Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation res...Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance.展开更多
In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking th...In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.展开更多
The fundamental right-based and human right-based nature of labor rights forms the subjective and objective theory of labor rights.The derived objective protection function and subjective realization function constitu...The fundamental right-based and human right-based nature of labor rights forms the subjective and objective theory of labor rights.The derived objective protection function and subjective realization function constitute the theoretical basis of the labor code system.The objective function of labor rights requires the labor code to provide corresponding institutional guarantees,while the subjective function demands that the code ensure the full realization of labor rights.The dual functions of labor rights are reflected in the structural framework and content logic of the labor code separately:on the one hand,labor rights can serve as the structural thread for narrating and systematically organizing the labor code,with the specific types of labor rights protection and functional systems jointly forming the framework of the code;on the other hand,the content arrangement of the labor code is guided by the value of realizing labor rights,exploring the pathways for the code’s realization of labor rights in different situations.展开更多
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat...Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%.展开更多
Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbule...Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder.展开更多
Distributed computing is an important topic in the field of wireless communications and networking,and its high efficiency in handling large amounts of data is particularly noteworthy.Although distributed computing be...Distributed computing is an important topic in the field of wireless communications and networking,and its high efficiency in handling large amounts of data is particularly noteworthy.Although distributed computing benefits from its ability of processing data in parallel,the communication burden between different servers is incurred,thereby the computation process is detained.Recent researches have applied coding in distributed computing to reduce the communication burden,where repetitive computation is utilized to enable multicast opportunities so that the same coded information can be reused across different servers.To handle the computation tasks in practical heterogeneous systems,we propose a novel coding scheme to effectively mitigate the "straggling effect" in distributed computing.We assume that there are two types of servers in the system and the only difference between them is their computational capabilities,the servers with lower computational capabilities are called stragglers.Given any ratio of fast servers to slow servers and any gap of computational capabilities between them,we achieve approximately the same computation time for both fast and slow servers by assigning different amounts of computation tasks to them,thus reducing the overall computation time.Furthermore,we investigate the informationtheoretic lower bound of the inter-communication load and show that the lower bound is within a constant multiplicative gap to the upper bound achieved by our scheme.Various simulations also validate the effectiveness of the proposed scheme.展开更多
Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem s...Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem surface code with three-qubit check operators demonstrates significant application potential due to its simplified measurement operations and low logical error rates.However,the existing minimum-weight perfect matching(MWPM)algorithm exhibits high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoder based on a graph attention network(GAT),representing error syndromes as undirected graphs with edge weights,and employing a multihead attention mechanism to efficiently aggregate node features and enable parallel computation.Compared to MWPM,the GAT decoder exhibits linear growth in computational complexity,adapts to different quantum code structures,and demonstrates stronger robustness under high physical error rates.The experimental results demonstrate that the proposed decoder achieves an overall accuracy of 89.95%under various small code lattice sizes(L=2,3,4,5),with the logical error rate threshold increasing to 0.0078,representing an improvement of approximately 13.04%compared to the MWPM decoder.This result significantly outperforms traditional methods,showcasing superior performance under small code lattice sizes and providing a more efficient decoding solution for large-scale quantum error correction.展开更多
Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and ...Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.展开更多
Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to...Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to its ability to handle user overload.Introducing SCMA into visible light communication(VLC)systems can improve the data transmission capability of the system.However,designing a suitable codebook becomes a challenging problem when addressing the demands of massive connectivity scenarios.Therefore,this paper proposes a low-complexity design method for high-overload codebooks based on the minimum bit error rate(BER)criterion.Firstly,this paper constructs a new codebook with parameters based on the symmetric mother codebook structure by allocating the codeword power so that the power of each user codebook is unbalanced;then,the BER performance in the visible light communication system is optimized to obtain specific parameters;finally,the successive interference cancellation(SIC)detection algorithm is used at the receiver side.Simulation results show that the method proposed in this paper can converge quickly by utilizing a relatively small number of detection iterations.This can simultaneously reduce the complexity of design and detection,outperforming existing design methods for massive SCMA codebooks.展开更多
QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribu...QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribution and phishing attacks.Traditional detection approaches rely on URL analysis or image-based feature extraction,whichmay introduce significant computational overhead and limit real-time applicability,and their performance often depends on the quality of extracted features.Previous studies in malicious detection do not fully focus on QR code securitywhen combining convolutional neural networks(CNNs)with recurrent neural networks(RNNs).This research proposes a deep learning model that integrates AlexNet for feature extraction,principal component analysis(PCA)for dimensionality reduction,and RNNs to detect malicious activity in QR code images.The proposed model achieves both efficiency and accuracy by transforming image data into a compact one-dimensional sequence.Experimental results,including five-fold cross-validation,demonstrate that the model using gated recurrent units(GRU)achieved an accuracy of 99.81%on the first dataset and 99.59%in the second dataset with a computation time of only 7.433 ms per sample.A real-time prototype was also developed to demonstrate deployment feasibility.These results highlight the potential of the proposed approach for practical,real-time QR code threat detection.展开更多
This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource ...This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource node(RN)instead of rotating a mother constellation(MC)as in the conventional SCMA works.In the other one,based on the MC,a multi-resources rotated codebooks are proposed to improve the performance of the superimposed constellations.The resultant codebooks are respectively referred to as the resource edge multidimensional codebooks(REMC)and the user edge multi-dimensional codebooks(UEMC).Additionally,we delve into the detailed design of the MC and the superimposed constellation.Then,we pay special attention to the application of the proposed schemes to challenging design cases,particularly for the high dimensional,high rate,and irregular codebooks,where the corresponding simplified schemes are proposed to reduce the complexity of codebook design.Finally,simulation results are presented to demonstrate the superiority of our progressive edge growth-based schemes.The numerical results indicate that the proposed codebooks significantly outperform the stateof-the-art codebooks.In addition,we also show that the proposed REMC codebooks outperform in the lower signal-to-noise ratio(SNR)regime,whereas the UEMC codebooks exhibit better performance at higher SNRs.展开更多
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及...介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。展开更多
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom...Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency.展开更多
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv...Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance.展开更多
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug...Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.展开更多
An analytical model of a floating heaving box integrated with a vertical flexible porous membrane placed right next to the box applications to wave energy extraction and breakwater systems is developed under the reduc...An analytical model of a floating heaving box integrated with a vertical flexible porous membrane placed right next to the box applications to wave energy extraction and breakwater systems is developed under the reduced wave equation.The theoretical solutions for the heave radiating potential to the assigned physical model in the corresponding zones are attained by using the separation of variables approach along with the Fourier expansion.Applying the matching eigenfunction expansion technique and orthogonal conditions,the unknown coefficients that are involved in the radiated potentials are determined.The attained radiation potential allows the computation of hydrodynamic coefficients of the heaving buoy,Power Take-Off damping,and wave quantities.The accuracy of the analytical solution for the hydrodynamic coefficients is demonstrated for different oblique angles with varying numbers of terms in the series solution.The current analytical analysis findings are confirmed by existing published numerical boundary element method simulations.Several numerical results of the hydrodynamic coefficients,power capture,power take-off optimal damping,and transmission coefficients for numerous structural and physical aspects are conducted.It has been noted that the ideal power take-off damping increases as the angle of incidence rises,and the analysis suggests that the ability to capture waves is more effective in shallower waters compared to deeper ones.展开更多
