In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of inform...In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future.展开更多
Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules...Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed.展开更多
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC...Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.展开更多
We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful atta...We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message.展开更多
The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake ...The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake is proPosed based on the results of deterministic seismic zoning map(1977). The Seismic intensity Zoning Map of China (1990),which is currently used in China, was compiled using probabilistic approach. So the method determining the far field earthquake based on deterministic zoning method is not suitable. A new method is providedin this paper under the consideration of the essence of the near field and far field earthquake and the aPProach ofthe probabilistic seismic hazard analysis. The related problems of how to use the Building Code (GBJll-89) andthe Seismic intensity Zoning Map of China(1990) are solved.展开更多
Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to ...Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to evaluate the severity of error propagation in the following frames,the error propagation intensity and human visual quality sensitivity of different areas were taken into consideration. It was followed by the quantification of relative importance. Finally,the proper coding mode was chosen utilizing an unequal comparison procedure. The simulation results show that the proposed method can improve peak signal-to-noise ratio (PSNR) up to 0. 9 dB and 1. 6 dB comparing with the field only and the dispersed flexible macro-block ordering (FMO)only methods respectively.展开更多
Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme wit...Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme with the K-th best relay selection (KBS) is proposed and investigated, wherein the K-th best relay is selected to forward the multiplexed signal to the destination. First, the upper bound of the symbol error probability (SEP), the diversity order, and the coding gain are derived for the CFNC scheme with KBS. Then, the coding gain is utilized as the optimized cri- terion to determine the optimal power allocation. It is validated through analysis and simulation that the CFNC scheme with KBS can achieve full diversity only when K=I, while the diversity order decreases with increasing parameter K, and the optimal power allocation can significantly improve the performance of the CFNC scheme with KBS.展开更多
The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not...The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not close to the neoclassical electric field. Second, the shear of radial electric field is independent on plasma parameters. Third, switching on poloidal drifts (E×B and diamagnetic drifts) leads to asymmetric parallel and poloidal fluxes from outer to inner plates and upper part of SOL for normal direction of toroidal magnetic field. Fourth, for the normal direction of toroidal magnetic, the radial electric field of SSDT is affected by the variation in temperature heating of plasma. Fifth, the parallel flux is directed from inner to outer plate in case of discharge without neutral beam injection (NBI).展开更多
By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimen...By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimension.展开更多
Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tok...Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal is simulated by B2SOLPS0.5.2D fluid transport code. The simulation demonstrate the following results: 1) Parallel (toroidal) flow flux and Mach number up to 0.6 at higher plasma density reverse with reverse toroidal magnetic direction in the edge plasma of small size divertor tokamak. 2) The radial electric field is toroidal magnetic direction independence in edge plasma of small size divertor tokamak. 3) For normal and reverse toroidal magnetic field, the strong ITB is located between the positions of the maximum and minimum values of the radial electric field shear. 4) Simulation result shows that, the structure of radial electric field at high field side (HFS) and low field side (LFS) is different. This difference result from the change in the parallel flux flows in the scrape off layer (SOL) to plasma core through separatrix. 5) At a region of strong radial electric field shear, a large reduction of poloidal rotation was observed. 6) The poloidal rotation is toroidal magnetic field direction dependence.展开更多
A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special p...A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special pretreatment ceramic substrates were used. The characteristics of the film have been identified by using X-ray diffraction(XRD),and Raman spectrum. The field emission experiment has been performed in a vacuum chamber with a base pressure of about 10 -5 Pa. The turn-on field of 1.2 V/μm,and the current density of 1.25 mA/cm 2 at electric field of 6 V/μm were obtained.展开更多
Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical ortho...Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical orthogonal code designing and finite geometry theory were discussed; find out the corresponding relationship between the parameter of OOC and that of finite geometry space. In this article, the systematic theory of OOC designing based on projective geometry is established in detail. The designing process and results of OOC on projective plane PG(2,q) and on m-dimension projective space are given respectively. Furthermore, the analytical theory for the corresponding relation between OOC with high cross-correlation and k-D manifold of projective space is set up. The OOC designing results given in this article have excellent performance, whose maximum cross-correlation is 1, and the cardinality reaches the Johnson upper bound, i.e. it realizes the optimization in both MUI and system capacity.展开更多
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h...A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.展开更多
基金supported by the National Natural Science Foundation of China under Grant No.61501064Sichuan Provincial Science and Technology Project under Grant No.2016GZ0122
文摘In the process of encoding and decoding,erasure codes over binary fields,which just need AND operations and XOR operations and therefore have a high computational efficiency,are widely used in various fields of information technology.A matrix decoding method is proposed in this paper.The method is a universal data reconstruction scheme for erasure codes over binary fields.Besides a pre-judgment that whether errors can be recovered,the method can rebuild sectors of loss data on a fault-tolerant storage system constructed by erasure codes for disk errors.Data reconstruction process of the new method has simple and clear steps,so it is beneficial for implementation of computer codes.And more,it can be applied to other non-binary fields easily,so it is expected that the method has an extensive application in the future.
