Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code

Size: px
Start display at page:

Download "Further Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code"

Transcription

1 Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited , Road No-12 Banjara His, Hyderabad, INDIA Phone: e-mai: ABSTRACT Channe coding adds redundant bits to the origina information bits in order to detect and correct possibe errors occurred during transmission. In GSM (Goba System for Mobie Communications), we use both bock coding and convoutiona coding for error contro. One of the channe coding schemes is CS-1 [1], which empoys shortened cycic Fire code for burst error correction. In this paper, we propose an efficient way of decoding shortened binary cycic Fire code, which is an improved version of our earier method [4]. This method is especiay suitabe for DSP impementation. The compexity of the proposed decoding scheme is much ower than that of conventiona methods [2,6] and ower than the method given in [4]. The proposed scheme is a straightforward method in the sense that it requires no knowedge of inverse cycic codes, which is a requirement for the patented method [3]. The proposed decoding scheme is appicabe to any binary shortened cycic code as we. 1. INTRODUCTION In the designated coding scheme CS-1 for GSM [1], the input to the bock encoder consists of a burst of 184 information bits {d (0), d (1),...,d (183)} and the encoder adds forty extra parity bits. These bits are added according to the binary shortened cycic Fire code. The decoding of the binary shortened cycic Fire code using conventiona methods is very compex and in the software impementation, it invoves three miion iterations for syndrome computation. An efficient agorithm for decoding binary shortened cycic Fire code was patented recenty [3]. In an earier paper [4], we presented an efficient method of decoding binary shortened cycic Fire code. Here, we describe further improvements in computationa compexity for the decoding of binary shortened cycic fire code. The method proposed here is of much ower compexity compared to that of conventiona methods [2,6], and is ess compex than the method given in [4]. This method is suitabe for DSP impementation. As the present and the next generation software defined radios (SDR) use DSP technoogy to increase system robustness and functionaity, this method is a ess compex soution for SDR. Note, however, that our scheme is straightforward method and entirey different from that of [3], as it requires no knowedge of inverse cycic codes. First we introduce the background materia briefy and present our scheme. Then we concentrate on impementation aspects with respect to CS-1 [1] and provide test procedure and resuts. 2. BACKGROUND 2.1 Cycic Codes An (n, k) inear code over a fied F is said to be a cycic code if, for every codeword C = (c 0, c 1,..., c n-1 ), the right cycic shift of C, viz. C 1 = (c n-1,c 0,c 1,..., c n-2 ), is aso a codeword. To deveop agebraic properties of cycic codes, we treat components of a code vector C, as coefficients of a poynomia. C(x) = c 0 + c 1 * x c n-1 * x n-1 (1) The encoding and decoding operations of a cycic code can be accompished by using inear shift registers with feed back connections. 2.2 Cycic Fire Code Fire codes are a type of cycic codes constructed systematicay for correcting burst errors. Let g 1 (x) be an irreducibe poynomia of degree m over GF(2). Let ρ be the smaest integer such that g 1 (x) divides x ρ +1. Let b be positive integer (b m) and 2b-1 is not divisibe by ρ. Foowing poynomia generates a b-burst errorcorrecting FIRE code with the number of parity check digits equa to m+2b-1. g(x) = (x 2b-1 + 1) * g 1 (x) (2) The ength n of this code is the east common mutipe of 2b-1 and ρ i.e., n = LCM (2b-1,ρ) (3)

2 2.3 Shortened Cycic Code Whie seecting a code, if a code of suitabe natura ength or suitabe number of information digits cannot be found, it is desirabe to shorten a code to meet the requirements. There are various methods to shorten a cycic code. One of such methods generay used is: given (n,k) cycic code C, consider the set of code vectors for which eading east significant (LSB) information digits are zero. There are 2 k- such code vectors and they form a inear sub code of C. If the zero information digits are deeted from each of these code vectors, we obtain a set of 2 k- vectors of ength n-. These 2 k- shortened vectors form an (n-,k- ) inear code. This code is caed shortened cycic code. The shortened cycic code is not cycic in the strict sense and properties of cycic codes cannot be appied directy. The minimum number of errors that a shortened cycic code can correct is same as that of the origina cycic code. The encoding of shortened cycic codes can be accompished by shift registers circuit with feed back connections, as usuay empoyed by the origina cycic encoding. This is so because the deeted eading east significant zero information digits do not affect the parity-check bits computation. However, the decoding process may become invoved whie computing the syndrome. The process woud invove shifting the syndrome cycicay after the entire received vector has been shifted into the shift register. For the bock code used in CS-1 [1], the number of shift operations wi be around three miion to get the proper syndrome. These extra shifts of the syndrome register cause undesirabe decoding deay and redundant computations. One method of avoiding these extra shifts is given in [4]. In the next section, we present a better method when impementing the syndrome computation mechanism on a DSP. 3. PROPOSED DECODING SCHEME The decoding process of binary shortened cycic Fire code invoves 1) Syndrome computation and 2) Error trapping and correction. In the derivation of decoding method we refer n as the tota number of bits in the received shortened code and k as the corresponding number of information bits in the received code. The order of the origina cycic code from which the shortened cycic code is derived is N-1, where N = n +. The coefficients g 0, g n-k the first and the ast coefficients of generator poynomia g(x), are assumed to be 1, as these are aways equa to one for any cycic code. 3.1 Syndrome computation The syndrome computation of the shortened cycic codes can be achieved using inear feedback shift registers (LFSR). But, after the entire received poynomia has been shifted into the LFSR, the syndrome register must be shifted right cycicay times to get proper syndrome, where is number of eading zeros of cycic code. For arge as in the case of bock decoding of GSM Packet Data Traffic Channe bock type-1 [1], these extra shifts of the syndrome register cause undesirabe deay in decoding and woud need redundant computations. This can be avoided by modifying the decoding process by the method given in [4]. However, we need simutaneous mutipication and division operations to get the syndrome. Though, simutaneous mutipication and division can be impemented very easiy using the circuit given in [2], whie impementing the code on a DSP this takes more cyces than poynomia division operation. Therefore a different method is considered here to arrive at ess compex soution than the method given in [4] for this situation. Let r(x) be the received poynomia of a shortened cycic code, and R(x) = x * r(x) be the unshortened version of this code. We can write R(x) = a 1 (x)*g(x) + S(x) (4) where S(x) is the syndrome obtained when R(x) is divided by g(x) and a 1 (x) is quotient. Let p(x) be the remainder resuting from dividing x by g(x) and a 2 (x) is quotient, then p(x) = x + a 2 (x)*g(x) (5) The actua syndrome of cycic code can aso be computed by using syndrome of shortened cycic code as described beow. Let s(x) be the syndrome of a received shortened cycic code. Then, r(x) = a 3 (x)*g(x) + s(x) (6) where a 3 (x) is the quotient. However note, here r(x) is not cycic and s(x) is not proper syndrome. The proper syndrome of the cycic code S(x) is obtained by x * r(x) = a 4 (x) * g(x) + S(x) (7) Substituting Equation (6) in (7) to get x * [a 3 (x)*g(x) + s(x)] = a 4 (x)*g(x) + S(x) (8) Simpifying Equation (8), we obtain x * s(x) = a 5 (x)*g(x) + S(x) (9) where a 5 (x) = x * a 3 (x) + a 4 (x). Note from (9) that S(x) is the remainder obtained by dividing x * s(x) by g(x). Mutipying both sides of Equation (5) with s(x) and using (9), we get p(x) * s(x) = a 6 (x) * g(x) + S(x) (10) where a 6 (x) = a 2 (x) * s(x) + a 5 (x) Equation (10) suggests that we can obtain the actua syndrome of cycic code S(x) by mutipying the syndrome of shortened cycic code with p(x) and dividing the product with g(x). The syndrome of the shortened code is computed by dividing the received poynomia with generator poynomia g(x). Since g(x) has ony 6 non zero coefficients for GSM CS-1 [1], this division can be impemented with very ess compexity. The syndrome of the

