To see the other types of publications on this topic, follow the link: Detection codes.

Journal articles on the topic 'Detection codes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Detection codes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Alekseev, Maksim. "On Strengthening of Weak Algebraic Manipulation Detection Codes." International Journal of Embedded and Real-Time Communication Systems 6, no. 2 (April 2015): 1–26. http://dx.doi.org/10.4018/ijertcs.2015040101.

Full text
Abstract:
Algebraic manipulation detection codes were introduced in 2008 to protect data against a special type of its modification – an algebraic manipulation. There are three classes of codes: weak, strong and stronger ones. Weak codes detect only weak algebraic manipulations, while strong and stronger are capable to detect both weak and strong manipulations. In this paper, a method to transform codes from weak to stronger is described resulting in a construction of generalized robust codes. The proposed construction forms the second known family of stronger AMD codes. Codes provide simple procedures of error detectiona and correction, and allow using multi-code codec design that makes it applicable in fault-tolerant computing, storage and cryptographic devices.
APA, Harvard, Vancouver, ISO, and other styles
2

Cramer, Ronald, Serge Fehr, and Carles Padró. "Algebraic manipulation detection codes." Science China Mathematics 56, no. 7 (July 2013): 1349–58. http://dx.doi.org/10.1007/s11425-013-4654-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ford, Elizabeth, John A. Carroll, Helen E. Smith, Donia Scott, and Jackie A. Cassell. "Extracting information from the text of electronic medical records to improve case detection: a systematic review." Journal of the American Medical Informatics Association 23, no. 5 (February 5, 2016): 1007–15. http://dx.doi.org/10.1093/jamia/ocv180.

Full text
Abstract:
Abstract Background Electronic medical records (EMRs) are revolutionizing health-related research. One key issue for study quality is the accurate identification of patients with the condition of interest. Information in EMRs can be entered as structured codes or unstructured free text. The majority of research studies have used only coded parts of EMRs for case-detection, which may bias findings, miss cases, and reduce study quality. This review examines whether incorporating information from text into case-detection algorithms can improve research quality. Methods A systematic search returned 9659 papers, 67 of which reported on the extraction of information from free text of EMRs with the stated purpose of detecting cases of a named clinical condition. Methods for extracting information from text and the technical accuracy of case-detection algorithms were reviewed. Results Studies mainly used US hospital-based EMRs, and extracted information from text for 41 conditions using keyword searches, rule-based algorithms, and machine learning methods. There was no clear difference in case-detection algorithm accuracy between rule-based and machine learning methods of extraction. Inclusion of information from text resulted in a significant improvement in algorithm sensitivity and area under the receiver operating characteristic in comparison to codes alone (median sensitivity 78% (codes + text) vs 62% (codes), P = .03; median area under the receiver operating characteristic 95% (codes + text) vs 88% (codes), P = .025). Conclusions Text in EMRs is accessible, especially with open source information extraction algorithms, and significantly improves case detection when combined with codes. More harmonization of reporting within EMR studies is needed, particularly standardized reporting of algorithm accuracy metrics like positive predictive value (precision) and sensitivity (recall).
APA, Harvard, Vancouver, ISO, and other styles
4

Das, P. K. "Codes on Key Errors." Cybernetics and Information Technologies 14, no. 2 (July 15, 2014): 31–37. http://dx.doi.org/10.2478/cait-2014-0017.

Full text
Abstract:
Abstract Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Chaofan, Li Li, Li Wang, Shuai Wang, Xiangming Li, and George K. Karagiannidis. "Noncoherent Detection With Polar Codes." IEEE Access 7 (2019): 6362–72. http://dx.doi.org/10.1109/access.2018.2889498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Klove, T. "Optimal codes for error detection." IEEE Transactions on Information Theory 38, no. 2 (March 1992): 479–89. http://dx.doi.org/10.1109/18.119708.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Condo, Carlo, Seyyed Ali Hashemi, and Warren J. Gross. "Blind Detection With Polar Codes." IEEE Communications Letters 21, no. 12 (December 2017): 2550–53. http://dx.doi.org/10.1109/lcomm.2017.2748940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Ying, and Guihua Zeng. "Quantum Event-Error Detection Codes." Journal of the Physical Society of Japan 74, no. 11 (November 15, 2005): 2949–56. http://dx.doi.org/10.1143/jpsj.74.2949.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Siddharth, A. "Error detection in numeric codes." Resonance 17, no. 7 (July 2012): 653–71. http://dx.doi.org/10.1007/s12045-012-0070-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shutao, Xia, and Fu Fangwei. "Combinatorial codes for error detection." Acta Mathematicae Applicatae Sinica 15, no. 4 (October 1999): 444–46. http://dx.doi.org/10.1007/bf02684046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hwang, Inho, Han Park, and Jeong Lee. "LDPC Coded Massive MIMO Systems." Entropy 21, no. 3 (February 27, 2019): 231. http://dx.doi.org/10.3390/e21030231.

Full text
Abstract:
We design a coded massive multiple-input multiple-output (MIMO) system using low-density parity-check (LDPC) codes and iterative joint detection and decoding (JDD) algorithm employing a low complexity detection. We introduce the factor graph representation of the LDPC coded massive MIMO system, based on which the message updating rule in the JDD is defined. We devise a tool for analyzing extrinsic information transfer (EXIT) characteristics of messages flowing in the JDD and the three-dimensional (3-D) EXIT chart provides a visualization of the JDD behavior. Based on the proposed 3-D EXIT analysis, we design jointly the degree distribution of irregular LDPC codes and the JDD strategy for the coded massive MIMO system. The JDD strategy was determined to achieve a higher error correction capability with a given amount of computational complexity. It was observed that the coded massive MIMO system equipped with the proposed LDPC codes and the proposed JDD strategy has lower bit error rate than conventional LDPC coded massive MIMO systems.
APA, Harvard, Vancouver, ISO, and other styles
12

Yen, Chih Ta, and Wen Bin Chen. "A Study of Modified Prime Codes Optical CDMA for Wired-Wireless System." Applied Mechanics and Materials 284-287 (January 2013): 2672–76. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2672.

Full text
Abstract:
In this study, we propose optical code-division multiple-access (OCDMA) network for the radio-over-fiber (RoF) transmissions. The network encoder/decoders (codecs) are structured on the basis of arrayed-waveguide-grating (AWG) routers coded with modified prime codes (MPCs). Performances are numerically evaluated with the effect of phase-induced-intensity-noise (PIIN). It showed that the new code families with lower cross correlation can suppress the intensity noise and cancel out the multiple-access interference (MAI) in balanced detection process effectively and hence improve the system performance. By the proposed MPC-coded OCDMA ROF network codecs, each network requires only two AWG routers to accomplish spectral coding of radio base station (RBS) and decoding of control station (CS), thus, resulting in a simpler and lower cost system. It is possible to accomplish interference- and crosstalk-free optical CDMA system for RoF transmissions.
APA, Harvard, Vancouver, ISO, and other styles
13

Samuel, Michael, and Michael Fitz. "Multi-strata codes: space-time block codes with low detection complexity." IEEE Transactions on Communications 58, no. 4 (April 2010): 1080–89. http://dx.doi.org/10.1109/tcomm.2010.04.080413.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Shutao, Xia, and Fu Fangwei. "Error detection capability of shortened hamming codes and their dual codes." Acta Mathematicae Applicatae Sinica 16, no. 3 (July 2000): 292–98. http://dx.doi.org/10.1007/bf02679894.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Zhang, Yu, Li Ping Song, and Li Heng Yang. "Malicious Codes Detection Inspired by MHC." Applied Mechanics and Materials 55-57 (May 2011): 1642–47. http://dx.doi.org/10.4028/www.scientific.net/amm.55-57.1642.

