Convolutional interleaver for unequal error protection of turbo codes

Size: px
Start display at page:

Download "Convolutional interleaver for unequal error protection of turbo codes"

Transcription

1 Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa Abstract: Ths paper descrbes constructon of a convolutonal nterleaver as a block nterleaver and dscusses ts applcaton to turbo codes wth equal and unequal error protecton technques. Based on smulatons, dfferent convolutonal nterleaver structures sutable for turbo codes wth unequal error protecton capablty are suggested. Fnally, based on conducted smulatons the best method s selected. Keywords: Convolutonal nterleaver, Unequal error protecton, turbo codes.. ITRODUCTIO Compresson has become the norm n moble communcatons; currently speech domnates but vdeo and general multmeda compresson s fast becomng mportant. A vtal characterstc of a compressed data stream s the unequal perceptual mportance of the compressed parameters. In turn, ths leads to unequal effects of errors durng transmsson. Thus Unequal Error Protecton (UEP) has become an mportant part of desgn of channel encoders for multmeda content. Amongst the known channel codes, turbo codes have the hghest performance n drect bt error rate reducton terms. Turbo codes are produced by the parallel concatenaton of two or more convolutonal code generators separated by one or more nterleavers []. The reducton n BER resultng from such codes s drectly dependent on the desgn of a sutable nterleaver. In the lterature, several technques for mplementng UEP usng turbo codes have been proposed. In [2], sngle nterleaver for all levels and, n [3], one nterleaver for each level are suggested, whle [4] dscusses optmzaton of the sngle nterleaver soluton. The nterleavers suggested n [2-4] are from the block nterleaver famly. In a block nterleaver, data bts are wrtten nto the memory column-wse and read row-wse (or vce versa). Another type of the block nterleaver s a sem random nterleaver, where after fllng the whole nterleaver memores the bts are read n a sem random manner, not rowor column-wse. Both types of nterleavers are used wth turbo codes and the total delay at the end of nterleavng process s twce of the nput data length. The non-block nterleavers (such as the convolutonal nterleavers [5]) have better performance n terms of BER reducton durng turbo decodng process. Addtonally, they ntroduce a shorter delay, whch smplfes the de-nterleavng procedure. It s also mportant to note that convolutonal nterleaver performance s data dependent and that they allow for a contnuous operaton, whch s a vtal consderaton for turbo codes. In ths paper, we ntroduce method that returns the memores of appled convolutonal nterleaver to the known state at the end of each data block, resultng n the convolutonal nterleaver performng effectvely as a block nterleaver. Therefore, the nterleaved block-by-block data are ndependent from each other, whch enable to use the conventonal teratve decodng methods n the decoder. The organzaton of the paper s as follows: In Secton 2, the structure of turbo codes and the poston of the nterleaver are descrbed. In Secton 3, the performance of a new convolutonal nterleaver wth the calculaton of dstance parameter of turbo codes s presented. In Secton 4, some structures of nterleaver sutable for UEP n turbo codes are descrbed. Secton 5 concludes the paper. 2. TURBO CODES STRUCTURE Turbo encoders consst of two or more Recursve Systematc Convolutonal (RSC) encoders separated by one or more nterleavers. Fgure shows a turbo encoder (rate /3) structure wth two RSC encoders. Input data IT RSC encoder Systematc data Fgure : Turbo encoder structure Party data Party data 2

