In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S...In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.展开更多
Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable...Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable for China's local culture consciousness. Its development context is clear: from literary text to culture text, and from the mythological outlook of literary standard to the mythological outlook driven by faith. We need rely on quadruple-evidence approaches which are integrated with multidisciplinary knowledge to reconstruct Chinese culture of the great tradition and little tradition theory from the new perspective of mythistory, to elaborate N-level coding theory, and to explore the faith in jade myth as the potential driving force of the beginning of civilization. By combing the complete symbolic process from the faith in jade myth to Chinese civilization core values, we wish to seek out the deep cultural genes among Chinese civilization identities ultimately.展开更多
In the present work, a construction making possible creation of an additive channel of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code correcting err...In the present work, a construction making possible creation of an additive channel of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code correcting errors of the channel A is presented.展开更多
In this paper, the perfect dyadic binary sequence pair with one-value dyadic correlation functions is presented. That is, the perfect dyadic binary sequence pair is a perfect discrete signal, for its dyadic relative f...In this paper, the perfect dyadic binary sequence pair with one-value dyadic correlation functions is presented. That is, the perfect dyadic binary sequence pair is a perfect discrete signal, for its dyadic relative function is δ-function. The transformation features and some existing admissibility conditions of perfect dyadic binary sequence pair are discussed, and the properties for this kind of code in Walsh transformation spectrum and weight spectrum are also analyzed. From above, It is found that the perfect dyadic binary sequence pair can easily differentiate from its dyadic shifting. So these good signals can used in engineering as synchronization code, multi-user code and so on.展开更多
A new set of binary sequences-Periodic Complementary Binary Sequence Pair (PCSP) is proposed. A new class of block design-Difference Family Pair (DFP) is also proposed.The relationship between PCSP and DFP, the proper...A new set of binary sequences-Periodic Complementary Binary Sequence Pair (PCSP) is proposed. A new class of block design-Difference Family Pair (DFP) is also proposed.The relationship between PCSP and DFP, the properties and existing conditions of PCSP and the recursive constructions for PCSP are given.展开更多
Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In ...Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In this paper, by introducing a concept of consulting design and based on the connection between factorial design theory and coding theory, we obtain some combinatorial identities that relate the wordlength pattern of a regular mixed-level (2^r)2^n factorial design to that of its consulting design. Consequently, a general rule for identifying minimum aberration (2^r)2^n factorial designs through their consulting designs is established. It is an improvement and generalization of the related result in Mukerjee and Wu(2001).展开更多
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron...With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records.展开更多
Guided by relevant learning theories and based on the analysis of the attributes of captioned video, the Chinese ESL learners' characteristics and the characteristics of ESL learning itself, the paper tries to propos...Guided by relevant learning theories and based on the analysis of the attributes of captioned video, the Chinese ESL learners' characteristics and the characteristics of ESL learning itself, the paper tries to propose a model of integrating captioned video in ESL acquisition process. The model focuses on the feasibility of using captioned video to facilitate or support ESL learning.展开更多
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical s...The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace.展开更多
Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been wid...Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been widely investigated.To decode the mechanism behind the popularity of yanzhi streamers,this study draws on Dual Coding Theory(DCT)to posit that age estimated from a streamer’s face and voice can influence the level of viewer engagement.To validate our hypothesized relationships,274 one-minute video records ahead of a viewer commenting or/and gifting were collected and analyzed via deep learning algorithms.Analytical results attest to the negative effects of both facial and vocal age on viewer engagement,while their interaction has a positive impact on viewer engagement.展开更多
基金jointly supported by the National Natural Science Foundation of China under Grant 61201198 and 61372089the Beijing Natural Science Foundation under Grant 4132015,4132007and 4132019
文摘In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime.
文摘Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable for China's local culture consciousness. Its development context is clear: from literary text to culture text, and from the mythological outlook of literary standard to the mythological outlook driven by faith. We need rely on quadruple-evidence approaches which are integrated with multidisciplinary knowledge to reconstruct Chinese culture of the great tradition and little tradition theory from the new perspective of mythistory, to elaborate N-level coding theory, and to explore the faith in jade myth as the potential driving force of the beginning of civilization. By combing the complete symbolic process from the faith in jade myth to Chinese civilization core values, we wish to seek out the deep cultural genes among Chinese civilization identities ultimately.
文摘In the present work, a construction making possible creation of an additive channel of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code correcting errors of the channel A is presented.
基金Supported by the National Natural Science Foundation of China (No.60372097)Beijing Municipal Natural Science Foundation (No.4052021)University IT Re-search Center Project (INHA UWB-ITRC), Korea.
文摘In this paper, the perfect dyadic binary sequence pair with one-value dyadic correlation functions is presented. That is, the perfect dyadic binary sequence pair is a perfect discrete signal, for its dyadic relative function is δ-function. The transformation features and some existing admissibility conditions of perfect dyadic binary sequence pair are discussed, and the properties for this kind of code in Walsh transformation spectrum and weight spectrum are also analyzed. From above, It is found that the perfect dyadic binary sequence pair can easily differentiate from its dyadic shifting. So these good signals can used in engineering as synchronization code, multi-user code and so on.
基金Supported by National Natural Science Foundation of China (69972042),Natural Science Fund of Hebei Provice(599245)and Science Foundation of Yanshan University
文摘A new set of binary sequences-Periodic Complementary Binary Sequence Pair (PCSP) is proposed. A new class of block design-Difference Family Pair (DFP) is also proposed.The relationship between PCSP and DFP, the properties and existing conditions of PCSP and the recursive constructions for PCSP are given.
文摘Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In this paper, by introducing a concept of consulting design and based on the connection between factorial design theory and coding theory, we obtain some combinatorial identities that relate the wordlength pattern of a regular mixed-level (2^r)2^n factorial design to that of its consulting design. Consequently, a general rule for identifying minimum aberration (2^r)2^n factorial designs through their consulting designs is established. It is an improvement and generalization of the related result in Mukerjee and Wu(2001).
文摘With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records.
文摘Guided by relevant learning theories and based on the analysis of the attributes of captioned video, the Chinese ESL learners' characteristics and the characteristics of ESL learning itself, the paper tries to propose a model of integrating captioned video in ESL acquisition process. The model focuses on the feasibility of using captioned video to facilitate or support ESL learning.
基金the National Natural Science Foundation Innovation Group Project(61521003).
文摘The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace.
文摘Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been widely investigated.To decode the mechanism behind the popularity of yanzhi streamers,this study draws on Dual Coding Theory(DCT)to posit that age estimated from a streamer’s face and voice can influence the level of viewer engagement.To validate our hypothesized relationships,274 one-minute video records ahead of a viewer commenting or/and gifting were collected and analyzed via deep learning algorithms.Analytical results attest to the negative effects of both facial and vocal age on viewer engagement,while their interaction has a positive impact on viewer engagement.