The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The HEVC is one of the most recent video coding standards, developed in order to face upcoming challenges, due to higher video quality and resolution. One of the HEVC components is the entropy encoder, which consists only of the Context Adaptive Binary Arithmetic Coding (CABAC) algorithm. The CABAC algorithm imposes some severe difficulties in order to achieve increasing throughput, due to the high...
A more powerful mini-type tripod head for laser goniometer was designed. Using high frequency and a large number of I/Os of the CPLD, 13 bits optical encoder dates of two channels could be received and processed, and the processed data could be delivered to the MCU in real time. Due to plenty of communication interfaces of the MCU, communication with the laser irradiator, north finder and upper computer...
This paper proposes a joint source channel-coding scheme based on a multi-encoder and inertial navigation module to solve the problem of poor wireless channel environment and high bit error rate. The encoder consists of three independent channels from the same source encoding the video imager for different H.264 encoding compression ratio. The propsed scheme aims to improve the system robustness under...
Image denoising is an extensively studied problem and can be used in many applications. In this paper, we propose an image denoising method using GMM and gradient sparse priors. GMM is a generic model and usually built based on image patches. Despite the high likelihood of GMM for image patches, the model is learned from image patches only. The relationship of neighboring patches is not learned. The...
In view of the shortcomings of the previous genetic algorithm in solving the problem of path planning of robot, this paper has improved it on the basis of the traditional genetic algorithm. The environment model is built by the grids and the fixed length serial number coding is used to encode. The random search method and the ascending order method are combined to generate the initial population....
A power- and area-efficient Low Voltage Differential Signaling (LVDS) AC coupled receiver for short links is presented. The receiver accommodates the wide LVDS common-mode range without requiring large, board-mounted AC coupling capacitors or a slow, rail-to-rail input stage. Instead, a small, on-chip coupling capacitance generates a pseudo return-to-zero (RZ) pulse that is latched into the receiver...
This project aims to improve the throughput, energy consumption and overhead of vehicular ad hoc network (VANET) by optimising the network coding (NC) using Genetic Algorithm (GA). VANET shows a promising technology as it could enhance the traffic efficiency and promote traffic safety on the road systems. The conventional store-and-forward transmission protocol used in the intermediate node(s) simply...
Cross-modal hashing is usually regarded as an effective technique for large-scale textual-visual cross retrieval, where data from different modalities are mapped into a shared Hamming space for matching. Most of the traditional textual-visual binary encoding methods only consider holistic image representations and fail to model descriptive sentences. This renders existing methods inappropriate to...
Person re-identification is best known as the problem of associating a single person that is observed from one or more disjoint cameras. The existing literature has mainly addressed such an issue, neglecting the fact that people usually move in groups, like in crowded scenarios. We believe that the additional information carried by neighboring individuals provides a relevant visual context that can...
Given a video and a description sentence with one missing word, “source sentence”, Video-Fill-In-the-Blank (VFIB) problem is to find the missing word automatically. The contextual information of the sentence, as well as visual cues from the video, are important to infer the missing word accurately. Since the source sentence is broken into two fragments: the sentence’s left fragment (before the blank)...
The deep convolutional neural network (CNN) is the state-of-the-art solution for large-scale visual recognition. Following some basic principles such as increasing network depth and constructing highway connections, researchers have manually designed a lot of fixed network architectures and verified their effectiveness.,,In this paper, we discuss the possibility of learning deep network structures...
We propose the Anchored Regression Network (ARN), a nonlinear regression network which can be seamlessly integrated into various networks or can be used stand-alone when the features have already been fixed. Our ARN is a smoothed relaxation of a piecewise linear regressor through the combination of multiple linear regressors over soft assignments to anchor points. When the anchor points are fixed...
The deep learning neural network is a recent development that has become the subject of research in the computer vision and remote sensing disciplines. Super resolution (SR) images can be obtained using deep neural network methods that achieve a higher performance than all previous traditional methods. Here, in this study, the objective is to describe existing deep learning methods for SR satellite...
In recent years, carrier based pulse-width modulation (PWM) has been extensively used for reducing input signal resolution in all-digital transmitters, and is known to provide better coding efficiency than other power encoding methods, e.g. delta-sigma modulation (DSM). Unfortunately, high levels of in-band distortion introduced by fully digitally implemented PWM, limit its usage in transceivers realized...
This work presents images encoding and decoding using the theory of conformal mapping. The conformal mapping theory made changes in the domain of problems without modifying physical characteristics between the domains. Images were utilized and are transported between domains using transformation functions like encrypt keys. Developed method showed to be able to preserve original images characteristics...
This paper presents a method to extract rendering matrix on multi-channel audio signals as an object fed to Moving Picture Expert Group Spatial Audio Object Coding (MPEG SAOC) encoder. This technique allows MPEG SAOC to transmit multiple multi-channel audio objects, instead of only a single multi-channel background object as specified in MPEG SAOC standard. Listening tests show that the proposed method...
Fault tree analysis (FTA) is a prominent reliability analysis method widely used in safety-critical industries. Computing minimal cut sets (MCSs), i.e., finding all the smallest combination of basic events that result in the top level event, plays a fundamental role in FTA. Classical methods have been proposed based on manipulation of boolean expressions of fault trees and Binary Decision Diagrams...
We focus on developer code review performance, and analyze whether the age of a subject affects the efficiency and preciseness of their code. Generally, older coders have more experience. Therefore, the age is considered to positively affect code review. However, in our past study, code understanding speed was relatively slow for older subjects, and memory is needed to understand programs. Similarly,...
The incorrect use of cryptography is a common source of critical software vulnerabilities. As developers lack knowledge in applied cryptography and support from experts is scarce, this situation is frequently addressed by adopting static code analysis tools to automatically detect cryptography misuse during coding and reviews, even if the effectiveness of such tools is far from being well understood...
Learners regularly abandon online coding tutorials when they get bored or frustrated, but there are few techniques for anticipating this abandonment to intervene. In this paper, we examine the feasibility of predicting abandonment with machine-learned classifiers. Using interaction logs from an online programming game, we extracted a collection of features that are potentially related to learner abandonment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.