期刊文献+
共找到74,076篇文章
< 1 2 250 >
每页显示 20 50 100
Quantum quasi-cyclic low-density parity-check error-correcting codes 被引量:1
1
作者 李渊 曾贵华 Moon Ho Leeb 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4154-4160,共7页
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne... In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated. 展开更多
关键词 quantum LDPC code quasi-cycliC circulant permutation matrix CSS code
原文传递
Quantum secret sharing based on quantum error-correcting codes
2
作者 张祖荣 刘伟涛 李承祖 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期91-95,共5页
Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to im... Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k-1) threshold scheme. It also takes advantage of classical enhancement of the [2k-1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. 展开更多
关键词 quantum secret sharing quantum error-correcting code classically enhanced quantumerror-correcting code
原文传递
On the complete weight distributions of quantum error-correcting codes
3
作者 杜超 马智 熊茂胜 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期272-287,共16页
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the singleton-type and hamming-type bounds for asymmetric quantum codes. In this paper we extend their study much further and obtain several new results concerning the complete weight distributions of quantum codes and applications. In particular, we provide a new proof of the Mac Williams identities of the complete weight distributions of quantum codes. We obtain new information about the weight distributions of quantum MDS codes and the double weight distribution of asymmetric quantum MDS codes. We get new identities involving the complete weight distributions of two different quantum codes. We estimate the complete weight distributions of quantum codes under special conditions and show that quantum BCH codes by the Hermitian construction from primitive, narrow-sense BCH codes satisfy these conditions and hence these estimate applies. 展开更多
关键词 quantum codes complete weight distributions Mac Williams identities BCH codes
原文传递
Cryptanalysis on AW digital signature scheme based on error-correcting codes 被引量:2
4
作者 张振峰 冯登国 戴宗铎 《Science in China(Series F)》 EI 2002年第5期397-400,共4页
In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, which is usually denoted by AW Scheme. In this paper we show that the AW Scheme is actually not secu... In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, which is usually denoted by AW Scheme. In this paper we show that the AW Scheme is actually not secure: anyone holding public keys of the signatory can obtain the equivalent private keys, and then forge digital signatures for arbitrary messages successfully. We also point out that one can hardly construct a digital signature scheme with high-level security due to the difficulty of decomposing large matrixes. 展开更多
关键词 CRYPTANALYSIS digital signature error-correcting code.
原文传递
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files 被引量:1
5
作者 Zhuorong Li Huawei Tian +2 位作者 Yanhui Xiao Yunqi Tang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期247-263,共17页
Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from... Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from theft.However,to the best of our knowledge,few studies have looked at how watermarking can resist attacks that involve vertex-reordering.Here,we present a lossless and robust watermarking scheme for STL files to protect against vertexreordering attacks.Specifically,we designed a novel error-correcting code(ECC)that can correct the error of any one-bit in a bitstream by inserting several check digits.In addition,ECC is designed to make use of redundant information according to the characteristics of STL files,which introduces further robustness for defense against attacks.No modifications are made to the geometric information of the three-dimensional model,which respects the requirements of a highprecision model.The experimental results show that the proposed watermarking scheme can survive numerous kinds of attack,including rotation,scaling and translation(RST),facet reordering,and vertex-reordering attacks. 展开更多
关键词 Three-dimensional watermarking stereolithographic file robust watermarking error-correcting code
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
6
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
USING ERROR-CORRECTING ENCODERS TO DESIGN LOCAL-RANDOM SEQUENCE GENERATORS
7
作者 杨义先 《Journal of Electronics(China)》 1995年第1期9-14,共6页
This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theor... This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theory and the modern cryptography. 展开更多
关键词 error-correcting CODING CRYPTOGRAPHY RANDOM SEQUENCES
在线阅读 下载PDF
Construction of Constant Rank and Orbit Codes over Finite Chain Rings
8
作者 GUO Ye LIU Xiusheng 《Wuhan University Journal of Natural Sciences》 2025年第3期289-301,共13页
In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over ... In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over finite chain rings and constant dimension codes over the residue fields.In particular,we prove that an orbit submodule code over a finite chain ring is a constant rank code.Finally,for special finite chain ring F_(q)+γF_(q),we define a Gray mapφfrom(F_(q)+γF_(q))^(n)to F^(2n)_(q),and by using cyclic codes over F_(q)+γF_(q),we obtain a method of constructing an optimum distance constant dimension code over F_(q). 展开更多
