Advances in Multimedia Information Processing-Pcm 2001

Advances in Multimedia Information Processing-Pcm 2001

Author: Heung-Yeung Shum

Publisher: Springer Science & Business Media

Published: 2001

Total Pages: 1171

ISBN-13: 3540426809

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second IEEE Pacific-Rim Conference on Multimedia (IEEE-PCM 2001), held in Beijing, China in October e2001. The revised 104 regular and 53 poster papers presented were carefully reviewed and selected from a total of 244 papers. The papers are organized in sections on wearable computing, retrieval techniques, coding techniques, systems, visions and graphics, face, multimedia retrieval, multimedia education, multimedia presentation and databases, data hiding, image and video coding, retrieval, speech and sound, networking, spoken dialog, multimedia security, multimedia networking, learning and recognition, and watermarking.


Joint Source Channel Coding Using Arithmetic Codes

Joint Source Channel Coding Using Arithmetic Codes

Author: Bi Dongsheng

Publisher: Springer Nature

Published: 2022-06-01

Total Pages: 69

ISBN-13: 3031016750

DOWNLOAD EBOOK

Based on the encoding process, arithmetic codes can be viewed as tree codes and current proposals for decoding arithmetic codes with forbidden symbols belong to sequential decoding algorithms and their variants. In this monograph, we propose a new way of looking at arithmetic codes with forbidden symbols. If a limit is imposed on the maximum value of a key parameter in the encoder, this modified arithmetic encoder can also be modeled as a finite state machine and the code generated can be treated as a variable-length trellis code. The number of states used can be reduced and techniques used for decoding convolutional codes, such as the list Viterbi decoding algorithm, can be applied directly on the trellis. The finite state machine interpretation can be easily migrated to Markov source case. We can encode Markov sources without considering the conditional probabilities, while using the list Viterbi decoding algorithm which utilizes the conditional probabilities. We can also use context-based arithmetic coding to exploit the conditional probabilities of the Markov source and apply a finite state machine interpretation to this problem. The finite state machine interpretation also allows us to more systematically understand arithmetic codes with forbidden symbols. It allows us to find the partial distance spectrum of arithmetic codes with forbidden symbols. We also propose arithmetic codes with memories which use high memory but low implementation precision arithmetic codes. The low implementation precision results in a state machine with less complexity. The introduced input memories allow us to switch the probability functions used for arithmetic coding. Combining these two methods give us a huge parameter space of the arithmetic codes with forbidden symbols. Hence we can choose codes with better distance properties while maintaining the encoding efficiency and decoding complexity. A construction and search method is proposed and simulation results show that we can achieve a similar performance as turbo codes when we apply this approach to rate 2/3 arithmetic codes. Table of Contents: Introduction / Arithmetic Codes / Arithmetic Codes with Forbidden Symbols / Distance Property and Code Construction / Conclusion


Image and Video Compression for Multimedia Engineering

Image and Video Compression for Multimedia Engineering

Author: Yun-Qing Shi

Publisher: CRC Press

Published: 2019-03-07

Total Pages: 636

ISBN-13: 1351578650

DOWNLOAD EBOOK

The latest edition provides a comprehensive foundation for image and video compression. It covers HEVC/H.265 and future video coding activities, in addition to Internet Video Coding. The book features updated chapters and content, along with several new chapters and sections. It adheres to the current international standards, including the JPEG standard.


Third Generation Wireless Systems: Post-Shannon signal architectures

Third Generation Wireless Systems: Post-Shannon signal architectures

Author: George M. Calhoun

Publisher: Artech House

Published: 2003

Total Pages: 511

ISBN-13: 1580530435

DOWNLOAD EBOOK

This book is about the technological foundations of the next generation of wireless networks for the mobile Internet. It places special emphasis on physical layer techniques and philosophies used in constructing interference-resistant wireless signals. A theoretical framework is developed around the idea of a post-Shannon approach to designing communications systems, viewing channel phenomena not as sources of degradation but as potential resources for additional information and signal robustness. Calhoun has worked in the wireless industry since 1980. Annotation (c)2003 Book News, Inc., Portland, OR (booknews.com).


Pulse Code Modulation Techniques

Pulse Code Modulation Techniques

Author: Bill Waggener

Publisher: Springer Science & Business Media

Published: 1995

Total Pages: 388

ISBN-13: 9780442014360

DOWNLOAD EBOOK

Pulse Code Modulation Techniques brings together the theory and practice of PCM at the physical layer, where the "bits meet the silicon", so to speak. The key topics of symbol encoding, detection and synchronization are discussed, in detail, both from a theoretical and a practical standpoint. Topics which have been largely absent in text books, such as multiplexing, formatting and format synchronization, are also considered. Although PCM evolved as a communication technology, it has become an important technology in data recording. In a sense, magnetic or optical media are just specialized communication media and the key technologies discussed in this book are just as important to recording applications as to communications. PCM codes used for magnetic recording applications are discussed along with traditional communication codes. The design, analysis and implementation of a PCM system requires knowledge of very specific techniques associated with detection, synchronization and coding. The techniques have evolved from both ad hoc methods and complex theory. One of the goals of this book is to bridge the gap between theory and practice in the key techniques. Matched filters are not only discussed theoretically, but means for implementing them are also considered. The same is true with symbol synchronization.