Dissertations / Theses on the topic 'Hamming codes'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 45 dissertations / theses for your research on the topic 'Hamming codes.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Sabir, Tanveer. "Classification of Perfect codes in Hamming Metric." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13833.
Full textMuthivhi, Thifhelimbilu Ronald. "Codes Related to and Derived from Hamming Graphs." University of the Western Cape, 2013. http://hdl.handle.net/11394/4091.
Full textHarney, Isaiah H. "Colorings of Hamming-Distance Graphs." UKnowledge, 2017. http://uknowledge.uky.edu/math_etds/49.
Full textMollard, Michel. "Quelques problèmes combinatoires sur l'hypercube et les graphes de Hamming." Habilitation à diriger des recherches, Grenoble 1, 1989. http://tel.archives-ouvertes.fr/tel-00333335.
Full textPuchinger, Sven [Verfasser]. "Construction and decoding of evaluation codes in hamming and rank metric / Sven Puchinger." Ulm : Universität Ulm, 2018. http://d-nb.info/1166757323/34.
Full textAhmed, Naveed, and Waqas Ahmed. "Classification of perfect codes and minimal distances in the Lee metric." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6574.
Full textFaure, Cédric. "Etudes de systèmes cryptographiques construits à l'aide de codes correcteurs, en métrique de Hamming et en métrique rang." Phd thesis, Ecole Polytechnique X, 2009. http://pastel.archives-ouvertes.fr/pastel-00005288.
Full textMachado, Daniel Alves. "Uma abordagem de dígitos verificadores e códigos corretores no ensino fundamental." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/55/55136/tde-24112016-103137/.
Full textLemes, Leandro Cruvinel. "Códigos de Goppa e Distâncias Generalizadas de Hamming." Universidade Federal de Uberlândia, 2009. https://repositorio.ufu.br/handle/123456789/16775.
Full textÁvila, Dane Marques de. "O segundo peso de Hamming do código de Reed-Muller generalizado." Universidade Federal de Uberlândia, 2016. https://repositorio.ufu.br/handle/123456789/16822.
Full textKhalil, Maya. "Classes de Steinitz, codes cycliques de Hamming et classes galoisiennes réalisables d'extensions non abéliennes de degré p³." Thesis, Valenciennes, 2016. http://www.theses.fr/2016VALE0012/document.
Full textReimers, Stephen Paul. "Towards Internet Protocol over seawater (IP/SW) : forward error correction (FEC) using Hamming codes for reliable acoustic telemetry /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA306010.
Full textBogaerts, Mathieu. "Codes et tableaux de permutations, construction, énumération et automorphismes." Doctoral thesis, Universite Libre de Bruxelles, 2009. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210302.
Full textSchrek, Julien. "Signatures et authentications pour les cryptosystèmes bases sur les codes correcteurs en métrique de Hamming et en métrique rang." Limoges, 2013. http://aurore.unilim.fr/theses/nxfile/default/e9fa83b6-8739-4c8a-8bd2-90c729b9a03f/blobholder:0/2013LIMO4052.pdf.
Full textBekjarova, Milka. "Packet erasure correcting codes for wireless sensor networks: implementation and field trial measurements." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3558/.
Full textDyshko, Serhii. "Généralisations du Théorème d'Extension de MacWilliams." Thesis, Toulon, 2016. http://www.theses.fr/2016TOUL0018/document.
Full textZávorka, Radek. "Program pro demonstraci kanálového kódování." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413009.
Full textDahlberg, Johan. "Embedded Computer for Space Applications suitable for Linux." Thesis, Linköping University, Department of Electrical Engineering, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2085.
Full textLemes, Leandro Cruvinel 1985. "Novos limitantes para a probabilidade de erro de decodificação em canais com apagamento." [s.n.], 2013. http://repositorio.unicamp.br/jspui/handle/REPOSIP/305913.
Full textKostrhoun, Jan. "Protichybové zabezpečení v digitálních komunikačních systémech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2013. http://www.nusl.cz/ntk/nusl-220327.
Full textPacher, Jakub. "Protichybové systémy s prokládáním." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218329.
Full textKaraer, Arzu. "Optimum bit-by-bit power allocation for minimum distortion transmission." Texas A&M University, 2005. http://hdl.handle.net/1969.1/4760.
Full textPospíšil, Jakub. "Bezdrátová čidla pro měření hladiny vody." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218270.
Full textFougeron, Denis. "Etude et mise en oeuvre de cellules résistantes aux radiations dans le cadre de l'évolution du détecteur à pixels d'Atlas technologie CMOS 65 nm." Electronic Thesis or Diss., Toulon, 2020. http://www.theses.fr/2020TOUL0005.
Full textFanning, Sarah Elizabeth. "Changing fictions of masculinity : adaptations of Jane Eyre and Wuthering Heights, 1939-2009." Thesis, University of Exeter, 2012. http://hdl.handle.net/10871/8524.
Full textCheng, Jay, and 鄭傑. "On Generalized Hamming Weights of Linear Block Codes." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/58867308564051097365.
Full textChen, Hung-Ta, and 陳宏達. "Improving Steganographic Embedding Efficiency by Combining Ternary Hamming Codes and Wet Paper Codes." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/43343876946405245254.
Full textWu, Po-Ting, and 吳柏霆. "A Data Hiding Scheme with Secret Sharing Based on Hamming Codes." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/jp5dn3.
Full textAzar, GHADY. "On the Optimality of the Hamming Metric for Decoding Block Codes over Binary Additive Noise Channels." Thesis, 2013. http://hdl.handle.net/1974/8111.
Full textBade, Peter. "A 1Mbps 0.18μm CMOS Soft-output Decoder for Product Turbo Codes". Thesis, 2009. http://hdl.handle.net/1807/17493.
Full text鄭兆晏. "Design and Analysis of an Efficient Approach for Parital-Sum Queries in Data Cubes Using Hamming-based Codes." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/85378956987241190645.
Full textJubinville, Jason. "Evaluation of intra-set clustering techniques for redundant social media content." Thesis, 2018. https://dspace.library.uvic.ca//handle/1828/10438.
Full textHrinčárová, Monika. "Audio steganografie a IP telefonie." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-347234.
Full textHrinčárová, Monika. "Audio steganografie a IP telefonie." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-357346.
Full textStaphorst, Leonard. "Viterbi Decoded Linear Block Codes for Narrowband and Wideband Wireless Communication Over Mobile Fading Channels." Diss., 2005. http://hdl.handle.net/2263/27090.
Full textchen, bo-rong, and 陳柏融. "Low Distortion Data Hiding Using Hamming Code." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/u8whh5.
Full textChen, Shan-Kang, and 陳善康. "A Halftone Image Authentication and Localization Method Using Hamming Code." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/50362569289258312346.
Full textCheng, Shih-Sheng, and 鄭時昇. "Low-Power Dependable Content Addressable Memory Based on Hamming Code Precomputation." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/85665580477783730368.
Full textChou, Yung-Shun, and 周詠順. "Data Hiding Schemes Based on Hamming Code and Pixel Overlapping Approach." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/rwja64.
Full textHUANG, CHING-CHIEH, and 黃勁傑. "Data Hiding in Halftone Images Using Hamming Code and Hilbert Curve." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/99986495057167154448.
Full textWang, Weisheng, and 王威勝. "An Improved Data Hiding Method on Halftone Images Using Hamming Code." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/04573549260566729311.
Full textShi, Allen, and 施彥任. "A New Fingerprinting System Based on Gray Scale Watermarking and Hamming Code." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/59984088015382296787.
Full textWu, Ming-Ying, and 吳明穎. "A Study on the Data Hiding Algorithms Based on Product Hamming Perfect Code." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/41699941341631163295.
Full textLIN, CHIH-HAO, and 林. 志壕. "An Improved Data Hiding Scheme using Hamming Code in Halftone Images Based on Error Diffusion." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/79365348602008656462.
Full textDyer, Jennifer. "The role of Archaeology in the Jesus industry." Diss., 2015. http://hdl.handle.net/10500/21003.
Full text