1,109 research outputs found

    Instantly Decodable Network Coding for Real-Time Scalable Video Broadcast over Wireless Networks

    Full text link
    In this paper, we study a real-time scalable video broadcast over wireless networks in instantly decodable network coded (IDNC) systems. Such real-time scalable video has a hard deadline and imposes a decoding order on the video layers.We first derive the upper bound on the probability that the individual completion times of all receivers meet the deadline. Using this probability, we design two prioritized IDNC algorithms, namely the expanding window IDNC (EW-IDNC) algorithm and the non-overlapping window IDNC (NOW-IDNC) algorithm. These algorithms provide a high level of protection to the most important video layer before considering additional video layers in coding decisions. Moreover, in these algorithms, we select an appropriate packet combination over a given number of video layers so that these video layers are decoded by the maximum number of receivers before the deadline. We formulate this packet selection problem as a two-stage maximal clique selection problem over an IDNC graph. Simulation results over a real scalable video stream show that our proposed EW-IDNC and NOW-IDNC algorithms improve the received video quality compared to the existing IDNC algorithms

    Advances in Pattern Recognition Algorithms, Architectures, and Devices

    Get PDF
    Over the last decade, tremendous advances have been made in the general area of pattern recognition techniques, devices, and algorithms. We have had the distinct pleasure of witnessing this remarkable growth as evidenced through their dissemination in the previous Optical Engineering special sections we have jointly edited— January 1998, March 1998, May 2000, and January 2002. Twenty-six papers were finally accepted for this latest special section, encompassing the recent trends and advancements made in many different areas of pattern recognition techniques utilizing algorithms, architectures, implementations, and devices. These techniques include matched spatial filter based recognition, hit-miss transforms, invariant pattern recognition, joint transform correlator JTC based recognition, morphological processing based recognition, neural network based recognition, wavelet based recognition, fingerprint and face recognition, data fusion based recognition, and target tracking, as well as other techniques. These papers summarize the work of 70 researchers from eight countries

    Delivery Time Reduction for Order-Constrained Applications using Binary Network Codes

    Full text link
    Consider a radio access network wherein a base-station is required to deliver a set of order-constrained messages to a set of users over independent erasure channels. This paper studies the delivery time reduction problem using instantly decodable network coding (IDNC). Motivated by time-critical and order-constrained applications, the delivery time is defined, at each transmission, as the number of undelivered messages. The delivery time minimization problem being computationally intractable, most of the existing literature on IDNC propose sub-optimal online solutions. This paper suggests a novel method for solving the problem by introducing the delivery delay as a measure of distance to optimality. An expression characterizing the delivery time using the delivery delay is derived, allowing the approximation of the delivery time minimization problem by an optimization problem involving the delivery delay. The problem is, then, formulated as a maximum weight clique selection problem over the IDNC graph wherein the weight of each vertex reflects its corresponding user and message's delay. Simulation results suggest that the proposed solution achieves lower delivery and completion times as compared to the best-known heuristics for delivery time reduction

    Joint Wavelet Transform Correlation with Separated Target and Reference Planes

    Get PDF
    In recent years, we realize the usefulness of feature extraction for optical correlator and hereby, we investigate the capability of Laplace operator in feature extraction of multiple targets. The first-order terms and the false alarm terms in the correlation output would be removed using electronic power spectrum subtraction technique. Most importantly, the entire magneto-optic SLM is completely utilized for displaying only targets in the input scene. A new cost efficient hardware implementation is proposed and aforementioned result of the proposed system is evaluated through computer simulation

    Case-control study of suicide in Karachi, Pakistan

    Get PDF
    Background: In recent years suicide has become a major public health problem in Pakistan. Aims: To identify major risk factors associated with suicides in Karachi, Pakistan. Method: A matched case-control psychological autopsy study. interviews were conducted for 100 consecutive suicides, which were matched for age, gender and area of residence with 100 living controls. Results: Both univariate analysis and conditional logistic regression model results indicate that predictors of suicides in Pakistan are psychiatric disorders (especially depression), marital status (being married), unemployment, and negative and stressful life events. only a few individuals were receiving treatment at the time of suicide. None of the victims had been in contact with a health professional in the month before suicide. Conclusions: Suicide in Pakistan is strongly associated with depression, which is under-recognised and under-treated, The absence of an effective primary healthcare system in which mental health could be integrated poses unique challenges for suicide prevention in Pakistan

    Screening for microbial load and antibiotic resistance pattern in Escherichia coli isolated from paper currency circulating in Kushtia, Bangladesh

    Get PDF
    Background: Paper currency is used for every type of commerce and plays an important role in the life of human beings. They are exchanged and come into contact with different environments and many different individuals during their circulation. Therefore, they can become contaminated with microorganisms and transfer bacteria across environments. The present study was aimed for quantitative assessment of microorganisms in circulated paper currency from Kushtia, Bangladesh and antibiotic resistant profiles of isolated Escherichia coli.Methods: A total of 10 paper currency samples currently in circulation involving three denominations (5, 10 and 500) were randomly collected from individuals involved in various occupations including street beggar, local hotel, bus conductor, poultry seller, vegetable seller, fish seller, commercial bank, ATM booth, tea seller, grocery store in Kushtia city, Bangladesh. Selective culture and biochemical tests were performed for the isolation and identification of microbial pathogens. Antibiotic resistance profiles were evaluated for isolated Escherichia coli using Kirby-Bauer method according to CLSI guidelines.Results: Aerobic mesophilic bacteria, Enterobacteriaceae and Pseudomonas spp. were the highest in paper currency from local hotel and ATM booth. Enterobacteriaceae (including coliforms) were predominantly present in paper currencies collected from local hotel, grocery, fish seller and beggar while Pseudomonas spp. were found in currency notes obtained from ATM booth, poultry farm, vegetable seller and local hotel. Antibiotic resistant profiles of E. coli isolated from local hotel currency showed that 50% of E. coli isolates were multidrug resistant. The highest resistant profile was observed against penicillin (95%) followed by polypeptide (75%), cephalosporin (50%), quinolone (30%) and sulfonamide (5%) groups of antibiotics.Conclusions: Multiple antibiotic resistant pathogenic bacteria are prevalent in paper currency regardless of their sources. Paper currency could contribute in transmission of infectious disease as well as in antibiotic resistance, therefore, should be handled carefully

    Epidemiology of childhood and adolescent cancer in Bangladesh, 2001-2014

    Get PDF
    Background: Cancer burden among children and adolescents is largely unknown in Bangladesh. This study aims to provide a comprehensive overview on childhood and adolescent cancers and to contribute to the future strategies to deal with these diseases in Bangladesh. Methods: Data on malignant neoplasms in patients aged less than 20years diagnosed between 2001 and 2014 (N=3143) in Bangladesh was collected by the National Institute of Cancer Research and Hospital and ASHIC Foundation. The age pattern and distribution of cancer types were analysed and the incidence rates were calculated. Results: The age-standardised incidence rate was 7.8 per million person-years for children (0-14 years) in the last time period (2011-2014). Retinoblastoma (25%) and leukaemia (18%) were the most common childhood cancers. For adolescents (15-19 years), the age-specific incidence rate was 2.1 per million person-years in the same time period. Most common adolescent cancers were malignant bone tumours (38%), germ cell and gonadal tumours (17%), and epithelial tumours (16%). There were more boys affected (M: F ratio 2.0 in children and 1.4 in adolescents) than girls. Conclusion: Cancer incidences were lower than expected most likely due to a low level of awareness about cancer among clinicians and the population, inadequate access to health care, lack of diagnostic equipment and incomplete recording of cases. Improvements on different levels should be made to get a better epidemiologic insight and to detect cancer earlier resulting in a better outcome for affected chil

    Logical equivalence of optical symbolic substitution and shadow-casting schemes

    Full text link
    The logical equivalence between two powerful optical computing techniques, namely, optical symbolic substitution and optical shadow-casting is investigated. A common basis for both schemes is developed and their roots are traced back to fundamental principles of logic design. Both shadow-casting and symbolic substitution based optical computing operations are shown to be equivalent to logical sum of product operations.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/29952/1/0000312.pd
    • …
    corecore