Convolutional interleaver for unequal error protection of turbo codes
|
|
- Allan Harrison
- 5 years ago
- Views:
Transcription
1 Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa Abstract: Ths paper descrbes constructon of a convolutonal nterleaver as a block nterleaver and dscusses ts applcaton to turbo codes wth equal and unequal error protecton technques. Based on smulatons, dfferent convolutonal nterleaver structures sutable for turbo codes wth unequal error protecton capablty are suggested. Fnally, based on conducted smulatons the best method s selected. Keywords: Convolutonal nterleaver, Unequal error protecton, turbo codes.. ITRODUCTIO Compresson has become the norm n moble communcatons; currently speech domnates but vdeo and general multmeda compresson s fast becomng mportant. A vtal characterstc of a compressed data stream s the unequal perceptual mportance of the compressed parameters. In turn, ths leads to unequal effects of errors durng transmsson. Thus Unequal Error Protecton (UEP) has become an mportant part of desgn of channel encoders for multmeda content. Amongst the known channel codes, turbo codes have the hghest performance n drect bt error rate reducton terms. Turbo codes are produced by the parallel concatenaton of two or more convolutonal code generators separated by one or more nterleavers []. The reducton n BER resultng from such codes s drectly dependent on the desgn of a sutable nterleaver. In the lterature, several technques for mplementng UEP usng turbo codes have been proposed. In [2], sngle nterleaver for all levels and, n [3], one nterleaver for each level are suggested, whle [4] dscusses optmzaton of the sngle nterleaver soluton. The nterleavers suggested n [2-4] are from the block nterleaver famly. In a block nterleaver, data bts are wrtten nto the memory column-wse and read row-wse (or vce versa). Another type of the block nterleaver s a sem random nterleaver, where after fllng the whole nterleaver memores the bts are read n a sem random manner, not rowor column-wse. Both types of nterleavers are used wth turbo codes and the total delay at the end of nterleavng process s twce of the nput data length. The non-block nterleavers (such as the convolutonal nterleavers [5]) have better performance n terms of BER reducton durng turbo decodng process. Addtonally, they ntroduce a shorter delay, whch smplfes the de-nterleavng procedure. It s also mportant to note that convolutonal nterleaver performance s data dependent and that they allow for a contnuous operaton, whch s a vtal consderaton for turbo codes. In ths paper, we ntroduce method that returns the memores of appled convolutonal nterleaver to the known state at the end of each data block, resultng n the convolutonal nterleaver performng effectvely as a block nterleaver. Therefore, the nterleaved block-by-block data are ndependent from each other, whch enable to use the conventonal teratve decodng methods n the decoder. The organzaton of the paper s as follows: In Secton 2, the structure of turbo codes and the poston of the nterleaver are descrbed. In Secton 3, the performance of a new convolutonal nterleaver wth the calculaton of dstance parameter of turbo codes s presented. In Secton 4, some structures of nterleaver sutable for UEP n turbo codes are descrbed. Secton 5 concludes the paper. 2. TURBO CODES STRUCTURE Turbo encoders consst of two or more Recursve Systematc Convolutonal (RSC) encoders separated by one or more nterleavers. Fgure shows a turbo encoder (rate /3) structure wth two RSC encoders. Input data IT RSC encoder Systematc data Fgure : Turbo encoder structure Party data Party data 2
