Showing 419,881 - 419,900 results of 420,088 for search '"A', query time: 3.63s Refine Results
  1. 419881

    Chaotic sequence based polar code encrypted scheme in negative secrecy capacity case by Xiaohui ZHANG, Shunliang ZHANG, Bowen LI

    Published 2020-10-01
    “…A chaos based encrypted polar coding scheme,which could be applied to the negative secrecy capacity case,was proposed.Chaotic sequences were employed to encrypt the information bits and fill the frozen bits.And multi-block polar coding structure was also employed in the proposed scheme.The proposed scheme was featured as lower complexity and higher secrecy transmission rate.Corresponding mathematical analysis had been performed in terms of the error probability,security and transmission rate.The result reveals that the proposed scheme can achieve reliability,security in negative secrecy capacity case.What’s more,it has relatively low complexity and high secrecy transmission rate compared with the existing schemes.…”
    Get full text
    Article
  2. 419882

    Design Mixers to Minimize Effects of Erosion and Corrosion Erosion by Julian Fasano, Eric E. Janz, Kevin Myers

    Published 2012-01-01
    “…A thorough review of the major parameters that affect solid-liquid slurry wear on impellers and techniques for minimizing wear is presented. …”
    Get full text
    Article
  3. 419883

    Bandwidth extension method based on nonlinear audio characteristics classification by Li-yan ZHANG, Chang-chun BAO, Xin LIU, Xing-tao ZHANG

    Published 2013-08-01
    “…A bandwidth extension method based on audio classification was proposed.Time series of audio signals were classified into four types based on recurrence plot and recurrence quantification analysis,and the fine spectrums were recovered by taking advantage of four methods respectively.In addition,the spectrum envelope and energy gain were adjusted by Gaussian mixture model and codebook mapping on the basis of soft decision respectively.Subjective and objective testing results indicate that the proposed method has good quality compared with conventional blind bandwidth extension methods,and the performance of ITU-T G.722.1 codec with the proposed algorithm is better than that of G.722.1C codec at the same bit rate.…”
    Get full text
    Article
  4. 419884

    Pilot based channel estimation in amplify-and-forward MIMO relay networks by Jian ZHOU, Bao-yu ZHENG

    Published 2014-09-01
    “…A channel estimation method in two time slots for two-hop amplify-and-forward MIMO relay channels is pro-posed.An algorithm for computing the optimal pair of source pilot and relay amplify matrix is developed,which mini-mizes the mean square error of the source-to-relay channel estimation subject to both power constraints at the source and the relay.The signal matrices are decomposed into unitary components and diagonal components.Then the bisection method is used to obtain the optimal diagonal components of the source pilot and the relay amplified matrix.The simula-tion results show that the proposed method has no ambiguity in the channel estimates.The effects of the channel correla-tion and the number of antennas on the performance of channel estimation are also analyed.…”
    Get full text
    Article
  5. 419885

    Study of wireless experiment platform in 60 GHz by Yuannian QIN, Chuan ZOU, Zhaoyu TENG

    Published 2016-03-01
    “…A scheme of 60 GHz wireless experimental platform was presented.The platform was made up of NI USRP(transceiver module),NetFPGA(data processing module)and PC(control module).NI USRP was connected with NetFPGA by Gigabit Nthernet interfaces,while NetFPGA was connected with PC by PCI-bus.This experiment platform works on Linux with the help of LabVIEW.The transceiver and data process module are reprogrammable.Many operations such as data stream capturing,classification and speed limit could be done with Linux and PCI.The platform has good performances in open-ended and expansibility.That would be convenient for farther research in channel modeling,timeslot allocation and multiple access algorithms.…”
    Get full text
    Article
  6. 419886

    Minimal coding cost and low delay multicast routing of wireless mesh networks by gang CHENZhi, jian SHENXiao, Li LIU

    Published 2016-01-01
    “…A minimal network coding cost and low delay multicast routing (MNCLDMR)of wireless mesh networks was presented. …”
    Get full text
    Article
  7. 419887

    Centralized base station sleep algorithm based on non-neighbor relation clustering in dense heterogeneous networks by Yikan CAO, Zhibin XIE, Yajun WANG, Benqi XIA

