The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Over these recent years, research on P2P streaming media has become very popular. In order to enhance quality of play and to improve performance of transmission, a new P2P streaming media system mode, i.e. P2PSMCM, is proposed in this article. This model may enhance data memorizing and forwarding capability of the system based on network coding mechanism. It solves the problem of unbalance of multicast...
Artificial Neural Network (ANN) based equalization and channel coding has been performed jointly to minimize Inter Symbol Interference (ISI) and noise over multipath faded channel. Further ANN equalization has been compared with a non-ANN MMSE equalizer to compare its performance and along with them (7, 4) Hamming coding is used for more minimization of the noise disturbances so as to achieve a superior...
Based on the investigation and statistics of the preparatory tunnel data in Chengchao Iron Mine, using the adjustable parameters adaptive genetic algorithm with combining hierarchical structure to optimize structure and solve parameters of the radial base function neural network(ACHG-RBF), the algorithm had trained and predicted the network and optimized the network topology. In addition, it has enhanced...
The traditional neural network is unavoidable to present local extreme value question, may result in failing training. On the basis of quantization of weapon system safe index, it has adopted neural network based on improved genetic algorithm to set up the systematic safety evaluation model of the weapon. It utilizes improved genetic algorithm to optimize the weight of neural network and get the final...
In this work, an opportunistic scheduling scheme for a large multiuser system is proposed. A group of users with good channels are scheduled simultaneously for data transmission and separated by means of superposition coding. The proposed scheduling scheme is analyzed in the large system limit. Random packet arrivals are modeled as constant arrivals with random content size. Transmission thresholds...
This paper describes a system for the distribution of content over multicast and broadcast media that uses network coding techniques for concealing packet losses from the applications, improving the received Quality of Service. We propose a systematic network code designed for this purpose, analyze the performance of the code, comparing it with a standard approach based on random linear network coding,...
This paper applies the principle of the immune system adjustment to optimize the structure parameters of wavelet network, so as to establish a new type of wavelet neural network model which will be applied to turbine exhaust steam enthalpies. The calculation results show that the model has fast convergence, simple operation, high accuracy in forecasting, and has certain value of engineering applications.
A neural representation of combinational logic circuit is proposed, called `Logical Neural Network' (LNN). LNN is a feed-forward neural network (NN) where the weights of the network indicate the connections of digital circuit. The logic operations of the circuit such as AND, OR, NOR etc are performed with the neurons of LNN. A modification of Simple Genetic Algorithm (mSGA) is applied to design and...
This paper discusses the rendering issues of complex text layout - traditional Mongolian script. The traditional Mongolian script has been standardized in Unicode. We analyzed existing Open Type fonts and their rendering schemes for traditional Mongolian script. We found some errors, and discovered grammatical rules, which are not documented in international standards. None of the existing Open Type...
Group technology has been used extensively in the manufacturing field for decades after it generated. In this paper a revolving body components grouping system based on neural network is set up. It introduces the appliance about Elman neural network in the components classify, and connects group technology and neural network, presents a components grouping method based on neural network. By analyzing...
In this paper, we proposed a novel approach to combine sub-bands SNR for Voice Activity Detection. In the proposed algorithm, a nonlinear method based on cochlear model is used to divide sub-bands. In each sub-band, two Order Statistic Filters are used to estimate the signal SNR. Through the use of the above methods, the sub-bands SNR is combined by a linear dicriminant function calculated under the...
Network-on-chip (NoC) architectures are emerged as a promising solution to the lack of scalability in multi-processor systems-on-chips (MPSoCs). In this paper, A busmesh network-on-chip (BMNoC) architecture is proposed, together with simulation results. It is comprised of bus-based connection and global mesh routers to enhance the performance of on-chip communication. Furthermore, MPEG-4, H.264 and...
An improved iterative algorithm is first proposed to calculate the rate-distortion performance of causal video coding for any continuous sources. Instead of using continuous reproduction alphabets, it utilizes finite reproduction alphabets and iteratively updates them along with transitional probabilities from the continuous source to reproduction letters, thus overcoming the computation complexity...
Map Reduce is a key-value based programming model and an associated implementation for processing large data sets. It has been adopted in various scenarios and seems promising. However, when spatial computation is expressed straightforward by this key-value based model, difficulties arise due to unfit features and performance degradation. In this paper, we present methods as follows: 1) a splitting...
In this paper, we proposed a novel network coding method called local-directed network coding to improve the throughput of the vehicular ad-hoc network. Different from other vehicular network coding methods, we consider the direction of packet transmission. In detail, the intermediate node selects one main packet and some sub-packets from forwards and backwards sending queues, and then encodes these...
As the shortcomings of BP neural network slow convergence rate, falling into local minimum easily and difficult to determine the number of hidden nodes accurately, the number of hidden nodes, weights and threshold of BP neural network were optimized, using binary and real number hybrid coding based on genetic algorithms with global searching ability. Finally, the method tested with WD615 diesel engine...
This paper presents an optimizing methodology for implementing a multi-layer perceptron (MLP) neural network in a Field Programmable Gate Array (FPGA) device. In order to obtain an efficient implementation, a compromise of time and area is needed. Starting from simulation in the learning phase with fixed point operators, we have developed a methodology which allows the automatic generation of a VHDL...
Ray-Space Interpolation is one of the key technologies in the free viewpoint television system. In this paper, a novel Ray-Space interpolation method based on hierarchical prediction is proposed. Firstly, disparity is estimated and optimized by our proposed bi-direction PDE method, then hierarchical prediction structure is proposed to interpolate the virtual views. Experimental results show that both...
A secrecy coding scheme is provided for degraded wire-tap channels via the method of channel polarization. It is shown that the entire rate-equivocation region is achievable via the provided scheme. The key element in the provided scheme is the utilization of the noisy bits, which are required to achieve the secrecy constraint, to provided private non-secure rate for the legitimate user.
Implementation of reconfigurable neural networks in hardware requires highly flexible connectivity, creating major architectural challenge. We perform an analytical evaluation and comparison of different configurable interconnect architectures (mesh NoC, tree, shared bus and point-to-point) emulating variants of two neural network topologies (having full and random exponential configurable connectivity)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.