Showing 121 - 140 results of 4,609 for search '"code"', query time: 0.06s Refine Results
  1. 121

    Novel Chaos Secure Communication System Based on Walsh Code by Gang Zhang, Niting Cui, Tianqi Zhang

    Published 2015-01-01
    “…Also the multiuser interference is greatly suppressed due to the orthogonality of Walsh code.…”
    Get full text
    Article
  2. 122

    Stability of Bar Code Information Stored in Magnetic Nanowire Arrays by Eduardo Cisternas, Eugenio E. Vogel, Julián Faúndez

    Published 2017-01-01
    “…Firmware applications such as security codes, magnetic keys, and similar products can be stored in magnetic bar codes similar to optical bar codes. …”
    Get full text
    Article
  3. 123

    Network Coded Wireless Cooperative Multicast with Minimum Transmission Cost by Xiumin Wang, Jin Wang, Shukui Zhang

    Published 2012-10-01
    “…In this paper, we propose a network coded hybrid source and cooperative exchange scheme to determine when to stop the source sending and start the exchange process, so as to minimize the total transmission cost. …”
    Get full text
    Article
  4. 124
  5. 125

    INTER-LAYER BIT ALLOCATION FOR SCALABLE HIGH-EFFICIENCY VIDEO CODING by Võ Phương Bình

    Published 2016-06-01
    “…In this paper, an improved bit allocation algorithm is proposed at the frame level for the emerging Scalable High-efficiency Video Coding (SHVC) standard. At the spatial base and enhancement layers, the bit budget is derived jointly from the hierarchical level and the visual complexity of the current frame, where the latter is measured by the inter-layer predicted MAD (Mean Absolute Difference) to allocate the bit budget of each frame. …”
    Get full text
    Article
  6. 126
  7. 127
  8. 128

    Code Development in Coupled PARCS/RELAP5 for Supercritical Water Reactor by Po Hu, Paul Wilson

    Published 2014-01-01
    “…The new capability is added to the existing coupled code package PARCS/RELAP5, in order to analyze SCWR design under supercritical pressure with the separated water coolant and moderator channels. …”
    Get full text
    Article
  9. 129

    Lightweight Data Compression in Wireless Sensor Networks Using Huffman Coding by Henry Ponti Medeiros, Marcos Costa Maciel, Richard Demo Souza, Marcelo Eduardo Pellenz

    Published 2014-01-01
    “…Instead of attempting to devise novel ad hoc algorithms, we show that, given general knowledge of the parameters that must be monitored, it is possible to efficiently employ conventional Huffman coding to represent the same parameter when measured at different locations and time periods. …”
    Get full text
    Article
  10. 130

    Thermal-Hydraulic System Codes in Nulcear Reactor Safety and Qualification Procedures by Alessandro Petruzzi, Francesco D'Auria

    Published 2008-01-01
    “…In the last four decades, large efforts have been undertaken to provide reliable thermal-hydraulic system codes for the analyses of transients and accidents in nuclear power plants. …”
    Get full text
    Article
  11. 131

    A Multivariate and Spatiotemporal Analysis of Water Quality in Code River, Indonesia by Mochamad A. Pratama, Yan D. Immanuel, Dwinanti R. Marthanty

    Published 2020-01-01
    “…This study aims to analyze spatial and temporal trends in water quality in Code River in Indonesia and correlate these with land use and land cover changes over a particular period. …”
    Get full text
    Article
  12. 132

    Analysis of Edge Detection in Bar Code Symbols: An Overview and Open Problems by Saša Krešić-Jurić

    Published 2012-01-01
    “…Accurate edge localization is essential in bar code decoding. Since speckle noise is the most dominant form of noise in laser bar code scanners, it is important to fully understand its effects on edge detection. …”
    Get full text
    Article
  13. 133

    The target of a crime under the Article 330 of the Criminal Code of Ukraine by V. Yu. Boichuk

    Published 2018-12-01
    “…From the standpoint of philosophical ontology the author has determined the notion and nature of information constituting official information gathered in the course of operative and search or counterintelligence operations and in the defense sphere of the country as the target of a crime under the Art. 330 of the Criminal Code of Ukraine. The place of this information has been specified in the list of information types determined by the current legislation of Ukraine. …”
    Get full text
    Article
  14. 134

    An Adaptive Source-Channel Coding with Feedback for Progressive Transmission of Medical Images by Jen-Lung Lo, Saeid Sanei, Kianoush Nazarpour

    Published 2009-01-01
    “…A novel adaptive source-channel coding with feedback for progressive transmission of medical images is proposed here. …”
    Get full text
    Article
  15. 135
  16. 136

    Motorcycle Parking Security System based on Website and QR Code Technology by Riva Andra Yuni, Werman Kasoep, Desta Yolanda

    Published 2023-09-01
    “…The system uses a website accessible via smartphones using QR code. Users scan the provided QR code to access the website, where they will be prompted to enter a password that functions as a controller for the locking and unlocking process of the motorcycle's front wheel using a servo motor. …”
    Get full text
    Article
  17. 137
  18. 138

    Weight Distribution of Periodic Errors and Optimal/Anti-Optimal Linear Codes by Pankaj Kumar Das

    Published 2014-01-01
    “…The paper discusses weight distribution of periodic errors and then the optimal case on bounds of parity check digits for (n=n1+n2, k) linear codes over GF(q) that corrects all periodic errors of order r in the first block of length n1 and all periodic errors of order s in the second block of length n2 and no others. …”
    Get full text
    Article
  19. 139
  20. 140

    LDPC-cat codes for low-overhead quantum computing in 2D by Diego Ruiz, Jérémie Guillaud, Anthony Leverrier, Mazyar Mirrahimi, Christophe Vuillot

    Published 2025-01-01
    “…First, the hardware implementation of the code can be realised with short-range qubit interactions in 2D and low-weight stabilizers, under constraints similar to those of the popular surface code architecture. …”
    Get full text
    Article