共查询到20条相似文献,搜索用时 15 毫秒
1.
ATM网传送MPEG—2的方法 总被引:3,自引:0,他引:3
ATM网传送MPEG-2业务是远程教育,VOD、远程医疗等网络服务的基础。由于MPEG-2具有很高的压缩比,因此它对丢失、时延有很高的要求。ATM网在传送MPEG-2业务时的关键是如何满足MPEG-2对丢失和时延的特定要求。本文对ATM传送MPEG-2的适配方法、打包策略、定时恢复及排队策略进行了综述。 相似文献
2.
提出了一种在隔行扫描MPEG-2视频流中嵌入DCT域水印的算法。该算法对MPEG-2中DCT变换按帧和按场进行的两种情况采用不同的扩频码进行嵌入和检测,使水印的检测基本不受DCT方式变化的影响,从而能够抵抗各种重编码攻击,同时也保持了良好的实时性。还采用了两步算法,即除水印数据外还同时嵌入了少量同步信息,这样既可定期更新用于水印数据的扩频码,从而提高算法的安全性与灵活性,同时在存在帧插入/删除等攻击时又不会因失去同步而导致检测失败。 相似文献
3.
本文介绍了动态图像专家组标准系列中MPEG 2视频标准的概念、组成以及特点 ,MPEG 2压缩编码的原理、技术 ,MPEG 2视频编码码流概念及其数据结构 相似文献
4.
5.
An adaptive compressed MPEG-2 video watermarking scheme 总被引:3,自引:0,他引:3
Biswas S. Das S.R. Petriu E.M. 《IEEE transactions on instrumentation and measurement》2005,54(5):1853-1861
Digital watermarking is becoming more and more important for protecting the authenticity of multimedia objects as they become easier to copy, exchange, and modify. Several watermarking schemes have been proposed in recent years, but most of them deal with still images, only some being extended over to the temporal domain for video watermarking. But again most of those approaches are applied to uncompressed video processing domain. In the subject paper, a new compressed video watermarking procedure is proposed. The developed method embeds several binary images, decomposed from a single watermark image, into different scenes of a video sequence. The spatial spread spectrum watermark is embedded directly into the compressed bit streams by modifying discrete cosine transform (DCT) coefficients. In order to embed the watermark with minimum loss in image fidelity, a visual mask based on local image characteristics is incorporated. Extensive experimental simulations demonstrate that the proposed watermarking scheme is substantially more effective and robust against spatial attacks such as scaling, rotation, frame averaging, and filtering, besides temporal attacks like frame dropping and temporal shifting. 相似文献
6.
7.
Kiran Challapali Alan Cavallerano Richard Shen Olu Akiwumi-Assani Aldo Cugnini Carlo Basile 《International journal of imaging systems and technology》1994,5(4):263-267
A practical and unique hardware architecture for video bitstream source decoding and video postprocessing of a Moving Pictures Expert Group (MPEG-2)-based high-definition television (HDTV) compressed bitstream has been implemented to impose minimal limitations on the video source coding algorithm. The Grand Alliance (GA) MPEG-2-based HDTV codec achieves a high degree of source and channel coding efficiency while preserving the delivery of high-resoultion picture quality in a variety of video input and output formats in bandwidth-limited channels. The video source decoder hardware architecture necessary to achieve the data decoding and ensuing video postprocessing poses numerous technologic challenges to the system designer, who must tradeoff minimizing codec constraints with the eventual commercialization of a video decoder for a consumer television receiver product. The powerful and flexible coding algorithm necessary to satisfy the HDTV picture quality and transmission channel bandwidth limitation requirements results in an encoder-output bitstream that necessitates high throughout decoding. Although the transmitted bitstream is of constant rate due to rate buffering, bistreams internal to the codec are both peaky and bursty. An intelligent distributive parallel processing decoding architecture has been developed to dynamically partition the MPEG-2 bitstream into a number of decodable subset bitstreams, while placing minimal constraints on the encoding algorithm. This architecture allows for high-speed, efficient decoding of the bitstream, and can be a prelude to the development of a cost-effective consumer product. Further architecture refinements can be explored, including implementation in VLSI. 相似文献
8.
Multimedia services over a CDMA2000 broadcast network face a challenge from the unreliable and error-prone nature of the radio channel. Reed-Solomon (RS) coding, integrated with the MAC protocol, is used to cope with this problem. However, performance analysis of RS coding under varying channel conditions shows that it is not always effective, especially for slow-moving nodes which experience relatively long error bursts. Therefore a more efficient scheme is proposed that uses a RS code with reduced parity overhead, and freeing bandwidth can be used flexibly for retransmission. The packets to be retransmitted are prioritised by a utility function derived from the map of the error control block at each mobile node and the number of mobile nodes that require the lost packet. Simulation results show that the gain of retransmission exceeds the loss incurred by reducing the parity, leading to an improvement in the playback quality of MPEG-4 video streams. As a result, service area for high-quality multimedia can be expanded. 相似文献
9.
Iole Moccagatta Raj Talluri 《International journal of imaging systems and technology》1997,8(5):468-479
This article describes the current status and future directions of the emerging ISO MPEG-4 audiovisual coding standard. The article first presents an overview of the different aspects of the standard and then focuses on the video coding aspects. The current status of the Video Verification Model (VM) (a completely defined encoder and decoder specification) is described in detail and its performance is presented. The new functionalities supported by this emerging standard and their potential applications are highlighted. © 1997 John Wiley & Sons, Inc. Int J Imaging Syst Technol, 8, 468–479, 1997 相似文献
10.
The authors propose a robust end-to-end loss differentiation scheme to identify the packet losses because of congestion for transport control protocol (TCP) connections over wired/wireless networks. The authors use the measured round trip time (RTT) values to determine whether the cause of packet loss is because of the congestion over wired path or regular bit errors over wireless paths. The classification should be as accurate as possible to achieve high throughput and maximum fairness for the TCP connections sharing the wired/wireless paths. The accuracies of previous schemes in the literature depends on varying network parameters such as RTT, buffer size, amount of cross traffic, wireless loss rate and congestion loss rate. The proposed scheme is robust in that the accuracy remains rather stable under varying network parameters. The basic idea behind the scheme is to set the threshold for the classification to be a function of the minimum RTT and the current sample RTT, so that it may automatically adapt itself to the current congestion level. When the congestion level of the path is estimated to be low, the threshold for a packet loss to be classified as a congestion loss is increased. This avoids unnecessary halving of the congestion window on packet loss because of the regular bit errors over the wireless path and hence improves the TCP throughput. When the congestion level of the path is estimated to be high, the threshold for a packet loss to be classified as the congestion loss not to miss any congestion loss is decreased and hence improves the TCP fairness. In ns 2 simulations, the proposed scheme correctly classifies the congestion losses under varying network parameters whereas the previous schemes show some dependency on subsets of parameters. 相似文献
11.
One of the main challenges in the Traffic Anomaly Detection (TAD) system is the ability to deal with unknown target scenes. As a result, the TAD system performs less in detecting anomalies. This paper introduces a novelty in the form of Adaptive Neuro-Fuzzy Inference System-Lossy-Count-based Topic Extraction (ANFIS-LCTE) for classification of anomalies in source and target traffic scenes. The process of transforming the input variables, learning the semantic rules in source scene and transferring the model to target scene achieves the transfer learning property. The proposed ANFIS-LCTE transfer learning model consists of four steps. (1) Low level visual items are extracted only for motion regions using optical flow technique. (2) Temporal transactions are created using aggregation of visual items for each set of frames. (3) An LCTE is applied for each set of temporal transaction to extract latent sequential topics. (4) ANFIS training is done with the back-propagation gradient descent method. The proposed ANFIS model framework is tested on standard dataset and performance is evaluated in terms of training performance and classification accuracies. Experimental results confirm that the proposed ANFIS-LCTE approach performs well in both source and target datasets. 相似文献
12.
The control of traffic flow can be related to different applications. In this work, a method to manage variable speed limits combined with coordinated ramp metering within the framework of the Lighthill–Whitham–Richards (LWR) network model is introduced. Following a ‘first-discretize-then-optimize’ approach, the first order optimality system is derived and the switch of speeds at certain fixed points in time is explained, together with the boundary control for the ramp metering. Sequential quadratic programming methods are used to solve the control problem numerically. For application purposes, experimental setups are presented wherein variable speed limits are used as a traffic guidance system to avoid traffic jams on highway interchanges and on-ramps. 相似文献
13.
14.
