Showing 621 - 640 results of 1,322 for search '"bit"', query time: 0.27s Refine Results
  1. 621

    Massive unsourced multiple access scheme based on block sequence codebook and compressed sensing by Jing ZHANG, Lin MA, Chulong LIANG, Hongxu GAO

    Published 2023-12-01
    “…A massive unsourced multiple access scheme based on block sequence codebook and compressed sensing was proposed for sporadic burst scenario in massive machine type communication (mMTC).Firstly, a large-capacity spreading codebook generation scheme was designed according to a specific shift pattern, thus the codebook space was expanded.Secondly, the sparse structure of uplink signal was combined with multi-carrier technology to support overlapping transmission of multi-user data on some subcarriers, thus the spectral efficiency was improved.Finally, a multi-carrier CS-MUD model was established, and a group orthogonal matching pursuit algorithm based on codebook sequence blocks was designed to achieve the joint detection of active users and their uplink data.Simulation results show that the proposed scheme can effectively reduce the bit error rate of massive random access.…”
    Get full text
    Article
  2. 622

    Performance optimization method of GFDM system based on WFRFT spectral precoding by Zhenduo WANG, Zhaohui WANG, Ruoyu ZHANG

    Published 2023-10-01
    “…Generalized frequency division multiplexing (GFDM) system always faces challenges related to out-of-band (OOB) power leakage and a high peak-to-average power ratio (PAPR).Through an in-depth analysis of power spectrum characteristics of spectrally precoded GFDM systems, a universal spectral precoding (SP) framework based on the weighted fractional Fourier transform (WFRFT) was established.A two-dimensional parameter-adjustable WFRFT-SP-GFDM system was introduced.By flexibly configuring the parameters, the WFRFT spectral precoder could be made to approximate the weighted fractional Fourier transform matrix, achieve precise control over OOB power and PAPR.Simulation results indicate that, when compared to conventional GFDM and WFRFT-GFDM waveforms, the WFRFT-SP-GFDM waveform effectively suppresses OOB power leakage, while maintaining favorable PAPR and bit error rate (BER) performance.…”
    Get full text
    Article
  3. 623

    Statistical ineffective fault analysis of the lightweight authenticated cipher algorithm Saturnin-Short by Wei LI, Chun LIU, Dawu GU, Wenqian SUN, Jianning GAO, Mengyang QIN

    Published 2023-04-01
    “…On the random single byte-oriented fault model and the assumption of ciphertext-only attack, a statistical ineffective fault analysis of the Saturnin-Short cipher was proposed.The analysis combined the statistical distribution with the ineffective analysis, and discussed the difference between intermediate states before and after fault injections.A variety of dual distinguishers was designed, such as the probabilistic symmetric Chi-square-maximum likelihood estimate, and harmonic mean-Hamming weight.It only required at least 1 097 ineffective faults to recover the 256 bit secret key with a success rate of at least 99%.The experimental results show that the proposed distinguishers can not only decrease fault injections, but also reduce the attacking time and complexities.Therefore, the Saturnin-Short cipher cannot resist against the statistical ineffective fault analysis.It provides an important reference for the security analysis of other lightweight authenticated ciphers.…”
    Get full text
    Article
  4. 624

    PISA 2018 Türkiye Örnekleminde Okuma Becerisini Etkileyen Değişkenlerin Boruta Algoritması ile Belirlenmesi by Sanem Şehribanoğlu

    Published 2024-07-01
    “…Bu çalışmada Boruta algoritması kullanılarak okul türü, kariyer beklentisi, sosyo-ekonomik durum, BİT’e olan ilgi ve aşinalık, üst biliş stratejileri gibi değişkenlerin öğrencilerin okuma becerilerinde öne çıktığı belirlenmiştir.…”
    Get full text
    Article
  5. 625

    Impossible statistical fault analysis of the PRIDE lightweight cryptosystem by Wei LI, Wenqian SUN, Dawu GU, Ailin ZHANG, Yunhua WEN

    Published 2024-01-01
    “…To analyze the implementation security of the PRIDE lightweight cryptosystem proposed at CRYPTO in 2014, a novel method of impossible statistical fault analysis on the ciphertext-only attack assumption was proposed.Furthermore, new distinguishers were designed, such as the Chi-square goodness-of-fit test-Hamming weight, and Chi-square goodness-of-fit test-maximum likelihood estimation.The proposed method had a random nibble-oriented fault model, and combined the statistical distribution states with the impossible relationship.On the difference among the intermediate states before and after the fault injections, at least 432 faults were required to recover the 128 bit secret key of PRIDE with a reliability of at least 99%.The experimental analysis demonstrates that the proposed method can not only reduce injected faults and latency, but also increase the accuracy.The results provide a vital reference for exploring the implementation security of lightweight cryptosystems.…”
    Get full text
    Article
  6. 626

    Blind detection of orthogonal space-time block coding based on ICA schemes by GU Bo1, LIU Ju1, XU Hong-ji1

    Published 2006-01-01
    “…Simulation results for Rayleigh fading channels demonstrated that the two new schemes could enhance the flexibility of the communication system while achieve better bit error rate (BER) performance.…”
    Get full text
    Article
  7. 627

    Mędrzec – ideał dla wybranych? Tożsamość mędrca w Księdze Syracha by Jolanta Judyta Pudełko

    Published 2018-03-01
    “…This calling, while requiring preparation and effort, must not be reduced to one of many – perhaps a bit more prestigious – professions and jobs. In his Book, Sirach shares with the reader his personal experience of acquiring wisdom and “becoming” a sage. …”
    Get full text
    Article
  8. 628

    A SIC and ML approach for MIMO non-orthogonal multiple access signal detection by Arun Kumar, Nishant Gaur, Aziz Nanthaamornphong

    Published 2025-02-01
    “…Additionally, the suggested algorithms are compared with traditional ML, SIC, Zero Forcing (ZF), and Minimum Mean Square Error (MMSE) approaches, and rigorous estimations are made of metrics like Bit Error Rate (BER) and Power Spectral Density (PSD). …”
    Get full text
    Article
  9. 629

    Snake Envenomation Causing Distant Tracheal Myonecrosis by Amina Khimani, Afton Mcnierney, Sara Surani, Salim Surani

    Published 2013-01-01
    “…We hereby present a case of a 42-year-old man who was transferred to our emergency department after a rattlesnake bit him twice. The patient, besides developing local myonecrosis at the site of the snakebite, developed necrosis of the scrotum as well as tracheal pressure myonecrosis at the site of the endotracheal tube balloon. …”
    Get full text
    Article
  10. 630

    Design of amplifying information metasurface for enhancing signal coverage by Lijie WU, Hanqing YANG, Qiang CHENG, Tiejun CUI

    Published 2022-12-01
    “…Traditional information metasurfaces can be used in wireless relay systems to control the propagation direction of electromagnetic waves due to their capability to control the amplitude and phase.However, owing to the lack of signal amplification function, these metasurfaces have a limited operating distance.Thus, a large size of metasurfaces is usually demanded to realize the signal coverage of dead zones.To solve this problem, an amplifying information metasurface was designed to realize the 2 bit phase manipulation and signal amplification function within the broad band from 2.7 to 3.1 GHz.Furthermore, a power dividing and combining network was introduced to combine the 1×8 metasurface elements into an array with only one amplifier, which greatly reduced the number of amplifiers, the hardware cost, and the power consumption.The simulation results indicate that the array can realize beamforming and signal amplification over a broad band.Therefore, the proposed amplifying information metasurface array may find important applications in wireless relay systems and provide a new solution to enhancing the signal coverage and reducing the size of the metasurface array.…”
    Get full text
    Article
  11. 631

    Covert Channel Construction Method Based on HTTP Composite Protocols by Longxing Jin, Zijun Liu, Fuquan Huang, Zizhao Lin, Ming Li

    Published 2022-01-01
    “…Aiming at the problems of low concealment of existing storage-type covert channels, high bit error rate, and low transmission rate of time-type covert channels, this paper proposes a method of constructing covert channels based on HTTP protocol combination. …”
    Get full text
    Article
  12. 632

    Aquaculture Applications of the Family Gobiidae by Matt DiMaggio, Jesse Von Linden, Joshua Patterson, Cortney Ohs

    Published 2020-06-01
    “…DiMaggio and published by the UF/IFAS Program in Fisheries and Aquatic Sciences, School of Forest Resources and Conservation provides a brief overview of the family including description and taxonomy, natural history, culture techniques, a bit about disease challenges, and advice on marketing for ornamental Gobids. …”
    Get full text
    Article
  13. 633

    Region-based lossless data hiding with high capacity for medical images by Xiao-hong DENG, Zhi-gang CHEN, Di-qing LIANG, Yi-min MAO

    Published 2015-01-01
    “…In view of the significant regional features of medical images,a new high capacity lossless data hiding method based on region and histogram shifting was presented.Firstly,the presented method utilized segmentation method of the maximum class separation distance to get the foreground region of medical images,and then used the polymeric polygonal approximation and image fitting algorithm to get the embedding region of region foreground.In the embedding procedure,the difference histogram circular shifting method and the code-based histogram shifting method were presented to embed hidden data in foreground and background region respectively,which improved the limit embedding capacity and resolved the overflow and underflow in traditional histogram shifting method.Experimental results show that the proposed method achieves high embedding capacity with 1 bit/pixel and stego-image quality about 40 dB.The presented method can be applied to the quality of sensitive image's large capacity information hiding with regional feature.…”
    Get full text
    Article
  14. 634

    On Self-Timed Circuits in Real-Time Systems by Markus Ferringer

    Published 2011-01-01
    “…We propose a simple timing model and elaborate a self-adapting circuit which shall derive a suitable notion of time for both bit transmission and protocol execution. We further introduce and analyze our jitter compensation concept, which is a threefold mechanism to keep the asynchronous circuit's notion of time tightly synchronized to the remaining communication participants. …”
    Get full text
    Article
  15. 635

    A genetic algorithm based method of optimizing dispersion matrix for RDSM system by Peng ZHANG, Xiaoping JIN, Dongxiao CHEN

    Published 2022-12-01
    “…Rectangular differential spatial modulation (RDSM) is a multi-antenna incoherent modulation technology with high spectral efficiency, low power consumption, and zero-overhead for channel estimation.RDSM is especially suitable for 6G communication systems, such as fast-moving Internet of vehicles, Internet of things, cellular networks, etc.However, the construction of the sparse rectangular unitary space-time dispersion matrix (DM) at transmitter is a problem.The proposed Genetic algorithm (GA) will result in less computational complexity than the currently used random research.The fitness of GA was calculated by the rank and determinant criterion (RDC) method to avoid discussions in differential system.Due to characteristics of constellation symbols of RDSM, the proposed method reduced the computational complexity during each single iteration in GA.The simulation results show that the optimized DMS can significantly improve the bit error rate (BER) performance of the RDSM system.Compared with random search, the low-complexity GA effectively improves the DMS optimization efficiency of RDSM.The computational complexity required for optimizing DMS is about 0.1% of random search optimization method.…”
    Get full text
    Article
  16. 636

    On-board Multi-User Detection Algorithm Based on Conditional Neural Process by Yilun LIU, Liang JIN, Jiali LI, Lidong ZHU

    Published 2021-12-01
    “…With the characteristics of all-terrain, all-weather and seamless coverage, satellite communications have become a potentially important part of 6G.An important prerequisite for achieving satellite intelligence is that the satellite have on-board processing capabilities.Multi-user detection (MUD) is a classic method of suppressing multiple access interference (MAI) in wireless communication, such as MMSE, Gaussian processregression (GPR) and other algorithms.Due to the inverse matrix required in the detection process, the algorithm complexity is usually cubic, and it is diff cult to directly apply to satellite platforms because of its limited processing capabilities.The conditional neural process combined the characteristics of the low complexity of the neural network and the data-eff cient of the Gaussian process.The neural network was used to parameterized the Gaussian process to avoided the inversion of the matrix, thereby reduced the computational complexity.The application of conditional neural process in MUD was studied.The simulation results showed that, while reduced complexity, conditional neural process also greatly improved the performance of bit error rate (BER).…”
    Get full text
    Article
  17. 637

    Joint channel and impulsive noise estimation method for MIMO-OFDM systems by Xinrong LYU, Youming LI, Qiang GUO

    Published 2021-12-01
    “…Aiming at the impulsive noise occurring in MIMO-OFDM systems, a joint channel and impulsive noise estimation method based on the multiple measurement vector compressed sensing theory was proposed.The channel impulse response and the impulsive noise were combined to form a row sparse matrix to be estimated, and a multiple measurement vector compressed sensing model based on all subcarriers was constructed.As the measurement matrix was partially unknown due to the presence of unknown transmitted symbols in data tones, the multiple response sparse Bayesian learning theory and expectation maximization framework were adopted to jointly estimate the channel impulse response, the impulsive noise, and the data symbols which were regarded as unknown parameters.Compared with the existing methods, the proposed method not only utilizes all subcarriers but also does not use any a priori information of the channel and impulsive noise.The simulation results show that the proposed method achieves significant improvement on the channel estimation and bit error rate performance.…”
    Get full text
    Article
  18. 638

    Companding transform technique combined with iterative filtering for reducing PAPR of OFDM signals by Chao YANG, Yong WANG, Jian-hua GE

    Published 2015-04-01
    “…Considering the drawbacks of the traditional companding transforms,an efficient companding scheme combined with iterative filtering was proposed to reduce the peak-to-average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals.By introducing a joint optimization approach for PAPR and bit error rate (BER) performances along with remaining an unchanged average output power level,the scheme could achieve significant reduction in PAPR as well as an improved BER simultaneously.Moreover,by adaptively adjusting the transform parameters in the iterative process,more design flexibility in companding form and lower out-of-band radiation could also be given to satisfy various system requirements.The proposed scheme had a simple functional form and less computational complexity.The theoretical results regarding the transform gain and impact of companding distortion were derived.Simulation results show that this scheme can substantially offer better overall performances in terms of PAPR reduction,BER performance and bandwidth efficiency.…”
    Get full text
    Article
  19. 639

    Background reference frame generation method for surveillance video based on image block codebook model by Wei ZHANG, Yu WANG, Xinyi CHEN, Yanwen WANG, Qingyang JING, Weimin LEI

    Published 2023-01-01
    “…To solve the problems that the background reference frames are seriously contaminated by the foreground, and the bit rate increases suddenly incurred by the one-time transmission of the background frames, a progressive background frame generation method with image block as the basic unit was proposed for surveillance video application.An image block codebook model based on clustering was formulated.The image blocks at the same position in the video sequence were effectively clustered by using perceptual hash-based element matching.The background symbol was accurately detected by using the characteristics of the background image area.A complete background frame was produced by extracting the background blocks in different frames based on the codebook model.Experimental results demonstrate that the proposed method achieves 17.89% coding efficiency for luma component compared with standard HM16.20, and can effectively improve the quality of the produced background reference frame.Besides, the proposed method complexity meets the real-time requirements of video applications.…”
    Get full text
    Article
  20. 640

    Sampling method for IDS in high bandwidth network by NING Zhuo1, GONG Jian1, GU Wen-jie1

    Published 2009-01-01
    “…A novel sampling method,IDSampling,was developed to solve the performance unbalance problem that IDS could not scale well in G+bit/s link,which was adaptive with the consumption of the memory bottleneck.With the help of the heuristic messages,such as the entropy of the single-packet flow and the flow length,IDSampling applied the simple sampling strategy based on the entropy of the single-packet flow when the large-scale anomaly occurred,or another complicated one instructed by the feedback of the rear detection results by default.In both cases IDSampling tried to guaran-tee the equal security with detection cost as low as it could.The results of experiment show that ①IDSampling keeps IDS effective by cutting off its load significantly when it is overloaded,at the same time it can guarantee the detection accuracy of the large-scale attack;②Comparing with the other two overwhelming sampling methods,the random packet sampling and the random flow sampling,the number of attack packets sampled by IDSampling is higher than that of the former two,the number outweighs the former two one order of magnitude especially in the large-scale anomaly case.…”
    Get full text
    Article