In this paper, we evaluate the impact of accurate 802.11 based wireless channel modeling on the
efficiency of dynamic Forward Error Correction (FEC) schemes in Motion JPEG 2000 video streaming systems.
We derive a compromise on the suitable trace length for practical estimation of Packet Error Rate (PER) at
decoder side. We demonstrate the validity of the derived trade-off using a real JPEG 2000 based video streaming
system.
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...CSCJournals
This paper presents a new MDC scheme for robust wireless data communications. The soft detection making of the MDC scheme utilises the statistical received data error obtained from channel decoding. The coded bit stream in the system is protected using either the Reed Solomon (RS) or Low Density Parity Check Codes (LDPC) channel coding scheme. Simulation results show that this system has some significant performance improvements over the single description or single channel transmission systems in terms of symbol error rate and peak signal-to-noise ratio PSNR. The system with RS codes is 2 to 5 dB better than single description. The system with LDPC channel codes is 6 to10 dB better than the single description.
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences
Rate Distortion Performance for Joint Source Channel Coding of JPEG image Ove...CSCJournals
This paper presents the rate distortion behavior of Joint Source Channel Coding (JSCC) scheme for still image transmission. The focus is on DCT based Source coding JPEG, Rate Compatible Punctured Convolution codes (RCPC) for transmission over Additive White Gaussian Noise (AWGN) channel under the constraint of fixed transmission bandwidth. Information transmission has a tradeoff between compression ratio and received quality of image. The compressed stream is more susceptible to channel errors, thus error control coding techniques are used along with images to minimize the effect of channel errors. But there is a clear tradeoff between channel coding redundancies versus source quality with constant channel bit rate. This paper proposes JSCC scheme based on Unequal Error Protection (UEP) for robust image transmission. With the conventional error control coding schemes that uses Equal Error Protection (EEP), all the information bits are equally protected. The use of the UEP schemes provides a varying amount of error protection according to the importance of the data. The received image quality can be improved using UEP compared to Equal Error Protection (EEP).
Error resilient for multiview video transmissions with gop analysisijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences.
Chaos Encryption and Coding for Image Transmission over Noisy Channelsiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Soft Decision Scheme for Multiple Descriptions Coding over Rician Fading Chan...CSCJournals
This paper presents a new MDC scheme for robust wireless data communications. The soft detection making of the MDC scheme utilises the statistical received data error obtained from channel decoding. The coded bit stream in the system is protected using either the Reed Solomon (RS) or Low Density Parity Check Codes (LDPC) channel coding scheme. Simulation results show that this system has some significant performance improvements over the single description or single channel transmission systems in terms of symbol error rate and peak signal-to-noise ratio PSNR. The system with RS codes is 2 to 5 dB better than single description. The system with LDPC channel codes is 6 to10 dB better than the single description.
ERROR RESILIENT FOR MULTIVIEW VIDEO TRANSMISSIONS WITH GOP ANALYSIS ijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences
Rate Distortion Performance for Joint Source Channel Coding of JPEG image Ove...CSCJournals
This paper presents the rate distortion behavior of Joint Source Channel Coding (JSCC) scheme for still image transmission. The focus is on DCT based Source coding JPEG, Rate Compatible Punctured Convolution codes (RCPC) for transmission over Additive White Gaussian Noise (AWGN) channel under the constraint of fixed transmission bandwidth. Information transmission has a tradeoff between compression ratio and received quality of image. The compressed stream is more susceptible to channel errors, thus error control coding techniques are used along with images to minimize the effect of channel errors. But there is a clear tradeoff between channel coding redundancies versus source quality with constant channel bit rate. This paper proposes JSCC scheme based on Unequal Error Protection (UEP) for robust image transmission. With the conventional error control coding schemes that uses Equal Error Protection (EEP), all the information bits are equally protected. The use of the UEP schemes provides a varying amount of error protection according to the importance of the data. The received image quality can be improved using UEP compared to Equal Error Protection (EEP).
Error resilient for multiview video transmissions with gop analysisijma
The work in this paper examines the effects of group of pictures on H.264 multiview video coding bitstream
over an erroneous network with different error rates. The study considers analyzing the bitrate
performance for different GOP and error rates to see the effects on the quality of the reconstructed
multiview video. However, by analyzing the multiview video content it is possible to identify an optimum
GOP size depending on the type of application used. In a comparison test, the H.264 data partitioning and
the multi-layer data partitioning technique with different error rates and GOP are evaluated in terms of
quality perception. The results of the simulation confirm that Multi-layer data partitioning technique shows
a better performance at higher error rates with different GOP. Further experiments in this work have
shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences.
This is an overview of the kinds of Bit Error Rates (BER) you can expect when using particular error correction techniques over a nominal satellite communications link. A more extensive paper on the subject is available upon request.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...IJMTST Journal
To combat the wireless fading impairment in the high network demand environment, various coding
schemes have been implemented. MIMO techniques are still the powerful techniques along with source
coding. This paper focuses on coherent implementation of high performance turbo codes with MIMO
equalization techniques. It is proposed to achieve optimum BER value at very low values of SNR in a noisy
environment.
In this paper, an investigation of the effects of group of pictures on H.264 multiview video coding content over an error prone environment with varying packet loss rates is presented. We analyse the bitrate performance for different GOP and error rates to see the effects on the
quality of the reconstructed multiview video. However, by analysing the multiview video content
it is possible to identify an optimum GOP size depending on the type of application used. A comparison is demonstrated for the performances between widely known H.264 data partitioning error resilience technique and multi-layer data partitioning technique with different error rates and GOP in terms of their perceived quality. Our simulation results turned out that Multi-layer data partitioning technique shows a better performance at higher error rates with different GOP. Further experiments in this work have shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Flexible fec and fair selection of scalable units for high quality vod stream...IJMIT JOURNAL
Providing high quality video on demand (VoD) streaming service over wireless networks is very challenging due to the limited capacity and error-proneness of the wireless environment. We propose a flexible forward error correction (FEC) and a fair selection scheme of scalable units that utilize a layered
coding structure of H.264/SVC (scalable video coding). Three error-resilient techniques (e.g., unequal
error protection, FEC, and retransmission) are adapted to minimize the total distortion of VoD streaming
service. For flexible FEC, a rateless FEC code is adopted. The FEC code rates are based on the possible
number of retransmission, the condition of the wireless channel and the layered coding structure of H.264/SVC for each packet. A theoretical study is performed to show how to utilize the possible number of retransmission for an adaptive FEC code rate. With fair selection, regular and retransmission-requested
packets compete for resources without fixing the retry limit. Thus, excessive retransmission is prevented and
the proposed scheme effectively provides capacity-limited and delay-constrained VoD streaming services.
For this fair selection of scalable units, we formulate the problem using binary integer programming and
propose an effective low complexity selection algorithm based on a priority index. The proposed algorithm
prioritizes packets according to the priority index and the H.264/SVC structure. We show that the proposed
scheme can minimize the total video distortion compared to other heuristic procedures. Other effects of the
various factors are also considered for the performance of the new scheme.
FLEXIBLE FEC AND FAIR SELECTION OF SCALABLE UNITS FOR HIGH QUALITY VOD STREAM...IJMIT JOURNAL
Providing high quality video on demand (VoD) streaming service over wireless networks is very
challenging due to the limited capacity and error-proneness of the wireless environment. We propose a
flexible forward error correction (FEC) and a fair selection scheme of scalable units that utilize a layered
coding structure of H.264/SVC (scalable video coding). Three error-resilient techniques (e.g., unequal
error protection, FEC, and retransmission) are adapted to minimize the total distortion of VoD streaming
service. For flexible FEC, a rateless FEC code is adopted. The FEC code rates are based on the possible
number of retransmission, the condition of the wireless channel and the layered coding structure of
H.264/SVC for each packet. A theoretical study is performed to show how to utilize the possible number of
retransmission for an adaptive FEC code rate. With fair selection, regular and retransmission-requested
packets compete for resources without fixing the retry limit. Thus, excessive retransmission is prevented and
the proposed scheme effectively provides capacity-limited and delay-constrained VoD streaming services.
For this fair selection of scalable units, we formulate the problem using binary integer programming and
propose an effective low complexity selection algorithm based on a priority index. The proposed algorithm
prioritizes packets according to the priority index and the H.264/SVC structure. We show that the proposed
scheme can minimize the total video distortion compared to other heuristic procedures. Other effects of the
various factors are also considered for the performance of the new scheme
The Mobile WiMAX simulation model is
implemented by using MATLAB code. The simulation model
consists of different phases which will help us to model the
transmitter and receiver section. In the next phase, the data is
being modulated by using the modulation methods QPSK and
QAM followed by OFDM transmitter. These phases can be
used to show the performance of these modulation methods
under varying condition. The Multipath Rician fading model is
implemented to introduce the fading in the transmitter data.
