咨询与建议

限定检索结果

文献类型

  • 148 篇 期刊文献
  • 97 篇 会议
  • 8 篇 学位论文
  • 1 册 图书

馆藏范围

  • 254 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 216 篇 工学
    • 136 篇 计算机科学与技术...
    • 120 篇 电气工程
    • 47 篇 信息与通信工程
    • 25 篇 控制科学与工程
    • 23 篇 软件工程
    • 17 篇 电子科学与技术(可...
    • 12 篇 仪器科学与技术
    • 7 篇 机械工程
    • 7 篇 材料科学与工程(可...
    • 6 篇 网络空间安全
    • 4 篇 动力工程及工程热...
    • 4 篇 石油与天然气工程
    • 4 篇 生物医学工程(可授...
    • 3 篇 光学工程
    • 2 篇 力学(可授工学、理...
    • 2 篇 测绘科学与技术
    • 2 篇 交通运输工程
    • 2 篇 航空宇航科学与技...
    • 2 篇 核科学与技术
    • 2 篇 安全科学与工程
  • 73 篇 理学
    • 48 篇 数学
    • 20 篇 物理学
    • 3 篇 化学
    • 3 篇 生物学
    • 2 篇 统计学(可授理学、...
  • 12 篇 管理学
    • 11 篇 管理科学与工程(可...
    • 3 篇 图书情报与档案管...
  • 9 篇 医学
    • 6 篇 临床医学
    • 2 篇 基础医学(可授医学...
  • 2 篇 法学
    • 2 篇 法学
  • 2 篇 教育学
  • 1 篇 经济学
  • 1 篇 农学
  • 1 篇 军事学

主题

  • 254 篇 hamming code
  • 18 篇 data hiding
  • 14 篇 steganography
  • 12 篇 perfect code
  • 9 篇 error correction
  • 9 篇 bch code
  • 8 篇 decoding
  • 7 篇 error correction...
  • 7 篇 lsb
  • 7 篇 fpga
  • 6 篇 error correcting...
  • 6 篇 fault tolerance
  • 6 篇 authentication
  • 6 篇 text
  • 6 篇 decoder
  • 6 篇 codes
  • 6 篇 hamming codes
  • 6 篇 encryption
  • 6 篇 error correcting
  • 5 篇 hammingův kód

机构

  • 6 篇 brno university ...
  • 6 篇 natl dong hwa un...
  • 4 篇 sejong univ dept...
  • 4 篇 feng chia univ d...
  • 3 篇 soongsil univ de...
  • 3 篇 hong kong univ s...
  • 3 篇 sobolev inst mat...
  • 3 篇 natl chung cheng...
  • 3 篇 hanoi open univ ...
  • 2 篇 wuhan polytech u...
  • 2 篇 natl chung hsing...
  • 2 篇 amrita vishwa vi...
  • 2 篇 sejong univ dept...
  • 2 篇 hefei univ techn...
  • 2 篇 acad sinica res ...
  • 2 篇 sejong univ dept...
  • 2 篇 chonnam natl uni...
  • 2 篇 univ oklahoma sc...
  • 2 篇 hsiuping univ sc...
  • 2 篇 xian univ techno...

作者

  • 13 篇 yang ching-nung
  • 10 篇 kim cheonshik
  • 7 篇 shin dongkyoo
  • 5 篇 chang chin-chen
  • 5 篇 jana biswapati
  • 4 篇 vinodhini m.
  • 4 篇 chou yung-shun
  • 4 篇 pottonen olli
  • 4 篇 ostergard patric...
  • 4 篇 murty n. s.
  • 3 篇 al-ani ahmed
  • 3 篇 kim cheol-hong
  • 3 篇 lee chin-feng
  • 3 篇 kim jong-myon
  • 3 篇 cheng samuel
  • 3 篇 ma rick
  • 3 篇 shin dongil
  • 3 篇 lee jaejin
  • 3 篇 al-dmour hayat
  • 2 篇 wang jen-tse

语言

  • 242 篇 英文
  • 10 篇 其他
  • 2 篇 中文
检索条件"主题词=hamming code"
254 条 记 录,以下是1-10 订阅
排序:
Mission-Critical Systems, Paradox of hamming code, Row Hammer Effect, 'Trojan Horse' of the Binary System and Numeral Systems with Irrational Bases
收藏 引用
COMPUTER JOURNAL 2018年 第7期61卷 1038-1063页
作者: Stakhov, Alexey Canadian Comp Firm FibTech Fibonacci Technol Toronto ON Canada
This article deals with a wide range of issues related to the design of specialized computing and measuring systems for mission-critical applications, in which the requirements of reliability and noise immunity are pu... 详细信息
来源: 评论
Robust watermarking scheme for binary images using a slice-based large-cluster algorithm with a hamming code
收藏 引用
OPTICAL ENGINEERING 2006年 第1期45卷 017005-1-017005页
作者: Chen, WY Liu, CC Natl Chin Yi Univ Technol Dept Elect Engn Taichung Taiwan
The problems with binary watermarking schemes are that they have only a small amount of embeddable space and are not robust enough. We develop a slice-based large-cluster algorithm (SBLCA) to construct a robust waterm... 详细信息
来源: 评论
An image authentication method by applying hamming code on rearranged bits
收藏 引用
PATTERN RECOGNITION LETTERS 2011年 第14期32卷 1679-1690页
作者: Chan, Chi-Shiang Asia Univ Dept Appl Informat & Multimedia Wufeng 41354 Taiwan
In 2007, Chan and Chang proposed an image authentication method using the hamming code technique. The parity check bits were produced from pixels by using the hamming code technique, and the produced bits were embedde... 详细信息
来源: 评论
A Memristor-Based In-Memory Computing Network for hamming code Error Correction
IEEE ELECTRON DEVICE LETTERS
收藏 引用
IEEE ELECTRON DEVICE LETTERS 2019年 第7期40卷 1080-1083页
作者: Sun, Xinhao Zhang, Teng Cheng, Caidie Yan, Xiaoqin Cai, Yimao Yang, Yuchao Huang, Ru Peking Univ Inst Microelect Minist Educ Key Lab Microelect Devices & Circuits Beijing 100871 Peoples R China Univ Sci & Technol Beijing Sch Mat Sci & Engn State Key Lab Adv Met & Mat Beijing 100083 Peoples R China
hamming code is a linear error-correcting code widely used in memory and telecommunication. For the first time, here we put forth an approach to analyzing hamming codes in hardware using networks consisting of memrist... 详细信息
来源: 评论
Concatenated coding scheme for MTCM/CPFSK with hamming code
收藏 引用
ELECTRONICS LETTERS 2000年 第13期36卷 1127-1129页
作者: Kim, SG Lee, HK Kim, K KJIST Dept Informat & Commun Kwangju 500712 South Korea Hongik Univ Dept Radio Commun Sci & Engn Seoul South Korea
An investigation into the burst statistics of multiple symbol trellis coded continuous phase frequency shift keying is presented. Based on this investigation, an outer linear block code with a block interleaver has be... 详细信息
来源: 评论
High capacity partial reversible data hiding by hamming code
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2020年 第31-32期79卷 23425-23444页
作者: Wu, Xiaotian Yang, Ching-Nung Liu, Yen-Wei Jinan Univ Dept Comp Sci Guangzhou Peoples R China Natl Dong Hwa Univ Dept Comp Sci & Informat Engn Hualien Taiwan
A high capacity partial reversible data hiding (PRDH) is introduced in this paper. First of all, an original image is converted to a cover image by the proposed image transformation algorithm. The image transformation... 详细信息
来源: 评论
Design and Implementation of Encoding and Check code Circuit with hamming code on QCA
收藏 引用
INTERNATIONAL JOURNAL OF UNCONVENTIONAL COMPUTING 2014年 第5-6期10卷 391-404页
作者: Xie, Guangjun Xiang, Yunlong Zhang, Yongqiang Liu, Shuai Lv, Hongjun Hefei Univ Technol Sch Elect Sci & Appl Phys Hefei 230009 Anhui Peoples R China
With hamming code encoding data and checking code in data access, this paper researches on the encode/check code circuit with hamming code designed based on Quantum-dot Cellular Automata (QCA). By inserting error corr... 详细信息
来源: 评论
AMBTC based high payload data hiding with modulo-2 operation and hamming code
收藏 引用
MATHEMATICAL BIOSCIENCES AND ENGINEERING 2019年 第6期16卷 7934-7949页
作者: Li, Li He, Min Zhang, Shanqing Luo, Ting Chang, Chin-Chen Hangzhou Dianzi Univ Sch Comp Sci & Technol Hangzhou 310018 Zhejiang Peoples R China Ningbo Univ Coll Sci & Technol Ningbo 315000 Zhejiang Peoples R China Feng Chia Univ Dept Informat Engn & Comp Sci Taichung 40724 Taiwan
An efficient data hiding method with modulo-2 operation and hamming code (3, 2) based on absolute moment block truncation coding (AMBTC) is proposed. In order to obtain good data hiding performance, different textures... 详细信息
来源: 评论
hamming code based watermarking scheme for 3D model verification
Hamming code based watermarking scheme for 3D model verifica...
收藏 引用
International Symposium on Computer, Consumer and Control (IS3C)
作者: Wang, Jen-Tse Chang, Yi-Ching Yu, Shyr-Shen Yu, Chun-Yuan Hsiuping Univ Sci & Technol Dept Informat Management Taichung 412 Taiwan Natl Chung Hsing Univ Dept Comp Sci & Engn Taichung 402 Taiwan Nan Kai Univ Technol Dept Digital Living Innovat Tsaotun 542 Nantou County Taiwan
The technique of 3D modeling and the Internet progress quickly, the issue of the copyright of 3D models has become more and more important. There is a public hamming code based fragile watermarking technique proposed ... 详细信息
来源: 评论
A reversible data hiding scheme based on (5,3) hamming code using extra information on overlapped pixel blocks of grayscale images
收藏 引用
MULTIMEDIA TOOLS AND APPLICATIONS 2021年 第9期80卷 13099-13120页
作者: Nguyen, Tuan Duc Le, Huu Dung Hanoi Open Univ Hanoi Vietnam
In this paper, we propose a reversible data hiding scheme using (5, 3) hamming code. A cover image is partitioned into blocks of five pixels. An adjusted (5, 3) hamming code method is then applied to find a possible m... 详细信息
来源: 评论