2 The nput and RSC coded data are referred to as systematc and party data, respectvely (see Fgure ). The nterleaver permutes the nput data pror to the second RSC encoder to generate dfferently encoded data compared wth the codeword of the frst RSC encoder [6]. If a trells termnaton or truncaton s performed on RSC encoders and block nterleaver s used, the turbo code performance can be evaluated as that of one block code (L(n+m), kl) where L, m and k/n represent the nterleaver length, the number of RSC encoder memores or encoder states, and the code rate, respectvely [6]. In ths paper, the trells termnaton s performed on the frst RSC encoder, whch returns ts memory contents to zero state, whle trells truncaton s performed on the second RSC encoder that leaves ts memory states open. As t has been shown n [7] wth an employment of convolutonal nterleavers, whch create less delay than block nterleavers and mantan synchronzaton between the nterleaver and denterleaver, turbo codes performance mproves. Moreover, utlzaton of the contnuous behavour n the stream-orented turbo codes s sutable for long data length wth RSC encoders havng hgh number of states [8-9]. In order to use the convolutonal nterleaver n turbo codes equvalent to a block code, the nterleaver memores should be reset at the end of each block to the specfc value to create segmented nterleaved data for the second RSC encoder. The new scheme can be used n turbo codes wth unequal error protecton property and the proposed technque s descrbed n the next sectons. 3. COVOLUTIOAL ITERLEAVER STRUCTURE A convolutonal nterleaver conssts of T parallel lnes, wth dfferent delay n each lne that represents nterleaver perod [5]. In general, each successve lne has a delay whch s M symbols duratons hgher than the prevous lne. The structure for M= and T=3 s llustrated n Fgure 2. Fgure 2: Convolutonal nterleaver structure wth T=3 and M=. In a smlar manner to the trells termnaton technque (whch emts stored data from memores), an nserton of a certan number of zeros at the end of a data block can solate the nterleaved data block. Ths guarantees a data block of a specfc length and generates ndependent blocks of data for the RSC encoder. For the data length L=6 and the convolutonal nterleaver wth M= and T=3, the nterleaved data would be X 0 0 X4 X2 0 0 X5 X3 0 0 X6. Snce the applcaton of convolutonal nterleaver n turbo codes requres an nserton of stuff bts that reduces channel bandwdth usage, an optmsaton should be performed on the nterleaver to control the number of those bts, whch can be equal to the number of appled memores. For ths purpose one block s added after the nterleaver to control the data at the nterleaver output deletng extra zero stuff bts that are nserted at the end of each block. In ths case, the memory contents at the end of each block have zero value that stays tll the begnnng of the next block. Fgure 3 shows the structure of the optmsed convolutonal nterleaver. Followng the prevous example, the optmsed nterleaver output s: X 0 0 X4 X2 0 X5 X3 X6. Input data Fgure 3- Optmsed Convolutonal Interleaver. The same procedure can be repeated to obtan a second set of sutably nterleaved data for the second RSC encoder. More optmsaton can be done to the zero stuff bts nserton for the systematc and the frst party data after the trells termnaton procedure of the frst RSC encoder, as t s not necessary to transmt zero stuff bts n the mentoned data parts. However, these bts need to be consdered for the second RSC because of ther nfluence on the performance of the nterleaver. To verfy performance of the new convolutonal nterleaver and compare t to conventonally employed nterleaver such as rowcolumn nterleavers, the dstance parameter d ) of the turbo encoder of Fgure was ( calculated. Based on ths parameter, the Bt Error Rate (BER) for addtve whte Gaussan nose (AWG) can be expressed as: [0] E BER ω b erfc( d R ) () 2L where s the number of codeword wth weght d, ω s the average weght of the data sequences wth weght length, E Convolutonal Interleaver s the code rate. b 0 d Zero deleton 0 Interleaved data, L s the nterleaver s the sgnal to nose rato per bt and R In [] and [2] two dfferent algorthms for dstance computaton of turbo codes wth dfferent RSC encoder structures have

3 been proposed, whch are manly useful for large nterleaver sze. Fgure 4: Free dstance computaton algorthm Snce n UEP turbo codes technque nput data s segmented to shorter lengths, we can compute d from the defnton. Ths nvolves fndng a L codeword wth mnmum weght among 2 possble L codewords of length L. Among all 2 cases, only codewords that create low weghts have been consdered. Snce nput data are transferred drectly to the encoder output as systematc bts and puncturng s not performed on them, weght of the nput data corresponds to the weght nformaton part of codeword. It should be noted that the tal bts due to trells termnaton of the frst RSC are consdered as a part of the systematc data, whch affects the codeword weght. Algorthm starts d calculaton for all possble data streams of length L and mnmum weght,.e. one. Then, the correspondng codeword weghts are calculated. The obtaned mnmum weght from the frst codeword set s consdered as dstance at the frst step. In the next step, nput stream weght s ncreased by one unt,.e. stream wth weght of 2 at the second step, and ther dstance s computed. The mnmum d value among two relevant computed values s consdered as d at the end of second step. Agan, for the stream wth one unt d hgher weght,.e. weght 3 s computed and the mnmum d between prevous and current calculaton s selected. Ths procedure s contnued tll the computed dstance n the related step s less or equal to the weght of the current nput stream. The obtaned d at the end of the procedure s consdered as d of the turbo code. Fgure 4 shows the appled d =0, d_[0]=3 L =+ Compute d_ (d_[]) for all possble codewords wth weght of (W[]) d_[]=mn { d_[], d_[-] } Yes d_=d_[] d_[] < W[] computaton algorthm. o Based on the descrbed procedure, d has been calculated for the turbo codes mplemented by the structure presented n Fgure wth the rowcolumn and convolutonal nterleavers of the length of 6 and 64 and the rate of /3. The plot of the E b calculated BER versus for the mentoned nterleavers s presented n Fgure 5. For the low sgnal-to-nose rato (SR) the convolutonal nterleavers have better performance than the block ones. In order to mprove the performance for hgh SRs, nterleaver structure wth longer perod s suggested and dscussed n detals n the next secton. It should be noted that ncreasng the perod and data separaton ncreases the number of stuff bts whch can potentally reduce usage of the channel bandwdth. Data separaton nto shorter blocks has the same dsadvantage, too. Thus, ncreasng the perod and data separaton should be done n a reasonable way mnmsng the overhead but mantanng the advantages. Fgure 5: BER for convolutonal and block nterleaver szes of 6 and 64 wth rate: /3. 4. ITERLEAVER FOR UEQUAL ERROR PROTECTIO For turbo codes wth unequal error protecton, the fxed nterleaver perod s consdered for all levels, and, dependng on the requred protecton level, the length of the data block at each level s altered. As an example, we consder three protecton levels for data wth length of 2048 bts. Specfcatons of these levels have been presented n Table. We assume that 2048 bts are splt nto 5 groups. At the begnnng of each group, 64 bts of data are allocated the protecton level. Then, there are some blocks of length L=42 wth the protecton level 2, and the remanng blocks of length L=32 are allocated the protecton level 3. 0

