Results 61 to 70 of about 2,484,228 (241)

Lecture on Entropy Coding [PDF]

open access: yes, 2010
Considers entropy, fixed length coding, Huffman coding and arithmetic ...
Maunder, Rob
core  

Heat stress in tropical highland regions: the case of Kenya during February 2024

open access: yesWeather, EarlyView.
Understanding and awareness about heat stress remain low in sub‐Saharan countries despite high exposure and vulnerability. After the national media in Kenya reported that people had complained about unusual heat stress during February 2024, we combine in situ and reanalysis data to (i) put this event into climatological perspective, and (ii) give ...
G. Chagnaud   +3 more
wiley   +1 more source

Entropy Coding Aided Adaptive Subcarrier-Index Modulated OFDM

open access: yesIEEE Access, 2018
We propose entropy coding-aided adaptive subcarrier-index-modulated orthogonal frequency division multiplexing (SIM-OFDM). In conventional SIM-OFDM, the indices of the subcarriers activated are capable of conveying extra information. We propose the novel
Mohammad Ismat Kadir   +3 more
doaj   +1 more source

Real-time data compression of broadcast video signals [PDF]

open access: yes, 1990
A non-adaptive predictor, a nonuniform quantizer, and a multi-level Huffman coder are incorporated into a differential pulse code modulation system for coding and decoding broadcast video signals in real ...
Barnes, Scott P.   +2 more
core   +2 more sources

Anti-uniform Huffman codes

open access: yesIET Communications, 2011
In this study, the authors consider the class of anti-uniform Huffman (AUH) codes. The authors derived tight lower and upper bounds on the average codeword length, entropy and redundancy of finite and infinite AUH codes in terms of the alphabet size of the source. These bounds are tighter than similar bounds.
S. Mohajer, A. Kakhbod
openaire   +1 more source

Robust steganographic framework for securing sensitive healthcare data of telemedicine using convolutional neural network

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
Abstract Data is the key element that runs the modern society. Large amounts of data are being released day by day as a result of many activities. The digital data is transferred through the Internet which may be vulnerable to attacks while transmitting. Especially, the medical data is observed to be of at most importance.
Rupa Ch   +4 more
wiley   +1 more source

Investment centre manager's multiperiod fairness perceptions and intertemporal dependency

open access: yesAccounting &Finance, Volume 65, Issue 1, Page 3-36, March 2025.
Abstract This paper explores the motivation of investment centre managers when their investment centre's performance is affected by decisions made by their predecessor. Through a qualitative case study of a Japanese manufacturer, the effectiveness of conventional remedies for motivational issues and further motivational issues caused by the same ...
Hiroyuki Selmes‐Suzuki
wiley   +1 more source

Weight Ward Change Region Plummeting Change for Square based Image Huffman Coding

open access: yesVOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE, 2019
Image weight is an execution of the data weight which encodes genuine picture with specific bits. The purpose of the image weight is to lessen the redundancy and superfluity of picture data to be capable to record or send data in an incredible structure.
Gowri Sankaran   +2 more
semanticscholar   +1 more source

Effects of parachute science on local research capacity 降落伞科学对当地研究能力的影响

open access: yesConservation Biology, EarlyView.
Abstract Strengthening research capacity is essential to address the global biodiversity crisis. Yet, parachute science often undermines this goal, and its prevalence, costs, and benefits are unclear. We analyzed 13,502 publications on primate research that we extracted from Scopus (1960–2022) to evaluate the effects of parachute science on local ...
Li Yang   +11 more
wiley   +1 more source

Diversified Intelligent Terminal Devices Unified Access and Data Communication Technology

open access: yesIEEE Access
Different intelligent devices have different operating systems, data interaction modes and network connection modes, which greatly hinder the realization of the Internet of everything.
Xueyan Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy