All known algorithms of cryptographic systems, which have the property of interference resistance, are based on codes that detect and correct errors. This work proposes a study of stochastic codes for their potential ...
详细信息
An iterative postprocessing algorithm is proposed in the paper to reduce the coding artifacts produced by block based motion compensated transform coding. In the proposed approach, the adaptive spatial operations foll...
详细信息
ISBN:
(纸本)0818669527
An iterative postprocessing algorithm is proposed in the paper to reduce the coding artifacts produced by block based motion compensated transform coding. In the proposed approach, the adaptive spatial operations followed by the adaptive motion compensated temporal operation are applied to the reconstructed image iteratively. As both the spatial and the temporal operations are adaptive to the image contents in both the spatial and the temporal domain, iteratively applying those operations to the reconstructed image can greatly reduce the coding artifacts without blurring image details. The computer simulations show that by using the proposed algorithm, one can reduce the coding artifacts and improve the quality of the reconstructed image effectively.
The extremely dynamic and competitive nature of the wireless communication systems market demands ever shorter times to market for new products. Virtual prototyping has emerged as one of the most promising techniques ...
详细信息
The extremely dynamic and competitive nature of the wireless communication systems market demands ever shorter times to market for new products. Virtual prototyping has emerged as one of the most promising techniques to offer the required time savings and resulting increases in design efficiency. A fully automated environment for development of virtual prototypes is presented here, offering maximal efficiency gains, and supporting both design and verification flows, from the algorithmic model to the virtual prototype. The environment employs automated verification pattern refinement to achieve increased reuse in the design process, as well as increased quality by reducing human coding errors.
The byte error locating codes specify the byte location in which errors are occurred without indicating the precise location of erroneous bit positions. This type of codes is considered to be useful for fault isolatio...
详细信息
The byte error locating codes specify the byte location in which errors are occurred without indicating the precise location of erroneous bit positions. This type of codes is considered to be useful for fault isolation and reconfiguration in the fault-tolerant computer systems. In this paper, difference between the code function of error-location and that of error-correction/error-detection is clarified. With using the concepts of unidirectional byte distance, unordered byte number and ordered byte number, the necessary and sufficient conditions of the unidirectional byte error locating codes are demonstrated.
Recently, a lot of research works have been carried out regarding intelligent communication. If the final information sink is assumed as a human being, a communication channel can be used more effectively when encoder...
详细信息
Recently, a lot of research works have been carried out regarding intelligent communication. If the final information sink is assumed as a human being, a communication channel can be used more effectively when encoders/decoders work ''intelligently'' or take into account of the semantics of information to be sent. We have been studying error-controlling systems based on different importance of segmental information. The system divides the information input into segments to which individual importance can be assigned. The segments are individually encoded by appropriate error-correcting codes (ECCs) which correspond to their importance among codes with different error-correcting capabilities. For the information that difference of the importance is systematically aligned, conventional UEP (unequal error protection) codes can be applied, but we treat the case that alignment of the importance of the information source is not systematically aligned. Since the system uses multiple ECCs with different (n,k,d) parameters, information regarding what length of the next codeword is required for decoding. We propose error controlling schemes using multiple ECCs;the first scheme and the second scheme use the obvious codelength identifying information. In the second scheme, information bits are sorted so that segments with the same importance can be encoded by an ECC with the same error-correcting capability. The third scheme is a main proposal in this paper and uses Variable Capability coding scheme (VCC) which uses some ECCs having different error-correcting capabilities and codelengths. A sequence encoded by the VCC is separable into appropriate segments without obvious codelength identifying information when the channel error probability is low. Subsequently, we evaluate these schemes by coderate when (1) error correcting capability (2) codelength identifying capability are the same. One of the feature of VCC is the capability of resuming from propagative errors because erro
The principles underlying the proposed international standard for the safety of software have been applied to the assessment of a number of computer based systems. It has been found that the methodology of safety engi...
详细信息
The principles underlying the proposed international standard for the safety of software have been applied to the assessment of a number of computer based systems. It has been found that the methodology of safety engineering has not yet transferred to computer systems and software. This results in hazards emerging late during the design or assessment process} with corresponding cost and delay. Company guidelines for good software engineering practice are lacking and individual engineers seek to apply good practice without the support of a consistent company framework. The assessment process itself can be made more cost effective by the adoption during the design process of methods which will make the analysis and understanding of the system less difficult. The same methods of working will also have a beneficial effect on the design process itself.
The reliability of a software system depends on its initial error contents and which errors are discovered during testing and use. Which errors are discovered and then corrected will depend on how the system is used. ...
详细信息
The reliability of a software system depends on its initial error contents and which errors are discovered during testing and use. Which errors are discovered and then corrected will depend on how the system is used. As a consequence of this, the reliability of a system will depend on its history (installation trail). Knowledge of this history can be used to predict the reliability at a new site and the test strategy necessary in order to obtain a specific reliability for a predefined site. This paper shows how we can describe the history of a system by a function execution vector. The number of remaining errors will have a Poisson distribution with intensity depending on the execution vectors for all the previous sites and the initial error content. Once the cost of a failure in any system function is identified, it is also possible to find the optimal test strategy for test of the system at a specified site.
Virtually all software programs contain errors. Personal estimates suggest that there can be initially one to ten errors per 1,000 lines of program code. Large industrial process control system programs are currently ...
详细信息
Virtually all software programs contain errors. Personal estimates suggest that there can be initially one to ten errors per 1,000 lines of program code. Large industrial process control system programs are currently being designed with more than one million lines of code. Program failures in the industrial process control arena can mean loss of production, bad product produced, damage to process plant and even loss of life. Given such a negative scene: What, if anything, can be done to quantify software reliability? Several quantifiable reliability measures of goodness exist 1 . Probabilistic techniques are discussed and then applied to real life examples. Their attributes and deficiencies are highlighted. One appendix example shows the appropriate application of a probabilistic software model used to estimate remaining software module defects at any given time. Other examples use Duane 2 growth modeling to obtain system program error occurrence rate of change and to make short term future error predictions. The Duane growth model is complemented by a very simple Software Error Discovery concept. Another technique illustrating Pareto 3 Error Profiling is examined. It is helpful when trying to decide where effort should be expended in further reducing program defects.
errors within an assembler program for limiting the local power density in a reactor vessel are to be identified and corrected during two test phases. According to the special features for error detection of the testi...
详细信息
errors within an assembler program for limiting the local power density in a reactor vessel are to be identified and corrected during two test phases. According to the special features for error detection of the testing facilities, the errors are classified, and an appropriate software reliability model is applied to each error class. These models allow prediction of certain reliability parameters from the observation of the test. Depending on the model employed these parameters can be e.g. the number of remaining errors, the probability for the occurance of an error within a given time interval, the meantime between successive errors. In this contribution references are only made to the number of remaining errors.
(1): I do not understand how the word “simulation” in the title can be misinterpreted as “code” or “software.”(2) and (3): I believe the confusion arises from his use of the definition of uncertainty as “A pote...
详细信息
(1): I do not understand how the word “simulation” in the title can be misinterpreted as “code” or “software.”
(2) and (3): I believe the confusion arises from his use of the definition of uncertainty as “A potential deficiency in any phase of the modeling process that is due to lack of knowledge” (which does not quantify a range within which truth lies with a specified degree of confidence) as opposed to the concepts and definitions used in current experimental uncertainty analysis 1 (which do quantify such a range).
The ranges D ± U D and S ± U S both contain (with 95% confidence) the truth T, which is independent of experiment or simulation. The assumption (also made in Oberkampf and Trucano, 2000) that D is “an individual experimental measurement” is inaccurate. The experimental result is D , and U D is the uncertainty...
暂无评论