Computation of Forward and Inverse MDCT Using Clenshaw s Recurrence Formula

Size: px
Start display at page:

Download "Computation of Forward and Inverse MDCT Using Clenshaw s Recurrence Formula"

Transcription

1 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 5, MAY Computation of Forward Inverse MDCT Using Clenshaw s Recurrence Formula Vladimir Nikolajevic, Student Member, IEEE, Gerhard Fettweis, Senior Member, IEEE Abstract The forward inverse modified discrete cosine transform (MDCT) are two of the most computational intensive operations in the MPEG audio coding stard. In this paper, we used Clenshaw s recurrence formula to transform kernels of the MDCT IMDCT of the general length. Efficient implementations of MDCT IMDCT are obtained. The proposed regular structures are particularly suitable for parallel VLSI realization. Our solution requires less hardware, we achieved significant savings for a number of operations compared with existing related systems. Index Terms Audio coding, modified discrete cosine transform (MDCT), MPEG. I. INTRODUCTION THE MPEG audio coding stard employs the dynamically windowed modified discrete cosine transform (MDCT) to achieve a high-quality performance. Direct computation of the MDCT in MPEG coding of the inverse MDCT (IMDCT) in MPEG decoding are computationally intensive tasks. Therefore, efficient algorithms for the MDCT IMDCT are of prime importance within the audio coding decoding process. Recently, Chiang Liu have proposed recursive algorithms for the forward inverse MDCT [1], which can be implemented by parallel VLSI filters. In addition, Wang et al. [2], Chau Siu [3], [4] Aburdene et al. [5] have proposed recursive algorithms for the general length discrete cosine transform (DCT). Based on the concept of the previously reported algorithms, we used Clenshaw s recurrence formula to transform kernels of the MDCT IMDCT, we propose new recursive structures for the general length MDCT IMDCT. The proposed regular structures are particularly suitable for parallel VLSI realization require less hardware number of operations than the one proposed in [1]. II. CLENSHAW S RECURRENCE FORMULA Clenshaw s recurrence formula is an elegant efficient way to evaluate a sum of coefficients times functions that obey a recurrence formula [6]. In this paper, it is used to obtain recur- sive algorithms for the forward inverse MDCT. Let us first see the formulation of Clenshaw s recurrence formula. Suppose that the desired sum is that obeys the recurrence relation for some functions. 1 Downward order: We define the quantities, by the following recurrence: Clenshaw s recurrence formula states that the sum computed by [6] 2 Upward order: We define the quantities, by the following recurrence: Clenshaw s recurrence formula states that the sum computed by III. DERIVATION OF THE MDCT ALGORITHM (1) (2) (3) can be (4) (5) can be Let,. The MDCT of is given by [1] (6) Manuscript received July 17, 2001; revised October 31, This work was supported in part by Deutsche Forschungsgemeinschaft under contract SFB 358-A6. The associate editor coordinating the review of this paper approving it for publication was Prof. Tsuhan Chan. V. Nikolajevic is with the Sony International (Europe) GmbH Advanced Technology Center, Stuttgart, Germany ( nikola@sony.de). G. Fettweis is with Mobile Communications Systems, Department of Electrical Engineering, Dresden University of Technology, Dresden, Germany ( fettweis@ifn.et.tu-dresden.de). Digital Object Identifier /TSP where is the window length, is the number of transform coefficients. To obtain the recursive transfer function of, let (7) (8) X/03$ IEEE

2 1440 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 5, MAY 2003 We define Further, we have (9) comparing with (2), we obtain (10a) (10b) Now, according to (5) for upward order, we define from (6), it follows that (11) Fig. 1. Recursive implementation of MDCT derived by using upward order Clenshaw s recurrence formula. (a) According to (13). (b) According to (14). From (11) for, wehave,we have (12) if we put this into the previous equation, after mathematical if we put this in the previous equation, we obtain Formula (13) could be rewritten as (13) (14) Therefore, we recursively generate the from the input sequence according to (11). At the th step, the th MDCT coefficient is evaluated from either (13) or (14). Fig. 1(a) (b) shows the digital implementation for the computation of the th transform element according to (13) (14), respectively. All elements of the transformation can be computed in parallel can be implemented in VLSI. These implementations require one fewer delay element than the method presented in [1]; see Table I. They require the same number of multipliers adders. To compute points of output, one needs ( ) multiplications ( ) additions per output sample, whereas the approach [1] requires ( ) multiplications 3 additions. According to (3) for downward order, we can also define from (4), it follows that (15) (16)

