期刊文献+
共找到74,076篇文章
< 1 2 250 >
每页显示 20 50 100
Quantum secret sharing based on quantum error-correcting codes
1
作者 张祖荣 刘伟涛 李承祖 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第5期91-95,共5页
Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to im... Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k-1) threshold scheme. It also takes advantage of classical enhancement of the [2k-1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels. 展开更多
关键词 quantum secret sharing quantum error-correcting code classically enhanced quantumerror-correcting code
原文传递
An Error-Correcting Code-Based Robust Watermarking Scheme for Stereolithographic Files 被引量:1
2
作者 Zhuorong Li Huawei Tian +2 位作者 Yanhui Xiao Yunqi Tang Anhong Wang 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期247-263,共17页
Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from... Stereolithographic(STL)files have been extensively used in rapid prototyping industries as well as many other fields as watermarking algorithms to secure intellectual property and protect three-dimensional models from theft.However,to the best of our knowledge,few studies have looked at how watermarking can resist attacks that involve vertex-reordering.Here,we present a lossless and robust watermarking scheme for STL files to protect against vertexreordering attacks.Specifically,we designed a novel error-correcting code(ECC)that can correct the error of any one-bit in a bitstream by inserting several check digits.In addition,ECC is designed to make use of redundant information according to the characteristics of STL files,which introduces further robustness for defense against attacks.No modifications are made to the geometric information of the three-dimensional model,which respects the requirements of a highprecision model.The experimental results show that the proposed watermarking scheme can survive numerous kinds of attack,including rotation,scaling and translation(RST),facet reordering,and vertex-reordering attacks. 展开更多
关键词 Three-dimensional watermarking stereolithographic file robust watermarking error-correcting code
在线阅读 下载PDF
Quantum quasi-cyclic low-density parity-check error-correcting codes 被引量:1
3
作者 李渊 曾贵华 Moon Ho Leeb 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4154-4160,共7页
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne... In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated. 展开更多
关键词 quantum LDPC code quasi-cycliC circulant permutation matrix CSS code
原文传递
On the complete weight distributions of quantum error-correcting codes
4
作者 杜超 马智 熊茂胜 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第5期272-287,共16页
In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the s... In a recent paper, Hu et al. defined the complete weight distributions of quantum codes and proved the Mac Williams identities, and as applications they showed how such weight distributions may be used to obtain the singleton-type and hamming-type bounds for asymmetric quantum codes. In this paper we extend their study much further and obtain several new results concerning the complete weight distributions of quantum codes and applications. In particular, we provide a new proof of the Mac Williams identities of the complete weight distributions of quantum codes. We obtain new information about the weight distributions of quantum MDS codes and the double weight distribution of asymmetric quantum MDS codes. We get new identities involving the complete weight distributions of two different quantum codes. We estimate the complete weight distributions of quantum codes under special conditions and show that quantum BCH codes by the Hermitian construction from primitive, narrow-sense BCH codes satisfy these conditions and hence these estimate applies. 展开更多
关键词 quantum codes complete weight distributions Mac Williams identities BCH codes
原文传递
Cryptanalysis on AW digital signature scheme based on error-correcting codes 被引量:2
5
作者 张振峰 冯登国 戴宗铎 《Science in China(Series F)》 EI 2002年第5期397-400,共4页
In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, which is usually denoted by AW Scheme. In this paper we show that the AW Scheme is actually not secu... In 1993, Alabhadi and Wicker gave a modification to Xinmei Digital Signature Scheme based on error-correcting codes, which is usually denoted by AW Scheme. In this paper we show that the AW Scheme is actually not secure: anyone holding public keys of the signatory can obtain the equivalent private keys, and then forge digital signatures for arbitrary messages successfully. We also point out that one can hardly construct a digital signature scheme with high-level security due to the difficulty of decomposing large matrixes. 展开更多
关键词 CRYPTANALYSIS digital signature error-correcting code.
