Results 41 to 50 of about 18,445 (196)

Golay and other box codes [PDF]

open access: yes, 1992
The (24,12;8) extended Golay Code can be generated as a 6 x 4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity.
Solomon, G.
core   +1 more source

Fault-tolerance techniques for hybrid CMOS/nanoarchitecture [PDF]

open access: yes, 2010
The authors propose two fault-tolerance techniques for hybrid CMOS/nanoarchitecture implementing logic functions as look-up tables. The authors compare the efficiency of the proposed techniques with recently reported methods that use single coding ...
A. Melouki   +24 more
core   +1 more source

Hoffmann's two‐toed sloth II: Muscle architectural properties in the thoracic limb of Choloepus (Pilosa: Xenarthra)

open access: yesJournal of Anatomy, EarlyView.
Two‐toed sloths use their thoracic limbs for more frequent and greater suspensory support than three‐toed sloths and have muscle architectural properties consistent with stability of the pectoral girdle, enhanced flexor force/torque applied at the shoulder and elbow joints, and grip on the support as indicated by their myology. Abstract Two‐toed sloths
C. S. Tucker   +4 more
wiley   +1 more source

Biometric Template Protection for Dynamic Touch Gestures Based on Fuzzy Commitment Scheme and Deep Learning

open access: yesMathematics, 2022
Privacy plays an important role in biometric authentication systems. Touch authentication systems have been widely used since touch devices reached their current level of development.
Asrar Bajaber, Lamiaa Elrefaei
doaj   +1 more source

Scratching beneath the surface: Quantification of muscle architecture and myosin heavy chain content in the forelimbs of black‐tailed prairie dogs (Cynomys, Rodentia)

open access: yesJournal of Anatomy, EarlyView.
Black‐tailed prairie dogs are highly social ground squirrels that excavate communal burrow systems, most often in medium‐textured soils. Their forelimbs demonstrate morphofunctional trade‐offs for scratch‐digging and terrestrial ecology, including well‐developed and fast‐contracting proximal musculature with large mechanical advantage paired with ...
Luke A. Scheetz   +4 more
wiley   +1 more source

A Robust and Improved Visual Quality Data Hiding Method for HEVC

open access: yesIEEE Access, 2018
This paper presents a novel and robust data hiding method based on H.265/High Efficiency Video Coding (HEVC) standard. To improve the robustness of data hiding, the embedded data are first encoded into the encoded data by using the BCH syndrome code (BCH
Yunxia Liu   +4 more
doaj   +1 more source

Experimental Demonstration and Evaluation of BCH-Coded UWOC Link for Power-Efficient Underwater Sensor Nodes

open access: yesIEEE Access, 2022
Mobile nodes can encounter many challenges in underwater environments during communication due to turbidity, suspended particles, small bubbles, and turbulence. These factors cause absorption and scattering, ultimately corrupting optical signals.
Maaz Salman   +2 more
doaj   +1 more source

Parental Racial‐Ethnic Socialization and Competence in Asian Families

open access: yesJournal of Marriage and Family, EarlyView.
ABSTRACT Objective This study examined how Asian parents' racial‐ethnic socialization (RES) content with their younger children coalesces with their confidence in providing messages about managing discrimination. Background The COVID‐19 pandemic and ensuing rise in anti‐Asian discrimination in the United States prompted Asian parents to talk more about
Frances M. Lobo   +20 more
wiley   +1 more source

A Hybrid Information Reconciliation Method for Physical Layer Key Generation

open access: yesEntropy, 2019
Physical layer key generation (PKG) has become a research focus as it solves the key distribution problem, which is difficult in traditional cryptographic mechanisms.
Guyue Li, Zheying Zhang, Yi Yu, Aiqun Hu
doaj   +1 more source

Ternary Covering Codes Derived from BCH Codes

open access: yesJournal of Combinatorial Theory, Series A, 1997
The covering radius \(R\) of a code \(C\subset \mathbb F^n_q\) is the smallest integer such that every element in \(\mathbb F^n_q\) is within Hamming distance \(R\) of some codeword in \(C\). The authors construct new ternary linear codes with covering radius 2 by lengthening ternary BCH codes.
Cock, John C, Östergård, Patric R.J
openaire   +2 more sources

Home - About - Disclaimer - Privacy