The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Document is unavailable: This DOI was registered to an article that was not presented by the author(s) at this conference. As per section 8.2.1.B.13 of IEEE's "Publication Services and Products Board Operations Manual," IEEE has chosen to exclude this article from distribution. We regret any inconvenience.
Neural-machine interface (NMI) decoding errors challenge the clinical value of neural control of powered artificial legs, because these errors can dangerously disturb the user's walking balance, cause stumbles or falls, and thus threaten the user's confidence and safety in prosthesis use. Although extensive research efforts have been made to minimize the NMI decoding error rate, none of the current...
High-density electrocorticography (ECoG) arrays are promising interfaces for high-resolution neural recording from the cortical surface. Commercial options for high-density arrays are limited, and historically tradeoffs must be made between spatial coverage and electrode density. However, thin-film technology is a promising alternative for generating electrode arrays capable of large area coverage...
Modern systems for ubiquitous computing domains such as Internet-of-things (IoT), wearable computing etc. are characterized by low duty cycle, low operating and stand by power consumption requirements. The design of such systems is further constrained by increasing leakages due to technology scaling and/or increased data retention requirements. These conflicting requirements make leakage reduction...
A networked controlled system (NCS) in which the plant communicates to the controller over a channel with random delay loss is considered. The channel model is motivated by recent development of tree codes for NCS, which effectively translates an erasure channel to one with random delay. A causal transform coding scheme is presented which exploits the plant state memory for efficient communications...
High embedding capacity is desired in digital image watermarking. In this paper, we propose a novel rank-based image watermarking method to achieve high embedding capacity. We first divide the host image into blocks. Then the 2-D discrete cosine transform (DCT) and zigzag scanning is used to construct the coefficient sets with a secret key. After that, the DCT coefficient sets are modified using a...
In echo-based audio watermarking methods, poor robustness and low embedding capacity are the main problems. In this paper, we propose a novel time-spread echo method for audio watermarking, aiming to improve the robustness and the embedding capacity. To improve the robustness, we design an efficient pseudonoise (PN) sequence and a corresponding decoding function. Compared to the conventional PN sequence...
As the microelectronics technology continuously scales down, the probability of multiple cell upsets (MCUs) induced by radiation in memory devices increases. It is required a robust error correction code (ECC), that has also an area, energy-efficient silicon implementation, to protect electronic devices from MCUs. This article describes the conception, implementation, and evaluation of a new algorithm...
Watermarking, known as a typical active network traffic analysis technique, has been widely used in stepping stone detecting and anonymity tracing. Among several different watermarking schemes, the interval centroid based watermarking scheme has shown its robustness in the problems such as chaff packet, packet drops and repacketization. It can be widely used in many applications, for it embeds watermarking...
This paper addresses the problem of robust decoding of 3D video over hybrid broadcast networks, using Multiple Description Coding (MDC). Despite the fact that MDC allows decoding of any description even when the others are lost in the multipath network, the resulting coarsely decoded depth maps produce unacceptable distortion in synthesised views. This is particularly harmful in the case of intra-coded...
LDPC decoders on faulty hardware have received increasing attention over the last few years, mainly motivated by reliability issues in emerging nanotechnologies. As a main result, it was shown that LDPC decoders are naturally robust to hardware faults. LDPC encoders on faulty hardware have received less attention, and they are expected to be less robust to hardware faults. In this work, we propose...
Functional Magnetic Resonance Imaging (fMRI) methods produce high dimensional representation of cognitive processes under heavy noise due to the limitations of hardware and measurement techniques. In order to reduce the noise and extract useful information from the fMRI data, a sequence of pre-processing techniques, such as smoothing with spatial filters and z-scoring, are used. In this study, we...
In this paper, a new shaped marker is designed for augmented reality applications that has 360 degree viewing angle about its shaft axis. The main advantage of the designed marker is that it is very simple to extract marker area from images with basic image processing methods. And decoding of the marker codes is very simple with basic mathematical functions. Experimental results showed that, the designed...
The improved compression efficiency achieved by the High Efficiency Video Coding (HEVC) standard has the counter-effect of decreasing error resilience in transmission over error-prone channels. To increase the error resilience of HEVC streams, this paper proposes a checkerboard reference picture selection method in order to reduce the prediction mismatch at the decoder in case of frame losses. The...
Encoded video bitstream is subjected to quality degradation when transmitted over unreliable network. Therefore, a novel feedback-based intra refresh method for robust video coding is proposed in this paper, which takes error concealment's effect, actual loss condition, and the structure of feedback into account. In the decoder, the error correction priority is calculated to reflect the error degree...
We present an efficient decoding algorithm for constant rate quantum hyper graph-product LDPC codes which provably corrects adversarial errors of weight proportional to the code minimum distance, or equivalently to the square-root of the block length. The algorithm runs in time linear in the number of qubits, which makes its performance the strongest to date for linear-time decoding of quantum codes...
Spread spectrum (SS) modulation is one of the most commonly used methods for data hiding. However, the capacity of SS-based methods is rather limited. To improve the hiding efficiency, this paper presents a method that employs the parallel combinatory spread spectrum (PCSS), in which the hidden data can be transmitted in parallel with a combination of a few pseudo noise sequences. An informed embedding...
In this paper, a novel sEMG decoder was proposed for estimating the detailed human intentions. For the use in practical applications, an sEMG decoder needs to have a high decoding performance, a robustness to the changes of electrode positions, and a capability to extract detailed and continuous intentions behind human motions. The new decoder satisfies all these needs by using a new supervised feature...
Code phase shift keying (CPSK) is an efficient M-ary modulation that can be applied to spread spectrum (SS) based watermarking to improve the watermark payload. However, the host media acts as interference that degrades the watermark robustness, especially in high-payload applications. In this paper, an informed embedding method for CPSK-based watermarking is proposed. The host is utilized at the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.