نتایج جستجو برای: channel construction

تعداد نتایج: 429805  

2003
Leonid Reyzin Scott Russell

Steganography is the science of hiding the very presence of a secret message within a public communication channel. In Crypto 2002, Hopper, Langford, and von Ahn proposed the first complexitytheoretic definition and constructions of stegosystems. They later pointed out and corrected a flaw in one of their basic constructions. The correction, unfortunately, introduced a need for expensive errorc...

2015
P. Gunning C. D. Hills R. Gunning A. Maries

The SAPICO2 project is an INTERREG IVA cross channel collaboration established to develop new technologies utilising accelerated carbonation for the creation of eco-construction materials from solid wastes. Over three phases, the project has identified carbon dioxide reactivity of solid wastes, produced prototype-construction materials (from these wastes), and manufactured bulk samples of carbo...

2005
Siddharth Ray Muriel Médard Harold E. Edgerton Jinane Abounadi Arthur C. Smith

We consider a time-slotted multiple access noisy as well as noise-free channel in which the received, transmit and noise alphabets belong to a finite field. We show that source-channel separation holds when the additive noise is independent of inputs. However, for input-dependent noise, separation may not hold. For channels over the binary field, we derive the expression for the probability of ...

2001
Zoltan Safar

Emerging wireless applications have created a strong motivation to increase the throughput of wireless communication systems. Space-time coding has become a promising method to achieve high data rates. In this work, we propose a space-time trellis code construction method that can provide variable protection against the adverse effects of the radio channel. The method is based on the multiple t...

Journal: :Journal of physics 2023

Abstract Based on the sensitivity of oysters to water environmental factors, a hydrodynamic model in Tongzhou Bay, southwest China’s Yellow Sea, is set up analyse impact and suspended sediment Liyashan Oyster Reef. The results show that characteristics waters near oyster reef will not be significantly affected by implementation project. diffusion range concentration greater than 10mg/L caused c...

Journal: :IEEE Transactions on Automatic Control 2022

We investigate the stability conditions for remote state estimation of multiple linear time-invariant (LTI) systems over wireless time-varying communication channels. answer following open problem: what is fundamental requirement on multi-sensor-multi-channel system to guarantee existence a sensor scheduling policy that can stabilize system? propose novel construction and analytical framework d...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه تربیت مدرس 1390

تخمین دقیق مشخصات کانال در سیستم های مخابراتی یک امر مهم محسوب می گردد. این امر به ویژه در کانال های بیسیم با ‏خاصیت فرکانس گزینی و زمان گزینی شدید، چالش بزرگی است. مقالات متعدد پر از روش های مبتکرانه ای برای طراحی و آنالیز ‏الگوریتم های تخمین کانال است که بیشتر آنها از روش های خاصی استفاده می کنند که یا دارای عملکرد خوب با پیچیدگی ‏محاسباتی بالا هستند و یا با عملکرد نه چندان خوب پیچیدگی پایینی...

Journal: :CoRR 2017
Mengfan Zheng Wen Chen Cong Ling

In this paper, we propose a low-complexity, secrecy capacity achieving polar coding scheme for the cognitive interference channel with confidential messages (CICC) under the strong secrecy criterion. Existing polar coding schemes for interference channels rely on the use of polar codes for the multiple access channel, the code construction problem of which can be complicated. We show that the w...

2013
Ivo Kubjas

This report is based on the article [1] by Koetter and Kschischang. The authors introduced a novel approach for constructing codes by selecting a subset of a powerset of a vector space. With the code construction, they also defined an operator channel for code transmission. The codewords are vector subspaces. The data is transmitted by using one of the bases of such a subspace. The properties o...

2015
Nadia El Mrabet Emmanuel Fouotsa

Pairings are mathematical tools that have been proven to be very useful in the construction of many cryptographic protocols. Some of these protocols are suitable for implementation on power constrained devices such as smart cards or smartphone which are subject to side channel attacks. In this paper, we analyse the efficiency of the point blinding countermeasure in pairing based cryptography ag...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید