A New Finite Word-length Optimization Method Design for LDPC Decoder
|
|
- Simon Parks
- 5 years ago
- Views:
Transcription
1 A New Finite Wod-length Optimization Method Design fo LDPC Decode Jinlei Chen, Yan Zhang and Xu Wang Key Laboatoy of Netwok Oiented Intelligent Computation Shenzhen Gaduate School, Habin Institute of Technology HIT Campus of Shenzhen Univesity Town, Shenzhen, China Abstact: -A new wod-length optimization method based on Monte Calo simulation is poposed. The wodlength of the check node extinsic message is also futhe optimized in this pape. In the poposed optimization method, and in the pocess of optimizing the wod-length of the channel data, the statistical distibution esults of vaiable node s posteio pobability data and check node s extinsic message ae also obtained. The optimized wod-length of vaiable node s posteio pobability data and check node s extinsic message is concluded by the statistical distibution esult and the BER (Bit Eo Rate) cuves. Compaed to the pue Monte Calo simulation, the poposed method could educe the amount of simulation wok by moe than 50%, and have the same wod-length optimization esults. Key-Wods: - LDPC decode, wod-length optimization, Monte Calo simulation, min-sum. 1 Intoduction Low density paity check (LDPC) code was fist poposed by Gallage in 1960 [1], and it was ediscoveed by MacKay and Neal in 1996 [2]. Due to the excellent decoding pefomance, LDPC code has been widely used in many communication systems, such as wieless local aea netwok (802.11n) [3], digital video boadcasting second geneation (DVB-S2) [4] and wold inteopeability fo micowave access (802.16e) [5-6]. Punctued LDPC codes used in coheent optical OFDM systems is also studied in [7]. Belief-popagation (BP), o called sum-poduct [2], is one of the best LDPC decoding algoithms, but it is not suitable fo hadwae implementation because of the exponent computation. Min-sum algoithm [8], which decodes LDPC only by compaisons and additions, simplifies the decoding pocess geatly with acceptable decoding pefomance loss. Modified min-sum algoithms wee poposed in [9-11], nomalized facto and offset facto ae used to get a bette pefomance in decoding. Layeed decoding method was poposed in [12]. Check node and vaiable node ae both updated simultaneously in this method to educe the decoding latency half without pefomance loss. In [13], a fast-convegence algoithm using layeed decoding was poposed and about 1/6 iteation numbes deceased fo LDPC codes used in DVB- S2. The finite wod-length (o the quantization scheme) of the data deeply affects the decoding pefomance and the total aea of the LDPC decode in hadwae implementation. So the finite wodlength optimization method should be able to balance between the decoding pefomance and the complexity of the LDPC decode. Monte Calo simulation method is a widely used method in finite wod-length optimization [14]. In LDPC decoding simulation, andom numbes ae used as the message bits of the code wod in LDPC codes simulation. These andom numbes, geneated by a pseudo andom numbe algoithm, ae independent and equally likely to be 0 o 1. BER (Bit Eo Rate) is used to measue the LDPC decoding pefomance ove vaious finite wodlengths. The expected BER is always below 10-6 in LDPC decoding, so it costs a long time to obtain the finite wod-length of all the tems by using Monte Calo simulation method. In this pape, we poposed a new finite wod-length optimization method. In this method, the finite wod-length of channel message is obtained by Monte Calo simulation, and the finite wod-length of othe messages ae obtained by the statistical distibution esults in Monte Calo simulation. The poposed method saves the E-ISSN: Issue 4, Volume 12, Apil 2013
2 simulation wok moe than 50% to obtain the same esults compaed to the oiginal Monte Calo simulation method. The est of this pape is oganized as follows. Section 2 descibes the LDPC decoding algoithm, nomalized min-sum algoithm and off-set min-sum algoithm. Layeed decoding scheme, wod-length of fix-point data and Monte Calo Simulation method ae also discussed in this section. Section 3 poposes a new wod-length optimization method. Section 4 poposes the method to futhe optimize the wod-length of the check node extinsic message. Simulations esults and discussions ae given in section 5. Section 6 concludes the pape. 2 Backgound 2.1 Min-Sum Algoithm Min-sum algoithm is one of the most popula appoaches of BP [9], and it educes the hadwae complexity geatly. Both nomalized min-sum and offset min-sum algoithm ae based on the min-sum algoithm. Min-sum algoithm is expessed as follows: At the beginning of decoding, all vaiable node messages q ae installed by (4). In each iteation, i (1), (2) and (3) ae pocessed seially, and a guess of the codewod is obtained by the sign of (0 fo 0, 1 fo 0) in (3), if the codewod fits all the paity check o the iteation exceeds the pedefined maximum iteation time, the decoding stops. 2.2 Modified min-sum Decoding Algoithm Although it is easy to implement the min-sum algoithm, it esults in degadation in decoding pefomance. Both nomalized min-sum and offset min-sum ae modified vesions of the min-sum algoithm, the fist one with a nomalized facto and the second with an additive coection facto, and these algoithms achieve almost the same pefomance as that of the BP algoithm. In the nomalized min-sum algoithm, check node updating opeation uses nomalization constant smalle than 1, and (1) is changed to: i a min q (5) V \ i V \ i i ' i a min q (1) V \ i V \ i i ' In offset min-sum algoithm, the check node updating opeation is given as follows: In (1), q i LLR LLR ' C i \ ' C i ' i (2) ' i (3) P( x 0 y) LLR log (4) P( x 1 y) i is the check-to-vaiable message passed fom check node i to vaiable node, q is the vaiable-to-check message passed fom vaiable node to check node i ', a is the sign of q, V \ i is the set of the vaiable nodes which connect to check node without node i, in (2), C \ is the set of the check nodes which connect to i vaiable node i without check node, in (3), is the log likelihood atio (LLR) fo vaiable node, C i is the set of all the check nodes which connect to vaiable node i, in (4), x is the tansmitted bit and y is the message eceived fom channel. i V \ i a max (6) min q, 0 V \ i In (5) and (6), both coection factos ae used to decease the magnitude of i, and thei pefomance is analyzed in [12]. Compaed to offset min-sum, nomalized min-sum algoithm has bette decoding pefomance but the multiplication inceases the implementation complexity. In this pape, nomalized min-sum algoithm is used in the poposed LDPC decode. 2.3 Layeed Decoding Scheme In layeed decoding scheme, the paity check matix can be viewed as hoizontal layes, and each laye can epesent a component code [13]. The code is composed of all layes and thei intesections. In C-LDPC code, the ows and columns ae natually blocked by the pemutation matix, so each block ow can be indicated as a laye. As each laye stats decoding, the inputs of vaiable node contain channel inputs and the extinsic messages of the check nodes fom the pevious layes. Iteations within a laye ae called sub-iteations and the oveall pocess is labelled as supe-iteations. E-ISSN: Issue 4, Volume 12, Apil 2013
3 In each sub-iteation, the vaiable-to-check message q is fistly computed by: ' i q i ' ' ' (7) Whee i ' is the check-to-vaiable message in the pevious supe-iteation of this laye, and ' is the LLR esult of vaiable node fom the pevious sub iteation. The i ' is computed by (1) o (5) o (6), and is computed by: i i q ' (8) When supe-iteation is finished, The codewod is obtained by the sign of. In geneal, the decoding convegence speed of the layeed decoding scheme is two times faste than that of the two-phase scheme, and in layeed decoding, only and i ae stoed in memoies because the vaiable-to-check message computed by (7). 2.4 Wod-length of Fix-point Data i q i ae The diffeence of fix-point data and floating-point data is that fo fix-point data, the position of the decimal point is fixed. The wod-length of intege pat and the faction pat ae constant. Fo fix-point data, we have: WL IWL FWL WL is the wod-length of the fix-point data, IWL is the wod-length of the intege pat, FWL is the wod-length of the faction pat. A signed numbe is always expessed by two s complement fom, in this case, IWL contains a sign bit: 0 fo positive numbe, 1 fo negative numbe, and in this case: WL IWL FWL 1 So the ange of the signed fix-point data is IWL IWL FWL [ 2, 2 2 ], the pecision of the data is 2 FWL. In LDPC decode hadwae implementation, we use the notation ( WL : FWL ) to epesent a quantization scheme. As intoduced peviously, WL bits ae used fo total bit size and FWL bits ae used fo factional values. 2.5 Monte Calo Simulation Method The quantization scheme of LLR significantly affects the decoding pefomance and the total decode complexity, and the wod-length of othe tems in the decoding algoithm ae also depended on it, so the quantization scheme of LLR should be detemined fistly. Though lage wod-length has good decoding pefomance, it causes hadwae ovehead fo the buffes and a lage numbe of hadwae fo the iteative decoding computation. A small wod length may esult in vey poo pefomance. Hence, the quantization scheme should balance the decoding pefomance and the hadwae complexity. Thee ae two steps in Monte Calo simulation method. Fist, the quantization scheme of channel message is obtained. Second, in two-phase decoding scheme, the finite wod-length of extinsic message of check node and vaiable node ae obtained. In layeed decoding scheme, the finite wod-lengths of vaiable node message and the extinsic message of check node ae obtained sequentially. In [15-17], the wod-lengths of vaiable node message and the extinsic message of check node ae equal. 3 An Impoved Wod-length Optimization Method In LDPC decoding, the expected BER is always below 10-6, and that means 10 8 message bits should be tansmitted in Monte Calo simulation. It will cost seveal days to obtain the quantization scheme of all the tems using Monte Calo method. In the poposed method, days of time will be saved because of moe than half Monte Calo simulations ae omitted. The poposed finite wod-length optimization method is expessed as follows: Step 1, the quantization scheme of channel message is obtained using Monte Calo simulation. Meanwhile, the statistical distibution esult of vaiable node s posteio pobability message is also obtained. Step 2, by analyzing the statistical distibution esult, the quantization scheme of is achieved. At last, the wod-length of i equals to the wodlength of. This method could be used in any min-sum based decoding algoithm. E-ISSN: Issue 4, Volume 12, Apil 2013
4 4 Futhe Wod-length Optimization of the Check Node Extinsic Message In layeed decoding scheme, only i is stoed in the extinsic memoy. So the wod-length of i deeply affects the aea of the decode. In [15-17], the wodlengths of i and ae equal. But in min-sum based LDPC decoding algoithm, as function (1) shows, the check node extinsic message i is the minimum value of the input messages q. So thee i ' is a chance that the wod-length of i could be futhe optimized. In this section, we popose methods to futhe optimize the wod-length of both in Monte Calo method and the poposed i method. 4.1 In Monte Calo Method Let LLR and use the quantization scheme obtained in Monte Calo simulation method as intoduced in section 2.5. The appopiate wodlength of i is obtained by analyzing BER cuves of i with vaious wod-length. Moe Monte Calo simulations ae needed in the wod-length optimization pocess of i, and that means moe time is needed in Monte Calo simulation method to obtain the quantization scheme of all the tems. 4.2 In the Impoved Optimization Method In the impoved method, the pocess of optimizing the wod-length of i is simila as the pocess of. The statistical distibution esult of i is obtained in step 1, and the esult is used to choose the appopiate wod-length of i. In the poposed method, the pocess of optimizing the wod-length of i doesn t bing in any exta Monte Calo simulation, so the time of optimizing the wod-length of all the tems is nealy the same as in section 3. 