The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of cloud computing, disk arrays tolerating triple disk failures (3DFTs) are receiving more attention nowadays because they can provide high data reliability with low monetary cost. However, a challenging issue in these arrays is how to efficiently reconstruct the lost data, especially for partial stripe errors (e.g., sector and chunk errors). It is one of the most significant...
Aiming at scheduling links efficiently, Contact Plan Design (CPD) has been playing an increasingly prominent role in the resource-limited Small Satellite Networks (SSNs). In CPD, the transfer stages of bundles should be coordinated arrange. Neglecting such feature in the bundle transmission undoubtedly deteriorate the network performance. For this issue, an algorithm named Genetically Inspired Contact...
The proliferation of cyber physical systems in society, from the smart grid to sensor networks and robots has raised the importance of error resilience in signal processing and control systems to unprecedented levels. Resilience to errors in sensing and control algorithm execution in processors all the way down to circuits for sensing and actuation is of critical importance in safety-critical applications...
In this invited paper, both binary and nonbinary LDPC codes suitable for optical transmission systems are described. The corresponding FPGA implementation has been discussed as well. The use of adaptive LDPC coding to deal with time-varying optical channel conditions is described as well.
The existing algorithms for the selection and switching of signal-code sequences (SCS) in IEEE 802.11 wireless equipment are analyzed. Indicators and criteria for assessing the efficiency of existing SCSs switching algorithms are reviewed. Suggested algorithms for switching SCS are proposed taking into account advantages and disadvantages of such algorithms.
Iris recognition is a biometric authentication system proving vital for ensuring security and has been employed as an important case to test the algorithms developed in pattern recognition. The unique circular shape of the iris and its time invariance makes it a versatile technique that has an accuracy that can be mathematically proven. Here in this work we propose a new segmentation technique and...
In Recent years, sparse representation has been significantly applied in many image processing problems, such as image restoration, face recognition and image super-resolution, and shown promising results. The key issue of sparse representation is how to find a reasonable representation dictionary, through which the image can be presented more sparsely. In this paper, we addressed the biological image...
The paper suggests an adaptation of a grouping genetic algorithm for solving the capacitated p-median problem. We propose a new encoding of the individual solutions that enables an efficient implementation of the crossover operation. A hybrid metaheuristic that combines the grouping genetic algorithm with the post-processing solver is proposed as well. Numerical experiments performed on benchmark...
With the development of mobile Internet technology and smart mobile devices, campus path navigation as a new trend have taken more attention. In this paper, we propose a new method based on quantum ant colony algorithm for campus path navigation. Quantum evolution algorithm has high effectiveness for solving combinational optimization problem. We combine ant colony algorithm with quantum evolution...
Global remote sensing and large-scale environment modeling have generated vast amounts of raster geospatial data. Performing spatial queries over such data has applications in many domains, such as climate impact studies, water and wildlife management, and urban planning. Processing those queries is greatly facilitated by the existence of spatial indices. However, I/O transfer is still a major bottleneck...
Fuzzy association rules are one of the most important data mining techniques. They allow to discover useful and meaningful information that help in decision-making. Many algorithms have been proposed to extract fuzzy association rules. A major drawback of these proposed algorithms is their high run-time for extracting fuzzy association rules. To overcome this problem, we introduce in this paper a...
It was first observed by John Bell that quantum theory predicts correlations between measurement outcomes that lie beyond the explanatory power of local hidden variable theories. These correlations have traditionally been studied extensively in the probabilistic framework. A drawback of this perspective is that one is then forced to use in a single argument the outcomes of mutually-exclusive measurements...
Erasure coding is an established data protection mechanism. It provides high resiliency with low storage overhead, which makes it very attractive to storage systems developers. Unfortunately, when used in a distributed setting, erasure coding hampers a storage system's performance, because it requires clients to contact several, possibly remote sites to retrieve their data. This has hindered the adoption...
This article offers a method of structural representation of telemetry data, based on displaying the original data onto plane or torus. Such method allows potentially detect the implicit correlation dependences both in single data frame and in sequence of such frames. It offers algorithms of compression based on displaying the original data, represented as bit-form, onto the surface of plane or torus...
Compared with H.264/AVC, H.265/HEVC achieves better image quality at the same coding bit rate, but requires more complexity in its coding process. In this paper, we propose a fast inter/intra decision method that can reduce the required encoding time with very little increase in required rate and PSNR degradation. We also introduce the weighted sampling and adaptive threshold condition to determine...
This study is the second using real-coded representation for problems usually solved with a discrete coding. The adaptive generative representation is able to adapt itself on the fly to prior parts of the construction of an object as it assembles it. In the initial study the ability of the representation to take user supplied or problem supplied biases that change its behavior was demonstrated but...
Recently, HTTP-based adaptive video streaming has been widely adopted in the Internet. Up to now, HTTP-based adaptive video streaming is standardized as Dynamic Adaptive Streaming over HTTP (DASH), where a client-side video player can dynamically pick the bitrate level according to the perceived network conditions. Actually, not only the available bandwidth is varying, but also the chunk sizes in...
High Efficiency Video Coding (HEVC) standard has a superior video compression rate compared with previous H.264/AVC. At the same time, Ultra-high-definition (UHD) video applications are becoming a reality under the development of the display technology. In this paper, a hardware-friendly multi-layer HEVC motion estimation (ME) algorithm for UHD applications are proposed. To keep the computational...
This paper presents a complexity reduction technique for 3D High Efficiency Video Coding (3D-HEVC) using Rate-Distortion (RD) list reduction in the depth maps intra-frame prediction. In the 3D-HEVC standardization, the HEVC intra-frame prediction was inherited from texture to depth maps. However, considering depth maps simpler behavior than texture, the intra-frame prediction contains an unnecessary...
Nowadays, video steganography has become important in many security applications. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.