3 NIKOLAJEVIC AND FETTWEIS: COMPUTATION OF FORWARD AND INVERSE MDCT 1441 TABLE I COMPARISON OF PROPOSED SOLUTIONS AND [1],we have if we put this into the previous equation, we will obtain Formula (17) can be rewritten as (17) From (15) for, we have if we put this into the previous equation, after mathematical (18) Again, we recursively generate the from the input sequence, only now, it is according to (15). At the th step, the th MDCT coefficient is evaluated from either (17) or (18). Fig. 2(a) (b) shows the digital implementation for the computation of the th transform element according to (17) (18), respectively. All elements of the transformation can be computed in parallel can be implemented in VLSI. These implementations require one fewer delay element than the method presented in [1], but the input sequence is in reverse order; see Table I. They require the same number of multipliers adders. To compute points of output, one needs ( ) multiplications ( ) additions per output sample, whereas the approach [1] requires ( ) multiplications 3 additions. If we summarize the results of proposed implementations for MDCT from Table I, it can be seen that we achieved significant savings for number of operations: approximately a 50% saving for the number of multiplications a 30% saving for Fig. 2. Recursive implementation of MDCT derived by using downward order Clenshaw s recurrence formula. (a) According to (17). (b) According to (18). the number of additions. We also decreased the number of delay elements for one. The first solution with upward order is rather superior to the second one with downward order because of natural order of the input sequence. IV. DERIVATION OF THE IMDCT ALGORITHM Let,. The IMDCT of is given by [1] To obtain the recursive transfer function of let (19) (20)

4 1442 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 5, MAY 2003 Similarly as for the MDCT, we define (21) Further, we have even Formula (25) could be rewritten as (25b) comparing with (2), we obtain (22a) (22b) From (23), for, we have even. Now, according to (5) for upward order, we define if we put this into the previous equation, after mathematical from (6), it follows that (23) (26a),we have even if we put this into the previous equation, we obtain even (24) even. (26b) is recursively generated from the input sequence according to (23). At the th step, the th IMDCT coefficient is evaluated from either (25) or (26). Figs. 3 4 show the digital implementation for the computation of the th transform element according to (25) (26), respectively. All elements of the transformation can be computed in parallel can be implemented in VLSI. The implementation in Fig. 3 requires one delay element less than the method presented in [1] but one multiplier more. The number of adders is the same. To compute points of output, one needs ( ) multiplications ( ) additions per output sample, whereas the approach [1] requires multiplications additions. The implementation in Fig. 4 requires one delay element less than the method presented in [1]; see Table I. The numbers of multipliers adders are the same. To compute points of output, one needs multiplications additions per output sample. According to (3) for downward order, we can also define (25a) (27)

5 NIKOLAJEVIC AND FETTWEIS: COMPUTATION OF FORWARD AND INVERSE MDCT 1443 Fig. 3. Recursive implementation of IMDCT according to (25) derived by using upward order Clenshaw s recurrence formula. (a) M. (b) M even. Fig. 5. Recursive implementation of IMDCT derived by using downward order Clenshaw s recurrence formula. (a) According to (29). (b) According to (30)., we get if we put this into the previous equation, we will obtain Formula (29) can be rewritten as (29) From (27) for, we have if we put this into the previous equation, after mathematical (30) Fig. 4. Recursive implementation of IMDCT according to (26) derived by using upward order Clenshaw s recurrence formula. (a) M. (b) M even. from (4), it follows that (28) Again, is recursively generated from the input sequence but, now, according to (27). At the th step, the th IMDCT coefficient is evaluated from either (29) or (30). Fig. 5(a) (b) shows the digital implementation for the computation of the th transform element according to (29) (30), respectively. All elements of the transformation can be computed in parallel can be implemented in VLSI. The implementation in Fig. 5(a) requires one delay element less than the method presented in [1], we do not need to

