期刊文献+
共找到214篇文章
< 1 2 11 >
每页显示 20 50 100
Differences in Mean Number of Consonant-Vowel-Consonant Words Decoded between Letter-Sound Readers and Non Letter-Sound Readers
1
作者 Gail M. Wolf 《Open Journal of Nursing》 2014年第6期409-450,共42页
Children’s failure to develop simple word decoding skills in early years is linked to future poor reading, school dropout, and poor health [1] [2]. Letter-sound knowledge is needed for word decoding development;howev... Children’s failure to develop simple word decoding skills in early years is linked to future poor reading, school dropout, and poor health [1] [2]. Letter-sound knowledge is needed for word decoding development;however questions remain on what types of letter-sound knowledge help children decode simple words [3]. This study investigated the differences in mean number of consonant-vowel-consonant (CVC) words decoded between two groups of children, a letter-sound reading group and non letter-sound reading group. Children aged 4 to 6 in both groups, attempted to decode a variety of simple words such as tan, sit, hen, pig, dot, and fun. Analysis determined word decoding differences existed between the two groups. The alternate hypothesis was accepted;the letter-sound reading group had a significantly higher mean in number of consonant-vowel-consonant words decoded compared to the non letter-sound reading group. The study informs the teaching approaches needed to improve early decoding skills showing letter-sound reading ability is an important step for learning to decode simple consonant-vowel-consonant words. 展开更多
关键词 Letter-Sound READING Decoding Automaticity Practicing READING
下载PDF
A Denoiser for Correlated Noise Channel Decoding: Gated-Neural Network
2
作者 Xiao Li Ling Zhao +1 位作者 Zhen Dai Yonggang Lei 《China Communications》 SCIE CSCD 2024年第2期122-128,共7页
This letter proposes a sliced-gated-convolutional neural network with belief propagation(SGCNN-BP) architecture for decoding long codes under correlated noise. The basic idea of SGCNNBP is using Neural Networks(NN) to... This letter proposes a sliced-gated-convolutional neural network with belief propagation(SGCNN-BP) architecture for decoding long codes under correlated noise. The basic idea of SGCNNBP is using Neural Networks(NN) to transform the correlated noise into white noise, setting up the optimal condition for a standard BP decoder that takes the output from the NN. A gate-controlled neuron is used to regulate information flow and an optional operation—slicing is adopted to reduce parameters and lower training complexity. Simulation results show that SGCNN-BP has much better performance(with the largest gap being 5dB improvement) than a single BP decoder and achieves a nearly 1dB improvement compared to Fully Convolutional Networks(FCN). 展开更多
关键词 belief propagation channel decoding correlated noise neural network
下载PDF
A Video Captioning Method by Semantic Topic-Guided Generation
3
作者 Ou Ye Xinli Wei +2 位作者 Zhenhua Yu Yan Fu Ying Yang 《Computers, Materials & Continua》 SCIE EI 2024年第1期1071-1093,共23页
In the video captioning methods based on an encoder-decoder,limited visual features are extracted by an encoder,and a natural sentence of the video content is generated using a decoder.However,this kind ofmethod is de... In the video captioning methods based on an encoder-decoder,limited visual features are extracted by an encoder,and a natural sentence of the video content is generated using a decoder.However,this kind ofmethod is dependent on a single video input source and few visual labels,and there is a problem with semantic alignment between video contents and generated natural sentences,which are not suitable for accurately comprehending and describing the video contents.To address this issue,this paper proposes a video captioning method by semantic topic-guided generation.First,a 3D convolutional neural network is utilized to extract the spatiotemporal features of videos during the encoding.Then,the semantic topics of video data are extracted using the visual labels retrieved from similar video data.In the decoding,a decoder is constructed by combining a novel Enhance-TopK sampling algorithm with a Generative Pre-trained Transformer-2 deep neural network,which decreases the influence of“deviation”in the semantic mapping process between videos and texts by jointly decoding a baseline and semantic topics of video contents.During this process,the designed Enhance-TopK sampling algorithm can alleviate a long-tail problem by dynamically adjusting the probability distribution of the predicted words.Finally,the experiments are conducted on two publicly used Microsoft Research Video Description andMicrosoft Research-Video to Text datasets.The experimental results demonstrate that the proposed method outperforms several state-of-art approaches.Specifically,the performance indicators Bilingual Evaluation Understudy,Metric for Evaluation of Translation with Explicit Ordering,Recall Oriented Understudy for Gisting Evaluation-longest common subsequence,and Consensus-based Image Description Evaluation of the proposed method are improved by 1.2%,0.1%,0.3%,and 2.4% on the Microsoft Research Video Description dataset,and 0.1%,1.0%,0.1%,and 2.8% on the Microsoft Research-Video to Text dataset,respectively,compared with the existing video captioning methods.As a result,the proposed method can generate video captioning that is more closely aligned with human natural language expression habits. 展开更多
关键词 Video captioning encoder-decoder semantic topic jointly decoding Enhance-TopK sampling
下载PDF
Improved Segmented Belief Propagation List Decoding for Polar Codes with Bit-Flipping
4
作者 Mao Yinyou Yang Dong +1 位作者 Liu Xingcheng Zou En 《China Communications》 SCIE CSCD 2024年第3期19-36,共18页
Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved s... Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved segmented belief propagation list decoding based on bit flipping(SBPL-BF) is proposed. On the one hand, the proposed algorithm makes use of the cooperative characteristic in BPL decoding such that the codeword is decoded in different BP decoders. Based on this characteristic, the unreliable bits for flipping could be split into multiple subblocks and could be flipped in different decoders simultaneously. On the other hand, a more flexible and effective processing strategy for the priori information of the unfrozen bits that do not need to be flipped is designed to improve the decoding convergence. In addition, this is the first proposal in BPL decoding which jointly optimizes the bit flipping of the information bits and the code bits. In particular, for bit flipping of the code bits, a H-matrix aided bit-flipping algorithm is designed to enhance the accuracy in identifying erroneous code bits. The simulation results show that the proposed algorithm significantly improves the errorcorrection performance of BPL decoding for medium and long codes. It is more than 0.25 d B better than the state-of-the-art BPL decoding at a block error rate(BLER) of 10^(-5), and outperforms CA-SCL decoding in the low signal-to-noise(SNR) region for(1024, 0.5)polar codes. 展开更多
关键词 belief propagation list(BPL)decoding bit-flipping polar codes segmented CRC
下载PDF
基于信道短化和圆球译码的水声通信迭代序列检测
5
作者 瞿逢重 方浩 +3 位作者 涂星滨 魏艳 章旻昊 杨劭坚 《哈尔滨工程大学学报(英文版)》 CSCD 2024年第1期238-246,共9页
The demand for high-data-rate underwater acoustic communications(UACs)in marine development is increasing;however,severe multipaths make demodulation a challenge.The decision feedback equalizer(DFE)is one of the most ... The demand for high-data-rate underwater acoustic communications(UACs)in marine development is increasing;however,severe multipaths make demodulation a challenge.The decision feedback equalizer(DFE)is one of the most popular equalizers in UAC;however,it is not the optimal algorithm.Although maximum likelihood sequence estimation(MLSE)is the optimal algorithm,its complexity increases exponentially with the number of channel taps,making it challenging to apply to UAC.Therefore,this paper proposes a complexity-reduced MLSE to improve the bit error rate(BER)performance in multipath channels.In the proposed algorithm,the original channel is first shortened using a channel-shortening method,and several dominant channel taps are selected for MLSE.Subsequently,sphere decoding(SD)is performed in the following MLSE.Iterations are applied to eliminate inter-symbol interference caused by weak channel taps.The simulation and sea experiment demonstrate the superiority of the proposed algorithm.The simulation results show that channel shortening combined with SD can drastically reduce computational complexity,and iterative SD performs better than DFE based on recursive least squares(RLS-DFE),DFE based on improved proportionate normalized least mean squares(IPNLMS-DFE),and channel estimation-based DFE(CE-DFE).Moreover,the sea experimental results at Zhairuoshan Island in Zhoushan show that the proposed receiver scheme has improved BER performance over RLSDFE,IPNLMS-DFE,and CE-DFE.Compared with the RLS-DFE,the BER,after five iterations,is reduced from 0.0076 to 0.0037 in the 8–12 k Hz band and from 0.1516 to 0.1145 in the 13–17 k Hz band at a distance of 2000 m.Thus,the proposed algorithm makes it possible to apply MLSE in UAC in practical scenarios. 展开更多
关键词 Underwater acoustic communications(UACs) Maximum likelihood sequence estimation(MLSE) Channel shortening Sphere decoding(SD) Iterative detection
下载PDF
Deep Learning Aided SCL Decoding of Polar Codes with Shifted-Pruning 被引量:1
6
作者 Yang Lu Mingmin Zhao +2 位作者 Ming Lei Chan Wang Minjian Zhao 《China Communications》 SCIE CSCD 2023年第1期153-170,共18页
Recently,a generalized successive cancellation list(SCL)decoder implemented with shiftedpruning(SP)scheme,namely the SCL-SP-ωdecoder,is presented for polar codes,which is able to shift the pruning window at mostωtim... Recently,a generalized successive cancellation list(SCL)decoder implemented with shiftedpruning(SP)scheme,namely the SCL-SP-ωdecoder,is presented for polar codes,which is able to shift the pruning window at mostωtimes during each SCL re-decoding attempt to prevent the correct path from being eliminated.The candidate positions for applying the SP scheme are selected by a shifting metric based on the probability that the elimination occurs.However,the number of exponential/logarithm operations involved in the SCL-SP-ωdecoder grows linearly with the number of information bits and list size,which leads to high computational complexity.In this paper,we present a detailed analysis of the SCL-SP-ωdecoder in terms of the decoding performance and complexity,which unveils that the choice of the shifting metric is essential for improving the decoding performance and reducing the re-decoding attempts simultaneously.Then,we introduce a simplified metric derived from the path metric(PM)domain,and a custom-tailored deep learning(DL)network is further designed to enhance the efficiency of the proposed simplified metric.The proposed metrics are both free of transcendental functions and hence,are more hardware-friendly than the existing metrics.Simulation results show that the proposed DL-aided metric provides the best error correction performance as comparison with the state of the art. 展开更多
关键词 polar codes successive cancellation list decoding deep learning shifted-pruning path metric
下载PDF
A Golden Decade of Polar Codes:From Basic Principle to 5G Applications 被引量:1
7
作者 Kai Niu Ping Zhang +2 位作者 Jincheng Dai Zhongwei Si Chao Dong 《China Communications》 SCIE CSCD 2023年第2期94-121,共28页
After the pursuit of seventy years,the invention of polar codes indicates that we have found the first capacity-achieving coding with low complexity construction and decoding,which is the great breakthrough of the cod... After the pursuit of seventy years,the invention of polar codes indicates that we have found the first capacity-achieving coding with low complexity construction and decoding,which is the great breakthrough of the coding theory in the past two decades.In this survey,we retrospect the history of polar codes and summarize the advancement in the past ten years.First,the primary principle of channel polarization is investigated such that the basic construction,coding method and the classic successive cancellation(SC)decoding are reviewed.Second,in order to improve the performance of the finite code length,we introduce the guiding principle and conclude five design criteria for the construction,design and implementation of the polar code in the practical communication system based on the exemplar schemes in the literature.Especially,we explain the design principle behind the concatenated coding and rate matching of polar codes in 5G wireless system.Furthermore,the improved SC decoding algorithms,such as SC list(SCL)decoding and SC stack(SCS)decoding etc.,are investigated and compared.Finally,the research prospects of polar codes for the future 6G communication system are explored,including the optimization of short polar codes,coding construction in fading channels,polar coded modulation and HARQ,and the polar coded transmission,namely polar processing.Predictably,as a new coding methodology,polar codes will shine a light on communication theory and unveil a revolution in transmission technology. 展开更多
关键词 polar codes channel polarization successive cancellation decoding polar coded modulation polar processing
下载PDF
Belief Propagation List Decoding for Polar Codes:Performance Analysis and Software Implementation on GPU
8
作者 Zhanxian Liu Wei Li +3 位作者 Lei Sun Wei Li Jianquan Wang Haijun Zhang 《China Communications》 SCIE CSCD 2023年第9期115-126,共12页
Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)de... Belief propagation(BP)decoding outputs soft information and can be naturally used in iterative receivers.BP list(BPL)decoding provides comparable error-correction performance to the successive cancellation list(SCL)decoding.In this paper,we firstly introduce an enhanced code construction scheme for BPL decoding to improve its errorcorrection capability.Then,a GPU-based BPL decoder with adoption of the new code construction is presented.Finally,the proposed BPL decoder is tested on NVIDIA RTX3070 and GTX1060.Experimental results show that the presented BPL decoder with early termination criterion achieves above 1 Gbps throughput on RTX3070 for the code(1024,512)with 32 lists under good channel conditions. 展开更多
关键词 polar code belief propagation SIMT list decoding GPU
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
9
