Showing 1 - 7 results of 7 for search '"Ōnin"', query time: 0.03s Refine Results
  1. 1

    Construction method of optimal codebook based on Zadoff-Chu matrix by Yubo LI, Shengyi LIU, Jingjing ZHANG, Dongyan JIA

    Published 2020-03-01
    “…Codebooks with low-coherence have wide utilization in code division multiple access (CDMA) communications,quantum information theory,compressed sensing and so on.In order to expand the number of codebooks,the restrictions on the transformation matrix were relaxed.Based on the Zadoff-Chu matrix,new codebooks were constructed using the difference set,almost difference set,and finite field character sum.The proposed codebooks were optimal or near optimal according to the Welch bound or Levenstein bound.Through experimental simulation,it is found that the deterministic measurement matrices constructed using these codebooks also have good performance in the process of compressed sensing.…”
    Get full text
    Article
  2. 2

    Practical group signature scheme with verifier-local revocation by LI Ji-guo, SUN Gang, ZHANG Yi-chen

    Published 2011-01-01
    “…An efficient approach of member revocation in group signature is verifier-local revocation.In this approach,revocation messages are only sent to signature verifiers,while signers have no involvement.There are some problems in group signature with verifier-local revocation;for example,some group signature schemes do not have exculpability and the computation cost of revocation check is dependent on the length of the revocation list,and so on.In order to solve above problems,and aim at the application of group signatures for enabling privacy-preserving attestation,a practical group signature scheme with verifier-local revocation based on the strong Diffie-Hellman assumption and decision linear Diffie-Hellman assumption,which was proven to be secure in the random Oracle model was proposed.The efficiency of the proposed scheme was analyzed.Compared with the existing verifier-local revocation group signatures,the computa-tion cost of revocation check in the scheme is independent of the length of the revocation list.At the same time,the scheme satisfies exculpability and backward unlinkability.…”
    Get full text
    Article
  3. 3

    Satellite remote sensing and the integration of 6G communication and remote sensing by Wenjia XU, Yixu WANG, Mugen PENG

    Published 2023-04-01
    “…Satellite remote sensing is an important means for humans to achieve high-resolution earth observation, and it has gradually become an important component supporting economic and social development as well as national defense and security.6G pursues deep integration of communication, perception, and computation, and communication and remote sensing integration has become an important feature of it.The development of satellite remote sensing at home and abroad were reviewed, the existing system architecture of satellite remote sensing systems and the integrated system architecture of communication and remote sensing in the 6G era were outlined, and the typical satellite remote sensing technologies and the latest research progress driven by artificial intelligence were elaborated on.In response to the trend of integrating satellite communication and remote sensing in the 6G era, the technical challenges and development trends of realizing the combination of “one satellite, multiple uses, multi-satellite networking, multi-network integration, and intelligent services” were discussed.…”
    Get full text
    Article
  4. 4

    Service mesh technology evaluation and integration scheme based on telecom operator perspective by Liyun YAN, Xinzhang YANG, Zhenwei HE, Yuanzhi LIN, Shaoxin HOU

    Published 2020-06-01
    “…Microservice architecture has evolved along with the changes in enterprise software architecture,from the embedded and integrated micro-service architecture to the non-intrusive and decoupled service mesh.The various of micro-service architectures have sprung up.Choose which microservice architecture to integrate has become an important part of the layout of microservices for the telecom operators.The evaluation and integration of service mesh (non-intrusive architecture) technologies based on the operator’s business characteristics was focused on.In the evaluation,choose the open source,mainstream service mesh technologies and cloud service provider’s microservice solutions were compared and analyzed from multiple dimensions,and the development trend of microservice technology and architecture was obtained.The integration category focused on the integration of Istio technology and Kubernetes which were mainstream technologies in their respective fields,and a heterogeneous microservice framework and development ideas that supported complex scenarios was innovatively proposed.Finally,combined with the differentiated needs of operators’ 5G SBA services,the key research and optimization directions of the operator’s service mesh technology were probed.…”
    Get full text
    Article
  5. 5

    Short-term traffic flow prediction based on adaptive rank dynamic tensor analysis by Lingchao HE, Dong LIN, Xinxin FENG

    Published 2019-09-01
    “…Short-term traffic flow prediction in intelligent transportation system can provide data support in areas such as route planning,traffic management,public safety and so on.In order to improve the prediction accuracy with missing and abnormal data,a short-term traffic flow prediction method based on the adaptive rank dynamic tensor analysis was proposed.Firstly,a four dimensional tensor consisted of week,day,time and space was constructed,which could excavate the multimodal correlation of traffic flow data.Secondly,tensor flow data with dynamic structure was formed by using sliding window model.The principal component analysis (PCA) algorithm was extended to an offline tensor analysis algorithm that could accept tensor input.Then the adaptive rank and the forgetting factor were introduced to generate an adaptive rank dynamic tensor analysis algorithm.Finally,the tensor stream data was inputted into the adaptive rank dynamic tensor analysis algorithm to realize the short-term traffic flow prediction.The experimental results show that a good prediction can be achieved even with data missing.…”
    Get full text
    Article
  6. 6

    Improving machine learning predictions to estimate fishing effort using vessel's tracking data by J. Samarão, A. Moreno, M.B. Gaspar, M.M. Rufino

    Published 2025-03-01
    “…This information can identify areas with high fishing density, warranting protection of their main fishing grounds against other users (i.e. ocean grabbing), while also signalling potential stock depletion requiring management interventions and preserving the ecosystems from which these fisheries depend on.In this study, we propose a series of steps to enhance the performance of Machine Learning algorithms in estimating fishing effort. …”
    Get full text
    Article
  7. 7

    LC-MS based analysis reveal antimicrobial compounds from Gabonese pharmacopoeia: chemical characterisation and cytotoxicity evaluation by Elvis Otogo N’nang, Elvis Otogo N’nang, Paulin N. Essone, Judicael Ella Ndong, Augustin Boueya, Kossiwa Kokou, Richard Kriz, Richard Kriz, Marie Andrée N’nengué, Félix Ovono Abessolo, Bertrand Lell, Peter G. Kremsner, Peter G. Kremsner, Selidji T. Agnandji, Selidji T. Agnandji

    Published 2025-01-01
    “…Eight (8) of these belong to the quinovic acid-type triterpenoid sap-onins identified in the aqueous extract of H. ledermannii, eleven (11) are dibenzofurans, chroman and stigmasterol detected in the methanolic extract of S. ochocoa and eight (8) compounds in the methanolic extract of D. gossweileri are friedelin, drypemolundein B and gossweilone, to name but a few. …”
    Get full text
    Article