Showing 521 - 540 results of 1,322 for search '"bit"', query time: 0.06s Refine Results
  1. 521

    Clustering scheme of base stations cooperation based on maximizing the average system performance by Kun LI, Kai-zhi HUANG, Jiang JI, Tao FENG, Yan-qing JIN

    Published 2012-11-01
    “…A novel clustering scheme based on maximizing average system performance was proposed.Firstly,according to the probability distribution of signal-to-interference-ratio (SIR)gain of base stations cooperation the average SIR gains were obtained.Then,the cluster structure was generated in the standard of maximizing the average system performance.Not only the average system performance was guaranteed but also the influence of CSI distortion was decreased,while the overall cost was reduced.Simulation results show that when the factors of CSI distortion and channel vibration both are 0.3,the proposed scheme provide a 0.7bit/s/Hz/cell increase of the average system performance compared with the benefit-tree clustering scheme.…”
    Get full text
    Article
  2. 522

    Improvement of Channel Coding System in Narrowband Communication System by Yanjun Wang, Jing Yue, Xue Cui

    Published 2013-05-01
    “…However,the requirement of higher transmission power in tactical environment of long distance transmission and higher quality of communication,results in additional energy loss,limited transmission range and relatively high bit error rate in receiver. High quality channel coding can achieve the same communication quality with lower power consumption,improving the performance of the whole system. …”
    Get full text
    Article
  3. 523

    Raison d’agir des écologistes océaniques : du golfe de Biscaye à la mer de Patagonie by Milo Villain

    Published 2021-05-01
    “…We propose the idea that its meaning can be grasped by studying the activists’ experiences, which could inform us a bit more about the modern individual subjectivity and ethic. …”
    Get full text
    Article
  4. 524

    Retrospectives on Turkish Studies in Canada by Ahmet Murat Kadıoğu, Çağatay Benhür

    Published 2016-10-01
    “…After more than 15 years of this study, making it a bit more specific, we refer to the work done Turcology in Canadian universities today. …”
    Get full text
    Article
  5. 525

    Wyner-Ziv spatial scalable video coding using compressive sensing in ubiquitous networks by GAN Zong-liang, QI Li-na, TANG Gui-jin, ZHU Xiu-chang

    Published 2010-01-01
    “…A novel Wyner-Ziv spatial scalable video coding using compressive sensing was proposed for the ubiquitous networks.At the encoder,both the base layer and enhancement layer encode the video signal independent,in which down-sampling video was coded by H.264 in the based layer and original video was coded with adaptive compressive sensing measurement,quantization and entropy coding in the enhancement layer.At the decoder,the base layer and enhancement layer jointly recovered the video signal using compressive sensing approach based on joint sparse model of inter frames.Theoretical analysis and experimental results show that the proposed video coding method can flexibly adjust the bit stream,and has better rate-distortion performance and the robustness of transmission.…”
    Get full text
    Article
  6. 526

    An overview of low resolution quantization in wireless communication system by Dan QIAO, Chaokai WEN, Feifei GAO, Shi JIN

    Published 2017-06-01
    “…Compared to the 4th generation (4G) mobile communication technology,the 5th generation (5G) mobile communication technology will provide tens of times of peak rate increase,reaching up to several thousands megabit per second.The coming wireless communication systems face the problems of expensive hardware cost and high power consumption,which is becoming a bottleneck of high-rate communication systems.To cope with these problems,redesigning communication systems with the receiver using finite precision analog-to-digital converters (ADC) is one possible approach.The analysis of recent information theory for the AWGN channel shows that the performance loss due to 2~3 bit ADC acceptable.The application of low resolution quantization in wireless communication systems was focused on,an overview of the channel capacity and receiver design under low-precision ADC was provided.…”
    Get full text
    Article
  7. 527

    Anomaly detection of large scale network based on data streams by ZHENG Jun, HU Ming-zeng, YUN Xiao-chun, ZHENG Zhong

    Published 2006-01-01
    “…The anomaly detection algorithms of the large scale network(LSN) were required to analysis the vast network traffic of G bit level in real-time and on-the-fly.A novel monitoring mechanism of LSN anomaly detection based on the data stream approach was proposed.The main contributions included: the sketch data structure and the frequent sketch algorithm of data streams were designed for anomaly detection of LSN.Optimized query methods were designed for customizing the security monitoring and detection policy with the correlations of multi data streams.The data reduction was proposed to make it possible that the whole network traffic character could be got using a few of special data streams.The experiments of the real networking environments validate the effectivity of LSN anomaly detection methods.…”
    Get full text
    Article
  8. 528

