Robust critical data recovery for MPEG-4 AAC encoded bitstreams
|
|
|
- Homer Franklin
- 10 years ago
- Views:
Transcription
1 Robust critical data recovery for MPEG-4 AAC encoded bitstreams Ruijing Hu, Xucen Huang, Michel Kieffer, Olivier Derrien, Pierre Duhamel To cite this version: Ruijing Hu, Xucen Huang, Michel Kieffer, Olivier Derrien, Pierre Duhamel. Robust critical data recovery for MPEG-4 AAC encoded bitstreams. International Conference on Acoustics, Speech, and Signal Processing, Mar 2010, Dallas, Texas, United States. pp , 2010, < /ICASSP >. <hal > HAL Id: hal Submitted on 21 Dec 2010 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 ROBUST CRITICAL DATA RECOVERY FOR MPEG-4 AAC ENCODED BITSTREAMS Ruijing Hu 1, Xucen Huang 1, Michel Kieffer 1, Olivier Derrien 2, and Pierre Duhamel 1 1 L2S, CNRS SUPELEC Univ Paris-Sud, 3 rue Joliot-Curie, Gif-sur-Yvette, France 2 LMA, CNRS, Marseille, France ABSTRACT This paper presents a bandwidth-efficient method for improved decoding of critical data generated by the MPEG-4 AAC audio coder when encoded bitstreams are transmitted over noisy channels. The critical data of each encoded frame is estimated using the redundancy due to the correlation between successive frame headers and using an optional CRC as an error-correcting code. Simulation results for an AWGN channel show a substantial link budget improvement (more than 5 db) compared to a classical hard-decoding method. Once critical data are efficiently estimated, the work of previously proposed joint source-channel decoding techniques to recover the remaining parts of the MPEG4 AAC frames is significantly facilitated. Index Terms Audio coding, Cyclic codes, Decoding, MAP estimation, Mobile communication, Robustness 1. INTRODUCTION High-quality audio codecs, such as the MPEG-4 AAC [1], provide high compression efficiency. Nevertheless, since they were designed for data transmission over reliable channels, such codecs are very sensitive to transmission errors. A single bit in error in a packet of compressed data may lead to the loss of the whole packet. Such errors are unavoidable when streaming audio over wireless networks in last generation mobile communication systems, characterized by unreliable transmission channels which introduce noise at bit level and frame losses. Packetisation of data and protection of the packets with error-detection codes (CRC or checksum) [2, 3] is a first solution to alleviate this problem. Erroneous packets are identified and retransmitted, if possible. Nevertheless, in scenarii with strong delay constraints, e.g., in visiophony, retransmission is difficult and may even become impossible when broadcasting data, e.g., in digital audio broadcasting. In addition to packetization, strong error-correcting codes, e.g., turbocodes, LDPC, at Physical (PHY) layer may be combined with packet-erasure codes at intermediate protocol layers [4, 5]. The redundancy introduced by these codes reduces the bandwidth allocated for the data and may be over-sized in good This work has been partly funded by the NEWCOM++ NoE. channel conditions. In bad conditions, some corrupted packets may still not be recovered and are assumed lost. Errorconcealment techniques [6, 7] can then be used by the source decoders at Application (APL) layer. They exploit the redundancy (temporal and/or spatial) found in the multimedia data for estimating the missing information. Joint source/channel decoding (JSCD) techniques have been proposed to recover corrupted packets [8]. JSCD takes advantage of various sources of redundancy present in the coding and transmission chain. Residual redundancy may come from to the syntax of variable-length source codes [9, 10, 11, 12, 13], from the semantic of the source coders [14, 15, 16, 17], from the packetization of compressed data [18], and from the protocol stack itself [19], see [8] for more details. Altogether, the various redundancies can attain an unexpected amount, and have the potential of avoiding many packet retransmissions. In [20], the JSCD of scalefactors in MPEG-AAC coded bitstream provides a significant improvement in perceptual signal quality compared to classical decoding method. Nevertheless, this result assumes that critical data (mainly packet headers) in every packet are correctly received. This assumption requires that critical data are better protected against transmission errors. This paper introduces an alternative approach to recover efficiently critical data in each MPEG4-AAC frame, which are assumed to be only protected by the optional CRC of MPEG4-AAC. A JSCD technique is again used to exploit the correlation between the headers of successive packets, in conjunction with soft information provided by the channel decoders at PHY layer and forwarded to the APL layer using a permeable protocol stack [21, 19] involving joint protocol channel decoding techniques to recover the various headers of the protocol stack. The proposed decoding technique is an adaptation of that proposed in [19], designed for the recovery of header at various levels of the protocol stack. Section 2 gives an overview of MPEG-4 AAC decoding and identifies the critical data in the MPEG4-AAC bitstreams. Section 3 introduces the JSCD of MPEG4-AAC critical data. Finally, Section 4 presents simulation results before drawing some conclusions.
