A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution

Size: px
Start display at page:

Download "A New Statistical Detector for CT-Based Multiplicative Image Watermarking Using the t Location-Scale Distribution"

Transcription

1 9th Internatonal Conference on Informaton and Knowledge Technology (IKT 07) October 8 & 9, 07, Amrkabr Unversty of Technology A ew Statstcal Detector for CT-Based Multplcatve Image Watermarkng Usng the t Locaton-Scale Dstrbuton Sadegh Etemad Dep. of Computer Engneerng and Info.Technology Amrkabr Unversty of Technology Tehran, Iran etemad.sadegh@aut.ac.r Maryam Amrmazlaghan Dep. of Computer Engneerng and Info.Technology Amrkabr Unversty of Technology Tehran, Iran mazlaghan@aut.ac.r Abstract In ths study, a new statstcal multplcatve watermark detector n contourlet doman s presented. The contourlet coeffcents of mages are hghly non-gaussan and a proper dstrbuton to model the statstcs of the contourlet coeffcents s a heavy-tal Probablty Dstrbuton Functon (PDF). In ths study, a multplcatve watermarkng scheme s proposed n the contourlet doman usng t locaton-scale dstrbuton (tls) Afterward, we used the lkelhood rato decson rule and tls dstrbuton to desgn an optmal multplcatve watermark detector. The detector showed hgher effcency than other watermarkng schemes n the lterature, based on the expermental results, and ts robustness aganst dfferent attacks was verfed. Keywords- t Locaton-Scale Dstrbuton; Contourlet transform; Multplcatve Image Watermarkng; Maxmum Lkelhood. I. ITRODUCTIO In recent years, due to ncreasng dgtal meda on the nternet, copyrght protecton turns nto an essental problem. One of the most popular approaches for the deal wth ths problem s dgtal watermarkng. Dgtal watermarkng has been proposed as a technology for copyrght protecton and content authentcaton. At the frst step of dgtal watermarkng, the secondary data (watermark) embedded nto dgtal meda such as mage, audo, vdeo, and text. Afterward, n the second step, the embedded watermark extract. The frst and second steps of dgtal watermarkng are called watermark embeddng and watermark extracton, respectvely. Some applcatons of dgtal watermarkng nclude broadcast montorng, tamper proofng, fngerprntng, content archvng, copyrght protecton and secret communcaton. In ths research, use of watermark detecton for copyrght protecton was examned. In the lterature, dgtal watermarkng methods categorzed n dfferent ways based on embeddng doman: spatal [] or frequency [], the embeddng methods: spread spectrum [3] or quantzaton based [4], and the extracton methods: detecton or decodng. Snce frequency doman technque more robust under dfferent types of attacks, t's favored to the spatal doman. Image watermarkng has been studed extensvely n the transform doman such as Dscrete Cosne Transform (DCT) [5,6], Dscrete Fourer Transform (DFT) [7], Dscrete Wavelet Transform (DWT) [8,9], Contourlet Transform (CT) [0,] and Rdgelet Transform []. At the early stage of the studes, some of transform doman watermarkng methods mplemented n the DCT, DFT. Later, the DWT-based watermarkng methods were present. ext, [3] demonstrates the outperformance of the contourlet-doman algorthms aganst the attacks compared wth other frequency-doman watermarkng schemes. There are some advances n contourlet doman over other drectonal representatons such as wavelet. The contourlet transform able to have several drectons whle obtanng nearly crtcal samplng. Also for computatonally effcent mplementaton, t uses the terated flter banks. Hence, n ths work, we focus on mage watermarkng n contourlet doman. Spread spectrum embeddng methods use two basc embeddng technques: addtve and multplcatve. In [0], we appled addtve embeddng rule for the watermarkng scheme. But snce the multplcatve embeddng method can model the Human Vsual System (HVS) preferred to addtve embeddng methods. Also, the multplcatve watermarks are mage content dependent [4]. So, n ths study, we mproved [0] by usng multplcatve embeddng n our watermarkng scheme. Accordng to [5], the contourlet coeffcents have large peaks and are hghly non-gaussan; they also have heaver tals compared to a Gaussan probablty densty functon, so, we can t use correlaton detector. Prevous works used varous PDFs as the pror dstrbuton for contourlet coeffcents. Some of the dstrbuton that used for modelng the contourlet coeffcents nclude generalzed Gaussan [6], ormal nverse Gaussan(IG) [7], Alpha-stable [8] and Bessel k Form (BKF) [] dstrbuton. In ths work, we propose a new statstcal multplcatve contourlet doman watermark detector usng t locaton-scale dstrbuton. The detector showed hgher effcency than other watermarkng schemes n the lterature, based on the expermental result, and ts robustness aganst dfferent attacks was verfed. We observed that the watermark detecton performance has enhanced as compared to other detectors such as addtve tls, multplcatve BKF, and GG detectors. The rest of the paper s as follows. Modelng of contourlet coeffcents s presented n secton. Secton 3 presents the multplcatve watermarkng method n the contourlet doman /7/$ IEEE 75