4 Unequal error protecton s obtaned by puncturng encoded stream dfferently at dfferent protecton levels. Part Lev. (L=64) Lev.2 (L=42) Lev.3 (L=32) Table : Dstrbuton of 2048 bts nto three protecton levels. The nserton of stuff bts to clear the nterleaver memores affects the effectve code rates, of course. Therefore, the effectve code rate at each level can be calculated as: L R eff = R (2) L + S Where L, ( ) S denote lengths of data block and the k number of stuff bts, respectvely, whle R =, n =, 2, 3 s the code rate after puncturng at the relevant protecton level. Hence, for the code rates of /3,/2, and 2/3, because of bt stuffng, we get the effectve code rates of 0.32,0.47, and 0.6, n the consdered example (see Table ). In order to verfy UEP turbo codes performance, an average rate for the mentoned example s calculated. Wth employment of puncturng at each level, the average code rate can be calculated as [3]: c = av = c R (3) k R = k the nterleaver. Takng nto account the number of blocks and block lengths at each level, the average length s gven by: Where c = c L = (4) = L L and ; =, 2, 3 are the length of data block and the number of blocks at each level, respectvely. Hence, the average length of turbo encoder s L 4bts. Snce an nterleaver wth 3 lnes and 3 stuff bts has been consdered, the length of the average data per block s approxmately: L data 4 3 = 38 bts. Based on the presented d n Table 3 for data dstrbuton of Table, Fg.6 gves the BER performance of the turbo codes at dfferent levels of protecton. At level wth the lowest number of data bts, we expect that the protecton s better than at other levels. Ths happens for low SRs but at hgh SRs t s smlar to that of level 2. The level 2 protecton at low SRs has weaker performance than the overall performance of the code. Ths s caused by the multplcty of dstance n level 2 due to ts data length and the puncturng. Lev. Lev.2 Lev.3 Overall d ω Table 3- Free dstance specfcatons wth nserton of stuff bts after tal bts to the nterleaver. Where, c represents the number of levels. Based on the data n Table 2 the effectve aggregate rate s 2048 determned as: R eff av = Level Length (bts) Code rate Effectve Code rate 320 / / /3.6 Average Table2: Specfcaton of three protecton levels. A smlar calculaton can then be performed to obtan the specfcaton for average block length of Fgure 6: BER for UEP turbo codes wth the nterleaver of Fgure 2 and nserton of stuff bts after the tal bts. In order to remove degradatons n the mentoned parts of level and 2, ther dstances

5 should be ncreased. One soluton s to consder the effect of stuff bts n the systematc and the frst coded party data. In ths case, trells termnaton s Fgure 7: BER for UEP turbo codes wth the nterleaver of Fgure 2 and nserton of stuff bts before tal bts. done after the entry of stuff bts to the frst RSC encoder. In order to consder tal bts effect for the second RSC encoder and to avod changng of the nterleaver memory states, whch are n the reset condton, the tal bts are transferred through the frst lne of nterleaver that has no memory. Fgure 7 shows smulaton results for the dentcal data structure of prevous example to verfy performance of the new nterleaver based on relevant computed d n Table 4. Lev. Lev.2 Lev.3 Overall d ω Table 4- Free dstance specfcatons wth nserton of stuff bts before tal bts to the nterleaver. Another method (referred here to as method 2) of achevng UEP s to consder a varable perod nterleaver whch alters the number of stuff bts at dfferent levels. Fgure 8 shows a convolutonal nterleaver confgured accordng to ths method. In ths example, the number of blocks at each level s the same as that of Table. The data requrng the hghest protecton level (level ) s dstrbuted on 5 lnes of the nterleaver wth 6 stuff bts. Meanwhle, level 2 and 3 data are dstrbuted on 4 and 3 lnes of the nterleaver, respectvely. Level Level 3 Level 2 Fgure 8: Interleaver structure n method 2. Agan, two alternatve schemes usng the new structure,.e. nserton of stuff bts after or before the tal bts are consdered and ther smulaton results compared wth the fxed perod nterleaver for all the levels. Table 5 and Fgure 9 show the computed d and the performance for protecton levels when stuff bts are nserted after tal bts, respectvely. Consderng the dfferent stuff bts length of dfferent levels, average value of stuff bts for overall level has been calculated, whch approxmately equals 3. Lev. Lev.2 Lev.3 Overall d ω Table5- Free dstance specfcatons wth nserton of stuff bts after tal bts to the nterleaver. In ths scheme d n level 2 occurs multple tmes but ts performance at low SRs s equal to that of the overall performance of the code. Also at level, degradaton s observed at hgh SRs. Wth nserton of stuff bts before tal bts, an mprovement s obtaned at relevant protecton levels, as llustrated n Fgure 0. The resultng dstances have been presented n Table 6. In comparson wth the prevous method, level 2 has been mproved near to the level graph n Fgure 8 whle level protecton shows better performance than the other levels. Method 2 has mproved performance but at the expense of an ncrease n stuff bts and hence redundancy level. Thus, a compromse needs to be found between optmsaton of turbo code performance and the number of utlzed stuff bts. As one optmsaton, combnaton of two mentoned schemes s suggested. For nstance, n method 2 and level, we apply zero stuff bts nserton before tal bts to get more protecton. But n level 2 we nsert them after the tal bts that have acceptable behavour wth less redundancy. Also smulaton shows that the level 3 protecton performance of turbo codes n both sub-methods are dentcal, whch can be due to puncturng effect at short data length. Therefore, for ths level, format of stuff bts nserton after tal bts s recommended. 5. COCLUSIOS In ths paper, we proposed a technque, whch ntalzes convolutonal nterleaver memores by the nserton of stuff bts at the end data of blocks of specfc lengths. Ths process results n a sem-block

6 nterleaver structure for turbo codng. The performance of ths new structure has been compared wth that of conventonal block nterleavers and appled to unequal error protecton turbo codes. Two major methods were proposed and tested. In each method, two schemes dependng on nserton of stuff bts before or after the tal bts were nvestgated. The results show that a stuff bt nserton before the tal bts n the nterleaver wth varable perod wll produce the best performance. Further work wll consder fndng a sutable compromse between the turbo-code performance and the stuff-bt redundancy. REFERECES []- C.Beerrou, A.Glaveux, P.Thtmajshma, ear Shannon lmt error-correctng codng and decodng: turbo codes, ICC 993, pp , May 993. [2]- A.Barbulescu, S.S.Petrobon, Rate compatble turbo codes, IEE Electroncs letters, vol.3, no.7, pp , 30 th March 995. [3]- M.Salah,R.A.Ranes, A.Temple, T.G.Baley, A general nterleaver for equal and unequal error protectons of turbo codes wth short frames, Internatonal conference on nformaton technology: Codng and computng 2000, pp [4]- M.Grangetto, E.Magl, G.Olmo, Embeddng Unequal Error Protecton nto turbo codes, 35 th Aslomar conference on Sgnals, Systems and Computers, 200, vol., pp [5]- G.D.Forney, Burst-correctng codes for the classc bursty channel, IEEE Trans. Commun, vol.com-9, pp , Oct.97. Fgure 9: BER for UEP turbo codes wth nterleaver of Fgure 8 and nserton of stuff bts after tal bts. Lev. Lev.2 Lev.3 Overall d ω Table 6- Free dstance specfcatons wth nserton of stuff bts before tal bts to the nterleaver. [6]- S.Dolnar, D.Dvsalar, Weght dstrbutons for turbo codes usng random and non-random permutatons, TDA progress report 42-22, pp.56-65, Aug,5,995. [7]- E.K.Hall, G.Wlson, Stream-orented turbo codes, IEEE Trans Inform. Theory, vol.47, no.5, pp.83-83, July 200. [8]- S.Benedetto, G.Montors, Performance of contnuous and blockwse decoded turbo codes, IEEE trans. Letters, vol.,no.3, pp.77-79,may 997. [9]- M.Brellng,L.Hanzo, The super-trells structure of turbo codes, IEEE Trans. On nform.theory, vol.46,no.6,pp , Sep [0]-L.C.Perez, J.Seghers, D.J.Costello, A dstance spectrum nterpretaton of turbo codes, IEEE Trans Inform Theory,vol.42,pp , ov.996. []- J.Seghers, On the dstance of turbo codes and related product codes Fnal Rep. Dploma project ss95,no 663,Swss Federal Insttute of Technology, Zurch, Swtzerland,Aug Fgure 0: BER for UEP turbo codes wth nterleaver of Fgure 8 and nserton of stuff bts before tal bts. [2]-R.Garello, P.Perlen, S.Benedetto, Computng the dstance of turbo codes and serally concatenated codes wth nterleavers: Algorthms and applcatons, IEEE Journal on selected areas n commun., vol.9, no.5,may 200,pp

