期刊文献+
共找到2,932篇文章
< 1 2 147 >
每页显示 20 50 100
JOINT ITERATIVE DECODING FOR SIMPLE-ENCODING SYSTEMATIC IRREGULAR-LDPC-BASED CODED COOPERATION IN NON-IDEAL RELAY CHANNEL 被引量:3
1
作者 Chen Jingwen Yang Fengfan +1 位作者 Luo Lin Tho Le-Ngoc 《Journal of Electronics(China)》 2010年第3期305-315,共11页
In this paper, a new kind of simple-encoding irregular systematic LDPC codes suitable for one-relay coded cooperation is designed, where the proposed joint iterative decoding is effectively performed in the destinatio... In this paper, a new kind of simple-encoding irregular systematic LDPC codes suitable for one-relay coded cooperation is designed, where the proposed joint iterative decoding is effectively performed in the destination which is in accordance with the corresponding joint Tanner graph characterizing two different component LDPC codes used by the source and relay in ideal and non-ideal relay cooperations. The theoretical analysis and simulations show that the coded cooperation scheme obviously outperforms the coded non-cooperation one under the same code rate and decoding complex. The significant performance improvement can be virtually credited to the additional mutual exchange of the extrinsic information resulted by the LDPC code employed by the source and its counterpart used by the relay in both ideal and non-ideal cooperations. 展开更多
关键词 Cooperative communication Low-density parity-check code Relay channel Joint Tanner graph Joint iterative decoding
下载PDF
A New Arithmetic Coding System Combining Source Channel Coding and MAP Decoding
2
作者 逄玉叶 孙军 王嘉 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第4期442-447,共6页
A new arithmetic coding system combining source channel coding and maximum a posteriori decoding were proposed. It combines source coding and error correction tasks into one unified process by introducing an adaptive ... A new arithmetic coding system combining source channel coding and maximum a posteriori decoding were proposed. It combines source coding and error correction tasks into one unified process by introducing an adaptive forbidden symbol. The proposed system achieves fixed length code words by adaptively adjusting the probability of the forbidden symbol and adding tail digits of variable length. The corresponding improved MAP decoding metric was derived. The proposed system can improve the performance. Simulations were performed on AWGN channels with various noise levels by using both hard and soft decision with BPSK modulation.The results show its performance is slightly better than that of our adaptive arithmetic error correcting coding system using a forbidden symbol. 展开更多
关键词 ARITHMETIC code (AC) forbidden SYMBOL joint SOURCE channel coding (JSCC) MAXIMUM a POSTERIORI (MAP) DEcoding
下载PDF
PIC-MF-based Iterative Receiver for Multiuser Space Frequency Block Coding Systems
3
作者 林文峰 何晨 熊勇 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第4期464-470,共7页
A novel low-complexity iterative receiver for multiuser space frequency block coding (SFBC) system was proposed in this paper. Unlike the conventional linear minimum mean square error (MMSE) detector, which requires m... A novel low-complexity iterative receiver for multiuser space frequency block coding (SFBC) system was proposed in this paper. Unlike the conventional linear minimum mean square error (MMSE) detector, which requires matrix inversion at each iteration, the soft-in soft-out (SISO) detector is simply a parallel interference cancellation (PIC)-matched filter (MF) operation. The probability density function (PDF) of PIC-MF detector output is approximated as Gaussian, whose variance is calculated with a priori information fed back from the channel decoder. With this approximation, the log likelihood ratios (LLRs) of transmitted bits are under-estimated. Then the LLRs are multiplied by a constant factor to achieve a performance gain. The constant factor is optimized according to extrinsic information transfer (EXIT) chart of the SISO detector. Simulation results show that the proposed iterative receiver can significantly improve the system performance and converge to the matched filter bound (MFB) with low computational complexity at high signal-to-noise ratios (SNRs). 展开更多
关键词 iterative MULTIUSER space FREQUENCY block coding (SFBC) parallel interference cancellation (PIC) matched filter (MF) EXTRINSIC information transfer (EXIT)
下载PDF
An Iterative Power Allocation Algorithm for Group-wise Space-Time Block Coding Systems
4
作者 张红伟 张海滨 +2 位作者 宋文涛 罗汉文 刘兴钊 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第4期481-485,共5页
An iterative transmit power allocation (PA) algorithm was proposed for group-wise space-time block coding (G-STBC) systems with group-wise successive interference cancellation (GSIC) receivers. Group-wise interference... An iterative transmit power allocation (PA) algorithm was proposed for group-wise space-time block coding (G-STBC) systems with group-wise successive interference cancellation (GSIC) receivers. Group-wise interference suppression (GIS) filters are employed to separate each group's transmit signals from other interferences and noise. While the total power on all transmit symbols is constrained, all transmit PA coefficients are updated jointly according to the channel information at each iteration. Through PA, each detection symbol has the same post-detection signal to interference-and-noise ratio (SINR). The simulation results verify that the proposed PA algorithm converges at the equilibrium quickly after few iterations, and it achieves much lower bit error rates than the previous single symbol SIC PA and the fixed ratio PA algorithms for G-STBC systems with GSIC receivers . 展开更多
关键词 power allocation (PA) group-wise space-time block coding (G-STBC) group-wise INTERFERENCE suppression (GIS) group-wise successive INTERFERENCE CANCELLATION (GSIC)
下载PDF
An apodized cubic phase mask used in a wavefront coding system to extend the depth of field
5
作者 朱丽娜 李飞 +1 位作者 黄泽宇 赵廷玉 《Chinese Physics B》 SCIE EI CAS CSCD 2022年第5期422-428,共7页
The point spread function(PSF)caused by a wavefront coding system with a cubic phase mask has big side-lobes which leads to bad image restoration.This paper proposes a novel apodized cubic phase mask to suppress the s... The point spread function(PSF)caused by a wavefront coding system with a cubic phase mask has big side-lobes which leads to bad image restoration.This paper proposes a novel apodized cubic phase mask to suppress the side-lobes of the PSF.Simulated annealing algorithm is used to optimize the cubic and the truncation parameter of the phase mask.The system with the novel phase mask has better performance in the modulation transfer function(MTF)especially in low-and-medium spatial frequency region.The simulation results show that the restored images with the novel phase mask are superior to the one with the classic cubic phase mask in contrast and ringing effect.The experimental results show that the side-lobes of the PSF are suppressed by using the apodized cubic phase mask. 展开更多
关键词 apodized cubic phase mask wavefront coding depth of field image restoration
下载PDF
Optical transfer function analysis of circular-pupil wavefront coding systems with separable phase masks
6
作者 赵廷玉 刘钦晓 余飞鸿 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期200-206,共7页
This paper proposes a simple method to achieve the optical transfer function of a circular pupil wavefront coding system with a separable phase mask in Cartesian coordinates. Based on the stationary phase method, the ... This paper proposes a simple method to achieve the optical transfer function of a circular pupil wavefront coding system with a separable phase mask in Cartesian coordinates. Based on the stationary phase method, the optical transfer function of the circular pupil system can be easily obtained from the optical transfer function of the rectangular pupil system by modifying the cut-off frequency and the on-axial modulation transfer function. Finally, a system with a cubic phase mask is used as an example to illustrate the way to achieve the optical transfer function of the circular pupil system from the rectangular pupil system. 展开更多
关键词 wavefront coding circular pupil separable phase mask stationary phase method
下载PDF
An Efficient Compression Coding System for Motion Images
7
作者 安平 王建敏 +3 位作者 高磊 刘军 张兆扬 王朔中 《Advances in Manufacturing》 SCIE CAS 1997年第2期149-154,共6页
An efficient compression coding system for motion images is presented. A macro-block matchingtechnique based on tile correlation betweell motion vectors is applied to the system. This technique effectivelyimproves the... An efficient compression coding system for motion images is presented. A macro-block matchingtechnique based on tile correlation betweell motion vectors is applied to the system. This technique effectivelyimproves the accuracy and the speed of motion estimation, and the compression ratio. A compression ratio of 29 isattainable without visible image degradation. 展开更多
关键词 compression coding DCT motion estimation motion compensation
下载PDF
Performance Evaluation of OFDM Coding System Using Concatenated BCH and LDPC Codes
8
作者 H. Gagan R. Manas N. G. Girish Kumar 《International Journal of Communications, Network and System Sciences》 2017年第5期67-77,共11页
This paper establishes a resilient concatenated coding platform for Orthogonal Frequency Division Multiplexing (OFDM) with Quadrature Amplitude Modulation (QAM) over Additive White Gaussian Noise (AWGN) channel. At th... This paper establishes a resilient concatenated coding platform for Orthogonal Frequency Division Multiplexing (OFDM) with Quadrature Amplitude Modulation (QAM) over Additive White Gaussian Noise (AWGN) channel. At the Forward Error Correction (FEC) coding unit, our proposed concatenated coding scheme utilizes standard type of BCH as external coding and LDPC as inner coding. In this scheme, Interleaver inclusion is seen as a catalyst to enhance the systems performance. 展开更多
关键词 CONCATENATED Codes OFDM LDPC BCH INTERLEAVER
下载PDF
Research on a New Coding System for Vibrating Feeder Design
9
作者 FU Cai-an ZHANG Ming DING Wei 《International Journal of Plant Engineering and Management》 2010年第2期90-96,共7页
The sUdeway design is the key in the design of the disc vibrating feeder. However, no reliable theoretical guidance has come into existence, which greatly restricted the application of CAD( Computer-aided design). I... The sUdeway design is the key in the design of the disc vibrating feeder. However, no reliable theoretical guidance has come into existence, which greatly restricted the application of CAD( Computer-aided design). In order to feed the application of CAD technology, we must make improvements to the existing coding method. Based on the similarity principle of Group Technology and existing coding system, a new coding method applicable to slide- way design is brought forward. The existing coding system could get optimized by means of analysing and studying the influence imposed by the parts' shape and posture features. More detailed information about the parts could be supplied by the new coding system, which makes the design simpler, more convenient and more accurate with the subjoin of the initial and targeted codes. 展开更多
关键词 slideway design group technology new coding method posture features
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
10
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
11
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
12
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
下载PDF
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation
13
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
下载PDF
Systematic Review: Analysis of Coding Vulnerabilities across Languages
14
作者 Shreyas Sakharkar 《Journal of Information Security》 2023年第4期330-342,共13页
The boom of coding languages in the 1950s revolutionized how our digital world was construed and accessed. The languages invented then, including Fortran, are still in use today due to their versatility and ability to... The boom of coding languages in the 1950s revolutionized how our digital world was construed and accessed. The languages invented then, including Fortran, are still in use today due to their versatility and ability to underpin a large majority of the older portions of our digital world and applications. Fortran, or Formula Translation, was a programming language implemented by IBM that shortened the apparatus of coding and the efficacy of the language syntax. Fortran marked the beginning of a new era of efficient programming by reducing the number of statements needed to operate a machine several-fold. Since then, dozens more languages have come into regular practice and have been increasingly diversified over the years. Some modern languages include Python, Java, JavaScript, C, C++, and PHP. These languages significantly improved efficiency and also have a broad range of uses. Python is mainly used for website/software development, data analysis, task automation, image processing, and graphic design applications. On the other hand, Java is primarily used as a client-side programming language. Expanding the coding languages allowed for increasing accessibility but also opened up applications to pertinent security issues. These security issues have varied by prevalence and language. Previous research has narrowed its focus on individual languages, failing to evaluate the security. This research paper investigates the severity and frequency of coding vulnerabilities comparatively across different languages and contextualizes their uses in a systematic literature review. 展开更多
关键词 CWE (Common Weakness Enumeration) Data Security coding Vulnerabilities
下载PDF
Decoding topological XYZ^(2) codes with reinforcement learning based on attention mechanisms
15
作者 陈庆辉 姬宇欣 +2 位作者 王柯涵 马鸿洋 纪乃华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期262-270,共9页
Quantum error correction, a technique that relies on the principle of redundancy to encode logical information into additional qubits to better protect the system from noise, is necessary to design a viable quantum co... Quantum error correction, a technique that relies on the principle of redundancy to encode logical information into additional qubits to better protect the system from noise, is necessary to design a viable quantum computer. For this new topological stabilizer code-XYZ^(2) code defined on the cellular lattice, it is implemented on a hexagonal lattice of qubits and it encodes the logical qubits with the help of stabilizer measurements of weight six and weight two. However topological stabilizer codes in cellular lattice quantum systems suffer from the detrimental effects of noise due to interaction with the environment. Several decoding approaches have been proposed to address this problem. Here, we propose the use of a state-attention based reinforcement learning decoder to decode XYZ^(2) codes, which enables the decoder to more accurately focus on the information related to the current decoding position, and the error correction accuracy of our reinforcement learning decoder model under the optimisation conditions can reach 83.27% under the depolarizing noise model, and we have measured thresholds of 0.18856 and 0.19043 for XYZ^(2) codes at code spacing of 3–7 and 7–11, respectively. our study provides directions and ideas for applications of decoding schemes combining reinforcement learning attention mechanisms to other topological quantum error-correcting codes. 展开更多
关键词 quantum error correction topological quantum stabilizer code reinforcement learning attention mechanism
下载PDF
Recurrent neural network decoding of rotated surface codes based on distributed strategy
16
作者 李帆 李熬庆 +1 位作者 甘启迪 马鸿洋 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期322-330,共9页
Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error corre... Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error correction using neural network-based machine learning methods is a promising approach that is adapted to physical systems without the need to build noise models.In this paper,we use a distributed decoding strategy,which effectively alleviates the problem of exponential growth of the training set required for neural networks as the code distance of quantum error-correcting codes increases.Our decoding algorithm is based on renormalization group decoding and recurrent neural network decoder.The recurrent neural network is trained through the ResNet architecture to improve its decoding accuracy.Then we test the decoding performance of our distributed strategy decoder,recurrent neural network decoder,and the classic minimum weight perfect matching(MWPM)decoder for rotated surface codes with different code distances under the circuit noise model,the thresholds of these three decoders are about 0.0052,0.0051,and 0.0049,respectively.Our results demonstrate that the distributed strategy decoder outperforms the other two decoders,achieving approximately a 5%improvement in decoding efficiency compared to the MWPM decoder and approximately a 2%improvement compared to the recurrent neural network decoder. 展开更多