Full text
Abstract:
More and more malicious codes spread faster than ever and make the traditional anti-virus technology based on virus signatures to encounter unprecedented difficulties. People try to seek inspirations from Nature. The biology immune system provides a novel idea for malicious codes detection. Inspired by the features of MHC (Major Histocompatibility Complex) in the biological immune system, we propose an MHC-inspired method for malicious codes detection to effectively detect previously unknown malicious codes. The antibody (detector) consists of the constant region and the variable region. The constant region, filled with MHC genes, is to preserve outstanding antibody genes. The variable region, composed of other antibodies genes fragments, is to improve the antibody diversity by mutation. The dynamic evolution of self and nonself, the presentation of antigen, and the generation of antibody are discussed. The experiments are conducted and the results indicate that the proposed method has relatively higher detection rate of unknown malicious codes than AISCSA, a typical immunity-based method for malicious codes detection.
APA, Harvard, Vancouver, ISO, and other styles
16

LU, Jia-xing, Fan GUO, and Min YU. "Static detection of polymorphic attack codes." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3349–53. http://dx.doi.org/10.3724/sp.j.1087.2010.03349.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Klove, Torleiv. "Constructing Proper Codes for Error Detection." IEEE Transactions on Information Theory 55, no. 8 (August 2009): 3520–25. http://dx.doi.org/10.1109/tit.2009.2023712.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

de Bruyne, M., and T. C. Baker. "Odor Detection in Insects: Volatile Codes." Journal of Chemical Ecology 34, no. 7 (June 6, 2008): 882–97. http://dx.doi.org/10.1007/s10886-008-9485-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yen, Chih-Ta, Ing-Jr Ding, and Cheng-Mu Tsai. "PERFORMANCE ANALYSIS OF SEVERAL QUASI-ORTHOGONAL CODES OPTICAL CDMA FOR RADIO-OVER-FIBER SYSTEM." Transactions of the Canadian Society for Mechanical Engineering 37, no. 3 (September 2013): 415–26. http://dx.doi.org/10.1139/tcsme-2013-0031.

Full text
Abstract:
An optical code-division multiple-access (OCDMA) network for radio-over-fiber (RoF) transmissions was proposed. The network encoders/decoders (codecs) were structured based on arrayed-waveguide-grating (AWG) routers coded using modified prime codes (MPCs). In the proposed system, the lower in-phase cross correlation could reduce the beating noise, and in the proposed study, its performance was compared with that of a conventional system that uses M-sequence and Walsh-Hadamard codes. The performance of both systems was numerically evaluated by analyzing the effect of phase-induced-intensity noise (PIIN). The results showed that the new code families that had lower cross correlation can suppress the intensity of the noise and effectively cancel out the multiple-access interference (MAI) in balanced detection processes, which improved system performance. By using the proposed MPC-coded OCDMA ROF network codecs, each network required only two AWG routers to accomplish the spectral coding of radio base stations (RBSs) and the decoding of control stations (CSs), resulting in a simple and low-cost system. Therefore, it is possible to produce interference- and crosstalk-free optical CDMA systems for RoF transmissions.
APA, Harvard, Vancouver, ISO, and other styles
20

Iffath, Fariha, A. S. M. Kayes, Md Tahsin Rahman, Jannatul Ferdows, Mohammad Shamsul Arefin, and Md Sabir Hossain. "Online Judging Platform Utilizing Dynamic Plagiarism Detection Facilities." Computers 10, no. 4 (April 8, 2021): 47. http://dx.doi.org/10.3390/computers10040047.

