Vector Quantization
859 Followers
Recent papers in Vector Quantization
... 870 JZC Lai Image and Vision Computing 15 (1997) 867871 Table 2 The execution time of enci ading a real image (tiffany) for 3 different algorithms' Number of codewords Available encoding algorithm (seconds) EAWFC (seconds) E... more
Learning Vector Quantization (LVQ) is a popular class of nearest prototype classifiers for multiclass classification. Learning algorithms from this family are widely used because of their intuitively clear learning process and ease of... more
We propose a new algorithm for vector quantization, the Activity Equalization Vector quantization (AEV). It is based on the winner takes all rule with an additional supervision of the average node activities over a training interval and a... more
In the recent years, Internet multimedia applications have become very popular. Valuable multimedia content such as digital images, however, is vulnerable to unauthorized access while in storage and during transmission over a network.... more
This thesis encapsulates a study conducted to use Automatic Speech Recognition (ASR) techniques to identify dog barks from ambient recordings. To achieve this, four different classifiers are developed. The first of which relies on... more
A simple yet complex approach to modern sophistication. In this project we used the MFCC approach to build a unique and accurate coefficients extracting processor to extract feature from the voice stored in the database, then on the next... more
Compression is the art of representing the information in a compact form rather than in its original or uncompressed form. In other words, using the data compression, the size of a particular file can be reduced. This is very useful when... more
The paper presents a novel biometric authentication approach using Principal Component Analysis (PCA), Regularized-Linear Discriminant Analysis (R-LDA) and supervised neural networks. Low dimensional feature vectors of human face images... more
Is a classical quantization technique from signal processing that allows the modeling of probability density functions by the distribution of prototype vectors. It was originally used for data compression. It works by dividing a large... more
An internally analog, externally digital architecture for parallel vector-matrix multiplication is presented. A threetransistor unit cell combines a single-bit dynamic random-access memory and a charge injection device binary multiplier... more
This paper presents the architecture and VHDL design of a Two Dimensional Discrete Cosine Transform (2D-DCT) with Quantization and zigzag arrangement. This architecture is used as the core and path in JPEG image compression hardware. The... more
In this paper, automatic speaker recognition system is implemented by combining feature extraction and feature matching technique. Feature extraction method that is implemented by the Mel Frequency Cepstral Coefficients (MFCC). The Vector... more
A fundamental goal of image compression is to reduce the bit rate for transmission or data storage while maintaining an acceptable fidelity or image quality. To improve the classical lossless compression of low efficiency, a method of... more
A new unsupervised competitive learning rule is introduced, called the Self-organizing free-topology map (Softmap) algorithm, for nonparametric density estimation. The receptive fields of the formal neurons are overlapping,... more
In Part I of this paper , an equivalence between the concepts of fuzzy clustering and soft competitive learning in clustering algorithms is proposed on the basis of the existing literature. Moreover, a set of functional attributes is... more
Clustering is needed in various applications such as biometric person authentication, speech coding and recognition, image compression and information retrieval. Hundreds of clustering methods have been proposed for the task in various... more
This paper introduces a new approach to control and drive the DC motor, using speech recognition. The speech signal can be provided through microphone that is connected to computer. A DC motor connected through microcontroller can be... more
Speech recognition is always looked upon as a fascinating field in human computer interaction. It is one of the fundamental steps towards understanding human recognition and their behavior. This paper explicates the theory and... more
This paper presents some results on the possibilities offered by neural networks for human face recognition. In particular, two algorithms have been tested: learning vector quantization (LVQ) and multilayer perceptron (MLP). Two different... more
This paper introduces methods for reducing the table storage required for encoding and decoding with unstructured vector quantization (UVQ) or tree-structured vector quantization (TSVQ). Specifically, a low-storage secondary quantizer is... more
In this letter, a preliminary study of habituation in self-organizing networks is reported. The habituation model implemented allows us to obtain a faster learning process and better clustering performances. The habituable neuron is a... more
