Comparative Study of Techniques to minimize packet loss in VoIP Shveni P Mehta

Size: px
Start display at page:

Download "Comparative Study of Techniques to minimize packet loss in VoIP Shveni P Mehta"

Transcription

1 Comparatve Study of Technques to mnmze packet loss n VoIP Shven P Mehta ABSTRACT Voce over IP s an upcomng technology that enables voce communcaton through the Internet. Packet-based network lnks are shared between dfferent connectons, whch gves rse to nteracton between varous traffc types. Excessve delay, packet loss, and hgh delay jtter all mpar the communcaton qualty. Although voce over IP s very economcal, people become hestant to use t due to the above-mentoned facts whch affect the voce qualty greatly. Delay jtter and packet loss are the two factors that affect the voce qualty the most. The delay jtter manfests tself as packet loss n the dejtter buffer, whch drops the late packets. It s mpossble to remove packet loss from the network but t can defntely be mnmzed. Several technques have been proposed to mnmze the effect of packet loss. Ths paper descrbes some of those technques and then compares the followng two technques on the bass of certan crtera: ) A New Technque for mprovng qualty of speech n voce over IP usng tme-scale modfcaton [] ) Adaptve playout schedulng and loss concealment for voce communcaton over IP Network [] Keywords VoIP, Packet loss, Adaptve playout, Tme-Scale Modfcaton.. INTRODUCTION For non-real-tme applcatons lke Telnet, FTP, and emal, TCP offers relable delvery of data, but for real-tme applcatons lke voce over IP, TCP s not approprate because t ntroduces too much delay n creatng that relablty. The three man problems occurrng n real-tme applcatons lke Voce over IP (VoIP) are: ) End-to-End delay: The total delay experenced by the packet from the sender tll t reaches the recever. ) Jtter: The varaton n packet nterarrval tme. The dfference between when the packet s expected and when t s actually receved s jtter. ) Packet loss: Loss of voce packets from sender to recever. The total packet loss s composed of two elements: ) packets lost over the network due to congeston, and ) packets arrvng late after ther expected playout tme that are dscarded by the recever. The jtter caused by varable delays n the network s ultmately translated nto the effect of packet loss n the network, as the packets arrvng after the playout tme are consdered as lost. Another factor that could affect the qualty of VoIP s the choce of codec used to transform and compress analog sgnals nto dgtal sgnals. Currently avalable codecs are lsted n Table. The Mean Opnon Score (MOS) s a measure to determne or compare the qualty of audo transmssons. It s wdely appled Table - Avalable Codecs [] Codec Standards Btrate G.7 µ-law G.7 A-Law G.76-7 ADPCM 5 bt G.76-7 ADPCM bt G.76-7 ADPCM bt G.78 GSM-FR G.79 G.7. 6 kbps 6 kbps 0 kbps kbps kbps 6 kbps kbps 8 kbps 5. kbps as a lstenng qualty scale. To evaluate a gven speech sample, humans lsten to a speech sample and evaluate t on a MOS Scale of to 5 as gven n Table. When comparng a speech sample aganst a reference speech sample, PESQ-MOS (Perceptual Evaluaton of Speech Qualty - MOS) or DMOS (Degradaton MOS) are determned on a scale of to 5 as gven n Table. Table - MOS, DMOS and PESQ-MOS Scale MOS Opnon DMOS or PESQ- MOS Opnon 5 Bad poor Far Good Excellent 5 Hgh bt rate Codecs Low bt rate Codecs Very annoyng annoyng Slghtly annoyng Audble but not annoyng Inaudble From [] t can be seen that the nfluence of samplng and dgtzaton s small but not neglgble. Lower bt-rate codecs show a larger degradaton of speech qualty. Codecs lke G.76-7 and G.78 are more susceptble to degradaton from lost packets than the other codecs lke G.7, GSM-FR, G.79 and G.7.. For hgh bt-rate codecs, packet loss values up to 0% are acceptable for good qualty, whereas for the low bt-rate codecs only -5% packet loss rate s acceptable because the number of samples lost wthn a packet covers more of the speech sgnal. However, packet sze tself does not have much nfluence on qualty for any of the codecs. For a connecton wthout a dejtter buffer, jtter has a sgnfcant nfluence on the perceved qualty of receved voce. For the connecton wth a dejtter buffer, both lost and delayed packets have the same effect n the dejtter buffer, whch drops the late packets. Thus, packet loss s the most mportant problem that should be studed to mprove the qualty of VoIP. st Computer Scence Semnar SB-T-

