期刊文献+
共找到73,646篇文章
< 1 2 250 >
每页显示 20 50 100
浅谈AMC助力地方政府化债机制
1
作者 舒晖 黄本鑫 +1 位作者 黄剑云 任云霄 《债券》 2025年第3期22-27,共6页
近年来,地方债务化解问题日益成为市场关注的焦点,相关部门积极部署化债工作,隐性债务化解持续推进。在一系列化债政策和行业政策的支持下,资产管理公司可通过多元化策略和市场化操作参与城投债务化解,缓释地方债务风险。
关键词 amc 地方债务 债务化解
在线阅读 下载PDF
Separate Source Channel Coding Is Still What You Need:An LLM-Based Rethinking
2
作者 REN Tianqi LI Rongpeng +5 位作者 ZHAO Mingmin CHEN Xianfu LIU Guangyi YANG Yang ZHAO Zhifeng ZHANG Honggang 《ZTE Communications》 2025年第1期30-44,共15页
Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information ... Along with the proliferating research interest in semantic communication(Sem Com),joint source channel coding(JSCC)has dominated the attention due to the widely assumed existence in efficiently delivering information semantics.Nevertheless,this paper challenges the conventional JSCC paradigm and advocates for adopting separate source channel coding(SSCC)to enjoy a more underlying degree of freedom for optimization.We demonstrate that SSCC,after leveraging the strengths of the Large Language Model(LLM)for source coding and Error Correction Code Transformer(ECCT)complemented for channel coding,offers superior performance over JSCC.Our proposed framework also effectively highlights the compatibility challenges between Sem Com approaches and digital communication systems,particularly concerning the resource costs associated with the transmission of high-precision floating point numbers.Through comprehensive evaluations,we establish that assisted by LLM-based compression and ECCT-enhanced error correction,SSCC remains a viable and effective solution for modern communication systems.In other words,separate source channel coding is still what we need. 展开更多
关键词 separate source channel coding(SSCC) joint source channel coding(JSCC) end-to-end communication system Large Language Model(LLM) lossless text compression Error Correction Code Transformer(ECCT)
在线阅读 下载PDF
地方AMC关于不良资产收购处置的财税研究
3
作者 周颖 《赣商》 2025年第1期0114-0116,共3页
地方AMC在化解区域金融风险、维护金融稳定、盘活存量资产中发挥了重要作用,但其业务模式以非标业务居多,随着金融业务创新和财税监督日益严格,地方AMC不良资产收购处置业务的财税处理面临更多挑战。本文根据目前地方AMC最主要的业务模... 地方AMC在化解区域金融风险、维护金融稳定、盘活存量资产中发挥了重要作用,但其业务模式以非标业务居多,随着金融业务创新和财税监督日益严格,地方AMC不良资产收购处置业务的财税处理面临更多挑战。本文根据目前地方AMC最主要的业务模式,从收购环节和持有处置环节对具体的财务核算与税务处理进行分析,降低财税风险。 展开更多
关键词 amc 不良资产 收购处置 财务核算 税务处理
在线阅读 下载PDF
Text-and-Timbre-Based Speech Semantic Coding for Ultra-Low-Bitrate Communications
4
作者 Yang Xiaoniu Qian Liping +2 位作者 Lyu Sikai Wang Qian Wang Wei 《China Communications》 2025年第1期7-24,共18页
To address the contradiction between the explosive growth of wireless data and the limited spectrum resources,semantic communication has been emerging as a promising communication paradigm.In this paper,we thus design... To address the contradiction between the explosive growth of wireless data and the limited spectrum resources,semantic communication has been emerging as a promising communication paradigm.In this paper,we thus design a speech semantic coded communication system,referred to as Deep-STS(i.e.,Deep-learning based Speech To Speech),for the lowbandwidth speech communication.Specifically,we first deeply compress the speech data through extracting the textual information from the speech based on the conformer encoder and connectionist temporal classification decoder at the transmitter side of Deep-STS system.In order to facilitate the final speech timbre recovery,we also extract the short-term timbre feature of speech signals only for the starting 2s duration by the long short-term memory network.Then,the Reed-Solomon coding and hybrid automatic repeat request protocol are applied to improve the reliability of transmitting the extracted text and timbre feature over the wireless channel.Third,we reconstruct the speech signal by the mel spectrogram prediction network and vocoder,when the extracted text is received along with the timbre feature at the receiver of Deep-STS system.Finally,we develop the demo system based on the USRP and GNU radio for the performance evaluation of Deep-STS.Numerical results show that the ac-Received:Jan.17,2024 Revised:Jun.12,2024 Editor:Niu Kai curacy of text extraction approaches 95%,and the mel cepstral distortion between the recovered speech signal and the original one in the spectrum domain is less than 10.Furthermore,the experimental results show that the proposed Deep-STS system can reduce the total delay of speech communication by 85%on average compared to the G.723 coding at the transmission rate of 5.4 kbps.More importantly,the coding rate of the proposed Deep-STS system is extremely low,only 0.2 kbps for continuous speech communication.It is worth noting that the Deep-STS with lower coding rate can support the low-zero-power speech communication,unveiling a new era in ultra-efficient coded communications. 展开更多
关键词 low coding rate semantic communication speech recognition speech synthesis
在线阅读 下载PDF
Mask-coding-assisted continuous-variable quantum direct communication with orbital angular momentum multiplexing
5
作者 Zhengwen Cao Yujie Wang +2 位作者 Geng Chai Xinlei Chen Yuan Lu 《Chinese Physics B》 2025年第2期64-72,共9页
Quantum secure direct communication(QSDC) is a communication method based on quantum mechanics and it is used to transmit secret messages. Unlike quantum key distribution, secret messages can be transmitted directly o... Quantum secure direct communication(QSDC) is a communication method based on quantum mechanics and it is used to transmit secret messages. Unlike quantum key distribution, secret messages can be transmitted directly on a quantum channel with QSDC. Higher channel capacity and noise suppression capabilities are key to achieving longdistance quantum communication. Here, we report a continuous-variable QSDC scheme based on mask-coding and orbital angular momentum, in which the mask-coding is employed to protect the security of the transmitting messages and to suppress the influence of excess noise. The combination of orbital angular momentum and information block transmission effectively improves the secrecy capacity. In the 800 information blocks ×1310 bits length 10-km experiment, the results show a statistical average bit error rate of 0.38%, a system excess noise value of 0.0184 SNU, and a final secrecy capacity of 6.319×10~6 bps. Therefore, this scheme reduces error bits while increasing secrecy capacity, providing a solution for long-distance large-scale quantum communication, which is capable of transmitting text, images and other information of reasonable size. 展开更多
关键词 continuous-variable quantum direct communication orbital angular momentum mask coding
在线阅读 下载PDF
Low Complexity Successive Cancellation List Decoding of U-UV Codes
6
作者 Chen Wenhao Chen Li +1 位作者 Lin Jingyu Zhang Huazi 《China Communications》 2025年第1期41-60,共20页
Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-med... Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-medium length regime.However,this list decoding complexity becomes formidable as the decoding output list size increases.This is primarily incurred by the OSD.Addressing this challenge,this paper proposes the low complexity SCL decoding through reducing the complexity of component code decoding,and pruning the redundant SCL decoding paths.For the former,an efficient skipping rule is introduced for the OSD so that the higher order decoding can be skipped when they are not possible to provide a more likely codeword candidate.It is further extended to the OSD variant,the box-andmatch algorithm(BMA),in facilitating the component code decoding.Moreover,through estimating the correlation distance lower bounds(CDLBs)of the component code decoding outputs,a path pruning(PP)-SCL decoding is proposed to further facilitate the decoding of U-UV codes.In particular,its integration with the improved OSD and BMA is discussed.Simulation results show that significant complexity reduction can be achieved.Consequently,the U-UV codes can outperform the cyclic redundancy check(CRC)-polar codes with a similar decoding complexity. 展开更多
关键词 ordered statistics decoding successive cancellation list decoding U-UV codes
在线阅读 下载PDF
Correction: Silencing of the long non-coding RNA LINC00265triggers autophagy and apoptosis in lung cancer by reducingprotein stability of SIN3A oncogene
7
作者 XIAOBI HUANG CHUNYUAN CHEN +9 位作者 YONGYANG CHEN HONGLIAN ZHOU YONGHUA CHEN ZHONG HUANG YULIU XIE BAIYANG LIU YUDONG GUO ZHIXIONG YANG GUANGHUA CHEN WENMEI SU 《Oncology Research》 2025年第5期1249-1250,共2页
In the article“Silencing of the long non-coding RNA LINC00265 triggers autophagy and apoptosis in lung cancer by reducing protein stability of SIN3A oncogene”(Oncology Research.2024,Vol.32,No.7,pp.1185–1195.doi:10.... In the article“Silencing of the long non-coding RNA LINC00265 triggers autophagy and apoptosis in lung cancer by reducing protein stability of SIN3A oncogene”(Oncology Research.2024,Vol.32,No.7,pp.1185–1195.doi:10.32604/or.2023.030771,https://www.techscience.com/or/v32n7/57163),an inadvertent error occurred during the compilation of Fig.3H.This needed corrections to ensure the accuracy and integrity of the data presented. 展开更多
关键词 lung cancer long non coding RNA reducing protein stability sin oncogene oncology AUTOPHAGY protein stability APOPTOSIS accuracy integrity SILENCING
在线阅读 下载PDF
转录因子HOXC13通过上调PCNA表达促进喉鳞状细胞癌AMC-HN-8细胞的恶性生物学行为
8
作者 兰利利 牛云峰 +3 位作者 胡国斌 刘猛 徐玉茹 王晶田 《中国肿瘤生物治疗杂志》 CAS CSCD 北大核心 2024年第6期558-565,共8页
目的:本研究旨在探讨转录因子HOXC13在喉鳞状细胞癌(LSCC)中的表达、功能及可能的调控机制。方法:常规培养LSCC细胞,将其分为sh-NC组、sh-HOXC13组、pcDNA3.1-NC组、pcDNA3.1-HOXC13组、pcDNA3.1-PCNA组和sh-HOXC13+pcDNA3.1-PCNA组,用... 目的:本研究旨在探讨转录因子HOXC13在喉鳞状细胞癌(LSCC)中的表达、功能及可能的调控机制。方法:常规培养LSCC细胞,将其分为sh-NC组、sh-HOXC13组、pcDNA3.1-NC组、pcDNA3.1-HOXC13组、pcDNA3.1-PCNA组和sh-HOXC13+pcDNA3.1-PCNA组,用转染试剂将相应核酸和质粒转染各组细胞。用数据库数据分析HOXC13mRNA在LSCC组织中的表达;收集2019年1月至2022年12月在联勤保障部队第九八〇医院耳鼻咽喉头颈外科手术切除的62对LSCC组织及配对的癌旁组织,免疫组织化学法检测中国人LSCC组织中HOXC13蛋白的表达,qPCR检测中国人LSCC组织、癌旁组织以及各组细胞中HOXC13和PCNAmRNA的表达,MTS法检测各组AMC-HN-8细胞的增殖能力,平板克隆实验检测各组AMC-HN-8细胞的克隆形成能力,Transwell小室实验检测各组AMC-HN-8细胞的迁移和侵袭能力,双萤光素酶报告基因实验和染色质免疫沉淀技术(ChIP)验证HOXC13与PCNA之间的结合关系。结果:HOXC13和PCNA在LSCC组织和细胞中均呈高表达(P<0.05或P<0.01)且两者的表达水平呈正相关(P<0.01),HOXC13的表达水平与TNM分期有明显关联(P<0.01)。敲减HOXC13可明显抑制AMC-HN-8细胞的增殖、迁移和侵袭能力(均P<0.01),过表达HOXC13则促进TU686细胞的增殖、迁移和侵袭能力(均P<0.01)。HOXC13可与PCNA启动子区结合并调控其转录。敲低PCNA可部分逆转HOXC13对AMC-HN-8细胞的恶性生物学行为的促进作用(均P<0.01)。结论:HOXC13通过上调PCNA促进LSCC细胞的恶性生物学行为,HOXC13是LSSC临床诊断和治疗的潜在靶点。 展开更多
关键词 转录因子 HOXC13 喉鳞状细胞癌 amc-HN-8细胞 增殖 侵袭 迁移 PCNA
在线阅读 下载PDF
Performance Analysis of an AMC System with an Iterative V-BLAST Decoding Algorithm
9
作者 Sangjin RYOO Kyunghwan LEE Intae HWANG 《International Journal of Communications, Network and System Sciences》 2008年第2期119-123,共5页
