Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme
|
|
- Myra Long
- 6 years ago
- Views:
Transcription
1 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract The objectve of nverse halftonng s to reconstruct hgh qualty grayscale mages from b-level halftone mages. Dfferent from the prevous nverse halftonng approaches, our algorthm computes the dfference mage between the predcted mage usng Gaussan flterng from a halftone mage and the orgnal grayscale one. The dfference mage s then compressed and embedded nto the halftone mage usng a reversble data hdng method. In the mage reconstructon process, the marked halftone mage s scanned to extract the embedded data. Fnally, a better qualty of reconstructed mage can be generated by addng the extracted dfference mage to the predcted mage. Expermental results show that the proposed approach can effcently mprove the qualty of reconstructed mages for nverse halftonng when compared to the prevous approaches. Index Terms nverse halftonng, pattern substtuton, reversble data hdng, Gaussan flterng H I. INTRODUCTION ALFTONE technques have been wdely appled to many felds, ncludng the prntng of newspapers, magaznes, books, and dsplay devces. It s a process of convertng grayscale mages nto halftone mages for the devces that can only process blevel mages. Halftone mages are bnary mages that provde a rendton of gray-scale mages and conssts of 0 and 1. In the halftonng process, t needs to use a kernel to carry out the converson, and the common kernel s such as Floyd-Stenberg kernel, and s dffcult to recover a contnuous-tone mage through halftone manpulaton, converson, compresson, etc. Inverse halftonng s a process whch transforms halftone mages nto grayscale mages. The objectve of nverse halftone reconstructon s to convert halftone blevel mages nto gray-level mages wth the mnmum dstorton. In the past few years, many effcent nverse halftonng algorthms have been proposed, but there s no way to construct a perfect gray-scale mage from a gven halftone mage. There exst several nverse halftonng methods, ncludng kernel estmaton [1], wavelet [2], flterng [3][4], and set theoretc approaches[5]. Most of these methods can obtan good Manuscrpt receved March 19, 2011; revsed Aprl 15, Ths work was Me-Y Wu. Author s wth General Educaton Center, Natonal Kaohsung Unversty of Hosptalty and Toursm. No.1, Songhe Rd., Xaogang Dst., Kaohsung Cty 81271, Tawan Ja-Hong Lee. Author s wth Informaton Management Department, the Natonal Kaohsung Frst Unversty of Scence and Technology, 2 Jhuoyue Rd., Nanzh, Kaohsung Cty, 811, Tawan (correspondng author, phone: ; fax: ; e-mal: jhlee@ nkfust.edu.tw). Hong-Je Wu. Author s wth Informaton Management Department, the Natonal Kaohsung Frst Unversty of Scence and Technology.. ISSN: (Prnt); ISSN: (Onlne) reconstructon mage qualty but requre relatvely hgh computatonal complexty. The halftonng and nverse halftonng processes can be regarded as the encodng and decodng processes of vector quantzaton. Therefore, the codebook desgn methods can be appled to buld the nverse halftonng lookup tables [6] [7]. The content of a table entry s the centrod of the nput samples that are mapped to ths entry. The results are optmal n the sense of mnmzng the MSE for a gven halftone method. Although the table lookup method has the advantages of good reconstructed qualty and fast speed, t faces the empty cell problem n whch no or very few tranng samples are mapped to a specfc halftone pattern. In ths paper, a reversble data hdng scheme s proposed to embed some useful nformaton nto the halftone mages. Then users can extract the embedded nformaton and reconstruct the orgnal halftone mage from the marked halftone mage. The extracted nformaton can mprove the qualty of generated grayscale mages by usng a flter based nverse halftonng method. II. REVIEW OF INVERSE HALFTONING AND REVERSIBLE DATA HIDING A. LUT-based Inverse Halftonng (LIH) Method The LUT-based method ncludes two procedures: the LUT buld-up and the LUT-based nverse halftonng (LIH) procedures. The LUT buld-up procedure s to buld the LUT nformaton by scannng selected grayscale mages and ther correspondng halftone mages wth a 3 3 or 4 4 template. Template s used as a sldng wndow to buld up the LUT. In the LIH procedure, a grayscale mage can be reconstructed from a gven halftone mage usng the LUT nformaton. The LUT nformaton contans a set of pars of bnary pattern and ts correspondng estmated gray value. Assume that there are L tranng mage par sets and {( O, H ) 1 L} represents the th par, where O denotes the th orgnal mage and H the correspondng halftone mage of O. The LUT buld-up and LIH procedures usng 4 4 template F are descrbed as follows: Procedure LUT buld-up: Step 1: Let arrays LUT[] and N [] be zero as the ntal values. LUT[] s used to record the mapped gray value correspondng to a specfc bnary template wth ndex I whch s appeared n the nput halftone mage and N[] s used to store the occurrence frequency of ths specfc bnary template n the halftone mage. Select L tranng grayscale mages and generate ther correspondng halftone mages, respectvely.
2 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Step2: Select one mage from the L tranng grayscale mages. Scan the selected mage and ts correspondng halftone mage n raster order wth the template F. Let P k be the bnary value of a pxel located on X n a halftone mage and the gray value wth the same locaton X n a tranng mage s denoted as G(X). The ndex I and LUT[ can be calculated usng equaton (1) where k represents dfferent locaton on the template F. Snce there are totally 16 locatons on the template F, the value of I ranges from 0 to Then, the sum of the template occurrence frequences and the sum of the gray values on the tranng mage wth the same poston X can be computed as the equaton (2). 15 (1) I 2 K Pk k0 N[ N[ 1 (2) LUT[ LUT[ G( X ) Step3: Repeat Step 2, untl all L mages are selected. Step4: The predcted gray value for a specfed 4 4 pattern wth ndexed I can be computed as Procedure LIH: LUT[ LUT[ (3) N[ Step1:Perform the above-mentoned LUT buld-up algorthm to buld LUT. Step2: Scan a halftone mage n raster order wth template F, and compute the template ndex I usng equaton (1). The estmated gray value G (X) on the locaton X can be obtaned and denoted as G' ( X ) LUT[. Step3: Output the estmated grayscale mage. Note that, some bnary patterns n the nput halftone mage may not exst n the tranng mages. In ths stuaton, we wll apply Gaussan flter method to estmate the mean gray value. Thought the LUT-based nverse halftonng method s easly mplemented, there exsts a dsadvantage of ths method, the constructed LUT nformaton must be sent to the recever. B. Gaussan Flterng Method Gaussan flterng s a smoothng algorthm for mages. Equaton (4) denotes a 2D Gaussan functon, where s the standard devaton of a Gaussan dstrbuton. In the mplementaton of nverse halftonng usng Gaussan flterng, the bnary pxel value 0 and 1 n the nput halftone mage wll be regarded as 0 and 255, respectvely. A weght mask wth specfed sze and contents should be determned accordng to the use of Gaussan dstrbuton wth parameter. G 2 2 x y ( x, y) e 2 (4) 2 In the nverse halftonng process, the halftone mage s scanned pxel by pxel n a raster order by movng the sldng mask. The output gray value on the correspondng central pxel of the mask s estmated va the summaton of the weght value on the mask content multplyng by the bnary values on the neghborng pxels. III. THE PROPOSED METHOD A. Dagram of the Proposed Method Orgnal Halftone (2)Gaussan flterng (5)Lossy Compresson (1)Halftonng by error-dffuson Predcted (4)Subtracton Dfference Bnary Fle (6) Reversble data hdng (3)Pattern selecton Selected Pars Marked Output Predcted (4)Gaussan flterng Halftone Decompressed Bnary Fle (1) Data extractng (5)Addton (3)Restore (2)Decompresson Fg. 1. The embeddng and extractng dagram of proposed method. To mprove the reconstructed mage qualty for nverse halftonng, the proposed reversble data hdng technque s appled and dvded nto two phases: the embeddng process and the extractng process. Fgure 1 shows the dagram of the proposed method. In the embeddng process, a grayscale mage G s transferred nto a halftone mage H by error dffuson process wth Floyd-Stenberg kernel. The halftone mage H can be used as an nput to obtan a predcted mage G when a Gaussan flter s appled. Then we can obtan a dfference mage D by a subtracton operaton D=G-G. In our opnon, the orgnal grayscale mage s lossless reconstructed f we can lossless embed the entre dfference mage D nto the halftone mage H. In the embeddng phase, a marked halftone mage H s output after data s embedded nto H. On the other hand, the dfference mage D and the orgnal halftone mage H can be extracted from the marked halftone mage H snce the embeddng process s reversble. The predcted mage G s computed by applyng the Gaussan flter to the halftone mage H agan. Then the orgnal mage G can be reconstructed as G=G +D. However, the embedded capacty of a halftone mage s not enough to carry the whole dfference mage. Therefore, a lossy mage compresson s used to reduce the mage fle sze to ft the capacty lmt of data embeddng. In our study, dgt wavelet transformaton (DWT) s appled to compress the dfference mage nto a small scale of sze mage for embeddng. Ths process s descrbed as a flowchart n Fgure 2. Although the mage qualty of the reconstructed grayscale mage s not perfect when compared wth the orgnal one, the obtaned mage qualty s better than the tradtonal nverse halftonng methods. ISSN: (Prnt); ISSN: (Onlne)
