This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-...This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-DCSK-CC system,the source transmits information bits to both the relay and destination in the first time slot,while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot.To be specific,the relay employs an N-order Walsh code to carry additional log_(2)N information bits,which are superimposed onto the SRDCSK signal carrying the decoded source information bits.Subsequently,the superimposed signal carrying both the source and relay information bits is transmitted to the destination.Moreover,the theoretical bit error rate(BER)expressions of the proposed CIMSR-DCSK-CC system are derived over additive white Gaussian noise(AWGN)and multipath Rayleigh fading channels.Compared with the conventional DCSKCC system and SR-DCSK-CC system,the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance.As a consequence,the proposed system is very promising for the applications of the 6G-enabled lowpower and high-rate communication.展开更多
In this paper,Index Modulation(IM)aided Generalized Space-Time Block Coding(GSTBC)is proposed,which intrinsically exploits the benefits of IM concept,diversity gain and spatial multiplexing gain.Specifically,the infor...In this paper,Index Modulation(IM)aided Generalized Space-Time Block Coding(GSTBC)is proposed,which intrinsically exploits the benefits of IM concept,diversity gain and spatial multiplexing gain.Specifically,the information bits are partitioned into U groups,with each being modulated by IM symbols(i.e.Spatial Modulation(SM),Quadrature SM(QSM),etc).Next,the structure of GSTBC is invoked for each K IM symbol,and a total ofμ=U/K GSTBC codes are transmitted via T time slots.A Block Expectation Propagation(B-EP)detector is designed for the proposed IM-GSTBC structure.Moreover,the theoretical Average Bit Error Probability(ABEP)is derived for our IM-GSTBC system,which is confirmed by the simulation results and helpful for performance evaluation.Simulation results show that our proposed IM-GSTBC system is capable of striking an efficient trade-off between spatial multiplexing gain,spatial diversity gain as well as implementation cost imposed for both small-scale and large-scale MIMO antenna configurations.展开更多
A new way of indexing and processing twig patterns in an XML documents is proposed in this paper. Every path in XML document can be transformed into a sequence of labels by Structure-Encoded that constructs a one-to-o...A new way of indexing and processing twig patterns in an XML documents is proposed in this paper. Every path in XML document can be transformed into a sequence of labels by Structure-Encoded that constructs a one-to-one correspondence between XML tree and sequence. Base on identifying characteristics of nodes in XML tree, the elements are classified and clustered. During query proceeding, the twig pattern is also transformed into its Structure-Encoded. By performing subsequence matching on the set of sequences in XML documents, all the occurrences of path in the XML documents are refined. Using the index, the numbers of elements retrieved are minimized. The search results with pertinent format provide more structure information without any false dismissals or false alarms. The index also supports keyword search Experiment results indicate the index has significantly efficiency with high precision.展开更多
In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model...In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model of quality assurance at source code level was proposed, which implies that coding standard should be better accepted and more emphasized than programming style. Our current researches on evaluating the compliance with coding standards will likely make the strategy of quality assurance at source code level more operable.展开更多
In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteris...In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteristics of varying rate, interference,and routing in wireless transmission channels,the concepts of equivalent delay (ED) and networked condition index (NCI) are introduced.Also,the analytic lower and upper bounds of EDs are obtained.Furthermore,we model the WNCS as a multicontroller switched system (MSS) under consideration of EDs and loss index in the wireless transmission.Sufficient stability condition of the closed-loop WNCS and corresponding dynamic state feedback controllers are derived in terms of linear matrix inequality (LMI). Numerical results show the validity and advantage of our proposed control strategies.展开更多
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati...Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization.展开更多
The deformation performance index limits of high reinforced concrete (RC) shear wall components based on Chinese codes were discussed by the nonlinear finite element method. Two typical RC shear wall specimens in th...The deformation performance index limits of high reinforced concrete (RC) shear wall components based on Chinese codes were discussed by the nonlinear finite element method. Two typical RC shear wall specimens in the previous work were first used to verify the correctness of the nonlinear finite element method. Then, the nonlinear finite element method was applied to study the deformability of a set of high RC shear wall components designed according to current Chinese codes and with shear span ratio λ≥2.0. Parametric studies were made on the influence of shear span ratio, axial compression ratio, ratio of flexural capacity to shear capacity and main flexural reinforcement ratio of confined botmdary members. Finally, the deformation performance index and its limits of high RC shear wall components under severe earthquakes were proposed by the finite element model results, which offers a reference in determining the performance status of RC shear wall components designed based on Chinese codes.展开更多
Erasure code is widely used as the redundancy scheme in distributed storage system. When a storage node fails, the repair process often requires to transfer a large amount of data. Regenerating code and hierarchical c...Erasure code is widely used as the redundancy scheme in distributed storage system. When a storage node fails, the repair process often requires to transfer a large amount of data. Regenerating code and hierarchical code are two classes of codes proposed to reduce the repair bandwidth cost. Regenerating codes reduce the amount of data transferred by each helping node, while hierarchical codes reduce the number of nodes participating in the repair process. In this paper, we propose a "sub-code nesting framework" to combine them together. The resulting regenerating hierarchical code has low repair degree as hierarchical code and lower repair cost than hierarchical code. Our code can achieve exact regeneration of the failed node, and has the additional property of low updating complexity.展开更多
The minimum squared Euclidean distance(MSED) of binary multi-h phase codes is presented. The signal segregation degree(SSD) has been put forward to determine MSED of multi-h phase codes. In order to maximize MSED, SSD...The minimum squared Euclidean distance(MSED) of binary multi-h phase codes is presented. The signal segregation degree(SSD) has been put forward to determine MSED of multi-h phase codes. In order to maximize MSED, SSD should be as large as possible. The necessary and sufficient conditions of maximizing SSD are derived. Finally, SSD and the exact formulae for MSED of binary 2-h phase codes are also presented.展开更多
A globally optimal solution to vector quantization (VQ) index assignment on noisy channel, the evolutionary algorithm based index assignment algorithm (EAIAA), is presented. The algorithm yields a significant reductio...A globally optimal solution to vector quantization (VQ) index assignment on noisy channel, the evolutionary algorithm based index assignment algorithm (EAIAA), is presented. The algorithm yields a significant reduction in average distortion due to channel errors, over conventional arbitrary index assignment, as confirmed by experimental results over the memoryless binary symmetric channel (BSC) for any bit error.展开更多
To facilitate high-dimensional KNN queries,based on techniques of approximate vector presentation and one-dimensional transformation,an optimal index is proposed,namely Bit-Code based iDistance(BC-iDistance).To overco...To facilitate high-dimensional KNN queries,based on techniques of approximate vector presentation and one-dimensional transformation,an optimal index is proposed,namely Bit-Code based iDistance(BC-iDistance).To overcome the defect of much information loss for iDistance in one-dimensional transformation,the BC-iDistance adopts a novel representation of compressing a d-dimensional vector into a two-dimensional vector,and employs the concepts of bit code and one-dimensional distance to reflect the location and similarity of the data point relative to the corresponding reference point respectively.By employing the classical B+tree,this representation realizes a two-level pruning process and facilitates the use of a single index structure to further speed up the processing.Experimental evaluations using synthetic data and real data demonstrate that the BC-iDistance outperforms the iDistance and sequential scan for KNN search in high-dimensional spaces.展开更多
This article describes a proposal for a double index to estimate the isotropic components of unitary errors in a quantum computation circuit. In the context of this work the error is considered isotropic if it has sph...This article describes a proposal for a double index to estimate the isotropic components of unitary errors in a quantum computation circuit. In the context of this work the error is considered isotropic if it has spherical symmetry about the state of interest. The theoretical definition is given, as well the numerical approximation for practical purposes. The index is tested in some simple examples and the geometric distortion of the propagated error is studied for an inaccurate Shor 9-qubits correcting code.展开更多
基金supported in part by the NSF of China under Grant 62322106,62071131 and 62171135the Guangdong Basic and Applied Basic Research Foundation under Grant 2022B1515020086+2 种基金the NSF of Guangdong Province under Grant 2019A1515011465the International Collaborative Research Program of Guangdong Science and Technology Department under Grant 2022A0505050070the Industrial R&D Project of Haoyang Electronic Co.,Ltd.under Grant 2022440002001494.