The paper presents a computer code system 'SRDAAR- QNPP' for the real-time dose as-sessment of an accident release for Qinshan Nuclear Power Plant. It includes three parts:thereal-time data acquisition system,...The paper presents a computer code system 'SRDAAR- QNPP' for the real-time dose as-sessment of an accident release for Qinshan Nuclear Power Plant. It includes three parts:thereal-time data acquisition system, assessment computer. and the assessment operating code system. InSRDAAR-QNPP, the wind field of the surface and the lower levels are determined hourly by using amass consistent three-dimension diasnosis model with the topographic following coordinate system.A Lagrangin Puff model under changing meteorological condition is adopted for atmosphericdispersion, the correction for dry and wet depositions. physical decay and partial plume penetrationof the top inversion and the deviation of plume axis caused by complex terrain have been taken in-to account. The calculation domain areas include three square grid areas with the sideline 10 km, 40krn and 160 km and a grid interval 0.5 km, 2.0 km, 8.0 km respectively. Three exposure pathwaysare taken into account:the external exposure from immersion cloud and passing puff, the internalexposure from inhalation and the external exposure from contaminated ground. This system is ableto provide the results of concentration and dose distributions within 10 minutes after the data havebeen inputed.展开更多
Turbo code has drawn more and more attractions for high data rate transmission these years especially in W CDMA and CDMA2000 of the third generation mobile communications systems. In this paper, the simulation perfor...Turbo code has drawn more and more attractions for high data rate transmission these years especially in W CDMA and CDMA2000 of the third generation mobile communications systems. In this paper, the simulation performance of turbo code under Rayleigh fading channel and additive white Gaussian channels are depicted. Comparison with the performance of convolutional code are made respect to different parameters, such as pilot length, interleaver size, frame length, mobile velocity and data rate, etc. Faithful results are drawn out.展开更多
A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method e...A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method extended the class of LDPC codes which could be constructed from shifted identity matrices. The method could avoid short cycles in Tanner graphs with simple inequation in the construction of shifting identity matrices, which made the girth of Tanner graphs 8. Because of the quasicyclic structure and the inherent block configuration of parity-check matrices, the encoders and the decoders were practically feasible. They were linear-time encodable and decodable. The LDPC codes proposed had various code rates, ranging from low to high. They performed excellently with iterative decoding and demonstrate better performance than other regular LDPC codes in OFDM systems.展开更多
文摘Based on the Maximum-Likelihood (ML) criterion, this paper proposes a novel noncoherent detection algorithm for Orthogonal Multicode (OM) system in Nakagami fading channel. Some theoretical analysis and simulation results are presented. It is shown that the proposed ML algorithm is at least 0.7 dB better than the conventional Matched-Filter (MF) algorithm for uncoded systems, in both non-fading and fading channels. For the consideration of practical application, it is further simplified in complexity. Compared with the original ML algorithm, the simplified ML algorithm can provide significant reduction in complexity with small degradation in performance.
文摘In digital fingerprinting, preventing piracy of images by colluders is an important and tedious issue. Each image will be embedded with a unique User IDentification (UID) code that is the fingerprint for tracking the authorized user. The proposed hiding scheme makes use of a random number generator to scramble two copies of a UID, which will then be hidden in the randomly selected medium frequency coefficients of the host image. The linear support vector machine (SVM) will be used to train classifications by calculating the normalized correlation (NC) for the 2class UID codes. The trained classifications will be the models used for identifying unreadable UID codes. Experimental results showed that the success of predicting the unreadable UID codes can be increased by applying SVM. The proposed scheme can be used to provide protections to intellectual property rights of digital images aad to keep track of users to prevent collaborative piracies.
基金“Research on Supporting and Regulating the Development of New Forms of Employment”(Project Number HZ05)2023 Key Research Project on Xi Jinping Thought on the Rule of Law sponsored by East China University of Political Science and Law,and“Research on Family Leave Promotion Legislation”(Project Number 2023-1-014)under the Excellent Doctoral Dissertation Cultivation Project of East China University of Political Science and Law.
文摘The fundamental right-based and human right-based nature of labor rights forms the subjective and objective theory of labor rights.The derived objective protection function and subjective realization function constitute the theoretical basis of the labor code system.The objective function of labor rights requires the labor code to provide corresponding institutional guarantees,while the subjective function demands that the code ensure the full realization of labor rights.The dual functions of labor rights are reflected in the structural framework and content logic of the labor code separately:on the one hand,labor rights can serve as the structural thread for narrating and systematically organizing the labor code,with the specific types of labor rights protection and functional systems jointly forming the framework of the code;on the other hand,the content arrangement of the labor code is guided by the value of realizing labor rights,exploring the pathways for the code’s realization of labor rights in different situations.
基金supported by the External Cooperation Program of Science and Technology of Fujian Province,China(2024I0016)the Fundamental Research Funds for the Central Universities(ZQN-1005).
文摘Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%.
基金supported by the National Natural Science Foundation of China(No.12104141).
文摘Aiming at the problem that the bit error rate(BER)of asymmetrically clipped optical orthogonal frequency division multiplexing(ACO-OFDM)space optical communication system is significantly affected by different turbulence intensities,the deep learning technique is proposed to the polarization code decoding in ACO-OFDM space optical communication system.Moreover,this system realizes the polarization code decoding and signal demodulation without frequency conduction with superior performance and robustness compared with the performance of traditional decoder.Simulations under different turbulence intensities as well as different mapping orders show that the convolutional neural network(CNN)decoder trained under weak-medium-strong turbulence atmospheric channels achieves a performance improvement of about 10^(2)compared to the conventional decoder at 4-quadrature amplitude modulation(4QAM),and the BERs for both 16QAM and 64QAM are in between those of the conventional decoder.
基金supported by NSF China(No.T2421002,62061146002,62020106005)。
文摘Distributed computing is an important topic in the field of wireless communications and networking,and its high efficiency in handling large amounts of data is particularly noteworthy.Although distributed computing benefits from its ability of processing data in parallel,the communication burden between different servers is incurred,thereby the computation process is detained.Recent researches have applied coding in distributed computing to reduce the communication burden,where repetitive computation is utilized to enable multicast opportunities so that the same coded information can be reused across different servers.To handle the computation tasks in practical heterogeneous systems,we propose a novel coding scheme to effectively mitigate the "straggling effect" in distributed computing.We assume that there are two types of servers in the system and the only difference between them is their computational capabilities,the servers with lower computational capabilities are called stragglers.Given any ratio of fast servers to slow servers and any gap of computational capabilities between them,we achieve approximately the same computation time for both fast and slow servers by assigning different amounts of computation tasks to them,thus reducing the overall computation time.Furthermore,we investigate the informationtheoretic lower bound of the inter-communication load and show that the lower bound is within a constant multiplicative gap to the upper bound achieved by our scheme.Various simulations also validate the effectiveness of the proposed scheme.
基金Project supported by the Natural Science Foundation of Shandong Province,China(Grant No.ZR2021MF049)the Joint Fund of the Natural Science Foundation of Shandong Province,China(Grant Nos.ZR2022LLZ012 and ZR2021LLZ001)the Key Research and Development Program of Shandong Province,China(Grant No.2023CXGC010901)。
文摘Quantum error-correcting codes are essential for fault-tolerant quantum computing,as they effectively detect and correct noise-induced errors by distributing information across multiple physical qubits.The subsystem surface code with three-qubit check operators demonstrates significant application potential due to its simplified measurement operations and low logical error rates.However,the existing minimum-weight perfect matching(MWPM)algorithm exhibits high computational complexity and lacks flexibility in large-scale systems.Therefore,this paper proposes a decoder based on a graph attention network(GAT),representing error syndromes as undirected graphs with edge weights,and employing a multihead attention mechanism to efficiently aggregate node features and enable parallel computation.Compared to MWPM,the GAT decoder exhibits linear growth in computational complexity,adapts to different quantum code structures,and demonstrates stronger robustness under high physical error rates.The experimental results demonstrate that the proposed decoder achieves an overall accuracy of 89.95%under various small code lattice sizes(L=2,3,4,5),with the logical error rate threshold increasing to 0.0078,representing an improvement of approximately 13.04%compared to the MWPM decoder.This result significantly outperforms traditional methods,showcasing superior performance under small code lattice sizes and providing a more efficient decoding solution for large-scale quantum error correction.
基金supported in part by Vietnam National Foundation for Science and Technology Development(NAFOSTED)under Grant 102.04-2021.57in part by Culture,Sports and Tourism R&D Program through the Korea Creative Content Agency grant funded by the Ministry of Culture,Sports and Tourism in 2024(Project Name:Global Talent Training Program for Copyright Management Technology in Game Contents,Project Number:RS-2024-00396709,Contribution Rate:100%).
文摘Digital content such as games,extended reality(XR),and movies has been widely and easily distributed over wireless networks.As a result,unauthorized access,copyright infringement by third parties or eavesdroppers,and cyberattacks over these networks have become pressing concerns.Therefore,protecting copyrighted content and preventing illegal distribution in wireless communications has garnered significant attention.The Intelligent Reflecting Surface(IRS)is regarded as a promising technology for future wireless and mobile networks due to its ability to reconfigure the radio propagation environment.This study investigates the security performance of an uplink Non-Orthogonal Multiple Access(NOMA)system integrated with an IRS and employing Fountain Codes(FCs).Specifically,two users send signals to the base station at separate distances.A relay receives the signal from the nearby user first and then relays it to the base station.The IRS receives the signal from the distant user and reflects it to the relay,which then sends the reflected signal to the base station.Furthermore,a malevolent eavesdropper intercepts both user and relay communications.We construct mathematical equations for Outage Probability(OP),throughput,diversity evaluation,and Interception Probability(IP),offering quantitative insights to assess system security and performance.Additionally,OP and IP are analyzed using a Deep Neural Network(DNN)model.A deeper comprehension of the security performance of the IRS-assisted NOMA systemin signal transmission is provided by Monte Carlo simulations,which are also carried out to confirm the theoretical conclusions.
