Learn More
Two established surgical techniques, Y-U antral advancement flap pyloroplasty and inverted pylorus duodenal plasty are used to treat the pyloric stenosis in dogs. The study was conducted on twelve healthy dogs of same age and body weight. The dogs were divided into three groups i.e. Group A, B and C comprising four animals each. The dogs in group A and B(More)
Designing a trustworthy voting system that uses electronic voting machines (EVMs) for efficiency and accuracy is a challenging task. It is difficult, if not impossible, to ensure the trustworthiness of EVMs that possess computation, storage, and communication capabilities. Thus an electronic voting system that does not assume trusted EVMs is clearly(More)
In this paper, we present a minimal list decoding algorithm for Reed-Solomon (RS) codes. Minimal list decoding for a code C refers to list decoding with radius L, where L is the minimum of the distances between the received word r and any codeword in C. We consider the problem of determining the value of L as well as determining all the codewords at(More)
Existing literature on source coding with side information (SCSI) uses channel codes like LDPC codes and turbo codes and assumes classical unique decoding. In this paper, in contrast to classical decoding, we have taken the list decoding approach and show that the theoretical limit of SCSI can then be achieved. We argue that, as opposed to channel coding,(More)
Video coding techniques utilising background frames, provide better rate distortion performance by exploiting coding efficiency in uncovered background areas compared to the latest video coding standard. Parametric approaches such as the mixture of Gaussian (MoG) based background modeling has been widely used however they require prior knowledge about the(More)
Mutual exclusion problem is the problem of ensuring that certain portions of program code are executed within critical regions, where no two programs are permitted to be in critical regions at the same time. This problem arises in both centralized and distributed systems. Unfortunately, all the three basic approaches – centralized, distributed and token(More)
Due to the infrequent medium access in Wireless Sensor Networks (WSN), their MAC protocols are mostly based on CSMA. In this paper we present an efficient contention resolution scheme for CSMA based MAC protocols which is suitable for periodic data collection in WSNs. Taking into account that the number of nodes in a single cluster is fixed, this protocol(More)
Motion vectors of depth-maps in multiview and free-viewpoint videos exhibit strong spatial as well as inter-component clustering tendency. This paper presents a novel motion vector coding technique that first compresses the multidimensional bitmaps of macro block mode information and then encodes only the non-zero components of motion vectors. The bitmaps(More)
Motion vectors of depth-maps in multiview and free-viewpoint videos exhibit strong spatial as well as inter-component clustering tendency. This paper presents a novel coding technique that first compresses the multidimensional bitmaps of macroblock mode and then encodes only the non-zero components of motion vectors. The bitmaps are partitioned into(More)
In this paper, we consider a communication system that uses M-ary phase shift keying (MPSK), M-ary quadrature amplitude modulation (MQAM), M-ary differential phase shift keying (MDPSK) and M-ary pulse amplitude modulation (MPAM) to transmit information over a Rayleigh fading channel perturbed by additive white Gaussian noise (AWGN). We model the Rayleigh(More)