期刊文献+
共找到448篇文章
< 1 2 23 >
每页显示 20 50 100
Low-Complexity Detection and Decoding Scheme for LDPC-Coded MLC NAND Flash Memory 被引量:1
1
作者 Xusheng Lin Guojun Han +2 位作者 Shijie Ouyang Yanfu Li Yi Fang 《China Communications》 SCIE CSCD 2018年第6期58-67,共10页
With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and... With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and hence causes an increase in the raw bit error rate of data stored in the cells.Recently, low-density parity-check(LDPC)codes have appeared to be a promising solution to combat the interference of MLC NAND flash memory. However, the decoding complexity of the sum-product algorithm(SPA) is extremely high. In this paper, to improve the accuracy of the log likelihood ratio(LLR) information of each bit in each NAND flash memory cell, we adopt a non-uniform detection(N-UD) which uses the average maximum mutual information to determine the value of the soft-decision reference voltages.Furthermore, with an aim to reduce the decoding complexity and improve the decoding performance, we propose a modified soft reliabilitybased iterative majority-logic decoding(MSRBI-MLGD) algorithm, which uses a non-uniform quantizer based on power function to decode LDPC codes. Simulation results show that our design can offer a desirable trade-off between the performance and complexity for high-column-weight LDPC-coded MLC NAND flash memory. 展开更多
关键词 Cell-to-cell interference(CCI) LDPC codes MLC NAND flash memory non-uniform detection(N-UD) modified soft reliability-based iterative majority-logic decoding(MSRBI-MLGD) algorithm
下载PDF
Coding Scheme for Ka-Band Fixed Satellite Communication System 被引量:4
2
作者 王爱华 罗伟雄 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期169-173,共5页
The performance analysis and simulation of coding schemes based on the modeling Ka band fixed satellite channel have been presented. The results indicate that concatenated codes with large inner interleaving depth ha... The performance analysis and simulation of coding schemes based on the modeling Ka band fixed satellite channel have been presented. The results indicate that concatenated codes with large inner interleaving depth have good performance and high spectrum efficiency. The studies also show that simple block interleaving is very effective in combating the slow frequency nonselective fading of Ka band. 展开更多
关键词 Ka band channel model performance simulation coding scheme
下载PDF
A simple algorithm to improve the performance of the WENO scheme on non-uniform grids 被引量:3
3
作者 Wen-Feng Huang Yu-Xin Ren Xiong Jiang 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2018年第1期37-47,共11页
This paper presents a simple approach for improving the performance of the weighted essentially nonoscillatory(WENO) finite volume scheme on non-uniform grids. This technique relies on the reformulation of the fifthor... This paper presents a simple approach for improving the performance of the weighted essentially nonoscillatory(WENO) finite volume scheme on non-uniform grids. This technique relies on the reformulation of the fifthorder WENO-JS(WENO scheme presented by Jiang and Shu in J. Comput. Phys. 126:202–228, 1995) scheme designed on uniform grids in terms of one cell-averaged value and its left and/or right interfacial values of the dependent variable.The effect of grid non-uniformity is taken into consideration by a proper interpolation of the interfacial values. On nonuniform grids, the proposed scheme is much more accurate than the original WENO-JS scheme, which was designed for uniform grids. When the grid is uniform, the resulting scheme reduces to the original WENO-JS scheme. In the meantime,the proposed scheme is computationally much more efficient than the fifth-order WENO scheme designed specifically for the non-uniform grids. A number of numerical test cases are simulated to verify the performance of the present scheme. 展开更多
关键词 WENO scheme non-uniform grids Shock capturing Finite volume methods
下载PDF
VARIABLE NON-UNIFORM QUANTIZED BELIEF PROPAGATION ALGORITHM FOR LDPC DECODING 被引量:2
4
作者 Liu Binbin Bai Dong Mei Shunliang 《Journal of Electronics(China)》 2008年第4期539-543,共5页
Non-uniform quantization for messages in Low-Density Parity-Check(LDPC)decoding canreduce implementation complexity and mitigate performance loss.But the distribution of messagesvaries in the iterative decoding.This l... Non-uniform quantization for messages in Low-Density Parity-Check(LDPC)decoding canreduce implementation complexity and mitigate performance loss.But the distribution of messagesvaries in the iterative decoding.This letter proposes a variable non-uniform quantized Belief Propaga-tion(BP)algorithm.The BP decoding is analyzed by density evolution with Gaussian approximation.Since the probability density of messages can be well approximated by Gaussian distribution,by theunbiased estimation of variance,the distribution of messages can be tracked during the iteration.Thusthe non-uniform quantization scheme can be optimized to minimize the distortion.Simulation resultsshow that the variable non-uniform quantization scheme can achieve better error rate performance andfaster decoding convergence than the conventional non-uniform quantization and uniform quantizationschemes. 展开更多
关键词 Low-Density Parity-Check (LDPC) codes Iterative decoding Belief Propagation (BP) non-uniform quantization
下载PDF
Novel joint encoding/decoding algorithms of fountain codes for underwater acoustic communication 被引量:1
5
作者 Mingshen Liang Jinjue Duan +2 位作者 Danfeng Zhao Jiaxi Si Xiangyu Song 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期772-779,共8页
Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh ma... Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh marine environment. And Luby transform(LT) codes are the first codes fully realizing the digital fountain concept. However, in conventional LT encoding/decoding algorithms, due to the imperfect coverage(IC) of input symbols and short cycles in the generator matrix, stopping sets would occur and terminate the decoding. Thus, the recovery probability is reduced,high coding overhead is required and decoding delay is increased.These issues would be disadvantages while applying LT codes in underwater acoustic communication. Aimed at solving those issues, novel encoding/decoding algorithms are proposed. First,a doping and non-uniform selecting(DNS) encoding algorithm is proposed to solve the IC and the generation of short cycles problems. And this can reduce the probability of stopping sets occur during decoding. Second, a hybrid on the fly Gaussian elimination and belief propagation(OFG-BP) decoding algorithm is designed to reduce the decoding delay and efficiently utilize the information of stopping sets. Comparisons via Monte Carlo simulation confirm that the proposed schemes could achieve better overall decoding performances in comparison with conventional schemes. 展开更多
关键词 underwater acoustic communication(UAC) fountain codes non-uniform encoding hybrid decoding algorithm stopping sets
下载PDF
Lifting Scheme Based SPIHT Still Image Coding
6
作者 沈利军 赵保军 何佩琨 《Journal of Beijing Institute of Technology》 EI CAS 2003年第S1期70-74,共5页
In order to eliminate float-point operations for fast wavelet transform, an integer D9/7 biorthogonal reversible wavelet transform was accomplished by lifting scheme. The lifting scheme based wavelet transform can be ... In order to eliminate float-point operations for fast wavelet transform, an integer D9/7 biorthogonal reversible wavelet transform was accomplished by lifting scheme. The lifting scheme based wavelet transform can be finished by addition and shift simply. It improved the quality of reconstructive image and greatly reduced the computational complexity due to integer operation. It is suitable for real-time image coding on hardware such as DSP. The simulation results show that the lifting scheme based SPIHT is prior to traditional wavelet based SPHIT in quality and complexity. 展开更多
关键词 SPIHT lifting scheme WAVELET image coding
下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
7
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
下载PDF
A CODING SCHEME USING GLOBAL MOTION ESTIMATION FOR AVS P-FRAME
8
作者 Gong Shengrong Guo Li Cui Zhiming 《Journal of Electronics(China)》 2007年第6期815-820,共6页
Block matching has been used for motion estimation and motion compensation in the Au- dio and Video Standard (AVS) for years. While having an acceptable performance in describing mo- tion between frames, it requires q... Block matching has been used for motion estimation and motion compensation in the Au- dio and Video Standard (AVS) for years. While having an acceptable performance in describing mo- tion between frames, it requires quite a few bits to represent the motion vectors. In certain circum- stances, the use of global motion estimation and compensation would perform equally well or even better than