Results 151 to 160 of about 1,102,740 (365)

Generalized reliability-based syndrome decoding for LDPC codes [PDF]

open access: yesarXiv, 2007
Aiming at bridging the gap between the maximum likelihood decoding (MLD) and the suboptimal iterative decodings for short or medium length LDPC codes, we present a generalized ordered statistic decoding (OSD) in the form of syndrome decoding, to cascade with the belief propagation (BP) or enhanced min-sum decoding.
arxiv  

Iterative Decoding of Turbo Codes

open access: yesJournal of Advanced College of Engineering and Management, 2018
<p><strong> </strong>This paper presents a Thesis which consists of a study of turbo codes as an error-control Code and the software implementation of two different decoders, namely the Maximum a Posteriori (MAP), and soft- Output Viterbi Algorithm (SOVA) decoders. Turbo codes were introduced in 1993 by berrouet at [2] and are perhaps
openaire   +2 more sources

Machine Learning‐Assisted Simulations and Predictions for Battery Interfaces

open access: yesAdvanced Intelligent Systems, EarlyView.
This review summarizes machine learning (ML)‐assisted simulations and predictions at battery interfaces. It highlights how employing ML algorithms with machine vision, enables the lithium dendrite growth simulation, the solid–electrolyte interphase formation, and other interfacial dynamics.
Zhaojun Sun   +4 more
wiley   +1 more source

Explainable machine learning in cybersecurity: A survey

open access: yesInternational Journal of Intelligent Systems, Volume 37, Issue 12, Page 12305-12334, December 2022., 2022
Abstract Machine learning (ML) techniques are increasingly important in cybersecurity, as they can quickly analyse and identify different types of threats from millions of events. In spite of the increasing number of possible applications of ML, successful adoption of ML models in cybersecurity still highly relies on the explainability of those models ...
Feixue Yan   +4 more
wiley   +1 more source

Iterative Bounded Distance Decoding of Product Codes with Scaled Reliability [PDF]

open access: yesarXiv, 2018
We propose a modified iterative bounded distance decoding of product codes. The proposed algorithm is based on exchanging hard messages iteratively and exploiting channel reliabilities to make hard decisions at each iteration. Performance improvements up to 0.26 dB are achieved.
arxiv  

Medical Image Hybrid Watermark Algorithm Based on Frequency Domain Processing and Inception v3

open access: yesAdvanced Intelligent Systems, EarlyView.
Frequency domain processing and Inceptionv3 method is used in this article for digital image watermarking of medical images. The algorithm extracts feature vectors from medical images using discrete wavelet transform and discrete cosine transform, enhancing the robustness of the image watermark With the widespread use of digital medical images in ...
Yu Fan   +4 more
wiley   +1 more source

Study of equivalent point-to-point transmission model for coded relay cooperations

open access: yesTongxin xuebao, 2012
LDPC-coded relay cooperation and its joint iterative decoding based on the bi-layer Tanner graph were investigated.The coded relay cooperation becomed an equivalent and relatively simple point-to-point transmission model by introducing the notation of ...
Qiu-xia ZHANG   +3 more
doaj   +2 more sources

Partially Permuted Multi-Trellis Belief Propagation for Polar Codes [PDF]

open access: yesarXiv, 2019
Belief propagation (BP) is an iterative decoding algorithm for polar codes which can be parallelized effectively to achieve higher throughput. However, because of the presence of error floor due to cycles and stopping sets in the factor graph, the performance of the BP decoder is far from the performance of state of the art cyclic redundancy check (CRC)
arxiv  

Home - About - Disclaimer - Privacy