Arithmetic Coding. Prof. Ja-Ling Wu. Department of Computer Science and Information Engineering National Taiwan University
|
|
- Mervin Sanders
- 6 years ago
- Views:
Transcription
1 Arithmetic Coding Prof. Ja-Ling Wu Department of Computer Science and Information Engineering Nationa Taiwan University
2 F(X) Shannon-Fano-Eias Coding W..o.g. we can take X={,,,m}. Assume p()>0 for a. The cumuative distribution function F() is defined as F a p a P() 0
3 Consider the modified cumuative distribution function F Pa P a where F denotes the sum of the probabiities of a symbos ess than pus haf the probabiity of the symbo. Since the r.v. is discrete, the cumuative distribution function consists of steps of size p(). The vaue of the Function F is the midpoint of the step corresponding to. Since a the probabiities are positive, F(a)F(b) if ab, and hence we can determine if we know F. Thus the vaue of F can be used as a code for. 3
4 But in genera F is a rea number epressibe ony by an infinite number of bits. So it is not efficient to use the eact vaue of Fas a code for. If we use an approimate vaue, what is the required accuracy? Assume that we round off F to () bits (denoted by F ). Thus we use the first () bits of F as a code for. By definition of rounding off, we have if F og F p p, F then F and therefore F ies within the step corresponding to. Thus () bits suffice to describe. 4
5 In addition to requiring that the codeword identify to corresponding symbo, we aso require the set of codewords to be prefi-free. Consider each codeword z, z,, z to represent not a point but the interva [0. z z z, 0. z z z +/ ]. The code is prefi-free iff the intervas corresponding to codewords are disjoint. The interva corresponding to any codeword has ength -(), which is ess than haf the height of the step corresponding to. The ower end of the interva is in the ower haf of the step. Thus the upper end of the interva ies beow the top of the step, and the interva corresponding to any codeword ies entirey within the step corresponding to that symbo in the cumuative distribution function. Therefore, the intervas corresponding to different codewords are disjoint and the code is prefi-free. Note that this procedure does not require the symbos to be ordered in terms of probabiity. 5
6 Since we use og p bits to represent, the epected ength of this code is L H p p og p if the probabiities are ordered as p p p m then Eampe: H L H p() F() in binary og codeword F F p 6
7 Arithmetic coding Huffman coding : a bottom-up procedure the cacuation of the probabiities of a source sequences of a particuar bock ength and the construction of the corresponding compete code tree. A better scheme is one which can be easiy etended to onger bock engths without having to redo a the cacuations. Arithmetic coding : a direct etension of Shannon- Fano-Eias coding cacuate the probabiity mass function p( n ) and the cumuative distribution function F( n ) for the source sequence n. 7
8 We can use a number in the interva (F( n ) P( n ),F( n )] as the code for n. Shannon-Fano-Eias code For eampe: epressing F( n ) to an accuracy of og code for the source. wi give us a the codeword corresponding the any sequences ies within the step in the cumuative distribution function. The codewords are different sequences of ength n. However, this procedure does not guarantee that the set of codewords is prefi-free. P n 8
9 We can construct a prefi-free set by using F rounded off to og P bits, as in the previous eampe. Arithmetic coding : Keep track of F( n ) and P( n ) We assume that we have a fied bock ength n that is known to both the encoder and the decoder. With a sma oss of generaity, we assume that the source aphabet is binary. We assume that we have a simpe procedure to cacuate P(,,, n ) for any string,,, n. We use the natura eicographic order on strings, so a string is greater than a string y if i = and y i =0 for the first i such that i y i. Equivaenty, 9
10 y i.e., if 0 if i i i i y i the corresponding binary numbers satisfy 0 y i, We can arrange the string as the eaves of a tree of depth n, where each eve of the tree corresponds to one bit. 0
11 0 T T T 3 0 In the above tree, the ordering >y corresponds to the fact that is to the right of y on the same eve of the tree.
12 The sum of the probabiities of a the eaves to the eft of n is the sum of the probabiities of a the subtrees to the eft of n. Let be a subtree starting with k- 0. The probabiity of this subtree is 0 k T 0 as can rewrite Therefore we 0 0 to theeft of :T is 0 n n T y n n n k y y n k k P P T y P F F P y y P P T n n n k k
13 E: if P(0)=, P()= in the above Binary tree, then F(00) = P(T ) + P(T ) + P(T 3 ) = P(00) + P(00) + P(00) = ( ) + ( ) + ( ). To encode the net bit of the source sequence, we need ony cacuate P( i i+ ) and update F( i i+ ) using the above scheme. Encoding can therefore be done sequentiay, by ooking at the bits as they come in. 3
14 To decode the sequence, we use the same procdeure to cacuate the cumuative distribution function and check whether it eceeds the vaue corresponding to the codeword. We then use the above binary tree as a decision tree. At the top node, we check to see if the received codeword F( n ) is greater than P(0). If it is, then the subtree starting with 0 is to the eft of n and hence =. Continuing this process down the tree, we can decode the bits in sequence. Thus we can compress and decompress a source sequence in a sequentia manner. 4
15 The above procedure depends on a mode for which we can easiy compute P( n ). Two eampes of such modes are i.i.d. source, where P n n P i and Markov source, where P n n P P i i i In both cases, we can easiy compute P( n n+ ) from P( n ). Note that it is not essentia that the probabiities used in the encoding be equa to the true distribution of the source. i 5
16 In some cases, such as in image compression, it is difficut to describe a true distribution for the source. Even then, it is possibe to appy the above arithmetic coding procedure. G.G. Langdon. An introduction to arithmetic coding, IBM Journa of Research and Deveopment, vo. 8, pp ,
17 7 Competitive Optimaity of the Shannon code Theorem: Let () be the codeword engths associated with the Shannon code and et () be the codeword engths associated with any other code. Then Proof: Since - () by the Kraft inequaity. No other code can do much better than the Shannon code most of the time. ' c r c P, ) ( ' og ' og ' ) ( ) ( ' ) ( : ' ) ( ) ( ' c c p c r p r p r r c p p P c P c P c P
18 Theorem: For a dyadic probabiity mass function p(), et og be the wordengths of the binary p Shannon code for the source, and et () be the ength of any other uniquey decodabe binary code for the source. Then P r ' P ' r with equaity iff ()=() for a. The codeength assignment og competitivey optima. p is uniquey 8
19 Proof: Define the function sgn(t) as foows:, if t>0 sgn(t) = 0, if t=0 -, if t<0 sgn() t - - Note: sgn(t) t - True for integer vaue of t for t=0,,, 9
20 0 0 ' sgn ' sgn ' ' ' ' ' ' ) ( ) '( : ) ( ) '( : r r p E p p p P P
21 Coroary: For non-dyadic probabiity mass function Esgn( ( ) '( ) ) ' og where p and is any other code for the source. 0
22 The Huffman coder generates a new codeword for each input symbo. the ower imit on compression for a Huffman coder is one bit per input symbo Higher compression ratio can be achieved by combining severa symbos into a singe unit ; however, the corresponding compeity for codeword construction wi be increased Another probem with Huffman coding is that the coding and modeing steps are combined into a singe process, and thus adaptive coding is difficut. If the probabiities of occurrence of the input symbos change, then one has to redesign the Huffman tabe from scratch.
23 Arithmetic coding is a ossess compression technique that benefits from treating mutipe symbos as a singe data unit but at the same time retains the incrementa symbo-by-symbo coding approach of Huffman coding. Arithmetic coding separates the coding from modeing. This aows for the dynamic adaptation of the probabiity mode without affecting the design of the coder. Encoding Process : AR coding : a singe codeword is assigned to each possibe data set. each codeword can be considered a haf-open subinterva in the interva [,0) 3
24 By assigning enough precision bits to each of the codewords, one can distinguish one subinterva from any other subintervas, and thus uniquey decode the corresponding data set. Like Huffman codewords, the more probabe data sets correspond to arger subintervas and thus require fewer bits of precision. E : symbo Probabiity Huffman codeword k u w e 0.3 r 0. 00? 0. 0 input string : u u r e? 0,0,00,00,00,,0 8 bits 4
25 Input ?? r r e e w u k u u
26 . At the start of the process, the message is assumed to be in the haf-open interva [0,). The interva is spit into severa subintervas, one subinterva for each symbo in our aphabet. The upper imit of each subinterva is the cumuative probabiity up to and incuding the corresponding symbo. The ower imit is the cumuative probabiity up to but not incuding the symbo. Si Pi subinterva end of message marker k 0.05 [0.00, 0.05) 0. [0.05, 0.5) u 0. [0.5, 0.35) w 0.05 [0.35, 0.40) e 0.3 [0.40, 0.70) r 0. [0.70, 0.90)? 0. [0.90,.00) 6
27 . When the first symbo, appears, we seect the corresponding subinterva and make it the new current interva. The intervas of the remaining symbos in the aphabet set are then scaed accordingy. Let Previous ow and Previous high be the ower and the upper imit for the od interva. Let Range = Previous ow - Previous high After input, the ower imit for the new interva is: Previous ow + Range subinterva ow of sumbo. the upper imit for the new interva is: Previous ow + Range subinterva high of symbo. 7
28 Previous ow = 0, Previous high = Range = 0 = subinterva ow of = 0.05 subinterva high of = 0.5 New interva ow = = 0.05 New interva high = = 0.5 After input, [ 0, ) [ 0.05, 0.5) 3. After the nd, we have New interva ow = [ ] 0.05 = 0.06 New interva high = [ ] 0.5 = 0.0 8
29 4. For the 3rd input u, we have New interva ow = [ ] 0.5 = 0.07 New interva high = [ ] 0.35 = The cacuations described in previous steps are repeated using the imits of the previous interva and subinterva ranges of the current symbo. This yieds the imits for the new interva. After the symbo?, the fina range is [ , ) 6. There is no need to transmit both vaues of the bounds in the ast interva. Instead, we transmit a vaue that is within the fina range. In the above eampe, any number such as , ,, coud be used. if is used = bits are required Arithmetic coding yieds better compression because encodes a message as a whoe new symbo instead of separate symbos. 9
30 Decoding Process Given the symbo probabiities, to each symbo in our aphabet we assign a unique number (i) and we associate a cumuative probabiity vaue cumprob i. Si i Cumprob i K u w e r? Given the fractiona representation of the input codeword vaue, the foowing agorithm outputs the corresponding decoded message. 30
31 DecodeSymbo (vaue): Begin Previous ow = 0 Previous high = Range = Previous high Previous ow. Repeat Find i such that vaue Previous Cumprob i Range Cumprob Output symbo corresponding to i from the decoding tabe. Update: Previous high = Previous ow + Range Cumprob i- Previous ow = Previous ow + Range Cumprob i Range = Previous high Previous ow Unti symbo decoded is? End ow i 3
32 E:. Initiay, Previous ow =0, Previous high =, and Range=. For i=6, vaue Previous Cumprob i Thus, the first decoded symbo is. Update: Previous high = 0.5 Previous ow = 0.5 Range = 0.0 Range ow Cumprob i. We repeat the decoding process and find that i=6 satisfies again the imits vaue 0.05 Cumprob i Cumprob 0.0 Thus the nd decoded symbo is. Update: Previous high = 0.0 Previous ow = 0.06 Range = 0.04 i 3
33 3. Repeating the decoding process yieds the i=5 satisfies the imits vaue 0.06 Cumprob i Cumprob 0.04 Thus the 3 rd decoded symbo is u Update: Previous high = Previous ow = Range = Repeat the decoding process unti? is decoded, then terminate the decoding agorithm, i 33
34 Impementation Issues : Incrementa Output The encoding method we have described geneates a compressed bit stream ony after reading the entire message. However, in most impementation, and particuary in image compression, we desire an incrementa transmission scheme. From the encoding figure, we observe that after encoding u, the subinterva range is [0.07, 0.074). In fact, it wi start with the vaue 0.07; hence we can transmit the first two digits 07. After the encoding of the net symbo, the fina representation wi begin with 0.07 since both the upper and the ower imits of this range contain Thus, we can transmit the digit. We repeat this process for the remaining symbos. Thus, incrementa encoding is achieved by transmitting to the decoder each digit in the finia representation as soon as it is known. The decoder can perform incrementa cacuation too. : encoding / decoding detais can be found in 我把電腦變大了 ( 黃鶴超 ) 數字編碼篇 34
35 High-precision arithmetic Most of the computations in arithmetic coding use foating-point arithmetic; however, most ow-cost hardware impementations support ony fied-point arithmetic. Furthermore, division (used by the decoder) is undesirabe in most impementations. Consider the probem of arithmetic precision in the encoder. During encoding, the subinterva range is narrowed as each new symbo is processed. Depending on the symbo probabiities, the precision required to represent this range may grow; thus, there is a potentia for overfow or underfow. For instance, in an integer impementation, if the fractiona vaues are not scaed appropriatey, different symbos may yied the same imits of Previous high and Previous ow ;that is, no subdivision of the previous subinterva takes pace. At this point, encoding woud have to be abnormay terminated. 35
36 Let subinterva imits Previous ow and Previous high be represented as integers with C bits of precision. The ength of a subinterva is equa to the product of the probabiities of the individua events. If we represent this probabiity with f bits of precision to avoid overfow or underfow, we required f c+ and f+c p, where p is the arithmetic precision for the computations. For AR coding on a 6-bit computer, p=6. If c=9, then f=7. If the message is composed of symbos from a k- symbo aphabet, then f k. Thus, a 56-symbo aphabet cannot be correcty encoded using 6-bit arithmetic. 36
37 Probabiity Modeing Thus far, we have assumed a priori knowedge of the symbo probabiities p i. In many practica impementations that use the arithmetic coder, symbo probabiities are estimated as the pies are processed. This aows the coder to adapt better to changes in the input stream. A typica eampe is a document that incudes both tet and images. Tet and images have quite different probabiity symbos. In this case, an adaptive arithmetic coder is epected to perform better than a nonadaptive entropy coder. 37
38 good references :. Witen, Nea, Ceary, Arithmetic coding for data compression, Communication ACM, 30(6), pp , June Mitche & Pennebaker, Optima hardware and software arithmetic coding procedures for the Q- coder, IBM J. of Research and Deveopment, 3(6), pp , Nov H.C. Huang, & Ja-Ling Wu, Windowed Huffman coding agorithm with size adaptation, IEE Proceeding-I, pp. 09-3, Apri Chia-Lun Yu & Ja-Ling Wu, Hierarchica dictionary mode and dictionary management poices for data compression, pp , Signa Processing,
Language Identification for Texts Written in Transliteration
Language Identification for Texts Written in Transiteration Andrey Chepovskiy, Sergey Gusev, Margarita Kurbatova Higher Schoo of Economics, Data Anaysis and Artificia Inteigence Department, Pokrovskiy
More informationChapter Multidimensional Direct Search Method
Chapter 09.03 Mutidimensiona Direct Search Method After reading this chapter, you shoud be abe to:. Understand the fundamentas of the mutidimensiona direct search methods. Understand how the coordinate
More informationAN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART
13 AN EVOLUTIONARY APPROACH TO OPTIMIZATION OF A LAYOUT CHART Eva Vona University of Ostrava, 30th dubna st. 22, Ostrava, Czech Repubic e-mai: Eva.Vona@osu.cz Abstract: This artice presents the use of
More informationInformation Theory and Communication
Information Theory and Communication Shannon-Fano-Elias Code and Arithmetic Codes Ritwik Banerjee rbanerjee@cs.stonybrook.edu c Ritwik Banerjee Information Theory and Communication 1/12 Roadmap Examples
More informationFurther Optimization of the Decoding Method for Shortened Binary Cyclic Fire Code
Further Optimization of the Decoding Method for Shortened Binary Cycic Fire Code Ch. Nanda Kishore Heosoft (India) Private Limited 8-2-703, Road No-12 Banjara His, Hyderabad, INDIA Phone: +91-040-3378222
More informationMobile App Recommendation: Maximize the Total App Downloads
Mobie App Recommendation: Maximize the Tota App Downoads Zhuohua Chen Schoo of Economics and Management Tsinghua University chenzhh3.12@sem.tsinghua.edu.cn Yinghui (Catherine) Yang Graduate Schoo of Management
More informationLecture outline Graphics and Interaction Scan Converting Polygons and Lines. Inside or outside a polygon? Scan conversion.
Lecture outine 433-324 Graphics and Interaction Scan Converting Poygons and Lines Department of Computer Science and Software Engineering The Introduction Scan conversion Scan-ine agorithm Edge coherence
More informationTesting Whether a Set of Code Words Satisfies a Given Set of Constraints *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 6, 333-346 (010) Testing Whether a Set of Code Words Satisfies a Given Set of Constraints * HSIN-WEN WEI, WAN-CHEN LU, PEI-CHI HUANG, WEI-KUAN SHIH AND MING-YANG
More informationA METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS. A. C. Finch, K. J. Mackenzie, G. J. Balsdon, G. Symonds
A METHOD FOR GRIDLESS ROUTING OF PRINTED CIRCUIT BOARDS A C Finch K J Mackenzie G J Basdon G Symonds Raca-Redac Ltd Newtown Tewkesbury Gos Engand ABSTRACT The introduction of fine-ine technoogies to printed
More informationNeural Network Enhancement of the Los Alamos Force Deployment Estimator
Missouri University of Science and Technoogy Schoars' Mine Eectrica and Computer Engineering Facuty Research & Creative Works Eectrica and Computer Engineering 1-1-1994 Neura Network Enhancement of the
More informationLecture Notes for Chapter 4 Part III. Introduction to Data Mining
Data Mining Cassification: Basic Concepts, Decision Trees, and Mode Evauation Lecture Notes for Chapter 4 Part III Introduction to Data Mining by Tan, Steinbach, Kumar Adapted by Qiang Yang (2010) Tan,Steinbach,
More informationFastest-Path Computation
Fastest-Path Computation DONGHUI ZHANG Coege of Computer & Information Science Northeastern University Synonyms fastest route; driving direction Definition In the United states, ony 9.% of the househods
More informationProceedings of the International Conference on Systolic Arrays, San Diego, California, U.S.A., May 25-27, 1988 AN EFFICIENT ASYNCHRONOUS MULTIPLIER!
[1,2] have, in theory, revoutionized cryptography. Unfortunatey, athough offer many advantages over conventiona and authentication), such cock synchronization in this appication due to the arge operand
More informationHiding secrete data in compressed images using histogram analysis
University of Woongong Research Onine University of Woongong in Dubai - Papers University of Woongong in Dubai 2 iding secrete data in compressed images using histogram anaysis Farhad Keissarian University
More informationTHE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM
17th European Signa Processing Conference (EUSIPCO 2009) Gasgow, Scotand, August 24-28, 2009 THE PERCENTAGE OCCUPANCY HIT OR MISS TRANSFORM P. Murray 1, S. Marsha 1, and E.Buinger 2 1 Dept. of Eectronic
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Why Learn to Program?
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Spring 2018 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program a set of
More informationA Design Method for Optimal Truss Structures with Certain Redundancy Based on Combinatorial Rigidity Theory
0 th Word Congress on Structura and Mutidiscipinary Optimization May 9 -, 03, Orando, Forida, USA A Design Method for Optima Truss Structures with Certain Redundancy Based on Combinatoria Rigidity Theory
More informationSpace-Time Trade-offs.
Space-Time Trade-offs. Chethan Kamath 03.07.2017 1 Motivation An important question in the study of computation is how to best use the registers in a CPU. In most cases, the amount of registers avaiabe
More informationAn Adaptive Two-Copy Delayed SR-ARQ for Satellite Channels with Shadowing
An Adaptive Two-Copy Deayed SR-ARQ for Sateite Channes with Shadowing Jing Zhu, Sumit Roy zhuj@ee.washington.edu Department of Eectrica Engineering, University of Washington Abstract- The paper focuses
More informationSolving Large Double Digestion Problems for DNA Restriction Mapping by Using Branch-and-Bound Integer Linear Programming
The First Internationa Symposium on Optimization and Systems Bioogy (OSB 07) Beijing, China, August 8 10, 2007 Copyright 2007 ORSC & APORC pp. 267 279 Soving Large Doube Digestion Probems for DNA Restriction
More informationSolutions to the Final Exam
CS/Math 24: Intro to Discrete Math 5//2 Instructor: Dieter van Mekebeek Soutions to the Fina Exam Probem Let D be the set of a peope. From the definition of R we see that (x, y) R if and ony if x is a
More informationSearching, Sorting & Analysis
Searching, Sorting & Anaysis Unit 2 Chapter 8 CS 2308 Fa 2018 Ji Seaman 1 Definitions of Search and Sort Search: find a given item in an array, return the index of the item, or -1 if not found. Sort: rearrange
More informationSpecial Edition Using Microsoft Excel Selecting and Naming Cells and Ranges
Specia Edition Using Microsoft Exce 2000 - Lesson 3 - Seecting and Naming Ces and.. Page 1 of 8 [Figures are not incuded in this sampe chapter] Specia Edition Using Microsoft Exce 2000-3 - Seecting and
More informationApplication of Intelligence Based Genetic Algorithm for Job Sequencing Problem on Parallel Mixed-Model Assembly Line
American J. of Engineering and Appied Sciences 3 (): 5-24, 200 ISSN 94-7020 200 Science Pubications Appication of Inteigence Based Genetic Agorithm for Job Sequencing Probem on Parae Mixed-Mode Assemby
More informationCERIAS Tech Report Replicated Parallel I/O without Additional Scheduling Costs by Mikhail J. Atallah Center for Education and Research
CERIAS Tech Report 2003-50 Repicated Parae I/O without Additiona Scheduing Costs by Mikhai J. Ataah Center for Education and Research Information Assurance and Security Purdue University, West Lafayette,
More informationDETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS
DETERMINING INTUITIONISTIC FUZZY DEGREE OF OVERLAPPING OF COMPUTATION AND COMMUNICATION IN PARALLEL APPLICATIONS USING GENERALIZED NETS Pave Tchesmedjiev, Peter Vassiev Centre for Biomedica Engineering,
More informationThe Big Picture WELCOME TO ESIGNAL
2 The Big Picture HERE S SOME GOOD NEWS. You don t have to be a rocket scientist to harness the power of esigna. That s exciting because we re certain that most of you view your PC and esigna as toos for
More informationLink Registry Protocol Options
Link Registry Protoco Options Norman Finn, March 2017 HUAWEI TECHNOLOGIES CO., LTD. IEEE 802.1 TSN At east two obvious choices for P802.1CS Link Registration Protoco An IS-IS-ike protoco. TCP (Transmission
More informationA Memory Grouping Method for Sharing Memory BIST Logic
A Memory Grouping Method for Sharing Memory BIST Logic Masahide Miyazai, Tomoazu Yoneda, and Hideo Fuiwara Graduate Schoo of Information Science, Nara Institute of Science and Technoogy (NAIST), 8916-5
More informationA Comparison of a Second-Order versus a Fourth- Order Laplacian Operator in the Multigrid Algorithm
A Comparison of a Second-Order versus a Fourth- Order Lapacian Operator in the Mutigrid Agorithm Kaushik Datta (kdatta@cs.berkeey.edu Math Project May 9, 003 Abstract In this paper, the mutigrid agorithm
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More informationOutline. Parallel Numerical Algorithms. Forward Substitution. Triangular Matrices. Solving Triangular Systems. Back Substitution. Parallel Algorithm
Outine Parae Numerica Agorithms Chapter 8 Prof. Michae T. Heath Department of Computer Science University of Iinois at Urbana-Champaign CS 554 / CSE 512 1 2 3 4 Trianguar Matrices Michae T. Heath Parae
More informationLoad Balancing by MPLS in Differentiated Services Networks
Load Baancing by MPLS in Differentiated Services Networks Riikka Susitaiva, Jorma Virtamo, and Samui Aato Networking Laboratory, Hesinki University of Technoogy P.O.Box 3000, FIN-02015 HUT, Finand {riikka.susitaiva,
More informationIntro to Programming & C Why Program? 1.2 Computer Systems: Hardware and Software. Hardware Components Illustrated
Intro to Programming & C++ Unit 1 Sections 1.1-3 and 2.1-10, 2.12-13, 2.15-17 CS 1428 Fa 2017 Ji Seaman 1.1 Why Program? Computer programmabe machine designed to foow instructions Program instructions
More informationOn-Chip CNN Accelerator for Image Super-Resolution
On-Chip CNN Acceerator for Image Super-Resoution Jung-Woo Chang and Suk-Ju Kang Dept. of Eectronic Engineering, Sogang University, Seou, South Korea {zwzang91, sjkang}@sogang.ac.kr ABSTRACT To impement
More informationA NEW APPROACH FOR BLOCK BASED STEGANALYSIS USING A MULTI-CLASSIFIER
Internationa Journa on Technica and Physica Probems of Engineering (IJTPE) Pubished by Internationa Organization of IOTPE ISSN 077-358 IJTPE Journa www.iotpe.com ijtpe@iotpe.com September 014 Issue 0 Voume
More informationSplit Restoration with Wavelength Conversion in WDM Networks*
Spit Reoration with aveength Conversion in DM Networks* Yuanqiu Luo and Nirwan Ansari Advanced Networking Laborator Department of Eectrica and Computer Engineering New Jerse Initute of Technoog Universit
More informationFiltering. Yao Wang Polytechnic University, Brooklyn, NY 11201
Spatia Domain Linear Fitering Yao Wang Poytechnic University Brookyn NY With contribution rom Zhu Liu Onur Gueryuz and Gonzaez/Woods Digita Image Processing ed Introduction Outine Noise remova using ow-pass
More informationA Fast Block Matching Algorithm Based on the Winner-Update Strategy
In Proceedings of the Fourth Asian Conference on Computer Vision, Taipei, Taiwan, Jan. 000, Voume, pages 977 98 A Fast Bock Matching Agorithm Based on the Winner-Update Strategy Yong-Sheng Chenyz Yi-Ping
More informationAd Hoc Networks 11 (2013) Contents lists available at SciVerse ScienceDirect. Ad Hoc Networks
Ad Hoc Networks (3) 683 698 Contents ists avaiabe at SciVerse ScienceDirect Ad Hoc Networks journa homepage: www.esevier.com/ocate/adhoc Dynamic agent-based hierarchica muticast for wireess mesh networks
More informationA Petrel Plugin for Surface Modeling
A Petre Pugin for Surface Modeing R. M. Hassanpour, S. H. Derakhshan and C. V. Deutsch Structure and thickness uncertainty are important components of any uncertainty study. The exact ocations of the geoogica
More informationImage Segmentation Using Semi-Supervised k-means
I J C T A, 9(34) 2016, pp. 595-601 Internationa Science Press Image Segmentation Using Semi-Supervised k-means Reza Monsefi * and Saeed Zahedi * ABSTRACT Extracting the region of interest is a very chaenging
More informationTopology-aware Key Management Schemes for Wireless Multicast
Topoogy-aware Key Management Schemes for Wireess Muticast Yan Sun, Wade Trappe,andK.J.RayLiu Department of Eectrica and Computer Engineering, University of Maryand, Coege Park Emai: ysun, kjriu@gue.umd.edu
More informationAn Exponential Time 2-Approximation Algorithm for Bandwidth
An Exponentia Time 2-Approximation Agorithm for Bandwidth Martin Fürer 1, Serge Gaspers 2, Shiva Prasad Kasiviswanathan 3 1 Computer Science and Engineering, Pennsyvania State University, furer@cse.psu.edu
More informationACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES. Eyal En Gad, Akshay Gadde, A. Salman Avestimehr and Antonio Ortega
ACTIVE LEARNING ON WEIGHTED GRAPHS USING ADAPTIVE AND NON-ADAPTIVE APPROACHES Eya En Gad, Akshay Gadde, A. Saman Avestimehr and Antonio Ortega Department of Eectrica Engineering University of Southern
More informationRegister Allocation. Consider the following assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x
Register Aocation Consider the foowing assignment statement: x = (a*b)+((c*d)+(e*f)); In posfix notation: ab*cd*ef*++x Assume that two registers are avaiabe. Starting from the eft a compier woud generate
More informationAlpha labelings of straight simple polyominal caterpillars
Apha abeings of straight simpe poyomina caterpiars Daibor Froncek, O Nei Kingston, Kye Vezina Department of Mathematics and Statistics University of Minnesota Duuth University Drive Duuth, MN 82-3, U.S.A.
More informationA Local Optimal Method on DSA Guiding Template Assignment with Redundant/Dummy Via Insertion
A Loca Optima Method on DSA Guiding Tempate Assignment with Redundant/Dummy Via Insertion Xingquan Li 1, Bei Yu 2, Jiani Chen 1, Wenxing Zhu 1, 24th Asia and South Pacific Design T h e p i c Automation
More informationNearest Neighbor Learning
Nearest Neighbor Learning Cassify based on oca simiarity Ranges from simpe nearest neighbor to case-based and anaogica reasoning Use oca information near the current query instance to decide the cassification
More informationECEn 528 Prof. Archibald Lab: Dynamic Scheduling Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018
ECEn 528 Prof. Archibad Lab: Dynamic Scheduing Part A: due Nov. 6, 2018 Part B: due Nov. 13, 2018 Overview This ab's purpose is to expore issues invoved in the design of out-of-order issue processors.
More information3.1 The cin Object. Expressions & I/O. Console Input. Example program using cin. Unit 2. Sections 2.14, , 5.1, CS 1428 Spring 2018
Expressions & I/O Unit 2 Sections 2.14, 3.1-10, 5.1, 5.11 CS 1428 Spring 2018 Ji Seaman 1 3.1 The cin Object cin: short for consoe input a stream object: represents the contents of the screen that are
More informationl Tree: set of nodes and directed edges l Parent: source node of directed edge l Child: terminal node of directed edge
Trees & Heaps Week 12 Gaddis: 20 Weiss: 21.1-3 CS 5301 Fa 2016 Ji Seaman 1 Tree: non-recursive definition Tree: set of nodes and directed edges - root: one node is distinguished as the root - Every node
More informationWATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION
WATERMARKING GIS DATA FOR DIGITAL MAP COPYRIGHT PROTECTION Shen Tao Chinese Academy of Surveying and Mapping, Beijing 100039, China shentao@casm.ac.cn Xu Dehe Institute of resources and environment, North
More informationOptimized Base-Station Cache Allocation for Cloud Radio Access Network with Multicast Backhaul
Optimized Base-Station Cache Aocation for Coud Radio Access Network with Muticast Backhau Binbin Dai, Student Member, IEEE, Ya-Feng Liu, Member, IEEE, and Wei Yu, Feow, IEEE arxiv:804.0730v [cs.it] 28
More informationEnumeration of MSO Queries on Strings with Constant Delay and Logarithmic Updates
Enumeration of MSO Queries on Strings with Constant Deay and Logarithmic Updates ABSTRACT Matthias Niewerth University of Bayreuth We consider the enumeration of MSO queries over strings under updates.
More informationExtended Node-Arc Formulation for the K-Edge-Disjoint Hop-Constrained Network Design Problem
Extended Node-Arc Formuation for the K-Edge-Disjoint Hop-Constrained Network Design Probem Quentin Botton Université cathoique de Louvain, Louvain Schoo of Management, (Begique) botton@poms.uc.ac.be Bernard
More informationHour 3: The Network Access Layer Page 1 of 10. Discuss how TCP/IP s Network Access layer relates to the OSI networking model
Hour 3: The Network Access Layer Page 1 of 10 Hour 3: The Network Access Layer At the base of the TCP/IP protoco stack is the Network Access ayer, the coection of services and specifications that provide
More informationAs Michi Henning and Steve Vinoski showed 1, calling a remote
Reducing CORBA Ca Latency by Caching and Prefetching Bernd Brügge and Christoph Vismeier Technische Universität München Method ca atency is a major probem in approaches based on object-oriented middeware
More informationDETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM
DETECTION OF OBSTACLE AND FREESPACE IN AN AUTONOMOUS WHEELCHAIR USING A STEREOSCOPIC CAMERA SYSTEM Le Minh 1, Thanh Hai Nguyen 2, Tran Nghia Khanh 2, Vo Văn Toi 2, Ngo Van Thuyen 1 1 University of Technica
More informationTransformation Invariance in Pattern Recognition: Tangent Distance and Propagation
Transformation Invariance in Pattern Recognition: Tangent Distance and Propagation Patrice Y. Simard, 1 Yann A. Le Cun, 2 John S. Denker, 2 Bernard Victorri 3 1 Microsoft Research, 1 Microsoft Way, Redmond,
More informationMULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY
MULTIGRID REDUCTION IN TIME FOR NONLINEAR PARABOLIC PROBLEMS: A CASE STUDY R.D. FALGOUT, T.A. MANTEUFFEL, B. O NEILL, AND J.B. SCHRODER Abstract. The need for paraeism in the time dimension is being driven
More informationProviding Hop-by-Hop Authentication and Source Privacy in Wireless Sensor Networks
The 31st Annua IEEE Internationa Conference on Computer Communications: Mini-Conference Providing Hop-by-Hop Authentication and Source Privacy in Wireess Sensor Networks Yun Li Jian Li Jian Ren Department
More information17.3 Surface Area of Pyramids and Cones
Name Cass Date 17.3 Surface Area of Pyramids and Cones Essentia Question: How is the formua for the atera area of a reguar pyramid simiar to the formua for the atera area of a right cone? Expore G.11.C
More informationJoint disparity and motion eld estimation in. stereoscopic image sequences. Ioannis Patras, Nikos Alvertos and Georgios Tziritas y.
FORTH-ICS / TR-157 December 1995 Joint disparity and motion ed estimation in stereoscopic image sequences Ioannis Patras, Nikos Avertos and Georgios Tziritas y Abstract This work aims at determining four
More informationEndoscopic Motion Compensation of High Speed Videoendoscopy
Endoscopic Motion Compensation of High Speed Videoendoscopy Bharath avuri Department of Computer Science and Engineering, University of South Caroina, Coumbia, SC - 901. ravuri@cse.sc.edu Abstract. High
More informationOn Upper Bounds for Assortment Optimization under the Mixture of Multinomial Logit Models
On Upper Bounds for Assortment Optimization under the Mixture of Mutinomia Logit Modes Sumit Kunnumka September 30, 2014 Abstract The assortment optimization probem under the mixture of mutinomia ogit
More informationfile://j:\macmillancomputerpublishing\chapters\in073.html 3/22/01
Page 1 of 15 Chapter 9 Chapter 9: Deveoping the Logica Data Mode The information requirements and business rues provide the information to produce the entities, attributes, and reationships in ogica mode.
More informationQuality of Service Evaluations of Multicast Streaming Protocols *
Quaity of Service Evauations of Muticast Streaming Protocos Haonan Tan Derek L. Eager Mary. Vernon Hongfei Guo omputer Sciences Department University of Wisconsin-Madison, USA {haonan, vernon, guo}@cs.wisc.edu
More informationReal-Time Image Generation with Simultaneous Video Memory Read/Write Access and Fast Physical Addressing
Rea-Time Image Generation with Simutaneous Video Memory Read/rite Access and Fast Physica Addressing Mountassar Maamoun 1, Bouaem Laichi 2, Abdehaim Benbekacem 3, Daoud Berkani 4 1 Department of Eectronic,
More informationPriority Queueing for Packets with Two Characteristics
1 Priority Queueing for Packets with Two Characteristics Pave Chuprikov, Sergey I. Nikoenko, Aex Davydow, Kiri Kogan Abstract Modern network eements are increasingy required to dea with heterogeneous traffic.
More informationUtility-based Camera Assignment in a Video Network: A Game Theoretic Framework
This artice has been accepted for pubication in a future issue of this journa, but has not been fuy edited. Content may change prior to fina pubication. Y.LI AND B.BHANU CAMERA ASSIGNMENT: A GAME-THEORETIC
More informationLinearity of Saturation for Berge Hypergraphs
Linearity of Saturation for Berge Hypergraphs Sean Engish Dánie Gerbner Abhishek Methuku Michae Tait Juy 18, 2018 Abstract For a graph F, we say a hypergraph H is Berge-F if it can be obtained from F be
More informationNeural Networks. Aarti Singh. Machine Learning Nov 3, Slides Courtesy: Tom Mitchell
Neura Networks Aarti Singh Machine Learning 10-601 Nov 3, 2011 Sides Courtesy: Tom Mitche 1 Logis0c Regression Assumes the foowing func1ona form for P(Y X): Logis1c func1on appied to a inear func1on of
More informationFormulation of Loss minimization Problem Using Genetic Algorithm and Line-Flow-based Equations
Formuation of Loss minimization Probem Using Genetic Agorithm and Line-Fow-based Equations Sharanya Jaganathan, Student Member, IEEE, Arun Sekar, Senior Member, IEEE, and Wenzhong Gao, Senior member, IEEE
More informationReal-Time Feature Descriptor Matching via a Multi-Resolution Exhaustive Search Method
297 Rea-Time Feature escriptor Matching via a Muti-Resoution Ehaustive Search Method Chi-Yi Tsai, An-Hung Tsao, and Chuan-Wei Wang epartment of Eectrica Engineering, Tamang University, New Taipei City,
More informationTutorial 3 Concepts for A1
CPSC 231 Introduction to Computer Science for Computer Science Majors I Tutoria 3 Concepts for A1 DANNY FISHER dgfisher@ucagary.ca September 23, 2014 Agenda script command more detais Submitting using
More informationDistinct Sampling on Streaming Data with Near-Duplicates*
Distinct Samping on Streaming Data with Near-Dupicates* ABSTRACT Jiecao Chen Indiana University Boomington Boomington, IN, USA jiecchen@umai.iu.edu In this paper we study how to perform distinct samping
More informationA Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irregular LDPC Codes in the IEEE 802.
A Fast-Convergence Decoding Method and Memory-Efficient VLSI Decoder Architecture for Irreguar LDPC Codes in the IEEE 82.16e Standards Yeong-Luh Ueng and Chung-Chao Cheng Dept. of Eectrica Engineering,
More informationChapter 5 VARIABLE-LENGTH CODING Information Theory Results (II)
Chapter 5 VARIABLE-LENGTH CODING ---- Information Theory Results (II) 1 Some Fundamental Results Coding an Information Source Consider an information source, represented by a source alphabet S. S = { s,
More informationlnput/output (I/O) AND INTERFACING
CHAPTER 7 NPUT/OUTPUT (I/O) AND INTERFACING INTRODUCTION The input/output section, under the contro of the CPU s contro section, aows the computer to communicate with and/or contro other computers, periphera
More informationMCSE TestPrep SQL Server 6.5 Design & Implementation - 3- Data Definition
MCSE TestPrep SQL Server 6.5 Design & Impementation - Data Definition Page 1 of 38 [Figures are not incuded in this sampe chapter] MCSE TestPrep SQL Server 6.5 Design & Impementation - 3- Data Definition
More informationMulti-level Shape Recognition based on Wavelet-Transform. Modulus Maxima
uti-eve Shape Recognition based on Waveet-Transform oduus axima Faouzi Aaya Cheikh, Azhar Quddus and oncef Gabbouj Tampere University of Technoogy (TUT), Signa Processing aboratory, P.O. Box 553, FIN-33101
More informationOptimization and Application of Support Vector Machine Based on SVM Algorithm Parameters
Optimization and Appication of Support Vector Machine Based on SVM Agorithm Parameters YAN Hui-feng 1, WANG Wei-feng 1, LIU Jie 2 1 ChongQing University of Posts and Teecom 400065, China 2 Schoo Of Civi
More informationResource Optimization to Provision a Virtual Private Network Using the Hose Model
Resource Optimization to Provision a Virtua Private Network Using the Hose Mode Monia Ghobadi, Sudhakar Ganti, Ghoamai C. Shoja University of Victoria, Victoria C, Canada V8W 3P6 e-mai: {monia, sganti,
More informationWEAVER: A KNOWLEDGE-BASED ROUTING EXPERT
WEAVER: A KNOWLEDGE-BASED ROUTING EXPERT Rostam Joobbani, Danie P. Siewiorek Department of Eectrica and Computer Engineering Carnegie-Meon University Scheney Park Pittsburgh, PA 15213 ABSTRACT In this
More informationCommunity-Aware Opportunistic Routing in Mobile Social Networks
IEEE TRANSACTIONS ON COMPUTERS VOL:PP NO:99 YEAR 213 Community-Aware Opportunistic Routing in Mobie Socia Networks Mingjun Xiao, Member, IEEE Jie Wu, Feow, IEEE, and Liusheng Huang, Member, IEEE Abstract
More informationDelay Budget Partitioning to Maximize Network Resource Usage Efficiency
Deay Budget Partitioning to Maximize Network Resource Usage Efficiency Kartik Gopaan Tzi-cker Chiueh Yow-Jian Lin Forida State University Stony Brook University Tecordia Technoogies kartik@cs.fsu.edu chiueh@cs.sunysb.edu
More informationTechTest2017. Solutions Key. Final Edit Copy. Merit Scholarship Examination in the Sciences and Mathematics given on 1 April 2017, and.
TechTest07 Merit Schoarship Examination in the Sciences and Mathematics given on Apri 07, and sponsored by The Sierra Economics and Science Foundation Soutions Key V9feb7 TechTest07 Soutions Key / 9 07
More informationA Discriminative Global Training Algorithm for Statistical MT
Discriminative Goba Training gorithm for Statistica MT Christoph Timann IBM T.J. Watson Research Center Yorktown Heights, N.Y. 10598 cti@us.ibm.com Tong Zhang Yahoo! Research New York Cit, N.Y. 10011 tzhang@ahoo-inc.com
More informationDigital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay
Digital Communication Prof. Bikash Kumar Dey Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 29 Source Coding (Part-4) We have already had 3 classes on source coding
More informationSelf-Control Cyclic Access with Time Division - A MAC Proposal for The HFC System
Sef-Contro Cycic Access with Time Division - A MAC Proposa for The HFC System S.M. Jiang, Danny H.K. Tsang, Samue T. Chanson Hong Kong University of Science & Technoogy Cear Water Bay, Kowoon, Hong Kong
More informationAnalysis of Random. Processes via And-Or Tree Evaluation. Michael Mitzenmachert M. Amin Shokrollahiz
Anaysis of Random Processes via And-Or Tree Evauation Michae G. Luby* Michae Mitzenmachert M. Amin Shokroahiz Abstract distributions not considered by previous anayses. We introduce a new set of probabiistic
More informationChapter 3: Introduction to the Flash Workspace
Chapter 3: Introduction to the Fash Workspace Page 1 of 10 Chapter 3: Introduction to the Fash Workspace In This Chapter Features and Functionaity of the Timeine Features and Functionaity of the Stage
More informationApproximate Closest Community Search in Networks
Approximate Cosest Community Search in Networks Xin Huang, Laks V.S. Lakshmanan, Jeffrey Xu Yu, Hong Cheng University of British Coumbia, The Chinese University of Hong Kong {xin,aks}@cs.ubc.ca, {yu, hcheng}@se.cuhk.edu.hk
More informationBridge Talk Release Notes for Meeting Exchange 5.0
Bridge Tak Reease Notes for Meeting Exchange 5.0 This document ists new product features, issues resoved since the previous reease, and current operationa issues. New Features This section provides a brief
More informationA Near-Optimal Distributed QoS Constrained Routing Algorithm for Multichannel Wireless Sensor Networks
Sensors 2013, 13, 16424-16450; doi:10.3390/s131216424 Artice OPEN ACCESS sensors ISSN 1424-8220 www.mdpi.com/journa/sensors A Near-Optima Distributed QoS Constrained Routing Agorithm for Mutichanne Wireess
More informationQuality Assessment using Tone Mapping Algorithm
Quaity Assessment using Tone Mapping Agorithm Nandiki.pushpa atha, Kuriti.Rajendra Prasad Research Schoar, Assistant Professor, Vignan s institute of engineering for women, Visakhapatnam, Andhra Pradesh,
More informationON WALSH CODE ASSIGNMENT
ON WAH COE AIGNENT Boris Tsybaov, ember, IEEE, Edward Tiedemann, enior ember, IEEE, and Peter Gaa QUACO Incorporated, 5775 orehose r., an iego, CA 9-74 {borist, etied, pgaa}@qacomm.com Abstract-The paper
More informationA Method for Calculating Term Similarity on Large Document Collections
$ A Method for Cacuating Term Simiarity on Large Document Coections Wofgang W Bein Schoo of Computer Science University of Nevada Las Vegas, NV 915-019 bein@csunvedu Jeffrey S Coombs and Kazem Taghva Information
More informationReference trajectory tracking for a multi-dof robot arm
Archives of Contro Sciences Voume 5LXI, 5 No. 4, pages 53 57 Reference trajectory tracking for a muti-dof robot arm RÓBERT KRASŇANSKÝ, PETER VALACH, DÁVID SOÓS, JAVAD ZARBAKHSH This paper presents the
More information