文摘Let Fq be a finite field. In this paper, a construction of Cartesian au-thentication codes from the normal form of a class of nilpotent matrices over the field Fq is presented. Moreover, assume that the encoding rules are chosen according to a uniform probability distribution, the probabilities PI and PS, of a successful im-personation attack and of a successful substitution attack respectively, of these codes are also computed.
基金supported by the National Natural Science Foundation of China(6104000561001126+5 种基金61271262)the China Postdoctoral Science Foundation Funded Project(201104916382012T50789)the Natural Science Foundation of Shannxi Province of China(2011JQ8036)the Special Fund for Basic Scientific Research of Central Colleges (CHD2012ZD005)the Research Fund of Zhejiang University of Technology(20100244)
文摘Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.
基金Sponsored by the National Natural Science Foundation of China(Grant No.61179026)the Fundamental Research of the Central Universities of China Civil Aviation University of Science Special(Grant No.3122016L005)
文摘We construct one multi-sender authentication code by algebraic combination method from eigenvalues and eigenvectors of the matrix over nite elds. Some parameters and the probabilities of three kinds of successful attack of this code are also computed. For multi-sender authentication code,it allows a group of senders to construct an authenticated message for a receiver such that the receiver can verify authenticity of the received message.
文摘The earthquake environment of far field earthquake effects or near field earthquake effects are required to be considered in the Building Code (GBJ11-89), and a method to determine near field and far field earthquake is proPosed based on the results of deterministic seismic zoning map(1977). The Seismic intensity Zoning Map of China (1990),which is currently used in China, was compiled using probabilistic approach. So the method determining the far field earthquake based on deterministic zoning method is not suitable. A new method is providedin this paper under the consideration of the essence of the near field and far field earthquake and the aPProach ofthe probabilistic seismic hazard analysis. The related problems of how to use the Building Code (GBJll-89) andthe Seismic intensity Zoning Map of China(1990) are solved.
基金National Natural Science Foundation of China(No.40927001)the Project of Key Scientific and Technological Innovation Team of Zhejiang Province,China(No.2011R09021-06)the Fundamental Research Funds for the Central Universities,China
文摘Packet loss protection method based on picture level adaptive frame /field coding (PAFF)was presented. Firstly,the end-to-end rate-distortion analysis for PAFF on the current frame was performed. Secondly,in order to evaluate the severity of error propagation in the following frames,the error propagation intensity and human visual quality sensitivity of different areas were taken into consideration. It was followed by the quantification of relative importance. Finally,the proper coding mode was chosen utilizing an unequal comparison procedure. The simulation results show that the proposed method can improve peak signal-to-noise ratio (PSNR) up to 0. 9 dB and 1. 6 dB comparing with the field only and the dispersed flexible macro-block ordering (FMO)only methods respectively.