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text ENCRYPTION matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
Sparse Rev-Shift Coded Modulation with Novel Overhead Bound
10
作者 Mingjun Dai Wanru Li +2 位作者 Chanting Zhang Xiaohui Lin Bin Chen 《China Communications》 SCIE CSCD 2023年第10期17-29,共13页
To provide reliability in distributed systems,combination property(CP)is desired,where k original packets are encoded into n≥k packets and arbitrary k are sufficient to reconstruct all the original packets.Shift-and-... To provide reliability in distributed systems,combination property(CP)is desired,where k original packets are encoded into n≥k packets and arbitrary k are sufficient to reconstruct all the original packets.Shift-and-add(SA)encoding combined with zigzag decoding(ZD)obtains the CP-ZD,which is promising to reap low computational complexity in the encoding/decoding process of these systems.As densely coded modulation is difficult to achieve CP-ZD,research attentions are paid to sparse coded modulation.The drawback of existing sparse CP-ZD coded modulation lies in high overhead,especially in widely deployed setting m<k,where m≜n−k.For this scenario,namely,m<k,a sparse reverseorder shift(Rev-Shift)CP-ZD coded modulation is designed.The proof that Rev-Shift possesses CP-ZD is provided.A lower bound for the overhead,as far as we know is the first for sparse CP-ZD coded modulation,is derived.The bound is found tight in certain scenarios,which shows the code optimality.Extensive numerical studies show that compared to existing sparse CP-ZD coded modulation,the overhead of Rev-Shift reduces significantly,and the derived lower bound is tight when k or m approaches 0. 展开更多
关键词 distributed system shift-and-add zigzag decoding sparse coded modulation
下载PDF
Construction of Protograph LDPC Codes Based on the Convolution Neural Network
11
作者 Zhiyuan Xiao Liguang Li +1 位作者 Jin Xu Jin Sha 《China Communications》 SCIE CSCD 2023年第5期84-92,共9页
This paper presents an intelligent protograph construction algorithm.Protograph LDPC codes have shown excellent error correction performance and play an important role in wireless communications.Random search or manua... This paper presents an intelligent protograph construction algorithm.Protograph LDPC codes have shown excellent error correction performance and play an important role in wireless communications.Random search or manual construction are often used to obtain a good protograph,but the efficiency is not high enough and many experience and skills are needed.In this paper,a fast searching algorithm is proposed using the convolution neural network to predict the iterative decoding thresholds of protograph LDPC codes effectively.A special input data transformation rule is applied to provide stronger generalization ability.The proposed algorithm converges faster than other algorithms.The iterative decoding threshold of the constructed protograph surpasses greedy algorithm and random search by about 0.53 dB and 0.93 dB respectively under 100 times of density evolution.Simulation results show that quasi-cyclic LDPC(QC-LDPC)codes constructed from the proposed algorithm have competitive performance compared to other papers. 展开更多
关键词 LDPC codes protograph codes iterative decoding threshold neural network
下载PDF
Triangular code:Near-optimal linear time fountain code
12
作者 Jalaluddin Qureshi Chuan Heng Foh 《Digital Communications and Networks》 SCIE CSCD 2023年第4期869-878,共10页
In this paper,we propose Triangular Code(TC),a new class of fountain code with near-zero redundancy and linear encoding and decoding computational complexities of OeLklog kT,where k is the packet batch size and L is t... In this paper,we propose Triangular Code(TC),a new class of fountain code with near-zero redundancy and linear encoding and decoding computational complexities of OeLklog kT,where k is the packet batch size and L is the packet data length.Different from previous works where the optimal performance of codes has been shown under asymptotic assumption,TC enjoys near-zero redundancy even under non-asymptotic settings for smallmoderate number of packets.These features make TC suitable for practical implementation in batteryconstrained devices in IoT,D2D and M2M network paradigms to achieve scalable reliability,and minimize latency due to its low decoding delay.TC is a non-linear code,which is encoded using the simple shift and XOR addition operations,and decoded using the simple back-substitution algorithm.Although it is nonlinear code at the packet level,it remains linear code when atomized at the bit level.We use this property to show that the backsubstitution decoder of TC is equivalent to the Belief Propagation(BP)decoder of LT code.Therefore,TC can benefit from rich prolific literature published on LT code,to design efficient code for various applications.Despite the equivalency between the decoders of TC and LT code,we show that compared to state-of-the-art optimized LT code,TC reduces the redundancy of LT code by 68%-99% for k reaching 1024. 展开更多
