期刊文献+
共找到97,446篇文章
< 1 2 250 >
每页显示 20 50 100
ASME Code Case 3029高温许用压应力计算方法的介绍及工程应用
1
作者 马忠明 《化工设备与管道》 北大核心 2026年第1期24-30,共7页
介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及... 介绍了高温蠕变工况下运行的压力容器可能出现的失效模式,结合工程设计现状,指出了我国当前压力容器标准体系在确定高温蠕变工况许用压应力时存在的技术瓶颈,在此基础之上引出ASME Code Case 3029,对其适用范围、发展历程、产生背景及工程意义进行了简单的介绍,以某工程设计项目中的实际结构为例,介绍了该方法的使用过程及注意事项,并结合压力容器工程设计领域的实际需求,对我国标准体系下一步的制定或修订方向提出了展望。 展开更多
关键词 code Case 3029 蠕变屈曲 失稳 压力容器 许用应力
在线阅读 下载PDF
ChatGPT+VS Code在高中地理地图开发中的应用——以“国内人口迁移”为例
2
作者 王凌宇 白絮飞 《中国信息技术教育》 2026年第1期81-84,共4页
人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为... 人工智能技术在中学地理教学中的应用是大势所趋。当前的研究主要聚焦于其作为学生的“助学者”和教师的“助教者”两大角色。然而,现有应用方式存在一定局限性:作为“助学者”,若学生使用不当可能引发依赖性,削弱其独立思考能力;作为“助教者”,若教师生成教学设计的指令过于宽泛,结果易出现“张冠李戴”或“似是而非”等问题,需教师二次加工。相反,若教师能针对教学设计中的特定模块提供详细准确的指令,人工智能技术输出的结果将更具准确性和实用性,展现出更高研究价值。因此,本文从人工智能技术“助教者”身份出发,摒弃传统完整的教学过程设计,聚焦备课中的“地图开发”模块,采用由人工智能技术生成地图代码并通过第三方软件运行的方式,实现快速辅助教师生成所需地图的目标,提升备课效率与教学质量。 展开更多
关键词 ChatGPT VS code 人工智能技术 中学地理 地图开发
在线阅读 下载PDF
I'll Check It Out
3
作者 Ruth Devlin 《空中英语教室(初级版.大家说英语)》 2026年第1期34-35,56,54,共4页
You can use the word“check”in many ways.When you check into something,you find out more about it.When you check something out,you look at that thing carefully.To check out a place,you may actually go there.When you ... You can use the word“check”in many ways.When you check into something,you find out more about it.When you check something out,you look at that thing carefully.To check out a place,you may actually go there.When you check in on someone,you go to their place.You may ask,“How are you doing?” 展开更多
关键词 PLACE check something check find more checkin SOMEONE checkout
原文传递
Rateless Polar Codes with Unequal Error Protection Property
4
作者 Cui Chen Xiang Wei +1 位作者 Ma Siwei Guo Qing 《China Communications》 2026年第1期10-23,共14页
Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a prom... Mobile communications are reaching out to every aspect of our daily life,necessitating highefficiency data transmission and support for diverse data types and communication scenarios.Polar codes have emerged as a promising solution due to their outstanding error-correction performance and low complexity.Unequal error protection(UEP)involves nonuniform error safeguarding for distinct data segments,achieving a fine balance between error resilience and resource allocation,which ultimately enhancing system performance and efficiency.In this paper,we propose a novel class of UEP rateless polar codes.The codes are designed based on matrix extension of polar codes,and elegant mapping and duplication operations are designed to achieve UEP property while preserving the overall performance of conventional polar codes.Superior UEP performance is attained without significant modifications to conventional polar codes,making it straightforward for compatibility with existing polar codes.A theoretical analysis is conducted on the block error rate and throughput efficiency performance.To the best of our knowledge,this work provides the first theoretical performance analysis of UEP rateless polar codes.Simulation results show that the proposed codes significantly outperform existing polar coding schemes in both block error rate and throughput efficiency. 展开更多
关键词 matrix extension polar codes rateless coding unequal error protection
在线阅读 下载PDF
Efficient Polar Codes with Low Complexity for Correcting Insertions/Deletions in DPPM
5
作者 Li Leran Liu Yuan +2 位作者 Yuan Ye Xiahou Wenqian Chen Maonan 《China Communications》 2026年第1期24-33,共10页
Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successiv... Differential pulse-position modulation(DP PM)can achieve a good compromise between power and bandwidth requirements.However,the output sequence has undetectable insertions and deletions.This paper proposes a successive cancellation(SC)decoding scheme based on the weighted levenshtein distance(WLD)of polar codes for correcting insertions/deletions in DPPM systems.In this method,the WLD is used to calculate the transfer probabilities recursively to obtain likelihood ratios,and the low-complexity SC decoding method is built according to the error characteristics to match the DPPM system.Additionally,the proposed SC decoding scheme is extended to list decoding,which can further improve error correction performance.Simulation results show that the proposed scheme can effectively correct insertions/deletions in the DPPM system,which enhances its reliability and performance. 展开更多
关键词 DPPM insertions/deletions polar codes SC decoding
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
6
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Gradient-Guided Assembly Instruction Relocation for Adversarial Attacks Against Binary Code Similarity Detection
7
作者 Ran Wei Hui Shu 《Computers, Materials & Continua》 2026年第1期1372-1394,共23页
Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Althoug... Transformer-based models have significantly advanced binary code similarity detection(BCSD)by leveraging their semantic encoding capabilities for efficient function matching across diverse compilation settings.Although adversarial examples can strategically undermine the accuracy of BCSD models and protect critical code,existing techniques predominantly depend on inserting artificial instructions,which incur high computational costs and offer limited diversity of perturbations.To address these limitations,we propose AIMA,a novel gradient-guided assembly instruction relocation method.Our method decouples the detection model into tokenization,embedding,and encoding layers to enable efficient gradient computation.Since token IDs of instructions are discrete and nondifferentiable,we compute gradients in the continuous embedding space to evaluate the influence of each token.The most critical tokens are identified by calculating the L2 norm of their embedding gradients.We then establish a mapping between instructions and their corresponding tokens to aggregate token-level importance into instructionlevel significance.To maximize adversarial impact,a sliding window algorithm selects the most influential contiguous segments for relocation,ensuring optimal perturbation with minimal length.This approach efficiently locates critical code regions without expensive search operations.The selected segments are relocated outside their original function boundaries via a jump mechanism,which preserves runtime control flow and functionality while introducing“deletion”effects in the static instruction sequence.Extensive experiments show that AIMA reduces similarity scores by up to 35.8%in state-of-the-art BCSD models.When incorporated into training data,it also enhances model robustness,achieving a 5.9%improvement in AUROC. 展开更多
关键词 Assembly instruction relocation adversary attack binary code similarity detection
在线阅读 下载PDF
Improving MCUCN code to simulate ultracold neutron storage and transportation in superfluid^(4)He
8
作者 Xue-Fen Han Fei Shen +6 位作者 Bin Zhou Xiao-Xiao Cai Tian-Cheng Yi Zhi-Liang Hu Song-Lin Wang Tian-Jiao Liang Robert Golub 《Nuclear Science and Techniques》 2026年第3期235-246,共12页
The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and ... The ultracold neutron(UCN)transport code,MCUCN,designed initially for simulating UCN transportation from a solid deuterium(SD_2)source and neutron electric dipole moment experiments,could not simulate UCN storage and transportation in a superfluid^(4)He(SFHe,He-Ⅱ)source accurately.This limitation arose from the absence of an^(4)He upscattering mechanism and the absorption of^(3)He.And the provided source energy distribution in MCUCN is different from that in SFHe source.This study introduced enhancements to MCUCN to address these constraints,explicitly incorporating the^(4)He upscattering effect,the absorption of^(3)He,the loss caused by impurities on converter wall,UCN source energy distribution in SFHe,and the transmission through negative optical potential.Additionally,a Python-based visualization code for intermediate states and results was developed.To validate these enhancements,we systematically compared the simulation results of the Lujan Center Mark3 UCN system by MCUCN and the improved MCUCN code(iMCUCN)with UCNtransport simulations.Additionally,we compared the results of the SUN1 system simulated by MCUCN and iMCUCN with measurement results.The study demonstrates that iMCUCN effectively simulates the storage and transportation of ultracold neutrons in He-Ⅱ. 展开更多
关键词 Ultracold neutron Storage TRANSPORTATION Improved MCUCN code Upscattering effect Absorption by^(3)He
在线阅读 下载PDF
Integrating Attention Mechanism with Code Structural Affinity and Execution Context Correlation for Automated Bug Repair
9
作者 Jinfeng Ji Geunseok Yang 《Computers, Materials & Continua》 2026年第3期1708-1725,共18页
Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite cons... Automated Program Repair(APR)techniques have shown significant potential in mitigating the cost and complexity associated with debugging by automatically generating corrective patches for software defects.Despite considerable progress in APR methodologies,existing approaches frequently lack contextual awareness of runtime behaviors and structural intricacies inherent in buggy source code.In this paper,we propose a novel APR approach that integrates attention mechanisms within an autoencoder-based framework,explicitly utilizing structural code affinity and execution context correlation derived from stack trace analysis.Our approach begins with an innovative preprocessing pipeline,where code segments and stack traces are transformed into tokenized representations.Subsequently,the BM25 ranking algorithm is employed to quantitatively measure structural code affinity and execution context correlation,identifying syntactically and semantically analogous buggy code snippets and relevant runtime error contexts from extensive repositories.These extracted features are then encoded via an attention-enhanced autoencoder model,specifically designed to capture significant patterns and correlations essential for effective patch generation.To assess the efficacy and generalizability of our proposed method,we conducted rigorous experimental comparisons against DeepFix,a state-of-the-art APR system,using a substantial dataset comprising 53,478 studentdeveloped C programs.Experimental outcomes indicate that our model achieves a notable bug repair success rate of approximately 62.36%,representing a statistically significant performance improvement of over 6%compared to the baseline.Furthermore,a thorough K-fold cross-validation reinforced the consistency,robustness,and reliability of our method across diverse subsets of the dataset.Our findings present the critical advantage of integrating attentionbased learning with code structural and execution context features in APR tasks,leading to improved accuracy and practical applicability.Future work aims to extend the model’s applicability across different programming languages,systematically optimize hyperparameters,and explore alternative feature representation methods to further enhance debugging efficiency and effectiveness. 展开更多
关键词 Automated bug repair autoencoder algorithm buggy code analysis stack trace similarity machine learning for debugging
在线阅读 下载PDF
Construction of Rate-Compatible(RC) Low-Density Parity-Check(LDPC) Convolutional Codes Based on RC-LDPC Block Codes 被引量:1
10
作者 穆丽伟 韩国军 刘志勇 《Journal of Shanghai Jiaotong university(Science)》 EI 2016年第6期679-683,共5页
In this paper,a family of rate-compatible(RC) low-density parity-check(LDPC) convolutional codes can be obtained from RC-LDPC block codes by graph extension method.The resulted RC-LDPC convolutional codes,which are de... In this paper,a family of rate-compatible(RC) low-density parity-check(LDPC) convolutional codes can be obtained from RC-LDPC block codes by graph extension method.The resulted RC-LDPC convolutional codes,which are derived by permuting the matrices of the corresponding RC-LDPC block codes,are systematic and have maximum encoding memory.Simulation results show that the proposed RC-LDPC convolutional codes with belief propagation(BP) decoding collectively offer a steady improvement on performance compared with the block counterparts over the binary-input additive white Gaussian noise channels(BI-AWGNCs). 展开更多
关键词 rate-compatible(RC) low-density parity-check(LDPC) convolutional codes systematic maximum encoding memory belief propagation(BP) decoding
原文传递
Quantum quasi-cyclic low-density parity-check error-correcting codes 被引量:1
11
作者 李渊 曾贵华 Moon Ho Leeb 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4154-4160,共7页
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne... In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated. 展开更多
关键词 quantum LDPC code quasi-cycliC circulant permutation matrix CSS code
原文传递
Low-Density Parity-Check Codes for Noncoherent UWB Communication Systems 被引量:2
12
作者 Zhonghua Liang Junshan Zang +2 位作者 Xiaojun Yang Xiaodai Dong Huansheng Song 《China Communications》 SCIE CSCD 2017年第7期152-162,共11页
In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) co... In order to guarantee reliable data transmission, powerful channel coding techniques are usually required in noncoherent ultra-wideband(UWB) communication systems. Accordingly, several forward error correction(FEC) codes, such as Reed-Solomon and convolutional codes have been used in noncoherent UWB systems to improve the bit error rate(BER) performance. In this paper, low-density parity-check(LDPC) codes are further studied as more powerful FEC candidates for noncoherent UWB systems. Two LDPC codes and the corresponding decoding procedures are presented for noncoherent UWB systems. Moreover, performance comparison between the LDPC codes and other FEC codes are provided for three major noncoherent UWB communication systems, namely, noncoherent pulse position modulation(NC-PPM), transmitted reference(TR) and transmitted reference pulse cluster(TRPC). Both theoretical analysis and simulation results show that the two investigated LDPC codes outperform other existing FEC codes with limited penalty in terms of complexity and therefore they are promising FEC candidates for noncoherent UWB systems with low-cost and low-power consumption. 展开更多
关键词 UWB NONCOHERENT channel coding LDPC codes
在线阅读 下载PDF
Low-Density Parity-Check Codes:Highway to Channel Capacity 被引量:4
13
作者 Liyuan Song Shuyan Yu Qin Huang 《China Communications》 SCIE CSCD 2023年第2期235-256,共22页
