scispace - formally typeset
Search or ask a question
Journal

Journal of China Institute of Communications 

Ren min yu dian chu ban she
About: Journal of China Institute of Communications is an academic journal. The journal publishes majorly in the area(s): Signal & Network packet. Over the lifetime, 568 publications have been published receiving 2010 citations.

Papers published on a yearly basis

Papers
More filters
Journal Article
TL;DR: A decoding rule, based on the Max-Log-APP (MLA) formulation, which requires a total of only 20 addition-equivalent operations per information bit, per iteration is presented.
Abstract: This paper presents a new family of error-correcting codes called zigzag codes, which has very low-complexity soft-in/soft-out decoding rules.We present a decoding rule, based on theMax-Log-MAP(MLM) formulation, which requires a total of only 20 addition-equivalent-operations per information bit, per iteration. Simulation of a concatenated zigzag code yields a bit error rate(BER) of 10-5 at 0.9dB and 1.4dB away from the Shannon theoretical limit by optimal and low-cost sub-optimal decoders, respectively. Furthermore, these codes appear to have lower error floors than comparabletwo-dimensional turbo codes.

68 citations

Journal Article
TL;DR: This article raises a new method to implement the image segmentation automatically based on the PCNN model and the entropy of image by selecting the criterion of maximal entropy of segmented binary image of PCNN output.
Abstract: Pulse-coupled neural network(PCNN) based on Eckhorn抯 model of the cat visual cortex find many applications in image processing, including segmentation, edge extraction et al. As all known, the performance of the image segmentation depends not only directly on the adjustment of PCNN parameters and the statistical properties of image but also on the cyclic iteration times N of PCNN. If the parameters have been properly set, it turns out to be essential to select a suitable criterion to determine N. While N is usually determined by means of visual judgement which decreases the efficient of PCNN image segmentation. This article raises a new method to implement the image segmentation automatically based on the PCNN model and the entropy of image. It is the criterion of maximal entropy of segmented binary image of PCNN output. According to this criterion, the iteration times, N, is determined automatically.

67 citations

Journal Article
TL;DR: The article discusses the contents of risk assessment, for example: present situation, models, standards, methods, process, then introduces information security test and evaluation system and analyzes the problems existing in Risk Assessment and the future prospect.
Abstract: In the information security engineering, Risk Assessment plays an important part. It is the basis of the information system security systematism. The article discusses in detail the contents of risk assessment, for example: present situation, models, standards, methods, process, then introduces information security test and evaluation system, finally, the paper analyzes the problems existing in Risk Assessment and the future prospect.

52 citations

Journal Article
TL;DR: The architecture, characteristics and application fields of wireless sensors network are briefly introduced and some hot spots including media access control protocols, power-aware routing schemes and nodes location are presented in detail.
Abstract: The architecture, characteristics and application fields of wireless sensors network are briefly introduced. Some hot spots including media access control protocols, power-aware routing schemes and nodes location are presented in detail. Open issues and development intends of sensors network are also discussed.

42 citations

Journal Article
TL;DR: Experimental results show that the evaluation method proposed can reflect node importance determined by the network topology more precisely and can reflect the most vital nodes more precisely.
Abstract: An evaluation method for node importance in communication networks is proposed, the concise generalized expressions are given. The relative importance of two groups of nodes in the graph can be compared with respect to the number of spanning trees. The most vital nodes are those whose removal with their incident links most drastically decreases the number of spanning trees. Experimental results show that the method is simple and can reflect node importance determined by the network topology more precisely.

34 citations

Network Information
Related Journals (5)
Journal of Communications
2.2K papers, 16K citations
78% related
Computer Engineering
10K papers, 19.5K citations
78% related
Journal of Systems Engineering and Electronics
2.4K papers, 17.9K citations
77% related
Journal of Computer Research and Development
3.1K papers, 13.6K citations
77% related
China Communications
2.3K papers, 26.9K citations
74% related
Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2005122
2004130
2003100
200289
200168
200057