Results 51 to 60 of about 2,705,238 (250)
Photon-Counting Security Tagging and Verification Using Optically Encoded QR Codes
We propose an optical security method for object authentication using photon-counting encryption implemented with phase encoded QR codes. By combining the full phase double-random-phase encryption with photon-counting imaging method and applying an ...
A. Markman, B. Javidi, M. Tehranipoor
doaj +1 more source
Optimal code design for lossless and near lossless source coding in multiple access networks [PDF]
A multiple access source code (MASC) is a source code designed for the following network configuration: a pair of correlated information sequences {Xi}i=1∞ and {Yi }i=1∞ is drawn i.i.d.
Effros, Michelle, Zhao, Qian
core
Investment centre manager's multiperiod fairness perceptions and intertemporal dependency
Abstract This paper explores the motivation of investment centre managers when their investment centre's performance is affected by decisions made by their predecessor. Through a qualitative case study of a Japanese manufacturer, the effectiveness of conventional remedies for motivational issues and further motivational issues caused by the same ...
Hiroyuki Selmes‐Suzuki
wiley +1 more source
Joint Source-Channel Decoding of Polar Codes for Language-Based Source
We exploit the redundancy of the language-based source to help polar decoding. By judging the validity of decoded words in the decoded sequence with the help of a dictionary, the polar list decoder constantly detects erroneous paths after every few bits ...
Bandic, Zvonimir +4 more
core +1 more source
Effects of parachute science on local research capacity 降落伞科学对当地研究能力的影响
Abstract Strengthening research capacity is essential to address the global biodiversity crisis. Yet, parachute science often undermines this goal, and its prevalence, costs, and benefits are unclear. We analyzed 13,502 publications on primate research that we extracted from Scopus (1960–2022) to evaluate the effects of parachute science on local ...
Li Yang +11 more
wiley +1 more source
A cryptographic method to have a secure communication of health care digital data into the cloud
Cloud computing is a technology that holds great promise and has potential to revolutionize the healthcare sector. Many security and privacy issues are brought up by the cloud’s centralization of data for both patients and healthcare professionals. There
K. Selvakumar, S. Lokesh
doaj +1 more source
An Efficient Coding Technique for Stochastic Processes
In the framework of coding theory, under the assumption of a Markov process (Xt) on a finite alphabet A, the compressed representation of the data will be composed of a description of the model used to code the data and the encoded data. Given the model,
Jesús E. García +3 more
doaj +1 more source
Optimal Prefix Codes for Infinite Alphabets with Nonlinear Costs
Let $P = \{p(i)\}$ be a measure of strictly positive probabilities on the set of nonnegative integers. Although the countable number of inputs prevents usage of the Huffman algorithm, there are nontrivial $P$ for which known methods find a source code ...
Baer, Michael B.
core +2 more sources
In this study, the authors consider the class of anti-uniform Huffman (AUH) codes. The authors derived tight lower and upper bounds on the average codeword length, entropy and redundancy of finite and infinite AUH codes in terms of the alphabet size of the source. These bounds are tighter than similar bounds.
S. Mohajer, A. Kakhbod
openaire +1 more source
LAPAN-A3/IPB satellite is the latest Indonesian experimental microsatellite with remote sensing and earth surveillance missions. The satellite has three optical payloads, which are multispectral push-broom imager, digital matrix camera and video camera ...
P. R. Hakim, Rizki Permala
semanticscholar +1 more source

