期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
关于信源的Tunstall编码方法 被引量:1
1
作者 杨军 符方伟 沈世镒 《应用数学学报》 CSCD 北大核心 2000年第3期367-376,共10页
在信源编码理论中,Tunstall码是渐近最优的V-B码(V代表变长消息,B代表定长码字).本文进一步研究了Tunstall码的性质,给出了Tunstall码的码率的新的上界,刻划了Tunstall树和扩展次数之间的... 在信源编码理论中,Tunstall码是渐近最优的V-B码(V代表变长消息,B代表定长码字).本文进一步研究了Tunstall码的性质,给出了Tunstall码的码率的新的上界,刻划了Tunstall树和扩展次数之间的一些较深刻的内在联系,并且给出了一个寻找ε-最优的Tunstall码的扩展次数的算法. 展开更多
关键词 信源编码 变长-定长编码 tunstall编码 码率
原文传递
Comparison of the ability of wavelet index and bispectral index for reflecting regain of consciousness in patients undergone surgery 被引量:12
2
作者 ZHANG Xiao-tong CHENG Hao XIONG Wei WANG Bao-guo 《Chinese Medical Journal》 SCIE CAS CSCD 2010年第12期1520-1523,共4页
Background Wavelet index (WLI) is a new parameter for monitoring depth of anesthesia based on Wavelet analysis. We observed the change of WLI and bispectral index (BIS) in patients regain of consciousness (ROC) ... Background Wavelet index (WLI) is a new parameter for monitoring depth of anesthesia based on Wavelet analysis. We observed the change of WLI and bispectral index (BIS) in patients regain of consciousness (ROC) in the absence of frontalis electromyographic (EMG) interference. The aim of this study was to compare the ability of WLI and BIS for reflecting ROC in patients undergone surgery. Methods Twelve patients who were scheduled for maxillofacial surgeries were enrolled in the study. BIS and WLI values were monitored continually. After being given midazolam and remifentanil, patients were asked to squeeze the investigator's hand ever 30 seconds. Patients were continuously given propofol until loss of consciousness (LOC1). Tunstalrs isolated forearm technique was used to test the surgical consciousness in patients. After total muscle relaxation endotracheal intubations were performed, and the patients were connected to a ventilator. Then, propofol was withdrawn until the patients showed regain of consciousness (ROC1) and an awareness reaction. After the command test, patients were readministered with propofol until loss of consciousness (LOC2). After surgery, all of the sedatives were withdrawn, and the patients were let to regain consciousness (ROC2), Results The BIS values of twelve patients at ROC1 after using muscle relaxant were much lower than those at LOC1 and ROC2 without using muscle relaxant, showing statistical significance (P 〈0.05). Meanwhile, the WLI values of twelve patients at ROC1 after using muscle relaxant were much higher than those at LOC1 and equal to ROC2 without using muscle relaxant, showing statistical significances (P 〈0.05) between ROC1 and LOCI. Conclusions This study showed that under muscle relaxation or facial paralysis, when there is no EMG signal, BIS can not accurately reflect regain of consciousness in surgical patients, but WLI can reflect it accurately. So WLI may have advantages for reflecting state of consciousness in surgical patients. 展开更多
关键词 frontalis electromyographic activity wavelet index bispectral index tunstall's isolated forearmexperiments regain of consciousness
原文传递
Indexing structures for the PLS blockchain
3
作者 Alex Shafarenko 《Cybersecurity》 EI CSCD 2022年第1期28-46,共19页
This paper studies known indexing structures from a new point of view:minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes ... This paper studies known indexing structures from a new point of view:minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes two Guy Fawkes protocols,PLS and SLVP.The PLS blockchain is not a cryptocurrency instrument;it is an immutable ledger offering guaranteed non-repudiation to low-power clients without use of public key crypto.The novelty of the situation is in the fact that every PLS client has to obtain a proof of absence in all blocks of the chain to which its counterparty does not contribute,and we show that it is possible without traversing the block's Merkle tree.We obtain weight statistics of a leaf path on a sparse Merkle tree theoretically,as our ground case.Using the theory we quantify the communication cost of a client interacting with the blockchain.We show that large savings can be achieved by providing a bitmap index of the tree compressed using Tunstall's method.We further show that even in the case of correlated access,as in two IoT devices posting messages for each other in consecutive blocks,it is possible to prevent compression degradation by re-randomising the IDs using a pseudorandom bijective function.We propose a low-cost function of this kind and evaluate its quality by simulation,using the avalanche criterion. 展开更多
关键词 PLS blockchain Guy Fawkes protocol Content-addressable storage Data-structure statistics tunstall coding Pseudorandom bijections
原文传递
Indexing structures for the PLS blockchain
4
作者 Alex Shafarenko 《Cybersecurity》 EI CSCD 2021年第1期561-579,共19页
This paper studies known indexing structures from a new point of view:minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes ... This paper studies known indexing structures from a new point of view:minimisation of data exchange between an IoT device acting as a blockchain client and the blockchain server running a protocol suite that includes two Guy Fawkes protocols,PLS and SLVP.The PLS blockchain is not a cryptocurrency instrument;it is an immutable ledger offering guaranteed non-repudiation to low-power clients without use of public key crypto.The novelty of the situation is in the fact that every PLS client has to obtain a proof of absence in all blocks of the chain to which its counterparty does not contribute,and we show that it is possible without traversing the block’s Merkle tree.We obtain weight statistics of a leaf path on a sparse Merkle tree theoretically,as our ground case.Using the theory we quantify the communication cost of a client interacting with the blockchain.We show that large savings can be achieved by providing a bitmap index of the tree compressed using Tunstall’s method.We further show that even in the case of correlated access,as in two IoT devices posting messages for each other in consecutive blocks,it is possible to prevent compression degradation by re-randomising the IDs using a pseudorandom bijective function.We propose a low-cost function of this kind and evaluate its quality by simulation,using the avalanche criterion. 展开更多
关键词 PLS blockchain Guy Fawkes protocol Content-addressable storage Data-structure statistics tunstall coding Pseudorandom bijections
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部