期刊文献+
共找到666,313篇文章
< 1 2 250 >
每页显示 20 50 100
Linking net ecosystem benefits and human activity:Regional management implications on the China’s Loess Plateau
1
作者 Xiaozhen Wang Shuai Wang +5 位作者 Kangying Li Xing Wu Chunbo Huang Zhouping Shangguan Kaibo Wang Lei Deng 《Geography and Sustainability》 2026年第1期82-94,共13页
Understanding the complex interactions between human activities and ecosystem functions is a prerequisite for achieving sustainable development.Since the implementation of the“Grain for Green”Project in 1999,ecosyst... Understanding the complex interactions between human activities and ecosystem functions is a prerequisite for achieving sustainable development.Since the implementation of the“Grain for Green”Project in 1999,ecosystem functions in China’s Loess Plateau have significantly improved.However,intensified human activities have also exacerbated the pressures on the region’s fragile ecological environment.This study investigates the spatiotemporal variations in the human activity intensity index(HAI)and net ecosystem benefits(NEB)from 2000 to 2020,using expert-based assessments and an enhanced cost-benefit evaluation framework.Results indicate that HAI increased by 16.7% and 16.6% at the grid and county levels,respectively.NEB exhibited pronounced spatial heterogeneity,with a total increase of USD 36.2 trillion at the grid scale.At the county level,the average NEB rose by 75%.The degree of trade-off was higher at the grid scale than at the county scale,while the synergistic areas initially expanded and then declined at both scales.Key areas for improvement and regions of lagging development were identified as priority zones for ecological management and spatial planning at both spatial resolutions.This study offers scientific insights and practical guidance for harmonizing ecological conservation with high-quality development in ecologically vulnerable regions. 展开更多
关键词 Eco-environment management net ecosystem benefits Human activity Regional management implications Scale effects Sustainable development
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
2
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
3
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
4
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
5
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
P4LoF: Scheduling Loop-Free Multi-Flow Updates in Programmable Networks
6
作者 Jiqiang Xia Qi Zhan +2 位作者 Le Tian Yuxiang Hu Jianhua Peng 《Computers, Materials & Continua》 2026年第1期1236-1254,共19页
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H... The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency. 展开更多
关键词 network management update consistency programmable data plane P4
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
7
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 Automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Clinical outcomes of humeral shaft fractures managed with intramedullary K-wires:A closed reduction approach
8
作者 Mohammad Adham Abdulsamad Turki S AlMugren +6 位作者 Abdullah I Saeed Waleed A Alrogy Linah D Alanazi Ohud M Alsaqer Faisal T Alanbar Abdulrahman H Alfarraj Ziad A Aljaafri 《World Journal of Orthopedics》 2026年第1期57-66,共10页
BACKGROUND Humeral shaft fractures are common and vary by age,with high-energy trauma observed in younger adults and low-impact injuries in older adults.Radial nerve palsy is a frequent complication.Treatment ranges f... BACKGROUND Humeral shaft fractures are common and vary by age,with high-energy trauma observed in younger adults and low-impact injuries in older adults.Radial nerve palsy is a frequent complication.Treatment ranges from nonoperative methods to surgical interventions such as intramedullary K-wires,which promote faster rehabilitation and improved elbow mobility.AIM To evaluate the outcomes of managing humeral shaft fractures using closed reduction and internal fixation with flexible intramedullary K-wires.METHODS This was a retrospective cohort study analyzing the medical records of patients with humeral shaft fractures managed with flexible intramedullary K-wires at King Abdulaziz Medical City,using non-random sampling and descriptive analysis for outcome evaluation.RESULTS This study assessed the clinical outcomes of 20 patients treated for humeral shaft fractures with intramedullary K-wires.Patients were predominantly male(n=16,80%),had an average age of 39.2 years,and a mean body mass index of 29.5 kg/m^(2).The fractures most frequently occurred in the middle third of the humerus(n=14,70%),with oblique fractures being the most common type(n=7,35%).All surgeries used general anesthesia and a posterior approach,with no intraoperative complications reported.Postoperatively,all patients achieved clinical and radiological union(n=20,100%),and the majority(n=13,65%)reached an elbow range of motion from 0 to 150 degrees.CONCLUSION These results suggest that intramedullary K-wire fixation may be an effective option for treating humeral shaft fractures,with favorable outcomes in range of motion recovery,fracture union,and a low rate of intraoperative complications. 展开更多
关键词 Humeral shaft fractures Flexible intramedullary K-wires Clinical outcomes Range of motion Surgical management
暂未订购
TransCarbonNet:Multi-Day Grid Carbon Intensity Forecasting Using Hybrid Self-Attention and Bi-LSTM Temporal Fusion for Sustainable Energy Management
9
作者 Amel Ksibi Hatoon Albadah +1 位作者 Ghadah Aldehim Manel Ayadi 《Computer Modeling in Engineering & Sciences》 2026年第1期812-847,共36页
Sustainable energy systems will entail a change in the carbon intensity projections,which should be carried out in a proper manner to facilitate the smooth running of the grid and reduce greenhouse emissions.The prese... Sustainable energy systems will entail a change in the carbon intensity projections,which should be carried out in a proper manner to facilitate the smooth running of the grid and reduce greenhouse emissions.The present article outlines the TransCarbonNet,a novel hybrid deep learning framework with self-attention characteristics added to the bidirectional Long Short-Term Memory(Bi-LSTM)network to forecast the carbon intensity of the grid several days.The proposed temporal fusion model not only learns the local temporal interactions but also the long-term patterns of the carbon emission data;hence,it is able to give suitable forecasts over a period of seven days.TransCarbonNet takes advantage of a multi-head self-attention element to identify significant temporal connections,which means the Bi-LSTM element calculates sequential dependencies in both directions.Massive tests on two actual data sets indicate much improved results in comparison with the existing results,with mean relative errors of 15.3 percent and 12.7 percent,respectively.The framework has given explicable weights of attention that reveal critical periods that influence carbon intensity alterations,and informed decisions on the management of carbon sustainability.The effectiveness of the proposed solution has been validated in numerous cases of operations,and TransCarbonNet is established to be an effective tool when it comes to carbon-friendly optimization of the grid. 展开更多
关键词 Carbon intensity forecasting self-attention mechanism bidirectional LSTM temporal fusion sustainable energy management smart grid optimization deep learning
在线阅读 下载PDF
Adaptive Grid-Interface Control for Power Coordination in Multi-Microgrid Energy Networks
10
作者 Sk.A.Shezan 《Energy Engineering》 2026年第1期91-114,共24页
Modern power systems increasingly depend on interconnected microgrids to enhance reliability and renewable energy utilization.However,the high penetration of intermittent renewable sources often causes frequency devia... Modern power systems increasingly depend on interconnected microgrids to enhance reliability and renewable energy utilization.However,the high penetration of intermittent renewable sources often causes frequency deviations,voltage fluctuations,and poor reactive power coordination,posing serious challenges to grid stability.Conventional Interconnection FlowControllers(IFCs)primarily regulate active power flowand fail to effectively handle dynamic frequency variations or reactive power sharing in multi-microgrid networks.To overcome these limitations,this study proposes an enhanced Interconnection Flow Controller(e-IFC)that integrates frequency response balancing and an Interconnection Reactive Power Flow Controller(IRFC)within a unified adaptive control structure.The proposed e-IFC is implemented and analyzed in DIgSILENT PowerFactory to evaluate its performance under various grid disturbances,including frequency drops,load changes,and reactive power fluctuations.Simulation results reveal that the e-IFC achieves 27.4% higher active power sharing accuracy,19.6% lower reactive power deviation,and 18.2% improved frequency stability compared to the conventional IFC.The adaptive controller ensures seamless transitions between grid-connected and islanded modes and maintains stable operation even under communication delays and data noise.Overall,the proposed e-IFCsignificantly enhances active-reactive power coordination and dynamic stability in renewable-integrated multi-microgrid systems.Future research will focus on coupling the e-IFC with tertiary-level optimization frameworks and conducting hardware-in-the-loop validation to enable its application in large-scale smart microgrid environments. 展开更多