2 . BRIEF OVERVIEW OF SOME OF THE PROPOSED TECHNIQUES Many technques have been proposed to mnmze the effect of packet loss n VoIP. Ths secton descrbes some of the technques n bref to get an dea about varous approaches taken for mnmzng the effect of packet loss n VoIP.. Replacng Lost Packets Mayorga et al [] frst study the mpact of packet loss n dfferent transmssons wth respect to dfferent codecs and then propose reconstructon strateges to recover lost nformaton... Interleavng Ths technque dstrbutes the effect of the lost packets n order to reduce the mpact on qualty. The nformaton of a speech part s dstrbuted n multple packets. The data unts are regrouped n a crossed form before transmsson such that they are dstrbuted, and at the recever they are rearranged n ther orgnal form. Thus, nstead of losng the whole packet small parts from dstrbuted packets are lost, Fgure Lost Fgure. Example of Interleavng Before Transmsson Interleavng.. Repetton: Lost packets are replaced by copes of last receved packets... Smple Interpolaton: Conssts of nterpolatng (averagng) by usng the packets after and before the lost packet... Interleavng wth Repetton The data are nterleaved before sendng and then any mssng part s substtuted usng the repetton technque at the recever...5 Interleavng wth Interpolaton Calculaton The nterleavng technque s used before sendng and then the recever nterpolates to replace any mssng parts n the jtter buffer.. Forward Error Correcton and Concealment [7] Ths approach encompasses both loss correcton and loss concealment algorthms. Loss Correcton uses meda-dependent and meda-ndependent Forward Error Correcton (FEC) technques. FEC consttutes addng redundancy data to the normal voce stream to protect from packet loss. FEC ntroduces overhead n terms of the total amount of traffc on the network, but f the amount of redundancy s controlled then ths approach can be used. In meda-ndependent FEC, general protecton codes lke Reed Solomon or Vterb are used to produce an extra protecton packet that follows the protected set of voce packets. These codes do not depend on any partcular underlyng meda characterstcs, but ntroduce a hgher delay whch may not be tolerated by many applcatons, ncludng VoIP. In medadependent FEC, the sender uses a hgh-qualty codec to create the voce samples and a lower qualty codec to generate redundant bts that are added to every packet rather than beng sent n ther own separate packet. The recevng codec removes the redundancy. If the recever must use that redundant data to substtute for a lost packet, the result s a lower-qualty (but not mssng) segment of voce. It ntroduces mnmum delay but may ntroduce more computatonal processng delay as t s meda dependent. Concealment technques can be used to supplement FEC for even better lost-packet compensaton. The most common concealment approaches nclude: Slence substtuton s substtuton of the lost frame by a slence frame of the same temporal frequency, but t can ntroduce nose f several of them are ntroduced. In nose substtuton Gaussan nose frames are used to substtute for the mssng frames. Ths produces better qualty. In frame replcaton, mssng frames are replaced by already present redundancy n the voce. Ths has low computatonal complexty and s effcent as more redundancy s expected to be present n the neghborng voce frames. It does not need large temporal sze. Waveform substtuton uses the frames pror to the lost frames and tres to use the most recent ones. It examnes buffered frames and searches for the best match.. Optmzed unequal error protecton [5] Forward Error Correcton schemes allocate equal amounts of error-control resources to each voce packet, rrespectve of the perceved mportance of a packet. Ths technque proposes sgnaladaptve, unequal error protecton n whch certan packets are allocated more FEC protecton than others, dependng on ther perceved mportance. Here, the basc unequal protecton vares the number of copes of a packet that are pggybacked onto subsequent packets: an adaptve Reed Solomon (RS) codng scheme provdes only certan packets wth RS protecton. The error control resources that should be allocated to the packet are determned by antcpatng what the packet loss concealment wll do f the packet s lost, and calculatng the expected dstorton for dfferent protecton scenaros. Ths technque s based on Lagrangan optmzaton used n vdeo communcatons to balance rate aganst dstorton. st Computer Scence Semnar SB-T-

3 . Compressed Doman Packet Loss Concealment of Snusodally Coded Speech [6] For ths technque Rodbro et al [6] desgned a new codec where the speech sgnal s compressed at the transmtter usng a snusodal codng scheme workng at 8 kbps. At the recever the concealment s carred out workng drectly on the snusodal parameters, based on tme-scalng of the packets surroundng the mssng ones. Ths s essentally another type of nterpolaton approach..5 Tme Scale Modfcaton Approach [] In ths approach a tme-scale modfcaton algorthm has been used to mnmze the effect of packet loss wthout ntroducng addtonal delays. It provdes flexble arrval delay cut-offs to late arrvng packets by means of adaptve playout, whch helps n reducng the packet loss-rate at the recever..6 Adaptve Playout Schedulng and Loss Concealment [] In ths scheme the past statstcs on network delay are used to adaptvely adjust the playout tme of the voce packets. Contnuous speech samples are created at the recever usng tmescale modfcaton. Ths technque mproves the trade off between bufferng delay and late loss sgnfcantly.. EVALUATION OF TECHNIQUES The most mportant characterstcs n determnng a good soluton for VoIP nclude the followng: ) Recever-based technque, as they are faster and ndependent of the network delay characterstcs, and also have lower computatonal overhead at the sender or network []. ) Mnmzes overall delay and packet loss. ) Flexble arrval delay cut-offs for late arrvng packets, to reduce the packet loss-rate at the recever. ) Uses adaptve playout to mnmze overall delay and effects of lost packets. 5) Low complexty. 6) Mantans ptch frequences and ntellgblty of speech. 7) Technque tself ncludes the soluton for recoverng from burst losses. Of the technques descrbed above, the two that best meet these crtera and are smlar enough to be compared effectvely are: ) Tme-scale modfcaton Approach []. ) Adaptve Playout schedulng and Loss Concealment []. The specfc characterstcs to be consdered for comparson are: ) Recever-based ) Mnmzes overall delay and packet loss ) Flexble arrval delay cut-offs to late arrvng packets, reducng the packet loss-rate at the recever ) Consders both portons of packet lost,.e., packets lost n the network due to congeston at some ntermedate node and at the recever due to packets arrvng later than ther scheduled playout tmes 5) Generc and relatve computatonal overhead 6) Mantans ptch frequences and ntellgblty of speech 7) Soluton for burst losses The prmary reason for choosng the selected technques for comparson s that both are packet loss concealment technques based on tme scalng. Both also mantan an adaptve playout buffer at the recever to compensate for the jtter. A detaled comparson of these two follows.. Tme-scale Modfcaton Approach [].. GLS-TSM Algorthm Tme-scale modfcaton s the processng performed on speech sgnals that changes the perceved rate of speech wthout affectng the ptch or ntellgblty of the speech. GLS-TSM (Global Local Search Tme Scale Modfcaton) s a tme-scale modfcaton algorthm whch s an mproved verson wth low complexty of the Synchronzed Overlap and Add (SOLA) algorthm []. Let S s be the length of the output frame and S a be the length of the nput frame arrvng at the recever. The relaton between S s and S a s gven by S s = α * S a; where α s tme scale modfcaton factor (α < for compresson and α > for expanson). GLS-TSM algorthm was orgnally desgned for larger speech segments (S a of length 600 samples or 00ms) and a pror fxed value of α. VoIP uses smaller packet szes, hence the values of these parameters were redefned to match the requrement of shorter sgnal segments and per packet varablty of α []. GLS-TSM takes N samples from those arrvng at the recever and α s calculated from the arrval pattern at the recever on a packet-bypacket bass. GLS-TSM searches for the pont of best algnment n two steps. Frst t searches for global smlarty or smlarty over a tme nterval between the analyss and synthess frames by comparng the zero crossng rates. Then t searches for local smlarty about a sample pont. Once the pont of best algnment s located, the output sgnal y[n], s formed by fadng-n the analyss frame and fadng-out the synthess frame n the overlappng nterval, and then duplcatng the nput frame untl all N samples are exhausted []. 0-ms voce packets and playout buffer sze of 5 packets are used to create the llustraton n Fgure. Addtonal delay allowed per packet was set to ms and Tme- Scale Modfcaton (TSM) frame sze was set to 5 packets. In Fgure (a), the packet s delayed by 7 ms. Ths delay s accepted and the packet s played out by tme-expandng packet wth α =. and packets and wth α =.. So packet s avalable when playout of packet ends. But as 7 ms playout tme of packet s already taken away by packets,, and, packet s compressed wth α = 0.5 as n Fgure (b). In general f the stuaton arses where a packet s to be compressed wth α < 0.5, t s compressed down to α = 0.5 only and the rest of the compresson s shared by subsequent packets. Ths s to mantan synchronzaton wthout degradng voce qualty by excessvely compressng a packet. As a result, packet 5 s also compressed and played out wth α = 0.8. If packet does not arrve at ts rescheduled playout tme, t s supposed to be lost, Fgure (c). Hence, any packet wth sequence number > s searched. For buffer sze of fve packets, sequence numbers of 5 or 6 are searched. If packet 5 has arrved then t s expanded to compensate for resdual playout tme of packet. If expanson s st Computer Scence Semnar SB-T-

4 Seq. # (a) Seq. # Seq. # (b) Fgure. Workng of the proposed scheme wth packet delay jtter (a) and loss (b) more than.5 tmes, then subsequent packets share the compensaton to avod delverng poor qualty voce wth excessve expanson. In Fgure (c), packet 5 s expanded wth α =. to compensate for ms of packet. In the worst case, f both packets 5 and 6 don t arrve, then samples from the prevously successfully receved packet are repeated to compensate for resdual playout tme wth smoothng of the waveform occurrng at packet boundares. Ths reduces the number of fully-repeated packets and elmnates the waveform msmatch at packet boundares. Thus, acceptable delay for late arrvng packets and concealment of the lost packets s acheved effectvely by ths technque. The redefned parameter ranges of the GLS-TSM algorthm produced good qualty speech for 0.5 α.0. The nput speech materal was taken from the TIMIT database and fles were downsampled to 8 KHz and two fles were concatenated to create a reference speech fle of duraton 6-8 seconds []. The plots n Fgure show that for acceptable packet loss values between 5% and0% the voce qualty has been graded as.5 PESQ MOS and above, whch s between slghtly annoyng and audble but not annoyng. Flexble delay cut-offs and mproved loss concealment gve better qualty speech. The scheme s generc, computatonally effcent, and sutable for any practcal VoIP system.. Adaptve Playout schedulng and Loss Concealment for voce communcaton over IP Networks.. Adaptve Playout When a playout buffer s employed at the recever to absorb the delay jtter, there s a tradeoff between average tme spent n the buffer (bufferng delay) and the number of packets that have to be dropped because of late arrval (late loss). Increasng 5 6 PESQ Score PESQ Score PESQ Score RPL % RPL % p RPL % Fgure. MOS predctons for representatve nput fles wth random packet-loss percentages (no packet arrval jtter) [] bufferng delay wll mnmze packet loss but ncrease end-to-end delay, whereas decreasng bufferng delay wll decrease end-toend delay but ncrease packet loss. In ths technque adaptve playout s used to accommodate as many as possble late arrvng packets. In Fgure the graph shows the delay of voce packets on the network as dots and the total delay as a sold lne. Packets arrvng after the playout deadlne are lost and have to be concealed. As can be seen n the fgure, the playout s adjusted not only n slence perods but also wthn talk spurts accordng to the varyng delay statstcs, whch shows that the technque s hghly dynamc. Voce packets are scaled to mantan contnuous playout, whch ntroduces some playout jtter. However, ths flexblty allows reducng the average bufferng delay and late loss at the same tme. Hence, the tradeoff between bufferng delay and late loss s mproved. Ths technque s manly based on the average bufferng delay and the late loss rate as the basc performance measures. All measures are defned n Table. Assume that there are N packets n the packet stream. For voce, packets are fxed-sze blocks and outgong packets are generated perodcally. As shown n Fgure 5, the packets are sent from the st Computer Scence Semnar SB-T-

5 . Network Delay Total End-to-End Delay Fgure. Adaptve Playout schedulng scheme [] recever at tme t s at a constant packetzaton tme Lo; where =,,.N s the sequence number of the packet. These packets are receved at the recever at tme t r whch s gven by t + s - t s = Lo = constant. These packets are frst stored at the recever n a buffer for tme equal to bufferng delay and then played out at. tme t p Thus, db = t p - t r. The network delay of the packets can be gven by d n = t r - t s. Thus, total delay d t = d n + d b. If the packet s lost durng transmsson then d n =. Hence, the set of receved packets s gven by R = { t r < }. As can be seen from the Fgure 5, the adaptaton s performed on a packet-by-packet bass and each packet s played out wth dfferent lengths of the played out packets gven by L = t + p - t p ; where L s the acheved length (n tme) of audo packet. Average bufferng delay s gven by d b = (d max d n ); where P = { t p > t r } s the set of P played packets, and P denotes the cardnalty of the set. Late loss rate s gven by ε l = ( R P ). Lnk loss rate ε n = ( N R ). N N The total loss rate s the sum of late loss rate and lnk loss rate.e.; ε = ε l + ε n. Burst loss rate, denoted by ε b, s gven by ε b = ( B )/N; where B s the set of packets wth two consecutve losses and s gven by B = { t p < t r, t + p < t + r }... Scalng of voce packets wth WSOLA Waveform Smlarty Overlap-Add (WSOLA) decomposes the nput nto overlappng segments of equal length, whch are then realgned and supermposed to form the output wth equal and fxed overlap. The realgnment leads to a modfed output length. The segments to be added n overlap are searched on the bass of maxmum correlaton to ensure that they have the maxmum smlarty and the superposton wll not cause any dscontnuty before they are supermposed to generate smooth transtons n the output. Weghtng wndows are appled to the segments the reconstructed output. For speech processng, WSOLA has the advantages of mantanng the ptch perod, whch results n mproved qualty compared to resamplng. Sngle-Packet WSOLA The WSOLA approach has been modfed to work on only one packet so that ncomng packets can be scaled mmedately, wthout ntroducng any addtonal processng delay. To scale a voce packet, a template segment of constant length s selected from the nput. Next the segment of maxmum smlarty to the Notaton t s t r t p d n d b d b d t d max d max ε n ε l ε b ε R P B N L o L Sender Recever Playout Table Notaton [] Descrpton Tme packet s sent Tme packet s receved Tme packet s played out Network delay of packet Bufferng delay of packet Average bufferng delay of a stream Total delay of packet Fxed playout deadlne Playout deadlne of packet Lnk loss rate Late loss rate Burst loss rate Total loss rate Set of receved packets Set of played packets Set of packets lost consequtvely Number of packets n stream Sender packetzaton tme Actual length of scaled packet Packet Sequence Number t s d n L o t r d max t d p b L Fgure 5. Adaptve Playout [] Tme segment, called the smlar segment, s searched n the nput. The start of the smlar segment s searched n a search regon, as s shown n Fgure 6. For expandng short packets, the search regon s moved to the pror segment to fnd the frst smlar segment. Ths wdens the range of lookng for smlar waveforms. The pror packet could have been played out at the tme of scalng. Once the smlar segment s found, t s weghted by a rsng wndow and the template segment s weghted by a symmetrc fallng wndow. The smlar segment followed by the rest of the samples n the packet s shfted and supermposed wth the template segment to generate the output. Ths results n a long output as shown n Fgure 6(a). For example n Fgure 6(a), the output waveform has one extra ptch perod. The extra ptch perod s the nterpolaton of several ptch perods based on smlarty. If the output speech has not reached the desred length t s t r t p st Computer Scence Semnar SB-T-5

6 Ptch Perod 5 5 packet tme and results n better voce qualty. Waveform repetton s used to repar burst loss. Packet Packet Lost δl Smlar Segment Template Search Regon 5 Template Smlar Segment Found Smlar Segment Realgnment and Overlap Add Output / / / 5 Weghtng Wndow Search Regon 5 5 / / 5 Output + Extend to L o Extend to.l o (a) Lost Lost Output Extend to L o Extend to L o Extend to.l o (b) δl Lost Lost Output - + Extend to L o Waveform Repetton + Extend to.l o + + Tme δl (a) (b) Tme (Sample) Used for Correlaton Fgure 6. (a) Extenson and (b) compresson of sngle voce packets usng tme-scale modfcaton [] after such operatons, addtonal teratons are performed. Packet compresson s done smlarly, as shown n Fgure 6(b), but as we want the output of shorter length than the nput, the search regon for the smlar segment should not be defned n the pror packet. Packet compresson requres that a packet contans more than one ptch, whch lmts the mnmum length of the packet that can be compressed. However, a common packet length, such as 0 ms, s usually suffcent because ptch values below 00 Hz are not very frequent n speech sgnals. If for some reason packet compresson cannot be performed, then the compresson s shared by later packets. Ths scheme s entrely voce codec-ndependent. The begnnng and the end of each packet are not altered, so concatenaton of modfed packets needs no overlap to obtan smooth transtons. Hence, packets can be modfed ndependently and sent to the output queue back to back. To avod extreme scalng, L max =. L o and L mn = 0. L o, where L o s constant packetzaton tme.. Packet Loss Concealment In ths technque the packet loss concealment tres to cover late loss as well as lnk loss n the network by takng advantage of redundancy n the audo sgnal. It s a hybrd of tme-scale modfcaton and waveform substtuton. It scales one packet at a tme and uses two-sded nformaton along wth adaptve playout schedulng. Scalng one packet at a tme reduces the delay to one (c) Algnment determned by correlaton Fgure 7. Loss concealment for (a) sngle loss (b) nterleaved loss (c) consecutve loss [] As shown n Fgure 7, the packets are stored n a buffer at the recever after arrval. Packet s assumed lost f t s not receved by the tme packet - s to be played out, and the concealment starts at that moment. When packet assumed lost, ts pror packet - s extended wth a target length of L o and then played out. Further operaton depends on the loss pattern. If packet s the only packet lost and the followng packets are receved by ther deadlnes, packet + s extended wth a target length of.l o. As s shown n Fgure 7(a), small segments from packets - and + are searched for smlarty to obtan a mergng poston. The two segments are then weghted by fallng and rsng wndows before mergng. The total expanson of packets - and + can be bgger or smaller than the gap created by the lost packet. The resultng length of modfed packets s then L - + L + - L merge, and the playout tme of packet + s t p + = t p - + L - + L + - L merge For successful concealment t p + > t r + but n general, t p + wll not match the desred playout tme and t s lkely to be ether ahead or behnd the scheduled playout by a small dfference δl, as shown n Fg. 7. Ths dfference s corrected by the adaptve loss patterns or bursts loss can be covered as shown n Fgure 7(b) and 7(c), respectvely. In Fgure 7(b) when packet + s determned to be lost, packet + s scaled wth a target length of Lo nstead of. Lo to cover the gap resultng from the second loss n Fg. 7(c) when packets and + are lost, the waveform of the scaled packet - s repeated n order to conceal burst loss. In both cases, search of smlar waveforms s performed for mergng, and adaptve playout tme adjustment s used on the st Computer Scence Semnar SB-T-6

7 Trace STD of Network Delay (ms) Maxmum Jtter (ms) Table - Subjectve results of the technque [] Lnk Loss Rate (%) STD of Total Delay (ms) Bufferng Delay (ms) Total Loss Rate (%) Burst Loss Rate (%) MOS followng packet losses as shown n Fgure 7(c), waveform repetton s used for a maxmum of three tmes before the mechansm stops to generate output and resets the playout schedule. Burst loss degrades voce qualty most severely, even after beng concealed, because t s a smple repetton of pror waveforms.. Performance of the technque As gven n [], results were collected usng packet delay traces from the Internet by transmttng voce streams between hosts at four dfferent geographc locatons. The data sequences collected from these lnks were referred to as Traces respectvely. Subjectve testng for evaluaton of the qualty degradaton by scalng of voce packets on a scale of 5 to as gven n secton shows that the degradaton due to audo scalng s between naudble and not annoyng, even for extreme cases. In short, these results say that scaled audo has a good qualty. Subjectve testng to determne the overall qualty of speech usng adaptve playout n combnaton wth loss concealment was carred out usng four short segments from Traces that last for aproxmately 6s. The correspondng network characterstcs for these segments are gven n column of Table. No orgnal sample was provded for drect comparson, and the lsteners were asked to rate the qualty of speech usng an absolute scale of 5 to correspondng to 5-excellent, -good, -far, - poor, and -bad qualty, respectvely. The mean opnon scores (MOS) obtaned by averagng the scores from all lsteners and four dfferent samples are lsted n Table. In order to obtan reasonable sound qualty for each trace, the bufferng delay used s adjusted to the jtter characterstcs. Therefore, the hghest bufferng delay s used for Trace whle the bufferng delay for Trace s close to the mnmum of one packet tme (0 ms), whch s requred for loss concealment. Table data are qute detaled, coverng not just packet loss, but also network loss, jtter, bufferng delay, and burst loss. SUMMARY AND CONCLUSION The two technques under comparson may look very smlar on the whole, but when studed closely they have some dfferences between them. Table 5 captures the hghlghts of how Tme- Scale Modfcaton Approach [] and Adaptve playout schedulng and loss concealment [] compare. Thus, n ths paper two almost smlar technques have been compared. From Fgure and Table 5 t mght appear that Tme- Scale Modfcaton Approach [] s better from the pont of vew of MOS values, but the results presented for Adaptve playout schedulng and loss Concealment [] are more detaled. The latter technque uses traces from the real network as compared to the fles used n the former technque. Although Tme-Scale Modfcaton Approach [] s effectve, the Table 5. Comparson Table Tme-Scale Modfcaton Adaptve Playout Schedulng and loss concealment [] Approach [] Recever-based Mnmzes overall delay and packet loss Flexble arrval delay cut-offs to late arrvng packets, reducng the packet loss-rate at the recever, but t s lkely to ntroduce more delay as compared to the other technque because t s based on collectng N samples from the nput as descrbed n Secton.. but, ths technque s based on GLS-TSM algorthm as descrbed n secton.. where expanson and compresson of packets for tmescalng are based on α. The value of α cannot be more than.5 to mantan the qualty of sound. The workng of the algorthm shows that t s comparatvely less dynamc and s a smple tme-scale modfcaton technque., but t does not have to wat for N samples from the nput before processng starts and hence t has comparatvely less bufferng delay as demonstrated n. but, ths technque s based on WSOLA algorthm as descrbed n secton.. where expanson and compresson are based on fndng smlar waveforms rather than scalng the neghborng packets. The smlar segment s weghted by a rsng wndow and template segment s weghted by a fallng wndow. The two segments are then shfted and supermposed wth template to generate output. Ths shows that the technque s hghly dynamc. It detects arrval patterns from the nput and automatcally adjusts the amount of delay. The output s not smple tme-scale modfcaton but s based on smlarty and s a hybrd of tme-scale modfcaton and waveform substtuton. st Computer Scence Semnar SB-T-7

8 Consders both portons of packet loss,.e., packets lost n the network due to congeston at some ntermedate node and at the recever due to packets arrvng later than ther scheduled playout tmes 5 Generc and less computaton overhead 6 Mantans ptch frequences and ntellgblty 7 Soluton for burst losses Waveform Repetton. It ntegrates well wth the system, s ndependent of codec and the results demonstrate less computatonal overhead. Waveform Repetton Adaptve playout schedulng and loss Concealment [] gves a more detaled analyss based on total delay, bufferng delay and loss, burst losses, network delay and loss, hence t s more relable n terms of mnmzng packet loss along wth delay. The results presented by both technques are nsuffcent to compare them n terms of MOS and PESQ-MOS values. Adaptve playout schedulng and loss Concealment [] gves a detaled analyss for each trace but t s based only on a sngle loss rate value. If t had produced results for more MOS values usng vared packet losses, then the two technques could have been compared more effectvely. Ths leads to the need for further work n ths area. The other technques proposed so far for mnmzng packet loss can also be studed to determne whch technque best serves the purpose of mnmzng the effects n partcular network condtons. 5.0 REFERENCES [] Agnhotr, S., Aravndhan, K., Jamadagn, H.S., Pawate, B.I. A new technque for mprovng qualty of speech n Voce Over IP usng tme-scale modfcaton, Acoustcs, Speech, and Sgnal Processng, 00 Proceedngs. (ICASSP '0). IEEE Internatonal Conference on, Volume:, 00 Pages: [] Duysburgh, B., Vanhastel, S., De Vreese, B., Petrsor, C., Demeester, P. On the nfluence of best-effort network condtons on the perceved speech qualty of VoIP connectons, Computer Communcatons and Networks, 00 Proceedngs. Tenth Internatonal Conference on 5-7 Oct 00, Pages -9. [] Lang, Y.J., Farber, N., Grod, B. Adaptve Playout schedulng and Loss Concealment for voce communcaton over IP Networks, Multmeda, IEEE on Volume: 5, Issue:, Dec. 00 Pages: 5 5 [] Mayorga, P., Besacer, L., Lamy, R., Sergnat, J.-F. Audo packet loss over IP and speech recognton, Automatc Speech Recognton and Understandng, 00. ASRU '0. 00 IEEE Workshop on, 0 Nov.- Dec. 00, Pages: [5] Mngyu Chen, Murth, M.N. Optmzed unequal error protecton for voce over IP, Acoustcs, Speech, and Sgnal Processng, 00 Proceedngs. (ICASSP '0). IEEE Internatonal Conference on, Volume: 5, 7- May 00, Pages vol.5. [6] Rodbro, C.A., Chrstensen, M.G., Andersen, S.V., Jensen, S.H. Compressed doman packet loss concealment of snusodally coded speech ; Acoustcs, Speech, and Sgnal Processng, 00 Proceedngs. (ICASSP '0). 00 IEEE Internatonal Conference on, Volume:, 6-0 Aprl 00, Pages: I vol.. [7] Santos, P.M., Balbnot, R., Slvera, J.G., Castello, F.C. Analyss of packet loss correcton and concealment algorthms n robust voce over IP envronments, Communcatons, Computers and sgnal Processng, 00. ACRIM. 00 IEEE Pacfc Rm Conference on, Volume:, 8-0 Aug. 00, Pages:8-87 vol. -9 st Computer Scence Semnar SB-T-8

Real-time interactive applications

Real-time interactive applications Real-tme nteractve applcatons PC-2-PC phone PC-2-phone Dalpad Net2phone vdeoconference Webcams Now we look at a PC-2-PC Internet phone example n detal Internet phone over best-effort (1) Best effort packet

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Real-Time Guarantees. Traffic Characteristics. Flow Control

Real-Time Guarantees. Traffic Characteristics. Flow Control Real-Tme Guarantees Requrements on RT communcaton protocols: delay (response s) small jtter small throughput hgh error detecton at recever (and sender) small error detecton latency no thrashng under peak

More information

[33]. As we have seen there are different algorithms for compressing the speech. The

[33]. As we have seen there are different algorithms for compressing the speech. The 49 5. LD-CELP SPEECH CODER 5.1 INTRODUCTION Speech compresson s one of the mportant doman n dgtal communcaton [33]. As we have seen there are dfferent algorthms for compressng the speech. The mportant

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video

End-to-end Distortion Estimation for RD-based Robust Delivery of Pre-compressed Video End-to-end Dstorton Estmaton for RD-based Robust Delvery of Pre-compressed Vdeo Ru Zhang, Shankar L. Regunathan and Kenneth Rose Department of Electrcal and Computer Engneerng Unversty of Calforna, Santa

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Convolutional interleaver for unequal error protection of turbo codes

Convolutional interleaver for unequal error protection of turbo codes Convolutonal nterleaver for unequal error protecton of turbo codes Sna Vaf, Tadeusz Wysock, Ian Burnett Unversty of Wollongong, SW 2522, Australa E-mal:{sv39,wysock,an_burnett}@uow.edu.au Abstract: Ths

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

CS 268: Lecture 8 Router Support for Congestion Control

CS 268: Lecture 8 Router Support for Congestion Control CS 268: Lecture 8 Router Support for Congeston Control Ion Stoca Computer Scence Dvson Department of Electrcal Engneerng and Computer Scences Unversty of Calforna, Berkeley Berkeley, CA 9472-1776 Router

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION

CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION 24 CHAPTER 2 PROPOSED IMPROVED PARTICLE SWARM OPTIMIZATION The present chapter proposes an IPSO approach for multprocessor task schedulng problem wth two classfcatons, namely, statc ndependent tasks and

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

Avoiding congestion through dynamic load control

Avoiding congestion through dynamic load control Avodng congeston through dynamc load control Vasl Hnatyshn, Adarshpal S. Seth Department of Computer and Informaton Scences, Unversty of Delaware, Newark, DE 976 ABSTRACT The current best effort approach

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

A fair buffer allocation scheme

A fair buffer allocation scheme A far buffer allocaton scheme Juha Henanen and Kalev Klkk Telecom Fnland P.O. Box 228, SF-330 Tampere, Fnland E-mal: juha.henanen@tele.f Abstract An approprate servce for data traffc n ATM networks requres

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Classification Based Mode Decisions for Video over Networks

Classification Based Mode Decisions for Video over Networks Classfcaton Based Mode Decsons for Vdeo over Networks Deepak S. Turaga and Tsuhan Chen Advanced Multmeda Processng Lab Tranng data for Inter-Intra Decson Inter-Intra Decson Regons pdf 6 5 6 5 Energy 4

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z.

TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS. Muradaliyev A.Z. TECHNIQUE OF FORMATION HOMOGENEOUS SAMPLE SAME OBJECTS Muradalyev AZ Azerbajan Scentfc-Research and Desgn-Prospectng Insttute of Energetc AZ1012, Ave HZardab-94 E-mal:aydn_murad@yahoocom Importance of

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Support Vector Machines

Support Vector Machines /9/207 MIST.6060 Busness Intellgence and Data Mnng What are Support Vector Machnes? Support Vector Machnes Support Vector Machnes (SVMs) are supervsed learnng technques that analyze data and recognze patterns.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) ,

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) , Fax: (370-5) , VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems

Fast Retransmission of Real-Time Traffic in HIPERLAN/2 Systems Fast Retransmsson of Real-Tme Traffc n HIPERLAN/ Systems José A Afonso and Joaqum E Neves Department of Industral Electroncs Unversty of Mnho, Campus de Azurém 4800-058 Gumarães, Portugal {joseafonso,

More information

Classifying Acoustic Transient Signals Using Artificial Intelligence

Classifying Acoustic Transient Signals Using Artificial Intelligence Classfyng Acoustc Transent Sgnals Usng Artfcal Intellgence Steve Sutton, Unversty of North Carolna At Wlmngton (suttons@charter.net) Greg Huff, Unversty of North Carolna At Wlmngton (jgh7476@uncwl.edu)

More information

Active Contours/Snakes

Active Contours/Snakes Actve Contours/Snakes Erkut Erdem Acknowledgement: The sldes are adapted from the sldes prepared by K. Grauman of Unversty of Texas at Austn Fttng: Edges vs. boundares Edges useful sgnal to ndcate occludng

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks

Quantization Noise Power Injection In Subband Audio Coding Using Low Selectivity Filter Banks Quantzaton Nose Power Injecton In Subband Audo Codng Usng Low Selectvty Flter Banks D. ARTÍNEZ -UÑOZ, N. RUIZ-REYES, P. VERA-CANDEAS, P.J. RECHE-LÓPEZ, J. CURPIÁN-ALONSO Departamento de Electrónca Unversdad

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Fitting: Deformable contours April 26 th, 2018

Fitting: Deformable contours April 26 th, 2018 4/6/08 Fttng: Deformable contours Aprl 6 th, 08 Yong Jae Lee UC Davs Recap so far: Groupng and Fttng Goal: move from array of pxel values (or flter outputs) to a collecton of regons, objects, and shapes.

