Complete complementary codes represent special group of codes with unique properties, which were not detected for any other codes. These codes found a wide application in several science areas with the broadest applic...
详细信息
Complete complementary codes represent special group of codes with unique properties, which were not detected for any other codes. These codes found a wide application in several science areas with the broadest application possibilities in telecommunications. This review paper analyses the applications of these codes proposed so far and aims to propose not sufficiently explored and new areas for further research endeavors.
A review of estimation approaches for intercoder reliability reported in articles in leading marketing journals reveals that most marketing researchers are using inadequate measures. The authors recommend that marketi...
详细信息
A review of estimation approaches for intercoder reliability reported in articles in leading marketing journals reveals that most marketing researchers are using inadequate measures. The authors recommend that marketing researchers report dependability indices based on generalizability theory for quantitative coding systems.
Circulant matrices are an important tool widely used in coding theory and cryptography. A circulant matrix is a square matrix whose rows are the cyclic shifts of the first row. Such a matrix can be efficiently stored ...
详细信息
Circulant matrices are an important tool widely used in coding theory and cryptography. A circulant matrix is a square matrix whose rows are the cyclic shifts of the first row. Such a matrix can be efficiently stored in memory because it is fully specified by its first row. The ring of n x n circulant matrices can be identifed with the quotient ring F[x]/(x n — 1). In consequence, the strong algebraic structure of the ring F[x]/(x n — 1) can be used to study properties of the collection of all n x n circulant matrices. The ring F[x]/(x n — 1) is a special case of a group algebra and elements of any finite dimensional group algebra can be represented with square matrices which are specified by a single column. In this paper we study this representation and prove that it is an injective Hamming weight preserving homomorphism of F-algebras and classify it in the case where the underlying group is abelian. Our work is motivated by the desire to generalize the BIKE cryptosystem (a contender in the NIST competition to get a new post-quantum standard for asymmetric cryptography). Group algebras can be used to design similar cryptosystems or, more generally, to construct low density or moderate density parity-check matrices for linear codes.
The author discusses a series of articles published by physicist Giorgio Parisi in 1979-1980 on the limitations of the replica symmetric solution proposed by D. Sherrington and S. Kirkpatrick, known as the SK model. A...
详细信息
The author discusses a series of articles published by physicist Giorgio Parisi in 1979-1980 on the limitations of the replica symmetric solution proposed by D. Sherrington and S. Kirkpatrick, known as the SK model. According to the author, Parisi's solution was based on the broken symmetry of replicas. It is suggested that, over time, Parisi's replicas solution has been proven to be applicable to several systems including neural networks, spin glasses, and coding.
Listeners exploit small interindividual variations around a generic acoustical structure to discriminate and identify individuals from their voice-a key requirement for social interactions. The human brain contains te...
详细信息
Listeners exploit small interindividual variations around a generic acoustical structure to discriminate and identify individuals from their voice-a key requirement for social interactions. The human brain contains temporal voice areas (TVA) [1] involved in an acoustic-based representation of voice identity [2-6], but the underlying coding mechanisms remain unknown. Indirect evidence suggests that identity representation in these areas could rely on a norm-based coding mechanism [4, 7-11]. Here, we show by using fMRI that voice identity is coded in the TVA as a function of acoustical distance to two internal voice prototypes (one male, one female)-approximated here by averaging a large number of same-gender voices by using morphing [12]. Voices more distant from their prototype are perceived as more distinctive and elicit greater neuronal activity in voice-sensitive cortex than closer voices-a phenomenon not merely explained by neuronal adaptation [13, 14]. Moreover, explicit manipulations of distance-to-mean by morphing voices toward (or away from) their prototype elicit reduced (or enhanced) neuronal activity. These results indicate that voice-sensitive cortex integrates relevant acoustical features into a complex representation referenced to idealized male and female voice prototypes. More generally, they shed light on remarkable similarities in cerebral representations of facial and vocal identity.
This article presents information on the October 2004 issue of the IEEE Transactions on Signal Processing. This issue is the first among three supplements on secure media. It contains ten papers which covers a broad r...
详细信息
This article presents information on the October 2004 issue of the IEEE Transactions on Signal Processing. This issue is the first among three supplements on secure media. It contains ten papers which covers a broad range of topics and were selected based on their high level of technical quality, mathematical rigor, significance and novelty. The topics include steganography, watermarking codes, temporal geometric robustness of video watermarks, cryptography for multimedia, performance analysis of biometric systems.
We incorporate the early zero-block detection technique into the UMHexagonS algorithm, which has already been adopted in H. 264/AVC JM reference software, to speed up the motion estimation process. A nearly sufficient...
详细信息
We incorporate the early zero-block detection technique into the UMHexagonS algorithm, which has already been adopted in H. 264/AVC JM reference software, to speed up the motion estimation process. A nearly sufficient condition is derived for early zero-block detection. Although the conventional early zero-block detection method can achieve significant improvement in computation reduction, the PSNR loss, to whatever extent, is not negligible especially for high quantization parameter (QP) or low bit-rate coding. This paper modifies the UMHexagonS algorithm with the early zero-block detection technique to improve its coding performance. The experimental results reveal that the improved UMHexagonS algorithm greatly reduces computation while maintaining very high coding efficiency. Copyright (C) 2008 Y. M. Lee et al.
The generalized quantum entropies are introduced in this paper. Some important properties such as nonnegativity, continuity, and concavity are proved. But different from the Von Neumann entropy, the subadditivity and ...
详细信息
The generalized quantum entropies are introduced in this paper. Some important properties such as nonnegativity, continuity, and concavity are proved. But different from the Von Neumann entropy, the subadditivity and additivity fail for the quantum unified (r,s)-entropy in general. (c) 2006 American Institute of Physics.
Within a continuum framework, flows featuring shock waves can be modelled by means of either shock capturing or shock fitting. Shock-capturing codes are algorithmically simple, but are plagued by a number of numerical...
详细信息
Within a continuum framework, flows featuring shock waves can be modelled by means of either shock capturing or shock fitting. Shock-capturing codes are algorithmically simple, but are plagued by a number of numerical troubles, particularly evident when shocks are strong and the grids unstructured. On the other hand, shock-fitting algorithms on structured grids allow to accurately compute solutions on coarse meshes, but tend to be algorithmically complex. We show how recent advances in computational mesh generation allow to relieve some of the difficulties encountered by shock capturing and contribute towards making shock fitting on unstructured meshes a versatile technique.
暂无评论