关键词 quantum error correction rotated surface code recurrent neural network distributed strategy
下载PDF
Improved Segmented Belief Propagation List Decoding for Polar Codes with Bit-Flipping
17
作者 Mao Yinyou Yang Dong +1 位作者 Liu Xingcheng Zou En 《China Communications》 SCIE CSCD 2024年第3期19-36,共18页
Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved s... Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved segmented belief propagation list decoding based on bit flipping(SBPL-BF) is proposed. On the one hand, the proposed algorithm makes use of the cooperative characteristic in BPL decoding such that the codeword is decoded in different BP decoders. Based on this characteristic, the unreliable bits for flipping could be split into multiple subblocks and could be flipped in different decoders simultaneously. On the other hand, a more flexible and effective processing strategy for the priori information of the unfrozen bits that do not need to be flipped is designed to improve the decoding convergence. In addition, this is the first proposal in BPL decoding which jointly optimizes the bit flipping of the information bits and the code bits. In particular, for bit flipping of the code bits, a H-matrix aided bit-flipping algorithm is designed to enhance the accuracy in identifying erroneous code bits. The simulation results show that the proposed algorithm significantly improves the errorcorrection performance of BPL decoding for medium and long codes. It is more than 0.25 d B better than the state-of-the-art BPL decoding at a block error rate(BLER) of 10^(-5), and outperforms CA-SCL decoding in the low signal-to-noise(SNR) region for(1024, 0.5)polar codes. 展开更多
关键词 belief propagation list(BPL)decoding bit-flipping polar codes segmented CRC
下载PDF
The Application of Nicotiana benthamiana as a Transient Expression Host to Clone the Coding Sequences of Plant Genes
18
作者 Jianzhong Huang Peng Jia +3 位作者 Xiaoju Zhong Xiuying Guan Hongbin Zhang Honglei Ruan 《American Journal of Molecular Biology》 CAS 2024年第2期54-65,共12页
Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using co... Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes. 展开更多
关键词 coding Sequence Genomic Sequence Nicotiana benthamiana Plant Genes
下载PDF
Polar codes based OFDM-PLC systems in the presence of impulsive noise
19
作者 周玉 LI Yue +4 位作者 ZHAO Shuangshuang GAO Fan ZHOU Chao MU Zhuowen CHEN Rui 《High Technology Letters》 EI CAS 2024年第2期188-198,共11页
Power line communication(PLC)has the potential to become the preferred technique for providing broadband communication to homes and offices with advantage of eliminating the need for new wiring infrastructure and redu... Power line communication(PLC)has the potential to become the preferred technique for providing broadband communication to homes and offices with advantage of eliminating the need for new wiring infrastructure and reducing the cost.But it suffers from the impulsive noise because it introduces significant time variance into the power line channel.In this paper,a polar codes based orthogonal frequency division multiplexing(OFDM)PLC system is proposed to deal with the impulsive noise and thereby improve the transmission performance.Firstly,the impulsive noise is modelled with a multi-damped sine function by analyzing the time behavior of impulse events.Then the polar codes are used to combat the impulsive noise of PLC channel,and a low complexity bit-flipping decoding method based on CRC-aided successive cancellation list(CA-SCL)decoding algorithm is proposed.Simulations evaluate the proposed decoding algorithm and the results validate the suggested polar codes based OFDM-PLC scheme which can improve the BER performance of PLC with impulsive interference. 展开更多
关键词 orthogonal frequency division multiplexing(OFDM) polar code impulsivenoise power line communication(PLC) bit-flipping
下载PDF
Recent Advances in Video Coding for Machines Standard and Technologies
20
作者 ZHANG Qiang MEI Junjun +3 位作者 GUAN Tao SUN Zhewen ZHANG Zixiang YU Li 《ZTE Communications》 2024年第1期62-76,共15页
To improve the performance of video compression for machine vision analysis tasks,a video coding for machines(VCM)standard working group was established to promote standardization procedures.In this paper,recent advan... To improve the performance of video compression for machine vision analysis tasks,a video coding for machines(VCM)standard working group was established to promote standardization procedures.In this paper,recent advances in video coding for machine standards are presented and comprehensive introductions to the use cases,requirements,evaluation frameworks and corresponding metrics of the VCM standard are given.Then the existing methods are presented,introducing the existing proposals by category and the research progress of the latest VCM conference.Finally,we give conclusions. 展开更多
关键词 video coding for machines VCM video compression
下载PDF
上一页 1 2 147 下一页 到第
使用帮助 返回顶部