原文传递
Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC 被引量:5
6
作者 Yingnan Zhang Minqing Zhang +2 位作者 Xiaoyuan Yang Duntao Guo Longfei Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期198-209,共12页
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi... In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment. 展开更多
关键词 steganography video secret sharing error-correcting code robustness grey relational analysis partition mode
原文传递
USING ERROR-CORRECTING ENCODERS TO DESIGN LOCAL-RANDOM SEQUENCE GENERATORS
7
作者 杨义先 《Journal of Electronics(China)》 1995年第1期9-14,共6页
This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theor... This paper proved the statement that a good linear block encoder is in fact a good local-random sequence generator. Furthermore, this statement discovers the deep relationship between the error-correcting coding theory and the modern cryptography. 展开更多
关键词 error-correcting CODING CRYPTOGRAPHY RANDOM SEQUENCES
在线阅读 下载PDF
A Quantum Error-Correction Circuit Based on Cyclic Code
8
作者 Lü Hongjun ZHANG Zhike XIE Guangjun 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期413-417,共5页
In this paper, the cyclic code of the classic circuit is transformed and transplanted; then, the quantum encoding scheme based on cyclic code and quantum error-correction circuit is constructed. The proposed circuit c... In this paper, the cyclic code of the classic circuit is transformed and transplanted; then, the quantum encoding scheme based on cyclic code and quantum error-correction circuit is constructed. The proposed circuit can correct one-bit error, and the use of redundant bits to encode more than one-bit quantum information breaks the previous limitations of many bits encoding a quantum bit. Compared with the existing coding circuits (Shor code, Steane code and five stable subcode), it shows obvious superiority in the quantum coding efficiency and transmission efficiency. 展开更多
关键词 quantum information quantum error-correction code cyclic code redundant bit
原文传递
Enhancement of Error-Correction Coding of Spatial Watermarks in Gray Code
9
作者 Tadahiko Kimoto 《Journal of Signal and Information Processing》 2013年第1期57-63,共7页
This paper demonstrates how channel coding can improve the robustness of spatial image watermarks against signal distortion caused by lossy data compression such as the JPEG scheme by taking advantage of the propertie... This paper demonstrates how channel coding can improve the robustness of spatial image watermarks against signal distortion caused by lossy data compression such as the JPEG scheme by taking advantage of the properties of Gray code. Two error-correction coding (ECC) schemes are used here: One scheme, referred to as the vertical ECC (VECC), is to encode information bits in a pixel by error-correction coding where the Gray code is used to improve the performance. The other scheme, referred to as the horizontal ECC (HECC), is to encode information bits in an image plane. In watermarking, HECC generates a codeword representing watermark bits, and each bit of the codeword is encoded by VECC. Simple single-error-correcting block codes are used in VECC and HECC. Several experiments of these schemes were conducted on test images. The result demonstrates that the error-correcting performance of HECC just depends on that of VECC, and accordingly, HECC enhances the capability of VECC. Consequently, HECC with appropriate codes can achieve stronger robustness to JPEG—caused distortions than non-channel-coding watermarking schemes. 展开更多
关键词 error-correctION Coding GRAY code Digital WATERMARK SPATIAL Domain JPEG DCT Compression
在线阅读 下载PDF
Spatial Image Watermarking by Error-Correction Coding in Gray Codes
10
作者 Tadahiko Kimoto 《Journal of Signal and Information Processing》 2013年第3期259-273,共15页
In this paper, error-correction coding (ECC) in Gray codes is considered and its performance in the protecting of spatial image watermarks against lossy data compression is demonstrated. For this purpose, the differen... In this paper, error-correction coding (ECC) in Gray codes is considered and its performance in the protecting of spatial image watermarks against lossy data compression is demonstrated. For this purpose, the differences between bit patterns of two Gray codewords are analyzed in detail. On the basis of the properties, a method for encoding watermark bits in the Gray codewords that represent signal levels by a single-error-correcting (SEC) code is developed, which is referred to as the Gray-ECC method in this paper. The two codewords of the SEC code corresponding to respective watermark bits are determined so as to minimize the expected amount of distortion caused by the watermark embedding. The stochastic analyses show that an error-correcting capacity of the Gray-ECC method is superior to that of the ECC in natural binary codes for changes in signal codewords. Experiments of the Gray-ECC method were conducted on 8-bit monochrome images to evaluate both the features of watermarked images and the performance of robustness for image distortion resulting from the JPEG DCT-baseline coding scheme. The results demonstrate that, compared with a conventional averaging-based method, the Gray-ECC method yields watermarked images with less amount of signal distortion and also makes the watermark comparably robust for lossy data compression. 展开更多
关键词 GRAY code error-correcting code Digital WATERMARK Spatial Domain JPEG DCT-Based Compression
暂未订购
Figma2Code:面向Figma设计稿的自动代码生成方法 被引量:1
11
作者 朱琳 封颖超杰 +8 位作者 朱航 王斯加 朱闽峰 喻晨昊 张钰荟 许达兴 赵德明 冯玉君 陈为 《计算机辅助设计与图形学学报》 北大核心 2025年第2期321-329,共9页
设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Co... 设计类创作工具已被广泛用于提高用户界面的设计效率,然而,根据设计稿开发代码是一件耗时费力的工作.针对现有的设计稿自动转代码的方案面临的代码可用性和复现结果准确性等问题,基于Figma设计工具提出一种自动代码生成方法——Figma2Code.首先,通过节点和图层优化提高设计稿元数据质量;其次,采用元数据标注信息的语义理解和图像识别技术识别组件;然后构建一套通用型的中间态数据结构,表示优化后的元数据和识别后的组件属性,以支持多种代码语言的生成;最后,基于模板生成可用代码,并通过函数抽取和元素循环输出提高代码可用性.采用生成代码的复现样式准确度量化评估和基于专家经验的代码可用性定性评估,证明了所提方法的有效性. 展开更多
关键词 设计稿转代码 逆向工程 用户界面 深度学习
在线阅读 下载PDF
Message Authentication Scheme Based on Quantum Error-correction Codes 被引量:1
12
作者 Ying Guo Guihua Zeng Yun Mao 《通讯和计算机(中英文版)》 2006年第7期36-39,共4页
关键词 美国昆腾公司 技术鉴定 编译程序 技术创新
在线阅读 下载PDF
Correction:Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space
13
作者 Mudassir Khalil Muhammad Imran Sharif +3 位作者 Ahmed Naeem Muhammad Umar Chaudhry Hafiz Tayyab Rauf Adham E.Ragab 《Computers, Materials & Continua》 SCIE EI 2025年第1期1461-1461,共1页
In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab C... In the article“Deep Learning-Enhanced Brain Tumor Prediction via Entropy-Coded BPSO in CIELAB Color Space”by Mudassir Khalil,Muhammad Imran Sharif,Ahmed Naeem,Muhammad Umar Chaudhry,Hafiz Tayyab Rauf,Adham E.Ragab Computers,Materials&Continua,2023,Vol.77,No.2,pp.2031–2047.DOI:10.32604/cmc.2023.043687,URL:https://www.techscience.com/cmc/v77n2/54831,there was an error regarding the affiliation for the author Hafiz Tayyab Rauf.Instead of“Centre for Smart Systems,AI and Cybersecurity,Staffordshire University,Stoke-on-Trent,ST42DE,UK”,the affiliation should be“Independent Researcher,Bradford,BD80HS,UK”. 展开更多
关键词 Deep code CIELAB
在线阅读 下载PDF
Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR
14
作者 Hailong Wang Junchao Shi 《Computers, Materials & Continua》 SCIE EI 2025年第1期1109-1128,共20页
