期刊文献+
共找到332篇文章
< 1 2 17 >
每页显示 20 50 100
QIM digital watermarkingbased on LDPC code and messagepassingunder scalingattacks
1
作者 崔鑫 颜斌 +1 位作者 贾霞 王亚菲 《Journal of Measurement Science and Instrumentation》 CAS 2014年第1期37-40,共4页
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati... Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization. 展开更多
关键词 digital watermarking quantization index modulation (QIM) message passing algorithm based on factor graph low density parity check (LDPC) code amplitude scaling attack
在线阅读 下载PDF
安全评审程序用CSAU法 被引量:1
2
作者 陈炳德 《核动力工程》 EI CAS CSCD 北大核心 1992年第5期22-26,共5页
为支持和配合新修订的“危急堆芯冷却系统验收准则”,美国 NRC 组织发展了一种程序模拟、可用性和误差评估方法(Code Scaling,Applicability and Uncertainty EvaluationMethodology,简称 CSAU)。该方法为安全评审和颁发许可证所需的评... 为支持和配合新修订的“危急堆芯冷却系统验收准则”,美国 NRC 组织发展了一种程序模拟、可用性和误差评估方法(Code Scaling,Applicability and Uncertainty EvaluationMethodology,简称 CSAU)。该方法为安全评审和颁发许可证所需的评审计算误差的定量化分析提供了一个系统的、严密的逻辑框架。例题演示证明,该方法具有结构化、实用和可核查的特点,可满足安全评审管理领域的需要。此外,该方法对我国引进程序和评审方法规范化及程序的改进和发展均是有益的。 展开更多
关键词 反应堆安全 估计 评价 程序 csau
在线阅读 下载PDF
Design and Implementation of Verification Code Identification Based on Anisotropic Heat Kernel 被引量:2
3
作者 LIU Lizhao LIU Jian +3 位作者 DAI Yaomei XU Huarong YIN Huayi ZHU Shunzhi 《China Communications》 SCIE CSCD 2016年第1期100-112,共13页
Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as ... Many websites use verification codes to prevent users from using the machine automatically to register,login,malicious vote or irrigate but it brought great burden to the enterprises involved in internet marketing as entering the verification code manually.Improving the verification code security system needs the identification method as the corresponding testing system.We propose an anisotropic heat kernel equation group which can generate a heat source scale space during the kernel evolution based on infinite heat source axiom,design a multi-step anisotropic verification code identification algorithm which includes core procedure of building anisotropic heat kernel,settingwave energy information parameters,combing outverification codccharacters and corresponding peripheral procedure of gray scaling,binarizing,denoising,normalizing,segmenting and identifying,give out the detail criterion and parameter set.Actual test show the anisotropic heat kernel identification algorithm can be used on many kinds of verification code including text characters,mathematical,Chinese,voice,3D,programming,video,advertising,it has a higher rate of 25%and 50%than neural network and context matching algorithm separately for Yahoo site,49%and 60%for Captcha site,20%and 52%for Baidu site,60%and 65%for 3DTakers site,40%,and 51%.for MDP site. 展开更多
关键词 verification code image recognition data mining scale space anisotropic heat kernel
在线阅读 下载PDF
Malicious Code Modeling and Analysis in Weighted Scale-Free Networks 被引量:2
4
作者 WANG Changguang WANG Fangwei +1 位作者 ZHANG Yangkai MA Jianfengi 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期51-54,共4页
We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in... We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then decays in a power-law form, which is different from the well-known result in unweighted network case. Simulation results show that the nodes with larger strength are preferential to be infected, but the hierarchical dynamics are not clearly found. The simulation results also show that larger dispersion of weight of networks leads to slower propagating, which indicates that malicious code propagates more quickly in unweighted scale-free networks than in weighted scale-free networks under the same condition. These results show that not only the topology of networks but also the link weights affect the malicious propagating process. 展开更多
关键词 malicious code weighted scale-free networks propagation model
在线阅读 下载PDF
Criteria for level 1 and level 2 trauma codes: Are pelvic ring injuries undertriaged?
