期刊文献+
共找到205篇文章
< 1 2 11 >
每页显示 20 50 100
Intelligent recognition and information extraction of radar complex jamming based on time-frequency features
1
作者 PENG Ruihui WU Xingrui +3 位作者 WANG Guohong SUN Dianxing YANG Zhong LI Hongwen 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1148-1166,共19页
In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise p... In modern war,radar countermeasure is becoming increasingly fierce,and the enemy jamming time and pattern are changing more randomly.It is challenging for the radar to efficiently identify jamming and obtain precise parameter information,particularly in low signal-to-noise ratio(SNR)situations.In this paper,an approach to intelligent recognition and complex jamming parameter estimate based on joint time-frequency distribution features is proposed to address this challenging issue.Firstly,a joint algorithm based on YOLOv5 convolutional neural networks(CNNs)is proposed,which is used to achieve the jamming signal classification and preliminary parameter estimation.Furthermore,an accurate jamming key parameters estimation algorithm is constructed by comprehensively utilizing chi-square statistical test,feature region search,position regression,spectrum interpolation,etc.,which realizes the accurate estimation of jamming carrier frequency,relative delay,Doppler frequency shift,and other parameters.Finally,the approach has improved performance for complex jamming recognition and parameter estimation under low SNR,and the recognition rate can reach 98%under−15 dB SNR,according to simulation and real data verification results. 展开更多
关键词 complex jamming recognition time frequency feature convolutional neural network(CNN) parameter estimation
下载PDF
Adversarial attacks and defenses for digital communication signals identification
2
作者 Qiao Tian Sicheng Zhang +1 位作者 Shiwen Mao Yun Lin 《Digital Communications and Networks》 SCIE CSCD 2024年第3期756-764,共9页
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become ... As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management systems.AI has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and industry.However,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial attacks.Adversarial examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong results.Therefore,the security of AI models for the digital communication signals identification is the premise of its efficient and credible applications.In this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial principle.Next we present more detailed adversarial indicators to evaluate attack and defense behavior.Finally,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research. 展开更多
关键词 Digital communication signals identification AI model Adversarial attacks Adversarial defenses Adversarial indicators
下载PDF
Design and Implementation of Network Communication Interface Based on μCLinux
3
作者 LV Jie WANG Jin-hai ZHENG Yu 《Semiconductor Photonics and Technology》 CAS 2008年第4期279-283,共5页
In order to meet the requirements of real-time and high efficient data transmission in data acquisition and industrial control fields,a scheme of network communication interface is presented. The design of hardware ci... In order to meet the requirements of real-time and high efficient data transmission in data acquisition and industrial control fields,a scheme of network communication interface is presented. The design of hardware circuit and the realization of software program are mainly introduced. The result of the experiment shows that this embedded system has high reliability and stability. It can realize high-speed data transmission,and also can satisfy the requirements of network communication in the industrial control fields. 展开更多
关键词 ΜCLINUX LPC2292 DM9000 SOCKET
下载PDF
New Individual Identification Method of Radiation Source Signal Based on Entropy Feature and SVM 被引量:5
4
作者 Yun Lin Xiao-Chun Xu Zi-Cheng Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第1期98-101,共4页
In this paper,according to the defect of methods which have low identification rate in low SNR,a new individual identification method of radiation source based on information entropy feature and SVM is presented. Firs... In this paper,according to the defect of methods which have low identification rate in low SNR,a new individual identification method of radiation source based on information entropy feature and SVM is presented. Firstly,based on the theory of multi-resolution wavelet analysis,the wavelet power spectrum of noncooperative signal can be gotten. Secondly,according to the information entropy theory,the wavelet power spectrum entropy is defined in this paper. Therefore,the database of signal's wavelet power spectrum entropy can be built in different SNR and signal parameters. Finally,the sorting and identification model based on SVM is built for the individual identification of radiation source signal. The simulation result indicates that this method has a high individual's identification rate in low SNR,when the SNR is greater than 4 dB,the identification rate can reach 100%. Under unstable SNR conditions,when the range of SNR is between 0 dB and 24 dB,the average identification rate is more than 92. 67%. Therefore,this method has a great application value in the complex electromagnetic environment. 展开更多
关键词 RADIATION source INDIVIDUAL identification WAVELET power spectrum information ENTROPY support VECTOR machine
下载PDF
Joint Trajectory and Passive Beamforming Optimization in IRS-UAV Enhanced Anti-Jamming Communication Networks 被引量:7
5
作者 Zhifeng Hou Jin Chen +5 位作者 Yuzhen Huang Yijie Luo Ximing Wang Jiangchun Gu Yifan Xu Kailing Yao 《China Communications》 SCIE CSCD 2022年第5期191-205,共15页
This paper investigates the anti-jamming communication scenario where an intelligent reflecting surface(IRS)is mounted on the unmanned aerial vehicle(UAV)to resist the malicious jamming attacks.Different from existing... This paper investigates the anti-jamming communication scenario where an intelligent reflecting surface(IRS)is mounted on the unmanned aerial vehicle(UAV)to resist the malicious jamming attacks.Different from existing works,we consider the dynamic deployment of IRS-UAV in the environment of the mobile user and unknown jammer.Therefore,a joint trajectory and passive beamforming optimization approach is proposed in the IRS-UAV enhanced networks.In detail,the optimization problem is firstly formulated into a Markov decision process(MDP).Then,a dueling double deep Q networks multi-step learning algorithm is proposed to tackle the complex and coupling decision-making problem.Finally,simulation results show that the proposed scheme can significantly improve the anti-jamming communication performance of the mobile user. 展开更多
关键词 intelligent reflecting surface unmanned aerial vehicle deep reinforcement learning trajectory optimization
下载PDF
Modulation recognition of communication signals based on SCHKS-SSVM 被引量:5
6
作者 Xiaolin Zhang Jian Chen Zhiguo Sun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2017年第4期627-633,共7页
A novel modulation recognition algorithm is proposed by introducing a Chen-Harker-Kanzow-Smale (CHKS) smooth function into the C-support vector machine deformation algorithm. A set of seven characteristic parameters i... A novel modulation recognition algorithm is proposed by introducing a Chen-Harker-Kanzow-Smale (CHKS) smooth function into the C-support vector machine deformation algorithm. A set of seven characteristic parameters is selected from a range of parameters of communication signals including instantaneous amplitude, phase, and frequency. And the Newton-Armijo algorithm is utilized to train the proposed algorithm, namely, smooth CHKS smooth support vector machine (SCHKS-SSVM). Compared with the existing algorithms, the proposed algorithm not only solves the non-differentiable problem of the second order objective function, but also reduces the recognition error. It significantly improves the training speed and also saves a large amount of storage space through large-scale sorting problems. The simulation results show that the recognition rate of the algorithm can batch training. Therefore, the proposed algorithm is suitable for solving the problem of high dimension and its recognition can exceed 95% when the signal-to-noise ratio is no less than 10 dB. 展开更多
关键词 communication signal modulation recognition support vector machine smooth function
下载PDF
High Frequency Communication Network with Diversity: System Structure and Key Enabling Techniques 被引量:4
7
作者 Kun Xu Bin Jiang +4 位作者 Zeyou Su Shengqing Wang Makun Guo Xiao Li Zhiyong Du 《China Communications》 SCIE CSCD 2018年第9期46-59,共14页
High frequency sky wave communication suffers from poor performance including poor link quality and low link success rate. To enhance performance, diversity technology is proposed in the high frequency communication n... High frequency sky wave communication suffers from poor performance including poor link quality and low link success rate. To enhance performance, diversity technology is proposed in the high frequency communication network(HFCN) in this paper.First, we present the benefits and the challenges by introducing diversity technology into the existing HFCN. Secondly, to exploit the benefits fully and overcome the challenges, we propose a system structure suitable for deploying diversity technology in HFCN in large scale,based on the cloud radio access network and software defined network. Moreover, we present a general structure for the real-time updating frequency management system that plays a more important role especially when resource consuming(e.g., frequency) diversity technology is deployed. Thirdly, we investigate the key techniques enabling diversity technology deployment. Finally, we point out the future research directions to help the HFCN with diversity work more efficiently and intelligently. 展开更多
关键词 high frequency high frequency communication network diversity technology access layer and core layer frequency management system
下载PDF
Direction finding of coexisted independent and coherent signals using electromagnetic vector sensor 被引量:3
8
作者 Ming Diao Chunlian An 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第4期481-487,共7页
The existing direction of arrival (DOA) estimation algorithms based on the electromagnetic vector sensors array barely deal with the coexisting of independent and coherent signals. A two-dimensional direction findin... The existing direction of arrival (DOA) estimation algorithms based on the electromagnetic vector sensors array barely deal with the coexisting of independent and coherent signals. A two-dimensional direction finding method using an L-shape electromagnetic vector sensors array is proposed. According to this method, the DOAs of the independent signals and the coherent signals are estimated separately, so that the array aperture can be exploited sufficiently. Firstly, the DOAs of the independent signals are estimated by the estimation of signal parameters via rotational invariance techniques, and the influence of the co- herent signals can be eliminated by utilizing the property of the coherent signals. Then the data covariance matrix containing the information of the coherent signals only is obtained by exploiting the Toeplitz property of the independent signals, and an improved polarimetric angular smoothing technique is proposed to de-correlate the coherent signals. This new method is more practical in actual signal environment than common DOA estimation algorithms and can expand the array aperture. Simulation results are presented to show the estimating performance of the proposed method. 展开更多
关键词 direction finding electromagnetic vector sensor polarimetric angular smoothing estimation of signal parameters viarotational invariance technique Toeplitz property.
下载PDF
Design of task priority model and algorithm for imaging observation problem 被引量:2
9
作者 WU Jian LU Fang +2 位作者 ZHANG Jiawei YANG Jinghui XING Lining 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2020年第2期321-334,共14页
In the imaging observation system, imaging task scheduling is an important topic. Most scholars study the imaging task scheduling from the perspective of static priority, and only a few from the perspective of dynamic... In the imaging observation system, imaging task scheduling is an important topic. Most scholars study the imaging task scheduling from the perspective of static priority, and only a few from the perspective of dynamic priority. However,the priority of the imaging task is dynamic in actual engineering. To supplement the research on imaging observation, this paper proposes the task priority model, dynamic scheduling strategy and Heuristic algorithm. At first, this paper analyzes the relevant theoretical basis of imaging observation, decomposes the task priority into four parts, including target priority, imaging task priority, track, telemetry & control(TT&C)requirement priority and data transmission requirement priority, summarizes the attribute factors that affect the above four types of priority in detail, and designs the corresponding priority model. Then, this paper takes the emergency tasks scheduling problem as the background, proposes the dynamic scheduling strategy and heuristic algorithm. Finally, the task priority model,dynamic scheduling strategy and heuristic algorithm are verified by experiments. 展开更多
关键词 IMAGING OBSERVATION system IMAGING TASK PRIORITY TASK PRIORITY model dynamic SCHEDULING strategy HEURISTIC algorithm
下载PDF
Design and multistability analysis of five-value memristor-based chaotic system with hidden attractors 被引量:1
10
作者 Li-Lian Huang Shuai Liu +1 位作者 Jian-Hong Xiang Lin-Yu Wang 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第10期207-218,共12页
A five-value memristor model is proposed,it is proved that the model has a typical hysteresis loop by analyzing the relationship between voltage and current.Then,based on the classical Liu-Chen system,a new memristor-... A five-value memristor model is proposed,it is proved that the model has a typical hysteresis loop by analyzing the relationship between voltage and current.Then,based on the classical Liu-Chen system,a new memristor-based fourdimensional(4D)chaotic system is designed by using the five-value memristor.The trajectory phase diagram,Poincare mapping,bifurcation diagram,and Lyapunov exponent spectrum are drawn by numerical simulation.It is found that,in addition to the general chaos characteristics,the system has some special phenomena,such as hidden homogenous multistabilities,hidden heterogeneous multistabilities,and hidden super-multistabilities.Finally,according to the dimensionless equation of the system,the circuit model of the system is built and simulated.The results are consistent with the numerical simulation results,which proves the physical realizability of the five-value memristor-based chaotic system proposed in this paper. 展开更多
关键词 five-valued memristor chaotic system hidden attractor MULTISTABILITY
下载PDF
New Three-Dimensional Assessment Model and Optimization of Acoustic Positioning System 被引量:1
11
作者 Lin Zhao Xiaobo Chen +3 位作者 Jianhua Cheng Lianhua Yu Chengcai Lv Jiuru Wang 《Computers, Materials & Continua》 SCIE EI 2020年第8期1005-1023,共19页
This paper addresses the problem of assessing and optimizing the acoustic positioning system for underwater target localization with range measurement.We present a new three-dimensional assessment model to evaluate th... This paper addresses the problem of assessing and optimizing the acoustic positioning system for underwater target localization with range measurement.We present a new three-dimensional assessment model to evaluate the optimal geometric beacon formation whether meets user requirements.For mathematical tractability,it is assumed that the measurements of the range between the target and beacons are corrupted with white Gaussian noise with variance,which is distance-dependent.Then,the relationship between DOP parameters and positioning accuracy can be derived by adopting dilution of precision(DOP)parameters in the assessment model.In addition,the optimal geometric beacon formation yielding the best performance can be achieved via minimizing the values of geometric dilution of precision(GDOP)in the case where the target position is known and fixed.Next,in order to ensure that the estimated positioning accuracy on the region of interest satisfies the precision required by the user,geometric positioning accuracy(GPA),horizontal positioning accuracy(HPA)and vertical positioning accuracy(VPA)are utilized to assess the optimal geometric beacon formation.Simulation examples are designed to illustrate the exactness of the conclusion.Unlike other work that only uses GDOP to optimize the formation and cannot assess the performance of the specified size,this new three-dimensional assessment model can evaluate the optimal geometric beacon formation for each dimension of any point in three-dimensional space,which can provide guidance to optimize the performance of each specified dimension. 展开更多
关键词 Acoustic positioning system three-dimensional assessment model positioning accuracy DOP optimal configuration
下载PDF
Design and Implementation of Fingerprint Identification System Based on KNN Neural Network 被引量:1
12
作者 Israa Ghazi Dakhil Ali Abdulhafidh Ibrahim 《Journal of Computer and Communications》 2018年第3期1-18,共18页
Fingerprint identification and recognition are considered popular technique in many security and law enforcement applications. The aim of this paper is to present a proposed authentication system based on fingerprint ... Fingerprint identification and recognition are considered popular technique in many security and law enforcement applications. The aim of this paper is to present a proposed authentication system based on fingerprint as biometric type, which is capable of recognizing persons with high level of confidence and minimum error rate. The designed system is implemented using Matlab 2015b and tested on a set of fingerprint images gathered from 90 different persons with 8 samples for each using Futronic’s FS80 USB2.0 Fingerprint Scanner and the ftrScanApiEx.exe program. An efficient image enhancement algorithm is used to improve the clarity (contrast) of the ridge structures in a fingerprint. After that core point and candidate core points are extracted for each Fingerprint image and feature vector have been extracted for each point using filterbank_based algorithm. Also, for the matching the KNN neural network was used. In addition, the matching results were calculated and compared to other papers using some performance evaluation factors. A threshold has been proposed and used to provide the rejection for the fingerprint images that does not belong to the database and the experimental results show that the KNN technique have a recognition rate equal to 93.9683% in a threshold equal to 70%. 展开更多
关键词 FINGERPRINT CORE Point and CANDIDATE CORE POINTS Filterbank_Based Algorithm Weightless Neural Network KNN
下载PDF
Study on the Characteristics of LFM Signals, BC Signals and Their Mixed Modulation Signals 被引量:1
13
作者 Zheng Dou Weidong Song Wenxu Zhang 《International Journal of Communications, Network and System Sciences》 2017年第8期196-205,共10页
This paper proposes a linear frequency modulation (LFM signal) and biphase coding (BC signal) mixed modulation signal called LFM-BC signal. LFM-BC signal has both LFM signal and BC signal two kinds of traditional sign... This paper proposes a linear frequency modulation (LFM signal) and biphase coding (BC signal) mixed modulation signal called LFM-BC signal. LFM-BC signal has both LFM signal and BC signal two kinds of traditional signal advantages but makes up for their shortcomings. In this paper, LFM-BC signal, LFM and BC signals are studied and compared from the time characteristic and frequency characteristic of the signal, fuzzy function, pulse compression and Doppler characteristics and low probability of interception (LPI) characteristics. 展开更多
关键词 LFM SIGNAL BC SIGNAL LFM-BC SIGNAL Pulse Compression LPI DOPPLER Char-acteristics
下载PDF
Novel joint encoding/decoding algorithms of fountain codes for underwater acoustic communication 被引量:1
14
作者 Mingshen Liang Jinjue Duan +2 位作者 Danfeng Zhao Jiaxi Si Xiangyu Song 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期772-779,共8页
Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh ma... Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh marine environment. And Luby transform(LT) codes are the first codes fully realizing the digital fountain concept. However, in conventional LT encoding/decoding algorithms, due to the imperfect coverage(IC) of input symbols and short cycles in the generator matrix, stopping sets would occur and terminate the decoding. Thus, the recovery probability is reduced,high coding overhead is required and decoding delay is increased.These issues would be disadvantages while applying LT codes in underwater acoustic communication. Aimed at solving those issues, novel encoding/decoding algorithms are proposed. First,a doping and non-uniform selecting(DNS) encoding algorithm is proposed to solve the IC and the generation of short cycles problems. And this can reduce the probability of stopping sets occur during decoding. Second, a hybrid on the fly Gaussian elimination and belief propagation(OFG-BP) decoding algorithm is designed to reduce the decoding delay and efficiently utilize the information of stopping sets. Comparisons via Monte Carlo simulation confirm that the proposed schemes could achieve better overall decoding performances in comparison with conventional schemes. 展开更多
关键词 underwater acoustic communication(UAC) fountain codes non-uniform encoding hybrid decoding algorithm stopping sets
下载PDF
Time-Frequency Bandwidth Product Estimation of Sinusoidal Non-Linear Chirp Keying Scheme 被引量:1
15
作者 Zhiguo Sun Xiaoyan Ning Danyang Tian 《China Communications》 SCIE CSCD 2017年第8期184-194,共11页
Sine Non-linear Chirp Keying(SNCK) is a kind of high-efficient modulation scheme, which provides a potential new beamforming method in communication and radar systems. It has been proved to have advantages in some par... Sine Non-linear Chirp Keying(SNCK) is a kind of high-efficient modulation scheme, which provides a potential new beamforming method in communication and radar systems. It has been proved to have advantages in some parameter estimation issues over conventional modulation schemes. In this paper, a novel transform termed as Discrete Sinusoidal Frequency Modulation transform(DSFMT) is proposed. Then, the DSFMT of SNCK signal is deduced and classified into three types, based on which, the time-bandwidth product is estimated by the proposed algorithm. Simulation results show that the noise has a signifi cant impact on the localization of the peak value and the time-bandwidth product can be estimated by using local ratio values when. 展开更多
关键词 parameter estimation time-bandwidth product sine non-linear chirp keying(SNCK) discrete sinusoidal frequency modulation transform(DSFMT)
下载PDF
Fault Detection and Recovery for Full Range of Hydrogen Sensor Based on Relevance Vector Machine
16
作者 Kai Song Bing Wang +2 位作者 Ming Diao Hongquan Zhang Zhenyu Zhang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2015年第6期37-44,共8页
In order to improve the reliability of hydrogen sensor,a novel strategy for full range of hydrogen sensor fault detection and recovery is proposed in this paper. Three kinds of sensors are integrated to realize the me... In order to improve the reliability of hydrogen sensor,a novel strategy for full range of hydrogen sensor fault detection and recovery is proposed in this paper. Three kinds of sensors are integrated to realize the measurement for full range of hydrogen concentration based on relevance vector machine( RVM). Failure detection of hydrogen sensor is carried out by using the variance detection method. When a sensor fault is detected,the other fault-free sensors can recover the fault data in real-time by using RVM predictor accounting for the relevance of sensor data. Analysis,together with both simulated and experimental results,a full-range hydrogen detection and hydrogen sensor self-validating experiment is presented to demonstrate that the proposed strategy is superior at accuracy and runtime compared with the conventional methods. Results show that the proposed methodology provides a better solution to the full range of hydrogen detection and the reliability improvement of hydrogen sensor. 展开更多
关键词 hydrogen CONCENTRATION measurement full range FAULT detection FAULT RECOVERY RELEVANCE VECTOR machine
下载PDF
Dynamic Investigations on the Wear Behavior of a 3D Revolute Joint Considering Time-Varying Contact Stiffness: Simulation and Experiment
17
作者 Li Zhang Yining Fang +1 位作者 Guanghan Bai Junyong Tao 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2023年第6期230-246,共17页
The existence of the relative radial and axial movements of a revolute joint’s journal and bearing is widely known.The three-dimensional(3D)revolute joint model considers relative radial and axial clearances;therefor... The existence of the relative radial and axial movements of a revolute joint’s journal and bearing is widely known.The three-dimensional(3D)revolute joint model considers relative radial and axial clearances;therefore,the freedoms of motion and contact scenarios are more realistic than those of the two-dimensional model.This paper proposes a wear model that integrates the modeling of a 3D revolute clearance joint and the contact force and wear depth calculations.Time-varying contact stiffness is first considered in the contact force model.Also,a cycle-update wear depth calculation strategy is presented.A digital image correlation(DIC)non-contact measurement and a cylindricity test are conducted.The measurement results are compared with the numerical simulation,and the proposed model’s correctness and the wear depth calculation strategy are verified.The results show that the wear amount distribution on the bearing’s inner surface is uneven in the axial and radial directions due to the journal’s stochastic oscillations.The maximum wear depth locates where at the bearing’s edges the motion direction of the follower shifts.These find-ings help to seek the revolute joints’wear-prone parts and enhance their durability and reliability through improved design. 展开更多
关键词 Multibody dynamics 3D revolute joint Wear prediction Digital image correlation
下载PDF
Prediction and Analysis of Society’s Networks
18
作者 Xin Wang Xinshe Qi +1 位作者 Na Wang Na Qu 《Journal of Applied Mathematics and Physics》 2018年第1期290-295,共6页
According to the information theory model, I use the qualitative analysis to explain the information flows through the media channel become news. Besides, I make use of a pyramid model to expound the relationship amon... According to the information theory model, I use the qualitative analysis to explain the information flows through the media channel become news. Besides, I make use of a pyramid model to expound the relationship among each media. I combine the information theory model into the prediction process, taking advantage of curve fitting and listing out different ratios of media capacities. Finally I get the small relative error between the fitting result and the reality. Based on the ELM model, I classify the information in two ways on the basis of the four specific factors. By taking the influence degree of public opinion into account, I quantify the factors with different ratios to determine how they could be used in information spreading. 展开更多
关键词 EDGE ROUTE TOPOLOGY Society’s NETWORK
下载PDF
A Demand Analysis and Teaching Design of English for Specific Military Purposes for Non-commissioned Officers
19
作者 HAO Wen-hui SONG Mei 《Journal of Literature and Art Studies》 2020年第10期923-928,共6页
Based on the theory of“demand analysis”,this paper investigates and analyzes the motivation,and demand of non-commissioned officers for ESMP(English for Specific Military Purposes)by means of questionnaire and inter... Based on the theory of“demand analysis”,this paper investigates and analyzes the motivation,and demand of non-commissioned officers for ESMP(English for Specific Military Purposes)by means of questionnaire and interview,in an attempt to construct the framework of ESMP teaching design for non-commissioned officers.The study points out that the design of ESMP for non-commissioned officers should be oriented by“demand analysis”theory,explore the effective integration of professional knowledge and language acquisition,and promote the cultivation of non-commissioned officers’practical ability of professional English application. 展开更多
关键词 non-commissioned officer ESMP demand analysis teaching design
下载PDF
Simulation Analysis of Multiple BP Decoding Algorithm and FFT-BP Decoding Algorithm
20
作者 Xin Wei Zhigang Li Zheng Dou 《International Journal of Communications, Network and System Sciences》 2017年第8期255-262,共8页
In order to solve the problem that the original decoding algorithm of multi-band LDPC codes is high and is not conducive to hardware implementation, two simplified decoding algorithms for multi-band LDPC codes are stu... In order to solve the problem that the original decoding algorithm of multi-band LDPC codes is high and is not conducive to hardware implementation, two simplified decoding algorithms for multi-band LDPC codes are studied: the reliability propagation based on fast Fourier transform Code algorithm (FFT-BP) and log-BP decoding algorithm based on logarithmic operations. The simulation results show that the FFT-BP decoding algorithm is more convenient and efficient. 展开更多
关键词 LDPC FFT-BP BP
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部