Search alternatives:
quantization » quantitative (Expand Search)
Showing 141 - 160 results of 304 for search 'information quantization', query time: 0.07s Refine Results
  1. 141

    Performance Analysis of Superposition M-ary QAM Modulation in Coded Protograph LDPC MIMO Communication Systems With Low-Resolution ADCs by Duc A. Hoang, Hieu T. Nguyen, Thang N. Le

    Published 2025-01-01
    “…Our approach leverages a message-passing (MP) algorithm that decomposes each high-order symbol into multiple BPSK layers, enabling more tractable soft-interference cancellation and extrinsic information updates. To theoretically assess system performance, we further develop a modified Protograph Extrinsic Information Transfer (PEXIT) algorithm, which integrates the effects of MIMO fading, ADC quantization noise, and protograph LDPC decoding into a single analytical tool. …”
    Get full text
    Article
  2. 142
  3. 143

    Compressive-Sensing-Based Video Codec by Autoregressive Prediction and Adaptive Residual Recovery by Ran Li, Hongbing Liu, Rui Xue, Yanling Li

    Published 2015-08-01
    “…Specifically, to reduce the quantization errors of measurements, a nonuniform quantization is integrated into the DPCM-based quantizer. …”
    Get full text
    Article
  4. 144

    Secure performance analysis and pilot spoofing attack detection in cell-free massive MIMO systems with finite-resolution ADCs by Xianyu Zhang, Xiaoqiang Qiao, Tao Liang, Kang An

    Published 2022-01-01
    “…Besides, the additive quantization noise model is utilized to analyze the impacts of the low-resolution analog-to-digital converters. …”
    Get full text
    Article
  5. 145
  6. 146
  7. 147
  8. 148
  9. 149

    A Secure Communication Method for Unmanned Undersea Systems Oriented to Federated Learning by Jiajia WU, Ming XU

    Published 2025-04-01
    “…This method reduced the dimensionality of transmission gradients through orthogonal projection and quantization, thereby decreasing communication costs while preserving information integrity. …”
    Get full text
    Article
  10. 150

    Secure Audio Forensic Marking Alogrithm Using 2D Barcode in DWT-DFRNT Domain by De Li, JongWeon Kim

    Published 2014-01-01
    “…We created a robust and secure forensic marking algorithm through the process of hiding information in a two-dimensional (2D) barcode and embedding it into the discrete wavelet transformation-discrete fractional random transformation (DWT-DFRNT) domain using the quantization technique. …”
    Get full text
    Article
  11. 151

    Optimizing Semantic-Aware Video Compression Using Particle Swarm Optimization Technique for Automotive Applications by Vadivel Shanmugam, B. Uma Maheswari

    Published 2025-01-01
    “…Radar, lidar, cameras, ultrasonic, and other sensor units provide the required information for highly automated driving and pave the way for AM. …”
    Get full text
    Article
  12. 152

    A Robust H.264/AVC Video Watermarking Scheme with Drift Compensation by Xinghao Jiang, Tanfeng Sun, Yue Zhou, Wan Wang, Yun-Qing Shi

    Published 2014-01-01
    “…In our scheme, motion vector residuals of macroblocks with the smallest partition size are selected to hide copyright information in order to hold visual impact and distortion drift to a minimum. …”
    Get full text
    Article
  13. 153
  14. 154
  15. 155
  16. 156
  17. 157

    Improved sub-band JND model with textural decomposition and its application in perceptual image coding by Ming-kui ZHENG, Kai-xiong SU, Wei-xing WANG, Cheng-dong LAN, Xiu-zhi YANG

    Published 2014-06-01
    “…Considering the compatibility and the auxiliary information which would affect the encoding efficiency, the JND model was adjusted to the quantization process and re-moved more visual redundancy. …”
    Get full text
    Article
  18. 158
  19. 159

    Multiple Description Coding Using Data Hiding and Regions of Interest for Broadcasting Applications by M. Verza, N. Conci, G. Boato, F. G. B. De Natale

    Published 2009-01-01
    “…The residual part of the frame (the background) is instead modeled through a checkerboard pattern, alternating the strength of the quantization. The decoder is provided with the necessary side-information to reconstruct the frame properly, namely, the ROI parameters and location, via a suitable data hiding procedure. …”
    Get full text
    Article
  20. 160