New Coding Techniques for Improved Bandwidth Utilization

نویسنده

  • Micah Adler
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DVSI Application of Vocoders

The need for increased utilization of available wireless communication spectrum has fueled the development of voice coding technology. From simple waveform coding techniques operating at 64 kbps, the advance of speech coding algorithms has produced communication quality systems at 2 kbps and below. This allows up to 32 communications channels to operate in the bandwidth formerly occupied by one...

متن کامل

Hybrid Regenerating Codes for Distributed Storage Systems

Distributed storage systems are mainly justified due to their ability to store data reliably over some unreliable nodes such that the system can have long term durability. Recently, regenerating codes are proposed to make a balance between the repair bandwidth and the storage capacity per node. This is achieved through using the notion of network coding approach. In this paper, a new variation ...

متن کامل

Improved frame erasure concealment for CELP-based coders

This paper describes new techniques for concealing frame erasures for CELP-based speech coders. Two main approaches were followed: interpolative, where both past and future information are used to reconstruct the missing data, and repetition-based, where no future information is required. Key features of the repetition-based approach include improved muting, pitch delay jittering, and LPC bandw...

متن کامل

Comparative study of Arithmetic and Huffman Compression Techniques for Enhancing Security and Effective Bandwidth Utilization in the Context of ECC for Text

In this paper, we proposed a model for text encryption using elliptic curve cryptography (ECC) for secure transmission of text and by incorporating the Arithmetic/Huffman data compression technique for effective utilization of channel bandwidth and enhancing the security. In this model, every character of text message is transformed into the elliptic curve points 1 / 4

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1996