The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many p-ary linear codes with two or three weights have recently been constructed from quadratic functions. In this paper, a construction of p-ary linear codes with two weights or three weights using a certain non-quadratic function is presented. In some cases, the resulted linear codes are optimal in the sense that they meet the Griesmer bound.
In this paper, we propose a simple header detection technique to identify multiple device connections for finite length wireless Internet-of-things (IoT) networks. The Hadamard codes are selected to guarantee low computational complexity, while finite length, defined as finite number of time-slots, is considered to fulfill the requirement of low network latency required by the fifth generation (5G)...
This paper proposes a new inverse tone mapping operator (TMO) with only one parameter. The proposed inverse TMO is based on Reinhard's global operator which is a well-known TMO. Inverse TM operations have two applications: generating an HDR image from an existing LDR one, and reconstructing an original HDR image from the mapped LDR image. In this paper, we focus on the latter application and the proposed...
The existing constructions of Golay complementary sets based on generalized Boolean functions are limited to lengths, which are powers of two. In a recent paper, Chen [3] proposed a new construction of binary and nonbinary complementary sets of non-power-of-two length based on truncated method. In this paper, we proposed a novel construction of ç-ary complementary sets based on the concatenation of...
This paper presents two constructions of Gaussian integer Z-periodic complementary sequence (ZPCS) sets. Construction I employs a ZPCS set as the original sequence set, however, the parameters of the resultant sequence sets cannot be flexibly chosen. Construction II generates Gaussian integer ZPCS sets using an orthogonal matrix, the ZCZ length and the flock size have flexible choices. The sequences...
In this paper, we interpret the polar codes based on Plotkin construction perspective. We briefly review the rate allocation for component codes of Plotkin codes and the construction of polar codes based on Gaussian approximation. Then, we show that the recursively constructed Plotkin codes can be a class of polar codes. And also, the polar codes are a class of Plotkin code having minimum threshold.
For cyclic codes, the defining sequence is an important parameter, because the calculation of some well-known lower bounds are used it. In this paper, we consider the consecutive elements pattern of defining sequence and show its some properties through Roos bound.
For reducing the influence of background noise and inhibiting synchronization slip in optical wireless communication, framed-differential on-off keying (Framed-DOOK) modulation scheme has been proposed. In this paper, the Framed-DOOK is combined with error correcting codes. The bit error rates of Framed-DOOK system using both standard turbo code and regular low density parity check (LDPC) code are...
In this paper, asymmetric binary zero correlation zone (A-ZCZ) sequence sets are constructed. Based on zero correlation zone aperiodic complementary sequence (ZACS) sets obtained in [13], K binary ZCZ sequence sets are constructed, each set is a binary (2M2, M, M)-ZCZ and the K sets have a inter-set zero cross-correlation zone of length Z = M/K − 1, where K = pn. As a result, the K binary ZCZ sequence...
This paper proposes a new method for continuous acoustic adaptive feedback cancelation (AFC) in digital hearing aids. The proposed method employs two adaptive filters working in tandem. The first adaptive filter is excited by the receiver (output) signal of the hearing aid, and uses microphone signal as its desired response. The lattice-predictor based adaptive algorithm is used to updated the coefficients...
Encryption-then-Compression (EtC) systems have been considered for the user-controllable privacy protection of social media like Twitter and Facebook. The aim of this paper is to evaluate the security of block scrambling-based encryption schemes, which have been proposed to construct EtC systems. Even though this scheme has enough key spaces for protecting brute-force attacks, each block in encrypted...
The authors have proposed an approach for generating a pseudo random binary sequence by using primitive polynomial, trace function, and Legendre symbol over the proper sub extension field. There are many uses of pseudo random binary sequence in security applications. The linear complexity of a sequence is considered as the most important property to be analyzed in these types of applications. In this...
Indoor visible light communications utilizing LED light that are available for not only the illumination but also data transmission are received interest for future home networks. The dimming control function which the illumination brightness can be controlled should not be compromised by the data transmission function. The bit error rate performance of the indoor visible light communications deteriorates...
A speeding up robust identification scheme for JPEG images is proposed in this paper. The aim of the identification is to robustly identify JPEG images that are generated from the same original image, under various compression conditions such as differences in compression ratios and initial quantization matrices. The conventional scheme that we focus on uses visually protected features to achieve...
The physical layer security in the up-link of the wireless communication systems is often modeled as the multiple access wiretap channel (MAC-WT), and recently it has received a lot attention. In this paper, the MAC-WT has been re-visited by considering the situation that the legitimate receiver feeds his received channel output back to the transmitters via two noiseless channels, respectively. This...
We present our previous work in [17] in a more generic way to construct q-ary Golay complementary sets and near-complementary sets of size N and sequence length M · Nm by using different seed sequences, where m is an arbitrary non-negative integer, M is the length of seed sequences and N is a power of 2. The boolean functions of these sequences will also be derived with our method. To illustrate it,...
Existing systematic constructions of optimal odd-length binary Z-complementary pairs (OBZCPs) only generate pairs with lengths 2α + 1 (where α is a non-negative integer). In this paper, we propose a new construction of optimal OBZCPs having generic lengths of 2α10β 26γ + 1, α ≥ 1 (where α, β and γ are non-negative integers). This is achieved with the aid of several interesting intrinsic structure...
Boolean functions used in stream ciphers and block ciphers should have high second-order nonlinearity to resist several known attacks and some potential attacks which may exist but are not yet efficient and might be improved in the future. The second-order nonlinearity of Boolean functions also play an important role in coding theory, since its maximal value equals the covering radius of the second-order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.