Error resilience for block loss with overlapped motion compensation

Author(s):  
Mei-Juan Chen ◽  
Liang-Gee Chen ◽  
Ruei-Xi Chen
2010 ◽  
Vol E93-C (3) ◽  
pp. 253-260 ◽  
Author(s):  
Xianmin CHEN ◽  
Peilin LIU ◽  
Dajiang ZHOU ◽  
Jiayi ZHU ◽  
Xingguang PAN ◽  
...  

Author(s):  
P Triantafyllou ◽  
◽  
J Liu ◽  
G. Z Yang ◽  
S Giannarou

Author(s):  
MP Ramachandran ◽  
MK Agarwal ◽  
DA Daniel

Image registration is important in geostationary weather satellites. Achieving consistent registration of the images with respect to the geographical locations on the Earth is here of interest. The consistency in the registration between the images is affected whenever the orbital inclination and eccentricity are not zero. The imaging payload has a two-axis scanning mirror to capture the Earth image. The above orbital effects together with scan mirror pointing direction are the factors that cause the misregistration. This paper presents an onboard algorithm that provides the scan compensation angles due to the above factors and achieves consistent registration. The compensation varies every second, which is the time taken for each scan. Hence it is preferred to have computations onboard than to have ground based bulk uplinks for the scan compensation. The paper presents an algorithm that is useful, say, when (i) the onboard computing capabilities are limited, (ii) the navigation accuracies are coarse and (iii) the image resampling is not preferred on the ground and the payload data are directly used for weather applications. The paper also discusses the tests that were carried on the onboard software in order to validate its performance in achieving the consistent registration before launch. This is done by using another independent software tool which is also described in detail. Image motion algorithm was invoked for a couple of days in INSAT 3DR. The atmospheric wind vector deduced directly from the satellite images is given at the end.


2021 ◽  
Vol 26 (4) ◽  
pp. 1-31
Author(s):  
Pruthvy Yellu ◽  
Landon Buell ◽  
Miguel Mark ◽  
Michel A. Kinsy ◽  
Dongpeng Xu ◽  
...  

Approximate computing (AC) represents a paradigm shift from conventional precise processing to inexact computation but still satisfying the system requirement on accuracy. The rapid progress on the development of diverse AC techniques allows us to apply approximate computing to many computation-intensive applications. However, the utilization of AC techniques could bring in new unique security threats to computing systems. This work does a survey on existing circuit-, architecture-, and compiler-level approximate mechanisms/algorithms, with special emphasis on potential security vulnerabilities. Qualitative and quantitative analyses are performed to assess the impact of the new security threats on AC systems. Moreover, this work proposes four unique visionary attack models, which systematically cover the attacks that build covert channels, compensate approximation errors, terminate normal error resilience mechanisms, and propagate additional errors. To thwart those attacks, this work further offers the guideline of countermeasure designs. Several case studies are provided to illustrate the implementation of the suggested countermeasures.


Sign in / Sign up

Export Citation Format

Share Document