Low-density parity-check(LDPC)codes are not only capacity-approaching,but also greatly suitable for high-throughput implementation.Thus,they are the most popular codes for high-speed data transmission in the past two ... Low-density parity-check(LDPC)codes are not only capacity-approaching,but also greatly suitable for high-throughput implementation.Thus,they are the most popular codes for high-speed data transmission in the past two decades.Thanks to the low-density property of their parity-check matrices,the optimal maximum a posteriori probability decoding of LDPC codes can be approximated by message-passing decoding with linear complexity and highly parallel nature.Then,it reveals that the approximation has to carry on Tanner graphs without short cycles and small trapping sets.Last,it demonstrates that well-designed LDPC codes with the aid of computer simulation and asymptotic analysis tools are able to approach the channel capacity.Moreover,quasi-cyclic(QC)structure is introduced to significantly facilitate their high-throughput implementation.In fact,compared to the other capacity-approaching codes,QC-LDPC codes can provide better area-efficiency and energy-efficiency.As a result,they are widely applied in numerous communication systems,e.g.,Landsat satellites,Chang’e Chinese Lunar mission,5G mobile communications and so on.What’s more,its extension to non-binary Galois fields has been adopted as the channel coding scheme for BeiDou navigation satellite system. 展开更多
关键词 LDPC codes SPARSITY high-speed MESSAGE-PASSING cycles trapping sets quasi-cyclic
在线阅读 下载PDF
Jointly-check iterative decoding algorithm for quantum sparse graph codes 被引量:1
14
作者 邵军虎 白宝明 +1 位作者 林伟 周林 《Chinese Physics B》 SCIE EI CAS CSCD 2010年第8期116-122,共7页
For quantum sparse graph codes with stabilizer formalism, the unavoidable girth-four cycles in their Tanner graphs greatly degrade the iterative decoding performance with standard belief-propagation (BP) algorithm. ... For quantum sparse graph codes with stabilizer formalism, the unavoidable girth-four cycles in their Tanner graphs greatly degrade the iterative decoding performance with standard belief-propagation (BP) algorithm. In this paper, we present a jointly-check iterative algorithm suitable for decoding quantum sparse graph codes efficiently. Numerical simulations show that this modified method outperforms standard BP algorithm with an obvious performance improvement. 展开更多
关键词 quantum error correction sparse graph code iterative decoding belief-propagation algorithm
原文传递
Half Rate Quasi Cyclic Low Density Parity Check Codes Based on Combinatorial Designs 被引量:2
15
作者 Sina Vafi Narges Rezvani Majid 《Journal of Computer and Communications》 2016年第12期39-49,共12页
This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the ba... This paper presents new half rate Quasi Cyclic Low Density Parity Check (QC- LDPC) codes formed on the basis of combinatorial designs. In these codes, circulant matrices of the parity check matrix are formed on the basis of subsets in which the difference between any two elements of a subset is unique with all differences obtained from the same or different subsets. This structure of circulant matrices guarantees non-existence of cycle-4 in the Tanner graph of QC-LDPC codes. First, an irregular code with girth 6 constituted by two rows of circulant matrices is proposed. Then, more criteria will be considered on the structure of subsets with the mentioned feature aiming to represent a new scheme of regular QC-LPDC codes with girth at least 8. From simulations, it is confirmed that codes have similar to or better performance than other well-known half rate codes, while require lower complexity in their design. 展开更多
关键词 Quasi-Cyclic LDPC codes Combinatorial Designs Circulant Matrix
在线阅读 下载PDF
PERFORMANCE EVALUATION OF LOW DENSITY PARITY CHECK CODES FOR DIGITAL RADIO MONDIALE (DRM) SYSTEM 被引量:2
16
作者 Wang Jiaqing Yu Xiaoyan Wu Lenan 《Journal of Electronics(China)》 2006年第2期189-192,共4页
In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel co... In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel coding schemes. This paper, proposes the schemes which use the Low-Density Parity-Check (LDPC) coded Bit-Interleaved Coded Modulation (BICM) schemes for the implementation of DRM systems. Simulation results show that the proposed system is more efficient than the Rate Compatible Punctured Convolutional (RCPC) coded DRM system on various broadcast channels, and may be recommended as a coding technology for Digital Amplitude Modulation Broadcasting (DAMB) systems of China. 展开更多
关键词 Low-Density Parity-check (LDPC) codes Digital Radio Mondiale (DRM) Bit Interleaved coded Modulation (BICM) Orthogonal Frequency Division Multiplexing (OFDM)
在线阅读 下载PDF
A Novel Algorithm of Error Check and Code Generation for Structured Flowchart
17
作者 Mingcheng Qu Naigang Cui +1 位作者 Xianghu Wu Yongchao Tao 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2017年第4期18-30,共13页
Structured flowchart( SFC) and Automatic code generation based on SFC( CG-SFC) have been widely used in software requirements,design and testing phases. Some CG-SFC tools such as Rhapsody have the ability to build flo... Structured flowchart( SFC) and Automatic code generation based on SFC( CG-SFC) have been widely used in software requirements,design and testing phases. Some CG-SFC tools such as Rhapsody have the ability to build flowchart and generate code,but they do not check whether a given flowchart is correct or structural. For unstructured error ‘goto'statements will be generated randomly. We proposed three algorithms and some error recognition criteria to solve those problems. Structure recognition algorithm can recognize Selection,While/for and do-while structures. Error recognition algorithm incorporating criteria can check all the errors. At last,we develop a CG-SFC system,and compared with existing Rhapsody,it shows that the proposed algorithms are correct and effective. 展开更多
关键词 STRUCTURED flowchart code generation ERROR check FEATURE RECOGNITION
在线阅读 下载PDF
Regular Quasi Cyclic Low Density Parity Check Codes with Girth 8 from Elementary Number Theory 被引量:1
18
作者 He Guofeng Li Xiangxue +2 位作者 Li Qiang Zhou Zhiheng Zheng Dong 《China Communications》 SCIE CSCD 2012年第4期80-88,共9页
This paper is concerned with (3,n) and (4,n) regular quasi-cyclic Low Density Parity Check (LDPC) code constructions from elementary number theory.Given the column weight,we determine the shift values of the circulant... This paper is concerned with (3,n) and (4,n) regular quasi-cyclic Low Density Parity Check (LDPC) code constructions from elementary number theory.Given the column weight,we determine the shift values of the circulant permutation matrices via arithmetic analysis.The proposed constructions of quasi-cyclic LDPC codes achieve the following main advantages simultaneously:1) our methods are constructive in the sense that we avoid any searching process;2) our methods ensure no four or six cycles in the bipartite graphs corresponding to the LDPC codes;3) our methods are direct constructions of quasi-cyclic LDPC codes which do not use any other quasi-cyclic LDPC codes of small length like component codes or any other algorithms/cyclic codes like building block;4)the computations of the parameters involved are based on elementary number theory,thus very simple and fast.Simulation results show that the constructed regular codes of high rates perform almost 1.25 dB above Shannon limit and have no error floor down to the bit-error rate of 10-6. 展开更多
关键词 quasi-cyclic LDPC code error floor Shannon limit number theory
在线阅读 下载PDF
A Construction of Low-Density Parity-Check Codes
19
作者 Xiuling SHAN Tienan LI 《Journal of Mathematical Research with Applications》 CSCD 2013年第3期330-336,共7页
Low-density parity-check (LDPC) codes were first presented by Gallager in 1962. They are linear block codes and their bit error rate (BER) performance approaches remarkably close to the Shannon limit. The LDPC cod... Low-density parity-check (LDPC) codes were first presented by Gallager in 1962. They are linear block codes and their bit error rate (BER) performance approaches remarkably close to the Shannon limit. The LDPC codes created much interest after the rediscovery by Mackay and Neal in 1995. This paper introduces some new LDPC codes by considering some combinatorial structures. We present regular LDPC codes based on group divisible designs which have Tanner graphs free of four-cycles. 展开更多
关键词 low-density parity-check code iterative decoding group divisible design.
原文传递
Application of the Henon Chaotic Model on to the Design of Low Density Parity Check Codes
20
作者 XIAO Dongliang LIN Chunlei +1 位作者 SHI Hongling JIAO Bingli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第3期485-490,共6页
A new method to design parity-check matrix based on Henon chaos model is presented. The designed parity-check matrix is with rather random behavior. Simulation results show that the proposed method makes an improvemen... A new method to design parity-check matrix based on Henon chaos model is presented. The designed parity-check matrix is with rather random behavior. Simulation results show that the proposed method makes an improvement in bit error rate (BER) performance by 0.4 dB compared with that of Luby for AWGN channel. The proposed method decreases the complexity of decoding significantly, and improves the error correcting performance of LDPC codes. It has been shown that Henon chaotic model is a powerful tool for construction of good LDPC codes, which make it possible to apply the LDPC code in real communication systems. 展开更多
关键词 LDPC codes CHAOS parity-check matrix Henon map
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部