3 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. It s not dscernble to human eyes f we modfy or add a pxel on the edge of a bnary mage. Therefore, the mage flppng operaton of Ho s method s to fnd the boundares where black and whte pxels meet. The flppng formula s as follows. P(, D(, P(, P( j 1, ) P(, P( j, 1) f j 1 f j 1 otherwse and and 1 1 (5) Fg. 2. The process of generatng a dfference mage. B. Reversble Data Hdng for Bnary s Reversble data hdng can embed secret message n a reversble way. Relatvely large amounts of secret data are embedded nto a cover mage so that the decoder can extract the hdden secret data and restore the orgnal cover mage wthout any dstorton. Recent, a boundary-based PWLC method s presented [8]. Ths method defnes the same contnuous 6 edge pxels as an embeddable block through searchng for bnary mage edges. And then one can embed data n the par of the thrd and fourth edge pxels. A reversble data hdng method for error dffused halftone mages s proposed[9] (Pan, Luo & Lu, 2007). Ths method employs statstcs feature of pxel block patterns to embed data, and utlzes the HVS characterstcs to reduce the ntroduced vsual dstorton. The method s sutable for the applcatons where the content accuracy of the orgnal halftone mage must be guaranteed, and t s easly extended to the feld of halftone mage authentcaton. However, these two methods both have a drawback that the capacty of data hdng s stll lmt. Recently, Ho et al. [10] proposed a hgh-capacty reversble data hdng method for bnary mages usng pattern substtuton. The method s capable of both successful extracton of secret data from a stego-mage and restorng the bnary mage completely after the extracton of secret data. Ther method gathers statstcal data concernng the occurrence frequences of varous patterns and establshes the pattern exchange relatonshps. Pattern substtuton can be used accordng to the pattern relatonshps for data hdng. In ths paper, Ho s scheme s appled to embed some useful nformaton nto the halftone mages and the nformaton can be extracted and used to mprove the qualty of generated grayscale mages. The flowchart of Ho s method s dsplayed n Fgure 3. Cover mage Secret data flppng Bt stream Pattern selecton for modfcaton Pattern substtuton Marker mage Capacty computaton Hdng by key Fg. 3. The flowchart of data embeddng process n Ho s method. For a flpped mage, we dvde t nto non-overlapped 4 1 mage blocks. Each four-pxel block from the flpped mage can be regarded as a pattern. Then we can compute the occurrence frequences for each knd of pattern type. TABLE I s the computed results for Lena mage. In ths study, we modfed Ho s method to embed more capacty. All patterns are classfed nto two groups, hgh frequent pattern and low frequent pattern. For each hgh frequent pattern A, a low frequent pattern B whch content s the most closest to pattern A wll be selected to form a par for data embeddng. In the data embeddng process, the orgnal halftone mage s parttoned nto a group of 4 1 non-overlappng patterns. Then, any pattern p on the halftone mage wth the same content of A wll be selected to embed 1-bt data. If a data bt 0 s embedded on p, then the content of p s remaned as A. If a data bt 1 s embedded on p, then the content of p s updated as the content of pattern B. In data extracton process, the embedded message s obtaned dependng on the pattern A, B when the test mage s scanned. For example, assume that the hghest frequent pattern n the mage s PH=1111 and ts correspondng lowest frequent pattern s PL=0101. If the content of the pattern PH s encountered, then check the bt value whch s currently embedded. If the bt value s 0 then reman the content as PH. If the value s 1 then we replace PH wth the PL pattern. Fgure 4 shows an example of the data embeddng and extractng processes for the used method. However, we had found that the usage of pattern type wth PL=0000 would cause black spot effect n the marked mage. Therefore, we avod the selecton of ths pattern type n the data embeddng process. Fgure 5 s an example to demonstrate the results wth and wthout the usage of pattern type PL=0000. TABLE I shows the frequences of dfferent 4 1 patterns appeared n Lena of sze TABLE I THE FREQUENCIES OF DIFFERENT PATTERNS APPEARED IN LENA IMAGE Pattern type Frequency Pattern type Frequency P P P P P P P P P P P P P P P P ISSN: (Prnt); ISSN: (Onlne)
4 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Fg. 4. The processes of data embeddng/extractng for the used reversble data hdng scheme. Benft (# PH # PL ) (# PL *18 4) t t t (7) where #PH and #PL s the frequences of the hgh and low frequent pattern appeared n the mage, and the overhead s for keep the coordnates of the PL patterns (9 bts for x coordnate and 9 bts for y coordnate f the sze of the test mage s ) and the PL content. Step 4. Search all blocks n the orgnal mage. As long as we come across a pattern n the embedded, the block s remaned as block s updated as the pattern PL. PH, f a bt 0 s PH ; Otherwse the The dstance defnton for two patterns n equaton 1 means the count of dfferent appearance n the same postons on patterns. The Maxmum capacty for dfferent halftoned mages usng the proposed method s lsted as follows. TABLE II The Maxmum Capacty of the embeddng method Maxmum Capacty(bts) Lena Pepper Arplane Baboon 6912 (a) Fg. 5. Marked mages of the data embeddng (a)usng the pattern type PL=0000 (b) wthout usng the pattern type PL=0000. For the purpose of reversblty, we should record the coordnates of the used lowest frequent patterns appeared n the test mage. In addton, to acheve a hgher capacty of embeddng data, more pattern pars should be determned, whose steps can be presented as below. Procedure-Par Selecton and Pattern Substtuton method for halftone mages Step1. Partton the orgnal mage nto non-overlappng 4 1 blocks. Step2. Compute the occurrence frequences for all appeared patterns. Sort these patterns decreasngly and denoted them as PH accordng to ther occurrence frequences. Step3. Fnd out all low frequent patterns PL. Assume that there are totally k low frequent patterns, k pars of patterns ( PH, PL ) should be constructed to perform the (b) data embeddng. Here the pattern matchng operaton should follow the mnmum dstance rule and the beneft rule, where the dstance computaton of two patterns s defned as 3 Dst ( PH, PL ) PH t PL (6) t t0 The embeddng capacty beneft of the th par of pattern wth pattern type PH t and PL t s determned by the followng equaton. C. Overhead Informaton There are two knds of data should be embedded nto the halftone mage to acheve the reversble data hdng and the hgh qualty of recovery mage, they are the selected pars nformaton (SH) and the compressed dfference mage(dh), respectvely. In the data extracton process, the recever should know the predefned patterns ( PH, PL ) n the data embeddng process to extract data correctly. Assume that there are totally TC pars of patterns used n the data embeddng process, the followng data depcted n Fgure 6(a) should be embedded sequentally. The sze the overhead nformaton s TC bts. We use 3 bts to store the TC value snce the total count of pattern pars for 4 1 dfferent bnary patterns s 16= On the other hand, assume the compressed fle sze of the dfference mage s DH, the compressed fle of the dfference mage s arranged n bt streams for embedded nto the halftone mage after the embeddng of par nformaton. The data structure s shown n Fgure 6(b). TC 0 PH DH 0 PL TC1 PH (a) SH (selected par header) D ' D ' 0 1 (b) DH (Data header) TC1 PL D ' DL2 D ' DL1 Fg. 6. The data structures of the overhead nformaton: (a) pars nformaton and (b) the compressed mage nformaton. ISSN: (Prnt); ISSN: (Onlne)
5 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. D. Data Embeddng and Extractng The way to embed SH nformaton s mportant snce the recever cannot extract any data from the marked mages f he doesn t have the SH nformaton before data extractng. We dvded the halftone mage nto two regons: one s the place to embed SH sequence and the other one s the place to embed the DH sequence. Snce the sze of SH nformaton s very small when compared to the entre mage sze. Two knds of embeddng data can be chosen here. One s the fxed poston method to arrange the SH and DH n faxed regons, such as the example n Fgure 7(a) and the other s the random poston method to randomly select dfferent pxels for embeddng DH nformaton. Then we drectly replace the selected pxels wth the SH sequence. The mplementaton of the second method requres a secret key K to select the postons for embeddng SH sequence and the recever should also have the key to extract the data. Although the second method needs more computaton n SH embeddng, t owns a hgher securty than the frst method. IV. EXPERIMEANT RESULTS Four error dffused halftone mages, Lena, Baboon, Arplane, and Pepper are selected to evaluate the performance of the proposed method, as shown n Fgure 8. These halftones are obtaned by performng Floyd Stenberg error dffuson flterng on the 8-bt gray-scale mages. Comparson of dfferent nverse halftonng methods, ncludng Gaussan flterng, LIH, ELIH are mplemented. The PSNR values of the predcted mage from dfferent nverse halftonng method and the orgnal grayscale mage are computed as lsted n Table III. The marked mages of the proposed methods are shown n Fgure 8. Fg. 7. Two knds of methods to embed SH and DH. The block dagram of data extracton s shown n Fgure 1, wth steps as follows. Procedure-Data Extracton from a marked halftone mage Step1. The SH and DH sequence reconstructon: we use the same Key K to fnd the TC pxel locatons and arrange the pxel values nto the selected pattern pars ( PH, PL ). Extract the embedded DH sequence by scannng the entre mage accordng to the SH nformaton. If a pattern n the PH s found then output bt 0. If a pattern n the pattern PL s found then output bt 1. Step2. Decompresson: DH sequence s decoded usng nverse dgtal wavelet transform (IDWT) and a predcted dfference mage D s obtaned. Step3. Restore the orgnal halftone mage H: The scan of the whole marked mage s performed. If a pattern belongs to the pattern PL then replace the pattern wth the correspondng pattern PH. Then, we wll update a part of patterns orgnal PH usng the coordnate nformaton of all PL extracted from SH. Step4. Compute the predcted mage G : A predcted mage of the halftone mage H s output usng a Gaussan flter. Step5. reconstructon: A recovery mage s obtaned by addng the mage D to the predcted mage G. Fg. 8. The marked mages wth dfferent amount of data bts embedded usng the proposed method.(a)(c) two pars of patterns were used (e)(g)three pars of patterns were used;(b)(d)(f)(h) maxmum capacty of data were embedded. In addton, mage qualty of restored grayscale mages was evaluated. Three sub-mages extracted from the restored mages usng dfferent nverse halftonng methods are shown n Fgure 9. We can found that the prnt words n the reconstructed mage n Fgure (c) look clearer than the other two methods. ISSN: (Prnt); ISSN: (Onlne)
