Search results for "codes"

showing 10 items of 201 documents

New super-orthogonal space-time trellis codes using differential M-PSK for noncoherent mobile communication systems with two transmit antennas

2010

Published version of an article in the journal: Annals of Telecommunications-Annales Des Telecommunications. Also available from the publisher at: http://dx.doi.org/10.1007/s12243-010-0191-1 In this paper, we develop super-orthogonal space-time trellis codes (SOSTTCs) using differential binary phase-shift keying, quadriphase-shift keying and eight-phase shift keying for noncoherent communication systems with two transmit antennas without channel state information at the receiver. Based on a differential encoding scheme proposed by Tarokh and Jafarkhani, we propose a new decoding algorithm with reduced decoding complexity. To evaluate the performance of the SOSTTCs by way of computer simulat…

Computational complexity theoryComputer scienceList decodingKeyingVDP::Technology: 500::Information and communication technology: 550Sequential decodingData_CODINGANDINFORMATIONTHEORYChannel state informationElectronic engineeringElectrical and Electronic Engineeringdifferential detection noncoherent communications super-orthogonal space-time trellies codesAlgorithmDifferential codingDecoding methodsComputer Science::Information TheoryPhase-shift keying
researchProduct

Error mitigation using RaptorQ codes in an experimental indoor free space optical link under the influence of turbulence

2015

In free space optical (FSO) communications, several factors can strongly affect the link quality. Among them, one of the most important impairments that can degrade the FSO link quality and its reliability even under the clear sky conditions consists of optical turbulence. In this work, the authors investigate the generation of both weak and moderate turbulence regimes in an indoor environment to assess the FSO link quality. In particular, they show that, due to the presence of the turbulence, the link experiences both erasure errors and packet losses during transmission, and also compare the experimental statistical distribution of samples with the predicted Gamma Gamma model. Furthermore,…

Computer scienceOptical linkReliability (computer networking)Optical linksTelecommunication network reliabilityRytov variance valueSettore ING-INF/01 - ElettronicaTelecomunicacióRaptorQ codesRedundancy (information theory)Indoor free space optical linkFSO communicationsStatisticsTEORIA DE LA SEÑAL Y COMUNICACIONESRedundancy (engineering)Gamma Gamma modelrateless codeElectrical and Electronic Engineeringpacket error rate (PER)Error-free transmissionNetwork packetbusiness.industrySettore ING-INF/03 - TelecomunicazioniSettore ING-INF/02 - Campi ElettromagneticiÒpticaComputer Science ApplicationsTransmission (telecommunications)Bit error rateErasureProbability distributionFree Space Optical (FSO) communicationTelecommunicationsbusinessOptical turbulenceFSO link reliabilityindoor linkError mitigation
researchProduct

An asynchronous covert channel using spam

2012

AbstractCurrent Internet e-mail facilities are built onto the foundation of standard rules and protocols, which usually allow a considerable amount of “freedom” to their designers. Each of these standards has been defined based on a number of vendor specific implementations, in order to provide common inter-working procedures for cross-vendor communication. Thus, a lot of optional and redundant information is being exchanged during e-mail sessions, which is available to implement versatile covert channel mechanisms.This work exploits this possibility by presenting a simple but effective steganographic scheme that can be used to deploy robust secret communication through spam e-mails. This s…

Computer scienceRetransmissionCovert channelAsynchronous covert channelData lossComputer securitycomputer.software_genreSecure communicationModelling and SimulationCommunication sourceRaptor codeStegosystemSpam steganographybusiness.industryE-mail steganographyComputational MathematicsComputational Theory and MathematicsAsynchronous communicationRaptor codesSecure communicationModeling and SimulationKey (cryptography)businessAsynchronous covert channel; E-mail steganography; Raptor codes; Secure communication; Spam steganography; Stegosystem; Modeling and Simulation; Computational Theory and Mathematics; Computational MathematicscomputerComputer networkComputers & Mathematics with Applications
researchProduct

Corporate ethical codes as strategic documents: An analysis of success and failure

2009

Ethical codes state the major philosophical principles and values in organizations and function as policy documents which define the responsibilities of organizations to stakeholders. They spell out the conduct expected of employees and articulate the acceptable ethical parameters of behavior in the organization. Most large US and multinational firms today have a code. If utilized effectively and embraced, codes can be key strategic documents in organizations for moderating employee behavior and reducing unethical actions. To be effective they must be communicated well and become a part of the culture of the organization. An ethical code from a major investment bank is analyzed in terms of …

ComputingMilieux_THECOMPUTINGPROFESSIONcorporate ethical codesLehman Brothersstrategyethics
researchProduct

From the LCA of food products to the environmental assessment of protected crops districts: A case-study in the south of Italy

2010

In the present study, Life Cycle Assessment (LCA) methodology was applied to evaluate the energy consumption and environmental burdens associated with the production of protected crops in an agricultural district in the Mediterranean region. In this study, LCA was used as a ‘support tool’, to address local policies for sustainable production and consumption patterns, and to create a ‘knowledge base’ for environmental assessment of an extended agricultural production area. The proposed approach combines organisation-specific tools, such as Environmental Management Systems and Environmental Product Declarations, with the environmental management of the district. Questionnaires were distribute…

Crops AgriculturalConservation of Natural ResourcesEngineeringEnvironmental EngineeringGreenhouseManagement Monitoring Policy and LawFood SupplyEnvironmental protectionSurveys and QuestionnairesEnvironmental impact assessmentAgricultural productivityWaste Management and DisposalLife-cycle assessmentSettore ING-IND/11 - Fisica Tecnica Ambientalebusiness.industryEnvironmental engineeringAgricultureGeneral MedicineEnvironmental PolicyItalyAgricultureGreenhouse gasEnvironmental management systembusinessEcodesignLCA Food Protected crop Agricultural district Environmental Supply Chain Management (ESCM)Environmental MonitoringJournal of Environmental Management
researchProduct

Angular variations of brightness surface temperatures derived from dual-view measurements of the Advanced Along-Track Scanning Radiometer using a new…

2019

Abstract Surface temperatures derived from remote sensing data over heterogeneous, non-isothermal land surfaces depend on the viewing and solar angles mainly due to variations in sunlit and shaded fractions of the different elements in the field of view. The near-simultaneous dual-view capability of the Advanced Along-Track Scanning Radiometer (AATSR) can be used to estimate differences in brightness surface temperatures (BSTs) between the nadir (satellite zenith angle of 0°–21.7°) and forward views (53°–55.6°) in the 11 and 12 μm bands. BST is defined as the black-body temperature corresponding to the radiance at surface level (that is, corrected for atmospheric absorption and emission). W…

DaytimeRadiometerAtmospheric radiative transfer codesAtmospheric correctionRadianceNadirSoil ScienceEnvironmental scienceGeologyAATSRComputers in Earth SciencesZenithRemote sensingRemote Sensing of Environment
researchProduct

READING WORDS, NUMB3R5 and $YMßOL$

2007

Words in alphabetic languages are processed via their constituents [1]. To recognize a printed word, we need to process the identity and position of its letters, hence distinguishing between cat and fat, or dog and god, but not between tABLe and TabLE, or and . Dehaene and colleagues [2] proposed a neuronal model with feed-forward connections only, according to which the brain decodes words through a hierarchy of local combination detectors in the occipito–infero–temporal pathway sensitive to increasingly larger fragments of words.

DecodesHierarchybiologyCognitive Neurosciencemedia_common.quotation_subjectExperimental and Cognitive Psychologybiology.organism_classificationLinguisticsIdentity (mathematics)Neuropsychology and Physiological PsychologyReading (process)Table (database)PsychologyWord (group theory)media_commonTrends in Cognitive Sciences
researchProduct

On the weight distribution of perfect binary codes

2021

In this paper, we give a new proof of the closed-form formula for the weight distribution of a perfect binary single-error-correcting code.

Discrete mathematicsAlgebra and Number TheoryPerfect codes Binary codes Hamming codes Weight distribution.Hamming boundApplied MathematicsBinary numberTheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGESSettore MAT/05 - Analisi MatematicaWeight distributionCode (cryptography)Binary codeSettore MAT/03 - GeometriaHamming codeAnalysisMathematics
researchProduct

New lower bounds for the minimum distance of generalized algebraic geometry codes

2013

Abstract In this paper, we give a new lower bound for generalized algebraic geometry codes with which we are able to construct some new linear codes having better parameters compared with the ones known in the literature. Moreover, we give a relationship between a family of generalized algebraic geometry codes and algebraic geometry codes. Finally, we propose a decoding algorithm for such a family.

Discrete mathematicsAlgebraic cycleBlock codeAlgebraic function field generalized algebraic geometry codes minimum distanceAlgebra and Number TheoryDerived algebraic geometryFunction field of an algebraic varietyAlgebraic surfaceReal algebraic geometryDimension of an algebraic varietySettore MAT/03 - GeometriaLinear codeMathematicsJournal of Pure and Applied Algebra
researchProduct

A-Codes from Rational Functions over Galois Rings

2006

In this paper, we describe authentication codes via (generalized) Gray images of suitable codes over Galois rings. Exponential sums over these rings help determine--or bound--the parameters of such codes.

Discrete mathematicsMathematics::Commutative AlgebraApplied MathematicsFundamental theorem of Galois theoryGalois groupRational functionExponential polynomialComputer Science ApplicationsEmbedding problemDifferential Galois theorysymbols.namesakeGalois rings Gray map codesComputer Science::Computer Vision and Pattern RecognitionComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATIONComputer Science::MultimediasymbolsSettore MAT/03 - GeometriaGalois extensionResolventMathematicsDesigns, Codes and Cryptography
researchProduct