3 2. CRITICAL DATA OF THE MPEG4-AAC FRAMES In this study, unreliable transmission channels which generate bit-level noise are considered. Data are segmented in transport-level frames, according to the network protocol [3]. It is assumed that, at the receiver side, reliability information at the output of the PHY layer reaches the APL layer and may be used by the source decoder [19, 22]. This assumption is reasonable because all processing is performed inside the receiver terminal. The MPEG-4 AAC standard specifies a bitstream format for encoded audio data. The bitstream is segmented in frames, of fixed length in the case of fixed bit-rate encoding, or variable length in the case of variable bit-rate (VBR) encoding. These are source level frames, and one frame does not necessarily correspond to a unique transport level frame. The simplest AAC bitstream is considered: A monophonic audio signal encoded with the Low Complexity profile. A frame is made up of a fixed header, a variable header, a data block, and a marker indicating the end of the frame. The data block comprises a global gain (Gg), an individual channel stream (ICS), a section, a scalefactor, a spectral data, and an optional, called data stream element (DSE). The most critical parts of the frame are the headers, the ICS, and the section s [23]. When these data are corrupted, decoding is almost impossible. Thus, errors on critical data are usually considered equivalent to a frame loss. The MPEG4-AAC standard provides an optional CRC covering the 192 first bits of the frame, allowing to detect a corruption of most critical data. In what follows, this CRC is used as an error-correcting code, in conjunction with the residual redundancy left by the MPEG4-AAC coder in the headers it generates and the redundancy due to the correlation between successive headers. 3. MAP ESTIMATOR FOR THE CRITICAL DATA Consider the n-th incoming MPEG-4 AAC packet. Since the 192 first bits are protected by the CRC c of l c bits of MPEG-4 AAC, only some parts of the long frames are protected. Fields protected by the CRC may have various properties, which will be used in a different way as far as the corresponding redundancy is concerned. Four types of s protected by CRC may be identified. The constant s, represented by the vector k n, are assumed to be known. The predictable s are embedded in the vector p n. In contrast with the known s, the predictable s are estimated by exploiting the correlation between successive packets, and, if available, information provided by the lower layers of the protocol stack. The provided information is represented by R n, which will be defined formally in what follows. The predictable s are assumed to be entirely determined if the preceding packets and if the header of the lower layers have been correctly decoded. The important unknown s are collected in the vector u n. These parameters are either completely unknown or limited to a configuration set Ω u (k n, p n, R n ) whose content is determined by the values of k n, p n, and R n. Finally, the vector o n contains the other s covered by the CRC. This last part contains less critical data, which may be robustly decoded using specific techniques [20]. The first three s k, p, and u are the critical data of the AAC frame, and R n gathers the critical data of the n 1-th frame R n = {k n 1, p n 1, u n 1 }. To lighten notations, when there is no ambiguity, the packet number is omitted in what follows. Assume that some soft information y = [y k, y p, y u, y o, y c ] on k, p, u, o, and c is received from the lower protocol layer. Since k and p are known or may be exactly predicted from the already received data, only u remains to be estimated. Taking into account the observations y, the knowledge of k, p, and R, as well as the CRC properties, one may obtain the maximum a posteriori estimate û MAP = arg max u Ω u P (u k, p,r, y u, y o, y c ) for u. After some derivations detailed in [22], one obtains with Ψ( ) = o û MAP = arg max u Ω u P (y u u)ψ( ). (1) P (o)p (y o o)p (y c F([k, p, u, o])), (2) and where F is the CRC encoding function. The evaluation of (2) requires summing 2 lo terms for each u Ω u. This results in many cases to an unmanageable computational complexity. A trellis decoding inspired from [24] has been proposed in [22]. This techniques allows to reduce the evaluation of (2) to O(2 lc ) operations. Splitting the CRC into several parts assumed to be independent allows to further reduce the complexity to O(2 lc/m ) operations, where M is the number of parts in which the CRC is divided. Further simplification introduces some suboptimality in the estimation algorithm.
4 Stucture Bits: Fixed Header Variable Header Bits: Bits: Data Block Synchron Id Lay Er Pf Fs Pr Ch Cp H C Fixed header Variable header Data block Frame Length Buffer Fullness Rb END 192th bit of the frame Id Tag Gg ICS Section Sf PNG Spectral estimator (1) using a trellis, as proposed in [22]. The performance of the three decoders is evaluated in terms of frame error rate (FER), evaluated only on the known, predictable, and unknown s Hard decoder non-informed Hard decoder informed Robust decoder Bits: ICS (long window) R Wsq Wsh Max Sfb Pr ICS (short window) Constant Bits: Partially unknown s R Wsq Wsh Max Sfb Groups Predictable Fully unknown 7 Other Parts not protected by CRC Frame Error Rate (FER) Fig. 1. Fields of an MPEG-4 AAC monophonic audio frame 4. APPLICATION The JSCD of critical data in a monophonic audio signal is performed using the algorithm described in Section 3. Figure 1 recalls the structure of an MPEG4-AAC encoded frame. Examples of the four types of s are provided in what follows. Synchronisation is a 12-bit known, since it contains only ones. Frame length is a predictable, since the length of the frame may be obtained from lower protocol layers. Fs, the sampling frequency is a of 4 bits, which may take any value between 0000 and 1011, it is thus a unknown with a limited set of values. Gg, the global gain is an 8-bit which may take any value, it is thus fully unknown. Finally, Section and Sf are examples of other s, which may be more efficiently decoded with other JSCD techniques than those presented here. The 5 first seconds of Tom s dinner by Suzanne Vega (first 5 seconds, sample rate 48 khz) have been encoded with an MPEG-4 AAC in a Low Complexity profile at 64 kbits/s. The 192 first bits of each frame are encoded with the CRC specified by the MPEG-4 AAC standard. To simplify simulation, each packet is BPSK modulated and transmitted over an AWGN channel, modeling the actual transmission channel and the various layers of a permeable protocol stack. Several decoders have been employed to estimate the critical data of each frame. The non-informed hard decoder is a standard hard-input decoder. The informed hard decoder takes into account the knowledge of the known and predictable s to only estimate the unknown s via a hard decision on the received bits. In other words, it makes use of the same information as used by our robust decoder. The robust decoder corresponds to an implementation of the SNR (db) Fig. 2. Frame Error Rate as a function of the SNR for three decoders Figure 2 shows the frame error rate for different values of SNR. For a FER of 10 3, compared with the hard decoders, from 4 to 5 db in SNR are gained with the proposed robust decoder, depending on whether the known and predictable s are exploited by the hard decoder. In [20], a JSCD of the Scalefactor has been proposed, assuming that the headers were correctly decoded. The JSCD starts to provide satisfying results at 11 db. One notices that at such values of the SNR, the robust decoder allows to get a vanishing FER. Assuming that headers may be correctly decoded, as done in [20] is thus reasonable. 5. CONCLUSIONS In this paper, a robust MPEG4-AAC critical data estimator has been presented. This JSCD technique takes advantage of the presence of an optional CRC and of the correlation between successive packet headers. This redundancy allows large parts of the critical data to be known in advance, and to reduce the search set for the unknown parts. Compared to a classical hard-decoding scheme, the frame error rate (measured on the critical data) is significantly reduced. A gain from 4 to 5 db is obtained in terms of SNR. If additional JSCD techniques are employed to decode other parts of the MPEG4-AAC frames, the critical data estimator allows these data to be error-free in the SNR region for which, e.g., robust scalefactor decoders work fine, see [20]. The robust decoder presented in this work and that in [20] have now to be combined in order to study the performance
5 of JSCD techniques on whole MPEG4-AAC frames. 6. REFERENCES [1] ISO/IEC, MPEG-4 information technology - very low bitrate audio-visual coding - part3: Audio), International Organization for Standardization, Tech. Rep , [2] R. E. Blahut, Theory and Practice of Error Control Codes. Reading, MA: Addison-Wesley, [3] J. F. Kurose and K. W. Ross, Computer Networking: A Top-Down Approach Featuring the Internet, 3rd ed. Boston: Addison Wesley, [4] T. Richardson and U. Urbanke, Modern Coding Theory. Cambridge University Press, [5] D. J. C. MacKay, Information Theory, Inference, and Learning Algorithms. Cambridge: Cambridge University Press, [6] W.-Y. KUNG, C.-S. KIM, and C.-C. J. KUO, Spatial and temporal error concealment techniques for video transmission over noisy channels, IEEE transactions on circuits and systems for video technology, vol. 16, pp , [7] M. C. Hong, H. Schwab, L. P. Kondi, and A. K. Katsaggelos, Error concealment algorithms for compressed video, Signal Processing: Image Communication, vol. 14, pp , [8] P. Duhamel and M. Kieffer, Joint Source-channel Decoding: A Cross-layer Perspective With Applications in Video Broadcasting. Academic Press, [9] V. Buttigieg and P. Farrell, On variable-length errorcorrecting codes, in Information Theory, Proceedings., 1994 IEEE International Symposium on, 27 June-1 July 1994, p [10] J. Hagenauer, Source-controlled channel decoding, IEEE trans. on Communications, vol. 43, no. 9, pp , [11] S. Kaiser and M. Bystrom, Soft decoding of variablelength codes, in Proc. IEEE ICC, vol. 3, New Orleans, 2000, pp [12] L. Perros-Meilhac and C. Lamy, Huffman tree based metric derivation for a low-complexity soft VLC decoding, in Proc. IEEE ICC, vol. 2, 2002, pp [13] R. Thobaben and J. Kliewer, On iterative sourcechannel decoding for variable-length encoded markov sources using a bit-level trellis, in Proc. IV IEEE Signal Processing Workshop on Signal Processing Advances in Wireless Communications (SPAWC 03), Rome, [14] T. Tillo, M. Grangetto, and G. Olmo, A flexible error resilient scheme for jpeg 2000, in Multimedia Signal Processing, 2004 IEEE 6th Workshop on, 29 Sept.-1 Oct. 2004, pp [15] H. Nguyen, P. Duhamel, J. Brouet, and D. Rouffet, Robust vlc sequence decoding exploiting additional video stream properties with reduced complexity, in Proc. IEEE International Conference on Multimedia and Expo (ICME), June 2004, pp , taipei, Taiwan. [16] C. Bergeron and C. Lamy-Bergot, Soft-input decoding of variable-length codes applied to the H.264 standard, in Proc. IEEE 6th Workshop on Multimedia Signal Processing, 29 Sept.-1 Oct. 2004, pp [17] G. Sabeva, S. Ben-Jamaa, M.. Kieffer, and P. Duhamel, Robust decoding of h.264 encoded video transmitted over wireless channels, in Proceedings of MMSP, Victoria, Canada, [18] C. Lee, M. Kieffer, and P. Duhamel, Soft decoding of VLC encoded data for robust transmission of packetized video, in Proceedings of ICASSP, 2005, pp [19] C. Marin, Y. Leprovost, M. Kieffer, and P. Duhamel, Robust header recovery based enhanced permeable protocol layer mechanism, in IEEE 9th Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 6-9 July 2008, pp [20] O. Derrien, K. Kieffer, and P. Duhamel, Joint source/channel decoding of scalefactors in mpeg-aac encoded bitstreams, in Proc. European Signal Processing Conferences (EUSIPCO), [21] H. Jenkac, T. Stockhammer, and W. Xu, Permeablelayer receiver for reliable multicast transmission in wireless systems, in Proc. IEEE Wireless Communications and Networking Conference, vol. 3, March 2005, pp [22] C. Marin, Y. Leprovost, M. Kieffer, and P. Duhamel, Robust mac-lite and soft header recovery for packetized multimedia transmission, IEEE Trans. on Communications, 2010, to appear. [23] J. Korhonen and Y. Wang, Schemes for error resilient streaming of perceptually coded audio, in Proc. International Conference on Multimedia and Expo (ICME 03), vol. 3, 6-9 July 2003, pp [24] J. K. Wolf, Efficient maximum-likelihood decoding of linear block codes using a trellis, IEEE Trans. Inform. Theory, vol. 24, no. 1, pp , 1978.
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System
ibalance-abf: a Smartphone-Based Audio-Biofeedback Balance System Céline Franco, Anthony Fleury, Pierre-Yves Guméry, Bruno Diot, Jacques Demongeot, Nicolas Vuillerme To cite this version: Céline Franco,
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
Aligning subjective tests using a low cost common set
Aligning subjective tests using a low cost common set Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky, Romuald Pépion, Patrick Le Callet To cite this version: Yohann Pitrey, Ulrich Engelke, Marcus Barkowsky,
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures
A graph based framework for the definition of tools dealing with sparse and irregular distributed data-structures Serge Chaumette, Jean-Michel Lepine, Franck Rubi To cite this version: Serge Chaumette,
A usage coverage based approach for assessing product family design
A usage coverage based approach for assessing product family design Jiliang Wang To cite this version: Jiliang Wang. A usage coverage based approach for assessing product family design. Other. Ecole Centrale
Managing Risks at Runtime in VoIP Networks and Services
Managing Risks at Runtime in VoIP Networks and Services Oussema Dabbebi, Remi Badonnel, Olivier Festor To cite this version: Oussema Dabbebi, Remi Badonnel, Olivier Festor. Managing Risks at Runtime in
QASM: a Q&A Social Media System Based on Social Semantics
QASM: a Q&A Social Media System Based on Social Semantics Zide Meng, Fabien Gandon, Catherine Faron-Zucker To cite this version: Zide Meng, Fabien Gandon, Catherine Faron-Zucker. QASM: a Q&A Social Media
Minkowski Sum of Polytopes Defined by Their Vertices
Minkowski Sum of Polytopes Defined by Their Vertices Vincent Delos, Denis Teissandier To cite this version: Vincent Delos, Denis Teissandier. Minkowski Sum of Polytopes Defined by Their Vertices. Journal
New implementions of predictive alternate analog/rf test with augmented model redundancy
New implementions of predictive alternate analog/rf test with augmented model redundancy Haithem Ayari, Florence Azais, Serge Bernard, Mariane Comte, Vincent Kerzerho, Michel Renovell To cite this version:
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski.
Discussion on the paper Hypotheses testing by convex optimization by A. Goldenschluger, A. Juditsky and A. Nemirovski. Fabienne Comte, Celine Duval, Valentine Genon-Catalot To cite this version: Fabienne
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation
Partial and Dynamic reconfiguration of FPGAs: a top down design methodology for an automatic implementation Florent Berthelot, Fabienne Nouvel, Dominique Houzet To cite this version: Florent Berthelot,
Online vehicle routing and scheduling with continuous vehicle tracking
Online vehicle routing and scheduling with continuous vehicle tracking Jean Respen, Nicolas Zufferey, Jean-Yves Potvin To cite this version: Jean Respen, Nicolas Zufferey, Jean-Yves Potvin. Online vehicle
Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet
DICTA2002: Digital Image Computing Techniques and Applications, 21--22 January 2002, Melbourne, Australia Bandwidth Adaptation for MPEG-4 Video Streaming over the Internet K. Ramkishor James. P. Mammen
Global Identity Management of Virtual Machines Based on Remote Secure Elements
Global Identity Management of Virtual Machines Based on Remote Secure Elements Hassane Aissaoui, P. Urien, Guy Pujolle To cite this version: Hassane Aissaoui, P. Urien, Guy Pujolle. Global Identity Management
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Internet Video Streaming and Cloud-based Multimedia Applications. Outline
Internet Video Streaming and Cloud-based Multimedia Applications Yifeng He, [email protected] Ling Guan, [email protected] 1 Outline Internet video streaming Overview Video coding Approaches for video
Expanding Renewable Energy by Implementing Demand Response
Expanding Renewable Energy by Implementing Demand Response Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi To cite this version: Stéphanie Bouckaert, Vincent Mazauric, Nadia Maïzi. Expanding Renewable
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?
Faut-il des cyberarchivistes, et quel doit être leur profil professionnel? Jean-Daniel Zeller To cite this version: Jean-Daniel Zeller. Faut-il des cyberarchivistes, et quel doit être leur profil professionnel?.
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy
Additional mechanisms for rewriting on-the-fly SPARQL queries proxy Arthur Vaisse-Lesteven, Bruno Grilhères To cite this version: Arthur Vaisse-Lesteven, Bruno Grilhères. Additional mechanisms for rewriting
Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia
Multiple Description Coding (MDC) and Scalable Coding (SC) for Multimedia Gürkan Gür PhD. Candidate e-mail: [email protected] Dept. Of Computer Eng. Boğaziçi University Istanbul/TR ( Currenty@UNITN)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac)
Study and Implementation of Video Compression standards (H.264/AVC, Dirac) EE 5359-Multimedia Processing- Spring 2012 Dr. K.R Rao By: Sumedha Phatak(1000731131) Objective A study, implementation and comparison
Application-Aware Protection in DWDM Optical Networks
Application-Aware Protection in DWDM Optical Networks Hamza Drid, Bernard Cousin, Nasir Ghani To cite this version: Hamza Drid, Bernard Cousin, Nasir Ghani. Application-Aware Protection in DWDM Optical
Performance of VoIP with DCCP for Satellite Links
Performance of VoIP with DCCP for Satellite Links Golam Sarwar, Roksana Boreli, Emmanuel Lochin To cite this version: Golam Sarwar, Roksana Boreli, Emmanuel Lochin. Performance of VoIP with DCCP for Satellite
Use of tabletop exercise in industrial training disaster.
Use of tabletop exercise in industrial training disaster. Alexis Descatha, Thomas Loeb, François Dolveck, Nathalie-Sybille Goddet, Valerie Poirier, Michel Baer To cite this version: Alexis Descatha, Thomas
Video Coding Basics. Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected]
Video Coding Basics Yao Wang Polytechnic University, Brooklyn, NY11201 [email protected] Outline Motivation for video coding Basic ideas in video coding Block diagram of a typical video codec Different
Study on Cloud Service Mode of Agricultural Information Institutions
Study on Cloud Service Mode of Agricultural Information Institutions Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang To cite this version: Xiaorong Yang, Nengfu Xie, Dan Wang, Lihua Jiang. Study on Cloud
How To Recognize Voice Over Ip On Pc Or Mac Or Ip On A Pc Or Ip (Ip) On A Microsoft Computer Or Ip Computer On A Mac Or Mac (Ip Or Ip) On An Ip Computer Or Mac Computer On An Mp3
Recognizing Voice Over IP: A Robust Front-End for Speech Recognition on the World Wide Web. By C.Moreno, A. Antolin and F.Diaz-de-Maria. Summary By Maheshwar Jayaraman 1 1. Introduction Voice Over IP is
ARIB STD-T64-C.S0042 v1.0 Circuit-Switched Video Conferencing Services
ARIB STD-T-C.S00 v.0 Circuit-Switched Video Conferencing Services Refer to "Industrial Property Rights (IPR)" in the preface of ARIB STD-T for Related Industrial Property Rights. Refer to "Notice" in the
Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks
Quality Optimal Policy for H.264 Scalable Video Scheduling in Broadband Multimedia Wireless Networks Vamseedhar R. Reddyvari Electrical Engineering Indian Institute of Technology Kanpur Email: [email protected]
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process
VR4D: An Immersive and Collaborative Experience to Improve the Interior Design Process Amine Chellali, Frederic Jourdan, Cédric Dumas To cite this version: Amine Chellali, Frederic Jourdan, Cédric Dumas.
For Articulation Purpose Only
E305 Digital Audio and Video (4 Modular Credits) This document addresses the content related abilities, with reference to the module. Abilities of thinking, learning, problem solving, team work, communication,
An update on acoustics designs for HVAC (Engineering)
An update on acoustics designs for HVAC (Engineering) Ken MARRIOTT To cite this version: Ken MARRIOTT. An update on acoustics designs for HVAC (Engineering). Société Française d Acoustique. Acoustics 2012,
MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music
ISO/IEC MPEG USAC Unified Speech and Audio Coding MPEG Unified Speech and Audio Coding Enabling Efficient Coding of both Speech and Music The standardization of MPEG USAC in ISO/IEC is now in its final
Towards Unified Tag Data Translation for the Internet of Things
Towards Unified Tag Data Translation for the Internet of Things Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl To cite this version: Loïc Schmidt, Nathalie Mitton, David Simplot-Ryl. Towards Unified
VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.)
VoIP Technologies Lecturer : Dr. Ala Khalifeh Lecture 4 : Voice codecs (Cont.) 1 Remember first the big picture VoIP network architecture and some terminologies Voice coders 2 Audio and voice quality measuring
Study and Implementation of Video Compression Standards (H.264/AVC and Dirac)
Project Proposal Study and Implementation of Video Compression Standards (H.264/AVC and Dirac) Sumedha Phatak-1000731131- [email protected] Objective: A study, implementation and comparison of
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS
ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS Jean-Marc Ginoux To cite this version: Jean-Marc Ginoux. ANIMATED PHASE PORTRAITS OF NONLINEAR AND CHAOTIC DYNAMICAL SYSTEMS. A.H. Siddiqi,
Distributed network topology reconstruction in presence of anonymous nodes
Distributed network topology reconstruction in presence of anonymous nodes Thi-Minh Dung Tran, Alain Y Kibangou To cite this version: Thi-Minh Dung Tran, Alain Y Kibangou Distributed network topology reconstruction
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Video Transmission over Wireless LAN. Hang Liu [email protected]
Video Transmission over Wireless LAN Hang Liu [email protected] Page 1 Introduction! Introduction! Wi-Fi Multimedia and IEEE 802.11e for QoS Enhancement! Error Control Techniques Page 2 Introduction!
An Analysis of Error Handling Techniques in Voice over IP
An Analysis of Error Handling Techniques in Voice over IP Martin John Lipka ABSTRACT The use of Voice over IP (VoIP) has been growing in popularity, but unlike its wired circuit-switched telephone network
Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network
Recent Advances in Electrical Engineering and Electronic Devices Log-Likelihood Ratio-based Relay Selection Algorithm in Wireless Network Ahmed El-Mahdy and Ahmed Walid Faculty of Information Engineering
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
How To Test Video Quality With Real Time Monitor
White Paper Real Time Monitoring Explained Video Clarity, Inc. 1566 La Pradera Dr Campbell, CA 95008 www.videoclarity.com 408-379-6952 Version 1.0 A Video Clarity White Paper page 1 of 7 Real Time Monitor
Mike Perkins, Ph.D. [email protected]
Mike Perkins, Ph.D. [email protected] Summary More than 28 years of experience in research, algorithm development, system design, engineering management, executive management, and Board of Directors
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
MOST error-correcting codes are designed for the equal
IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 387 Transactions Letters Unequal Error Protection Using Partially Regular LDPC Codes Nazanin Rahnavard, Member, IEEE, Hossein Pishro-Nik,
A New Digital Communications Course Enhanced by PC-Based Design Projects*
Int. J. Engng Ed. Vol. 16, No. 6, pp. 553±559, 2000 0949-149X/91 $3.00+0.00 Printed in Great Britain. # 2000 TEMPUS Publications. A New Digital Communications Course Enhanced by PC-Based Design Projects*
Performance of Multicast MISO-OFDM Systems
Performance of Multicast MISO-OFDM Systems Didier Le Ruyet Electronics and Communications Lab CNAM, 292 rue Saint Martin 75141, Paris, France Email: leruyet@cnamfr Berna Özbek Electrical and Electronics
Digital Audio and Video Data
Multimedia Networking Reading: Sections 3.1.2, 3.3, 4.5, and 6.5 CS-375: Computer Networks Dr. Thomas C. Bressoud 1 Digital Audio and Video Data 2 Challenges for Media Streaming Large volume of data Each
Chapter 3 ATM and Multimedia Traffic
In the middle of the 1980, the telecommunications world started the design of a network technology that could act as a great unifier to support all digital services, including low-speed telephony and very
Cracks detection by a moving photothermal probe
Cracks detection by a moving photothermal probe J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, M. Pigeon, J. Sellier To cite this version: J. Bodnar, M. Egée, C. Menu, R. Besnard, A. Le Blanc, et
Real-Time DMB Video Encryption in Recording on PMP
Real-Time DMB Video Encryption in Recording on PMP Seong-Yeon Lee and Jong-Nam Kim Dept. of Electronic Computer Telecommunication Engineering, PuKyong Nat'l Univ. [email protected], [email protected]
Audio Coding Algorithm for One-Segment Broadcasting
Audio Coding Algorithm for One-Segment Broadcasting V Masanao Suzuki V Yasuji Ota V Takashi Itoh (Manuscript received November 29, 2007) With the recent progress in coding technologies, a more efficient
Applicability of UDP-Lite for Voice over IP in UMTS Networks
Applicability of -Lite for Voice over IP in UMTS Networks Frank Mertz, Ulrich Engelke, Peter Vary RWTH Aachen University, Institute of Communication Systems and Data Processing (IND) D-5256 Aachen, Germany
Running an HCI Experiment in Multiple Parallel Universes
Running an HCI Experiment in Multiple Parallel Universes,, To cite this version:,,. Running an HCI Experiment in Multiple Parallel Universes. CHI 14 Extended Abstracts on Human Factors in Computing Systems.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey.
Overview of model-building strategies in population PK/PD analyses: 2002-2004 literature survey. Céline Dartois, Karl Brendel, Emmanuelle Comets, Céline Laffont, Christian Laveille, Brigitte Tranchand,
Parametric Comparison of H.264 with Existing Video Standards
Parametric Comparison of H.264 with Existing Video Standards Sumit Bhardwaj Department of Electronics and Communication Engineering Amity School of Engineering, Noida, Uttar Pradesh,INDIA Jyoti Bhardwaj
AUDIO CODING: BASICS AND STATE OF THE ART
AUDIO CODING: BASICS AND STATE OF THE ART PACS REFERENCE: 43.75.CD Brandenburg, Karlheinz Fraunhofer Institut Integrierte Schaltungen, Arbeitsgruppe Elektronische Medientechnolgie Am Helmholtzring 1 98603
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY
MULTI-STREAM VOICE OVER IP USING PACKET PATH DIVERSITY Yi J. Liang, Eckehard G. Steinbach, and Bernd Girod Information Systems Laboratory, Department of Electrical Engineering Stanford University, Stanford,
Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5. Victoria Kostina
Victoria Kostina Curriculum Vitae - September 6, 2015 Page 1 of 5 Victoria Kostina Department of Electrical Engineering www.caltech.edu/~vkostina California Institute of Technology, CA 91125 [email protected]
DEM modeling of penetration test in static and dynamic conditions
DEM modeling of penetration test in static and dynamic conditions Quoc Anh Tran, Bastien Chevalier, Pierre Breul To cite this version: Quoc Anh Tran, Bastien Chevalier, Pierre Breul. DEM modeling of penetration
Multimedia Data Transmission over Wired/Wireless Networks
Multimedia Data Transmission over Wired/Wireless Networks Bharat Bhargava Gang Ding, Xiaoxin Wu, Mohamed Hefeeda, Halima Ghafoor Purdue University Website: http://www.cs.purdue.edu/homes/bb E-mail: [email protected]
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON
ANALYSIS OF SNOEK-KOSTER (H) RELAXATION IN IRON J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni To cite this version: J. San Juan, G. Fantozzi, M. No, C. Esnouf, F. Vanoni. ANALYSIS OF SNOEK-KOSTER
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD
IMPROVING QUALITY OF VIDEOS IN VIDEO STREAMING USING FRAMEWORK IN THE CLOUD R.Dhanya 1, Mr. G.R.Anantha Raman 2 1. Department of Computer Science and Engineering, Adhiyamaan college of Engineering(Hosur).
SELECTIVELY ABSORBING COATINGS
SELECTIVELY ABSORBING COATINGS J. Vuletin, P. Kuli ik, M. Bosanac To cite this version: J. Vuletin, P. Kuli ik, M. Bosanac. SELECTIVELY ABSORBING COATINGS. Journal de Physique Colloques, 1981, 42 (C1),
Broadband Networks. Prof. Dr. Abhay Karandikar. Electrical Engineering Department. Indian Institute of Technology, Bombay. Lecture - 29.
Broadband Networks Prof. Dr. Abhay Karandikar Electrical Engineering Department Indian Institute of Technology, Bombay Lecture - 29 Voice over IP So, today we will discuss about voice over IP and internet
Video compression: Performance of available codec software
Video compression: Performance of available codec software Introduction. Digital Video A digital video is a collection of images presented sequentially to produce the effect of continuous motion. It takes
GDS Resource Record: Generalization of the Delegation Signer Model
GDS Resource Record: Generalization of the Delegation Signer Model Gilles Guette, Bernard Cousin, David Fort To cite this version: Gilles Guette, Bernard Cousin, David Fort. GDS Resource Record: Generalization
Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding
Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Proposal for the configuration of multi-domain network monitoring architecture
Proposal for the configuration of multi-domain network monitoring architecture Aymen Belghith, Bernard Cousin, Samer Lahoud, Siwar Ben Adj Said To cite this version: Aymen Belghith, Bernard Cousin, Samer
Performance Analysis of Interleaving Scheme in Wideband VoIP System under Different Strategic Conditions
Performance Analysis of Scheme in Wideband VoIP System under Different Strategic Conditions Harjit Pal Singh 1, Sarabjeet Singh 1 and Jasvir Singh 2 1 Dept. of Physics, Dr. B.R. Ambedkar National Institute
Improved Method for Parallel AES-GCM Cores Using FPGAs
Improved Method for Parallel -GCM Cores Using FPGAs Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez To cite this version: Karim Moussa Ali Abdellatif, Roselyne Chotin-Avot, abib Mehrez.
(51) Int Cl.: H04N 7/24 (2011.01)
(19) TEPZZ_79 49 B_T (11) EP 1 792 492 B1 (12) EUROPEAN PATENT SPECIFICATION (4) Date of publication and mention of the grant of the patent: 04.12.13 Bulletin 13/49 (21) Application number: 08021. (22)
Cobi: Communitysourcing Large-Scale Conference Scheduling
Cobi: Communitysourcing Large-Scale Conference Scheduling Haoqi Zhang, Paul André, Lydia Chilton, Juho Kim, Steven Dow, Robert Miller, Wendy E. Mackay, Michel Beaudouin-Lafon To cite this version: Haoqi
Centralized and distributed architectures of scalable video conferencing services
Centralized and distributed architectures of scalable video conferencing services Tien Anh Le, Hang Nguyen To cite this version: Tien Anh Le, Hang Nguyen. Centralized and distributed architectures of scalable
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages
Part I: The problem specifications NTNU The Norwegian University of Science and Technology Department of Telematics Note! The problem set consists of two parts: Part I: The problem specifications pages
Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy
Performance Evaluation Of Multiband CSMA/CA With RTS/CTS For M2M Communication With Finite Retransmission Strategy Baher Mawlawi, Jean-Baptiste Doré, Nikolai Lebedev, Jean-Marie Gorce To cite this version:
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers
Performance Evaluation of Encryption Algorithms Key Length Size on Web Browsers Syed Zulkarnain Syed Idrus, Syed Alwee Aljunid, Salina Mohd Asi, Suhizaz Sudin To cite this version: Syed Zulkarnain Syed
APPLICATION BULLETIN AAC Transport Formats
F RA U N H O F E R I N S T I T U T E F O R I N T E G R A T E D C I R C U I T S I I S APPLICATION BULLETIN AAC Transport Formats INITIAL RELEASE V. 1.0 2 18 1 AAC Transport Protocols and File Formats As
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
Traffic Prioritization of H.264/SVC Video over 802.11e Ad Hoc Wireless Networks
Traffic Prioritization of H.264/SVC Video over 802.11e Ad Hoc Wireless Networks Attilio Fiandrotti, Dario Gallucci, Enrico Masala and Enrico Magli 1 Dipartimento di Automatica e Informatica / 1 Dipartimento
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
