期刊文献+
共找到787篇文章
< 1 2 40 >
每页显示 20 50 100
Research of Methods for Lost Data Reconstruction in Erasure Codes over Binary Fields 被引量:2
1
作者 Dan Tang 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期43-48,共6页
In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform... In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future. 展开更多
关键词 Binary fields data reconstruction decoding erasure codes
在线阅读 下载PDF
Using Normal Form of Nilpotent Matrices over Finite Fields to Construct Cartesian Authentication Codes 被引量:5
2
作者 赵辉芳 秦德生 《Northeastern Mathematical Journal》 CSCD 2004年第4期415-423,共9页
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules... Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed. 展开更多
关键词 cartesian authentication codes finite field nilpotent matrices
在线阅读 下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
3
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
在线阅读 下载PDF
A Construction of Multi-Sender Authentication Codes from Eigenvalues and Eigenvectors of the Matrix Over Finite Fields
4
作者 Xiuli Wang Lina Wang Yakun Hao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2019年第1期51-60,共10页
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta... We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message. 展开更多
关键词 multi-sender AUTHENTICATION codes NONSINGULAR symmetric matrix EIGENVALUES EIGENVECTORS finite fields
在线阅读 下载PDF
网络环境下基于Erasure Codes的高可靠性存储体系设计 被引量:1
5
作者 贾军博 谷建华 +1 位作者 朱靖飞 张集文 《计算机应用研究》 CSCD 北大核心 2009年第5期1835-1838,共4页
设计了一种基于Erasure Codes的网络环境下的分布式文件存储系统。初步的实验结果证明这种存储体系可以较好地解决人们当前所面临的文件存储的可靠性、安全性等问题。
关键词 分布式存储 数据可靠性 数据安全性 纠错码 加罗华域
在线阅读 下载PDF
A deterministic method for designing near field and far field earthquakes 被引量:1
6
作者 高孟潭 鄢家全 《Acta Seismologica Sinica(English Edition)》 CSCD 1995年第3期457-462,共6页
The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake ... The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake is proPosed based on the results of deterministic seismic zoning map(1977). The Seismic intensity Zoning Map of China (1990),which is currently used in China, was compiled using probabilistic approach. So the method determining the far field earthquake based on deterministic zoning method is not suitable. A new method is providedin this paper under the consideration of the essence of the near field and far field earthquake and the aPProach ofthe probabilistic seismic hazard analysis. The related problems of how to use the Building Code (GBJll-89) andthe Seismic intensity Zoning Map of China(1990) are solved. 展开更多
关键词 probebility intensity evaluation field earthuake building code
在线阅读 下载PDF
Error Resilient Video Communication Based on Picture Level Adaptive Frame / Field Coding
7
作者 徐巍炜 周凡 陈耀武 《Journal of Donghua University(English Edition)》 EI CAS 2013年第2期103-109,共7页
Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to ... Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to evaluate the severity of error propagation in the following frames,the error propagation intensity and human visual quality sensitivity of different areas were taken into consideration. It was followed by the quantification of relative importance. Finally,the proper coding mode was chosen utilizing an unequal comparison procedure. The simulation results show that the proposed method can improve peak signal-to-noise ratio (PSNR) up to 0. 9 dB and 1. 6 dB comparing with the field only and the dispersed flexible macro-block ordering (FMO)only methods respectively. 展开更多
关键词 error resilience field coding adaptive frame/field coding human visual system error control coding
在线阅读 下载PDF
Optimal power allocation for complex field network coding scheme with the K-th best relay selection
8
作者 Xi CAI Pingzhi FAN Qingchun CHEN 《Journal of Modern Transportation》 2012年第4期255-260,共6页
Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme wit... Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme with the K-th best relay selection (KBS) is proposed and investigated, wherein the K-th best relay is selected to forward the multiplexed signal to the destination. First, the upper bound of the symbol error probability (SEP), the diversity order, and the coding gain are derived for the CFNC scheme with KBS. Then, the coding gain is utilized as the optimized cri- terion to determine the optimal power allocation. It is validated through analysis and simulation that the CFNC scheme with KBS can achieve full diversity only when K=I, while the diversity order decreases with increasing parameter K, and the optimal power allocation can significantly improve the performance of the CFNC scheme with KBS. 展开更多
关键词 complex field network coding the K-th best relay selection power allocation
在线阅读 下载PDF
ON SELF-DUAL PERMUTATION CODES
9
作者 樊恽 袁媛 《Acta Mathematica Scientia》 SCIE CSCD 2008年第3期633-638,共6页
Permutation codes over finite fields are introduced, some conditions for existence or non-existence of self-dual permutation codes are obtained.
关键词 Finite field group code permutation code self-dual code
在线阅读 下载PDF
Simulation of Electric Fields in Small Size Divertor Tokamak Plasma Edge
10
作者 A. H. BEKHEIT 《Energy and Power Engineering》 2010年第1期39-45,共7页
The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not... The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not close to the neoclassical electric field. Second, the shear of radial electric field is independent on plasma parameters. Third, switching on poloidal drifts (E×B and diamagnetic drifts) leads to asymmetric parallel and poloidal fluxes from outer to inner plates and upper part of SOL for normal direction of toroidal magnetic field. Fourth, for the normal direction of toroidal magnetic, the radial electric field of SSDT is affected by the variation in temperature heating of plasma. Fifth, the parallel flux is directed from inner to outer plate in case of discharge without neutral beam injection (NBI). 展开更多
关键词 ELECTRIC field TRANSPORT codeS DIVERTOR TOKAMAK
在线阅读 下载PDF
THE TRUE DIMENSION OF CERTAIN ALTERNANT CODES
11
作者 Yue Dianwu Feng Guangzeng(Dept. of Telecom. Eng., Nanjing University of Posts & Telecommunications, Nanjing 210003) 《Journal of Electronics(China)》 2000年第4期352-356,共5页
By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimen... By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimension. 展开更多
关键词 Alternant code DIMENSION ALGEBRAIC funtion field Geometric Goppa code
在线阅读 下载PDF
Simulation of small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal
12
作者 A. H. Bekheit 《Natural Science》 2011年第8期738-742,共5页
Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tok... Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal is simulated by B2SOLPS0.5.2D fluid transport code. The simulation demonstrate the following results: 1) Parallel (toroidal) flow flux and Mach number up to 0.6 at higher plasma density reverse with reverse toroidal magnetic direction in the edge plasma of small size divertor tokamak. 2) The radial electric field is toroidal magnetic direction independence in edge plasma of small size divertor tokamak. 3) For normal and reverse toroidal magnetic field, the strong ITB is located between the positions of the maximum and minimum values of the radial electric field shear. 4) Simulation result shows that, the structure of radial electric field at high field side (HFS) and low field side (LFS) is different. This difference result from the change in the parallel flux flows in the scrape off layer (SOL) to plasma core through separatrix. 5) At a region of strong radial electric field shear, a large reduction of poloidal rotation was observed. 6) The poloidal rotation is toroidal magnetic field direction dependence. 展开更多
关键词 REVERSE TOROIDAL field B2SOLPS0.5.2D code ITB
暂未订购
基于公钥思想的非对称Hopping Code系统编码芯片设计
13
作者 柯建东 祝叶华 +1 位作者 刘文江 戎蒙恬 《微电子学与计算机》 CSCD 北大核心 2006年第6期138-140,144,共4页
针对应用于遥控或命令辨别场合的跳码系统,提出了一种新型的非对称跳码算法。该跳码系统的加解密算法基于有限域GF(2m)上的多项式运算,采用了随机数发生器,能够完成汽车电子钥匙等遥控或命令辨别场合的跳码功能,并达到较高的安全性。文... 针对应用于遥控或命令辨别场合的跳码系统,提出了一种新型的非对称跳码算法。该跳码系统的加解密算法基于有限域GF(2m)上的多项式运算,采用了随机数发生器,能够完成汽车电子钥匙等遥控或命令辨别场合的跳码功能,并达到较高的安全性。文章主要介绍了加解密模块及发送端芯片的设计与实现。 展开更多
关键词 跳码 加解密 编码发送芯片 有限域上多项式 超大规模集成电路
在线阅读 下载PDF
Field Electron Emission from Diamond - like Carbon Films
14
作者 ZHANGBing-lin WANGXiao-ping 《Semiconductor Photonics and Technology》 CAS 1999年第3期152-155,共4页
A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special p... A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special pretreatment ceramic substrates were used. The characteristics of the film have been identified by using X-ray diffraction(XRD),and Raman spectrum. The field emission experiment has been performed in a vacuum chamber with a base pressure of about 10 -5 Pa. The turn-on field of 1.2 V/μm,and the current density of 1.25 mA/cm 2 at electric field of 6 V/μm were obtained. 展开更多
关键词 Chemical Vapor Deposition DIAMOND Diamond-like Carbon field Emission CLC number:O472 Document code:A
在线阅读 下载PDF
OCDMA SystemSignature Code Design Theory Via Finite Projective Geometry 被引量:1
15
作者 Li Chuanqi Sun Xiaohan +1 位作者 Zhang Mingde Je-Myung Jeong 《工程科学(英文版)》 2005年第4期37-44,共8页
Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical ortho... Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical orthogonal code designing and finite geometry theory were discussed; find out the corresponding relationship between the parameter of OOC and that of finite geometry space. In this article, the systematic theory of OOC designing based on projective geometry is established in detail. The designing process and results of OOC on projective plane PG(2,q) and on m-dimension projective space are given respectively. Furthermore, the analytical theory for the corresponding relation between OOC with high cross-correlation and k-D manifold of projective space is set up. The OOC designing results given in this article have excellent performance, whose maximum cross-correlation is 1, and the cardinality reaches the Johnson upper bound, i.e. it realizes the optimization in both MUI and system capacity. 展开更多
关键词 OCDMA系统 有限射影几何学 有限域 向量空间 光学正交码
在线阅读 下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
16
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
在线阅读 下载PDF
论生态环境法典法律责任的规范构造 被引量:4
17
作者 黄锡生 黄淑婷 《学术论坛》 北大核心 2025年第3期69-83,共15页
生态环境法典法律责任的内容和结构在学术界引起了广泛讨论,形成了诸多不同的观点。厘清生态环境法典法律责任的内容并进行科学合理编排,对于实质性推进生态环境法典的编纂进程具有重要意义。从现行法律体系来看,民事和刑事立法对环境... 生态环境法典法律责任的内容和结构在学术界引起了广泛讨论,形成了诸多不同的观点。厘清生态环境法典法律责任的内容并进行科学合理编排,对于实质性推进生态环境法典的编纂进程具有重要意义。从现行法律体系来看,民事和刑事立法对环境民事责任和环境刑事责任已有较为完备的规定,生态环境法典对这两种责任设置引致条款即可。生态环境法典行政立法领域的定位表明它是行政法领域的法典,是行政法典的分支,为部门型法典,这一根本定位决定了环境行政责任是生态环境法典法律责任的核心内容。生态环境法典法律责任的主要内容有普适性规定,环境行政处罚(环境行政命令、环境行政处分)规定、环境刑事责任和环境民事责任的引致条款以及环境行政责任和其他法律责任的衔接规定。结合《生态环境法典(草案)》,在结构安排上建议采用“独立为主、分散为辅”的立法模式,生态环境法典在总则编设置独立的生态环境法律责任章对生态环境法典法律责任的一般性问题进行统领性规定,共通性环境行政管理制度涉及的行政责任规范紧随该制度,污染防治编、生态保护编、绿色低碳发展编则在各编中设置独立的法律责任章或节。 展开更多
关键词 生态环境法典 法律责任 行政立法领域 环境行政责任
在线阅读 下载PDF
Sidon空间和循环子空间码的构造
18
作者 刘雪梅 张佳瑢 《河南师范大学学报(自然科学版)》 北大核心 2025年第3期66-71,F0002,共7页
子空间码特别是循环子空间码在随机网络编码中具有高效的编码和译码算法,因此近年来受到了广泛关注.Sidon空间是构造循环子空间码的重要工具,利用有限域上的本原元和不可约多项式的根,构造了不同维数的Sidon空间,并在此基础上得到了码... 子空间码特别是循环子空间码在随机网络编码中具有高效的编码和译码算法,因此近年来受到了广泛关注.Sidon空间是构造循环子空间码的重要工具,利用有限域上的本原元和不可约多项式的根,构造了不同维数的Sidon空间,并在此基础上得到了码字个数更多的循环子空间码. 展开更多
关键词 有限域 循环子空间码 Sidon空间 不可约多项式的根
在线阅读 下载PDF
基于模板对齐与多阶段特征学习的光场角度重建
19
作者 郁梅 周涛 +3 位作者 陈晔曜 蒋志迪 骆挺 蒋刚毅 《电子与信息学报》 北大核心 2025年第2期530-540,共11页
现有光场图像角度重建方法通过探索光场图像内在的空间-角度信息以进行角度重建,但无法同时处理不同视点层的子孔径图像重建任务,难以满足光场图像可伸缩编码的需求。为此,将视点层视为稀疏模板,该文提出一种能够单模型处理不同角度稀... 现有光场图像角度重建方法通过探索光场图像内在的空间-角度信息以进行角度重建,但无法同时处理不同视点层的子孔径图像重建任务,难以满足光场图像可伸缩编码的需求。为此,将视点层视为稀疏模板,该文提出一种能够单模型处理不同角度稀疏模板的光场图像角度重建方法。将不同的角度稀疏模板视为微透镜阵列图像的不同表示,通过模板对齐将输入的不同视点层整合为微透镜阵列图像,采用多阶段特征学习方式,以微透镜阵列级-子孔径级的特征学习策略来处理不同输入的稀疏模板,并辅以独特的训练模式,以稳定地参考不同角度稀疏模板,重建任意角度位置的子孔径图像。实验结果表明,所提方法能有效地参考不同稀疏模板,灵活地重建任意角度位置的子孔径图像,且所提模板对齐与训练方法能有效地应用于其它光场图像超分辨率重建方法以提升其处理不同角度稀疏模板的能力。 展开更多
关键词 光场图像 角度重建 可伸缩编码 稀疏模板
在线阅读 下载PDF
行政法典时代下国家安全行政法的定位和发展
20
作者 黄信瑜 孔秋石 《铜陵学院学报》 2025年第2期56-61,共6页
国家安全行政法作为国家安全领域立法中行政法律部门的重要组成部分,在我国行政法典立法逐步推进的背景下,迎来了新的发展契机。我国行政法典主流的“总则+”模式,为国家安全行政法的可执行化与系统化创造了有利条件。然而,当前国家安... 国家安全行政法作为国家安全领域立法中行政法律部门的重要组成部分,在我国行政法典立法逐步推进的背景下,迎来了新的发展契机。我国行政法典主流的“总则+”模式,为国家安全行政法的可执行化与系统化创造了有利条件。然而,当前国家安全行政法存在自身地位不明晰、与行政一般法难以兼容、与国家安全法位阶不明等问题。为健全我国法律体系,推动国家安全行政法发展,文章建议依总体国家安全法明确法律属性,从领域法视角出发定位国家安全行政法双重属性,以衔接视角审视国家安全法与行政法总则的关联,明晰行政法与国家安全领域法的接触与边界,以此为行政法典时代下的国家安全行政法精准定位并梳理发展方向。 展开更多
关键词 行政法典 领域法学 国家安全行政法
在线阅读 下载PDF
上一页 1 2 40 下一页 到第
使用帮助 返回顶部