Implementation of fast motion estimation algorithms and comparison with full search method in H.264
|
|
- Suzanna Walters
- 6 years ago
- Views:
Transcription
1 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March Ipleentation of fast otion estiation algoriths and coparison with full search ethod in H.264 A.Ahadi, M.M.Azadfar Departent of Planning & Engineering, Mobile Counications Copany of Iran (MCCI), Tehran, Iran Multiedia Systes Group, IT Faculty, Iran Telecounication Research Center (ITRC), Tehran, Iran Suary In this paper, Three otion estiation algoriths for H.264 standard have been ipleented and perforance and soe features of these three have been tested. These algoriths are full search and two fast search ethod. Finally soe paraeters such as bit rate, speed up and PSNR for different value of QP have been copared. Ipleentation has been perfored in Matlab software. Key words: ITU-H.264 standard,otion estiation,full search,fast search. 1. Introduction Motion Estiation (ME) is an iportant part of any video copression syste, since it can achieve significant copression by exploiting the teporal redundancy existing in a video sequence. Unfortunately it is also the ost coputationally intensive function of the entire encoding process. In otion estiation the current iage is divided into Macro Blocks (MB) [1]. Most of algoriths have been proposed for otion estiation use fro BMA_based (Block Matching Algoriths) ethods. In this ethods, otion estiation is perfored for a N M blocks of current frae, It is done with checking entire N M blocks fro search area situated in the reference frae(s) and calculating the difference between the current block and other reference blocks and finally choosing the block that has the ost siilarity (iniu SSD) to the early block in current frae. Then, difference of two blocks as residual (otion copensated residual) and the distance of the as otion vector, is coded and transitted. Search area in the reference frae, generally is a range of [- 15,15] [-15,,15] pixels relative to the location of the block to be searched. SSD A = F (, ) ( s) F G sεa in SSD G 2 ( s) (1) In H.264, unlike other standard, M and N is variable and are selected based on coplexity value of otion. The seven possible odes of a block in H.264, are 16 16, 16 8, 8 16, 8 8, 8 4, 4 8, 4 4. Fitting selection of the block sizes leads to acceptable quality in low bit rates. The proble with ethod of choosing the best ode of block size is the tie, because of the process coplexity, we cannot find the best in real tie. The otion estiation process accounts for ore than 50% of total encoding tie in case of one reference frae, however, as the nuber of reference fraes increases, the relative coputational portion of otion copensation increases gradually, and at last it is about 70% in case of four reference pictures.[2] In fast search algoriths, the otion estiation process instead of full search, follows special pattern that checks less point nuber, Such as diaond pattern (figure 1) and hexagonal[1] pattern. saller otion copensation block sizes can produce better otion copensation results. However, a saller block size leads to increased coplexity (ore search operations ust be carried out) and an increase in the nuber of otion vectors that need to be transitted. Sending each otion vector requires bits to be sent and the extra overhead for vectors ay outweigh the benefit of reduced residual energy. An effective coproise is to adapt the block size to the picture characteristics, for exaple choosing a large block size in flat, hoogeneous regions of a frae and choosing a sall block size around areas of high detail and coplex otion.[3] The ost iportant criterion for this selection is ratedistortion (RD) and iniization the j value that achieves fro equation (2). j = SSD + λ r (2) Where SSD is su of square error and λ is equal to: ( QP 12) / 3 λ = (3)
2 140 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 Value of QP is between 0 and 51 and r represents the nuber of bits that needs for otion vector coding. The inforative RD optiization technology provides a bitrate reduction of up to approxiately 10% and a PSNR iproveent of up to 0.35 db, while it increases the coputational coplexity of the H.264 encoder.[4] n 2 (2 1) PSNRdB = 10log10 (4) MSE checking points of LDSP are tested at the first step. If the iniu SAD occurs at the search center of LDSP, then the search pattern is switched fro LDSP to SDSP, and the position having the iniu SAD in SDSP is decided as the otion vector. Otherwise, a new center of LDSP is placed at the point that yields the iniu SAD in the previous step, and all points on the new LDSP are tested again. This process is iteratively repeated until the iniu SAD falls on the search center. 2. MB ode deterination and otion estiation ethods The seven possible odes of a block, as entioned earlier, are 16 16, 16 8, 8 16, 8 8, 8 4, 4 8, 4 4. Fitting selection of the block sizes leads to acceptable quality in low bit rates. Very different ethods ay be used in this section that soe of the in the following 2.1. Full Search ethod (recoendation of standard) Generally, in this ethod, all possible odes is checked. With perforing the otion estiation for every blocks and calculating the R-D criterion for all of the, We can decided which block sizes should be used. First of all, otion estiation for acroblock (16 16 block) is perfored and j is calculated. Then acroblock is divided into two 16 8 and then 8 16 blocks and for each of the, otion estiation and j calculation is perfored. The su of calculated j of blocks in each ode, is the j of that ode. Fro this four state, a ode that has iniized the j is choosed. If the selected ode is 8 8, breaking process of each blocks is continued like the previous. The sallest possible block sizes is 4 4 and afterward the breaking procedure is finished. The ost iportant disadvantage of this algorith versus it s high precision is, the over tie expended to procedure and this,overshadow the feature of realtie coding. 2.2.The first ethod of fast search and MB ode deterination (fast search 1) [2] In this algorith, fast otion estiation with odified diaond search for variable block sizes is perfored. Motion vector field adaptive search technique (MVFAST) uses a different initial search point and search patterns with selective application of large diaond search (LDS) and sall diaond search (SSD) according to the characteristics of otion activity assessed by the siilarity of otion vector field aong contiguous blocks. In the LDS case, the LDSP (LDS pattern) shown in Fig.1 is centered at the search center, and all the (a) LDSP (b) SDSP Fig. 1 Two types of diaond search pattern In the proposed schee, fro the siilarity of otion vector aong hierarchical block size structure is utilized instead of neighboring block s otion field as in MVFAST for the otion field adaptive search. ME is perfored fro 4 4 to block sizes. At first, sixteen basic otion vectors of all 4 4 blocks in one acroblock are found by MVFAST ethod. The search centers and patterns for larger blocks of 8 4, 4 8, and 8 8 are selected on the basis of the otion vector deviation of the 4 4 blocks constituting the given block. The otion vector deviation D of a given block of 8 4, 4 8, 8 8 is coputed as the average absolute distance between 4 4 block otion vector and their ean vector as: N 1 D = MVb( i) ean _ vector (5) N i= 1 Where, N is the nuber of basic otion vectors of MVb(i) in the given block, and MVb(i) is the otion vector of i th 4 4 block in a given block. If all basic otion vectors of 4 4 block corresponding to the current block are the sae, that is, if D equals to zero, the ean vector becoes the otion vector of current block, and ME is skipped. If D is saller than or equal to T 1, only the first step of the sall diaond search (SDS) is perfored at the center position. That is, only five points as shown in Fig. 1(b) is tested. Otherwise, if D is saller than or equal to T 2, the SDS is perfored. If D is larger than T 2, LDS is perfored. Therefore, as otion vector deviation increases, ore coplex and larger diaond search starting fro the
3 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March ean vector is applied. The sae process is also perfored for 16 8, 8 16, blocks with regard to 8 8 block otion vectors. In this experient, the values 1 and 8 are used respectively for the thresholds T 1 and T 2. [2] 2.3. The second ethod of fast search and MB ode deterination (fast search 2)[5] This algorith has been proposed to reduce the nuber of potential odes and to restrict the set of past coded reference picture for ME. The algorith will eliinate ME for soe block types and reference pictures and will differentiate Skip ode (SKIP ode refers to the ode where no otion and residual inforation is encoded, So no otion search is required and it has the lowest coplexity) fro other block types and give it the highest priority. The algorith is based on whether the error surface versus block size is onotonic, that is, whether the current acroblock has the sae tendency of using saller block size (sub-acroblock partition) or larger block size. The error surface is built by initial 3 odes (block sizes): 16 16, 8 8, and 4 4. Here 8 8 eans that the entire acroblock is exained using only 8 8 partitions, and 4 4 eans that the entire acroblock is exained using only 4 4 partitions. We call that the error surface is onotonic if : J ode (16_16)< J ode (8_8) <J ode (4_4) or versa. If the error surface is not onotonic, all other odes need to be tested. If the error surface is onotonic, only odes (block sizes) between the best two odes are tested. For exaple, if the best two odes are and 8 8, which iplies that the acroblock tends to use larger block partitions, only 16 8 and 8 16 are further tested; if the best two odes are 8 8 and 4 4, this iplies that the acroblock tends to use saller block partitions (or sub-acroblock partitions), and only 8 4 and 4 8 odes are further tested. step1: check SKIP ode. if J ode (SKIP) < T1, select SKIP as best ode, stop; otherwise go to step2; step2: check and 8 8. if (J ode (SKIP) < J ode (16_16))&&(J ode (SKIP)< J ode (8_8)), go to step7; otherwise, go to step3; step3: check 4 4; if ((MinJ ode = = J ode (8_8)) (MaxJ ode = = J ode (8_8))), go to step4; if MaxJ ode = = J ode (4_4), go to step5; if MaxJ ode = = J ode (16_16), go to step6; step4: check 16 8, 8 16, 8 4, 4 8; go to step7; step5: check 16 8, 8 16; go to step7; step6: check sub-acroblock partition; go to step7; step7: choose the best ode aong all tested odes. In step1, threshold T1 = N bits.λode, where N bits equals the iniu nuber of bits required for non SKIP inter odes. In step2, by coparing SKIP with and 8 8, we assue that if the RD cost for SKIP is the inial, then the probability for other odes to have cost less than SKIP will be very sall, so no other odes need to be checked. We check the onotonic condition in step3, In step6, an additional decision is perfored for each 8 8 partition to decide which type shall be used aong the 4 sub-acroblock partitions. Only 8 4 and 4 8 need to be tested. The search for otion estiation in this algorith also is perfored according to LDS pattern. 3. Ipleentation results The experients were carried out on a 1.6 MHz Intel Pentiu achine with 256 MB RAM eory. The environent for coparing the perforances is MATLAB software. The algoriths is applied on two successive fras of the bitstrea. The first frae as reference frae is used for coding the next frae. For exaple, figure 2 shows two successive fraes of silent bitstrea and difference of the(residual) has been shown in figure 3. In the residual frae, PSNR is db and j is equal to but with applying full search algorith on the fraes, otion copensated residual frae shown better results. PSNR and J are db and 1950 respectively. This process last about 54 seconds in test states. This frae is shown in figure 4. After running The fast search(1) algorith on the fraes, following result (fig 5) will be achieved. In this frae, PSNR is db and average of J criterion is 2561, while the Speed_up value is 4.9 respect to the full search ethod. In the next state, with applying the fast search(2) algorith, PSNR, J and Speed_up will be db, 4590 and 7.7 respectively. Residual frae has been shown in figure 6. The energy and bit_rate of this frae is larger than previous and these are the cost of better Speed_up. All of these tests is perfored for QP=26. Calculation of speed_up paraeter is as following: Tie Full search _ (6) TieFast search Speed up = Fig. 2 two successive fraes of silent bitstrea
4 142 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March 2008 These successive two fraes have been chosen fro forean, coastguard, hall, news and silent bitstreas and their paraeters such as bit-rate, speed_up and PSNR have been copared. Both of bit-rate and speed_up paraeters is respect to the Full search and hence one value has been assigned to the. The bit-rate calculation is perfored based on RD cost value in the picture. The coparison is presented for three separate values of QP paraeter (consist of 5, 26, 50). the results is shown in annex tables(fro table1 to table4). To obtain ore precision results Table4 for 10 successive fraes (F=10)(at QP=26) has been achieved. Fig. 3 difference of two fraes Table 1: coparison at QP=5 (F=1) Table 2: coparison at QP=26 (F=1) Fig. 4 residual frae after applying full search Table 3: coparison at QP=50 (F=1) Table 4: coparison at QP=26 (F=10) Fig. 5 residual frae after applying fastl search(1) Fig. 6 residual frae after applying fastl search(2) Fig. 7 forean bitstrea
5 IJCSNS International Journal of Coputer Science and Network Security, VOL.8 No.3, March Fig. 8 Coastguard bitstrea Fig. 9 news bitstrea Fig. 10 hall bitstrea 4. Conclusion In this paper, three different algoriths for otion estiation are tested and copared. The fraes are I picture type and otion estiation process is perfored using one reference frae.coparison between FS(1) and FS(2) : Whereas FS(1) operates with sall block sizes, In sall value of QP and fraes with a onotonic otion (forean), it is faster than FS(2) and produces lower bit-rate. But when the otion details or oving areas decrease, FS(1) has lower speed up than FS(2), because FS(2) first checks larger blocks and has the skip ode. For larger QP or less otility fraes, it has faster operation and rather than others shows better bit-rate. When QP increases, The speed up value for FS(1) is decreased, but in FS(2), this is increased strongly. And it is due to the starting search procedure fro sall block sizes in FS(1) and fro larger block sizes in FS(2). And for all QP values, Full search algorith has the best PSNR, FS(2) has the ost speed up and PSNR for FS(1) is better than FS(2). As it sees, when QP increases, the PSNR is reduced for all algoriths, because this leads to choosing larger block sizes and produces a significant aount of energy in otion copensation residual frae. For sall QPs, The ost aount of bit-rate is for FS(2) and for large QP the ost is for FS(1). References [1] M. Ghanbari, Standard Codecs : Iage Copression to Advanced Video Coding. IEE, [2] Paolo De Pascalis, Luca Pezzoni, Gian Antonio Mian, and Daniele Bagni, "fast otion estiation with size-based predictors selection hexagonal search in H.264/AVC encoding", IEEE 2003 [3] Woong IL Choi; Byeungwoo Jeon; "fast otion estiation with odified diaond search for variable otion block sizes", International Conference on Iage Processing, Volue 2, pp 371-4, Sept [4] H.264 and MPEG-4 Video Copression, Iain E. G. Richardson, John Wiley Press, [5] Ki-Hun HAN, Yung-Lyul, "Fast Macroblock Deterination to Reduce H.264 Coplexity", IEICE TRANS. Fundaentals, Vol.E88 A, No.3 MARCH 2005 [6] Peng Yin; Tourapis, H.-Y.C.; Tourapis, A.M.; Boyce, J.; "Fast ode decision and otion estiation for JVT/H.264", International Conference on Iage Processing, Volue 3, pp 853-6, Sept [7] T. Shanableh and M. Ghanbari, Heterogeneous video transcoding tolower spatio-teporal resolutions and different encoding forats, IEEETrans. on Multiedia, vol. 2, no. 2, pp , Jun [8] R. Srinivasan and K. R. Rao, Predictive coding based on efficientotion estiation, IEEE Trans. on Co., vol. 2, no. 2, pp ,1985. [9] H. G. Musann, P. Pirsch, and H. J. Grallert, Advances in picture coding, Proc. IEEE, vol. 73, pp , Apr [10] M. Kung, VLSI Array Processors. Englewood Cliffs NJ: Prentice Hall,1987. [11] K. Tavassoli and W. Badawy, A prototype for parallel otion estiation architecture using full-search block atching algorith, in International Workshop on Digital and Coputational Video (DCV 02), Nov [12] J.-C. Tuan and C.-W. Chang, T.-S. Jen, On the data reuse and eory bandwidth analysis for full-search blockatching vlsi architecture, IEEE Trans. on Cicuits and Systes for Video Tech.,vol. 12,No.1,pp.61 72,Jan Air Ahadi received the B.E. degree in Counications, fro Tabriz Univ. (Tabriz-IRAN) in He also received his M.S degree in Electronics fro Iran University of Sience & Technology (Tehran-IRAN) in He has worked as a Planner in Dept. of Planning & Engineering at Mobile Counications Copany of Iran (MCCI) since His research interest includes Digital Iage Processing, Iage and Video Coding. M.Mahdi Azadfar received the B.E. degree in Electronics fro Ferdowsi Univ. (Mashad-IRAN) in He also received his M.S degree in Electronics fro Tarbiat Modaress Univ.(Tehran-IRAN) in He has worked as a researcher in Dept. of Multiplex,Network, Inforation Technology, at Iran Teleco Research Center (ITRC) since His research interest includes Digital Iage Processing, Iage and Video Coding, Analog and Digital Television, Multiedia systes, Video Broadcasting over Network. He is currently with the ITRC as a faculty eber.
Implementation of A Optimized Systolic Array Architecture for FSBMA using FPGA for Real-time Applications
46 IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.3, March 2008 Implementation of A Optimized Systolic Array Architecture for FSBMA using FPGA for Real-time Applications
More informationAnalysing Real-Time Communications: Controller Area Network (CAN) *
Analysing Real-Tie Counications: Controller Area Network (CAN) * Abstract The increasing use of counication networks in tie critical applications presents engineers with fundaental probles with the deterination
More informationNON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH
NON-RIGID OBJECT TRACKING: A PREDICTIVE VECTORIAL MODEL APPROACH V. Atienza; J.M. Valiente and G. Andreu Departaento de Ingeniería de Sisteas, Coputadores y Autoática Universidad Politécnica de Valencia.
More informationUtility-Based Resource Allocation for Mixed Traffic in Wireless Networks
IEEE IFOCO 2 International Workshop on Future edia etworks and IP-based TV Utility-Based Resource Allocation for ixed Traffic in Wireless etworks Li Chen, Bin Wang, Xiaohang Chen, Xin Zhang, and Dacheng
More informationStructural Balance in Networks. An Optimizational Approach. Andrej Mrvar. Faculty of Social Sciences. University of Ljubljana. Kardeljeva pl.
Structural Balance in Networks An Optiizational Approach Andrej Mrvar Faculty of Social Sciences University of Ljubljana Kardeljeva pl. 5 61109 Ljubljana March 23 1994 Contents 1 Balanced and clusterable
More informationThe optimization design of microphone array layout for wideband noise sources
PROCEEDINGS of the 22 nd International Congress on Acoustics Acoustic Array Systes: Paper ICA2016-903 The optiization design of icrophone array layout for wideband noise sources Pengxiao Teng (a), Jun
More informationInvestigation of The Time-Offset-Based QoS Support with Optical Burst Switching in WDM Networks
Investigation of The Tie-Offset-Based QoS Support with Optical Burst Switching in WDM Networks Pingyi Fan, Chongxi Feng,Yichao Wang, Ning Ge State Key Laboratory on Microwave and Digital Counications,
More informationImage Filter Using with Gaussian Curvature and Total Variation Model
IJECT Vo l. 7, Is s u e 3, Ju l y - Se p t 016 ISSN : 30-7109 (Online) ISSN : 30-9543 (Print) Iage Using with Gaussian Curvature and Total Variation Model 1 Deepak Kuar Gour, Sanjay Kuar Shara 1, Dept.
More informationAscending order sort Descending order sort
Scalable Binary Sorting Architecture Based on Rank Ordering With Linear Area-Tie Coplexity. Hatrnaz and Y. Leblebici Departent of Electrical and Coputer Engineering Worcester Polytechnic Institute Abstract
More informationA Beam Search Method to Solve the Problem of Assignment Cells to Switches in a Cellular Mobile Network
A Bea Search Method to Solve the Proble of Assignent Cells to Switches in a Cellular Mobile Networ Cassilda Maria Ribeiro Faculdade de Engenharia de Guaratinguetá - DMA UNESP - São Paulo State University
More informationEvaluation of a multi-frame blind deconvolution algorithm using Cramér-Rao bounds
Evaluation of a ulti-frae blind deconvolution algorith using Craér-Rao bounds Charles C. Beckner, Jr. Air Force Research Laboratory, 3550 Aberdeen Ave SE, Kirtland AFB, New Mexico, USA 87117-5776 Charles
More informationOPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS
Key words SOA, optial, coplex service, coposition, Quality of Service Piotr RYGIELSKI*, Paweł ŚWIĄTEK* OPTIMAL COMPLEX SERVICES COMPOSITION IN SOA SYSTEMS One of the ost iportant tasks in service oriented
More informationEE 364B Convex Optimization An ADMM Solution to the Sparse Coding Problem. Sonia Bhaskar, Will Zou Final Project Spring 2011
EE 364B Convex Optiization An ADMM Solution to the Sparse Coding Proble Sonia Bhaskar, Will Zou Final Project Spring 20 I. INTRODUCTION For our project, we apply the ethod of the alternating direction
More informationEnhancing Real-Time CAN Communications by the Prioritization of Urgent Messages at the Outgoing Queue
Enhancing Real-Tie CAN Counications by the Prioritization of Urgent Messages at the Outgoing Queue ANTÓNIO J. PIRES (1), JOÃO P. SOUSA (), FRANCISCO VASQUES (3) 1,,3 Faculdade de Engenharia da Universidade
More informationEffective Tracking of the Players and Ball in Indoor Soccer Games in the Presence of Occlusion
Effective Tracking of the Players and Ball in Indoor Soccer Gaes in the Presence of Occlusion Soudeh Kasiri-Bidhendi and Reza Safabakhsh Airkabir Univerisity of Technology, Tehran, Iran {kasiri, safa}@aut.ac.ir
More informationClustering. Cluster Analysis of Microarray Data. Microarray Data for Clustering. Data for Clustering
Clustering Cluster Analysis of Microarray Data 4/3/009 Copyright 009 Dan Nettleton Group obects that are siilar to one another together in a cluster. Separate obects that are dissiilar fro each other into
More informationDetection of Outliers and Reduction of their Undesirable Effects for Improving the Accuracy of K-means Clustering Algorithm
Detection of Outliers and Reduction of their Undesirable Effects for Iproving the Accuracy of K-eans Clustering Algorith Bahan Askari Departent of Coputer Science and Research Branch, Islaic Azad University,
More informationEnd-to-end Quality Adaptation Scheme Based on QoE Prediction for Video Streaming Service in LTE Networks
End-to-end Quality Adaptation Schee Based on QoE Prediction for Video Streaing Service in LTE etworks Huifang Chen 1,2 Xin Yu 1 Lei Xie 1,2 1 Dept. of Inforation Science and Electronic Engineering, Zhejiang
More informationDeterministic Voting in Distributed Systems Using Error-Correcting Codes
IEEE TRASACTIOS O PARALLEL AD DISTRIBUTED SYSTEMS, VOL. 9, O. 8, AUGUST 1998 813 Deterinistic Voting in Distributed Systes Using Error-Correcting Codes Lihao Xu and Jehoshua Bruck, Senior Meber, IEEE Abstract
More informationAn Efficient Approach for Content Delivery in Overlay Networks
An Efficient Approach for Content Delivery in Overlay Networks Mohaad Malli, Chadi Barakat, Walid Dabbous Projet Planète, INRIA-Sophia Antipolis, France E-ail:{alli, cbarakat, dabbous}@sophia.inria.fr
More informationComputer Aided Drafting, Design and Manufacturing Volume 26, Number 2, June 2016, Page 13
Coputer Aided Drafting, Design and Manufacturing Volue 26, uber 2, June 2016, Page 13 CADDM 3D reconstruction of coplex curved objects fro line drawings Sun Yanling, Dong Lijun Institute of Mechanical
More informationCollaborative Web Caching Based on Proxy Affinities
Collaborative Web Caching Based on Proxy Affinities Jiong Yang T J Watson Research Center IBM jiyang@usibco Wei Wang T J Watson Research Center IBM ww1@usibco Richard Muntz Coputer Science Departent UCLA
More informationGeo-activity Recommendations by using Improved Feature Combination
Geo-activity Recoendations by using Iproved Feature Cobination Masoud Sattari Middle East Technical University Ankara, Turkey e76326@ceng.etu.edu.tr Murat Manguoglu Middle East Technical University Ankara,
