Results 31 to 40 of about 235,653 (168)
The principles of poly-parametric information coding have been considered. The methods for developing poly-parametric codes have been presented. It is shown that the protection of block codes from channel interference using check patterns can be developed by a mono- or poly-parametric method.
Julia Milova, Yuri Melnik
openaire +3 more sources
System Performance of Concatenated STBC and Block Turbo Codes in Dispersive Fading Channels
A new scheme of concatenating the block turbo code (BTC) with the space-time block code (STBC) for an OFDM system in dispersive fading channels is investigated in this paper.
Kam Tai Chan, Yinggang Du
doaj +1 more source
Given a regular multiset [Formula: see text] on [Formula: see text], a partial order [Formula: see text] on [Formula: see text], and a label map [Formula: see text] defined by [Formula: see text] with [Formula: see text], we define a pomset block metric [Formula: see text] on the direct sum [Formula: see text] of [Formula: see text] based on the ...
Atul Kumar Shriwastva, R. S. Selvaraj
openaire +3 more sources
The work in this paper is an extension of the recently proposed stacked Alamouti based spatial modulation (SA-SM) scheme. The motivation is that by taking advantage of the existing full-diversity full-rate (FDFR) space-time code, to construct SM ...
Lei Wang
doaj +1 more source
Alamouti code based on block repetition in FBMC/OQAM systems
In this paper, we address the Alamouti code in Filter-Bank Multicarrier with Offset Quadrature Amplitude Modulation (FBMC/OQAM) and propose a novel block-wise Alamouti code, in which a repeated block is designed to eliminate the imaginary interference ...
Dejin Kong +4 more
doaj +1 more source
CAMFuzz: Explainable Fuzzing with Local Interpretation
Grey-box fuzzing techniques have been widely used in software bug finding. In general, there are many decisions to make in the fuzzing process, including which code block in the target program should be explored first, which bytes of an input seed should
Ji Shi +6 more
doaj +1 more source
Binary code similarity detection (BCSD) plays a vital role in computer security and software engineering. Traditional BCSD methods heavily rely on specific features and necessitate rich expert knowledge, which are sensitive to code alterations.
Zhenhao Luo +4 more
doaj +1 more source
Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang +8 more
wiley +1 more source
Case Study: Design Strategies for Enabling Visual Application Blocks of Bluetooth Library
Block-based tools can make it easier for beginners to learn programming by arranging blocks. Their block concept and extensible characteristics make block-based designs suitable for introductory programming. However, block-based tools are easy to use but
Tai-Liang Chen, I-An Su, Jenq-Kuen Lee
doaj +1 more source
Function‐driven design of a surrogate interleukin‐2 receptor ligand
Interleukin (IL)‐2 signaling can be achieved and precisely fine‐tuned through the affinity, distance, and orientation of the heterodimeric receptors with their ligands. We designed a biased IL‐2 surrogate ligand that selectively promotes effector T and natural killer cell activation and differentiation. Interleukin (IL) receptors play a pivotal role in
Ziwei Tang +9 more
wiley +1 more source