Full text
Abstract:
A programming contest generally involves the host presenting a set of logical and mathematical problems to the contestants. The contestants are required to write computer programs that are capable of solving these problems. An online judge system is used to automate the judging procedure of the programs that are submitted by the users. Online judges are systems designed for the reliable evaluation of the source codes submitted by the users. Traditional online judging platforms are not ideally suitable for programming labs, as they do not support partial scoring and efficient detection of plagiarized codes. When considering this fact, in this paper, we present an online judging framework that is capable of automatic scoring of codes by detecting plagiarized contents and the level of accuracy of codes efficiently. Our system performs the detection of plagiarism by detecting fingerprints of programs and using the fingerprints to compare them instead of using the whole file. We used winnowing to select fingerprints among k-gram hash values of a source code, which was generated by the Rabin–Karp Algorithm. The proposed system is compared with the existing online judging platforms to show the superiority in terms of time efficiency, correctness, and feature availability. In addition, we evaluated our system by using large data sets and comparing the run time with MOSS, which is the widely used plagiarism detection technique.
APA, Harvard, Vancouver, ISO, and other styles
21

Tian, Runlan, Guoyi Zhang, Rui Zhou, and Wei Dong. "Detection of Polyphase Codes Radar Signals in Low SNR." Mathematical Problems in Engineering 2016 (2016): 1–6. http://dx.doi.org/10.1155/2016/1382960.

Full text
Abstract:
A novel effective detection method is proposed for electronic intelligence (ELINT) systems detecting polyphase codes radar signal in the low signal-to-noise ratio (SNR) scenario. The core idea of the proposed method is first to calculate the time-frequency distribution of polyphase codes radar signals via Wigner-Ville distribution (WVD); then the modified Hough transform (HT) is employed to cumulate all the energy of WVD’s ridges effectively to achieve signal detection. Compared with the generalised Wigner Hough transform (GWHT) method, the proposed method has a superior performance in low SNR and is not sensitive to the code type. Simulation results verify the validity of the proposed method.
APA, Harvard, Vancouver, ISO, and other styles
22

McAuley, A. J. "Weighted sum codes for error detection and their comparison with existing codes." IEEE/ACM Transactions on Networking 2, no. 1 (1994): 16–22. http://dx.doi.org/10.1109/90.282604.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Efanov, D. V. "Features of Error Detection by Borden Codes." Èlektronnoe modelirovanie 41, no. 6 (December 5, 2019): 49–64. http://dx.doi.org/10.15407/emodel.41.06.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Han, Lansheng, Cai Fu, Deqing Zou, ChangHoon Lee, and Wenjing Jia. "Task-based behavior detection of illegal codes." Mathematical and Computer Modelling 55, no. 1-2 (January 2012): 80–86. http://dx.doi.org/10.1016/j.mcm.2011.01.052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Nguyen, G. D. "Error-detection codes: algorithms and fast implementation." IEEE Transactions on Computers 54, no. 1 (January 2005): 1–11. http://dx.doi.org/10.1109/tc.2005.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Raphaeli, D., G. Sitton, and I. Taler. "Geometrically Uniform Trellis Codes for Noncoherent Detection." IEEE Transactions on Wireless Communications 3, no. 6 (November 2004): 2182–88. http://dx.doi.org/10.1109/twc.2004.837281.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Anderson, J. B., and E. Offer. "Reduced-state sequence detection with convolutional codes." IEEE Transactions on Information Theory 40, no. 3 (May 1994): 965–72. http://dx.doi.org/10.1109/18.335914.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Fang-Wei Fu and Shu-Tao Xia. "Binary constant-weight codes for error detection." IEEE Transactions on Information Theory 44, no. 3 (May 1998): 1294–99. http://dx.doi.org/10.1109/18.669415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Feldmeier, D. C. "Fast software implementation of error detection codes." IEEE/ACM Transactions on Networking 3, no. 6 (1995): 640–51. http://dx.doi.org/10.1109/90.477710.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Leung, C., and K. A. Witzke. "On testing for improper error detection codes." IEEE Transactions on Communications 38, no. 12 (1990): 2085–86. http://dx.doi.org/10.1109/26.64645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Chujoh, Takeshi. "Error detection capability for variable length codes." Electronics and Communications in Japan (Part III: Fundamental Electronic Science) 86, no. 1 (September 17, 2002): 70–79. http://dx.doi.org/10.1002/ecjc.10014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Efanov, D. V., G. V. Osadchiy, and M. V. Zueva. "THE CHARACTERISTICS OF ERROR DETECTION BY CODES WITH THE SUMMATION OF SINGLE INFORMATION BITS IN THE RING OF RESIDUES, ACCORDING TO A GIVEN MODULUS ARE ANALYZED, WHICH ARE MANIFESTED IN THE SYNTHESIS OF BUILT-IN CONTROL CIRCUITS USING THE BOOLEAN COMPLEMENT METHOD." Automation on Transport 7, no. 2 (June 2021): 284–314. http://dx.doi.org/10.20295/2412-9186-2021-7-2-284-314.