5 Simulations and Discussions 5.1 Monte Calo Method In this section, we use layeed offset min-sum algoithm as the decoding algoithm, all the BER cuves ae obtained by tansmitted 100,000 code wods, the max iteation numbe is 50, the modulation method is BPSK and the channel module is AWGN. BER esults ove Monte Calo Simulation ae used to compae the diffeent pefomance of vaious quantization scheme of LLR, and i. The pefomances of the (1944, 972) LDPC code in IEEE n with floating point, (7:4), (6:3) and (5:2) quantization schemes of LLR ae shown in Fig. 1. It shows that (7:4) quantization scheme has the best pefomance of the thee fix-point quantization schemes, and the diffeence of decoding pefomance between (7:4) and (6:3) quantization scheme is less than 0.05dB. The (5:2) quantization scheme has the wost decoding pefomance. Thus it tuns out that using the (6:3) scheme of LLR seems to be the optimal tadeoff between hadwae complexity and decoding pefomance. This quantization scheme has a 3 pecision of with a maximum value of and a minimum value of 2 4. Let LLR use the (6:3) quantization scheme, the decoding pefomances of the (1944, 972) LDPC code in IEEE n with vaious wod-length of (which is denote by W ) ae shown in Fig. 2. As shown in Fig. 2, W 9 has nealy the same pefomance as W, and when W 8, the BER cuve has an eo floo at So at last, we choose W 9. The pecision of is the same as that of LLR. Let LLR use (6:3) quantization scheme, uses (9:3) quantization scheme, the decoding pefomances of the (1944, 972) LDPC code in IEEE n with vaious wod-length of i ae shown in Fig. 3. When W 7, the BER cuves is coincide with the cuve of W, and thee is only little diffeence between W 6 and W 7. Fo example, when SNR=1.9dB, BER of W 7 is , and BER of W 6is But the diffeence between W 5 and W 6 is quite significant. So at last, we choose W 6. And the pecision of i is also the same as that of LLR. E-ISSN: Issue 4, Volume 12, Apil 2013
5 Figue 1. BER Cuves of LLR unde Layeed Offset Min-Sum Algoithm with Diffeent uantization scheme. Figue 2. BER Cuves of unde Layeed Offset Min-Sum Algoithm with Diffeent uantization E-ISSN: Issue 4, Volume 12, Apil 2013
6 Figue 3. BER Cuves of i unde Layeed Offset Min-Sum Algoithm with Diffeent uantization Table 1: uantization Scheme of Offset Min-Sum Decoding Algoithm Message uantization scheme Range Pecision LLR (6:3) (-4, 3.875) (9:3) (-32, ) (6:3) (-4, 3.875) i The quantization scheme of all the tems in offset min-sum algoithm is summaized in table 1. In [15-17], the wod-length of i would be the same as, so in the poposed method, the wod-length is futhe optimized by 1/ The Impoved Optimization Method We also use the example in 5.1. The statistical distibution esult of and i in the simulation of Fig. 1 is shown in Fig. 4 and Fig. 5. The assumed SNR of AWGN channel is 1.9dB, and in this case, the aveage iteation is In Fig. 4 and Fig. 5, the x-axis data is quantized. Fo example, the numbe 5 in x-axis equals to As shown in Fig. 4, the distibution ange of inceases as the iteations incease, and most values of is in the ange of (-256, 256), so the quantization scheme of is (9:3). Fom Fig. 4, we can see that the aea of the cuves decease as the iteations incease. It means the amount of deceases with the iteations, and that because in each iteation, many code wods ae decoded, and the numbe of un-decoded codes deceases with the inceasing of iteations. Fom Fig. 4, we can also see that the statistical distibution cuve of the channel input data LLR is the supeposition of two Gauss cuves, and the symmety axis of the two cuves ae x 8 and x 8. That because in the simulation, the modulation system is BPSK, and in BPSK, bit 0 is changed to -1, and bit 1 is unchanged, and the channel module in the simulation is AWGN, the data eceived at each time is equal to the sent data plus Gaussian noise, so the statistical distibution cuve of LLR is the supeposition of two Gauss E-ISSN: Issue 4, Volume 12, Apil 2013
7 Figue 4 Statistical Distibution of Figue 5 Statistical Distibution of i Figue 6. BER Cuves of unde Layeed Offset Min-Sum Algoithm with Diffeent uantization E-ISSN: Issue 4, Volume 12, Apil 2013
8 Figue 6. BER Cuves of unde Layeed Offset Min-Sum Algoithm with Diffeent uantization cuves. The quantization scheme of LLR is (6:3), so the symmety axis of the two cuves ae x 8 and x 8. As shown in Fig. 5, the distibution ange of i inceases with the iteations, and most values of i is in the ange of (-32, 32), so the quantization scheme of i is (6:3). In Fig. 5, thee is a wave cest aound 0 in the statistical distibution cuve of the fist iteation, and the cest disappeas as the iteations incease. That because in the fist few iteations, the signs of many ae uncetain o the eliabilities of ae small, and fom function (1), we can conclude that in the fist few iteations, most values of i ae aound 0. When the numbe of iteations inceases, moe codewod is decoded, and fo the un-decoded codewod, the eliability of and the ange of i would inceases. So the wave cest aound 0 disappeas with iteations. Fig. 6 shows the decoding pefomance of the (1944, 972) LDPC code in IEEE n with floating-point and the final quantization scheme. It is shown that the decoding pefomance loss using the poposed quantization scheme compaed with floating point is less than 0.1dB. In this example, by using Monte Calo method, 12 BER cuves ae needed to obtain the final quantization scheme. In the impoved finite wodlength optimization method, only 3 BER cuves and 2 statistical distibution cuves ae needed. So in this example, the impoved finite wod-length optimization method educes the simulation wok by 75%. Geneally speaking, in Monte Calo simulation method, fo layeed decoding scheme, at least 9 BER cuves ae needed to obtain the final quantization scheme (3 cuves fo LLR, 3 cuves fo and 3 cuves fo i ), fo two-phase decoding scheme, at least 6 BER cuves ae needed to obtain the final quantization scheme(3 cuves fo LLR and 3 cuves fo the extinsic messages of vaiable nodes). In the poposed finite wod-length optimization method, only 3 BER cuves ae needed to obtain the final quantization scheme fo both layeed decoding scheme and two-phase decoding scheme. So the poposed method can educe the simulation wok by moe than 50% 6 Conclusion In this pape, we poposed a new wod-length optimization method and futhe optimized the wod-length of the check node extinsic message. In E-ISSN: Issue 4, Volume 12, Apil 2013
