The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a color attribute compression method for MPEG Point Cloud Compression (PCC) by exploiting the spatial redundancy among the adjacent points. With the increased interest in representing real-world surface as 3D point clouds, compressing the attributes (i.e., colors and normal directions) of point cloud has attracted great attention in MPEG. The proposed method is based on grouping...
Complex software appliances can be deployed on hardware with limited available computational resources. This computational boundary puts an additional constraint on software applications. This can be an issue for real-time applications with a fixed time constraint such as low delay video encoding. In the context of High Efficiency Video Coding (HEVC), a limited number of publications have focused...
With the exponential growth of digital cameras and the aid of powerful video editing softwares, videos with various resolutions become ever more popular. Therefore, there is a great demand for video coding schemes supporting arbitrary resolutions with higher efficiency. In the latest standard, only a simple padding with direct copying is adopted to meet this requirement, and the coding efficiency...
Dynamic graph software watermarking has become the focus of attention both in the academia and industries. In this paper we improve the IPPCT structure (Improved Planted Plane Cubic Trees) which is based on the Radix-k circular linked list structure and PPCT structure. This further improvement takes advantage of all nodes in PPCT tree to encode so as to enhance the data rate at the same time. In order...
In this paper, an adaptive weighted prediction is proposed to improve the coding efficiency. Conventional weighted prediction methods are optimized for specific sequences with global brightness variations (GBVs) such as fade-in and fade-out. However, if there is uncovered background by motion between current picture and reference picture, weighted prediction parameter (WPP) could not be derived accurately...
Block matching used in traditional hybrid coding, like intra block copy (IBC), is not always efficient to code similar or identical pattern within a picture, since they use 2-D pattern of only a few fixed sizes. To improve the coding efficiency of such repeated pattern with a flexible size, an intra string copy method is proposed in this paper. The proposed string copy is flexible in the sense that...
The rate control model used in the HEVC reference software HM10.0 is a R-λ model. In this model the distortion is measured by Mean Squared Error (MSE) and Sum of Absolute Difference(SAD). However, MSE and SAD are not correlated well with perceptual image quality. In this paper, we propose an improved LCU-level rate control algorithm based on the structural similarity (SSIM) index which was proved...
Software maintainability evaluation index system is built up in consideration of software maintainability metrics and evaluation problem. Fuzzy integral evaluation approach is applied to measure software maintainability, and virtual maintenance system is taken as an example to validate the maintainability status.
Debugging techniques assist a developer in localizing and correcting faults in a system's description when the behavior of the system does not conform to its specification. Two fault localization techniques are model-based diagnosis and error explanation. Model-based diagnosis computes a subset of the system's components which when replaced correct the system. Error explanation determines potential...
In the current HEVC test model (HM), a quad-tree based coding tree block (CTB) representation is used to signal mode, partition, prediction and residual information. The large number of combinations of quad-tree partitions and modes to be tested during rate-distortion optimization (RDO) results in a high encoding complexity. In this paper, we investigate and compare a variety of algorithms for fast...
In many commercial applications proprietary file formats make it difficult to access the generated data. In the worst case interoperability is impeded even further by shortcomings in interface technology. The objective of this work is to find out whether it is possible to retrieve textual data from certain binary files in a quality which is sufficient to build a useful index. We propose a method to...
In this paper, an interleaved motion vector coding is proposed which supports flexible coding order of motion vector components according to directional property of vertical and horizontal components in motion vector field. It requires no additional information for adaptively selecting the coding order.
In this paper, we advocate asx-ng, a form of machine-readable ASTERIX specifications that allows, amongst other features, to automatically generate decoders, encoders, and validators. We also present some applications that use this specification form.
Within software coding standards, identifier naming plays an important role. Identifier naming conventions were divided into four categories in our research - Hungarian, Pascal, Camel and Underscore. Such techniques in compiler theory as regular expression and lexical analysis were used to extract identifiers and to match them with the defined naming conventions in our evaluation system. The consistency...
The study of compressed storage schemes for highly repetitive sequence collections has been recently boosted by the availability of cheaper sequencing technologies and the flood of data they promise to generate. Such a storage scheme may range from the simple goal of retrieving whole individual sequences to the more advanced one of providing fast searches in the collection. In this paper we study...
In the field of software developing, project is almost the most common organizational form. But with the enhancement of software products' complexity and the constant change of customers' demand, the importance of communication in software development projects is increasingly prominent.Based on literature review about communication management and software development life cycle, the paper identified...
Compliance with coding standards is becoming an important evaluating index of a software engineer??s teamwork capability and international cooperation capability. Unreadable and non-reusable program code, high defect density, and expensive maintenance cost are changing the mindset of managers working in software companies. The best place to solve this problem should be in an educational environment...
A novel steganographic scheme is proposed in this paper to embed secret message into Java executable files. It analyzes firstly the format of Java class file, and then reorder the indexes of constants to embed messages. Expensive experiments show that the stego file modified by the proposed scheme still have the same file size and the implementation performance as cover. It is concluded that our scheme...
In order to increase students' capacity of complying with coding standard and strengthen their competitiveness in software industry, an AHP-based evaluation index system and Web-based evaluating platform were established. A student-centered teaching model was discussed, in which both teachers and evaluating platform support the students. After implementing the preliminary teaching model in one academic...
Cryptographic devices are recently implemented with different countermeasures against side channel attacks and fault analysis. Moreover, some usual testing techniques, such as scan chains, are not allowed or restricted for security requirements. In this paper, we analyze the impact that error detecting schemes have on the testability of an implementation of the advanced encryption standard, in particular...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.