期刊文献+
共找到788篇文章
< 1 2 40 >
每页显示 20 50 100
Research of Methods for Lost Data Reconstruction in Erasure Codes over Binary Fields 被引量:2
1
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期43-48,共6页
In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform... In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future. 展开更多
关键词 Binary fields data reconstruction decoding erasure codes
在线阅读 下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
2
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
在线阅读 下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
3
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
在线阅读 下载PDF
A Construction of Multi-Sender Authentication Codes from Eigenvalues and Eigenvectors of the Matrix Over Finite Fields
4
作者 Xiuli Wang Lina Wang Yakun Hao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2019年第1期51-60,共10页
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta... We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message. 展开更多
关键词 multi-sender AUTHENTICATION codes NONSINGULAR symmetric matrix EIGENVALUES EIGENVECTORS finite fields
在线阅读 下载PDF
基于置换多项式簇的五类置换码构造及其参数分析
5
作者 叶娜 夏永波 《数学杂志》 2026年第1期20-30,共11页
本文研究了基于有限域上的置换多项式构造置换码的问题.利用有限域上形如f(x)=αx^(m)+βx(其中m为正整数)的置换多项式簇,构造了五类置换码,并借助求解有限域上代数方程的一些方法,确定了这五类置换码的参数,包括码长、码字数量和极小... 本文研究了基于有限域上的置换多项式构造置换码的问题.利用有限域上形如f(x)=αx^(m)+βx(其中m为正整数)的置换多项式簇,构造了五类置换码,并借助求解有限域上代数方程的一些方法,确定了这五类置换码的参数,包括码长、码字数量和极小汉明距离,所得结果丰富了置换码的构造理论. 展开更多
关键词 置换多项式 置换码 极小汉明距离 码字数量 有限域
在线阅读 下载PDF
网络环境下基于Erasure Codes的高可靠性存储体系设计 被引量:1
6
作者 贾军博 谷建华 +1 位作者 朱靖飞 张集文 《计算机应用研究》 CSCD 北大核心 2009年第5期1835-1838,共4页
设计了一种基于Erasure Codes的网络环境下的分布式文件存储系统。初步的实验结果证明这种存储体系可以较好地解决人们当前所面临的文件存储的可靠性、安全性等问题。
关键词 分布式存储 数据可靠性 数据安全性 纠错码 加罗华域
在线阅读 下载PDF
生态环境法典编纂的“适度法典化”再造——基于系统观念的启示
7
作者 许政敏 李莉娜 《湖南工业大学学报(社会科学版)》 2026年第1期104-112,共9页
系统观念是引领生态环境法典编纂的重要原则。基于系统观念,生态环境法典编纂的“适度法典化”再造,应在“整体论”与“系统构造原理”指引下,明确生态环境法典的“领域型法典”深层次性质,即在“领域性”基础上进一步明确其“行政立法... 系统观念是引领生态环境法典编纂的重要原则。基于系统观念,生态环境法典编纂的“适度法典化”再造,应在“整体论”与“系统构造原理”指引下,明确生态环境法典的“领域型法典”深层次性质,即在“领域性”基础上进一步明确其“行政立法领域”性质,从而确立法典编纂的中心目标应聚焦于生态环境行政领域,而非“诸法合体”。在系统运用编纂方法上,应明确“适度法典化”的“适度性”界限与程度,为完善法典编纂提供可操作性指导。在系统设计体例架构上,应在“适度性”上框定法典的架构范围及其法典化内容,适度提高法典的体系性。 展开更多
关键词 生态环境法典 “适度法典化” 系统观念 行政立法领域
在线阅读 下载PDF
A deterministic method for designing near field and far field earthquakes 被引量:1
8
作者 高孟潭 鄢家全 《Acta Seismologica Sinica(English Edition)》 CSCD 1995年第3期457-462,共6页
The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake ... The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake is proPosed based on the results of deterministic seismic zoning map(1977). The Seismic intensity Zoning Map of China (1990),which is currently used in China, was compiled using probabilistic approach. So the method determining the far field earthquake based on deterministic zoning method is not suitable. A new method is providedin this paper under the consideration of the essence of the near field and far field earthquake and the aPProach ofthe probabilistic seismic hazard analysis. The related problems of how to use the Building Code (GBJll-89) andthe Seismic intensity Zoning Map of China(1990) are solved. 展开更多
关键词 probebility intensity evaluation field earthuake building code
在线阅读 下载PDF
Error Resilient Video Communication Based on Picture Level Adaptive Frame / Field Coding
9
作者 徐巍炜 周凡 陈耀武 《Journal of Donghua University(English Edition)》 EI CAS 2013年第2期103-109,共7页
Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to ... Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to evaluate the severity of error propagation in the following frames,the error propagation intensity and human visual quality sensitivity of different areas were taken into consideration. It was followed by the quantification of relative importance. Finally,the proper coding mode was chosen utilizing an unequal comparison procedure. The simulation results show that the proposed method can improve peak signal-to-noise ratio (PSNR) up to 0. 9 dB and 1. 6 dB comparing with the field only and the dispersed flexible macro-block ordering (FMO)only methods respectively. 展开更多