More informationDesign Optimization of Mixed Time/Event-Triggered Distributed Embedded Systems
Design Optiization of Mixed Tie/Event-Triggered Distributed Ebedded Systes Traian Pop, Petru Eles, Zebo Peng Dept. of Coputer and Inforation Science, Linköping University {trapo, petel, zebpe}@ida.liu.se
More informationSuper-Resolution on Moving Objects using a Polygon-Based Object Description
Super-Resolution on Moving Objects using a Polgon-Based Object Description A. van Eekeren K. Schutte O.R. Oudegeest L.J. van Vliet TNO Defence, Securit and Safet, P.O. Box 96864, 2509 JG, The Hague, The
More informationInternational Journal of Scientific & Engineering Research, Volume 4, Issue 10, October ISSN
International Journal of Scientific & Engineering Research, Volue 4, Issue 0, October-203 483 Design an Encoding Technique Using Forbidden Transition free Algorith to Reduce Cross-Talk for On-Chip VLSI
More informationCOLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL
COLOR HISTOGRAM AND DISCRETE COSINE TRANSFORM FOR COLOR IMAGE RETRIEVAL 1 Te-Wei Chiang ( 蔣德威 ), 2 Tienwei Tsai ( 蔡殿偉 ), 3 Jeng-Ping Lin ( 林正平 ) 1 Dept. of Accounting Inforation Systes, Chilee Institute
More informationA Hybrid Network Architecture for File Transfers
JOURNAL OF IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 6, NO., JANUARY 9 A Hybrid Network Architecture for File Transfers Xiuduan Fang, Meber, IEEE, Malathi Veeraraghavan, Senior Meber,
More informationEFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B.
EFFICIENT VIDEO SEARCH USING IMAGE QUERIES A. Araujo1, M. Makar2, V. Chandrasekhar3, D. Chen1, S. Tsai1, H. Chen1, R. Angst1 and B. Girod1 1 Stanford University, USA 2 Qualco Inc., USA ABSTRACT We study
More informationDistributed Multicast Tree Construction in Wireless Sensor Networks
Distributed Multicast Tree Construction in Wireless Sensor Networks Hongyu Gong, Luoyi Fu, Xinzhe Fu, Lutian Zhao 3, Kainan Wang, and Xinbing Wang Dept. of Electronic Engineering, Shanghai Jiao Tong University,
More informationFast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE Gaurav Hansda
Fast Decision of Block size, Prediction Mode and Intra Block for H.264 Intra Prediction EE 5359 Gaurav Hansda 1000721849 gaurav.hansda@mavs.uta.edu Outline Introduction to H.264 Current algorithms for
More informationDesigning High Performance Web-Based Computing Services to Promote Telemedicine Database Management System
Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh 1, Issa Khalil 2, and Abdallah Khreishah 3 1: Coputer Engineering & Inforation Technology,
More informationA CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER
A CRYPTANALYTIC ATTACK ON RC4 STREAM CIPHER VIOLETA TOMAŠEVIĆ, SLOBODAN BOJANIĆ 2 and OCTAVIO NIETO-TALADRIZ 2 The Mihajlo Pupin Institute, Volgina 5, 000 Belgrade, SERBIA AND MONTENEGRO 2 Technical University
More informationShortest Path Determination in a Wireless Packet Switch Network System in University of Calabar Using a Modified Dijkstra s Algorithm
International Journal of Engineering and Technical Research (IJETR) ISSN: 31-869 (O) 454-4698 (P), Volue-5, Issue-1, May 16 Shortest Path Deterination in a Wireless Packet Switch Network Syste in University
More informationTALLINN UNIVERSITY OF TECHNOLOGY, INSTITUTE OF PHYSICS 17. FRESNEL DIFFRACTION ON A ROUND APERTURE
7. FRESNEL DIFFRACTION ON A ROUND APERTURE. Objective Exaining diffraction pattern on a round aperture, deterining wavelength of light source.. Equipent needed Optical workbench, light source, color filters,
More informationReal Time Displacement Measurement of an image in a 2D Plane
International Journal of Scientific Research Engineering & Technology (IJSRET), ISSN 2278 0882 Volue 5, Issue 3, March 2016 176 Real Tie Displaceent Measureent of an iage in a 2D Plane Abstract Prashant
More informationEfficient Estimation of Inclusion Coefficient using HyperLogLog Sketches
Efficient Estiation of Inclusion Coefficient using HyperLogLog Sketches Azade Nazi, Bolin Ding, Vivek Narasayya, Surajit Chaudhuri Microsoft Research {aznazi, bolind, viveknar, surajitc}@icrosoft.co ABSTRACT
More informationAdaptive Parameter Estimation Based Congestion Avoidance Strategy for DTN
Proceedings of the nd International onference on oputer Science and Electronics Engineering (ISEE 3) Adaptive Paraeter Estiation Based ongestion Avoidance Strategy for DTN Qicai Yang, Futong Qin, Jianquan
More informationSolving the Damage Localization Problem in Structural Health Monitoring Using Techniques in Pattern Classification
Solving the Daage Localization Proble in Structural Health Monitoring Using Techniques in Pattern Classification CS 9 Final Project Due Dec. 4, 007 Hae Young Noh, Allen Cheung, Daxia Ge Introduction Structural
More informationA Trajectory Splitting Model for Efficient Spatio-Temporal Indexing
A Trajectory Splitting Model for Efficient Spatio-Teporal Indexing Slobodan Rasetic Jörg Sander Jaes Elding Mario A. Nasciento Departent of Coputing Science University of Alberta Edonton, Alberta, Canada
More informationTHE rapid growth and continuous change of the real
IEEE TRANSACTIONS ON SERVICES COMPUTING, VOL. 8, NO. 1, JANUARY/FEBRUARY 2015 47 Designing High Perforance Web-Based Coputing Services to Proote Teleedicine Database Manageent Syste Isail Hababeh, Issa
More informationQoS and Sensible Routing Decisions
QoS and Sensible Routing Decisions Erol Gelenbe Dept. of Electrical & Electronic Engineering Iperial College London SW7 2BT e.gelenbe@iperial.ac.uk Abstract Network Quality of Service (QoS) criteria of
More informationDifferent criteria of dynamic routing
Procedia Coputer Science Volue 66, 2015, Pages 166 173 YSC 2015. 4th International Young Scientists Conference on Coputational Science Different criteria of dynaic routing Kurochkin 1*, Grinberg 1 1 Kharkevich
More informationA Novel Approach to Fractal Dimension based Fingerprint Recognition System
Volue: 03 Issue: 04 Apr-2016 www.irjet.net p-issn: 2395-0072 A Novel Approach to Fractal Diension based Fingerprint Recognition Syste Chiteranjan Sahu 1, Vinay Jain 2 1M.E. Scholar, Dept. of Electronics
More informationBoosted Detection of Objects and Attributes
L M M Boosted Detection of Objects and Attributes Abstract We present a new fraework for detection of object and attributes in iages based on boosted cobination of priitive classifiers. The fraework directly
More informationFast Mode Decision for H.264/AVC Using Mode Prediction
Fast Mode Decision for H.264/AVC Using Mode Prediction Song-Hak Ri and Joern Ostermann Institut fuer Informationsverarbeitung, Appelstr 9A, D-30167 Hannover, Germany ri@tnt.uni-hannover.de ostermann@tnt.uni-hannover.de
More informationData & Knowledge Engineering
Data & Knowledge Engineering 7 (211) 17 187 Contents lists available at ScienceDirect Data & Knowledge Engineering journal hoepage: www.elsevier.co/locate/datak An approxiate duplicate eliination in RFID
More informationA Fast Multi-Objective Genetic Algorithm for Hardware-Software Partitioning In Embedded System Design
A Fast Multi-Obective Genetic Algorith for Hardware-Software Partitioning In Ebedded Syste Design 1 M.Jagadeeswari, 2 M.C.Bhuvaneswari 1 Research Scholar, P.S.G College of Technology, Coibatore, India
More informationSecure Wireless Multihop Transmissions by Intentional Collisions with Noise Wireless Signals
Int'l Conf. Wireless etworks ICW'16 51 Secure Wireless Multihop Transissions by Intentional Collisions with oise Wireless Signals Isau Shiada 1 and Hiroaki Higaki 1 1 Tokyo Denki University, Japan Abstract
More informationA Novel Fast Constructive Algorithm for Neural Classifier
A Novel Fast Constructive Algorith for Neural Classifier Xudong Jiang Centre for Signal Processing, School of Electrical and Electronic Engineering Nanyang Technological University Nanyang Avenue, Singapore
More informationApproximate String Matching with Reduced Alphabet
Approxiate String Matching with Reduced Alphabet Leena Salela 1 and Jora Tarhio 2 1 University of Helsinki, Departent of Coputer Science leena.salela@cs.helsinki.fi 2 Aalto University Deptartent of Coputer
More informationMultipath Selection and Channel Assignment in Wireless Mesh Networks
Multipath Selection and Channel Assignent in Wireless Mesh Networs Soo-young Jang and Chae Y. Lee Dept. of Industrial and Systes Engineering, KAIST, 373-1 Kusung-dong, Taejon, Korea Tel: +82-42-350-5916,
More informationUsing Imperialist Competitive Algorithm in Optimization of Nonlinear Multiple Responses
International Journal of Industrial Engineering & Production Research Septeber 03, Volue 4, Nuber 3 pp. 9-35 ISSN: 008-4889 http://ijiepr.iust.ac.ir/ Using Iperialist Copetitive Algorith in Optiization
More informationProblem Solving of graph correspondence using Genetics Algorithm and ACO Algorithm
Proble Solving of graph correspondence using Genetics Algorith and ACO Algorith Alireza Rezaee, 1, Azizeh Ajalli 2 Assistant professor,departent of Mechatronics Engineering, Faculty of New Sciences and
More informationScheduling Parallel Real-Time Recurrent Tasks on Multicore Platforms
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL., NO., NOV 27 Scheduling Parallel Real-Tie Recurrent Tasks on Multicore Platfors Risat Pathan, Petros Voudouris, and Per Stenströ Abstract We
More informationA Method of Generating Multi-Scale Disc-Like Distributions for NDT Registration Algorithm
International Journal of Mechanical Engineering and Robotics Research Vol. 5, o., January 06 A Method of Generating Multi-Scale Disc-Like Distributions for D Registration Algorith Hyunki Hong and Beohee
More informationComparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types
Coparative Evaluation of Color-Based Video Signatures in the Presence of Various Distortion Types Aritz Sánchez de la Fuente, Patrick Ndjiki-Nya, Karsten Sühring, Tobias Hinz, Karsten üller, and Thoas
More informationLOSSLESS COMPRESSION OF BAYER MASK IMAGES USING AN OPTIMAL VECTOR PREDICTION TECHNIQUE
1th European Signal Processing Conference (EUSIPCO 2006), Florence, Italy, Septeber -8, 2006, copyright by EUASIP LOSSLESS COMPESSION OF AYE MASK IMAES USIN AN OPTIMAL VECTO PEDICTION TECHNIQUE Stefano
More informationFeature Based Registration for Panoramic Image Generation
IJCSI International Journal of Coputer Science Issues, Vol. 10, Issue 6, No, Noveber 013 www.ijcsi.org 13 Feature Based Registration for Panoraic Iage Generation Kawther Abbas Sallal 1, Abdul-Mone Saleh
More informationA Broadband Spectrum Sensing Algorithm in TDCS Based on ICoSaMP Reconstruction
MATEC Web of Conferences 73, 03073(08) https://doi.org/0.05/atecconf/087303073 SMIMA 08 A roadband Spectru Sensing Algorith in TDCS ased on I Reconstruction Liu Yang, Ren Qinghua, Xu ingzheng and Li Xiazhao
More informationA simplified approach to merging partial plane images
A siplified approach to erging partial plane iages Mária Kruláková 1 This paper introduces a ethod of iage recognition based on the gradual generating and analysis of data structure consisting of the 2D
More informationOn the Computation and Application of Prototype Point Patterns
On the Coputation and Application of Prototype Point Patterns Katherine E. Tranbarger Freier 1 and Frederic Paik Schoenberg 2 Abstract This work addresses coputational probles related to the ipleentation
More informationIdentifying Converging Pairs of Nodes on a Budget
Identifying Converging Pairs of Nodes on a Budget Konstantina Lazaridou Departent of Inforatics Aristotle University, Thessaloniki, Greece konlaznik@csd.auth.gr Evaggelia Pitoura Coputer Science and Engineering
More informationMULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES. Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou
MULTI-INDEX VOTING FOR ASYMMETRIC DISTANCE COMPUTATION IN A LARGE-SCALE BINARY CODES Chih-Yi Chiu, Yu-Cyuan Liou, and Sheng-Hao Chou Departent of Coputer Science and Inforation Engineering, National Chiayi
More informationIMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE. Rafael García, Xevi Cufí and Lluís Pacheco
IMAGE MOSAICKING FOR ESTIMATING THE MOTION OF AN UNDERWATER VEHICLE Rafael García, Xevi Cufí and Lluís Pacheco Coputer Vision and Robotics Group Institute of Inforatics and Applications, University of
More informationRelief shape inheritance and graphical editor for the landscape design
Relief shape inheritance and graphical editor for the landscape design Egor A. Yusov Vadi E. Turlapov Nizhny Novgorod State University after N. I. Lobachevsky Nizhny Novgorod Russia yusov_egor@ail.ru vadi.turlapov@cs.vk.unn.ru
More informationTensorFlow and Keras-based Convolutional Neural Network in CAT Image Recognition Ang LI 1,*, Yi-xiang LI 2 and Xue-hui LI 3
2017 2nd International Conference on Coputational Modeling, Siulation and Applied Matheatics (CMSAM 2017) ISBN: 978-1-60595-499-8 TensorFlow and Keras-based Convolutional Neural Network in CAT Iage Recognition
More informationA wireless sensor network for visual detection and classification of intrusions
A wireless sensor network for visual detection and classification of intrusions ANDRZEJ SLUZEK 1,3, PALANIAPPAN ANNAMALAI 2, MD SAIFUL ISLAM 1 1 School of Coputer Engineering, 2 IntelliSys Centre Nanyang
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationPrivacy-preserving String-Matching With PRAM Algorithms
Privacy-preserving String-Matching With PRAM Algoriths Report in MTAT.07.022 Research Seinar in Cryptography, Fall 2014 Author: Sander Sii Supervisor: Peeter Laud Deceber 14, 2014 Abstract In this report,
More informationRedundancy Level Impact of the Mean Time to Failure on Wireless Sensor Network
(IJACSA) International Journal of Advanced Coputer Science and Applications Vol. 8, No. 1, 217 Redundancy Level Ipact of the Mean Tie to Failure on Wireless Sensor Network Alaa E. S. Ahed 1 College of
More informationNovel Image Representation and Description Technique using Density Histogram of Feature Points
Novel Iage Representation and Description Technique using Density Histogra of Feature Points Keneilwe ZUVA Departent of Coputer Science, University of Botswana, P/Bag 00704 UB, Gaborone, Botswana and Tranos
More informationPerformance Analysis of RAID in Different Workload
Send Orders for Reprints to reprints@benthascience.ae 324 The Open Cybernetics & Systeics Journal, 2015, 9, 324-328 Perforance Analysis of RAID in Different Workload Open Access Zhang Dule *, Ji Xiaoyun,
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More informationPOSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION. Junjun Jiang, Ruimin Hu, Zhen Han, Tao Lu, and Kebin Huang
IEEE International Conference on ultiedia and Expo POSITION-PATCH BASED FACE HALLUCINATION VIA LOCALITY-CONSTRAINED REPRESENTATION Junjun Jiang, Ruiin Hu, Zhen Han, Tao Lu, and Kebin Huang National Engineering
More informationClosing The Performance Gap between Causal Consistency and Eventual Consistency
Closing The Perforance Gap between Causal Consistency and Eventual Consistency Jiaqing Du Călin Iorgulescu Aitabha Roy Willy Zwaenepoel EPFL ABSTRACT It is well known that causal consistency is ore expensive
More informationEffects of Interleaving on RTP Header Compression
Effects of Interleaving on RTP Header Copression Colin Perkins Jon Crowcroft Departent of Coputer Science University College London Gower Street London WCE 6BT Abstract We discuss the use of interleaving
More informationDerivation of an Analytical Model for Evaluating the Performance of a Multi- Queue Nodes Network Router
Derivation of an Analytical Model for Evaluating the Perforance of a Multi- Queue Nodes Network Router 1 Hussein Al-Bahadili, 1 Jafar Ababneh, and 2 Fadi Thabtah 1 Coputer Inforation Systes Faculty of
More informationMIDA: AN IDA SEARCH WITH DYNAMIC CONTROL
April 1991 UILU-ENG-91-2216 CRHC-91-9 Center fo r Reliable and High-Perforance Coputing MIDA: AN IDA SEARCH WITH DYNAMIC CONTROL Benjain W. Wah Coordinated Science Laboratory College of Engineering UNIVERSITY
More informationSurvivability Function A Measure of Disaster-Based Routing Performance
Survivability Function A Measure of Disaster-Based Routing Perforance Journal Club Presentation on W. Molisz. Survivability function-a easure of disaster-based routing perforance. IEEE Journal on Selected
More informationJoint Measurement- and Traffic Descriptor-based Admission Control at Real-Time Traffic Aggregation Points
Joint Measureent- and Traffic Descriptor-based Adission Control at Real-Tie Traffic Aggregation Points Stylianos Georgoulas, Panos Triintzios and George Pavlou Centre for Counication Systes Research, University
More informationAbstract. 2. Segmentation Techniques. Keywords. 1. Introduction. 3. Threshold based Image Segmentation
International Journal of Advanced Coputer Research (ISSN (print): 49-777 ISSN (online): 77-7970) Volue-3 Nuber- Issue-8 March-03 MRI Brain Iage Segentation based on hresholding G. Evelin Sujji, Y.V.S.
More informationVision Based Mobile Robot Navigation System
International Journal of Control Science and Engineering 2012, 2(4): 83-87 DOI: 10.5923/j.control.20120204.05 Vision Based Mobile Robot Navigation Syste M. Saifizi *, D. Hazry, Rudzuan M.Nor School of
More informationPERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/m QUEUEING MODEL
IJRET: International Journal of Research in Engineering and Technology ISSN: 239-63 PERFORMANCE MEASURES FOR INTERNET SERVER BY USING M/M/ QUEUEING MODEL Raghunath Y. T. N. V, A. S. Sravani 2 Assistant
More informationReal-Time Detection of Invisible Spreaders
Real-Tie Detection of Invisible Spreaders MyungKeun Yoon Shigang Chen Departent of Coputer & Inforation Science & Engineering University of Florida, Gainesville, FL 3, USA {yoon, sgchen}@cise.ufl.edu Abstract
More informationVideo summarization based on shot boundary detection with penalized contrasts
Video suarization based on shot boundary detection with penalized contrasts Paschalina Medentzidou and Constantine Kotropoulos Departent of Inforatics Aristotle University of Thessaloniki Thessaloniki
More informationTheoretical Analysis of Local Search and Simple Evolutionary Algorithms for the Generalized Travelling Salesperson Problem
Theoretical Analysis of Local Search and Siple Evolutionary Algoriths for the Generalized Travelling Salesperson Proble Mojgan Pourhassan ojgan.pourhassan@adelaide.edu.au Optiisation and Logistics, The
More informationA Measurement-Based Model for Parallel Real-Time Tasks
A Measureent-Based Model for Parallel Real-Tie Tasks Kunal Agrawal 1 Washington University in St. Louis St. Louis, MO, USA kunal@wustl.edu https://orcid.org/0000-0001-5882-6647 Sanjoy Baruah 2 Washington
More informationEvaluation of the Timing Properties of Two Control Networks: CAN and PROFIBUS
Evaluation of the Tiing Properties of Two Control Networs: CAN and PROFIBUS Max Mauro Dias Santos 1, Marcelo Ricardo Steer 2 and Francisco Vasques 3 1 UnilesteMG, CEP 35170-056, Coronel Fabriciano MG Brasil.
More informationThreshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding
1 Threshold Analysis of Non-Binary Spatially-Coupled LDPC Codes with Windowed Decoding Lai Wei, Toshiaki Koike-Akino, David G. M. Mitchell, Thoas E. Fuja, and Daniel J. Costello, Jr. Departent of Electrical
More informationMGS-SIFT: A New Illumination Invariant Feature Based on SIFT Descriptor
International Journal of Coputer Theory and Engineering, Vol 5, No, February 0 MGS-SIFT: A New Illuination Invariant Feature Based on SIFT Descriptor Reza Javanard Alitappeh and Fariborz Mahoudi Abstract
More informationA High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Membership Functions *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 607-626 (2005) A High-Speed VLSI Fuzzy Inference Processor for Trapezoid-Shaped Mebership Functions * SHIH-HSU HUANG AND JIAN-YUAN LAI + Departent of
More informationDefining and Surveying Wireless Link Virtualization and Wireless Network Virtualization
1 Defining and Surveying Wireless Link Virtualization and Wireless Network Virtualization Jonathan van de Belt, Haed Ahadi, and Linda E. Doyle The Centre for Future Networks and Counications - CONNECT,
More informationA Low-cost Memory Architecture with NAND XIP for Mobile Embedded Systems
A Low-cost Meory Architecture with XIP for Mobile Ebedded Systes Chanik Park, Jaeyu Seo, Sunghwan Bae, Hyojun Ki, Shinhan Ki and Busoo Ki Software Center, SAMSUNG Electronics, Co., Ltd. Seoul 135-893,
More informationCLUSTERING OF AE SIGNAL AMPLITUDES BY MEANS OF FUZZY C-MEANS ALGORITHM
The 12 th International Conference of the Slovenian Society for Non-Destructive Testing»Application of Conteporary Non-Destructive Testing in Engineering«Septeber 4-6, 213, Portorož, Slovenia More info
More informationAction Recognition Using Local SpatioTemporal Oriented Energy Features and Additive. Kernel SVMs
International Journal of Electronics and Electrical Engineering Vol., No., June, 4 Action Recognition Using Local SpatioTeporal Oriented Energy Features and Additive Kernel SVMs Jiangfeng Yang and Zheng
More informationColorado School of Mines. Computer Vision. Professor William Hoff Dept of Electrical Engineering &Computer Science.
Professor Willia Hoff Dept of Electrical Engineering &Coputer Science http://inside.ines.edu/~whoff/ 1 Caera Calibration 2 Caera Calibration Needed for ost achine vision and photograetry tasks (object
More informationAutomatic Graph Drawing Algorithms
Autoatic Graph Drawing Algoriths Susan Si sisuz@turing.utoronto.ca Deceber 7, 996. Ebeddings of graphs have been of interest to theoreticians for soe tie, in particular those of planar graphs and graphs
More informationQUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS
QUERY ROUTING OPTIMIZATION IN SENSOR COMMUNICATION NETWORKS Guofei Jiang and George Cybenko Institute for Security Technology Studies and Thayer School of Engineering Dartouth College, Hanover NH 03755
More informationA Learning Framework for Nearest Neighbor Search
A Learning Fraework for Nearest Neighbor Search Lawrence Cayton Departent of Coputer Science University of California, San Diego lcayton@cs.ucsd.edu Sanjoy Dasgupta Departent of Coputer Science University
More information