期刊文献+
共找到450篇文章
< 1 2 23 >
每页显示 20 50 100
Low-Complexity Detection and Decoding Scheme for LDPC-Coded MLC NAND Flash Memory 被引量:1
1
作者 Xusheng Lin Guojun Han +2 位作者 Shijie Ouyang Yanfu Li Yi Fang 《China Communications》 SCIE CSCD 2018年第6期58-67,共10页
With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and... With the development of manufacture technology, the multi-level cell(MLC)technique dramatically increases the storage density of NAND flash memory. As the result,cell-to-cell interference(CCI) becomes more serious and hence causes an increase in the raw bit error rate of data stored in the cells.Recently, low-density parity-check(LDPC)codes have appeared to be a promising solution to combat the interference of MLC NAND flash memory. However, the decoding complexity of the sum-product algorithm(SPA) is extremely high. In this paper, to improve the accuracy of the log likelihood ratio(LLR) information of each bit in each NAND flash memory cell, we adopt a non-uniform detection(N-UD) which uses the average maximum mutual information to determine the value of the soft-decision reference voltages.Furthermore, with an aim to reduce the decoding complexity and improve the decoding performance, we propose a modified soft reliabilitybased iterative majority-logic decoding(MSRBI-MLGD) algorithm, which uses a non-uniform quantizer based on power function to decode LDPC codes. Simulation results show that our design can offer a desirable trade-off between the performance and complexity for high-column-weight LDPC-coded MLC NAND flash memory. 展开更多
关键词 Cell-to-cell interference(CCI) LDPC codes MLC NAND flash memory non-uniform detection(N-UD) modified soft reliability-based iterative majority-logic decoding(MSRBI-MLGD) algorithm
在线阅读 下载PDF
Coding Scheme for Ka-Band Fixed Satellite Communication System 被引量:4
2
作者 王爱华 罗伟雄 《Journal of Beijing Institute of Technology》 EI CAS 2002年第2期169-173,共5页
The performance analysis and simulation of coding schemes based on the modeling Ka band fixed satellite channel have been presented. The results indicate that concatenated codes with large inner interleaving depth ha... The performance analysis and simulation of coding schemes based on the modeling Ka band fixed satellite channel have been presented. The results indicate that concatenated codes with large inner interleaving depth have good performance and high spectrum efficiency. The studies also show that simple block interleaving is very effective in combating the slow frequency nonselective fading of Ka band. 展开更多
关键词 Ka band channel model performance simulation coding scheme
在线阅读 下载PDF
A simple algorithm to improve the performance of the WENO scheme on non-uniform grids 被引量:3
3
作者 Wen-Feng Huang Yu-Xin Ren Xiong Jiang 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2018年第1期37-47,共11页
This paper presents a simple approach for improving the performance of the weighted essentially nonoscillatory(WENO) finite volume scheme on non-uniform grids. This technique relies on the reformulation of the fifthor... This paper presents a simple approach for improving the performance of the weighted essentially nonoscillatory(WENO) finite volume scheme on non-uniform grids. This technique relies on the reformulation of the fifthorder WENO-JS(WENO scheme presented by Jiang and Shu in J. Comput. Phys. 126:202–228, 1995) scheme designed on uniform grids in terms of one cell-averaged value and its left and/or right interfacial values of the dependent variable.The effect of grid non-uniformity is taken into consideration by a proper interpolation of the interfacial values. On nonuniform grids, the proposed scheme is much more accurate than the original WENO-JS scheme, which was designed for uniform grids. When the grid is uniform, the resulting scheme reduces to the original WENO-JS scheme. In the meantime,the proposed scheme is computationally much more efficient than the fifth-order WENO scheme designed specifically for the non-uniform grids. A number of numerical test cases are simulated to verify the performance of the present scheme. 展开更多
关键词 WENO scheme non-uniform grids Shock capturing Finite volume methods
在线阅读 下载PDF
VARIABLE NON-UNIFORM QUANTIZED BELIEF PROPAGATION ALGORITHM FOR LDPC DECODING 被引量:2
4
作者 Liu Binbin Bai Dong Mei Shunliang 《Journal of Electronics(China)》 2008年第4期539-543,共5页
Non-uniform quantization for messages in Low-Density Parity-Check(LDPC)decoding canreduce implementation complexity and mitigate performance loss.But the distribution of messagesvaries in the iterative decoding.This l... Non-uniform quantization for messages in Low-Density Parity-Check(LDPC)decoding canreduce implementation complexity and mitigate performance loss.But the distribution of messagesvaries in the iterative decoding.This letter proposes a variable non-uniform quantized Belief Propaga-tion(BP)algorithm.The BP decoding is analyzed by density evolution with Gaussian approximation.Since the probability density of messages can be well approximated by Gaussian distribution,by theunbiased estimation of variance,the distribution of messages can be tracked during the iteration.Thusthe non-uniform quantization scheme can be optimized to minimize the distortion.Simulation resultsshow that the variable non-uniform quantization scheme can achieve better error rate performance andfaster decoding convergence than the conventional non-uniform quantization and uniform quantizationschemes. 展开更多
关键词 Low-Density Parity-Check (LDPC) codes Iterative decoding Belief Propagation (BP) non-uniform quantization
在线阅读 下载PDF
Novel joint encoding/decoding algorithms of fountain codes for underwater acoustic communication 被引量:1
5
作者 Mingshen Liang Jinjue Duan +2 位作者 Danfeng Zhao Jiaxi Si Xiangyu Song 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第4期772-779,共8页
Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh ma... Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh marine environment. And Luby transform(LT) codes are the first codes fully realizing the digital fountain concept. However, in conventional LT encoding/decoding algorithms, due to the imperfect coverage(IC) of input symbols and short cycles in the generator matrix, stopping sets would occur and terminate the decoding. Thus, the recovery probability is reduced,high coding overhead is required and decoding delay is increased.These issues would be disadvantages while applying LT codes in underwater acoustic communication. Aimed at solving those issues, novel encoding/decoding algorithms are proposed. First,a doping and non-uniform selecting(DNS) encoding algorithm is proposed to solve the IC and the generation of short cycles problems. And this can reduce the probability of stopping sets occur during decoding. Second, a hybrid on the fly Gaussian elimination and belief propagation(OFG-BP) decoding algorithm is designed to reduce the decoding delay and efficiently utilize the information of stopping sets. Comparisons via Monte Carlo simulation confirm that the proposed schemes could achieve better overall decoding performances in comparison with conventional schemes. 展开更多
关键词 underwater acoustic communication(UAC) fountain codes non-uniform encoding hybrid decoding algorithm stopping sets
在线阅读 下载PDF
Lifting Scheme Based SPIHT Still Image Coding
6
作者 沈利军 赵保军 何佩琨 《Journal of Beijing Institute of Technology》 EI CAS 2003年第S1期70-74,共5页
In order to eliminate float-point operations for fast wavelet transform, an integer D9/7 biorthogonal reversible wavelet transform was accomplished by lifting scheme. The lifting scheme based wavelet transform can be ... In order to eliminate float-point operations for fast wavelet transform, an integer D9/7 biorthogonal reversible wavelet transform was accomplished by lifting scheme. The lifting scheme based wavelet transform can be finished by addition and shift simply. It improved the quality of reconstructive image and greatly reduced the computational complexity due to integer operation. It is suitable for real-time image coding on hardware such as DSP. The simulation results show that the lifting scheme based SPIHT is prior to traditional wavelet based SPHIT in quality and complexity. 展开更多
关键词 SPIHT lifting scheme WAVELET image coding
在线阅读 下载PDF
NEW SECRET SHARING SCHEME BASED ON LINEAR CODE
7
作者 TanXiaoqing WangZhiguo 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2004年第2期160-166,共7页
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h... A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme. 展开更多
关键词 verifiable secret sharing(VSS) scheme secret sharing(SS) scheme linear code finite field(Galois field).
在线阅读 下载PDF
A Novel Secret Sharing Scheme Based on Minimal Linear Codes
8
作者 LI Zhihui SUN Jianhong LI Jing 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期407-412,共6页
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we part... In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation. 展开更多
关键词 secret sharing scheme computationally efficient secret sharing minimal linear code access structure short share
原文传递
A CODING SCHEME USING GLOBAL MOTION ESTIMATION FOR AVS P-FRAME
9
作者 Gong Shengrong Guo Li Cui Zhiming 《Journal of Electronics(China)》 2007年第6期815-820,共6页
Block matching has been used for motion estimation and motion compensation in the Au- dio and Video Standard (AVS) for years. While having an acceptable performance in describing mo- tion between frames, it requires q... Block matching has been used for motion estimation and motion compensation in the Au- dio and Video Standard (AVS) for years. While having an acceptable performance in describing mo- tion between frames, it requires quite a few bits to represent the motion vectors. In certain circum- stances, the use of global motion estimation and compensation would perform equally well or even better than the block matching in terms of motion accuracy, while it results in the coding of global motion model parameters. In this letter, we modify an AVS coder by adding (1) six global motion model parameters to the frame header, and (2) mode selection among INTRA, SKIP, INTER-16×16, INTER-16×8, INTER-8×16, INTER-8×8, and Global Motion Compensation (GMC) modes by La- grange optimal rate-distortion criteria. Simulation results demonstrate that over 0.1dB improvement in PSNR is obtained compared to the AVS coder for an average coded P-frame with the same bit- rate. 展开更多
关键词 coding scheme Motion compensation Motion estimation Audio and Video Standard (AVS)
在线阅读 下载PDF
Secret Sharing Schemes Based on the Dual Code of the Code of a Symmetric (v, k, λ)-Design and Minimal Access Sets
10
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期95-100,共6页
Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct... Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design. 展开更多
关键词 Linear code the code of a symmetric design secret sharing scheme minimal access set.
在线阅读 下载PDF
A New Method to Construct Secret Sharing Schemes Based on Linear Codes
11
作者 Selda Calkavur 《Computer Technology and Application》 2015年第2期89-94,共6页
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin... Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme. 展开更多
关键词 Linear code parity-check matrix secret sharing scheme minimal codeword minimal access set.
在线阅读 下载PDF
A novel bit mapping scheme for high-order polar coded modulation systems
12
作者 LI Zhiwei YUAN Jianguo +1 位作者 ZHANG Rui HUANG Sheng 《Optoelectronics Letters》 EI 2021年第11期683-687,共5页
In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping schem... In order to improve the spectrum efficiency of the high-order polar coded modulation systems, the polar code is used as the component code of the bit-interleave coded modulation(BICM) system, a novel bit mapping scheme is proposed considering of the channel polarization and successive cancellation(SC) decoding principle of polar codes as well as the unequal protection of equivalent channels by modulator. In this scheme, the frozen bits on the unreliable split channel are allocated to the equivalent channel with the low protection of the modulator, while the equivalent channels with the high protection are used to transmit the information bits. Thus, the error-correcting performance of polar codes is improved. Compared with some bit mapping schemes, the proposed bit mapping scheme only needs to divide and choose the parameters of the split channels reliability measurement, the complexity does not increase obviously, and simulation results show that the proposed scheme has the better performance under the quadrature amplitude modulation(QAM) modulation based on the Gray mapping. 展开更多
关键词 A novel bit mapping scheme for high-order polar coded modulation systems
原文传递
Corrigendum to“Evolution of multi-cluster fracturing in high-density layered shale considering the effect of injection scheme”[Pet.Sci.22(2025)2109-2122]
13
作者 Xiao Yan Haitao Yu Peng Zhang 《Petroleum Science》 2025年第7期3068-3068,共1页
The authors regret Acknowledgements Firstly,the authors wish to acknowledge the academic support from Ruhr University Bochum during the first author's(Xiao Yan)research stay from 2018.11 to 2020.10,including the s... The authors regret Acknowledgements Firstly,the authors wish to acknowledge the academic support from Ruhr University Bochum during the first author's(Xiao Yan)research stay from 2018.11 to 2020.10,including the soft code implement and debug support from Vladislav Gudzulic and academic advising from Günther Meschke. 展开更多
关键词 research stay academic advising soft code implement debug support high density layered shale evolution injection scheme academic support multi cluster fracturing
原文传递
Lifting Scheme及其在小波图象编码中的应用 被引量:2
14
作者 曾剑芬 马争鸣 《中国图象图形学报(A辑)》 CSCD 北大核心 2001年第11期1111-1117,共7页
L ifting Schem e是构造第二代小波的关键技术 .相对于第一代小波而言 ,L ifting Scheme是一种比 Mallat算法更快、更简单和更容易操作的算法 ,也是 JPEG2 0 0 0推荐的算法 .为了将其应用到小波图象编码中 ,提出了一种对 L ifting Schem... L ifting Schem e是构造第二代小波的关键技术 .相对于第一代小波而言 ,L ifting Scheme是一种比 Mallat算法更快、更简单和更容易操作的算法 ,也是 JPEG2 0 0 0推荐的算法 .为了将其应用到小波图象编码中 ,提出了一种对 L ifting Scheme作适当改进以用于小波图象编码的方法 .该方法就是先用 L ifting Scheme来实现 D9/ 7双正交小波变换 ,然后再用这种技术实现的 D9/ 7双正交小波变换来进行图象压缩编码 .在将 L ifting Schem e算法用于小波图象编码的过程中 ,对该算法做了必要的简化 ,以便保证每个提升 (lifting)环节都是 FIR滤波 .同时 ,根据能量守恒的原则 ,重新调整了尺度因子 .实验结果表明 ,这种经过改进的 L ifting Schem e取得了比 展开更多
关键词 小波图象编码 MALLAT算法 LIFTING scheme 小波分析 图象压缩
在线阅读 下载PDF
