The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an examination of channel based time delays and their application as units which perform storage and computation. We describe the implementation of compound arithmetic operations, and show that by recirculating the impulses along a channel, both memory and computation can be achieved on the same general channel unit. In addition, this approach has the further advantage of performing...
This paper presents initial results for a novel 128-antenna massive Multiple-Input, Multiple- Output (MIMO) testbed developed through Bristol Is Open in collaboration with National Instruments and Lund University. We believe that the results presented here validate the adoption of massive MIMO as a key enabling technology for 5G and pave the way for further pragmatic research by the massive MIMO community...
Encouraged by recent waves of successful applications of deep learning, some researchers have demonstrated the effectiveness of applying convolutional neural networks (CNN) to time series classification problems. However, CNN and other traditional methods require the input data to be of the same dimension which prevents its direct application on data of various lengths and multi-channel time series...
The ability of ultra-low latency to process market data feed is the premise and foundation for a today's trading system to grab the instant trading profits. The market data feed containing up-to-date information on market changes is multicasted real-timely from financial exchanges to market participants, usually in the form of financial information exchange (FIX) Adapted for STreaming (FAST) protocol...
Research on multilingual speech recognition remains attractive yet challenging. Recent studies focus on learning shared structures under the multi-task paradigm, in particular a feature sharing structure. This approach has been found effective to improve performance on each individual language. However, this approach is only useful when the deployed system supports just one language. In a true multilingual...
Field programmable gate arrays (FPGAs) are readily affected by transient faults in the presence of radiation and other environmental hazards compared to application specific integrated circuits. Hence, error mitigation and recovery techniques are necessary to protect the FPGA hardware from soft errors arising from transient faults. In this letter, modified matrix code (MMC) is used for multibit error...
In recent years, there has been a large push in the U.S. Department of Defense (DoD) to more rapidly respond and adapt to changing technology advancements and emerging threats. Nowhere is an accelerated pace of innovation more needed than in the airborne tactical domain where the predominant communication system, Link 16, has been in use for over 40 years. Airborne tactical systems are often stove-piped,...
This work presents a comparison of two implementations of the last software version of The High Efficiency Video Coding (HEVC) decoder in a single low cost processor ARM Cortex-A series using NEON architecture which is a Single Input Multiple Data (SIMD). By using this technology of optimization, the whole execution time is reduced up to x4. We have analyzed separately all the blocks in the decoder...
Convolutional encoders and Viterbi decoders are the most commonly used channel encoders/decoders used for efficient extraction of message bits. Convolutional encoder used EXOR gates for generating the code bits. Conventional Viterbi decoders use Trellis diagrams for extracting the message bits. Architecture of Viterbi decoder includes Branch Metric Unit (BMU), Path Metric Unit (PMU) and SurvivorMemory...
Signal communication is the method of sending data from one place to another. Signal compression is the technique, used to reduce the amount of data that must be transmitted in the signal communication. Algorithms that produce better compression ratio and less loss of data in the reconstructed signal are needed for signal compression. This paper presents the wavelet based signal compression algorithm...
LDPC block codes (LDPC-BCs) have attracted great interests in recent years by highly parallel computation and good bit-error-rate performance, and one of the decoder implementation issues is high routing complexity. LDPC convolutional codes (LDPC-CCs) not only release routing complexity but also are natural to dynamic length of data frame. Thus, the codes are very suitable for video stream and pre-5G...
We propose a fully automatic method for segmenting myelin and axon from microscopy images of excised mouse spinal cord based on Convolutional Neural Networks (CNNs) and Deep Convolutional Encoder-Decoder. We compare a two-class CNN, multi-class CNN, and multi-class deep convolutional encoder-decoder with traditional methods. The CNN method gives a pixel-wise accuracy of 79.7% whereas an Active Contour...
Distributed video coding is the promising solution for emerging applications such as wireless video surveillance, wireless video sensor networks that have not been supported by traditional video coding standards. Success of distributed video coding is based on exploiting the source statistics at the decoder with availability of some side information. The better the quality of side information, the...
Check node processing dominates the complexity of nonbinary LDPC decoding. Trellis based min-max algorithm[1] can reduce the computation complexity and generate the message from check node to variable node in parallel. In this paper, power representation is used to implement check node processor, adder structures over GF(q) using power representation in trellis based check node processing are proposed...
Statistical error compensation techniques in computing circuits are becoming prevalent, especially as implemented on nanoscale physical substrates. One such technique that has been developed and deployed is algorithmic noise tolerance (ANT), which aggregates information from several computational branches operating at different points along energy-reliability circuit tradeoffs. To understand this...
With the development of flash technology, multilevel per cell (MLC) NAND flash memory has mastered the key market because of its storage capacity superiority. However, excessive density increment leads to decay of reliability of MLC NAND flash memory, thus an appropriate error correction code (ECC) is required to address this issue. This paper presents an efficient multi-strategy ECC scheme called...
Although High Dynamic Range (HDR) content can provide an enhanced immersive experience for end-users, the impact of channel errors on its perception is unclear due to the lack of a standardized HDR video distribution framework. This paper presents an assessment of the robustness of the two main HDR video distribution architectures, the single-layer 10-bit scheme and the two-layer 8-bit backward-compatible...
Deep learning algorithms modelled with deep architectures have demonstrated impressive results to alleviate common problems of Feedforward Neural Networks, i.e. escaping poor solutions of local minima. Basic architecture concepts behind these powerful models have been set up by preliminary research on Neural Networks, including the application of unsupervised pretraining algorithms and greedy layer-wise...
Security places an important role in communication applications for secure data transfers. Image Steganography is one of the most reliable technique in encryption and decryption of an image (hidden) inside other image (cover) such way that only cover image is visible. In this paper frequency domain Image Steganography using DWT and Modified LSB technique is proposed. The proposed approach uses DWT...
Presenting large formal instruction set models as executable functions makes them accessible to engineers and useful for less formal purposes such as simulation. However, it is more difficult to extract information about the behaviour of individual instructions for reasoning. We present a method which combines symbolic evaluation and symbolic execution techniques to provide a rule-based view of instruction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.