期刊文献+
共找到1,315篇文章
< 1 2 66 >
每页显示 20 50 100
Separate Source Channel Coding Is Still What You Need:An LLM-Based Rethinking 被引量:3
1
作者 REN Tianqi LI Rongpeng +5 位作者 ZHAO Mingmin CHEN Xianfu LIU Guangyi YANG Yang ZHAO Zhifeng ZHANG Honggang 《ZTE Communications》 2025年第1期30-44,共15页
Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information ... Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information semantics.Nevertheless,this paper challenges the conventional JSCC paradigm and advocates for adopting separate source channel coding(SSCC)to enjoy a more underlying degree of freedom for optimization.We demonstrate that SSCC,after leveraging the strengths of the Large Language Model(LLM)for source coding and Error Correction Code Transformer(ECCT)complemented for channel coding,offers superior performance over JSCC.Our proposed framework also effectively highlights the compatibility challenges between Sem Com approaches and digital communication systems,particularly concerning the resource costs associated with the transmission of high-precision floating point numbers.Through comprehensive evaluations,we establish that assisted by LLM-based compression and ECCT-enhanced error correction,SSCC remains a viable and effective solution for modern communication systems.In other words,separate source channel coding is still what we need. 展开更多
关键词 separate source channel coding(SSCC) joint source channel coding(JSCC) end-to-end communication system Large Language Model(LLM) lossless text compression Error Correction code Transformer(ECCT)
在线阅读 下载PDF
Low complexity DCT-based distributed source coding with Gray code for hyperspectral images 被引量:1
2
作者 Rongke Liu Jianrong Wang Xuzhou Pan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第6期927-933,共7页
To compress hyperspectral images, a low complexity discrete cosine transform (DCT)-based distributed source coding (DSC) scheme with Gray code is proposed. Unlike most of the existing DSC schemes, which utilize tr... To compress hyperspectral images, a low complexity discrete cosine transform (DCT)-based distributed source coding (DSC) scheme with Gray code is proposed. Unlike most of the existing DSC schemes, which utilize transform in spatial domain, the proposed algorithm applies transform in spectral domain. Set-partitioning-based approach is applied to reorganize DCT coefficients into waveletlike tree structure and extract the sign, refinement, and significance bitplanes. The extracted refinement bits are Gray encoded. Because of the dependency along the line dimension of hyperspectral images, low density paritycheck-(LDPC)-based Slepian-Wolf coder is adopted to implement the DSC strategy. Experimental results on airborne visible/infrared imaging spectrometer (AVIRIS) dataset show that the proposed paradigm achieves up to 6 dB improvement over DSC-based coders which apply transform in spatial domain, with significantly reduced computational complexity and memory storage. 展开更多
关键词 image compression hyperspectral images distributed source coding (DSC) discrete cosine transform (DCT) Gray code band-interleaved-by-pixel (BIP).
在线阅读 下载PDF
NEW ITERATIVE SUPER-TRELLIS DECODING WITH SOURCE A PRIORI INFORMATION FOR VLCS WITH TURBO CODES 被引量:3
3
作者 Liu Jianjun Tu Guofang Wu Weiren 《Journal of Electronics(China)》 2007年第1期122-127,共6页
A novel Joint Source and Channel Decoding (JSCD) scheme for Variable Length Codes (VLCs) concatenated with turbo codes utilizing a new super-trellis decoding algorithm is presented in this letter. The basic idea of ou... A novel Joint Source and Channel Decoding (JSCD) scheme for Variable Length Codes (VLCs) concatenated with turbo codes utilizing a new super-trellis decoding algorithm is presented in this letter. The basic idea of our decoding algorithm is that source a priori information with the form of bit transition probabilities corresponding to the VLC tree can be derived directly from sub-state transitions in new composite-state represented super-trellis. A Maximum Likelihood (ML) decoding algorithm for VLC sequence estimations based on the proposed super-trellis is also described. Simu-lation results show that the new iterative decoding scheme can obtain obvious encoding gain especially for Reversible Variable Length Codes (RVLCs),when compared with the classical separated turbo decoding and the previous joint decoding not considering source statistical characteristics. 展开更多
关键词 Joint source and Channel Decoding (JSCD) Variable Length codes (VLCs) Turbo codes Super-trellis
在线阅读 下载PDF
Adaptation of the Two Sources of Code and One-Hot Encoding Method for Designing a Model of Microprogram Control Unit with Output Identification 被引量:3
4
作者 Lukasz Smolinski Alexander Barkalov Larysa Titarenko 《Intelligent Control and Automation》 2015年第2期116-125,共10页
This article presents a proposal for a model of a microprogram control unit (CMCU) with output identification adapted for implementation in complex programmable logic devices (CPLD) equipped with integrated memory mod... This article presents a proposal for a model of a microprogram control unit (CMCU) with output identification adapted for implementation in complex programmable logic devices (CPLD) equipped with integrated memory modules [1]. An approach which applies two sources of code and one-hot encoding has been used in a base CMCU model with output identification [2] [3]. The article depicts a complete example of processing for the proposed CMCU model. Furthermore, it also discusses the advantages and disadvantages of the approach in question and presents the results of the experiments conducted on a real CPLD system. 展开更多
关键词 CPLD PAL UFM CLB Two sources of code One-Hot Encoding CMCU
暂未订购
Integrated Joint Source-Channel Symbol-by-Symbol Decoding of Variable-Length Codes Using 3-D MAP Sequence Estimation 被引量:1
5
作者 WU Jing CHEN Shuzhen 《Wuhan University Journal of Natural Sciences》 CAS 2007年第3期471-475,共5页
Most of multimedia schemes employ variable-length codes (VLCs) like Huffman code as core components in obtaining high compression rates. However VLC methods are very sensitive to channel noise. The goal of this pape... Most of multimedia schemes employ variable-length codes (VLCs) like Huffman code as core components in obtaining high compression rates. However VLC methods are very sensitive to channel noise. The goal of this paper is to salvage as many data from the damaged packets as possible for higher audiovisual quality. This paper proposes an integrated joint source-channel decoder (I-JSCD) at a symbol-level using three-dimensional (3-D) trellis representation for first-order Markov sources encoded with VLC source code and convolutional channel code. This method combines source code and channel code state-spaces and bit-lengths to construct a two-dimensional (2-D) state-space, and then develops a 3-D trellis and a maximum a-posterior (MAP) algorithm to estimate the source sequence symbol by symbol. Experiment results demonstrate that our method results in significant improvement in decoding performance, it can salvage at least half of (50%) data in any channel error rate, and can provide additional error resilience to VLC stream like image, audio, video stream over high error rate links. 展开更多
关键词 integrated joint source-channel decoding (I-JSCD) variable-length code (VLC) exp-Golomb code convolutional code maximum a-oosteriori (MAP)
在线阅读 下载PDF
Automatic Mining of Security-Sensitive Functions from Source Code
6
作者 Lin Chen Chunfang Yang +2 位作者 Fenlin Liu Daofu Gong Shichang Ding 《Computers, Materials & Continua》 SCIE EI 2018年第8期199-210,共12页
When dealing with the large-scale program,many automatic vulnerability mining techniques encounter such problems as path explosion,state explosion,and low efficiency.Decomposition of large-scale programs based on safe... When dealing with the large-scale program,many automatic vulnerability mining techniques encounter such problems as path explosion,state explosion,and low efficiency.Decomposition of large-scale programs based on safety-sensitive functions helps solve the above problems.And manual identification of security-sensitive functions is a tedious task,especially for the large-scale program.This study proposes a method to mine security-sensitive functions the arguments of which need to be checked before they are called.Two argument-checking identification algorithms are proposed based on the analysis of two implementations of argument checking.Based on these algorithms,security-sensitive functions are detected based on the ratio of invocation instances the arguments of which have been protected to the total number of instances.The results of experiments on three well-known open-source projects show that the proposed method can outperform competing methods in the literature. 展开更多
关键词 code mining VULNERABILITIES static analysis security-sensitive function source code.