A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can ... A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition.In the coding number detection stage,Differentiable Binarization Network is used as the backbone network,combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect.In terms of text recognition,using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate the problem of coding recognition errors caused by image color distortion due to variations in lighting and background noise.In addition,model pruning and quantization are used to reduce the number ofmodel parameters to meet deployment requirements in resource-constrained environments.A comparative experiment was conducted using the dataset of tank bottom spray code numbers collected on-site,and a transfer experiment was conducted using the dataset of packaging box production date.The experimental results show that the algorithm proposed in this study can effectively locate the coding of cans at different positions on the roller conveyor,and can accurately identify the coding numbers at high production line speeds.The Hmean value of the coding number detection is 97.32%,and the accuracy of the coding number recognition is 98.21%.This verifies that the algorithm proposed in this paper has high accuracy in coding number detection and recognition. 展开更多
关键词 Can coding recognition differentiable binarization network scene visual text recognition model pruning and quantification transport model
在线阅读 下载PDF
Incorporating red blanket protocol within code crimson:Streamlining definitive trauma care amid the chaos
15
作者 Sohil Pothiawala Savitha Bhagvan Andrew MacCormick 《World Journal of Critical Care Medicine》 2025年第1期14-19,共6页
The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation... The care of a patient involved in major trauma with exsanguinating haemorrhage is time-critical to achieve definitive haemorrhage control,and it requires coordinated multidisciplinary care.During initial resuscitation of a patient in the emergency department(ED),Code Crimson activation facilitates rapid decisionmaking by multi-disciplinary specialists for definitive haemorrhage control in operating theatre(OT)and/or interventional radiology(IR)suite.Once this decision has been made,there may still be various factors that lead to delay in transporting the patient from ED to OT/IR.Red Blanket protocol identifies and addresses these factors and processes which cause delay,and aims to facilitate rapid and safe transport of the haemodynamically unstable patient from ED to OT,while minimizing delay in resuscitation during the transfer.The two processes,Code Crimson and Red Blanket,complement each other.It would be ideal to merge the two processes into a single protocol rather than having two separate workflows.Introducing these quality improvement strategies and coor-dinated processes within the trauma framework of the hospitals/healthcare systems will help in further improving the multi-disciplinary care for the complex trauma patients requiring rapid and definitive haemorrhage control. 展开更多
关键词 Red blanket protocol code crimson HAEMORRHAGE Trauma
暂未订购
一套实用的企业应用分析框架CODE
16
作者 姚富士 《信息技术与标准化》 2025年第1期53-57,共5页
随着企业信息化的深入,众多应用不再是“孤岛”,而是形成体系,应用间集成度越来越高,与业务的融合不断加深。在这种大趋势下,企业信息化在具体应用落地时要充分考虑其在企业体系中的定位,基于业务和技术环境找准发力点,才能最大化应用... 随着企业信息化的深入,众多应用不再是“孤岛”,而是形成体系,应用间集成度越来越高,与业务的融合不断加深。在这种大趋势下,企业信息化在具体应用落地时要充分考虑其在企业体系中的定位,基于业务和技术环境找准发力点,才能最大化应用的价值。提出一套用于企业应用分析框架CODE,该分析框架由目标、业务上下文、系统上下文、领域、数据、分布、发展、接口、交互等要素构成,并充分考虑了企业环境的复杂性。经验证,该应用框架能够较好地完成应用分析,助力企业更好地进行应用建设。 展开更多
关键词 企业信息化 复杂性 分析框架 code
在线阅读 下载PDF
Pliable Fraction Repetition Codes for Access-balancing in Distributed Storage
17
作者 LI Yueting 《数学进展》 北大核心 2025年第1期73-84,共12页
Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition d... Fraction repetition(FR)codes are integral in distributed storage systems(DSS)with exact repair-by-transfer,while pliable fraction repetition codes are vital for DSSs in which both the per-node storage and repetition degree can easily be adjusted simultaneously.This paper introduces a new type of pliable FR codes,called absolute balanced pliable FR(ABPFR)codes,in which the access balancing in DSS is considered.Additionally,the equivalence between pliable FR codes and resolvable transversal packings in combinatorial design theory is presented.Then constructions of pliable FR codes and ABPFR codes based on resolvable transversal packings are presented. 展开更多
关键词 distributed storage system pliable fraction repetition code access balancing resolvable transversal packing
原文传递
Design of Serially Concatenated Two-Level Polar Coded Modulation System with Low-Complexity
18
作者 Zhou Lin Liao Guojun +3 位作者 Xu Lei An Ran Xie Xianzhong Wang Xi 《China Communications》 2025年第1期102-110,共9页
Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitat... Multilevel coding(MLC)is a commonly used polar coded modulation scheme,but challenging to implement in engineering due to its high complexity and long decoding delay for high-order modulations.To address these limitations,a novel two-level serially concatenated MLC scheme,in which the bitlevels with similar reliability are bundled and transmitted together,is proposed.The proposed scheme hierarchically protects the two bit-level sets:the bitlevel sets at the higher level are sufficiently reliable and do not require excessive resources for protection,whereas only the bit-level sets at the lower level are encoded by polar codes.The proposed scheme has the advantages of low power consumption,low delay and high reliability.Moreover,an optimized constellation signal labeling rule that can enhance the performance is proposed.Finally,the superiority of the proposed scheme is validated through the theoretical analysis and simulation results.Compared with the bit interleaving coding modulation(BICM)scheme,under 256-quadrature amplitude modulation(QAM),the proposed scheme attains a performance gain of 1.0 dB while reducing the decoding complexity by 54.55%. 展开更多
关键词 bit-interleaved coded modulation high-order modulation multilevel coding polar codes
在线阅读 下载PDF
Quick Response Code在手术室新护士及实习生临床培训考核中的应用
19
作者 叶文婕 金鑫 《中国药物经济学》 2025年第9期125-128,共4页
目的探讨Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果。方法选取2023年12月至2024年11月九江市第一人民医院手术室的新护士及实习生共100名,按随机数字表法分为观察组和对照组,每组50名。对照组采用常规培训与... 目的探讨Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果。方法选取2023年12月至2024年11月九江市第一人民医院手术室的新护士及实习生共100名,按随机数字表法分为观察组和对照组,每组50名。对照组采用常规培训与管理,观察组在对照组基础上增加Quick Response Code培训,比较两组的培训效果。结果观察组理论考核评分和操作考核评分分别为(92.37±4.69)分和(91.16±4.31)分,均高于对照组的(85.12±3.86)分和(86.43±3.85)分(P<0.05)。观察组培训总满意度为96.00%,高于对照组的82.00%(P<0.05)。观察组仪器设备损耗率和不良事件发生率分别为0.00%和2.00%,均低于对照组的8.00%和14.00%(P<0.05)。观察组各项核心胜任力评分及总分均高于对照组(P<0.05)。结论Quick Response Code在手术室新护士及实习生临床培训考核中的应用效果显著,可提高新护士及实习生的考核成绩与满意度,降低仪器设备损耗率及不良事件发生率,同时可提升核心胜任力。 展开更多
关键词 新护士 实习生 手术室 Quick Response code 培训考核
原文传递
Construction of Constant Rank and Orbit Codes over Finite Chain Rings
20
作者 GUO Ye LIU Xiusheng 《Wuhan University Journal of Natural Sciences》 2025年第3期289-301,共13页
In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over ... In this paper,we first generalize the constant dimension and orbit codes over finite fields to the constant rank and orbit codes over finite chain rings.Then we provide a relationship between constant rank codes over finite chain rings and constant dimension codes over the residue fields.In particular,we prove that an orbit submodule code over a finite chain ring is a constant rank code.Finally,for special finite chain ring F_(q)+γF_(q),we define a Gray mapφfrom(F_(q)+γF_(q))^(n)to F^(2n)_(q),and by using cyclic codes over F_(q)+γF_(q),we obtain a method of constructing an optimum distance constant dimension code over F_(q). 展开更多
关键词 finite chain ring rank of linear codes constant rank codes orbit codes
原文传递
上一页 1 2 250 下一页 到第
使用帮助 返回顶部