首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
This paper discusses optimal binary codes and pure binary quantum codes created using Steane construction. First, a local search algorithm for a special subclass of quasi-cyclic codes is proposed, then five binary quasi-cyclic codes are built. Second, three classical construction methods are generalized for new codes from old such that they are suitable for constructing binary self-orthogonal codes, and 62 binary codes and six subcode chains of obtained self-orthogonal codes are designed. Third, six pure binary quantum codes are constructed from the code pairs obtained through Steane construction. There are 66 good binary codes that include 12 optimal linear codes, 45 known optimal linear codes, and nine known optimal self-orthogonal codes. The six pure binary quantum codes all achieve the performance of their additive counterparts constructed by quaternary construction and thus are known optimal codes.  相似文献   

2.
Cyclic codes form an important class of codes. They have very interesting algebraic structure. Furthermore, they are equivalent to many important codes, such as binary Hamming codes, Golay codes and BCH codes. Minimal codewords in linear codes are widely used in constructing decoding algorithms and studying linear secret sharing scheme. In this paper, we show that in the binary cyclic code all of the codewords are minimal, except 0 and 1. Then, we obtain a result about the number of minimal codewords in the binary cyclic codes.  相似文献   

3.
The performance of code tracking loop in direct sequence spread spectrum system decreases because of multi-access interference.In order to solve this problem,this paper presents a new code discriminator based on barycenter algorithm.By calculating the barycenter of code phase by multiple PN code branches’correlation results,PN code phase error can be obtained.Theoretical analysis of new discriminator’s performance is given,and it is indicated that the code tracking loop using this algorithm can also solve the problems of low ranging precision and large mean deviation caused by multi-access interference.The efciency of the proposed algorithm is verified by simulation and measurements and the new discriminator is used in an aerospace engineering project successfully.  相似文献   

4.
Aiming to fill a gap in traditional methods of source code documentation, which focus mainly on the API (application programming interface) documentation for other programmers, this article presents a new approach for business requirements, mapping them through a set of annotations. These annotations, in turn, are interpreted by the GaiaDoc tool, which is specified in this paper and is able to generate documentation in form of use case specifications in a language and format easily understandable by the project stakeholders. Along with the GaiaDoc tool proposal, a RUP (rational unified process) based requirements flow is developed to fit with its needs and it is validated through CMMI (capability maturity model integration) requirement process areas and a case study of the proposed methodology's application is presented before the final considerations.  相似文献   

5.
Phase extraction, phase unwrapping and phase to height conversion are consecutive steps within the fringe projection method for reconstruction of 3D objects. The procedure of determining discontinuities on the wrapped phase, resolving them and achieving the unwrapped phase is called phase unwrapping. A software system was developed that provides the ability to create many kinds of patterns with a verity of desirable properties suitable for different demands in fringe projection systems. In our previous work, an experimental study was reported based on a multi-wavelength unwrapping approach. In the following work, we implemented a new method called binary code pattern unwrapping that is based on time analysis. A comparison of the two unwrapping approaches in terms of resolution, quality, noise, depth accuracy, and computational cost is provided.  相似文献   

6.
The APP (Application) store at the Android market is very popular and attractive for most of current smart phone users. A rotary ring type of APP named as Loving SML (Loving Sun-Moon Lake--"爱上日月谭") is an instant information capturer to capture the instant traffic tourism information (info) services and serve as an interactive device for user to know the instant traffic information of SML area where you may want to go. The tourism service is specialized on i3 travel, which is identified as innovation, intelligent, and interesting for all of the visitors coming from all over the world. The captured instant information is provided by the sightseeing cloud from SML-NSA (National Scenic Area) with the integration of infrastructure of VD (vehicle detector), CMS or VMS (changeable (or variable) message sign), CCTV (closed circuit television), AVI (automatic vehicle identification). The technique of AR (augmented reality) is also used to identify how many sparkling places in front of you that you may visit. One can easily know the road performance ahead from you before you plan a trip.  相似文献   

7.
软件的开发及维护过程中经常要对代码进行搜索。基于关键字匹配的代码搜索面临与传统信息检索一样的问题,即用户查询关键字与代码文本用词不匹配。为提高代码搜索精度,需要挖掘软件中的语义相关词进行查询扩展。本文针对软件工程领域设计了一种基于Word Embedding的语义相关词挖掘方法,并且采用IT技术问答网站Stack Overflow的文档作为语料库训练得到了共包含19332个单词的语义相关词表。与前人工作的对比实验验证了本文方法挖掘的语义相关词能有效提高代码搜索精度。  相似文献   

8.
克隆代码是指在软件源程序中存在的相同或相似的代码片段。克隆代码在很多软件工程中,例如程序理解,代码质量分析,剽窃检测,漏洞查找和病毒检测,都需要通过找出语义或语法上相似的代码片段来实现。目前常用的检测方法有四种:基于文本(text-based)的检测,基于字符序列(token-based)的检测,基于语法树(tree-based)的检测和基于关系图(PDG-based)的检测。基于字符序列的克隆检测首先对源程序进行预处理转换,再经过匹配算法得到克隆检测结果。克隆代码的检测是软件分析的一个重要的部分。  相似文献   

9.
克隆代码是指在软件源程序中存在的相同或相似的代码片段。克隆代码在很多软件工程中,例如程序理解,代码质量分析,剽窃检测,漏洞查找和病毒检测,都需要通过找出语义或语法上相似的代码片段来实现,目前常用的检测方法有四种:基于文本(text—based)检测,基于字符序列(token-based)的检测,基于语法树(tree-based)的检测和基于关系图(PDG—based)的检测。基于字符序列的克隆检测首先对源程序进行预处理转换,再经过匹配算法得到克隆检测结果:克隆代码的检测是软件分析的一个重要的部分。  相似文献   

10.
A new low-power, area efficiency all-digital delay-locked loop (ADDLL) circuit is proposed for DDR3 application. The ADDLL can process the input clock frequency ranging from 333 MHz to 800 MHz (DDR3- 667/800/1066/1600) by using Phase Detector (PD), Delay Control Delay Line (DCDL), Digital Loop Filter Controller (DLFC) and Delay Generator (DG). To achieve 1.6 Gb/s/pin operation, a novel DCDL scheme is employed. The DCDL has a small delay with a shunt capacitor based digitally controlled delay element. A split- control thermometer-code generator generates the control voltages used to set a current in the current-starved inverters. The testchip fabricated with a 40-nm CMOS process gives the ADDLL data rate of 667 Mbps- 1.6 Gbps. Experimental results that show the power consumption is 1.87 mW at 1.1 V with active area is 0.0137 mm2.  相似文献   

11.
为解决航空发动机数控系统中复杂控制算法开发难度大、周期长的问题,提出基于Matlab及其自动代码生成功能进行机载嵌入式控制算法快速开发的方法。针对航空发动机数控系统中常用的DSP和VxWorks实时平台,以典型算法LQR控制器和卡尔曼滤波器为例,分别利用Embedded Matlab和Simulink/RTW进行实时代码开发。解决了其中的代码提取、修改和移植等关键技术问题,实现控制算法跨平台开发的无缝过渡和高效移植。试验表明,提出的航空发动机数控系统控制算法的快速开发方法具有可行性和高效性。  相似文献   

12.
Complex dynamics testing system for UAV can be constructed based on the virtual instrument and the software is the core LabVIEW is a graphical-based programming language with a convenient user interaction and shorter development cycle than the text-based programming language. This paper uses LabVIEW as the software development platform of the dynamics testing system for UAV. The idea of software engineering is used in the design of the testing system for UAV, and then is used to improve the reliability, stability and scalability of the testing system. The experimental results show that this system is practical, convenient to operate, able to meet the needs of the engineering and teaching for UAV research and development.  相似文献   

13.
In today's process-centered business organization, it is imperative that enterprise information system must be converted from task-centered to process-centered system. However, traditional software development methodology is function-oriented, in which each function manages its own data and it results in redundancy because data that belongs to one object are stored by several functions. Proposed in this paper is a process-driven software development methodology, in which business process is a major concern and workflow functionalities are identified and specified throughout the entire development life cycle. In the proposed methodology, the development process, modeling tools and deliverables are clarified explicitly. Proposed methodology can be a guideline to practitioners involved in enterprise software development, of which workflow is an essential part.  相似文献   

