Twelve scientific challenges for 6G: Rethinking the foundations of communications theory

M Chafii, L Bariah, S Muhaidat… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
The research in the sixth generation of wireless networks needs to tackle new challenges in
order to meet the requirements of emerging applications in terms of high data rate, low …

A tutorial on Reed–Solomon coding for fault‐tolerance in RAID‐like systems

JS Plank - Software: Practice and Experience, 1997 - Wiley Online Library
It is well‐known that Reed‐Solomon codes may be used to provide error correction for
multiple failures in RAID‐like systems. The coding technique itself, however, is not as well …

Deep learning enabled semantic communication systems

H Xie, Z Qin, GY Li, BH Juang - IEEE Transactions on Signal …, 2021 - ieeexplore.ieee.org
Recently, deep learned enabled end-to-end communication systems have been developed
to merge all physical layer blocks in the traditional communication systems, which make joint …

American sign language recognition using deep learning and computer vision

K Bantupalli, Y Xie - 2018 IEEE international conference on big …, 2018 - ieeexplore.ieee.org
Speech impairment is a disability which affects an individuals ability to communicate using
speech and hearing. People who are affected by this use other media of communication …

Xoring elephants: Novel erasure codes for big data

M Sathiamoorthy, M Asteris, D Papailiopoulos… - arXiv preprint arXiv …, 2013 - arxiv.org
Distributed storage systems for large clusters typically use replication to provide reliability.
Recently, erasure codes have been used to reduce the large storage overhead of three …

Distortion agnostic deep watermarking

X Luo, R Zhan, H Chang, F Yang… - Proceedings of the …, 2020 - openaccess.thecvf.com
Watermarking is the process of embedding information into an image that can survive under
distortions, while requiring the encoded image to have little or no perceptual difference with …

A low storage room requirement framework for distributed ledger in blockchain

M Dai, S Zhang, H Wang, S Jin - IEEE access, 2018 - ieeexplore.ieee.org
Traditional centralized commerce on the Internet relies on trusted third parties to process
electronic payments. It suffers from the weakness of the trust-based model. A pure …

[图书][B] Undergraduate Texts in Mathematics

S Axler, KA Ribet - 2015 - Springer
In Chapter 1, we have seen how the algebra of the polynomial rings k [x1,..., xn] and the
geometry of affine algebraic varieties are linked. In this chapter, we will study the method of …

[图书][B] Information theory and network coding

RW Yeung - 2008 - books.google.com
This book is an evolution from my book A First Course in Information Theory published in
2002 when network coding was still at its infancy. The last few years have witnessed the …

Hot sax: Efficiently finding the most unusual time series subsequence

E Keogh, J Lin, A Fu - … Conference on Data Mining (ICDM'05), 2005 - ieeexplore.ieee.org
In this work, we introduce the new problem of finding time series discords. Time series
discords are subsequences of a longer time series that are maximally different to all the rest …