基金supported in part by the National Science Foundation of China(NSFC)under Grant 62161024Jiangxi Provincial Natural Science Foundation under Grant 20224BAB212002+3 种基金Jiangxi Provincial Talent Project for Academic and Technical Leaders of Major Disciplines under Grant 20232BCJ23085,China Postdoctoral Science Foundation under Grant 2021TQ0136 and 2022M711463the State Key Laboratory of Computer Architecture(ICT,CAS)Open Project under Grant CARCHB202019supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62061030supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62161023。
文摘Sparse code multiple access(SCMA)is a non-orthogonal multiple access(NOMA)scheme based on joint modulation and spread spectrum coding.It is ideal for future communication networks with a massive number of nodes due to its ability to handle user overload.Introducing SCMA into visible light communication(VLC)systems can improve the data transmission capability of the system.However,designing a suitable codebook becomes a challenging problem when addressing the demands of massive connectivity scenarios.Therefore,this paper proposes a low-complexity design method for high-overload codebooks based on the minimum bit error rate(BER)criterion.Firstly,this paper constructs a new codebook with parameters based on the symmetric mother codebook structure by allocating the codeword power so that the power of each user codebook is unbalanced;then,the BER performance in the visible light communication system is optimized to obtain specific parameters;finally,the successive interference cancellation(SIC)detection algorithm is used at the receiver side.Simulation results show that the method proposed in this paper can converge quickly by utilizing a relatively small number of detection iterations.This can simultaneously reduce the complexity of design and detection,outperforming existing design methods for massive SCMA codebooks.
基金funded by the Deanship of Scientific Research(DSR)at King Abdulaziz University Jeddah,under grant no.(GPIP:1168-611-2024)The authors acknowledge the DSR for financial and technical support.
文摘QR codes are widely used in applications such as information sharing,advertising,and digital payments.However,their growing adoption has made them attractive targets for malicious activities,including malware distribution and phishing attacks.Traditional detection approaches rely on URL analysis or image-based feature extraction,whichmay introduce significant computational overhead and limit real-time applicability,and their performance often depends on the quality of extracted features.Previous studies in malicious detection do not fully focus on QR code securitywhen combining convolutional neural networks(CNNs)with recurrent neural networks(RNNs).This research proposes a deep learning model that integrates AlexNet for feature extraction,principal component analysis(PCA)for dimensionality reduction,and RNNs to detect malicious activity in QR code images.The proposed model achieves both efficiency and accuracy by transforming image data into a compact one-dimensional sequence.Experimental results,including five-fold cross-validation,demonstrate that the model using gated recurrent units(GRU)achieved an accuracy of 99.81%on the first dataset and 99.59%in the second dataset with a computation time of only 7.433 ms per sample.A real-time prototype was also developed to demonstrate deployment feasibility.These results highlight the potential of the proposed approach for practical,real-time QR code threat detection.
文摘This paper proposes a class of novel progressive edge growth-based codebooks for downlink sparse code multiple access(SCMA)systems.In the first scheme,we propose to progressively design the codebooks of each resource node(RN)instead of rotating a mother constellation(MC)as in the conventional SCMA works.In the other one,based on the MC,a multi-resources rotated codebooks are proposed to improve the performance of the superimposed constellations.The resultant codebooks are respectively referred to as the resource edge multidimensional codebooks(REMC)and the user edge multi-dimensional codebooks(UEMC).Additionally,we delve into the detailed design of the MC and the superimposed constellation.Then,we pay special attention to the application of the proposed schemes to challenging design cases,particularly for the high dimensional,high rate,and irregular codebooks,where the corresponding simplified schemes are proposed to reduce the complexity of codebook design.Finally,simulation results are presented to demonstrate the superiority of our progressive edge growth-based schemes.The numerical results indicate that the proposed codebooks significantly outperform the stateof-the-art codebooks.In addition,we also show that the proposed REMC codebooks outperform in the lower signal-to-noise ratio(SNR)regime,whereas the UEMC codebooks exhibit better performance at higher SNRs.
