期刊文献+
共找到3,724篇文章
< 1 2 187 >
每页显示 20 50 100
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation 被引量:1
1
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
下载PDF
Efficient unequal error protection for online fountain codes 被引量:1
2
作者 SHI Pengcheng WANG Zhenyong +1 位作者 LI Dezhi LYU Haibo 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第2期286-293,共8页
In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in... In this paper,an efficient unequal error protection(UEP)scheme for online fountain codes is proposed.In the buildup phase,the traversing-selection strategy is proposed to select the most important symbols(MIS).Then,in the completion phase,the weighted-selection strategy is applied to provide low overhead.The performance of the proposed scheme is analyzed and compared with the existing UEP online fountain scheme.Simulation results show that in terms of MIS and the least important symbols(LIS),when the bit error ratio is 10-4,the proposed scheme can achieve 85%and 31.58%overhead reduction,respectively. 展开更多
关键词 online fountain code random graph unequal error protection(UEP) rateless code
下载PDF
Taxonomic Status of Three Recently Proposed Species of the Genus Kurixalus(Anura,Rhacophoridae),with Discussion on the ZooBank Registrations for Electronical Publication 被引量:1
3
作者 Zhitong LYU Maoliang LI +5 位作者 Guanqi WANG Gang LIU Min LIU Ke JIANG Dechun JIANG Jiatang LI 《Asian Herpetological Research》 SCIE CSCD 2024年第1期31-40,共10页
In the present study,we propose the synonymization of Kurixalus silvaenaias with Kurixalus qionglaiensis.This conclusion is based on morphological examination and phylogenetic analysis of a series of newly collected s... In the present study,we propose the synonymization of Kurixalus silvaenaias with Kurixalus qionglaiensis.This conclusion is based on morphological examination and phylogenetic analysis of a series of newly collected specimens,as well as the type series of both nomenclatures.The publication dates of the two species were determined according to the related articles of the International Code of Zoological Nomenclature.Of note,the ZooBank registrations for both species are invalid.Consequently,the publication of K.silvaenaias does not qualify as a published work and the correct publication date of K.qionglaiensis should be the date on which it was physically printed.Furthermore,based on the results presented in this study and its original description,the proposal of K.inexpectatus is deemed untenable and should,therefore,be considered a junior synonym of K.idiootocus.We further provide suggestions for the authors,editors,and publishers who are working on taxonomic publications,as well as for ZooBank to improve the registering service. 展开更多
关键词 Kurixalus inexpectatus Kurixalus qionglaiensis Kurixalus silvaenaias NOMENCLATURE the Code
下载PDF
Software Defect Prediction Method Based on Stable Learning 被引量:1
4
作者 Xin Fan Jingen Mao +3 位作者 Liangjue Lian Li Yu Wei Zheng Yun Ge 《Computers, Materials & Continua》 SCIE EI 2024年第1期65-84,共20页
The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect predicti... The purpose of software defect prediction is to identify defect-prone code modules to assist software quality assurance teams with the appropriate allocation of resources and labor.In previous software defect prediction studies,transfer learning was effective in solving the problem of inconsistent project data distribution.However,target projects often lack sufficient data,which affects the performance of the transfer learning model.In addition,the presence of uncorrelated features between projects can decrease the prediction accuracy of the transfer learning model.To address these problems,this article propose a software defect prediction method based on stable learning(SDP-SL)that combines code visualization techniques and residual networks.This method first transforms code files into code images using code visualization techniques and then constructs a defect prediction model based on these code images.During the model training process,target project data are not required as prior knowledge.Following the principles of stable learning,this paper dynamically adjusted the weights of source project samples to eliminate dependencies between features,thereby capturing the“invariance mechanism”within the data.This approach explores the genuine relationship between code defect features and labels,thereby enhancing defect prediction performance.To evaluate the performance of SDP-SL,this article conducted comparative experiments on 10 open-source projects in the PROMISE dataset.The experimental results demonstrated that in terms of the F-measure,the proposed SDP-SL method outperformed other within-project defect prediction methods by 2.11%-44.03%.In cross-project defect prediction,the SDP-SL method provided an improvement of 5.89%-25.46% in prediction performance compared to other cross-project defect prediction methods.Therefore,SDP-SL can effectively enhance within-and cross-project defect predictions. 展开更多