基金supported by the Major State Basic Research Development Program of China(973 Program No.2012CB316100)the National Natural Science Foundation of China(Nos.61032002/61271246)the 111 Project(No.111-2-14)
文摘Wireless relay and network coding are two critical techniques to increase the reliability and throughput of wireless cooperative communication systems. In this paper, a complex field network coding (CFNC) scheme with the K-th best relay selection (KBS) is proposed and investigated, wherein the K-th best relay is selected to forward the multiplexed signal to the destination. First, the upper bound of the symbol error probability (SEP), the diversity order, and the coding gain are derived for the CFNC scheme with KBS. Then, the coding gain is utilized as the optimized cri- terion to determine the optimal power allocation. It is validated through analysis and simulation that the CFNC scheme with KBS can achieve full diversity only when K=I, while the diversity order decreases with increasing parameter K, and the optimal power allocation can significantly improve the performance of the CFNC scheme with KBS.
文摘The fluid simulation of Small Size Divertor Tokamak (SSDT) plasma edge by the B2-SOLPS5.0 2D [1] transport code gives the following results: First, in the vicinity of separatrix the radial electric field result is not close to the neoclassical electric field. Second, the shear of radial electric field is independent on plasma parameters. Third, switching on poloidal drifts (E×B and diamagnetic drifts) leads to asymmetric parallel and poloidal fluxes from outer to inner plates and upper part of SOL for normal direction of toroidal magnetic field. Fourth, for the normal direction of toroidal magnetic, the radial electric field of SSDT is affected by the variation in temperature heating of plasma. Fifth, the parallel flux is directed from inner to outer plate in case of discharge without neutral beam injection (NBI).
基金Supported by the National Natural Science Foundation of China(No.69872016)
文摘By applying a result from geometric Goppa codes, due to H.Schtenoth, the true dimension of certain alternant codes is calculated. The results lead in many cases to an improvement of the usual lower bound for the dimension.
文摘Asymmetries between the divertor legs of small size divertor (SSD) tokamak plasma edge are noticed to reverse when the direction of toroidal magnetic field is reversed. In the present paper the small size divertor tokamak plasma edge under effect of toroidal magnetic field reversal is simulated by B2SOLPS0.5.2D fluid transport code. The simulation demonstrate the following results: 1) Parallel (toroidal) flow flux and Mach number up to 0.6 at higher plasma density reverse with reverse toroidal magnetic direction in the edge plasma of small size divertor tokamak. 2) The radial electric field is toroidal magnetic direction independence in edge plasma of small size divertor tokamak. 3) For normal and reverse toroidal magnetic field, the strong ITB is located between the positions of the maximum and minimum values of the radial electric field shear. 4) Simulation result shows that, the structure of radial electric field at high field side (HFS) and low field side (LFS) is different. This difference result from the change in the parallel flux flows in the scrape off layer (SOL) to plasma core through separatrix. 5) At a region of strong radial electric field shear, a large reduction of poloidal rotation was observed. 6) The poloidal rotation is toroidal magnetic field direction dependence.
基金The National Advanced Material Com mittee of China
文摘A low turn-on field electron emission from diamond-like carbon films has been observed for the first time to author’s knowledge.Carbon films were prepared by microwave plasma chemical vapor deposition (CVD).Special pretreatment ceramic substrates were used. The characteristics of the film have been identified by using X-ray diffraction(XRD),and Raman spectrum. The field emission experiment has been performed in a vacuum chamber with a base pressure of about 10 -5 Pa. The turn-on field of 1.2 V/μm,and the current density of 1.25 mA/cm 2 at electric field of 6 V/μm were obtained.
基金The National Natural Science Foundationof China (No.:60272048) Natural Science Foundationof JiangsuEducation Department(No.04kjb510057) China Scholarship Council
文摘Optical orthogonal code is the main signature code employed by optical CDMA system. Starting from modern mathematics theory, finite projective geometry and Galois theory, the essential connection between optical orthogonal code designing and finite geometry theory were discussed; find out the corresponding relationship between the parameter of OOC and that of finite geometry space. In this article, the systematic theory of OOC designing based on projective geometry is established in detail. The designing process and results of OOC on projective plane PG(2,q) and on m-dimension projective space are given respectively. Furthermore, the analytical theory for the corresponding relation between OOC with high cross-correlation and k-D manifold of projective space is set up. The OOC designing results given in this article have excellent performance, whose maximum cross-correlation is 1, and the cardinality reaches the Johnson upper bound, i.e. it realizes the optimization in both MUI and system capacity.
文摘A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.