在线阅读 下载PDF
Joint Source-Channel Coding for 6G Communications 被引量:4
7
作者 Yanfei Dong Jincheng Dai +2 位作者 Kai Niu Sen Wang Yifei Yuan 《China Communications》 SCIE CSCD 2022年第3期101-115,共15页
In order to provide ultra low-latency and high energy-efficient communication for intelligences,the sixth generation(6G)wireless communication networks need to break out of the dilemma of the depleting gain of the sep... In order to provide ultra low-latency and high energy-efficient communication for intelligences,the sixth generation(6G)wireless communication networks need to break out of the dilemma of the depleting gain of the separated optimization paradigm.In this context,this paper provides a comprehensive tutorial that overview how joint source-channel coding(JSCC)can be employed for improving overall system performance.For the purpose,we first introduce the communication requirements and performance metrics for 6G.Then,we provide an overview of the source-channel separation theorem and why it may not hold in practical applications.In addition,we focus on two new JSCC schemes called the double low-density parity-check(LDPC)codes and the double polar codes,respectively,giving their detailed coding and decoding processes and corresponding performance simulations.In a nutshell,this paper constitutes a tutorial on the JSCC scheme tailored to the needs of future 6G communications. 展开更多
关键词 6G joint source and channel coding doubel LDPC codes doubel polar codes
在线阅读 下载PDF
An Adaptive Joint Source/Channel Coding Using Error Correcting Arithmetic Codes 被引量:1
8
作者 刘军清 逄玉叶 孙军 《Journal of Shanghai Jiaotong university(Science)》 EI 2007年第4期448-453,共6页
An approximately optimal adaptive arithmetic coding (AC) system using a forbidden symbol (FS) over noisy channels was proposed which allows one to jointly and adaptively design the source decoding and channel correcti... An approximately optimal adaptive arithmetic coding (AC) system using a forbidden symbol (FS) over noisy channels was proposed which allows one to jointly and adaptively design the source decoding and channel correcting in a single process, with superior performance compared with traditional separated techniques. The concept of adaptiveness is applied not only to the source model but also to the amount of coding redundancy. In addition, an improved branch metric computing algorithm and a faster sequential searching algorithm compared with the system proposed by Grangetto were proposed. The proposed system is tested in the case of image transmission over the AWGN channel, and compared with traditional separated system in terms of packet error rate and complexity. Both hard and soft decoding were taken into account. 展开更多
关键词 ARITHMETIC CODING joint source channel CODING MAXIMUM a POSTERIORI (MAP) forbidden SYMBOL
在线阅读 下载PDF
An Iterative Detection/Decoding Algorithm of Correlated Sources for the LDPC-Based Relay Systems 被引量:1
9
作者 Haiqiang Chen Hang Cao +3 位作者 Xiangcheng Li Youming Sun Haibin Wan Tuanfa Qin 《China Communications》 SCIE CSCD 2017年第9期190-198,共9页
An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the... An iterative detection/decoding algorithm of correlated sources for the LDPC-based relay systems is presented. The signal from the source-destination(S-D) link is formulated as a highly correlated counterpart from the relay-destination(R-D) link. A special XOR vector is defined using the correlated hard decision information blocks from two decoders and the extrinsic information exchanged between the two decoders is derived by the log-likelihood ratio(LLR) associated with the XOR vector. Such the decoding scheme is different from the traditional turbo-like detection/decoding algorithm, where the extrinsic information is computed by the side information and the soft decoder outputs. Simulations show that the presented algorithm has a slightly better performance than the traditional turbo-like algorithm(Taking the(255,175) EG-LDPC code as an example, it achieves about 0.1 dB performance gains aroundBLER=10^(-4)). Furthermore, the presented algorithm requires fewer computing operations per iteration and has faster convergence rate. For example, the average iteration of the presented algorithm is 33 at SNR=1.8 dB, which is about twice faster than that of the turbo-like algorithm, when decoding the(961,721) QC-LDPC code. Therefore, the presented decoding algorithm of correlated sources provides an alternative decoding solution for the LDPC-based relay systems. 展开更多
关键词 CORRELATED sources ITERATIVE de-coding LDPC codeS RELAY channel
在线阅读 下载PDF
Source extension based on ε-entropy 被引量:3
10
作者 张剑 《Journal of Chongqing University》 CAS 2005年第2期102-106,共5页
It is known by entropy theory that image is a source correlated with a certain characteristic of probability. The entropy rate of the source and ε- entropy (rate-distortion function theory) are the information conten... It is known by entropy theory that image is a source correlated with a certain characteristic of probability. The entropy rate of the source and ε- entropy (rate-distortion function theory) are the information content to identify the characteristics of video images, and hence are essentially related with video image compression. They are fundamental theories of great significance to image compression, though impossible to be directly turned into a compression method. Based on the entropy theory and the image compression theory, by the application of the rate-distortion feature mathematical model and Lagrange multipliers to some theoretical problems in the H.264 standard, this paper presents a new the algorithm model of coding rate-distortion. This model is introduced into complete test on the capability of the test model of JM61e (JUT Test Model). The result shows that the speed of coding increases without significant reduction of the rate-distortion performance of the coder. 展开更多
关键词 Rate-Distortion function LAGRANGIAN source extension Theory of information video coding image compression
在线阅读 下载PDF
Matching Source Code Using Abstract Syntax Trees in Version Control Systems 被引量:2
11
作者 Jonathan van den Berg Hirohide Haga 《Journal of Software Engineering and Applications》 2018年第6期318-340,共23页
Software projects are becoming larger and more complicated. Managing those projects is based on several software development methodologies. One of those methodologies is software version control, which is used in the ... Software projects are becoming larger and more complicated. Managing those projects is based on several software development methodologies. One of those methodologies is software version control, which is used in the majority of worldwide software projects. Although existing version control systems provide sufficient functionality in many situations, they are lacking in terms of semantics and structure for source code. It is commonly believed that improving software version control can contribute substantially to the development of software. We present a solution that considers a structural model for matching source code that can be used in version control. 展开更多
关键词 VERSION Control source code MATCHING ABSTRACT SYNTAX Tree STRUCTURED Representation
在线阅读 下载PDF
Multiple-stacked Hybrid Plays of lacustrine source rock intervals:Case studies from lacustrine basins in China 被引量:2
12
作者 Shu Jiang You-Liang Feng +6 位作者 Lei Chen Yue Wu Zheng-Yu Xu Zheng-Long Jiang Dong-Sheng Zhou Dong-Sheng Cai Elinda Mc Kenna 《Petroleum Science》 SCIE CAS CSCD 2017年第3期459-483,共25页
Hydrocarbon-producing lacustrine basins are widely developed in the world, and China has a large number of lacustrine basins that have developed since the early Permian. The organic-rich shale-dominated heterogeneous ... Hydrocarbon-producing lacustrine basins are widely developed in the world, and China has a large number of lacustrine basins that have developed since the early Permian. The organic-rich shale-dominated heterogeneous source rock intervals in Chinese lacustrine basins generally contain frequent thin interbeds of stratigraphically associated sandstone, siltstone, marl, dolomite, and limestone. The concept of ‘‘Hybrid Plays' ' as put forth in this article recognizes this pattern of alternating organicrich shale and organic-lean interbeds and existence of mixed unconventional and conventional plays. Hybrid Plays in lacustrine source rock intervals present a unique closed petroleum system hosting continuous hydrocarbons.The interbedded organic-lean siliciclastic and/or carbonateplays are efficiently charged with hydrocarbons via short migration pathways from the adjacent organic-rich shale that is often also a self-sourced play. We assert ‘‘Hybrid Plays' ' provide the most realistic exploration model for targeting multiple-stacked and genetically related very tight shale, tight and conventional plays together in the entire source rock interval rather than individual plays only. The Hybrid Play model has been proven and works for a wide variety of lacustrine rift, sag and foreland basins in China. 展开更多
关键词 Lacustrine basin Hybrid Plays - Shale Interbed source rock Petroleum system
原文传递
Estimation of Ion Beam Trajectories for a Slot Aperture Accelerator of Long-Pulse Ion Source in Neutral Beam Injector 被引量:1
13
作者 Doo-Hee Chang 《Open Journal of Applied Sciences》 2013年第2期163-168,共6页
A neutral beam injection (NBI) system has been developed and is being tested for an Experimental Advanced Superconducting Tokamak (EAST) device. The NBI system needs to be employed for an auxiliary heating and current... A neutral beam injection (NBI) system has been developed and is being tested for an Experimental Advanced Superconducting Tokamak (EAST) device. The NBI system needs to be employed for an auxiliary heating and current drive of EAST plasmas. The first long pulse ion source (LPIS-1) has been installed in the neutral beam test bed (NBTB) system, and the performance is being tested in the NBTB. The LPIS-1 consists of a magnetic bucket plasma generator with multipole cusp-fields and a set of tetrode accelerators with slit-type apertures (a transparency of 60%). The ion beam trajectories of the accelerator column are estimated for the LPIS-1, including an original structure, with the change of slit aperture distance, plasma grid shape, grid gap distance, and voltage ratio between a plasma grid and a gradient grid using the IGUN code. This kind of calculation for the ion beam trajectory may be useful for the estimation of beam extraction characteristics and the direction of accelerator upgrade or modification, prior to the experiments of ion beam extraction. 展开更多
关键词 Long Pulse ION source SLOT APERTURE ACCELERATOR EAST Neutral BEAM Injection ION BEAM Trajectory IGUN code
在线阅读 下载PDF
Numerical study on wave loads and motions of two ships advancing in waves by using three-dimensional translating-pulsating source 被引量:10
14
作者 Yong Xu Wen-Cai Dong 《Acta Mechanica Sinica》 SCIE EI CAS CSCD 2013年第4期494-502,共9页
A frequency domain analysis method based on the three-dimensional translating-pulsating (3DTP) source Green function is developed to investigate wave loads and free motions of two ships advancing on parallel course ... A frequency domain analysis method based on the three-dimensional translating-pulsating (3DTP) source Green function is developed to investigate wave loads and free motions of two ships advancing on parallel course in waves. Two experiments are carried out respectively to mea- sure the wave loads and the free motions for a pair of side-by- side arranged ship models advancing with an identical speed in head regular waves. For comparison, each model is also tested alone. Predictions obtained by the present solution are found in favorable agreement with the model tests and are more accurate than the traditional method based on the three dimensional pulsating (3DP) source Green function. Numer- ical resonances and peak shift can be found in the 3DP pre- dictions, which result from the wave energy trapped in the gap between two ships and the extremely inhomogeneous wave load distribution on each hull. However, they can be eliminated by 3DTP, in which the speed affects the free sur- face and most of the wave energy can be escaped from the gap. Both the experiment and the present prediction show that hydrodynamic interaction effects on wave loads and free motions are significant. The present solver may serve as a validated tool to predict wave loads and motions of two ves- sels under replenishment at sea, and may help to evaluate the hydrodynamic interaction effects on the ships safety in replenishment operation. 展开更多
关键词 Hydrodynamic interaction - Wave loads ~Ship motions ~ Model test ~ Three-dimensional translating-pulsating source ~ Underway replenishment
在线阅读 下载PDF
Joint resource allocation for MIMO-OFDM video transmission systems with unequal error protection 被引量:3
15
作者 张成文 刘鑫 谭学治 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第2期119-124,共6页
To improve the performance of MIMO-OFDM video transmission systems on the limitation of wireless bandwidth and transmitting power,we propose an adaptive joint resource allocation algorithm with unequal error protectio... To improve the performance of MIMO-OFDM video transmission systems on the limitation of wireless bandwidth and transmitting power,we propose an adaptive joint resource allocation algorithm with unequal error protection(UEP) based on joint source-channel coding(JSCC) according to H.264 video compression standard and RCPT channel coding.According to different thresholds of the average SNR of subchannels,the algorithm dynamically allocates the source coding parameters of original video data and the channel coding parameters of RCPT,which realizes UEP for the compressed video data of different importance.Through the bit and power allocation based on MQAM modulation and the subspace allocation based on beamforming technology for different subcarriers,an adaptive joint resource allocation making full use of space-frequency domain resources have been realized.The simulation results indicate that the algorithm improves the adaptability of video transmission systems in different wireless environments and the quality of video retrieval. 展开更多
关键词 video transmission MIMO-OFDM unequal error protection joint source-channel coding
在线阅读 下载PDF
The Application and Adaptation of the Two Sources of Code and Natural Encoding Method for Designing a Model of Microprogram Control Unit with Base Structure 被引量:2
16
作者 Lukasz Smolinski Alexander Barkalov Larysa Titarenko 《Circuits and Systems》 2014年第12期301-308,共8页
The article presents a modification to the method which applies two sources of data. The modification is depicted on the example of a compositional microprogram control unit (CMCU) model with base structure implemente... The article presents a modification to the method which applies two sources of data. The modification is depicted on the example of a compositional microprogram control unit (CMCU) model with base structure implemented in the complex programmable logic devices (CPLD). First, the conditions needed to apply the method are presented, followed by the results of its implementation in real hardware. 展开更多
关键词 CPLD PAL UFM CLB Two sources of code One-Hot Encoding Natural Encoding CMCU
暂未订购
An efficient chaotic source coding scheme with variable-length blocks
17
作者 林秋镇 黄国和 陈剑勇 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第7期94-100,共7页
An efficient chaotic source coding scheme operating on variable-length blocks is proposed. With the source message represented by a trajectory in the state space of a chaotic system, data compression is achieved when ... An efficient chaotic source coding scheme operating on variable-length blocks is proposed. With the source message represented by a trajectory in the state space of a chaotic system, data compression is achieved when the dynamical system is adapted to the probability distribution of the source symbols. For infinite-precision computation, the theoretical compression performance of this chaotic coding approach attains that of optimal entropy coding. In finite-precision implementation, it can be realized by encoding variable-length blocks using a piecewise linear chaotic map within the precision of register length. In the decoding process, the bit shift in the register can track the synchronization of the initial value and the corresponding block. Therefore, all the variable-length blocks are decoded correctly. Simulation results show that the proposed scheme performs well with high efficiency and minor compression loss when compared with traditional entropy coding. 展开更多
关键词 CHAOS compression source coding finite-precision implementation
原文传递
Secure Multi-Source Network Coding Scheme with Lattice Signature
18
作者 SHANG Tao PENG Tianli LIU Jianwei 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2015年第6期476-482,共7页
Multi-source network coding allows intermediate nodes to linearly combine packets from multiple sources, but it is vulnerable to pollution attacks which can cause multiple down- stream data to be polluted. To solve th... Multi-source network coding allows intermediate nodes to linearly combine packets from multiple sources, but it is vulnerable to pollution attacks which can cause multiple down- stream data to be polluted. To solve this problem, we take advan- tage of lattice signature and homomorphic property to build a se- cure multi-source network coding scheme. By means of the lattice basis delegation algorithms, our scheme can generate a public lattice for all source nodes and the homomorphic signatures can be calculated on this lattice. Consequently, the multi-source signature problem can be transformed into single-source signature problem only if all source nodes are considered as a whole. Scheme analy- sis shows the correctness and homomorphic property of the pro- posed scheme. 展开更多
关键词 network coding multiple sources pollution attacks lattice signature homomorphic property
原文传递
Research on Classification of Malware Source Code
19
作者 陈嘉玫 赖谷鑫 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期425-430,共6页
In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis o... In the face threat of the Internet attack, malware classification is one of the promising solutions in the field of intrusion detection and digital forensics. In previous work, researchers performed dynamic analysis or static analysis after reverse engineering. But malware developers even use anti-virtual machine(VM) and obfuscation techniques to evade malware classifiers. By means of the deployment of honeypots, malware source code could be collected and analyzed. Source code analysis provides a better classification for understanding the purpose of attackers and forensics. In this paper, a novel classification approach is proposed, based on content similarity and directory structure similarity. Such a classification avoids to re-analyze known malware and allocates resources for new malware. Malware classification also let network administrators know the purpose of attackers. The experimental results demonstrate that the proposed system can classify the malware efficiently with a small misclassification ratio and the performance is better than virustotal. 展开更多
关键词 MALWARE source code classification static analysis HONEYPOT
原文传递
Geant4 simulation of 238U(n,f) reaction induced by D-T neutron source
20
作者 Chang-Lin Lan Meng Peng +3 位作者 Yi Zhang Zheng Wei Ze-En Yao Bao-Lin Xie 《Nuclear Science and Techniques》 SCIE CAS CSCD 2017年第1期49-56,共8页
Knowledge of actinides(n,f) fission process induced by neutron is of importance in the field of nuclear power and nuclear engineering,especially for reactor applications.In this work,fission characteristics of^(238)U(... Knowledge of actinides(n,f) fission process induced by neutron is of importance in the field of nuclear power and nuclear engineering,especially for reactor applications.In this work,fission characteristics of^(238)U(n,f) reaction induced by D-T neutron source were simulated with Geant4 code from multiple perspectives,including the fission production yields,total nubar,kinetic energy distribution,fission neutron spectrum and cumulative γ-ray spectrum of the fission products.The simulation results agree well with the experimental nuclear reaction data(EXFOR) and evaluated nuclear data(ENDF).Mainly,this work was to examine the rationality of the parametric nuclear fission model in Geant4 and to direct our future experimental measurements for the cumulative fission yields of ^(238)U(n,f) reaction. 展开更多
关键词 FISSION characteristics GEANT4 code 238U(n f) REACTION D-T neutron source Decayed c-ray spectrum
在线阅读 下载PDF
上一页 1 2 66 下一页 到第
使用帮助 返回顶部