3 shortened code so computed, is mutipied with p(x) and dividing the product with g(x) gives the actua syndrome of the cycic Fire code. Here simutaneous mutipication and division is performed on the syndrome poynomia of shortened code, which is of order n-k-1. So this method of syndrome computation is ceary a ess compex soution than the method given in [4], for which syndrome is computed by p(x)*r(x) = a(x)*g(x) + S(x) (11) Once syndrome computation is over, the process of error trapping and correction for shortened cycic code described in [4] takes pace to compete the decoding process. This process is briefy described in the next sub section. 3.2 Error trapping and Correction Let the received poynomia of a shortened cycic code r(x) be represented as r(x) = c 0 + c 1 * x +..., + c n-1 * x n-1 (12) and unshortened version of this code R(x) = represented as x * r(x) be R(x) = C 0 + C 1 * x +..., + C N-1 * x N-1 (13) and et R 1 (x) be the right cycic shift of R(x). Then the reationship between R(x) and R 1 (x) is given by R 1 (x) = x * R(x) + C N-1 * (x N +1) (14) Let the actua syndrome of shortened cycic code be represented as S(x) = s 0 + s 1 * x + s 2 * x , + s n-k-1 * x n-k-1 (15) Let S 1 (x) be the syndrome of R 1 (x) and g(x) = 1 + g 1 * x +..., + g n-k-1 * x n-k-1 + x n-k be the generator poynomia then R(x) = a(x) * g(x) + S(x) (16) and S 1 (x) = R 1 (x) mod g(x) (17) where mod is the moduo operator. Substituting Equation (14) in (17) we get, S 1 (x) = [x * R(x) + C N-1 * (x N +1)] mod g(x) (18) For cycic codes we can write (x N +1) = g(x) * h(x) where h(x) is the parity-check poynomia. Then Equation (18) can be written as, S 1 (x) = x * R(x) mod g(x) (19) Substituting Equation (16) in (19) we get, S 1 (x) = x * S(x) mod g(x) (20) The Equation (20) suggests that the syndrome S 1 (x) of R 1 (x) is the remainder obtained by dividing x * S(x) with g(x) where S(x) is the syndrome of R(x). Now x * S(x) mod g(x) can be computed by right shifting the syndrome register once cycicay with S(x) as its initia contents using the circuit of Figure 1, shown in [4]. The proof for this is provided in [4]. This property is used in the error trapping and correction mechanism. Let r(x) be the received poynomia of a shortened cycic code. Further, et R(x) = x * r(x) is the received poynomias of unshortened version of this code. Let g(x) be the generator poynomia and E(x) be the error poynomia of the unshortened cycic code, then the actua syndrome of cycic code is, S(x) = R(x) mod g(x) = E(x) mod g(x) (21) Now suppose errors are confined to b high order positions x n-b, x n-b+1,..., x n-1 of r(x). These bits are identica to x N-b, x N-b+1,..., x N-1 bits of R(x). Then if R(x) is cycicay shifted right b times, errors are confined to ow order positions x 0, x 1,x 2,..., x b-1 of R b (x). The corresponding error pattern is then E b (x) =e N-b + e N-b+1 *x + e N-b+2 *x ,+ e N-1 *x b-1 (22) As degree of E b (x) is ess than that of g(x), from (21) S b (x) = E b (x) mod g(x) = E b (x) (23) Therefore errors in the burst can be corrected by adding b ow order syndrome register bits with x N-b, x N-b+1,..., x N-2, x N-1 bits of R(x). These bits are same as x n-b, x n-b+1,..., x n-2, x n-1 bits of r(x). So the burst error in the received poynomia can be corrected by adding b ow order syndrome register bits with these bits of r(x) over moduo 2. Suppose errors are not confined to b high order positions of r(x) or R(x), but they are confined to b consecutive positions x i, x i+1, x i+2,..., x i+b-1 of r(x). These bits are same as x +i, x +i+1, x +i+2,..., x +i+b-1 bits of R(x). After (n-i) right cycic shifts of R(x), errors are confined to b consecutive ow order positions of R n-i (x). And from Equation (21), S n-i (x) corresponds to E n-i (x). Therefore errors can be corrected by adding b ow order syndrome register bits to x +i, x +i+1, x +i+2,..., x +i+b-1 of R(x) which are same as x i, x i+1, x i+2,..., x i+b-1 bits of r(x). So by adding b eft side bits of LFSR to these bits of r(x), singe burst error can be corrected. Thus, the process of Error trapping and correction consists of cycicay shifting the syndrome register for n times and each time checking the ast n-k-b stages of syndrome register for zero bits. Where n is the number of encoded bits of shortened cycic code. If the ast n-k-b bits of syndrome register are zero for i th shift (1 i n), the process of shifting is stopped and burst error is corrected by adding ow order b bits of syndrome register to appropriate bits of r(x). This process takes n cock cyces. One may note here that in [3], error trapping is based on checking LSB (Least Significant Bit) of syndrome register, shifting the

