期刊文献+
共找到9,503篇文章
< 1 2 250 >
每页显示 20 50 100
A NEW ML DETECTION ALGORITHM FOR ORTHOGONAL MULTICODE SYSTEM IN NAKAGAMI FADING CHANNEL
1
作者 Wei Shengqun Cheng Yunpeng Wang Jinlong 《Journal of Electronics(China)》 2006年第2期184-188,共5页
Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation res... Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance. 展开更多
关键词 Signal detection Orthogonal code Maximum-Likelihood (ML) Nakagami fading channel
在线阅读 下载PDF
Predicting and Classifying User Identification Code System Based on Support Vector Machines
2
作者 陈民枝 陈荣昌 +1 位作者 梁倩华 陈同孝 《Journal of Donghua University(English Edition)》 EI CAS 2007年第2期280-283,共4页
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th... In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies. 展开更多
关键词 WATERMARK Support Vector Machines SVMs )User IDentification (UID) code COLLUSION
在线阅读 下载PDF
The Function and Realization of Labor Rights in the Labor Code System
3
作者 TIAN Silu WU Yang 《The Journal of Human Rights》 2024年第5期1076-1097,共22页
The fundamental right-based and human right-based nature of labor rights forms the subjective and objective theory of labor rights.The derived objective protection function and subjective realization function constitu... The fundamental right-based and human right-based nature of labor rights forms the subjective and objective theory of labor rights.The derived objective protection function and subjective realization function constitute the theoretical basis of the labor code system.The objective function of labor rights requires the labor code to provide corresponding institutional guarantees,while the subjective function demands that the code ensure the full realization of labor rights.The dual functions of labor rights are reflected in the structural framework and content logic of the labor code separately:on the one hand,labor rights can serve as the structural thread for narrating and systematically organizing the labor code,with the specific types of labor rights protection and functional systems jointly forming the framework of the code;on the other hand,the content arrangement of the labor code is guided by the value of realizing labor rights,exploring the pathways for the code’s realization of labor rights in different situations. 展开更多
关键词 labor rights labor code labor rights protection labor rights realization systemATIZATION
原文传递
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
4
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
Design of Serially Concatenated Two-Level Polar Coded Modulation System with Low-Complexity
5
作者 Zhou Lin Liao Guojun +3 位作者 Xu Lei An Ran Xie Xianzhong Wang Xi 《China Communications》 2025年第1期102-110,共9页
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat... Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%. 展开更多
关键词 bit-interleaved coded modulation high-order modulation multilevel coding polar codes
在线阅读 下载PDF
Research on deep learning decoding method for polar codes in ACO-OFDM spatial optical communication system
6
作者 LIU Kangrui LI Ming +2 位作者 CHEN Sizhe QU Jiashun ZHOU Ming’ou 《Optoelectronics Letters》 2025年第7期427-433,共7页
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule... Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder. 展开更多
关键词 frequency conduction polar codes deep learning signal demodulation deep learning technique DECODING ACO OFDM polarization code decoding
原文传递
Coded Distributed Computing for System with Stragglers
7
作者 Xu Jiasheng Kang Huquan +5 位作者 Zhang Haonan Fu Luoyi Long Fei Cao Xinde Wang Xinbing Zhou Chenghu 《China Communications》 2025年第8期298-313,共16页
Distributed computing is an important topic in the field of wireless communications and networking,and its high efficiency in handling large amounts of data is particularly noteworthy.Although distributed computing be... Distributed computing is an important topic in the field of wireless communications and networking,and its high efficiency in handling large amounts of data is particularly noteworthy.Although distributed computing benefits from its ability of processing data in parallel,the communication burden between different servers is incurred,thereby the computation process is detained.Recent researches have applied coding in distributed computing to reduce the communication burden,where repetitive computation is utilized to enable multicast opportunities so that the same coded information can be reused across different servers.To handle the computation tasks in practical heterogeneous systems,we propose a novel coding scheme to effectively mitigate the "straggling effect" in distributed computing.We assume that there are two types of servers in the system and the only difference between them is their computational capabilities,the servers with lower computational capabilities are called stragglers.Given any ratio of fast servers to slow servers and any gap of computational capabilities between them,we achieve approximately the same computation time for both fast and slow servers by assigning different amounts of computation tasks to them,thus reducing the overall computation time.Furthermore,we investigate the informationtheoretic lower bound of the inter-communication load and show that the lower bound is within a constant multiplicative gap to the upper bound achieved by our scheme.Various simulations also validate the effectiveness of the proposed scheme. 展开更多
关键词 coded computation communication load distributed computing straggling effect
在线阅读 下载PDF
Quantum decoder design for subsystem surface code based on multi-head graph attention and edge weighting
8
作者 Nai-Hua Ji Hui-Qian Sun +2 位作者 Bo Xiao Ping-Li Song Hong-Yang Ma 《Chinese Physics B》 2025年第2期165-176,共12页
Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem s... Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem surface code with three-qubit check operators demonstrates significant application potential due to its simplified measurement operations and low logical error rates.However,the existing minimum-weight perfect matching(MWPM)algorithm exhibits high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoder based on a graph attention network(GAT),representing error syndromes as undirected graphs with edge weights,and employing a multihead attention mechanism to efficiently aggregate node features and enable parallel computation.Compared to MWPM,the GAT decoder exhibits linear growth in computational complexity,adapts to different quantum code structures,and demonstrates stronger robustness under high physical error rates.The experimental results demonstrate that the proposed decoder achieves an overall accuracy of 89.95%under various small code lattice sizes(L=2,3,4,5),with the logical error rate threshold increasing to 0.0078,representing an improvement of approximately 13.04%compared to the MWPM decoder.This result significantly outperforms traditional methods,showcasing superior performance under small code lattice sizes and providing a more efficient decoding solution for large-scale quantum error correction. 展开更多
关键词 quantum error correction graph attention network subsystem surface code circuit-level noise
原文传递
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
9
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLINK
在线阅读 下载PDF
Low-Complexity Codebook Design for SCMA-Assisted Indoor Visible Light Communication Systems
10
作者 Wang Yuhao Xu Chuan +3 位作者 Yu Lisu Lyu Xinxin Chen Junyuan Wang Zhenghai 《China Communications》 2025年第6期180-192,共13页
Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to... Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to its ability to handle user overload.Introducing SCMA into visible light communication(VLC)systems can improve the data transmission capability of the system.However,designing a suitable codebook becomes a challenging problem when addressing the demands of massive connectivity scenarios.Therefore,this paper proposes a low-complexity design method for high-overload codebooks based on the minimum bit error rate(BER)criterion.Firstly,this paper constructs a new codebook with parameters based on the symmetric mother codebook structure by allocating the codeword power so that the power of each user codebook is unbalanced;then,the BER performance in the visible light communication system is optimized to obtain specific parameters;finally,the successive interference cancellation(SIC)detection algorithm is used at the receiver side.Simulation results show that the method proposed in this paper can converge quickly by utilizing a relatively small number of detection iterations.This can simultaneously reduce the complexity of design and detection,outperforming existing design methods for massive SCMA codebooks. 展开更多
关键词 high overload low-complexity codebook design sparse code multiple access(SCMA) successive interference cancellation(SIC) visible light communication(VLC)
在线阅读 下载PDF
Efficient Malicious QR Code Detection System Using an Advanced Deep Learning Approach
11
作者 Abdulaziz A.Alsulami Qasem Abu Al-Haija +4 位作者 Badraddin Alturki Ayman Yafoz Ali Alqahtani Raed Alsini Sami Saeed Binyamin 《Computer Modeling in Engineering & Sciences》 2025年第10期1117-1140,共24页
QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribu... QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribution and phishing attacks.Traditional detection approaches rely on URL analysis or image-based feature extraction,whichmay introduce significant computational overhead and limit real-time applicability,and their performance often depends on the quality of extracted features.Previous studies in malicious detection do not fully focus on QR code securitywhen combining convolutional neural networks(CNNs)with recurrent neural networks(RNNs).This research proposes a deep learning model that integrates AlexNet for feature extraction,principal component analysis(PCA)for dimensionality reduction,and RNNs to detect malicious activity in QR code images.The proposed model achieves both efficiency and accuracy by transforming image data into a compact one-dimensional sequence.Experimental results,including five-fold cross-validation,demonstrate that the model using gated recurrent units(GRU)achieved an accuracy of 99.81%on the first dataset and 99.59%in the second dataset with a computation time of only 7.433 ms per sample.A real-time prototype was also developed to demonstrate deployment feasibility.These results highlight the potential of the proposed approach for practical,real-time QR code threat detection. 展开更多
关键词 CYBERSECURITY quick response(QR)code deep learning recurrent neural network(RNN) gated recurrent unit(GRU) long short-term memory(LSTM)
在线阅读 下载PDF
A Novel Progressive Edge Growth-Based Codebook Design for SCMA Systems
12
作者 Lei Tuofeng Ni Shuyan +2 位作者 Luo Qu Chen Shimiao Xiao Pei 《China Communications》 2025年第6期116-130,共15页
This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource ... This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource node(RN)instead of rotating a mother constellation(MC)as in the conventional SCMA works.In the other one,based on the MC,a multi-resources rotated codebooks are proposed to improve the performance of the superimposed constellations.The resultant codebooks are respectively referred to as the resource edge multidimensional codebooks(REMC)and the user edge multi-dimensional codebooks(UEMC).Additionally,we delve into the detailed design of the MC and the superimposed constellation.Then,we pay special attention to the application of the proposed schemes to challenging design cases,particularly for the high dimensional,high rate,and irregular codebooks,where the corresponding simplified schemes are proposed to reduce the complexity of codebook design.Finally,simulation results are presented to demonstrate the superiority of our progressive edge growth-based schemes.The numerical results indicate that the proposed codebooks significantly outperform the stateof-the-art codebooks.In addition,we also show that the proposed REMC codebooks outperform in the lower signal-to-noise ratio(SNR)regime,whereas the UEMC codebooks exhibit better performance at higher SNRs. 展开更多
关键词 codebook design resource edge multidimensional codebooks(REMC) sparse code multiple access(SCMA) symbol error performance user edge multi-dimensional codebooks(UEMC)
在线阅读 下载PDF
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
13
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
Rateless Polar Codes with Unequal Error Protection Property
14
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
15
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
VS Code软件技术在红绿彩文化网站构建中的应用研究
16
作者 李萍 杨冬梅 《办公自动化》 2026年第6期1-3,共3页
红绿彩文化作为中华民族传统文化的重要组成部分,有着悠久的历史和独特的艺术价值。其兴起打破以往以单色釉为主导的高温烧瓷的局面,在历史的长河中不断地推陈出新。然而,在现代社会中,随着文化的多元化和工业化的冲击,红绿彩文化发展... 红绿彩文化作为中华民族传统文化的重要组成部分,有着悠久的历史和独特的艺术价值。其兴起打破以往以单色釉为主导的高温烧瓷的局面,在历史的长河中不断地推陈出新。然而,在现代社会中,随着文化的多元化和工业化的冲击,红绿彩文化发展面临着诸多挑战。在此背景下,借助VS Code以及JavaScript相关技术,对红绿彩文化网站进行深化设计与研究,为构建交互型红绿彩文化网站提供借鉴,同时也将为传播红绿彩文化提供具体可行的方法。 展开更多
关键词 红绿彩文化 JAVASCRIPT VS code 网站
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
17
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
18
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
Beyond Accuracy:Evaluating and Explaining the Capability Boundaries of Large Language Models in Syntax-Preserving Code Translation
19
作者 Yaxin Zhao Qi Han +1 位作者 Hui Shu Yan Guang 《Computers, Materials & Continua》 2026年第2期1371-1394,共24页
LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora... LargeLanguageModels(LLMs)are increasingly appliedinthe fieldof code translation.However,existing evaluation methodologies suffer from two major limitations:(1)the high overlap between test data and pretraining corpora,which introduces significant bias in performance evaluation;and(2)mainstream metrics focus primarily on surface-level accuracy,failing to uncover the underlying factors that constrain model capabilities.To address these issues,this paper presents TCode(Translation-Oriented Code Evaluation benchmark)—a complexity-controllable,contamination-free benchmark dataset for code translation—alongside a dedicated static feature sensitivity evaluation framework.The dataset is carefully designed to control complexity along multiple dimensions—including syntactic nesting and expression intricacy—enabling both broad coverage and fine-grained differentiation of sample difficulty.This design supports precise evaluation of model capabilities across a wide spectrum of translation challenges.The proposed evaluation framework introduces a correlation-driven analysis mechanism based on static program features,enabling predictive modeling of translation success from two perspectives:Code Form Complexity(e.g.,code length and character density)and Semantic Modeling Complexity(e.g.,syntactic depth,control-flow nesting,and type system complexity).Empirical evaluations across representative LLMs—including Qwen2.5-72B and Llama3.3-70B—demonstrate that even state-of-the-art models achieve over 80% compilation success on simple samples,but their accuracy drops sharply below 40% on complex cases.Further correlation analysis indicates that Semantic Modeling Complexity alone is correlated with up to 60% of the variance in translation success,with static program features exhibiting nonlinear threshold effects that highlight clear capability boundaries.This study departs fromthe traditional accuracy-centric evaluation paradigm and,for the first time,systematically characterizes the capabilities of large languagemodels in translation tasks through the lens of programstatic features.The findings provide actionable insights for model refinement and training strategy development. 展开更多
关键词 Large language models(LLMs) code translation compiler testing program analysis complexity-based evaluation
在线阅读 下载PDF
TLS Blind Recognition Algorithm of LDPC Codes
20
作者 Ning Xiaoyan Sun Jingjing +1 位作者 Wang Zhenduo Sun Zhiguo 《China Communications》 2026年第2期112-121,共10页
Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively ... Blind recognition of low-density paritycheck(LDPC)codes has gradually attracted more attention with the development of military and civil communications.However,in the case of the paritycheck matrices with relatively high row weights,the existing blind recognition algorithms based on a candidate set generally perform worse.In this paper,we propose a blind recognition method for LDPC codes,called as tangent function assisted least square(TLS)method,which improves recognition performances by constructing a new cost function.To characterize the constraint degree among received vectors and paritycheck vectors,a feature function based on tangent function is constructed in the proposed algorithm.A cost function based on least square method is also established according to the feature function values satisfying the parity-check relationship.Moreover,the minimum average value in TLS is obtained on the candidate set.Numerical analysis and simulation results show that recognition performances of TLS algorithm are consistent with theoretical results.Compared with existing algorithms,the proposed method possesses better recognition performances. 展开更多
关键词 blind recognition cost function least square low-density parity-check(LDPC)codes
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部