文摘介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。
基金supported by National Natural Science Foundation of China(No.62301008)China Postdoctoral Science Foundation(No.2022M720272)New Cornerstone Science Foundation through the XPLORER PRIZE。
文摘Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency.
基金supported by National Natural Science Foundation of China(No.61801327).
文摘Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance.
基金supported by Key Laboratory of Cyberspace Security,Ministry of Education,China。
文摘Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC.
基金Open access funding provided by FCT|FCCN(b-on)the Strategic Research Plan of the Centre for Marine Technology and Ocean Engineering(CENTEC),which is financed by the Portuguese Foundation for Science and Technology(Fundação para a Ciência e Tecnologia-FCT)under contract UIDB/UIDP/00134/2020.
文摘An analytical model of a floating heaving box integrated with a vertical flexible porous membrane placed right next to the box applications to wave energy extraction and breakwater systems is developed under the reduced wave equation.The theoretical solutions for the heave radiating potential to the assigned physical model in the corresponding zones are attained by using the separation of variables approach along with the Fourier expansion.Applying the matching eigenfunction expansion technique and orthogonal conditions,the unknown coefficients that are involved in the radiated potentials are determined.The attained radiation potential allows the computation of hydrodynamic coefficients of the heaving buoy,Power Take-Off damping,and wave quantities.The accuracy of the analytical solution for the hydrodynamic coefficients is demonstrated for different oblique angles with varying numbers of terms in the series solution.The current analytical analysis findings are confirmed by existing published numerical boundary element method simulations.Several numerical results of the hydrodynamic coefficients,power capture,power take-off optimal damping,and transmission coefficients for numerous structural and physical aspects are conducted.It has been noted that the ideal power take-off damping increases as the angle of incidence rises,and the analysis suggests that the ability to capture waves is more effective in shallower waters compared to deeper ones.
文摘The paper presents a computer code system 'SRDAAR- QNPP' for the real-time dose as-sessment of an accident release for Qinshan Nuclear Power Plant. It includes three parts:thereal-time data acquisition system, assessment computer. and the assessment operating code system. InSRDAAR-QNPP, the wind field of the surface and the lower levels are determined hourly by using amass consistent three-dimension diasnosis model with the topographic following coordinate system.A Lagrangin Puff model under changing meteorological condition is adopted for atmosphericdispersion, the correction for dry and wet depositions. physical decay and partial plume penetrationof the top inversion and the deviation of plume axis caused by complex terrain have been taken in-to account. The calculation domain areas include three square grid areas with the sideline 10 km, 40krn and 160 km and a grid interval 0.5 km, 2.0 km, 8.0 km respectively. Three exposure pathwaysare taken into account:the external exposure from immersion cloud and passing puff, the internalexposure from inhalation and the external exposure from contaminated ground. This system is ableto provide the results of concentration and dose distributions within 10 minutes after the data havebeen inputed.
文摘Turbo code has drawn more and more attractions for high data rate transmission these years especially in W CDMA and CDMA2000 of the third generation mobile communications systems. In this paper, the simulation performance of turbo code under Rayleigh fading channel and additive white Gaussian channels are depicted. Comparison with the performance of convolutional code are made respect to different parameters, such as pilot length, interleaver size, frame length, mobile velocity and data rate, etc. Faithful results are drawn out.
文摘A new method of constructing regular low-density parity-check (LDPC) codes was proposed. And the novel class of LDPC codes was applied in a coded orthogonal frequency division multiplexing (OFDM) system. This method extended the class of LDPC codes which could be constructed from shifted identity matrices. The method could avoid short cycles in Tanner graphs with simple inequation in the construction of shifting identity matrices, which made the girth of Tanner graphs 8. Because of the quasicyclic structure and the inherent block configuration of parity-check matrices, the encoders and the decoders were practically feasible. They were linear-time encodable and decodable. The LDPC codes proposed had various code rates, ranging from low to high. They performed excellently with iterative decoding and demonstrate better performance than other regular LDPC codes in OFDM systems.