Results 31 to 40 of about 217,546 (313)

Learned Convolutional Sparse Coding [PDF]

open access: yes2018 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2018
We propose a convolutional recurrent sparse auto-encoder model. The model consists of a sparse encoder, which is a convolutional extension of the learned ISTA (LISTA) method, and a linear convolutional decoder. Our strategy offers a simple method for learning a task-driven sparse convolutional dictionary (CD), and producing an approximate convolutional
Sreter, Hillel, Giryes, Raja
openaire   +3 more sources

An efficient algorithm for the reconstruction of punctured convolutional codes

open access: yesEURASIP Journal on Wireless Communications and Networking, 2017
Puncturing is one of the methods of increasing the code rate, and the original code before puncturing is called the mother code. Any (N,K) convolutional code is obtainable by puncturing some (n,1) mother codes.
Habong Chung   +2 more
doaj   +1 more source

Performance Improvement of Space Missions Using Convolutional Codes by CRC-Aided List Viterbi Algorithms

open access: yesIEEE Access, 2023
Recently, CRC-aided list decoding of convolutional codes has gained attention thanks to its remarkable performance in the short blocklength regime. This paper studies the convolutional and CRC codes of the Consultative Committee for Space Data System ...
Riccardo Schiavone   +2 more
doaj   +1 more source

On the MacWilliams Identity for Convolutional Codes [PDF]

open access: greenIEEE Transactions on Information Theory, 2006
The adjacency matrix associated with a convolutional code collects in a detailed manner information about the weight distribution of the code. A MacWilliams Identity Conjecture, stating that the adjacency matrix of a code fully determines the adjacency matrix of the dual code, will be formulated, and an explicit formula for the transformation will be ...
Heide Gluesing-Luerssen, Gert Schneider
openalex   +6 more sources

Performance of Different Concatenated Coding Schemes for CDMA System

open access: yesJournal of Engineering, 2018
In this paper different channel coding and interleaving schemes in DS/CDMA system over multipath fading channel were used. Two types of serially concatenated coding were presented.
Zainab Majeed Abid
doaj   +1 more source

Application of convolutional codes for the protection of FPGA against single failures caused by outer space radiation effects

open access: yesВестник Самарского университета: Аэрокосмическая техника, технологии и машиностроение, 2017
Increasing the resistance of a system consisting of several programmable logic integrated circuits (FPGA) to space radiation effects is discussed in the paper.
A. A. Nikitin, Yu. N. Zhigulevtsev
doaj   +1 more source

Classification of convolutional codes

open access: yesLinear Algebra and its Applications, 2010
AbstractConvolutional codes have the structure of an F[z]-module. To study their properties it is desirable to classify them as the points of a certain algebraic variety. By considering the correspondence of submodules and the points of certain quotient schemes, and the inclusion of these as subvarieties of certain Grassmannians, one has a one-to-one ...
José María Muñoz Porras   +1 more
openaire   +2 more sources

Design of high-speed and low-latency Viterbi decoder

open access: yesDianzi Jishu Yingyong, 2018
In a Viterbi decoder, there are two known memory organization techniques for the storage of survivor sequences, namely register exchange method and traceback method.
Yang Min
doaj   +1 more source

A Fast Method for Blind Identification of Punctured Convolutional Codes [PDF]

open access: yesRadioengineering, 2018
The existing method for blind identification of a punctured convolutional code involves searching for dual words and the puncturing pattern exhaustively.
S. N. Han, M. Zhang, X. H. Li
doaj  

A Robust Watermarking Scheme in YCbCr Color Space Based on Channel Coding

open access: yesIEEE Access, 2019
The rapid development of big data and cloud computing technologies greatly accelerate the spreading and utilization of images and videos. The copyright protection for images and videos is becoming increasingly serious.
Yun Tan   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy