Dissertations / Theses on the topic 'Decodage'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Decodage.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
WALCZAK, ROBERT. "Decodage de la selenocysteine : relations structure-fonction dans l'element rna secis." Université Louis Pasteur (Strasbourg) (1971-2008), 1997. http://www.theses.fr/1997STR13150.
Full textTRAMINI, STEPHANE. "Problemes inverses et edp pour le decodage et la deconvolution d'images." Nice, 1999. http://www.theses.fr/1999NICE5377.
Full textDufresne, André. "Decodage de l'exposition professionnelle par l'analyse de particules extraites du parenchyme pulmonaire." Thesis, McGill University, 1990. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=70181.
Full textA Kappa test revealed that there was a limited correlation at the 5% level of confidence between the work history history and physico-chemical estimators for the group of subjects exposed to asbestos fiber (k = 0.475, p = 0.001), a 10% level for the group with silica exposure (k = 0.213, p = 0.089) and at a 5% level in the unexposed nonsmoker group (k = 0.417, p = 0.003). The average pulmonary dust burden of the log-normalized values for certain minerals that were extracted from subjects belonging to certain groups of interest were statistically different.
VICARD, DOMINIQUE. "Algorithmes et architectures pour le decodage acoustico-phonetique de la parole continue." Paris, ENST, 1987. http://www.theses.fr/1987ENST0013.
Full textFohr, Dominique Haton Jean-Paul. "APHODEX : UN SYSTEME EXPERT EN DECODAGE ACOUSTICO-PHONETIQUE DE LA PAROLE CONTINUE." [S.l.] : [s.n.], 1986. http://www.scd.uhp-nancy.fr/docnum/SCD_T_1986_FOHR.pdf.
Full textCaraty, Marie-José. "Contribution au decodage acoustico-phonetique : etudes de distances interspectrales etreconnaissance de cycles volcaliques." Paris 6, 1987. http://www.theses.fr/1987PA066702.
Full textDeléglise, Paul. "Une architecture logicielle pour le decodage acoustico-phonetique, applications a la detection d'evenements phonetiques." Paris 6, 1991. http://www.theses.fr/1991PA066460.
Full textSènac, Christine. "Contribution a l'etude du decodage acoustico-phonetique pour la reconnaissance automatique de la parole." Toulouse 3, 1989. http://www.theses.fr/1989TOU30104.
Full textKabre, Harouna. "Decodage acoustico-phonetique multilingue : systeme a base de connaissances et etiquetage automatique de corpus de parole." Toulouse 3, 1991. http://www.theses.fr/1991TOU30165.
Full textIOOSS, GIAI CHRISTINE. "Decodage lexical pour la reconnaissance de la parole continue : une approche par un reseau de neurones sequentiel." Paris 11, 1991. http://www.theses.fr/1991PA112152.
Full textPICART, ANNIE. "Concatenation de codes et decodage iteratif application des turbo-codes produits aux transmissions a forte efficacite spectrale." Rennes 1, 1998. http://www.theses.fr/1998REN10144.
Full textMartelli, Thérèse. "Modelisation objet pour la representation de connaissances complexes : application au decodage acoustico-phonetique de la parole continue." Paris, ENST, 1988. http://www.theses.fr/1988ENST0005.
Full textMottier, David. "Association des fonctions d'egalisation, de synchronisation et de decodage canal pour les transmissions numeriques a grande efficacite spectrale." Rennes, INSA, 1997. http://www.theses.fr/1997ISAR0010.
Full textCAMBIER, JEAN-PIERRE. "Code noir, code de nuremberg, code genetique : de l'esclavage a la nationalisation des corps. essai de decodage du biopouvoir." Toulouse 2, 1993. http://www.theses.fr/1993TOU2A027.