关键词 finite chain ring rank of linear codes constant rank codes orbit codes
原文传递
Neural Codes Constructs Based on Combinatorial Design
9
作者 Jin Huang 《Applied Mathematics》 2025年第1期42-60,共19页
Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into... Neuroscience (also known as neurobiology) is a science that studies the structure, function, development, pharmacology and pathology of the nervous system. In recent years, C. Cotardo has introduced coding theory into neuroscience, proposing the concept of combinatorial neural codes. And it was further studied in depth using algebraic methods by C. Curto. In this paper, we construct a class of combinatorial neural codes with special properties based on classical combinatorial structures such as orthogonal Latin rectangle, disjoint Steiner systems, groupable designs and transversal designs. These neural codes have significant weight distribution properties and large minimum distances, and are thus valuable for potential applications in information representation and neuroscience. This study provides new ideas for the construction method and property analysis of combinatorial neural codes, and enriches the study of algebraic coding theory. 展开更多
关键词 Combinatorial Neural codes Orthogonal Latin Rectangle Steiner System Group Divisible Design Transversal Design
在线阅读 下载PDF
Research on deep learning decoding method for polar codes in ACO-OFDM spatial optical communication system
10
作者 LIU Kangrui LI Ming +2 位作者 CHEN Sizhe QU Jiashun ZHOU Ming’ou 《Optoelectronics Letters》 2025年第7期427-433,共7页
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule... Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder. 展开更多
关键词 frequency conduction polar codes deep learning signal demodulation deep learning technique DECODING ACO OFDM polarization code decoding
原文传递
Spatial Image Watermarking by Error-Correction Coding in Gray Codes
11
作者 Tadahiko Kimoto 《Journal of Signal and Information Processing》 2013年第3期259-273,共15页
In this paper, error-correction coding (ECC) in Gray codes is considered and its performance in the protecting of spatial image watermarks against lossy data compression is demonstrated. For this purpose, the differen... In this paper, error-correction coding (ECC) in Gray codes is considered and its performance in the protecting of spatial image watermarks against lossy data compression is demonstrated. For this purpose, the differences between bit patterns of two Gray codewords are analyzed in detail. On the basis of the properties, a method for encoding watermark bits in the Gray codewords that represent signal levels by a single-error-correcting (SEC) code is developed, which is referred to as the Gray-ECC method in this paper. The two codewords of the SEC code corresponding to respective watermark bits are determined so as to minimize the expected amount of distortion caused by the watermark embedding. The stochastic analyses show that an error-correcting capacity of the Gray-ECC method is superior to that of the ECC in natural binary codes for changes in signal codewords. Experiments of the Gray-ECC method were conducted on 8-bit monochrome images to evaluate both the features of watermarked images and the performance of robustness for image distortion resulting from the JPEG DCT-baseline coding scheme. The results demonstrate that, compared with a conventional averaging-based method, the Gray-ECC method yields watermarked images with less amount of signal distortion and also makes the watermark comparably robust for lossy data compression. 展开更多
关键词 GRAY code error-correcting code Digital WATERMARK Spatial Domain JPEG DCT-Based Compression
暂未订购
Lightweight Deep Learning Model and Novel Dataset for Restoring Damaged Barcodes and QR Codes in Logistics Applications
12
作者 Tarek Muallim Haluk Kucuk +1 位作者 Muhammet Bareket Metin Kahraman 《Computer Modeling in Engineering & Sciences》 2025年第6期3557-3581,共25页
This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics ope... This study introduces a lightweight deep learning model and a novel synthetic dataset designed to restore damaged one-dimensional(1D)barcodes and Quick Response(QR)codes,addressing critical challenges in logistics operations.The proposed solution leverages an efficient Pix2Pix-based framework,a type of conditional Generative Adversarial Network(GAN)optimized for image-to-image translation tasks,enabling the recovery of degraded barcodes and QR codes with minimal computational overhead.A core contribution of this work is the development of a synthetic dataset that simulates realistic damage scenarios frequently encountered in logistics environments,such as low contrast,misalignment,physical wear,and environmental interference.By training on this diverse and realistic dataset,the model demonstrates exceptional performance in restoring readability and decoding accuracy.The lightweight architecture,featuring a U-Net-based encoder-decoder with separable convolutions,ensures computational efficiency,making the approach suitable for real-time deployment on embedded and resource-constrained devices commonly used in logistics systems.Experimental results reveal significant improvements:QR code decoding ratios increased from 14%to 99%on training data and from 15%to 68%on validation data,while 1D barcode decoding ratios improved from 7%to 73%on training data and from 9%to 44%on validation data.By providing a robust,resource-efficient solution for restoring damaged barcodes and QR codes,this study offers practical advancements for enhancing the reliability of automated scanning systems in logistics operations,particularly under challenging conditions. 展开更多
关键词 BARcode quick response code RESTORATION applied deep learning
在线阅读 下载PDF
Minimal Binary Codes over a Ring
13
作者 PAN Yang GUO Yuxin YE Chang 《湖州师范学院学报》 2025年第2期1-7,共7页
We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh t... We construct an infinite family of minimal linear codes over the ring F_(2)+u F_(2).These codes are defined through trace functions and Boolean functions.Their Lee weight distribution is completely computed by Walsh transformation.By Gray mapping,we obtain a family of minimal binary linear codes from a generic construction,which have prominent applications in secret sharing and secure two-party computation. 展开更多
关键词 Boolean function trace function minimal code secret sharing
在线阅读 下载PDF
Low Complexity Successive Cancellation List Decoding of U-UV Codes
14
作者 Chen Wenhao Chen Li +1 位作者 Lin Jingyu Zhang Huazi 《China Communications》 2025年第1期41-60,共20页
Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-med... Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-medium length regime.However,this list decoding complexity becomes formidable as the decoding output list size increases.This is primarily incurred by the OSD.Addressing this challenge,this paper proposes the low complexity SCL decoding through reducing the complexity of component code decoding,and pruning the redundant SCL decoding paths.For the former,an efficient skipping rule is introduced for the OSD so that the higher order decoding can be skipped when they are not possible to provide a more likely codeword candidate.It is further extended to the OSD variant,the box-andmatch algorithm(BMA),in facilitating the component code decoding.Moreover,through estimating the correlation distance lower bounds(CDLBs)of the component code decoding outputs,a path pruning(PP)-SCL decoding is proposed to further facilitate the decoding of U-UV codes.In particular,its integration with the improved OSD and BMA is discussed.Simulation results show that significant complexity reduction can be achieved.Consequently,the U-UV codes can outperform the cyclic redundancy check(CRC)-polar codes with a similar decoding complexity. 展开更多
关键词 ordered statistics decoding successive cancellation list decoding U-UV codes
在线阅读 下载PDF
Computation-Efficient Decoding of LDPC Codes for High-Speed Space Laser Communications
15
作者 Hu Zhuojun Chen Zhao +1 位作者 Kuang Linling Yin Liuguo 《China Communications》 2025年第12期108-123,共16页
Space laser communication(SLC)is an emerging technology to support high-throughput data transmissions in space networks.In this paper,to guarantee the reliability of high-speed SLC links,we aim at practical implementa... Space laser communication(SLC)is an emerging technology to support high-throughput data transmissions in space networks.In this paper,to guarantee the reliability of high-speed SLC links,we aim at practical implementation of low-density paritycheck(LDPC)decoding under resource-restricted space platforms.Particularly,due to the supply restriction and cost issues of high-speed on-board devices such as analog-to-digital converters(ADCs),the input of LDPC decoding will be usually constrained by hard-decision channel output.To tackle this challenge,density-evolution-based theoretical analysis is firstly performed to identify the cause of performance degradation in the conventional binaryinitialized iterative decoding(BIID)algorithm.Then,a computation-efficient decoding algorithm named multiary-initialized iterative decoding with early termination(MIID-ET)is proposed,which improves the error-correcting performance and computation efficiency by using a reliability-based initialization method and a threshold-based decoding termination rule.Finally,numerical simulations are conducted on example codes of rates 7/8 and 1/2 to evaluate the performance of different LDPC decoding algorithms,where the proposed MIID-ET outperforms the BIID with a coding gain of 0.38 dB and variable node calculation saving of 37%.With this advantage,the proposed MIID-ET can notably reduce LDPC decoder’s hardware implementation complexity under the same bit error rate performance,which successfully doubles the total throughput to 10 Gbps on a single-chip FPGA. 展开更多
关键词 computation-efficient decoding highspeed decoders LDPC codes LLR initialization space laser communications
在线阅读 下载PDF
Genetic Optimization of Non-Binary Quasi-Cyclic LDPC Codes
16
作者 Zhang Yidi Jiang Ming Zhao Chunming 《China Communications》 2025年第8期76-86,共11页
