-
41
Full-diversity design criterion for multi-user STBC based on integer-forcing detection
Published 2019-03-01“…Multi-user space time block code systems have the problem of high decoding complexity.To ensure good system performance with low decoding complexity at the same time,low complexity integer-forcing (IF) detection algorithm was applied to multi-user space time block code.Then the upper bound of error probability for IF detection was derived by minimizing the equivalent noise power.To obtain good multi-user space time block code when decoded with IF detection,a full-diversity design criterion was proposed.It was proved that full diversity could be achieved if every user’s space time block code had property of non-vanishing singular value.Simulation result shows that the code gain is found related to the minimum singular value.…”
Get full text
Article -
42
Full-diversity design criterion for multi-user STBC based on integer-forcing detection
Published 2019-03-01“…Multi-user space time block code systems have the problem of high decoding complexity.To ensure good system performance with low decoding complexity at the same time,low complexity integer-forcing (IF) detection algorithm was applied to multi-user space time block code.Then the upper bound of error probability for IF detection was derived by minimizing the equivalent noise power.To obtain good multi-user space time block code when decoded with IF detection,a full-diversity design criterion was proposed.It was proved that full diversity could be achieved if every user’s space time block code had property of non-vanishing singular value.Simulation result shows that the code gain is found related to the minimum singular value.…”
Get full text
Article -
43
Extensible hierarchical codec semantic communication system
Published 2023-08-01“…Aiming at the problem that most current researches on text semantic communication mainly rely on simulation system for theoretical verification, an extensible hierarchical semantic communication system was proposed by taking advantage of the separation of hierarchical encoding and decoding architecture in semantic level and grammatical level.The system was compatible with the reliable communication technology under the framework of Shannon information through the mode of semantic and syntactic separation, and realized the nested combination of semantic communication and traditional communication.Furthermore, a universal and extensible verification system was built based on the software radio platform to verify the proposed semantic communication system architecture.The verification system took semantic communication software platform as the driving core of hardware drive and algorithm call, integrated the whole process of signal generation, information transmission, data acquisition, decoding and evaluation at the receiving end, and could be further extended for semantic and syntactic level.Finally, the text semantic communication was tested based on this verification system, which verified that it had higher validity and reliability than the traditional communication mode.…”
Get full text
Article -
44
Neural representation of consciously seen and unseen information
Published 2025-03-01“…They were asked to discriminate the orientation of the grating, and report whether they had perceived it or not. Participants’ EEG signal was recorded while performing the task and was then analysed by using ML algorithms to decode distinctive task-related parameters. …”
Get full text
Article -
45
Comparison of FORCE trained spiking and rate neural networks shows spiking networks learn slowly with noisy, cross-trial firing rates.
Published 2025-07-01“…Moreover, our findings suggest that the decoding solutions learned by FORCE for spiking networks approximate a cross-trial firing rate-based decoding.…”
Get full text
Article -
46
The Genetic and Environmental Foundation of the Simple View of Reading in Chinese.
Published 2012-01-01“…In addition, sentence comprehension had a stronger genetic correlation with word reading while passage comprehension showed a trend of stronger genetic overlap with vocabulary. …”
Get full text
Article -
47
Gestão ambiental urbana, diferente em cidades planejadas? O caso de três cidades brasileiras
Published 2008-11-01“…The cities in question had been constructed at different times. Goiania was founded in 1933, Brasilia in 1960 and Palmas in 1989. …”
Get full text
Article -
48
Engaging short film activity that supports learning, science identity, and nature of science comprehension
Published 2025-04-01“…The focus of our curricular intervention is two short films that explore personal histories and research narratives: Decoding Ancestral Knowledge and CRISPR Apostle. We assigned students (N = 286) in a large, asynchronous, online general microbiology course to watch Decoding and CRISPR at distinct times in the semester. …”
Get full text
Article -
49
An intelligent comprehensive scoring approach based on improved differential evolution algorithm
Published 2025-03-01“…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
Get full text
Article -
50
An intelligent comprehensive scoring approach based on improved differential evolution algorithm
Published 2025-03-01“…Secondly, an intelligent comprehensive scoring approach had been proposed based on improved differential evolution algorithm, which introduced the following three improvements to the traditional differential evolution algorithm framework: a real encoding and decoding method was developed based on the score weights. …”
Get full text
Article -
51
Exploring fonts as retrieval cues in text-based learning
Published 2024-11-01“…Contrary to expectations, using the same font for encoding and decoding did not improve learning performance. Furthermore, learners did not report higher levels of mental effort when they had to work on learning questions presented in the same font as the learning texts. …”
Get full text
Article -
52
Mediation and Mediators in Carlos Morton’s The Miser of Mexico and Trumpus Caesar
Published 2023-11-01“…This paper aims towards identifying those protagonists who occupy the position of mediator in the process of decoding the message by uniting detached ideologies in Carlos Morton’s The Miser of Mexico (1989) and Trumpus Caesar (2021). …”
Get full text
Article -
53
Imago proelii. La cartografia storica della Prima Guerra Mondiale dal Museo Storico della Terza Armata: spigolature per una analisi tipologica e semiologica
Published 2021-04-01“…Following this line, the essay presents the cartographic corpus of the historical archive of the Terza Armata (Third Army); the Terza Armata had a fundamental role in the conflict, settling on the Piave river after Caporetto and leading the final advance towards Istria. …”
Get full text
Article -
54
Rhythm training improves word-reading in children with dyslexia
Published 2025-05-01“…The children were in 2nd to 5th grade and had been in school for more than 3 years. The exclusion criteria were reading or writing remediation during the past 12 months, previous use of Mila-Learn, and severe chronic illness. …”
Get full text
Article -
55
Recognizing induced emotions of happiness and sadness from dance movement.
Published 2014-01-01“…Recent research revealed that emotional content can be successfully decoded from human dance movement. Most previous studies made use of videos of actors or dancers portraying emotions through choreography. …”
Get full text
Article -
56
Shaping Green Choices: How Sensory Cues Drive Behavior of Wood-Plastic Composites
Published 2025-03-01“…By decoding the behavioral mechanisms underlying material perception, this study pioneers a sensory nudging strategy to accelerate the adoption of sustainable materials. …”
Get full text
Article -
57
La fluidité : un moyen pour évaluer la compréhension de l’écrit
Published 2025-06-01“…Abstract We found that average 4th grade students had difficulty accessing the meaning of texts, even though official guidelines stated that they were able to understand all types of writing. …”
Get full text
Article -
58
Computationally secure steganography based on speech synthesis
Published 2022-06-01“…The steganography theory of computing security has been proposed for a long time, but it has not been widely adopted for mainstream steganography using multimedia data as a carrier.The reason is that the prerequisite for calculating secure steganography is to obtain the accurate distribution of the carrier or to accurately sample according to the carrier distribution.However, naturally collected images and audio/video cannot meet this prerequisite.With the development of deep learning technology, various machine-generated media such as image generation and synthesized speech, have become more and more common on the Internet and then generated media has become a reasonable steganography carrier.Steganography can use normal generated media to cover up secret communications, and pursue in distinguishability from normal generated media.The distribution learned by some generative models is known or controllable, which provides an opportunity to push computational security steganography for practical use.Taking the widely used synthetic speech model as an example, a computationally secure symmetric key steganography algorithm was designed and implemented.The message was decompressed into the synthetic audio according to the decoding process of arithmetic coding based on the conditional probability of sample points, and the message receiver had the same generation model to complete the message extraction by reproducing the audio synthesis process.The public key steganography algorithm was additionally designed based on this algorithm, which provided algorithmic support for the realization of full-flow steganographic communication.Steganographic key exchange ensured the security of steganographic content and the security of steganographic behavior was also achieved.The theoretical analysis showed that the security of the proposed algorithm is determined by the randomness of the embedded message.And the steganography analysis experiment further verified that the attacker cannot distinguish the synthesized carrier audio from the encrypted audio.…”
Get full text
Article -
59
Hive Relocation Does Not Adversely Affect Honey Bee (Hymenoptera: Apidae) Foraging
Published 2013-01-01“…We moved three colonies housed in observation hives onto the campus from a site 26 km away and compared their foraging performance to three similarly sized colonies at the same location that had not been moved. We obtained data on (1) foraging performance by calculating distance by decoding waggle dances, (2) hive foraging rate by counting forager departure rate, (3) forage quality by assessing sugar content of nectar from returning foragers, and (4) forager success by calculating the proportion of bees returning to the nest entrance with nectar in their crop. …”
Get full text
Article -
60
The aesthetic effect of vocal recitation in building the theatrical image
Published 2023-08-01“…And secondly: - The aesthetic effect of vocal recitation in the artwork is represented as a tool for transforming the manifestations of the show and contributing to its visual construction, leading to a social reading that allows decoding the symbols and codes of the theatrical show. …”
Get full text
Article