2 The nput and RSC coded data are referred to as systematc and party data, respectvely (see Fgure ). The nterleaver permutes the nput data pror to the second RSC encoder to generate dfferently encoded data compared wth the codeword of the frst RSC encoder [6]. If a trells termnaton or truncaton s performed on RSC encoders and block nterleaver s used, the turbo code performance can be evaluated as that of one block code (L(n+m), kl) where L, m and k/n represent the nterleaver length, the number of RSC encoder memores or encoder states, and the code rate, respectvely [6]. In ths paper, the trells termnaton s performed on the frst RSC encoder, whch returns ts memory contents to zero state, whle trells truncaton s performed on the second RSC encoder that leaves ts memory states open. As t has been shown n [7] wth an employment of convolutonal nterleavers, whch create less delay than block nterleavers and mantan synchronzaton between the nterleaver and denterleaver, turbo codes performance mproves. Moreover, utlzaton of the contnuous behavour n the stream-orented turbo codes s sutable for long data length wth RSC encoders havng hgh number of states [8-9]. In order to use the convolutonal nterleaver n turbo codes equvalent to a block code, the nterleaver memores should be reset at the end of each block to the specfc value to create segmented nterleaved data for the second RSC encoder. The new scheme can be used n turbo codes wth unequal error protecton property and the proposed technque s descrbed n the next sectons. 3. COVOLUTIOAL ITERLEAVER STRUCTURE A convolutonal nterleaver conssts of T parallel lnes, wth dfferent delay n each lne that represents nterleaver perod [5]. In general, each successve lne has a delay whch s M symbols duratons hgher than the prevous lne. The structure for M= and T=3 s llustrated n Fgure 2. Fgure 2: Convolutonal nterleaver structure wth T=3 and M=. In a smlar manner to the trells termnaton technque (whch emts stored data from memores), an nserton of a certan number of zeros at the end of a data block can solate the nterleaved data block. Ths guarantees a data block of a specfc length and generates ndependent blocks of data for the RSC encoder. For the data length L=6 and the convolutonal nterleaver wth M= and T=3, the nterleaved data would be X 0 0 X4 X2 0 0 X5 X3 0 0 X6. Snce the applcaton of convolutonal nterleaver n turbo codes requres an nserton of stuff bts that reduces channel bandwdth usage, an optmsaton should be performed on the nterleaver to control the number of those bts, whch can be equal to the number of appled memores. For ths purpose one block s added after the nterleaver to control the data at the nterleaver output deletng extra zero stuff bts that are nserted at the end of each block. In ths case, the memory contents at the end of each block have zero value that stays tll the begnnng of the next block. Fgure 3 shows the structure of the optmsed convolutonal nterleaver. Followng the prevous example, the optmsed nterleaver output s: X 0 0 X4 X2 0 X5 X3 X6. Input data Fgure 3- Optmsed Convolutonal Interleaver. The same procedure can be repeated to obtan a second set of sutably nterleaved data for the second RSC encoder. More optmsaton can be done to the zero stuff bts nserton for the systematc and the frst party data after the trells termnaton procedure of the frst RSC encoder, as t s not necessary to transmt zero stuff bts n the mentoned data parts. However, these bts need to be consdered for the second RSC because of ther nfluence on the performance of the nterleaver. To verfy performance of the new convolutonal nterleaver and compare t to conventonally employed nterleaver such as rowcolumn nterleavers, the dstance parameter d ) of the turbo encoder of Fgure was ( calculated. Based on ths parameter, the Bt Error Rate (BER) for addtve whte Gaussan nose (AWG) can be expressed as: [0] E BER ω b erfc( d R ) () 2L where s the number of codeword wth weght d, ω s the average weght of the data sequences wth weght length, E Convolutonal Interleaver s the code rate. b 0 d Zero deleton 0 Interleaved data, L s the nterleaver s the sgnal to nose rato per bt and R In [] and [2] two dfferent algorthms for dstance computaton of turbo codes wth dfferent RSC encoder structures have
3 been proposed, whch are manly useful for large nterleaver sze. Fgure 4: Free dstance computaton algorthm Snce n UEP turbo codes technque nput data s segmented to shorter lengths, we can compute d from the defnton. Ths nvolves fndng a L codeword wth mnmum weght among 2 possble L codewords of length L. Among all 2 cases, only codewords that create low weghts have been consdered. Snce nput data are transferred drectly to the encoder output as systematc bts and puncturng s not performed on them, weght of the nput data corresponds to the weght nformaton part of codeword. It should be noted that the tal bts due to trells termnaton of the frst RSC are consdered as a part of the systematc data, whch affects the codeword weght. Algorthm starts d calculaton for all possble data streams of length L and mnmum weght,.e. one. Then, the correspondng codeword weghts are calculated. The obtaned mnmum weght from the frst codeword set s consdered as dstance at the frst step. In the next step, nput stream weght s ncreased by one unt,.e. stream wth weght of 2 at the second step, and ther dstance s computed. The mnmum d value among two relevant computed values s consdered as d at the end of second step. Agan, for the stream wth one unt d hgher weght,.e. weght 3 s computed and the mnmum d between prevous and current calculaton s selected. Ths procedure s contnued tll the computed dstance n the related step s less or equal to the weght of the current nput stream. The obtaned d at the end of the procedure s consdered as d of the turbo code. Fgure 4 shows the appled d =0, d_[0]=3 L =+ Compute d_ (d_[]) for all possble codewords wth weght of (W[]) d_[]=mn { d_[], d_[-] } Yes d_=d_[] d_[] < W[] computaton algorthm. o Based on the descrbed procedure, d has been calculated for the turbo codes mplemented by the structure presented n Fgure wth the rowcolumn and convolutonal nterleavers of the length of 6 and 64 and the rate of /3. The plot of the E b calculated BER versus for the mentoned nterleavers s presented n Fgure 5. For the low sgnal-to-nose rato (SR) the convolutonal nterleavers have better performance than the block ones. In order to mprove the performance for hgh SRs, nterleaver structure wth longer perod s suggested and dscussed n detals n the next secton. It should be noted that ncreasng the perod and data separaton ncreases the number of stuff bts whch can potentally reduce usage of the channel bandwdth. Data separaton nto shorter blocks has the same dsadvantage, too. Thus, ncreasng the perod and data separaton should be done n a reasonable way mnmsng the overhead but mantanng the advantages. Fgure 5: BER for convolutonal and block nterleaver szes of 6 and 64 wth rate: /3. 4. ITERLEAVER FOR UEQUAL ERROR PROTECTIO For turbo codes wth unequal error protecton, the fxed nterleaver perod s consdered for all levels, and, dependng on the requred protecton level, the length of the data block at each level s altered. As an example, we consder three protecton levels for data wth length of 2048 bts. Specfcatons of these levels have been presented n Table. We assume that 2048 bts are splt nto 5 groups. At the begnnng of each group, 64 bts of data are allocated the protecton level. Then, there are some blocks of length L=42 wth the protecton level 2, and the remanng blocks of length L=32 are allocated the protecton level 3. 0
4 Unequal error protecton s obtaned by puncturng encoded stream dfferently at dfferent protecton levels. Part Lev. (L=64) Lev.2 (L=42) Lev.3 (L=32) Table : Dstrbuton of 2048 bts nto three protecton levels. The nserton of stuff bts to clear the nterleaver memores affects the effectve code rates, of course. Therefore, the effectve code rate at each level can be calculated as: L R eff = R (2) L + S Where L, ( ) S denote lengths of data block and the k number of stuff bts, respectvely, whle R =, n =, 2, 3 s the code rate after puncturng at the relevant protecton level. Hence, for the code rates of /3,/2, and 2/3, because of bt stuffng, we get the effectve code rates of 0.32,0.47, and 0.6, n the consdered example (see Table ). In order to verfy UEP turbo codes performance, an average rate for the mentoned example s calculated. Wth employment of puncturng at each level, the average code rate can be calculated as [3]: c = av = c R (3) k R = k the nterleaver. Takng nto account the number of blocks and block lengths at each level, the average length s gven by: Where c = c L = (4) = L L and ; =, 2, 3 are the length of data block and the number of blocks at each level, respectvely. Hence, the average length of turbo encoder s L 4bts. Snce an nterleaver wth 3 lnes and 3 stuff bts has been consdered, the length of the average data per block s approxmately: L data 4 3 = 38 bts. Based on the presented d n Table 3 for data dstrbuton of Table, Fg.6 gves the BER performance of the turbo codes at dfferent levels of protecton. At level wth the lowest number of data bts, we expect that the protecton s better than at other levels. Ths happens for low SRs but at hgh SRs t s smlar to that of level 2. The level 2 protecton at low SRs has weaker performance than the overall performance of the code. Ths s caused by the multplcty of dstance n level 2 due to ts data length and the puncturng. Lev. Lev.2 Lev.3 Overall d ω Table 3- Free dstance specfcatons wth nserton of stuff bts after tal bts to the nterleaver. Where, c represents the number of levels. Based on the data n Table 2 the effectve aggregate rate s 2048 determned as: R eff av = Level Length (bts) Code rate Effectve Code rate 320 / / /3.6 Average Table2: Specfcaton of three protecton levels. A smlar calculaton can then be performed to obtan the specfcaton for average block length of Fgure 6: BER for UEP turbo codes wth the nterleaver of Fgure 2 and nserton of stuff bts after the tal bts. In order to remove degradatons n the mentoned parts of level and 2, ther dstances
5 should be ncreased. One soluton s to consder the effect of stuff bts n the systematc and the frst coded party data. In ths case, trells termnaton s Fgure 7: BER for UEP turbo codes wth the nterleaver of Fgure 2 and nserton of stuff bts before tal bts. done after the entry of stuff bts to the frst RSC encoder. In order to consder tal bts effect for the second RSC encoder and to avod changng of the nterleaver memory states, whch are n the reset condton, the tal bts are transferred through the frst lne of nterleaver that has no memory. Fgure 7 shows smulaton results for the dentcal data structure of prevous example to verfy performance of the new nterleaver based on relevant computed d n Table 4. Lev. Lev.2 Lev.3 Overall d ω Table 4- Free dstance specfcatons wth nserton of stuff bts before tal bts to the nterleaver. Another method (referred here to as method 2) of achevng UEP s to consder a varable perod nterleaver whch alters the number of stuff bts at dfferent levels. Fgure 8 shows a convolutonal nterleaver confgured accordng to ths method. In ths example, the number of blocks at each level s the same as that of Table. The data requrng the hghest protecton level (level ) s dstrbuted on 5 lnes of the nterleaver wth 6 stuff bts. Meanwhle, level 2 and 3 data are dstrbuted on 4 and 3 lnes of the nterleaver, respectvely. Level Level 3 Level 2 Fgure 8: Interleaver structure n method 2. Agan, two alternatve schemes usng the new structure,.e. nserton of stuff bts after or before the tal bts are consdered and ther smulaton results compared wth the fxed perod nterleaver for all the levels. Table 5 and Fgure 9 show the computed d and the performance for protecton levels when stuff bts are nserted after tal bts, respectvely. Consderng the dfferent stuff bts length of dfferent levels, average value of stuff bts for overall level has been calculated, whch approxmately equals 3. Lev. Lev.2 Lev.3 Overall d ω Table5- Free dstance specfcatons wth nserton of stuff bts after tal bts to the nterleaver. In ths scheme d n level 2 occurs multple tmes but ts performance at low SRs s equal to that of the overall performance of the code. Also at level, degradaton s observed at hgh SRs. Wth nserton of stuff bts before tal bts, an mprovement s obtaned at relevant protecton levels, as llustrated n Fgure 0. The resultng dstances have been presented n Table 6. In comparson wth the prevous method, level 2 has been mproved near to the level graph n Fgure 8 whle level protecton shows better performance than the other levels. Method 2 has mproved performance but at the expense of an ncrease n stuff bts and hence redundancy level. Thus, a compromse needs to be found between optmsaton of turbo code performance and the number of utlzed stuff bts. As one optmsaton, combnaton of two mentoned schemes s suggested. For nstance, n method 2 and level, we apply zero stuff bts nserton before tal bts to get more protecton. But n level 2 we nsert them after the tal bts that have acceptable behavour wth less redundancy. Also smulaton shows that the level 3 protecton performance of turbo codes n both sub-methods are dentcal, whch can be due to puncturng effect at short data length. Therefore, for ths level, format of stuff bts nserton after tal bts s recommended. 5. COCLUSIOS In ths paper, we proposed a technque, whch ntalzes convolutonal nterleaver memores by the nserton of stuff bts at the end data of blocks of specfc lengths. Ths process results n a sem-block
6 nterleaver structure for turbo codng. The performance of ths new structure has been compared wth that of conventonal block nterleavers and appled to unequal error protecton turbo codes. Two major methods were proposed and tested. In each method, two schemes dependng on nserton of stuff bts before or after the tal bts were nvestgated. The results show that a stuff bt nserton before the tal bts n the nterleaver wth varable perod wll produce the best performance. Further work wll consder fndng a sutable compromse between the turbo-code performance and the stuff-bt redundancy. REFERECES []- C.Beerrou, A.Glaveux, P.Thtmajshma, ear Shannon lmt error-correctng codng and decodng: turbo codes, ICC 993, pp , May 993. [2]- A.Barbulescu, S.S.Petrobon, Rate compatble turbo codes, IEE Electroncs letters, vol.3, no.7, pp , 30 th March 995. [3]- M.Salah,R.A.Ranes, A.Temple, T.G.Baley, A general nterleaver for equal and unequal error protectons of turbo codes wth short frames, Internatonal conference on nformaton technology: Codng and computng 2000, pp [4]- M.Grangetto, E.Magl, G.Olmo, Embeddng Unequal Error Protecton nto turbo codes, 35 th Aslomar conference on Sgnals, Systems and Computers, 200, vol., pp [5]- G.D.Forney, Burst-correctng codes for the classc bursty channel, IEEE Trans. Commun, vol.com-9, pp , Oct.97. Fgure 9: BER for UEP turbo codes wth nterleaver of Fgure 8 and nserton of stuff bts after tal bts. Lev. Lev.2 Lev.3 Overall d ω Table 6- Free dstance specfcatons wth nserton of stuff bts before tal bts to the nterleaver. [6]- S.Dolnar, D.Dvsalar, Weght dstrbutons for turbo codes usng random and non-random permutatons, TDA progress report 42-22, pp.56-65, Aug,5,995. [7]- E.K.Hall, G.Wlson, Stream-orented turbo codes, IEEE Trans Inform. Theory, vol.47, no.5, pp.83-83, July 200. [8]- S.Benedetto, G.Montors, Performance of contnuous and blockwse decoded turbo codes, IEEE trans. Letters, vol.,no.3, pp.77-79,may 997. [9]- M.Brellng,L.Hanzo, The super-trells structure of turbo codes, IEEE Trans. On nform.theory, vol.46,no.6,pp , Sep [0]-L.C.Perez, J.Seghers, D.J.Costello, A dstance spectrum nterpretaton of turbo codes, IEEE Trans Inform Theory,vol.42,pp , ov.996. []- J.Seghers, On the dstance of turbo codes and related product codes Fnal Rep. Dploma project ss95,no 663,Swss Federal Insttute of Technology, Zurch, Swtzerland,Aug Fgure 0: BER for UEP turbo codes wth nterleaver of Fgure 8 and nserton of stuff bts before tal bts. [2]-R.Garello, P.Perlen, S.Benedetto, Computng the dstance of turbo codes and serally concatenated codes wth nterleavers: Algorthms and applcatons, IEEE Journal on selected areas n commun., vol.9, no.5,may 200,pp
7 [3]-G.Care, E.Bgler, Parallel concatenated codes wth Unequal Error Protecton, IEEE Trans.Commun, vol.46, no.5, pp , May 998.
A Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationAn Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed
More informationRepeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits
Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationAn Entropy-Based Approach to Integrated Information Needs Assessment
Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology
More informationNOVEL CONSTRUCTION OF SHORT LENGTH LDPC CODES FOR SIMPLE DECODING
Journal of Theoretcal and Appled Informaton Technology 27 JATIT. All rghts reserved. www.jatt.org NOVEL CONSTRUCTION OF SHORT LENGTH LDPC CODES FOR SIMPLE DECODING Fatma A. Newagy, Yasmne A. Fahmy, and
More informationParallel matrix-vector multiplication
Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationEnhanced AMBTC for Image Compression using Block Classification and Interpolation
Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa
More informationImproving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky
Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationCluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More information[33]. As we have seen there are different algorithms for compressing the speech. The
49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationR s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes
SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges
More informationRADIX-10 PARALLEL DECIMAL MULTIPLIER
RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationPriority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks
Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,
More informationMallathahally, Bangalore, India 1 2
7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationFuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches
Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of
More informationARTICLE IN PRESS. Signal Processing: Image Communication
Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationAssignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.
Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton
More informationEfficient Broadcast Disks Program Construction in Asymmetric Communication Environments
Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationClassifying Acoustic Transient Signals Using Artificial Intelligence
Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationImproving The Test Quality for Scan-based BIST Using A General Test Application Scheme
_ Improvng The Test Qualty for can-based BIT Usng A General Test Applcaton cheme Huan-Chh Tsa Kwang-Tng Cheng udpta Bhawmk Department of ECE Bell Laboratores Unversty of Calforna Lucent Technologes anta
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationAn Image Compression Algorithm based on Wavelet Transform and LZW
An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationEnd-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video
End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationShape-adaptive DCT and Its Application in Region-based Image Coding
Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationA Frame Packing Mechanism Using PDO Communication Service within CANopen
28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The
More informationCHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION
24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and
More informationA New Token Allocation Algorithm for TCP Traffic in Diffserv Network
A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,
More informationTECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.
TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of
More informationFibre-Optic AWG-based Real-Time Networks
Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se
More informationProper Choice of Data Used for the Estimation of Datum Transformation Parameters
Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationSome Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.
Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationSkew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach
Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research
More informationClassification Based Mode Decisions for Video over Networks
Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4
More informationShared Running Buffer Based Proxy Caching of Streaming Sessions
Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More informationSpatially Coupled Repeat-Accumulate Coded Cooperation
Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationCollaboratively Regularized Nearest Points for Set Based Recognition
Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,
More informationParallel Inverse Halftoning by Look-Up Table (LUT) Partitioning
Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum
More informationOnline Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks
12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele
More informationAnalysis of Non-coherent Fault Trees Using Ternary Decision Diagrams
Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationSupport Vector Machines
/9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationFast Computation of Shortest Path for Visiting Segments in the Plane
Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationDesign of a High-Speed Asynchronous Turbo Decoder
Desgn of a Hgh-Speed Asynchronous Turbo Decoder Pana Golan Georgos D. Dmou, Malla Praash, Peter A. Beerel Department of Electrcal Engneerng-Systems Unversty of Southern Calforna, Los Angeles, CA 90089
More informationDynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication
Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons
More informationParallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations
Journal of Physcs: Conference Seres Parallel Branch and Bound Algorthm - A comparson between seral, OpenMP and MPI mplementatons To cte ths artcle: Luco Barreto and Mchael Bauer 2010 J. Phys.: Conf. Ser.
More informationDelay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks
Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network
More informationImperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments
Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationConfiguration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*
Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad
More informationAn efficient iterative source routing algorithm
An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu
More informationClassifier Selection Based on Data Complexity Measures *
Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.
More informationObstacle-Aware Routing Problem in. a Rectangular Mesh Network
Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department
More informationType-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data
Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES
More informationA Lossless Watermarking Scheme for Halftone Image Authentication
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationA Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics
A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany
More information