The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Since the number of surveillance cameras in public areas increases very fast, massive crowd videos are captured and shared, which brings an urgent need to retrieve these videos efficiently and effectively. However, most recent research on crowd video mainly focused on crowd behavior understanding and abnormal detection. In this study, as the very first attempt, we propose a crowd video retrieval method...
This paper presents a no reference method for efficient detection of dropped video frames in live video streaming. Temporal information of video frames is calculated and is used to detect dropped video frames. The videos are analyzed in binary form instead of true color format RGB in order to reduce the computational time. The proposed method uses two separate thresholds for videos containing high...
LDPC was first proposed in 1962, after that considerable achievements have been made both in decoding algorithms and also in the structure of the decoder. In terms of decoding algorithm, from belief propagation (BP) to min-sum (MS), then normalized MS (NMS) and finally to a more performance oriented variable MS (VMS) algorithm. In terms of the decoder structure, there are mainly two, flooding and...
Mixed-excitation linear prediction (MELP) is a United States department of defense speech coding standard used mainly in military applications and satellite communications, secure voice, and secure radio devices. MELP vocoder could provide an acceptable voice quality over prone erroneous channels in various environments by exploiting redundancy statistics of voice data. This paper explains performance...
In recent years, iterative receiver has been widely considered since it is able to achieve high data rates and reliable communications for coded MIMO-OFDM systems. However, such a receiver is extremely challenging in practical implementation. In this paper, we present an efficient fixed-point arithmetic of iterative receiver based on low-complexity K-Best decoder in order to reduce the hardware costs...
Physical-layer network coding (PNC) can potentially boost the throughput of a two-way relay network by 100% compared with conventional packet forwarding schemes. However, the complexity of PNC channel decoders can be considerably higher than the complexity of channel decoders for point-to-point communication systems. Although many PNC channel decoders proposed to date have good decoding performance,...
We commenced two memory measure, and power productive algorithmic transmutation for the Viterbi Algorithm (VA) and genetic algorithm(GA). The first performs in-place ciphering marking down memory vital and bit transitions on the data address bus, although the second elucidate the traceback standard of expressive VA, Today the technology changes indubitable fast as it evoked from old stone (Palaeolithic)...
In this work, Automatic-Repeat-Request (ARQ) and Maximal Ratio Combination (MRC), have been jointly exploited to enhance the confidentiality of wireless services requested by a legitimate user (Bob) against an eavesdropper (Eve). The obtained security performance is analyzed using Packet Error Rate (PER), where the exact PER gap between Bob and Eve is determined. PER is proposed as a new practical...
Performance monitoring of datacenters provides vital information for dynamic resource provisioning, anomaly detection, capacity planning, and metering decisions. Online monitoring, however, incurs a variety of costs: the very act of monitoring a system interferes with its performance, consuming network bandwidth and disk space. With the goal of reducing these costs, we develop and validate a strategy...
We investigate the fundamental information theoretic limits of cache-aided wireless networks, where edge nodes (or transmitters) are endowed with caches that can store popular content such as multimedia files. This architecture aims to localize popular multimedia content by proactively pushing it closer to the edge of the wireless network, thereby alleviating backhaul load. An information theoretic...
In this paper, a novel attempt is made to design a reconfigurable coder system which can be reconfigured on-the-fly to work either as an encoder, or decoder, or both encoder and decoder depending on the user requirements. In order to build the proposed reconfigurable system, Convolutional encoder, Viterbi decoder, Golay encoder and Golay decoder are employed in different combinations for the proposed...
Due to famous mistake revising probability turbo coding is significantly used as a piece of advanced correspondence systems. In this paper different arrangement of turbo decoder with decreased element constrain dissemination is shown. In this changed decoder, standard cell based design using pipeline logarithm-most extreme a back (Log-MAP) calculation with clock gating and variable number of cycle...
We propose a coding scheme based on the combination of interleaving with systematic channel codes for secrecy. The basic idea consists of generating a random interleaving key that is used to shuffle/interleave information at the source. The message and the interleaving key are then both encoded with a systematic code and the part related to the interleaving key is removed/punctured before being sent...
This paper talks about designing an efficient Viterbi coder which can be used for Text to Speech synthesis (TTS). Today numerous applications uses Text to Speech synthesis (TTS) and Viterbi coder plays a key role in producing the synthesized output. Viterbi algorithm includes numerous iterations to produce the output and hence power utilization is more. We propose a technique which uses a memory access...
A fiber-optic communication system employing a multistage bit-wise coded modulation scheme is considered as it enables the efficient utilization of higher-order modulation formats in combination with binary forward error correction (FEC) coding. Since modern FEC schemes employ soft-decision decoding, soft information on coded bits is required. In this paper, the decoding metric for the multistage...
Language barriers in day to day communication are common in all countries. In Sri Lanka we have a rising need for translation for Sinhala and Tamil to reduce language barriers and the statistical machine translation approach is more suitable for the concerned languages. Statistical machine translation method is one of the most promising and efficient method to perform machine translation for Sri Lankan...
Due to its advantage of performance over other algorithms, successive cancellation list (SCL) decoding has become one of the most favorable algorithms for polar codes. However, it still suffers a lot from the linear increasing complexity with list size l. In this paper, an adaptive SCL polar decoder based relaxed sorting (RS) approach is proposed, which successfully reduces the sorting complexity...
To improve the performance of kinship verification, we propose a novel deep kinship verification (DKV) model by integrating excellent deep learning architecture into metric learning. Unlike most existing shallow models based on metric learning for kinship verification, we employ a deep learning model followed by a metric learning formulation to select nonlinear features, which can find the appropriate...
Cognitive Radio has a potential to improve spectrum efficiency for future wireless communication systems. However, the performance of such systems can be degraded by various factors e.g. imperfect sensing, non-accurate result reporting of the sensed spectrum either due to error-prone reporting channel (RC) or malicious user attack. Moreover the phenomena of reporting only from those cognitive users...
This research is our first step on the purpose of developing low-complex Viterbi decoder for IoT applications. We evaluate how the values of Viterbi decoder's parameters such as trace back length (L), input data bit-width (D), and LLR truncated value (E), affects to BER and PER of a communication system. The IEEE 802.11ah simulator is used with AWGN channel and BPSK modulation. Our simulation results...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.