7 [3]-G.Care, E.Bgler, Parallel concatenated codes wth Unequal Error Protecton, IEEE Trans.Commun, vol.46, no.5, pp , May 998.

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits

Repeater Insertion for Two-Terminal Nets in Three-Dimensional Integrated Circuits Repeater Inserton for Two-Termnal Nets n Three-Dmensonal Integrated Crcuts Hu Xu, Vasls F. Pavlds, and Govann De Mchel LSI - EPFL, CH-5, Swtzerland, {hu.xu,vasleos.pavlds,govann.demchel}@epfl.ch Abstract.

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

NOVEL CONSTRUCTION OF SHORT LENGTH LDPC CODES FOR SIMPLE DECODING

NOVEL CONSTRUCTION OF SHORT LENGTH LDPC CODES FOR SIMPLE DECODING Journal of Theoretcal and Appled Informaton Technology 27 JATIT. All rghts reserved. www.jatt.org NOVEL CONSTRUCTION OF SHORT LENGTH LDPC CODES FOR SIMPLE DECODING Fatma A. Newagy, Yasmne A. Fahmy, and

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

RADIX-10 PARALLEL DECIMAL MULTIPLIER

RADIX-10 PARALLEL DECIMAL MULTIPLIER RADIX-10 PARALLEL DECIMAL MULTIPLIER 1 MRUNALINI E. INGLE & 2 TEJASWINI PANSE 1&2 Electroncs Engneerng, Yeshwantrao Chavan College of Engneerng, Nagpur, Inda E-mal : mrunalngle@gmal.com, tejaswn.deshmukh@gmal.com

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Mallathahally, Bangalore, India 1 2

Mallathahally, Bangalore, India 1 2 7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments

Efficient Broadcast Disks Program Construction in Asymmetric Communication Environments Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Improving The Test Quality for Scan-based BIST Using A General Test Application Scheme

Improving The Test Quality for Scan-based BIST Using A General Test Application Scheme _ Improvng The Test Qualty for can-based BIT Usng A General Test Applcaton cheme Huan-Chh Tsa Kwang-Tng Cheng udpta Bhawmk Department of ECE Bell Laboratores Unversty of Calforna Lucent Technologes anta

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Positive Semi-definite Programming Localization in Wireless Sensor Networks

Positive Semi-definite Programming Localization in Wireless Sensor Networks Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research

Scheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information

Spatially Coupled Repeat-Accumulate Coded Cooperation

Spatially Coupled Repeat-Accumulate Coded Cooperation Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Collaboratively Regularized Nearest Points for Set Based Recognition

Collaboratively Regularized Nearest Points for Set Based Recognition Academc Center for Computng and Meda Studes, Kyoto Unversty Collaboratvely Regularzed Nearest Ponts for Set Based Recognton Yang Wu, Mchhko Mnoh, Masayuk Mukunok Kyoto Unversty 9/1/013 BMVC 013 @ Brstol,