Receiver section is used to receive data from channel will be fed
into the OFDM demodulation. In the next phase, Fast Fourier
Transform is used to disassemble OFDM frame. After that
convolution encoding is applied to data and interleaving is
carried on by using MATLAB function. BPSK method is used
to change the data in the form of bit information to be symbols.
We had used
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLIAEME Publication
The IEEE 802.11e EDCF mechanism cannot guarantee the QOS of high-priority traffic as the bandwidth consumption of the low-priority traffic increases. Also, in the presence of high priority traffic dampen link utilization of low priority traffic. To overcome these problems, we propose the Novel mechanism in our research that extends IEEE 802.11e EDCF by introducing a Super Slot and Virtual Collision. Compared to EDCF, our proposed approach has EDCF has two advantages: (a) Higher priority traffic achieves Quality of service regardless of the amount of low priority traffic, and (b) Low priority traffic obtains a higher throughput in the presence of same amount of high priority traffic.
This is an overview of the kinds of Bit Error Rates (BER) you can expect when using particular error correction techniques over a nominal satellite communications link. A more extensive paper on the subject is available upon request.
PERFORMANCE OF WIMAX PHYSICAL LAYER WITH VARIATIONS IN CHANNEL CODING AND DIG...ijistjournal
The aim of this paper is to analyze the bit error rate (BER) performance of WiMAX physical layer with the implementation of different concatenated channel coding schemes under QAM and 16QAM digital modulations over realistic channel conditions (i.e. noise and multipath fading). In concatenated channel coding, the WiMAX system incorporates CRC-CC (Cyclic Redundancy Check and Convolutional) or RSCC (Reed-Solomon and Convolutional) encoder over an additative white gaussian noise (AWGN) and other multipath fading (Raleigh and Rician) channels. A segment of synthetic data is used for the analysis. Computer simulation results based on BER and signal to noise ratio (SNR) demonstrate that the performance of concatenated CRC-CC coded WiMAX system under QAM modulation is better as compared to RS-CC coded system over noisy and fading environments.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Performance Analysis of MIMO Equalization Techniques with Highly Efficient Ch...IJMTST Journal
To combat the wireless fading impairment in the high network demand environment, various coding
schemes have been implemented. MIMO techniques are still the powerful techniques along with source
coding. This paper focuses on coherent implementation of high performance turbo codes with MIMO
equalization techniques. It is proposed to achieve optimum BER value at very low values of SNR in a noisy
environment.
In this paper, an investigation of the effects of group of pictures on H.264 multiview video coding content over an error prone environment with varying packet loss rates is presented. We analyse the bitrate performance for different GOP and error rates to see the effects on the
quality of the reconstructed multiview video. However, by analysing the multiview video content
it is possible to identify an optimum GOP size depending on the type of application used. A comparison is demonstrated for the performances between widely known H.264 data partitioning error resilience technique and multi-layer data partitioning technique with different error rates and GOP in terms of their perceived quality. Our simulation results turned out that Multi-layer data partitioning technique shows a better performance at higher error rates with different GOP. Further experiments in this work have shown the effects of GOP in terms of visual quality and bitrate for different multiview video sequences.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Due to the rapidly increasing data speed requirement, it has become essential to smartly utilize the available frequency spectrum. In wireless communications systems, channel quality parameters are often used to enable resource allocation techniques that improve system capacity and user quality. The uncoded bit or symbol error rate (SER) is specified as an important parameter in the second and third generation partnership project (3GPP). Nonetheless, techniques to estimate the uncoded SER are usually not much published. This paper introduces a novel uncoded bit error rate (BER) estimation method using the
accurate-bits sequence of the new channel codes over the AWGN channel. Here, we have used the new channel codes as a forward error correction coding scheme for our communication system. This paper also presents the simulation results to demonstrate and compare the estimation accuracy of the proposed method over the AWGN channel.
A New Bit Split and Interleaved Channel Coding for MIMO DecoderIJARBEST JOURNAL
Authors:-C. Amar Singh Feroz1, S. Karthikeyan2, K. Mala3
Abstract– In wireless communications, the use of multiple antennas at both the
transmitter and receiver is a key technology to enable high data transmission without
additional bandwidth or transmit power. MIMO schemes are widely used in many
wireless standards, allowing higher throughput using spatial multiplexing techniques.
Bit split mapping based on JDD is designed. Here ETI coding is used for encoding and
Viterbi is used for decoding. Experimental results for 16-QAM and 64 QAM with the
code rate of ½ and 1/3 codes are shown to verify the proposed approach and to elucidate
the design tradeoffs in terms the BER performance. This bit split mapping based JDD
algorithm can greatly improve BER performance with different system settings.
Flexible fec and fair selection of scalable units for high quality vod stream...IJMIT JOURNAL
Providing high quality video on demand (VoD) streaming service over wireless networks is very challenging due to the limited capacity and error-proneness of the wireless environment. We propose a flexible forward error correction (FEC) and a fair selection scheme of scalable units that utilize a layered
coding structure of H.264/SVC (scalable video coding). Three error-resilient techniques (e.g., unequal
error protection, FEC, and retransmission) are adapted to minimize the total distortion of VoD streaming
service. For flexible FEC, a rateless FEC code is adopted. The FEC code rates are based on the possible
number of retransmission, the condition of the wireless channel and the layered coding structure of H.264/SVC for each packet. A theoretical study is performed to show how to utilize the possible number of retransmission for an adaptive FEC code rate. With fair selection, regular and retransmission-requested
packets compete for resources without fixing the retry limit. Thus, excessive retransmission is prevented and
the proposed scheme effectively provides capacity-limited and delay-constrained VoD streaming services.
For this fair selection of scalable units, we formulate the problem using binary integer programming and
propose an effective low complexity selection algorithm based on a priority index. The proposed algorithm
prioritizes packets according to the priority index and the H.264/SVC structure. We show that the proposed
scheme can minimize the total video distortion compared to other heuristic procedures. Other effects of the
various factors are also considered for the performance of the new scheme.
FLEXIBLE FEC AND FAIR SELECTION OF SCALABLE UNITS FOR HIGH QUALITY VOD STREAM...IJMIT JOURNAL
Providing high quality video on demand (VoD) streaming service over wireless networks is very
challenging due to the limited capacity and error-proneness of the wireless environment. We propose a
flexible forward error correction (FEC) and a fair selection scheme of scalable units that utilize a layered
coding structure of H.264/SVC (scalable video coding). Three error-resilient techniques (e.g., unequal
error protection, FEC, and retransmission) are adapted to minimize the total distortion of VoD streaming
service. For flexible FEC, a rateless FEC code is adopted. The FEC code rates are based on the possible
number of retransmission, the condition of the wireless channel and the layered coding structure of
H.264/SVC for each packet. A theoretical study is performed to show how to utilize the possible number of
retransmission for an adaptive FEC code rate. With fair selection, regular and retransmission-requested
packets compete for resources without fixing the retry limit. Thus, excessive retransmission is prevented and
the proposed scheme effectively provides capacity-limited and delay-constrained VoD streaming services.
For this fair selection of scalable units, we formulate the problem using binary integer programming and
propose an effective low complexity selection algorithm based on a priority index. The proposed algorithm
prioritizes packets according to the priority index and the H.264/SVC structure. We show that the proposed
scheme can minimize the total video distortion compared to other heuristic procedures. Other effects of the
various factors are also considered for the performance of the new scheme
The Mobile WiMAX simulation model is
implemented by using MATLAB code. The simulation model
consists of different phases which will help us to model the
transmitter and receiver section. In the next phase, the data is
being modulated by using the modulation methods QPSK and
QAM followed by OFDM transmitter. These phases can be
used to show the performance of these modulation methods
under varying condition. The Multipath Rician fading model is
implemented to introduce the fading in the transmitter data.
Receiver section is used to receive data from channel will be fed
into the OFDM demodulation. In the next phase, Fast Fourier
Transform is used to disassemble OFDM frame. After that
convolution encoding is applied to data and interleaving is
carried on by using MATLAB function. BPSK method is used
to change the data in the form of bit information to be symbols.
We had used
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration
for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the
IoT network scenario considered in the work, for the same coding rate and the number of decoding
iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective
fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to
polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large
number of decoding iterations and high coding rates.