6 Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. TABLE III Comparson of dfferent nverse halftonng methods Gaussan flterng PSNR(dB) Capacty(bts) LIH ELIH[7] Lena Pepper Arplane Baboon Proposed method (27849) (26612) (14849) (6912) (a) REFERENCES [1] P. W. Wong, Inverse halftonng and kernel estmaton for error dffuson, IEEE Transactons on Processng, vol. 4, pp , Aprl, [2] Z. Xong, M. T. Orchard and K. Ramchandran, Inverse halftonngusng wavelets, Proceedngs of the IEEE nternatonal conference on mage processng, vol. 1, pp , [3] Z. Fan, Retreval of mages from dgtal halftones, Proceedngs of the IEEE nternatonal symposum on crcuts systems pp , [4] T. D. Kte, N. D. Venkata, B. L. Evans and A. C. Bovk, A fast hgh qualty nverse halftonng algorthm for error dffused halftones, IEEE Transactons on Processng, vol. 9, pp , [5] P.C. Chang, C. S. Yu and T. H. Lee, Hybrd LMS-MMSE nverse halftonng technque, IEEE Transactons on Processng, vol. 10, pp , [6] M. Mese, P.P. Vadyanathan, Look-up Table (LUT) Method for Inverse Halftonng, IEEE Transactons on Processng, vol. 10, pp , October [7] K.L. Chung, S.T. Wu, Inverse Halftonng Algorthm Usng Edge-Based Lookup Table Approach, IEEE Transactons on Processng, vol. 10, pp , [8] C.L. Tsa, H. F. Chang, K.C. Fan, C.D. Chung, Reversble data hdng and lossless reconstructon of bnary mages usng par-wse logcal computaton mechansm, Pattern Recognton, , [9] J.S. Pan, H. Luo, Z.M. Lu, Look-up Table Based Reversble Data Hdng for Error Dffused Halftone s. INFORMATICA, Vol. 18, No. 4, , [10] Yu-An Ho, Yung-Kuan Chan, Hsen-Chu Wu, Yen-Png Chu, Hgh-capacty reversble data hdng n bnary mages usng pattern substtuton. Computer Standards & Interfaces 31(4): , (b) (c) Fg. 9. qualty comparson of restored mages usng dfferent nverse halftonng methods (a) Gaussan flterng method (b) LIH method (c)the proposed method. V. CONCLUSION In ths paper, a reversble data hdng scheme s ntroduced to embed some useful nformaton nto halftone mages. The proposed approach frstly computes the dfference mage between the predcted mage usng Gaussan flterng and the orgnal grayscale one. The dfference mage s then compressed and embedded nto the halftone mage usng a reversble data hdng method. In the mage reconstructon process, the marked halftone mage s scanned to extract the embedded dfference mage. Fnally, a better qualty of reconstructed mage wll be generated by addng the extracted dfference mage to the predcted mage usng Gaussan flterng. Expermental results show that the proposed approach can effcently mprove the qualty of reconstructed mages for nverse halftonng. ISSN: (Prnt); ISSN: (Onlne)
Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding
Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu
More informationPRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht
68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly
More informationEfficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques
The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department
More informationAn Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold
Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty
More informationDynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University
Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout
More informationWalsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter
Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957
More informationA Novel and Secure technique for image. Steganography using DWT
Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton
More informationHigh Speed, Low Power And Area Efficient Carry-Select Adder
Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs
More informationCalculation of the received voltage due to the radiation from multiple co-frequency sources
Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons
More informationTamper Localization in Wavelet Domain Using Semi- Fragile Watermarking
Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract
More informationSteganography in JPEG2000 Compressed Images
824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed
More informationaperture David Makovoz, 30/01/2006 Version 1.0 Table of Contents
aperture 1 aperture Davd Makovoz, 30/01/2006 Verson 1.0 Table of Contents aperture... 1 1 Overvew... 2 1.1 Input Image Requrements... 2 2 aperture... 2 2.1 Input... 2 2.2 Processng... 4 2.3 Output Table...
