期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Full Diversity Reception Based on Dempster-Shafer Theory for Network Coding with Multiple-Antennas Relay 被引量:1
1
作者 SUN Yanhua YANG Yi +1 位作者 LI Yonghua ZHANG Yanhua 《China Communications》 SCIE CSCD 2015年第10期76-90,共15页
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S... In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime. 展开更多
关键词 network coding MIMO-DS NC/PNC Dempster-Shafer evidence theory twoway multiple antennas relay system
下载PDF
The Review of Chinese Literary Anthropology Theory's Construction Since 21 st Century
2
作者 GONG Wei-jun SUN Feng-juan 《Journal of Literature and Art Studies》 2017年第4期410-420,共11页
Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable... Important changes have taken place in the study of Chinese literary anthropology since 21st century. Chinese literary anthropologists make every effort to explore and construct one theoretical system which is suitable for China's local culture consciousness. Its development context is clear: from literary text to culture text, and from the mythological outlook of literary standard to the mythological outlook driven by faith. We need rely on quadruple-evidence approaches which are integrated with multidisciplinary knowledge to reconstruct Chinese culture of the great tradition and little tradition theory from the new perspective of mythistory, to elaborate N-level coding theory, and to explore the faith in jade myth as the potential driving force of the beginning of civilization. By combing the complete symbolic process from the faith in jade myth to Chinese civilization core values, we wish to seek out the deep cultural genes among Chinese civilization identities ultimately. 展开更多
关键词 quadruple-evidence approach mythistory great tradition and little tradition faith in jade myth N-level coding theory white jade worship
下载PDF
Construction of New Codes from Given Ones in an Additive Channel
3
作者 Garib Movsisyan 《Journal of Information Security》 2016年第3期165-171,共7页
In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting err... In the present work, a construction making possible creation of an additive channel  of cardinality s and rank r for arbitrary integers s, r, n (r≤min (n,s-1)), as well as creation of a code  correcting errors of the channel A is presented. 展开更多
关键词 Additive Channel Golay code Classical Coding theory T-Order Neighborhood Correcting code Binary Alphabet CARDINALITY
下载PDF
RESEARCH ON PERFECT DYADIC BINARY SEQUENCE PAIR 被引量:2
4
作者 Mao Fei Jiang Ting Zhao Chenglin Zhou Zheng 《Journal of Electronics(China)》 2006年第3期361-364,共4页
In this paper, the perfect dyadic binary sequence pair with one-value dyadic correlation functions is presented. That is, the perfect dyadic binary sequence pair is a perfect discrete signal, for its dyadic relative f... In this paper, the perfect dyadic binary sequence pair with one-value dyadic correlation functions is presented. That is, the perfect dyadic binary sequence pair is a perfect discrete signal, for its dyadic relative function is δ-function. The transformation features and some existing admissibility conditions of perfect dyadic binary sequence pair are discussed, and the properties for this kind of code in Walsh transformation spectrum and weight spectrum are also analyzed. From above, It is found that the perfect dyadic binary sequence pair can easily differentiate from its dyadic shifting. So these good signals can used in engineering as synchronization code, multi-user code and so on. 展开更多
关键词 code theory CORRELATION DYADIC Sequence pair
下载PDF
PERIODIC COMPLEMENTARY BINARY SEQUENCE PAIRS 被引量:16
5
作者 XuChengqian ZhaoXiaoqun 《Journal of Electronics(China)》 2002年第2期152-159,共8页
A new set of binary sequences-Periodic Complementary Binary Sequence Pair (PCSP) is proposed. A new class of block design-Difference Family Pair (DFP) is also proposed.The relationship between PCSP and DFP, the proper... A new set of binary sequences-Periodic Complementary Binary Sequence Pair (PCSP) is proposed. A new class of block design-Difference Family Pair (DFP) is also proposed.The relationship between PCSP and DFP, the properties and existing conditions of PCSP and the recursive constructions for PCSP are given. 展开更多
关键词 Coding theory Periodic complementary binary sequence pairs Difference family pairs Autocorrelation function Block design
下载PDF
Some Results on Minimum Aberration Mixed-level (2~r)2~n Factorial Designs
6
作者 SHI Cheng-tang ZHANG Dan +1 位作者 CHEN Bao-ting LI Yu-kai 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2007年第1期79-86,共8页
Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In ... Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In this paper, by introducing a concept of consulting design and based on the connection between factorial design theory and coding theory, we obtain some combinatorial identities that relate the wordlength pattern of a regular mixed-level (2^r)2^n factorial design to that of its consulting design. Consequently, a general rule for identifying minimum aberration (2^r)2^n factorial designs through their consulting designs is established. It is an improvement and generalization of the related result in Mukerjee and Wu(2001). 展开更多
关键词 coding theory consulting design minimum aberration MIXED-LEVEL REGULAR wordlength pattern
下载PDF
Ensuring Readability of Electronic Records Based on Virtualization Technology in Cloud Storage
7
作者 Qirun Wang Fujian Zhu +2 位作者 Yan Leng Yongjun Ren Jinyue Xia 《Journal on Internet of Things》 2019年第1期33-39,共7页
With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electron... With the rapid development of E-commerce and E-government, there are somany electronic records have been produced. The increasing number of electronicrecords brings about storage difficulties, the traditional electronic records center isdifficult to cope with the current fast growth requirements of electronic records storageand management. Therefore, it is imperative to use cloud storage technology to buildelectronic record centers. However, electronic records also have weaknesses in the cloudstorage environment, and one of them is that once electronic record owners or managerslose physical control of them, the electronic records are more likely to be tampered withand destroyed. So, the paper builds a reliable electronic records preservation systembased on coding theory. It can effectively guarantee the reliability of record storage whenthe electronic record is damaged, and the original electronic record can be restored byredundant coding, thus ensuring the reliable storage of electronic records. 展开更多
关键词 Electronic record cloud storage preservation mechanism coding theory
下载PDF
Tentative model of integrating authentic captioned video to facilitate ESL learning
8
作者 WANG Yan-dong SHEN Cai-fen 《Sino-US English Teaching》 2007年第9期1-13,共13页
Guided by relevant learning theories and based on the analysis of the attributes of captioned video, the Chinese ESL learners' characteristics and the characteristics of ESL learning itself, the paper tries to propos... Guided by relevant learning theories and based on the analysis of the attributes of captioned video, the Chinese ESL learners' characteristics and the characteristics of ESL learning itself, the paper tries to propose a model of integrating captioned video in ESL acquisition process. The model focuses on the feasibility of using captioned video to facilitate or support ESL learning. 展开更多
关键词 authentic captioned video ESL information processing theory dual coding theory
下载PDF
Problems and solutions regarding generalized functional safety in cyberspace 被引量:5
9
作者 JiangXing Wu 《Security and Safety》 2022年第1期90-102,共13页
The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical s... The common endogenous security problems in cyberspace and related attack threats have posed subversive challenges to conventional theories and methods of functional safety.In the current design of the cyber physical system(CPS),functional safety and cyber security are increasingly intertwined and inseparable,which evolve into the generalized functional safety(S&S)problem.The conventional reliability and cybersecurity technologies are unable to provide security assurance with quanti able design and veri cation metrics in response to the cyberattacks in hardware and software with common endogenous security problems,and the functional safety of CPS facilities or device has become a frightening ghost.The dynamic heterogeneity redundancy(DHR)architecture and coding channel theory(CCT)proposed by the cyberspace endogenous security paradigm could handle random failures and uncertain network attacks in an integrated manner,and its generalized robust control mechanism can solve the universal problem of quantitative design for functional safety under probability or improbability perturbation.As a generalized functional safety enabling structure,DHR opens up a new direction to solve the common endogenous security problems in the cross-disciplinary elds of cyberspace. 展开更多
关键词 Common endogenous security problem Generalized functional safety(S&S) Dynamic heterogeneity redundancy(DHR)architecture General robust control mechanism Coding channel theory Common cross-disciplinary eld problems
原文传递
Effects of age on live streaming viewer engagement:a dual coding perspective
10
作者 Fei Liu Yijing Li +3 位作者 Xiaofei Song Zhao Cai Eric T.K.Lim Chee-Wee Tan 《Journal of Management Analytics》 EI 2022年第4期435-447,共13页
Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been wid... Though the emerging live streaming industry has attracted growing attention,the dominant yanzhi category where streamers mostly interact with the audience through amateur talent shows and casual chats has not been widely investigated.To decode the mechanism behind the popularity of yanzhi streamers,this study draws on Dual Coding Theory(DCT)to posit that age estimated from a streamer’s face and voice can influence the level of viewer engagement.To validate our hypothesized relationships,274 one-minute video records ahead of a viewer commenting or/and gifting were collected and analyzed via deep learning algorithms.Analytical results attest to the negative effects of both facial and vocal age on viewer engagement,while their interaction has a positive impact on viewer engagement. 展开更多
关键词 live streaming age viewer engagement dual coding theory deep learning
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部