期刊文献+
共找到259篇文章
< 1 2 13 >
每页显示 20 50 100
A proof of maximum contention-free property of interleavers for Turbo codes using permutation polynomials over integer rings
1
作者 MA Xin-rui XU You-yun ZHANG Le 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2007年第1期24-27,共4页
It is well known that interleavers play a critical role in Turbo coding/decoding schemes, and contention-free interleaver design has become a serious problem in the paraUelization of Turbo decoding, which is indispens... It is well known that interleavers play a critical role in Turbo coding/decoding schemes, and contention-free interleaver design has become a serious problem in the paraUelization of Turbo decoding, which is indispensable to meet the demands for high throughput and low latency in next generation mobile communication systems. This paper unveils the fact that interleavers based on permutation polynomials modulo N are contention-free for every window size W, a factor of the intedeaver length N, which, also called maximum contention-free interleavers. 展开更多
关键词 Turbo codes integer ring Permutation polynomial INTERLEAVER Maximum contention-free (MCF)
在线阅读 下载PDF
Application of Rollout Strategy to Test Points Selection for Integer-Coded Fault Wise Table 被引量:4
2
作者 Cheng-Lin Yang Shu-Lin Tian Bing Long 《Journal of Electronic Science and Technology of China》 2009年第4期308-311,共4页
Test points selection for integer-coded fault wise table is a discrete optimization problem. The global minimum set of test points can only be guaranteed by an exhaustive search which is eompurationally expensive. In ... Test points selection for integer-coded fault wise table is a discrete optimization problem. The global minimum set of test points can only be guaranteed by an exhaustive search which is eompurationally expensive. In this paper, this problem is formulated as a heuristic depth-first graph search problem at first. The graph node expanding method and rules are given. Then, rollout strategies are applied, which can be combined with the heuristic graph search algorithms, in a computationally more efficient manner than the optimal strategies, to obtain solutions superior to those using the greedy heuristic algorithms. The proposed rollout-based test points selection algorithm is illustrated and tested using an analog circuit and a set of simulated integer-coded fault wise tables. Computa- tional results are shown, which suggest that the rollout strategy policies are significantly better than other strategies. 展开更多
关键词 Heuristic graph search integer-coded fault wise table optimization rollout strategy test points selection.
在线阅读 下载PDF
Selection of Minimal Test Points Set for Integer-Coded Fault Wise Table 被引量:1
3
作者 Shu-Lin Tian Cheng-Lin Yang Bing Long 《Journal of Electronic Science and Technology of China》 2009年第4期312-316,共5页
Test points selection for integer-coded fault wise table is a discrete optimization problem. On one hand, traditional exhaustive search method is computationally expensive. On the other hand, the space complexity of t... Test points selection for integer-coded fault wise table is a discrete optimization problem. On one hand, traditional exhaustive search method is computationally expensive. On the other hand, the space complexity of traditional exhaustive is low. A tradeoff method between the high time complexity and low space complexity is proposed. At first, a new fault-pair table is constructed based on the integer-coded fault wise table. The fault-pair table consists of two columns: one column represents fault pair and the other represents test points set that can distinguish the corresponding faults. Then, the rows are arranged in ascending order according to the cardinality of corresponding test points set. Thirdly, test points in the top rows are selected one by one until all fault pair are isolated. During the test points selection process, the rows that contain selected test points are deleted and then the dimension of fault-pair table decreases gradually. The proposed test points selection algorithm is illustrated and tested using an integercoded fault wise table derived from a real analog circuit. Computational results suggest show policies are better than the exhaustive strategy. 展开更多
关键词 Fault-pair table integer-coded fault wise table optimization test points selection.
在线阅读 下载PDF
An Integer Coding Based Optimization Model for Queen Problems
4
作者 Nengfa Hu 《American Journal of Computational Mathematics》 2016年第1期32-36,共5页
Queen problems are unstructured problems, whose solution scheme can be applied in the actual job scheduling. As for the n-queen problem, backtracking algorithm is considered as an effective approach when the value of ... Queen problems are unstructured problems, whose solution scheme can be applied in the actual job scheduling. As for the n-queen problem, backtracking algorithm is considered as an effective approach when the value of n is small. However, in case the value of n is large, the phenomenon of combination explosion is expected to occur. In order to solve the aforementioned problem, queen problems are firstly converted into the problem of function optimization with constraints, and then the corresponding mathematical model is established. Afterwards, the n-queen problem is solved by constructing the genetic operators and adaption functions using the integer coding based on the population search technology of the evolutionary computation. The experimental results demonstrate that the proposed algorithm is endowed with rapid calculation speed and high efficiency, and the model presents simple structure and is readily implemented. 展开更多
关键词 Queen Problem Function Optimization Mathematical Model Evolutionary Computation integer coding
在线阅读 下载PDF
A Novel Decoding Method for Non-Binary TCM Codes
5
作者 Riyadh A. Al-Hilali Abdulkareem S. Abdallah Raad H. Thaher 《Communications and Network》 2014年第1期22-28,共7页
A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the ... A new non-binary decoding method, which is called Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes which is based on the trellis diagram representing the convolutional encoder. Yaletharatalhussein decoding algorithm outperforms the Viterbi algorithm and other algorithms in its simplicity, very small computational complexity, decoding reliability for high states TCM codes that suitable for Fourth-Generation (4G), decreasing errors with increasing word length, and easy to implement with real-time applications. The proposed Yaletharatalhussein decoding algorithm deals with non-binary error control coding of the convolutional and TCM codes. Convolutional codes differ from block codes in that a block code takes a fixed message length and encodes it, whereas a convolutional code can encode a continuous stream of data, and a hard-decision decoding can easily be realized using the Yaletharatalhussein algorithm. The idea of non-binary codes has been extended for symbols defined over rings of integers, which outperform binary codes with only a small increase in decoding complexity. The simulation results show that the performance of the nonbinary TCM-based Yaletharatalhussein algorithm outperforms the binary and non-binary decoding methods. 展开更多
关键词 Convolutional CODES Coded MODULATION (CM) Trellis Code MODULATION (TCM) Non-Binary Error Correcting CODES Groups Rings of integers
在线阅读 下载PDF
Buffer Overflow Detection on Binary Code 被引量:2
6
作者 郑燕飞 李晖 陈克非 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期224-229,共6页
Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically th... Most solutions for detecting buffer overflow are based on source code. But the requirement tor source code is not always practical especially for business software. A new approach was presented to detect statically the potential buffer overflow vulnerabilities in the binary code of software. The binary code was translated into assembly code without the lose of the information of string operation functions. The feature code abstract graph was constructed to generate more accurate constraint statements, and analyze the assembly code using the method of integer range constraint. After getting the elementary report on suspicious code where buffer overflows possibly happen, the control flow sensitive analysis using program dependence graph was done to decrease the rate of false positive. A prototype was implemented which demonstrates the feasibility and efficiency of the new approach. 展开更多
