SIMULATION MODEL OF THE SOFTWARE FOR WORKING WITH PERFECT CODES BASED ON HAMMING CODE AND GOLE CODE
نویسندگان
چکیده
منابع مشابه
The poset structures admitting the extended binary Hamming code to be a perfect code
Brualdi et al. introduced the concept of poset codes, and gave an example of poset structure which admits the extended binary Hamming code to be a double-error-correcting perfect P-code. Our study is motivated by this example. In this paper we classify all poset structures which admit the extended binary Hamming code to be a double or triple-error-correcting perfect P-code. © 2004 Elsevier B.V....
متن کاملHamming Code for Multiple Sources
We consider Slepian-Wolf (SW) coding of multiple sources and extend the packing bound and the notion of perfect code from conventional channel coding to SW coding with more than two sources. We then introduce Hamming Codes for Multiple Sources (HCMSs) as a potential solution of perfect SW coding for arbitrary number of terminals. Moreover, we study the case with three sources in detail. We pres...
متن کاملdeveloping a pattern based on speech acts and language functions for developing materials for the course “ the study of islamic texts translation”
هدف پژوهش حاضر ارائه ی الگویی بر اساس کنش گفتار و کارکرد زبان برای تدوین مطالب درس "بررسی آثار ترجمه شده ی اسلامی" می باشد. در الگوی جدید، جهت تدوین مطالب بهتر و جذاب تر، بر خلاف کتاب-های موجود، از مدل های سطوح گفتارِ آستین (1962)، گروه بندی عملکردهای گفتارِ سرل (1976) و کارکرد زبانیِ هالیدی (1978) بهره جسته شده است. برای این منظور، 57 آیه ی شریفه، به صورت تصادفی از بخش-های مختلف قرآن انتخاب گردید...
15 صفحه اولImage Steganography Based on Hamming Code and Edge Detection
In this paper a novel algorithm which is based on hamming code and 2 k correction is proposed. The new method also utilizes canny edge detection and coherent bit length. Firstly, canny edge detector is applied to detect the edge of cover image and only edge pixels are selected for embedding payload. In order to enhance security, the edge pixels are scrambled. Then hamming encoding is practiced ...
متن کاملAn Information Hiding Scheme Based on (7,4) Hamming Code Oriented Wet Paper Codes
Generally, the embedding quality and the embedding capacity are two important factors in evaluating the performance of information hiding schemes, but they are usually inversely proportional. Thus, to satisfy the different requirements, the users often make a tradeoff between good embedding quality and high embedding capacity. In this paper, a spatial domain technique, embedding binary message ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Globus
سال: 2021
ISSN: 2658-5197
DOI: 10.52013/2658-5197-61-4-5