搜索结果: 1-7 共查到“应用数学 Coding”相关记录7条 . 查询时间(0.12 秒)
三亚国际数学论坛:Mathematical Theory Applied in Coding and Cryptography
三亚国际数学论坛 Mathematical Theory Applied Coding Cryptography
font style='font-size:12px;'>
2017/11/24
Coding and cryptography are an essential subjects in the fields of information security and communication, and they have been applied widely in information technology for several decades of years. Cod...
Wavelet image coding measurement based on system visual human
DWT copression image quality
font style='font-size:12px;'>
2010/9/27
A reliable quality measurement is a much needed tool for determining the type and amount of image distortion for the embedded zero tree wavelet image coding based on perceptual techniques. Attempts to...
Overlay Protection Against Link Failures Using Network Coding
Overlay Protection Link Failures Network Coding
font style='font-size:12px;'>
2010/11/22
This paper introduces a network coding-based protection scheme against single and multiple link failures. The proposed strategy ensures that in a connection, each node receives two copies of the same ...
Effects of the Generation Size and Overlap on Throughput and Complexity in Randomized Linear Network Coding
Throughput Randomized Linear Network Coding
font style='font-size:12px;'>
2010/11/22
To reduce computational complexity and delay in randomized network coded content distribution, and for some other practical reasons, coding is not performed simultaneously over all content blocks, bu...
Coding Theorems on Generalized Cost Measure
Decipherable code Source alphabet Codeword Cost function Holders inequality Codeword length
font style='font-size:12px;'>
2008/7/1
In the present communication a generalized cost measure of utilities and lengths of output codewords from a memoryless source are defined. Lower and upper bounds in terms of a non-additive generalized...
Entropy Lower Bounds Related to a Problem of Universal Coding and Prediction
Entropy Index of coincidence Rényi entropy Measure of roughness Universal coding Universal prediction
font style='font-size:12px;'>
2008/7/1
Second order lower bounds for the entropy function expressed in terms of the index of coincidence are derived. Equivalently, these bounds involve entropy and Rényi entropy of order 2. The constants fo...
iew of a coding scheme in information storage techniques
Piecewise maps Coding scheme
font style='font-size:12px;'>
2010/9/15
This paper deals with coding scheme, first step in storage of information. Information storage techniques use one and two dimensional piecewise maps, this method consists in associating stable and uns...