Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 3 )

2018 ( 8 )

2017 ( 6 )

2016 ( 13 )

Custom range...

Search Results: 1 - 10 of 453 matches for " Encoding "
All listed articles are free for downloading (OA Articles)
Page 1 /453
Display every page Item
Tanureet Kaur
International Journal of Computer and Distributed System , 2012,
Abstract: With the advent in technology, there exist many compression schemes, each being unique in itself. However, the decision to use one in a particular situation is dictated largely by the type of data being compressed. The greater the compression ratios the more dependent the method tends to be. Several lossless techniques have been proposed so far for Image Compression. Here we study a lossless image compression using two techniques i.e. Delta encoding and Run length. Delta encoding is a simple compression scheme for audio, EEG, and general time series data files. Numerous past researches projects have observed that one can compress one object relative to another one by computing the differences between the two, delta-encoding systems have almost invariably required knowledge of a specific relationship between them most commonly. The idea of delta encoding to reduce communication or storage costs is not new. Using lossless run length encoding technique together we propose a new algorithm for lossless image compression.
Employment of a Multi-measure Approach as a Vehicle for Monitoring Encoding and Retrieval Dynamics: The Case of Semantically Related Words  [PDF]
Jonathan Guez, Moshe Naveh-Benjamin
Psychology (PSYCH) , 2011, DOI: 10.4236/psych.2011.25072
Abstract: Several recent studies have indicated that retrieval, unlike encoding, is only minimally affected by dividing attention, but is associated with significant secondary task costs. The reported experiment manipulated the strength of pre-experimental semantic associations, using a cued-recall paradigm and a multi-measure approach. This allowed the assessment of accuracy and latency of retrievals, as well as of overall attentional costs and the temporal distribution of attentional costs incurred by these retrievals. By simultaneously inspecting the different measures, we identified a common set of retrieval types and retrieval components. The results presented different patterns for semantically related or un-related words under full or divided attention as a function of the dependent measure used. The results emphasize the advantage of using multi-measure approach to the uncovering of different properties of cognitive processes.
Power Analysis of Sensor Node Using Simulation Tool  [PDF]
R. Sittalatchoumy, R. Kanthavel, R. Seetharaman
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.713348
Abstract: Power consumption of sensor node is analyzed in this paper. In order to analyze the energy consumption, the node model is simulated using Proteus Software tool. The proposed sensor nodes power characteristics are measured by using different combinations of microprocessors and sensors. Using this, the energy consumption of the node is calculated. This is a cost-effective method and provides appropriate power model for specific applications.
A Novel Approach of Multilevel Binary Image Encoding using Walsh Table and Spiral Scanning
Nilanjan Dey#1 , Sourav Samanta#2 , Anamitra Bardhan Roy#3
International Journal of Engineering Trends and Technology , 2011,
Abstract: In this paper we proposed a method of image encoding technique in a new formulated way. During transmission image is encoded in two phases for the enhancement of security. In the first phase encoding is done using Walsh table and in the second phase by using spiral scanning based encoding technique.
Information Hiding Method Based on Block DWT Sub-Band Feature Encoding  [PDF]
Qiudong SUN, Wenxin MA, Wenying YAN, Hong DAI
Journal of Software Engineering and Applications (JSEA) , 2009, DOI: 10.4236/jsea.2009.25051
Abstract: For realizing of long text information hiding and covert communication, a binary watermark sequence was obtained firstly from a text file and encoded by a redundant encoding method. Then, two neighboring blocks were selected at each time from the Hilbert scanning sequence of carrier image blocks, and transformed by 1-level discrete wavelet transformation (DWT). And then the double block based JNDs (just noticeable difference) were calculated with a visual model. According to the different codes of each two watermark bits, the average values of two corresponding detail sub-bands were modified by using one of JNDs to hide information into carrier image. The experimental results show that the hidden information is invisible to human eyes, and the algorithm is robust to some common image processing operations. The conclusion is that the algorithm is effective and practical.
The Application and Adaptation of the Two Sources of Code and Natural Encoding Method for Designing a Model of Microprogram Control Unit with Base Structure  [PDF]
?ukasz Smoliński, Alexander Barkalov, Larysa Titarenko
Circuits and Systems (CS) , 2014, DOI: 10.4236/cs.2014.512031
Abstract: The article presents a modification to the method which applies two sources of data. The modification is depicted on the example of a compositional microprogram control unit (CMCU) model with base structure implemented in the complex programmable logic devices (CPLD). First, the conditions needed to apply the method are presented, followed by the results of its implementation in real hardware.
FPGA-Based High-Frequency Digital Pulse Width Modulator Architecture for DC-DC Converters  [PDF]
V. Radhika, K. Baskaran
Circuits and Systems (CS) , 2016, DOI: 10.4236/cs.2016.74039
Abstract: Digital pulse width modulator is an integral part in digitally controlled Direct Current to Direct Current (DC-DC) converter utilized in modern portable devices. This paper presents a new Digital Pulse Width Modulator (DPWM) architecture for DC-DC converter using mealy finite state machine with gray code encoding scheme and one hot encoding method to derive the variable duty cycle Pulse Width Modulation (PWM) signal without varying the clock frequency. To verify the proposed DPWM technique, the architecture with control input of six, five and four bits are implemented and the maximum operating frequency along with power consumption results is obtained for different Field Programmable Gate Array (FPGA) devices. The post layout timing results are presented showing that architecture can work with maximum frequency of 326 MHz and derive PWM signal of 3.59 MHz. Experimental results show the implementation of the proposed architecture in low-cost FPGA (Spartan 3A) with on-board oscillator clock frequency of 12 MHz which is multiplied internally by two with Digital Clock Manager (DCM) and derive the PWM signal of 1.5 MHz with a time resolution of 1 ps.
A New Approach for Image Steganography using Edge detection method
International Journal of Innovative Research in Computer and Communication Engineering , 2013,
Abstract: :This paper proposed a new technique for image steganography using edge detection for RGB images. There are lots of algorithms to hide data with precision level but they are also decreasing the quality of the image. In this proposed study, edges of an RGB image will be detected by scanning method using 3x3 window, and then text will be embedded in to the edges of the color image. By doing this not only high embedding capacity will be achieved, it also enhances the quality of the stego image from the HVS (human vision system)
Aerial Video Encoding Optimization Based On x264  [PDF]
Fan Yang, Hongbing Ma
Open Journal of Applied Sciences (OJAppS) , 2013, DOI: 10.4236/ojapps.2013.31B008
Abstract: x264 video codec uses lots of new video encoding technology based on H.264/AVC video encoding standard which enhances compression efficiency. However this results in so heavy computation that the x264 codec is not fit for real-time encoding application of high resolution video. This paper analyses the character of aerial video and then opti-mizes the inter-frame mode decision and motion estimation in x264 codec according to its character by reducing a lot of unnecessary computation. In the result, about 19% computation and encoding time is reduced with total bits and PSNR decreasing lightly.
Encrypted Sensing Based on Digital Holography for Fingerprint Images  [PDF]
Masafumi Takeda, Kazuya Nakano, Hiroyuki Suzuki, Masahiro Yamaguchi
Optics and Photonics Journal (OPJ) , 2015, DOI: 10.4236/opj.2015.51002
Abstract: We propose a novel biometric sensing technique for personal authentication in which fingerprint images are captured using an optical encryption method. This method can reduce the risk of data theft or leakage of personal information captured by biometric sensing. This method, termed encrypted sensing, is implemented using digital holography with double random phase encoding. We demonstrate experimentally that a fingerprint image can be captured as an optically encrypted image and can be restored correctly only when the correct cipher key is used. Moreover, we investigate experimentally the verification accuracy of the decrypted images.
Page 1 /453
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.