    Shopping for Health: A Menu for One by Morgan Denhard, Wendy Dahl

    Published 2013-04-01
    “…Whether you pop a dish into the microwave after a busy day or spend time cooking a special meal for yourself, shopping for and preparing healthy, low-cost meals for one can be easy and enjoyable with just a little bit of planning. This 4-page fact sheet was written by Morgan Denhard and Wendy Dahl and published by the UF Department of Food Science and Human Nutrition, February 2013. …”
    Get full text
    Article
  9. 529

    Test Research of Low Temperature Property of Chain Material by Lu Jiguang, Wang Lili, Wei Yibo, Shao Weixian

    Published 2016-01-01
    “…The result show that the breaking load of the LH1034 plate chain under the condition of- 40 ℃ low temperature is a bit higher than 10 ℃,and the impact property of the materials under the low temperature is significantly reduced.…”
    Get full text
    Article
  10. 530

    Nonlinear error modified equalization algorithm in high-order modulation of satellite communication by Cheng-kai TANG, Ling-ling ZHANG, Bao-wang LIAN

    Published 2017-01-01
    “…Aiming at the larger computation and the slower speed of nonlinear error compensation of traditional equalization algorithms,the fast nonlinear error equalization algorithm with amplitude and phase separation was constructed.It combined the feedback equalization to reduce the computational complexity respectively.In order to eliminate nonlinear interference and memory interference,the algorithm utilized the Volterra model to modify the error and it was adapted to update the feedback equalization parameters.The theoretical analysis and simulation compared proposed algorithm and existing conventional equalization algorithms from the bit error rate,convergence speed and computational complexity.The results show that the computational complexity is only equivalent to 14.1%~24.9% of other algorithms and proposed method can cancel the nonlinear interference quickly.…”
    Get full text
    Article
  11. 531

    Blind recognition of short linear block code based on the weight of common polynomial by Lihua SHEN, Jianlin ZHANG

    Published 2017-06-01
    “…According to the problem of a short linear block code in communication signal processing,an algorithm based on the maximal weight of common polynomial was proposed.Firstly,the received code sequence was divided with different lengths.Then the common polynomial of code words and x<sup>n</sup>+1 was obtained and filtered.The code length was estimated by the number of common polynomials.The weight was defined according to the probability of polynomial,and the generator polynomial was recovered according to the maximal weight.The validity and the performances of the blind recognition method were illustrated by the computer simulation results.The correct recognition rate of the algorithm is higher than that of the existing algorithms under the same bit error rate,and the method is applicable for both short codes and normal codes.…”
    Get full text
    Article
  12. 532

    Improvement and evaluation for algebraic fault attacks on PRESENT by Jing HUANG, Xin-jie ZHAO, Fan ZHANG, Shi-ze GUO, Ping ZHOU, Hao CHEN, Jian YANG

    Published 2016-08-01
    “…An enhanced algebraic fault analysis on PRESENT was proposed.Algebraic cryptanalysis was introduced to build the algebraic equations for both the target cipher and faults.The equation set of PRESENT was built reversely in order to accelerate the solving speed.An algorithm of estimating the reduced key entropy for given amount of fault injec-tions was proposed,which can evaluate the resistance of PRESENT against fault attacks under different fault models.Fi-nally,extensive glitch-based fault attacks were conducted on an 8-bit smart card PRESENT implemented on a smart card.The best results show that only one fault injection was required for the key recovery,this is the best result of fault attacks on PRESENT in terms of the data complexity.…”
    Get full text
    Article
  13. 533

    Impulsive noise mitigation based on iteration adaptive approach in underwater acoustic communication by Guili ZHOU, Youming LI, Mingchen YU, Xiaoli WANG

    Published 2017-11-01
    “…Focusing on the impulsive noise mitigation in underwater acoustic communication,an impulsive noise mitigation method based on iteration adaptive approach was proposed.Firstly,by utilizing the orthogonality of the subcarriers in OFDM system,both the impulsive noise and background noise were separated from the signals.Then null tones matrix was used to construct a steering matrix and get the impulsive noise interference covariance matrix.Furthermore,a cost function based on weighted least squares approach was proposed and a close form expression for the impulsive noise was derived.Finally,the impulsive noise was mitigated by substracting the estimation of the impulse noise in the received signal.Simulation results show that the proposed algorithm can reduce the bit error rate (BER) efficiently and provide better performance,especially in high signal to impulsive noise ratio (SINR) case.…”
    Get full text
    Article
  14. 534

    Analysis of energy efficiency for cooperative beamforming in wireless sensor networks by FAN Jian-cun, YIN Qin-ye, WANG Wen-jie, FENG Ang

    Published 2008-01-01
    “…The energy consumption of cooperative beamforming was studied under given requirements on the end-to-end bit error rate (BER),and the optimal numbers of cooperative node were obtained for different propagation environments and transmission distances. …”
    Get full text
    Article
  15. 535

    374~747 MHz digital tunable microstrip filter by Deng-yao TIAN, Quan-yuan FENG, Qian-yin XIANG

    Published 2016-08-01
    “…A novel digital microstrip tunable bandpass filter based on digitally tunable capacitor loading microstrip open ring resonators was proposed.The novel non-uniform open ring resonances with mixed coupling structure was used to make the coupling coefficient of the resonators increases with the decreasing of resonance frequency and achieve a con-stant absolute bandwidth tunable filter.Then the proposed digital tunable microstrip filters based on 5 bit digitally tunable capacitance was simulated and manufactured.The measurement shows that the −3 dB absolute bandwidth varies from 44~67 MHz while the central frequency of the passband varying from 374~747 MHz,the OIP3 is greater than 50 dBm.…”
    Get full text
    Article
  16. 536

    Evaluation Model and Approximate Solution to Inconsistent Max-Min Fuzzy Relation Inequalities in P2P File Sharing System by Xiao-Peng Yang

    Published 2019-01-01
    “…Considering the requirement of biggest download speed of the terminals, a BitTorrent-like Peer-to-Peer (P2P) file sharing system can be reduced into a system of max-min fuzzy relation inequalities. …”
    Get full text
    Article
  17. 537

    Universally composable oblivious transfer protocol based on VSPH by LI Feng-hua1, FENG Tao1, MA Jian-feng1

    Published 2007-01-01
    “…A new oblivious transfer protocol was proposed within the framework of universally composable security(UC-DT).The protocol based on the verifiably smooth projective hashing(VSPH) is against adaptive adversaries in a common reference string(CRS) model.The UC-OT protocol improves computational efficiency with non-committing encryptions(NCE)which is based on decisional compounding residuosity,achieves UC-OT,and it saves O(n)-1 rounds in communication efficiency than bit-OT protocols.Compared with Canetti’s scheme in non-erase model,the message reduced once.Compared with Fischlin’s scheme,the message transfers were reduced twice,and the scheme does not rely on the auxiliary party,therefore it is more practical.…”
    Get full text
    Article
  18. 538

    Complexity control method of random forest based HEVC by Peng WEN, Zongju PENG, Fen CHEN, Gangyi JIANG, Mei YU

    Published 2019-02-01
    “…High efficiency video coding (HEVC) has high computational complexity,and fast algorithm cannot perform video coding under restricted coding time.Therefore,a complexity control method of HEVC based on random forest was proposed.Firstly,three random forest classifiers with different prediction accuracy were trained to provide various coding configurations for coding tree unit (CTU).Then,an average depth-complexity model was built to allocate CTU complexity.Finally,the CTU coding configuration,determined by the smoothness,average depth,bit,and CTU-level accumulated coding error,was used to complete complexity control.The experimental results show that the proposed method has better complexity control precision,and outperforms the state-of-the-art method in terms of video quality.…”
    Get full text
    Article
  19. 539

    A Novel Secret Sharing Method Based on Binary Sequence by Yexia Cheng, Yuejin Du, Kai Yang, Shen He, Jin Peng, Wen Jiang

    Published 2015-11-01
    “…A novel secret sharing method was proposed based on binary sequence,which was quite different from the traditional secret sharing method.This secret sharing method was based on binary secret sequence using bit operations.The secret here included but not limited to key,message,etc,meanwhile the secret sequence included but not limited to key sequence,message sequence and so on.And two new concepts which were called non-M sequence and non-M sequence rule method were defined.By using the non-M sequence rule method,the elements of sub-secret sequence M' of secret sharing were computed.The method for generating sub-secrets and the method for recovering secret was proposed based on binary sequence.The method was practical and effective.…”
    Get full text
    Article
  20. 540

    Channel Assignment Strategy Based on the Sustained-Transmission Rule of Nodes in Cognitive Radio Sensor Network by Xinbin Li, Zequn Huang, Song Han, Jianmei Chen

    Published 2015-03-01
    “…In order to improve the success rate of data packet transmission in heterogeneous and hierarchical cognitive radio sensor network,the nodes were divided into sustained-transmission and non-sustained-transmission conditions.The ways of improving the success rate of data packet transmission are more energy consumption and better channel assignment,so that there is a type of centralized channel assignment strategies.At the same time,in order to reduce the energy consumption per bit in information transmission process of nodes,the packet size adaptation mechanism was optimized,ensuring the optimal packet size of non-sustained-transmission nodes.Simulation results demonstrate that the channel assignment strategy and the optimization mechanism improve the efficiency of energy utilization and the performance of network.…”
    Get full text
    Article