Showing 681 - 700 results of 10,293 for search 'data coding', query time: 0.30s Refine Results
  1. 681

    A Novel Jamming Method Based on Sine Function Secondary Modulation and Phase Coded Modulation by Guikun Liu, Guangyuan Li, Zhenyang Xu, Haoming Xu, Feng Ming, Liang Li, Chen Song, Zhengshuai Li, Peng Wang

    Published 2025-01-01
    “…The simulation results based on airborne SAR raw echo data verify the correctness of the theoretical model.…”
    Get full text
    Article
  2. 682

    Integrated Analysis of Long Noncoding RNA and Coding RNA Expression in Esophageal Squamous Cell Carcinoma by Wei Cao, Wei Wu, Fachun Shi, Xiaobing Chen, Lihua Wu, Ke Yang, Fu Tian, Minghui Zhu, Guoyong Chen, WeiWei Wang, Fred G. Biddle, Jianqin Gu

    Published 2013-01-01
    “…These data provide compelling evidence for a potential novel genomic biomarker of esophageal squamous cell cancer.…”
    Get full text
    Article
  3. 683
  4. 684
  5. 685

    Staying True to the Data by Ilse Doyer, Michael K. Ayomoh

    Published 2025-06-01
    “…Secondly, process data in the form of a coding rate time study and theoretical contribution rate, were tracked to monitor theoretical saturation objectively. …”
    Get full text
    Article
  6. 686

    Data-driven optimisation of variation of residual concentration to estimate the hydrogen diffusion coefficient and uptake via MATLABMendeley DataMendeley Data by Luca Gritti, Denny Coffetti, Marina Cabrini, Tommaso Pastore

    Published 2025-10-01
    “…This article presents the data collected during experimental solubility tests in University of Bergamo lab and the developed code to estimate the principal parameters for hydrogen uptake. …”
    Get full text
    Article
  7. 687

    AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 2. DEVELOPMENT OF A CORRELATION-TYPE TRANSCEIVER BASED ON A MULTI... by A. V. Varavin, G. P. Ermak, D. P. Kudryavtsev, O. S. Vasiliev, M. V. Balaban, S. S. Melnyk, V. M. Zheltov, O. V. Fateev

    Published 2025-06-01
    “…An algorithm for generating and decoding signals of a sub-noise correlation communication system has been implemented, using the spreading signal method for data transmission with noise-like Gold-code-based signals. …”
    Get full text
    Article
  8. 688

    AN INTERFERENCE-IMMUNE COMMUNICATION SYSTEM FOR DIGITAL DATA TRANSMISSION BASED ON A MULTI-CHANNEL CORRELATOR Part 1. DEVELOPMENT OF A SIGNAL FORMATION AND DECODING ALGORITHM FOR T... by A. V. Varavin, H. P. Yermak, D. P. Kudryavtsev, O. S. Vasiliev, M. V. Balaban, S. S. Melnyk, V. M. Zheltov, O. V. Fateev

    Published 2025-03-01
    “…An algorithm has been developed for generating and decoding from a sub-noise spread spectrum correlation communication system using DSSS technology. The processes of data formation and transmission by noise-like signals based on the Gold codes have been modeled. …”
    Get full text
    Article
  9. 689
  10. 690

    Hiding Techniques using Mp3 by Shyma Mohammed, Ahmed Nori

    Published 2010-12-01
    “…Here, some steganography techniques on sound (Low Bit Encoding, Phase Coding) has been used to apply them on MP3 file format which had been chosen as a cover for data transmission.…”
    Get full text
    Article
  11. 691

    Data Please!: Expanding the Role of Libraries in Data Science through Digital Scholarship by Halie Kerns

    Published 2025-07-01
    “…Objective: As data science becomes more integrated into research and teaching, libraries are well-positioned to support this work. …”
    Get full text
    Article
  12. 692

    Research on the high-performance transmission control protocol under lossy networks by Kai PAN, Hui LI

    Published 2014-07-01
    “…A novel redundancy parameter updating algorithm based on network coding combined TCP was proposed.Reduced coefficients linear network coding which could simplify decoding and simultaneously reduce the overhead in the header was involved in encoding process before data transmission.During the simulations,NS2 was used to test the communication under different lossy networks.Results showed that the new protocol which adopted this algorithm re-tained the fairness and outperformed the other protocols in effectiveness and adaptability especially under light-load net-works.…”
    Get full text
    Article
  13. 693

    Chloroplast genome sequencing and phylogenetic analysis of Brassica tournefortii Gouan (Brassicaceae) by Eun Su Kang, Dong Chan Son, Sang-Chul Kim

    Published 2025-08-01
    “…These findings provide essential chloroplast genome data for B. tournefortii, supporting research on species identification, evolutionary studies, and understanding species invasion mechanisms.…”
    Get full text
    Article
  14. 694

    Research on data management technology of shearer based on protocol matching and data compression by Zhongbin WANG, Dong WEI, Lei SI, Chaoquan LIANG, Chao TAN, Yihui ZHAO

    Published 2024-11-01
    “…Next, the switching sensor data compression algorithm based on the same state word and the analog sensor data compression algorithm based on the variable length coding are designed to improve the compression ratio of the real-time data of the shearer and reduce the overhead of the data storage subsystem. …”
    Get full text
    Article
  15. 695

    3D PCDM Probabilistic Shaping Transmission Scheme Based on Chaotic Constellation Mapping by Mengjie Wu, Bo Liu, Jianxin Ren, Yu Bai, Zeqian Guo, Shuyu Zhou, Yilan Ma, Gengyin Chen, Yongyi Yu, Xiangyu Wu, Yaya Mao, Feng Wang, Yongfeng Wu, Lilong Zhao

    Published 2023-01-01
    “…The bit error rate (BER) performance of the communication system is optimized by using the probabilistic shaping effect of PCDM and the strong correction performance of Polar code. Meantime the Logistic and Lorenz chaotic models are used to mask the constellation map for multiple times to ensure the security transmission of data. …”
    Get full text
    Article
  16. 696

    Mechanism for data recovery as a result of data corruption, infection and/or unauthorized modification by L. V. Cherkesova, V. A. Savelyev, E. A. Revyakina, A. R. Polulyakh, M. A. Sementsov

    Published 2025-04-01
    “…To develop the software module, a reversible incremental backup algorithm was chosen as the most suitable for the developed algorithm and more convenient to use.Conclusion. The proposed data recovery mechanism is a modern solution that ensures the safety of personal files in case of their damage. …”
    Get full text
    Article
  17. 697

    Simulating data breaches: Synthetic datasets for depicting personally identifiable information through scenario-based breachesMendeley DataMendeley Data by Abhishek Sharma, May Bantan

    Published 2025-02-01
    “…With hackers relentlessly disrupting cyberspace and the day-to-day operations of organizations worldwide, there are also concerns related to Personally Identifiable Information (PII). Due to the data breaches and the data getting dumped on the clear web or the dark web, there are serious concerns about how the different threat actors worldwide can misuse the data. …”
    Get full text
    Article
  18. 698

    Optimizing Energy Efficiency and Green Storage in RAID-6 Systems: Comparative Analyses of Error Correction Codes by Guo Pinyi

    Published 2025-01-01
    “…Despite their benefits, these systems are also associated with high energy consumption, significantly impacting the carbon footprint of data facilities. This study evaluates the energy efficiency of three prevalent error correction codes—Reed-Solomon, Row-Diagonal Parity (RDP), and Liberation Codes—applied within RAID-6 systems. …”
    Get full text
    Article
  19. 699

    Generative adversarial networks based adaptive modulation and coding for next-generation 5G communication systems by A. Manikandan, Rakesh Thoppaen Suresh Babu, S Jai Ganesh, T. Sanjay

    Published 2025-01-01
    “…Abstract In 5G based communication systems, adaptive modulation and coding (AMC) is a key approach that optimizes data transmission by constantly modifying modulation schemes and error correction coding by the current channel circumstances. …”
    Get full text
    Article
  20. 700

    Integer wavelet transform‐based secret image sharing using rook polynomial and hamming code with authentication by Sara Charoghchi, Zahra Saeidi, Samaneh Mashhadi

    Published 2024-12-01
    “…Also, utilising Hamming code lets us embed data with much less required modifications on the cover image which results in high‐quality stego images.…”
    Get full text
    Article