Harsha B K
Harsha B K
  • 31
  • 70 346
Convolutional codes Encoding using Code tree.
This video describes about the convolutional codes encoding using Code tree.
The convolutional codes
State table, state transition table, state diagram can be found in th-cam.com/video/7xkkIu4NiE0/w-d-xo.html
Time domain approach can be found here th-cam.com/video/VOlhznDawlo/w-d-xo.html
Transform domain approach can be found here th-cam.com/video/37-ZzpA1bxI/w-d-xo.html
มุมมอง: 17 521

วีดีโอ

Convolutional codes #State table, #State transition table and #State Diagram
มุมมอง 22K3 ปีที่แล้ว
This video describes about the State table, State transition table and State Diagram for a convolutional encoder. Convolutional coding more videos can be found in the below links 1. Time domain approach can be found in th-cam.com/video/VOlhznDawlo/w-d-xo.html 2. Transform domain approach can be found in th-cam.com/video/37-ZzpA1bxI/w-d-xo.html Reference books 1. Digital and analog communication...
Binary Cyclic Codes Encoding Circuit
มุมมอง 3.7K3 ปีที่แล้ว
This video explains about how to draw an encoding circuit for an (n, k) binary cyclic code, using (n-k) bit shift register.
8051 ALP TO GENERATE A TRIANGULAR WAVE
มุมมอง 2.5K4 ปีที่แล้ว
MOV A,#00H ; LOWER VALUE OF THE SQUARE WAVE 00 UP: MOV P0, A ; OUTPUT IT THROUGH PORT0 INC A ; NEXT VALUE OF THE PLOT CJNE A, #0FFH, UP ; COMPARE THE CONTENTS OF ACCUMLATOR WITH MAXMIMUM VALUE IF ; NOT REACHED REPEAT PEAK VALUE OUTPUT DOWN: MOV P0, A ; OUTPUT IT THROUGH PORT0 DEC A ; NEXT VALUE OF THE PLOT CJNE A, #00H, DOWN ; COMPARE THE CONTENTS OF ACCUMLATOR WITH MAXMIMUM VALUE IF ; NOT REAC...
Enterprise Security Using Zachman Framework, lecture #2, by Prof.Harsha B K
มุมมอง 2824 ปีที่แล้ว
In this video we discuss Enterprise Workshop, Matrix Mining, Nominal Group Technique, Minipatterns for Problem Solving Meetings
8051 ALP TO CHECK IF THE NUMBER IS EVEN OR ODD
มุมมอง 7K4 ปีที่แล้ว
ALP TO CHECK IF THE NUMBER IS EVEN OR ODD MOV R1, #00H ; To hold the result MOV A, #0A5H ; Number under test CLR C ; Clear the contents of carry flag RRC A ; Rotate Right content of reg A JC NEXT ; Jump if carry to label NEXT MOV R1, #00H ; R1=00 as the given number is Even SJMP HERE ; Unconditional Jump to label HERE NEXT: MOV R1, #01H ; R1=01 as the given number is Odd HERE:SJMP $ ; Self loop...
8051 ALP TO CHECK IF THE NUMBER IS POSITIVE OR NEGATIVE
มุมมอง 6K4 ปีที่แล้ว
MOV R1, #00H ; To hold the result MOV A, #0A5H ; Number under test CLR C ; Clear the contents of carry flag RLC A ; Rotate left content of reg A JC NEXT ; Jump if carry to label NEXT MOV R1, #00H ; R1=00 as the given number is positive SJMP HERE ; Unconditional Jump to label HERE NEXT: MOV R1, #01H ; R1=01 as the given number is negative HERE:SJMP $ ; Self loop infinite times END ; End of program
Enterprise Security Using Zachman Framework, lecture #1, by Prof. Harsha B K
มุมมอง 1.2K4 ปีที่แล้ว
In this video we discuss What Is Architecture? Why Do We Need It? Enterprises are Complex and Changing, The ZF for Enterprise Architecture, Primitive Models versus Composite Models, How Does the ZF Help with Cybersecurity?, Architectural Problem Solving Patterns, Problem-solving types, Business Question Analysis, Document Mining, Hierarchy Formation
Cyber Network Security lecture #3, by Prof. Harsha B K
มุมมอง 2854 ปีที่แล้ว
In this video we discuss the antipatterns, Networks Always Play by the Rules, Hard on the Outside, Gooey in the Middle, Webify Everything, No Time for Security, Summary
Cyber Network Security lecture #2, by Prof. Harsha B K
มุมมอง 6704 ปีที่แล้ว
In this video we discuss Antipatterns Concept, Forces in Cyber Antipatterns, Cyber Antipattern Templates, Micro-Antipattern Templates, Full Cyber Antipattern Template, Cybersecurity Antipattern Catalog, Can’t Patch Dumb, Unpatched Applications, Never Read the Logs.
