1,553 research outputs found

    Scalable video/image transmission using rate compatible PUM turbo codes

    Get PDF
    The robust delivery of video over emerging wireless networks poses many challenges due to the heterogeneity of access networks, the variations in streaming devices, and the expected variations in network conditions caused by interference and coexistence. The proposed approach exploits the joint optimization of a wavelet-based scalable video/image coding framework and a forward error correction method based on PUM turbo codes. The scheme minimizes the reconstructed image/video distortion at the decoder subject to a constraint on the overall transmission bitrate budget. The minimization is achieved by exploiting the rate optimization technique and the statistics of the transmission channel

    Neural mechanisms of predatory aggression in rats-implications for abnormal intraspecific aggression

    Get PDF
    Our recent studies showed that brain areas that are activated in a model of escalated aggression overlap with those that promote predatory aggression in cats. This finding raised the interesting possibility that the brain mechanisms that control certain types of abnormal aggression include those involved in predation. However, the mechanisms of predatory aggression are poorly known in rats, a species that is in many respects different from cats. To get more insights into such mechanisms, here we studied the brain activation patterns associated with spontaneous muricide in rats. Subjects not exposed to mice, and those which did not show muricide were used as controls. We found that muricide increased the activation of the central and basolateral amygdala, and lateral hypothalamus as compared to both controls; in addition, a ventral shift in periaqueductal gray activation was observed. Interestingly, these are the brain regions from where predatory aggression can be elicited, or enhanced by electrical stimulation in cats. The analysis of more than 10 other brain regions showed that brain areas that inhibited (or were neutral to) cat predatory aggression were not affected by muricide. Brain activation patterns partly overlapped with those seen earlier in the cockroach hunting model of rat predatory aggression, and were highly similar with those observed in the glucocorticoid dysfunction model of escalated aggression. These findings show that the brain mechanisms underlying predation are evolutionarily conservative, and indirectly support our earlier assumption regarding the involvement of predation-related brain mechanisms in certain forms of escalated social aggression in rats

    Towards a Formal Verification Methodology for Collective Robotic Systems

    Get PDF
    We introduce a UML-based notation for graphically modeling systems’ security aspects in a simple and intuitive way and a model-driven process that transforms graphical specifications of access control policies in XACML. These XACML policies are then translated in FACPL, a policy language with a formal semantics, and the resulting policies are evaluated by means of a Java-based software tool

    ICN as Network Infrastructure for Multi-Sensory Devices: Local Domain Service Discovery for ICN-based IoT Environments

    Get PDF
    Information Centric Networking (ICN) is an emerging research topic aiming at shifting the Internet from its current host-centric paradigm towards an approach centred around content, which enables the direct retrieval of information objects in a secure, reliable, scalable, and efficient way. The exposure of ICN to scenarios other than static content distribution is a growing research topic, promising to extend the impact of ICN to a broader scale. In this context, particular attention has been given to the application of ICN in Internet of Things (IoT) environments. The current paper, by focusing on local domain IoT scenarios, such as multi-sensory Machine to Machine environments, discusses the challenges that ICN, particularly Interest-based solutions, impose to service discovery. This work proposes a service discovery mechanism for such scenarios, relying on an alternative forwarding pipeline for supporting its core operations. The proposed mechanism is validated through a proof-of-concept prototype, developed on top of the Named Data Networking ICN architecture, with results showcasing the benefits of our solution for discovering services within a collision domain. © 2017 Springer Science+Business Media New Yor

    Multi-user video streaming using unequal error protection network coding in wireless networks

    Get PDF
    In this paper, we investigate a multi-user video streaming system applying unequal error protection (UEP) network coding (NC) for simultaneous real-time exchange of scalable video streams among multiple users. We focus on a simple wireless scenario where users exchange encoded data packets over a common central network node (e.g., a base station or an access point) that aims to capture the fundamental system behaviour. Our goal is to present analytical tools that provide both the decoding probability analysis and the expected delay guarantees for different importance layers of scalable video streams. Using the proposed tools, we offer a simple framework for design and analysis of UEP NC based multi-user video streaming systems and provide examples of system design for video conferencing scenario in broadband wireless cellular networks

    Compressive sampling of binary images

    Get PDF
    Compressive sampling is a novel framework that exploits sparsity of a signal in a transform domain to perform sampling below the Nyquist rate. In this paper, we apply compressive sampling to reduce the sampling rate of binary images. A system is proposed whereby the image is split into non-overlapping blocks of equal size and compressive sampling is performed on selected blocks only using the orthogonal matching pursuit technique. The remaining blocks are sampled fully. This way, the complexity and the required sampling time is reduced since the orthogonal matching pursuit operates on a smaller number of samples, and at the same time local sparsity within an image is exploited. Our simulation results show more than 20% saving in acquisition for several binary images
    corecore