期刊文献+
共找到806,125篇文章
< 1 2 250 >
每页显示 20 50 100
Correction:Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space
1
作者 Mudassir Khalil Muhammad Imran Sharif +3 位作者 Ahmed Naeem Muhammad Umar Chaudhry Hafiz Tayyab Rauf Adham E.Ragab 《Computers, Materials & Continua》 SCIE EI 2025年第1期1461-1461,共1页
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C... In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”. 展开更多
关键词 Deep code CIELAB
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
2
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
Design of Serially Concatenated Two-Level Polar Coded Modulation System with Low-Complexity
3
作者 Zhou Lin Liao Guojun +3 位作者 Xu Lei An Ran Xie Xianzhong Wang Xi 《China Communications》 2025年第1期102-110,共9页
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat... Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%. 展开更多
关键词 bit-interleaved coded modulation high-order modulation multilevel coding polar codes
在线阅读 下载PDF
Blind recognition of polar code parameters based on log-likelihood ratio
4
作者 ZHONG Zhaogen XIE Cunxiang JIN Kun 《Journal of Systems Engineering and Electronics》 2025年第3期642-658,共17页
The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based ... The syndrome a posteriori probability of the log-likelihood ratio of intercepted codewords is used to develop an algorithm that recognizes the polar code length and generator matrix of the underlying polar code.Based on the encoding structure,three theorems are proved,two related to the relationship between the length and rate of the polar code,and one related to the relationship between frozen-bit positions,information-bit positions,and codewords.With these three theorems,polar codes can be quickly reconstruced.In addition,to detect the dual vectors of codewords,the statistical characteristics of the log-likelihood ratio are analyzed,and then the information-and frozen-bit positions are distinguished based on the minimumerror decision criterion.The bit rate is obtained.The correctness of the theorems and effectiveness of the proposed algorithm are validated through simulations.The proposed algorithm exhibits robustness to noise and a reasonable computational complexity. 展开更多
关键词 code length frozen-bit position information-bit position log-likelihood ratio polar code
在线阅读 下载PDF
Research on deep learning decoding method for polar codes in ACO-OFDM spatial optical communication system
5
作者 LIU Kangrui LI Ming +2 位作者 CHEN Sizhe QU Jiashun ZHOU Ming’ou 《Optoelectronics Letters》 2025年第7期427-433,共7页
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule... Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder. 展开更多
关键词 frequency conduction polar codes deep learning signal demodulation deep learning technique DECODING ACO OFDM polarization code decoding
原文传递
Development and benchmark simulations of a hybrid fluid particle-in-cell code SHYPIC
6
作者 Dehui LI Yong Chia Francis THIO Li JIA 《Plasma Science and Technology》 2025年第5期64-71,共8页
This paper introduces a hybrid fluid-kinetic code,SHYPIC(ShanghaiTech HYbrid PIC code),developed as a baseline framework for simulating plasma dynamics relevant to plasma-jetdriven magneto-inertial fusion(PJMIF).The c... This paper introduces a hybrid fluid-kinetic code,SHYPIC(ShanghaiTech HYbrid PIC code),developed as a baseline framework for simulating plasma dynamics relevant to plasma-jetdriven magneto-inertial fusion(PJMIF).The code integrates a fluid description for electrons and a particle-in-cell(PIC)description for ions,providing computational efficiency and enabling larger-scale simulations.It incorporates ion kinetic effects,allowing accurate simulation of microscale non-equilibrium phenomena.In this initial version,the SHYPIC code is presented along with a series of benchmark tests,including quiet plasma evolution,dispersion relation verification,and the excitation and propagation of externally driven plasma waves.This version does not yet incorporate collisional effects or non-ideal terms(e.g.,resistivity,viscosity,and hyperviscosity)in the electron fluid,which will be included in future developments.The present work lays the foundation for further improvements required for fully simulating the complex dynamics of PJMIF. 展开更多
关键词 plasma-jet-driven magneto-inertial fusion jet merging hybrid fluid-kinetic code PARTICLE-IN-CELL
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
7
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
A graph neural network and multi-task learning-based decoding algorithm for enhancing XZZX code stability in biased noise
8
作者 Bo Xiao Zai-Xu Fan +2 位作者 Hui-Qian Sun Hong-Yang Ma Xing-Kui Fan 《Chinese Physics B》 2025年第5期250-257,共8页
Quantum error correction is a technique that enhances a system’s ability to combat noise by encoding logical information into additional quantum bits,which plays a key role in building practical quantum computers.The... Quantum error correction is a technique that enhances a system’s ability to combat noise by encoding logical information into additional quantum bits,which plays a key role in building practical quantum computers.The XZZX surface code,with only one stabilizer generator on each face,demonstrates significant application potential under biased noise.However,the existing minimum weight perfect matching(MWPM)algorithm has high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoding method that combines graph neural networks(GNN)with multi-classifiers,the syndrome is transformed into an undirected graph,and the features are aggregated by convolutional layers,providing a more efficient and accurate decoding strategy.In the experiments,we evaluated the performance of the XZZX code under different biased noise conditions(bias=1,20,200)and different code distances(d=3,5,7,9,11).The experimental results show that under low bias noise(bias=1),the GNN decoder achieves a threshold of 0.18386,an improvement of approximately 19.12%compared to the MWPM decoder.Under high bias noise(bias=200),the GNN decoder reaches a threshold of 0.40542,improving by approximately 20.76%,overcoming the limitations of the conventional decoder.They demonstrate that the GNN decoding method exhibits superior performance and has broad application potential in the error correction of XZZX code. 展开更多
关键词 quantum error correction XZZX code biased noise graph neural network
原文传递
Low Complexity Successive Cancellation List Decoding of U-UV Codes
9
作者 Chen Wenhao Chen Li +1 位作者 Lin Jingyu Zhang Huazi 《China Communications》 2025年第1期41-60,共20页
Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-med... Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-medium length regime.However,this list decoding complexity becomes formidable as the decoding output list size increases.This is primarily incurred by the OSD.Addressing this challenge,this paper proposes the low complexity SCL decoding through reducing the complexity of component code decoding,and pruning the redundant SCL decoding paths.For the former,an efficient skipping rule is introduced for the OSD so that the higher order decoding can be skipped when they are not possible to provide a more likely codeword candidate.It is further extended to the OSD variant,the box-andmatch algorithm(BMA),in facilitating the component code decoding.Moreover,through estimating the correlation distance lower bounds(CDLBs)of the component code decoding outputs,a path pruning(PP)-SCL decoding is proposed to further facilitate the decoding of U-UV codes.In particular,its integration with the improved OSD and BMA is discussed.Simulation results show that significant complexity reduction can be achieved.Consequently,the U-UV codes can outperform the cyclic redundancy check(CRC)-polar codes with a similar decoding complexity. 展开更多
关键词 ordered statistics decoding successive cancellation list decoding U-UV codes
在线阅读 下载PDF
PtrProxy:Efficient Code Re-Randomization on AArch64 Platform
10
作者 Luo Chenke Fu Jianming +2 位作者 Ming Jiang Xie Mengfei Peng Guojun 《China Communications》 2025年第6期64-82,共19页
Memory-unsafe programming languages,such as C/C++,are often used to develop system programs,rendering the programs susceptible to a variety of memory corruption attacks.Among these threats,just-in-time return-oriented... Memory-unsafe programming languages,such as C/C++,are often used to develop system programs,rendering the programs susceptible to a variety of memory corruption attacks.Among these threats,just-in-time return-oriented programming(JIT-ROP)stands out as an advanced method for conducting code-reuse attacks,effectively circumventing code randomization safeguards.JIT-ROP leverages memory disclosure vulnerabilities to obtain reusable code fragments dynamically and assemble malicious payloads dynamically.In response to JIT-ROP attacks,several re-randomization implementations have been developed to prevent the use of disclosed code.However,existing re-randomization methods require recurrent re-randomization during program runtime according to fixed time windows or specific events such as system calls,incurring significant runtime overhead.In this paper,we present the design and implementation of PtrProxy,an efficient re-randomization approach on the AArch64 platform.Unlike previous methods that necessitate frequent runtime rerandomization or reply on unreliable triggering conditions,this approach triggers the re-randomization process by detecting the code page harvest operation,which is a fundamental operation of the JIT-ROP at-tacks,making our method more efficient and reliable than previous approaches.We evaluate PtrProxy on benchmarks and real-world applications.The evaluation results show that our approach can effectively protect programs from JIT-ROP attacks while introducing marginal runtime overhead. 展开更多
关键词 code reuse attacks re-randomization return-oriented programming security and privacy software security
在线阅读 下载PDF
Genetic Optimization of Non-Binary Quasi-Cyclic LDPC Codes
11
作者 Zhang Yidi Jiang Ming Zhao Chunming 《China Communications》 2025年第8期76-86,共11页
This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and... This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and the corresponding non-binary replacement matrices are constructed by the progressive edge growth algorithm and randomly generated,respectively.The genetic algorithm is then utilized to optimize the base matrices and the replacement ones.The simulation results show that the NB-QC-LDPC codes constructed by the proposed method achieve better decoding performance and lower implementation complexity compared to the existing NB-LDPC codes such as consultative committee for space data system and Bei Dou satellite navigation system. 展开更多
关键词 BDS CCSDS genetic algorithm nonbinary quasi-cyclic(NB-QC)LDPC codes
在线阅读 下载PDF
Reliability Performance Estimation and Its Applications of Rate-Compatible Polar Codes for B5G-IoT
12
作者 Liang Hao Liang Xiaohu +2 位作者 Ye Ganhua Lu Ruimin Lu Xinjin 《China Communications》 2025年第7期124-137,共14页
The beyond fifth-generation Internet of Things requires more capable channel coding schemes to achieve high-reliability,low-complexity and lowlatency communications.The theoretical analysis of error-correction perform... The beyond fifth-generation Internet of Things requires more capable channel coding schemes to achieve high-reliability,low-complexity and lowlatency communications.The theoretical analysis of error-correction performance of channel coding functions as a significant way of optimizing the transmission reliability and efficiency.In this paper,the efficient estimation methods of the block error rate(BLER)performance for rate-compatible polar codes(RCPC)are proposed under several scenarios.Firstly,the BLER performance of RCPC is generally evaluated in the additive white Gaussian noise channels.That is further extended into the Rayleigh fading channel case using an equivalent estimation method.Moreover,with respect to the powerful decoder such as successive cancellation list decoding,the performance estimation is derived analytically based on the polar weight spectrum and BLER upper bounds.Theoretical evaluation and numerical simulation results show that the estimated performance can fit well the practical simulated results of RCPC under the objective conditions,verifying the validity of our proposed performance estimation methods.Furthermore,the application designs of the reliability estimation of RCPC are explored,particularly in the advantages of the signal-to-noise(SNR)estimation and throughput efficiency optimization of polar coded hybrid automatic repeat request. 展开更多
关键词 Internet of Things polar codes ratecompatible reliability estimation SNR estimation throughput optimization
在线阅读 下载PDF
Quantum decoder design for subsystem surface code based on multi-head graph attention and edge weighting
13
作者 Nai-Hua Ji Hui-Qian Sun +2 位作者 Bo Xiao Ping-Li Song Hong-Yang Ma 《Chinese Physics B》 2025年第2期165-176,共12页
Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem s... Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem surface code with three-qubit check operators demonstrates significant application potential due to its simplified measurement operations and low logical error rates.However,the existing minimum-weight perfect matching(MWPM)algorithm exhibits high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoder based on a graph attention network(GAT),representing error syndromes as undirected graphs with edge weights,and employing a multihead attention mechanism to efficiently aggregate node features and enable parallel computation.Compared to MWPM,the GAT decoder exhibits linear growth in computational complexity,adapts to different quantum code structures,and demonstrates stronger robustness under high physical error rates.The experimental results demonstrate that the proposed decoder achieves an overall accuracy of 89.95%under various small code lattice sizes(L=2,3,4,5),with the logical error rate threshold increasing to 0.0078,representing an improvement of approximately 13.04%compared to the MWPM decoder.This result significantly outperforms traditional methods,showcasing superior performance under small code lattice sizes and providing a more efficient decoding solution for large-scale quantum error correction. 展开更多
关键词 quantum error correction graph attention network subsystem surface code circuit-level noise
原文传递
Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative Networks
14
作者 Slim Chaoui Omar Alruwaili +1 位作者 Faeiz Alserhani Haifa Harrouch 《Computer Modeling in Engineering & Sciences》 2025年第2期1933-1954,共22页
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative communications.In the HDFSIR approach,the relay operates in decode-... In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative communications.In the HDFSIR approach,the relay operates in decode-and-forward(DF)mode when it successfully decodes the received message;otherwise,it switches to soft information relaying(SIR)mode.The benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy alone.Closed-form expressions for the outage probability and symbol error rate(SER)are derived for coded cooperative communication with HDFSIR and energy-harvesting relays.Additionally,we introduce a novel normalized log-likelihood-ratio based soft estimation symbol(NL-SES)mapping technique,which enhances soft symbol accuracy for higher-order modulation,and propose a model characterizing the relationship between the estimated complex soft symbol and the actual high-order modulated symbol.Further-more,the hybrid DF-SIR strategy is extended to a distributed Alamouti space-time-coded cooperative network.To evaluate the~performance of the proposed HDFSIR strategy,we implement extensive Monte Carlo simulations under varying channel conditions.Results demonstrate significant improvements with the hybrid technique outperforming individual DF and SIR strategies in both conventional and distributed Alamouti space-time coded cooperative networks.Moreover,at a SER of 10^(-3),the proposed NL-SES mapping demonstrated a 3.5 dB performance gain over the conventional averaging one,highlighting its superior accuracy in estimating soft symbols for quadrature phase-shift keying modulation. 展开更多
关键词 Cooperative communication soft information relaying soft symbols modeling cooperative diversity gain distributed Alamouti space-time code
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
15
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Deep learning on chromatin profiles reveals the cis-regulatory sequence code of the rice genome
16
作者 Xinkai Zhou Zhonghao Ruan +2 位作者 Chenlu Zhang Kerstin Kaufmann Dijun Chen 《Journal of Genetics and Genomics》 2025年第6期848-851,共4页
Rice(Oryza sativa)is a staple food for more than half of the world's population and a critical crop for global agriculture.Understanding the regulatory mechanisms that control gene expression in the rice genome is... Rice(Oryza sativa)is a staple food for more than half of the world's population and a critical crop for global agriculture.Understanding the regulatory mechanisms that control gene expression in the rice genome is fundamental for advancing agricultural productivity and food security.In mechanism,cis-regulatory elements(including promoters,enhancers,silencers,and insulators)are key DNA sequences whose activities determine the spatial and temporal expression patterns of nearby genes(Yocca and Edger,2022;Schmitz et al.,2022). 展开更多
关键词 cis regulatory elements deep learning chromatin profiles agricultural productivity rice genome cis regulatory sequence code gene expression food security
原文传递
Low-Complexity Codebook Design for SCMA-Assisted Indoor Visible Light Communication Systems
17
作者 Wang Yuhao Xu Chuan +3 位作者 Yu Lisu Lyu Xinxin Chen Junyuan Wang Zhenghai 《China Communications》 2025年第6期180-192,共13页
Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to... Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to its ability to handle user overload.Introducing SCMA into visible light communication(VLC)systems can improve the data transmission capability of the system.However,designing a suitable codebook becomes a challenging problem when addressing the demands of massive connectivity scenarios.Therefore,this paper proposes a low-complexity design method for high-overload codebooks based on the minimum bit error rate(BER)criterion.Firstly,this paper constructs a new codebook with parameters based on the symmetric mother codebook structure by allocating the codeword power so that the power of each user codebook is unbalanced;then,the BER performance in the visible light communication system is optimized to obtain specific parameters;finally,the successive interference cancellation(SIC)detection algorithm is used at the receiver side.Simulation results show that the method proposed in this paper can converge quickly by utilizing a relatively small number of detection iterations.This can simultaneously reduce the complexity of design and detection,outperforming existing design methods for massive SCMA codebooks. 展开更多
关键词 high overload low-complexity codebook design sparse code multiple access(SCMA) successive interference cancellation(SIC) visible light communication(VLC)
在线阅读 下载PDF
Huffman-Code-Based Ternary Tree Transformation
18
作者 Qing-Song Li Huan-Yu Liu +2 位作者 Qingchun Wang Yu-Chun Wu Guo-Ping Guo 《Chinese Physics Letters》 2025年第10期1-12,共12页
Using a quantum computer to simulate fermionic systems requires fermion-to-qubit transformations.Usually,lower Pauli weight of transformations means shallower quantum circuits.Therefore,most existing transformations a... Using a quantum computer to simulate fermionic systems requires fermion-to-qubit transformations.Usually,lower Pauli weight of transformations means shallower quantum circuits.Therefore,most existing transformations aim for lower Pauli weight.However,in some cases,the circuit depth depends not only on the Pauli weight but also on the coefficients of the Hamiltonian terms.In order to characterize the circuit depth of these algorithms,we propose a new metric called weighted Pauli weight,which depends on Pauli weight and coefficients of Hamiltonian terms.To achieve smaller weighted Pauli weight,we introduce a novel transformation,Huffman-code-based ternary tree(HTT)transformation,which is built upon the classical Huffman code and tailored to different Hamiltonians.We tested various molecular Hamiltonians and the results show that the weighted Pauli weight of the HTT transformation is smaller than that of commonly used mappings.At the same time,the HTT transformation also maintains a relatively small Pauli weight.The mapping we designed reduces the circuit depth of certain Hamiltonian simulation algorithms,facilitating faster simulation of fermionic systems. 展开更多
关键词 quantum computer weighted pauli weightwhich Huffman code based ternary tree transformation simulate fermionic systems fermion qubit transformations characterize circuit depth hamiltonian termsin fermionic systems
原文传递
A Novel Progressive Edge Growth-Based Codebook Design for SCMA Systems
19
作者 Lei Tuofeng Ni Shuyan +2 位作者 Luo Qu Chen Shimiao Xiao Pei 《China Communications》 2025年第6期116-130,共15页
This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource ... This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource node(RN)instead of rotating a mother constellation(MC)as in the conventional SCMA works.In the other one,based on the MC,a multi-resources rotated codebooks are proposed to improve the performance of the superimposed constellations.The resultant codebooks are respectively referred to as the resource edge multidimensional codebooks(REMC)and the user edge multi-dimensional codebooks(UEMC).Additionally,we delve into the detailed design of the MC and the superimposed constellation.Then,we pay special attention to the application of the proposed schemes to challenging design cases,particularly for the high dimensional,high rate,and irregular codebooks,where the corresponding simplified schemes are proposed to reduce the complexity of codebook design.Finally,simulation results are presented to demonstrate the superiority of our progressive edge growth-based schemes.The numerical results indicate that the proposed codebooks significantly outperform the stateof-the-art codebooks.In addition,we also show that the proposed REMC codebooks outperform in the lower signal-to-noise ratio(SNR)regime,whereas the UEMC codebooks exhibit better performance at higher SNRs. 展开更多
关键词 codebook design resource edge multidimensional codebooks(REMC) sparse code multiple access(SCMA) symbol error performance user edge multi-dimensional codebooks(UEMC)
在线阅读 下载PDF
LINC00839调节miR-625-5p/MSI1轴对子宫内膜癌细胞恶性生物学行为的影响 被引量:1
20
作者 黄霁 邓秀娟 程显 《中国医科大学学报》 北大核心 2025年第2期121-126,132,共7页
目的 探究长链非编码RNA LINC00839调节miR-625-5p/MSI1轴对子宫内膜癌(EC)细胞恶性生物学行为的影响。方法采用实时定量PCR检测EC组织和细胞中LINC00839、miR-625-5p、MSI1 mRNA表达水平。以Ishikawa细胞为研究对象,采用生物信息学、... 目的 探究长链非编码RNA LINC00839调节miR-625-5p/MSI1轴对子宫内膜癌(EC)细胞恶性生物学行为的影响。方法采用实时定量PCR检测EC组织和细胞中LINC00839、miR-625-5p、MSI1 mRNA表达水平。以Ishikawa细胞为研究对象,采用生物信息学、双萤光素酶报告基因实验、RNA结合蛋白免疫沉淀实验验证LINC00839、MSI1与miR-625-5p的靶向关系;采用CCK-8、集落形成、流式细胞术、Transwell实验检测细胞增殖、凋亡、迁移和侵袭,采用Western blotting检测MSI1、Bcl-2、Bax、MMP-2、MMP-9蛋白表达水平。体内成瘤实验验证LINC00839对裸鼠移植瘤的影响。结果 EC组织中LINC00839、MSI1 mRNA表达水平升高,miR-625-5p表达水平下降(P <0.05);LINC00839、MSI1可靶向作用于miR-625-5p。LINC00839敲低或miR-625-5p过表达抑制细胞恶性生物学行为(P <0.05)。抑制miR-625-5p表达或过表达MSI1,可逆转LINC00839敲低或miR-625-5p过表达对细胞恶性生物学行为的抑制作用(P <0.05)。LINC00839敲低可抑制移植瘤的体积和质量,升高miR-625-5p表达水平,抑制MSI1表达水平。结论 LINC00839可靶向调节miR-625-5p/MSI1轴,调控EC细胞的增殖、凋亡、迁移及侵袭。 展开更多
关键词 子宫内膜癌 恶性生物学行为 长链非编码RNA LINC00839 miR-625-5p MSI1
暂未订购
上一页 1 2 250 下一页 到第
使用帮助 返回顶部