文摘This paper proposes a high-throughput short reference differential chaos shift keying cooperative communication system with the aid of code index modulation,referred to as CIM-SR-DCSK-CC system.In the proposed CIM-SR-DCSK-CC system,the source transmits information bits to both the relay and destination in the first time slot,while the relay not only forwards the source information bits but also sends new information bits to the destination in the second time slot.To be specific,the relay employs an N-order Walsh code to carry additional log_(2)N information bits,which are superimposed onto the SRDCSK signal carrying the decoded source information bits.Subsequently,the superimposed signal carrying both the source and relay information bits is transmitted to the destination.Moreover,the theoretical bit error rate(BER)expressions of the proposed CIMSR-DCSK-CC system are derived over additive white Gaussian noise(AWGN)and multipath Rayleigh fading channels.Compared with the conventional DCSKCC system and SR-DCSK-CC system,the proposed CIM-SR-DCSK-CC system can significantly improve the throughput without deteriorating any BER performance.As a consequence,the proposed system is very promising for the applications of the 6G-enabled lowpower and high-rate communication.
基金supported in part by the National Key Research and Development Program of China under Grant 2021YFB2900500in part by the National Science Foundation of China under Grant 62001179+1 种基金in part by the Fundamental Research Funds for the Central Universities under Grant 2020kfyXJJS111。
文摘In this paper,Index Modulation(IM)aided Generalized Space-Time Block Coding(GSTBC)is proposed,which intrinsically exploits the benefits of IM concept,diversity gain and spatial multiplexing gain.Specifically,the information bits are partitioned into U groups,with each being modulated by IM symbols(i.e.Spatial Modulation(SM),Quadrature SM(QSM),etc).Next,the structure of GSTBC is invoked for each K IM symbol,and a total ofμ=U/K GSTBC codes are transmitted via T time slots.A Block Expectation Propagation(B-EP)detector is designed for the proposed IM-GSTBC structure.Moreover,the theoretical Average Bit Error Probability(ABEP)is derived for our IM-GSTBC system,which is confirmed by the simulation results and helpful for performance evaluation.Simulation results show that our proposed IM-GSTBC system is capable of striking an efficient trade-off between spatial multiplexing gain,spatial diversity gain as well as implementation cost imposed for both small-scale and large-scale MIMO antenna configurations.
基金Supported by the National Natural Science Foundation of China (60473085)
文摘A new way of indexing and processing twig patterns in an XML documents is proposed in this paper. Every path in XML document can be transformed into a sequence of labels by Structure-Encoded that constructs a one-to-one correspondence between XML tree and sequence. Base on identifying characteristics of nodes in XML tree, the elements are classified and clustered. During query proceeding, the twig pattern is also transformed into its Structure-Encoded. By performing subsequence matching on the set of sequences in XML documents, all the occurrences of path in the XML documents are refined. Using the index, the numbers of elements retrieved are minimized. The search results with pertinent format provide more structure information without any false dismissals or false alarms. The index also supports keyword search Experiment results indicate the index has significantly efficiency with high precision.
文摘In order to make most software engineers and managers pay more attention to software quality at source level, two confusing terms-coding standard and programming style-were reviewed and compared. An evolutionary model of quality assurance at source code level was proposed, which implies that coding standard should be better accepted and more emphasized than programming style. Our current researches on evaluating the compliance with coding standards will likely make the strategy of quality assurance at source code level more operable.
基金National Outstanding Youth Founda-tion (No.60525303)National Natural Science Foundation of China(No.60404022,60704009)Natural Science Foundation of Hebei Province (No.F2005000390,F2006000270).
文摘In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteristics of varying rate, interference,and routing in wireless transmission channels,the concepts of equivalent delay (ED) and networked condition index (NCI) are introduced.Also,the analytic lower and upper bounds of EDs are obtained.Furthermore,we model the WNCS as a multicontroller switched system (MSS) under consideration of EDs and loss index in the wireless transmission.Sufficient stability condition of the closed-loop WNCS and corresponding dynamic state feedback controllers are derived in terms of linear matrix inequality (LMI). Numerical results show the validity and advantage of our proposed control strategies.
