{"id":"https://openalex.org/W1582460764","doi":"https://doi.org/10.1109/iswcs.2004.1407238","title":"Unequal error protection schemes for image transmission over fading channels","display_name":"Unequal error protection schemes for image transmission over fading channels","publication_year":2005,"publication_date":"2005-03-31","ids":{"openalex":"https://openalex.org/W1582460764","doi":"https://doi.org/10.1109/iswcs.2004.1407238","mag":"1582460764"},"language":"en","primary_location":{"id":"doi:10.1109/iswcs.2004.1407238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iswcs.2004.1407238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"1st International Symposium onWireless Communication Systems, 2004.","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046666794","display_name":"M. Caldera","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144648","display_name":"Perron Institute for Neurological and Translational Science","ror":"https://ror.org/04yn72m09","country_code":"AU","type":"facility","lineage":["https://openalex.org/I4210144648"]}],"countries":["AU"],"is_corresponding":true,"raw_author_name":"M. Caldera","raw_affiliation_strings":["Western Australian Telecommunications Research Institute, Nedlands, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Western Australian Telecommunications Research Institute, Nedlands, WA, Australia","institution_ids":["https://openalex.org/I4210144648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5073318200","display_name":"Hans\u2010J\u00fcrgen Zepernick","orcid":"https://orcid.org/0000-0003-3604-2766"},"institutions":[{"id":"https://openalex.org/I4210144648","display_name":"Perron Institute for Neurological and Translational Science","ror":"https://ror.org/04yn72m09","country_code":"AU","type":"facility","lineage":["https://openalex.org/I4210144648"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"H.-J. Zepernick","raw_affiliation_strings":["Western Australian Telecommunications Research Institute, Nedlands, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Western Australian Telecommunications Research Institute, Nedlands, WA, Australia","institution_ids":["https://openalex.org/I4210144648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5063896405","display_name":"Ian Holland","orcid":null},"institutions":[{"id":"https://openalex.org/I4210144648","display_name":"Perron Institute for Neurological and Translational Science","ror":"https://ror.org/04yn72m09","country_code":"AU","type":"facility","lineage":["https://openalex.org/I4210144648"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"I.D. Holland","raw_affiliation_strings":["Western Australian Telecommunications Research Institute, Nedlands, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Western Australian Telecommunications Research Institute, Nedlands, WA, Australia","institution_ids":["https://openalex.org/I4210144648"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009517745","display_name":"Chow Yii Pui","orcid":"https://orcid.org/0000-0002-5065-9765"},"institutions":[{"id":"https://openalex.org/I4210144648","display_name":"Perron Institute for Neurological and Translational Science","ror":"https://ror.org/04yn72m09","country_code":"AU","type":"facility","lineage":["https://openalex.org/I4210144648"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"C. Pui","raw_affiliation_strings":["Western Australian Telecommunications Research Institute, Nedlands, WA, Australia"],"affiliations":[{"raw_affiliation_string":"Western Australian Telecommunications Research Institute, Nedlands, WA, Australia","institution_ids":["https://openalex.org/I4210144648"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000235818","display_name":"Sylvie van der Werf","orcid":"https://orcid.org/0000-0002-1148-4456"},"institutions":[{"id":"https://openalex.org/I205640436","display_name":"Curtin University","ror":"https://ror.org/02n415q13","country_code":"AU","type":"education","lineage":["https://openalex.org/I205640436"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"S. Van Der Werf","raw_affiliation_strings":["School of Electrical and Computer Engineering, Curtin University of Technology, Perth, WA, Australia"],"affiliations":[{"raw_affiliation_string":"School of Electrical and Computer Engineering, Curtin University of Technology, Perth, WA, Australia","institution_ids":["https://openalex.org/I205640436"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5046666794"],"corresponding_institution_ids":["https://openalex.org/I4210144648"],"apc_list":null,"apc_paid":null,"fwci":0.5191,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.70691708,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"203","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11321","display_name":"Error Correcting Code Techniques","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10901","display_name":"Advanced Data Compression Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10741","display_name":"Video Coding and Compression Technologies","score":0.9947999715805054,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7385072112083435},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.6951921582221985},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5618109703063965},{"id":"https://openalex.org/keywords/payload","display_name":"Payload (computing)","score":0.5558235049247742},{"id":"https://openalex.org/keywords/error-detection-and-correction","display_name":"Error detection and correction","score":0.5248051881790161},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.5236449241638184},{"id":"https://openalex.org/keywords/rayleigh-fading","display_name":"Rayleigh fading","score":0.5178847312927246},{"id":"https://openalex.org/keywords/hamming-code","display_name":"Hamming code","score":0.5135712623596191},{"id":"https://openalex.org/keywords/jpeg","display_name":"JPEG","score":0.5064655542373657},{"id":"https://openalex.org/keywords/fading","display_name":"Fading","score":0.5008447170257568},{"id":"https://openalex.org/keywords/binary-golay-code","display_name":"Binary