9 the poposed method, the wod-length of vaiable node s posteio pobability data and check node s extinsic message is concluded by the statistical distibution esult and the BER (Bit Eo Rate) cuves. Compaed to the pue Monte Calo simulation, the poposed method could educe the amount of simulation wok by at least 50%, and has the same esults. Refeences: [1] R.G.Gallage, Low-density paity-check codes, IEEE Tansactions on Infomation Theoy, Jan.1962, pp [2] D. J. C. MacKay and R. M. Neal, Nea Shannon limit pefomance of low-density paity-check codes, Electonic Lette, vol. 32, Aug 1996, pp [3] IEEE Std n-2009, Wieless LAN Medium Access Contol (MAC) and Physical Laye (PHY) Specifications: Enhancements fo Highe Thoughput, IEEE P802.11n, Sep [4] Digital video boadcasting (DVB); Second geneation faming stuctue, channel coding and modulation systems fo boadcasting, inteactive sevices, news gatheing and othe boad-band satellite applications, ETSI, EN V1. 1.1, [5] IEEE Std e, Ai Inteface fo Fixed and Mobile Boadband Wieless Access Systems, IEEE P802.16e, Feb [6] M. Khan, R. Caasco and I. Wassell, application of high ate LDPC codes fo IEEE d o WiMAX (fixed boadband) systems, WSEAS Tansactions on Communications, vol. 6, iss. 1, Jan. 2007, pp [7] J. Chang, K. Takeshi, F. Hisato and H. Kazuhisa, Influence of lase linewidth and modulation level fo coheent optical OFDM with punctued LDPC codes, WSEAS Tansactions on Communications, vol. 10, iss. 6, pp [8] J. Chen and M. P. C. Fossoie, Nea optimum univesal belief popagation based decoding of low-density paity check codes, IEEE Tansactions on Communications, vol. 50, Ma. 2002, pp [9] J. Chen and M. P. C. Fossoie, Decoding lowdensity paity-check codes with nomalized APP-based algoithm, Poceedings of IEEE Globecom, San Antonio, TX, Nov. 2001, pp [10] E. Eleftheiou, T. Mittelholze, A. Dholakia, Reduced-complexity decoding algoithm fo low-density paity-check codes, IEEE Electonic Lettes, vol. 37, Jan. 2001, pp [11] M.P.C. Fossoie, M. Mihalevic, H. Imai, Reduced complexity iteative decoding of low density paity check codes based on belief popagation, IEEE Tansactions on Communications, vol. 47, no. 5, May 1999, pp [12] D.E. Hoceva, A Reduced Complexity Decode Achitectue via Layeed Decoding of LDPC Codes, IEEE wokshop on Signal Pocessing Systems, Oct. 2004, pp: [13] J. Xie, L. Yin, N. Ge and J. Lu, Fast Convegence Algoithm fo Decoding of Low Density Paity Check Codes, WSEAS Tansactions on Communications, volume.8, issue7, July 2009, pp [14] N. Metopolis, S. Ulam, The Monte Calo Method, Jounal of the Ameican Statistical Association, vol. 44, no. 247, pp [15] V. K. K. Sinivasan, C. K. Singh, P. T. Balsaa, A Geneic Scalable Achitectue fo Min- Sum/Offset-Min-Sum Unit fo Iegula/Regula LDPC Decode, IEEE Tansactions on VLSI, vol. 18, no. 9, Aug., 2010, pp [16] T. C. Kuo, A. N. Willson, A flexible Decode IC fo WiMAX C-LDPC Codes, IEEE Intenational Confeence on Custom Integated Cicuits, Sept. 2008, pp [17] C. H. Liu, S. W. Yen, C. L. Chen and H. C. Chang, An LDPC Decode Chip Based on Self- Routing Netwok fo IEEE e Applications, IEEE Jounal of Solid-State Cicuits, vol. 43, n. 3, Ma. 2008, pp E-ISSN: Issue 4, Volume 12, Apil 2013
10 Biogaphies Jinlei Chen bon in He eceived the B.S. degee fom Jilin Univesity in micoelectonics in 2005 and M.S. degee in micoelectonics fom the Shenzhen Gaduate School, Habin Institute of Technology, Shenzhen, China, in Since 2008, he has been a PhD candidate in micoelectonics. His main eseach inteests include LDPC codes and VLSI hadwae design. Yan Zhang bon in He has been pofesso of the Shenzhen Gaduate School, Habin Institute of Technology since His main eseach inteests ae application specific instuction set pocesso design, including medical image pocessing chips and wieless communication baseband chip. Wang Xu bon in Received the M.A s. degees in micoelectonics fom the Shenzhen Gaduate School, Habin Institute of Technology, Shenzhen, China, in Since 2008, he has been a PhD candidate in micoelectonics. His main eseach inteests include image pocessing and embedded DSP pocesso design. E-ISSN: Issue 4, Volume 12, Apil 2013
IP Network Design by Modified Branch Exchange Method
Received: June 7, 207 98 IP Netwok Design by Modified Banch Method Kaiat Jaoenat Natchamol Sichumoenattana 2* Faculty of Engineeing at Kamphaeng Saen, Kasetsat Univesity, Thailand 2 Faculty of Management
More informationControlled Information Maximization for SOM Knowledge Induced Learning
3 Int'l Conf. Atificial Intelligence ICAI'5 Contolled Infomation Maximization fo SOM Knowledge Induced Leaning Ryotao Kamimua IT Education Cente and Gaduate School of Science and Technology, Tokai Univeisity
More informationJournal of World s Electrical Engineering and Technology J. World. Elect. Eng. Tech. 1(1): 12-16, 2012
2011, Scienceline Publication www.science-line.com Jounal of Wold s Electical Engineeing and Technology J. Wold. Elect. Eng. Tech. 1(1): 12-16, 2012 JWEET An Efficient Algoithm fo Lip Segmentation in Colo
More informationSegmentation of Casting Defects in X-Ray Images Based on Fractal Dimension
17th Wold Confeence on Nondestuctive Testing, 25-28 Oct 2008, Shanghai, China Segmentation of Casting Defects in X-Ray Images Based on Factal Dimension Jue WANG 1, Xiaoqin HOU 2, Yufang CAI 3 ICT Reseach
More informationANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS
ANALYTIC PERFORMANCE MODELS FOR SINGLE CLASS AND MULTIPLE CLASS MULTITHREADED SOFTWARE SERVERS Daniel A Menascé Mohamed N Bennani Dept of Compute Science Oacle, Inc Geoge Mason Univesity 1211 SW Fifth
More informationSlotted Random Access Protocol with Dynamic Transmission Probability Control in CDMA System
Slotted Random Access Potocol with Dynamic Tansmission Pobability Contol in CDMA System Intaek Lim 1 1 Depatment of Embedded Softwae, Busan Univesity of Foeign Studies, itlim@bufs.ac.k Abstact In packet
More informationOptical Flow for Large Motion Using Gradient Technique
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 3, No. 1, June 2006, 103-113 Optical Flow fo Lage Motion Using Gadient Technique Md. Moshaof Hossain Sake 1, Kamal Bechkoum 2, K.K. Islam 1 Abstact: In this
More informationHigh performance CUDA based CNN image processor
High pefomance UDA based NN image pocesso GEORGE VALENTIN STOIA, RADU DOGARU, ELENA RISTINA STOIA Depatment of Applied Electonics and Infomation Engineeing Univesity Politehnica of Buchaest -3, Iuliu Maniu
More informationImage Enhancement in the Spatial Domain. Spatial Domain
8-- Spatial Domain Image Enhancement in the Spatial Domain What is spatial domain The space whee all pixels fom an image In spatial domain we can epesent an image by f( whee x and y ae coodinates along
More informationAn Unsupervised Segmentation Framework For Texture Image Queries
An Unsupevised Segmentation Famewok Fo Textue Image Queies Shu-Ching Chen Distibuted Multimedia Infomation System Laboatoy School of Compute Science Floida Intenational Univesity Miami, FL 33199, USA chens@cs.fiu.edu
More informationAdaptation of TDMA Parameters Based on Network Conditions
Adaptation of TDMA Paametes Based on Netwok Conditions Boa Kaaoglu Dept. of Elect. and Compute Eng. Univesity of Rocheste Rocheste, NY 14627 Email: kaaoglu@ece.ocheste.edu Tolga Numanoglu Dept. of Elect.