关键词 Software defect prediction code visualization stable learning sample reweight residual network
下载PDF
Physical Layer Encryption of OFDM-PON Based on Quantum Noise Stream Cipher with Polar Code 被引量:1
5
作者 Xu Yinbo Gao Mingyi +3 位作者 Zhu Huaqing Chen Bowen Xiang Lian Shen Gangxiang 《China Communications》 SCIE CSCD 2024年第3期174-188,共15页
Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast e... Orthogonal frequency division multiplexing passive optical network(OFDM-PON) has superior anti-dispersion property to operate in the C-band of fiber for increased optical power budget. However,the downlink broadcast exposes the physical layer vulnerable to the threat of illegal eavesdropping. Quantum noise stream cipher(QNSC) is a classic physical layer encryption method and well compatible with the OFDM-PON. Meanwhile, it is indispensable to exploit forward error correction(FEC) to control errors in data transmission. However, when QNSC and FEC are jointly coded, the redundant information becomes heavier and thus the code rate of the transmitted signal will be largely reduced. In this work, we propose a physical layer encryption scheme based on polar-code-assisted QNSC. In order to improve the code rate and security of the transmitted signal, we exploit chaotic sequences to yield the redundant bits and utilize the redundant information of the polar code to generate the higher-order encrypted signal in the QNSC scheme with the operation of the interleaver.We experimentally demonstrate the encrypted 16/64-QAM, 16/256-QAM, 16/1024-QAM, 16/4096-QAM QNSC signals transmitted over 30-km standard single mode fiber. For the transmitted 16/4096-QAM QNSC signal, compared with the conventional QNSC method, the proposed method increases the code rate from 0.1 to 0.32 with enhanced security. 展开更多
关键词 physical layer encryption polar code quantum noise stream cipher
下载PDF
Improved Belief Propagation Decoder for LDPC-CRC-Polar Codes with Bit-Freezing
6
作者 Qasim Jan Yin Chao +3 位作者 Pan Zhiwen Muhammad Furqan Zakir Ali You Xiaohu 《China Communications》 SCIE CSCD 2024年第7期135-148,共14页
Though belief propagation bit-flip(BPBF)decoding improves the error correction performance of polar codes,it uses the exhaustive flips method to achieve the error correction performance of CA-SCL decoding,thus resulti... Though belief propagation bit-flip(BPBF)decoding improves the error correction performance of polar codes,it uses the exhaustive flips method to achieve the error correction performance of CA-SCL decoding,thus resulting in high decoding complexity and latency.To alleviate this issue,we incorporate the LDPC-CRC-Polar coding scheme with BPBF and propose an improved belief propagation decoder for LDPC-CRC-Polar codes with bit-freezing(LDPCCRC-Polar codes BPBFz).The proposed LDPCCRC-Polar codes BPBFz employs the LDPC code to ensure the reliability of the flipping set,i.e.,critical set(CS),and dynamically update it.The modified CS is further utilized for the identification of error-prone bits.The proposed LDPC-CRC-Polar codes BPBFz obtains remarkable error correction performance and is comparable to that of the CA-SCL(L=16)decoder under medium-to-high signal-to-noise ratio(SNR)regions.It gains up to 1.2dB and 0.9dB at a fixed BLER=10-4compared with BP and BPBF(CS-1),respectively.In addition,the proposed LDPC-CRC-Polar codes BPBFz has lower decoding latency compared with CA-SCL and BPBF,i.e.,it is 15 times faster than CA-SCL(L=16)at high SNR regions. 展开更多
关键词 belief propagation bit-flipping concatenated codes LDPC-CRC-Polar codes polar codes
下载PDF
Doped low-density parity-check codes
7
作者 Yong Li Rui Liu +3 位作者 Xianlong Jiao Youqiang Hu Zhen Luo Francis C.M.Lau 《Digital Communications and Networks》 SCIE CSCD 2024年第1期217-226,共10页
