• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 215
  • 42
  • 38
  • 10
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 6
  • 4
  • 4
  • 3
  • 1
  • Tagged with
  • 381
  • 381
  • 381
  • 321
  • 316
  • 97
  • 73
  • 60
  • 57
  • 48
  • 44
  • 44
  • 44
  • 40
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Decoding of two dimensional symbologies on uneven surfaces.

January 2002 (has links)
by Tse, Yan Tung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 75-76). / Abstracts in English and Chinese. / Abstract --- p.i / 摘要 --- p.i / Acknowledgements --- p.ii / Table of Contents --- p.iii / List of Figures --- p.vi / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Types of 2D Barcodes --- p.3 / Chapter 1.2 --- Reading 2D Barcodes --- p.5 / Chapter 1.3 --- Thesis Organization --- p.8 / Chapter Chapter 2 --- Related Works --- p.9 / Chapter 2.1 --- DataMatrix --- p.9 / Chapter 2.2 --- Original MaxiCode --- p.11 / Chapter 2.3 --- Spatial Methods for MaxiCode --- p.12 / Chapter 2.4 --- Summary --- p.14 / Chapter Chapter 3 --- Reading 2D Barcode on Uneven Surfaces --- p.15 / Chapter 3.1 --- The Image Processing Framework --- p.15 / Chapter 3.2 --- The Scanning Environment --- p.17 / Chapter 3.3 --- Perspective Transform --- p.20 / Chapter Chapter 4 --- Uneven Surface Models --- p.23 / Chapter 4.1 --- Cylindrical Surfaces --- p.24 / Chapter 4.2 --- General Uneven Surfaces --- p.26 / Chapter Chapter 5 --- """Patch-wise"" Barcode Reading" --- p.28 / Chapter 5.1 --- The Inputs --- p.28 / Chapter 5.2 --- The Registration Process --- p.29 / Chapter 5.3 --- Patch Cutting --- p.33 / Chapter Chapter 6 --- Registering Cells in a Patch --- p.37 / Chapter 6.1 --- Document Skew Detection: Projection Profiles --- p.38 / Chapter 6.2 --- Radon Transform Based Orientation Detection --- p.41 / Chapter 6.3 --- Identifying Row/column Boundaries --- p.45 / Chapter 6.4 --- Detecting Cell Width --- p.50 / Chapter 6.5 --- Calculating Transform Parameters --- p.53 / Chapter Chapter 7 --- Patch Registration --- p.57 / Chapter 7.1 --- Matching Adjacent patches --- p.57 / Chapter 7.2 --- Expanding to the Entire Code Area --- p.60 / Chapter Chapter 8 --- Simulation and Results --- p.61 / Chapter 8.1 --- Implementation Details --- p.61 / Chapter 8.2 --- Comparison Methods --- p.63 / Chapter 8.3 --- Results --- p.63 / Chapter 8.4 --- Computation Costs --- p.68 / Chapter Chapter 9 --- Conclusion and Further Works --- p.73 / Bibliography --- p.75
32

Coherent network error correction. / 網絡編碼與糾錯 / CUHK electronic theses & dissertations collection / Wang luo bian ma yu jiu cuo

January 2008 (has links)
Based on the weight properties of network codes, we present the refined versions of the Hamming bound, the Singleton bound and the Gilbert-Varshamov bound for linear network codes. We give two different algorithms to construct network codes with minimum distance constraints, both of which can achieve the refined Singleton bound. The first algorithm finds a codebook based on a given set of local encoding kernels defining a linear network code. The second algorithm finds a set of of local encoding kernels based on a given classical error-correcting code satisfying a certain minimum distance requirement. / First, the error correction/detection correction capabilities of a network code is completely characterized by a parameter which is equivalent to the minimum Hamming distance when the network code is linear and the weight measure on the error vectors is the Hamming weight. Our results imply that for a linear network code with the Hamming weight being the weight measure on the error vectors, the capability of the code is fully characterized by a single minimum distance. By contrast, for a nonlinear network code, two different minimum distances are needed for characterizing the capabilities of the code for error correction and for error detection. This leads to the surprising discovery that for a nonlinear network code, the number of correctable errors can be more than half of the number of detectable errors. (For classical algebraic codes, the number of correctable errors is always the largest integer not greater than half of the number of detectable errors.) / Network error correction provides a new method to correct errors in network communications by extending the strength of classical error-correcting codes from a point-to-point model to networks. This thesis considers a number of fundamental problems in coherent network error correction. / We further define equivalence classes of weight measures with respect to a general channel model. Specifically, for any given channel, the minimum weight decoders for two different weight measures are equivalent if the two weight measures belong to the same equivalence class. In the special case of network coding, we study four weight measures and show that all the four weight measures are in the same equivalent class for linear network codes. Hence they are all equivalent for error correction and detection when applying minimum weight decoding. / Yang, Shenghao. / Adviser: Raymond W.H. Yeung. / Source: Dissertation Abstracts International, Volume: 70-06, Section: B, page: 3708. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 89-93). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
33

