The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Joint source-channel decoding (JSCD) exploits residual redundancy in compressed bitstreams to improve the robustness to transmission errors of multimedia coding schemes. This paper proposes an architecture to introduce some additional side information in compressed streams to help JSCD. This architecture exploits a reference decoder already present or introduced at the encoder side. An application...
In order to solve the problems of laxity, redundancy and poor interaction that exist in current web curriculum resources and the effectively manage the curriculum resources, this paper is to study the ontology-based curriculum resource management model by taking data-structure curriculum as an example. Protégé ontology editing tool is used to define, classify, establish relationship for curriculum...
In this paper, we investigate the performance and the design of Joint Source-Channel Decoding (JSCD) schemes involving structured Low-Density Parity-Check (LDPC) codes such as protograph based codes. We first present the asymptotic analysis of such iterative receivers based on multi-dimensional EXIT charts. Since a protograph can be interpreted as different encoding schemes, the information mapping...
Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.