CODING SCHEMES FOR ENERGY CONSTRAINED IOT DEVICESijmnct_journal
This paper investigates the application of advanced forward error correction techniques mainly: lowdensity parity checks (LDPC) code and polar code for IoT networks. These codes are under consideration for 5G systems. Different code parameters such as code rate and a number of decoding iterations are used
to show their effect on the performance of the network. LDPC is performed better than polar code, over the IoT network scenario considered in the work, for the same coding rate and the number of decoding iterations. Considering bit error rate (BER) performance, LDPC with rate1/3 provided an improvement of
up to 2.6 dB for additive white Gaussian noise (AWGN) channel, and 2 dB for SUI-3 (frequency selective fading channel model). LDPC code gives an improvement in throughput of about 12% as compared to polar code with a coding rate of 2/3 over AWGN channel. The corresponding values over SUI-3 channel
are about 10%. Finally, in comparison with LDPC, polar code shows better energy saving for large number of decoding iterations and high coding rates.
A NOVEL SLOTTED ALLOCATION MECHANISM TO PROVIDE QOS FOR EDCF PROTOCOLIAEME Publication
The IEEE 802.11e EDCF mechanism cannot guarantee the QOS of high-priority traffic as the bandwidth consumption of the low-priority traffic increases. Also, in the presence of high priority traffic dampen link utilization of low priority traffic. To overcome these problems, we propose the Novel mechanism in our research that extends IEEE 802.11e EDCF by introducing a Super Slot and Virtual Collision. Compared to EDCF, our proposed approach has EDCF has two advantages: (a) Higher priority traffic achieves Quality of service regardless of the amount of low priority traffic, and (b) Low priority traffic obtains a higher throughput in the presence of same amount of high priority traffic.
Automated deployment of data collection policies over heterogeneous shared se...Cyril Cecchinel
Smart buildings and smart cities rely on interconnected sensor networks that collect data about their environment to support various applications. Developing and deploying the data collection architectures of these systems is a challenging problem. The specificities of the sensor platforms compel software engineers to work at a low level. This make this activity tedious, producing code that badly exploit the network architecture, and hampering reuse of data collection policies. Moreover, several data collection programs cannot be guaranteed to be deployable on a shared infrastructure. We present an automated approach that supports (i) the definition of data collection policies at a higher level of abstraction, (ii) the representation of the diverse platforms and the network topology, and (iii) the automatic composition and deployment of the policies on top of heterogeneous sensing infrastructures following different strategies. The approach is tooled and has been assessed on both realistic and simulated deployments.
ADVANCED RAILWAY SECURITY SYSTEM (ARSS) BASED ON ZIGBEE COMMUNICATION FOR TRA...rashmimabattin28
The principle point of this paper is to build up an inserted framework to distinguishing rail track flaw sending message to close station utilizing ZIGBEE TECHNOLOGY.
MicroGrid and Energy Storage System COMPLETE DETAILS NEW PPT Abin Baby
A microgrid is a localized grouping of electricity generation, energy storage, and loads that normally operates connected to a traditional centralized grid (macrogrid). This single point of common coupling with the macrogrid can be disconnected. The microgrid can then function autonomously. Generation and loads in a microgrid are usually interconnected at low voltage. From the point of view of the grid operator, a connected microgrid can be controlled as if it were one entity.
Microgrid generation resources can include fuel cells, wind, solar, or other energy sources. The multiple dispersed generation sources and ability to isolate the microgrid from a larger network would provide highly reliable electric power. Produced heat from generation sources such as micro turbines could be used for local process heating or space heating, allowing flexible trade off between the needs for heat and electric power.
IoT (Internet of things) big data analytics is becoming important to process unimaginably large amounts of information and data that are obtained by the sensor embedded interconnected IoT devices. The typical IoT big data analytics system is Hadoop, an open-source software framework that supports data-intensive distributed applications, and the running of applications on large clusters of commodity hardware. Hadoop, that is based on the architectural framework MapReduce, collects both structured data and unstructured data, processes the collected data set in a distributed network cluster in parallel, and extracts valuable information from the processed data set within a short time.
Performance analysis of transmission of 5 users based on model b using gf (5)...csandit
We present transmission of five users with 5 WDM × 4 TDM × 5 CODE channel on 3D
OCDMA system based on Model B using GF (5) with varying receiver attenuation at 1Gbps, 2
Gbps, 5Gbps and 10Gbps data rates on OPTSIM.
PERFORMANCE ANALYSIS OF TRANSMISSION OF 5 USERS BASED ON MODEL B USING GF (5)...cscpconf
We present transmission of five users with 5 WDM × 4 TDM × 5 CODE channel on 3D
OCDMA system based on Model B using GF (5) with varying receiver attenuation at 1Gbps, 2 Gbps, 5Gbps and 10Gbps data rates on OPTSIM.
Implementation of a bit error rate tester of a wireless communication system ...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
A Wavelet - Based Object Watermarking System for MPEG4 VideoCSCJournals
Efficient storage, transmission and use of video information are key requirements in many multimedia applications currently being addressed by MPEG-4. To fulfill these requirements, a new approach for representing video information which relies on an object-based representation, has been adopted. Therefore, object-based watermarking schemes are needed for copyright protection. This paper presents a novel object based watermarking solution for MPEG4 video authentication using the shape adaptive-discrete wavelet transform (SA-DWT). In order to make the watermark robust and transparent, the watermark is embedded in the average of wavelet blocks using the visual model based on the human visual system. Wavelet coefficients n least significant bits (LSBs) are adjusted in concert with the average. Simulation results shows that the proposed watermarking scheme is perceptually invisible and robust against many attacks such as lossy compression (e.g. MPEG1 and MPEG2,MPEG-4,H264)
Powerful business model for fixed wireless data using outdoor antennas - PaperAndre Fourie
Paper presented at the 2nd Africa Radio Comms Conference in Johannesburg - Nov 2015
By Andre Fourie
The revenue that can be generated by an LTE base station is influenced by the quality of the signal received by the customer premise equipment (CPE). Most CPE come with omni-directional indoor antennas, but have provision for the connection to external antennas.
Substituting the indoor antennas for directional outdoor antennas has a marked effect on the data transfer speeds of the network. There are two reasons for this. Firstly, outdoor antennas are physically larger than their indoor counterparts and thus have a higher gain. The increase in antenna gain translates directly to an increase in received signal strength. The second advantage is that the outdoor antenna sits in an environment that has much better propagating properties than the indoor antenna. Tests have shown that data speeds 3-5 times faster are possible using external antennas compared to indoor antennas.
It is shown, using a primitive financial model that fairly large financial gains can be made by equipping CPE devices with external antennas.
Evaluation and Analysis of Rate Control Methods for H.264/AVC and MPEG-4 Vide...IJECEIAES
Audio, image and video signals produce a vast amount of data. The only solution of this problem is to compress data before storage and transmission. In general there is the three crucial terms as, Bit Rate Reduction, Fast Data Transfer and Reduction in Storage. Rate control is a vigorous factor in video coding. In video communications, rate control must ensure the coded bitstream can be transmitted effectively and make full use of the narrow bandwidth. There are various test models usually suggested by a standard during the development of video codes models in order to video coding which should be suffienciently be efficient based on H.264 at very low bit rate. These models are Test Model Number 5 (TMN5), Test Model Number 8 for H.263, and Verification Model 8 (VM8) for MPEG-4 and H.264 etc. In this work, Rate control analysis for H.264, MPEG-4 performed. For Rate control analysis test model verification model version 8.0 is adopted.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Low complexity video coding for sensor networkeSAT Journals
Abstract Modern video codecs such as H.264/AVC give state-of-the-art compression performance. However, extensive use of optimization tools makes them highly complex and hence not suitable for wireless video sensor network. In this paper an efficient video codec with substantially reduced complexity is proposed. Simulation result shows that the proposed video codec gives comparable compression performance compared to H.264/AVC but at substantially reduced computational complexity. Keywords—Low complexity coding, Sensor network, Video coding, Wavelet transform.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
AN APPLICATION OF NEURAL NETWORKS TO CHANNEL ESTIMATION OF THE ISDB-TB FBMC S...ijwmn
Due to the evolution of technology and the diffusion of digital television, many researchers are studying
more efficient transmission and reception methods. This fact occurs because of the demand of transmitting
videos with better quality using new standards such 8K SUPER Hi-VISION. In this scenario, modulation
techniquessuch as Filter Bank Multi Carrier, associated with advanced coding and synchronization
methods, are being applied, aiming to achieve the desired data rate to support ultra-high definition videos.
Simultaneously, it is also important to investigate ways of channel estimation that enable a better reception
of the transmitted signal. This task is not always trivial, depending on the characteristics of the channel.
Thus, the use of artificial intelligence can contribute to estimate the channel frequency response, from the
transmitted pilots. A classical algorithm called Back-propagation Training can be applied to find the
channel equalizer coefficients, making possible the correct reception of TV signals. Therefore, this work
presents a method of channel estimation that uses neural network techniques to obtain the channel
response in the Brazilian Digital System Television, called ISDB-TB, using Filter Bank Multi Carrier.
The efficient interleaving of digital-video-broadcasting-satellite 2nd genera...TELKOMNIKA JOURNAL
The DVB-S2 system is designed as a toolbox to permit the execution of the satellite programs. Interleaver is an essential part of the DVB-S2 system. The current general block interleaver in DVB-S2 is not best, which leads to high BER and maybe not satisfy the requirements of the system. The purpose of this paper is to study the several interleaver types and comparative analyses are done between them to find which of these give better performance. Simulations results obtained prove that the 2D interleavers minimize BER more than other interleavers of DVB-S2. Further, the performance of 2D interleaver is better on a system that required a low SNR.
Multicasting Of Adaptively-Encoded MPEG4 Over Qos-Cognizant IP NetworksEditor IJMTER
we propose a novel architectural planning for multicasting of adaptively-encoded
layered MPEG4 over a QoS-aware IP network. We re-quire a QoS-aware IP network in this case to
(1) Support priority dropping of packets in time of congestion. (2) Provide congestion notification to
the multicast sender. For the first requirement, we use RED's extension for service differentiation. It
recognizes the priority of packets when they need to be dropped and drops lower priority packets
first. We couple RED with our proposal for the second requirement which is the adoption of
Backward Explicit Congestion Notification (BECN) for use with IP multicast. BECN will provide
early congestion notification at the IP layer level to the video sender. BECN detects upcoming
congestion based on size of the RED queue in the routers. The MPEG4 adaptive-encoder can change
the sending rate and also can divide the video packets into lower priority packets and high priority
packets. Based on BECN messages from the routers, a simple flow controller at the sender sets the
rate for the adaptive MPEG4 encoder and also sets the ratio between the high priority and low
priority packets within the video stream. We use a TES model for generating the MPEG4 traffic that
is based on real video traces. Simulation results show that combining priority dropping, MPEG4
adaptive encoding, and multicast BECN: (1) Improves bandwidth utilization (2) Reduces time to
react to congestion and hence improves the received video quality (3) Maintains graceful degradation
in quality with congestion and provides minimum quality even if congestion persists.
Convolutional encoding with Viterbi decoding is a good forward error correction technique suitable for channels affected by noise degradation. Fangled Viterbi decoders are variants of Viterbi decoder (VD) which decodes quicker and takes less memory with no error detection capability. Modified fangled takes it a step further by gaining one bit error correction and detection capability at the cost of doubling the computational complexity and processing time. A new efficient fangled Viterbi algorithm is proposed in this paper with less complexity and processing time along with 2 bit error correction capabilities. For 1 bit error correction for 14 bit input data, when compared with Modified fangled Viterbi decoder, computational complexity has come down by 36-43% and processing delay was halved. For a 2 bit error correction, when compared with Modified fangled decoder computational complexity decreased by 22-36%.
A Novel Method for Prevention of Bandwidth Distributed Denial of Service AttacksIJERD Editor
Distributed Denial of Service (DDoS) Attacks became a massive threat to the Internet. Traditional
Architecture of internet is vulnerable to the attacks like DDoS. Attacker primarily acquire his army of Zombies,
then that army will be instructed by the Attacker that when to start an attack and on whom the attack should be
done. In this paper, different techniques which are used to perform DDoS Attacks, Tools that were used to
perform Attacks and Countermeasures in order to detect the attackers and eliminate the Bandwidth Distributed
Denial of Service attacks (B-DDoS) are reviewed. DDoS Attacks were done by using various Flooding
techniques which are used in DDoS attack.
The main purpose of this paper is to design an architecture which can reduce the Bandwidth
Distributed Denial of service Attack and make the victim site or server available for the normal users by
eliminating the zombie machines. Our Primary focus of this paper is to dispute how normal machines are
turning into zombies (Bots), how attack is been initiated, DDoS attack procedure and how an organization can
save their server from being a DDoS victim. In order to present this we implemented a simulated environment
with Cisco switches, Routers, Firewall, some virtual machines and some Attack tools to display a real DDoS
attack. By using Time scheduling, Resource Limiting, System log, Access Control List and some Modular
policy Framework we stopped the attack and identified the Attacker (Bot) machines
Hearing loss is one of the most common human impairments. It is estimated that by year 2015 more
than 700 million people will suffer mild deafness. Most can be helped by hearing aid devices depending on the
severity of their hearing loss. This paper describes the implementation and characterization details of a dual
channel transmitter front end (TFE) for digital hearing aid (DHA) applications that use novel micro
electromechanical- systems (MEMS) audio transducers and ultra-low power-scalable analog-to-digital
converters (ADCs), which enable a very-low form factor, energy-efficient implementation for next-generation
DHA. The contribution of the design is the implementation of the dual channel MEMS microphones and powerscalable
ADC system.
Influence of tensile behaviour of slab on the structural Behaviour of shear c...IJERD Editor
-A composite beam is composed of a steel beam and a slab connected by means of shear connectors
like studs installed on the top flange of the steel beam to form a structure behaving monolithically. This study
analyzes the effects of the tensile behavior of the slab on the structural behavior of the shear connection like slip
stiffness and maximum shear force in composite beams subjected to hogging moment. The results show that the
shear studs located in the crack-concentration zones due to large hogging moments sustain significantly smaller
shear force and slip stiffness than the other zones. Moreover, the reduction of the slip stiffness in the shear
connection appears also to be closely related to the change in the tensile strain of rebar according to the increase
of the load. Further experimental and analytical studies shall be conducted considering variables such as the
reinforcement ratio and the arrangement of shear connectors to achieve efficient design of the shear connection
in composite beams subjected to hogging moment.
Gold prospecting using Remote Sensing ‘A case study of Sudan’IJERD Editor
Gold has been extracted from northeast Africa for more than 5000 years, and this may be the first
place where the metal was extracted. The Arabian-Nubian Shield (ANS) is an exposure of Precambrian
crystalline rocks on the flanks of the Red Sea. The crystalline rocks are mostly Neoproterozoic in age. ANS
includes the nations of Israel, Jordan. Egypt, Saudi Arabia, Sudan, Eritrea, Ethiopia, Yemen, and Somalia.
Arabian Nubian Shield Consists of juvenile continental crest that formed between 900 550 Ma, when intra
oceanic arc welded together along ophiolite decorated arc. Primary Au mineralization probably developed in
association with the growth of intra oceanic arc and evolution of back arc. Multiple episodes of deformation
have obscured the primary metallogenic setting, but at least some of the deposits preserve evidence that they
originate as sea floor massive sulphide deposits.
The Red Sea Hills Region is a vast span of rugged, harsh and inhospitable sector of the Earth with
inimical moon-like terrain, nevertheless since ancient times it is famed to be an abode of gold and was a major
source of wealth for the Pharaohs of ancient Egypt. The Pharaohs old workings have been periodically
rediscovered through time. Recent endeavours by the Geological Research Authority of Sudan led to the
discovery of a score of occurrences with gold and massive sulphide mineralizations. In the nineties of the
previous century the Geological Research Authority of Sudan (GRAS) in cooperation with BRGM utilized
satellite data of Landsat TM using spectral ratio technique to map possible mineralized zones in the Red Sea
Hills of Sudan. The outcome of the study mapped a gossan type gold mineralization. Band ratio technique was
applied to Arbaat area and a signature of alteration zone was detected. The alteration zones are commonly
associated with mineralization. The alteration zones are commonly associated with mineralization. A filed check
confirmed the existence of stock work of gold bearing quartz in the alteration zone. Another type of gold
mineralization that was discovered using remote sensing is the gold associated with metachert in the Atmur
Desert.
Reducing Corrosion Rate by Welding DesignIJERD Editor
The paper addresses the importance of welding design to prevent corrosion at steel. Welding is
used to join pipe, profiles at bridges, spindle, and a lot more part of engineering construction. The
problems happened associated with welding are common issues in these fields, especially corrosion.
Corrosion can be reduced with many methods, they are painting, controlling humidity, and also good
welding design. In the research, it can be found that reducing residual stress on the welding can be
solved in corrosion rate reduction problem.
Preheating on 500oC and 600oC give better condition to reduce corosion rate than condition after
preheating 400oC. For all welding groove type, material with 500oC and 600oC preheating after 14 days
corrosion test is 0,5%-0,69% lost. Material with 400oC preheating after 14 days corrosion test is 0,57%-0,76%
lost.