2 Performance of tls detector s assessed n secton 4. Conclusons are fnally presented n secton 5. II. STATISTICAL MODELIG In the frst part of ths secton, we analyzed the locaton-scale famly dstrbutons and revewed the tls dstrbuton then n the second part, contourlet coeffcent modelng was examned usng tls dstrbuton. A. t locaton-scale Dstrbuton (tls) A x as a random varable (RV) follows a student's t dstrbuton [9] v + Γ( ) ( ; ) x f x v = ( + ) v v vπ Γ( ) v+ ( ) () Parameter v > 0 determnes the degree of freedom and Γ denotes the gamma functon, whch s defned as x a x e dx 0 Γ = () a ( ) Where a > 0. Student's t dstrbuton can be generalzed to a tls by applyng the lnear transformaton Y = μ + σ X. Through applcaton of a lnear transformaton, we can easly shft the center of the dstrbuton and affect the dvergence from ts mean. then Y follows the t locaton scale dstrbuton (or non-standard Student's t dstrbuton) wth the parameters μ, σ,v. The PDF of t locaton-scale dstrbuton s So, f X Student ' s ( v) and each resdual mage s fed nto the drectonal flter bank (DFB) to obtan drectonal nformaton. Fg. shows the results of applyng contourlet transform on the Barbara mage. At frst, the mage dsntegrated n two pyramdal levels. ext, the DFB appled on the mage to obtan four and eght drectonal subbands. Fgure. Barbara mage contourlet coeffcents for two fnest scale. Snce the contourlet coeffcents have heavy-taled, non- Gaussan dstrbutons, a proper dstrbuton s needed for modelng contourlet coeffcents, whch present large peaks and heaver tals compared to the Gaussan PDF. In ths research, tls dstrbuton s used to model the contourlet coeffcents. Fg. represents the log-scale hstogram of contourlet coeffcents and the log-scale pdf of the best ftted tls, student's t and generalzed Gaussan(GG) dstrbutons for Barbara mage (8th and 9th subband at fourth level of pyramdal decomposton). Ths fgure demonstrates that the tls dstrbuton s well ftted whle student's t dstrbuton fals n modelng contourlet coeffcents. Also, n comparson wth generalzed Gaussan dstrbuton, tls dstrbuton has better performance for modelng the contourlet coeffcents. v + Γ( ) v+ ( ) y μ _ ( ;,, ) = ( + ( ) ) f tls y μσ v σ vπγ v ( ) v σ (3) where < μ < +, σ > 0 and v > 0 are respectvely the parameters of locaton, scale and shape. The maxmum lkelhood estmator can be used to determne parameters of locaton, scale, and shape [9]. B. Contourlet Coeffcent Modelng wth tls In [3], Do and Vetterl ntroduced contourlet transform for obtanng sparse expansons. In ths transform, Laplacan pyramd (LP) s appled to the orgnal mage to reach multscale decomposton when the coarse mage s teratvely subsampled (a) 76

3 ( α ) y = x + w (5) Where W= [ w, w,..., w ] s the watermark sequence, α s (b) Fgure. The log-scale hstogram of contourlet coeffcents for Barbara mage at (a) 8th and (b) 9th subband n the fourth level of pyramdal decomposton and the best ftted t locaton scale, student's t and generalzed Gaussan dstrbutons. the embeddng power, Y = [ y, y,..., y ] refers to watermarked contourlet coeffcents. W represents the bpolar watermark wth smlar probablty (- and ). Accordng to watermark to document rato (WDR) value, the embeddng power (α ) value for each mage s calculated. ow, to nvestgate the mperceptblty of embeddng step, we have plotted Fg. 3. In the frst row of Fg.3 the orgnal mages (Barbara, Arplane, Boat and Lena) are presented. The correspondng watermarked mages and the dfference between them have been shown n mddle and bottom rows of Fg., respectvely. The peak sgnal-to-nose rato (PSR) and mean square error (MSE) are common ndces for analyzng the nvsblty of embeddng. The values of the MSE, PSR and α show n Table I. Smlar results were obtaned on dfferent subbands for other mages. III. WATERMARKIG SCHEME Watermark embeddng and detecton comprse a watermarkng scheme. So, n ths secton, we descrbed them. A. Watermark Embeddng In the watermark embeddng step, we use a contourlet doman multplcatve spread spectrum embeddng scheme. For ths purpose, frst, we appled the contourlet transform wth the fourth level of pyramdal decomposton and sxteen drectons of drectonal flter banks to the orgnal mages. So, for each mage, the contourlet coeffcents of the drectonal subband, X = [ x, x,..., x ], s calculated. Then, to embed the watermark bts nto the drectonal subband coeffcents, we select the subband that has maxmum energy. The energy of each drectonal subband calculated as follows: jk,, A B m = n = ( ) l j jk(, ) M E X m n X l j = (4) Where jk, refers to the subband mage at j-th decomposton level and k-th bandpass drectonal mage, decomposed by an j l -th level DFB. A B shows subband sze, and E jk, s the subband energyat j-th decomposton level and k-th bandpass. Later, we use multplcatve embeddng rule for embeddng watermark n the selected drectonal subband as followng Fgure 3. Orgnal, watermarked and dfference mages respectvely. the Barbara, Arplane, Boat and Lena wth sze 5 5 are test mages (WDR=-55). It can be seen from Fg.3 and Table I that the mages are ndstngushable wth hgh PSR values. Hence, we acheved the mperceptblty of the embedded watermark at the embeddng step. TABLE I. THE VALUE OF MSE, PSR AD α (WDR=-55) Image PSR MSE α Barbara Arplane Boat Lena

4 B. Watermark Detecton Snce, the applcaton of paper s copyrght protecton, we should verfy the exstence of a known watermark. In ths secton, to detect the watermark n the contourlet subband coeffcents, we develop an optmum detector based on the tls PDF. The watermark detecton can be represented as bnary hypothess test: H : y x =,,..., 0 = (6) H : y = x ( +αw ) =,,..., (7) H 0 and H represent respectvely the null (the watermark does not exst) and alternatve (the watermark exsts) hypotheses. We assume the orgnal mage coeffcents ( x ) to be ndependent and dentcally dstrbuted (..d) and follow a tls dstrbuton wth the parameters (,, ) v μ σ as defned n (3). So, due to (6) and (7), the dstrbuton of the contourlet coeffcents under null and alternatve hypothess can be computed as: H : P( y H ) = f _ tls( y, μσ,, v) 0 0 = = (8) H : P ( y H ) = f _ tls( y, μ ( + αw), σ ( + αw), v) (9) To mathematcal smplfcaton, the log-lkelhood rato test (LLRT) nstead of LRT was used. So; we have LLRT ( y) = () = ln ( ) v + y μ + α w + ln v+ σ v + y ( + αw ) μ ln v + ( + αw ) σ Equaton () s Maxmum Lkelhood(ML) detector that we proposed. IV. SIMULATIO RESULTS In ths secton, we study the performance of tls watermark detector on many mages [0]. Snce we have lmted space for reportng the results, we only publsh the results of four grayscale mages, namely, Barbara, Arplane, Boat, and Lena (5 5). In the followng, we frst examne the performance of the t locaton-scale detector wthout any type of attack and compare t wth other contourlet doman detectors such as Bessel K Form (BKF) [] and Generalzed Gaussan (GG) [6] by recever operatng characterstc (ROC) plot. Fg.4 represents the ROCs of the three detectors for mages (Barbara, Arplane, Boat and Lena) wthout any attacks. Ths fgure demonstrates that the hgher performance of our detector versus other detectors. f _ tls ndcates the tls dstrbuton as determned n (3). the lkelhood rato test (LRT) was appled, consderng ts effcacy based on the eyman-pearson crteron. So, we employ the LRT for a subband as: H P( y H ) > Λ ( y) = < η (0) P( y H ) H0 0 Where η denotes threshold that s computed usng eyman- Pearson crtera. By ntegratng (8) and (9) n (0) and usng (), we have Λ ( y) = = ( + α w ) y ( + αw ) μ v + ( αw ) + σ y μ v + σ () v+ (a) 78

5 detectors under JPEG Compresson, Gaussan Flter and Rotaton s, respectvely. In each row of tables, the bold value s the best result. These tables demonstrate the outperformance of the proposed detector. (b) TABLE II. type JPEG (QF=45) AUROC VALUES UDER JPEG COMPRESSIO ATTACK (WDR=-55) Images t-ls Addtve BKF GG t-ls [0] [] [6] Barbara Arplane Boat Lena TABLE III. type Medan Flterng (44) AUROC VALUES UDER MEDIA FILTER ATTACK (WDR=- 55) Images t-ls Addtve BKF GG t-ls [0] [] [6] Barbara Arplane Boat Lena (c) TABLE IV. type Rotaton (=0) AUROC VALUES UDER ROTATIO ATTACK (WDR=-55) Images t-ls Addtve BKF GG t-ls [0] [] [6] Barbara Arplane Boat Lena (d) Fgure 4. ROC curve usng tls, BKF and GG based detectors wthout any attacks on test mages (a)barbara, (b)arplane, (c)boat and (d)lena (WDR=-55 db). Then, we examne the performance of the BKF, GG, addtve tls [0] and Multplcatve tls detectors under dfferent types of attacks by usng the area under the ROC (AUROC). Table II, Table III and Table IV represents the AUROC results of the multplcatve tls, addtve tls, BKF and GG V. COCLUSIO A detector was proposed for multplcatve watermarkng n the contourlet doman based on tls dstrbuton. Accordngly eyman-pearson crteron, the LRT s optmal for desgnng the watermark detector. So n ths work, we used LRT test. Performance of our watermark detector was examned based on several experments and compared wth addtve tls, BKF, and GG detectors n the contourlet doman. The results confrm that our watermarkng detector was superor to other schemes. Besdes, t provded hgh robustness aganst dfferent attacks. REFERECES [] T. Zong, Y. Xang, I. atgunanathan, S. Guo, W. Zhou, and G. Belakov, Robust hstogram shape-based method for mage watermarkng, IEEE Transactons on Crcuts and Systems for Vdeo Technology, vol. 0, no. 3, pp ,

6 []. Kalantar, S. M. Ahad, M. Vafadust, A robust mage watermarkng n the rdgelet doman usng unversally optmum decoder, IEEE Transactons on crcuts and systems for vdeo technology, vol. 0, pp , Mar 00. [3].I. J. Cox, J. Klan, F. T. Leghton, and T. Shamoon, Secure spread spectrum watermarkng for multmeda, IEEE Trans. Image Process., vol. 6, no., pp , Dec [4] E. ezhadarya, Z. J. Wang, and R. K. Ward, Robust mage watermarkng based on multscale gradent drecton quantzaton, IEEE Transactons on Informaton Forenscs and Securty, vol. 6, no. 4, pp. 00-3, 0. [5] L. Hsu, H. Hwa-Tsu, Blnd mage watermarkng va explotaton of nter-block predcton and vsblty threshold n DCT doman, Journal of Vsual Communcaton and Image Representaton, vol. 3, pp , Oct 05 [6] C. Hseh, L. Ch-Jen, "A novel mage watermarkng scheme based on ampltude attack." Pattern Recognton, vol. 40, pp , Apr 007. [7] V. R. Doncel,,. kolads, I. Ptas, An optmal detector structure for the Fourer descrptors doman watermarkng of D vector graphcs, IEEE Transactons on Vsualzaton and Computer Graphcs, vol. 3, pp , Jul 007. [8] M. Amrmazlaghan, M. Rezgh, H. Amndavar, A novel robust scalng mage watermarkng scheme based on Gaussan Mxture Model, Expert Systems wth Applcatons, vol. 4, pp , Mar 05. [9] M.Amrmazlaghan, Addtve watermark detecton n the wavelet doman usng D-GARCH model, Informaton Scences, vol. 370, pp. - 7, ov 06. [0] S. Etemad, M. Amrmazlaghan, Addtve watermark detector n contourlet doman usng the t locaton-scale dstrbuton, nd Internatonal Conf. Sgnal Proc. and Intell. Sys., pp. -5, Dec 06. [] M. Rabzadeh, M. Amrmazlaghan, M. Ahmadan-Attar, A new detector for contourlet doman multplcatve mage watermarkng usng Bessel K form dstrbuton, Journal of Vsual Communcaton and Image Representaton, vol. 40, pp , Oct 06. [] H. Sadreazam, M. Amn, A robust spread spectrum based mage watermarkng n rdgelet doman, AEU-Internatonal Journal of Electroncs and Communcatons, vol. 66, pp , May 0. [3] M. Do, M. Vetterl, The contourlet transform: an effcent drectonal multresoluton mage representaton, IEEE Transactons on mage processng, vol. 4, pp , Dec 005. [4] Q. Cheng and T. S. Huang, Robust optmum detecton of transform doman multplcatve watermarks, IEEE Transactons on Sgnal Processng, vol. 5, no. 4, pp , 003. [5] D. Po, M. Do, Drectonal multscale modelng of mages usng the contourlet transform, IEEE Transacton on mage processng, vol. 5, pp , Jun 006. [6] M. Akhaee, S. Sahraean, F. Marvast, Contourlet-based mage watermarkng usng optmum detector n a nosy envronment, IEEE Transactons on Image Processng, vol. 9, pp , Apr 00. [7] H. Sadreazam, M. Ahmad, M.S. Swamy, Optmum multplcatve watermark detector n contourlet doman usng the normal nverse Gaussan dstrbuton, IEEE nternatonal Symp. On Crcuts and Sys, pp , May 05. [8] H. Sadreazam, M. Ahmad, M Swamy, A study of multplcatve watermark detecton n the contourlet doman usng alpha-stable dstrbutons, IEEE Transactons on Image Processng, vol. 3, pp , Oct 04. [9] S. Kotz, S. adarajah, Multvarate t-dstrbutons and ther applcatons. Cambrdge Unversty Press, 004. [0] Onlne Image Database. [Onlne]. Avalable: accessed Mar

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold

An Efficient Blind Watermarking Method based on Significant Difference of Wavelet Tree Quantization using Adaptive Threshold Internatonal Journal of Electroncs and Electrcal Engneerng Vol., No., June 3 An Effcent Blnd ng Method based on Sgnfcant Dfference of Wavelet Tree Quantzaton usng Adaptve Threshold Then Huynh The Unversty

More information

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images

SECURE multimedia data transmission across Internet can. A Channel-Dependent Statistical Watermark Detector for Color Images Ths artcle has been accepted for publcaton n a future ssue of ths journal, but has not been fully edted. Content may change pror to fnal publcaton. Ctaton nformaton: DOI.9/TMM.8.85447, IEEE Transactons

More information

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES

CONTOURLET TRANSFORM BASED WATERMARKING FOR COLOUR IMAGES he Internatonal Journal of Multmeda & Its Applcatons (IJMA) Vol.3, No.1, February 211 CONOURLE RANSFORM BASED WAERMARKING FOR COLOUR IMAGES Dnesh Kumar 1 and Vjay Kumar 2 1 Department of Computer Scence

More information

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking

Tamper Localization in Wavelet Domain Using Semi- Fragile Watermarking Tamper Localzaton n Wavelet Doman Usng Sem- Fragle Watermarkng Sandpbha Mangrolya, Ketk Pathak Departement of Electroncs and Communcaton Engneerng Sarvajank College of Engneerng & Technology, Surat Abstract

More information

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding

Side-Match Vector Quantizers Using Neural Network Based Variance Predictor for Image Coding Sde-Match Vector Quantzers Usng Neural Network Based Varance Predctor for Image Codng Shuangteng Zhang Department of Computer Scence Eastern Kentucky Unversty Rchmond, KY 40475, U.S.A. shuangteng.zhang@eku.edu

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Spread Spectrum based M-ary Modulated Robust Image Watermarking 54 IJCSS Internatonal Journal of Computer Scence and etwor Securty, VOL.7 o., October 27 Spread Spectrum based M-ary Modulated Robust Image atermarng T. S. Das, V. H. Manar 2 and S. K. Sarar 3, Dept. of

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING

IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING U.P.B. Sc. Bull., Seres C, Vol. 77, Iss. 4, 015 ISSN 86-3540 IMAGE AUTHENTICATION AND RECOVERY USING WAVELET-BASED DUAL WATERMARKING Radu Ovdu PREDA 1, Ioana MARCU, Amela CIOBANU 3 In ths paper a novel

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

Improved Error Detection in the JPEG2000 Codec

Improved Error Detection in the JPEG2000 Codec Improved Error Detecton n the JPEG2000 Codec Farzad Zargar, Member, IEEE, Al Sefdpour, M. Shahram Mon, Member, IEEE, and Mohammad Ghanbar, Fellow, IEEE Abstract the Segmentaton symbol s an error reslence

