In this paper, a modified FPGA scheme for the convolutional encoder and Viterbi decoder based on the IEEE 802.11a standards of WLAN is presented in OFDM baseband processing systems. The proposed design supports a gene...In this paper, a modified FPGA scheme for the convolutional encoder and Viterbi decoder based on the IEEE 802.11a standards of WLAN is presented in OFDM baseband processing systems. The proposed design supports a generic, robust and configurable Viterbi decoder with constraint length of 7, code rate of 1/2 and decoding depth of 36 symbols. The Viterbi decoder uses full-parallel structure to improve computational speed for the add-compare-select (ACS) modules, adopts optimal data storage mechanism to avoid overflow and employs three distributed RAM blocks to complete cyclic trace-back. It includes the core parts, for example, the state path measure computation, the preservation and transfer of the survivor path and trace-back decoding, etc. Compared to the general Viterbi decoder, this design can effectively decrease the 10% of chip logic elements, reduce 5% of power consumption, and increase the encoder and decoder working performance in the hardware implementation. Lastly, relevant simulation results using Verilog HDL language are verified based on a Xinlinx Virtex-II FPGA by ISE 7.1i. It is shown that the Viterbi decoder is capable of decoding (2, 1, 7) convolutional codes accurately with a throughput of 80 Mbps.展开更多
The encoding/decoding scheme based on Fiber Bragg Grating (FBG) for Optical Code Division Multiple Access (OCDMA) system is analyzed and the whole process from transmitting end to receiving end is researched in detail...The encoding/decoding scheme based on Fiber Bragg Grating (FBG) for Optical Code Division Multiple Access (OCDMA) system is analyzed and the whole process from transmitting end to receiving end is researched in detail. The mathematical mode including signal transmission, summing, receiving and recovering are established respectively. One of the main sources of Bit Error Rate (BER) of OCDMA system based on FBGs is the unevenness of signal power spectrum, which leads to the chip powers unequal with each other. The Signal to Interfere Ratio (SIR) and BER performance of the system are studied and simulated at the case with uneven distribution of chips' powers.展开更多
Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding ...Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding and decoding semantic communication framework,which adopts the semantic information and the contextual correlations between items to optimize the performance of a communication system over various channels.On the sender side,the average semantic loss caused by the wrong detection is defined,and a semantic source encoding strategy is developed to minimize the average semantic loss.To further improve communication reliability,a decoding strategy that utilizes the semantic and the context information to recover messages is proposed in the receiver.Extensive simulation results validate the superior performance of our strategies over state-of-the-art semantic coding and decoding policies on different communication channels.展开更多
The translation activity is a process of the interlinguistic transmission of information realized by the information encoding and decoding.Encoding and decoding,cognitive practices operated in objective contexts,are i...The translation activity is a process of the interlinguistic transmission of information realized by the information encoding and decoding.Encoding and decoding,cognitive practices operated in objective contexts,are inevitably of selectivity ascribing to the restriction of contextual reasons.The translator as the intermediary agent connects the original author(encoder)and the target readers(decoder),shouldering the dual duties of the decoder and the encoder,for which his subjectivity is irrevocably manipulated by the selectivity of encoding and decoding.展开更多
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog...There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.展开更多
In order to make the information transmission more efficient and reliable in a digital communication channel with limited capacity, various encoding-decoding techniques have been proposed and widely applied in many br...In order to make the information transmission more efficient and reliable in a digital communication channel with limited capacity, various encoding-decoding techniques have been proposed and widely applied in many branches of the signal processing including digital communications, data compression,information encryption, etc. Recently, due to its promising application potentials in the networked systems(NSs), the analysis and synthesis issues of the NSs under various encoding-decoding schemes have stirred some research attention. However, because of the network-enhanced complexity caused by the limited network resources, it poses new challenges to the design of suitable encoding-decoding procedures to meet certain control or filtering performance for the NSs. In this survey paper, our aim is to present a comprehensive review of the encoding-decodingbased control and filtering problems for different types of NSs.First, some basic introduction with respect to the coding-decoding mechanism is presented in terms of its engineering insights,specific properties and theoretical formulations. Then, the recent representative research progress in the design of the encodingdecoding protocols for various control and filtering problems is discussed. Some possible further research topics are finally outlined for the encoding-decoding-based NSs.展开更多
Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its ...Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its existence and development are also of great significance to the diversified development of world culture.Based on Stuart Hall’s encoding/decoding theory,this paper analyzes the problems in the spreading of Chinese tea in and out of the country and provides solutions from the perspective of encoding,communication,and decoding.It is expected to provide a reference for the domestic and international dissemination of Chinese tea culture.展开更多
The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can he...The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can help to evoke cultural memories and cultural identification of the Canal and build cultural confidence.This paper applies Stuart Hall’s encoding/decoding theory to analyze the dissemination of intangible heritage tourism culture.On the basis of a practical study of the villages along the Beijing-Hangzhou Grand Canal,this paper analyses the problems in the transmission of its intangible cultural heritage and proposes specific methods to solve them in four processes,encoding,decoding,communication,and secondary encoding,in order to propose references for the transmission of intangible heritage culture at home and abroad.展开更多
文摘In this paper, a modified FPGA scheme for the convolutional encoder and Viterbi decoder based on the IEEE 802.11a standards of WLAN is presented in OFDM baseband processing systems. The proposed design supports a generic, robust and configurable Viterbi decoder with constraint length of 7, code rate of 1/2 and decoding depth of 36 symbols. The Viterbi decoder uses full-parallel structure to improve computational speed for the add-compare-select (ACS) modules, adopts optimal data storage mechanism to avoid overflow and employs three distributed RAM blocks to complete cyclic trace-back. It includes the core parts, for example, the state path measure computation, the preservation and transfer of the survivor path and trace-back decoding, etc. Compared to the general Viterbi decoder, this design can effectively decrease the 10% of chip logic elements, reduce 5% of power consumption, and increase the encoder and decoder working performance in the hardware implementation. Lastly, relevant simulation results using Verilog HDL language are verified based on a Xinlinx Virtex-II FPGA by ISE 7.1i. It is shown that the Viterbi decoder is capable of decoding (2, 1, 7) convolutional codes accurately with a throughput of 80 Mbps.
基金Supported by the Natural Science Research Foundation of Jiangsu Higher-Learning Insti-tution (No.04jkb510057).
文摘The encoding/decoding scheme based on Fiber Bragg Grating (FBG) for Optical Code Division Multiple Access (OCDMA) system is analyzed and the whole process from transmitting end to receiving end is researched in detail. The mathematical mode including signal transmission, summing, receiving and recovering are established respectively. One of the main sources of Bit Error Rate (BER) of OCDMA system based on FBGs is the unevenness of signal power spectrum, which leads to the chip powers unequal with each other. The Signal to Interfere Ratio (SIR) and BER performance of the system are studied and simulated at the case with uneven distribution of chips' powers.
基金supported in part by the National Natural Science Foundation of China under Grant No.61931020,U19B2024,62171449,62001483in part by the science and technology innovation Program of Hunan Province under Grant No.2021JJ40690。
文摘Increasing research has focused on semantic communication,the goal of which is to convey accurately the meaning instead of transmitting symbols from the sender to the receiver.In this paper,we design a novel encoding and decoding semantic communication framework,which adopts the semantic information and the contextual correlations between items to optimize the performance of a communication system over various channels.On the sender side,the average semantic loss caused by the wrong detection is defined,and a semantic source encoding strategy is developed to minimize the average semantic loss.To further improve communication reliability,a decoding strategy that utilizes the semantic and the context information to recover messages is proposed in the receiver.Extensive simulation results validate the superior performance of our strategies over state-of-the-art semantic coding and decoding policies on different communication channels.
文摘The translation activity is a process of the interlinguistic transmission of information realized by the information encoding and decoding.Encoding and decoding,cognitive practices operated in objective contexts,are inevitably of selectivity ascribing to the restriction of contextual reasons.The translator as the intermediary agent connects the original author(encoder)and the target readers(decoder),shouldering the dual duties of the decoder and the encoder,for which his subjectivity is irrevocably manipulated by the selectivity of encoding and decoding.
基金This research was supported by the Researchers supporting program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
文摘There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.
基金supported in part by the Royal Society of the UK,the Nationa Natural Science,Foundation of China(61329301,61374039)the Program for Capability Construction of Shanghai Provincial Universities(15550502500)the Alexander von Humboldt Foundation of Germany
文摘In order to make the information transmission more efficient and reliable in a digital communication channel with limited capacity, various encoding-decoding techniques have been proposed and widely applied in many branches of the signal processing including digital communications, data compression,information encryption, etc. Recently, due to its promising application potentials in the networked systems(NSs), the analysis and synthesis issues of the NSs under various encoding-decoding schemes have stirred some research attention. However, because of the network-enhanced complexity caused by the limited network resources, it poses new challenges to the design of suitable encoding-decoding procedures to meet certain control or filtering performance for the NSs. In this survey paper, our aim is to present a comprehensive review of the encoding-decodingbased control and filtering problems for different types of NSs.First, some basic introduction with respect to the coding-decoding mechanism is presented in terms of its engineering insights,specific properties and theoretical formulations. Then, the recent representative research progress in the design of the encodingdecoding protocols for various control and filtering problems is discussed. Some possible further research topics are finally outlined for the encoding-decoding-based NSs.
文摘Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its existence and development are also of great significance to the diversified development of world culture.Based on Stuart Hall’s encoding/decoding theory,this paper analyzes the problems in the spreading of Chinese tea in and out of the country and provides solutions from the perspective of encoding,communication,and decoding.It is expected to provide a reference for the domestic and international dissemination of Chinese tea culture.
基金supported by the National Social Science Fund Project (No.20BH151).
文摘The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can help to evoke cultural memories and cultural identification of the Canal and build cultural confidence.This paper applies Stuart Hall’s encoding/decoding theory to analyze the dissemination of intangible heritage tourism culture.On the basis of a practical study of the villages along the Beijing-Hangzhou Grand Canal,this paper analyses the problems in the transmission of its intangible cultural heritage and proposes specific methods to solve them in four processes,encoding,decoding,communication,and secondary encoding,in order to propose references for the transmission of intangible heritage culture at home and abroad.