code combination
Recently Published Documents


TOTAL DOCUMENTS

20
(FIVE YEARS 12)

H-INDEX

2
(FIVE YEARS 0)

Author(s):  
B. S. Yesmagambetov ◽  

In telemetry systems, using irreversible data compression, several message generation methods can be used. In the channel output packet, there may be several code words defining its composition. They can be combined and arranged in a strictly defined sequence. Such a data packet is a constant or variable length code combination, wherein the constant length of the packet is generated in the case of a predetermined and unchanged amount of information at the data output interval, and the variable is otherwise generated. The channel data packet can then be treated as a single whole: provide it with address information about the source of the message, information about the time interval at which the packet was formed, to bind significant samples to time, additional check symbols and codes to increase interference immunity of transmission, or to form a packet structure in the same way. Address, time and synchronization information in the literature is called overhead. The need to transmit overhead information reduces the efficiency of the transceiver systems. Therefore, the problem of reducing the volume of service information is extremely urgent.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Daoling Chen ◽  
Pengpeng Cheng

PurposeIn order to help companies better grasp the perceptual needs of consumers for patterns, so as to carry out more accurate product pattern development and recommendation, this research develops a product pattern design system based on computer-aided design.Design/methodology/approachFirst, use the Kansei engineering theory and method to obtain the user's perceptual image, and deconstruct and encode the pattern based on the morphological analysis method, then through the BP neural network to construct the mapping relationship between the user's perceptual image and the pattern design elements, and finally calculate and find the corresponding design code combination according to the design goal to guide the pattern design.FindingsTaking costume paper-cut patterns as an example, the feasibility of this system is verified, the design system can well reflect the user's perceptual image in the pattern design and improve the efficiency of pattern customization service.Originality/valueCompared with the traditional method that relies on the designer's personal experience to propose a design plan, this research provides scientific and intelligent design methods for product pattern design.


Author(s):  
Vladislav Kravchenko ◽  
Olena Hryshchenko ◽  
Viktoriia Skrypnik ◽  
Hanna Dudarieva

The essence of the concept of a family of several codes and its properties is considered. Typical structures of shear vectors for a family of several codes are analyzed. The regularity of determining the decimal values of the elements of the shift vectors and their dependence on the length of the code combinations and the number of single characters in the code combination is determined. The defined regularities allow algorithms to be developed to decode information with the use of the structure of the shift vectors.


Author(s):  
Julia Milova ◽  
Yuri Melnik

The principles of poly-parametric information coding have been considered. The methods for developing poly-parametric codes have been presented. It is shown that the protection of block codes from channel interference using check patterns can be developed by a mono- or poly-parametric method. A special type of block codes has been presented, the check patterns of which are formed on the basis of their neighbours, which are functionally related to the given code combination. Such codes have been called poly-parametric. Binary poly-parametric ring codes, the check patterns of which are designed to detect and correct channel errors, are developed using the properties of Galois fields and on the basis of the vector shift indicators of the codewords. To obtain digital poly-parametric block codes, the properties and features of the normalized natural sequence are used. It is shown that each codeword of a binary block code can be represented as a certain positive integer in the decimal number system, which is an element of the natural sequence. Its elements on an interval that equals the norm acquire a functional dependency.


2021 ◽  
Vol 1 (1) ◽  
pp. 13-18
Author(s):  
A. V. Korobeinikov

The fast algorithm for calculating the autocorrelation function (ACF) of a binary code is developed in relation to the problem of synthesizing codes with a given ACF by enumerative technique. The algorithm is applicable for any duration of the N code. The computational complexity of calculating the ACF is 2N multiplication operations and 2N addition operations. The linear dependence of computational complexity on the duration of the N code is noted. To calculate the ACF of the newly created code combination, the previous code, its ACF, and the index of the changed code element are used. The condition of applicability of the algorithm is that the search of code combinations must be performed by changing only one element in the current code combination. An enumerative technique is proposed that allows a complete enumertion of all 2N existing combinations by sequentially changing the code combination of just one element.


Author(s):  
Abhinandan P. Mangaonkar

In earlier days there was no much use of computers. As developments took place in the field of computer science, every little and large industries or even every person started using computers. Computers are now in every field and in every little thing. Then there comes a part of internet for sharing information with each other. Internet is mainly used for social networking, online marketing, net banking, and online money transactions. With all this there comes the darker side of the internet that is: internet frauds, hackings, cracking etc. Whoever is using the internet first and foremost they wish their safety and security and this is done by using authentication. In most of the cases, the user is provided with USERNAMES and PASSWORDS for authentication. But hackers are now attacking authentication systems for doing online frauds and we need stronger solutions to avoid attacks, that will be possible using “colour-code combination for secured login” technique.


2021 ◽  
Vol 1779 (1) ◽  
pp. 012015
Author(s):  
Guntur Firmansyah ◽  
Ervin Dwi Rahayu ◽  
Didik Hariyanto ◽  
Irwansyah ◽  
Trinovandhi Setyawan ◽  
...  

2021 ◽  
Author(s):  
Andi Yusdianti

Abstract The language produced by speakers is a reflection of a culture that it adheres to because, incommunication, it certainly has a close relationship with the other person so that the language spoken can bewell understood. A discussion can take place if the style used can be followed so that the message delivered canbe received. This study aims to analyze code-switching and code-mixing in novels Badai Matahari CreationHary El-Parsia. The method in this research is descriptive qualitative carried out by not prioritizing the numbersbut prioritizes the depth of appreciation of the interaction between the concepts being studied imply. The type ofresearch in the literature is. The source and type of data of this research are the data written on novel BadaiMatahari Andalusia. The results of the study showed that in the Solar Storm novel, there were seven quotes fromthe Code and nine quotes from the Code. Code Transfer and Mix The most dominant code is the Transfer ofCode by mixing Indonesian, English, Arabic. In other words, the author Hary El-Parsia in his work uses theTransfer of Code and Mixed Code as the hallmark of his work.Keywords: Code Transfer, Code Combination. Novel. Badai Matahari Andalusia


2021 ◽  
Author(s):  
HARZIKO

AbstractThe language produced by speakers is a reflection of a culture that it adheres to because, incommunication, it certainly has a close relationship with the other person so that the language spoken can bewell understood. A discussion can take place if the style used can be followed so that the message delivered canbe received. This study aims to analyze code-switching and code-mixing in novels Badai Matahari CreationHary El-Parsia. The method in this research is descriptive qualitative carried out by not prioritizing the numbersbut prioritizes the depth of appreciation of the interaction between the concepts being studied imply. The type ofresearch in the literature is. The source and type of data of this research are the data written on novel BadaiMatahari Andalusia. The results of the study showed that in the Solar Storm novel, there were seven quotes fromthe Code and nine quotes from the Code. Code Transfer and Mix The most dominant code is the Transfer ofCode by mixing Indonesian, English, Arabic. In other words, the author Hary El-Parsia in his work uses theTransfer of Code and Mixed Code as the hallmark of his work.Keywords: Code Transfer, Code Combination. Novel. Badai Matahari Andalusia


Sign in / Sign up

Export Citation Format

Share Document