The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a factor-graph-based approach to joint channel, impulse, symbol and bit estimation (JCISB) of LDPC-coded orthogonal frequency division multiplexing (OFDM) systems in impulsive noise environments. Impulsive noise arises in many modern wireless and wireline communication systems, such as cellular LTE and powerline communications, due to uncoordinated interference that is much stronger than...
Several researches investigate the performance of the conventional adaptive equalizers for the medium data rates HF waveforms (up to 8 PSK) and show that they are suitable for mitigating the HF channel. However, the performance of these types of equalizers is very bad for the high data rates HF waveforms (up to 64QAM). Most of the later researches in the high data rates HF waveforms are based on the...
Two principal transmission techniques have been developed to take advantage of Multiple-Input Multiple-Output (MIMO) systems: Spatial Multiplexing and Diversity Transmission. In this paper we are combining space-time block code (STBC) with spatial multiplexing technique over space to take advantages of both schemes. At the receiver, a minimum mean square error (MMSE) detector with interference cancelation...
In Distributed Video Coding (DVC) the encoder compresses frames at source rates that rely on the statistical dependency involving the Wyner-Ziv (WZ) and side information frames. A significant issue that individuals address in this paper provides the encoder with a mechanism to spot the origin rate to be found in encoding a WZ frame. One possible solution is to check out a feedback approach; the encoder...
Positron emission tomography (PET) is typically based on 2-D array of scintillation crystals and light sharing technique decoded by Anger-logic. The decoded result is a pseudo-position of the gamma interaction. A crystal position map generated from the flood histogram is used as a crystal look-up table (CLT) to assign each pseudo-position to a specific crystal. For the light sharing based PET detector...
In this paper, we propose an efficient channel coding scheme for anytime communications. We design this anytime code based on spatially coupled LDPC codes and investigate the performance over binary erasure channels. Through density evolution analysis, we asymptotically show the desired anytime properties of the proposed code. We also numerically predict the finite-length performance of the anytime...
Considering low estimation accuracy and small synchronization range of carrier synchronization algorithms in low signal-to-noise ratio (SNR) for short burst communication systems, a joint pilot and iterative decoding soft-output carrier synchronization algorithm is proposed, which utilizes the time-domain correlation algorithm for coarse estimation and makes hard decision directly for systematic soft-information...
Simulation-based Design Space Exploration (DSE) to evaluate all possible mappings for a given application and Multiprocessor-System-on-Chip (MPSoC) platform is computationally costly for large problems. Even using efficient exploration methodologies to evaluate the mappings cannot overcome the evaluation time bottleneck. This paper presents a novel DSE methodology that analyzes the execution trace...
Performing joint activity and data detection has recently gained attention for reducing signaling overhead in multi-user Machine-to-Machine Communication systems. In this context, Compressed Sensing has been identified as a good candidate for joint activity and data detection especially in scenarios where the activity probability is very low. This paper augments activity and data detection for frame...
In this paper, we propose a technique to synthesize a cost-efficient distributed platform consisting of multiple Application Specific Instruction Set Processors (multi-ASIPs) running applications with strict timing constraints. Multi-ASIP platform synthesis is a non-trivial task for two reasons. Firstly, we need to know the WCET of tasks in target applications to derive platforms (including synthesized...
The multimedia signal processing community has recently identified the need to design depth map compression algorithms which preserve depth discontinuities in order to improve the rendering quality of virtual views for Free Viewpoint Video (FVV) services. This paper adopts contour detection with surround suppression on the color video to approximate the foreground edges present in the depth image...
Given two arbitrary sequences of denoisers for block lengths tending to infinity we ask if it is possible to construct a third sequence of denoisers with an asymptotically vanishing (in block length) excess expected loss relative to the best expected loss of the two given denoisers for all clean channel input sequences. As in the setting of DUDE [1], which solves this problem when the given denoisers...
Multi-core platform has become a trend in hand-held embedded systems, such as smartphone and tablet. To improve the video decoding performance by using the multiple cores, one of parallel algorithms should be adopted. However, different parallel algorithm should be selected for different video standard on different platform. Therefore, an engine to estimate performance on a target platform from existing...
In this paper, we investigate to achieve low Packet Error Rate (PER) for Vehicle-to-Vehicle (V2V) communications within the IEEE 802.11p standard. We first present the best achievable PER with the assumption of perfect channel knowledge. Then we propose to approach the best achievable PER with a relaxed assumption of partial channel knowledge, i.e., knowing a few separated channels in a packet. In...
In this paper, a platform-independent energy estimation methodology is proposed to estimate the energy consumption of RVC-CAL video codec specifications. This methodology is based on the performance monitoring counters (PMCs) of embedded platforms and demonstrates its portability, simplicity and accuracy for on-line estimation. It has two off-line procedure stages, the former, which automatically...
This paper presents the main features of the TURNUS co-exploration environment, an unified design space exploration framework suitable for heterogeneous parallel systems designed using an high level dataflow representation. The main functions of this tool are illustrated through the analysis of a video decoder implemented in the RVC-CAL dataflow language.
Task-accurate performance estimation methods are widely applied in early design phases to explore different architecture options. These methods rely on accurate annotations generated by software profiling or real measurements to guarantee accurate results. However, in practice, such accurate annotations are not available in early design phases due to lack of source code and hardware platform. Instead,...
We are now developing a Japanese speaking test called SCAT, which is part of J-CAT (Japanese Computerized Adaptive Test), a free online proficiency test for Japanese language learners. In this paper, we focus on the sentence-reading-aloud task and the sentence generation task in SCAT, and propose an automatic scoring method for estimating the overall score of answer speech, which is holistically determined...
This paper proposes a new fingerprinting decoder based on the Markov Chain Monte Carlo (MCMC) method. A Gibbs sampler generates groups of users according to the posterior probability that these users could have forged the sequence extracted from the pirated content. The marginal probability that a given user pertains to the collusion is then estimated by a Monte Carlo method. The users having the...
We consider the problem of estimation and control of a linear system when some of the sensors or actuators are attacked by a malicious agent. In our previous work [1] we studied systems with no control inputs and we formulated the estimation problem as a dynamic error correction problem with sparse attack vectors. In this paper we extend our study and look at the role of inputs and control. We first...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.