4 syndrome towards LSB, and adding the pre computed and stored version of x n-1 mod g(x) to it if the LSB is 1. Our method of error trapping is a straightforward method and an extension to the error trapping of origina cycic codes to efficienty decode shortened cycic codes. The decoding procedure described above can be appied to burst error correction in the bock decoding for CS-1, which empoys binary shortened cycic Fire code. This is given in the next section. 4. BLOCK DECODER FOR CS Decoder design In this section, we concentrate on the impementation of binary shortened cycic Fire decoding circuit for coding scheme-1 of GSM packet data traffic channe [1]. The encoding rue for this coding scheme is given as foows. The bock of 184 information bits is protected by 40 extra bits used for error correction and detection. These bits are added to the 184 bits according to a shortened binary cycic code (FIRE code) using the generator poynomia: g(x) = (x ) * (x 17 + x 3 + 1) (24) The encoding of the cycic code is performed in a systematic form, which means that, in GF(2), the poynomia: v(x) = d(0)x d(1)x d(183)x 40 + p(0) x 39 +p(1)x ,+p(38)x + p(39) (25) Where {p(0),p(1),...,p(39)} are the parity bits, when divided by g(x) yieds a remainder equa to: s(x) = 1 + x + x x 39 (26) This code is capabe of correcting singe 12-bit burst error. The period ρ of (x 17 + x 3 + 1) is The order n of unshortened version of this code is The number of eading zero bits of this code is The bit configuration of the code word for this binary shortened cycic Fire code is as shown in Figure 2 of [4]. The bock of bits indicate eading east significant zero bits, and bocks of 184 and 40 indicate number of information and parity bits respectivey. At the encoding side the 40 parity check bits can be computed by pushing 184 information bits from right side in to inear shift registers with feed back connection with circuit shown in Figure 1 of [4]. After 184 information bits are cocked into the LFSR, we get the 40 parity bits in LFSR. This is so because the deeted eading zero information digits do not affect the paritycheck bits computation. However, for decoding this code word, if we want to use the same circuit used for encoding, after pushing 184 information bits and 40 parity bits into the syndrome register, we need to shift the syndrome register cycicay right times to get proper syndrome. This can be avoided by using any one of the two methods, either the method given in [4] or the method described in this paper for the syndrome computation. However, the method described here is efficient than the method given in [4] whie impementing on a DSP. The predetermined poynomia, p(x) is given in [4]. Then using the Equation (10), we can find the proper syndrome of the binary shortened cycic Fire code, S(x). The error trapping and correcting process invoves, shifting syndrome register (with S(x) as initia contents) cycicay right 224 times and each time checking for a zeros for the ast 28 stages of syndrome register. If ast 28 stages of syndrome register (LFSR) turn out to be a zeros for i th shift (1 i 224), then burst error is trapped into eft 12 stages of shift register. Which aso indicates that x 224-i, x 224-i+1,..., x 224-i+11 of r(x) might be corrupted bits. Then the process of shifting the syndrome register is stopped. And 12-burst error can be corrected by adding first 12 bits of syndrome register to x 224-i, x 224-i+1,..., x 224-i+11 bits of the received code over GF(2). For the occurrence of burst error of ength ess than 12, ony those number of bits need to be corrected. If a right 28 stages of syndrome register are never zero for 224 shifts, then we can say uncorrectabe burst errors occurred in the received code word. This process of the error trapping and correction takes 224 cock cyces. 4.2 Test procedure and resuts The decoder is tested according to the test procedure given in [4] and is found that the decoder described in this paper is abe to correct a possibe singe burst errors for burst ength ess than or equa to 12 in a cases. 5. CONCLUSIONS In this paper, an efficient method of decoding binary shortened cycic Fire code is deveoped. Its impementation with inear shift registers with feed back connections is discussed. Present decoding method impementation requires fewer processing operations than conventiona methods. The decoding method is capabe of correcting a possibe error patterns with singe burst error. The impementation detais for the bock decoder of CS-1 [1] are described. This method is a better option than that of [4], whie impementing the binary shortened cycic Fire decoder on a DSP. Our method of decoding is a straightforward method and entirey different from that of [3] in the sense that it requires no knowedge of inverse cycic codes, which is a requirement for the patented method. The present method of decoding is appicabe to any shortened cycic code as we. 6. ACKNOWLEDGMENT The author wishes to thank S. Rama Rao, Vice President and Genera Manager (India operations), of Heosoft for the support and encouragement extended during the course of work. The author aso wishes to thank Dr. Y. Yoganandam, Technica Director of Heosoft, and Dr. V. Umapathi Reddy, Chief Technica Officer of Heosoft for their vauabe suggestions and encouragement.

5 7. REFERENCES [1] ETSI EN v8.5.1 ( ) - Digita ceuar teecommunications system (Phase 2+); Channe coding (GSM version Reease 1999) [2] Shu Lin and Danie J. Costeo, Jr, Error Contro Coding: Fundamentas and Appications. Prentice-Ha, Inc. Pubishing Company, 1983 (Chapters 4,9) [3] Ramesh, et a, Shortened Fire code Error Trapping Decoding method and apparatus- United States Patent 5,936,978. Cycic Fire Code, Internationa Conference on Persona Wireess Communications (IEEE-ICPWC), December 2002, P [5] Vijay K. Bhargava, Forward Error Correction Schemes For Digita Communications, IEEE Communications Magazine, January [6] John G. Proakis, Digita Communications, McGRAW-HILL INTERNATIONAL EDITION, 2001 (Chapter.8) [4] Ch. Nanda Kishore, Efficient Decoding of Shortened Binary

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm

Outline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae

More information

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.

A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802. A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,

More information

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.

Lecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion. Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence

More information

Service Scheduling for General Packet Radio Service Classes

Service Scheduling for General Packet Radio Service Classes Service Scheduing for Genera Packet Radio Service Casses Qixiang Pang, Amir Bigoo, Victor C. M. Leung, Chris Schoefied Department of Eectrica and Computer Engineering, University of British Coumbia, Vancouver,

More information

Mobile App Recommendation: Maximize the Total App Downloads

Mobile App Recommendation: Maximize the Total App Downloads Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management

More information

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges

Special Edition Using Microsoft Excel Selecting and Naming Cells and Ranges Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and

More information

A Memory Grouping Method for Sharing Memory BIST Logic

A Memory Grouping Method for Sharing Memory BIST Logic A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5

More information

Chapter Multidimensional Direct Search Method

Chapter Multidimensional Direct Search Method Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate

More information

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University

Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory

A Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory 0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory

More information

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds

A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed

More information

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing

An Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses

More information

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System

Self-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong

More information

Alpha labelings of straight simple polyominal caterpillars

Alpha labelings of straight simple polyominal caterpillars Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.

More information

Topology-aware Key Management Schemes for Wireless Multicast

Topology-aware Key Management Schemes for Wireless Multicast Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu

More information

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem

Extended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard

More information

A Fast Block Matching Algorithm Based on the Winner-Update Strategy

A Fast Block Matching Algorithm Based on the Winner-Update Strategy In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping

More information

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters

Crossing Minimization Problems of Drawing Bipartite Graphs in Two Clusters Crossing Minimiation Probems o Drawing Bipartite Graphs in Two Custers Lanbo Zheng, Le Song, and Peter Eades Nationa ICT Austraia, and Schoo o Inormation Technoogies, University o Sydney,Austraia Emai:

More information

Priority Queueing for Packets with Two Characteristics

Priority Queueing for Packets with Two Characteristics 1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.

More information

On-Chip CNN Accelerator for Image Super-Resolution

On-Chip CNN Accelerator for Image Super-Resolution On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement

More information

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks

A Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess

More information

Space-Time Trade-offs.

Space-Time Trade-offs. Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe

More information

Language Identification for Texts Written in Transliteration

Language Identification for Texts Written in Transliteration Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy

More information

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming

Solving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction

More information

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks

Providing Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department

More information

Hiding secrete data in compressed images using histogram analysis

Hiding secrete data in compressed images using histogram analysis University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University

More information

EE 122 Final Exam - Solution Date: December 14, 2002

EE 122 Final Exam - Solution Date: December 14, 2002 Name: SID: ee ogin: Day/Time of section you atten: EE Fina Exam - Soution Date: December 4, 00 Probem Points /0 /0 3 /0 4 /0 5 /0 6 /0 7 /0 8 /0 9 /0 0 /0 Tota /00 . Question (0 pt) (a) (5 pt) Expain briefy

More information

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!

Proceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER! [1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand

More information

Neural Network Enhancement of the Los Alamos Force Deployment Estimator

Neural Network Enhancement of the Los Alamos Force Deployment Estimator Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the

More information

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014

5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 2014 5940 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 11, NOVEMBER 014 Topoogy-Transparent Scheduing in Mobie Ad Hoc Networks With Mutipe Packet Reception Capabiity Yiming Liu, Member, IEEE,

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

Image Segmentation Using Semi-Supervised k-means

Image Segmentation Using Semi-Supervised k-means I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging

More information

Response Surface Model Updating for Nonlinear Structures

Response Surface Model Updating for Nonlinear Structures Response Surface Mode Updating for Noninear Structures Gonaz Shahidi a, Shamim Pakzad b a PhD Student, Department of Civi and Environmenta Engineering, Lehigh University, ATLSS Engineering Research Center,

More information

Resource Optimization to Provision a Virtual Private Network Using the Hose Model

Resource Optimization to Provision a Virtual Private Network Using the Hose Model Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,

More information

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints *

Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG

More information

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing

Real-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,

More information

As Michi Henning and Steve Vinoski showed 1, calling a remote

As Michi Henning and Steve Vinoski showed 1, calling a remote Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware

More information

Fastest-Path Computation

Fastest-Path Computation Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods

More information

INPUT TO (TM/TC) CHANNEL CODING GREEN BOOK(s) AS DISCUSSED AT THE MEETING IN CRYSTAL CITY, VA (USA) on 12 March Frame Error Control Field

INPUT TO (TM/TC) CHANNEL CODING GREEN BOOK(s) AS DISCUSSED AT THE MEETING IN CRYSTAL CITY, VA (USA) on 12 March Frame Error Control Field INUT TO (TM/TC) CHANNEL CODING GREEN BOOK(s) AS DISCUSSED AT THE MEETING IN CRYSTAL CITY, VA (USA) on 12 March 28 --------- Frame Error Control Field [Reply to comment GC2] - Section 8.4.2 of CCSDS 13.1-G-1

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Solutions to the Final Exam

Solutions to the Final Exam CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a

More information

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162

University of Illinois at Urbana-Champaign, Urbana, IL 61801, /11/$ IEEE 162 oward Efficient Spatia Variation Decomposition via Sparse Regression Wangyang Zhang, Karthik Baakrishnan, Xin Li, Duane Boning and Rob Rutenbar 3 Carnegie Meon University, Pittsburgh, PA 53, wangyan@ece.cmu.edu,

More information

Load Balancing by MPLS in Differentiated Services Networks

Load Balancing by MPLS in Differentiated Services Networks Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,

More information

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc.

An Indian Journal FULL PAPER ABSTRACT KEYWORDS. Trade Science Inc. [Type text] [Type text] [Type text] ISSN : 0974-7435 Voume 10 Issue 16 BioTechnoogy 014 An Indian Journa FULL PAPER BTAIJ, 10(16), 014 [999-9307] Study on prediction of type- fuzzy ogic power system based

More information

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS)

FIRST BEZIER POINT (SS) R LE LE. φ LE FIRST BEZIER POINT (PS) Singe- and Muti-Objective Airfoi Design Using Genetic Agorithms and Articia Inteigence A.P. Giotis K.C. Giannakogou y Nationa Technica University of Athens, Greece Abstract Transonic airfoi design probems

More information

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line

Application of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby

More information

Tutorial 3 Concepts for A1

Tutorial 3 Concepts for A1 CPSC 231 Introduction to Computer Science for Computer Science Majors I Tutoria 3 Concepts for A1 DANNY FISHER dgfisher@ucagary.ca September 23, 2014 Agenda script command more detais Submitting using

More information

CS321: Computer Networks Error Detection and Correction

CS321: Computer Networks Error Detection and Correction CS321: Computer Networks Error Detection and Correction Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Error Detection and Correction Objective: System must

More information

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge

l Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node

More information

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method

Real-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method 297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,

More information

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform

Digital Image Watermarking Algorithm Based on Fast Curvelet Transform J. Software Engineering & Appications, 010, 3, 939-943 doi:10.436/jsea.010.310111 Pubished Onine October 010 (http://www.scirp.org/journa/jsea) 939 igita Image Watermarking Agorithm Based on Fast Curveet

More information

Quality of Service Evaluations of Multicast Streaming Protocols *

Quality of Service Evaluations of Multicast Streaming Protocols * Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu

More information

An Introduction to Design Patterns

An Introduction to Design Patterns An Introduction to Design Patterns 1 Definitions A pattern is a recurring soution to a standard probem, in a context. Christopher Aexander, a professor of architecture Why woud what a prof of architecture

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization

QoS-Aware Data Transmission and Wireless Energy Transfer: Performance Modeling and Optimization QoS-Aware Data Transmission and Wireess Energy Transfer: Performance Modeing and Optimization Dusit Niyato, Ping Wang, Yeow Wai Leong, and Tan Hwee Pink Schoo of Computer Engineering, Nanyang Technoogica

More information

Collinearity and Coplanarity Constraints for Structure from Motion

Collinearity and Coplanarity Constraints for Structure from Motion Coinearity and Copanarity Constraints for Structure from Motion Gang Liu 1, Reinhard Kette 2, and Bodo Rosenhahn 3 1 Institute of Information Sciences and Technoogy, Massey University, New Zeaand, Department

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

Progressive Source Transmissions using Joint Source-Channel Coding and Hierarchical Modulation in Packetized Networks

Progressive Source Transmissions using Joint Source-Channel Coding and Hierarchical Modulation in Packetized Networks Progressive Source Transmissions using Joint Source-Channe Coding and Hierarchica Moduation in Packetized Networks Suayb S. Arsan, Pamea C. Cosman and Laurence B. Mistein Department of Eectrica and Computer

More information

Ch. 7 Error Detection and Correction

Ch. 7 Error Detection and Correction Ch. 7 Error Detection and Correction Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and corrected. 2 1. Introduction Let us

More information

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed

Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Layout Conscious Approach and Bus Architecture Synthesis for Hardware-Software Co-Design of Systems on Chip Optimized for Speed Nattawut Thepayasuwan, Member, IEEE and Aex Doboi, Member, IEEE Abstract

More information

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY

MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven

More information

TOUCH 2100 TOUCH 2100

TOUCH 2100 TOUCH 2100 EASE OF USE Fryer Machine understands that fi nding skied operators and programmers is becoming increasingy difficut. The Touch 2100 contro was designed with this in mind. Fryer s unique software patform

More information

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0

BEA WebLogic Server. Release Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Server Reease Notes for WebLogic Tuxedo Connector 1.0 BEA WebLogic Tuxedo Connector Reease 1.0 Document Date: June 29, 2001 Copyright Copyright 2001 BEA Systems, Inc. A Rights Reserved. Restricted

More information

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01

file://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01 Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.

More information

An Exponential Time 2-Approximation Algorithm for Bandwidth

An Exponential Time 2-Approximation Algorithm for Bandwidth An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu

More information

lnput/output (I/O) AND INTERFACING

lnput/output (I/O) AND INTERFACING CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera

More information

Chapter 5 Combinational ATPG

Chapter 5 Combinational ATPG Chapter 5 Combinationa ATPG 2 Outine Introduction to ATPG ATPG for Combinationa Circuits Advanced ATPG Techniques 3 Input and Output of an ATPG ATPG (Automatic Test Pattern Generation) Generate a set of

More information

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING

CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING CLOUD RADIO ACCESS NETWORK WITH OPTIMIZED BASE-STATION CACHING Binbin Dai and Wei Yu Ya-Feng Liu Department of Eectrica and Computer Engineering University of Toronto, Toronto ON, Canada M5S 3G4 Emais:

More information

Error Control Strategies for WiMAX Multi-hop Relay Networks

Error Control Strategies for WiMAX Multi-hop Relay Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.mer.com Error Contro Strategies for WiMAX Muti-hop Reay Networks Weihuang Fu, Zhifeng Tao, Jinyun Zhang, Dharma Agrawa TR2009-083 December 2009 Abstract

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS

DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,

More information

Endoscopic Motion Compensation of High Speed Videoendoscopy

Endoscopic Motion Compensation of High Speed Videoendoscopy Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High

More information

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation

Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,

More information

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism

Backing-up Fuzzy Control of a Truck-trailer Equipped with a Kingpin Sliding Mechanism Backing-up Fuzzy Contro of a Truck-traier Equipped with a Kingpin Siding Mechanism G. Siamantas and S. Manesis Eectrica & Computer Engineering Dept., University of Patras, Patras, Greece gsiama@upatras.gr;stam.manesis@ece.upatras.gr

More information

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm

A Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm

More information

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7

Functions. 6.1 Modular Programming. 6.2 Defining and Calling Functions. Gaddis: 6.1-5,7-10,13,15-16 and 7.7 Functions Unit 6 Gaddis: 6.1-5,7-10,13,15-16 and 7.7 CS 1428 Spring 2018 Ji Seaman 6.1 Moduar Programming Moduar programming: breaking a program up into smaer, manageabe components (modues) Function: a

More information

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003

Published in: Proc. IEEE International Conference on Acoustics, Speech and Signal Processing, April, 2003 Aaborg Universitet Compressed Domain Packet Loss Conceament of Sinusoiday Coded Speech Rødbro, Christoffer Asgaard; Christensen, Mads Græsbø; Andersen, Søren Vang; Jensen, Søren Hodt Pubished in: Proc.

More information

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM

Congestion Avoidance and Control in Sensor Network Based on Fuzzy AQM ICSP2012 Proceedings Congestion Avoidance and Contro in Sensor Network Based on Fuzzy AQM Luo Cheng, Xie Weixin,Li Qiusheng ATR Key Laboratory of Nationa Defense Technoogy, Shenzhen University, Shenzhen

More information

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency

Delay Budget Partitioning to Maximize Network Resource Usage Efficiency Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu

More information

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5

LCD Video Controller. LCD Video Controller. Introduction Safety Precautions Indentifying the Components... 5 LCD Video Controer LCD Video Controer Introduction... 3 Safety Precautions... 4 Indentifying the Components... 5 Main Board... 5 Main Board ASIC Features... 6 LVDS Transmitter... 8 Backight Inverter...