More information

AN EFFICIENT ALGORITHM FOR REAL-TIME SPECTROGRAM INVERSION. Gerald T. Beauregard Xinglei Zhu Lonce Wyse. Research, Singapore

AN EFFICIENT ALGORITHM FOR REAL-TIME SPECTROGRAM INVERSION. Gerald T. Beauregard Xinglei Zhu Lonce Wyse. Research, Singapore AN EFFICIENT ALGORITHM FOR REAL-TIME SPECTROGRAM INVERSION Gerald T. Beauregard Xngle Zhu Lonce Wyse muvee Technologes g.beauregard@eee.org Insttute for Infocomm Research, Sngapore xzhu@r.astar.edu.sg

More information

K-means and Hierarchical Clustering

K-means and Hierarchical Clustering Note to other teachers and users of these sldes. Andrew would be delghted f you found ths source materal useful n gvng your own lectures. Feel free to use these sldes verbatm, or to modfy them to ft your

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Evaluation of Parallel Processing Systems through Queuing Model

Evaluation of Parallel Processing Systems through Queuing Model ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION

MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION MULTISPECTRAL IMAGES CLASSIFICATION BASED ON KLT AND ATR AUTOMATIC TARGET RECOGNITION Paulo Quntlano 1 & Antono Santa-Rosa 1 Federal Polce Department, Brasla, Brazl. E-mals: quntlano.pqs@dpf.gov.br and

More information

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET

APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET APPLICATION OF PREDICTION-BASED PARTICLE FILTERS FOR TELEOPERATIONS OVER THE INTERNET Jae-young Lee, Shahram Payandeh, and Ljljana Trajovć School of Engneerng Scence Smon Fraser Unversty 8888 Unversty

More information

Query Clustering Using a Hybrid Query Similarity Measure

Query Clustering Using a Hybrid Query Similarity Measure Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

Gateway Algorithm for Fair Bandwidth Sharing

Gateway Algorithm for Fair Bandwidth Sharing Algorm for Far Bandwd Sharng We Y, Rupnder Makkar, Ioanns Lambadars Department of System and Computer Engneerng Carleton Unversty 5 Colonel By Dr., Ottawa, ON KS 5B6, Canada {wy, rup, oanns}@sce.carleton.ca

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet

Comparisons of Packet Scheduling Algorithms for Fair Service among Connections on the Internet Comparsons of Packet Schedulng Algorthms for Far Servce among Connectons on the Internet Go Hasegawa, Takahro Matsuo, Masayuk Murata and Hdeo Myahara Department of Infomatcs and Mathematcal Scence Graduate

More information

Adaptive Load Shedding for Windowed Stream Joins

Adaptive Load Shedding for Windowed Stream Joins Adaptve Load Sheddng for Wndowed Stream Jons Buğra Gedk, Kun-Lung Wu, Phlp S. Yu, Lng Lu College of Computng, Georga Tech Atlanta GA 333 {bgedk,lnglu}@cc.gatech.edu IBM T. J. Watson Research Center Yorktown

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

A Frame Packing Mechanism Using PDO Communication Service within CANopen

A Frame Packing Mechanism Using PDO Communication Service within CANopen 28 A Frame Packng Mechansm Usng PDO Communcaton Servce wthn CANopen Mnkoo Kang and Kejn Park Dvson of Industral & Informaton Systems Engneerng, Ajou Unversty, Suwon, Gyeongg-do, South Korea Summary The

More information

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces

Range images. Range image registration. Examples of sampling patterns. Range images and range surfaces Range mages For many structured lght scanners, the range data forms a hghly regular pattern known as a range mage. he samplng pattern s determned by the specfc scanner. Range mage regstraton 1 Examples

More information

WIRELESS communication technology has gained widespread

WIRELESS communication technology has gained widespread 616 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 4, NO. 6, NOVEMBER/DECEMBER 2005 Dstrbuted Far Schedulng n a Wreless LAN Ntn Vadya, Senor Member, IEEE, Anurag Dugar, Seema Gupta, and Paramvr Bahl, Senor

More information

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010

Simulation: Solving Dynamic Models ABE 5646 Week 11 Chapter 2, Spring 2010 Smulaton: Solvng Dynamc Models ABE 5646 Week Chapter 2, Sprng 200 Week Descrpton Readng Materal Mar 5- Mar 9 Evaluatng [Crop] Models Comparng a model wth data - Graphcal, errors - Measures of agreement

More information

Video streaming over the Internet is becoming very popular and

Video streaming over the Internet is becoming very popular and Streamng MPEG-4 AudoVsual Objects Usng TCP-Frendly Rate Control and Unequal Error Protecton Toufk Ahmed 1, Ahmed Mehaoua 1 and Vncent Lecure 2 1 2 CNRS-PRSM LabUnversty of Versalles CRAN lab CNRS UMR 739

More information

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation

An Iterative Solution Approach to Process Plant Layout using Mixed Integer Optimisation 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 An Iteratve Soluton Approach to Process Plant Layout usng Mxed

More information

Routing in Degree-constrained FSO Mesh Networks

Routing in Degree-constrained FSO Mesh Networks Internatonal Journal of Hybrd Informaton Technology Vol., No., Aprl, 009 Routng n Degree-constraned FSO Mesh Networks Zpng Hu, Pramode Verma, and James Sluss Jr. School of Electrcal & Computer Engneerng

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information