Results 11 to 20 of about 72,386 (210)

Coded-GFDM for Reliable Communication in Underwater Acoustic Channels

open access: yesSensors, 2022
The performance of the coded generalized frequency division multiplexing (GFDM) transceiver has been evaluated in a shallow underwater acoustic channel (UAC). Acoustic transmission is the scheme of choice for communication in UAC since radio waves suffer
Mohsin Murad   +2 more
doaj   +1 more source

Convolutional Codes

open access: yes, 2020
published
Lieb, Julia   +2 more
openaire   +3 more sources

NOISE IMMUNITY CODES DISPLAY IN RELIABILITY CORDINATES

open access: yesInformation and Telecommunication Sciences, 2015
Background. Noise immunity codes are widely used in the modern telecommunication systems. The methodology of properties count of convolutional codes, offered by authors before, to the equivalent parameters of block codes gave the opportunity to use the ...
Leonid Uryvskyi, Anton Pieshkin
doaj   +1 more source

Performance Improvement of Space Missions Using Convolutional Codes by CRC-Aided List Viterbi Algorithms

open access: yesIEEE Access, 2023
Recently, CRC-aided list decoding of convolutional codes has gained attention thanks to its remarkable performance in the short blocklength regime. This paper studies the convolutional and CRC codes of the Consultative Committee for Space Data System ...
Riccardo Schiavone   +2 more
doaj   +1 more source

Good Quantum Convolutional Error Correction Codes And Their Decoding Algorithm Exist [PDF]

open access: yes, 1998
Quantum convolutional code was introduced recently as an alternative way to protect vital quantum information. To complete the analysis of quantum convolutional code, I report a way to decode certain quantum convolutional codes based on the classical ...
A. Dholakia   +30 more
core   +2 more sources

THE CONVOLUTIONAL CODESАNALYSIS TECHNIQUE ON THE OPTIMUM BLOCK CODES GROUNDS

open access: yesInformation and Telecommunication Sciences, 2014
The convolutional codes analysis and synthesis technique is proposed. This technique is optimal according to near Shannon's bound criterion and guarantees a given bit error rate from message source.
Leonid Uryvskyi   +2 more
doaj   +1 more source

An Embedding Strategy Using Q-Ary Convolutional Codes for Large and Small Payloads

open access: yesMathematics, 2021
Matrix embedding (ME) code is a commonly used steganography technique, which uses linear block codes to improve embedding efficiency. However, its main disadvantage is the inability to perform maximum likelihood decoding due to the high complexity of ...
Jyun-Jie Wang   +4 more
doaj   +1 more source

Realization of 2D (2,2)–Periodic Encoders by Means of 2D Periodic Separable Roesser Models

open access: yesInternational Journal of Applied Mathematics and Computer Science, 2019
It is well known that convolutional codes are linear systems when they are defined over a finite field. A fundamental issue in the implementation of convolutional codes is to obtain a minimal state representation of the code. Compared with the literature
Napp Diego   +3 more
doaj   +1 more source

On the State Approach Representations of Convolutional Codes over Rings of Modular Integers

open access: yesMathematics, 2021
In this study, we prove the existence of minimal first-order representations for convolutional codes with the predictable degree property over principal ideal artinian rings.
Ángel Luis Muñoz Castañeda   +2 more
doaj   +1 more source

Deriving Good LDPC Convolutional Codes from LDPC Block Codes [PDF]

open access: yes, 2010
Low-density parity-check (LDPC) convolutional codes are capable of achieving excellent performance with low encoding and decoding complexity. In this paper we discuss several graph-cover-based methods for deriving families of time-invariant and time ...
Ali E. Pusane   +4 more
core   +1 more source

Home - About - Disclaimer - Privacy