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

The Application of Interpolation Algorithms in OFDM Channel Estimation

The Application of Interpolation Algorithms in OFDM Channel Estimation The Applcaton of Interpolaton Algorthms n OFDM Estmaton Xjun ZHANG 1,, Zhantng YUAN 1, 1 School of Electrcal and Informaton Engneerng, Lanzhou Unversty of Technology, Lanzhou, Gansu 730050, Chna School

More information

A Novel and Secure technique for image. Steganography using DWT

A Novel and Secure technique for image. Steganography using DWT Internatonal Journal of Computer Technology and Electroncs Engneerng (IJCTEE) Volume 3 Issue 5 October 2013 A Novel and Secure technque for mage Abstract: Steganography s the art and scence of hdng nformaton

More information

Wideband Spectrum Sensing by Compressed Measurements

Wideband Spectrum Sensing by Compressed Measurements Wdeband Spectrum Sensng by Compressed Measurements Davood Mardan Najafabad Department of Electrcal Engneerng Yazd Unversty Emal: d.mardan@stu.yazdun.ac.r Al A. Tadaon Department of Electrcal Engneerng

More information

Robust Block Selection for Watermarking Video Streams

Robust Block Selection for Watermarking Video Streams Proceedngs of the World Congress on Engneerng 8 Vol I WCE 8, July - 4, 8, London, U.K. Robust Block Selecton for Watermarkng Vdeo Streams Tamás Polyák, Gábor Fehér Abstract In ths paper a robust vdeo atermarkng

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS

BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS BLIND COMPRESSED IMAGE WATERMARKING FOR NOISY COMMUNICATION CHANNELS Jonathan Me Carnege Mellon Unversty Department of Electrcal & Computer Engneerng Pttsburgh, PA 523 jme@cmu.edu Scott Pudlewsk Lncoln

More information

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT

DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT DISTINCT IMAGE FUSION METHODS FOR LANDSLIDE INFORMATION ENHANCEMENT J.Wang a,b, a *, J.X.Zhang, Z.J.Lu a a Insttute of Photogrammetry & Remote Sensng, CASM, Bejng, Chna - stecsm@publc.bta.net.cn b Department

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

On the Feasibility of Receive Collaboration in Wireless Sensor Networks

On the Feasibility of Receive Collaboration in Wireless Sensor Networks On the Feasblty of Receve Collaboraton n Wreless Sensor Networs B. Bantaleb, S. Sgg and M. Begl Computer Scence Department Insttute of Operatng System and Computer Networs (IBR) Braunschweg, Germany {behnam,

More information

A Robust Feature Extraction Algorithm for Audio Fingerprinting

A Robust Feature Extraction Algorithm for Audio Fingerprinting A Robust Feature Extracton Algorthm for Audo Fngerprntng Janpng Chen 1, Tejun Huang 2 1 Insttute of Computng Technology, Chnese Academy of Scences, Bejng 100190, Chna 2 Key Laboratory of Machne Percepton(Mnstry

More information

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm

Multi-focus Image Fusion Using Spatial Frequency and Genetic Algorithm 0 IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.8 No., February 008 Mult-focus Image Fuson Usng Spatal Frequency and Genetc Algorthm Jun Kong,, Kayuan Zheng,, Jngbo Zhang,,*,,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization

A Heuristic Speech De-noising with the aid of Dual Tree Complex Wavelet Transform using Teaching-Learning Based Optimization ISSN (Prnt) : 39-863 ISSN (Onlne) : 975-44 D. Yugandhar et al. / Internatonal Journal of Engneerng and Technology (IJET) A Heurstc Speech De-nosng wth the ad of Dual Tree Complex Wavelet Transform usng

More information

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features

Recognition of Low-Resolution Face Images using Sparse Coding of Local Features Recognton of Low-Resoluton Face Images usng Sparse Codng of Local Features M. Saad Shakeel and Kn-Man-Lam Centre for Sgnal Processng, Department of Electronc and Informaton Engneerng he Hong Kong Polytechnc

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels.

New Wavelet Based Performance Analysis and Optimization of Scalable Joint Source/Channel Coder (SJSCC & SJSCCN) for Time-Varying Channels. Internatonal Research Journal of Engneerng and Technology (IRJET) e-issn: 2395-0056 Volume: 02 Issue: 09 DEC-205 p-issn: 2395-0072 www.rjet.net New Wavelet Based Performance Analyss and Optmzaton of Scalable

More information

Steganography in JPEG2000 Compressed Images

Steganography in JPEG2000 Compressed Images 824 IEEE Transactons on Consumer Electroncs, Vol. 49, No. 4, NOVEMBER 2003 Steganography n JPEG2000 Compressed Images Po-Chy Su and C.-C. Jay Kuo, Fellow, IEEE Abstract Informaton hdng n JPEG2000 compressed

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

ANNUAL OF NAVIGATION 11/2006

ANNUAL OF NAVIGATION 11/2006 ANNUAL OF NAVIGATION 11/2006 TOMASZ PRACZYK Naval Unversty of Gdyna A FEEDFORWARD LINEAR NEURAL NETWORK WITH HEBBA SELFORGANIZATION IN RADAR IMAGE COMPRESSION ABSTRACT The artcle presents the applcaton

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES

SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L SPATIAL QUALITY EVALUATION OF FUSION OF DIFFERENT RESOLUTION IMAGES Jun L Laval Unversty, Canada COPL, Physcs department Jl@phy.ulaval.ca KEY WORDS: Image Fuson, Evaluaton, Spatal Qualty, Blur Parameter,

More information

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode

A High-Sensitivity Oversampling Digital Signal Detection Technique for CMOS Image Sensors Using Non-destructive Intermediate High-Speed Readout Mode A Hgh-Senstvty Oversamplng Dgtal Sgnal Detecton Technque for CMOS Image Sensors Usng Non-destructve Intermedate Hgh-Speed Readout Mode Shoj Kawahto*, Nobuhro Kawa** and Yoshak Tadokoro** *Research Insttute

More information

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS

OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS OVER-SAMPLING FOR ACCURATE MASKING THRESHOLD CALCULATION IN WAVELET PACKET AUDIO CODERS Ferdnan Snaga #, Elathamby Ambkarajah # and Andrew P. Bradley* # School of Electrcal Engneerng and Telecommuncatons

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network

A Preliminary Study on Targets Association Algorithm of Radar and AIS Using BP Neural Network Avalable onlne at www.scencedrect.com Proceda Engneerng 5 (2 44 445 A Prelmnary Study on Targets Assocaton Algorthm of Radar and AIS Usng BP Neural Networ Hu Xaoru a, Ln Changchuan a a Navgaton Insttute

More information

RC Filters TEP Related Topics Principle Equipment

RC Filters TEP Related Topics Principle Equipment RC Flters TEP Related Topcs Hgh-pass, low-pass, Wen-Robnson brdge, parallel-t flters, dfferentatng network, ntegratng network, step response, square wave, transfer functon. Prncple Resstor-Capactor (RC)

More information

Particle Filters. Ioannis Rekleitis

Particle Filters. Ioannis Rekleitis Partcle Flters Ioanns Reklets Bayesan Flter Estmate state x from data Z What s the probablty of the robot beng at x? x could be robot locaton, map nformaton, locatons of targets, etc Z could be sensor

More information

Compressive Direction Finding Based on Amplitude Comparison

Compressive Direction Finding Based on Amplitude Comparison Compressve Drecton Fndng Based on Ampltude Comparson Rumng Yang, Ypeng Lu, Qun Wan and Wanln Yang Department of Electronc Engneerng Unversty of Electronc Scence and Technology of Chna Chengdu, Chna { shan99,

More information

Development of Neural Networks for Noise Reduction

Development of Neural Networks for Noise Reduction The Internatonal Arab Journal of Informaton Technology, Vol. 7, No. 3, July 00 89 Development of Neural Networks for Nose Reducton Lubna Badr Faculty of Engneerng, Phladelpha Unversty, Jordan Abstract:

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance

Optimizing a System of Threshold-based Sensors with Application to Biosurveillance Optmzng a System of Threshold-based Sensors wth Applcaton to Bosurvellance Ronald D. Frcker, Jr. Thrd Annual Quanttatve Methods n Defense and Natonal Securty Conference May 28, 2008 What s Bosurvellance?

More information

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs

A New Type of Weighted DV-Hop Algorithm Based on Correction Factor in WSNs Journal of Communcatons Vol. 9, No. 9, September 2014 A New Type of Weghted DV-Hop Algorthm Based on Correcton Factor n WSNs Yng Wang, Zhy Fang, and Ln Chen Department of Computer scence and technology,

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

熊本大学学術リポジトリ. Kumamoto University Repositor

熊本大学学術リポジトリ. Kumamoto University Repositor 熊本大学学術リポジトリ Kumamoto Unversty Repostor Ttle Wreless LAN Based Indoor Poston and Its Smulaton Author(s) Ktasuka, Teruak; Nakansh, Tsune CtatonIEEE Pacfc RIM Conference on Comm Computers, and Sgnal Processng

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

An Algorithm Forecasting Time Series Using Wavelet

An Algorithm Forecasting Time Series Using Wavelet IJCSI Internatonal Journal of Computer Scence Issues, Vol., Issue, No, January 04 ISSN (Prnt): 94-084 ISSN (Onlne): 94-0784 www.ijcsi.org 0 An Algorthm Forecastng Tme Seres Usng Wavelet Kas Ismal Ibraheem,Eman

More information

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM

MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET DOMAIN BASED ON BAT ALGORITHM Journal of Theoretcal and Appled Informaton Technology 2005-2015 JATIT & LLS. All rghts reserved. ISSN: 1992-8645 www.jatt.org E-ISSN: 1817-3195 MEDICAL IMAGE WATERMARKING WITH PSNR OPTIMIZATION IN WAVELET

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock

Time-frequency Analysis Based State Diagnosis of Transformers Windings under the Short-Circuit Shock Tme-frequency Analyss Based State Dagnoss of Transformers Wndngs under the Short-Crcut Shock YUYING SHAO, ZHUSHI RAO School of Mechancal Engneerng ZHIJIAN JIN Hgh Voltage Lab Shangha Jao Tong Unversty

More information

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution

On Channel Estimation of OFDM-BPSK and -QPSK over Generalized Alpha-Mu Fading Distribution Int. J. Communcatons, Network and System Scences, 010, 3, 380-384 do:10.436/jcns.010.34048 Publshed Onlne Aprl 010 (http://www.scrp.org/journal/jcns/) On Channel Estmaton of OFDM-BPSK and -QPSK over Generalzed

More information

Combined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization

Combined Independent Component Analysis and Kalman Filter Based Real-Time Digital Video Stabilization Internatonal Journal of Sgnal Processng Systems Vol. 1, No. 2 December 2013 Combned Independent Component Analyss and Kalman Flter Based Real-Tme Dgtal Vdeo Stablzaton Hassaan S. Quresh, Syed A. Jabr,

More information

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels

Markov Chain Monte Carlo Detection for Underwater Acoustic Channels Markov Chan Monte Carlo Detecton for Underwater Acoustc Channels Hong Wan, Rong-Rong Chen, Jun Won Cho, Andrew Snger, James Presg, and Behrouz Farhang-Boroujeny Dept. of ECE, Unversty of Utah Dept. of

More information

Fast Code Detection Using High Speed Time Delay Neural Networks

Fast Code Detection Using High Speed Time Delay Neural Networks Fast Code Detecton Usng Hgh Speed Tme Delay Neural Networks Hazem M. El-Bakry 1 and Nkos Mastoraks 1 Faculty of Computer Scence & Informaton Systems, Mansoura Unversty, Egypt helbakry0@yahoo.com Department

More information

Performance Analysis of the Weighted Window CFAR Algorithms

Performance Analysis of the Weighted Window CFAR Algorithms Performance Analyss of the Weghted Wndow CFAR Algorthms eng Xangwe Guan Jan He You Department of Electronc Engneerng, Naval Aeronautcal Engneerng Academy, Er a road 88, Yanta Cty 6400, Shandong Provnce,

More information

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network

An Alternation Diffusion LMS Estimation Strategy over Wireless Sensor Network Progress In Electromagnetcs Research M, Vol. 70, 135 143, 2018 An Alternaton Dffuson LMS Estmaton Strategy over Wreless Sensor Network Ln L * and Donghu L Abstract Ths paper presents a dstrbuted estmaton

More information

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance.

Index Terms Adaptive modulation, Adaptive FEC, Packet Error Rate, Performance. ANALYTICAL COMPARISON OF THE PERFORMANCE OF ADAPTIVE MODULATION AND CODING IN WIRELESS NETWORK UNDER RAYLEIGH FADING 723 Sab Y.M. BANDIRI, Rafael M.S. BRAGA and Danlo H. SPADOTI Federal Unversty of Itajubá

More information

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid

Latency Insertion Method (LIM) for IR Drop Analysis in Power Grid Abstract Latency Inserton Method (LIM) for IR Drop Analyss n Power Grd Dmtr Klokotov, and José Schutt-Ané Wth the steadly growng number of transstors on a chp, and constantly tghtenng voltage budgets,

More information

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels

Estimation of Critical Performance and Optimization of Scalable Joint Source/Channel Coder (SJSCC) For Time Varying Channels Proceedngs of the Internatonal MultConference of Engneers and Computer Scentsts 8 Vol II IMECS 8, 9- March, 8, Hong ong Estmaton of Crtcal Performance and Optmzaton of Scalable Jont Source/ Coder (SJSCC)

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

Design and Implementation of DDFS Based on Quasi-linear Interpolation Algorithm

Design and Implementation of DDFS Based on Quasi-linear Interpolation Algorithm Desgn and Implementaton of DDFS Based on Quas-lnear Interpolaton Algorthm We Wang a, Yuanyuan Xu b and Hao Yang c College of Electroncs Engneerng, Chongqng Unversty of Posts and Telecommuncatons, Chongqng

More information

Cod and climate: effect of the North Atlantic Oscillation on recruitment in the North Atlantic

Cod and climate: effect of the North Atlantic Oscillation on recruitment in the North Atlantic Ths appendx accompanes the artcle Cod and clmate: effect of the North Atlantc Oscllaton on recrutment n the North Atlantc Lef Chrstan Stge 1, Ger Ottersen 2,3, Keth Brander 3, Kung-Sk Chan 4, Nls Chr.

More information

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery

Low Sampling Rate Technology for UHF Partial Discharge Signals Based on Sparse Vector Recovery 017 nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 017) ISBN: 978-1-60595-5-3 Low Samplng Rate Technology for UHF Partal Dscharge Sgnals Based on Sparse Vector Recovery Qang

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN

PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN PROTECTING INTELLECTUAL RIGHTS: DIGITAL WATERMARKING IN THE WAVELET DOMAIN Crstan V. SERDEAN 1, Martn TOMLINSON 1, Graham J. WADE 2 and Adran M. AMBROZE 1 1 Unversty of Plymouth, Unted Kngdom and 2 The

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

c 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media,

c 2009 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, c 2009 IEEE. Personal use of ths materal s permtted. Permsson from IEEE must be obtaned for all other uses, n any current or future meda, ncludng reprntng/republshng ths materal for advertsng or promotonal

More information

FFT Spectrum Analyzer

FFT Spectrum Analyzer THE ANNUAL SYMPOSIUM OF THE INSTITUTE OF SOLID MECHANICS SISOM 22 BUCHAREST May 16-17 ----------------------------------------------------------------------------------------------------------------------------------------

More information

California, 4 University of California, Berkeley

California, 4 University of California, Berkeley Dversty Processng WCDMA Cell earcher Implementaton Ahmed M. Eltawl, Eugene Grayver 2, Alreza Targhat, Jean Francos Frgon, Kambz hoarnejad, Hanl Zou 3 and Danjela Cabrc 4 Unversty of Calforna, Los Angeles,

More information

Topology Control for C-RAN Architecture Based on Complex Network

Topology Control for C-RAN Architecture Based on Complex Network Topology Control for C-RAN Archtecture Based on Complex Network Zhanun Lu, Yung He, Yunpeng L, Zhaoy L, Ka Dng Chongqng key laboratory of moble communcatons technology Chongqng unversty of post and telecommuncaton

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University)

Th P5 13 Elastic Envelope Inversion SUMMARY. J.R. Luo* (Xi'an Jiaotong University), R.S. Wu (UC Santa Cruz) & J.H. Gao (Xi'an Jiaotong University) -4 June 5 IFEMA Madrd h P5 3 Elastc Envelope Inverson J.R. Luo* (X'an Jaotong Unversty), R.S. Wu (UC Santa Cruz) & J.H. Gao (X'an Jaotong Unversty) SUMMARY We developed the elastc envelope nverson method.