6 1444 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 51, NO. 5, MAY 2003 be concerned with whether is even or, but the input sequence is in reverse order. The number of adders is the same, but the number of multipliers is one more. To compute points of output, one needs multiplications ( ) additions per output sample, whereas the approach [1] requires multiplications 3 additions. The implementation in Fig. 5(b) requires one delay element less than the method presented in [1], we do not need to be concerned with whether is even or, but the input sequence is in reverse order; see Table I. The numbers of multipliers adders are the same. To compute points of output, one needs ( ) multiplications ( ) additions per output sample. If we summarize the results of proposed implementations for inverse MDCT from Table I, it can be seen that we achieved approximately 30% saving for number of additions. We also decreased the number of delay elements for one. In addition, in proposed solutions for inverse MDCT with downward order, it does not need to be considered the parity of, but in some implementations, it might be necessary to have additional memory. From the other side in proposed solutions with upward order, it is not necessary to have additional memory, in most implementations, is even; therefore, only one realization for inverse MDCT is required. Again, we can say that the first solution with upward order is rather superior to the second one with downward order because of natural order of the input sequence. V. CONCLUSION In this paper, we proposed new recursive algorithms for the forward inverse MDCT of general length, which are suitable for parallel VLSI implementation. The Clenshaw s recurrence formula is used for derivation. Our solutions are compared with the method presented in [1]. The comparison is given in Table I. We proposed two solutions with upward downward order of input data for both forward inverse MDCT. Our solutions require significantly fewer number of operations (30 50%) as well as one delay element less compared with the method presented in [1]. In addition, in proposed solutions for inverse MDCT with downward order, the parity of does not need to be considered, but in some implementations, it might be necessary to have additional memory. From the other side, in proposed solutions with upward order, it is not necessary to have additional memory, in most implementations, is even; therefore, only one realization for inverse MDCT is required. REFERENCES [1] H.-C. Chiang J.-C. Liu, Regressive implementations for the forward inverse MDCT in MPEG audio coding, IEEE Signal Processing Lett., vol. 3, pp , Apr [2] Z. Wang, G. A. Jullien, W. C. Miller, Recursive algorithms for the forward inverse discrete cosine transform with arbitrary length, IEEE Signal Processing Lett., vol. 1, pp , July [3] L.-P. Chau W.-C. Siu, Recursive algorithm for the discrete cosine transform with general lengths, Electron. Lett., vol. 30, pp , Feb [4], Efficient recursive algorithm for the inverse discrete cosine transform, IEEE Signal Processing Lett., vol. 7, pp , Oct [5] M. F. Aburdene, J. Zheng, R. J. Kozick, Computation of discrete cosine transform using Clenshaw s recurrence formula, IEEE Signal Processing Lett., vol. 2, pp , Aug [6] W. H. Press, S. A. Teukolsky, W. T. Vetterling, B. P. Flannery, Numerical Recipes in C. Cambridge, U.K.: Cambridge Univ. Press, [7] V. Nikolajevic G. Fettweis, New recursive algorithms for the forward inverse MDCT, in Proc. IEEE Workshop Signal Process. Syst., Antwerp, Belgium, Sept [8] Information technology Coding of moving pictures associated audio for digital storage media at up to about 1.5 Mbit/s, Part 3: Audio,, ISO/IEC JTC1/SC29/WG11 MPEG, IS , [9] Information technology Generic coding of moving pictures associated audio, Part 3: Audio,, ISO/IEC JTC1/SC29/WG11 MPEG, IS , Vladimir Nikolajevic (S 94) received the M.Sc./ Dipl.-Ing. degree in electrical engineering from the University of Belgrade, Yugoslavia, in From 1994 to 1998, he was a research teaching assistant with the Telecommunication Department, Faculty of Electrical Engineering, University of Belgrade. From 1998 to 2001, he was a research assistant with Dresden University of Technology, Dresden, Germany. Since August 2001, he has been with Sony International (Europe), Stuttgart, Germany. Gerhard Fettweis (S 82 M 90 SM 98) received the M.Sc./Dipl.-Ing. Ph.D. degree in electrical engineering from the Aachen University of Technology (RWTH), Aachen, Germany, in , respectively. From 1990 to 1991, he was a Visiting Scientist at the IBM Almaden Research Center, San Jose, CA, working on signal processing for disk drives. From 1991 to 1994, he was a Scientist with TCSI, Berkeley, CA, where he was responsible for signal processor developments for mobile phones. Since September 1994, he has held the Mannesmann Mobilfunk Chair for Mobile Communications Systems at the Dresden University of Technology, Dresden, Germany. Since 1999 he has been the CTO of Systemonic, a startup spun out of TU Dresden, focussing on broadb wireless chip-sets. Dr. Fettweis has been an elected member of the IEEE Solid State Circuits Society s Administrative Committee since 1999 of the IEEE ComSoc Board of governors from 1998 to 2000, respectively. He has been associate editor for IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II associate editor for the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS wireless series. He has organized been on the program committees of numerous IEEE workshops conferences.

THE Walsh Hadamard transform (WHT) and discrete

THE Walsh Hadamard transform (WHT) and discrete IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I: REGULAR PAPERS, VOL. 54, NO. 12, DECEMBER 2007 2741 Fast Block Center Weighted Hadamard Transform Moon Ho Lee, Senior Member, IEEE, Xiao-Dong Zhang Abstract

More information

An Efficient RNS to Binary Converter Using the Moduli Set {2n + 1, 2n, 2n 1}

An Efficient RNS to Binary Converter Using the Moduli Set {2n + 1, 2n, 2n 1} An Efficient RNS to Binary Converter Using the oduli Set {n + 1, n, n 1} Kazeem Alagbe Gbolagade 1,, ember, IEEE and Sorin Dan Cotofana 1, Senior ember IEEE, 1. Computer Engineering Laboratory, Delft University

More information

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio

Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio Reconfigurable Low Area Complexity Filter Bank Architecture for Software Defined Radio 1 Anuradha S. Deshmukh, 2 Prof. M. N. Thakare, 3 Prof.G.D.Korde 1 M.Tech (VLSI) III rd sem Student, 2 Assistant Professor(Selection

More information

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays

Design and Analysis of Parallel AES Encryption and Decryption Algorithm for Multi Processor Arrays IOSR Journal of VLSI and Signal Processing (IOSR-JVSP) Volume 5, Issue, Ver. III (Jan - Feb. 205), PP 0- e-issn: 239 4200, p-issn No. : 239 497 www.iosrjournals.org Design and Analysis of Parallel AES

More information

Hardware Implementation of Probabilistic State Machine for Word Recognition

Hardware Implementation of Probabilistic State Machine for Word Recognition IJECT Vo l. 4, Is s u e Sp l - 5, Ju l y - Se p t 2013 ISSN : 2230-7109 (Online) ISSN : 2230-9543 (Print) Hardware Implementation of Probabilistic State Machine for Word Recognition 1 Soorya Asokan, 2

More information

FPGA area allocation for parallel C applications

FPGA area allocation for parallel C applications 1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University

