Showing 401 - 420 results of 10,293 for search 'data coding', query time: 0.18s Refine Results
  1. 401

    A Review of the Accuracy of Crash Coding When Applied to Motorcycle Crashes by Liz de Rome, Christopher Hurren, Thomas Brandon

    Published 2024-11-01
    “…In Australia, crash type is defined by the last vehicle movement before the first crash impact. This coding system was originally based on police data for motor vehicle crashes but did not distinguish between vehicle types. …”
    Get full text
    Article
  2. 402

    Low error floor LT coding algorithm for unequal error protection by Xin SONG, Shuyan NI, Zhe ZHANG, Yurong LIAO, Tuofeng LEI

    Published 2022-06-01
    “…Objectives:Rateless LT code is designed to provide an ideal transport protocol for large-scale data distribution and reliable broadcasting.The rateless LT code has three excellent characteristics,namely link adaptation,the code rate can be switched seamlessly, and the feedback method is relatively simple. …”
    Get full text
    Article
  3. 403

    An Integer Erasure Correction Coding and Its Application for Security Enhancement of Encryption by Miodrag J. Mihaljevic, Aleksandar Radonjic, Nevena Mijajlovic, Lianhai Wang, Shujiang Xu

    Published 2025-01-01
    “…The proposed ECCs employ integer arithmetic to encode and decode data bits and can correct all data bytes, each affected by exactly two erasures. …”
    Get full text
    Article
  4. 404

    DECODING OF THE NONLINEAR ERROR CONTROL CODE ON THE BASIS OF CRYPTOGRAPHIC ALGORITHM OF RIJNDAEL by D. M. Bildziuk, S. B. Salomatin

    Published 2019-06-01
    “…The nonlinear error control code on the basis of cryptographic transformation of data through Rijndael algorithm is considered. …”
    Get full text
    Article
  5. 405

    The Effects of Code-switching on Teaching English from EFL Students’ Perspective by Sangar Othman Ibrahim.

    Published 2023-04-01
    “…To obtain data, for this study an open-ended questionnaire is used. …”
    Get full text
    Article
  6. 406

    Three-Dimensional Adaptive Modulation and Coding for DDO-OFDM Transmission System by Xi Chen, Zhenhua Feng, Ming Tang, Borui Li, Huibin Zhou, Songnian Fu, Deming Liu

    Published 2017-01-01
    “…To evaluate the performance of the proposed algorithm, we tailor the system parameters of direct detection optical OFDM (DDO-OFDM) to investigate the difference of effective data rate (EDR) between fixed schemes and proposed adaptive modulation and coding (AMC) schemes. …”
    Get full text
    Article
  7. 407

    Research on side information generation algorithm for Wyner-Ziv video coding by SONG Bin, HE Hong, LIU Hai-hua, QIN Hao

    Published 2010-01-01
    “…To reduce the block artifacts and ghosting artifacts of side-information frame in Wyner-Ziv video coding,an overlapped block bi-directional motion compensation algorithm based on the original-image correlation was proposed.Firstly,the correlation of the original image in the encoder is calculated and sent to the decoder.Secondly,the correlation data is used to motion estimation in the decoder to get more accurate motion vector.Then the side information is gener-ated by bi-directional motion compensation.Compared with the existing algorithm,the proposed method can increase the average PSNR(peak signal-to-noise ratio) by 1.5~3dB,and also significantly improve the subjective quality of the side information.…”
    Get full text
    Article
  8. 408

    A fast network coding scheme for mobile wireless sensor networks by Chen Han, Yuwang Yang, Xu Han

    Published 2017-02-01
    “…However, the linear dependence of coded packets caused by linear network coding will result in significant instability of the entire network during data transmission. …”
    Get full text
    Article
  9. 409

    CORRECTION OF DEPENDENT ERRORS BY THE TURBOcodec based ON ATTACHED evenly convolutional codes by E. G. Makeichik, A. I. Korolev, V. K. Kanapelka

    Published 2019-06-01
    “…The effectiveness of the proposed methods for data coding by two- and three-components turbocodes is evaluated. …”
    Get full text
    Article
  10. 410

    Validation of the Subchannel Code SUBCHANFLOW Using the NUPEC PWR Tests (PSBT) by Uwe Imke, Victor Hugo Sanchez

    Published 2012-01-01
    “…As part of the ongoing assessment efforts, the code has been validated by using experimental data from the NUPEC PWR Subchannel and Bundle Tests (PSBT). …”
    Get full text
    Article
  11. 411
  12. 412

    Network-coding-based two-way relay cooperation with energy harvesting by Shunwai Zhang, Rongfang Song, Tao Hong

    Published 2017-04-01
    “…We introduce a maximal ratio combining–based decoding algorithm for the proposed system to achieve coding gain and diversity gain. Furthermore, we analyze the outage probability and bit error rate of the system when the optimal antenna selection algorithm is adopted at the relay to transmit data. …”
    Get full text
    Article
  13. 413

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  14. 414

    Feature dependence graph based source code loophole detection method by Hongyu YANG, Haiyun YANG, Liang ZHANG, Xiang CHENG

    Published 2023-01-01
    “…Given the problem that the existing source code loophole detection methods did not explicitly maintain the semantic information related to the loophole in the source code, which led to the difficulty of feature extraction of loo-phole statements and the high false positive rate of loophole detection, a source code loophole detection method based on feature dependency graph was proposed.First, extracted the candidate loophole statements in the function slice, and gen-erated the feature dependency graph by analyzing the control dependency chain and data dependency chain of the candi-date loophole statements.Secondly, the word vector model was used to generate the initial node representation vector of the feature dependency graph.Finally, a loophole detection neural network oriented to feature dependence graph was constructed, in which the graph learning network learned the heterogeneous neighbor node information of the feature de-pendency graph and the detection network extracted global features and performed loophole detection.The experimental results show that the recall rate and F1 score of the proposed method are improved by 1.50%~22.32% and 1.86%~16.69% respectively, which is superior to the existing method.…”
    Get full text
    Article
  15. 415

    Indonesian-English Code Switching Used on Pita’s Life Youtube Channel by Ayuni Kabobu Heda, F.X. Ouda Teda Ena

    Published 2021-05-01
    “…The use of language styles such as code-switching become a trend. In this study, the researcher aims to analyze the reasons and social function of why the speaker of YouTube video uses code-switching in their vlog. …”
    Get full text
    Article
  16. 416

    Collaborative Music Creation Method Based on Image Collection of Lattice Code by Yuehua Xiang

    Published 2022-01-01
    “…After searching for a pair of dot codes with the shortest distance in the horizontal or vertical direction, starting from the first code point in the vertical direction and following the second code point. …”
    Get full text
    Article
  17. 417

    A survey on deep learning based joint source-channel coding by Tianjie MU, Xiaohui CHEN, Yiyun WANG, Lupeng MA, Dong LIU, Jing ZHOU, Wenyi ZHANG

    Published 2020-10-01
    “…Classical information theory shows that separate source-channel coding is asymptotically optimal over a point-to-point channel.As modern communication systems are becoming more sensitive to delays and bandwidth,it becomes difficult to adopt the assumption that such separate designs have unlimited computing power for encoding and decoding.Compared to joint source-channel coding,separate coding has proven to be sub-optimal when the bandwidth is limited.However,conventional joint source-channel coding schemes require complicated design.In contrast,data-driven deep learning brings new designing ideas into the paradigm.A summary of relevant research results was provided,which will help to clarify the way in which deep learning methods solve the joint source-channel coding problem and to provide an overviewof new research directions.Source compression schemes and end-to-end communication system models were firstly introduced,both based on deep learning,then two kinds of joint coding designs under different types of source,and potential problems of joint source-channel coding based on deep learning and possible future research directions were introduced.…”
    Get full text
    Article
  18. 418

    THE USE OF CODE-SWITCHING AMONG THE LATE ADOLESCENTS IN SOCIAL MEDIA FACEBOOK by Indah Sari Lubis, Satyawati Surya, Adinda Usin Muka

    Published 2017-12-01
    “…This study discussed the use of code-switching among the late adolescents in social media Facebook. …”
    Get full text
    Article
  19. 419

    Post-Quantum Homomorphic Encryption: A Case for Code-Based Alternatives by Siddhartha Siddhiprada Bhoi, Arathi Arakala, Amy Beth Corman, Asha Rao

    Published 2025-05-01
    “…We compare lattice-based and code-based homomorphic encryption solutions identifying challenges that have inhibited the progress of code-based schemes. …”
    Get full text
    Article
  20. 420

    An analysis of the impact of India’s Labour Codes on its organized and unorganized sectors by Rajrishi Ramaswamy, Dr. Anuradha Binnuri

    Published 2023-12-01
    “…The analysis on the unorganized sector is also significant as it highlights the lacunae in the existing laws and also emphasizes on the insufficient reforms ushered in by the Labour Codes. The article uses the doctrinal methodology of legal research to gather and analyze the data. …”
    Get full text
    Article