In this paper, the iterative Vertical-Bell-lab Layered Space-Time (V-BLAST) decoding algorithm of an Adaptive Modulation and Coding (AMC) system is proposed, and the corresponding MIMO scheme is analyzed. The proposed... In this paper, the iterative Vertical-Bell-lab Layered Space-Time (V-BLAST) decoding algorithm of an Adaptive Modulation and Coding (AMC) system is proposed, and the corresponding MIMO scheme is analyzed. The proposed decoding algorithm adopts iteratively extrinsic information from a Maximum A Posteriori (MAP) decoder as an a priori probability in the two decoding procedures of the V-BLAST scheme of ordering and slicing in an AMC system. Furthermore, the performance of the proposed decoding algorithm is compared with that of a conventional V-BLAST decoding algorithm and a Maximum Likelihood (ML) decoding algorithm in the combined system of an AMC scheme and a V-BLAST scheme. In this analysis, each MIMO schemes are assumed to be parts of the system for performance improvement. 展开更多
关键词 ITERATIVE V-BLAST Decoding MAP DECODER amc STD Turbo Code
在线阅读 下载PDF
A Study on Scalable Video Coding for AMC with Mobile Media-Based Multicast over WiMAX 802.16e
10
作者 Tzu-Kai Cheng Feng-Ming Yang Jean-Lien C. Wu 《International Journal of Communications, Network and System Sciences》 2010年第4期385-394,共10页
Adaptive Modulation and Coding (AMC), which is a technology used when channel condition changes, is adapted in Mobile Worldwide Interoperability for Microwave Access (WiMAX). Scalable Video Coding (SVC) is a video cod... Adaptive Modulation and Coding (AMC), which is a technology used when channel condition changes, is adapted in Mobile Worldwide Interoperability for Microwave Access (WiMAX). Scalable Video Coding (SVC) is a video coding scheme used for different users with bandwidth level. SVC encodes a video into a number of layers. Users receive different number of encoded layers based on their channel condition. In this paper, Intermediate Control Server (ICS) is proposed to deal with the signaling between multimedia server and BS. Both AMC and SVC are employed to enhance the user perceived video quality in the system. 展开更多
关键词 amc SVC SERVER SIGNALING 802.16e Mobile WIMAX
在线阅读 下载PDF
基于AMC的高增益高平坦度偶极子天线
11
作者 陈昱洁 刘佳丽 +3 位作者 窦江玲 沈韬 宋健 王青旺 《微波学报》 CSCD 北大核心 2024年第S1期32-35,共4页
本文提出了一种加载人工磁导体(AMC)反射板的高增益偶极子天线。天线由一对交叉偶极子和AMC反射器组成。首先利用AMC的同相反射特性在保持低剖面的同时获得了较高的增益,同时在AMC反射板的介质基板和金属反射地板之间增加空气层等效增... 本文提出了一种加载人工磁导体(AMC)反射板的高增益偶极子天线。天线由一对交叉偶极子和AMC反射器组成。首先利用AMC的同相反射特性在保持低剖面的同时获得了较高的增益,同时在AMC反射板的介质基板和金属反射地板之间增加空气层等效增加介质板厚度,展宽AMC单元的同相反射带宽。然后为了改善天线的阻抗匹配和增益的平坦度,在偶极子的辐射臂上进行凹槽处理。此外为了避免馈线相互交叉造成匹配调节不便的问题,馈电采用了交叉耦合结构。测试结果表明,天线的阻抗带宽为4.59~5.24GHz(13.22%),天线增益具有高平坦度且峰值增益为9.9dBi。 展开更多
关键词 amc 高增益 高平坦度
在线阅读 下载PDF
洁净室内AMC治理方法研究
12
作者 王雄 刘菊 《制冷与空调(四川)》 2024年第1期148-154,共7页
气态分子级污染物(Airborne Molecular Continent,AMC)是影响洁净室生产环境的主要因素之一,因此控制洁净室内AMC浓度成了半导体行业发展的关键问题之一。分别从“防”与“治”两个方面阐述了有效控制室内AMC浓度的方法,提供了室外新风... 气态分子级污染物(Airborne Molecular Continent,AMC)是影响洁净室生产环境的主要因素之一,因此控制洁净室内AMC浓度成了半导体行业发展的关键问题之一。分别从“防”与“治”两个方面阐述了有效控制室内AMC浓度的方法,提供了室外新风的不同处理方式及应用场景,提供了洁净室内装修材料选用的标准及依据,研究了面板行业敏感度较高的VOCs(Volatile Organic Compounds)的相关处理方式及应用场景,为后续相关洁净室设计提供了参考及工程实际意义。 展开更多
关键词 洁净室设计 amc VOCS
在线阅读 下载PDF
Intrusion Detection Model Using Chaotic MAP for Network Coding Enabled Mobile Small Cells
13
作者 Chanumolu Kiran Kumar Nandhakumar Ramachandran 《Computers, Materials & Continua》 SCIE EI 2024年第3期3151-3176,共26页
Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),a... Wireless Network security management is difficult because of the ever-increasing number of wireless network malfunctions,vulnerabilities,and assaults.Complex security systems,such as Intrusion Detection Systems(IDS),are essential due to the limitations of simpler security measures,such as cryptography and firewalls.Due to their compact nature and low energy reserves,wireless networks present a significant challenge for security procedures.The features of small cells can cause threats to the network.Network