5
作者 Brittany E Haws Scott Wuertzer +2 位作者 Laura Raffield Leon Lenchik Anna N Miller 《World Journal of Orthopedics》 2016年第8期481-486,共6页
AIM: To determine the association of unstable pelvic ring injuries with trauma code status.METHODS: A retrospective review of all pelvic ring injuries at a single academic center from July 2010 to June 2013 was perfor... AIM: To determine the association of unstable pelvic ring injuries with trauma code status.METHODS: A retrospective review of all pelvic ring injuries at a single academic center from July 2010 to June 2013 was performed. The trauma registry was used to identify level 1 and level 2 trauma codes for each injury. The computed tomography scans in all patients were classified as stable or unstable using the Abbreviated Injury Scale. Pelvic injury classifications in level 1 and level 2 groups were compared. Patient disposition at discharge in level 1 and level 2 groups were also compared.RESULTS: There were 108 level 1 and 130 level 2 blunt trauma admissions. In the level 1 group, 67% of pelvic injuries were classified as stable fracture patterns and 33% were classified as unstable. In the level 2 group, 62% of pelvic injuries were classified as stable fracture patterns and 38% were classified as unstable. level 1 trauma code was not associated with odds of having an unstable fracture pattern(OR = 0.83, 95%CI: 0.48-1.41, P = 0.485). In the level 1 group with unstable pelvic injuries, 33% were discharged to home, 36% to a rehabilitation facility, and 32% died. In the level 2 group with unstable pelvic injuries, 65% were discharged to home, 31% to a rehabilitation facility, and 4% died. For those with unstable pelvic fractures(n = 85), assignment of a level 2 trauma code was associated with reduced odds of death(OR = 0.07, 95%CI: 0.01-0.35, P = 0.001) as compared to being discharged to home.CONCLUSION: Trauma code level assignment is not correlated with severity of pelvic injury. Because an unstable pelvis can lead to hemodynamic instability, these injuries may be undertriaged. 展开更多
关键词 PELVIC ring TRAUMA code TRIAGE UNSTABLE PELVIS Abbreviated injury scale
暂未订购
Scaling Laws for Plasma Focus Machines from Numerical Experiments
6
作者 S. H. SAW S. LEE 《Energy and Power Engineering》 2010年第1期65-72,共8页
Numerical experiments carried out systematically using the Lee Model code unveil insightful and practical wide-ranging scaling laws for plasma focus machines for nuclear fusion energy as well as other applications. An... Numerical experiments carried out systematically using the Lee Model code unveil insightful and practical wide-ranging scaling laws for plasma focus machines for nuclear fusion energy as well as other applications. An essential feature of the numerical experiments is the fitting of a measured current waveform to the computed waveform to calibrate the model for the particular machine, thus providing a reliable and rigorous determination of the all-important pinch current. The thermodynamics and radiation properties of the resulting plasma are then reliably determined. This paper provides an overview of the recently published scaling laws for neutron (Yn) and neon soft x-ray, SXR (Ysxr) yields: Yn = 3.2x1011 Ipinch4.5;Yn = 1.8x1010 Ipeak3.8;Ipeak (0.3 to 5.7), Ipinch (0.2 to 2.4) in MA. Yn^E02.0 at tens of kJ to Yn^E00.84 at MJ level (up to 25MJ) and Ysxr = 8.3x103 Ipinch3.6;Ysxr = 6x102 Ipeak3.2;Ipeak (0.1 to 2.4), Ipinch (0.07 to1.3) in MA. Ysxr^E01.6 (kJ range) to Ysxr^E00.8 (towards MJ). 展开更多
关键词 dense PLASMA FOCUS PLASMA FOCUS scaling LAWS NEUTRON scaling LAWS soft x-ray scaling LAWS PLASMA FOCUS modeling LEE model code
暂未订购
An FPGA-based LDPC decoder with optimized scale factor of NMS decoding algorithm
7
作者 LI Jinming ZHAGN Pingping +1 位作者 WANG Lanzhu WANG Guodong 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2022年第4期398-406,共9页
Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm wi... Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm with variable scale factor is proposed for the near-earth space LDPC codes(8177,7154)in the consultative committee for space data systems(CCSDS)standard.The shift characteristics of field programmable gate array(FPGA)is used to optimize the quantization data of check nodes,and finally the function of LDPC decoder is realized.The simulation and experimental results show that the designed FPGA-based LDPC decoder adopts the scaling factor in the NMS decoding algorithm to improve the decoding performance,simplify the hardware structure,accelerate the convergence speed and improve the error correction ability. 展开更多
关键词 LDPC code NMS decoding algorithm variable scale factor QUANTIZATION
在线阅读 下载PDF
Scaling Factor Optimization of Turbo-Polar Iterative Decoding
8
作者 Zhenzhen Liu Kai Niu +2 位作者 Jiaru Lin Jingyuan Sun Hao Guan 《China Communications》 SCIE CSCD 2018年第6期169-177,共9页
In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SF... In this paper, we investigate the weighted iterative decoding to improve the performance of turbo-polar code. First of all, a minimum weighted mean square error criterion is proposed to optimize the scaling factors(SFs). Secondly, for two typical iterative algorithms,such as soft cancellation(SCAN) and belief propagation(BP) decoding, genie-aided decoders are proposed as the ideal reference of the practical decoding. Guided by this optimization framework, the optimal SFs of SCAN or BP decoders are obtained. The bit error rate performance of turbo-polar code with the optimal SFs can achieve 0.3 dB or 0.7 dB performance gains over the standard SCAN or BP decoding respectively. 展开更多
关键词 turbo-polar code BP decoder SCAN decoder mean square error scaling factors
在线阅读 下载PDF
Secret Codes of Scale Distribution of Different Matter Stratums from Planck Scale to the Sun-Scale, Proof of Anthropic Principle and Different Stratum Sciences
9
作者 Changyu Huang Yong-Chang Huang 《Journal of Modern Physics》 2017年第9期1537-1546,共10页
This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c a... This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c and Plank constant, and starting from the global consideration of treating the whole universe as a well unified entity in all scales. According to this symmetric scale distribution law of different scale regions: (a) we naturally give a possibility overcoming the difficulty of the desert effect between the grand unification scale and electroweak unification scale relevant to quarks and leptons, and it is really surprising to discover that the scales of quarks & electrons, protons & neutrons and atoms again all sequentially locate at the predicted points of the scale space;(b) we closely uncover the scale of the cells, which is the basic unit constructing the human bodies;(c) even the average height of human being is naturally deduced;(d) further, it is very surprising that the scales of the celestial bodies tightly related to us human beings, including the earth and the sun, also exactly fall at the predicted points in scale space in order. Therefore, all these scales with 105n cm order (n = 0, 1, 2, …, 9) above just give a proof of very key anthropic principle for whole mankind (which just makes the anthropic principle be reduced as anthropic theorem), i.e., matter stratums (a) and (b) are inorganic and organic bases of constructing human being respectively;matter stratum (c) is just human being;matter stratums (d) are the living environments of human being. Namely, everything is for or relevant to the existence of human being. Consequently, the experimentally checked scale ladder of well-known matter levels just coincides with the scale ladder predicted by the deduced distribution law. From Planck scale to the Sun scale, people may systematically build up the exact scientific theories corresponding ten matter stratums, may set up the different sciences among the different cross stratums, further, can systematically understand all the different sciences and their relations in the deepest way up to now. 展开更多
关键词 Astroparticle PHYSICS Particle PHYSICS PLANCK SCALE Basic Constant SCALE Secret codes Earth The Sun Anthropic Principle
暂未订购
Performance Enhancement of SOVA Based Decoder in SCCC and PCCC Schemes
10
作者 Ahmed A. Hamad 《Wireless Engineering and Technology》 2013年第1期40-45,共6页
This study proposes a simple scaling factor approach to improve the performance of parallel-concatenated convolutional code (PCCC) and serial concatenated convolutional code (SCCC) systems based on suboptimal soft-inp... This study proposes a simple scaling factor approach to improve the performance of parallel-concatenated convolutional code (PCCC) and serial concatenated convolutional code (SCCC) systems based on suboptimal soft-input soft-output (SISO) decoders. Fixed and adaptive scaling factors were estimated to mitigate both the optimistic nature of a posteriori information and the correlation between intrinsic and extrinsic information produced by soft-output Viterbi (SOVA) decoders. The scaling factors could be computed off-line to reduce processing time and implementation complexity. The simulation results show a significant improvement in terms of bit-error rate (BER) over additive white Gaussian noise and Rayleigh fading channel. The convergence properties of the suggested iterative scheme are assessed using the extrinsic information transfer (EXIT) chart analysis technique. 展开更多
关键词 TURBO codes SOVA SCCC scaling Factor EXIT
在线阅读 下载PDF
On the Construction of the Kernel Matrix by Primitive BCH Codes for Polar Codes
11
作者 Liping Lin 《Communications and Network》 2022年第1期23-35,共13页
The polar codes defined by the kernel matrix are a class of codes with low coding-decoding complexity and can achieve the Shannon limit. In this paper, a novel method to construct the 2<sup>n</sup>-dimensi... The polar codes defined by the kernel matrix are a class of codes with low coding-decoding complexity and can achieve the Shannon limit. In this paper, a novel method to construct the 2<sup>n</sup>-dimensional kernel matrix is proposed, that is based on primitive BCH codes that make use of the interception, the direct sum and adding a row and a column. For ensuring polarization of the kernel matrix, a solution is also put forward when the partial distances of the constructed kernel matrix exceed their upper bound. And the lower bound of exponent of the 2<sup>n</sup>-dimensional kernel matrix is obtained. The lower bound of exponent of our constructed kernel matrix is tighter than Gilbert-Varshamov (G-V) type, and the scaling exponent is better in the case of 16-dimensional. 展开更多
关键词 Polar code Kernel Matrix Matrix Interception Partial Distance EXPONENT scaling Exponent
在线阅读 下载PDF
Proposed Simplified Procedure for Safety Factor Scaling for Various Life Cycles
12
作者 Eliezer Shamir 《Journal of Civil Engineering and Architecture》 2014年第10期1317-1326,共10页
It is common to assume that structures are designed in view of 50 year life cycle as per Euro-Code 2 and other codes. In special cases, structures are designed in view of longer life cycle, such as bridges, important ... It is common to assume that structures are designed in view of 50 year life cycle as per Euro-Code 2 and other codes. In special cases, structures are designed in view of longer life cycle, such as bridges, important infrastructure facilities, important religious structures or in case of extended returning period of seismic event or floods. Beside issues of durability and maintenance aspects, this involves also the need to cover the probability of exceeding characteristic design live loads during the extended period, while keeping the same levels of the accepted risk that were assumed by the various codes, as good enough for the standard 50 year life cycle. Bearing in mind that design procedures, formulations, materials characteristic strengths and partial safety factors are used for these structures as per the existing codes, scaling of partial safety factors, or alternatively an additional "compensating" factor is required. A simplified approach and procedure to arrive at a reasonable calibration of the code safety factors based on 50 years to compensate for an extended life cycle, based upon structural reliability considerations, is proposed. 展开更多
关键词 Life cycle code calibration scaling safety factors target reliability factor.
在线阅读 下载PDF
改进MSE和BTSVM的往复压缩机轴承智能诊断研究
13
作者 闫旭辉 武文革 邓诗俊 《机械设计与制造》 北大核心 2025年第12期277-282,共6页
针对往复压缩机轴承故障诊断识别准确率不高,故障特征信息耦合等问题,提出了基于改进MSE和优化BTSVM的故障诊断新方法。鉴于多尺度样本熵算法在冗余计算与特征提取效率方面存在的局限性,本研究深入剖析其多尺度处理策略与样本熵计算流程... 针对往复压缩机轴承故障诊断识别准确率不高,故障特征信息耦合等问题,提出了基于改进MSE和优化BTSVM的故障诊断新方法。鉴于多尺度样本熵算法在冗余计算与特征提取效率方面存在的局限性,本研究深入剖析其多尺度处理策略与样本熵计算流程,针对性地实施了优化措施。由此,本文提出了改进多尺度样本熵算法(IMSE),旨在显著提升算法的计算效率与特征提取精度。其次,针对传统纠错码无法确定码长及最优排列顺序这两方面的不足,将Hadamard矩阵应用于纠错码,提出一种基于Hadamard纠错码结合二叉树支持向量机(BTSVM)的故障识别方法。最后,将两种改进方法进行混合应用于往复压缩机故障诊断中,结果表明,本方法不但提高了故障诊断的准确率,还极大地加快了故障诊断的计算速度。 展开更多
关键词 往复压缩机 改进多尺度样本熵算法 纠错码 二叉树支持向量机 故障诊断
在线阅读 下载PDF
多尺度热工水力分析方法研究及其在海洋核动力小堆中的应用
14
作者 罗涵禹 宋厚德 刘晓晶 《核技术》 北大核心 2025年第10期130-139,共10页
海洋核动力小堆作为未来海洋核能应用的重要形式,其热工水力特性受到周期性流体波动和复杂运动的影响,增加了设计与安全评估的挑战。本研究旨在开发一种多尺度分析方法,通过适应性改造和多层次模拟,系统评估海洋条件下核动力小堆的热工... 海洋核动力小堆作为未来海洋核能应用的重要形式,其热工水力特性受到周期性流体波动和复杂运动的影响,增加了设计与安全评估的挑战。本研究旨在开发一种多尺度分析方法,通过适应性改造和多层次模拟,系统评估海洋条件下核动力小堆的热工水力行为与安全性。首先,选用STAR-CCM+作为改造系统分析、子通道和计算流体力学(Computational Fluid Dynamics,CFD)等程序的工具,对RELAP5源程序进行了修改,对海洋小堆进行简化建模,以适应海洋环境下的系统行为、组件传热、燃料棒束等关键特性;其次,针对反应堆系统级、组件级和棒束级的多尺度特性,构建跨尺度数据传递机制,实现多尺度分析,同时考虑了5 cm直径的小破口以及主泵失电失流的典型事故瞬态的模拟计算和分析。计算结果表明,海洋条件下小堆热工水力特性发生显著变化,尤其在摇摆条件下,系统热力学参数呈现周期性波动,换热系数受周期性振荡影响显著增强。本研究提出的多尺度分析方法适用于海洋核动力小堆的安全评估和设计优化,有助于提升其在海洋环境中的可靠性和运行效率,为海洋核能技术的应用提供理论和实践支持。 展开更多
关键词 多尺度分析 海洋核动力小堆 系统程序 子通道程序 CFD程序
原文传递
基于SecureViT的恶意代码检测模型
15
作者 张傲 刘微 +2 位作者 刘阳 李波 刘芳菲 《电子测量技术》 北大核心 2025年第16期113-121,共9页