Cyber Network Security lecture #1, by Prof. Harsha B K
มุมมอง 6974 ปีที่แล้ว
In this video we discuss Inroduction to Cyber Network Security Concepts, Why start with Antipatterns, Security Architecture, Antipattern: Signature-Based Malware Detection versus Polymorphic Threats, Refactored Solution: Reputational-, Behavioral-, and Entropy-Based Malware Detection, Antipattern: Document-Driven Certification and Accreditation, Antipattern: Proliferating IA Standards with No P...
IP Security lecture #8, by Prof. Harsha B K
มุมมอง 1834 ปีที่แล้ว
In this video we discuss Features of IKE key determination, IKE cookie generation requirements, IKE key determination supports, IKE Authentication methods, IKEV2 Exchanges, Header and Payload Formats, IKE Payload Types, Cryptographic Suites, Virtual Private Networks (RFC 4308), NSA Suite B (RFC 4869)
IP Security lecture #7, by Prof. Harsha B K
มุมมอง 1174 ปีที่แล้ว
In this video we discuss IP security, Features of IKE key determination, IKE cookie generation requirements, IKE key determination supports, IKE Authentication methods, Cryptographic Suites
IP Security lecture #6, by Prof. Harsha B K
มุมมอง 1954 ปีที่แล้ว
IP Security lecture #6, by Prof. Harsha B K
IP Security lecture #5, by Prof. Harsha B K
มุมมอง 2064 ปีที่แล้ว
IP Security lecture #5, by Prof. Harsha B K
IP Security lecture #4, by Prof. Harsha B K
มุมมอง 8884 ปีที่แล้ว
IP Security lecture #4, by Prof. Harsha B K
IP Security lecture #3, by Prof. Harsha B K
มุมมอง 3384 ปีที่แล้ว
IP Security lecture #3, by Prof. Harsha B K
IP Security lecture #2, by Prof. Harsha B K
มุมมอง 4674 ปีที่แล้ว
IP Security lecture #2, by Prof. Harsha B K
IP Security lecture #1, by Prof. Harsha B K
มุมมอง 1.7K4 ปีที่แล้ว
IP Security lecture #1, by Prof. Harsha B K
Electronic Mail Security lecture #7, by Prof. Harsha B K
มุมมอง 1424 ปีที่แล้ว
Electronic Mail Security lecture #7, by Prof. Harsha B K
Electronic Mail Security lecture #8, Prof. Harsha B K
มุมมอง 1534 ปีที่แล้ว
Electronic Mail Security lecture #8, Prof. Harsha B K
Electronic Mail Security lecture #6, by Prof. Harsha B K
มุมมอง 1184 ปีที่แล้ว
Electronic Mail Security lecture #6, by Prof. Harsha B K
Electronic Mail Security lecture #5, by Prof. Harsha B K
มุมมอง 1314 ปีที่แล้ว
Electronic Mail Security lecture #5, by Prof. Harsha B K
Electronic Mail Security lecture #4, Prof. Harsha B K
มุมมอง 1054 ปีที่แล้ว
Electronic Mail Security lecture #4, Prof. Harsha B K
Electronic Mail Security lecture #3, by Prof. Harsha B K
มุมมอง 1844 ปีที่แล้ว
Electronic Mail Security lecture #3, by Prof. Harsha B K
Electronic Mail Security lecture #2, by Prof. Harsha B K
มุมมอง 3214 ปีที่แล้ว
Electronic Mail Security lecture #2, by Prof. Harsha B K
Electronic Mail Security lecture #1, by Prof. Harsha B K
มุมมอง 1.4K4 ปีที่แล้ว
Electronic Mail Security lecture #1, by Prof. Harsha B K