关键词 Active power flow control interconnection flow controller(IFC) frequency response micro grid stability reactive power management
在线阅读 下载PDF
System Modeling and Deep Learning-Based Security Analysis of Uplink NOMA Relay Networks with IRS and Fountain Codes
11
作者 Phu Tran Tin Minh-Sang Van Nguyen +2 位作者 Quy-Anh Bui Agbotiname Lucky Imoize Byung-Seo Kim 《Computer Modeling in Engineering & Sciences》 2025年第8期2521-2543,共23页
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ... Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions. 展开更多
关键词 Copyright management deep neural network fountain codes intelligent reflecting surface non-orthogonal multiple access physical layer security UPLinK
在线阅读 下载PDF
A graph neural network and multi-task learning-based decoding algorithm for enhancing XZZX code stability in biased noise
12
作者 Bo Xiao Zai-Xu Fan +2 位作者 Hui-Qian Sun Hong-Yang Ma Xing-Kui Fan 《Chinese Physics B》 2025年第5期250-257,共8页
Quantum error correction is a technique that enhances a system’s ability to combat noise by encoding logical information into additional quantum bits,which plays a key role in building practical quantum computers.The... Quantum error correction is a technique that enhances a system’s ability to combat noise by encoding logical information into additional quantum bits,which plays a key role in building practical quantum computers.The XZZX surface code,with only one stabilizer generator on each face,demonstrates significant application potential under biased noise.However,the existing minimum weight perfect matching(MWPM)algorithm has high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoding method that combines graph neural networks(GNN)with multi-classifiers,the syndrome is transformed into an undirected graph,and the features are aggregated by convolutional layers,providing a more efficient and accurate decoding strategy.In the experiments,we evaluated the performance of the XZZX code under different biased noise conditions(bias=1,20,200)and different code distances(d=3,5,7,9,11).The experimental results show that under low bias noise(bias=1),the GNN decoder achieves a threshold of 0.18386,an improvement of approximately 19.12%compared to the MWPM decoder.Under high bias noise(bias=200),the GNN decoder reaches a threshold of 0.40542,improving by approximately 20.76%,overcoming the limitations of the conventional decoder.They demonstrate that the GNN decoding method exhibits superior performance and has broad application potential in the error correction of XZZX code. 展开更多
关键词 quantum error correction XZZX code biased noise graph neural network
原文传递
Genetic Optimization of Non-Binary Quasi-Cyclic LDPC Codes
13
作者 Zhang Yidi Jiang Ming Zhao Chunming 《China Communications》 2025年第8期76-86,共11页
This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and... This paper proposes a genetic optimization method for the construction of non-binary quasi-cyclic low-density parity-check(NB-QC-LDPC)codes with short block lengths.In our scheme,the initial template base matrices and the corresponding non-binary replacement matrices are constructed by the progressive edge growth algorithm and randomly generated,respectively.The genetic algorithm is then utilized to optimize the base matrices and the replacement ones.The simulation results show that the NB-QC-LDPC codes constructed by the proposed method achieve better decoding performance and lower implementation complexity compared to the existing NB-LDPC codes such as consultative committee for space data system and Bei Dou satellite navigation system. 展开更多
关键词 BDS CCSDS genetic algorithm nonbinary quasi-cyclic(NB-QC)LDPC codes
在线阅读 下载PDF
Neural network-based decoding for bias-tailored quantum codes over quantum channels with asymmetric noise
14
作者 Jihao Fan Qianhui Zhang +1 位作者 Zhihua Zhang Jun Li 《Communications in Theoretical Physics》 2025年第12期32-42,共11页
To improve the decoding performance of quantum error-correcting codes in asymmetric noise channels,a neural network-based decoding algorithm for bias-tailored quantum codes is proposed.The algorithm consists of a bias... To improve the decoding performance of quantum error-correcting codes in asymmetric noise channels,a neural network-based decoding algorithm for bias-tailored quantum codes is proposed.The algorithm consists of a biased noise model,a neural belief propagation decoder,a convolutional optimization layer,and a multi-objective loss function.The biased noise model simulates asymmetric error generation,providing a training dataset for decoding.The neural network,leveraging dynamic weight learning and a multi-objective loss function,mitigates error degeneracy.Additionally,the convolutional optimization layer enhances early-stage convergence efficiency.Numerical results show that for bias-tailored quantum codes,our decoder performs much better than the belief propagation(BP)with ordered statistics decoding(BP+OSD).Our decoder achieves an order of magnitude improvement in the error suppression compared to higher-order BP+OSD.Furthermore,the decoding threshold of our decoder for surface codes reaches a high threshold of 20%. 展开更多
关键词 quantum error correction quantum channels asymmetric noise neural networkbased decoding bias-tailored quantum codes
原文传递
Sparse graph neural network aided efficient decoder for polar codes under bursty interference
15
作者 Shengyu Zhang Zhongxiu Feng +2 位作者 Zhe Peng Lixia Xiao Tao Jiang 《Digital Communications and Networks》 2025年第2期359-364,共6页
In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the e... In this paper,a sparse graph neural network-aided(SGNN-aided)decoder is proposed for improving the decoding performance of polar codes under bursty interference.Firstly,a sparse factor graph is constructed using the encoding characteristic to achieve high-throughput polar decoding.To further improve the decoding performance,a residual gated bipartite graph neural network is designed for updating embedding vectors of heterogeneous nodes based on a bidirectional message passing neural network.This framework exploits gated recurrent units and residual blocks to address the gradient disappearance in deep graph recurrent neural networks.Finally,predictions are generated by feeding the embedding vectors into a readout module.Simulation results show that the proposed decoder is more robust than the existing ones in the presence of bursty interference and exhibits high universality. 展开更多
关键词 Sparse graph neural network Polar codes Bursty interference Sparse factor graph Message passing neural network
在线阅读 下载PDF
Hybrid DF and SIR Forwarding Strategy in Conventional and Distributed Alamouti Space-Time Coded Cooperative Networks
16
作者 Slim Chaoui Omar Alruwaili +1 位作者 Faeiz Alserhani Haifa Harrouch 《Computer Modeling in Engineering & Sciences》 2025年第2期1933-1954,共22页
In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative communications.In the HDFSIR approach,the relay operates in decode-... In this paper,we propose a hybrid decode-and-forward and soft information relaying(HDFSIR)strategy to mitigate error propagation in coded cooperative communications.In the HDFSIR approach,the relay operates in decode-and-forward(DF)mode when it successfully decodes the received message;otherwise,it switches to soft information relaying(SIR)mode.The benefits of the DF and SIR forwarding strategies are combined to achieve better performance than deploying the DF or SIR strategy alone.Closed-form expressions for the outage probability and symbol error rate(SER)are derived for coded cooperative communication with HDFSIR and energy-harvesting relays.Additionally,we introduce a novel normalized log-likelihood-ratio based soft estimation symbol(NL-SES)mapping technique,which enhances soft symbol accuracy for higher-order modulation,and propose a model characterizing the relationship between the estimated complex soft symbol and the actual high-order modulated symbol.Further-more,the hybrid DF-SIR strategy is extended to a distributed Alamouti space-time-coded cooperative network.To evaluate the~performance of the proposed HDFSIR strategy,we implement extensive Monte Carlo simulations under varying channel conditions.Results demonstrate significant improvements with the hybrid technique outperforming individual DF and SIR strategies in both conventional and distributed Alamouti space-time coded cooperative networks.Moreover,at a SER of 10^(-3),the proposed NL-SES mapping demonstrated a 3.5 dB performance gain over the conventional averaging one,highlighting its superior accuracy in estimating soft symbols for quadrature phase-shift keying modulation. 展开更多
关键词 Cooperative communication soft information relaying soft symbols modeling cooperative diversity gain distributed Alamouti space-time code
在线阅读 下载PDF
AeroMTP:A fountain code-based multipath transport protocol for airborne networks 被引量:4
17
作者 Li Jie Gong Erling +2 位作者 Sun Zhiqiang Liu Wei Xie Hongwei 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2015年第4期1147-1162,共16页
Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, AN... Airborne networks(ANs) are special types of ad hoc networks that can be used to enhance situational awareness, flight coordination and flight efficiency in civil and military aviation.Compared to ground networks, ANs have some unique attributes including high node mobility, frequent topology changes, mechanical and aerodynamic constrains, strict safety requirements and harsh communication environment.Thus, the performance of conventional transmission control protocol(TCP) will be dramatically degraded in ANs.Aircraft commonly have two or more heterogeneous network interfaces which offer an opportunity to form multiple communication paths between any two nodes in ANs.To satisfy the communication requirements in ANs, we propose aeronautical multipath transport protocol(Aero MTP) for ANs, which effectively utilizes the available bandwidth and diversity provided by heterogeneous wireless paths.Aero MTP uses fountain codes as forward error correction(FEC) codes to recover from data loss and deploys a TCP-friendly rate-based congestion control mechanism for each path.Moreover, we design a packet allocation algorithm based on optimization to minimize the delivery time of blocks.The performance of Aero MTP is evaluated through OMNe T++ simulations under a variety of test scenarios.Simulations demonstrate that Aero MTP is of great potential to be applied to ANs. 展开更多
关键词 Ad hoc networks Airborne networks Fountain code Multi-paths network protocols
原文传递
Performance improvement of magneto-acousto-electrical tomography for biological tissues with sinusoid-Barker coded excitation 被引量:7
18
作者 Zheng-Feng Yu Yan Zhou +4 位作者 Yu-Zhi Li Qing-Yu Ma Ge-Pu Guol Juan Tu Dong Zhang 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第9期346-353,共8页
By combining magnetics, acoustics and electrics, the magneto-acoustic-electrical tomography(MAET) proves to possess the capability of differentiating electrical impedance variation and thus improving the spatial res... By combining magnetics, acoustics and electrics, the magneto-acoustic-electrical tomography(MAET) proves to possess the capability of differentiating electrical impedance variation and thus improving the spatial resolution. However,the signal-to-noise ratio(SNR) of the collected MAET signal is still unsatisfactory for biological tissues with low-level electrical conductivity. In this study, the formula of MAET measurement with sinusoid-Barker coded excitation is derived and simplified for a planar piston transducer. Numerical simulations are conducted for a four-layered gel phantom with the 13-bit sinusoid-Barker coded excitation, and the performances of wave packet recovery with side-lobe suppression are improved by using the mismatched compression filter, which is also demonstrated by experimentally measuring a three-layered gel phantom. It is demonstrated that comparing with the single-cycle sinusoidal excitation, the amplitude of the driving signal can be reduced greatly with an SNR enhancement of 10 dB using the 13-bit sinusoid-Barker coded excitation. The amplitude and polarity of the wave packet filtered from the collected MAET signal can be used to achieve the conductivity derivative at the tissue boundary. In this study, we apply the sinusoid-Barker coded modulation method and the mismatched suppression scheme to MAET measurement to ensure the safety for biological tissues with improved SNR and spatial resolution, and suggest the potential applications in biomedical imaging. 展开更多
关键词 magneto-acousto-electrical tomography sinusoid-Barker coded excitation mismatched compression filter side lobe suppression
原文传递
An Energy-Efficient Network Coded Cooperation Scheme in Wireless Sensor Networks 被引量:4
19
作者 覃团发 罗建中 +1 位作者 唐振华 刘家锋 《China Communications》 SCIE CSCD 2011年第2期166-172,共7页
Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless comm... Energy-efficient communications is crucial for wireless sensor networks(WSN) where energy consumption is constrained. The transmission and reception energy can be saved by applying network coding to many wireless communications systems. In this paper,we present a coded cooperation scheme which employs network coding to WSN. In the scheme,the partner node forwards the combination of the source data and its own data instead of sending the source data alone. Afterward,both of the system block error rates(BLERs) and energy performance are evaluated. Experiment results show that the proposed scheme has higher energy efficiency. When Noise power spectral density is-171dBm/Hz,the energy consumption of the coded cooperation scheme is 81.1% lower than that of the single-path scheme,43.9% lower than that of the cooperation scheme to reach the target average BLER of 10-2. When the channel condition is getting worse,the energy saving effect is more obvious. 展开更多
关键词 wireless sensor network energy efficiency cooperation diversity network coding
在线阅读 下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
20
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部