The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Modulo multiplication forms the basic block of Residue Number System (RNS) based Digital signal processing and cryptographic applications. Several techniques are proposed to concise the computation complexity of the multiplier design. In this paper the area and power efficient modulo 2N multiplier for {2N-1, 2N, 2N+1} based RNS is designed involving Logarithmic Number System (LNS) concept. The divided...
This paper presents a new intelligent computing method of adaptive streaming video delivery based on Unequal Error Protection (UEP) rateless code for a Scalable Video Coding (SVC) video source, which can be applied to both broadcast and end-to-end scenario. The proposed rateless UEP Code is generated by concatenating punctured convolutional codes and LT codes with a specific coding graph. It provides...
Trafc indication map (TIM) is one information element (IE) that is used to indicate the buffered frame status for the stations (STAs) and carried in the regularly transmitted beacons in the IEEE 802.11 based WLANs. To reduce the overhead of TIM signaling for the recent standardization of IEEE 802.11ah, which supports a large number of STAs and operates at the sub-1GHz frequency, a hierarchical structure...
Low-Density Parity-Check (LDPC) codes with linear time encoding complexity and low hardware storage are a hot issue recently. We propose a general method for constructing LDPC codes with quasi-cyclic (QC) structure and improved zigzag pattern to obtain both linear time encoding and low hardware storage. We call it irregular repeat accumulate like (IRA-like) codes for its similarity with irregular...
PCM (phase-coded modulation) signal is a kind of radar signal that is widely used in many circumstances, such as PD processing, communication, etc. In wild electromagnetic environment, the identification of PCM signals is important in passive location system. STFT is an efficient method in time-frequency analysis, which can exactly identify PCM signals with wave-entropy analysis. Theory verification...
Scalable video coding (SVC) features a flexible media representation that enables adaptive streaming as network conditions change. However, existing SVC simulation tools do not support adaptive video transmission. In this paper, we present an Adaptive VIdeo Simulation (AVIS) framework for SVC in network simulator 2 (NS2). The framework includes two new NS2 objects, including AVIS transmitter and receiver,...
In this paper, we present an extension of the semi-definite programming formulation of the optimal rate code design in single link Binary Erasure Channel (BEC) proposed by the authors to the Binary Erasure Multiple Access Channel (BE-MAC) with two sources correlation. This new way can be easily extended to the multiple access senders. Simulation results show the efficiency and effectiveness of the...
Polar codes have a regular-recursive structure, which can efficiently be mapped to hardware for practical applications. A good quantization scheme plays a great important role in hardware implementation. In this paper, three uniform quantizers are designed for successive cancellation (SC) decoding of polar codes based on either optimizing the equivalent channel capacity, cutoff rate or mean-squared...
The Detector Generation Algorithm based on Niching Strategy (DGANS) could pass good genes to the next generation and maintain the diversity of the population. In this paper, a Detector Evolutionary Algorithm based on Immunization Strategy of Complex Networks (DEAISCN) is proposed, in which the immunization strategy of complex networks is studied to improve the evolutionary process of mature detectors...
On the basis of Lu's syndrome-based decoding algorithm, we propose an improved decoding algorithm for turbo product code, which has lower complexity and latency. On one hand, the proposed algorithm further reduces the computational complexity and the decoding latency by simplifying the calculation of syndrome and selecting a proper number of least reliable bits. On the other hand, this algorithm obtains...
The application of network coding in wireless environment provides a new horizon for throughput enhancement. By means of network coding the throughput of a network can be increased very efficiency. In this paper we use a family of constant dimension subspace codes called lifted rank-metric coding (LRMC) and investigate its performance in a general wireless environment. LRMC process reduces the number...
Path planning is always an essential issue and complicated optimum problem for unmanned aerial vehicle (UAV). Genetic algorithms are well applied to solve such problems as a stochastic search method. In this paper, a new method of path planning for UAV based on genetic algorithms is introduced. Reasonable coding way and fitness function are used in this improved genetic algorithm, and prior knowledge...
This paper proposes a fast hardware friendly intra block size selection algorithm with simple gradient calculations and the bottom-up structure to solve the high computational demand of intra prediction in the latest HEVC (High Efficiency Video Coding) standard. The simulation results show that the proposed algorithm can save 57.3% encoding time in average for all-intra main case compared to the default...
In this paper, we propose a fast rough mode decision method based on edge detection for intra coding in HEVC. It performs edge detection using Sobel operator and estimates the angular direction using gradient values. Histogram mapping is used to reduce the number of prediction modes for full rate-distortion optimization (RDO). The proposed method can achieve processing speed improvement through RDO...
In this paper, we propose an accumulated loss recovery algorithm on overlay multicast system using Fountain codes. Fountain code successfully decodes the packet loss, but it is weak in accumulated losses on multicast tree. The proposed algorithm overcomes an accumulated loss and significantly reduces delay on overlay multicast tree.
In VLSI systems, channel bandwidth limitation becomes a crucial problem as the required data rate communication increases, as high-frequency channel loss significantly degrades transmission performance. In this paper, we compare non-return-to-zero (NRZ) binary and 4-PAM (pulse amplitude modulation) coding techniques for serial links by fabricating a test board of a micro-strip line. By extracting...
The design objectives of PID controller is to choose the reasonable parameters which can make the system meet the design requirements. Specific to the problem of the controller parameter optimization of flight control system, the classic tuning method of PID controller parameters is cumbersome and need repeating trial. What's more, the controller parameters cannot be guaranteed to be optimal. Therefore,...
Recently, data sharing applications among mobile users in cloud computing platforms (e.g., Dropbox and Google Drive) are very popular. In such applications, a cloud server is responsible for synchronization among mobile users and thus the synchronization traffic can be significant when the data are frequently updated and shared by many mobile users. To address this problem, we propose a proxy-based...
Since the Quantum Key Distribution (QKD)technique makes it possible to construct an absolute secure cryptographic system by combing the One-time pad, QKD has drawn many attention these years. The insufficient implementation speed of the post-processing system of QKD is one of the greatest obstacle to wide application of QKD. The sifting module of QKD post-processing system needs to deal with the heaviest...
Fountain codes based on non-binary low-density parity-check (LDPC) codes have good decoding performance when the number of source packets is finite. However, the space complexity of the decoding algorithm for fountain codes based on non-binary LDPC codes grows exponentially with the degree of a field extension. Zigzag decodable codes generate the output packets from source packets by using shift and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.