Results 71 to 80 of about 409,239 (186)

Reduced vascular leakage correlates with breast carcinoma T regulatory cell infiltration but not with metastatic propensity

open access: yesMolecular Oncology, EarlyView.
A mouse model for vascular normalization and a human breast cancer cohort were studied to understand the relationship between vascular leakage and tumor immune suppression. For this, endothelial and immune cell RNAseq, staining for vascular function, and immune cell profiling were employed.
Liqun He   +8 more
wiley   +1 more source

Rateless Polar-Spinal Coding Scheme With Enhanced Information Unequal Error Protection

open access: yesIEEE Access, 2019
In this paper, a rateless coding scheme with enhanced unequal error protection (UEP) property is proposed by concatenating the systematic polar code (SPC) and spinal code, where SPC is used as the outer code and spinal code is the inner code.
Hao Liang   +3 more
doaj   +1 more source

Low-Complexity CRC Aided Joint Iterative Detection and SCL Decoding Receiver of Polar Coded SCMA System

open access: yesIEEE Access, 2020
As the fifth-generation (5G) wireless networks' key technology, the joint design of SCMA and polar code is concerned by the future communication system. In this paper, a CRC aided joint iterative detection and successive cancellation list (SCL) decoding (
Xi Wu, Yafeng Wang, Chuanfeng Li
doaj   +1 more source

How to Achieve the Capacity of Asymmetric Channels

open access: yes, 2018
We survey coding techniques that enable reliable transmission at rates that approach the capacity of an arbitrary discrete memoryless channel. In particular, we take the point of view of modern coding theory and discuss how recent advances in coding for ...
Hassani, S. Hamed   +2 more
core   +1 more source

Three-dimensional calculation of shuttle charging in polar orbit [PDF]

open access: yes, 1985
The charged particles environment in polar orbit can be of sufficient intensity to cause spacecraft charging. In order to gain a quantitative understanding of such effects, the Air Force is developing POLAR, a computer code which simulates in three ...
Cooke, D. L.   +4 more
core   +1 more source

A Novel Interleaving Scheme for Polar Codes

open access: yes, 2016
It's known that the bit errors of polar codes with successive cancellation (SC) decoding are coupled. We call the coupled information bits the correlated bits.
Hu, Yanjun, Li, Liping, Meng, Ya
core   +1 more source

Bit-Permuted Coded Modulation for Polar Codes [PDF]

open access: yes2017 IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2017
We consider the problem of using polar codes with higher order modulation over AWGN channels. Unlike prior work, we focus on using modulation independent polar codes. That is, the polar codes are not re-designed based on the modulation used. Instead, we propose bit-permuted coded modulation (BPCM): a technique for using the multilevel coding (MLC ...
openaire   +2 more sources

Does Gaussian Approximation Work Well for the Long-Length Polar Code Construction?

open access: yesIEEE Access, 2017
Gaussian approximation (GA) is widely used to construct polar codes. However, when the code length is long, the subchannel selection inaccuracy due to the calculation error of conventional approximate GA (AGA), which uses a two-segment approximation ...
Jincheng Dai   +4 more
doaj   +1 more source

Polar codes for distributed hierarchical source coding

open access: yesAdvances in Mathematics of Communications, 2015
We show that polar codes can be used to achieve the rate-distortion functions in the problem of hierarchical source coding also known as the successive refinement problem. We also analyze the distributed version of this problem, constructing a polar coding scheme that achieves the rate distortion functions for successive refinement with side ...
Ye, Min, Barg, Alexander
openaire   +2 more sources

Hash-Polar Codes With Application to 5G

open access: yesIEEE Access, 2019
This paper presents a kind of concatenated polar codes called hash-polar codes with flexible outer code lengths, in which a hash function-based encoder is used as an outer encoder.
Peiyao Chen   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy