Loading [MathJax]/extensions/MathZoom.js
IEEE Xplore Search Results

Showing 1-25 of 23,912 resultsfor

Results

We extend the results of Ghourchian et al. [1] to joint source-channel coding with eavesdropping. Our work characterizes the sequential encoding process using the cumulative rate distribution functions (CRDF) and includes a security constraint using the cumulative leakage distribution functions (CLF). The information leakage is defined based on the mutual information between the source and the out...Show More
In multi-label classification problems, each instance can simultaneously have multiple labels. Since the whole number of available labels in real-world applications tends to be (very) large, multi-label classification becomes an important challenge and recently label space dimension reduction (LSDR) methods have received attention. These methods first encode the output space to a low-dimensional l...Show More
A hardware design for genetic algorithm (GA) can implement only one specific cost function of a problem at a time. Actually, different GA applications require different GA hardware architecture. The development of a flexible very-large-scale integration (VLSI) for GA has been proposed in this paper. For the hardware architecture, we has develop on a random number generator (RNG), crossover, and mu...Show More
In this paper we propose a matched decoding scheme for convolutionally encoded transmission over intersymbol interference (ISI) channels and devise a nonlinear trellis description. As an application we show that for coded continuous phase modulation (CPM) using a non-coherent receiver the number of states of the super-trellis can be significantly reduced by means of a matched non-linear trellis en...Show More
This paper first introduces the principle of BDD algorithm, then gives the definition of 1-structure function and 0-structural function, and derives the 1-structure and 0-structure function of each logic gate based on the principle of disjoint of BDD. Next, the concept of hidden BDD is proposed. Then the algorithm flow is proposed, The algorithm does not need to sort the bottom event, nor does it ...Show More
A multilevel S-threshold function characterizes a partition of a discrete point set (the domain of the function)into nonempty subsets. Each subset is labeled by one element (level) of the image set. We propose an encoding that converts a multilevel S-threshold function into a tuple of positive integers. The components of this code are generalisation of well known Chow and Nomura parameters. We der...Show More
As the first step of machine-learning based protein structure and function prediction, the amino acid encoding play a fundamental role in the final success of those methods. Different from the protein sequence encoding, the amino acid encoding can be used in both residue-level and sequence-level prediction of protein properties by combining them with different algorithms. However, it has not attra...Show More
Boolean functions are very important cryptographic primitives in stream or block ciphers. In order to be useful for cryptographic applications, these functions should satisfy some properties like high algebraic degree, high non linearity or being correlation immune. Since for most of the cryptographic criteria presented in the literature there is no complete characterization of the set of function...Show More
Some applications require video content to be encoded and uploaded to a remote destination in a fixed time. This paper proposes a novel approach to address this challenge, based on online adaptation of compression parameters to control both encoding and uploading time. In particular, an algorithm to accurately predict the encoding time and bit-rate resulting from using a given quantisation paramet...Show More
In this paper, a modified bit-rate estimation method is proposed to reduce the computation for 4×4 intra mode decision of H.264/AVC video encoder. The number of coded bits is modeled by a linear combination of existing coding parameters, which are highly related to the entropy coding of H.264/AVC. Furthermore, to improve the accuracy of the estimation, the proposed scheme is made adaptive to the i...Show More
Rate-Distortion (R-D) optimization technique plays an important role in video coding. R-D sense discarding (thresholding) technique can make great improvement on the coding efficiency. This work first proposes a multi-level coefficient discarding scheme, which is composed of coefficient-level (CL), block-level and macroblock-level discarding. In CL, coefficient-level R-D cost function is formulate...Show More
Software piracy has become a major threat to software developer. One of the techniques that can be used to discourage piracy is watermarking, by embedding developer's watermark into software which can later be extracted to prove ownership. During the last few years, different algorithms were developed to embed watermark inside the software. One of the algorithms is dummy method insertion technique...Show More
In this paper we address the state assignment problem for Finite State Machines (FSMs). In particular we study the effect of certain sparse state encoding strategies on the area and performance of the FSM when implemented using multi-level logic circuits. We present the results of a systematic study conducted for characterizing the effects of some encoding schemes on the area and delay of FSM impl...Show More
We address the problem of finite state machines (FSM) synthesis for the two most popular Field Programmable Gate Array (FPGA) architectures : Actel and Xilinx. We propose a unified approach that deals with state assignment, optimization and mapping problems and that takes the target architecture into account during all the phases of the synthesis. This approach is made possible by very fast FPGA m...Show More
This paper presents an operational rate-distortion (ORD) optimal approach for skeleton-based boundary encoding. The boundary information is first decomposed into skeleton and distance signals, by which a more efficient representation of the original boundary results. Curves of arbitrary order are utilized for approximating the skeleton and distance signals. For a given bit budget for a video frame...Show More
We report plasmonic physical unclonable functions utilizing on-chip integrated arrays of nanoparticles with strong heterogeneity. Via transmission and dark-field imaging, the characterized PUF tags exhibit excellent randomness, uniqueness, and scalable encoding capacity up to $\sim 2^{35107}$.Show More
In this paper, radial basis function (RBF) network is applied to achieve the discrimination of ratpsilas behavior by encoding and decoding the ratpsilas motor cortical activity. Firstly, the brain neuronal action potentials during extending and flexing behaviors of ratspsila forearms are recorded. Secondly, the neuronal action potentials are classified based on principal component analysis (PCA) a...Show More
This paper discusses the symbolic functional decomposition method for implementing finite state machines in field-programmable gate array devices as a viable alternative to the presently widespread two-step approach to the problem, which consist of separate encoding and mapping stages. Also, a new algorithm for obtaining the betaG and betaQv blankets is introduced, along with results showing the a...Show More
We present a new approach for FSM synthesis on the two most popular FPGA architectures: Actel and Xilinx. This approach deals with state assignment, optimization and mapping problems. Very fast FPGA mapping techniques based on multi-ROBDD representation (Shared, Reduced and Ordered BDDs) have been defined that allow the target architecture to be really taken into consideration during all the phase...Show More
We present a general MIMO neural circuit architecture for the encoding of multivariate stimuli in the time domain. The signals belong to the finite space of vector-valued trigonometric polynomials. They are filtered with a linear time-invariant kernel and then processed by a population of leaky integrate-and-fire neurons. We present formal, intuitive, necessary conditions for faithful encoding and...Show More
In this paper, a rate estimation technique using the transform coefficient variance is proposed in the rate-distortion cost function for intra mode decision. The experiment shows that the rate estimation using the absolute transform coefficient variance can predict rates more accurate than the one using ρ-domain model. The new cost function brings out an average speed-up factor of 13.8 when compar...Show More
This paper describes two speed-up techniques for Boolean matching of LUT-based circuits. One is one-hot encoding technique for variables representing input assignments. Though it requires more variables than existing binary encoding technique, almost all added clauses using one-hot encoding are binary clauses, which are suitable for efficient Boolean constraint propagation. The other is CEGAR (cou...Show More
Petri nets are a graph-based formalism appropriate to model concurrent systems such as asynchronous circuits or network protocols. Symbolic techniques based on Binary Decision Diagrams (BDDs) have emerged as one of the strategies to overcome the state explosion problem in the analysis of systems modeled by Petri nets. The existing techniques for state encoding use a variable-per-place strategy tha...Show More
The contribution is an optimal encoding for a set in a Reduced Ordered Binary Decision Diagram (ROBDD) when the number of elements in the set's domain is not a power of 2. The contribution includes a proof that the proposed encoding produces an ROBDD with the minimum number of nodes and discusses related open problems that are not solved by the proposed encoding.Show More
H.264/AVC is a powerful and high performance video compression standard. To achieve high coding efficiency, it employs many new techniques, such as spatial prediction in intra coding, adaptive block size motion compensation, multiple reference pictures, and so on. Especially the complex intra and inter encoding modes, obtain notable coding gains. The high computation burden of mode decision proced...Show More