Side information has a significant influence on the rate-distortion(RD) performance of distributed video coding(DVC). In the conventional motion compensated frame interpolation scheme, all blocks adopt the same si...
详细信息
Side information has a significant influence on the rate-distortion(RD) performance of distributed video coding(DVC). In the conventional motion compensated frame interpolation scheme, all blocks adopt the same side-information generation method regardless of the motion intensity inequality at different regions. In this paper, an improved method is proposed. The image blocks are classified into two modes, fast motion and slow motion, by simply computing the discrete cosine transformation(DCT) coefficients at the encoder. On the decoder, it chooses the direct interpolation and refined motion compensated interpolation correspondingly to generate side information. Experimental results show that the proposed method, without increasing the encoder complexity, can increase the average peak signal-to-noise ratio(PSNR) by up to 1~ 2 dB compared with the existing algorithm. Meanwhile, the proposed algorithm significantly improves the subjective quality of the side information.
In the ever-evolving landscape of competitive programming and coding contests, the utilization of cloud computing has emerged as a transformative force, revolutionizing the way programmers participate and compete. Thi...
详细信息
Between the display panel and the video driver, fiber is used to transfer the uncompressed video data. Especially for head-mounted display, the video cable can be replaced by fiber. Choosing an appropriate line coding...
详细信息
In order to overcome the security and integrity problems of the traditional university file information resource sharing model, the paper proposes a new cloud computing-based university file information resource shari...
详细信息
ISBN:
(纸本)9781665438926
In order to overcome the security and integrity problems of the traditional university file information resource sharing model, the paper proposes a new cloud computing-based university file information resource sharing model. Supported by the cloud computing system architecture, the use of cloud computing search algorithms to fully excavate university archives information resources to realize the comprehensive sharing of university information archives, and calculate the utility parameters of university archives information resource sharing based on the mining results of cloud computing , and build a communication consumption matrix for the sharing of archives information resources in colleges and universities, and complete the construction of the sharing model of archives information resources in colleges. The comparative experiment results show that compared with the traditional sharing model, the intrusion rate and sharing transmission loss of the constructed sharing model are significantly reduced, indicating that the constructed model can effectively realize the sharing of archive information resources in universities and ensure the integrity and safety of archives.
Turbo codes have been shown to approach the Shannon limit for error correcting capability at low signal-to-noise ratios given large sized frames. Extensive research efforts have been examining ways to enhance the perf...
详细信息
This study looks into the impact of mobile coding apps on autonomous learning among tertiary students through a cross-sectional survey. Analyzing data from 377 students, primarily from the BS informationtechnology pr...
详细信息
One Anti-scanning & printing digital watermark algorithm is studied which can be used in electronic seal Anti-counterfeiting system. Spread spectrum coding strategy is used for embedding the watermark of bigger ca...
详细信息
ISBN:
(纸本)9780769536880
One Anti-scanning & printing digital watermark algorithm is studied which can be used in electronic seal Anti-counterfeiting system. Spread spectrum coding strategy is used for embedding the watermark of bigger capacity. The experimental results show that the algorithm can withstand pixel distortion and geometry distortion at the same time which can be used in digital watermark of the electronic seal anti-counteifeiting system and paper certificate and raised the security of watermark detection system in very great degree.
A scheme of variable bit rate video coding for ATM networks is proposed in this paper. A two-layer coding method of image sequences using wavelet transform over a VBR network is given, and, the statistical multiplexin...
详细信息
ISBN:
(纸本)7505336355
A scheme of variable bit rate video coding for ATM networks is proposed in this paper. A two-layer coding method of image sequences using wavelet transform over a VBR network is given, and, the statistical multiplexing gain of the WT coding scheme over ATM-BISDN networks is also computed. The computing simulation results of the mean SNR and the mean data compression rate of reconstructed images with WT show that the subjective and the objective qualities of reconstructed images using proposal coding scheme are satisfied.
With the increasing of meteorological technology and equipment, how to efficiently manage meteorological technology and equipment is a difficult problem. This paper proposes to establish a set of standard coding rules...
详细信息
ISBN:
(纸本)9781450390200
With the increasing of meteorological technology and equipment, how to efficiently manage meteorological technology and equipment is a difficult problem. This paper proposes to establish a set of standard coding rules, realize coding based on WebService, and uniquely identify the equipment through coding, so as to provide support for the information management and life cycle management of meteorological technical equipment.
Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to en...
详细信息
ISBN:
(纸本)9781728103853
Trust is an important factor to consider when selecting a cloud computing provider. While some security models have failed to provide extended trustworthy in this space, this paper aims to propose a new approach to entering and trusting cloud computing. The proposed approach consists of developing a cloud computing trust model (CCTM) through a cloud computing security solution called H-AES. CCTM is designed with security features in mind and contains elements that are needed to build trust in a cloud computing environment. The CCMT model was derived heuristically based on literature review and surveying IT professionals. H-AES is a hardware implementation of the advanced encryption standard (AES) for data in transmission and is able to encrypt, decrypt and transmit information in a real time communication mode.
暂无评论