Full textFormerly slaves "by nature", blacks "intermediaries between man and monkey" (toqueville), presently "human guinea pigs" situated "between man and the experimental animals" (pr milhaud) : philosophy, law, of ethics have very rarely risen above the demands of their time, political, colonial or scientific. Could the present difficulty of french law to guarantee the security of the human body be due to the neglect of natural law ? must we reroot human rights in a modernized natural right, and practise "biopolitics" (barret-kriegel) ? however, as an agent of "biopower", medical science often reduces man as a manipulable object, to correct the errors of a nature whose standards and aims it claims to interpret, going as far as contemplating access to genetic code. In realizing biopolitics, the welfarestate aims, certainly, to guarantee a right to life, but in the midst of an "insured" society which has become "sovereign master of death" (f. Ewald). A tragical drifting, which we see at work in the french law of 20 12 88, regulating the experimental use of human body, regardless of the free consent of the subjects. We challenge ewald's optimism, founded on the erroneous assimilation of the sociopolitical norm to the biological norm. Michel foucault rightly fears a dramatical contemporary resurgence of the archaic "right of dealth", generating new forms of racism and social exclusion
Sun, Hyo-Sook. "Le comportement linguistique et culturel des apprenants coreens de francais en situation exolingue - observation de deux types d'activites : decodage encodage." Grenoble 3, 1988. http://www.theses.fr/1988GRE39003.
Full textCEUGNIET, MIYUKI. "Etude des systemes de codage-decodage du cri d'appel des perdrix rouges (alectoris rufa), bartavelles (a. Graeca) et de leurs hybrides." Paris 11, 2000. http://www.theses.fr/2000PA112182.
Full textPrévost, Raoul. "Décodage et localisation AIS par satellite." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0121/document.
Full textThe automatic identification system (AIS) is a system allowing ships and coast stations to exchange some information by VHF radio. This information includes the identifier, status, location, direction and speed of the emitter. The aim of this thesis is to allow the reception of AIS messages by low Earth orbit satellites without modifying the existing ship equipments. With this system, it becomes possible to know the position of all ships over the Earth. As a consequence, several new services become available, such as global traffic monitoring or determining boat location (for ship-owners). Satellite reception of AIS signals is subjected to a higher noise level when compared to ground level reception. This noise makes classical demodulation and decoding methods unusable. A first contribution of this thesis is to develop new demodulators using error correction methods. These demodulators take advantage of the presence of a cyclic redundancy check (CRC) block in the messages as well as known information about the structure of messages and data. Generalizations of the proposed receiver have also been studied in order to take into account the phase noise of the received signals and the possible collision of messages sent simultaneously by several vessels. The last part of this thesis is devoted to the study of localization methods for ships that do not transmit their location in AIS messages. This localization takes advantage of information contained in the received messages such as the propagation delay and the carrier frequency shift due to the Doppler effect, and a ship movement model
MBU, NYAMSI UM NYOBE RUBEN GEORGE. "Analyse et synthese de signaux acoustiques d'oiseaux. Mise au point de methodes pour l'etude des mecanismes de codage, decodage et propagation de ces signaux." Paris 7, 1994. http://www.theses.fr/1994PA077162.
Full textMontacié, Claude. "Decodage acoustico-phonetique : apport de la decomposition temporelle generalisee et de transformations spectrales non-lineaires. application a la reconnaissance des mots epeles en continu." Paris, ENST, 1991. http://www.theses.fr/1991ENST0015.
Full textRobisson, Patrice. "La reconnaissance individuelles chez deux especes jumelles, le manchot empereur aptenodytes forsteri, et le manchot royal aptenodytes patagonicus. Codage, decodage et signification adaptative des signaux acoustiques de reconnaissance en milieu extreme." Rennes 1, 1993. http://www.theses.fr/1993REN10119.
Full textDelemar, Olivier. "Reconnaissance de la parole par une méthode hybride : texte imprimé : Réseaux markoviens et base de règles." Grenoble INPG, 1996. http://www.theses.fr/1996INPG0052.
Full textNeagu, Pétrisor Adrian. "Représentations phonétiques et identification des syllabes occlusive - voyelle en français." Grenoble INPG, 1998. http://www.theses.fr/1998INPG0040.
Full textMakhdoumi, Ali (Makhdoumi Kakhaki). "Locally decodable source coding." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/82403.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 63-65).
Source coding is accomplished via the mapping of consecutive source symbols (blocks) into code blocks of fixed or variable length. The fundamental limits in source coding introduces a tradeoff between the rate of compression and the fidelity of the recovery. However, in practical communication systems many issues such as computational complexity, memory capacity, and memory access requirements must be considered. In conventional source coding, in order to retrieve one coordinate of the source sequence, accessing all the encoded coordinates are required. In other words, querying all of the memory cells is necessary. We study a class of codes for which the decoder is local. We introduce locally decodable source coding (LDSC), in which the decoder need not to read the entire encoded coordinates and only a few queries suffice to retrieve a given source coordinate. Both cases of having a constant number of queries and also a scaling number of queries with the source block length are studied. Also, both lossless and lossy source coding are considered. We show that with constant number of queries, the rate of (almost) lossless source coding is one, meaning that no compression is possible. We also show that with logarithmic number of queries in block length, one can achieve Shannon entropy rate. Moreover, we provide achievability bound on the rate of lossy source coding with both constant and scaling number of queries.
by Ali Makhdoumi.