关键词 LT code DECODER Computational complexity Green computing Network coding
下载PDF
List-Serial Pipelined Hardware Architecture for SCL Decoding of Polar Codes
13
作者 Zhongxiu Feng Cong Niu +3 位作者 Zhengyu Zhang Jiaxi Zhou Daiming Qu Tao Jiang 《China Communications》 SCIE CSCD 2023年第3期175-184,共10页
For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from h... For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss. 展开更多
关键词 successive cancellation list decoding po-lar codes hardware implementation pipelined archi-tecture
下载PDF
Research on dual-command operation path optimization based on Flying-V warehouse layout
14
作者 刘建胜 YUAN Bin +1 位作者 YANG Zan ZHONG RAY Y 《High Technology Letters》 EI CAS 2023年第4期388-396,共9页
To enhance the efficiency of warehouse order management,this study investigates a dual-com-mand operation mode in the Flying-V non-traditional warehouse layout.Three dual-command opera-tion strategies are designed,and... To enhance the efficiency of warehouse order management,this study investigates a dual-com-mand operation mode in the Flying-V non-traditional warehouse layout.Three dual-command opera-tion strategies are designed,and a dual-command operation path optimization model is established with the shortest path as the optimization goal.Furthermore,a genetic algorithm based on a dynamic decoding strategy is proposed.Simulation results demonstrate that the Flying-V layout warehouse management and access cooperation operation can reduce the operation time by an average of 25%-35%compared with the single access operation path,and by an average of 13%-23%compared with the‘deposit first and then pick’operation path.These findings provide evidence for the effec-tiveness of the optimization model and algorithm. 展开更多
关键词 Flying-V access collaboration path optimization dynamic decoding genetic al-gorithm
下载PDF
Design of two-dimensional spatially coupled LDPC codes for combating burst erasures
15
作者 刘洋 HE Jinglin +1 位作者 WANG Bin ZHANG Yuzhi 《High Technology Letters》 EI CAS 2023年第3期288-294,共7页
Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding proc... Spatially-coupled low-density parity-check(SC-LDPC)codes are prominent candidates for fu-ture communication standards due to their‘threshold saturation’properties.However,when facing burst erasures,the decoding process will stop and the decoding performances will dramatically de-grade.To improve the ability of burst erasure corrections,this paper proposes a two-dimensional SC-LDPC(2D-SC-LDPC)codes constructed by parallelly connecting two asymmetric SC-LDPC coupled chains for resistance to burst erasures.Density evolution algorithm is presented to evaluate the as-ymptotic performances against burst erasures,by which the maximum correctable burst erasure length can be computed.The analysis results show that the maximum correctable burst erasure lengths of the proposed 2D-SC-LDPC codes are much larger than the SC-LDPC codes and the asym-metric SC-LDPC codes.Finite-length performance simulation results of the 2D-SC-LDPC codes over the burst erasure channel confirm the excellent asymptotic performances. 展开更多
关键词 burst erasure channel SC-LDPC code density evolution decoding performance
下载PDF
Unifying Convolution and Transformer Decoder for Textile Fiber Identification
16
作者 许罗力 李粉英 常姗 《Journal of Donghua University(English Edition)》 CAS 2023年第4期357-363,共7页
At present,convolutional neural networks(CNNs)and transformers surpass humans in many situations(such as face recognition and object classification),but do not work well in identifying fibers in textile surface images... At present,convolutional neural networks(CNNs)and transformers surpass humans in many situations(such as face recognition and object classification),but do not work well in identifying fibers in textile surface images.Hence,this paper proposes an architecture named FiberCT which takes advantages of the feature extraction capability of CNNs and the long-range modeling capability of transformer decoders to adaptively extract multiple types of fiber features.Firstly,the convolution module extracts fiber features from the input textile surface images.Secondly,these features are sent into the transformer decoder module where label embeddings are compared with the features of each type of fibers through multi-head cross-attention and the desired features are pooled adaptively.Finally,an asymmetric loss further purifies the extracted fiber representations.Experiments show that FiberCT can more effectively extract the representations of various types of fibers and improve fiber identification accuracy than state-of-the-art multi-label classification approaches. 展开更多