由传统认证码(A-CODE)构造有仲裁人的认证码(A^2-CODE) 被引量:5
15
作者 周智 胡正名 《电子科学学刊》 CSCD 1997年第4期489-493,共5页
本文利用密钥分享方案,特别是(k,n)-门限方案和智力扑克协议作为工具,从目前所有的无仲裁人的认证码可以构造出安全高效的有仲裁人的认证码.分析表明,得到的新码可以抵抗来自各方(包括通信双方,敌方,仲裁人,以及某一方与某些仲裁人的合... 本文利用密钥分享方案,特别是(k,n)-门限方案和智力扑克协议作为工具,从目前所有的无仲裁人的认证码可以构造出安全高效的有仲裁人的认证码.分析表明,得到的新码可以抵抗来自各方(包括通信双方,敌方,仲裁人,以及某一方与某些仲裁人的合谋)的欺骗攻击,同时具有原码的所有优良性能。它的实现比较简单,为了抵抗来自仲裁人的攻击,只需增加一定的冗余度,所增加的冗余比特的多少随着安全度要求的变化而变化。 展开更多
关键词 认证码 密钥分享 门限方案 密码学
在线阅读 下载PDF
基于导流板优化方案的非能动安全壳水膜蒸发传热传质试验研究
16
作者 王国栋 黄思洋 +1 位作者 张迪 史国宝 《核动力工程》 北大核心 2026年第1期87-96,共10页
为了缩短核电厂建造周期、提升运维便利性和降低设备造价,本文提出了一种非能动核电厂空气导流板优化方案,为论证该方案,搭建了1∶4缩比的非能动安全壳冷却能力验证试验台架(COCOVET),基于COCOVET空气对流传热试验,借助粒子图像测速(PIV... 为了缩短核电厂建造周期、提升运维便利性和降低设备造价,本文提出了一种非能动核电厂空气导流板优化方案,为论证该方案,搭建了1∶4缩比的非能动安全壳冷却能力验证试验台架(COCOVET),基于COCOVET空气对流传热试验,借助粒子图像测速(PIV)工具将非能动安全壳冷却系统(PCS)环腔的空气流动可视化。在明晰空气流动传热特性后,开展水膜蒸发传热传质试验,研究PCS环腔空气强迫对流和自然对流并存的混合对流水膜蒸发传热传质现象,通过对比试验数据和程序模拟结果,论证安全分析程序模拟导流板优化方案的可行性。研究结果表明:在PCS环腔下降段空气到达导流板尾部区域后,大部分空气折流180°进入PCS环腔上升段,沿导流板向上流动,少量空气沿冷却面继续向下流动。在无导流板区域,“水膜-空气”为偏自然对流类型的混合对流传热传质过程,加热面热流密度沿高度方向基本不变;在有导流板区域,PCS环腔上升段存在明显的传热“入口效应”,加热面热流密度呈现先迅速增加后降低的趋势。安全壳安全分析程序计算值和试验测量值符合良好,适用于模拟水膜蒸发传热传质过程。研究结果支撑了非能动核电厂导流板优化方案,也丰富了混合对流类型的传热传质研究内容。 展开更多
关键词 空气导流板优化方案 非能动安全壳冷却系统(PCS) 水膜蒸发传热传质 安全壳冷却能力验证试验台架(COCOVET) 程序适用性
原文传递
Evil-hunter: a novel web shell detection system based on scoring scheme 被引量:1
17
作者 张庭秀 程光 +1 位作者 郭晓军 潘吴斌 《Journal of Southeast University(English Edition)》 EI CAS 2014年第3期278-284,共7页
In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-... In order to detect web shells that hackers inject into web servers by exploiting system vulnerabilities or web page open sources, a novel web shell detection system based on the scoring scheme is proposed, named Evil-hunter. First, a large set of malicious function samples normally used in web shells are collected from various sources on the Internet and security forums. Secondly, according to the danger level and the frequency of using these malicious functions in the web shells as well as in legal web applications, an assigning score strategy for each malicious sample is devised. Then, the appropriate score threshold value for each sample is obtained from the results of a statistical analysis. Finally, based on the threshold value, a simple algorithm is presented to identify files that contain web shells in web applications. The experimental results show that compared with other approaches, Evil-hunter can identify web shells more efficiently and accurately. 展开更多
关键词 web shell detection scoring scheme malicious code identification
在线阅读 下载PDF
基于双混沌系统与DNA编码的医学图像加密算法
18
作者 马浩然 章庆勇 《科技创新与应用》 2026年第6期135-138,共4页
针对医学图像传输隐私风险及传统算法局限,在双混沌系统研究基础上提出增强型加密方案。创新级联Logistic与Chen超混沌系统,生成密钥空间高达1.5×10^(173)的动态密钥流,并引入DNA动态编码及跨块链式扩散机制。实验表明,相较AES、3... 针对医学图像传输隐私风险及传统算法局限,在双混沌系统研究基础上提出增强型加密方案。创新级联Logistic与Chen超混沌系统,生成密钥空间高达1.5×10^(173)的动态密钥流,并引入DNA动态编码及跨块链式扩散机制。实验表明,相较AES、3DES、SM4传统算法,该方案信息熵达7.999857 bit,像素空间相关性彻底消除,为医学图像安全传输提供高效解决方案。 展开更多
关键词 双混沌系统 DNA动态编码 AES 隐私风险 加密方案
在线阅读 下载PDF
Embedded Coded Relay System for Molecular Communications 被引量:1
19
作者 Eman S.Attia Ashraf A.M.Khalaf +6 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Farid Shawki Imran Khan Ki-Il Kim 《Computers, Materials & Continua》 SCIE EI 2022年第8期2729-2748,共20页
