Loading...
Search for: source-coding
0.007 seconds
Total 32 records

    Error resilient source coding for video communication

    , Article 2007 IEEE 15th Signal Processing and Communications Applications, SIU, Eskisehir, 11 June 2007 through 13 June 2007 ; 2007 ; 1424407192 (ISBN); 9781424407194 (ISBN) Ajorloo, H ; Lakdashti, A ; Manzuri Shalmani, M. T ; Sharif University of Technology
    2007
    Abstract
    A novel error resilient source coding method is proposed for video codecs such as H.264 standard. The main idea is to develop an error resilient part similar to the channel coders at the source coder. This enables the receiver to recover a damaged slice of a frame, inter or intra coded, up to a certain size determined by the encoder. In contrast to another previously approach presented in the literature, our algorithm has significantly less artifacts on the video frames with a considerable increase in speed  

    Generating summaries for methods of event-driven programs: An Android case study

    , Article Journal of Systems and Software ; Volume 170 , 2020 Aghamohammadi, A ; Izadi, M ; Heydarnoori, A ; Sharif University of Technology
    Elsevier Inc  2020
    Abstract
    The lack of proper documentation makes program comprehension a cumbersome process for developers. Source code summarization is one of the existing solutions to this problem. Many approaches have been proposed to summarize source code in recent years. A prevalent weakness of these solutions is that they do not pay much attention to interactions among elements of software. An element is simply a callable code snippet such as a method or even a clickable button. As a result, these approaches cannot be applied to event-driven programs, such as Android applications, because they have specific features such as numerous interactions between their elements. To tackle this problem, we propose a novel... 

    Secrecy Rates in Wiretap Channels

    , Ph.D. Dissertation Sharif University of Technology Salimi, Somayeh (Author) ; Salmasizadeh, Mahmoud (Supervisor) ; Aref, Mohammad Reza (Supervisor)
    Abstract
    Security has been considered from the information theoretic point of view in different channels such as broadcast, multiple access and relay channels. Due to application of these channels in modern networks such as wireless, sensor and Ad-hoc networks, information theoretic security arguments especially wiretapping, has major significance in these networks. With regard to necessity of confidentiality protection in modern telecommunication services, security from the information theoretic point of view should be considered as well as capacity and achievable rate region considerations in these networks. In this thesis, first, a survey of basic works in the subjects of secrecy capacity and... 

    Joint SourceChannel Coding in Video Transmission Using Deep Learning

    , M.Sc. Thesis Sharif University of Technology Ghayoumi Ghamsari, Moein (Author) ; Behroozi, Hamid (Supervisor) ; Hossein Khalaj, Babak (Supervisor)
    Abstract
    In the signal transmission cycle in a telecommunication network, there are two coding blocks, which can be realized in two ways. In the traditional way, source coding is first used to remove redundancies and compress information. Then, channel coding is used to transmit on the telecommunication channel and deal with noise and other destructive factors of the channel. In other words, source coding and channel coding are done separately. In contrast, signal transmission can be done by joint source¬channel coding. According to Shannon separation theorem and with the fulfillment of the conditions mentioned in the theorem, the method of separation of source and channel coding in a point to point... 

    Automated Release Note Generation

    , Ph.D. Dissertation Sharif University of Technology Izadi, Maliheh (Author) ; Heydarnoori, Abbas (Supervisor)
    Abstract
    As one of the most important software artifacts, release reports include most essential changes of software systems in each release. These reports are useful for documenting team activities, improving communication between team members and facilitating decision makings. They are often generated manually by a team member, which can be a tedious and time-consuming task. For each release, one should go through hundreds of issue reports, changed files, source code, and other related documents to determine what has changed and why. Then they need to identify the most important and relevant changes. Therefore, automated generation of release reports can be highly desirable. Despite the... 

    On source transmission over some classes of relay channels

    , Article IEEE International Symposium on Information Theory - Proceedings ; 2012 , Pages 1942-1946 ; 9781467325790 (ISBN) Salehkalaibar, S ; Aref, M. R ; Sharif University of Technology
    IEEE  2012
    Abstract
    We study the reliable transmission of correlated sources over the relay channel. One of the sources is available at the sender while the other one is known to the relay. The receiver wishes to reconstruct both sources. We find necessary and sufficient conditions for optimal separation of source and channel codes. The coding scheme is based on the combination of the Slepian-Wolf source coding and Partial Decode-and-Forward (PDF) strategy. In this scheme, the relay partially decodes the message transmitted by the sender. We also consider the semi-deterministic relay channel where the output at the relay is a deterministic function of inputs from the sender and the relay. For the transmission... 

    Neutron noise source reconstruction using the adaptive neuro-fuzzy inference system (ANFIS) in the VVER-1000 reactor core

    , Article Annals of Nuclear Energy ; Volume 105 , 2017 , Pages 36-44 ; 03064549 (ISSN) Hosseini, S. A ; Esmaili Paeen Afrakoti, I ; Sharif University of Technology
    Abstract
    The neutron noise is defined as the stationary fluctuation of the neutron flux around its mean value due to the induced perturbation in the reactor core. The neutron noise analysis may be useful in many applications like noise source reconstruction. To identify the noise source, calculated neutron noise distribution of the detectors is used as input data by the considered unfolding algorithm. The neutron noise distribution of the VVER-1000 reactor core is calculated using the developed computational code based on Galerkin Finite Element Method (GFEM). The noise source of type absorber of variable strength is considered in the calculation. The computational code developed based on An Adaptive... 

    Sampling and distortion tradeoffs for indirect source retrieval

    , Article 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016, 7 December 2016 through 9 December 2016 ; 2017 , Pages 545-549 ; 9781509045457 (ISBN) Mohammadi, E ; Fallah, A ; Marvasti, F ; IEEE Signal Processing Society; The Institute of Electrical and Electronics Engineers ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2017
    Abstract
    We study the problem of remote reconstruction of a continuous signal from its multiple corrupted versions. We are interested in the optimal number of samples and their locations for each corrupted signal to minimize the total reconstruction distortion of the remote signal. The correlation among the corrupted signals can be utilized to reduce the sampling rate. For a class of Gaussian signals, we show that in the low sampling rate region, it is optimal to use a certain nonuniform sampling scheme on all the signals. On the other hand, in the high sampling rate region, it is optimal to uniformly sample all the signals. We also show that both of these sampling strategies are optimal if we are... 

    Joint distributed source and network coding for multiple wireless unicast sessions

    , Article 2009 IEEE Wireless Communications and Networking Conference, WCNC 2009, Budapest, 5 April 2009 through 8 April 2009 ; 2009 ; 15253511 (ISSN); 9781424429486 (ISBN) Etemadi Tajbakhsh, S ; Movaghar, A ; Sharif University of Technology
    2009
    Abstract
    Few works has been focused on the problem of joint distributed data compression and network coding. In this paper we give some examples showing the advantage of broadcast nature of wireless environment as a basis for joint codes design. Also we show that joint coding is possible in the case of multiple unicasts. The idea of this paper can be exploited in an opportunistic manner. Actually, the foundation of our idea is nothing but combining opportunistic network coding (COPE) and distributed source coding using syndromes (DISCUS) for wireless applications. © 2009 IEEE  

    Evaluating the Rate of Compressibility of Sparse Stochastic Processes

    , M.Sc. Thesis Sharif University of Technology Ghourchian, Hamid (Author) ; Amini, Arash (Supervisor) ; Aminzadeh Gohari, Amin (Supervisor)
    Abstract
    In most stochastic models with uncountable cardinality of sample space with non-trivial probability measures, the inherent information is infinite. The continuous-valued random variables and continuous-domain random processes are among such objects. Therefore, a fidelity criterion must be defined between the stochastic subject and its estimated version. Although there are some criteria for of stochastic continuous signals, based on quantizing the signal in both time and amplitude domains, we are going to define a criterion which is for stochastic processes in bounded time domain. Next, the criterion will be expressed in general sources perspective and the optimum rate of coding will be... 

    A new approach for distributed image coding in wireless sensor networks

    , Article Proceedings - IEEE Symposium on Computers and Communications, 22 June 2010 through 25 June 2010, Riccione ; June , 2010 , Pages 563-566 ; 15301346 (ISSN) ; 9781424477555 (ISBN) Jamali, M ; Zokaei, S ; Rabiee, H. R ; Sharif University of Technology
    2010
    Abstract
    Power and bandwidth constraints are two major challenges in wireless sensor networks. Since a considerable amount of energy in sensor networks is consumed for data transmission, compression techniques may prolong the life of such networks. Moreover, with fewer bits to transmit, the network can cope better with the problem of inadequate bandwidth. In this paper, we consider an image sensor network and propose a paradigm based on the principles of Distributed Source Coding (DSC) for efficient compression. Our method relies on high correlation between the sensor nodes. The algorithm consists of two phases: the Training Phase and the Main Phase. In the Training Phase an aggregation node or a... 

    An iterative signal recovery technique capable of decreasing the lossy effects of codecs

    , Article 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, ICT-MICC 2007, Penang, 14 May 2007 through 17 May 2007 ; February , 2007 , Pages 107-112 ; 1424410940 (ISBN); 9781424410941 (ISBN) Jahani Yekta, M. M ; Marvasti, F ; Sharif University of Technology
    2007
    Abstract
    In this paper applications of an iterative method in some signal recovery problems are introduced. It is proved that the distorting effect of linear operators can be removed completely using the iterative scheme. The inverse of monotonic functions can also be made indirectly by the method. A novel approach for separating the messages of different subscribers in a CDMA network will be proposed as well, relying on the recursive approach. It would be shown that Sigma Delta Modulated signals can be decoded via the iterative procedure. We will prove both analytically and with simulations that a broad class of nonlinear operators including speech and image codecs can be approximately inverted with...