More informationANNUAL OF NAVIGATION 11/2006
ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton
More informationChaotic Filter Bank for Computer Cryptography
Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College
More informationRC Filters TEP Related Topics Principle Equipment
RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)
More informationA New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs
Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,
More informationApplication of Intelligent Voltage Control System to Korean Power Systems
Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon
More informationUncertainty in measurements of power and energy on power networks
Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:
More information熊本大学学術リポジトリ. Kumamoto University Repositor
熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng
More informationA Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network
Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute
More informationResearch of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b
2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng
More informationGeneralized Incomplete Trojan-Type Designs with Unequal Cell Sizes
Internatonal Journal of Theoretcal & Appled Scences 6(1): 50-54(2014) ISSN No. (Prnt): 0975-1718 ISSN No. (Onlne): 2249-3247 Generalzed Incomplete Trojan-Type Desgns wth Unequal Cell Szes Cn Varghese,
More informationOptimal Placement of PMU and RTU by Hybrid Genetic Algorithm and Simulated Annealing for Multiarea Power System State Estimation
T. Kerdchuen and W. Ongsakul / GMSARN Internatonal Journal (09) - Optmal Placement of and by Hybrd Genetc Algorthm and Smulated Annealng for Multarea Power System State Estmaton Thawatch Kerdchuen and
More informationRecognition of Low-Resolution Face Images using Sparse Coding of Local Features
Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc
More informationMulti-focus Image Fusion Using Spatial Frequency and Genetic Algorithm
0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,
More informationCompressive Direction Finding Based on Amplitude Comparison
Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,
More informationA High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode
A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute
More informationMulti-Level Halftoning by IGS Quantization
Journal of Sgnal and Informaton Processng, 2013, 4, 351-358 Publshed Onlne ovember 2013 (http://www.scrp.org/journal/jsp) http://dx.do.org/10.4236/jsp.2013.44044 351 Mult-Level Halftonng by IGS Quantzaton
More informationA study of turbo codes for multilevel modulations in Gaussian and mobile channels
A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,
More informationFFT Spectrum Analyzer
THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------
More informationIMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING
U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel
More informationDouble-lock for image encryption with virtual optical wavelength
Double-lock for mage encrypton wth vrtual optcal wavelength Xang Peng Natonal Laboratory of Precson Measurement Technology and Instrumentaton, Tanjn Unversty, 30007 Tanjn, Chna Lngfeng Yu, and Llong Ca
More informationIEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES
IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department
More informationSpread Spectrum based M-ary Modulated Robust Image Watermarking
54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of
More informationThe Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System
Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng
More informationBeam quality measurements with Shack-Hartmann wavefront sensor and M2-sensor: comparison of two methods
Beam qualty measurements wth Shack-Hartmann wavefront sensor and M-sensor: comparson of two methods J.V.Sheldakova, A.V.Kudryashov, V.Y.Zavalova, T.Y.Cherezova* Moscow State Open Unversty, Adaptve Optcs
More informationHIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY
Internatonal Journal of Electrcal, Electroncs and Computer Systems, (IJEECS) HIGH PERFORMANCE ADDER USING VARIABLE THRESHOLD MOSFET IN 45NM TECHNOLOGY 1 Supryo Srman, 2 Dptendu Ku. Kundu, 3 Saradndu Panda,
More informationFast Code Detection Using High Speed Time Delay Neural Networks
Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department
More informationMoving Target Tracking Based on CamShift Approach and Kalman Filter
Appl. Math. Inf. Sc. 7 No. 1S pp. 193S-200S (2013) Appled Mathematcs & Informaton Scences An Internatonal Journal @ 2012 NSP Natural Scences Publshng Cor. Movng arget rackng Based on CamShft Approach and
More informationResearch on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating
, pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle
More informationResource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks
Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty
More informationFigure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13
A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng
More informationA MODIFIED DIFFERENTIAL EVOLUTION ALGORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS
A MODIFIED DIFFERENTIAL EVOLUTION ALORITHM IN SPARSE LINEAR ANTENNA ARRAY SYNTHESIS Kaml Dmller Department of Electrcal-Electroncs Engneerng rne Amercan Unversty North Cyprus, Mersn TURKEY kdmller@gau.edu.tr
More informationInternational Journal of Network Security & Its Application (IJNSA), Vol.2, No.1, January SYSTEL, SUPCOM, Tunisia.
