• No results found

code length

Riding  the  Saddle  Point:  asymptotics  of  the  capacity-achieving  simple  decoder  for  bias-based  traitor  tracing

Riding the Saddle Point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

... Asymptotically the first and second moment completely determine the shape of the probability distribution of the score, for an innocent user as well as for the coalition score. (The distribution becomes Gaussian in ...

15

Codes With Low Peak- To- Average Power Ratio For OFDM Systems

Codes With Low Peak- To- Average Power Ratio For OFDM Systems

... systems. Code set sizes have been derived, showing that reasonable coding rates can be achieved up to length ...the code length, while their PAP ratio is only 3 ...achievable code rate ...

8

Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

Riding the saddle point: asymptotics of the capacity-achieving simple decoder for bias-based traitor tracing

... Asymptotically, the first and second moments completely determine the shape of the probability distribution of the score, for an innocent user as well as for the coalition score. (The distribution becomes Gaussian in ...

18

A new MFCC code for spectral amplitude coding OCDMA system

A new MFCC code for spectral amplitude coding OCDMA system

... ‘DW’ code ( Wei and Ghafouri, 2002), Modified Double-Weight ‘MDW’ code (Aljunid and ...‘RD’ code (Hilal and all., 2009) and Flexible Cross Correlation ‘FCC’ code (Rashidi and ...the ...

5

FCM BPSO: ENERGY EFFICIENT TASK BASED LOAD BALANCING IN CLOUD COMPUTING

FCM BPSO: ENERGY EFFICIENT TASK BASED LOAD BALANCING IN CLOUD COMPUTING

... proposed code, named diagonal permutation shifting (DPS) code for the spectral-amplitude-coding (SAC) optical code-division multiple-access (OCDMA) ...DPS code is derived and constructed from ...

10

A note on reducing the computation time for minimum distance and equivalence check of binary linear codes

A note on reducing the computation time for minimum distance and equivalence check of binary linear codes

... Binary linear codes and self-dual codes in particular are extensively studied for the plethora of connections to communication, cryptography, combinatorial designs, among many. When computing self-dual codes one should ...

6

Construction of Short-Length High-Rates LDPC Codes Using Difference Families

Construction of Short-Length High-Rates LDPC Codes Using Difference Families

... (LDPC) code is linear-block error-correcting code defined by sparse parity-check ...The code is constructed using difference families from combinatorial ...resulting code, which is designed to ...

5

Intensification of Lempel ZIV Welch Algorithm

Intensification of Lempel ZIV Welch Algorithm

... 12bit code length for gaining better compression ratio from the small and medium ...the code length compression and using frequently entered string length compression, the intensified ...

5

Freeman chain code route length optimization using meta heuristic 
		techniques for handwritten character recognition

Freeman chain code route length optimization using meta heuristic techniques for handwritten character recognition

... Chain code is used as representation for an image in form of sequence of directional codes along the border or structure ...Chain Code (FCC) was used as data representation that uses 8- neighbourhood ...

9

Stochastic Complexity, Histograms and Hypothesis Testing of Homogeneity

Stochastic Complexity, Histograms and Hypothesis Testing of Homogeneity

... the code length (39) has a high probability to be larger than (40) if the null hypothesis H 0 is true, implying the test has a firm control of type I ...

30

Construction of Cryptosystem on the Basis of Triangular Codes

Construction of Cryptosystem on the Basis of Triangular Codes

... EXAMPLE 11. For a triangular code with n = 12 on the channel cryptosystem two messages 2 and 1 are transferred. These messages are coded by two codewords (according to table 4): 000000011001 and 000000000111, i.e. ...

8

A code-aided synchronization IP core for iterative channel decoders

A code-aided synchronization IP core for iterative channel decoders

... mated phase offset 8. The synchronization is done in two ˜ main steps. Initially, a (coarse) carrier synchronization is per- formed with the help of pilot symbols. Afterwards fine syn- chronization is done iteratively ...

6

A Uniform Parcel Delivery System Based on IoT

A Uniform Parcel Delivery System Based on IoT

... serial code and give it to the next one. The serial code doesn’t have the information about their parcels themselves, but it can serve as a link to the ad- dress of the database of their company or a ...

25

Effect of code rate variation on 
		performance of optical convolutionally coded IDMA using random and tree 
		interleavers

Effect of code rate variation on performance of optical convolutionally coded IDMA using random and tree interleavers

... as code rate (k/n) ...constraint length of encoder as ...the code like (1, 2) (1, 3) (1,4). Code rate are also changing as ½, 1/3, ¼ and variation of code rate on performance of OIDMA ...

6

Structure and dynamics of a gene network model incorporating small RNAs

Structure and dynamics of a gene network model incorporating small RNAs

... where b is the length of the protein binding sequence. For large systems, this relation results in an average con- nectivity considerably higher than has previously been ar- gued to occur in biological systems ...

8

On 2-Repeated Burst Codes

On 2-Repeated Burst Codes

... In section 2, we obtain bounds for codes detecting 2-repeated bursts of length b (fixed). Section 3 presents a bound for codes which can detect and simultaneously correct such 2-repeated bursts. In what follows a ...

13

A  Code-specific  Conservative  Model  for  the  Failure  Rate  of  Bit-flipping   Decoding  of  LDPC  Codes  with  Cryptographic  Applications

A Code-specific Conservative Model for the Failure Rate of Bit-flipping Decoding of LDPC Codes with Cryptographic Applications

... However, the efficient iterative algorithms used for decoding Low-Density Parity-Check (LDPC) and Moderate-Density Parity-Check (MDPC) codes are not bounded distance decoders, yielding a non-zero probability of obtaining ...

19

Convolution of Barker and Golay Codes for Low Voltage Ultrasonic Testing

Convolution of Barker and Golay Codes for Low Voltage Ultrasonic Testing

... Baker code and its main lobe is associated with that of the Barker code and Golay code pairs ...Barker code and no side lobe Golay code ...the code produced by the convolution of ...

16

Length estimators for two dimensional and three dimensional images using relative direction chain code

Length estimators for two dimensional and three dimensional images using relative direction chain code

... global length estimators received input as chain code ...chain code has clear advantages over the Freeman chain code and is applied in different ...chain code in different dimensions ...

27

Reliable Wireless Communication for Medical Devices Using Turbo Convolution Code

Reliable Wireless Communication for Medical Devices Using Turbo Convolution Code

... Wireless technology is now being used to bring significantly innovative products and services in the health- care sector, enabling new medical sensors, and treatment methods. In this paper, a new and improved com- ...

8

Show all 10000 documents...

Related subjects