期刊文献+
共找到38篇文章
< 1 2 >
每页显示 20 50 100
Punctured(2,1,N)系列卷积码的编码及其Viterbi译码的软件实现 被引量:7
1
作者 袁东风 李作为 张锋 《山东大学学报(理学版)》 CAS CSCD 北大核心 2002年第1期48-53,共6页
给出了由 (2 ,1,N)系列卷积码作为母码产生的punctured卷积码的编码及其Viterbi译码的软件实现方法 ,从而为各种不同码率的卷积码的编、译码给出了一种通用的实现方法 。
关键词 Punctured卷积 移动衰落信道 多级编分量码 差错控制 方法 Punctured(2 1 n)系列卷积 VITERBI译 软件实现
下载PDF
基于CRT的(3,L)-QC-LDPC码构造 被引量:1
2
作者 彭海英 杨箭 孙力军 《计算机工程与应用》 CSCD 北大核心 2018年第5期105-110,共6页
对于任意行重L,利用完全确定的方式构造出一类围长为8的(3,L)-LDPC码作为分量码1,构造可快速编码的LDPC码作为分量码2,利用分量码1和分量码2,并结合中国剩余定理(CRT)构造出一类围长至少为8的合成QCLDPC码。该方法构造出来的码字同时具... 对于任意行重L,利用完全确定的方式构造出一类围长为8的(3,L)-LDPC码作为分量码1,构造可快速编码的LDPC码作为分量码2,利用分量码1和分量码2,并结合中国剩余定理(CRT)构造出一类围长至少为8的合成QCLDPC码。该方法构造出来的码字同时具备以上两种特性。仿真结果表明,所构造的码字性能与基于IRCMS算法构造的QC-LDPC码相比,有略微提升,且具有快速编码特性,编码复杂度更低;与具有双对角结构的阵列码相比,性能有了明显提升。在误码率达到10^(-4)时,码字性能大约提高了0.3 dB;与PEG-CRT-LDPC码相比,所构造的码字在低编码复杂度的基础上性能有所提升。 展开更多
关键词 低密度奇偶校验(LDPC) 中国剩余定理 分量码 快速编
下载PDF
Turbo码的矩阵描述及其对交织器设计的影响
3
作者 王莹 李晖 王育民 《计算机学报》 EI CSCD 北大核心 2003年第10期1400-1403,共4页
从信号与系统角度研究了Turbo码编码器的工作原理 ,并在这一基础上指出了Turbo码交织器设计过程中应注意的一些问题 .从信号与系统的观点 ,Turbo码编码器的输出码字可以看成是零输入响应和零状态响应的叠加 ,这样可以得出编码器输出码... 从信号与系统角度研究了Turbo码编码器的工作原理 ,并在这一基础上指出了Turbo码交织器设计过程中应注意的一些问题 .从信号与系统的观点 ,Turbo码编码器的输出码字可以看成是零输入响应和零状态响应的叠加 ,这样可以得出编码器输出码字是由输入信息和几个与编码器结构有关的基本矩阵唯一确定的结论 .利用这样的结论 ,作者讨论了交织器设计过程中满足距离谱特性要求时应遵循的一些设计原则 ,这样可以更好地了解Turbo码的内部结构以及交织器的重要作用 . 展开更多
关键词 TURBO 矩阵描述 交织器 设计 分量码
下载PDF
斜率因子对Turbo码性能的影响
4
作者 施俊杰 王琳 《现代电子技术》 2005年第17期15-16,共2页
Turbo码近年来一直是通信领域的研究重点,寻找好的分量码即是一个重要方向。Turbo码分量码编码器采用了以本原多项式作为反馈连接多项式的递归系统卷积码,以获得最大的最小码重和最大的自由距离。本文说明了另一个影响卷积码纠错能力的... Turbo码近年来一直是通信领域的研究重点,寻找好的分量码即是一个重要方向。Turbo码分量码编码器采用了以本原多项式作为反馈连接多项式的递归系统卷积码,以获得最大的最小码重和最大的自由距离。本文说明了另一个影响卷积码纠错能力的参量活性突发距离,提出以卷积码的斜率因子为替代参量来分析Turbo码。仿真说明在采用同一个本原多项式作为反馈连接多项式的情况下,分量码的斜率因子越大,则Turbo码的纠错性能相应越好,斜率因子可以作为评价Turbo码性能的另一个重要参数。 展开更多
关键词 TURBO 分量码 活性突发距离 斜率因子
下载PDF
结合Turbo码的多级编码调制研究介绍
5
作者 徐文进 李兴江 袁东风 《山东电子》 2003年第3期32-34,共3页
论文作者在对已有的多级编码调制方案深入研究的基础上 ,进一步研究了Turbo码编码技术 ,并把Turbo码作为分量码结合多级编码调制方案进行了理论研究 .符合当今移动通信的大容量、高可靠性的要求 .论文的主要创新点有 ,通过理论研究 。
关键词 TURBO 多级编调制 分量码 MLC 多级译
下载PDF
A Total Dose Radiation Hardened PDSOI CMOS 3-Line to 8-Line Decoder
6
作者 刘梦新 韩郑生 +3 位作者 李多力 刘刚 赵超荣 赵发展 《Journal of Semiconductors》 EI CAS CSCD 北大核心 2008年第6期1036-1039,共4页
The first domestic total dose hardened 2μm partially depleted silicon-on-insulator (PDSOI) CMOS 3-line to 8- line decoder fabricated in SIMOX is demonstrated. The radiation performance is characterized by transisto... The first domestic total dose hardened 2μm partially depleted silicon-on-insulator (PDSOI) CMOS 3-line to 8- line decoder fabricated in SIMOX is demonstrated. The radiation performance is characterized by transistor threshold voltage shifts,circuit static leakage currents,and I-V curves as a function of total dose up to 3× 10^5rad(Si). The worst case threshold voltage shifts of the front channels are less than 20mV for nMOS transistors at 3 × 10^5rad(Si) and follow-up irradiation and less than 70mV for the pMOS transistors. Furthermore, no significant radiation induced leakage currents and functional degeneration are observed. 展开更多
关键词 PDSOI DECODER total dose RADIATION
下载PDF
IMPROVING THE CAPACITY OF MULTI-CODE MULTIMEDIA CDMA SYSTEM 被引量:1
7
作者 Pan Su Liu Shengmei 《Journal of Electronics(China)》 2007年第4期557-559,共3页
A novel method for improving the capacity of multi-code multimedia Code Division Mul- tiple Access (CDMA) systems is proposed. By factitiously improving the transmission bit rate of the call, the number of the orthogo... A novel method for improving the capacity of multi-code multimedia Code Division Mul- tiple Access (CDMA) systems is proposed. By factitiously improving the transmission bit rate of the call, the number of the orthogonal codes used by a user is increased which leads to the decreasing of the interference. Simulation results shows that the proposed scheme results in better throughput than traditional multi-code CDMA systems. 展开更多
关键词 Capacity MULTIMEDIA Code Division Multiple Access (CDMA)
下载PDF
Quantum Key Distribution Scheme Based on Dense Encoding in Entangled States 被引量:4
8
作者 ZHANGXiao-Long ZHANGYue-Xia GAOKe-Lin 《Communications in Theoretical Physics》 SCIE CAS CSCD 2005年第4期627-630,共4页
A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the f... A quantum key distribution protocol, based on the quantum dense encoding in entangled states, is presented. In this protocol, we introduce an encoding process to encode two classical bits information into one of the four one-qubit unitary operations implemented by Alice and the Bell states measurement implemented by Bob in stead of direct measuring the previously shared Einstein-Podolsky-Rosen pairs by both of the distant parties, Alice and Bob.Considering the practical application we can get the conclusion that our protocol has some advantages. It not only simplifies the measurement which may induce potential errors, but also improves the effectively transmitted rate of the generated qubits by the raw key. Here we also discuss eavesdropping attacks against the scheme and the channel loss. 展开更多
关键词 quantum key distribution dense coding quantum entanglement
下载PDF
A NOVEL CAPACITY ANALYZING METHOD FOR MULTIMEDIA CDMA SYSTEMS BASED ON POWER LEVEL ALLOCATION 被引量:5
9
作者 Pan Su Tung Sang Ng Feng Guangzeng 《Journal of Electronics(China)》 2006年第6期842-847,共6页
A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Err... A novel method is proposed to analyze the capacity of future Code Division Multiple Access (CDMA) systems carrying multimedia services. The power level allocation is firstly investigated to meet each call's Bit Error Rate (BER) requirement, then the system capacity is defined from the conditions lbr the existence of the physical meaning of these power levels. Simulation results have shown that the capacity analyzing methods can be well used in the performance evaluation of the system accommodating heterogeneous services and the spectral efficiency of this scheme is higher than the existing ones. 展开更多
关键词 Capacity MULTIMEDIA Code Division Multiple Access (CDMA)
下载PDF
Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size 被引量:1
10
作者 唐少杰 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期443-446,共4页
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca... Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment. 展开更多
关键词 quantum key distribution finite data-set size statistical fluctuation
下载PDF
The Simulation of High Reynolds Number Cavity Flow Based on Fractional Volumetric Lattice Boltzmann Method
11
作者 HAN Shan-ling(韩善灵) +3 位作者 ZHU Ping(朱平) LIN Zhong-qin(林忠钦) 《Journal of Shanghai Jiaotong university(Science)》 EI 2005年第4期373-376,共4页
The fractional volumetric lattice Boltzmann method with much better stability was used to simulate two-chmensional cavity flows. Because the effective viscosity was reduced by the fraction factor, it is very effective... The fractional volumetric lattice Boltzmann method with much better stability was used to simulate two-chmensional cavity flows. Because the effective viscosity was reduced by the fraction factor, it is very effective for simulating high Reynolds number flows. Simulations were carried out on a uniform grids system. The stream lines and the velocity profiles obtained from the simulations agree well with the standard lattice Boltzmann method simulations. Comparisons of detailed flow patterns with other studies via location of vortex centers are also satisfactory. 展开更多
关键词 lattice Boltzmann method cavity flow fraction factor high Reynolds number flow
下载PDF
Measuring-Basis Encrypted Quantum Key Distribution with Four-State Systems 被引量:3
12
作者 CHEN Pan LI Yan-Song +1 位作者 DENG Fu-Guo LONG Gui-Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第1期49-52,共4页
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i... A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used. 展开更多
关键词 quantum key distribution measuring-basis encryption four-state system
下载PDF
A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2
13
作者 YANG Yu 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ... Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%. 展开更多
关键词 text steganalysis SVM steganalysis space-coding detecting
下载PDF
Constructing Non-binary Asymmetric Quantum Codes via Graphs 被引量:2
14
作者 马智 冷日光 +1 位作者 魏正超 钟淑琴 《China Communications》 SCIE CSCD 2013年第2期33-41,共9页
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ... The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way. 展开更多
关键词 asymmetric quantum codes quantum MDS codes graph construction
下载PDF
Asymmetrical Quantum Encryption Protocol Based on Quantum Search Algorithm 被引量:2
15
作者 LUO Wenjun LIU Guanli 《China Communications》 SCIE CSCD 2014年第9期104-111,共8页
Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way f... Quantum cryptography and quantum search algorithm are considered as two important research topics in quantum information science.An asymmetrical quantum encryption protocol based on the properties of quantum one-way function and quantum search algorithm is proposed.Depending on the no-cloning theorem and trapdoor one-way functions of the publickey,the eavesdropper cannot extract any private-information from the public-keys and the ciphertext.Introducing key-generation randomized logarithm to improve security of our proposed protocol,i.e.,one privatekey corresponds to an exponential number of public-keys.Using unitary operations and the single photon measurement,secret messages can be directly sent from the sender to the receiver.The security of the proposed protocol is proved that it is informationtheoretically secure.Furthermore,compared the symmetrical Quantum key distribution,the proposed protocol is not only efficient to reduce additional communication,but also easier to carry out in practice,because no entangled photons and complex operations are required. 展开更多
关键词 quantum cryptography asymmetrical encryption information-theoreticalsecurity quantum search algorithms
下载PDF
A NEW METHOD FOR RESYNCHRONIZATION ATTACK
16
作者 Chen Jie Wang Baocang Hu Yupu 《Journal of Electronics(China)》 2006年第3期423-427,共5页
This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degr... This paper presents a new method for resynchronization attack, which is the combination of the differential cryptanalysis and algebraic attack. By using the new method one gets a system of linear equations or low-degree equations about initial keys, and the solution of the system of equations results in the recovery of the initial keys. This method has a lower computational complexity and better performance of attack in contrast to the known methods. Accordingly, the design of the resynchronization stream generators should be reconsidered to make them strong enough to avoid our attacks. When implemented to the Toyocrypt, our method gains the computational complexity of O(2^17), and that of 0(2^67) for LILI-128. 展开更多
关键词 Stream ciphers Resynchronization attack Algebraic attacks Differential cryptanalysis Computational complexity
下载PDF
SNP site-drug association prediction algorithm based on denoising variational auto-encoder
17
作者 SONG Xiaoyu FENG Xiaobei +3 位作者 ZHU Lin LIU Tong WU Hongyang LI Yifan 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第3期300-308,共9页
Single nucletide polymorphism(SNP)is an important factor for the study of genetic variation in human families and animal and plant strains.Therefore,it is widely used in the study of population genetics and disease re... Single nucletide polymorphism(SNP)is an important factor for the study of genetic variation in human families and animal and plant strains.Therefore,it is widely used in the study of population genetics and disease related gene.In pharmacogenomics research,identifying the association between SNP site and drug is the key to clinical precision medication,therefore,a predictive model of SNP site and drug association based on denoising variational auto-encoder(DVAE-SVM)is proposed.Firstly,k-mer algorithm is used to construct the initial SNP site feature vector,meanwhile,MACCS molecular fingerprint is introduced to generate the feature vector of the drug module.Then,we use the DVAE to extract the effective features of the initial feature vector of the SNP site.Finally,the effective feature vector of the SNP site and the feature vector of the drug module are fused input to the support vector machines(SVM)to predict the relationship of SNP site and drug module.The results of five-fold cross-validation experiments indicate that the proposed algorithm performs better than random forest(RF)and logistic regression(LR)classification.Further experiments show that compared with the feature extraction algorithms of principal component analysis(PCA),denoising auto-encoder(DAE)and variational auto-encode(VAE),the proposed algorithm has better prediction results. 展开更多