More information

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning

Parallel Inverse Halftoning by Look-Up Table (LUT) Partitioning Parallel Inverse Halftonng by Look-Up Table (LUT) Parttonng Umar F. Sddq and Sadq M. Sat umar@ccse.kfupm.edu.sa, sadq@kfupm.edu.sa KFUPM Box: Department of Computer Engneerng, Kng Fahd Unversty of Petroleum

More information

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks

Online Policies for Opportunistic Virtual MISO Routing in Wireless Ad Hoc Networks 12 IEEE Wreless Communcatons and Networkng Conference: Moble and Wreless Networks Onlne Polces for Opportunstc Vrtual MISO Routng n Wreless Ad Hoc Networks Crstano Tapparello, Stefano Tomasn and Mchele

More information

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams

Analysis of Non-coherent Fault Trees Using Ternary Decision Diagrams Analyss of Non-coherent Fault Trees Usng Ternary Decson Dagrams Rasa Remenyte-Prescott Dep. of Aeronautcal and Automotve Engneerng Loughborough Unversty, Loughborough, LE11 3TU, England R.Remenyte-Prescott@lboro.ac.uk

More information

High-Boost Mesh Filtering for 3-D Shape Enhancement

High-Boost Mesh Filtering for 3-D Shape Enhancement Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Design of a High-Speed Asynchronous Turbo Decoder

Design of a High-Speed Asynchronous Turbo Decoder Desgn of a Hgh-Speed Asynchronous Turbo Decoder Pana Golan Georgos D. Dmou, Malla Praash, Peter A. Beerel Department of Electrcal Engneerng-Systems Unversty of Southern Calforna, Los Angeles, CA 90089

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Parallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations

Parallel Branch and Bound Algorithm - A comparison between serial, OpenMP and MPI implementations Journal of Physcs: Conference Seres Parallel Branch and Bound Algorthm - A comparson between seral, OpenMP and MPI mplementatons To cte ths artcle: Luco Barreto and Mchael Bauer 2010 J. Phys.: Conf. Ser.

More information

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks

Delay Variation Optimized Traffic Allocation Based on Network Calculus for Multi-path Routing in Wireless Mesh Networks Appl. Math. Inf. Sc. 7, No. 2L, 467-474 2013) 467 Appled Mathematcs & Informaton Scences An Internatonal Journal http://dx.do.org/10.12785/ams/072l13 Delay Varaton Optmzed Traffc Allocaton Based on Network

More information

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments

Imperialist Competitive Algorithm with Variable Parameters to Determine the Global Minimum of Functions with Several Arguments Fourth Internatonal Conference Modellng and Development of Intellgent Systems October 8 - November, 05 Lucan Blaga Unversty Sbu - Romana Imperalst Compettve Algorthm wth Varable Parameters to Determne

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations*

Configuration Management in Multi-Context Reconfigurable Systems for Simultaneous Performance and Power Optimizations* Confguraton Management n Mult-Context Reconfgurable Systems for Smultaneous Performance and Power Optmzatons* Rafael Maestre, Mlagros Fernandez Departamento de Arqutectura de Computadores y Automátca Unversdad

More information

An efficient iterative source routing algorithm

An efficient iterative source routing algorithm An effcent teratve source routng algorthm Gang Cheng Ye Tan Nrwan Ansar Advanced Networng Lab Department of Electrcal Computer Engneerng New Jersey Insttute of Technology Newar NJ 7 {gc yt Ansar}@ntedu

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network

Obstacle-Aware Routing Problem in. a Rectangular Mesh Network Appled Mathematcal Scences, Vol. 9, 015, no. 14, 653-663 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.1988/ams.015.411911 Obstacle-Aware Routng Problem n a Rectangular Mesh Network Norazah Adzhar Department

More information

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data

Type-2 Fuzzy Non-uniform Rational B-spline Model with Type-2 Fuzzy Data Malaysan Journal of Mathematcal Scences 11(S) Aprl : 35 46 (2017) Specal Issue: The 2nd Internatonal Conference and Workshop on Mathematcal Analyss (ICWOMA 2016) MALAYSIAN JOURNAL OF MATHEMATICAL SCIENCES

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics

A Hybrid Genetic Algorithm for Routing Optimization in IP Networks Utilizing Bandwidth and Delay Metrics A Hybrd Genetc Algorthm for Routng Optmzaton n IP Networks Utlzng Bandwdth and Delay Metrcs Anton Redl Insttute of Communcaton Networks, Munch Unversty of Technology, Arcsstr. 21, 80290 Munch, Germany

More information