-text access may be available. Sign in or learn about subscription options.
by
Araz Jahaniaval
,
Dalia Fayek
Adaptive Spatial Resolution Control Scheme for Mobile Video Applications
Full-text access may be available. Sign in or learn about subscription options.
by
Yonghee Lee
,
Heejung Lee
,
Heonshik Shin
Adaptive Enhancement of Historical Document Images
Full-text access may be available. Sign in or learn about subscription options.
by
N. Krishna Kishore
,
Priti P. Rege
Prediction-based Prefetching for Remote Rendering Streaming in Mobile Virtual Environments
Full-text access may be available. Sign in or learn about subscription options.
by
Shaimaa Lazem
,
Marwa Elteir
,
Ayman Abdel-Hamid
,
Denis Gracanin
Effectively Finding the Right Keywords for the Target Audience
Full-text access may be available. Sign in or learn about subscription options.
by
Dimas Dwihananto
,
Teng-Sheng Moh
An efficient architecture of bitplane coding in VC-1 for real-time video processing
Full-text access may be available. Sign in or learn about subscription options.
by
Yo-Han Lim
,
Seung-Sick Jun
,
Jung-Sun Kang
Bio-Inspired Integrated Chips for Telecommunications S/W Defect-Tracking
Full-text access may be available. Sign in or learn about subscription options.
by
Hoda S Abdel-Aty-Zohdy
,
Mostafa Hashem Sherif
,
Adam Smiarowski
,
Brian Searing
Multipath Channel Tracking using Random Sets with application to OFDM Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Daniele Angelosante
,
Ezio Biglieri
,
Marco Lops
Goodput optimized bit and power allocation for OFDM transmission with relaying
Full-text access may be available. Sign in or learn about subscription options.
by
Rodolfo Torrea Duran
,
Jerome Louveaux
,
Luc Vandendorpe
Interleave-Division Multiplexing MIMO Scheme for Increasing Cell-Edge Throughput
Full-text access may be available. Sign in or learn about subscription options.
by
Kai Li
,
Xiaodong Wang
A Bayesian Multiuser Detector for MIMO-OFDM Systems Affected by Multipath Fading, Carrier Frequency Offset and Phase Noise
Full-text access may be available. Sign in or learn about subscription options.
by
Filippo Zuccardi Merli
,
Giorgio Matteo Vitetta
,
Xiaodong Wang
A High-Rate Full-Diversity 2x2 Space-Time Code with Simple Maximum Likelihood Decoding
Full-text access may be available. Sign in or learn about subscription options.
by
Serdar Sezginer
,
Hikmet Sari
Pilot-Aided Carrier Synchronization Using an Approximate DCT-Based Phase Noise Model
Full-text access may be available. Sign in or learn about subscription options.
by
Jabran Bhatti
,
Marc Moeneclaey
FPGA Implementation of a Configurable Complex Blind Adaptive Equalizer
Full-text access may be available. Sign in or learn about subscription options.
by
Kevin Banovic
,
Mohammed A.S. Khalid
,
Esam Abdel-Raheem
A B_Spline Based Image Compression and Watermarking Technique
Full-text access may be available. Sign in or learn about subscription options.
by
M. F. Fahmy
,
G. M. Abdel Raheem
,
U.S. Mohammed
,
Omar E. Fahmy
Object Retrieval Approach with Invariant Features Based on Corner Shapes
Full-text access may be available. Sign in or learn about subscription options.
by
Nishat Ahmad
,
Jongan Park
,
Gwangwon Kang
,
Jiyoung Kang
,
Junguk Beak
Increased Robustness and Security of Digital Watermarking Using DS-CDMA
Full-text access may be available. Sign in or learn about subscription options.
by
Muhammad Kashif Samee
,
Jurgen Gotze
A Geometric Attack Resistant Image Watermarking Scheme Based on Invariant Centroids
Full-text access may be available. Sign in or learn about subscription options.
by
Elijah Mwangi
Monaural Separation of Dependent Audio Sources Based on a Generalized Wiener Filter
Full-text access may be available. Sign in or learn about subscription options.
by
Guilin Ma
,
Finn T. Agerkvist
,
Jim Benjamin Luther
Using Phoneme Segmentation in Conjunction with Missing Feature Approaches for Noise Robust Speech Recognition
Full-text access may be available. Sign in or learn about subscription options.
by
Arash Mohammadi
,
Farshad Almasganj
,
Aboozar Taherkhani
,
Farnoosh Naderkhani
Nonlinear Signal Processing for Voice Disorder Detection by Using Modified GP Algorithm and Surrogate Data Analysis
Full-text access may be available. Sign in or learn about subscription options.
by
Aboozar Taherkhani
,
Seyyed Ali Seyyedsalehi
,
Arash Mohammadi
,
Mohammad Hasan Moradi
A Robust High Capacity Watermarking Based on DCT and Spread Spectrum
Full-text access may be available. Sign in or learn about subscription options.
by
Nasrollah Moghaddam Charkari
,
Mohammad Ali Zare Chahooki
An Affine Projection Algorithm with an Adaptive Step-Size Equation
Full-text access may be available. Sign in or learn about subscription options.
by
Khaled Mayyas
Analysing Optical Flow Based Methods
Full-text access may be available. Sign in or learn about subscription options.
by
Soroor Behbahani
,
Saeed Asadi
,
Meghdad Ashtiyani
,
Keivan Maghooli
High Voltage Signal Processing Using a Small Signal Approach
Full-text access may be available. Sign in or learn about subscription options.
by
Hirak C. Patangia
,
Dennis Gregory
Improving the Performance of a Recurrent Neural Network Convolutional Decoder
Full-text access may be available. Sign in or learn about subscription options.
by
Klaus Hueske
,
Jurgen Gotze
,
Edmund Coersmeier
Joint Source-Channel Wyner-Ziv Coding in Wireless Video Sensor Networks
Full-text access may be available. Sign in or learn about subscription options.
by
C. Yaacoub
,
J. Farah
,
B. Pesquet-Popescu
An Improved Trickle-based Interference Cancellation Scheme for CDMA Systems
Full-text access may be available. Sign in or learn about subscription options.
by
Pooyan Haghighat
,
Ali Ghrayeb
Analysis of a Distributed Coded Cooperation Scheme for Multi-Relay Channels
Full-text access may be available. Sign in or learn about subscription options.
by
Mohamed Elfituri
,
Walaa Hamouda
,
Ali Ghrayeb
A New Class of Interlaced Complementary Codes Based on Components with Unity Peak Sidelobes
Full-text access may be available. Sign in or learn about subscription options.
by
Adly T. Fam
,
Indranil Sarkar
An Improved Timing Synchronization Scheme for BOC Signals
Full-text access may be available. Sign in or learn about subscription options.
by
Sanghun Kim
,
Dahae Chong
,
Sun Yong Kim
,
Seokho Yoon
Robust Channel Feedback for Collaborative Uplink Beamforming
Full-text access may be available. Sign in or learn about subscription options.
by
Amr El-Keyi
,
Benoit Champagne
Recognizing and Investigating Spoken Arabic Alphabet
Full-text access may be available. Sign in or learn about subscription options.
by
Yousef Ajami Alotaibi
Constructing Quasi-Cyclic LDPC codes Using a Search Algorithm
Full-text access may be available. Sign in or learn about subscription options.
by
Gabofetswe Malema
Showing 100 out of 226
Load More
Load All