基金National Natural Science Foundation of China(No.61272432)Qingdao Science and Technology Development Plan(No.12-1-4-6-(10)-jch)
文摘Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization.
基金Project(2009ZA04) supported by the Independent Research Foundation of State Key Laboratory of Subtropical Architecture Science,China
文摘The deformation performance index limits of high reinforced concrete (RC) shear wall components based on Chinese codes were discussed by the nonlinear finite element method. Two typical RC shear wall specimens in the previous work were first used to verify the correctness of the nonlinear finite element method. Then, the nonlinear finite element method was applied to study the deformability of a set of high RC shear wall components designed according to current Chinese codes and with shear span ratio λ≥2.0. Parametric studies were made on the influence of shear span ratio, axial compression ratio, ratio of flexural capacity to shear capacity and main flexural reinforcement ratio of confined botmdary members. Finally, the deformation performance index and its limits of high RC shear wall components under severe earthquakes were proposed by the finite element model results, which offers a reference in determining the performance status of RC shear wall components designed based on Chinese codes.
基金Supported by 973 Project of China (No. 2012CB315803)Research Fund for the Doctoral Program of Higher Education of China (No. 20100002110033)Open research Fund of National Mobile Communications Research Laboratory, Southeast University (No. 2011D11)
文摘Erasure code is widely used as the redundancy scheme in distributed storage system. When a storage node fails, the repair process often requires to transfer a large amount of data. Regenerating code and hierarchical code are two classes of codes proposed to reduce the repair bandwidth cost. Regenerating codes reduce the amount of data transferred by each helping node, while hierarchical codes reduce the number of nodes participating in the repair process. In this paper, we propose a "sub-code nesting framework" to combine them together. The resulting regenerating hierarchical code has low repair degree as hierarchical code and lower repair cost than hierarchical code. Our code can achieve exact regeneration of the failed node, and has the additional property of low updating complexity.
文摘The minimum squared Euclidean distance(MSED) of binary multi-h phase codes is presented. The signal segregation degree(SSD) has been put forward to determine MSED of multi-h phase codes. In order to maximize MSED, SSD should be as large as possible. The necessary and sufficient conditions of maximizing SSD are derived. Finally, SSD and the exact formulae for MSED of binary 2-h phase codes are also presented.
文摘A globally optimal solution to vector quantization (VQ) index assignment on noisy channel, the evolutionary algorithm based index assignment algorithm (EAIAA), is presented. The algorithm yields a significant reduction in average distortion due to channel errors, over conventional arbitrary index assignment, as confirmed by experimental results over the memoryless binary symmetric channel (BSC) for any bit error.
基金Sponsored by the National High Technology Research and Development Program of China (863 Program)(Grant No.[2005]555)
文摘To facilitate high-dimensional KNN queries,based on techniques of approximate vector presentation and one-dimensional transformation,an optimal index is proposed,namely Bit-Code based iDistance(BC-iDistance).To overcome the defect of much information loss for iDistance in one-dimensional transformation,the BC-iDistance adopts a novel representation of compressing a d-dimensional vector into a two-dimensional vector,and employs the concepts of bit code and one-dimensional distance to reflect the location and similarity of the data point relative to the corresponding reference point respectively.By employing the classical B+tree,this representation realizes a two-level pruning process and facilitates the use of a single index structure to further speed up the processing.Experimental evaluations using synthetic data and real data demonstrate that the BC-iDistance outperforms the iDistance and sequential scan for KNN search in high-dimensional spaces.
文摘This article describes a proposal for a double index to estimate the isotropic components of unitary errors in a quantum computation circuit. In the context of this work the error is considered isotropic if it has spherical symmetry about the state of interest. The theoretical definition is given, as well the numerical approximation for practical purposes. The index is tested in some simple examples and the geometric distortion of the propagated error is studied for an inaccurate Shor 9-qubits correcting code.