Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Erasure coding has been increasingly replacing replication in distributed storage systems, thanks to its lower storage overhead with the same level of failure tolerance. However, with lower storage overhead, the reconstruction overhead of erasure codes can increase significantly as well. Under the ever-changing workload, in which the data access can be highly skewed, it is difficult to achieve a well...
For the designing of high performance multipliers, the redundant binary representation can be used because of its high modularity and carry free addition. In this paper, a multiplier using redundant binary modified partial product generator (RBMPPG) is designed. A redundant binary modified partial product generator eliminates the extra error correcting word generated due to Modified Booth Encoding...
As multiple node failures are becoming so frequent in distributed storage systems, many erasure coding techniques are emerging to handle such failures. In this paper we use the fractional repetition code to apply as a redundancy scheme for multiple failure recovery with optimized system cost. The fractional repetition (FR) code is a class of regenerating codes that consists of a concatenation of an...
Computer Assisted Qualitative Data Analysis Software (CAQDAS) may be defined as tools that help researchers developing qualitative research projects. These software packages help the users with tasks such as transcription analysis, writing and annotation, coding and text interpretation, recursive abstraction, content search and analysis, discourse analysis, data mapping, grounded theory methodology,...
SRAM based FPGAs that are based on a nanometer technology with denser integration schemes are used most widely now-a-days. When the radiation in the environment strikes any one of the configuration frames, it would seriously affect the functionality of the SRAM based FPGA which leads to Multiple Bit Upsets (MBUs). These MBUs affect a larger number of configuration frames in SRAM based FPGA. So in...
High growth in multimedia based applications has increased the need for high data rates and bandwidth efficiency. Orthogonal Frequency division multiplexing (OFDM) is best choice in this regard which supports high data rates and bandwidth efficiency. As the number of subcarriers used in OFDM systems increases the data rates supported by it also increases at the cost of high Peak to average power ratio...
Signed digit representation is vital for implementation of fast arithmetic algorithm and efficient hardware realization. Redundant binary (RB) number representation is the most widely used technique for representation of signed digit number. Again RB representation has ability to provide carry propagation free addition. In this paper we have presented an efficient modified redundant binary (MRB) adder...
The dedicated short-range communication (DSRC) plays important role in modern intelligent transportation system. The DSRC standards generally adopt FM0 and Manchester encoding technique to reach dc balance and enhance the signal reliability. Same properties are possessed by Miller and inverted Manchester encoding. Therefore, this two techniques can be added in existing FM0/Manchester encoding module...
Pathology reports are written by pathologists, skilled physicians, that know how to interpret disorders in various tissue samples from the human body. To obtain valuable statistics on outcome of disorders, as for example cancer and effect of treatment, statistics are collected. Therefore, cancer pathology reports interpreted and coded into databases at cancer registries. In Norway is this task carried...
Electromagnetic radiation of PC contains video information, and the image can be reconstructed. It is well known after the Van Eck's paper. The video cable used to connect the display with the graphics controller turned out to be the primary source of the leaking signal. For digital video interface, not all kinds of color images can be intercepted and reconstructed. Firstly we analyzed which color...
The challenge to H.265/HEVC multiview video coding (MVC) is its extremely high computational complexity. This paper presents the development and implementation of a scalable massively parallel fast search algorithm to significantly reduce the computational cost of motion and disparity estimation over the current best available GPU full block matching and sub optimal CPU fast search algorithms by a...
In this paper, we propose a novel massively parallel motion estimation for HEVC using an efficient yet flexible predicate algorithm, ScalingFast that exploits inter-pixel similarities. When evaluated over four video test video sequences with changing resolution, the proposed algorithm outperforms the anchor algorithm by factor of up to 4.6, with little to no loss in rate-distortion (RD) performance.
This paper investigates the problem of MVC from a high-level perspective and proposes a multiple-view-frame-parallel (MVFP), scheduling scheme for a computing cluster. The proposed scheme outperforms the view sequential coding by a factor of more than 12, for the IPP prediction structure for MVC.
The advancement in technologies has been increasing with increase in integrating scales which allow fabricating millions of transistors on a chip. This demands the efficient testing circuit to evaluate the fault present, where the large volume of data volume needs to be tested during manufacturing and fabrication. Therefore the challenging fact arises in methodologies to achieve the test data compression...
Cryptography is a technique by which the stored and transferred data in a particular form can be comprehended and processed by only those, who it is intended for. In the modern era, cryptography is most often associated with the deception of the plaintext into a cipher text using a process called Encryption then back to the original plaintext using a process called Decryption. Strong cryptography...
Health care system's instantaneous answering method using machine-learning process has hindered the cross-system operability and the inter-user reusability. The scheme consists of two naturally reinforced components of database, namely Local Repository and Web. Primarily the user can access the local-repository database with simple keywords for the health data from the local repository. In other cases,...
Stochastic logic performs computation on data represented by random bit streams. The representation allows complex arithmetic to be performed with very simple logic, but it suffers from high latency and poor precision. Furthermore, the results are always somewhat inaccurate due to random fluctuations. The random or pseudorandom sources required to generate the representation are costly, consuming...
Graph Steganography (Graphstega) provides a method of covert communication by converting a message to plotted data in a graph. Due to numerous usages of graphs in our daily life, Graphstega can hide secret message communication without arising any suspicion. This paper proposes a secured Graphstega approach aiming at a secured method of information hiding that looks like innocent and unnoticeable...
Stochastic circuits provide very high efficiency in terms of gate area and power consumption compared with conventional binary logic. However, they require random bit streams generated by stochastic number generators (SNGs), which account for a significant portion of area and energy offsetting their merits. In this paper, we propose a new SNG that significantly reduces area and energy while improving...
We present the design and organization of an homogeneous asynchronous bit-level array based on Null Convention Logic. A bit element (bel) array represents a bit-level hybrid processor that exhibits both Spatial and Temporal computing characteristics. The bit elements are organized in a 2D grid, with eight-way connectivity. Programs represented as Directed Acyclic Graphs can be mapped to the array...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.