More information

CORRELATION filters (CFs) are a useful tool for a variety

CORRELATION filters (CFs) are a useful tool for a variety Zero-Aiasing Correation Fiters for Object Recognition Joseph A. Fernandez, Student Member, IEEE, Vishnu Naresh Boddeti, Member, IEEE, Andres Rodriguez, Member, IEEE, B. V. K. Vijaya Kumar, Feow, IEEE arxiv:4.36v

More information

NOWDAYS, our ways of living are under gradual but

NOWDAYS, our ways of living are under gradual but Transmission Management of Deay-Sensitive Medica Packets in Beyond Wireess Body Area Networks: A Queueing Game Approach Changyan Yi, Student Member, IEEE, and Jun Cai, Senior Member, IEEE Abstract In this

More information

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM

JOINT IMAGE REGISTRATION AND EXAMPLE-BASED SUPER-RESOLUTION ALGORITHM JOINT IMAGE REGISTRATION AND AMPLE-BASED SUPER-RESOLUTION ALGORITHM Hyo-Song Kim, Jeyong Shin, and Rae-Hong Park Department of Eectronic Engineering, Schoo of Engineering, Sogang University 35 Baekbeom-ro,

More information

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul

Optimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28

More information

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters

Optimization and Application of Support Vector Machine Based on SVM Algorithm Parameters Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi

More information

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks

Blackboard Mechanism Based Ant Colony Theory for Dynamic Deployment of Mobile Sensor Networks Journa of Bionic Engineering 5 (2008) 197 203 Bacboard Mechanism Based Ant Coony Theory for Dynamic Depoyment of Mobie Sensor Networs Guang-ping Qi, Ping Song, Ke-jie Li Schoo of Aerospace Science and

More information

Approximate Closest Community Search in Networks

Approximate Closest Community Search in Networks Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk

More information

Hands-free system (for cellular phone)

Hands-free system (for cellular phone) Hands-free system (for ceuar phone) With navigation system Owners of modes equipped with a navigation system shoud refer to the Navigation System Owner s Manua. Without navigation system This system supports

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1

Avaya Extension to Cellular User Guide Avaya Aura TM Communication Manager Release 5.2.1 Avaya Extension to Ceuar User Guide Avaya Aura TM Communication Manager Reease 5.2.1 November 2009 2009 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information

More information

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center

Minimizing Resource Cost for Camera Stream Scheduling in Video Data Center Gao YH, Ma HD, Liu W. Minimizing resource cost for camera stream scheduing in video data center. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 32(3): 555 570 May 2017. DOI 10.1007/s11390-017-1743-x Minimizing

More information

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication

Fuzzy Controller for a Dynamic Window in Elliptic Curve Cryptography Wireless Networks for Scalar Multiplication 6th Asia-Pacific Conference on Communications Fuzzy Controer for a Dynamic Window in Eiptic Curve Cryptography Wireess Networks for Scaar Mutipication Xu Huang Facuty of Information Sciences and Engineering

More information

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation

1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER Backward Fuzzy Rule Interpolation 1682 IEEE TRANSACTIONS ON FUZZY SYSTEMS, VOL. 22, NO. 6, DECEMBER 2014 Bacward Fuzzy Rue Interpoation Shangzhu Jin, Ren Diao, Chai Que, Senior Member, IEEE, and Qiang Shen Abstract Fuzzy rue interpoation

More information

Telephony Trainers with Discovery Software

Telephony Trainers with Discovery Software Teephony Trainers 58 Series Teephony Trainers with Discovery Software 58-001 Teephony Training System 58-002 Digita Switching System 58-003 Digita Teephony Training System 58-004 Digita Trunk Network System

More information

Distance Weighted Discrimination and Second Order Cone Programming

Distance Weighted Discrimination and Second Order Cone Programming Distance Weighted Discrimination and Second Order Cone Programming Hanwen Huang, Xiaosun Lu, Yufeng Liu, J. S. Marron, Perry Haaand Apri 3, 2012 1 Introduction This vignette demonstrates the utiity and

More information

Layer-Specific Adaptive Learning Rates for Deep Networks

Layer-Specific Adaptive Learning Rates for Deep Networks Layer-Specific Adaptive Learning Rates for Deep Networks arxiv:1510.04609v1 [cs.cv] 15 Oct 2015 Bharat Singh, Soham De, Yangmuzi Zhang, Thomas Godstein, and Gavin Tayor Department of Computer Science Department

More information

Lines and Angles. introduction

Lines and Angles. introduction 9 Lines and nges intrductin In cass VI, you have earnt soe basic concepts and ters of geoetry point, ine, pane, ine segent, ray, ange and types of anges. In this chapter, we sha earn about soe pairs of

More information

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION

WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North

More information

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION

AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION S.Sai Kumar et a. / (IJCSIT Internationa Journa of Computer Science and Information Technoogies, Vo. 1 (4, 010, 73-79 AUTOMATIC IMAGE RETARGETING USING SALIENCY BASED MESH PARAMETERIZATION 1 S.Sai Kumar,

More information