More information

A Mixed-Signal System-on-Chip Audio Decoder Design for Education

A Mixed-Signal System-on-Chip Audio Decoder Design for Education A Mixed-Signal System-on-Chip Audio Decoder Design for Education R. Koenig, A. Thomas, M. Kuehnle, J. Becker, E.Crocoll, M. Siegel @itiv.uni-karlsruhe.de @ims.uni-karlsruhe.de

More information

(Refer Slide Time: 01:11-01:27)

(Refer Slide Time: 01:11-01:27) Digital Signal Processing Prof. S. C. Dutta Roy Department of Electrical Engineering Indian Institute of Technology, Delhi Lecture - 6 Digital systems (contd.); inverse systems, stability, FIR and IIR,

More information

How To Calculate The Neutral Conductor Current

How To Calculate The Neutral Conductor Current IEEE TRANSACTIONS ON INDUSTRY APPLICATIONS, VOL. 39, NO. 3, MAY/JUNE 2003 587 Analysis of the Neutral Conductor Current in a Three-Phase Supplied Network With Nonlinear Single-Phase Loads Jan J. M. Desmet,

More information

Video Coding Technologies and Standards: Now and Beyond

Video Coding Technologies and Standards: Now and Beyond Hitachi Review Vol. 55 (Mar. 2006) 11 Video Coding Technologies and Standards: Now and Beyond Tomokazu Murakami Hiroaki Ito Muneaki Yamaguchi Yuichiro Nakaya, Ph.D. OVERVIEW: Video coding technology compresses

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

ADAPTIVE ALGORITHMS FOR ACOUSTIC ECHO CANCELLATION IN SPEECH PROCESSING

ADAPTIVE ALGORITHMS FOR ACOUSTIC ECHO CANCELLATION IN SPEECH PROCESSING www.arpapress.com/volumes/vol7issue1/ijrras_7_1_05.pdf ADAPTIVE ALGORITHMS FOR ACOUSTIC ECHO CANCELLATION IN SPEECH PROCESSING 1,* Radhika Chinaboina, 1 D.S.Ramkiran, 2 Habibulla Khan, 1 M.Usha, 1 B.T.P.Madhav,

More information

Implementation of Full -Parallelism AES Encryption and Decryption

Implementation of Full -Parallelism AES Encryption and Decryption Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption

More information

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)

Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- sumedha.phatak@mavs.uta.edu Objective: A study, implementation and comparison of

More information

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: "Embedded Systems - ", Raj Kamal, Publs.: McGraw-Hill Education

Lesson 7: SYSTEM-ON. SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY. Chapter-1L07: Embedded Systems - , Raj Kamal, Publs.: McGraw-Hill Education Lesson 7: SYSTEM-ON ON-CHIP (SoC( SoC) AND USE OF VLSI CIRCUIT DESIGN TECHNOLOGY 1 VLSI chip Integration of high-level components Possess gate-level sophistication in circuits above that of the counter,

More information

Mike Perkins, Ph.D. perk@cardinalpeak.com

Mike Perkins, Ph.D. perk@cardinalpeak.com Mike Perkins, Ph.D. perk@cardinalpeak.com Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors

More information

Curriculum Vitae. Vladimír Guzma. Flat 16, Moore Court, 2 Dodd Road, WD24 5DA, Watford, United Kingdom Telephone(s) +44 (0)7581 342 766

Curriculum Vitae. Vladimír Guzma. Flat 16, Moore Court, 2 Dodd Road, WD24 5DA, Watford, United Kingdom Telephone(s) +44 (0)7581 342 766 Curriculum Vitae Personal information Surname(s) / First name(s) Address(es) Flat 16, Moore Court, 2 Dodd Road, WD24 5DA, Watford, United Kingdom Telephone(s) +44 (0)7581 342 766 Email(s) Nationality(-ies)

More information

Floating Point Fused Add-Subtract and Fused Dot-Product Units

Floating Point Fused Add-Subtract and Fused Dot-Product Units Floating Point Fused Add-Subtract and Fused Dot-Product Units S. Kishor [1], S. P. Prakash [2] PG Scholar (VLSI DESIGN), Department of ECE Bannari Amman Institute of Technology, Sathyamangalam, Tamil Nadu,

More information

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality

Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality Further Analysis Of A Framework To Analyze Network Performance Based On Information Quality A Kazmierczak Computer Information Systems Northwest Arkansas Community College One College Dr. Bentonville,

More information

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina

Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 vkostina@caltech.edu

More information

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music

MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final

More information

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions

JPEG compression of monochrome 2D-barcode images using DCT coefficient distributions Edith Cowan University Research Online ECU Publications Pre. JPEG compression of monochrome D-barcode images using DCT coefficient distributions Keng Teong Tan Hong Kong Baptist University Douglas Chai

More information

Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927

Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Zukang Shen Home Address: Work: 214-480-3198 707 Kindred Lane Cell: 512-619-7927 Richardson, TX 75080 Email: zukang.shen@ti.com Education: The University of Texas, Austin, TX, USA Jun. 2003 May 2006 Ph.D.,

More information

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal

More information

Combating Anti-forensics of Jpeg Compression

Combating Anti-forensics of Jpeg Compression IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, November 212 ISSN (Online): 1694-814 www.ijcsi.org 454 Combating Anti-forensics of Jpeg Compression Zhenxing Qian 1, Xinpeng

