Showing 1 - 20 results of 62 for search 'code machine scheme', query time: 0.10s Refine Results
  1. 1
  2. 2

    Joint vibrotactile coding for machine recognition and human perception by Ying FANG, Yiwen XU, Tiesong ZHAO

    Published 2023-05-01
    “…In order to accurately transmit the content meaning of vibrotactile signals and achieve intelligent recognition and signal reconstruction, a joint vibrotactile coding scheme for machine recognition and human perception was proposed.At the encoding end, the original three-dimensional vibrotactile signals were converted into one-dimensional signals.Then the semantic information of the signals was extracted using a short-time Fourier transform before being effectively compressed and transmitted.At the decoding end, a fully convolutional neural network was used to intelligently recognize based on the semantic information.The difference between the original signals and the reconstructed signals based on semantic information was used as compensation for the semantic information, and the quality of the reconstructed signals was gradually improved to meet human perceptual needs.The experimental results show that the proposed scheme achieve tactile recognition with semantic information at a lower bit rate while improving the compression efficiency of tactile data, thus satisfying human perceptual needs.…”
    Get full text
    Article
  3. 3

    AMC With a BP-ANN Scheme for 5G Enhanced Mobile Broadband by Li-Sheng Chen, Wei-Ho Chung, Ing-Yi Chen, Sy-Yen Kuo

    Published 2025-01-01
    “…AMC technologies use channel state information to select the optimal modulation or coding scheme as well as transmission parameters to improve the transmission speed, transmission quality, and spectrum efficiency of links. …”
    Get full text
    Article
  4. 4

    Tradeoff between compression ratio and decoding delay of distributed source coding for uplink transmissions in machine-type communication by Wen Wang, Jinkang Zhu, Sihai Zhang, Wuyang Zhou

    Published 2018-07-01
    “…We analyze how the decoding delay and storage consumption scale with the number of users and prove that the average decoding delay grows linearly with the user number under some assumptions. A machine-type communications uplink transmission scheme adopting clustered distributed source coding is proposed to balance the compression ratio and decoding delay of distributed source coding where users are divided into independently encoded and decoded clusters. …”
    Get full text
    Article
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11

    FPGA implementation of high throughput encoder and decoder design of lossless canonical Huffman machine by Erna Guguloth, Saidulu Vadtya, Thirumalesu Kudithi, Muni Rathnam Shanmugam, Ashok Nayak Banoth

    Published 2025-06-01
    “…Traditional compression and decompression schemes suffer from data loss, low throughput, and high encoding time. …”
    Get full text
    Article
  12. 12

    Privacy cloud storage scheme based on fog computing by Jiyuan ZHOU, Hao LUO, Lei QIU, Tian WANG

    Published 2019-03-01
    “…As one of the core applications in cloud computing field,cloud storage attracts a large number of users depending on its powerful storage capacity.However,in this storage schema,users’ data is stored completely in cloud server.In other word,users’ right of control on data is lost and users are facing privacy leakage risk.Traditional privacy protection scheme is usually based on encryption technology,but the attack from the inside of cloud server can’t be resisted effectively by these kinds of methods.Once the password gets compromised,users’ data will be stolen.In order to solve this problem,a three-level secure cloud storage scheme based on fog computing was proposed and a Hash-Solomon code algorithm was designed.A small part of data was stored in local machine and fog server,which can take full advantage of cloud storage and protect the privacy of data.Through the theoretical safety analysis and experimental test,the feasibility of our scheme is proved,and it is really a powerful supplement to existing cloud storage scheme.…”
    Get full text
    Article
  13. 13

    Defense scheme for the world state based attack in Ethereum by Zhen GAO, Dongbin ZHANG, Xiao TIAN

    Published 2022-04-01
    “…Ethereum is taken as the representative platform of the second generation of blockchain system.Ethereum can support development of different distributed applications by running smart contracts.Local database is used to store the account state (named world state) for efficient validation of transactions, and the state root is stored in the block header to guarantee the integrity of the state.However, some researches revealed that the local database could be easily tempered with, and attackers can issue illegal transactions based on the modified account state to obtain illegitimate benefits.This world-state based security problem was introduced, and the preconditions for attack were analyzed.Compared with the two common security threats under the PoW (proof of work) consensus, it was found that when the attacker controls the same mining computing power, the world-state based attack brought higher risk, and the success rate approached 100%.In order to deal with this threat, a practical scheme for attack detection and defense was proposed accordingly.The secondary verification and data recovery process were added to the Ethereum source code.The feasibility and complexity of the proposed scheme was evaluated with single-machine multi-threading experiments.The proposed scheme improves Ethereum’s tolerance to malicious tampering of account state, and is applicable to other blockchain platforms applying local database for transaction validation, such as Hyperledger Fabric.In addition, the time and computational overhead brought by the proposed scheme are not prominent, so it has good applicability and induces acceptable impact on the performance of original system.…”
    Get full text
    Article
  14. 14

    EFFECTIVE MODELS AND SCHEMES OF CYCLIC ACTION DIGITAL DEVICES by N. I. Gudko

    Published 2018-06-01
    “…The work considersmodels and schemes of widespread digital devices of cyclic action. …”
    Get full text
    Article
  15. 15

    On the Achievable User Number of the Downlinks in Cellular-Based Machine-to-Machine Communications by Yingbo Li, Chen Chen, Lin Bai, Ye Jin

    Published 2012-09-01
    “…In cellular-based machine-to-machine (M2M) networks, supporting large number of machine-type communications (MTC) users (devices) has become a critical challenge in both the uplink and downlink channels. …”
    Get full text
    Article
  16. 16

    Successive Refinement for Lossy Compression of Individual Sequences by Neri Merhav

    Published 2025-03-01
    “…The matching achievability scheme is conceptually straightforward. We also consider the more general multiple description coding problem on a similar footing and propose achievability schemes that are analogous to the well-known El Gamal–Cover and the Zhang–Berger achievability schemes of memoryless sources and additive distortion measures.…”
    Get full text
    Article
  17. 17
  18. 18

    NeuralMag: an open-source nodal finite-difference code for inverse micromagnetics by C. Abert, F. Bruckner, A. Voronov, M. Lang, S. A. Pathak, S. Holt, R. Kraft, R. Allayarov, P. Flauger, S. Koraltan, T. Schrefl, A. Chumak, H. Fangohr, D. Suess

    Published 2025-06-01
    “…The library implements a novel nodal finite-difference discretization scheme that provides improved accuracy over traditional finite-difference methods without increasing computational complexity. …”
    Get full text
    Article
  19. 19
  20. 20

    Comparative Analysis of SEC DED, EVEN-ODD, and Pyramid Codes for Distributed Storage Systems: A MATLAB-Based Study by Huang Shouhan

    Published 2025-01-01
    “…The study concludes with recommendations for enhancing erasure coding effectiveness in distributed environments and suggests areas for future research, including hybrid coding schemes and machine learning optimizations.…”
    Get full text
    Article