Nt1310 Unit 6 Assignment 1

Decent Essays
We implemented the proposed algorithm in HM15.0 [4] of H.265/HEVC reference software and compared it with TZ Search in terms of computations (search speed measured by total encoding time and ME time) and performance (PSNR and bit rate). Average Speedup is defined as the ratio of the time of TZ search algorithm to the proposed algorithm.
Test conditions [8] for simulation are as follows:
1. Four different quantization parameters (QP=22, 27, 32, 37) to test the algorithm at different bit rates.
2. Encoder_ lowdelay_main configuration and main profile (Bit Depth=8) has been used.
3. Search range is set to 64.
The simulation platform is a PC with OS type Ubuntu14.04 LTS (64 bit), Processor: Intel CoreTM i7-4790 CPU @3.60GHz. The uncompressed test sequences used for simulation are standard test sequences [9] recommended by JCT-VC. Class A test sequences are not applicable for encoder_lowdelay_main configuration. List of test sequences used for simulation are as follows
…show more content…
Test Sequences
Class Test Sequence
Class B BQTerrace_1920X1080
Class C BQMall_832X480
Class D BlowingBubbles_416X240
Class E Johnny_1280X720

To calculate the computational efficiency of proposed algorithm total time saving and ME time saving measures are used. PSNR Gain and increase in Bit Rate are the performance quality measures
These are calculated as follows:

Time Saving = (16)

PSNR Loss = TZ PSNR – Proposed PSNR (17)

Bit Rate Increase=

Related Documents

  • Decent Essays

    Nt1310 Unit 1 Exercise 1

    • 551 Words
    • 3 Pages

    In this section the fast-recovery algorithm that makes TCP NewReno[1] perform better than the Reno[3], is described. During congestion avoidance if the sender receives triple duplicate ACKs, then it performs fast-retransmission and enters into fast-recovery. In fast-retransmit the sender retransmits the lost segment,sets the threshold value for slow-start as ssthresh = cwnd/2, and sets congestion window, cwnd = ssthresh+3 segments. In fast-recovery, the sender increases its congestion window by one segment for each subsequent duplicate ACK received that indicates a segment is reaching the destination. It can transmit new segments if permitted by its congestion window.…

    • 551 Words
    • 3 Pages
    Decent Essays
  • Great Essays

    Nt2580 Unit 6 Lab 1

    • 1713 Words
    • 7 Pages

    OMIS 660 Business Computing Environment and Network Lab - 1 REPORT TCP: Transmission Control Protocol SUMMARY: The idea of TCP congestion control is for each sender to determine the available capacity in the network so that it knows how many packets can be safely transmitted. The congestion window is a state variable for each connection which is used by the sender to limit how much data a sender can transmit into the network before receiving an acknowledgement. This report consist of the simulation of different model of TCP transmission which demonstrates the congestion control using the variation of dynamic window size implemented by TCP (Transmission Control Protocol). Various models are considered where packet drop rates are varied for demonstration of different situations from…

    • 1713 Words
    • 7 Pages
    Great Essays
  • Decent Essays

    Due to the age of the existing equipment, four new Cisco Catalyst 3560 V2 24 port switches will be use and configure for network redundancy by connecting each switch in a multiple links, single IP address with routing protocol Border Gateway Protocol (BGP). This multi-homing will detect when one of the links fail and not send traffic over that link anymore until the issue is resolved. This redundancy configuration will meet Western County Bank management requirement reducing unplanned outages and regular maintenance performed on the network equipment supporting 10 GB links as well as static or LACP-based (link aggregation control protocol) network interface controller (NIC) teaming. The Time Warner Cable, Business, Dedicated Internet Access, and AT&T Uverse Business Internet service will provide redundancy to the Internet…

    • 452 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 4-Qm Analysis

    • 482 Words
    • 2 Pages

    It accepts an M-ary value that specifies a predefined symbol map with the number of distinct symbol map values to use as symbols. samples per symbol specifies an even, positive number of samples dedicated to each symbol. Multiply this value by the symbol rate to determine the sample rate. The default value is 16. symbol values specifies an array of symbol values with an order that corresponds to the symbol map.…

    • 482 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Additional wellbeing has been incorporated into this outline by making a "loopbacks" to the zero tally, with a yield of zero if the information state to the counter is inconceivable for the present number that it is on (for instance, a data condition of 010—NS, when the present check is 101—5, the NS tally ought to have as of now circled back). By circling back to zero, this will give the framework's movement express a more drawn out time to determine an "undetermined" state. Test Strategy: With a specific end goal to test the counter outline, we have chosen to test just a predetermined number of cases and test to see whether the configuration a) tallies accurately, and b) sends the yield T high at the right times. To do this, we will pick two or three states to…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    A routing loop is a situation that occurs between two or more routers in which a packet is continuously routed between the routers as a result of irregularities from the routing algorithms and/or the routing tables of the routers. (routing loops, 2015). An example is when three routers are connected in a triangular pattern i.e. router A is connected to router B, router B is connected to router C and router C is connected to router A, when the network is converged, all three routers will have sent their routing tables to their neighbors. If router C goes down and router B tries to send a packet to C at the same time the router went down before it receives an updated table from router A, it will look into its routing table and it sees that router A can get to C, so it will update its route to C through A and will send the packet through router A. the same thing happens when router A receives the packet from router B, since it received no update on a change from B, it also checks its table and sees that B can get to C, so it updates its route to C through B and sends the packet to B and the packet keeps getting sent this way until the maximum hop count is reached…

    • 677 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    I affixed a hold tag on container #28, which was formerly known as container #9 and it was bulk packaged in my presence. As Katie mentioned below, the bulk packaging only requires the operator to remove and change the drum label, thus the container is easy to locate and sample. Let me know if there is anything that I can do to…

    • 63 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Professor Doupé, Thank you for your reply, and for your questions. We are excited to potentially have your guidance in our research, and hope we have provided clear explanations to your questions below: 1. SSL/TLS encryption secures data flowing between client and server. Using SSL during an authentication attempt could provide a secure way for a non malicious server to authenticate with the device, while blocking out sign in attempts from malware. 2.…

    • 682 Words
    • 3 Pages
    Decent Essays
  • Decent Essays

    After choosing scenario number three, I determined there was no conflict of principles or values in regards to me making the right decision. The nurse was in violation of hospital policy and in violation of HIPPA, which requires me to report the situation for patient safety. I would report what I saw to the charge nurse, instead of approaching the senior nurse and possibly having the situation become hostile. The ANA provision that mainly applies to the situation would be provision 3.1, which is the protection of the rights of privacy and confidentiality of the patient. The nurse violated this provision by looking in the chart of the patient in order to learn why the patient sought care.…

    • 191 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Assignment

    • 502 Words
    • 3 Pages

    After staying with my friend over Thanksgiving, we had to head back home and meet my parents. We were going to meet them part way, so they did not have to drive as far. From State College, where my friend and I were, to Slippery Rock, where I live, is 142 miles. My parents left at 11:15 a.m., while we left a few minutes later, at 11:24 a.m. My parents were going 67 miles per hour, while we were travelling at a rate of 71 miles per hour.…

    • 502 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    ANALYSIS AND DESIGN OF CUCKOO ALGORITHM Cuckoo search (CS) is an optimization algorithm developed by Xin-she Yang and Suash Deb in 2009. It was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host birds can engage direct conflict with the intruding cuckoos. For example, if a host bird discovers the eggs are not their own, it will either throw these alien eggs away or simply abandon its nest and build a new nest elsewhere. Some cuckoo species such as the New World brood-parasitic Tapera have evolved in such a way that female parasitic cuckoos are often very specialized in the mimicry in colors and pattern of the eggs of a few chosen host species Cuckoo…

    • 917 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    PICT Case Study

    • 1546 Words
    • 7 Pages

    There are three core principles in developing PICT which are speed in generating test, ease of use and extensibility of core engine. PICT take input of plain-text file that specified by tester as test factor (parameters) and test factor values (values of parameter) (Czerwonka, 2006). Two phases need to be passed through in order to generate test cases in PICT, preparation and generation. Firstly, all information needed in generation phase need to be computed in preparation phase. This information includes parameter-interaction structure that defined interaction of values to be covered.…

    • 1546 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    The asynchronous algorithm is thus very similar to the synchronous algorithm, except that we update as much information as possible after each design point is analyzed. The inertia is only applied when design iteration is completed. Of course, this could result in some points of the next design iteration being analyzed before the inertia operator is applied for that design iteration. However, the influence on the overall performance of the algorithm seems to be negligible [24]. IV.…

    • 1263 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    RESULTS AND DISCUSSION In order to investigate the performance of SFSA and ISFSA, simulation is carried out to eight test systems with and without integration of renewables. MATLAB 7.8 is the solution platform and the hardware configuration is Intel core i5 processor with 2GHz speed and 4 GB RAM. Parameter Selection of SFSA…

    • 814 Words
    • 4 Pages
    Great Essays
  • Superior Essays

    4.1 The GABC Approach for Image Segmentation The GABC is the Genetic Artificial Bee Colony Algorithm. The proposed algorithm is the implementation of ABC algorithm with the key concept of GA technique. The GABC is actually the hybrid approach of Artificial Bee Colony Algorithm and the Genetic Algorithm. In this method we extend Genetic Algorithm with Artificial Bee Colony operators i:e Employed Bees and Onlooker Bees to improve the solution space named as Genetic Artificial Bee Colony Algorithm (GABCA).…

    • 2119 Words
    • 9 Pages
    Superior Essays