More information

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS

IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS IMPROVED NETWORK PARAMETER ERROR IDENTIFICATION USING MULTIPLE MEASUREMENT SCANS Liuxi Zhang and Ali Abur Department of Electrical and Computer Engineering Northeastern University Boston, MA, USA lzhang@ece.neu.edu

More information

A Control Scheme for Industrial Robots Using Artificial Neural Networks

A Control Scheme for Industrial Robots Using Artificial Neural Networks A Control Scheme for Industrial Robots Using Artificial Neural Networks M. Dinary, Abou-Hashema M. El-Sayed, Abdel Badie Sharkawy, and G. Abouelmagd unknown dynamical plant is investigated. A layered neural

More information

A Complexity Measure Based on Cognitive Weights

A Complexity Measure Based on Cognitive Weights International Journal of Theoretical and Applied Computer Sciences Volume 1 Number 1 (2006) pp. 1 10 (c) GBS Publishers and Distributors (India) http://www.gbspublisher.com/ijtacs.htm A Complexity Measure

More information

JPEG Image Compression by Using DCT

JPEG Image Compression by Using DCT International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-4 E-ISSN: 2347-2693 JPEG Image Compression by Using DCT Sarika P. Bagal 1* and Vishal B. Raskar 2 1*

More information

Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation

Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation Wireless 100Gb/s and Beyond: A Special Focus Program of the German Scientific Foundation Rolf Kraemer Technical University Cottbus IHP Im Technologiepark 25 15236 Frankfurt (Oder) Germany IHP Im Technologiepark

More information

FFT Algorithms. Chapter 6. Contents 6.1

FFT Algorithms. Chapter 6. Contents 6.1 Chapter 6 FFT Algorithms Contents Efficient computation of the DFT............................................ 6.2 Applications of FFT................................................... 6.6 Computing DFT

More information

Real-Time DMB Video Encryption in Recording on PMP

Real-Time DMB Video Encryption in Recording on PMP Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. sylee9997@pknu.ac.kr, jongnam@pknu.ac.kr

More information

DCT-JPEG Image Coding Based on GPU

DCT-JPEG Image Coding Based on GPU , pp. 293-302 http://dx.doi.org/10.14257/ijhit.2015.8.5.32 DCT-JPEG Image Coding Based on GPU Rongyang Shan 1, Chengyou Wang 1*, Wei Huang 2 and Xiao Zhou 1 1 School of Mechanical, Electrical and Information

More information

Evaluating The Performance of Symmetric Encryption Algorithms

Evaluating The Performance of Symmetric Encryption Algorithms International Journal of Network Security, Vol.10, No.3, PP.213 219, May 2010 213 Evaluating The Performance of Symmetric Encryption Algorithms Diaa Salama Abd Elminaam 1, Hatem Mohamed Abdual Kader 2,

More information

Image Compression through DCT and Huffman Coding Technique

Image Compression through DCT and Huffman Coding Technique International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul

More information

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique

Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique Invisible Image Water Marking Using Hybrid DWT Compression/Decompression Technique B.Sai Kiran M.Tech (VLSI), CMR Institute of Technology. Mr.Shahbaz Khan Associate Professor, CMR Institute of Technology.

More information

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers

Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Automatic Detection of Emergency Vehicles for Hearing Impaired Drivers Sung-won ark and Jose Trevino Texas A&M University-Kingsville, EE/CS Department, MSC 92, Kingsville, TX 78363 TEL (36) 593-2638, FAX

More information

Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition

Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition Design of a High-speed and large-capacity NAND Flash storage system based on Fiber Acquisition Qing Li, Shanqing Hu * School of Information and Electronic Beijing Institute of Technology Beijing, China

More information

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY

MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,

More information

Reasons for need for Computer Engineering program From Computer Engineering Program proposal

Reasons for need for Computer Engineering program From Computer Engineering Program proposal Reasons for need for Computer Engineering program From Computer Engineering Program proposal Department of Computer Science School of Electrical Engineering & Computer Science circa 1988 Dedicated to David

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

Formulations of Model Predictive Control. Dipartimento di Elettronica e Informazione

Formulations of Model Predictive Control. Dipartimento di Elettronica e Informazione Formulations of Model Predictive Control Riccardo Scattolini Riccardo Scattolini Dipartimento di Elettronica e Informazione Impulse and step response models 2 At the beginning of the 80, the early formulations

More information

Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany.

Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany. Karlheinz Brandenburg was born on June 20th 1954 in Erlangen, Germany. He received engineering degrees from Erlangen University in Electrical Engineering (1980) and in Mathematics (1982). In 1989 he obtained

More information

Analysis of Load Frequency Control Performance Assessment Criteria

Analysis of Load Frequency Control Performance Assessment Criteria 520 IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 16, NO. 3, AUGUST 2001 Analysis of Load Frequency Control Performance Assessment Criteria George Gross, Fellow, IEEE and Jeong Woo Lee Abstract This paper presents

More information

Solutions for Increasing the Number of PC Parallel Port Control and Selecting Lines

Solutions for Increasing the Number of PC Parallel Port Control and Selecting Lines Solutions for Increasing the Number of PC Parallel Port Control and Selecting Lines Mircea Popa Abstract: The paper approaches the problem of control and selecting possibilities offered by the PC parallel

More information

Study and Implementation of Video Compression standards (H.264/AVC, Dirac)

Study and Implementation of Video Compression standards (H.264/AVC, Dirac) Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison

More information

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation

A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation A Novel Method to Improve Resolution of Satellite Images Using DWT and Interpolation S.VENKATA RAMANA ¹, S. NARAYANA REDDY ² M.Tech student, Department of ECE, SVU college of Engineering, Tirupati, 517502,

More information

Multi-factor Authentication in Banking Sector

Multi-factor Authentication in Banking Sector Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering

More information

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE

INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE INVESTIGATION OF RENDERING AND STREAMING VIDEO CONTENT OVER CLOUD USING VIDEO EMULATOR FOR ENHANCED USER EXPERIENCE Ankur Saraf * Computer Science Engineering, MIST College, Indore, MP, India ankursaraf007@gmail.com

More information

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM

FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM FRANCESCO BELLOCCHIO S CURRICULUM VITAE ET STUDIORUM April 2011 Index Personal details and education 1 Research activities 2 Teaching and tutorial activities 3 Conference organization and review activities

More information

MOST error-correcting codes are designed for the equal

MOST error-correcting codes are designed for the equal IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,

More information

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm

Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA nandakishore@qualcomm.com K.

More information

MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN. zl2211@columbia.edu. ml3088@columbia.edu

MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN. zl2211@columbia.edu. ml3088@columbia.edu MP3 Player CSEE 4840 SPRING 2010 PROJECT DESIGN Zheng Lai Zhao Liu Meng Li Quan Yuan zl2215@columbia.edu zl2211@columbia.edu ml3088@columbia.edu qy2123@columbia.edu I. Overview Architecture The purpose

More information

Student Project Allocation Using Integer Programming

Student Project Allocation Using Integer Programming IEEE TRANSACTIONS ON EDUCATION, VOL. 46, NO. 3, AUGUST 2003 359 Student Project Allocation Using Integer Programming A. A. Anwar and A. S. Bahaj, Member, IEEE Abstract The allocation of projects to students

More information

3 Software Defined Radio Technologies

3 Software Defined Radio Technologies 3 Software Defined Radio Technologies 3-1 Software Defined Radio for Next Generation Seamless Mobile Communication Systems In this paper, the configuration of the newly developed small-size software defined

More information

Implementation of Digital Signal Processing: Some Background on GFSK Modulation

Implementation of Digital Signal Processing: Some Background on GFSK Modulation Implementation of Digital Signal Processing: Some Background on GFSK Modulation Sabih H. Gerez University of Twente, Department of Electrical Engineering s.h.gerez@utwente.nl Version 4 (February 7, 2013)

More information

A Mathematical Model for Evaluating the Perceptual Quality of Video

A Mathematical Model for Evaluating the Perceptual Quality of Video A Mathematical Model for Evaluating the Perceptual Quality of Video Jose Joskowicz, José-Carlos López-Ardao, Miguel A. González Ortega, and Cándido López García ETSE Telecomunicación, Campus Universitario,

More information

Reliable Systolic Computing through Redundancy

Reliable Systolic Computing through Redundancy Reliable Systolic Computing through Redundancy Kunio Okuda 1, Siang Wun Song 1, and Marcos Tatsuo Yamamoto 1 Universidade de São Paulo, Brazil, {kunio,song,mty}@ime.usp.br, http://www.ime.usp.br/ song/

More information

SECTION 10-2 Mathematical Induction

SECTION 10-2 Mathematical Induction 73 0 Sequences and Series 6. Approximate e 0. using the first five terms of the series. Compare this approximation with your calculator evaluation of e 0.. 6. Approximate e 0.5 using the first five terms

More information

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. CURRICULUM VITAE Taha Abdelshafy Abdelhakim Khalaf Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt. Contact Addresses: 116 Electrical Engineering Dept. Faculty of Engineering

More information

Performance Analysis of medical Image Using Fractal Image Compression

Performance Analysis of medical Image Using Fractal Image Compression Performance Analysis of medical Image Using Fractal Image Compression Akhil Singal 1, Rajni 2 1 M.Tech Scholar, ECE, D.C.R.U.S.T, Murthal, Sonepat, Haryana, India 2 Assistant Professor, ECE, D.C.R.U.S.T,

More information

A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder.

A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER. Figure 1. Basic structure of an encoder. A HIGH PERFORMANCE SOFTWARE IMPLEMENTATION OF MPEG AUDIO ENCODER Manoj Kumar 1 Mohammad Zubair 1 1 IBM T.J. Watson Research Center, Yorktown Hgts, NY, USA ABSTRACT The MPEG/Audio is a standard for both

More information

Numerical Research on Distributed Genetic Algorithm with Redundant

Numerical Research on Distributed Genetic Algorithm with Redundant Numerical Research on Distributed Genetic Algorithm with Redundant Binary Number 1 Sayori Seto, 2 Akinori Kanasugi 1,2 Graduate School of Engineering, Tokyo Denki University, Japan 10kme41@ms.dendai.ac.jp,

More information

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT

An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT An Efficient Architecture for Image Compression and Lightweight Encryption using Parameterized DWT Babu M., Mukuntharaj C., Saranya S. Abstract Discrete Wavelet Transform (DWT) based architecture serves

More information

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder

Performance Analysis and Comparison of JM 15.1 and Intel IPP H.264 Encoder and Decoder Performance Analysis and Comparison of 15.1 and H.264 Encoder and Decoder K.V.Suchethan Swaroop and K.R.Rao, IEEE Fellow Department of Electrical Engineering, University of Texas at Arlington Arlington,

More information

A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology

A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Issue-1 E-ISSN: 2347-2693 A Novel Low Power Fault Tolerant Full Adder for Deep Submicron Technology Zahra

More information

Understanding CIC Compensation Filters

Understanding CIC Compensation Filters Understanding CIC Compensation Filters April 2007, ver. 1.0 Application Note 455 Introduction f The cascaded integrator-comb (CIC) filter is a class of hardware-efficient linear phase finite impulse response

More information

A New Programmable RF System for System-on-Chip Applications

A New Programmable RF System for System-on-Chip Applications Vol. 6, o., April, 011 A ew Programmable RF System for System-on-Chip Applications Jee-Youl Ryu 1, Sung-Woo Kim 1, Jung-Hun Lee 1, Seung-Hun Park 1, and Deock-Ho Ha 1 1 Dept. of Information and Communications

More information

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network

The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network , pp.67-76 http://dx.doi.org/10.14257/ijdta.2016.9.1.06 The Combination Forecasting Model of Auto Sales Based on Seasonal Index and RBF Neural Network Lihua Yang and Baolin Li* School of Economics and

More information

Symbolic Determinants: Calculating the Degree

Symbolic Determinants: Calculating the Degree Symbolic Determinants: Calculating the Degree Technical Report by Brent M. Dingle Texas A&M University Original: May 4 Updated: July 5 Abstract: There are many methods for calculating the determinant of

More information

Error Detection and Data Recovery Architecture for Systolic Motion Estimators

Error Detection and Data Recovery Architecture for Systolic Motion Estimators Error Detection and Data Recovery Architecture for Systolic Motion Estimators L. Arun Kumar #1, L. Sheela *2 # PG Scholar, * Assistant Professor, Embedded System Technologies, Regional Center of Anna University

More information

The Bucharest Academy of Economic Studies, Romania E-mail: ppaul@ase.ro E-mail: catalin.boja@ie.ase.ro

The Bucharest Academy of Economic Studies, Romania E-mail: ppaul@ase.ro E-mail: catalin.boja@ie.ase.ro Paul Pocatilu 1 and Ctlin Boja 2 1) 2) The Bucharest Academy of Economic Studies, Romania E-mail: ppaul@ase.ro E-mail: catalin.boja@ie.ase.ro Abstract The educational process is a complex service which

More information

Greatest Common Factors and Least Common Multiples with Venn Diagrams

Greatest Common Factors and Least Common Multiples with Venn Diagrams Greatest Common Factors and Least Common Multiples with Venn Diagrams Stephanie Kolitsch and Louis Kolitsch The University of Tennessee at Martin Martin, TN 38238 Abstract: In this article the authors

More information

Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network

Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network Forecasting of Economic Quantities using Fuzzy Autoregressive Model and Fuzzy Neural Network Dušan Marček 1 Abstract Most models for the time series of stock prices have centered on autoregressive (AR)

More information

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number

A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number A Parallel Processor for Distributed Genetic Algorithm with Redundant Binary Number 1 Tomohiro KAMIMURA, 2 Akinori KANASUGI 1 Department of Electronics, Tokyo Denki University, 07ee055@ms.dendai.ac.jp

More information

A comprehensive survey on various ETC techniques for secure Data transmission

A comprehensive survey on various ETC techniques for secure Data transmission A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and

More information

Semantic Concept Based Retrieval of Software Bug Report with Feedback

Semantic Concept Based Retrieval of Software Bug Report with Feedback Semantic Concept Based Retrieval of Software Bug Report with Feedback Tao Zhang, Byungjeong Lee, Hanjoon Kim, Jaeho Lee, Sooyong Kang, and Ilhoon Shin Abstract Mining software bugs provides a way to develop

More information

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services

Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Achieve Better Ranking Accuracy Using CloudRank Framework for Cloud Services Ms. M. Subha #1, Mr. K. Saravanan *2 # Student, * Assistant Professor Department of Computer Science and Engineering Regional

More information

Architectures and Platforms

Architectures and Platforms Hardware/Software Codesign Arch&Platf. - 1 Architectures and Platforms 1. Architecture Selection: The Basic Trade-Offs 2. General Purpose vs. Application-Specific Processors 3. Processor Specialisation

More information

Department of Electrical and Computer Engineering

Department of Electrical and Computer Engineering Department of Electrical and Computer Engineering ADMINISTRATIVE OFFICER John O. Attia, Department Head FACULTY Cajetan Akujuobi, Electrical and Computer Engineering Annamalai, Annamalai, Electrical and

More information

FAST MIR IN A SPARSE TRANSFORM DOMAIN

FAST MIR IN A SPARSE TRANSFORM DOMAIN ISMIR 28 Session 4c Automatic Music Analysis and Transcription FAST MIR IN A SPARSE TRANSFORM DOMAIN Emmanuel Ravelli Université Paris 6 ravelli@lam.jussieu.fr Gaël Richard TELECOM ParisTech gael.richard@enst.fr

More information

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network

Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering

More information

Synchronization of sampling in distributed signal processing systems

Synchronization of sampling in distributed signal processing systems Synchronization of sampling in distributed signal processing systems Károly Molnár, László Sujbert, Gábor Péceli Department of Measurement and Information Systems, Budapest University of Technology and

More information

Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones

Final Year Project Progress Report. Frequency-Domain Adaptive Filtering. Myles Friel. Supervisor: Dr.Edward Jones Final Year Project Progress Report Frequency-Domain Adaptive Filtering Myles Friel 01510401 Supervisor: Dr.Edward Jones Abstract The Final Year Project is an important part of the final year of the Electronic

More information

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data

Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Parallel Data Selection Based on Neurodynamic Optimization in the Era of Big Data Jun Wang Department of Mechanical and Automation Engineering The Chinese University of Hong Kong Shatin, New Territories,

More information

JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY 2010 126. Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M.

JOURNAL OF TELECOMMUNICATIONS, VOLUME 2, ISSUE 2, MAY 2010 126. Simulink based VoIP Analysis. Hardeep Singh Dalhio, Jasvir Singh, M. 126 Simulink based VoIP Analysis Hardeep Singh Dalhio, Jasvir Singh, M. Mian Abstract Voice communication over internet not be possible without a reliable data network, this was first available when distributed

More information

Load Balancing and Switch Scheduling

Load Balancing and Switch Scheduling EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load

More information

Barcode Based Automated Parking Management System

Barcode Based Automated Parking Management System IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin

More information

An Object Oriented Role-based Access Control Model for Secure Domain Environments

An Object Oriented Role-based Access Control Model for Secure Domain Environments International Journal of Network Security, Vol.4, No.1, PP.10 16, Jan. 2007 10 An Object Oriented -based Access Control Model for Secure Domain Environments Cungang Yang Department of Electrical and Computer

More information

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel

B.Sc. degree in Computer Science, with honors, 1986 Technion, Israel Institute of Technology (IIT), Haifa, Israel Education: D.Sc. degree in Computer Science,1994 Research subject: Protocols for Spatial and Slot Reuse in Bus Networks Research: Distributed algorithms, MAC protocols for wired and wireless networks.

More information

The continuous and discrete Fourier transforms

The continuous and discrete Fourier transforms FYSA21 Mathematical Tools in Science The continuous and discrete Fourier transforms Lennart Lindegren Lund Observatory (Department of Astronomy, Lund University) 1 The continuous Fourier transform 1.1

More information

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey

Turgut Ozal University. Computer Engineering Department. TR-06010 Ankara, Turkey Dr. YILDIRAY YALMAN Associate Professor CONTACT INFORMATION Turgut Ozal University Computer Engineering Department TR-06010 Ankara, Turkey Phone: +90 (0)312-5515437 E-mail: yyalman@turgutozal.edu.tr RESEARCH

More information

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1

Recursive Algorithms. Recursion. Motivating Example Factorial Recall the factorial function. { 1 if n = 1 n! = n (n 1)! if n > 1 Recursion Slides by Christopher M Bourke Instructor: Berthe Y Choueiry Fall 007 Computer Science & Engineering 35 Introduction to Discrete Mathematics Sections 71-7 of Rosen cse35@cseunledu Recursive Algorithms

More information

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks

Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks www.ijcsi.org 400 Network Selection Using TOPSIS in Vertical Handover Decision Schemes for Heterogeneous Wireless Networks K.Savitha 1, DR.C.Chandrasekar 2 1 Research Scholar, Periyar University Salem,

More information

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094

Rate control algorithms for video coding. Citation. Issued Date 2000. http://hdl.handle.net/10722/31094 Title Rate control algorithms for video coding Author(s) Ng, Cheuk-yan; 吳 卓 恩 Citation Issued Date 2000 URL http://hdl.handle.net/10722/31094 Rights The author retains all proprietary rights, (such as

More information

Fundamental to determining

Fundamental to determining GNSS Solutions: Carrierto-Noise Algorithms GNSS Solutions is a regular column featuring questions and answers about technical aspects of GNSS. Readers are invited to send their questions to the columnist,

More information

SECRET sharing schemes were introduced by Blakley [5]

SECRET sharing schemes were introduced by Blakley [5] 206 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 1, JANUARY 2006 Secret Sharing Schemes From Three Classes of Linear Codes Jin Yuan Cunsheng Ding, Senior Member, IEEE Abstract Secret sharing has

More information

Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath

Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath Efficient Algorithm for Predicting QOS in Cloud Services Sangeeta R. Alagi, Srinu Dharavath Abstract Now a days, Cloud computing is becoming more popular research topic. Building high-quality cloud applications

More information