|
This book examines distributed video coding (DVC) and multiple description coding (MDC), two novel techniques designed to address the problems of conventional image and video compression coding. Covering all fundamental concepts and core technologies, the chapters can also be read as independent and self-sufficient, describing each methodology in sufficient detail to enable readers to repeat the corresponding experiments easily. Topics and features: provides a broad overview of DVC and MDC, from the basic principles to the latest research; covers sub-sampling based MDC, quantization based MDC, transform based MDC, and FEC based MDC; discusses Sleplian-Wolf coding based on Turbo and LDPC respectively, and comparing relative performance; includes original algorithms of MDC and DVC; presents the basic frameworks and experimental results, to help readers improve the efficiency of MDC and DVC; introduces the classical DVC system for mobile communications, providing the developmental environment in detail. |
|
|
Automatic Digital Document Processing and Management: Problems, Algorithms and Techniques
This text reviews the issues involved in handling and processing digital documents. Examining the full range of a document’s lifetime, the book covers acquisition, representation, security, pre-processing, layout analysis, understanding, analysis of single components, information extraction, filing, indexing and retrieval. Features:... | | How to Succeed in College and Beyond: The Art of Learning
How to Succeed in College and Beyond is an insightful, inspired guide to the undergraduate experience that helps students balance the joy of learning with the necessity of career preparation.
-
Features a wealth of advice for getting the most from an undergraduate education, especially inthe areas of arts and...
| | Computer Security Handbook, Set
Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immediate financial, privacy, and safety consequences. This handbook has compiled advice from top professionals working in the real world about how to minimize the possibility of computer... |
|