14.
This paper presents the model of a static synchronous condenser (STATCOM) which is controlled externally by a newly designed power oscillation controller (POC) for the improvements of power system stability and damping effect of an on line power system. The proposed POC consists of two controllers (power oscillation damping & proportional integral derivative PID & POD). PID parameters have been optimized by Zigler Necles close loop tuning method. Machine excitation has been controller by using excitation controller as required. Both single phase and three phase faults has been considered in the research. In this paper, a power system network is considered which is simulated in the phasor simulation method & the network is simulated in three steps: without STATCOM, with STATCOM but no externally controlled, STATCOM with POC. Simulation result shows that without STATCOM, the system parameters become unstable during faults. When STATCOM is imposed in the network, then system parameters become stable. Again, when STATCOM is controlled externally by POC controllers, then system voltage & power becomes stable in faster way then without controller It has been observed that the STATCOM ratings are only 20 MVA with controllers and 200 MVA without controllers. Therefore, STATCOM with POC controllers are more effective to enhance the voltage stability and increases power transmission capacity of a power system. So STATCOM with POC & excitation controllers, the system performance is greatly enhanced.  相似文献   

15.
In this article, the results were presented of research concerning the visual and functional aspects of the websites of three largest logistics operators in Poland. The research was carried out with the participation of the following three groups: institutional customers, individual customers and marketing management students. The article covers an attempt to evaluate cooperation through virtual contacts with the company. The analysis also concerned such issues as information on corporate social responsibility (CSR), information on job offers and the position of the company on the market.  相似文献   

16.
Searching for relevant code in the local code base is a common activity during software maintenance. However, previous research indicates that 88% of manually composed search queries retrieve no relevant results. One reason that many searches fail is existing search tools’ dependence on string matching algorithms, which cannot find semantically related code. To solve this problem by helping developers compose better queries, researchers have proposed numerous query recommendation techniques, relying on a variety of dictionaries and algorithms. However, few of these techniques are empirically evaluated by usage data from real-world developers. To fill this gap, we designed a multi-recommendation system that relies on the cooperation between several query recommendation techniques. We implemented and deployed this recommendation system within the Sando code search tool and conducted a longitudinal field study. Our study shows that over 34% of all queries were adopted from recommendation; and recommended queries retrieved results 11% more often than manual queries.  相似文献   

17.
Stochastic and deterministic versions of a discrete dynamical network system are investigated. This network consists of a sequence of contours NSWE with nodes, which are common points atN, W, S and E. There are four cells and a particle on each contour At each time instance, the particle occupies a cell, and attempts to occupy the next cell in the same direction. Particles of neighboring contours move in accordance with some rules. Both deterministic and stochastic rules are considered. The behavior of the model with the first rule is stochastic only at the beginning, and after a time interval the system becomes to pure deterministic. The system with the second rule comes to a steady state, which depends on the initial state. The average velocity of particles and other characteristics of the system are studied.  相似文献   

18.
In order to tolerate possible leakage of secret keys, leakage-resilient cryptosystem models a class of attractive leakage output by allowing an adversary to provide any computable leakage function and learning the partial keys or other possible intemal states from the output of function. In this work, we present an adaptively secure broadcast encryption resilient to key continual leakage in the standard model. Our scheme provides the tolerance of continual leakage, in which any user can generate multiple private keys per user by periodically updating the key. We use the dual system encryption mechanism to implement the leakage resilience and adaptive security, and intrinsically set an algorithm to refresh a key and produce a same distributed new key. We also give the evaluation of the leakage bound and leakage fraction, and the simulations show that our scheme can tolerate about 71% leakage fraction with 3.34× 10^-52 failure probability in standard 80-bit security level when we adjust the leakage factor to allow the private key to be 100 Kb.  相似文献   

19.
根据有限域Fq上的MDS码与接近MDS码,提出F2+vF2环上的MDR码与接近MDR码,其中包括几乎MDR码。利用环F2+vF2与域F2中加法群的一个同态 ,根据映线性码的生成矩阵证明C是F2+vF2上MDR码,当且仅当q(C)为F2上的MDS码,C是R上的接近MDR码,q(C)为F2上的接近MDS码,并由此给出环F2+vF2上MDR码与接近MDR码的构造方法及具体实例。  相似文献   

20.
Meeting deliverable deadline is a critical issue for successful organization. Last minute adjustments characterize software development due to many reasons including not testing thoroughly. XP (Practicing Extreme Programming), which is an agile software development methodology, gives rise to the issue of pair programming. This paper aims at discussing the strengths and weaknesses of an Extreme Programming methodology by examining the characteristics of the 12 software development practices of the XP methodology. Working together will incur in a highly reliable functionalities to release. Furthermore, moving people around will allow the team to keep track of the whole project.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号