Search

Your search keyword '"HAMMING codes"' showing total 735 results

Search Constraints

Start Over You searched for: Descriptor "HAMMING codes" Remove constraint Descriptor: "HAMMING codes"
735 results on '"HAMMING codes"'

Search Results

1. A novel secure image steganography scheme based on Hamming encoding and LSB matching revisited using Lah Transform.

2. Packing coloring of hypercubes with extended Hamming codes.

3. On b-symbol distance, Hamming distance and RT distance of Type 1 λ-constacyclic codes of length 8ps over 픽pm[u]/〈uk〉.

4. A Low-Density Parity-Check Coding Scheme for LoRa Networking.

5. Error mitigation in LPWAN systems: A study on the efficacy of Hamming-coded RPW.

6. Area and energy optimized Hamming encoder and decoder for nano-communication.

7. On the parameters of extended primitive cyclic codes and the related designs.

8. A Simple and Efficient Data Hiding Method with Error Detection and Correction.

9. Enhancement of KASUMI algorithm by adding hamming code.

10. FS-GDI Based Area Efficient Hamming (11, 7) Encoding.

11. Geometric dual and sum‐rank minimal codes.

12. 文本语义哈希技术研究进展.

13. Fault Detection and Analysis in SRAM through SelfRefreshing Operation.

14. Fast shape recognition via a bi-level restraint reduction of contour coding.

15. Jacobi polynomials and harmonic weight enumerators of the first-order Reed–Muller codes and the extended Hamming codes.

16. Antipodal two-weight rank metric codes.

17. DEVELOPMENT OF THE METHOD OF DETECTING AND CORRECTING DATA TRANSMISSION ERRORS IN IOT SYSTEMS FOR MONITORING THE STATE OF OBJECTS.

18. On maximal partial Latin hypercubes.

19. High performance image steganography integrating IWT and Hamming code within secret sharing.

20. INTRODUCTION TO CYCLIC CODES AND ILLUSTRATION OF THEIR IMPLEMENTATION THROUGH LINEAR FEEDBACK SHIFT REGISTERS WITHIN A PROGRESSIVE WEB APPLICATION.

21. Real-Time Design and Implementation of Soft Error Mitigation Using Embedded System.

22. Binary multi-view sparse subspace clustering.

23. CÓDIGOS CORRETORES DE ERROS E UMA BREVE INTRODUÇÃO AOS CÓDIGOS DE HAMMING.

24. Bounds on the Probability of Undetected Error for q -Ary Codes.

25. Overlapped (7,4) hamming code for large-capacity and low-loss data hiding.

26. A comparison analysis on forward error correction technology: a future perspective for GNSS.

27. Optimal and extremal graphical designs on regular graphs associated with classical parameters.

28. Implementation of a new coding scheme for improving the SET operations in Phase Change Memory (PCM).

29. On the Classification of Completely Regular Codes with Covering Radius Two and Antipodal Duals.

30. Dual Reversible Data Hiding in Encrypted Halftone Images Using Matrix Encoding.

31. Graphical designs and gale duality.

32. A Fragile Watermarking by Hamming Code on Distributed Pixels with Perfect Recovery for Small Tampers.

33. A Generalized Spread Spectrum-Based Audio Watermarking Method with Adaptive Synchronization.

34. VLSI Implementation of Error Correction Codes for Molecular Communication.

35. A Power-Efficient Error Detection and Correction Circuit Design Using Hamming Codes for Portable Electronic Devices.

36. COMPACT AND ENERGY EFFICIENT QCA BASED HAMMING ENCODER FOR ERROR DETECTION AND CORRECTION.

37. Linear codes resulting from finite group actions

39. Error Detection in Fault-Tolerant Reversible Circuit Using Fredkin Gates

40. Post-Quantum Cryptosystem of Niederreiter, Algorithm and Encryption Scheme: Modification and Optimization

41. EFFICIENT LINEAR AND AFFINE CODES FOR CORRECTING INSERTIONS/DELETIONS.

42. Performance Evaluation of Error-Correcting Output Coding Based on Noisy and Noiseless Binary Classifiers.

43. On the weights of dual codes arising from the GK curve.

44. The minimum locality of linear codes.

45. Weight-2 input sequences of 1/n convolutional codes from linear systems point of view.

46. Latin Matchings and Ordered Designs OD (n −1, n , 2 n −1) †.

47. LINEAR CODES RESULTING FROM FINITE GROUP ACTIONS.

48. Steganography from perfect codes on Cayley graphs over Gaussian integers, Eisenstein–Jacobi integers and Lipschitz integers.

49. Use of mathematical cryptanalysis on 'magic tricks'.

50. Comparing structures of two-dimensional error correction codes.

Catalog

Books, media, physical & digital resources