Full text
Abstract:
Errors occurring in the control vectors are always detected. Unlike previous studies in this subject area, the authors focus on the features of error detection by modular sum codes in all codewords, and not just in information vectors. Previously unknown properties of error detection by modular sum- mation codes with their classification by types (unidirectional, symmetrical and asymmetrical errors) and multiplicities have been established. Catalogs of detailed characteristics of modular sum codes are provided. The key patterns inherent in this class of codes are described. The research results can be used in organizing built-in control circuits using the Boolean complement method, in solving other problems of technical diagnostics, where it is important to know the properties of detecting errors in code words, as well as problems of data protection and transmission
APA, Harvard, Vancouver, ISO, and other styles
33

Mackenthun, K. M. "Codes based on a trellis cut set transformation .II. Codes for noncoherent detection." IEEE Transactions on Communications 47, no. 7 (July 1999): 998–1007. http://dx.doi.org/10.1109/26.774850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kim, Jeong-Chang, and Kyung-Whoon Cheun. "Efficient Detection of Space-Time Block Codes Based on Parallel Detection." Journal of Korean Institute of Communications and Information Sciences 36, no. 2A (February 28, 2011): 100–107. http://dx.doi.org/10.7840/kics.2011.36a.2.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

SOYJAUDAH, K. M. S., and M. I. JAHMEERBACUS. "NOVEL EMBEDDED CODING TECHNIQUE USING ARRAY CODES AND STATISTICAL CHANNEL EVALUATION." Journal of Circuits, Systems and Computers 09, no. 05n06 (October 1999): 307–19. http://dx.doi.org/10.1142/s0218126699000256.

Full text
Abstract:
Previously, the proposed embedded coding techniques based on the row and column array codes, employ a combination of inner codes for error correction and outer codes for error detection. The outer codes involve the addition of further redundant bits. This reduces the overall code rate and hence, the throughput of the system. Furthermore, the decoding of these array codes is not a maximum likelihood decoding. In this paper, we propose a novel embedded coding technique that employs a combination of row and column array codes as well as the generalized array codes, but no outer code. The decoding of these codes is a maximum likelihood decoding and the error detection is done by a new statistical channel evaluation technique that uses the trellises of the component codes embedded in the main block.
APA, Harvard, Vancouver, ISO, and other styles
36

Dodunekova, R., O. Rabaste, and J. L. V. Paez. "Error Detection With a Class of Irreducible Binary Cyclic Codes and Their Dual Codes." IEEE Transactions on Information Theory 51, no. 3 (March 2005): 1206–9. http://dx.doi.org/10.1109/tit.2004.842758.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Farkas, P. "Comments on "Weighted sum codes for error detection and their comparison with existing codes"." IEEE/ACM Transactions on Networking 3, no. 2 (April 1995): 222–23. http://dx.doi.org/10.1109/90.374122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yen, Chih Ta, and Wen Bin Chen. "A Study of Bipolar Walsh-Hadamard Coding Method in Optical CDMA Networks." Applied Mechanics and Materials 284-287 (January 2013): 2667–71. http://dx.doi.org/10.4028/www.scientific.net/amm.284-287.2667.

Full text
Abstract:
This study analyzes and calculates unipolar and bipolar coded configurations of spectral-amplitude-coding optical division multiple access (SAC-OCDMA) systems by using analytic and simulated methods. The important feature of the SAC-OCDMA systems is that multiple access interference (MAI) can be eliminated by code sequences of a fixed in-phase cross-correlation value. This property can be effectively canceled by multiple access interference by using balance detection schemes. This study uses Walsh-Hadamard codes as signature codes for the unipolar and bipolar schemes. The coder and decoder structures are based on optical filters of fiber Bragg gratings (FBGs). The simulation results of unipolar/bipolar coding structures are first presented by commercial simulation obtained using OptiSystem software. The simulation results show that the bit error rate (BER) through use of the bipolar coding method is superior to the unipolar scheme, especially when the received effect power is large. The eye diagram also shows that the bipolar encoding structure exhibits a wider opening than the unipolar encoding structure.
APA, Harvard, Vancouver, ISO, and other styles
39

Elkhazin, Akrum, Konstantinos Plataniotis, and Subbarayan Pasupathy. "Irregular Convolutional Codes in Multiantenna Bit-Interleaved Coded Modulation Under Iterative Detection and Decoding." IEEE Transactions on Vehicular Technology 59, no. 7 (September 2010): 3332–41. http://dx.doi.org/10.1109/tvt.2010.2047739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Saifuddin, A., N. Kadowaki, R. Imai, H. Okazawa, and M. Yamamoto. "HDR codec with concatenated multilevel codes and multiple-symbol differential detection for satellite application." Electronics Letters 33, no. 16 (1997): 1355. http://dx.doi.org/10.1049/el:19970929.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Malek, Miroslaw, and Kitty Hiu Yau. "Cost-effective error detection codes in multicomputer networks." Microprocessing and Microprogramming 20, no. 4-5 (May 1987): 331–43. http://dx.doi.org/10.1016/0165-6074(87)90222-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Anjali, V., T. R. Swapna, and Bharat Jayaraman. "Plagiarism Detection for Java Programs without Source Codes." Procedia Computer Science 46 (2015): 749–58. http://dx.doi.org/10.1016/j.procs.2015.02.143.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Pottie, G. J. "Trellis codes for the optical direct-detection channel." IEEE Transactions on Communications 39, no. 8 (1991): 1182–83. http://dx.doi.org/10.1109/26.134004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Redinbo, G. R. "Decoding real block codes: activity detection Wiener estimation." IEEE Transactions on Information Theory 46, no. 2 (March 2000): 609–23. http://dx.doi.org/10.1109/18.825828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Redinbo, G. R. "Wavelet Codes: Detection and Correction Using Kalman Estimation." IEEE Transactions on Signal Processing 57, no. 4 (April 2009): 1339–50. http://dx.doi.org/10.1109/tsp.2008.2011838.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Hashimoto, T. "Good error-detection codes satisfying the expurgated bound." IEEE Transactions on Information Theory 41, no. 5 (1995): 1347–53. http://dx.doi.org/10.1109/18.412681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Fratini, S. "Error detection in a class of decimal codes." IEEE Transactions on Information Theory 35, no. 5 (1989): 1095–98. http://dx.doi.org/10.1109/18.42228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Karpovsky, M. G., and P. Nagvajara. "Optimal codes for minimax criterion on error detection." IEEE Transactions on Information Theory 35, no. 6 (1989): 1299–305. http://dx.doi.org/10.1109/18.45288.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Dodunekova, R., and S. M. Dodunekov. "The MMD codes are proper for error detection." IEEE Transactions on Information Theory 48, no. 12 (December 2002): 3109–11. http://dx.doi.org/10.1109/tit.2002.805082.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mao, Wei, and Joseph Kahn. "Lattice codes for amplified direct-detection optical systems." IEEE Transactions on Communications 56, no. 7 (July 2008): 1137–45. http://dx.doi.org/10.1109/tcomm.2008.040340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography