期刊文献+
共找到2,156篇文章
< 1 2 108 >
每页显示 20 50 100
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
1
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
An Analytical Method to Mitigate the False Alarm Rates of Polar Code Blind Detection in 5G New Radio
2
作者 Gao Jian Piao Jinnan +1 位作者 Dai Jincheng Niu Kai 《China Communications》 2025年第9期140-150,共11页
In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, differen... In 5G new radio(NR), polar codes are adopted for e MBB downlink control channels where the blind detection is employed in user equipment(UE) to identify the correct downlink control information(DCI). However, different from that in the 4G LTE system, the cyclic redundancy check(CRC) in polar decoding plays both error correction and error detection roles. Consequently, the false alarm rates(FAR) may not meet the system requirements(FAR<1.52 × 10^(−5)). In this paper, to mitigate the FAR in polar code blind detection, we attach a binary classifier after the polar decoder to further remove the false alarm results and meanwhile retain the correct DCI. This classifier works by tracking the squared Euclidean distance ratio(SEDR) between the received signal and hypothesis. We derive an analytical method to fast compute proper classification threshold that is implementation-friendly in practical use. Combining the well-designed classifier, we show that some very short CRC sequences can even be used to meet the FAR requirements. This consequently reduces the CRC overhead and contributes to the system error performance improvements. 展开更多
关键词 binary classifier blind detection classifi cation threshold 5G NR polar codes
在线阅读 下载PDF
Digital coherent detection research on Brillouin optical time domain reflectometry with simplex pulse codes 被引量:7
3
作者 郝蕴琦 叶青 +2 位作者 潘政清 蔡海文 瞿荣辉 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第11期253-256,共4页
The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensi... The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement. 展开更多
关键词 Brillouin optical time domain reflectometry digital coherent detection simplex pulse codes signal-to-noise ratio
原文传递
An improved linear dispersion codes transmission scheme based on OSIC detection
4
作者 施风 陈明 程时昕 《Journal of Southeast University(English Edition)》 EI CAS 2004年第2期139-142,共4页
Linear dispersion codes (LDCs) were originally designed based on maximum likelihood detection. They do not have good performance when using ordered successive interference cancellation (OSIC) detection. In this paper,... Linear dispersion codes (LDCs) were originally designed based on maximum likelihood detection. They do not have good performance when using ordered successive interference cancellation (OSIC) detection. In this paper,we propose a new improved linear dispersion codes transmission scheme to combat performance loss of original LDCs when using OSIC detection. We introduce an interleaver to each data substream transmitted over different antennas after LDCs encoder. Furthermore,a new computer search criterion for a linear transformation matrix is also proposed. New search criterion is to minimize the symbol error rate based on OSIC detection. Computer simulations show that the performance of proposed LDCs transmission scheme is better than the original LDCs. 展开更多
关键词 linear dispersion codes space-time codes INTERLEAVER ordered successive interference cancellation (OSIC) detection
在线阅读 下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
5
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
在线阅读 下载PDF
A Fault Detection Mechanism in Erasure-Code Byzantine Fault-Tolerance Quorum 被引量:1
6
作者 LIU Gang ZHOU Jingli SUN Yufen QIN Leihua 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1453-1456,共4页
Fault-tolerance is increasingly significant for large-scale storage systems in which Byzantine failure of storage nodes may happen. Traditional Byzantine Quorum systems that tolerate Byzantine failures by using replic... Fault-tolerance is increasingly significant for large-scale storage systems in which Byzantine failure of storage nodes may happen. Traditional Byzantine Quorum systems that tolerate Byzantine failures by using replication have two main limitations: low space-efficiency and static quorum variables. We propose an Erasure-code Byzantine Fault-tolerance Quorum that can provide high reliability with far lower storage overhead than replication by adopting erasure code as redundancy scheme. Through read/write operations of clients and diagnose operation of supervisor, our Quorum system can detect Byzantine nodes, and dynamically adjust system size and fault threshold. Simulation results show that our method improves performance for the Quorum with relatively small quorums. 展开更多
关键词 fault detection erasure code Byzantine fault-tolerance QUORUM
在线阅读 下载PDF
HCRVD: A Vulnerability Detection System Based on CST-PDG Hierarchical Code Representation Learning 被引量:1
7
作者 Zhihui Song Jinchen Xu +1 位作者 Kewei Li Zheng Shan 《Computers, Materials & Continua》 SCIE EI 2024年第6期4573-4601,共29页
Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representation... Prior studies have demonstrated that deep learning-based approaches can enhance the performance of source code vulnerability detection by training neural networks to learn vulnerability patterns in code representations.However,due to limitations in code representation and neural network design,the validity and practicality of the model still need to be improved.Additionally,due to differences in programming languages,most methods lack cross-language detection generality.To address these issues,in this paper,we analyze the shortcomings of previous code representations and neural networks.We propose a novel hierarchical code representation that combines Concrete Syntax Trees(CST)with Program Dependence Graphs(PDG).Furthermore,we introduce a Tree-Graph-Gated-Attention(TGGA)network based on gated recurrent units and attention mechanisms to build a Hierarchical Code Representation learning-based Vulnerability Detection(HCRVD)system.This system enables cross-language vulnerability detection at the function-level.The experiments show that HCRVD surpasses many competitors in vulnerability detection capabilities.It benefits from the hierarchical code representation learning method,and outperforms baseline in cross-language vulnerability detection by 9.772%and 11.819%in the C/C++and Java datasets,respectively.Moreover,HCRVD has certain ability to detect vulnerabilities in unknown programming languages and is useful in real open-source projects.HCRVD shows good validity,generality and practicality. 展开更多
关键词 Vulnerability detection deep learning CST-PDG code representation tree-graph-gated-attention network CROSS-LANGUAGE
在线阅读 下载PDF
A VERTICAL LAYERED SPACE-TIME CODE AND ITS CLOSED-FORM BLIND SYMBOL DETECTION 被引量:1
8
作者 Zhao Zheng Yin Qinye Zhang Hong Feng Aigang (Institute of Information Engineering, Xi’an .Jiaotong University, Xi’an 710049) 《Journal of Electronics(China)》 2003年第2期102-109,共8页
Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading condition... Vertical layered space-time codes have demonstrated the enormous potential to accommodate rapid flow data. Thus far, vertical layered space-time codes assumed that perfect estimates of current channel fading conditions are available at the receiver. However, increasing the number of transmit antennas increases the required training interval and reduces the available time in which data may be transmitted before the fading coefficients change. In this paper, a vertical layered space-time code is proposed. By applying the subspace method to the layered space-time code, the symbols can be detected without training symbols and channel estimates at the transmitter or the receiver. Monte Carlo simulations show that performance can approach that of the detection method with the knowledge of the channel. 展开更多
关键词 Layered space-time code Array signal processing Subspace method Blind symbol detection
在线阅读 下载PDF
Low-Complexity Detection and Decoding Scheme for LDPC-Coded MLC NAND Flash Memory 被引量:1
9
作者 Xusheng Lin Guojun Han +2 位作者 Shijie Ouyang Yanfu Li Yi Fang 《China Communications》 SCIE CSCD 2018年第6期58-67,共10页
With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and... With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and hence causes an increase in the raw bit error rate of data stored in the cells.Recently, low-density parity-check(LDPC)codes have appeared to be a promising solution to combat the interference of MLC NAND flash memory. However, the decoding complexity of the sum-product algorithm(SPA) is extremely high. In this paper, to improve the accuracy of the log likelihood ratio(LLR) information of each bit in each NAND flash memory cell, we adopt a non-uniform detection(N-UD) which uses the average maximum mutual information to determine the value of the soft-decision reference voltages.Furthermore, with an aim to reduce the decoding complexity and improve the decoding performance, we propose a modified soft reliabilitybased iterative majority-logic decoding(MSRBI-MLGD) algorithm, which uses a non-uniform quantizer based on power function to decode LDPC codes. Simulation results show that our design can offer a desirable trade-off between the performance and complexity for high-column-weight LDPC-coded MLC NAND flash memory. 展开更多
关键词 Cell-to-cell interference(CCI) LDPC codes MLC NAND flash memory non-uniform detection(N-UD) modified soft reliability-based iterative majority-logic decoding(MSRBI-MLGD) algorithm
在线阅读 下载PDF
SNR improvement in self-heterodyne detection Brillouin optical time domain reflectometer using Golay pulse codes 被引量:7
10
作者 李永倩 李晓娟 +2 位作者 范寒柏 安琪 张立欣 《Optoelectronics Letters》 EI 2017年第6期414-418,共5页
The application of Golay pulse coding technique in spontaneous Brillouin-based distributed temperature sensor based on self-heterodyne detection of Rayleigh and Brillouin scattering is theoretically and experimentally... The application of Golay pulse coding technique in spontaneous Brillouin-based distributed temperature sensor based on self-heterodyne detection of Rayleigh and Brillouin scattering is theoretically and experimentally analyzed. The enhancement of system signal to noise ratio(SNR) and reduction of temperature measurement error provided by coding are characterized. By using 16-bit Golay coding, SNR can be improved by about 2.77 d B, and temperature measurement error of the 100 m heated fiber is reduced from 1.4 °C to 0.5 °C with a spatial resolution of 13 m. The results are believed to be beneficial for the performance improvement of self-heterodyne detection Brillouin optical time domain reflectometer. 展开更多
关键词 BRILLOUIN GOLAY RAYLEIGH codes BOTDR decoding heated normalized SPONTANEOUS STOKES
原文传递
Topology Data Analysis-Based Error Detection for Semantic Image Transmission with Incremental Knowledge-Based HARQ
11
作者 Ni Fei Li Rongpeng +1 位作者 Zhao Zhifeng Zhang Honggang 《China Communications》 2025年第1期235-255,共21页
Semantic communication(SemCom)aims to achieve high-fidelity information delivery under low communication consumption by only guaranteeing semantic accuracy.Nevertheless,semantic communication still suffers from unexpe... Semantic communication(SemCom)aims to achieve high-fidelity information delivery under low communication consumption by only guaranteeing semantic accuracy.Nevertheless,semantic communication still suffers from unexpected channel volatility and thus developing a re-transmission mechanism(e.g.,hybrid automatic repeat request[HARQ])becomes indispensable.In that regard,instead of discarding previously transmitted information,the incremental knowledge-based HARQ(IK-HARQ)is deemed as a more effective mechanism that could sufficiently utilize the information semantics.However,considering the possible existence of semantic ambiguity in image transmission,a simple bit-level cyclic redundancy check(CRC)might compromise the performance of IK-HARQ.Therefore,there emerges a strong incentive to revolutionize the CRC mechanism,thus more effectively reaping the benefits of both SemCom and HARQ.In this paper,built on top of swin transformer-based joint source-channel coding(JSCC)and IK-HARQ,we propose a semantic image transmission framework SC-TDA-HARQ.In particular,different from the conventional CRC,we introduce a topological data analysis(TDA)-based error detection method,which capably digs out the inner topological and geometric information of images,to capture semantic information and determine the necessity for re-transmission.Extensive numerical results validate the effectiveness and efficiency of the proposed SC-TDA-HARQ framework,especially under the limited bandwidth condition,and manifest the superiority of TDA-based error detection method in image transmission. 展开更多
关键词 error detection incremental knowledgebased HARQ joint source-channel coding semantic communication swin transformer topological data analysis
在线阅读 下载PDF
Blind Decorrelating Detection Based on Particle Swarm Optimization under Spreading Code Mismatch
12
作者 Jhih-Chung Chang Chih-Chang Shen 《Journal of Electronic Science and Technology》 CAS 2014年第3期288-292,共5页
A way of resolving spreading code mismatches in blind multiuser detection with a particle swarm optimization (PSO) approach is proposed. It has been shown that the PSO algorithm incorporating the linear system of th... A way of resolving spreading code mismatches in blind multiuser detection with a particle swarm optimization (PSO) approach is proposed. It has been shown that the PSO algorithm incorporating the linear system of the decorrelating detector, which is termed as decorrelating PSO (DPSO), can significantly improve the bit error rate (BER) and the system capacity. As the code mismatch occurs, the output BER performance is vulnerable to degradation for DPSO. With a blind decorrelating scheme, the proposed blind DPSO (BDPSO) offers more robust capabilities over existing DPSO under code mismatch scenarios. 展开更多
关键词 code division multiple access code mismatch decorrelating detector multiuser detection particle swarm optimization
在线阅读 下载PDF
Joint channel estimation and symbol detection for space-time block code
13
作者 单淑伟 罗汉文 宋文涛 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第3期266-269,共4页
The simplified joint channel estimation and symbol detection based on the EM (expectation-maximization) algorithm for space-time block code (STBC) are proposed. By assuming channel to be invariant within only one STBC... The simplified joint channel estimation and symbol detection based on the EM (expectation-maximization) algorithm for space-time block code (STBC) are proposed. By assuming channel to be invariant within only one STBC word and utilizing the orthogonal structure of STBC, the computational complexity and cost of this algorithm are both very low, so it is very suitable to implementation in real systems. 展开更多
关键词 space-time block code expectation-maximization algorithm channel estimation symbol detection.
在线阅读 下载PDF
Code Clone Detection Method Based on the Combination of Tree-Based and Token-Based Methods
14
作者 Ryota Ami Hirohide Haga 《Journal of Software Engineering and Applications》 2017年第13期891-906,共16页
This article proposes the high-speed and high-accuracy code clone detection method based on the combination of tree-based and token-based methods. Existence of duplicated program codes, called code clone, is one of th... This article proposes the high-speed and high-accuracy code clone detection method based on the combination of tree-based and token-based methods. Existence of duplicated program codes, called code clone, is one of the main factors that reduces the quality and maintainability of software. If one code fragment contains faults (bugs) and they are copied and modified to other locations, it is necessary to correct all of them. But it is not easy to find all code clones in large and complex software. Much research efforts have been done for code clone detection. There are mainly two methods for code clone detection. One is token-based and the other is tree-based method. Token-based method is fast and requires less resources. However it cannot detect all kinds of code clones. Tree-based method can detect all kinds of code clones, but it is slow and requires much computing resources. In this paper combination of these two methods was proposed to improve the efficiency and accuracy of detecting code clones. Firstly some candidates of code clones will be extracted by token-based method that is fast and lightweight. Then selected candidates will be checked more precisely by using tree-based method that can find all kinds of code clones. The prototype system was developed. This system accepts source code and tokenizes it in the first step. Then token-based method is applied to this token sequence to find candidates of code clones. After extracting several candidates, selected source codes will be converted into abstract syntax tree (AST) for applying tree-based method. Some sample source codes were used to evaluate the proposed method. This evaluation proved the improvement of efficiency and precision of code clones detecting. 展开更多
关键词 code Clone Token-Based detection Tree-Based detection TREE EDIT Distance
暂未订购
DM Code Key Point Detection Algorithm Based on CenterNet
15
作者 Wei Wang Xinyao Tang +2 位作者 Kai Zhou Chunhui Zhao Changfa Liu 《Computers, Materials & Continua》 SCIE EI 2023年第11期1911-1928,共18页
Data Matrix(DM)codes have been widely used in industrial production.The reading of DM code usually includes positioning and decoding.Accurate positioning is a prerequisite for successful decoding.Traditional image pro... Data Matrix(DM)codes have been widely used in industrial production.The reading of DM code usually includes positioning and decoding.Accurate positioning is a prerequisite for successful decoding.Traditional image processing methods have poor adaptability to pollution and complex backgrounds.Although deep learning-based methods can automatically extract features,the bounding boxes cannot entirely fit the contour of the code.Further image processing methods are required for precise positioning,which will reduce efficiency.Because of the above problems,a CenterNet-based DM code key point detection network is proposed,which can directly obtain the four key points of the DM code.Compared with the existing methods,the degree of fitness is higher,which is conducive to direct decoding.To further improve the positioning accuracy,an enhanced loss function is designed,including DM code key point heatmap loss,standard DM code projection loss,and polygon Intersection-over-Union(IoU)loss,which is beneficial for the network to learn the spatial geometric characteristics of DM code.The experiment is carried out on the self-made DM code key point detection dataset,including pollution,complex background,small objects,etc.,which uses the Average Precision(AP)of the common object detection metric as the evaluation metric.AP reaches 95.80%,and Frames Per Second(FPS)gets 88.12 on the test set of the proposed dataset,which can achieve real-time performance in practical applications. 展开更多
关键词 DM code key point detection CenterNet object detection enhanced loss function
在线阅读 下载PDF
SSA-HIAST: A Novel Framework for Code Clone Detection
16
作者 Neha Saini Sukhdip Singh 《Computers, Materials & Continua》 SCIE EI 2022年第5期2999-3017,共19页
In the recent era of software development,reusing software is one of the major activities that is widely used to save time.To reuse software,the copy and paste method is used and this whole process is known as code cl... In the recent era of software development,reusing software is one of the major activities that is widely used to save time.To reuse software,the copy and paste method is used and this whole process is known as code cloning.This activity leads to problems like difficulty in debugging,increase in time to debug and manage software code.In the literature,various algorithms have been developed to find out the clones but it takes too much time as well as more space to figure out the clones.Unfortunately,most of them are not scalable.This problem has been targeted upon in this paper.In the proposed framework,authors have proposed a new method of identifying clones that takes lesser time to find out clones as compared with many popular code clone detection algorithms.The proposed framework has also addressed one of the key issues in code clone detection i.e.,detection of near-miss(Type-3)and semantic clones(Type-4)with significant accuracy of 95.52%and 92.80%respectively.The present study is divided into two phases,the first method converts any code into an intermediate representation form i.e.,Hashinspired abstract syntax trees.In the second phase,these abstract syntax trees are passed to a novel approach“Similarity-based self-adjusting hash inspired abstract syntax tree”algorithm that helps in knowing the similarity level of codes.The proposed method has shown a lot of improvement over the existing code clones identification methods. 展开更多
关键词 code cloning clone detection hash inspired abstract syntax tree ROTATIONS hybrid framework
在线阅读 下载PDF
A NEW ML DETECTION ALGORITHM FOR ORTHOGONAL MULTICODE SYSTEM IN NAKAGAMI FADING CHANNEL
17
作者 Wei Shengqun Cheng Yunpeng Wang Jinlong 《Journal of Electronics(China)》 2006年第2期184-188,共5页
Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation res... Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance. 展开更多
关键词 Signal detection Orthogonal code Maximum-Likelihood (ML) Nakagami fading channel
在线阅读 下载PDF
Code Smell Detection Using Whale Optimization Algorithm
18
作者 Moatasem M.Draz Marwa S.Farhan +1 位作者 Sarah N.Abdulkader M.G.Gafar 《Computers, Materials & Continua》 SCIE EI 2021年第8期1919-1935,共17页
Software systems have been employed in many fields as a means to reduce human efforts;consequently,stakeholders are interested in more updates of their capabilities.Code smells arise as one of the obstacles in the sof... Software systems have been employed in many fields as a means to reduce human efforts;consequently,stakeholders are interested in more updates of their capabilities.Code smells arise as one of the obstacles in the software industry.They are characteristics of software source code that indicate a deeper problem in design.These smells appear not only in the design but also in software implementation.Code smells introduce bugs,affect software maintainability,and lead to higher maintenance costs.Uncovering code smells can be formulated as an optimization problem of finding the best detection rules.Although researchers have recommended different techniques to improve the accuracy of code smell detection,these methods are still unstable and need to be improved.Previous research has sought only to discover a few at a time(three or five types)and did not set rules for detecting their types.Our research improves code smell detection by applying a search-based technique;we use the Whale Optimization Algorithm as a classifier to find ideal detection rules.Applying this algorithm,the Fisher criterion is utilized as a fitness function to maximize the between-class distance over the withinclass variance.The proposed framework adopts if-then detection rules during the software development life cycle.Those rules identify the types for both medium and large projects.Experiments are conducted on five open-source software projects to discover nine smell types that mostly appear in codes.The proposed detection framework has an average of 94.24%precision and 93.4%recall.These accurate values are better than other search-based algorithms of the same field.The proposed framework improves code smell detection,which increases software quality while minimizing maintenance effort,time,and cost.Additionally,the resulting classification rules are analyzed to find the software metrics that differentiate the nine code smells. 展开更多
关键词 Software engineering intelligence search-based software engineering code smell detection software metrics whale optimization algorithm fisher criterion
在线阅读 下载PDF
BLIND MULTIUSER DETECTION FOR V-BLAST CODED MULTICARRIER CDMA SYSTEM
19
作者 Deng Ke Yin Qinye Zhang Hong 《Journal of Electronics(China)》 2006年第1期14-19,共6页
Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Divi... Focusing on the space-time coded multiuser mobile communication systems in the frequency-selective fading environment, this paper proposes a Vertical Bell labs LAyered Space-Time (V-BLAST) coded Multicarrier Code-Division Multiple-Access (MC-CDMA) scheme and its blind channel identification algorithm. This algorithm employs an ESPRIT-like method and the singular value decomposition, and the channels between every transmit antenna of every user and every receive antenna of the base station are blindly estimated with a closed-form solution. Based on it, an equivalent Minimum Mean-Squared Error (MMSE) time-domain multiuser detector is derived. Moreover, the proposed scheme exploits the precoding in the transmitter in order to eliminate the constraint of more receive antennas than transmit ones, required by most conventional V-BLAST codec schemes. Computer simulation results demonstrate the validity of this proposed scheme. 展开更多
关键词 MULTICARRIER code-division multiple-access Vertical Bell labs layered space-time code Multiuser detection
在线阅读 下载PDF
Iterative Noncoherent Block Detection of Coded MPSK for Cooperative Relay Systems
20
作者 Yucheng He Jingjing Zhang +1 位作者 Rui Zhao Lin Zhou 《China Communications》 SCIE CSCD 2016年第7期1-6,共6页
Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Vi... Maximum likelihood(ML) noncoherent block detection techniques are investigated for block-coded MPSK modulation in cooperative decode-and-forward relay systems over slow fading channels.A decision-directed iterative Viterbi algorithm(IVA) is derived for a suboptimal ML noncoherent detection.Simulation results show that the IVA can approach the error performances of the exhaustive detection method but at a lower complexity. 展开更多
关键词 coded modulation cooperative communication M-ray phase shift keying noncoherent detection
在线阅读 下载PDF
上一页 1 2 108 下一页 到第
使用帮助 返回顶部