More information

A Proposal of Mode Shape Estimation Method Using Pseudo-Modal Response : Applied to Steel Bridge in Building

A Proposal of Mode Shape Estimation Method Using Pseudo-Modal Response : Applied to Steel Bridge in Building A Proposal of Mode Shape Estmaton Method Usng Pseudo-Modal Response : Appled to Steel Brdge n Buldng More nfo about ths artcle: http://www.ndt.net/?d=19899 Doyoung Km 1, Hak Bo Shm 2, Hyo Seon Park 1 1

More information

Robust Filter Design based on Generalized Maximum-Likelihood Estimation

Robust Filter Design based on Generalized Maximum-Likelihood Estimation Robust Flter Desgn based on Generalzed Maxmum-Lkelhood Estmaton STEFA LEISCHER, ROBERT KLISKI, HOLGER HUTZELMA, RUDI KORR Fraunhofer Insttute for Communcaton Systems Hansastr. 3, 8686 Munch GERMAY Abstract:

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN

International Journal of Scientific & Engineering Research, Volume 4, Issue 11, November-2013 ISSN Internatonal Journal of Scentfc & Engneerng Research, Volume 4, Issue, November-203 ISSN 2229-558 33 COMPARATIVE STUDY OF HUFFMAN CODING, SBAC AND CABAC USED IN VARIOUS VIDEO CODING STANDARS AND THEIR

More information

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H

Delay Constrained Fuzzy Rate Control for Video Streaming over DVB-H Delay Constraned Fuzzy Rate Control for Vdeo Streamng over DVB-H Mehd Rezae, Moncef Gabbouj, 3 med Bouazz,, Tampere Unversty of Technology, 3 Noka Research Center, Tampere, Fnland mehd.rezae@tut.f, moncef.gabbouj@tut.f,

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating

Research on Peak-detection Algorithm for High-precision Demodulation System of Fiber Bragg Grating , pp. 337-344 http://dx.do.org/10.1457/jht.014.7.6.9 Research on Peak-detecton Algorthm for Hgh-precson Demodulaton System of Fber ragg Gratng Peng Wang 1, *, Xu Han 1, Smn Guan 1, Hong Zhao and Mngle

More information

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES *

THE GENERATION OF 400 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * SLAC PUB 874 3/1999 THE GENERATION OF 4 MW RF PULSES AT X-BAND USING RESONANT DELAY LINES * Sam G. Tantaw, Arnold E. Vleks, and Rod J. Loewen Stanford Lnear Accelerator Center, Stanford Unversty P.O. Box

More information

New SRRC receiver filter design with reduced number of filter taps for wireless communication systems

New SRRC receiver filter design with reduced number of filter taps for wireless communication systems IET Communcatons Research Artcle ew SRRC recever flter desgn wth reduced number of flter taps for wreless communcaton systems ISS 75-868 Receved on 6th July 07 Revsed 3rd January 08 Accepted on 8th February

More information

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking. M. Khademi

Archive of SID. Channel Capacity Analysis of Spread Spectrum Audio Watermarking.   M. Khademi KHADEMI: CHAEL CAPACITY AALYSIS OF SPREAD SPECTRUM AUDIO WATERMARKIG Channel Capacty Analyss of Spread Spectrum Audo Watermarkng M. Khadem Abstract In ths paper, nformaton-theoretc analyss of spread spectrum

More information

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm

FPGA Implementation of Ultrasonic S-Scan Coordinate Conversion Based on Radix-4 CORDIC Algorithm IACSIT Internatonal Journal of Engneerng and Technology, Vol. 7, No. 3, June 25 FPGA Implementaton of Ultrasonc S-Scan Coordnate Converson Based on Radx-4 CORDIC Algorthm Ruobo Ln, Guxong Lu, and Wenmng

More information

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION

LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION LOCAL DECODING OF WALSH CODES TO REDUCE CDMA DESPREADING COMPUTATION Albert M. Chan, Jon Feldman, and Raghu Madyastha (Vanu, Inc., Cambrdge, MA, USA, {chanal,jonfeld,raghu}@vanu.com); Potr Indyk and Davd

More information

DISTRIBUTED video coding (DVC) [1] [4] is an attractive

DISTRIBUTED video coding (DVC) [1] [4] is an attractive 1040 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 23, NO. 6, JUNE 2013 Dstrbuted Wreless Vsual Communcaton Wth Power Dstorton Optmzaton Xaopeng Fan, Member, IEEE, Feng Wu, Fellow,

More information

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication

Modeling and Simulation of New Encoding Schemes for High-Speed UHF RFID Communication Modelng and Smulaton of New Encodng Schemes for Hgh-Speed UHF RFID Communcaton Sang-Hyun Mo, J-Hoon Bae, Chan-Won Park, Hyo-Chan Bang, and Hyung Chul Park In ths paper, we present novel hgh-speed transmsson

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER

DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER DESIGN OF OPTIMIZED FIXED-POINT WCDMA RECEIVER Ha-Nam Nguyen, Danel Menard, and Olver Senteys IRISA/INRIA, Unversty of Rennes, rue de Kerampont F-3 Lannon Emal: hanguyen@rsa.fr ABSTRACT To satsfy energy

More information