2012
DOI: 10.1007/978-3-642-25206-8_24
|View full text |Cite
|
Sign up to set email alerts
|

Maximum a Posteriori Decoding of Arithmetic Codes in Joint Source-Channel Coding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…As shown in Figure 4(c), the forecasted forbidden region is much larger than that in Figure 3, which obviously improves the error correcting capability. On the other hand, the look-ahead technique [26] usually employed in AC decoders can detect forbidden symbol quickly by decoding the source symbol even when the decoding interval bounds +1 and +1 are located in the encoding intervals for a particular source symbol and the forbidden region by assuming that it is error-free. An example of which is given in Figure 5, where the source symbol "1" is decoded in Figure 5(a) and then the forbidden symbol can be detected in Figure 5(b).…”
Section: The Proposed Algorithmmentioning
confidence: 99%
See 4 more Smart Citations
“…As shown in Figure 4(c), the forecasted forbidden region is much larger than that in Figure 3, which obviously improves the error correcting capability. On the other hand, the look-ahead technique [26] usually employed in AC decoders can detect forbidden symbol quickly by decoding the source symbol even when the decoding interval bounds +1 and +1 are located in the encoding intervals for a particular source symbol and the forbidden region by assuming that it is error-free. An example of which is given in Figure 5, where the source symbol "1" is decoded in Figure 5(a) and then the forbidden symbol can be detected in Figure 5(b).…”
Section: The Proposed Algorithmmentioning
confidence: 99%
“…In this section, the proposed scheme is compared with the original MAP scheme [10] and the look-ahead scheme [26]. Binary source symbols with 0 = 0.8667 are randomly generated, which correspond to the memoryless source entropy = 0.567.…”
Section: Simulationsmentioning
confidence: 99%
See 3 more Smart Citations