The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A deep analysis of discrete Fourier transform - rational dither modulation (DFT-RDM), developed to cope with linear time invariant filtering, is here presented. This study has been motivated by the significant increase of the error probability suffered by DFT-RDM for non-white hosts, in spite of the low bit-error rate achieved for white hosts under the same attack filter. The theoretical analysis...
Fingerprinting codes are used to prevent dishonest users from redistributing copyrighted material. In this context, codes with the traceability (TA) property are of remarkable significance, since they provide an efficient way to identify traitors. Codes with the identifiable parent property (IPP) are also capable of identifying traitors, requiring less restrictive conditions than the TA codes at the...
In this paper, through the detailed analysis of user data in the short message to the PDU mode structure, obtained a Chinese SMS encoding and decoding rule, detailed introduced the use of AT commands to control phones send and receive text messages and realize the short message data transmission through the GSM network.
Unique words are inserted in a transmitted data stream in communications. A typical example is a synchronization word for frame detection. To make the inserted word unique, a stuffing procedure can be applied to the stream. The detection of the inserted unique word is important, and the detection of the inserted word for stuffing as well. The detection is required to be robust against the transmission...
Most previous studies formalize Chinese named entity recognition (NER) as a chunking task with either characters or lexicon words as the basic tokens for chunking. However, it is difficult under this formulation to explore lexical information for NER. Furthermore, traditional NER chunking systems usually employ an exhaustive strategy for entity candidate generation, obviously resulting in efficiency...
We consider the problem of data harvesting in wireless sensor networks. A designated collector node seeks to compute a function of the sensor measurements. For a directed graph G = (V ,??) on the sensor nodes, we wish to determine the optimal encoders on each edge which achieve zero-error block computation of the function at the collector node. Our goal is to characterize the rate region in R|??|...
In this paper, a novel non-blind audio watermarking scheme is proposed. The method makes use of both channels of stereo music signals. The signals are divided into segments and watermarks are embedded by hiding echoes into these segments. The embedded echoes represent the watermark bits. For single channel watermarking, echoes with two different delays are used. One is used to encode watermark bit...
Recently, a novel decoding procedure which is called the syndrome-weight determination for the Golay code, or the (23, 12, 7) quadratic residue code, was proposed by Chang et al. This method is not only very simple in principle but also suitable for the parallel hardware design. Furthermore, to develop a universal decoding algorithm for arbitrary binary quadratic residue codes is very important. In...
In the present work, an effort has been made to propose and implement a new steganographic technique for images by modifying existing algorithms. This technique uses LSB steganography as the basis and randomly disperses the secret message over the entire image to ensure that the secret message cannot be obtained easily from the image. Detailed visual and statistical analysis of the algorithm reveals...
This paper presents two error concealment (EC) techniques for embedded wavelet codec based on set portioning in hierarchal trees (SPIHT), one for the lowest frequency wavelet coefficients (the low-frequency EC) and the other for high frequency coefficients (the high-frequency EC). The low frequency EC algorithm uses data hiding technique. The lowest frequency coefficients, which are taken as the hidden...
We apply Hidden Conditional Random Fields (HCRFs) to the task of TIMIT phone recognition. HCRFs are discriminatively trained sequence models that augment conditional random fields with hidden states that are capable of representing subphones and mixture components. We extend HCRFs, which had previously only been applied to phone classification with known boundaries, to recognize continuous phone sequences...
State-of-the art statistical machine translation depends heavily on the availability of domain-specific bilingual parallel text. However, acquiring large amounts of bilingual parallel text is costly and, depending on the language pair, sometimes impossible. We propose an alternative to parallel text as machine translation (MT) training data; audio recordings of parallel speech (pSp) as it occurs in...
In this paper, we survey some central issues in the historical, current, and future landscape of statistical machine translation (SMT) research, taking as a starting point an extended three-dimensional MT model space. We posit a socio-geographical conceptual disparity hypothesis, that aims to explain why language pairs like Chinese-English have presented MT with so much more difficulty than others...
Due to the rapid decrease of technology feature size speed related faults, such as Address Decoder Delay Faults (ADDFs), are becoming very important. In addition, increased leakage currents demand for improved tests for Bit Line Imbalance Faults (BLIFs)(caused by memory cell pass transistor leakage). This paper contributes to new and improved algorithms for detecting these faults. First it provides...
Recently, selective encoding of scan slices is proposed to compress test data. This encoding technique, unlike many other compression techniques encoding all the bits, only encodes the target-symbol by specifying single bit index and copying group data. In this paper, we propose an extended selective encoding which presents two new techniques: flexible grouping strategy, X bits exploitation and filling...
Comparator is the key module in LDPC decoder that consumes most of the power and area. In this paper, a new comparator based on pass transistors and dynamic logic is proposed to decrease the power and the area. The comparator is implemented with full custom design at SMIC 0.18 1P6M technology. The simulation result of layout shows that the power drops by 11.4% and the area is reduced by 30% compared...
In this paper, the authors propose a novel method to measure the perceived picture quality of H.264 coded video based on hybrid no reference framework. The latter term means that the proposed model uses only receiver-side information for objective video quality assessment, but analyzes both the compressed bitstream and baseband signals of the decoded picture to improve the estimation accuracy of the...
This paper presents a run-length-based compression method considering dimensions of pattern information. Information such as pattern length and number of pattern runs is encoded to denote the compression status. The decoder is simple and requires very low hardware overhead. Significant improvements are experimentally demonstrated on larger ISCAS'89 benchmarks.
We derive an achievable region for the 2-receiver broadcast channel with private messages only by incorporating ideas of message splitting as in the Han-Kobayashi scheme for the interference channel. The achievable region we obtain is equivalent to the best-known achievable region under this scenario, obtained by Marton. The scheme presented here is motivated by the following question: Why does a...
We propose a novel image watermarking scheme capable of providing unequal protection levels to different regions in the image. In the scheme, we firstly divide the image into high protection region, low protection region and non-protection region, and then use unequal error protection (UEP) code to encode the bits generated by high and low protection regions simultaneously and form the watermark bits...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.