关键词 binary code buffer overflow integer range constraint feature abstract graph
在线阅读 下载PDF
Second Generation Wavelet Applied to Lossless Compression Coding of Image 被引量:1
7
作者 Yan Tang Yu-long Mo 《Advances in Manufacturing》 2000年第3期225-229,共5页
In this paper, the second generation wavelet transform is applied to image lossless coding, according to its characteristic of reversible integer wavelet transform. The second generation wavelet transform can provide ... In this paper, the second generation wavelet transform is applied to image lossless coding, according to its characteristic of reversible integer wavelet transform. The second generation wavelet transform can provide higher compression ratio than Huffman coding while it reconstructs image without loss compared with the first generation wavelet transform. The experimental results show that the se cond generation wavelet transform can obtain excellent performance in medical image compression coding. 展开更多
关键词 wavelet transform integer wavelet image compression lossless coding
在线阅读 下载PDF
A High Spectral Efficient Non-Binary TCM Scheme-Based Novel Decoding Algorithm for 4G Systems
8
作者 Riyadh A. Al-Hilali Raad H. Thaher Abdulkareem S. Abdallah 《Communications and Network》 2013年第4期296-304,共9页
This paper deals with the MIMO-OFDM technique that is applied to the fourth generation (4G) of the wireless communication systems, this technique can provide high data rate transmission without increasing transmit pow... This paper deals with the MIMO-OFDM technique that is applied to the fourth generation (4G) of the wireless communication systems, this technique can provide high data rate transmission without increasing transmit power and expanding bandwidth, it can also efficiently use space resources and has a bright future. It presents the channel coding assisted STBC-OFDM systems, and employs the Coded Modulation techniques (CM), since the signal bandwidth available for wireless communications is limited. The proposed system deals with Non-binary error control coding of the TCM-aided STBC-OFDM scheme for transmissions over the Rayleigh channel. A new non-binary decoding method, Yaletharatalhussein decoding algorithm, is designed and implemented for decoding non-binary convolutional codes, which is based on the trellis diagram representing the convolutional encoder. Yaletharatalhussein decoding algorithm outperforms the Viterbi algorithm and other algorithms in its simplicity, very small computational complexity, decoding reliability for high states TCM codes that are suitable for Fourth-Generation (4G), decreasing errors with increasing word length, and easy to implement with real-time applications. The simulation results show that the performance of the non-binary TCM-based Yaletharatalhussein decoding algorithm-assisted STBC-OFDM scheme outperforms the binary and non-binary decoding methods. 展开更多
关键词 Convolutional CODES Trellis Code Modulation(TCM) Non-Binary Error Correcting CODES Groups Rings of integerS OFDM MIMO MIMO-OFDM STBC
在线阅读 下载PDF
An Optimal Algorithm for Prufer Codes
9
作者 Xiaodong Wang Lei Wang Yingjie Wu 《Journal of Software Engineering and Applications》 2009年第2期111-115,共5页
This paper studies the algorithms for coding and decoding Prufer codes of a labeled tree. The algorithms for coding and decoding Prufer codes of a labeled tree in the literatures require time usually. Although there e... This paper studies the algorithms for coding and decoding Prufer codes of a labeled tree. The algorithms for coding and decoding Prufer codes of a labeled tree in the literatures require time usually. Although there exist linear time algorithms for Prufer-like codes [1,2,3], the algorithms utilize the integer sorting algorithms. The special range of the integers to be sorted is utilized to obtain a linear time integer sorting algorithm. The Prufer code problem is reduced to integer sorting. In this paper we consider the Prufer code problem in a different angle and a more direct manner. We start from a na&#239;ve algorithm, then improved it gradually and finally we obtain a very practical linear time algorithm. The techniques we used in this paper are of interest in their own right. 展开更多
关键词 DESIGN of ALGORITHM Labeled Trees Prufer CODES integer SORTING
在线阅读 下载PDF
Repeated-Root Self-Dual Negacyclic Codes over Finite Fields
10
作者 Xiuli LI 《Journal of Mathematical Research with Applications》 CSCD 2016年第3期275-284,共10页
Let F_q be a finite field with q = p^m, where p is an odd prime. In this paper, we study the repeated-root self-dual negacyclic codes over Fq. The enumeration of such codes is investigated. We obtain all the self-dual... Let F_q be a finite field with q = p^m, where p is an odd prime. In this paper, we study the repeated-root self-dual negacyclic codes over Fq. The enumeration of such codes is investigated. We obtain all the self-dual negacyclic codes of length 2~ap^r over F_q, a ≥ 1.The construction of self-dual negacyclic codes of length 2~abp^r over F_q is also provided, where gcd(2, b) = gcd(b, p) = 1 and a ≥ 1. 展开更多
关键词 codes length Root integer factorization reciprocal polynomial facts generator irreducible
原文传递
基于游程编码和颜色转换的图像安全传输研究
11
作者 赵杨宇 姚丙君 +1 位作者 汤震宇 平萍 《计算机仿真》 2025年第5期147-152,220,共7页
由于电力巡检缺陷图像在传输过程中易被攻击者获取和利用,从而对电力公司造成潜在威胁。研究首次结合频域和空域提出了一种基于游程编码和颜色转换的电力巡检缺陷图像安全传输方案。首先,游程编码被首次用于图像隐藏中对缺陷图像进行编... 由于电力巡检缺陷图像在传输过程中易被攻击者获取和利用,从而对电力公司造成潜在威胁。研究首次结合频域和空域提出了一种基于游程编码和颜色转换的电力巡检缺陷图像安全传输方案。首先,游程编码被首次用于图像隐藏中对缺陷图像进行编码,这可降低图像嵌入对掩体图像像素值的损害。然后,在频域下,秘密信息被嵌入到频域的子带中。最后,在空域下,颜色转换被使用以提高含密图像的质量。在模拟实验中,上述方法含密图像的PSNR和MSSIM高于经典的图像隐藏方法,且含密图像能够抵抗残差分析和直方图分析。多方面的实验结果表明该方案在保证缺陷图像无损恢复的前提下显著提高了含密图像的质量,增强了含密图像在不安全网络中传输的安全性。 展开更多
关键词 电力巡检缺陷图像 整数小波变换 游程编码 颜色转换 图像隐藏
在线阅读 下载PDF
A spatial multi-scale integer coding method and its application to three-dimensional model organization 被引量:1
12
作者 Guangling Lai Xiaochong Tong +4 位作者 Yongsheng Zhang Lu Ding Yinling Sui Yi Lei Yong Zhang 《International Journal of Digital Earth》 SCIE 2020年第10期1151-1171,共21页
With the rapid development of digital earth,smart city,and digital twin technology,the demands of three-dimensional model data’s application is getting higher and higher.These data tend to be multi-objectification,mu... With the rapid development of digital earth,smart city,and digital twin technology,the demands of three-dimensional model data’s application is getting higher and higher.These data tend to be multi-objectification,multi-type,multi-scale,complex spatial relationship,and large amount,which brings great challenges to the efficient organization of them.This paper mainly studies the organization of three-dimensional model data,and the main contributions are as follows:1)A integer coding method of three dimensional multi-scale grid is proposed,which can reduce the four-dimensional(spatial dimension and scale dimension)space into one-dimensional,and has better space and scale clustering characteristics by comparing with various types of grid coding.2)The binary algebra calculation method is proposed to realize the basic spatial relationship calculation of three-dimensional grid,which has higher spatial relationship computing ability than 3D-Geohash method;3)The multi-scale integer coding method is applied to the data organization of three-dimensional city model,and the experiment results show that:it is more efficient and stable than the threedimensional R-tree index and Geohash coding method in the establishment of index and the query of three dimensional space. 展开更多
关键词 Regular grid division threedimensional spatial index multi-scale integer coding encoding calculations threedimensional building model data organization
原文传递
A reversibility-gain model for integer Karhunen-Loève transform design in video coding
13
作者 Xing-guo ZHU Lu YU 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2015年第10期883-891,共9页
Karhunen-Loeve transform (KLT) is the optimal transform that minimizes distortion at a given bit allocation for Gaussian source. As a KLT matrix usually contains non-integers, integer-KLT design is a classical probl... Karhunen-Loeve transform (KLT) is the optimal transform that minimizes distortion at a given bit allocation for Gaussian source. As a KLT matrix usually contains non-integers, integer-KLT design is a classical problem. In this paper, a joint reversibility-gain (R-G) model is proposed for integer-KLT design in video coding. Specifically, the 'reversibility' is modeled according to distortion analysis in using forward and inverse integer transform without quantization. It not only measures how invcrtible a transform is, but also bounds the distortion introduced by the non-orthonormal integer transform process. The 'gain' means transform coding gain (TCG), which is a widely used criterion for transform design in video coding. Since KLT maximizes the TCG under some assumptions, here we define the TCG loss ratio (LR) to measure how much coding gain an integer-KLT loses when compared with the original KLT. Thus, the R-G model can be explained as follows: subject to a certain TCG LR, an integer- KLT with the best reversibility is the optimal integer transform for a given non-integer-KLT. Experimental results show that the R-G model can guide the design of integer-KLTs with good performance. 展开更多
关键词 integer transform Karhunen-Loeve transform (KLT) integer-KLT Transform coding Video coding
原文传递
Integer Codes Correcting Single Errors and Random Asymmetric Errors within a Byte
14
作者 RADONJIC Aleksandar VUJICIC Vladimir 《Journal of Systems Science & Complexity》 SCIE EI CSCD 2020年第6期2103-2113,共11页
In optical networks without optical amplifiers(ONWOAs) photons may fade or fail to be detected, but new photons cannot be generated. Hence, under normal conditions, only 1 → 0 errors can occur. However, in some situa... In optical networks without optical amplifiers(ONWOAs) photons may fade or fail to be detected, but new photons cannot be generated. Hence, under normal conditions, only 1 → 0 errors can occur. However, in some situations, the photodetector may generate a false 0 → 1 error. This mostly occurs in cases when the dark current is higher than specified. With this in mind, in this paper,the authors present a class of codes suitable for use in ONWOAs using self-synchronous scramblers.The presented codes can correct single errors and random asymmetric(1 → 0) errors within a b-bit byte. Unlike classical codes, these codes use integer and lookup table operations. As a result, their interleaved version, implemented on a dual-core 3.0 GHz processor, achieves the theoretical throughput above the operating rate of 10 G networks. 展开更多
关键词 Asymmetric errors decoding throughput integer codes optical networks single errors
原文传递
Improved rate-distortion optimized video coding using non-integer bit estimation and multiple Lambda search
15
作者 Sio Kei IM Mohammad Mahdi GHANDI 《Frontiers of Computer Science》 SCIE EI CSCD 2016年第1期157-166,共10页
Many modern video encoders use the Lagrangian rate-distortion optimization (RDO) algorithm for mode deci- sions during the compression procedure. For each encoding stage, this approach involves minimizing a cost, wh... Many modern video encoders use the Lagrangian rate-distortion optimization (RDO) algorithm for mode deci- sions during the compression procedure. For each encoding stage, this approach involves minimizing a cost, which is a function of rate, distortion and a multiplier called Lambda. This paper proposes to improve the RDO process by applying two modifications. The first modification is to increase the ac- curacy of rate estimation, which is achieved by computing a non-integer number of bits for arithmetic coding of the syntax elements. This leads to a more accurate cost computation and therefore a better mode decision. The second modification is to search and adjust the value of Lambda based on the char- acteristics of each coding stage. For the encoder used, this paper proposes to search multiple values of Lambda for the intra-4x4 mode decision. Moreover, a simple shift in Lambda value is proposed for motion estimation. Each of these modi- fications offers a certain gain in RDO performance, and, when all are combined, an average bit-rate saving of up to 7.0% can be achieved for the H.264/AVC codec while the same concept is applicable to the H.265/HEVC codec as well. The extra added complexity is contained to a certain level, and is also adjustable according to the processing resources available. 展开更多
关键词 rate distortion optimization Lambda adjust-ment non-integer bit estimation H.264/AVC H265/HEVCvideo coding
原文传递
基于Geohash的面数据区域查询 被引量:59
16
作者 金安 程承旗 +1 位作者 宋树华 陈波 《地理与地理信息科学》 CSCD 北大核心 2013年第5期31-35,共5页
鉴于Geohash编码的全球唯一性、多层次递归性和一维的特性,以及Geohash目前通常只用于邻近点数据的空间查询而鲜用于面数据空间查询的现状,提出了一种基于Geohash的面数据区域查询方案,描述了对面数据和查询区域的处理方法。主要思路是... 鉴于Geohash编码的全球唯一性、多层次递归性和一维的特性,以及Geohash目前通常只用于邻近点数据的空间查询而鲜用于面数据空间查询的现状,提出了一种基于Geohash的面数据区域查询方案,描述了对面数据和查询区域的处理方法。主要思路是将面数据关联到若干Geohash单元网格,并在数据库中保存网格的Geohash编码与面数据的对应关系,查询时将查询区域根据规则对应到最多4个Geohash编码,再根据编码查询与区域相交的面数据。通过对比试验可知,在数据量较大且查询区域较小的情况下,基于Geohash编码的面数据查询效率较基于经纬度和R-树的查询效率高,在海量空间数据检索上具有一定应用价值。 展开更多
关键词 Geohash GIS 区域查询 整型编码
在线阅读 下载PDF
多UCAV任务分配的混合遗传算法与约束处理 被引量:22
17
作者 叶媛媛 闵春平 沈林成 《控制与决策》 EI CSCD 北大核心 2006年第7期781-786,共6页
针对多UCAV协同作战任务分配问题,建立了多目标整数规划模型,提出了基于整数编码的混合遗传算法.将约束分为全局约束和局部约束,根据局部约束将决策变量分为自由变量和非自由变量,仅对非自由变量进行编码,减少了染色体变化要素.设计了... 针对多UCAV协同作战任务分配问题,建立了多目标整数规划模型,提出了基于整数编码的混合遗传算法.将约束分为全局约束和局部约束,根据局部约束将决策变量分为自由变量和非自由变量,仅对非自由变量进行编码,减少了染色体变化要素.设计了交叉算子和变异算子,以提高个体的约束满足率.以UCAV的SEAD任务为想定进行仿真,实验结果表明,该混合遗传算法可有效解决大规模整数规划问题,在求解效率和约束满足率上比标准遗传算法有显著提高. 展开更多
关键词 UCAV 任务分配 整数规划 混合遗传算法 整数编码
在线阅读 下载PDF
一种基于整数小波变换的图像编码算法 被引量:33
18
作者 张立保 王珂 《软件学报》 EI CSCD 北大核心 2003年第8期1433-1438,共6页
针对静止图像经整数小波变换(integer wavelet transform)后,各子带系数的幅值动态变化范围小,不利于零树编码(embedded zerotree wavelet coding)的缺点,采用“从1开始的整数平方”代替“2的整数次幂”作为零树编码的量化阈值,缩短了... 针对静止图像经整数小波变换(integer wavelet transform)后,各子带系数的幅值动态变化范围小,不利于零树编码(embedded zerotree wavelet coding)的缺点,采用“从1开始的整数平方”代替“2的整数次幂”作为零树编码的量化阈值,缩短了量化阈值间隔,通过减少重要系数在较低量化阈值中出现的机会,增加了编码过程中的零树数量;同时通过减少参与编码的字符数及对最高频带零树不编码,简化了编码过程。实验结果表明,整数平方量化阈值下的零树编码(integer square zerotree wavelet coding)解决了整数小波变换中零树编码的低效问题,提高了静止图像的编码效率。 展开更多
关键词 整数小波变换 零树编码 整数平方零树编码 2的整数次幂 量化阈值
在线阅读 下载PDF
基于整数编码遗传算法的传感器优化配置研究 被引量:25
19
作者 覃柏英 林贤坤 +1 位作者 张令弥 郭勤涛 《振动与冲击》 EI CSCD 北大核心 2011年第2期252-257,共6页
动态测试中,为了将传感器配置在合理的自由度上,以便充分反映结构的动力特性,需对传感器进行优化配置。分别以模态置信度矩阵、Fisher信息阵和它们的组合为优化准则,采用整数编码遗传算法,探讨了单目标和多目标优化的传感器优化配置问... 动态测试中,为了将传感器配置在合理的自由度上,以便充分反映结构的动力特性,需对传感器进行优化配置。分别以模态置信度矩阵、Fisher信息阵和它们的组合为优化准则,采用整数编码遗传算法,探讨了单目标和多目标优化的传感器优化配置问题。通过与现有的模态动能法、有效独立法及基于QR分解的逐步累积法进行比较,传感器优化配置的结果表明整数编码遗传算法优于上述三种方法。 展开更多
关键词 传感器 优化配置 组合优化问题 整数编码 遗传算法
在线阅读 下载PDF
一种新的数据无损压缩编码方法 被引量:11
20
作者 蔡明 乔文孝 +3 位作者 鞠晓东 车小花 卢俊强 贾安学 《电子与信息学报》 EI CSCD 北大核心 2014年第4期1008-1012,共5页
为了降低数据存储和传输的成本,对数据进行压缩处理是一种有效的手段。该文针对具有较小均方值特征的整型数据序列提出了一种新的可用于数据无损压缩的位重组标记编码方法。该方法首先对整型数据序列进行位重组处理,以提高部分数据出现... 为了降低数据存储和传输的成本,对数据进行压缩处理是一种有效的手段。该文针对具有较小均方值特征的整型数据序列提出了一种新的可用于数据无损压缩的位重组标记编码方法。该方法首先对整型数据序列进行位重组处理,以提高部分数据出现的概率;然后根据数据流中局部数据的概率分布特点自适应地选择合适的编码方式对数据流进行编码。运用实际具有较小均方值特征的整型数据序列对该文方法和其它几种无损压缩方法进行了压缩解压测试,并对比分析了各种压缩算法的压缩效果。测试结果表明,新方法可以实现数据的无损压缩与解压,且其压缩效果优于LZW编码,经典的算术编码,通用的WinRAR软件和专业音频数据压缩软件FLAC的压缩效果,具有良好的应用前景。 展开更多
关键词 数据传输 编码 无损压缩 整型数据 位重组 标记
在线阅读 下载PDF
上一页 1 2 13 下一页 到第
使用帮助 返回顶部