A simple RLS-POCS solution for reduced complexity ADSL impulse shortening

Helms, Sheldon J. 03 September 1999 (has links)
Recently, with the realization of the World Wide Web, the tremendous need for high-speed data communications has grown. Several access techniques have been proposed which utilize the existing copper twisted pair cabling. Of these, the xDSL family, particularly ADSL and VDSL, have shown great promise in providing broadband or near-broadband access through the common telephone lines. A critical component of the ADSL and VDSL systems is the guard band needed to eliminate the interference caused by the previously transmitted blocks. This guard band must come in the form of redundant samples at the start of every transmit block, and be at least as long as the channel impulse response. Since the required guard band length is much greater than the length of the actual transmitted samples, techniques to shorten the channel impulse response must be considered. In this thesis, a new algorithm based on the RLS error minimization and POCS optimization techniques will be applied to the channel impulse-shortening problem in an ADSL environment. As will be shown, the proposed algorithm will provide a much better solution with a minimal increase in complexity as compared to the existing LMS techniques. / Graduation date: 2000
34

Classification context in a machine learning approach to predicting protein secondary structure

Langford, Bill T. 13 May 1993 (has links)
An important problem in molecular biology is to predict the secondary structure of proteins from their primary structure. The primary structure of a protein is the sequence of amino acid residues. The secondary structure is an abstract description of the shape of the folded protein, with regions identified as alpha helix, beta strands, and random coil. Existing methods of secondary structure prediction examine a short segment of the primary structure and predict the secondary structure class (alpha, beta, coil) of an individual residue centered in that segment. The last few years of research have failed to improve these methods beyond the level of 65% correct predictions. This thesis investigates whether these methods can be improved by permitting them to examine externally-supplied predictions for the secondary structure of other residues in the segment. The externally-supplied predictions are called the "classification context," because they provide contextual information about the secondary structure classifications of neighboring residues. The classification context could be provided by an existing algorithm that made initial secondary structure predictions, and then these could be taken as input by a second algorithm that would attempt to improve the predictions. A series of experiments on both real and simulated classification context were performed to measure the possible improvement that could be obtained from classification context. The results showed that the classification context provided by current algorithms does not yield improved performance when used as input by those same algorithms. However, if the classification context is generated by randomly damaging the correct classifications, substantial performance improvements are possible. Even small amounts of randomly damaged correct context improves performance. / Graduation date: 1994
35

Decentralized Coding in Unreliable Communication Networks

Lin, Yunfeng 30 August 2010 (has links)
Many modern communication networks suffer significantly from the unreliable characteristic of their nodes and links. To deal with failures, traditionally, centralized erasure codes have been extensively used to improve reliability by introducing data redundancy. In this thesis, we address several issues in implementing erasure codes in a decentralized way such that coding operations are spread to multiple nodes. Our solutions are based on fountain codes and randomized network coding, because of their capability of being amenable to decentralized implementation originated from their simplicity and randomization properties. Our contributions consist of four parts. First, we propose a novel decentralized implementation of fountain codes utilizing random walks. Our solution does not require node location information and enjoys a small local routing table with a size in proportion to the number of neighbors. Second, we introduce priority random linear codes to achieve partial data recovery by partition and encoding data into non-overlapping or overlapping subsets. Third, we present geometric random linear codes to decrease communication costs in decoding significantly, by introducing modest data redundancy in a hierarchical fashion. Finally, we study the application of network coding in disruption tolerant networks. We show that network coding achieves shorter data transmission time than replication, especially when data buffers are limited. We also propose an efficient variant of network coding based protocol, which attains similar transmission delay, but with much lower transmission costs, as compared to a protocol based on epidemic routing.
36

Decentralized Coding in Unreliable Communication Networks

Lin, Yunfeng 30 August 2010 (has links)
Many modern communication networks suffer significantly from the unreliable characteristic of their nodes and links. To deal with failures, traditionally, centralized erasure codes have been extensively used to improve reliability by introducing data redundancy. In this thesis, we address several issues in implementing erasure codes in a decentralized way such that coding operations are spread to multiple nodes. Our solutions are based on fountain codes and randomized network coding, because of their capability of being amenable to decentralized implementation originated from their simplicity and randomization properties. Our contributions consist of four parts. First, we propose a novel decentralized implementation of fountain codes utilizing random walks. Our solution does not require node location information and enjoys a small local routing table with a size in proportion to the number of neighbors. Second, we introduce priority random linear codes to achieve partial data recovery by partition and encoding data into non-overlapping or overlapping subsets. Third, we present geometric random linear codes to decrease communication costs in decoding significantly, by introducing modest data redundancy in a hierarchical fashion. Finally, we study the application of network coding in disruption tolerant networks. We show that network coding achieves shorter data transmission time than replication, especially when data buffers are limited. We also propose an efficient variant of network coding based protocol, which attains similar transmission delay, but with much lower transmission costs, as compared to a protocol based on epidemic routing.
37

Error-correcting codes on low néron-severi rank surfaces

Zarzar, Marcos Augusto 28 August 2008 (has links)
Not available / text
38

Double-burst-error correction with cyclic codes.

Jang, Kenneth Kin Yok January 1972 (has links)
No description available.
39

Iterative coding methods for the binary symmetric channel and magnetic recording channel

Thangaraj, Andrew 08 1900 (has links)
No description available.
40

Key management for McEliece public-key cryptosystem

Williams, Deidre D. 08 1900 (has links)
No description available.

Page generated in 0.1007 seconds