In multiagent reinforcement learning, inter-agent credit assignment is a fundamental problem, since a single scalar reinforcement signal is the only reliable feedback that teams of learning agents receive. This proble...
详细信息
In multiagent reinforcement learning, inter-agent credit assignment is a fundamental problem, since a single scalar reinforcement signal is the only reliable feedback that teams of learning agents receive. This problem is more critical in groups of independent learners with a joint task. In this research, it is assumed that a critic agent receives the environment feedback and assigns a proper credit to each agent using some measures. Three of such measures for a team of cooperative agents with a parallel and AND-type task are introduced. These measures somehow compare the agents' knowledge. One of these criteria, called normal expertness, is a non-relative measure while two other ones (certainty and relative normal expertness) are relative measure. It is experimentally shown that relative measures work better as they contain more information for the critic agent.
We propose a text scanner which detects wide text strings in a sequence of scene images. For scene text detection, we use a multiple-CAMShift algorithm on a text probability image produced by a multi-layer perceptron....
详细信息
ISBN:
(纸本)076951695X
We propose a text scanner which detects wide text strings in a sequence of scene images. For scene text detection, we use a multiple-CAMShift algorithm on a text probability image produced by a multi-layer perceptron. To provide enhanced resolution of the extracted text images, we perform the text detection process after generating a mosaic image in a fast and robust image registration method.
Savings ranging from 36% to 53% in FPGA resources are achieved through a filter design program that simultaneously applies optimum scaling, careful selection of filter order and use of fixed-coefficient multipliers de...
详细信息
The standard FIR filter design approach which uses ideal filter coefficients determined by a filter design algorithm such as remez exchange, windowing, or similar techniques, rounding or truncating the ideal coefficie...
详细信息
ISBN:
(纸本)078037147X
The standard FIR filter design approach which uses ideal filter coefficients determined by a filter design algorithm such as remez exchange, windowing, or similar techniques, rounding or truncating the ideal coefficients to a specific number of bits and realizing the digital filter using one of the standard FIR filter structures generates filters with considerably more hardware than is required to meet the original specifications. By using a new public-domain computer program written in Matlab, FIR filters can be designed with one-third of the hardware required using standard techniques. In a typical filter example described by the Xilinx application notes, an 8-tap FIR filter can be reduced using the CSD/DM technique from 584 slices to only 186 slices for Synplify Pro 6.0 and from 645 slices to only 214 slices for FPGA express 3.4.
Savings ranging from 36% to 53% in FPGA resources are achieved through a filter design program that simultaneously applies optimum scaling, careful selection of filter order and use of fixed-coefficient multipliers de...
详细信息
ISBN:
(纸本)0780366859
Savings ranging from 36% to 53% in FPGA resources are achieved through a filter design program that simultaneously applies optimum scaling, careful selection of filter order and use of fixed-coefficient multipliers designed with CSD and/or DM techniques. The output of the program is a VHDL description of the optimized hardware that is suitable as input to the Synplify Pro computer program that generates highly optimized FPGA circuits for Xilinx and other FPGA's.
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "di...
详细信息
ISBN:
(纸本)0769510620
The article describes some of the security issues in streaming video over the Internet. If high quality video sequences are to be delivered to computers and digital television systems over the Internet in our "digital future", this material must be protected.
Large-scale scientific applications present great challenges to computational scientists in terms of obtaining high performance and in managing large datasets. These applications (most of which are simulations) may em...
详细信息
With the recent growth of networked multimedia systems, techniques are needed to prevent (or at least deter) the illegal copying, forgery and distribution of digital media elements such as audio, images and video. The...
详细信息
With the recent growth of networked multimedia systems, techniques are needed to prevent (or at least deter) the illegal copying, forgery and distribution of digital media elements such as audio, images and video. The problem is that a copy of a media element is identical to the original. It is also desirable to determine where and by how much a multimedia element has been changed from the original. One classical approach to the problem of protecting "digital content" has been the use of cryptographic methods such as encryption and authentication. Recently other methods have been proposed to improve one's claim of ownership over a digital media element by inserting a small amount of distortion directly into the media element. This distortion, known as a digital watermark, can be used to uniquely identify the owner of the content. Digital watermarking research is mainly the domain of the signal processing community that is very naive when considering real world security problems. Also the attitude of the academic community that it has the "right" to copy and reproduce any multimedia element is curious at best and perhaps conveys the wrong message to our students. The use of the "Lena" image is a good example of this. In this talk I will survey the current state of multimedia security and describe important research issues. I will also express some concern that perhaps we in the signal processing community might want to understand the "security scenario" before making grandiose claims about how our latest watermarking technique will save the world!
We develop a framework for efficiently encoding predictive error frames (PEF) as part of a rate scalable, wavelet-based video compression algorithm. We investigate the use of rate-distortion analysis to determine the ...
详细信息
We develop a framework for efficiently encoding predictive error frames (PEF) as part of a rate scalable, wavelet-based video compression algorithm. We investigate the use of rate-distortion analysis to determine the significance of coefficients in the wavelet decomposition. Based on this analysis, we allocate the bit budget assigned to a PEF to the coefficients that yield the largest reduction in distortion, while maintaining the embedded and rate scalable properties of our video compression algorithm.
Our results demonstrate that our novel application development environment provides both ease-of-use and high performance for large-scale, I/O-intensive scientific applications.
ISBN:
(纸本)9781581132700
Our results demonstrate that our novel application development environment provides both ease-of-use and high performance for large-scale, I/O-intensive scientific applications.
暂无评论