期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Full Diversity Reception Based on Dempster-Shafer Theory for Network Coding with Multiple-Antennas Relay 被引量:1
1
作者 SUN Yanhua YANG Yi +1 位作者 LI Yonghua ZHANG Yanhua 《China Communications》 SCIE CSCD 2015年第10期76-90,共15页
In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-S... In this paper,a two-way relay system which achieves bi-directional communication via a multiple-antenna relay in two time slots is studied.In the multiple access(MA) phase,the novel receive schemes based on Dempster-Shafer(D-S) evidence theory are proposed at the relay node.Instead of traditional linear detection,the first proposed MIMO-DS NC scheme adopts D-S evidence theory to detect the signals of each source node before mapping them into network-coded signal.Moreover,different from traditional physical-layer network coding(PNC) based on virtual MIMO model,the further proposed MIMO-DS PNC comes from the vector space perspective and combines PNC mapping with D-S theory to obtain network-coded signal without estimating each source node signal.D-S theory can appropriately characterize uncertainty and make full use of multiple evidence source information by Dempster's combination rule to obtain reliable decisions.In the broadcast(BC) phase,the space-time coding(STC) and antenna selection(AS) schemes are adopted to achieve transmit diversity.Simulation results reveal that the STC and AS schemes both achieve full transmit diversity in the BC phase and the proposed MIMO-DS NC/PNC schemes obtain better end-to-end BER performance and throughputs compared with traditional schemes with a little complexity increasing and no matter which scheme is adopted in the BC phase,MIMO-DS PNC always achieves full end-to-end diversity gain as MIMO-ML NC but with a lower complexity and its throughput approaches the throughput of MIMO-ML NC in high SNR regime. 展开更多
关键词 network coding MIMO-DS NC/PNC Dempster-Shafer evidence theory twoway multiple antennas relay system
在线阅读 下载PDF
Mathematical Analysis and Simulation of Secure Information Transmission and Processing Model
2
作者 Ren Quan Wu Jiangxing He Lei 《China Communications》 2025年第3期181-201,共21页
The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically dem... The security of information transmission and processing due to unknown vulnerabilities and backdoors in cyberspace is becoming increasingly problematic.However,there is a lack of effective theory to mathematically demonstrate the security of information transmission and processing under nonrandom noise(or vulnerability backdoor attack)conditions in cyberspace.This paper first proposes a security model for cyberspace information transmission and processing channels based on error correction coding theory.First,we analyze the fault tolerance and non-randomness problem of Dynamic Heterogeneous Redundancy(DHR)structured information transmission and processing channel under the condition of non-random noise or attacks.Secondly,we use a mathematical statistical method to demonstrate that for non-random noise(or attacks)on discrete memory channels,there exists a DHR-structured channel and coding scheme that enables the average system error probability to be arbitrarily small.Finally,to construct suitable coding and heterogeneous channels,we take Turbo code as an example and simulate the effects of different heterogeneity,redundancy,output vector length,verdict algorithm and dynamism on the system,which is an important guidance for theory and engineering practice. 展开更多
关键词 coding theory information systems mod-eling non-random noise security proof
在线阅读 下载PDF
Some Results on Minimum Aberration Mixed-level (2~r)2~n Factorial Designs
3
作者 SHI Cheng-tang ZHANG Dan +1 位作者 CHEN Bao-ting LI Yu-kai 《Chinese Quarterly Journal of Mathematics》 CSCD 北大核心 2007年第1期79-86,共8页
Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In ... Mukerjee and Wu(2001) employed projective geometry theory to find the wordlength pattern of a regular mixed factorial design in terms of its complementary set, but only for the numbers of words of length 3 or 4. In this paper, by introducing a concept of consulting design and based on the connection between factorial design theory and coding theory, we obtain some combinatorial identities that relate the wordlength pattern of a regular mixed-level (2^r)2^n factorial design to that of its consulting design. Consequently, a general rule for identifying minimum aberration (2^r)2^n factorial designs through their consulting designs is established. It is an improvement and generalization of the related result in Mukerjee and Wu(2001). 展开更多
关键词 coding theory consulting design minimum aberration MIXED-LEVEL REGULAR wordlength pattern
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部