the block matching in terms of motion accuracy, while it results in the coding of global motion model parameters. In this letter, we modify an AVS coder by adding (1) six global motion model parameters to the frame header, and (2) mode selection among INTRA, SKIP, INTER-16×16, INTER-16×8, INTER-8×16, INTER-8×8, and Global Motion Compensation (GMC) modes by La- grange optimal rate-distortion criteria. Simulation results demonstrate that over 0.1dB improvement in PSNR is obtained compared to the AVS coder for an average coded P-frame with the same bit- rate. 展开更多
关键词 coding scheme Motion compensation Motion estimation Audio and Video Standard (AVS)
下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
9
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
10
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
下载PDF
三角形结合方案的最优局部修复码构造
11
作者 王静 李静辉 +1 位作者 杨佳蓉 王娥 《上海交通大学学报》 EI CAS CSCD 北大核心 2024年第10期1596-1605,共10页
局部修复码(LRCs)为用于分布式存储系统中的新型纠删码,能够有效实现海量数据的可靠高效存储,构造具有(r,t)局部性的LRCs已成为当前研究热点.为此,提出基于三角形结合方案的LRCs构造方法,可构造具有任意(r,t)局部性的二元最优LRCs.性能... 局部修复码(LRCs)为用于分布式存储系统中的新型纠删码,能够有效实现海量数据的可靠高效存储,构造具有(r,t)局部性的LRCs已成为当前研究热点.为此,提出基于三角形结合方案的LRCs构造方法,可构造具有任意(r,t)局部性的二元最优LRCs.性能分析结果表明,构造的可用性t=2的LRCs达到了最优码率界,构造的具有任意局部性r>2和可用性t>2的LRCs达到了最优最小距离界.与基于近正则图及基于直积码等构造方法相比,本文构造出的LRCs在码率上表现更优且参数选择更灵活. 展开更多
关键词 分布式存储系统 局部修复码 三角形结合方案 最小距离
下载PDF
融合多头自注意力的AeroMACS自适应调制编码算法
12
作者 程龙 孟繁栋 +2 位作者 毛建华 袁树德 姜博文 《电光与控制》 CSCD 北大核心 2024年第6期36-41,共6页
航空移动机场通信系统(AeroMACS)因传输速率高、安全性好等优点成为机场、空地通信网络的重要组成部分。针对飞机起飞、着陆高速移动阶段的信道快速时变导致信道状态信息(CSI)过时和多普勒频移大等引起通信质量恶化的问题,利用多头自注... 航空移动机场通信系统(AeroMACS)因传输速率高、安全性好等优点成为机场、空地通信网络的重要组成部分。针对飞机起飞、着陆高速移动阶段的信道快速时变导致信道状态信息(CSI)过时和多普勒频移大等引起通信质量恶化的问题,利用多头自注意力机制,提出了基于Transformer神经网络的信道预测方法。根据实时预测的信噪比(SNR)来调整AeroMACS的WiMAX和5G双模的调制编码方案(MCS)。仿真结果表明,与其他3种人工智能方法相比,所提出的基于Transformer网络的信道预测方法能够达到较高的准确率,并提升了系统的总吞吐量,对缓解信道参数过时现状和提高系统通信性能具有良好的促进作用。 展开更多
关键词 航空移动机场通信系统 信道预测 多头自注意力 调制编码方案 系统吞吐量
下载PDF
基于重传错误率估计的自适应HARQ
13
作者 付钰 刘奕彤 杨鸿文 《系统工程与电子技术》 EI CSCD 北大核心 2024年第3期1093-1100,共8页
自适应混合自动重传请求(hybrid automatic repeat request,HARQ)系统的性能与每次传输中的调制与编码方案(modulation and coding scheme,MCS)、发送功率选择密切相关,通过优化重传时的MCS及发送功率可以提升HARQ系统的吞吐率并降低能... 自适应混合自动重传请求(hybrid automatic repeat request,HARQ)系统的性能与每次传输中的调制与编码方案(modulation and coding scheme,MCS)、发送功率选择密切相关,通过优化重传时的MCS及发送功率可以提升HARQ系统的吞吐率并降低能耗。由于不同MCS传输合并后的译码性能没有闭式解,这导致自适应HARQ优化问题不易解决。首先基于译码的判决域半径给出了一种HARQ合并后译码错误率的近似公式,进而提出了多种能权衡吞吐率和能耗性能的自适应HARQ优化策略。仿真结果验证了所提错误率估计方法的可靠性以及所提自适应HARQ的性能。与传统HARQ方案相比,所提方案能同时提高吞吐率、降低能耗,实现更好的吞吐率与能耗的性能折中。 展开更多
关键词 自适应混合自动重传请求 调制与编码方案 吞吐率 能耗 判决域半径
下载PDF
中小型白酒企业产品追溯体系建设方案研究
14
作者 张荣欣 吕月明 +1 位作者 杨广 张道雷 《中国酿造》 CAS 北大核心 2024年第4期276-281,共6页
产品追溯是指从原料、生产、仓储等各个环节,对产品信息进行详细记录,以实现对产品状态及流向的实时跟踪。建立完善的产品追溯体系,是政府监管部门对白酒生产企业的强制要求,同时也是企业自身生产经营的客观需要。该文以中小型白酒生产... 产品追溯是指从原料、生产、仓储等各个环节,对产品信息进行详细记录,以实现对产品状态及流向的实时跟踪。建立完善的产品追溯体系,是政府监管部门对白酒生产企业的强制要求,同时也是企业自身生产经营的客观需要。该文以中小型白酒生产企业为研究对象,分析了当前追溯体系的现状,较系统的阐述了追溯体系的建立、信息传递及实施过程,重点介绍了一种适合于中小型白酒企业的追溯信息及规范化编码方法,可供相关企业借鉴。 展开更多
关键词 中小型白酒企业 产品追溯 编码方法
下载PDF
Lifting Scheme及其在小波图象编码中的应用 被引量:2
