Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Issue Section
Date
Availability
1-5 of 5
Keywords: Codes
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Cryptography: A security pillar of privacy, integrity and authenticity of data communication
Available to Purchase
Journal:
Kybernetes
Kybernetes (2011) 40 (9-10): 1422–1439.
Published: 18 October 2011
...‐key cryptography RSA digital signature scheme Codes Organizations and individuals are becoming more and more dependent on the information stored and communicated through networks and the internet. The internet evolved over the years as a means for users to access information, and exchange e...
Journal Articles
Adaptive SNR estimation algorithms for decoding block turbo codes
Available to Purchase
Journal:
Kybernetes
Kybernetes (2010) 39 (8): 1298–1304.
Published: 10 August 2010
...Hejing Xiong; Mianyun Chen; Yi Lin; Kang Wang; Xingcheng Liu; Paul Cull Purpose The purpose of this paper is to propose a novel decoding algorithm, to decrease the complexity in decoding conventional block turbo codes. Design/methodology/approach In this algorithm, the signal‐to‐noise ratio...
Journal Articles
Journal:
Kybernetes
Kybernetes (2009) 38 (5): 843–844.
Published: 12 June 2009
...D.M. Hutton Jack P. Hailman . Coding and Redundancy: Man‐made and Animal‐evolved Signals . Harvard University Press , 2009 . Prices: contact web site: www.hup.harvard.edu 272 pp. 9780674027954 © Emerald Group Publishing Limited 2009 --> Codes Cybernetics...
Journal Articles
Information granulation and signal quantization
Available to Purchase
Journal:
Kybernetes
Kybernetes (2001) 30 (2): 179–192.
Published: 01 March 2001
... the characteristic function of the interval A= [a,b]. If A(x) = 1 then the i‐th index is invoked, otherwise A(x) = 0. Cybernetics Fuzzy sets Codes Information Signal processing It is instructive to concentrate on the role of shadowed sets arising in the setting of the quantization process...
Journal Articles
Algorithms for generating generalized gray codes
Available to Purchase
Journal:
Kybernetes
Kybernetes (1999) 28 (6-7): 837–844.
Published: 01 August 1999
...Edward T. Lee; Madonna E. Lee Gray code is a code with the property that there is one and only one bit‐change between any two neighboring numbers. An algorithm for generating gray codes is presented. It turns out that there are other codes which have the same characteristics as gray codes. We call...