More informationSpiral Recognition Methodology and Its Application for Recognition of Chinese Bank Checks
Spial Recognition Methodology and Its Application fo Recognition of Chinese Bank Checks Hanshen Tang 1, Emmanuel Augustin 2, Ching Y. Suen 1, Olivie Baet 2, Mohamed Cheiet 3 1 Cente fo Patten Recognition
More informationPerformance Optimization in Structured Wireless Sensor Networks
5 The Intenational Aab Jounal of Infomation Technology, Vol. 6, o. 5, ovembe 9 Pefomance Optimization in Stuctued Wieless Senso etwoks Amine Moussa and Hoda Maalouf Compute Science Depatment, ote Dame
More informationColor Correction Using 3D Multiview Geometry
Colo Coection Using 3D Multiview Geomety Dong-Won Shin and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 13 Cheomdan-gwagio, Buk-ku, Gwangju 500-71, Republic of Koea ABSTRACT Recently,
More informationDesign of a Quasi-Cyclic LDPC Decoder Using Generic Data Packing Scheme
Design of a Quasi-Cyclic LDPC Decoder Using Generic Data Packing Scheme Jinlei Chen, Yan Zhang and Xu Wang Key Laboratory of Network Oriented Intelligent Computation Shenzhen Graduate School, Harbin Institute
More informationSYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH
I J C A 7(), 202 pp. 49-53 SYSTEM LEVEL REUSE METRICS FOR OBJECT ORIENTED SOFTWARE : AN ALTERNATIVE APPROACH Sushil Goel and 2 Rajesh Vema Associate Pofesso, Depatment of Compute Science, Dyal Singh College,
More informationA Memory Efficient Array Architecture for Real-Time Motion Estimation
A Memoy Efficient Aay Achitectue fo Real-Time Motion Estimation Vasily G. Moshnyaga and Keikichi Tamau Depatment of Electonics & Communication, Kyoto Univesity Sakyo-ku, Yoshida-Honmachi, Kyoto 66-1, JAPAN
More informationTitle. Author(s)NOMURA, K.; MOROOKA, S. Issue Date Doc URL. Type. Note. File Information
Title CALCULATION FORMULA FOR A MAXIMUM BENDING MOMENT AND THE TRIANGULAR SLAB WITH CONSIDERING EFFECT OF SUPPO UNIFORM LOAD Autho(s)NOMURA, K.; MOROOKA, S. Issue Date 2013-09-11 Doc URL http://hdl.handle.net/2115/54220
More informationANN Models for Coplanar Strip Line Analysis and Synthesis
200 IJCSNS Intenational Jounal of Compute Science and Netwok Secuity, VOL.8 No.10, Octobe 2008 Models fo Coplana Stip Line Analysis and J.Lakshmi Naayana D.K.Si Rama Kishna D.L.Patap Reddy Chalapathi Institute
More informationA Full-mode FME VLSI Architecture Based on 8x8/4x4 Adaptive Hadamard Transform For QFHD H.264/AVC Encoder
20 IEEE/IFIP 9th Intenational Confeence on VLSI and System-on-Chip A Full-mode FME VLSI Achitectue Based on 8x8/ Adaptive Hadamad Tansfom Fo QFHD H264/AVC Encode Jialiang Liu, Xinhua Chen College of Infomation
More informationTwo-Dimensional Coding for Advanced Recording
Two-Dimensional Coding fo Advanced Recoding N. Singla, J. A. O Sullivan, Y. Wu, and R. S. Indec Washington Univesity Saint Louis, Missoui s Motivation: Aeal Density Pefomance: match medium, senso, pocessing
More informationConcomitants of Upper Record Statistics for Bivariate Pseudo Weibull Distribution
Available at http://pvamuedu/aam Appl Appl Math ISSN: 93-9466 Vol 5, Issue (Decembe ), pp 8 9 (Peviously, Vol 5, Issue, pp 379 388) Applications and Applied Mathematics: An Intenational Jounal (AAM) Concomitants
More informationTransmission Lines Modeling Based on Vector Fitting Algorithm and RLC Active/Passive Filter Design
Tansmission Lines Modeling Based on Vecto Fitting Algoithm and RLC Active/Passive Filte Design Ahmed Qasim Tuki a,*, Nashien Fazilah Mailah b, Mohammad Lutfi Othman c, Ahmad H. Saby d Cente fo Advanced
More informationMulti-azimuth Prestack Time Migration for General Anisotropic, Weakly Heterogeneous Media - Field Data Examples
Multi-azimuth Pestack Time Migation fo Geneal Anisotopic, Weakly Heteogeneous Media - Field Data Examples S. Beaumont* (EOST/PGS) & W. Söllne (PGS) SUMMARY Multi-azimuth data acquisition has shown benefits
More informationRANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES
RANDOM IRREGULAR BLOCK-HIERARCHICAL NETWORKS: ALGORITHMS FOR COMPUTATION OF MAIN PROPERTIES Svetlana Avetisyan Mikayel Samvelyan* Matun Kaapetyan Yeevan State Univesity Abstact In this pape, the class
More informationDynamic Multiple Parity (DMP) Disk Array for Serial Transaction Processing
IEEE TRANSACTIONS ON COMPUTERS, VOL. 50, NO. 9, SEPTEMBER 200 949 Dynamic Multiple Paity (DMP) Disk Aay fo Seial Tansaction Pocessing K.H. Yeung, Membe, IEEE, and T.S. Yum, Senio Membe, IEEE AbstactÐThe
More informationDetection and Recognition of Alert Traffic Signs
Detection and Recognition of Alet Taffic Signs Chia-Hsiung Chen, Macus Chen, and Tianshi Gao 1 Stanfod Univesity Stanfod, CA 9305 {echchen, macuscc, tianshig}@stanfod.edu Abstact Taffic signs povide dives
More informationAnnales UMCS Informatica AI 2 (2004) UMCS
Pobane z czasopisma Annales AI- Infomatica http://ai.annales.umcs.pl Annales Infomatica AI 2 (2004) 33-340 Annales Infomatica Lublin-Polonia Sectio AI http://www.annales.umcs.lublin.pl/ Embedding as a
More informationLow Rate Concatenated Zigzag-Hadamard Codes
Low Rate Concatenated Zigzag-Hadamad Codes Guosen Yue,W.K.Leung,LiPing and Xiaodong Wang NEC Laboatoy Ameica, Inc., Pinceton, NJ 854. Dept. of Electonic Eng., City Univesity of Hong Kong. Dept. of Electical
More informationModule 6 STILL IMAGE COMPRESSION STANDARDS
Module 6 STILL IMAE COMPRESSION STANDARDS Lesson 17 JPE-2000 Achitectue and Featues Instuctional Objectives At the end of this lesson, the students should be able to: 1. State the shotcomings of JPE standad.
More information1.3 Multiplexing, Time-Switching, Point-to-Point versus Buses
http://achvlsi.ics.foth.g/~kateveni/534 1.3 Multiplexing, Time-Switching, Point-to-Point vesus Buses n R m Aggegation (multiplexing) Distibution (demultiplexing) Simplest Netwoking, like simplest pogamming:
More informationEffects of Model Complexity on Generalization Performance of Convolutional Neural Networks
Effects of Model Complexity on Genealization Pefomance of Convolutional Neual Netwoks Tae-Jun Kim 1, Dongsu Zhang 2, and Joon Shik Kim 3 1 Seoul National Univesity, Seoul 151-742, Koea, E-mail: tjkim@bi.snu.ac.k
More informationTopological Characteristic of Wireless Network
Topological Chaacteistic of Wieless Netwok Its Application to Node Placement Algoithm Husnu Sane Naman 1 Outline Backgound Motivation Papes and Contibutions Fist Pape Second Pape Thid Pape Futue Woks Refeences
More informationA ROI Focusing Mechanism for Digital Cameras
A ROI Focusing Mechanism fo Digital Cameas Chu-Hui Lee, Meng-Feng Lin, Chun-Ming Huang, and Chun-Wei Hsu Abstact With the development and application of digital technologies, the digital camea is moe popula
More informationA modal estimation based multitype sensor placement method
A modal estimation based multitype senso placement method *Xue-Yang Pei 1), Ting-Hua Yi 2) and Hong-Nan Li 3) 1),)2),3) School of Civil Engineeing, Dalian Univesity of Technology, Dalian 116023, China;
More informationA Two-stage and Parameter-free Binarization Method for Degraded Document Images
A Two-stage and Paamete-fee Binaization Method fo Degaded Document Images Yung-Hsiang Chiu 1, Kuo-Liang Chung 1, Yong-Huai Huang 2, Wei-Ning Yang 3, Chi-Huang Liao 4 1 Depatment of Compute Science and
More informationPoint-Biserial Correlation Analysis of Fuzzy Attributes
Appl Math Inf Sci 6 No S pp 439S-444S (0 Applied Mathematics & Infomation Sciences An Intenational Jounal @ 0 NSP Natual Sciences Publishing o Point-iseial oelation Analysis of Fuzzy Attibutes Hao-En hueh
More informationLecture Topics ECE 341. Lecture # 12. Control Signals. Control Signals for Datapath. Basic Processing Unit. Pipelining
EE 341 Lectue # 12 Instucto: Zeshan hishti zeshan@ece.pdx.edu Novembe 10, 2014 Potland State Univesity asic Pocessing Unit ontol Signals Hadwied ontol Datapath contol signals Dealing with memoy delay Pipelining
More informationSCALABLE ENERGY EFFICIENT AD-HOC ON DEMAND DISTANCE VECTOR (SEE-AODV) ROUTING PROTOCOL IN WIRELESS MESH NETWORKS
SCALABL NRGY FFICINT AD-HOC ON DMAND DISTANC VCTOR (S-AODV) ROUTING PROTOCOL IN WIRLSS MSH NTWORKS Sikande Singh Reseach Schola, Depatment of Compute Science & ngineeing, Punjab ngineeing College (PC),
More informationA Novel Automatic White Balance Method For Digital Still Cameras
A Novel Automatic White Balance Method Fo Digital Still Cameas Ching-Chih Weng 1, Home Chen 1,2, and Chiou-Shann Fuh 3 Depatment of Electical Engineeing, 2 3 Gaduate Institute of Communication Engineeing
More information= dv 3V (r + a 1) 3 r 3 f(r) = 1. = ( (r + r 2
Random Waypoint Model in n-dimensional Space Esa Hyytiä and Joma Vitamo Netwoking Laboatoy, Helsinki Univesity of Technology, Finland Abstact The andom waypoint model (RWP) is one of the most widely used
More informationModelling, simulation, and performance analysis of a CAN FD system with SAE benchmark based message set
Modelling, simulation, and pefomance analysis of a CAN FD system with SAE benchmak based message set Mahmut Tenuh, Panagiotis Oikonomidis, Peiklis Chachalakis, Elias Stipidis Mugla S. K. Univesity, TR;
More informationLecture # 04. Image Enhancement in Spatial Domain
Digital Image Pocessing CP-7008 Lectue # 04 Image Enhancement in Spatial Domain Fall 2011 2 domains Spatial Domain : (image plane) Techniques ae based on diect manipulation of pixels in an image Fequency
More informationIllumination methods for optical wear detection
Illumination methods fo optical wea detection 1 J. Zhang, 2 P.P.L.Regtien 1 VIMEC Applied Vision Technology, Coy 43, 5653 LC Eindhoven, The Nethelands Email: jianbo.zhang@gmail.com 2 Faculty Electical
More informationHierarchically Clustered P2P Streaming System
Hieachically Clusteed P2P Steaming System Chao Liang, Yang Guo, and Yong Liu Polytechnic Univesity Thomson Lab Booklyn, NY 11201 Pinceton, NJ 08540 Abstact Pee-to-pee video steaming has been gaining populaity.
More informationPositioning of a robot based on binocular vision for hand / foot fusion Long Han
2nd Intenational Confeence on Advances in Mechanical Engineeing and Industial Infomatics (AMEII 26) Positioning of a obot based on binocula vision fo hand / foot fusion Long Han Compute Science and Technology,
More informationCommunication vs Distributed Computation: an alternative trade-off curve
Communication vs Distibuted Computation: an altenative tade-off cuve Yahya H. Ezzeldin, Mohammed amoose, Chistina Fagouli Univesity of Califonia, Los Angeles, CA 90095, USA, Email: {yahya.ezzeldin, mkamoose,
More informationA Recommender System for Online Personalization in the WUM Applications
A Recommende System fo Online Pesonalization in the WUM Applications Mehdad Jalali 1, Nowati Mustapha 2, Ali Mamat 2, Md. Nasi B Sulaiman 2 Abstact foeseeing of use futue movements and intentions based
More informationTopic -3 Image Enhancement
Topic -3 Image Enhancement (Pat 1) DIP: Details Digital Image Pocessing Digital Image Chaacteistics Spatial Spectal Gay-level Histogam DFT DCT Pe-Pocessing Enhancement Restoation Point Pocessing Masking
More informationGeneralized Grey Target Decision Method Based on Decision Makers Indifference Attribute Value Preferences
Ameican Jounal of ata ining and Knowledge iscovey 27; 2(4): 2-8 http://www.sciencepublishinggoup.com//admkd doi:.648/.admkd.2724.2 Genealized Gey Taget ecision ethod Based on ecision akes Indiffeence Attibute
More informationAN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE
AN ANALYSIS OF COORDINATED AND NON-COORDINATED MEDIUM ACCESS CONTROL PROTOCOLS UNDER CHANNEL NOISE Tolga Numanoglu, Bulent Tavli, and Wendi Heinzelman Depatment of Electical and Compute Engineeing Univesity
More informationOn Error Estimation in Runge-Kutta Methods
Leonado Jounal of Sciences ISSN 1583-0233 Issue 18, Januay-June 2011 p. 1-10 On Eo Estimation in Runge-Kutta Methods Ochoche ABRAHAM 1,*, Gbolahan BOLARIN 2 1 Depatment of Infomation Technology, 2 Depatment
More informationObstacle Avoidance of Autonomous Mobile Robot using Stereo Vision Sensor
Obstacle Avoidance of Autonomous Mobile Robot using Steeo Vision Senso Masako Kumano Akihisa Ohya Shin ichi Yuta Intelligent Robot Laboatoy Univesity of Tsukuba, Ibaaki, 35-8573 Japan E-mail: {masako,
More informationFrequency Domain Approach for Face Recognition Using Optical Vanderlugt Filters
Optics and Photonics Jounal, 016, 6, 94-100 Published Online August 016 in SciRes. http://www.scip.og/jounal/opj http://dx.doi.og/10.436/opj.016.68b016 Fequency Domain Appoach fo Face Recognition Using
More informationWe are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors
We ae IntechOpen, the wold s leading publishe of Open Access books Built by scientists, fo scientists,800 6,000 0M Open access books available Intenational authos and editos Downloads Ou authos ae among
More informationOn using circuit-switched networks for file transfers
On using cicuit-switched netwoks fo file tansfes Xiuduan Fang, Malathi Veeaaghavan Univesity of Viginia Email: {xf4c, mv5g}@viginia.edu Abstact High-speed optical cicuit-switched netwoks ae being deployed
More informationEvent-based Location Dependent Data Services in Mobile WSNs
Event-based Location Dependent Data Sevices in Mobile WSNs Liang Hong 1, Yafeng Wu, Sang H. Son, Yansheng Lu 3 1 College of Compute Science and Technology, Wuhan Univesity, China Depatment of Compute Science,
More informationAn Extension to the Local Binary Patterns for Image Retrieval
, pp.81-85 http://x.oi.og/10.14257/astl.2014.45.16 An Extension to the Local Binay Pattens fo Image Retieval Zhize Wu, Yu Xia, Shouhong Wan School of Compute Science an Technology, Univesity of Science
More informationApproximating Euclidean Distance Transform with Simple Operations in Cellular Processor Arrays
00 th Intenational Wokshop on Cellula Nanoscale Netwoks and thei Applications (CNNA) Appoximating Euclidean Distance Tansfom with Simple Opeations in Cellula Pocesso Aas Samad Razmjooei and Piot Dudek
More informationErasure-Coding Based Routing for Opportunistic Networks
Easue-Coding Based Routing fo Oppotunistic Netwoks Yong Wang, Sushant Jain, Magaet Matonosi, Kevin Fall Pinceton Univesity, Univesity of Washington, Intel Reseach Bekeley ABSTRACT Routing in Delay Toleant
More informationTopic 7 Random Variables and Distribution Functions
Definition of a Random Vaiable Distibution Functions Popeties of Distibution Functions Topic 7 Random Vaiables and Distibution Functions Distibution Functions 1 / 11 Definition of a Random Vaiable Distibution
More informationGravitational Shift for Beginners
Gavitational Shift fo Beginnes This pape, which I wote in 26, fomulates the equations fo gavitational shifts fom the elativistic famewok of special elativity. Fist I deive the fomulas fo the gavitational
More informationOn the Forwarding Area of Contention-Based Geographic Forwarding for Ad Hoc and Sensor Networks
On the Fowading Aea of Contention-Based Geogaphic Fowading fo Ad Hoc and Senso Netwoks Dazhi Chen Depatment of EECS Syacuse Univesity Syacuse, NY dchen@sy.edu Jing Deng Depatment of CS Univesity of New
More informationPOMDP: Introduction to Partially Observable Markov Decision Processes Hossein Kamalzadeh, Michael Hahsler
POMDP: Intoduction to Patially Obsevable Makov Decision Pocesses Hossein Kamalzadeh, Michael Hahsle 2019-01-02 The R package pomdp povides an inteface to pomdp-solve, a solve (witten in C) fo Patially
More informationA VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM
Accepted fo publication Intenational Jounal of Flexible Automation and Integated Manufactuing. A VECTOR PERTURBATION APPROACH TO THE GENERALIZED AIRCRAFT SPARE PARTS GROUPING PROBLEM Nagiza F. Samatova,
More informationXFVHDL: A Tool for the Synthesis of Fuzzy Logic Controllers
XFVHDL: A Tool fo the Synthesis of Fuzzy Logic Contolles E. Lago, C. J. Jiménez, D. R. López, S. Sánchez-Solano and A. Baiga Instituto de Micoelectónica de Sevilla. Cento Nacional de Micoelectónica, Edificio
More informationCombinatorial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registration in Mobile IP Environments
Wieless Netwoks 0, 3 32, 200 200 Kluwe Academic Publishes. Manufactued in The Nethelands. Combinatoial Mobile IP: A New Efficient Mobility Management Using Minimized Paging and Local Registation in Mobile
More informationIP Multicast Simulation in OPNET
IP Multicast Simulation in OPNET Xin Wang, Chien-Ming Yu, Henning Schulzinne Paul A. Stipe Columbia Univesity Reutes Depatment of Compute Science 88 Pakway Dive South New Yok, New Yok Hauppuage, New Yok
More informationMonte Carlo Simulation for the ECAT HRRT using GATE
Monte Calo Simulation fo the ECAT HRRT using GATE F. Bataille, C. Comtat, Membe, IEEE, S. Jan, and R. Tébossen Abstact The ECAT HRRT (High Resolution Reseach Tomogaph, CPS Innovations, Knoxville, TN, U.S.A.)
More informationAn Improved Resource Reservation Protocol
Jounal of Compute Science 3 (8: 658-665, 2007 SSN 549-3636 2007 Science Publications An mpoved Resouce Resevation Potocol Desie Oulai, Steven Chambeland and Samuel Piee Depatment of Compute Engineeing
More informationAnalysis of Wired Short Cuts in Wireless Sensor Networks
Analysis of Wied Shot Cuts in Wieless Senso Netwos ohan Chitaduga Depatment of Electical Engineeing, Univesity of Southen Califonia, Los Angeles 90089, USA Email: chitadu@usc.edu Ahmed Helmy Depatment
More informationA Neural Network Model for Storing and Retrieving 2D Images of Rotated 3D Object Using Principal Components
A Neual Netwok Model fo Stong and Reteving 2D Images of Rotated 3D Object Using Pncipal Components Tsukasa AMANO, Shuichi KUROGI, Ayako EGUCHI, Takeshi NISHIDA, Yasuhio FUCHIKAWA Depatment of Contol Engineeng,
More informationarxiv: v2 [physics.soc-ph] 30 Nov 2016
Tanspotation dynamics on coupled netwoks with limited bandwidth Ming Li 1,*, Mao-Bin Hu 1, and Bing-Hong Wang 2, axiv:1607.05382v2 [physics.soc-ph] 30 Nov 2016 1 School of Engineeing Science, Univesity
More informationView Synthesis using Depth Map for 3D Video
View Synthesis using Depth Map fo 3D Video Cheon Lee and Yo-Sung Ho Gwangju Institute of Science and Technology (GIST) 1 Oyong-dong, Buk-gu, Gwangju, 500-712, Republic of Koea E-mail: {leecheon, hoyo}@gist.ac.k
More informationMonte Carlo Techniques for Rendering
Monte Calo Techniques fo Rendeing CS 517 Fall 2002 Compute Science Conell Univesity Announcements No ectue on Thusday Instead, attend Steven Gotle, Havad Upson Hall B17, 4:15-5:15 (efeshments ealie) Geomety
More informationDynamic Topology Control to Reduce Interference in MANETs
Dynamic Topology Contol to Reduce Intefeence in MANETs Hwee Xian TAN 1,2 and Winston K. G. SEAH 2,1 {stuhxt, winston}@i2.a-sta.edu.sg 1 Depatment of Compute Science, School of Computing, National Univesity
More informationINFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM
INFORMATION DISSEMINATION DELAY IN VEHICLE-TO-VEHICLE COMMUNICATION NETWORKS IN A TRAFFIC STREAM LiLi Du Depatment of Civil, Achitectual, and Envionmental Engineeing Illinois Institute of Technology 3300
More information3D inspection system for manufactured machine parts
3D inspection system fo manufactued machine pats D. Gacía a*, J. M. Sebastián a*, F. M. Sánchez a*, L. M. Jiménez b*, J. M. González a* a Dept. of System Engineeing and Automatic Contol. Polytechnic Univesity
More informationThe Dual Round Robin Matching Switch with Exhaustive Service
The Dual Round Robin Matching Switch with Exhaustive Sevice Yihan Li, Shivenda S. Panwa, H. Jonathan Chao Abstact Vitual Output Queuing is widely used by fixed-length highspeed switches to ovecome head-of-line
More informationClustering Interval-valued Data Using an Overlapped Interval Divergence
Poc. of the 8th Austalasian Data Mining Confeence (AusDM'9) Clusteing Inteval-valued Data Using an Ovelapped Inteval Divegence Yongli Ren Yu-Hsn Liu Jia Rong Robet Dew School of Infomation Engineeing,
More informationAny modern computer system will incorporate (at least) two levels of storage:
1 Any moden compute system will incopoate (at least) two levels of stoage: pimay stoage: andom access memoy (RAM) typical capacity 32MB to 1GB cost pe MB $3. typical access time 5ns to 6ns bust tansfe
More informationUCB CS61C : Machine Structures
inst.eecs.bekeley.edu/~cs61c UCB CS61C : Machine Stuctues Lectue SOE Dan Gacia Lectue 28 CPU Design : Pipelining to Impove Pefomance 2010-04-05 Stanfod Reseaches have invented a monitoing technique called
More informationThe concept of PARPS - Packet And Resource Plan Scheduling
The concept of PARPS - Packet And Resouce Plan Scheduling Magnus Eiksson 1 and Håkan Sätebeg 2 1) Dept. of Signals, Sensos and Systems, Royal Inst. of Technology, Sweden. E-mail: magnus.eiksson@ite.mh.se.