This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and... This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and the corresponding non-binary replacement matrices are constructed by the progressive edge growth algorithm and randomly generated,respectively.The genetic algorithm is then utilized to optimize the base matrices and the replacement ones.The simulation results show that the NB-QC-LDPC codes constructed by the proposed method achieve better decoding performance and lower implementation complexity compared to the existing NB-LDPC codes such as consultative committee for space data system and Bei Dou satellite navigation system. 展开更多
关键词 BDS CCSDS genetic algorithm nonbinary quasi-cyclic(NB-QC)LDPC codes
在线阅读 下载PDF
Reliability Performance Estimation and Its Applications of Rate-Compatible Polar Codes for B5G-IoT
17
作者 Liang Hao Liang Xiaohu +2 位作者 Ye Ganhua Lu Ruimin Lu Xinjin 《China Communications》 2025年第7期124-137,共14页
The beyond fifth-generation Internet of Things requires more capable channel coding schemes to achieve high-reliability,low-complexity and lowlatency communications.The theoretical analysis of error-correction perform... The beyond fifth-generation Internet of Things requires more capable channel coding schemes to achieve high-reliability,low-complexity and lowlatency communications.The theoretical analysis of error-correction performance of channel coding functions as a significant way of optimizing the transmission reliability and efficiency.In this paper,the efficient estimation methods of the block error rate(BLER)performance for rate-compatible polar codes(RCPC)are proposed under several scenarios.Firstly,the BLER performance of RCPC is generally evaluated in the additive white Gaussian noise channels.That is further extended into the Rayleigh fading channel case using an equivalent estimation method.Moreover,with respect to the powerful decoder such as successive cancellation list decoding,the performance estimation is derived analytically based on the polar weight spectrum and BLER upper bounds.Theoretical evaluation and numerical simulation results show that the estimated performance can fit well the practical simulated results of RCPC under the objective conditions,verifying the validity of our proposed performance estimation methods.Furthermore,the application designs of the reliability estimation of RCPC are explored,particularly in the advantages of the signal-to-noise(SNR)estimation and throughput efficiency optimization of polar coded hybrid automatic repeat request. 展开更多
关键词 Internet of Things polar codes ratecompatible reliability estimation SNR estimation throughput optimization
在线阅读 下载PDF
Construction of Polar Codes in Correlated Block Fading Channels via Split Polar Spectrum
18
作者 Li Yan Niu Kai 《China Communications》 2025年第10期137-148,共12页
The construction of polar codes in corre-lated block fading channels is still an open issue to be solved.In this paper,to explicitly reveal the impact of correlation on error performance of polar coded diver-sity comm... The construction of polar codes in corre-lated block fading channels is still an open issue to be solved.In this paper,to explicitly reveal the impact of correlation on error performance of polar coded diver-sity communication systems,an integrated framework has been established to analyze the theoretical error performance of polar codes in correlated block fading channels.First,the upper bound on error probabil-ity of polarized channels is derived based on split po-lar spectrum,which is fully determined by covariance channel matrix as well as the block-wise weight distri-bution of the corresponding polar subcode.Further,to facilitate practical implementations,we design a con-struction metric named polarized correlation weight(PCW)to generate polar codes in correlated block fad-ing channels.Finally,simulation results on block error rate indicate that the proposed metric can exhibit both diversity gain and coding gain compared to the con-ventional methods under successive cancellation de-coding. 展开更多
关键词 CONSTRUCTION correlated block Rayleigh fading channel polar codes split polar spectrum
在线阅读 下载PDF
Sparse graph neural network aided efficient decoder for polar codes under bursty interference
19
作者 Shengyu Zhang Zhongxiu Feng +2 位作者 Zhe Peng Lixia Xiao Tao Jiang 《Digital Communications and Networks》 2025年第2期359-364,共6页
In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the e... In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the encoding characteristic to achieve high-throughput polar decoding.To further improve the decoding performance,a residual gated bipartite graph neural network is designed for updating embedding vectors of heterogeneous nodes based on a bidirectional message passing neural network.This framework exploits gated recurrent units and residual blocks to address the gradient disappearance in deep graph recurrent neural networks.Finally,predictions are generated by feeding the embedding vectors into a readout module.Simulation results show that the proposed decoder is more robust than the existing ones in the presence of bursty interference and exhibits high universality. 展开更多
关键词 Sparse graph neural network Polar codes Bursty interference Sparse factor graph Message passing neural network
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
20
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部