Here are two newest published articles talking about joint source channel coding, in which source coding is invovled scalable video coding. They are very useful for people who are doing research about it.
标签: source published articles channel
上传时间: 2013-12-03
上传用户:1427796291
With the advent of multimedia, digital signal processing (DSP) of sound has emerged from the shadow of bandwidth-limited speech processing. Today, the main appli- cations of audio DSP are high quality audio coding and the digital generation and manipulation of music signals. They share common research topics including percep- tual measurement techniques and analysis/synthesis methods. Smaller but nonetheless very important topics are hearing aids using signal processing technology and hardware architectures for digital signal processing of audio. In all these areas the last decade has seen a significant amount of application oriented research.
标签: multimedia processing the digital
上传时间: 2014-01-23
上传用户:xwd2010
UIT - Secteur de la normalisation des télécommunications ITU - Telecommunication Standardization Sector UIT - Sector de Normalización de las Telecomunicaciones Study Period 1997-2000 Commission d études Study Group Comisión de Estudio 16 Contribution tardive Delayed Contribution Contribución tardía D.xxx Geneva, 7-18 February 2000 Texte disponible seulement en Text available only in Texto disponible solamente en E Question(s): Q.15/SG16 SOURCE*: Nokia Inc. / Nokia Research Center 6000 Connection Drive Irving, Texas 75039 USA Tel : +12147976155 Fax : +19728944589 e-mail : marta.karczewicz@nokia.com TITLE: MVC Decoder Description
标签: Telecommunication Standardization communications normalisation
上传时间: 2013-12-24
上传用户:541657925
Many of the pattern fi nding algorithms such as decision tree, classifi cation rules and clustering techniques that are frequently used in data mining have been developed in machine learning research community. Frequent pattern and association rule mining is one of the few excep- tions to this tradition. The introduction of this technique boosted data mining research and its impact is tremendous. The algorithm is quite simple and easy to implement. Experimenting with Apriori-like algorithm is the fi rst thing that data miners try to do.
标签: 64257 algorithms decision pattern
上传时间: 2014-01-12
上传用户:wangdean1101
另一本介绍贝叶斯网络的经典教材,可以与Learning Bayesian Networks配合使用,相得益彰。
上传时间: 2014-01-05
上传用户:电子世界
The literature of cryptography has a curious history. Secrecy, of course, has always played a central role, but until the First World War, important developments appeared in print in a more or less timely fashion and the field moved forward in much the same way as other specialized disciplines. As late as 1918, one of the most influential cryptanalytic papers of the twentieth century, William F. Friedman’s monograph The Index of Coincidence and Its Applications in Cryptography, appeared as a research report of the private Riverbank Laboratories [577]. And this, despite the fact that the work had been done as part of the war effort. In the same year Edward H. Hebern of Oakland, California filed the first patent for a rotor machine [710], the device destined to be a mainstay of military cryptography for nearly 50 years.
标签: cryptography literature has Secrecy
上传时间: 2016-12-08
上传用户:fxf126@126.com
* Lightweight backpropagation neural network. * This a lightweight library implementating a neural network for use * in C and C++ programs. It is intended for use in applications that * just happen to need a simply neural network and do not want to use * needlessly complex neural network libraries. It features multilayer * feedforward perceptron neural networks, sigmoidal activation function * with bias, backpropagation training with settable learning rate and * momentum, and backpropagation training in batches.
标签: backpropagation implementating Lightweight lightweight
上传时间: 2013-12-27
上传用户:清风冷雨
% Train a two layer neural network with the Levenberg-Marquardt % method. % % If desired, it is possible to use regularization by % weight decay. Also pruned (ie. not fully connected) networks can % be trained. % % Given a set of corresponding input-output pairs and an initial % network, % [W1,W2,critvec,iteration,lambda]=marq(NetDef,W1,W2,PHI,Y,trparms) % trains the network with the Levenberg-Marquardt method. % % The activation functions can be either linear or tanh. The % network architecture is defined by the matrix NetDef which % has two rows. The first row specifies the hidden layer and the % second row specifies the output layer.
标签: Levenberg-Marquardt desired network neural
上传时间: 2016-12-27
上传用户:jcljkh
This function applies the Optimal Brain Surgeon (OBS) strategy for % pruning neural network models of dynamic systems. That is networks % trained by NNARX, NNOE, NNARMAX1, NNARMAX2, or their recursive % counterparts.
标签: function strategy Optimal Surgeon
上传时间: 2013-12-19
上传用户:ma1301115706
Train a two layer neural network with a recursive prediction error % algorithm ("recursive Gauss-Newton"). Also pruned (i.e., not fully % connected) networks can be trained. % % The activation functions can either be linear or tanh. The network % architecture is defined by the matrix NetDef , which has of two % rows. The first row specifies the hidden layer while the second % specifies the output layer.
标签: recursive prediction algorithm Gauss-Ne
上传时间: 2016-12-27
上传用户:ljt101007