Results 41 to 50 of about 18,445 (196)
Golay and other box codes [PDF]
The (24,12;8) extended Golay Code can be generated as a 6 x 4 binary matrix from the (15,11;3) BCH-Hamming Code, represented as a 5 x 3 matrix, by adding a row and a column, both of odd or even parity.
Solomon, G.
core +1 more source
Fault-tolerance techniques for hybrid CMOS/nanoarchitecture [PDF]
The authors propose two fault-tolerance techniques for hybrid CMOS/nanoarchitecture implementing logic functions as look-up tables. The authors compare the efficiency of the proposed techniques with recently reported methods that use single coding ...
A. Melouki +24 more
core +1 more source
Two‐toed sloths use their thoracic limbs for more frequent and greater suspensory support than three‐toed sloths and have muscle architectural properties consistent with stability of the pectoral girdle, enhanced flexor force/torque applied at the shoulder and elbow joints, and grip on the support as indicated by their myology. Abstract Two‐toed sloths
C. S. Tucker +4 more
wiley +1 more source
Privacy plays an important role in biometric authentication systems. Touch authentication systems have been widely used since touch devices reached their current level of development.
Asrar Bajaber, Lamiaa Elrefaei
doaj +1 more source
Black‐tailed prairie dogs are highly social ground squirrels that excavate communal burrow systems, most often in medium‐textured soils. Their forelimbs demonstrate morphofunctional trade‐offs for scratch‐digging and terrestrial ecology, including well‐developed and fast‐contracting proximal musculature with large mechanical advantage paired with ...
Luke A. Scheetz +4 more
wiley +1 more source
A Robust and Improved Visual Quality Data Hiding Method for HEVC
This paper presents a novel and robust data hiding method based on H.265/High Efficiency Video Coding (HEVC) standard. To improve the robustness of data hiding, the embedded data are first encoded into the encoded data by using the BCH syndrome code (BCH
Yunxia Liu +4 more
doaj +1 more source
Mobile nodes can encounter many challenges in underwater environments during communication due to turbidity, suspended particles, small bubbles, and turbulence. These factors cause absorption and scattering, ultimately corrupting optical signals.
Maaz Salman +2 more
doaj +1 more source
Parental Racial‐Ethnic Socialization and Competence in Asian Families
ABSTRACT Objective This study examined how Asian parents' racial‐ethnic socialization (RES) content with their younger children coalesces with their confidence in providing messages about managing discrimination. Background The COVID‐19 pandemic and ensuing rise in anti‐Asian discrimination in the United States prompted Asian parents to talk more about
Frances M. Lobo +20 more
wiley +1 more source
A Hybrid Information Reconciliation Method for Physical Layer Key Generation
Physical layer key generation (PKG) has become a research focus as it solves the key distribution problem, which is difficult in traditional cryptographic mechanisms.
Guyue Li, Zheying Zhang, Yi Yu, Aiqun Hu
doaj +1 more source
Ternary Covering Codes Derived from BCH Codes
The covering radius \(R\) of a code \(C\subset \mathbb F^n_q\) is the smallest integer such that every element in \(\mathbb F^n_q\) is within Hamming distance \(R\) of some codeword in \(C\). The authors construct new ternary linear codes with covering radius 2 by lengthening ternary BCH codes.
Cock, John C, Östergård, Patric R.J
openaire +2 more sources

