Search results for "coding"

showing 10 items of 920 documents

Optimization of the Relay Selection Scheme in Cooperative Retransmission Networks

2011

Cooperative MAC protocol design has attracted much attention recently thanks to the development of relaying techniques. In single-relay C-ARQ, the relay selection scheme cannot work efficiently in a dense network, due to high collision probability among different contending relays. In this paper, the throughput performance impairment from the collision is analysed in a typical network scenario. Thereby, we propose an optimized relay selection scheme aiming at maximizing system throughput by reducing collision probability. The throughput performance enhancement by the proposed optimal relay selection scheme is verified by simulations.

business.industryComputer scienceAutomatic repeat requestRetransmissionComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSThroughputData_CODINGANDINFORMATIONTHEORYlaw.inventionRelaylawComputer Science::Networking and Internet ArchitectureFadingbusinessThroughput (business)Selection (genetic algorithm)Relay channelComputer Science::Information TheoryComputer network2011 IEEE 73rd Vehicular Technology Conference (VTC Spring)
researchProduct

Use of H.264 real-time video encoding to reduce display wall system bandwidth consumption

2015

This paper compares the DXT and JPEG image compression techniques used in display wall solutions SAGE and DisplayCluster with hardware accelerated H.264 video encoding that is used in the display wall system developed by the authors of this paper. The obtained processing power usage and generated bandwidth measurements presented in this paper demonstrate that hardware accelerated H.264 encoding offers multiple benefits over software implemented H.264, DXT and JPEG.

business.industryComputer scienceBandwidth (signal processing)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONData_CODINGANDINFORMATIONTHEORYcomputer.file_formatJPEGPower usageReal time videoSoftwareJpeg image compressionbusinesscomputerComputer hardwareTransform codingData compression2015 IEEE 3rd Workshop on Advances in Information, Electronic and Electrical Engineering (AIEEE)
researchProduct

Prediction of Disease–lncRNA Associations via Machine Learning and Big Data Approaches

2021

This chapter introduces long non-coding RNAs and their role in the occurrence and progress of diseases. The discovery of novel lncRNA-disease associations may provide valuable input to the understanding of disease mechanisms at the lncRNA level, as well as to the detection of biomarkers for disease diagnosis, treatment, prognosis, and prevention. Unfortunately, due to costs and time complexity, the number of possible disease-related lncRNAs verified by traditional biological experiments is very limited. Computational approaches for the prediction of potential disease-lncRNA associations can effectively decrease the time and cost of biological experiments. We first review the main computatio…

business.industryComputer scienceBig Data Technologies Biological Processes Computational Approaches Disease–lncRNA Associations Non-Coding RNA Hypergeometric distribution Leave One Out Cross Validation Long non-coding RNA Master-Slave Architecture Micro-RNA.Big dataArtificial intelligenceDiseasebusinessMachine learningcomputer.software_genrecomputer
researchProduct

Performance Analysis of M-Ary PSK Modulation Schemes over Multiple Double Rayleigh Fading Channels with EGC in Cooperative Networks

2010

This article studies the performance of M-ary phase shift keying (PSK) modulation schemes over mobile-to-mobile (M2M) fading channels with equal gain combining (EGC) in cooperative networks. The frequency-nonselective M2M fading channels are modeled assuming non-line-of-sight (NLOS) propagation conditions. Furthermore, a dual-hop amplify-and-forward relay type cooperative network is taken into consideration here. It is assumed that K diversity branches are present between the source mobile station and the destination mobile station via K mobile relays. The performance of M-ary PSK modulation schemes is analyzed by evaluating the average bit error probability (BEP). We have derived a simple …

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSData_CODINGANDINFORMATIONTHEORYTopologylaw.inventionNon-line-of-sight propagationDiversity gainRelaylawModulationMobile stationComputer Science::Networking and Internet ArchitectureFadingTelecommunicationsbusinessComputer Science::Information TheoryCommunication channelPhase-shift keyingRayleigh fading2010 IEEE International Conference on Communications Workshops
researchProduct

Multi-Antenna Covert Communication With Jamming in the Presence of a Mobile Warden

2021

Covert communication can hide the information transmission process from the warden to prevent adversarial eavesdropping. However, it becomes challenging when the warden can move. In this paper, we propose a covert communication scheme against a mobile warden, which maximizes the connectivity throughput between a multi-antenna transmitter and a full-duplex jamming receiver with the covert outage probability (COP) limit. First, we analyze the monotonicity of the COP to obtain the optimal location the warden can move. Then, under this worst situation, we optimize the transmission rate, the transmit power and the jamming power of covert communication to maximize the connection throughput. This …

business.industryComputer scienceComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTransmitterProcess (computing)020206 networking & telecommunicationsJammingEavesdroppingThroughputData_CODINGANDINFORMATIONTHEORY02 engineering and technologyTransmitter power outputPower (physics)Covert0202 electrical engineering electronic engineering information engineeringbusinessComputer network2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring)
researchProduct

Repair Mechanisms for Broadcast Transmissions in Hybrid Cellular & DVB-H Systems

2006

This paper proposes a framework for investigating potential infrastructure cost savings in hybrid cellular and DVB- H systems by performing efficient error repair of broadcast transmissions. The main idea is to reuse as much as possible the existing network infrastructure to provide mobile TV services. The cellular system is not only employed to collect information, but also to send repair data to the users whose conditions are temporarily affected by noise, interference and fading. To enable an easy and efficient implementation of the repair mechanisms we adopt the use of application layer - forward error correction (AL-FEC) with digital fountain coding.

business.industryComputer scienceDVB-HMobile televisionDigital Video BroadcastingFadingForward error correctionReusebusinessApplication layerComputer networkCoding (social sciences)2006 3rd International Symposium on Wireless Communication Systems
researchProduct

Application Layer FEC for Mobile TV Delivery in IP Datacast Over DVB-H Systems

2009

In this paper we investigate the potential gain that can be obtained in DVB-H using application layer forward error correction (AL-FEC) to perform a multi-burst protection of the transmission for improving the reception of streaming services for mobile terminals. Compared to the conventional approach with link layer multi protocol encapsulation FEC (MPE-FEC), this technique allows to increase the robustness of the DVB-H transmission not only as a function of the capacity devoted for error repair (FEC overhead), but also as a function of the number of bursts jointly encoded. The main drawback of this approach is an increase of the network latency, that can be translated into a larger service…

business.industryComputer scienceDVB-HMobile televisionReal-time computingData_CODINGANDINFORMATIONTHEORYApplication layerlaw.inventionlawInternet ProtocolDigital Video BroadcastingMedia TechnologyLink layerForward error correctionElectrical and Electronic EngineeringbusinessAccess timeComputer networkIEEE Transactions on Broadcasting
researchProduct

Towards General Purpose Object Detection: Deep Dense Grid Based Object Detection

2020

Object detection is one of the most challenging and very important branch of computer vision. Some of the challenging aspect of a detection network is the fact that an object can appear anywhere in the image, be partially occluded by another object, might appear in crowd or have greatly varying scales. Consequently, we propose a fine grained and equally spaced dense grid cells throughout an input image be responsible of detecting an object. We re-purpose an already existing deep state-of-the-art detector or classifier into deep and dense detector. Our dense object detector uses binary class encoding and hence suitable for very large multi-class object detector. We also propose a more flexib…

business.industryComputer scienceDetector0211 other engineering and technologiesBinary number020101 civil engineering02 engineering and technologyFilter (signal processing)Pascal (programming language)Object (computer science)Object detection0201 civil engineeringEncoding (memory)021105 building & constructionClassifier (linguistics)Computer visionArtificial intelligencebusinesscomputercomputer.programming_language2020 14th International Conference on Innovations in Information Technology (IIT)
researchProduct

Joint routing and per-flow fairness in wireless multihop networks

2008

In wireless multihop networks communication between two end-nodes is carried out by hopping over multiple short wireless links. Traditional CSMA/CA based media access control does not work satisfactory in a multihop scenario, since an intended target of a communication may be subject to mutual interference imposed by concurrent transmissions from nodes which cannot directly sense each other, causing unfair throughput allocation. Although TDMA seems to be a more promising solution, careful transmission scheduling is needed in order to achieve error-free communication and fairness. In our previous work, a TDMA scheduling algorithm has been proposed that schedules the transmissions in a fair m…

business.industryComputer scienceDistributed computingComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSTime division multiple accessData_CODINGANDINFORMATIONTHEORYLoad balancing (computing)Network topologyScheduling (computing)WLANroutingMedia access controlWirelessMaximum throughput schedulingbusinessWireless sensor networkComputer network
researchProduct

Superresolving optical system with time multiplexing and computer decoding

2008

Objects that have slow temporal variations may be superresolved with two moving masks such as pinhole or grating. The first mask is responsible for encoding the input image, and the second one performs the decoding operation. This approach is efficient for exceeding the resolving capability beyond Abbe’s limit of resolution. However, the proposed setup requires two physical gratings that should move in a synchronized manner. We propose what is believed to be a novel configuration in which the second grating responsible for the information decoding is replaced with a detector array and some postprocessing digital procedures. In this way the synchronization problem that exists when two gratin…

business.industryComputer scienceMaterials Science (miscellaneous)Aperture synthesisPhysics::OpticsImage processingGratingMultiplexingSuperresolutionIndustrial and Manufacturing EngineeringSynchronizationsymbols.namesakeOpticssymbolsPinhole (optics)Business and International ManagementbusinessDoppler effectImage resolutionDecoding methodsApplied Optics
researchProduct