Search alternatives:
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
code » mode (Expand Search), core (Expand Search)
pore » more (Expand Search)
peers » peer (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
cheaters » heaters (Expand Search), chapters (Expand Search), centers (Expand Search)
code » mode (Expand Search), core (Expand Search)
pore » more (Expand Search)
peers » peer (Expand Search)
bears » years (Expand Search), beams (Expand Search), bear (Expand Search)
-
121
Protein codes promote selective subcellular compartmentalization
Published 2025“…Our results indicate that protein sequences contain not only a folding code, but also a previously unrecognized code governing their distribution to diverse subcellular compartments.…”
Get full text
Article -
122
CSS-like constructions of asymmetric quantum codes
Published 2019Subjects: Get full text
Get full text
Journal Article -
123
Abelian codes in principal ideal group algebras
Published 2013“…We study abelian codes in principal ideal group algebras (PIGAs). …”
Get full text
Get full text
Get full text
Journal Article -
124
Repairing reed-solomon codes with multiple erasures
Published 2020“…Despite their exceptional error-correcting properties, Reed-Solomon (RS) codes have been overlooked in distributed storage applications due to the common belief that they have poor repair bandwidth. …”
Get full text
Journal Article -
125
-
126
Attendance taking using QR code (III)
Published 2023“…The advancement of technology gave rise to QR codes, a type of matrix code. The initial design of the system was inspired by the black and white pieces used in the game of Go. …”
Get full text
Final Year Project (FYP) -
127
SNR enhancement in OTDR using pulse coding
Published 2009“…To optimize the two parameters at the same time, one applicable approach is to employ pulse coding and trace decoding technique for probe lights and reflect signals, respectively. …”
Get full text
Thesis -
128
-
129
TCM codes for spread spectrum communication systems
Published 2010“…In this study, the performance of a TCM coded spread spectrum multiple access system (SSMA) is examined, using various types of TCM codes. …”
Get full text
Thesis -
130
-
131
A coding scheme for distributed storage systems
Published 2011“…The repairing phases in these codes were scheduled and a suitable algorithm was required to attain an optimal situation.…”
Get full text
Final Year Project (FYP) -
132
Code domain power measuring system receiver
Published 2008“…In this dissertation, the design and implementation of a code domain power-measuring receiver for measuring pilot signals in CDMA systems are presented. …”
Get full text
Thesis -
133
Code refactoring of HPC applications for multicore processors
Published 2012Get full text
Final Year Project (FYP) -
134
Computationally efficient and adaptive scalable video coding
Published 2012“…The characteristics of current video transmission system pose many problems for video delivery and scalable video coding is a highly attractive solution. This thesis investigates the existing video coding standards, especially the newest H.264/advanced video coding and its scalable extension: scalable video coding. …”
Get full text
Thesis -
135
Interference suppression of coded frequency hopped system
Published 2016“…The purpose of this report is to study the bit error rate (BER) of the frequency hopped (FH) system with a non-coherent MFSK or M-ary frequency-shift-keyed modulation and how to improve the BER, with the usage of some channel coding techniques. Channels include different combinations of different types of interference waveforms, as well as the additive white Gaussian noise (AWGN). …”
Get full text
Final Year Project (FYP) -
136
Efficient storage codes for non-volatile memories
Published 2016“…From the WOM-rate analysis, the WOM-codes designed have an improvement of 2% for the unrestricted codes and 1% for the restricted codes. …”
Get full text
Thesis -
137
A USRP implementation of wiretap lattice codes
Published 2015“…Confidentiality between Alice and Bob is obtained using wiretap codes, which exploit the difference between the channels to Bob and to Eve. …”
Get full text
Get full text
Conference Paper -
138
Iterated MIDO space-time code constructions
Published 2012“…We consider the problem of designing codes for multiple antenna channels, with 4 transmit antennas and two receive antennas, using as code design full diversity and fast decodability. …”
Get full text
Get full text
Conference Paper -
139
Corporate governance convergence & implications for Singapore's code.
Published 2008Get full text
Final Year Project (FYP) -
140