Golay code","score":0.4401005208492279},{"id":"https://openalex.org/keywords/bit-error-rate","display_name":"Bit error rate","score":0.41144639253616333},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3776753842830658},{"id":"https://openalex.org/keywords/data-compression","display_name":"Data compression","score":0.27777746319770813},{"id":"https://openalex.org/keywords/block-code","display_name":"Block code","score":0.2253744900226593},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.19585996866226196},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16402092576026917},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.12096607685089111}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7385072112083435},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.6951921582221985},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5618109703063965},{"id":"https://openalex.org/C134066672","wikidata":"https://www.wikidata.org/wiki/Q1424639","display_name":"Payload (computing)","level":3,"score":0.5558235049247742},{"id":"https://openalex.org/C103088060","wikidata":"https://www.wikidata.org/wiki/Q1062839","display_name":"Error detection and correction","level":2,"score":0.5248051881790161},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.5236449241638184},{"id":"https://openalex.org/C56985126","wikidata":"https://www.wikidata.org/wiki/Q854039","display_name":"Rayleigh fading","level":4,"score":0.5178847312927246},{"id":"https://openalex.org/C73150493","wikidata":"https://www.wikidata.org/wiki/Q853922","display_name":"Hamming code","level":4,"score":0.5135712623596191},{"id":"https://openalex.org/C198751489","wikidata":"https://www.wikidata.org/wiki/Q2195","display_name":"JPEG","level":3,"score":0.5064655542373657},{"id":"https://openalex.org/C81978471","wikidata":"https://www.wikidata.org/wiki/Q1196572","display_name":"Fading","level":3,"score":0.5008447170257568},{"id":"https://openalex.org/C165293857","wikidata":"https://www.wikidata.org/wiki/Q1534522","display_name":"Binary Golay code","level":2,"score":0.4401005208492279},{"id":"https://openalex.org/C56296756","wikidata":"https://www.wikidata.org/wiki/Q840922","display_name":"Bit error rate","level":3,"score":0.41144639253616333},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3776753842830658},{"id":"https://openalex.org/C78548338","wikidata":"https://www.wikidata.org/wiki/Q2493","display_name":"Data compression","level":2,"score":0.27777746319770813},{"id":"https://openalex.org/C157125643","wikidata":"https://www.wikidata.org/wiki/Q884707","display_name":"Block code","level":3,"score":0.2253744900226593},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.19585996866226196},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16402092576026917},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.12096607685089111}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iswcs.2004.1407238","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iswcs.2004.1407238","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"1st International Symposium onWireless Communication Systems, 2004.","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.8100000023841858,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1492380776","https://openalex.org/W1582460764","https://openalex.org/W1967820532","https://openalex.org/W2045407304","https://openalex.org/W2059156253","https://openalex.org/W2113131108","https://openalex.org/W2121330233","https://openalex.org/W2156452863","https://openalex.org/W2176476591","https://openalex.org/W2284515730","https://openalex.org/W2917583897","https://openalex.org/W6664895086"],"related_works":["https://openalex.org/W2077262851","https://openalex.org/W4238936689","https://openalex.org/W2975015174","https://openalex.org/W2810993169","https://openalex.org/W2893901612","https://openalex.org/W4244929333","https://openalex.org/W2057936276","https://openalex.org/W2042033443","https://openalex.org/W1967378985","https://openalex.org/W205132508"],"abstract_inverted_index":{"In":[0,41],"this":[1,61],"paper,":[2],"an":[3,110],"unequal":[4],"error":[5,13,39,64,81,154],"protection":[6,65,82,155],"(UEP)":[7],"scheme":[8,144],"is":[9],"investigated":[10],"for":[11,69,105,122],"highly":[12],"sensitive":[14],"joint":[15],"photographic":[16],"experts":[17],"group":[18],"(JPEG)":[19],"images":[20],"transmitted":[21,52],"over":[22],"uncorrelated":[23],"flat":[24],"Rayleigh":[25],"fading":[26],"channels.":[27],"The":[28],"powerful":[29,101],"source":[30],"compression":[31],"involved":[32],"with":[33],"JPEG":[34],"often":[35],"leads":[36],"to":[37,55,86,150],"increased":[38],"susceptibility.":[40],"particular,":[42],"corruption":[43],"of":[44,160,163],"the":[45,56,94,106,123,141,151,161],"file":[46,53],"headers":[47,75],"may":[48,66,83,90],"result":[49],"in":[50,158],"a":[51,100,134],"unreadable":[54],"target":[57],"application.":[58],"To":[59],"alleviate":[60],"problem,":[62],"additional":[63],"be":[67,84,91],"provided":[68],"critical":[70,107],"data":[71],"segments,":[72],"such":[73],"as":[74],"and":[76,109,118],"control":[77],"markers,":[78],"whilst":[79],"less":[80,124],"allocated":[85],"payload":[87,126],"data.":[88],"This":[89],"accomplished":[92],"by":[93],"proposed":[95,142],"UEP":[96,143],"scheme,":[97,157],"which":[98],"uses":[99],"extended":[102,111],"Golay":[103],"code":[104],"bits,":[108],"Hamming":[112],"code,":[113],"having":[114],"reduced":[115],"decoding":[116,138],"complexity":[117],"storage":[119],"space":[120],"requirements,":[121],"important":[125],"bits.":[127],"Simulation":[128],"results":[129],"obtained":[130],"using":[131],"symbol-by-symbol":[132],"maximum":[133],"posteriori":[135],"probability":[136],"(MAP)":[137],"demonstrate":[139],"that":[140],"displays":[145],"significant":[146],"performance":[147],"improvement":[148],"compared":[149],"traditional":[152],"equal":[153],"(EEP)":[156],"terms":[159],"percentage":[162],"readable":[164],"files.":[165]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