Welding groove also influence corrosion rate. X and V type welding groove give better condition to reduce
corrosion rate than use 1/2V and 1/2 X welding groove. After 14 days corrosion test, the samples with
X welding groove type is 0,5%-0,57% lost. The samples with V welding groove after 14 days corrosion test is
0,51%-0,59% lost. The samples with 1/2V and 1/2X welding groove after 14 days corrosion test is 0,58%-
0,71% lost.
Router 1X3 – RTL Design and VerificationIJERD Editor
Routing is the process of moving a packet of data from source to destination and enables messages
to pass from one computer to another and eventually reach the target machine. A router is a networking device
that forwards data packets between computer networks. It is connected to two or more data lines from different
networks (as opposed to a network switch, which connects data lines from one single network). This paper,
mainly emphasizes upon the study of router device, it‟s top level architecture, and how various sub-modules of
router i.e. Register, FIFO, FSM and Synchronizer are synthesized, and simulated and finally connected to its top
module.
Active Power Exchange in Distributed Power-Flow Controller (DPFC) At Third Ha...IJERD Editor
This paper presents a component within the flexible ac-transmission system (FACTS) family, called
distributed power-flow controller (DPFC). The DPFC is derived from the unified power-flow controller (UPFC)
with an eliminated common dc link. The DPFC has the same control capabilities as the UPFC, which comprise
the adjustment of the line impedance, the transmission angle, and the bus voltage. The active power exchange
between the shunt and series converters, which is through the common dc link in the UPFC, is now through the
transmission lines at the third-harmonic frequency. DPFC multiple small-size single-phase converters which
reduces the cost of equipment, no voltage isolation between phases, increases redundancy and there by
reliability increases. The principle and analysis of the DPFC are presented in this paper and the corresponding
simulation results that are carried out on a scaled prototype are also shown.
Mitigation of Voltage Sag/Swell with Fuzzy Control Reduced Rating DVRIJERD Editor
Power quality has been an issue that is becoming increasingly pivotal in industrial electricity
consumers point of view in recent times. Modern industries employ Sensitive power electronic equipments,
control devices and non-linear loads as part of automated processes to increase energy efficiency and
productivity. Voltage disturbances are the most common power quality problem due to this the use of a large
numbers of sophisticated and sensitive electronic equipment in industrial systems is increased. This paper
discusses the design and simulation of dynamic voltage restorer for improvement of power quality and
reduce the harmonics distortion of sensitive loads. Power quality problem is occurring at non-standard
voltage, current and frequency. Electronic devices are very sensitive loads. In power system voltage sag,
swell, flicker and harmonics are some of the problem to the sensitive load. The compensation capability
of a DVR depends primarily on the maximum voltage injection ability and the amount of stored
energy available within the restorer. This device is connected in series with the distribution feeder at
medium voltage. A fuzzy logic control is used to produce the gate pulses for control circuit of DVR and the
circuit is simulated by using MATLAB/SIMULINK software.
Study on the Fused Deposition Modelling In Additive ManufacturingIJERD Editor
Additive manufacturing process, also popularly known as 3-D printing, is a process where a product
is created in a succession of layers. It is based on a novel materials incremental manufacturing philosophy.
Unlike conventional manufacturing processes where material is removed from a given work price to derive the
final shape of a product, 3-D printing develops the product from scratch thus obviating the necessity to cut away
materials. This prevents wastage of raw materials. Commonly used raw materials for the process are ABS
plastic, PLA and nylon. Recently the use of gold, bronze and wood has also been implemented. The complexity
factor of this process is 0% as in any object of any shape and size can be manufactured.
Spyware triggering system by particular string valueIJERD Editor
This computer programme can be used for good and bad purpose in hacking or in any general
purpose. We can say it is next step for hacking techniques such as keylogger and spyware. Once in this system if
user or hacker store particular string as a input after that software continually compare typing activity of user
with that stored string and if it is match then launch spyware programme.
A Blind Steganalysis on JPEG Gray Level Image Based on Statistical Features a...IJERD Editor
This paper presents a blind steganalysis technique to effectively attack the JPEG steganographic
schemes i.e. Jsteg, F5, Outguess and DWT Based. The proposed method exploits the correlations between
block-DCTcoefficients from intra-block and inter-block relation and the statistical moments of characteristic
functions of the test image is selected as features. The features are extracted from the BDCT JPEG 2-array.
Support Vector Machine with cross-validation is implemented for the classification.The proposed scheme gives
improved outcome in attacking.
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Application of Buckley-Leverett Equation in Modeling the Radius of Invasion i...IJERD Editor
A thorough review of existing literature indicates that the Buckley-Leverett equation only analyzes
waterflood practices directly without any adjustments on real reservoir scenarios. By doing so, quite a number
of errors are introduced into these analyses. Also, for most waterflood scenarios, a radial investigation is more
appropriate than a simplified linear system. This study investigates the adoption of the Buckley-Leverett
equation to estimate the radius invasion of the displacing fluid during waterflooding. The model is also adopted
for a Microbial flood and a comparative analysis is conducted for both waterflooding and microbial flooding.
Results shown from the analysis doesn’t only records a success in determining the radial distance of the leading
edge of water during the flooding process, but also gives a clearer understanding of the applicability of
microbes to enhance oil production through in-situ production of bio-products like bio surfactans, biogenic
gases, bio acids etc.
Gesture Gaming on the World Wide Web Using an Ordinary Web CameraIJERD Editor
- Gesture gaming is a method by which users having a laptop/pc/x-box play games using natural or
bodily gestures. This paper presents a way of playing free flash games on the internet using an ordinary webcam
with the help of open source technologies. Emphasis in human activity recognition is given on the pose
estimation and the consistency in the pose of the player. These are estimated with the help of an ordinary web
camera having different resolutions from VGA to 20mps. Our work involved giving a 10 second documentary to
the user on how to play a particular game using gestures and what are the various kinds of gestures that can be
performed in front of the system. The initial inputs of the RGB values for the gesture component is obtained by
instructing the user to place his component in a red box in about 10 seconds after the short documentary before
the game is finished. Later the system opens the concerned game on the internet on popular flash game sites like
miniclip, games arcade, GameStop etc and loads the game clicking at various places and brings the state to a
place where the user is to perform only gestures to start playing the game. At any point of time the user can call
off the game by hitting the esc key and the program will release all of the controls and return to the desktop. It
was noted that the results obtained using an ordinary webcam matched that of the Kinect and the users could
relive the gaming experience of the free flash games on the net. Therefore effective in game advertising could
also be achieved thus resulting in a disruptive growth to the advertising firms.
Hardware Analysis of Resonant Frequency Converter Using Isolated Circuits And...IJERD Editor
-LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region[5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits.
Simulated Analysis of Resonant Frequency Converter Using Different Tank Circu...IJERD Editor
LLC resonant frequency converter is basically a combo of series as well as parallel resonant ckt. For
LCC resonant converter it is associated with a disadvantage that, though it has two resonant frequencies, the
lower resonant frequency is in ZCS region [5]. For this application, we are not able to design the converter
working at this resonant frequency. LLC resonant converter existed for a very long time but because of
unknown characteristic of this converter it was used as a series resonant converter with basically a passive
(resistive) load. . Here, it was designed to operate in switching frequency higher than resonant frequency of the
series resonant tank of Lr and Cr converter acts very similar to Series Resonant Converter. The benefit of LLC
resonant converter is narrow switching frequency range with light load[6] . Basically, the control ckt plays a
very imp. role and hence 555 Timer used here provides a perfect square wave as the control ckt provides no
slew rate which makes the square wave really strong and impenetrable. The dead band circuit provides the
exclusive dead band in micro seconds so as to avoid the simultaneous firing of two pairs of IGBT’s where one
pair switches off and the other on for a slightest period of time. Hence, the isolator ckt here is associated with
each and every ckt used because it acts as a driver and an isolation to each of the IGBT is provided with one
exclusive transformer supply[3]. The IGBT’s are fired using the appropriate signal using the previous boards
and hence at last a high frequency rectifier ckt with a filtering capacitor is used to get an exact dc
waveform .The basic goal of this particular analysis is to observe the wave forms and characteristics of
converters with differently positioned passive elements in the form of tank circuits. The supported simulation
is done through PSIM 6.0 software tool
Amateurs Radio operator, also known as HAM communicates with other HAMs through Radio
waves. Wireless communication in which Moon is used as natural satellite is called Moon-bounce or EME
(Earth -Moon-Earth) technique. Long distance communication (DXing) using Very High Frequency (VHF)
operated amateur HAM radio was difficult. Even with the modest setup having good transceiver, power
amplifier and high gain antenna with high directivity, VHF DXing is possible. Generally 2X11 YAGI antenna
along with rotor to set horizontal and vertical angle is used. Moon tracking software gives exact location,
visibility of Moon at both the stations and other vital data to acquire real time position of moon.
“MS-Extractor: An Innovative Approach to Extract Microsatellites on „Y‟ Chrom...IJERD Editor
Simple Sequence Repeats (SSR), also known as Microsatellites, have been extensively used as
molecular markers due to their abundance and high degree of polymorphism. The nucleotide sequences of
polymorphic forms of the same gene should be 99.9% identical. So, Microsatellites extraction from the Gene is
crucial. However, Microsatellites repeat count is compared, if they differ largely, he has some disorder. The Y
chromosome likely contains 50 to 60 genes that provide instructions for making proteins. Because only males
have the Y chromosome, the genes on this chromosome tend to be involved in male sex determination and
development. Several Microsatellite Extractors exist and they fail to extract microsatellites on large data sets of
giga bytes and tera bytes in size. The proposed tool “MS-Extractor: An Innovative Approach to extract
Microsatellites on „Y‟ Chromosome” can extract both Perfect as well as Imperfect Microsatellites from large
data sets of human genome „Y‟. The proposed system uses string matching with sliding window approach to
locate Microsatellites and extracts them.
Importance of Measurements in Smart GridIJERD Editor
- The need to get reliable supply, independence from fossil fuels, and capability to provide clean
energy at a fixed and lower cost, the existing power grid structure is transforming into Smart Grid. The
development of a smart energy distribution grid is a current goal of many nations. A Smart Grid should have
new capabilities such as self-healing, high reliability, energy management, and real-time pricing. This new era
of smart future grid will lead to major changes in existing technologies at generation, transmission and
distribution levels. The incorporation of renewable energy resources and distribution generators in the existing
grid will increase the complexity, optimization problems and instability of the system. This will lead to a
paradigm shift in the instrumentation and control requirements for Smart Grids for high quality, stable and
reliable electricity supply of power. The monitoring of the grid system state and stability relies on the
availability of reliable measurement of data. In this paper the measurement areas that highlight new
measurement challenges, development of the Smart Meters and the critical parameters of electric energy to be
monitored for improving the reliability of power systems has been discussed.
Study of Macro level Properties of SCC using GGBS and Lime stone powderIJERD Editor
One of the major environmental concerns is the disposal of the waste materials and utilization of
industrial by products. Lime stone quarries will produce millions of tons waste dust powder every year. Having
considerable high degree of fineness in comparision to cement this material may be utilized as a partial
replacement to cement. For this purpose an experiment is conducted to investigate the possibility of using lime
stone powder in the production of SCC with combined use GGBS and how it affects the fresh and mechanical
properties of SCC. First SCC is made by replacing cement with GGBS in percentages like 10, 20, 30, 40, 50 and
by taking the optimum mix with GGBS lime stone powder is blended to mix in percentages like 5, 10, 15, 20 as
a partial replacement to cement. Test results shows that the SCC mix with combination of 30% GGBS and 15%
limestone powder gives maximum compressive strength and fresh properties are also in the limits prescribed by
the EFNARC.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video streaming systems
1. International Journal of Engineering Research and Development
e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com
Volume 10, Issue 12 (December 2014), PP.30-38
30
Accurate wireless channel modeling for efficient adaptive
Forward Error Correction in JPEG 2000 video streaming systems
1
Max Agueh, 2
Magaye Diop,
1
LACSC ECE, 37 Quai de Grenelle, 75725 Paris Cedex 15, France
2
ESP, Université Cheikh Anta Diop, BP 5085 Dakar, Sénégal
Abstract:- In this paper, we evaluate the impact of accurate 802.11 based wireless channel modeling on the
efficiency of dynamic Forward Error Correction (FEC) schemes in Motion JPEG 2000 video streaming systems.
We derive a compromise on the suitable trace length for practical estimation of Packet Error Rate (PER) at
decoder side. We demonstrate the validity of the derived trade-off using a real JPEG 2000 based video streaming
system.
Index Terms:- Wireless channel modeling; trace length; analysis window length; dynamic Forward Error
Correction; Packet Error Rate estimation; Motion JPEG 2000 video streaming.
I. INTRODUCTION
With the development of wireless multimedia streaming systems there is an increasing demand on
application level tools which could increase the robustness of video streaming over wireless networks. JPEG
2000 [1], the newest image representation standard, addresses this issue by predefining error resilient tools in his
core encoding system (part 1) and going straightforward by defining in its 11th part called wireless JPEG2000 (
JPWL) [2] a set of error resilient techniques to improve the transmission of JPEG2000 code streams over error-
prone wireless channel. One of the mains recommendations of JPWL final draft is the use of Forward Error
Correction (FEC) with Reed-Solomon. Hence, in the literature, authors [3][4] proposed FEC rate allocation
schemes for robust JPEG 2000 images and video streaming. These schemes statically [3] or dynamically [4]
allocate JPEG 2000 code streams channel coding rate based on the estimation of respectively Bit Error Rate
(BER) and Packet Error Rate ( PER ). In [4], at the decoder side, error rate metrics are derived after frame
decoding and these metrics are used, at the encode side, to derive an application level channel model. The FEC
rate allocation scheme relies on the derived channel model to select the appropriate channel codes for next
frames protection. Hence, in wireless images and video streaming systems such as the one considered in this
work (see Figure 1), the effectiveness of FEC rate allocation schemes depends on the accuracy of error rate
estimation and channel modeling in the system.
Figure 1. Wireless multimedia system
In this paper, we evaluate the impact of accurate Packet Error Rate (interchangeably Bit Error Rate) on
the effectiveness of JPEG 2000 based FEC rate allocation schemes. Then, we define an analysis window length
as the length of the used trace for PER estimation at decoder side. Ideally, the analysis window length should be
the highest possible for accurate channel modeling, however due to the real time constraint this value must not
be too high. By the other side, a very short analysis window length leads to bad channel modeling because the
estimated PER is not statistically representative. Finally, we derive a trade-off point for practical estimation of
analysis window length and we validate this compromise using an application of Motion JPEG 2000 video
streaming over real ad-hoc networks traces.
To the best of our knowledge the present work is the first to give practical clues (compromise on
analysis window length) for accurate wireless channel modeling in order to enhance the effectiveness of the FEC
rate allocation schemes used in Wireless JPEG 2000 images and video streaming systems.
2. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
31
The paper is arranged as follows. Section II presents the two FEC rate allocation schemes considered in this
work for robust JPEG 2000 images and video streaming over wireless networks. In section III, the loss patterns
generation is described and an analysis of the considered real wireless channel traces is provided. A compromise
on the suitable analysis window length for efficient FEC rate allocation schemes is also derived in section III.
The results validating the derived empirical trade-off are presented in section IV. Finally, some conclusions are
provided in section V.
II. FEC RATE ALLOCATION SCHEMES
In this paper we considered two low-complexity Forward Error Correction schemes used respectively in
[3] and [4] for robust JPEG 2000 based images/video streaming.
A. Layered Unequal Error Protection Scheme
Z. Guo and al proposed in [3] a slightly complex layered unequal error protection scheme for robust
Motion JPEG 2000 streaming over wireless network. This FEC rate allocation scheme relies on the contribution
of each layer to the improvement of image quality to select the suitable RS codes. Hence powerful RS codes are
set to most important layers such as the base layer and the other layers are protected by decreasing order of
importance. However, this algorithm is not JPWL compliant and was designed based on the assumption that the
channel is a memoryless Binary Symmetric Channel (uncorrelated error occurrence) which is not realistic
because wireless channels have correlated errors sequences.
B. Dynamic FEC rate allocation scheme
The second considered FEC rate allocation scheme is presented in [4] and is a dynamic layered based
unequal error protection FEC rate allocation methodology for efficient JPEG 2000 streaming over MANET.
This scheme is based on the assumption that transmitted JPEG 2000 image quality is linked to the amount of
correctly decoded packets at the receiver. Hence, goal of this scheme is to maximize the overall throughput in
the system. The dynamic FEC rate allocation scheme improves the performance by about 10% compared to a
priori selection of channel coding.
The drawback of both methodologies is that their effectiveness depends on the accuracy of error rate
estimation at decoder side. This paper addresses this issue by relying on real 802.11 traces analysis to derive a
trade-off on the estimation window length for accurate Packet Error Rate evaluation.
In the following section we analyse the real MANET traces.
III. APPLICATION LEVEL CHANNEL MODELING
A. Loss Patterns Generation
The platform used to generate the loss patterns is presented in Figure 1. It consists of a client/server
software pair running on two Windows XP laptops connected in ad-hoc network using two PCMCIA IEEE
802.11 b/g cards (at 2,4 GHz).
Figure 2. Loss patterns generation platform
The set of loss patterns generated covers different transmission scenarios (mobile or static). Each
pattern corresponds to a specific Carrier to Noise ratio
N
C (
N
C is the ratio between the desired signal and the
total received noise power).The used mode at the physical layer of the wireless link is the mode 4 where the
modulation is QPSK, the coding rate is 3/4 and the Nominal Data Rate alNoR min is 18Mbit/s. In the considered
loss patterns,
N
C varies between 20 dB and 11dB which corresponds to a Packet Error Rate ranging from
3
101.5
to 1
10662.2
.
Generated traces are available in [5].
3. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
32
B. Modeling Loss Patterns with Gilbert Model
The Gilbert model was first introduced by Gilbert in [9]. Elliot proposes an extension of the Gilbert
model in [10], the last model is commonly known as the Gilbert-Elliot (GE). In GE model, the wireless channel
is modelled to have two states: good and bad. In the good state ( g ), the channel provides a constant and low
error probability ( GP ) whereas in the bad state ( b ), the channel experiences a high error probability ( BP ).
Hence we have GP << BP for GE, and 0GP and 1BP for the Gilbert channel, in other words the Gilbert
model is a simplified GE model.
In this work, we consider an 8-bit symbol oriented model to emulate the correlated error characteristics
of wireless channel. Therefore, our wireless channel is modelled as a two state Markov process (see figure
3).With this model, the channel produces error bursts.
Figure 3. Two state Markov process scheme
Let GL and BL be respectively the mean length of error free and erroneous sequences, we have:
gg
G
p
L
1
1 and
bb
B
p
L
1
1
Applying Markov process at symbol level, we derive the Symbol Error Rate ( SER ) for Gilbert model [9]:
ggbb
gg
pp
p
SER
11
1
A comprehensive description of the Markov modeling for wireless channel is explained in [11].
C. Trace Analysis under Gilbert Framework
It is worth noting that in the considered traces each packet had a fixed length of 1128 symbols (bytes).
In our work we do not consider a cross layer estimation of transmission errors, so the Symbol Error Rate ( SER )
is equal to the Packet Error Rate ( PER ).
Therefore, packet oriented Gilbert models derived from traces had the same characteristics and same
parameters than the 8-bit symbol oriented Gilbert models used to emulate the wireless channel at application
level. As loss patterns are applied on packets, for coherence reason, a packet oriented analysis of the traces is
presented.
In the loss patterns Good state (G) and bad state (B) are represented respectively by 0 and 1. Hence 0
corresponds to a well received packet and 1 to an erroneous packet.
The distribution of error bursts is presented in figure 3-a for different loss patterns. From figure 3-a, it can be
noticed that, in most cases, the error burst length is less than 10 packets. So 10max
BL is considered as the
upper bound of the error burst length.
The error free burst length distribution in figure 3-b shows that the upper bound 100max
GL is ten times
superior to the error bursts. This is due to the fact that apart from the moment when the wireless channel
experience fading (bursts of errors), the transmission is often successful. We also notice that the number of error
free bursts is lower than the number of error bursts, but this gap is compensated by the stay time in error free
state (error free burst length) which is much longer than the one in error state (error burst length). So in the
models used to emulate the traces, the mean time in the good state G should be sensibly greater than the mean
time in the bad state B.
bbpggp
bgp
gbp
BG
4. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
33
Figure 3-a. Error bursts distribution
Figure 3-b. Error free bursts distribution
Figure 4-a presents the mean error burst length evolution for different traces. An exponential increase of
the mean error burst length with the Packet Error Rate can be observed. It is worth noticing that even when the
channel is highly noised, typically 12
1010
PER , the mean error burst does not vary, and is about 1.05
packets. It can be deduced that our channel experiences relatively fast fading periods. In figure 4-b, the error
burst length standard deviation is presented, in order to evaluate the fluctuation of the error burst length around
the mean error burst length of the considered traces.
Figure 4-a. Error burst mean length versus PER
Figure 4-b. Error burst length standard deviation versus PER
5. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
34
Figure 4-b indicates that for slightly noised channel, typically
12
1010
PER , the error burst length
standard deviation is low, meaning that error burst length is closed to the mean value BL , whereas for highly
noised channel, typically
1
10
PER , the error burst standard deviation is high, leading to a sensible
fluctuation of error burst length around the mean value.
Similarly figure 5-a shows that the mean error free burst length decreases exponentially with the Packet Error
Rate. Hence this metric varies between 100 and 200 packets for 2
10
PER , and 100 and 10 packets for
12
1010
PER .
For 1
10
PER the mean error free burst length is 10 packets, which is ten times higher than the mean error
burst length, demonstrating that even for highly noised channel the ratio between error free burst length and error
burst length is still higher. It comes under view that the channel experiences longer error free sequence than error
sequence which confirms the conclusions derived from figure 3-a and figure 3-b.
Figure 5-a. Error free burst mean length versus PER
Figure 5-b. Error free burst length standard deviation versus PER
In figure 5-b the standard deviation of the error free burst length versus the Packet Error Rate is
presented. We notice that for 2
10
PER , error free burst length standard deviation is high meaning that error
free burst length fluctuates a lot around the mean value GL whereas for 1
10
PER this metric is sensibly
reduced making the error burst length closer to the mean value.
Thanks to loss patterns analysis, interesting information can be derived about the wireless channel such
as the mean error free burst length GL and the mean error burst length BL . In previous section, we shown that,
GL and its associated standard deviation increase exponentially with PER whereas BL and its associated
standard deviation behave inversely. Those metrics are then used to derive the Gilbert model parameters gbp
and bgp using the relation verified by R. Jain in [12]:
G
gb
L
p
1
and
B
bg
L
p
1
.
In our work each loss pattern had a fixed length of 10000 packets. Let evaluate, the impact of the considered
traces length on the accuracy of its associated Gilbert model.
D. Impact of Analysis Window length on the Accuracy of Gilbert Models
In order to estimate the impact of the trace length on the accuracy of generated Gilbert models, the
analysis window N and the parameters gbp and bgp are fixed. Then, a Monte-Carlo simulation is conducted
using 1000 artificial traces of same length N . For each artificial trace, the parameters gbpˆ and bgpˆ are
estimated.
Let gbp and bgp be the relative gap between the parameters estimated from artificial traces and from the
6. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
35
fixed Gilbert model parameters, we have:
gb
gbgb
gb
p
pp
p
ˆ and
bg
bgbg
bg
p
pp
p
ˆ . Let
2
gbp and
2
bgp be the
variance respectively of gbp and bgp . The parameter
2
gbp versus the analysis window length N is
presented in figure 6-a.
Figure 6-a. Variance of delta P_gb versus analysis window length
Figure 6-b. Variance of delta P_bg versus analysis window length
We notice that increasing the analysis window length N decreases the variance of gbp and so
increases the accuracy on the estimation of the estimated gbp . In other words, the more the trace length is long
the more accurate is the estimated Gilbert model. This is due to the fact that the estimation of Gilbert
parameter gbp , relies on mean error free burst length whose value becomes statistically representative with the
increase of the trace length. Moreover, we observe that increasing PER leads to a sensible reduction of the error
made in the estimation of gbp .
Indeed, for 1
10*662.2
PER and with an analysis window of 1000 packets, we have
22
10*5.1
gbp whereas for the same 1000N and 3
10*1.5
PER we have
2
gbp close to 1
10
. In the
last case, the improvement in the accuracy of the model is about 60 times higher than in the previous case.
Hence, the more the channel is erroneous, the more the estimation of gbp is accurate. This is explained by the
fact that increasing PER decreases the error free bursts length standard deviation as shown in figure 5-b. As the
accuracy of gbp is linked to statistically representative values of GL , it comes under view that the considered
parameter estimation changes with the PER whose sensitively impacts GL . However, as shown in figure 6-b this
is no longer the case for the estimation of parameter bgp . From figure 6-b, it can be noticed that for analysis
7. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
36
window length of 1000, estimation of bgp is slightly sensitive to PER , because we do not have enough error
bursts to derive sufficiently representative measures of BL in which we rely to estimate bgp . However, as far as
N significantly increases, we have a better estimate of bgp and its estimation became less impacted by the
PER increase for a considered analysis window length contrarily to gbp .This is explained by the fact that
increasing PER increases the number of error bursts but does not increase their length whose mean remains
constant as shown in figure 4-a.
Finally, we can deduced from this section that for accurate Gilbert model parameters estimation, an
analysis window length of at least 1000 packets (corresponding to 10% of the overall trace length) should be
considered.
Going straightforward, we extend this trade-off to video streaming systems. Hence, denoting VL as the
video length, an interesting window length for accurate PER estimation is VL1.0 . As an example, for a Motion
JPEG 2000 video constituted by 200 frames, the PER at receiver should be estimated at least every twenty JPEG
2000 frames in order to guaranty the efficiency of the FEC rate allocation scheme.
In the following section, we validate this empirical compromise using a Motion JPEG 2000 video streaming over
real MANET traces.
IV. JPEG2000 VIDEO STREAMING RESULTS
The interest of this section is to validate the compromise on PER estimation window length in a real
dynamic FEC rate allocation system.
The video sequence used is the speedway.mj2 [13] containing 200 JPEG2000 frames at an overall
quality of 0.2 bpp (bit per pixel) with 0.05 bpp for base layer, 0.1 bpp for the second layer and 0.2 bpp for the
third layer.
As error occurrence in the transmission channel is a random process, different runs were made for each
simulation and the Mean Square Error ( MSE ) between the original image ( oI ) and the decoded image ( dI ), is
averaged over all the runs in order to have statistically representative metrics.
The measured Peak Signal to Noise Ratio (PSNR) is obtained as follows:
M
x
N
y
dodo yxIyxI
NM
IIMSE
1 1
2
),(),(
.
1
,
framesN
MSE
MSE
and
MSE
PSNR
2
10
255
log*10
Where MSE is the Mean Square Error over all the framesN images considered. In the case of Motion JPEG2000
streaming, framesN represents the 200 JPEG2000 frames constituting the video sequence Each PSNR measure is
associated to a decoding rate metric which corresponds to crash estimation on the basis of frames transmission
trials.
The FEC rate allocation schemes used are the one presented in section 2. Thanks to the wireless
multimedia system presented in figure 1, the effectiveness of both data protection schemes is evaluated by
computing the PSNR at the output of the system. Through a client/server application the JPEG2000 frames
extracted from the Motion JPEG2000 (MJ2) file are transmitted to the receiver which represents the wireless
client.
The Packet Error Rate is estimated at the decoder and sent back to the encoder via the uplink in order to improve
next frames protection levels. Thanks to a better knowledge of the channel, the encoder selects a set of RS codes
to protect each layer of JPEG 2000 frames.
In our work, the wireless channel is emulated using real loss patterns [5] presented in section 3. The considered
loss patterns have dB
N
C
18 and the Motion JPEG 2000 file (speedway.mj2) length is bytesLV 8704 .
Figure 7 illustrates the selected ),( knRS codes error correcting ability
2
kn
t
versus the PER estimation
window length while using the FEC rate allocation schemes presented respectively in [3] and [4]. Since the best
set of selected RS codes are achieved with the maximal window length VL , we notice that PER estimation
(analysis) window length of VL1.0 is enough to yield the suitable protection level for JPEG 2000 code streams.
Using a PER estimation window length higher than the proposed trade-off leads to the same set of RS codes
selection but decreases the reactivity of the system and by the way its effectiveness because PER values are
8. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
37
updated less frequently. On the over side, using a PER estimation window length lower than the proposed trade-
off leads to inaccurate channel modeling which reduces the efficiency of the protection schemes.
Figure 7. Correcting ability of the RS codes used for MJPEG 2000 data protection – Bandwidth 18 Mbits/s
Table I and table II show the PSNR of decoded video sequence versus estimation window length while using the
FEC rate allocation schemes presented respectively in [3] and [4].
TABLE I: PSNR OF VIDEO SEQUENCE AND IMAGES SUCCESSFUL DECODING RATE VERSUS PER
ESTIMATION WINDOW LENGTH (Z. GUO)
Window length
VL (bytes)
PSNR (dB) Successful
Decoding
Rate (%)
VL (8704 bytes) 47.04 94
VL1.0 (871 bytes) 45.87 91
VL01.0 (88
bytes)
41.01 90
TABLE II: PSNR OF VIDEO SEQUENCE AND IMAGES SUCCESSFUL DECODING RATE VERSUS PER
ESTIMATION WINDOW LENGTH (DYNAMIC FEC)
Window length
VL (bytes)
PSNR
(dB)
Successful
Decoding
Rate (%)
VL (8704 bytes) 47.12 94
VL1.0 (871 bytes) 46.02 93
VL01.0 (88 bytes) 41.22 91
We notice from table I and table II, that the PSNR of decoded video sequence is almost the same for
PER estimation window length superior or equal to VL1.0 ( dB46 ). However, the PSNR decreases about 5 dB
under the proposed trade-off point which implies a reduction of the video quality decoded by the wireless client.
It is worth noting that the successful decoding rate is often higher than 90% which means that in our work even
in case of inaccurate channel modeling, both FEC rate allocation schemes select sufficiently powerful RS codes
to avoid decoder crashes.
We conclude that the proposed PER estimation window length is a valid trade-off for practical
implementation of FEC rate allocation schemes in Motion JPEG 2000 video streaming systems. An interesting
extension to this work could be the comparison of the results obtained using the proposed empirical window
threshold to those achievable while using the sliding window algorithm proposed in [14].
9. Accurate wireless channel modeling for efficient adaptive Forward Error Correction in JPEG 2000 video…
38
V. CONCLUSION
In this paper we evaluate the impact of the accuracy of the channel models on the effectiveness of
application level FEC rate allocation schemes.
We start by presenting the considered FEC rate allocation schemes for robust Motion JPEG 2000 video
streaming application over wireless channels. After analysing real 802.11 based traces we derived a compromise
for the PER estimation window length at receiver side. The proposed estimation window length is about ten time
less than the transmitted video length. We then show the validity of the proposed trade-off using an application
of Motion JPEG 2000 video streaming of JPEG 2000 traces.
REFERENCES
[1]. D.S. Taubman et M.W. Marcellin, “JPEG 2000 Image Compression Fundamentals, Standards and
Practice,” Kluwer Academic Publishers, The Netherlands 2001
[2]. JPEG 2000 part 11 Final Draft International Standard, ISO/IEC JTC 1/SC 29/WG 1 N3797
[3]. Z. Guo, Y. Nishikawa, R. Y. Omaki, T. Onoye and I. Shirakawa, “A Low-Complexity FEC
Assignment Scheme for Motion JPEG 2000 over Wireless Network”, IEEE Transactions on Consumer
Electronics, Vol. 52, Issue 1, Feb. 2006 Page(s): 81 – 86
[4]. M. Agueh, J-F Diouris, M. Diop and F-O Devaux,“ Dynamic channel coding for efficient Motion
JPEG 2000 streaming over MANET,” Proc. Mobimedia2007 conf, August 2007, Nafpaktos, Greece
[5]. Loss patterns acquired during the WCAM Annecy 2004 measurement campaigns IST-2003-507204
WCAM, “Wireless Cameras and Audio-Visual Seamless Networking,” project website: http://www.ist-
wcam.org
[6]. M. Agueh, J-F Diouris, “Application level channel modelling in wireless network: example of JPEG
2000 images/video streaming over wireless channel,” In Proc. IRAMUS Workshop, Jan 2007 ,Val
thorens, France
[7]. Almudena Konrad, Ben Y. Zhao, Anthony D. Joseph, and Reiner Ludwig, “A Markov-Based Channel
Model Algorithm for Wireless Network,” Proc. International Workshop on Modeling, Analysis and
Simulation of Wireless and Mobile Systems (MSWiM),2001
[8]. Ping Ji, B. Liu, D. Towsley, Zihui Ge, J. Kurose, “Modeling Frame-level Errors in GSM Wireless
Channels,” Internet performance symposium. V 55, issue 1-2 (Jan 2004)
[9]. E. N. Gilbert, “Capacity of a burst noise channel,” Bell Syst. Tech. J., vol. 398, pp. 1253-1266, Sept
1960
[10]. O.Elliot, “Estimates of error rates for codes on burst-noise channel, ” Bell Syst.Tech. J., vol. 42, pp.
1977-1997, Sept 1963
[11]. Julio Arauz, prashant Krisnamurthy, ”Markov Modeling of 802.11 channels, ” In Vehicular Technology
Conférence, 2003.VTC 2003-Fall. 2003 IEEE 58th
. Vol.2 , pp 771- 775, 6-9 Oct. 2003
[12]. R. Jain, “The art of computer systems performance analysis, ” p 491- 1991
[13]. Speedway video sequences have been generated by UCL.
Available:http://euterpe.tele.ucl.ac.be/WCAM/public/Speedway%20Sequence/
[14]. Z. Li, J. Chakareski, X. Niu, Y. Zhang and W. Gu, “Modeling and Analysis of Distortion caused by
Markov-model burst packet losses in Video transmission,” submitted to IEEE Trans. On Circuits and
Systems for video Technology, 2008, Ref: LTS-article-2009-018. Available:
http://infoscience.epfl.ch/record/131189?ln=fr