关键词 non-destructive textile fiber identification transformer decoder asymmetric loss
下载PDF
Interactive Approaches in ESL Teaching and Its Application
17
作者 WANG Jialing 《Sino-US English Teaching》 2023年第3期85-89,共5页
Traditionally,second language reading was considered as a simple passive decoding process.However,researchers began to study the issue from the psycholinguistic perspectives,and proposed the interactive approach to ES... Traditionally,second language reading was considered as a simple passive decoding process.However,researchers began to study the issue from the psycholinguistic perspectives,and proposed the interactive approach to ESL reading.In this thesis,a brief review is made concerning the related theories.Some strategies are suggested to improve learners’ability in top-down and bottom-up models.Finally,it is pointed out that these two models interact in the reading process,and therefore the teaching methods should also be applied in good combination to improve reading. 展开更多
关键词 READING interactive approach TEXT DECODING
下载PDF
The Dissemination of Chinese Tea Culture Based on Encoding/Decoding Theory
18
作者 TAN Hao XIANYU Jing 《Journalism and Mass Communication》 2023年第1期45-49,共5页
Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its ... Tea has a history of thousands of years in China and it plays an important role in the working-life and daily life of people.Tea culture rich in connotation is an important part of Chinese traditional culture,and its existence and development are also of great significance to the diversified development of world culture.Based on Stuart Hall’s encoding/decoding theory,this paper analyzes the problems in the spreading of Chinese tea in and out of the country and provides solutions from the perspective of encoding,communication,and decoding.It is expected to provide a reference for the domestic and international dissemination of Chinese tea culture. 展开更多
关键词 tea culture ENCODING DECODING COMMUNICATION
下载PDF
The Dissemination of Intangible Cultural Heritage Along Beijing-Hangzhou Canal Based on Encoding/Decoding Theory
19
作者 TAN Hao XIANYU Jing 《Cultural and Religious Studies》 2023年第5期241-245,共5页
The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can he... The Beijing-Hangzhou Grand Canal carries a wealth of Chinese cultural symbols,showing the lifestyle and wisdom of working people through ages.The preservation and inheritance of its intangible cultural heritage can help to evoke cultural memories and cultural identification of the Canal and build cultural confidence.This paper applies Stuart Hall’s encoding/decoding theory to analyze the dissemination of intangible heritage tourism culture.On the basis of a practical study of the villages along the Beijing-Hangzhou Grand Canal,this paper analyses the problems in the transmission of its intangible cultural heritage and proposes specific methods to solve them in four processes,encoding,decoding,communication,and secondary encoding,in order to propose references for the transmission of intangible heritage culture at home and abroad. 展开更多
关键词 DISSEMINATION ENCODING DECODING intangible cultural heritage
下载PDF
Cooperative Relaying in a Three User Downlink NOMA System Using Dynamic Power Allocation
20
作者 Mwewa Mabumba Simon Tembo Lukumba Phiri 《Semiconductor Science and Information Devices》 2023年第1期26-32,共7页
Non-orthogonal multiple access(NOMA)represents the latest addition to the array of multiple access techniques,enabling simultaneous servicing of multiple users within a singular resource block in terms of time,frequen... Non-orthogonal multiple access(NOMA)represents the latest addition to the array of multiple access techniques,enabling simultaneous servicing of multiple users within a singular resource block in terms of time,frequency,and code.A typical NOMA configuration comprises a base station along with proximate and distant users.The proximity users experience more favorable channel conditions in contrast to distant users,resulting in a compromised performance for the latter due to the less favorable channel conditions.When cooperative communication is integrated with NOMA,the overall system performance,including spectral efficiency and capacity,is further elevated.This study introduces a cooperative NOMA setup in the downlink,involving three users,and employs dynamic power allocation(DPA).Within this framework,User 2 acts as a relay,functioning under the decode-and-forward protocol,forwarding signals to both User 1 and User 3.This arrangement aims to bolster the performance of the user positioned farthest from the base station,who is adversely affected by weaker channel conditions.Theoretical and simulation outcomes reveal enhancements within the system’s performance. 展开更多
关键词 NOMA Cooperative NOMA Decode and forward Dynamic power allocation
下载PDF
上一页 1 2 11 下一页 到第
使用帮助 返回顶部