In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)codes.The doping component is a short block code in which the information bits are selected from the coded bits of t... In this paper,we propose a doping approach to lower the error floor of Low-Density Parity-Check(LDPC)codes.The doping component is a short block code in which the information bits are selected from the coded bits of the dominant trapping sets of the LDPC code.Accordingly,an algorithm for selecting the information bits of the short code is proposed,and a specific two-stage decoding algorithm is presented.Simulation results demonstrate that the proposed doped LDPC code achieves up to 2.0 dB gain compared with the original LDPC code at a frame error rate of 10^(-6)Furthermore,the proposed design can lower the error floor of original LDPC Codes. 展开更多
关键词 LDPC codes Doped LDPC codes Tanner graph Quadratic residue codes Trapping sets
下载PDF
A New Framework for Software Vulnerability Detection Based on an Advanced Computing
8
作者 Bui Van Cong Cho Do Xuan 《Computers, Materials & Continua》 SCIE EI 2024年第6期3699-3723,共25页
The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses ... The detection of software vulnerabilities written in C and C++languages takes a lot of attention and interest today.This paper proposes a new framework called DrCSE to improve software vulnerability detection.It uses an intelligent computation technique based on the combination of two methods:Rebalancing data and representation learning to analyze and evaluate the code property graph(CPG)of the source code for detecting abnormal behavior of software vulnerabilities.To do that,DrCSE performs a combination of 3 main processing techniques:(i)building the source code feature profiles,(ii)rebalancing data,and(iii)contrastive learning.In which,the method(i)extracts the source code’s features based on the vertices and edges of the CPG.The method of rebalancing data has the function of supporting the training process by balancing the experimental dataset.Finally,contrastive learning techniques learn the important features of the source code by finding and pulling similar ones together while pushing the outliers away.The experiment part of this paper demonstrates the superiority of the DrCSE Framework for detecting source code security vulnerabilities using the Verum dataset.As a result,the method proposed in the article has brought a pretty good performance in all metrics,especially the Precision and Recall scores of 39.35%and 69.07%,respectively,proving the efficiency of the DrCSE Framework.It performs better than other approaches,with a 5%boost in Precision and a 5%boost in Recall.Overall,this is considered the best research result for the software vulnerability detection problem using the Verum dataset according to our survey to date. 展开更多
关键词 Source code vulnerability source code vulnerability detection code property graph feature profile contrastive learning data rebalancing
下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
9
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
下载PDF
A GAN-EfficientNet-Based Traceability Method for Malicious Code Variant Families
10
作者 Li Li Qing Zhang Youran Kong 《Computers, Materials & Continua》 SCIE EI 2024年第7期801-818,共18页
Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families ... Due to the diversity and unpredictability of changes in malicious code,studying the traceability of variant families remains challenging.In this paper,we propose a GAN-EfficientNetV2-based method for tracing families of malicious code variants.This method leverages the similarity in layouts and textures between images of malicious code variants from the same source and their original family of malicious code images.The method includes a lightweight classifier and a simulator.The classifier utilizes the enhanced EfficientNetV2 to categorize malicious code images and can be easily deployed on mobile,embedded,and other devices.The simulator utilizes an enhanced generative adversarial network to simulate different variants of malicious code and generates datasets to validate the model’s performance.This process helps identify model vulnerabilities and security risks,facilitating model enhancement and development.The classifier achieves 98.61%and 97.59%accuracy on the MMCC dataset and Malevis dataset,respectively.The simulator’s generated image of malicious code variants has an FID value of 155.44 and an IS value of 1.72±0.42.The classifier’s accuracy for tracing the family of malicious code variants is as high as 90.29%,surpassing that of mainstream neural network models.This meets the current demand for high generalization and anti-obfuscation abilities in malicious code classification models due to the rapid evolution of malicious code. 展开更多
关键词 Malicious code variant traceability feature reuse lightweight neural networks code visualization attention mechanism
下载PDF
Design and implementation of code acquisition using sparse Fourier transform
11
作者 ZHANG Chen WANG Jian +1 位作者 FAN Guangteng TIAN Shiwei 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第5期1063-1072,共10页
Code acquisition is the kernel operation for signal synchronization in the spread-spectrum receiver.To reduce the computational complexity and latency of code acquisition,this paper proposes an efficient scheme employ... Code acquisition is the kernel operation for signal synchronization in the spread-spectrum receiver.To reduce the computational complexity and latency of code acquisition,this paper proposes an efficient scheme employing sparse Fourier transform(SFT)and the relevant hardware architecture for field programmable gate array(FPGA)and application-specific integrated circuit(ASIC)implementation.Efforts are made at both the algorithmic level and the implementation level to enable merged searching of code phase and Doppler frequency without incurring massive hardware expenditure.Compared with the existing code acquisition approaches,it is shown from theoretical analysis and experimental results that the proposed design can shorten processing latency and reduce hardware complexity without degrading the acquisition probability. 展开更多
关键词 code acquisition hardware structure sparse Fourier transform(SFT) code phase estimation Doppler frequency estimation
下载PDF
Parallel Implementation of the CCSDS Turbo Decoder on GPU
12
作者 Liu Zhanxian Liu Rongke +3 位作者 Zhang Haijun Wang Ning Sun Lei Wang Jianquan 《China Communications》 SCIE CSCD 2024年第10期70-77,共8页
This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Syste... This paper presents a software turbo decoder on graphics processing units(GPU).Unlike previous works,the proposed decoding architecture for turbo codes mainly focuses on the Consultative Committee for Space Data Systems(CCSDS)standard.However,the information frame lengths of the CCSDS turbo codes are not suitable for flexible sub-frame parallelism design.To mitigate this issue,we propose a padding method that inserts several bits before the information frame header.To obtain low-latency performance and high resource utilization,two-level intra-frame parallelisms and an efficient data structure are considered.The presented Max-Log-Map decoder can be adopted to decode the Long Term Evolution(LTE)turbo codes with only small modifications.The proposed CCSDS turbo decoder at 10 iterations on NVIDIA RTX3070 achieves about 150 Mbps and 50Mbps throughputs for the code rates 1/6 and 1/2,respectively. 展开更多
关键词 CCSDS CUDA GPU parallel decoding turbo codes
下载PDF
Focus control of wide-angle metalens based on digitally encoded metasurface
13
作者 Yi Chen Simeng Zhang +7 位作者 Ying Tian Chenxia Li Wenlong Huang Yixin Liu Yongxing Jin Bo Fang Zhi Hong Xufeng Jing 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第8期26-41,共16页
Based on the principle of super-symmetric lens with quadratic phase gradient transformation, combined with the principle of digital coding of metasurface, we propose a wide-angle coded metalens for focusing control in... Based on the principle of super-symmetric lens with quadratic phase gradient transformation, combined with the principle of digital coding of metasurface, we propose a wide-angle coded metalens for focusing control in two-dimensional space. This metalens achieves focus shift in the x-direction by changing the oblique incidence angle of the incident wave,and focus control in the y-direction by combining with the convolution principle of the digitally coded metasurface to achieve flexible control of light focusing in the two-dimensional plane. The metasurface unit is mainly composed of threelayer of metal structure and two layers of medium, and the transmission phase is obtained by changing the middle layer of metal structure, which in turn obtains the required phase distribution of the metalens. The design of the metalens realizes the function of the lens with a large viewing angle at the x-polarized incidence, and realizes two-dimensional focus control. Experimentally, we prepared the designed coding metalens and tested the focus control function of the wide-angle coding metalens. The experimental results are in good agreement with the design results. 展开更多
关键词 metasurface metalens WIDE-ANGLE CODING
下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
14
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
下载PDF
Energy-Efficient Implementation of BCD to Excess-3 Code Converter for Nano-Communication Using QCA Technology
15
作者 Nuriddin Safoev Angshuman Khan +1 位作者 Khudoykulov Zarif Turakulovich Rajeev Arya 《China Communications》 SCIE CSCD 2024年第6期103-111,共9页
Code converters are essential in digital nano communication;therefore,a low-complexity optimal QCA layout for a BCD to Excess-3 code converter has been proposed in this paper.A QCA clockphase-based design technique wa... Code converters are essential in digital nano communication;therefore,a low-complexity optimal QCA layout for a BCD to Excess-3 code converter has been proposed in this paper.A QCA clockphase-based design technique was adopted to investigate integration with other complicated circuits.Using a unique XOR gate,the recommended circuit’s cell complexity has been decreased.The findings produced using the QCADesigner-2.0.3,a reliable simulation tool,prove the effectiveness of the current structure over earlier designs by considering the number of cells deployed,the area occupied,and the latency as design metrics.In addition,the popular tool QCAPro was used to estimate the energy dissipation of the proposed design.The proposed technique reduces the occupied space by∼40%,improves cell complexity by∼20%,and reduces energy dissipation by∼1.8 times(atγ=1.5EK)compared to the current scalable designs.This paper also studied the suggested structure’s energy dissipation and compared it to existing works for a better performance evaluation. 展开更多
关键词 BCD code converter Excess-3 nano communication QCA circuits
下载PDF
Blind Recognition of Non-Binary LDPC Codes Based on Ant Colony Optimization
16
作者 Guan Mengsheng Gao Wanting +2 位作者 Chen Qi Zhu Min Bai Baoming 《China Communications》 SCIE CSCD 2024年第10期59-69,共11页
This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Sp... This paper introduces a novel blind recognition of non-binary low-density parity-check(LDPC)codes without a candidate set,using ant colony optimization(ACO)algorithm over additive white Gaussian noise(AWGN)channels.Specifically,the scheme that effectively combines the ACO algorithm and the non-binary elements over finite fields is proposed.Furthermore,an improved,simplified elitist ACO algorithm based on soft decision reliability is introduced to recognize the parity-check matrix over noisy channels.Simulation results show that the recognition rate continuously increases with an increased signalto-noise ratio(SNR)over the AWGN channel. 展开更多
关键词 ACO blind recognition non-binary LDPC codes open-set
下载PDF
An Encode-and CRT-Based Scalability Scheme for Optimizing Transmission in Blockchain
17
作者 Qianqi Sun Fenhua Bai 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1733-1754,共22页
Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened com... Blockchain technology has witnessed a burgeoning integration into diverse realms of economic and societal development.Nevertheless,scalability challenges,characterized by diminished broadcast efficiency,heightened communication overhead,and escalated storage costs,have significantly constrained the broad-scale application of blockchain.This paper introduces a novel Encode-and CRT-based Scalability Scheme(ECSS),meticulously refined to enhance both block broadcasting and storage.Primarily,ECSS categorizes nodes into distinct domains,thereby reducing the network diameter and augmenting transmission efficiency.Secondly,ECSS streamlines block transmission through a compact block protocol and robust RS coding,which not only reduces the size of broadcasted blocks but also ensures transmission reliability.Finally,ECSS utilizes the Chinese remainder theorem,designating the block body as the compression target and mapping it to multiple modules to achieve efficient storage,thereby alleviating the storage burdens on nodes.To evaluate ECSS’s performance,we established an experimental platformand conducted comprehensive assessments.Empirical results demonstrate that ECSS attains superior network scalability and stability,reducing communication overhead by an impressive 72% and total storage costs by a substantial 63.6%. 展开更多
关键词 Blockchain network coding block compression transmission optimization
下载PDF
Reconfigurable mechanism-based metamaterials for ternary-coded elastic wave polarizers and programmable refraction control
18
作者 Zhou HU Zhibo WEI +1 位作者 Yan CHEN Rui ZHU 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI CSCD 2024年第7期1225-1242,共18页