Internatonal Journal of Network Securty & Its Applcaton (IJNSA), Vol.2, No., January 2 WEAKNESS ON CRYPTOGRAPHIC SCHEMES BASED ON REGULAR LDPC CODES Omessaad Hamd, Manel abdelhed 2, Ammar Bouallegue 2,
More informationMTBF PREDICTION REPORT
MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0
More informationA NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems
0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of
More informationLow Switching Frequency Active Harmonic Elimination in Multilevel Converters with Unequal DC Voltages
Low Swtchng Frequency Actve Harmonc Elmnaton n Multlevel Converters wth Unequal DC Voltages Zhong Du,, Leon M. Tolbert, John N. Chasson, Hu L The Unversty of Tennessee Electrcal and Computer Engneerng
More informationDISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT
DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department
More informationRobust Block Selection for Watermarking Video Streams
Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng
More informationPERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER. Chirala Engineering College, Chirala.
PERFORMANCE EVALUATION OF BOOTH AND WALLACE MULTIPLIER USING FIR FILTER 1 H. RAGHUNATHA RAO, T. ASHOK KUMAR & 3 N.SURESH BABU 1,&3 Department of Electroncs and Communcaton Engneerng, Chrala Engneerng College,
More informationFPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm
IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng
More informationImplementation Complexity of Bit Permutation Instructions
Implementaton Complexty of Bt Permutaton Instructons Zhje Jerry Sh and Ruby B. Lee Department of Electrcal Engneerng, Prnceton Unversty, Prnceton, NJ 085 USA {zsh, rblee}@ee.prnceton.edu Abstract- Several
More informationRejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan
More informationNETWORK 2001 Transportation Planning Under Multiple Objectives
NETWORK 200 Transportaton Plannng Under Multple Objectves Woodam Chung Graduate Research Assstant, Department of Forest Engneerng, Oregon State Unversty, Corvalls, OR9733, Tel: (54) 737-4952, Fax: (54)
More informationDelay Constrained Fuzzy Rate Control for Video Streaming over DVB-H
Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,
More informationHUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1
Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,
More informationDTIC DTIC. 9o o FILE COPY NATIONAL COMMUNICATIONS SYSTEM TECHNICAL INFORMATION BULLETIN 87-8 PULSE CODE MODULATION FOR GROUP 4 FACSIMILE
DTC FLE COPY NCS TB 87-8 NATONAL COMMUNCATONS SYSTEM q. nm TECHNCAL NFORMATON BULLETN 87-8 N NTRANSFORM CODNG AND DFFERENTAL Qz PULSE CODE MODULATON FOR GROUP 4 FACSMLE DTC ELECTE JUL 10]1! l AUGUST 1987
More informationA High-Speed Multiplication Algorithm Using Modified Partial Product Reduction Tree
World Academy of Scence, Engneerng and Technology Internatonal Journal of Electrcal and Computer Engneerng Vol:4, No:, 200 A Hgh-Speed Multplcaton Algorthm Usng Modfed Partal Product educton Tree P Asadee
More informationNATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985
NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT
More informationNetwork Reconfiguration in Distribution Systems Using a Modified TS Algorithm
Network Reconfguraton n Dstrbuton Systems Usng a Modfed TS Algorthm ZHANG DONG,FU ZHENGCAI,ZHANG LIUCHUN,SONG ZHENGQIANG School of Electroncs, Informaton and Electrcal Engneerng Shangha Jaotong Unversty
More informationINSTANTANEOUS TORQUE CONTROL OF MICROSTEPPING BIPOLAR PWM DRIVE OF TWO-PHASE STEPPING MOTOR
The 5 th PSU-UNS Internatonal Conference on Engneerng and 537 Technology (ICET-211), Phuket, May 2-3, 211 Prnce of Songkla Unversty, Faculty of Engneerng Hat Ya, Songkhla, Thaland 9112 INSTANTANEOUS TORQUE
More informationA New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution
9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the
More informationA Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method
A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,
More informationJoint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding
Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent
More informationOptimal Allocation of Static VAr Compensator for Active Power Loss Reduction by Different Decision Variables
S. Aucharyamet and S. Srsumrannukul / GMSARN Internatonal Journal 4 (2010) 57-66 Optmal Allocaton of Statc VAr Compensator for Actve Power oss Reducton by Dfferent Decson Varables S. Aucharyamet and S.
More informationParameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation
1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected
More informationThroughput Maximization by Adaptive Threshold Adjustment for AMC Systems
APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal
More information1.0 INTRODUCTION 2.0 CELLULAR POSITIONING WITH DATABASE CORRELATION
An Improved Cellular postonng technque based on Database Correlaton B D S Lakmal 1, S A D Das 2 Department of Electronc & Telecommuncaton Engneerng, Unversty of Moratuwa. { 1 shashka, 2 dleeka}@ent.mrt.ac.lk
More informationSpace Time Equalization-space time codes System Model for STCM
Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal
More informationFall 2018 #11 Games and Nimbers. A. Game. 0.5 seconds, 64 megabytes
5-95 Fall 08 # Games and Nmbers A. Game 0.5 seconds, 64 megabytes There s a legend n the IT Cty college. A student that faled to answer all questons on the game theory exam s gven one more chance by hs
More informationTo: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel
To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,
More informationLSPIHT Algorithm for ECG Data Compression and Transmission for Telemedicine Applications
Dhaa Unv. J. Sc. 60(1): 31-36, 2012 (January) LSPIHT Algorthm for ECG Data Compresson and Transmsson for Telemedcne Applcatons Tahmna Zebn, Eramul Faroo, Syeda Znath Aman and Shahda Rafque Department of
More informationEnsemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame
Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749
More informationLow-Delay 16 kb/s Wideband Speech Coder with Fast Search Methods
Low-Delay 16 b/s Wdeband Speech Coder wth Fast Search Methods M. HALIMI M. BENGHERABI A. KADDAI Speech Codng eam Centre de Développement des echnologes Avancées Haouch Oul BP. 17 Baba Hassen Algers ALGERIA
More informationPerformance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme
Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,
More informationFigure 1. DC-DC Boost Converter
EE36L, Power Electroncs, DC-DC Boost Converter Verson Feb. 8, 9 Overvew Boost converters make t possble to effcently convert a DC voltage from a lower level to a hgher level. Theory of Operaton Relaton
More informationantenna antenna (4.139)
.6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,
More informationThe Application of Interpolation Algorithms in OFDM Channel Estimation
The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School
More informationA Robust Feature Extraction Algorithm for Audio Fingerprinting
A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry
More informationTopology Control for C-RAN Architecture Based on Complex Network
Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton
More informationImproved Error Detection in the JPEG2000 Codec
Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence
More informationCombined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization
Internatonal Journal of Sgnal Processng Systems Vol. 1, No. 2 December 2013 Combned Independent Component Analyss and Kalman Flter Based Real-Tme Dgtal Vdeo Stablzaton Hassaan S. Quresh, Syed A. Jabr,
More informationLow Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery
017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang
More informationPerformance Analysis of the Weighted Window CFAR Algorithms
Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,
More informationGraph Method for Solving Switched Capacitors Circuits
Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586
More informationAdaptive System Control with PID Neural Networks
Adaptve System Control wth PID Neural Networs F. Shahra a, M.A. Fanae b, A.R. Aromandzadeh a a Department of Chemcal Engneerng, Unversty of Sstan and Baluchestan, Zahedan, Iran. b Department of Chemcal
More informationCod and climate: effect of the North Atlantic Oscillation on recruitment in the North Atlantic
Ths appendx accompanes the artcle Cod and clmate: effect of the North Atlantc Oscllaton on recrutment n the North Atlantc Lef Chrstan Stge 1, Ger Ottersen 2,3, Keth Brander 3, Kung-Sk Chan 4, Nls Chr.
More informationSPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES
Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,
More informationAn Algorithm Forecasting Time Series Using Wavelet
IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman
More informationAn Adaptive Over-current Protection Scheme for MV Distribution Networks Including DG
An Adaptve Over-current Protecton Scheme for MV Dstrbuton Networks Includng DG S.A.M. Javadan Islamc Azad Unversty s.a.m.javadan@gmal.com M.-R. Haghfam Tarbat Modares Unversty haghfam@modares.ac.r P. Barazandeh
More informationLearning Ensembles of Convolutional Neural Networks
Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)
More informationDiscussion on How to Express a Regional GPS Solution in the ITRF
162 Dscusson on How to Express a Regonal GPS Soluton n the ITRF Z. ALTAMIMI 1 Abstract The usefulness of the densfcaton of the Internatonal Terrestral Reference Frame (ITRF) s to facltate ts access as
More informationNew Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.
Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable
More informationEvaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator
Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research
More informationPhasor Representation of Sinusoidal Signals
Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e
More informationTime-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock
Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty
More informationGeneralized Multiple ROI Prioritization in JPEG2000 for Natural Images
Ompraash Rajanar et al, / (IJCSIT) Internatonal Journal of Computer Scence and Informaton Technologes, Vol. 6 (), 015, 1636-164 Generalzed Multple ROI Prortzaton n JPEG000 for Natural Images Ompraash Rajanar
More information3D Particle Position Measurement via the Defocusing Concept
Internatonal Journal of Advanced Scence and Technology Vol. 24, November,, 2 3D Partcle Poston Measurement va the Defocusng Concept Xaol Bao, Muguo L State Key Laboratory of Coastal and Offshore Engneerng,
More informationPrevention of Sequential Message Loss in CAN Systems
Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar
More informationWeighted Penalty Model for Content Balancing in CATS
Weghted Penalty Model for Content Balancng n CATS Chngwe Davd Shn Yuehme Chen Walter Denny Way Len Swanson Aprl 2009 Usng assessment and research to promote learnng WPM for CAT Content Balancng 2 Abstract
More information