Coding(NC)enabled small cells are vulnerable to various types of attacks.Avoiding attacks and performing secure“peer”to“peer”data transmission is a challenging task in small cells.Due to the low power and memory requirements of the proposed model,it is well suited to use with constrained small cells.An attacker cannot change the contents of data and generate a new Hashed Homomorphic Message Authentication Code(HHMAC)hash between transmissions since the HMAC function is generated using the shared secret.In this research,a chaotic sequence mapping based low overhead 1D Improved Logistic Map is used to secure“peer”to“peer”data transmission model using lightweight H-MAC(1D-LM-P2P-LHHMAC)is proposed with accurate intrusion detection.The proposed model is evaluated with the traditional models by considering various evaluation metrics like Vector Set Generation Accuracy Levels,Key Pair Generation Time Levels,Chaotic Map Accuracy Levels,Intrusion Detection Accuracy Levels,and the results represent that the proposed model performance in chaotic map accuracy level is 98%and intrusion detection is 98.2%.The proposed model is compared with the traditional models and the results represent that the proposed model secure data transmission levels are high. 展开更多
关键词 Network coding small cells data transmission intrusion detection model hashed message authentication code chaotic sequence mapping secure transmission
在线阅读 下载PDF
The Application of Nicotiana benthamiana as a Transient Expression Host to Clone the Coding Sequences of Plant Genes
14
作者 Jianzhong Huang Peng Jia +3 位作者 Xiaoju Zhong Xiuying Guan Hongbin Zhang Honglei Ruan 《American Journal of Molecular Biology》 CAS 2024年第2期54-65,共12页
Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using co... Coding sequences (CDS) are commonly used for transient gene expression, in yeast two-hybrid screening, to verify protein interactions and in prokaryotic gene expression studies. CDS are most commonly obtained using complementary DNA (cDNA) derived from messenger RNA (mRNA) extracted from plant tissues and generated by reverse transcription. However, some CDS are difficult to acquire through this process as they are expressed at extremely low levels or have specific spatial and/or temporal expression patterns in vivo. These challenges require the development of alternative CDS cloning technologies. In this study, we found that the genomic intron-containing gene coding sequences (gDNA) from Arabidopsis thaliana, Oryza sativa, Brassica napus, and Glycine max can be correctly transcribed and spliced into mRNA in Nicotiana benthamiana. In contrast, gDNAs from Triticum aestivum and Sorghum bicolor did not function correctly. In transient expression experiments, the target DNA sequence is driven by a constitutive promoter. Theoretically, a sufficient amount of mRNA can be extracted from the N. benthamiana leaves, making it conducive to the cloning of CDS target genes. Our data demonstrate that N. benthamiana can be used as an effective host for the cloning CDS of plant genes. 展开更多
关键词 coding Sequence Genomic Sequence Nicotiana benthamiana Plant Genes
在线阅读 下载PDF
A quantum blind signature scheme based on dense coding for non-entangled states
15
作者 邢柯 殷爱菡 薛勇奇 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期220-228,共9页
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot... In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage. 展开更多
关键词 quantum blind signature dense coding non-entanglement Hadamard gate
在线阅读 下载PDF
Decoding topological XYZ^(2) codes with reinforcement learning based on attention mechanisms
16
作者 陈庆辉 姬宇欣 +2 位作者 王柯涵 马鸿洋 纪乃华 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第6期262-270,共9页
Quantum error correction, a technique that relies on the principle of redundancy to encode logical information into additional qubits to better protect the system from noise, is necessary to design a viable quantum co... Quantum error correction, a technique that relies on the principle of redundancy to encode logical information into additional qubits to better protect the system from noise, is necessary to design a viable quantum computer. For this new topological stabilizer code-XYZ^(2) code defined on the cellular lattice, it is implemented on a hexagonal lattice of qubits and it encodes the logical qubits with the help of stabilizer measurements of weight six and weight two. However topological stabilizer codes in cellular lattice quantum systems suffer from the detrimental effects of noise due to interaction with the environment. Several decoding approaches have been proposed to address this problem. Here, we propose the use of a state-attention based reinforcement learning decoder to decode XYZ^(2) codes, which enables the decoder to more accurately focus on the information related to the current decoding position, and the error correction accuracy of our reinforcement learning decoder model under the optimisation conditions can reach 83.27% under the depolarizing noise model, and we have measured thresholds of 0.18856 and 0.19043 for XYZ^(2) codes at code spacing of 3–7 and 7–11, respectively. our study provides directions and ideas for applications of decoding schemes combining reinforcement learning attention mechanisms to other topological quantum error-correcting codes. 展开更多
关键词 quantum error correction topological quantum stabilizer code reinforcement learning attention mechanism
在线阅读 下载PDF
Recurrent neural network decoding of rotated surface codes based on distributed strategy
17
作者 李帆 李熬庆 +1 位作者 甘启迪 马鸿洋 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第4期322-330,共9页
Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error corre... Quantum error correction is a crucial technology for realizing quantum computers.These computers achieve faulttolerant quantum computing by detecting and correcting errors using decoding algorithms.Quantum error correction using neural network-based machine learning methods is a promising approach that is adapted to physical systems without the need to build noise models.In this paper,we use a distributed decoding strategy,which effectively alleviates the problem of exponential growth of the training set required for neural networks as the code distance of quantum error-correcting codes increases.Our decoding algorithm is based on renormalization group decoding and recurrent neural network decoder.The recurrent neural network is trained through the ResNet architecture to improve its decoding accuracy.Then we test the decoding performance of our distributed strategy decoder,recurrent neural network decoder,and the classic minimum weight perfect matching(MWPM)decoder for rotated surface codes with different code distances under the circuit noise model,the thresholds of these three decoders are about 0.0052,0.0051,and 0.0049,respectively.Our results demonstrate that the distributed strategy decoder outperforms the other two decoders,achieving approximately a 5%improvement in decoding efficiency compared to the MWPM decoder and approximately a 2%improvement compared to the recurrent neural network decoder. 展开更多
关键词 quantum error correction rotated surface code recurrent neural network distributed strategy
在线阅读 下载PDF
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
18
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
在线阅读 下载PDF
On Zero Dynamics and Controllable Cyber-Attacks in Cyber-Physical Systems and Dynamic Coding Schemes as Their Countermeasures
19
作者 Mahdi Taheri Khashayar Khorasani Nader Meskin 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第11期2191-2203,共13页
In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose condition... In this paper, we study stealthy cyber-attacks on actuators of cyber-physical systems(CPS), namely zero dynamics and controllable attacks. In particular, under certain assumptions, we investigate and propose conditions under which one can execute zero dynamics and controllable attacks in the CPS. The above conditions are derived based on the Markov parameters of the CPS and elements of the system observability matrix. Consequently, in addition to outlining the number of required actuators to be attacked, these conditions provide one with the minimum system knowledge needed to perform zero dynamics and controllable cyber-attacks. As a countermeasure against the above stealthy cyber-attacks, we develop a dynamic coding scheme that increases the minimum number of the CPS required actuators to carry out zero dynamics and controllable cyber-attacks to its maximum possible value. It is shown that if at least one secure input channel exists, the proposed dynamic coding scheme can prevent adversaries from executing the zero dynamics and controllable attacks even if they have complete knowledge of the coding system. Finally, two illustrative numerical case studies are provided to demonstrate the effectiveness and capabilities of our derived conditions and proposed methodologies. 展开更多
关键词 Controllable attacks cyber-physical systems(CPS) dynamic coding zero dynamics attacks stealthy cyber-attacks
在线阅读 下载PDF
Improved Segmented Belief Propagation List Decoding for Polar Codes with Bit-Flipping
20
作者 Mao Yinyou Yang Dong +1 位作者 Liu Xingcheng Zou En 《China Communications》 SCIE CSCD 2024年第3期19-36,共18页
Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved s... Belief propagation list(BPL) decoding for polar codes has attracted more attention due to its inherent parallel nature. However, a large gap still exists with CRC-aided SCL(CA-SCL) decoding.In this work, an improved segmented belief propagation list decoding based on bit flipping(SBPL-BF) is proposed. On the one hand, the proposed algorithm makes use of the cooperative characteristic in BPL decoding such that the codeword is decoded in different BP decoders. Based on this characteristic, the unreliable bits for flipping could be split into multiple subblocks and could be flipped in different decoders simultaneously. On the other hand, a more flexible and effective processing strategy for the priori information of the unfrozen bits that do not need to be flipped is designed to improve the decoding convergence. In addition, this is the first proposal in BPL decoding which jointly optimizes the bit flipping of the information bits and the code bits. In particular, for bit flipping of the code bits, a H-matrix aided bit-flipping algorithm is designed to enhance the accuracy in identifying erroneous code bits. The simulation results show that the proposed algorithm significantly improves the errorcorrection performance of BPL decoding for medium and long codes. It is more than 0.25 d B better than the state-of-the-art BPL decoding at a block error rate(BLER) of 10^(-5), and outperforms CA-SCL decoding in the low signal-to-noise(SNR) region for(1024, 0.5)polar codes. 展开更多
关键词 belief propagation list(BPL)decoding bit-flipping polar codes segmented CRC
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部