Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Space Time Code Representation in Transform Domain

    In this paper, the space time block code is investigated in transform domain. We represent the orthogonal space time block codes by using a fast Hadamard transform. Additionally, the filter theory is considere...

    Gi Yean Hwang, Jia Hou, Moon Ho Lee in Knowledge-Based Intelligent Information an… (2004)

  2. No Access

    Chapter and Conference Paper

    Cocyclic Jacket Matrices and Its Application to Cryptography Systems

    We describe the extended Hadamard matrices named Jacket in terms of combinatorial designs, and show that the center weighted Jacket matrices belong to a class of cocyclic matrices. Additionally, a simple publi...

    Jia Hou, Moon Ho Lee in Information Networking. Convergence in Bro… (2005)

  3. No Access

    Chapter and Conference Paper

    Memory Reused Multiplication Implementation for Cryptography System

    In this paper, we simply present a memory reused multiplication implementation. This scheme could efficiently reduce the number of computations for cryptography system or other computation algorithms.

    Gi Yean Hwang, Jia Hou, Kwang Ho Chun in Computational Science and Its Applications… (2005)

  4. No Access

    Chapter and Conference Paper

    Decoding Consideration for Space Time Coded MIMO Channel with Constant Amplitude Multi-code System

    The space time constant amplitude multi-code design applied to wireless communication is reported in this paper. The propose systems could lead to both simple implementation and the maximum diversity gain corr...

    Jia Hou, Moon Ho Lee, Ju Yong Park, Jeong Su Kim in Networking - ICN 2005 (2005)

  5. No Access

    Chapter and Conference Paper

    High Rate UWB-LDPC Code and Its Soft Initialization

    In this paper, we describe a kind of high rate low density parity check (LDPC) code and its decoding scheme for ultra wideband (UWB) communication. Particularly, the proposed scheme uses a hybrid soft normaliz...

    Jia Hou, Moon Ho Lee in Networking - ICN 2005 (2005)

  6. No Access

    Chapter and Conference Paper

    A Fast Search and Advanced Marking Scheme for Network IP Traceback Model

    Defending against distributed denial-of-service (DDoS) attack is one of the hardest security problems on the internet today. In this paper, we investigate a fast search algorithm for IP trace back, which is si...

    Jia Hou, Moon Ho Lee in Distributed Computing and Internet Technology (2005)

  7. No Access

    Chapter and Conference Paper

    Detecting Changes of Functional Connectivity by Dynamic Graph Embedding Learning

    Our current understandings reach the unanimous consensus that the brain functions and cognitive states are dynamically changing even in the resting state rather than remaining at a single constant state. Due t...

    Yi Lin, Jia Hou, Paul J. Laurienti in Medical Image Computing and Computer Assis… (2020)