|
|
|
Yin-Chen Lin, Jyun-Jie Wang, Sheng-Chih Yang and Chi-Chun Chen
This paper presents a joint source?channel image transmission model based on a modified trellis construction using variable-length and fixed-length codes. The model employs linear block trellis codes and a modified Bahl?Cocke?Jelinek?Raviv algorithm for ...
ver más
|
|
|
|
|
|
|
Jiyuan Tan, Limin Zhang and Zhaogen Zhong
Aiming to solve the problem of the distinction of scrambled linear block codes, a method for identifying the scrambling types of linear block codes by combining correlation features and convolution long short-term memory neural networks is proposed in th...
ver más
|
|
|
|
|
|
|
Sujanth Roy J, G Lakshminarayanan
Pág. 170 - 182
Polar codes have recently emerged as an error-correcting code and have become popular owing to their capacity-achieving nature. Polar code based communication system primarily consists of two parts, including Polar Encoder and Decoder. Successive Cancell...
ver más
|
|
|
|
|
|
|
Kazuki Nakamura, Koji Hori and Shoichi Hirose
Cryptographic hash functions play an essential role in various aspects of cryptography, such as message authentication codes, pseudorandom number generation, digital signatures, and so on. Thus, the security of their hardware implementations is an import...
ver más
|
|
|
|
|
|
|
Nicolai Moos, Carsten Juergens and Andreas P. Redecker
This paper describes a methodological approach that is able to analyse socio-demographic and -economic data in large-scale spatial detail. Based on the two variables, population density and annual income, one investigates the spatial relationship of thes...
ver más
|
|
|
|
|
|
|
Cheonshik Kim, Dong-Kyoo Shin, Ching-Nung Yang and Lu Leng
The image-based data hiding method is a technology used to transmit confidential information secretly. Since images (e.g., grayscale images) usually have sufficient redundancy information, they are a very suitable medium for hiding data. Absolute Moment ...
ver más
|
|
|
|
|
|
|
Giuseppe Antonio Pierro, Roberto Tonelli and Michele Marchesi
Many empirical software engineering studies show that there is a need for repositories where source codes are acquired, filtered and classified. During the last few years, Ethereum block explorer services have emerged as a popular project to explore and ...
ver más
|
|
|
|
|
|
|
Alla Gavrilova,Ihor Volkov,Yuliia Kozhedub,Roman Korolev,Oleksandr Lezik,Volodymyr Medvediev,Oleksandr Milov,Bogdan Tomashevsky,Andrii Trystan,Oksana Chekunova
Pág. 45 - 63
The development of computer technology has determined the vector for the expansion of services based on the Internet and ?G? technologies. The main requirements for modern services in the banking sector are security and reliability. At the same time, sec...
ver más
|
|
|
|
|
|
|
Marco Mondelli, S. Hamed Hassani and Rüdiger Urbanke
We consider the primitive relay channel, where the source sends a message to the relay and to the destination, and the relay helps the communication by transmitting an additional message to the destination via a separate channel. Two well-known coding te...
ver más
|
|
|
|
|
|
|
Marco Baldi, Alessandro Barenghi, Franco Chiaraluce, Gerardo Pelosi and Paolo Santini
Decoding of random linear block codes has been long exploited as a computationally hard problem on which it is possible to build secure asymmetric cryptosystems. In particular, both correcting an error-affected codeword, and deriving the error vector cor...
ver más
|
|
|
|