This paper analyzes whether methods from social network analysis can be adopted for the modeling of scientific fields in order to obtain a better understanding of the respective scientific area. The approach proposed is based on articles published within the respective scientific field and certain types of nodes deduced from these papers, such as authors, journals, conferences and organizations. As a proof of concept, the techniques discussed here are applied to the field of ‘Mobile Social Networking’. For this purpose, a tool was developed to create a large data collection representing the aforementioned field. The paper analyzes various views on the complete network and discusses these on the basis of the data collected on Mobile Social Networking. The authors demonstrate that the analysis of particular subgraphs derived from the data collection allows the identification of important authors as well as separate sub-disciplines such as classic network analysis and sensor networks and also contributes to the classification of the field of ‘Mobile Social Networking’ within the greater context of computer science, applied mathematics and social sciences. Based on these results, the authors propose a set of concrete services which could be offered by such a network and which could help the user to deal with the scientific information process. The paper concludes with an outlook upon further possible research topics. 相似文献
15.
Radial basis function method for 1-D and 2-D groundwater contaminant transport modeling 总被引:1,自引:0,他引:1
In this paper we develop a meshless method for modeling groundwater contaminant transport. The algorithm uses collocation method with radial basis functions. Numerical results are presented for several cases: pure diffusion; advection and dispersion for continuous source; advection and dispersion for instantaneous source; advection and dispersion for patch-source. The results show that the method is very simple and accurate.Jichun Li likes to thank the UNLV Research Office for the NIA grant support for this project. This work is also partially supported by Nevada EPSCoR. The authors are very grateful to the reviewers for their valuable comments on improving this paper. 相似文献
16.
Bayesian networks are quantitative modeling tools whose applications to the maritime traffic safety context are becoming more popular. This paper discusses the utilization of Bayesian networks in maritime safety modeling. Based on literature and the author's own experiences, the paper studies what Bayesian networks can offer to maritime accident prevention and safety modeling and discusses a few challenges in their application to this context. It is argued that the capability of representing rather complex, not necessarily causal but uncertain relationships makes Bayesian networks an attractive modeling tool for the maritime safety and accidents. Furthermore, as the maritime accident and safety data is still rather scarce and has some quality problems, the possibility to combine data with expert knowledge and the easy way of updating the model after acquiring more evidence further enhance their feasibility. However, eliciting the probabilities from the maritime experts might be challenging and the model validation can be tricky. It is concluded that with the utilization of several data sources, Bayesian updating, dynamic modeling, and hidden nodes for latent variables, Bayesian networks are rather well-suited tools for the maritime safety management and decision-making. 相似文献
17.
18.
This paper addresses the economic feasibility of measures to reduce the material damage of transport companies. Results are presented of a series of interviews among transport companies as well as from a postal questionnaire survey. Next, calculations are presented for three types of companies: a small family company, a large family company and a large formalised company. From the viewpoint of costs and benefits, damage prevention measures appear to be particularly interesting to larger companies. Small companies, being the largest group, tend to have an informal culture in which measures are less effective. Especially those measures for which no large investments are needed, which influence the behaviour of drivers and need not to be contracted out, are perceived as attractive by the transport companies. 相似文献
19.
Qi Ma Anders Johansson Atsushi Tero Toshiyuki Nakagaki David J. T. Sumpter 《Journal of the Royal Society Interface》2013,10(80)
Biological systems that build transport networks, such as trail-laying ants and the slime mould Physarum, can be described in terms of reinforced random walks. In a reinforced random walk, the route taken by ‘walking’ particles depends on the previous routes of other particles. Here, we present a novel form of random walk in which the flow of particles provides this reinforcement. Starting from an analogy between electrical networks and random walks, we show how to include current reinforcement. We demonstrate that current-reinforcement results in particles converging on the optimal solution of shortest path transport problems, and avoids the self-reinforcing loops seen in standard density-based reinforcement models. We further develop a variant of the model that is biologically realistic, in the sense that the particles can be identified as ants and their measured density corresponds to those observed in maze-solving experiments on Argentine ants. For network formation, we identify the importance of nonlinear current reinforcement in producing networks that optimize both network maintenance and travel times. Other than ant trail formation, these random walks are also closely related to other biological systems, such as blood vessels and neuronal networks, which involve the transport of materials or information. We argue that current reinforcement is likely to be a common mechanism in a range of systems where network construction is observed. 相似文献
20.
In this paper, a repairable circular consecutive-k-out-of-n:F system with one repairman is studied. It is assumed that the working time and the repair time of each component are both exponentially distributed and every component after repair is ‘as good as new’. Each component is classified as either a key component or an ordinary component. Key components have priority in repair when failed. By using the definition of generalized transition probability, the state transition probabilities of the system are derived. Important reliability indices are evaluated for an example. 相似文献