Multi-user wireless systems with multiple antennas can drastically increase the capac- ity while maintaining the quality of service requirements. The best performance of these systems is obtained at the presence of instantaneous channel... more
Clustering algorithms aim at modeling fuzzy (i.e., ambiguous) unlabeled patterns efficiently. Our goal is to propose a theoretical framework where the expressive power of clustering systems can be compared on the basis of a meaningful set... more
The issue of Automatic Relevance Determination (ARD) has attracted attention over the last decade for the sake of efficiency and accuracy of classifiers, and also to extract knowledge from discriminant functions adapted to a given data... more
In the recent years, Internet multimedia applications have become very popular. Valuable multimedia content such as digital images, however, is vulnerable to unauthorized access while in storage and during transmission over a network.... more
A full-rank under-determined linear system of equations Ax = b has in general infinitely many possible solutions. In recent years there is a growing interest in the sparsest solution of this equation-the one with the fewest non-zero... more
The pyramid image structure can be naturally adapted for progressive image transmission over low-speed channels and hierarchical image retrieving in computerized image archiving. An efficient pyramid image coding system using quadrature... more
This two part paper proposes an intelligent energy management agent (IEMA) for parallel hybrid vehicles. IEMA incorporates a driving situation identification component whose role is to assess the driving environment, the driving style of... more
Novel algorithms for vector quantization codebook design are presented in this paper. Two basic techniques are proposed. The first technique takes into consideration specific characteristics of the blocks of the training sequence during... more
The color satellite image compression technique by vector quantization can be improved either by acting directly on the step of constructing the dictionary or by acting on the quantization step of the input vectors. In this paper, an... more
Vector quantization is a compression technique which is used to compress the image data in the spatial domain. Since it is a lossy technique, so maintaining the image quality and the compression ratio is a difficult task. For this, the... more
This paper presents an efficient authentication method for JPEG images based on Genetic Algorithms (GA). The current authentication methods for JPEG images require the receivers to know the quantization table beforehand in order to... more
This paper studies an application of turbo codes to compressed image/video transmission and presents an approach to improving error control performance through joint channel and source decoding (JCSD). The proposed approach to JCSD... more
The design of feed-forward ADALINE neural networks can be split into two independent optimization problems.
This paper describes a method to randomly generate vectors of symbol probabilities so that the corresponding discrete memoryless source has a prescribed entropy. One application is to Monte Carlo simulation of the performance of noiseless... more
This paper reports our study of how to gain consistency of states in a ball-game typed Distributed Virtual Environment (DVE) with lag, in peer-to-peer (P2P) architecture. That is, we are studying how to reduce in real-time the difference... more
Fingerprints are imprints formed by friction ridges of the skin and thumbs. They have long been used for identification because of their immutability and individuality. Immutability refers to the permanent and unchanging character of the... more
This paper presents a novel Vector Quantizer codebook design using Fuzzy Possibilistic C Means (FPCM) clustering technique for image compression using Wavelet Packet. The idea is to achieve higher compression ratio based on clustering the... more
Nowadays, face detection plays important roles in many applications, such as: human-computer interaction, security and surveillance, face recognition etc. In this paper, a novel scheme for human face detection in color images under... more
Cet article pr~sente une nouvelle mdthode de codage audionum6rique h faible retard et & d~bit rdduit pour des applications ~mergentes en tdldcommunication telles que l'audioconfgrence ou la vidgoconf(rence. Le codeur dgveloppd permet de... more
This paper describes an encoding technique-multilevel block truncation coding-that preserves the spatial details in digital images while achieving a reasonable compression ratio. An adaptive quantizer-level allocation scheme is... more
The foremost issues with most of the existing selective encryption (SE) schemes of images are vulnerability to cryptographic and application specific attacks, reduction in the compression performance, insubstantial computational savings... more