More informationTHE THETA BLOCKCHAIN
THE THETA BLOCKCHAIN Theta is a decentalized video steaming netwok, poweed by a new blockchain and token. By Theta Labs, Inc. Last Updated: Nov 21, 2017 esion 1.0 1 OUTLINE Motivation Reputation Dependent
More informationThe EigenRumor Algorithm for Ranking Blogs
he EigenRumo Algoithm fo Ranking Blogs Ko Fujimua N Cybe Solutions Laboatoies N Copoation akafumi Inoue N Cybe Solutions Laboatoies N Copoation Masayuki Sugisaki N Resonant Inc. ABSRAC he advent of easy
More informationHeterogeneous V2V Communications in Multi-Link and Multi-RAT Vehicular Networks
1 Heteogeneous V2V Communications in Multi-Link and Multi-RAT Vehicula Netwoks Miguel Sepulce and Javie Gozalvez Abstact Connected and automated vehicles will enable advanced taffic safety and efficiency
More informationDecentralized Trust Management for Ad-Hoc Peer-to-Peer Networks
Decentalized Tust Management fo Ad-Hoc Pee-to-Pee Netwoks Thomas Repantis Vana Kalogeaki Depatment of Compute Science & Engineeing Univesity of Califonia, Riveside Riveside, CA 92521 {tep,vana}@cs.uc.edu
More informationQuality-of-Content (QoC)-Driven Rate Allocation for Video Analysis in Mobile Surveillance Networks
Quality-of-Content (QoC)-Diven Rate Allocation fo Video Analysis in Mobile Suveillance Netwoks Xiang Chen, Jenq-Neng Hwang, Kuan-Hui Lee, Ricado L. de Queioz Depatment of Electical Engineeing, Univesity
More informationA Cross-Layer Framework of QoS Routing and Distributed Scheduling for Mesh Networks
A Coss-Laye Famewok of QoS Routing and Distibuted Scheduling fo Mesh Netwoks Chi Haold Liu, Athanasios Gkelias, and Kin K. Leung Depatment of Electical and Electonic Engineeing, Impeial College London
More informationExtract Object Boundaries in Noisy Images using Level Set. Final Report
Extact Object Boundaies in Noisy Images using Level Set by: Quming Zhou Final Repot Submitted to Pofesso Bian Evans EE381K Multidimensional Digital Signal Pocessing May 10, 003 Abstact Finding object contous
More informationLOSSLESS audio coding is used in such applications as
INTL JOURNAL OF ELECTRONICS AND TELECOMMUNICATIONS, 2013, VOL. 59, NO. 1, PP. 17 23 Manuscipt eceived Januay 10, 2013; evised Mach, 2013. DOI: 10.2478/eletel-2013-0002 Novel Ideas fo Lossless Audio Coding
More informationBo Gu and Xiaoyan Hong*
Int. J. Ad Hoc and Ubiquitous Computing, Vol. 11, Nos. /3, 1 169 Tansition phase of connectivity fo wieless netwoks with gowing pocess Bo Gu and Xiaoyan Hong* Depatment of Compute Science, Univesity of
More informationi-pcgrid Workshop 2016 April 1 st 2016 San Francisco, CA
i-pcgrid Wokshop 2016 Apil 1 st 2016 San Fancisco, CA Liang Min* Eddy Banks, Bian Kelley, Met Kokali, Yining Qin, Steve Smith, Philip Top, and Caol Woodwad *min2@llnl.gov, 925-422-1187 LDRD 13-ERD-043
More informationA Stable Traffic Engineering Technique for Performance Enhancement of the Non-TCP Elastic Flows *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 30, 1115-1129 (2014) A Stable Taffic Engineeing Technique fo Pefomance Enhancement of the Non-TCP Elastic Flows * Ian Telecom Reseach Cente (ITRC) Tehan,
More informationOn Adaptive Bandwidth Sharing with Rate Guarantees
On Adaptive Bandwidth Shaing with Rate Guaantees N.G. Duffield y T. V. Lakshman D. Stiliadis y AT&T Laboatoies Bell Labs Rm A175, 180 Pak Avenue Lucent Technologies Floham Pak, 101 Cawfods Cone Road NJ
More informationPrediction of Time Series Using RBF Neural Networks: A New Approach of Clustering
138 The Intenational Aab Jounal of Infomation Technology, Vol. 6,. 2, Apil 2009 Pediction of Time Seies Using RBF Neual Netwoks: A New Appoach of Clusteing Mohammed Awad 2, Hécto Pomaes 1, Ignacio Rojas
More informationTowards Adaptive Information Merging Using Selected XML Fragments
Towads Adaptive Infomation Meging Using Selected XML Fagments Ho-Lam Lau and Wilfed Ng Depatment of Compute Science and Engineeing, The Hong Kong Univesity of Science and Technology, Hong Kong {lauhl,
More informationUCLA Papers. Title. Permalink. Authors. Publication Date. Localized Edge Detection in Sensor Fields. https://escholarship.org/uc/item/3fj6g58j
UCLA Papes Title Localized Edge Detection in Senso Fields Pemalink https://escholashipog/uc/item/3fj6g58j Authos K Chintalapudi Govindan Publication Date 3-- Pee eviewed escholashipog Poweed by the Califonia
More informationConservation Law of Centrifugal Force and Mechanism of Energy Transfer Caused in Turbomachinery
Poceedings of the 4th WSEAS Intenational Confeence on luid Mechanics and Aeodynamics, Elounda, Geece, August 1-3, 006 (pp337-34) Consevation Law of Centifugal oce and Mechanism of Enegy Tansfe Caused in
More informationEmbeddings into Crossed Cubes
Embeddings into Cossed Cubes Emad Abuelub *, Membe, IAENG Abstact- The hypecube paallel achitectue is one of the most popula inteconnection netwoks due to many of its attactive popeties and its suitability
More information