Search results for "codes"
showing 10 items of 201 documents
New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas
2010
Published version of an article in the journal: Annals of Telecommunications-Annales Des Telecommunications. Also available from the publisher at: http://dx.doi.org/10.1007/s12243-010-0191-1 In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with two transmit antennas without channel state information at the receiver. Based on a differential encoding scheme proposed by Tarokh and Jafarkhani, we propose a new decoding algorithm with reduced decoding complexity. To evaluate the performance of the SOSTTCs by way of computer simulat…
Error mitigation using RaptorQ codes in an experimental indoor free space optical link under the influence of turbulence
2015
In free space optical (FSO) communications, several factors can strongly affect the link quality. Among them, one of the most important impairments that can degrade the FSO link quality and its reliability even under the clear sky conditions consists of optical turbulence. In this work, the authors investigate the generation of both weak and moderate turbulence regimes in an indoor environment to assess the FSO link quality. In particular, they show that, due to the presence of the turbulence, the link experiences both erasure errors and packet losses during transmission, and also compare the experimental statistical distribution of samples with the predicted Gamma Gamma model. Furthermore,…
An asynchronous covert channel using spam
2012
AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…
Corporate ethical codes as strategic documents: An analysis of success and failure
2009
Ethical codes state the major philosophical principles and values in organizations and function as policy documents which define the responsibilities of organizations to stakeholders. They spell out the conduct expected of employees and articulate the acceptable ethical parameters of behavior in the organization. Most large US and multinational firms today have a code. If utilized effectively and embraced, codes can be key strategic documents in organizations for moderating employee behavior and reducing unethical actions. To be effective they must be communicated well and become a part of the culture of the organization. An ethical code from a major investment bank is analyzed in terms of …
From the LCA of food products to the environmental assessment of protected crops districts: A case-study in the south of Italy
2010
In the present study, Life Cycle Assessment (LCA) methodology was applied to evaluate the energy consumption and environmental burdens associated with the production of protected crops in an agricultural district in the Mediterranean region. In this study, LCA was used as a ‘support tool’, to address local policies for sustainable production and consumption patterns, and to create a ‘knowledge base’ for environmental assessment of an extended agricultural production area. The proposed approach combines organisation-specific tools, such as Environmental Management Systems and Environmental Product Declarations, with the environmental management of the district. Questionnaires were distribute…
Angular variations of brightness surface temperatures derived from dual-view measurements of the Advanced Along-Track Scanning Radiometer using a new…
2019
Abstract Surface temperatures derived from remote sensing data over heterogeneous, non-isothermal land surfaces depend on the viewing and solar angles mainly due to variations in sunlit and shaded fractions of the different elements in the field of view. The near-simultaneous dual-view capability of the Advanced Along-Track Scanning Radiometer (AATSR) can be used to estimate differences in brightness surface temperatures (BSTs) between the nadir (satellite zenith angle of 0°–21.7°) and forward views (53°–55.6°) in the 11 and 12 μm bands. BST is defined as the black-body temperature corresponding to the radiance at surface level (that is, corrected for atmospheric absorption and emission). W…
READING WORDS, NUMB3R5 and $YMßOL$
2007
Words in alphabetic languages are processed via their constituents [1]. To recognize a printed word, we need to process the identity and position of its letters, hence distinguishing between cat and fat, or dog and god, but not between tABLe and TabLE, or and . Dehaene and colleagues [2] proposed a neuronal model with feed-forward connections only, according to which the brain decodes words through a hierarchy of local combination detectors in the occipito–infero–temporal pathway sensitive to increasingly larger fragments of words.
On the weight distribution of perfect binary codes
2021
In this paper, we give a new proof of the closed-form formula for the weight distribution of a perfect binary single-error-correcting code.
New lower bounds for the minimum distance of generalized algebraic geometry codes
2013
Abstract In this paper, we give a new lower bound for generalized algebraic geometry codes with which we are able to construct some new linear codes having better parameters compared with the ones known in the literature. Moreover, we give a relationship between a family of generalized algebraic geometry codes and algebraic geometry codes. Finally, we propose a decoding algorithm for such a family.
A-Codes from Rational Functions over Galois Rings
2006
In this paper, we describe authentication codes via (generalized) Gray images of suitable codes over Galois rings. Exponential sums over these rings help determine--or bound--the parameters of such codes.