关键词 association prediction k-mer molecular fingerprinting support vector machine(SVM) denoising variational auto-encoder(DVAE)
下载PDF
NOVEL LSCM BEAM-FORMING ALGORITHM IN SMART ANTENNA MC-CDMA SYSTEM
18
作者 Fu Hongliang Feng Guangzeng 《Journal of Electronics(China)》 2006年第4期501-505,共5页
A novel Least Squares Constant Modulus (LSCM) beam-forming algorithm in smart antenna Multi-Carrier Code Division Multiple Access (MC-CDMA) system is proposed in this paper. It adaptively beam-forms the multi-carrier ... A novel Least Squares Constant Modulus (LSCM) beam-forming algorithm in smart antenna Multi-Carrier Code Division Multiple Access (MC-CDMA) system is proposed in this paper. It adaptively beam-forms the multi-carrier antenna array signal using the LSCM Algorithm (LSCMA), and in the meantime, the beam-formed signals on every sub-carrier are combined by using Orthogonal Restore Combination (ORC), Equal Gain Combination (EGC) or Maximum Ratio Combination (MRC). Then the decision of the combined signals and the spread-code of the expected user are used to re-construct the signals on every sub-carrier. At last, the difference between the re-constructed signal and the output signal of the beam-former is used to con-trol the coefficients of the beam-former. The bit error probability of the proposed algorithm is analyzed. We simulated and compared it with the conventional LSCM beam-forming algorithm. Simulation results show that the proposed algorithm is superior to the latter in Bit Error Rate (BER). 展开更多
关键词 Smart antenna MULTI-CARRIER Least Squares Constant Modulus Algorithm (LSCMA) BEAMFORMING
下载PDF
SAR imagery coding based on blocking high frequency energy matching 被引量:1
19
作者 陈德元 Luan +2 位作者 Enjie Tu Guofang 《High Technology Letters》 EI CAS 2009年第4期378-383,共6页
A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm,... A new fractal image compression algorithm based on high frequency energy (HFE) partitioning andmatched domain block searching is presented to code synthetic aperture radar (SAR) imagery. In the hybridcoding algorithm, the original SAR image is decomposed to low frequency components and high frequencycomponents by wavelet transform (WT). Then the coder uses HFE of block to partition and searchthe matched domain block for each range block to code the low frequency components. For the high frequencycomponents, a modified embedded zero-tree wavelet coding algorithm is applied. Experiment resultsshow that the proposed coder obtains about 0. 3dB gain when compared to the traditional fractal coderbased on the quadtree partition. Moreover, the subjective visual quality of the reconstructed SAR imageof the proposed coder outperforms that of the traditional fractal coders in the same compression ratio(CR). 展开更多
关键词 synthetic aperture radar (SAR) fractal image compression wavelet transform high frequency energy (HFE)
下载PDF
Quantization Skipping Method for H.264/AVC Video Coding
20
作者 Won-seon SONG Min-cheol HONG 《Journal of Measurement Science and Instrumentation》 CAS 2010年第3期247-249,共3页
This paper presents a quantization skipping method for H. 264/AVC video coding standard. In order to reduce the conputational-cost of quantization process coming from integer discrete cosine transform of H. 264/AVC, a... This paper presents a quantization skipping method for H. 264/AVC video coding standard. In order to reduce the conputational-cost of quantization process coming from integer discrete cosine transform of H. 264/AVC, a quantization skipping condition is derived by the analysis of integer transform and quantization procedures. The expeerimental results show that the proposed algorithm has the capability to reduce the computional cost about 10% -2.5%. 展开更多
关键词 H. 264/AVC quantization skipping integer transform computational-cost
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部