The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
New and modern video encoders employ the CABAC (Context-Based Adaptive Binary Arithmetic Coding) to allow a high compression and/or improved video quality. CABAC is composed of three main blocks which are binarizer, context modeler and binary arithmetic coder block. Since the binarizer block is used in the beginning of the encoder process, the whole performance of CABAC depends a lot on the design...
A Hyperspectral (HS) image provides observational powers beyond human vision capability but represents more than 100 times data compared to a traditional image. To transmit and store the huge volume of an HS image, we argue that a fundamental shift is required from the existing "original pixel intensity"-based coding approaches using traditional image coders (e.g. JPEG) to the "residual"...
Proper feedback can leverage students to better understand their difficulties and shorten the characteristic program-submit-refactor cycle of programming exercises. The ideal feedback is the result of a human inspection and analysis considering both functional and qualitative aspects of programs produced by students. On the other hand, automated assessment systems can provide rapid, cheap and standardized...
In recent years, game-based learning has been increasing in popularity as a tool for providing students with experiential learning opportunities. Although there have been a few implementations at the graduate level, there is still the need for a greater number of studies documenting the effectiveness of game-based practices in graduate-level environments. In our study, we developed and implemented...
Map images are widely used in variety applications such as personal navigation, mobile computing, internet and academia. The usage of raster maps in many applications especially in small storage devices has negative impacts because of its relatively large size. The efficient use of compression method is essential to meet such requirements. A fast lossless compression scheme for raster map images is...
A simple but powerful language model called fixed-size ordinally-forgetting encoding (FOFE) based feedforward neural network language models (FNN-LMs) has been proposed recently. Experimental results have shown that FOFE based FNN-LMs can outperform not only the standard FNN-LMs but also the popular recurrent neural network language models (RNN-LMs). In this paper, we extend FOFE based FNN-LMs from...
This paper addresses the problem of creating simplifiers for logic formulas based on conditional term rewriting. In particular, the paper focuses on a program synthesis application where formula simplifications have been shown to have a significant impact. We show that by combining machine learning techniques with constraint-based synthesis, it is possible to synthesize a formula simplifier fully...
In scientific and technical software, floating-point arithmetic is often used to approximate arithmetic on physical quantities natively modeled as reals. Checking properties for such programs (e.g. proving unreachability of code fragments) requires accurate reasoning over floating-point arithmetic. Currently, most of the SMT-solvers addressing this problem class rely on bit-blasting. Recently, methods...
Episodic memory can store time sequential events and retrieve them anytime with specific cues. However, if the episodic memory only stores events comprised of actions and objects, execution of episodes may fail if current situation is different from the settings it learned in. As a solution, we propose Deep C-ART (Context-Adaptive Resonance Theory) which considers not only time sequential events but...
We consider spatially coupled systems governed by a set of scalar density evolution equations. Such equations track the behavior of message-passing algorithms used, for example, in coding, sparse sensing, or constraint-satisfaction problems. Assuming that the “profile” describing the average state of the algorithm exhibits a solitonic wave-like behavior after initial transient iterations, we derive...
In hardware video encoders, the throughput of the entropy coding stage can limit the support of high-quality and high-resolution videos. This paper presents an FPGA-oriented optimization method which increases the clock frequency of the probability modeling stage of the multi-symbol Context Adaptive Binary Arithmetic Coder (CABAC). The method leverages the unary code to represent probability states...
Organizations identified the opportunities of big data analytics to support the business with problem-specific insights through the exploitation of generated data. Socio-technical solutions are developed in big data projects to reach competitive advantage. Although these projects are aligned to specific business needs, common architectural challenges are not addressed in a comprehensive manner. Enterprise...
Live coding is a performance discipline that considers code as an interface. The act of writing, deleting and modifying code allows a performer to directly interact with their context through the creation of computational side effects such as sounds and visuals. A commonly used tool for many kinds of expression is randomness which enables the introduction of automated variation into performances....
Most augmented reality applications connect virtual information to anchors, i.e. physical places or objects, by using spatial overlays or proximity. However, for industrial use cases this is not always feasible because specific parts must remain fully visible in order to meet work or security requirements. In these situations virtual information must be displayed at alternative positions while connections...
Encoders based on the High Efficiency Video Coding (HEVC) standard consider an input sequence as a succession of slices grouped in Structures of Pictures (SOP). The SOP used while encoding specifies many parameters, such as the coding order of frames, or the reference frames used during inter-prediction. Reference encoders typically make use of a fixed SOP structure of a given size, which is periodically...
In this paper, we improve a computational conceptof logic-based consensus among agents that has been introducedrecently. A consensus is defined as a non-contradictoryfragment of the information conveyed by various agents suchthat this fragment does not logically conflict with any agent. In this study, we introduce an additional requirement to theconcept of consensus to avoid some paradoxical consensuses...
The advent of depth sensing technologies has eased the detection of object contours in images. For efficient image compression, coded contours can enable edge-adaptive coding techniques such as graph Fourier transform (GFT) and arbitrarily shaped sub-block motion prediction. However, acquisition noise in captured depth images means that detected contours also suffer from errors. In this paper, we...
We present a novel lossless image compression algorithm. It achieves better compression than popular lossless image formats like PNG and lossless JPEG 2000. Existing image formats have specific strengths and weaknesses: e.g. JPEG works well for photographs, PNG works well for line drawings or images with few distinct colors. For any type of image, our method performs as good or better (on average)...
The study is based on a “Lesson Study” project in China. It is aimed to reveal the development of teachers' reflection ability from two aspect, reflective level and reflection content. 120 reflection journals are collected from 40 teachers in primary and middle schools and analyzed by Content Analysis Method. The results are as follows: First, teachers' reflective levels improved significantly from...
Selective encryption conceals video content, rendering unwatchable. It gains over full encryption in terms of reduced encryption latency and reduced bandwidth. Many commercial applications of video encryption can go further because greater utility can be gained from transparent encryption, i.e. allowing prospective viewers to glimpse a reduced quality version of the content as a taster. The lightweight...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.