The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, practical software development exercises have been carried out in many higher education institutions. To carry out the exercises effectively, it is important that teachers understand the difficulty of learners in exercises and advise appropriately for it. Currently, a common way to check the results of the exercises is that teachers review artifacts which learners submitted. However,...
Partially occluded or illuminated faces pose a significant obstacle for robust, real-world face recognition. The problem of how to characterize the error caused by occlusion or illumination is still a challenging task. There must exist some close relationship between the error metric and error distribution. However, some metric (e.g. Z2-norm) can't characterize this error distribution completely....
Fountain codes are gradually being incorporated into broadcast technologies, such as multimedia streaming for 4G mobile communications. In this paper, we investigate the capability of existing fountain-coded schemes to recover a fraction of the source data at an early stage and progressively retrieve the remaining source packets as additional coded packets arrive. To this end, we propose a practical...
The present paper focuses on the implementation and validation of audiovisual content, quality evaluation approaches in mediated learning. The main aim of the work is to identify and describe the mechanisms that the attributes of source content (and its encoding properties) influence the learning process and the involved emotional aspects in terms of Quality of Experience and Learning (QoE & QoL)...
In storage systems with vast numbers of files, compression techniques should exploit of inter-file similarity, while allowing for near-atomic access to individual files. In differential compression, collections of files are compressed by identifying shared common strings. Therefore, some files are represented largely by references to strings in other files. In addition, a file in the collection can...
The increasing expansion of data scale leads to the widespread deployment of storage systems with larger capacity and further induces the climbing probability of data loss or damage. The Maximum Distance Separable (MDS) code in RAID-6, which tolerates the concurrent failures of any two disks with minimal storage requirement, is one of the best candidates to enhance the data reliability. However, most...
Erasure codes with different parameters provide a wide range tradeoff between the reliability and spatial redundancy to the distributed storage. This paper proposes a technique to auto-configure the parameters of the erasure codes based on the users' requirements and the current status of the distributed storage system. The basic principle behind this technique is to incorporate the requirements of...
In this paper, an improved soft in soft out (SISO) iterative decoding scheme for joint source-channel coding is presented. It is realized as the iterative soft decoding of arithmetic code based on sequential decoding to successively prune the decoding tree. Making use of the forecasted forbidden symbols, an error-resistant arithmetic code with an improved a posteriori probability (APP) metric is adopted...
In this paper, we propose a location-based friend-assisted coding-aware routing protocol (LFCR) for wireless multihop networks. To achieve improved network throughout, LFCR performs inter-flow network coding based routing with the assistance of location information. Specifically, LFCR combines friend-assisted path discovery and coding-aware routing. Further, when making decision on next hop selection,...
One of the most important infrastructure requirements in the domain of remote health monitoring BASNs is the secure collection and dissemination of the user's medical data. Data security desiderata in this application domain are not limited to ensuring the confidentiality and integrity of medical data that has been logged to a data sink. Requirements also arise from the need to provide the data owner...
The novel decoding algorithm for the list decoding of tail-biting convolutional codes is described. The main idea is first to estimate the most reliable state from all state spaces for transmitted codeword by using a Soft Input Soft Output decoder, and then to perform the list Viterbi decoding algorithm from this state around the circular tail-biting trellis. For the LTE standard concatenated coding...
The problem of compressing a large collection of feature vectors so that object identification can further be processed on the compressed form of the features is investigated. The idea is to perform matching against a query image in the compressed form of the feature descriptor vectors retaining the metric. Specifically, we concentrate on SIFT (Scale Invariant Feature Transform), a known object detection...
Alice wishes to potentially communicate covertly with Bob over a Binary Symmetric Channel while Willie the wiretapper listens in over a channel that is noisier than Bob's. We show that Alice can send her messages reliably to Bob while ensuring that even whether or not she is actively communicating is (a) deniable to Willie, and (b) optionally, her message is also hidable from Willie. We consider two...
Testing the inherited features is clearly essential, however, the testing process can easily become very complex if features in the child classes are unnecessarily tested. In this paper, an object-oriented testing technique "Inheritance Testing in Classes" (ITC) is proposed that facilitates the testing of object-oriented code by incorporating procedures to support inheritance testing. ITC...
A multi-sensor array of the gas sensors is used in order to improve the selectivity of a single sensor and obtain a unique signature. Typically, pattern recognition algorithms are used to find a relationship between the multi-sensor array response and odor class. Theses methods usually accompanied with high computational requirement. Recent results reveal that time of first spike coding exhibits fast...
We show how Gabidulin codes can be list decoded by using a parametrization approach. For this we consider a certain module in the ring of linearized polynomials and find a minimal basis for this module using the Euclidean algorithm with respect to composition of polynomials. For a given received word, our decoding algorithm computes a list of all codewords that are closest to the received word with...
Video databases often focus on a particular use case with a limited set of sequences. In this paper, a different type of database creation is proposed: an exhaustive number of test conditions will be continuously created and made freely available for objective and subjective evaluation. At the moment, the database comprises more than ten thousand JM/x264-encoded video sequences. An extensive study...
A review of HEVC/H.265 main characteristics and some tendencies of video coding standard evolution are given. Some ideas how to improve the efficiency of video coding method are presented. The importance of proper video quality assessment for user friendly video codecs design is emphasized.
Modern distributed file systems are deploying erasure codes to increase storage efficiency compared to block replication. Initially, classical error-correcting codes (like Reed-Solomon) were used but the benefits of custom code designs are now clear. Multiple companies including Microsoft and Facebook are designing and deploying distributed storage codes. Still, however, the fundamental information...
Perception based coding with Texture Analysis and Synthesis (TAS) is a promising way to increase the compression efficiency of modern coding schemes, such as High Efficiency Video Coding (HEVC). TAS approaches typically employ an analysis step which specifies which blocks could be reconstructed by a texture synthesizer. Even though synthesized blocks are perceptually similar to their original versions,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.