随着恶意代码的多样性和隐蔽性不断增加,传统的恶意代码检测方法在面对未知恶意代码时往往面临高成本和不稳定性的挑战。本研究旨在提出一种轻量化且高效的恶意代码检测模型,以适应资源受限环境中的应用需求。本文提出了一种基于Secure... 随着恶意代码的多样性和隐蔽性不断增加,传统的恶意代码检测方法在面对未知恶意代码时往往面临高成本和不稳定性的挑战。本研究旨在提出一种轻量化且高效的恶意代码检测模型,以适应资源受限环境中的应用需求。本文提出了一种基于SecureViT的轻量化恶意代码检测模型。该模型通过引入ACF模块与MSDC模块实现高效特征提取与精准分类。ACF模块增强了模型对全局上下文信息的建模能力,MSDC模块则通过多尺度特征提取与动态显著性调整进一步提升特征表达的丰富性。实验结果表明,SecureViT模型在Malimg、Virus-MNIST和BIG2015数据集上的分类精度分别为97.46%、91.17%和95.49%,且计算开销仅为1.71 GMAC,显著提高了检测性能并有效降低了计算成本。该模型在恶意代码检测中展现了优异的检测精度与低计算复杂度,具备在资源受限环境中的实际应用潜力。 展开更多
关键词 恶意代码检测 上下文融合 多尺度卷积 轻量化深度学习模型
原文传递
建筑物多尺度空间表达及编码研究
16
作者 黄秋华 夏林元 《惠州学院学报》 2025年第6期43-48,共6页
随着智慧城市快速发展,建筑物在城市规划、建设和管理中占据了重要地位,在不同空间尺度下对建筑物进行合理表达及有效编码具有重要意义。这种变尺度表达一方面可以实现建筑物数据的高效存储、检索和共享,同时还可以对建筑物进行全生命... 随着智慧城市快速发展,建筑物在城市规划、建设和管理中占据了重要地位,在不同空间尺度下对建筑物进行合理表达及有效编码具有重要意义。这种变尺度表达一方面可以实现建筑物数据的高效存储、检索和共享,同时还可以对建筑物进行全生命周期的有效管理,实现建筑物演变和变化的追溯和分析。选取某社区进行网格划分,在网格内部进一步划分院落,在院落的基础上对不同建筑物进行编码。同时从建筑物、楼层、房间等不同空间尺度上对建筑物进行描述与编码表达,给出了不同尺度下建筑物所对应的属性描述,并以所选案例为对象,对其进行可视化表达。建筑物多尺度表达及编码能够显著提升建筑物相关数据信息的管理效率和应用价值,为未来智慧城市建设提供有效信息支撑。 展开更多
关键词 建筑物 尺度 网格 编码
在线阅读 下载PDF
基于Swin Transformer的联合信源信道编码算法
17
作者 廖潇 李智 《现代信息科技》 2025年第7期1-4,共4页
联合信源信道编码作为语义通信的关键研究方向,已取得初步研究成果。然而,随着图像分辨率的提升,传统的基于卷积神经网络的联合信源信道编码算法在图像语义特征提取方面表现出局限性。为了解决该问题,文章提出了一种基于Swin Transforme... 联合信源信道编码作为语义通信的关键研究方向,已取得初步研究成果。然而,随着图像分辨率的提升,传统的基于卷积神经网络的联合信源信道编码算法在图像语义特征提取方面表现出局限性。为了解决该问题,文章提出了一种基于Swin Transformer的联合信源信道编码算法。该算法首先利用多尺度大核注意力机制初步捕获图像的局部信息和长距离依赖性,然后通过Swin Transformer进一步对图像语义特征进行分层提取和自适应码率编码。实验结果表明,在AWGN和Rayleigh信道模型下,所提出的算法在PSNR和MS-SSIM指标上均优于传统的算法。 展开更多
关键词 联合信源信道编码 Swin Transformer 多尺度大核注意力
在线阅读 下载PDF
纳米级SRAM多位翻转检纠错方法实现
18
作者 薛国凤 安军社 周昌义 《哈尔滨工业大学学报》 北大核心 2025年第9期39-45,共7页
为解决纳米级SRAM(100 nm以内工艺)在航天工程应用中出现的多位翻转问题,依据纳米级SRAM的翻转特性,在传统串行编译码的基础上优化改进,采用并行编译码的方式,实现了基于RS(12,8,4)码的纳米级SRAM的加固方法,在单时钟节拍内实现编译码... 为解决纳米级SRAM(100 nm以内工艺)在航天工程应用中出现的多位翻转问题,依据纳米级SRAM的翻转特性,在传统串行编译码的基础上优化改进,采用并行编译码的方式,实现了基于RS(12,8,4)码的纳米级SRAM的加固方法,在单时钟节拍内实现编译码输出。以FPGA为平台,验证该加固方法的延时和纠错能力。测试结果表明:与Xilinx自带的可检二纠一汉明码的块RAM相比,本文提出的方法访问延时相近,但纠错能力是汉明码的5~8倍;与FUEC-QUAEC、CLC等编译码方法相比,将连续5 bit翻转错误的纠正率提高到100%。采用并行编译码实现的基于RS(12,8,4)码加固方法可用于纳米级SRAM抗多位翻转加固,以较小的延时代价实现纠正一个码字(48 bit)内任意两个符号(最多8 bit)内的错误,可完全纠正空间单粒子环境中出现的单个字内连续5 bit翻转的错误。该加固方法可扩展应用到CPU外部存储器的访问控制以及CPU内部cache的加固,以解决现有航天处理器采用检二纠一码无法纠正其cache多位翻转错误的问题。 展开更多
关键词 单粒子效应 多位翻转 RS编码 纳米级SRAM
在线阅读 下载PDF
基于残差预测的端到端图像编码方法
19
作者 蒋伟 陈笑 +2 位作者 汪坡 肖睿 许子韬 《信息技术》 2025年第4期54-60,共7页
随着深度学习的发展,基于神经网络的端到端图像压缩技术受到广泛关注。基于自编码器结构的端到端图像编码模型中,特征经过多次下采样后,容易损失细节信息,导致在高码率时性能受损。针对这一问题,提出了基于残差预测的端到端图像编码方法... 随着深度学习的发展,基于神经网络的端到端图像压缩技术受到广泛关注。基于自编码器结构的端到端图像编码模型中,特征经过多次下采样后,容易损失细节信息,导致在高码率时性能受损。针对这一问题,提出了基于残差预测的端到端图像编码方法,采用通道上下文模型降低多尺度特征间的冗余,降低码率的同时保留更多图像细节。实验结果表明,文中算法在PSNR指标下相比JPEG2000可以节省19.011%BD-rate,在MS-SSIM指标下相比VVC可以节省29.696%BD-rate。 展开更多
关键词 深度学习 自编码器 端到端图像编码 残差预测 多尺度特征
在线阅读 下载PDF
口服蔗糖联合非营养性吸吮对新生儿操作性疼痛效果
20
作者 卢荣荣 郝佳丽 +1 位作者 蔡娟 赵盛楠 《中外医学研究》 2025年第19期151-154,共4页
目的:探讨口服蔗糖联合非营养性吸吮对新生儿重症监护病房(NICU)病房新生儿疼痛性操作的效果。方法:选取2023年1—12月在蚌埠医科大学第一附属医院收治的120名新生儿作为研究对象,随机分为试验组(n=60)和对照组(n=60)。这120名新生儿住... 目的:探讨口服蔗糖联合非营养性吸吮对新生儿重症监护病房(NICU)病房新生儿疼痛性操作的效果。方法:选取2023年1—12月在蚌埠医科大学第一附属医院收治的120名新生儿作为研究对象,随机分为试验组(n=60)和对照组(n=60)。这120名新生儿住院期间均进行了疼痛性操作如静脉穿刺,试验组在穿刺前给予蔗糖口服联合非营养性吸吮,对照组则给予安抚等常规护理措施。通过比较两组新生儿各项生理指标、面部编码系统和疼痛评分量表等。结果:试验组患儿不仅心率、呼吸、氧饱和度等指标优于对照组,而且面部编码系统和疼痛量表得分均低于对照组,差异有统计学意义(P<0.05)。结论:对需要静脉穿刺的新生儿,采用口服蔗糖联合非营养性吸吮的干预措施,可以明显改善其疼痛指标,减少疼痛带来的负面影响。 展开更多
关键词 蔗糖 非营养性吸吮 新生儿面部编码系统 疼痛评分量表 新生儿疼痛
暂未订购
上一页 1 2 17 下一页 到第
使用帮助 返回顶部