The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new approach to synthesize reversible (quantum permutative) automata from standard state tables. It uses various variants of error-detecting and error-correcting encodings. Next, a combination of recently introduced “EPOE circuits” as well as EXOR Lattices are used for synthesis. The goal is to compare the costs of various encodings and synthesis methods for the same machine,...
In Recent years, sparse representation has been significantly applied in many image processing problems, such as image restoration, face recognition and image super-resolution, and shown promising results. The key issue of sparse representation is how to find a reasonable representation dictionary, through which the image can be presented more sparsely. In this paper, we addressed the biological image...
The users of information systems often have to deal with outliers in their data. Such outliers can have negative (i.e. abnormal observations) or positive (i.e. detection of new features) impact on their work. Despite the fact, that several methods of outlier detection already exist, there is still a need to improve them. In this work we propose a method for evolutionary outlier detection. The novelty...
This paper addresses the problem of joint source and channel coding for 3-D video coding and transmission. Firstly, we formulate a packet-level joint texture and depth coding mode selection framework for error-resilient source coding using Lagrange multiplier. Then, we evolve to the more general formulation that jointly optimizes error-resilient source coding and channel coding for texture and depth...
In the urban water supply system, the location and quantity of the pressure monitoring nodes play a significant role for the monitoring effect and the response warning of the pipe burst. However, most installation of pressure monitoring nodes are based on human experience, which cannot totally present the whole water supply system condition. In view of the unreasonable layout of pressure monitoring...
Learning based hashing has become increasingly popular because of its high efficiency in handling the large scale image retrieval. Preserving the pairwise similarities of data points in the Hamming space is critical in state-of-the-art hashing techniques. However, most previous methods ignore to capture the local geometric structure residing on original data, which is essential for similarity search...
Emerging virtual reality (VR) applications bring much challenge to video coding for 360-degree videos. To compress this kind of video, each picture should be projected to a 2D plane (e.g. equirctangular projection map) first, adapting to the input of existing video coding systems. At the display side, an inverse projection is performed before viewport rendering. However, such a project introduces...
With the development of mobile Internet technology and smart mobile devices, campus path navigation as a new trend have taken more attention. In this paper, we propose a new method based on quantum ant colony algorithm for campus path navigation. Quantum evolution algorithm has high effectiveness for solving combinational optimization problem. We combine ant colony algorithm with quantum evolution...
We present an information theoretic approach to caching in multicore embedded systems. In contrast to conventional approaches where caches are treated independently, we leverage novel cache placement and coded data delivery algorithms that treat the caches holistically, and provably reduce the communication overhead resulting from main memory accesses. The proposed approach intelligently places data...
We investigate the overlay coding scheme as the capacity achieving multi user detection (MUD) technique, i.e., transmitting over non-orthogonal channels, in forward link in multi-beam satellite systems with dense frequency reuse. The classic overlay coding scheme, uses the strongest co- channel interference (CCI) as extra source of information. The data intended for the target user is shared between...
Data shaping is a coding technique that has been proposed to increase the lifetime of flash memory devices. Several data shaping codes have been described in recent work, including endurance codes [2] and direct shaping codes for structured data [8], [4], [5]. In this paper, we study information-theoretic properties of a general class of data shaping codes and prove a separation theorem stating that...
Recently, Parizi, Telatar, and Merhav [1] determined the exact random coding secrecy exponents for a wiretap channel. In this study, we focus on the computation of such secrecy exponents. To obtain the exact random coding secrecy exponent for a constant composition random coding ensemble, optimization with respect to two stochastic matrices must be performed. Parizi et al. suggested that inner optimization...
Today, many real-world machine learning and data analytics problems are of a scale that requires distributed optimization; unlike in centralized computing, these systems are vulnerable to network and node failures. Recently, coding-theoretic ideas have been applied to mitigate node failures in such distributed computing networks. Relaxing the exact recovery requirement of such techniques, we propose...
Mobile cloud storage (MCS) is being extensively used nowadays toprovide data access services to various mobile platforms such assmart phones and tablets. For cross-platform mobile apps, MCS is afoundation for sharing and accessing user data as well as supportingseamless user experience in a mobile cloud computing environment. However, the mobile usage of smart phones or tablets is quite differentfrom...
1.2 billion people, predominantly living in remote rural regions in countries of the Global South, currently live without access to any modern source of energy. Options for electrification of these communities include extending existing national grid infrastructure, deploying mini-grids, and installing standalone home systems (SHS). Deriving the most cost effective means of delivering energy to these...
Most published results show that power reduction of the finite-state machines (FSMs) is achieved by decomposition. In order to achieve a low power FSM implementation, a Genetic Fuzzy c-mean clustering-based decomposition method, called GFCM-D, is proposed for FSM partition in this study. GFCM-D used Fuzzy c-mean clustering (FCM) to partition a set of states of FSM into a collection of c fuzzy clusters,...
Finding a solution to the Multi-Criteria Minimum Spanning Tree (mc-MST) problem has direct benefit on real world problems. The Multi-objective Evolutionary Algorithm (MOEA) called NSGA-II (Non-Dominated Sorting Genetic Algorithm) has demonstrated to be the most promising approach to tackle mc-MST problem because of their efficiency and simplicity of implementation. However, it often reaches premature...
In the Evolutionary Computation field, it is frequent to assume that a computation load necessary for fitness value computation is, at least, similar for all possible cases. The main objective of this paper is to show that the above assumption is frequently false. Therefore, the examples of evolutionary methods that use problem encoding which allows for significant optimization of the fitness computation...
Distributed storage systems are known to be susceptible to long tails in response time. It has been shown that in modern online applications such as Bing, Facebook, and Amazon, the long tail of latency is of particular concern, with 99.9th percentile response times being orders of magnitude worse than the mean. As erasure codes emerge as a popular technique in distributed storage to achieve high data...
In this paper a robust encoding scheme is proposed to improve the visual quality of HEVC decoded video when intra frames are lost along the streaming path. For this purpose, the encoding process includes frame loss simulation and subsequent error concealment, to find the most efficient method that should be used by a decoder to recover lost intra frames. In this novel scheme, each image is divided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.