With the emergence of the COVID-19 pandemic,the World Health Organization(WHO)has urged scientists and industrialists to exploremodern information and communication technology(ICT)as a means to reduce or even eliminat... With the emergence of the COVID-19 pandemic,the World Health Organization(WHO)has urged scientists and industrialists to exploremodern information and communication technology(ICT)as a means to reduce or even eliminate it.The World Health Organization recently reported that the virus may infect the organism through any organ in the living body,such as the respiratory,the immunity,the nervous,the digestive,or the cardiovascular system.Targeting the abovementioned goal,we envision an implanted nanosystem embedded in the intra living-body network.The main function of the nanosystem is either to perform diagnosis and mitigation of infectious diseases or to implement a targeted drug delivery system(i.e.,delivery of the therapeutic drug to the diseased tissue or targeted cell).The communication among the nanomachines is accomplished via communication-based molecular diffusion.The control/interconnection of the nanosystem is accomplished through the utilization of Internet of bio-nano things(IoBNT).The proposed nanosystem is designed to employ a coded relay nanomachine disciplined by the decode and forward(DF)principle to ensure reliable drug delivery to the targeted cell.Notably,both the sensitivity of the drug dose and the phenomenon of drug molecules loss before delivery to the target cell site in long-distance due to the molecules diffusion process are taken into account.In this paper,a coded relay NM with conventional coding techniques such as RS and Turbo codes is selected to achieve minimum bit error rate(BER)performance and high signal-to-noise ratio(SNR),while the detection process is based on maximum likelihood(ML)probability and minimum error probability(MEP).The performance analysis of the proposed scheme is evaluated in terms of channel capacity and bit error rate by varying system parameters such as relay position,number of released molecules,relay and receiver size.Analysis results are validated through simulation and demonstrate that the proposed scheme can significantly improve delivery performance of the desirable drugs in the molecular communication system. 展开更多
关键词 Molecular communication nanonetwork internet of bio-nano things coded relay scheme coding
在线阅读 下载PDF
Time Division Multiplexing Fiber Bragg Grating Sensor System Using Composite Codes
20
作者 CAO Yaoyu XU Hongxuan +3 位作者 ZHANG Yang ZHU Yushuang GUI Lin ZUO Jiancun 《Journal of Donghua University(English Edition)》 EI CAS 2019年第2期163-169,共7页
A novel multi-point sensing scheme to improve the signal-to-noise ratio(SNR),temperature measurement range of the fiber Bragg grating(FBG)sensors is proposed.The new sensing scheme adopted a composite coding technique... A novel multi-point sensing scheme to improve the signal-to-noise ratio(SNR),temperature measurement range of the fiber Bragg grating(FBG)sensors is proposed.The new sensing scheme adopted a composite coding technique based on Simplex codes and Golay codes and time division multiplexing technique to enhance the performance of the sensing system.Simulation results,in good agreement with the theory,confirmed that the maximum SNR enhancement of the sensor system employing composite coding based on 15-bit Simplex codes and 16-bit Golay codes was approximately 6.01 dB in comparison to the conventional single pulse case. 展开更多
关键词 fiber BRAGG grating(FBG) time division multiplexing(TDM) COMPOSITE coding scheme coding gain
在线阅读 下载PDF
上一页 1 2 23 下一页 到第
使用帮助 返回顶部