The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Reed-Solomon code or RS code is widely used for error corrections of data in transmission and storages. However, it is thought of as insecure for direct implementation in code-based cryptography due to plaintext-known attacks. In recent years, McEliece cryptosystem with enhanced public key security by generalized RS code and Goppa code are discussed for hardware implementation. In this work, from...
We consider a communication problem in which a transmitter encodes a source into several streams that are subject to modification by an omniscient adversary while en route. We design encodings with a distortion guarantee that degrades gradually as the number of streams that the adversary alters increases. Notably, we find that a mixture of highly redundant coding and uncoded transmission outperforms...
We investigate adaptive transmission for tactical packet radio networks in which a source uses fountain coding to multicast a file to a number of destinations over time-varying links. We examine two strategies from the literature for packet-by-packet adaptation of the modulation and channel code. The maximum data-recovery rate philosophy attempts to maximize the throughput for each transmitted packet...
Coding of signals with high amount of dense transient events, like applause, rain drops, etc., is usually a difficult task for perceptual audio coders. Especially at low bit rates, coding (and the associated coding noise) leads to smeared transients and a perceived increase in noise-like signal character. We propose a post-processing technique for coded/decoded applause-like signals which is based...
Efficient code descriptions of rate compatible polar codes are studied. An efficient code description method, so-called the polarization weight sequence that defines multiple codewords, was proposed in 3GPP standardization. We verify the validity of the method for various environments. We assess the performance degradation under successive cancellation (SC) decoding and SC list decoding compared with...
Dual Connectivity(DC) is one of the key technologies standardized in Release 12 of the 3GPP specifications for the Long Term Evolution (LTE) network. It attempts to increase the per-user throughput by allowing the user equipment (UE) to maintain connections with the MeNB (master eNB) and SeNB (secondary eNB) simultaneously, which are inter-connected via non-ideal backhaul. In this paper, we focus...
Efficient and robust wireless video delivery is an enabling technology for various applications. The existing wireless video transmission scheme has the cliff effect and it cann't gracefully adapt to channel variations. In this paper, we introduce a pseudo-analog wireless video transmission improvements and design in the hardware. Comparing with the traditional transmission, the linear processing...
Recent simulation results have shown that serial concatenation with outer codes such as cyclic redundancy check (CRC) or parity check (PC) codes can boost the error correcting performance of polar codes. A theoretical analysis for further explaining where the performance gain comes from is in order. In this paper, we try to provide such an analysis for concatenated polar codes from the distance spectrum...
NarrowBand Waveforms (NBWF) are often used in VHF or UHF tactical communications. For these kinds of waveforms, low latency and robust data rates result in short codeword lengths that are challenging in terms of channel coding. Usually, serially concatenated convolutional code and continuous phase modulation (CC-CPM) schemes are considered in the context of NBWF. When evaluating the achievable rates,...
Engineering courses often make use of term projects to tie together course concepts and enable open-ended learning. Projects can also be used to teach entrepreneurial-minded learning (EML). At Rose-Hulman we offer mobile/web app development in 4 different courses. In each of these courses, we have two goals for our students: (1) to master fundamental technical skills for that platform and (2) to create...
In this paper, we proposed a fast coding unit (CU) size decision algorithm for High Efficiency Video Coding (HEVC) medical image lossless coding. In detailed, we used the coding information obtained after checking the first two prediction unit (PU) modes inter 2N×2N and Skip to determine whether or not to continue partitioning the current CU. Eight features are extracted from the coding information...
Data traffic volume including video transmission is increasing exponentially over the past decade. The demand for ultra-high speed wired and wireless communication systems is also growing in an unprecedented pace. In providing ultra-high data transmission rate as well as reliable communications, error correction codes are playing an ever important role. They can ensure received data being highly reliable...
Large-scale systems with arrays of solid state disks (SSDs) have become increasingly common in many computing segments. To make such systems resilient, we can adopt erasure coding such as Reed-Solomon (RS) code as an alternative to replication because erasure coding can offer a significantly lower storage cost than replication. To understand the impact of using erasure coding on system performance...
Sparse Modeling Representative Selection (SMRS) has been recently proposed for finding the most relevant instances in datasets. This method deploys a data self-representativeness coding in order to infer a coding matrix that is regularized with a row sparsity constraint. The method assumes that the score of any sample is set to the L2 norm of the corresponding row in the coding matrix. Since the SMRS...
The 10Gbase-KR protocol is widely used to accomplish the high speed data conversion in the Ethernet area. This paper presents a design of the critical controller in the physical coding sublayer based on the 10Gbase-KR. In order to satisfy the demand of the high speed data conversion, the scrambler and descrambler are specially designed to work in a parallel mode. The post-synthesis simulation results...
Feature ranking from video-wide temporal evolution brings reliable information for complex action recognition. However, a video may contain similar features in the sequence of frames which deliver unnecessary information to the ranking function. This paper proposes a method to improve the rank-pooling strategy which captures the optimized latent structure of the video sequence data. The optimization...
Action recognition is still a challenging problem. In order to catch effective compact representation of the action sequences, the discriminative dictionaries could be learned by sparse coding. But sparse coding is needed in both the training and testing phases of the classifier framework. And it is also time consuming for the adoption of 1-norm sparsity constraint on the representation coefficients...
Depth videos affect the visual quality of virtual view greatly, while conventional encoders are not adapted to encode depth videos. To solve this problem, we propose, in the paper, a fault-tolerance based joint block-level bit allocation scheme for depth video coding. The scheme classifies depth blocks into two classes by the fault-tolerance, and constructs virtual view perceptual quality based rate-distortion...
Energy efficiency has become a primary concern in the design of multimedia digital systems, particularly when targeting mobile devices. Approximate computing is a highly promising approach to address this challenge. This paper presents an architectural exploration in a variable block size motion estimation (VBSME) architecture using imprecise Lower-Part-OR Adders (LOA). These adders were applied to...
Good user experience with interactive cloud-based multimedia applications, such as cloud gaming and cloud-based VR, requires low end-to-end latency and large amounts of downstream network bandwidth at the same time. In this paper, we present a foveated video streaming system for cloud gaming. The system adapts video stream quality by adjusting the encoding parameters on the fly to match the player's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.