Nt1310 Unit 6 Assignment 1

Decent Essays
We implemented the proposed algorithm in HM15.0 [4] of H.265/HEVC reference software and compared it with TZ Search in terms of computations (search speed measured by total encoding time and ME time) and performance (PSNR and bit rate). Average Speedup is defined as the ratio of the time of TZ search algorithm to the proposed algorithm.
Test conditions [8] for simulation are as follows:
1. Four different quantization parameters (QP=22, 27, 32, 37) to test the algorithm at different bit rates.
2. Encoder_ lowdelay_main configuration and main profile (Bit Depth=8) has been used.
3. Search range is set to 64.
The simulation platform is a PC with OS type Ubuntu14.04 LTS (64 bit), Processor: Intel CoreTM i7-4790 CPU @3.60GHz. The uncompressed test sequences used for simulation are standard test sequences [9] recommended by JCT-VC. Class A test sequences are not applicable for encoder_lowdelay_main configuration. List of test sequences used for simulation are as follows
…show more content…
Test Sequences
Class Test Sequence
Class B BQTerrace_1920X1080
Class C BQMall_832X480
Class D BlowingBubbles_416X240
Class E Johnny_1280X720

To calculate the computational efficiency of proposed algorithm total time saving and ME time saving measures are used. PSNR Gain and increase in Bit Rate are the performance quality measures
These are calculated as follows:

Time Saving = (16)

PSNR Loss = TZ PSNR – Proposed PSNR (17)

Bit Rate Increase=

Related Documents

  • Decent Essays

    Scott and Mia, I am not sure which one of your can help me, but in reconciling our account I have discovered a few issues and have some questions. The swiped amount on the reports provided for the GL reconciliation do not always match the swiped amount. I understand that a vendor can undercharge a charge and swipe a card multiple times, but I did not think they could process cards for more than the total payment amount. For example, in tying out our invoice for 2/28-3/6/2018 I found that the swiped amount ties to our invoice/what was paid out via our account, but the swiped amount is for a different amount than what was issued. In six of the seven instances where the swiped amount was different than the issued amount, the swiped amount…

    • 281 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Ilab 5 jerry Metcalf Keller Graduate School of Management Professor: Gregory Gleghorn 6/4/2017 VPN Connection The type of VPN connection solution that we will be using to connect user to the internet work will be the Cisco Any connect client and the RSA secureID. We will be going in to detail of how the connection process goes and also how to configure it. Both clients are required in order for the user to authenticate and connect to the company network. When the user is connected they will be able to do their job remotely and send and retrieve information remotely.…

    • 678 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1006 Words
    • 5 Pages

    Create new scope of server, Assign scope name and description. Now define a range of IP address, start and end date Now use any excusive address that is server IP address Now select lease duration, now configure DHCP [3] options now Insert router IP address which is 192.168.1.1 in my case, press next---> Next--->activate scope now--->then finish 5) Roaming Profile [4]: For creating of centrally profile [4] of all domain users’ roaming profile [4] is use. In roaming profile we simply share and folder and assign it to all authorized domain user.…

    • 1006 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 6 Assignment

    • 502 Words
    • 3 Pages

    After staying with my friend over Thanksgiving, we had to head back home and meet my parents. We were going to meet them part way, so they did not have to drive as far. From State College, where my friend and I were, to Slippery Rock, where I live, is 142 miles. My parents left at 11:15 a.m., while we left a few minutes later, at 11:24 a.m. My parents were going 67 miles per hour, while we were travelling at a rate of 71 miles per hour.…

    • 502 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The main purpose of such record is to categorization and timeless storage of the patient information along with maximizing interoperability between easily shareable system and secured electronic records. For a successful implementation of EHR system, there are six basic areas which need to be taken into account. The foremost being the appropriate leadership. For any kind of transformation or change implementation in an organization, influence should be in “top to down” form so as to create maximum impact on the majority class of people (Nguyen, Bellucci, & Nguyen, 2014). The leadership should be highly committed to make the implementation as an organizational priority.…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ANALYSIS AND DESIGN OF CUCKOO ALGORITHM Cuckoo search (CS) is an optimization algorithm developed by Xin-she Yang and Suash Deb in 2009. It was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host birds can engage direct conflict with the intruding cuckoos. For example, if a host bird discovers the eggs are not their own, it will either throw these alien eggs away or simply abandon its nest and build a new nest elsewhere. Some cuckoo species such as the New World brood-parasitic Tapera have evolved in such a way that female parasitic cuckoos are often very specialized in the mimicry in colors and pattern of the eggs of a few chosen host species Cuckoo…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    PICT Case Study

    • 1546 Words
    • 7 Pages

    There are three core principles in developing PICT which are speed in generating test, ease of use and extensibility of core engine. PICT take input of plain-text file that specified by tester as test factor (parameters) and test factor values (values of parameter) (Czerwonka, 2006). Two phases need to be passed through in order to generate test cases in PICT, preparation and generation. Firstly, all information needed in generation phase need to be computed in preparation phase. This information includes parameter-interaction structure that defined interaction of values to be covered.…

    • 1546 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    RESULTS AND DISCUSSION In order to investigate the performance of SFSA and ISFSA, simulation is carried out to eight test systems with and without integration of renewables. MATLAB 7.8 is the solution platform and the hardware configuration is Intel core i5 processor with 2GHz speed and 4 GB RAM. Parameter Selection of SFSA…

    • 814 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    4.1 The GABC Approach for Image Segmentation The GABC is the Genetic Artificial Bee Colony Algorithm. The proposed algorithm is the implementation of ABC algorithm with the key concept of GA technique. The GABC is actually the hybrid approach of Artificial Bee Colony Algorithm and the Genetic Algorithm. In this method we extend Genetic Algorithm with Artificial Bee Colony operators i:e Employed Bees and Onlooker Bees to improve the solution space named as Genetic Artificial Bee Colony Algorithm (GABCA).…

    • 2119 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    The asynchronous algorithm is thus very similar to the synchronous algorithm, except that we update as much information as possible after each design point is analyzed. The inertia is only applied when design iteration is completed. Of course, this could result in some points of the next design iteration being analyzed before the inertia operator is applied for that design iteration. However, the influence on the overall performance of the algorithm seems to be negligible [24]. IV.…

    • 1263 Words
    • 6 Pages
    Superior Essays