Elastic metamaterials with unusual elastic properties offer unprecedented ways to modulate the polarization and propagation of elastic waves.However,most of them rely on the resonant structural components,and thus are... Elastic metamaterials with unusual elastic properties offer unprecedented ways to modulate the polarization and propagation of elastic waves.However,most of them rely on the resonant structural components,and thus are frequency-dependent and unchangeable.Here,we present a reconfigurable 2D mechanism-based metamaterial which possesses transformable and frequency-independent elastic properties.Based on the proposed mechanism-based metamaterial,interesting functionalities,such as ternarycoded elastic wave polarizer and programmable refraction,are demonstrated.Particularly,unique ternary-coded polarizers,with 1-trit polarization filtering and 2-trit polarization separating of longitudinal and transverse waves,are first achieved.Then,the strong anisotropy of the proposed metamaterial is harnessed to realize positive-negative bi-refraction,only-positive refraction,and only-negative refraction.Finally,the wave functions with detailed microstructures are numerically verified. 展开更多
关键词 elastic metamaterial elastic wave reconfigurable design zero mode ternary code programmable refraction
下载PDF
Layered Coded Cache Placement and Cooperative Delivery with Sharing Links in Satellite-Terrestrial Integrated Networks
19
作者 Gu Shushi Chen Zihan +2 位作者 Wu Yaonan Zhang Qinyu Wang Ye 《China Communications》 SCIE CSCD 2024年第3期217-229,共13页
Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content deliver... Cooperative utilization of multidimensional resources including cache, power and spectrum in satellite-terrestrial integrated networks(STINs) can provide a feasible approach for massive streaming media content delivery over the seamless global coverage area. However, the on-board supportable resources of a single satellite are extremely limited and lack of interaction with others. In this paper, we design a network model with two-layered cache deployment, i.e., satellite layer and ground base station layer, and two types of sharing links, i.e., terrestrial-satellite sharing(TSS) links and inter-satellite sharing(ISS) links, to enhance the capability of cooperative delivery over STINs. Thus, we use rateless codes for the content divided-packet transmission, and derive the total energy efficiency(EE) in the whole transmission procedure, which is defined as the ratio of traffic offloading and energy consumption. We formulate two optimization problems about maximizing EE in different sharing scenarios(only TSS and TSS-ISS),and propose two optimized algorithms to obtain the optimal content placement matrixes, respectively.Simulation results demonstrate that, enabling sharing links with optimized cache placement have more than 2 times improvement of EE performance than other traditional placement schemes. Particularly, TSS-ISS schemes have the higher EE performance than only TSS schemes under the conditions of enough number of satellites and smaller inter-satellite distances. 展开更多
关键词 coded content placement cooperative delivery energy efficiency sharing links STINs
下载PDF
Gray code based gradient-free optimization algorithm for parameterized quantum circuit
20
作者 张安琪 武春辉 赵生妹 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期189-194,共6页
A Gray code based gradient-free optimization(GCO)algorithm is proposed to update the parameters of parameterized quantum circuits(PQCs)in this work.Each parameter of PQCs is encoded as a binary string,named as a gene,... A Gray code based gradient-free optimization(GCO)algorithm is proposed to update the parameters of parameterized quantum circuits(PQCs)in this work.Each parameter of PQCs is encoded as a binary string,named as a gene,and a genetic-based method is adopted to select the offsprings.The individuals in the offspring are decoded in Gray code way to keep Hamming distance,and then are evaluated to obtain the best one with the lowest cost value in each iteration.The algorithm is performed iteratively for all parameters one by one until the cost value satisfies the stop condition or the number of iterations is reached.The GCO algorithm is demonstrated for classification tasks in Iris and MNIST datasets,and their performance are compared by those with the Bayesian optimization algorithm and binary code based optimization algorithm.The simulation results show that the GCO algorithm can reach high accuracies steadily for quantum classification tasks.Importantly,the GCO algorithm has a robust performance in the noise environment. 展开更多
关键词 gradient-free optimization Gray code genetic-based method
下载PDF
上一页 1 2 187 下一页 到第
使用帮助 返回顶部