S.M.
Wiman, Mårten. "Improved Constructions of Unbalanced Uniquely Decodable Code Pairs." Thesis, KTH, Skolan för teknikvetenskap (SCI), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210869.
Full textYekhanin, Sergey. "Locally Decodable Codes and Private Information Retrieval Schemes." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42242.
Full textIncludes bibliographical references (leaves 90-99).
This thesis studies two closely related notions, namely Locally Decodable Codes (LDCs) and Private Information Retrieval Schemes (PIRs). Locally decodable codes are error-correcting codes that allow extremely efficient, "sublinear-time" decoding procedures. More formally, a k-query locally decodable code encodes n-bit messages x in such a way that one can probabilistically recover any bit xi of the message by querying only k bits of the (possibly corrupted) code-word, where k can be as small as 2. LDCs were initially introduced in complexity theory in the context of worst-case to average-case reductions and probabilistically checkable proofs. Later they have found applications in numerous other areas including information theory, cryptography and the theory of fault tolerant computation. The major goal of LDC related research is to establish the optimal trade-off between length N and query complexity k of such codes, for a given message length n. Private information retrieval schemes are cryptographic protocols developed in order to protect the privacy of the user's query, when accessing a public database. In such schemes a database (modelled by an n-bit string x) is replicated between k non-communicating servers. The user holds an index i and is interested in obtaining the value of the bit xi. To achieve this goal, the user queries each of the servers and gets replies from which the desired bit xi can be computed. The query to each server is distributed independently of i and therefore each server gets no information about what the user is after. The main parameter of interest in a PIR scheme is its communication complexity, namely the number of bits exchanged by the user accessing an n-bit database and the servers. In this thesis we provide a fresh algebraic look at the theory of locally decodable codes and private information retrieval schemes.
(cont.) We obtain new families of LDCs and PIRs that have much better parameters than those of previously known constructions. We also prove limitations of two server PIRs in a restricted setting that covers all currently known schemes. Below is a more detailed summary of our contributions. * Our main result is a novel (point removal) approach to constructing locally decodable codes that yields vast improvements upon the earlier work. Specifically, given any Mersenne prime p = 2t - 1, we design three query LDCs of length N = exp (nl/t), for every n. Based on the largest known Mersenne prime, this translates to a length of less than exp (n10-7), compared to exp (n1/2) in the previous constructions. It has often been conjectured that there are infinitely many Mersenne primes. Under this conjecture, our constructions yield three query locally decodable codes of length N = exp n(oglog)) for infinitely many n. * We address a natural question regarding the limitations of the point-removal approach. We argue that further progress in the unconditional bounds via this method (under a fairly broad definition of the method) is tied to progress on an old number theory question regarding the size of the largest prime factors of Mersenne numbers. * Our improvements in the parameters of locally decodable codes yield analogous improvements for private information retrieval schemes. We give 3-server PIR schemes with communication complexity of O (n10-7) to access an n-bit database, compared to the previous best scheme with complexity 0(n1/5.25).
(cont.) Assuming again that there are infinitely many Mersenne primes, we get 3-server PIR schemes of communication complexity n(1/ loglog n) for infinitely many n. * Our constructions yield tremendous improvements for private information retrieval schemes involving three or more servers, and provide no insights on the two server case. This raises a natural question regarding whether the two server case is truly intrinsically different. We argue that this may well be the case. We introduce a novel combinatorial approach to PIR and establish the optimality of the currently best known two server schemes a restricted although fairly broad model
by Sergey Yekhanin.
Ph.D.
Aktas, Tugcan. "Parallel Decodable Channel Coding Implemented On A Mimo Testbed." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608644/index.pdf.
Full textTang, Yao. "Partial decode-forward in relay networks." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121541.
Full textLa transmission coopérative agit comme étant une solution diffusée, permettant de fournir une communication sans fil très robuste. Elle regroupe les ressources disponibles, comme la puissance et la bande passante, à travers le réseau. Le réseau à relais est le modèle théorique le plus simple pour un réseau sans fil coopératif et la compréhension des limites de communication à travers de ce réseau permet potentiellement de saisir la conception d'un réseau sans fil plus efficace. Par contre, la capacité du réseau à relais est encore inconnue. Dans cette thèse, nous adressons la conception du schéma du decode-forward partiel dans un réseau à relais ayant une source et une destination unique. Dans la première partie de cette thèse, nous révisons le réseau à relais. Nous révisons aussi le decode-forward ainsi que le decode-forward partiel dans les réseaux à relais. Dans la deuxième partie de cette thèse, nous introduisons un réseau à relais sans mémoire composé d'une source, d'une destination et de relais N. Par la suite, nous concevons un schéma à partir du réseau decode-forward partiel. La source divise son message en une partie commune et en parties privées N+1 qui sont destinées à des relais différents. La source code les parties du message divisé en utilisant le codage length-N black Markov, dans lequel chaque partie du message privé est superposé indépendamment sur les parties communes du bloc actuel et des blocs précédents N. En utilisant le décodage conjoint fenetre coulissante, chaque relais récupère la partie du message commune et sa partie du message privé ayant le même index bloc, et les envoi par la suite ensemble aux nœuds du bloc suivant. Nous dérivons son taux réalisable dans un format compact. Le résultat permet de réduire la borne inférieure connue du decode-forward d'un réseau à N-relais et la borne inférieure du decode-forward partiel pour un réseau à deux relais. Nous appliquons par la suite notre schéma propositionnel à un réseau à relais gaussien et d'obtenir sa capacité de borne inférieure en prenant en compte les contraints de puissance aux nœuds émetteurs. Dans la troisième partie de cette thèse, nous introduisons le fractionnement exhaustif des messages pour le decode-forward partiel ayant une source et une destination unique dans un réseau à relais ayant N relais, dans lequel chaque sous-ensemble différent du relais contient un message privé distinct à décoder. Nous étudions profondément ce schéma dans un réseau à trois relais basé sur le codage un bloc Markov. Nous dérivons son taux réalisable. Nous fournissons un graphique orienté qui détaille le superpositionnement de la structure du codebook afin d'aider le lecteur à comprendre la hiérarchie de la génération du codeword. Finalement, nous appliquons ce schéma à un réseau à trois relais gaussien et nous montrons que notre schéma généralise le relais decode-forward et le schéma du fractionnement du message privé comme démontré dans la seconde partie.
Peyton, Julia Ann. "Comparison of more-decodable and less-decodable text paired with systematic phonics instruction in a supplemental tutoring setting with at-risk first-grade students /." Thesis, Connect to this title online; UW restricted, 2002. http://hdl.handle.net/1773/7916.
Full textDoan, Dung Ngoc. "Design and analysis of iteratively decodable codes for ISI channels." Diss., Texas A&M University, 2004. http://hdl.handle.net/1969.1/2754.
Full textShams, Bilal. "Les Codes LDPC non-binaires de nouvelle génération." Thesis, Cergy-Pontoise, 2010. http://www.theses.fr/2010CERG0525/document.
Full textIn this thesis we present our work in the domain of non-binary decoding algorithm for general classes of non-binary LDPC codes. Low-Density Parity-Check (LDPC) codes were originally presented by Gallager in 1963, and after some fundamental theoretical advancements, they were considered in standards like DVB-S2, WI-MAX, DSL, W-LAN etc. Later on, non-binary LDPC (NB-LDPC)codes were proposed in the litterature, and showed better performance for small lengths or when used on non-binary channels. However, the advantages of using NB-LDPC codes comes with the consequence of an heavily increased decoding complexity. For a code defined in GF(q), the complexity is of the order O(q^2). Similarly, the memory required for storing messages is of order O(q). Consequently, the implementation of an LDPC-decoder defined over a field order q > 64 becomes practically impossible.The main objective of the thesis is to develop reduced complexity algorithms for non-binary LDPC codes that exhibit excellent performance and is practically im-plementable. For better decoding performance, not only the decoding algorithm is important, but also the structure of the code plays an important role. With this goal in mind, a new family of codes called cluster-NB-LDPC codes was developped and specific improvements of the NB decoder for cluster-NB-LDPC codes were proposed. Our principal result is that we were able to propose decoders for cluster-NB-LDPC codes with reduced complexity compared to usual decoders for NB-LDPC codes on fields, without any performance loss in error correction capability
Del, Toso Christophe. "Architectures de circuits VLSI pour diffusion de télévision numérique." Grenoble INPG, 1997. http://www.theses.fr/1997INPG0066.
Full textEricson, Elke. "High-resolution phenomics to decode : yeast stress physiology /." Göteborg : Göteborg University, Dept. of Cell and Molecular Biology, Faculty of Science, 2006. http://www.loc.gov/catdir/toc/fy0707/2006436807.html.
Full textStiles, Lori. "Scientists at UA, Collaborating Institutions Decode Maize Genome." College of Agriculture and Life Sciences, University of Arizona (Tucson, AZ), 2010. http://hdl.handle.net/10150/622061.
Full textLaird, Daniel T. "Voice Encode/Decode System for PCM Insertion and Extraction." International Foundation for Telemetering, 1994. http://hdl.handle.net/10150/611660.
Full textIn the field of aircraft testing the need to efficiently record the cockpit voice communication without consuming a significant amount of the acquisition frame bandwidth has been an issue for years. There are methods, based on commercially available products, that allow for voice placement into PCM streams that will satisfy the requirement of relatively low bandwidth consumption. In this paper I will discuss a design that makes minimal demand on bandwidth, with the freedom to vary the placement of the voice within the minor acquisition frame.
Qian, Chuyi. "Improving spectral efficiency of half-duplex decode-and-forward relay." Thesis, University of Surrey, 2014. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.665471.
Full textMaagh, Stefan. "Performance analysis of the HARQ dynamic decode-and-forward protocol." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8849.
Full textErdin, Enes. "Performance Of Parallel Decodable Turob And Repeat-accumulate Codes Implemented On An Fpga Platform." Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/2/12610998/index.pdf.
Full textElmorshedy, Lina. "RF energy harvesting in a decode-and-forward wireless relay network." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/57607.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Deyo, Kathleen Susan. "Developmental differences in the ability to decode facial expression of pain." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ62471.pdf.
Full textChenais, Patrick. "Une carte de traitement et de reconnaissance de la parole : etude de cibles acoustiques." Toulouse 3, 1987. http://www.theses.fr/1987TOU30009.
Full textWharin, Caitlin. "Using neural reconfiguration to improve decode performance for use in brain machine interfaces." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=110426.
Full textPour développer une prothèse neurale basée sur la cognition qui aiderait les patients souffrant de dysfonction moteur, nous devons être capable de décoder les intentions de mouvements des patients à partir de leur activité cérébrale. Des matrices de microélectrodes sont fréquemment employées pour échantillonner l'activité des neurones. Un défi auquel font habituellement face les chercheurs, lorsqu'ils utilisent des matrices de microélectrode, est que seul un petit ensemble de neurones peut être isolé et échantillonné adéquatement. De plus, ces neurones ont tendance à surreprésenter certaine région de l'espace et à présenter un manque dans la représentation des autres. Il y a donc un biais dans la représentation de l'espace dans lequel s'effectue normalement les mouvements. Plusieurs études réalisées sur des expériences impliquant des interfaces cerveau-machine (ICM) ont rapporté que l'activité des neurones des sujets entreprend une réorganisation fonctionnelle, suite aux contraintes imposées par l'ICM. Dans cette étude, nous avons testé l'hypothèse selon laquelle nous pourrions utiliser la récompense pour, non seulement induire activement une reconfiguration de l'activité, mais aussi pour guider la réorganisation fonctionnelle de façon à ce qu'elle résulte en une augmentation de la quantité d'information qui peut être extraite d'une population de neurones. Pour ce faire, nous avons échantillonné l'activité des neurones du cortex pariétal et de l'aire pré-moteur d'un macaque Rhésus en y implantant 96 électrodes. Nous avons conçu une tâche de contrôle par la pensé dans laquelle un décodeur Bayesien adaptatif utilise l'activité des neurones pour prédire les intentions de mouvement du bras du singe. Lors des essais fructueux, le singe a été récompensé par du jus. Au cours d'un essai, une indication visuelle délivrée en temps réel informait le singe de la performance du décodeur à déduire ses intentions. La performance du décodeur fixait la quantité de jus donnée au singe en récompense. Nos résultats démontrent que les performances du décodeur ont augmenté au cours du déroulement de l'expérience en même temps que les changements dans l'activité des neurones ont entraîné une représentation plus uniforme de l'espace. Ces résultats suggèrent que la récompense peut-être utilisée pour induire des changements dans l'activité des neurones qui améliore les performances d'un décodeur en augmentant la quantité d'information qui peut-être extraite de l'activité cérébrale.
Kumar, Kuldeep. "Optimized Constellation Mappings for Adaptive Decode-and-Forward Relay Networks using BICM-ID." International Foundation for Telemetering, 2012. http://hdl.handle.net/10150/581817.
Full textLebel, Cynthia. "Optical Brain Imaging of Motor Cortex to Decode Movement Direction using Cross-Correlation Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609111/.
Full textNeset, Katie. "Comparative Analysis of Traditional and Modified DECODE Method in Small Sample Gene Expression Experiments." Thesis, North Dakota State University, 2018. https://hdl.handle.net/10365/28750.
Full textFarhat, Jamil de Araujo. "Eficiência energética e throughput seguros em decode-and-forward seletivo com alocação de potência distribuída." Universidade Tecnológica Federal do Paraná, 2015. http://repositorio.utfpr.edu.br/jspui/handle/1/1368.
Full textWe investigate the secure energy efficiency and throughput in cooperative wireless communications systems, in which a pair of legitimate users (Alice and Bob) are assisted by a relay node and the communication occurs in the presence of a passive eavesdropper (Eve). Several cooperative protocols are compared with respect to these measures and we use of an iterative and distributed algorithm, based on Dinkelbach algorithm, to allocate power between Alice and the relay. The power allocation is performed in order to increase the secure energy efficiency, measured in secure bits/J/Hz, or secure throughput, measured in secure bits/s/Hz. About the protocols, we consider the case where Alice has perfect knowledge only about the instantaneous channel state of the legitimate channel. So, we employ a Selective Decode-and-Forward (SDF) protocol, which chooses the best type of communication between Alice and Bob (direct or cooperative communication) in order to improve security. For comparison, we consider other classical cooperative schemes such as the Amplify-and-Forward (AF), the Fixed Decode-and-Forward (DF) and the Cooperative Jamming (CJ). Our results show that SDF outperforms AF, DF and CJ in most situations. However, when the transmit rate increases or when Eve is close to the legitimate nodes, CJ has a better performance.
Elsaid, Lubna A. "PHYSICAL-LAYER SECURITY WITH FULL-DUPLEX DECODE-AND-FORWARD RELAYING: SECRECY RATES AND POWER ALLOCATION." University of Akron / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=akron1467375632.
Full textSorour, Sameh. "Completion Delay Minimization for Instantly Decodable Network Coding." Thesis, 2011. http://hdl.handle.net/1807/29876.
Full textLai, Jian-Ming, and 賴建名. "Authentication Using Fuzzy Extractor with List Decodable Codes." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/03062128854571896603.
Full text國立交通大學
資訊工程系所
94
Password authentication is a traditional method to verify rights of a user. But it’s not secure, since the password is low-entropy and non-uniform. Recently people are thinking about using the biometric information, such as fingerprint, iris, hand shape…etc. Dodis et al. proposed fuzzy extractor to extract truly random string from biometric data for cryptographic use. In this thesis, based on the fuzzy extractor, we construct a fingerprint authentication system. Furthermore, we use list decodable codes to raise the identification rate of the system.
Mills, Andrew Jesse. "Lower bounds and correctness results for locally decodable codes." Thesis, 2011. http://hdl.handle.net/2152/ETD-UT-2011-08-4223.
Full texttext
Liu, Ming-Yu, and 劉明宇. "A Fault-Tolerant RAID-like system with List Decodable Codes." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/29438786431728573729.
Full text國立交通大學
資訊工程系所
92
With list decoding of error-correcting codes, we can correct errors beyond the traditional "error-correction radius". The advantage is that the transmitted message can suffer from more errors caused by the noise in the communication channel. But after we perform the list-decoding algorithm on the received word, we get a list of codewords, and still don't know which is the correct one. Codes that have list-decoding algorithm are called list decodable codes. In the thesis, we will use the list-decodable codes to build a RAID-like system with high fault tolerance, for example, more than half the system is faulty. That is, we can safeguard a document in the system, even when more than half the system are failure. We will also bring up some experimental results about our system.