A Protection Method of Target Codes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

solution of security constrained unit commitment problem by a new multi-objective optimization method

چکیده-پخش بار بهینه به عنوان یکی از ابزار زیر بنایی برای تحلیل سیستم های قدرت پیچیده ،برای مدت طولانی مورد بررسی قرار گرفته است.پخش بار بهینه توابع هدف یک سیستم قدرت از جمله تابع هزینه سوخت ،آلودگی ،تلفات را بهینه می کند،و هم زمان قیود سیستم قدرت را نیز برآورده می کند.در کلی ترین حالتopf یک مساله بهینه سازی غیر خطی ،غیر محدب،مقیاس بزرگ،و ایستا می باشد که می تواند شامل متغیرهای کنترلی پیوسته و گ...

A Method for Target Setting with Share Data

Data Envelopment Analysis (DEA) is a mathematical programming technique for evaluatingthe relative efficiency of a set of Decision Making Units (DMUs) and can also be utilized forsetting target. Target setting is one of the important subjects since according to its resultsefficiency can be increased. An important issue to be currently discussed, is to set targetwhile considering share data. The...

متن کامل

A Time-Domain Method for Shape Reconstruction of a Target with Known Electrical Properties (RESEARCH NOTE)

This paper uses a method for shape reconstruction of a 2-D homogeneous object with arbitrary geometry and known electrical properties. In this method, the object is illuminated by a Gaussian pulse, modulated with sinusoidal carrier plane wave and the time domains’ footprint signal due to object presence is used for the shape reconstruction. A nonlinear feedback loop is used to minimize the diff...

متن کامل

Method to Construct A-Codes from A-Codes

Another important idea in the study of codes is the relation between authentication codes with arbitration and authentication codes without arbitration. Nowadays there is no much work about this relation, very few authors have studied it. Then in this paper we are going to study this relation and come out some important results. For this cause we established and proved two theorems, which provi...

متن کامل

Progressive Optimal Error Protection of Embedded Codes

The embedded wavelet image coders such as SPIHT [1] or JPEG 2000 [2] allow an efficient progressive transmission of digital images. However, the bitstreams generated by these coders are very sensitive to channel noise, and error protection is necessary to ensure acceptable reconstruction fidelity. One of the most successful protection systems for embedded wavelet coders was recently proposed by...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computer and Information Science

سال: 2012

ISSN: 1913-8997,1913-8989

DOI: 10.5539/cis.v5n6p43