The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The majority of online content is written in languages other than English, and is most commonly encoded in UTF-8, the world's dominant Unicode character encoding. Traditional compression algorithms typically operate on individual bytes. While this approach works well for the single-byte ASCII encoding, it works poorly for UTF-8, where characters often span multiple bytes. Previous research has focused...
In October 2015, MPEG and ITU jointly launched the Joint Video Exploration Team (JVET) to prepare the next generation of video coding standard beyond HEVC. The tools added over HEVC, grouped into the Joint Exploration Model 3.0 (JEM-3.0), achieve over 25% of coding gains compared to HEVC for the Random-Access mode. In inter-coding mode, the transform stage consists in the Adaptive Multiple Transforms...
Demanding for efficient compression and storage of DNA sequences has been rising with the rapid growth of DNA sequencing technologies. Existing reference-based algorithms map all patterns to regions found in the reference sequence, which lead to redundancy of incomplete similarity. This paper proposes an efficient reference-based method for DNA sequence compression that integrates FM-index and complementary...
In view of the problem that the unfixed CRC calculation and the compatibility with gigabit Ethernet are the two questions during design of ten gigabit Ethernet MAC controller. This paper solves the above two questions according to the proposed solution. CRC calculation module can be designed to be a fast calculation speed and low gate delay by using a new type CRC method which contains the preprocessing...
This paper improves a colorization-based image coding using image segmentation and adaptive colorspaces. Recently, various approaches for color image coding based on colorization have been presented. These methods utilize a YCbCr colorspace and transfer the luminance component by a conventional compression method. Then, the chrominance components are approximated from the luminance component using...
In this paper, we introduce a new concept called context-free bipartite grammar (CFBG) and present a framework wherein large sparse binary matrices can be compactly represented by CFBGs. Similar to the traditional concept of context-free grammar (CFG), a CFBG consists of a set of production rules. Unlike CFGs, however, the right member of each production rule in a CFBG is a labeled bipartite graph...
In eukaryotic genomes, at least two adjacent duplicates of pattern nucleotides are considered as a tandem repeat. They are the major causes of several genetic diseases. Consequently, locating and characterizing them is of a crucial importance. Bioinformatics tools still very unsatisfactory in this domain, to use them, we need to have a preliminary knowledge about repetition which cannot always be...
The PPM (Prediction by Partial Matching) methods are applied before the lossless compression algorithms, as a preprocessing procedure for the text in order to use efficiently the redundancy. This paper presents 4 compression algorithms preceded by 3 different PPM methods. The compression ratio is studied in relation with the file size, its content, and the context order (the prediction degree). Some...
The Factored 3-way Restricted Boltzmann Machine has encoded the image transformation successfully. But when utilize the code to unknown image, the result was much affected by the feature of training samples. Based on the model, we separated the transformation feature out of the hidden representation and designed a new probabilistic model with gate for learning distributed representations of image...
A duration of century past over to the invention of electrocardiogram (ECG) but even today also electrocardiogram (ECG) monitoring is playing its important role of help to take care of patients having cardiac diseases. Electrocardiogram (ECG) data compression is important for portable solutions, for reducing the storage requirements and low power consumption. Large variety of ECG compression algorithms...
3D-HEVC, as the extension of High Efficiency Video Coding standard, achieves a significant improvement in the coding efficiency of 3D videos, compared with the Multi-View Video Coding (MVC). However the improvement causes a great computational complexity. In this paper, a fast coding parameters decision algorithm is proposed to reduce the computational complexity. The process of the selection of Coding...
Person re-identification is a fundamental challenging task in Computer Vision that consists on recognizing the same person across multiple potentially non-overlapping cameras. This importance is due to the important challenges that it proposes like pose, background clutter and occlusion, illumination changes and low resolution. Also, most of the existing approaches rely on brute-force matching between...
The Sum of Absolute Transformed Differences (SATD) computation is one of the most time consuming functions of the High Efficiency Video Codec (HEVC) reference model (HM). Thus, dedicated hardware architectures are demanded for such metric. In HM, the SATDs are computed using the Hadamard Transform (HT) 8×8 or 4×4. When the partition sizes are larger than those two HT sizes listed, the SATD is computed...
Vehicle verification in two different views can be applied for Intelligent Transportation System. However, object appearance matching in two different views is difficult. The vehicle images captured in two views are represented as a feature pair which can be classified as the same/different pair. Sparse representation (SR) has been applied for reconstruction, recognition, and verification. However,...
A novel perceptual multiple description coding with randomly offset quantizers (PMDROQ) is proposed. In the proposed PMDROQ method, the input image is partitioned into M subsets, and then obtaining M descriptions. In each description, one subset is directly encoded and decoded with different-small perceptual quantization stepsizes in DCT domain, while other subsets are predictively coded and decoded...
We propose a high accuracy algorithm for compressed sensing magnetic resonance imaging (CS-MRI) using a convex optimization technique. Lustig et al. proposed CS-MRI technique based on the minimization of a cost function defined by the sum of the data fidelity term, the 11-norm of sparsifying transform coefficients, and a total variation (TV). This function is not differentiable because of both l1-norm...
Sparse representation has been proven to be a powerful tool for analysis and processing of signals and images. Whereas the most existing sparse representation methods are based on the synthesis model, this paper addresses sparse representation with the so-called analysis model. The ℓ1/2-norm regularizer theory in compressive sensing (CS) shows that the ℓ1/2-norm regularizer can yield stronger sparsity-promoting...
High Efficiency Video Coding (HEVC) standard represents the newest video coding standard generation for both ITU-T Video Coding Experts Group and the ISO/IEC Moving Picture Experts Group. The new standard reduces bitrates by 50% compared to the existing standards using Advanced Video Coding (AVC) for equal video quality. This paper provides an overview of the technical features and characteristics...
Enormous usage of multimedia necessitates maintaining a secured environment. Security in multimedia communication can be achieved with many cryptographic techniques. Perceptual video encryption is an essential technique to prevent the unwanted use of the video which is transmitted. Encryption is used in order to maintain a safe content of data from attackers. This paper explains about the perceptual...
In order to efficiently recognize actions from depth sequences, we propose a novel feature, called Global Ternary Image (GTI), which implicitly encodes both motion regions and motion directions between consecutive depth frames via recording the changes of depth pixels. In this study, each pixel in GTI indicates one of the three possible states, namely positive, negative and neutral, which represents...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.