{"title":"Methods and characteristics of videodata unequal protection based on uniform convolutional codes","authors":"V. K. Konopilko, A. Korolov, Ahmed Said Elalam","doi":"10.1109/ICAICT.2010.5612052","DOIUrl":null,"url":null,"abstract":"Well-known methods of unequal protection of information symbols from errors are implemented [1] based on signal-code structures using multi-phase and multi-level modulation methods and group codes with different correcting capacity on the appropriate levels of signal set segmentation or with segmentation of transferred information into flows of significant and non-significant information symbols. Significant information symbols are encoded by cascade code based on cyclic Hamming codes, BCH-codes and convolution code with code symbols perforation capacity. Disadvantages of these unequal protection methods of information symbols are the high excessiveness of the transferred information r ≥ 60% and relatively low reliability of significant information symbols transfer:","PeriodicalId":314036,"journal":{"name":"2010 4th International Conference on Application of Information and Communication Technologies","volume":"62 12","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2010-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2010 4th International Conference on Application of Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAICT.2010.5612052","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
Well-known methods of unequal protection of information symbols from errors are implemented [1] based on signal-code structures using multi-phase and multi-level modulation methods and group codes with different correcting capacity on the appropriate levels of signal set segmentation or with segmentation of transferred information into flows of significant and non-significant information symbols. Significant information symbols are encoded by cascade code based on cyclic Hamming codes, BCH-codes and convolution code with code symbols perforation capacity. Disadvantages of these unequal protection methods of information symbols are the high excessiveness of the transferred information r ≥ 60% and relatively low reliability of significant information symbols transfer: