The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Because of the strong non-linearity and uncertainty, the dynamics restraints of autopilots, as well as the effects of wave disturbances, designing a high performance ship course controller is always a difficult work. In order to solve the difficulty, an active disturbance rejection nonlinear control strategy is proposed, and the genetic algorithm is used to modify parameters of ADRC online which improve...
Error correction encoding combining with spread spectrum scrambling are adopted in fingerprint generation. We construct Trace ability Codes (TA codes) by Reed-Solomon codes which have significant burst-error-correcting capability, and then scramble the TA codes by spread spectrum code. The generated digital fingerprint is capable of resisting normal video attacks and realizing effective tracing of...
A new adaptive recursive maximum likelihood decoding algorithm using ordered statistics is proposed. The average computational complexity of the algorithm is considerably small compared with the known algorithms. Preliminary simulation results for the (64,22,16) Reed-Muller code and the (64,24,16) extended BCH code are shown. The average number of additions and comparisons on soft-decision values...
This paper presents a class of high-rate codes called low-density parity-check accumulate (LDPCA) codes. The code design is the serial concatenation of an LDPC outer code and an accumulator with an interleaver. The iterative decoding for the LDPCA code design has complexity linear to the code length. When using regular LDPC codes with column weight 2, the proposed codes have low encoding complexity...
Network-on-Chip (NoC) links consume a significant fraction of the total NoC power. We present Selective Packet Interleaving (SPI), a flit transmission scheme that reduces power consumption in NoC links. SPI decreases the number of bit transitions in the links by exploiting the multiplicity of virtual channels in a NoC router. SPI multiplexes flits to the router's output link so as to minimize the...
Fountain codes have been suggested as an efficient solution for multimedia communications over erasure packet network. Therefore, the unequal error protection (UEP) fountain codes schemes are needed for the multimedia data of different importance. This paper proposed a novel technique to optimize the degree distribution of the generalized fountain codes that can provide strong UEP property. We further...
The basic structure and principle of data link communication system (DLCS) were introduced. And then the RS error-corrected coding/decoding and MSK modulation/ demodulation techniques were analyzed. The anti-noise performance of DLCS in Gaussian white noise channel was studied. Moreover a model of DLCS with RS coding/decoding was developed based on Simulink in Matlab. The simulation results were verified.
A new cross layer path selection scheme with quality of service (QoS) support along urban areas is proposed. First, we introduce a cross-layer approach where the routing decision takes explicit consideration of the application layer objective function. Second, the queueing based mobility model, spatial traffic distribution and probability of connectivity for sparse and dense Vehicular Ad-Hoc Networks...
As the degree distribution plays a key role in determining the encoding and decoding performance of fountain codes, asymptotically good degree distributions are developed in LT codes and Raptor codes. In this paper, we analyze the relationship between degree distribution and bit error rate (BER), and then we propose a method to design the output degree distribution of fountain codes by Differential...
In this paper, a method for implementation of the DC-balanced 8B/10B coding used in Superspeed USB with employ a very fast FPGA from Altra family is proposed. This technique can be used by other high-speed serial buses such as PCI Express, IEEE 1394b, Serial ATA, SAS, Fiber Channel, SSA, Gigabit Ethernet, InfiniBand, XAUI, Serial RapidIO, DVI and HDMI (Transition Minimized Differential Signaling)...
In this paper we present ToroVerde, a novel push-based peer-to-peer (P2P) content distribution application exploiting the digital fountain concept through the use of rateless codes. We provide the protocol specification, then describe the simulator and the complete prototype we have developed for Planetlab deployment and testing. To this end, we consider flash crowd and steady arrival patterns as...
In this paper, an enhanced sum of absolute integer transform difference (ESAITD) cost function with rate predictor "sum of non-zero coefficient frequencies" from CAVLC-based rate estimation is proposed for Intra_4x4 mode decision in H.264/AVC. This rate predictor is using simple but significant parameter to approximate the total encoded bitrate accurately. Experimental results show that...
The burgeoning complexity of computer systems increases the role of middleware technologies in current researches. As a matter of fact, a middleware is the convergence point of progressing hardware and software engineering. In this paper, OSCI TLM-2.0, as a modeling standard for ESL design, is proposed for grid computing modeling that is one of the most important middleware technologies. Our study...
In this paper, we investigate the design of decentralized encoding procedure for distributed random linear coding (RLC) in resource-constrained wireless networks. We propose a novel distributed RLC scheme called “Fireworks”, analyze its performance and support it by simulation results. The presented results demonstrate design flexibility of the proposed scheme, where the design choices influence the...
In view of the defect of particle swarm optimization(PSO) which easily gets into partial extremum, the paper puts out an improved particle swarm optimization(IPSO), and applies the algorithm to the selecting of parameter of RBF neural network pit function. The algorithm searches the parameter vector which has the best fitness in the whole space, according to coding mode, iterative formula, fitness...
In recent years, genetic algorithm (GA) and interactive genetic algorithm (IGA) are usually used for the sound generation process in the field of computer music. However, it is difficult to just handle these methods directly for the music composition. In this research we have already proposed a music composition system based on the Twelve-tone Technique which uses twelve notes of the chromatic scale...
Service restoration in distribution systems is usually formulated as a multi-objective and multi-constrained optimization problem. In order to improve the performance of Evolutionary Algorithms (EAs) applied in such problem, a new tree encoding, called Node-depth Encoding (NDE), has been successfully applied together with both a conventional EA and a modified version of the Non-Dominated Sorting Genetic...
A known problem in video streaming is that loss of a packet usually results into loss of a whole video frame. Error concealment is an effective way to solve this problem. A fast interactive anti-error algorithm based on motion tracking which suits for H.264 is proposed. In this algorithm, decoder firstly detects the error, and position of error blocks is feed back to encoder. Then encoder decides...
This paper designs an RFID IP core by utilizing FPGA technology, which has advantages of internal task scheduling and high-speed encoding & decoding. The RTL design of base-band communication IP core based on modular method is presented. The RFID simulation model is established and the experiment results show that the proposed communication simulation model has a good performance, and the IP-core...
As a widely accepted model of multi-step network intrusions, attack graph has been applied to topological vulnerability analysis, network hardening, alert correlation, security metrics, and so on. A major challenge faced by attack graphs is the scalability: Even the attack graph of a moderate-sized network is typically incomprehensible to the human eyes, whereas that of large enterprise networks usually...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.