关键词 error resilience field coding adaptive frame/field coding human visual system error control coding
在线阅读 下载PDF
Optimal power allocation for complex field network coding scheme with the K-th best relay selection
10
作者 Xi CAI Pingzhi FAN Qingchun CHEN 《Journal of Modern Transportation》 2012年第4期255-260,共6页
Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme wit... Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme with the K-th best relay selection (KBS) is proposed and investigated, wherein the K-th best relay is selected to forward the multiplexed signal to the destination. First, the upper bound of the symbol error probability (SEP), the diversity order, and the coding gain are derived for the CFNC scheme with KBS. Then, the coding gain is utilized as the optimized cri- terion to determine the optimal power allocation. It is validated through analysis and simulation that the CFNC scheme with KBS can achieve full diversity only when K=I, while the diversity order decreases with increasing parameter K, and the optimal power allocation can significantly improve the performance of the CFNC scheme with KBS. 展开更多
关键词 complex field network coding the K-th best relay selection power allocation
在线阅读 下载PDF
ON SELF-DUAL PERMUTATION CODES
11
作者 樊恽 袁媛 《Acta Mathematica Scientia》 SCIE CSCD 2008年第3期633-638,共6页
Permutation codes over finite fields are introduced, some conditions for existence or non-existence of self-dual permutation codes are obtained.
关键词 Finite field group code permutation code self-dual code
在线阅读 下载PDF
Simulation of Electric Fields in Small Size Divertor Tokamak Plasma Edge
12
作者 A. H. BEKHEIT 《Energy and Power Engineering》 2010年第1期39-45,共7页
The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not... The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not close to the neoclassical electric field. Second, the shear of radial electric field is independent on plasma parameters. Third, switching on poloidal drifts (E×B and diamagnetic drifts) leads to asymmetric parallel and poloidal fluxes from outer to inner plates and upper part of SOL for normal direction of toroidal magnetic field. Fourth, for the normal direction of toroidal magnetic, the radial electric field of SSDT is affected by the variation in temperature heating of plasma. Fifth, the parallel flux is directed from inner to outer plate in case of discharge without neutral beam injection (NBI). 展开更多
关键词 ELECTRIC field TRANSPORT codeS DIVERTOR TOKAMAK
在线阅读 下载PDF
THE TRUE DIMENSION OF CERTAIN ALTERNANT CODES
13
作者 Yue Dianwu Feng Guangzeng(Dept. of Telecom. Eng., Nanjing University of Posts & Telecommunications, Nanjing 210003) 《Journal of Electronics(China)》 2000年第4期352-356,共5页
By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimen... By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimension. 展开更多
关键词 Alternant code DIMENSION ALGEBRAIC funtion field Geometric Goppa code
在线阅读 下载PDF
Simulation of small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal
14
作者 A. H. Bekheit 《Natural Science》 2011年第8期738-742,共5页
Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tok... Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal is simulated by B2SOLPS0.5.2D fluid transport code. The simulation demonstrate the following results: 1) Parallel (toroidal) flow flux and Mach number up to 0.6 at higher plasma density reverse with reverse toroidal magnetic direction in the edge plasma of small size divertor tokamak. 2) The radial electric field is toroidal magnetic direction independence in edge plasma of small size divertor tokamak. 3) For normal and reverse toroidal magnetic field, the strong ITB is located between the positions of the maximum and minimum values of the radial electric field shear. 4) Simulation result shows that, the structure of radial electric field at high field side (HFS) and low field side (LFS) is different. This difference result from the change in the parallel flux flows in the scrape off layer (SOL) to plasma core through separatrix. 5) At a region of strong radial electric field shear, a large reduction of poloidal rotation was observed. 6) The poloidal rotation is toroidal magnetic field direction dependence. 展开更多
关键词 REVERSE TOROIDAL field B2SOLPS0.5.2D code ITB
暂未订购
基于公钥思想的非对称Hopping Code系统编码芯片设计
15
作者 柯建东 祝叶华 +1 位作者 刘文江 戎蒙恬 《微电子学与计算机》 CSCD 北大核心 2006年第6期138-140,144,共4页
针对应用于遥控或命令辨别场合的跳码系统,提出了一种新型的非对称跳码算法。该跳码系统的加解密算法基于有限域GF(2m)上的多项式运算,采用了随机数发生器,能够完成汽车电子钥匙等遥控或命令辨别场合的跳码功能,并达到较高的安全性。文... 针对应用于遥控或命令辨别场合的跳码系统,提出了一种新型的非对称跳码算法。该跳码系统的加解密算法基于有限域GF(2m)上的多项式运算,采用了随机数发生器,能够完成汽车电子钥匙等遥控或命令辨别场合的跳码功能,并达到较高的安全性。文章主要介绍了加解密模块及发送端芯片的设计与实现。 展开更多
关键词 跳码 加解密 编码发送芯片 有限域上多项式 超大规模集成电路
在线阅读 下载PDF
Field Electron Emission from Diamond - like Carbon Films
16
作者 ZHANGBing-lin WANGXiao-ping 《Semiconductor Photonics and Technology》 CAS 1999年第3期152-155,共4页
A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special p... A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special pretreatment ceramic substrates were used. The characteristics of the film have been identified by using X-ray diffraction(XRD),and Raman spectrum. The field emission experiment has been performed in a vacuum chamber with a base pressure of about 10 -5 Pa. The turn-on field of 1.2 V/μm,and the current density of 1.25 mA/cm 2 at electric field of 6 V/μm were obtained. 展开更多
关键词 Chemical Vapor Deposition DIAMOND Diamond-like Carbon field Emission CLC number:O472 Document code:A
在线阅读 下载PDF
OCDMA SystemSignature Code Design Theory Via Finite Projective Geometry 被引量:1
17
作者 Li Chuanqi Sun Xiaohan +1 位作者 Zhang Mingde Je-Myung Jeong 《工程科学(英文版)》 2005年第4期37-44,共8页
Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical ortho... Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical orthogonal code designing and finite geometry theory were discussed; find out the corresponding relationship between the parameter of OOC and that of finite geometry space. In this article, the systematic theory of OOC designing based on projective geometry is established in detail. The designing process and results of OOC on projective plane PG(2,q) and on m-dimension projective space are given respectively. Furthermore, the analytical theory for the corresponding relation between OOC with high cross-correlation and k-D manifold of projective space is set up. The OOC designing results given in this article have excellent performance, whose maximum cross-correlation is 1, and the cardinality reaches the Johnson upper bound, i.e. it realizes the optimization in both MUI and system capacity. 展开更多
关键词 OCDMA系统 有限射影几何学 有限域 向量空间 光学正交码
在线阅读 下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
18
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
在线阅读 下载PDF
论生态环境法典法律责任的规范构造 被引量:7
19
作者 黄锡生 黄淑婷 《学术论坛》 北大核心 2025年第3期69-83,共15页
生态环境法典法律责任的内容和结构在学术界引起了广泛讨论,形成了诸多不同的观点。厘清生态环境法典法律责任的内容并进行科学合理编排,对于实质性推进生态环境法典的编纂进程具有重要意义。从现行法律体系来看,民事和刑事立法对环境... 生态环境法典法律责任的内容和结构在学术界引起了广泛讨论,形成了诸多不同的观点。厘清生态环境法典法律责任的内容并进行科学合理编排,对于实质性推进生态环境法典的编纂进程具有重要意义。从现行法律体系来看,民事和刑事立法对环境民事责任和环境刑事责任已有较为完备的规定,生态环境法典对这两种责任设置引致条款即可。生态环境法典行政立法领域的定位表明它是行政法领域的法典,是行政法典的分支,为部门型法典,这一根本定位决定了环境行政责任是生态环境法典法律责任的核心内容。生态环境法典法律责任的主要内容有普适性规定,环境行政处罚(环境行政命令、环境行政处分)规定、环境刑事责任和环境民事责任的引致条款以及环境行政责任和其他法律责任的衔接规定。结合《生态环境法典(草案)》,在结构安排上建议采用“独立为主、分散为辅”的立法模式,生态环境法典在总则编设置独立的生态环境法律责任章对生态环境法典法律责任的一般性问题进行统领性规定,共通性环境行政管理制度涉及的行政责任规范紧随该制度,污染防治编、生态保护编、绿色低碳发展编则在各编中设置独立的法律责任章或节。 展开更多
关键词 生态环境法典 法律责任 行政立法领域 环境行政责任
在线阅读 下载PDF
Sidon空间和循环子空间码的构造
20
作者 刘雪梅 张佳瑢 《河南师范大学学报(自然科学版)》 北大核心 2025年第3期66-71,F0002,共7页
子空间码特别是循环子空间码在随机网络编码中具有高效的编码和译码算法,因此近年来受到了广泛关注.Sidon空间是构造循环子空间码的重要工具,利用有限域上的本原元和不可约多项式的根,构造了不同维数的Sidon空间,并在此基础上得到了码... 子空间码特别是循环子空间码在随机网络编码中具有高效的编码和译码算法,因此近年来受到了广泛关注.Sidon空间是构造循环子空间码的重要工具,利用有限域上的本原元和不可约多项式的根,构造了不同维数的Sidon空间,并在此基础上得到了码字个数更多的循环子空间码. 展开更多
关键词 有限域 循环子空间码 Sidon空间 不可约多项式的根
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部