15
作者 曾剑芬 马争鸣 《中国图象图形学报(A辑)》 CSCD 北大核心 2001年第11期1111-1117,共7页
L ifting Schem e是构造第二代小波的关键技术 .相对于第一代小波而言 ,L ifting Scheme是一种比 Mallat算法更快、更简单和更容易操作的算法 ,也是 JPEG2 0 0 0推荐的算法 .为了将其应用到小波图象编码中 ,提出了一种对 L ifting Schem... L ifting Schem e是构造第二代小波的关键技术 .相对于第一代小波而言 ,L ifting Scheme是一种比 Mallat算法更快、更简单和更容易操作的算法 ,也是 JPEG2 0 0 0推荐的算法 .为了将其应用到小波图象编码中 ,提出了一种对 L ifting Scheme作适当改进以用于小波图象编码的方法 .该方法就是先用 L ifting Scheme来实现 D9/ 7双正交小波变换 ,然后再用这种技术实现的 D9/ 7双正交小波变换来进行图象压缩编码 .在将 L ifting Schem e算法用于小波图象编码的过程中 ,对该算法做了必要的简化 ,以便保证每个提升 (lifting)环节都是 FIR滤波 .同时 ,根据能量守恒的原则 ,重新调整了尺度因子 .实验结果表明 ,这种经过改进的 L ifting Schem e取得了比 展开更多
关键词 小波图象编码 MALLAT算法 LIFTING scheme 小波分析 图象压缩
下载PDF
由传统认证码(A-CODE)构造有仲裁人的认证码(A^2-CODE) 被引量:5
16
作者 周智 胡正名 《电子科学学刊》 CSCD 1997年第4期489-493,共5页
本文利用密钥分享方案,特别是(k,n)-门限方案和智力扑克协议作为工具,从目前所有的无仲裁人的认证码可以构造出安全高效的有仲裁人的认证码.分析表明,得到的新码可以抵抗来自各方(包括通信双方,敌方,仲裁人,以及某一方与某些仲裁人的合... 本文利用密钥分享方案,特别是(k,n)-门限方案和智力扑克协议作为工具,从目前所有的无仲裁人的认证码可以构造出安全高效的有仲裁人的认证码.分析表明,得到的新码可以抵抗来自各方(包括通信双方,敌方,仲裁人,以及某一方与某些仲裁人的合谋)的欺骗攻击,同时具有原码的所有优良性能。它的实现比较简单,为了抵抗来自仲裁人的攻击,只需增加一定的冗余度,所增加的冗余比特的多少随着安全度要求的变化而变化。 展开更多
关键词 认证码 密钥分享 门限方案 密码学
下载PDF
LTE-M车地无线通信系统中的自适应调制编码技术 被引量:2
17
作者 冯琳 《长江信息通信》 2024年第1期187-189,共3页
城市轨道交通车地综合通信(LTEM)系统在通信环境、业务需求等方面与公共无线通信系统有较大的差异。传统的调制编码技术已无法满足系统性能要求。文章针对LTE-M应用场景的特殊性,提出了一种AMC技术的优化方案。经过测试证明,该方案解决... 城市轨道交通车地综合通信(LTEM)系统在通信环境、业务需求等方面与公共无线通信系统有较大的差异。传统的调制编码技术已无法满足系统性能要求。文章针对LTE-M应用场景的特殊性,提出了一种AMC技术的优化方案。经过测试证明,该方案解决了由于信号质量变化太快以及信号频繁抖动所带来的调制编码等级不准确问题,保证了在切换过程中的丢包率以及时延,大大提高了切换过程中的性能指标。 展开更多
关键词 自适应调制编码 LTE-M 调制编码方式
下载PDF
基于循环码的秘密共享方案
18
作者 伍高飞 张玉清 《密码学报(中英文)》 CSCD 北大核心 2024年第4期895-910,共16页
纠错码可以用来构造秘密共享方案,每个线性码均对应一个秘密共享方案.然而,一般情况下,基于线性码所得到的秘密共享方案的存取结构难以确定.循环码是线性码的一类非常重要的子码,由于其具有高效的编码和解码算法,循环码在数据存储系统... 纠错码可以用来构造秘密共享方案,每个线性码均对应一个秘密共享方案.然而,一般情况下,基于线性码所得到的秘密共享方案的存取结构难以确定.循环码是线性码的一类非常重要的子码,由于其具有高效的编码和解码算法,循环码在数据存储系统、通信系统和消费者电子系统中有广泛应用.令p是一个奇素数,m是一个正整数.设α是F^(∗)_(p)m的一个生成元,0≤e1,e2,e3≤p^(m)-2,s=p^(m)-1/2.令C(e1,e2,e3)表示具有三个非零根α^(e1)、α^(e2)和α^(e3)的p元循环码.首先,本文通过分析有限域上某些多项式的根的个数,给出两类参数为[5m-1,5m-2m-2,4]的最优五元循环码C(0,e1,e2).其次,给出了循环码C(0,e1,e2)和C(s,e1+s,e2+s)之间的一个联系.该联系表明可以利用最优循环码C(0,1,e)来构造最优循环码C(1,e,s).最后,本文给出了一些基于五元循环码的秘密共享方案,结果表明所构造的秘密共享方案具有良好的存取结构. 展开更多
关键词 五元 循环码 最优 秘密共享方案 有限域
下载PDF
Evil-hunter: a novel web shell detection system based on scoring scheme 被引量:1
19
作者 张庭秀 程光 +1 位作者 郭晓军 潘吴斌 《Journal of Southeast University(English Edition)》 EI CAS 2014年第3期278-284,共7页
In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-... In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately. 展开更多
关键词 web shell detection scoring scheme malicious code identification
下载PDF
基于PLC控制的一种通用喷码机设计
20
作者 苗琳 施永刚 《电气传动自动化》 2024年第5期47-50,共4页
喷码技术已经广泛应用到各行业,其可将文本、数字、图形码等重要信息喷印在产品上面以及产品的内袋或包装的外箱等处。目前市面上多数喷码机器价格昂贵,后期耗材维护成本也较高,并不适用于大多数用户使用。本文针对上述现象提出了一种... 喷码技术已经广泛应用到各行业,其可将文本、数字、图形码等重要信息喷印在产品上面以及产品的内袋或包装的外箱等处。目前市面上多数喷码机器价格昂贵,后期耗材维护成本也较高,并不适用于大多数用户使用。本文针对上述现象提出了一种通用形式的喷码机设计,此方案制作成本低、运行稳定可靠、性价比高。该方案可供有这方面需求的人员参考或选用。 展开更多
关键词 喷码 喷印 PLC控制 系统设计 设计方案
下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部