1,553 research outputs found
Scalable video/image transmission using rate compatible PUM turbo codes
The robust delivery of video over emerging wireless networks poses many challenges due to the heterogeneity of access networks, the variations in streaming devices, and the expected variations in network conditions caused by interference and coexistence. The proposed approach exploits the joint optimization of a wavelet-based scalable video/image coding framework and a forward error correction method based on PUM turbo codes. The scheme minimizes the reconstructed image/video distortion at the decoder subject to a constraint on the overall transmission bitrate budget. The minimization is achieved by exploiting the rate optimization technique and the statistics of the transmission channel
Recommended from our members
A survey on online monitoring approaches of computer-based systems
This report surveys forms of online data collection that are in current use (as well as being the subject of research to adapt them to changing technology and demands), and can be used as inputs to assessment of dependability and resilience, although they are not primarily meant for this use
Recommended from our members
An Empirical Study of the Effectiveness of 'Forcing Diversity' Based on a Large Population of Diverse Programs
Use of diverse software components is a viable defence against common-mode failures in redundant softwarebased systems. Various forms of "Diversity-Seeking Decisions" (“DSDs”) can be applied to the process of developing, or procuring, redundant components, to improve the chances of the resulting components not failing on the same demands. An open question is how effective these decisions, and their combinations, are for achieving large enough reliability gains. Using a large population of software programs, we studied experimentally the effectiveness of specific "DSDs" (and their combinations) mandating differences between redundant components. Some of these combinations produced much better improvements in system probability of failure per demand (PFD) than "uncontrolled" diversity did. Yet, our findings suggest that the gains from such "DSDs" vary significantly between them and between the application problems studied. The relationship between DSDs and system PFD is complex and does not allow for simple universal rules
(e.g. "the more diversity the better") to apply
Neural mechanisms of predatory aggression in rats-implications for abnormal intraspecific aggression
Our recent studies showed that brain areas that are activated in a model of escalated aggression overlap with those that promote predatory aggression in cats. This finding raised the interesting possibility that the brain mechanisms that control certain types of abnormal aggression include those involved in predation. However, the mechanisms of predatory aggression are poorly known in rats, a species that is in many respects different from cats. To get more insights into such mechanisms, here we studied the brain activation patterns associated with spontaneous muricide in rats. Subjects not exposed to mice, and those which did not show muricide were used as controls. We found that muricide increased the activation of the central and basolateral amygdala, and lateral hypothalamus as compared to both controls; in addition, a ventral shift in periaqueductal gray activation was observed. Interestingly, these are the brain regions from where predatory aggression can be elicited, or enhanced by electrical stimulation in cats. The analysis of more than 10 other brain regions showed that brain areas that inhibited (or were neutral to) cat predatory aggression were not affected by muricide. Brain activation patterns partly overlapped with those seen earlier in the cockroach hunting model of rat predatory aggression, and were highly similar with those observed in the glucocorticoid dysfunction model of escalated aggression. These findings show that the brain mechanisms underlying predation are evolutionarily conservative, and indirectly support our earlier assumption regarding the involvement of predation-related brain mechanisms in certain forms of escalated social aggression in rats
Towards a Formal Verification Methodology for Collective Robotic Systems
We introduce a UML-based notation for graphically modeling
systems’ security aspects in a simple and intuitive
way and a model-driven process that transforms graphical
specifications of access control policies in XACML. These
XACML policies are then translated in FACPL, a policy
language with a formal semantics, and the resulting policies
are evaluated by means of a Java-based software tool
Recommended from our members
Security and Performance Trade-offs for Data Distribution Service in Flying Ad-Hoc Networks
This paper focuses on the data distribution service(DDS) middleware and its publish/subscribe logic - a topic thathas recently regained popularity in both academia as well asindustry. DDS is a well-known approach based on publish-subscribe logic. Therefore, only brief introduction of the issueis given followed by practical evaluation of current, availableand real implementations from the security and performancepoint of view. The analysis and evaluation is performed toaid comparison of competing DDS implementation, and thuscould serve well as an input to decision-making about whichof these solutions is best suited for a given situation. Finally,the practical performance evaluation is performed via severaldifferent scenarios to effectively compare the currently most-usedDDS implementations
ICN as Network Infrastructure for Multi-Sensory Devices: Local Domain Service Discovery for ICN-based IoT Environments
Information Centric Networking (ICN) is an emerging research topic aiming at shifting the Internet from its current host-centric paradigm towards an approach centred around content, which enables the direct retrieval of information objects in a secure, reliable, scalable, and efficient way. The exposure of ICN to scenarios other than static content distribution is a growing research topic, promising to extend the impact of ICN to a broader scale. In this context, particular attention has been given to the application of ICN in Internet of Things (IoT) environments. The current paper, by focusing on local domain IoT scenarios, such as multi-sensory Machine to Machine environments, discusses the challenges that ICN, particularly Interest-based solutions, impose to service discovery. This work proposes a service discovery mechanism for such scenarios, relying on an alternative forwarding pipeline for supporting its core operations. The proposed mechanism is validated through a proof-of-concept prototype, developed on top of the Named Data Networking ICN architecture, with results showcasing the benefits of our solution for discovering services within a collision domain. © 2017 Springer Science+Business Media New Yor
Multi-user video streaming using unequal error protection network coding in wireless networks
In this paper, we investigate a multi-user video streaming system applying unequal error protection (UEP) network coding (NC) for simultaneous real-time exchange of scalable video streams among multiple users. We focus on a simple wireless scenario where users exchange encoded data packets over a common central network node (e.g., a base station or an access point) that aims to capture the fundamental system behaviour. Our goal is to present analytical tools that provide both the decoding probability analysis and the expected delay guarantees for different importance layers of scalable video streams. Using the proposed tools, we offer a simple framework for design and analysis of UEP NC based multi-user video streaming systems and provide examples of system design for video conferencing scenario in broadband wireless cellular networks
Recommended from our members
Comparison of thermistor linearization techniques for accurate temperature measurement in phase change materials
Alternate energy technologies are developing rapidly in the recent years. A significant part of this trend is the development of different phase change materials (PCMs). Proper utilization of PCMs requires accurate thermal characterization. There are several methodologies used in this field. This paper stresses the importance of accurate temperature measurements during the implementation of T-history method. Since the temperature sensor size is also important thermistors have been selected as the sensing modality. Two thermistor linearization techniques, one based on Wheatstone bridge and the other based on simple serial-parallel resistor connection, are compared in terms of achievable temperature accuracy through consideration of both, nonlinearity and self-heating errors. Proper calibration was performed before T-history measurement of RT21 (RUBITHERM® GmbH) PCM. Measurement results suggest that the utilization of serial-parallel resistor connection gives better accuracy (less than ±0.1°C) in comparison with the Wheatstone bridge based configuration (up to ±1.5°C)
Compressive sampling of binary images
Compressive sampling is a novel framework that exploits sparsity of a signal in a transform domain to perform sampling below the Nyquist rate. In this paper, we apply compressive sampling to reduce the sampling rate of binary images. A system is proposed whereby the image is split into non-overlapping blocks of equal size and compressive sampling is performed on selected blocks only using the orthogonal matching pursuit technique. The remaining blocks are sampled fully. This way, the complexity and the required sampling time is reduced since the orthogonal matching pursuit operates on a smaller number of samples, and at the same time local sparsity within an image is exploited. Our simulation results show more than 20% saving in acquisition for several binary images
- …