    Published 2018-05-01
    “…A centralized base station sleeping algorithm based on non-neighbor relation clustering was proposed for dense heterogeneous networks.Firstly,based on the non-neighbor relationship criterion,the low power base stations with no direct switching relationship were clustered into several groups.Then,the low power base station running mode decision mechanism and possible base station sleeping decision mechanism was set according to the energy efficiency mean of base station in each cluster and the position relations between the users and the base station.At last,all clusters run the decision mechanism of inner cluster according to the order of the implementation of sleeping algorithm.The simulation results show that the proposed algorithm has satisfactory network performance.…”
    Get full text
    Article
  8. 419888

    RSU-coordinated multichannel MAC protocol in vehicular ad hoc network by Caixia SONG, Guozhen TAN, Nan DING

    Published 2018-11-01
    “…A road side unit (RSU)-coordinated multichannel media access control (MAC) (RMM) protocol was proposed in vehicular ad hoc network,which aimed to improve the transmission efficiency of non-safety messages.Under the coordination of RSU,nodes had more opportunities to make SCH reservations on control channel,and the contention-free message transmissions were thus realized.The proposed RMM protocol could use the service channel during the whole synchronization interval for non-safety message transmissions,and thus the saturated network throughput and channel utilization were improved,and the transmission delay was reduced.Compared with other existing protocols,extensive analysis and simulation results demonstrate the superiority of the RMM protocol.…”
    Get full text
    Article
  9. 419889

    Task distribution algorithm based on community in mobile crowd sensing by Hao LONG, Shukui ZHANG, Yang ZHANG, Li ZHANG

    Published 2019-10-01
    “…A community-based task distribution algorithm was proposed to solve the problem of the validity of mobile crowd sensing (MCS) task distribution.By calculating the minimum spanning tree (MST),the connection parameter (CP) and the community convergence degree (CI) between the mobile nodes,the behavior patterns of the users were abstracted and identified to rationally divide the nodes into different communities.Then,the eigenvalue matching degree of the community behavior patterns with the sensing task was calculated.According to the matching degree,the distribution of the corresponding tasks was completed by the central node of the community.The simulation results show that the proposed method can effectively improve the accuracy of the task distribution and the task completion rate,and save the time cost of the task completion.…”
    Get full text
    Article
  10. 419890

    On coding over the spatial-temporal diversity for reliable transmission scheme in low-duty-cycle WSN by Yu-bo YAN, Pan-long YANG, Lei ZHANG, Zheng-lun QIU, Shan-lin HONG

    Published 2012-06-01
    “…A reliable data delivery scheme for low-duty-cycle wireless sensor networks(WSN)was proposed.Using this scheme,the unique spatial-temporal diversity in low-duty-cycle WSN was explored and exploited.Combining with coding schemes,the proposed scheme could achieve higher energy efficiency and lower delivery delay.The coding block allocation problem over multiple paths was formulated.As it was NP-hard,an approximate algorithm to tackle this difficulty was proposed.The impact of network parameters was further analyzed with experimental methods.Extensive simulations also show that,the coding over the spatial-temporal diversity scheme could achieve relatively reliable and low delay delivery with relatively less energy.…”
    Get full text
    Article
  11. 419891

    Grid chaotic attractors based on arc tangent and its secure communication by Xue-zhi MAO, Yong XU, Jian-ping LIU, Hui-quan MA

    Published 2014-12-01
    “…A smooth arc tangent function series approach for creating multi-directional multi-scroll grid chaotic attractors was proposed,including one-directional n-scroll,two-directional n×m-grid scroll,and three-directional n×m×l-grid scroll chaotic attractors.The chotic properties were studied by equilibrium points analysis,numerical simulation,Lyapunov exponents spectrum,bifurcation diagrams and Poincaré section diagrams.Synchronize the two grid multi-scroll chaotic systems with same structure by designing simple linear feedback control lows,which is applied to secure communication.The effectiveness of this method has been verified by simple analysis and numerical simulation.…”
    Get full text
    Article
  12. 419892

    Molecular Identification of Enterocytozoon bieneusi Isolates from Nigerian Children by Adekunle Bamidele Ayinmode, Oladele Teslim Ojuromi, Lihua Xiao

    Published 2011-01-01
    “…A study was conducted to detect and identify enteric microsporidian species in 43 children from Oyo state, Nigeria. …”
    Get full text
    Article
  13. 419893

    Nonlinear distortion compensation algorithm aided by channel estimation of memoryless power amplifier for OTFS receiver by Zhanjun JIANG, Huan LIU, Huawei ZHANG, Cuiran LI

    Published 2022-12-01
    “…A compensation algorithm for OTFS receiver was proposed to solve the problem of transmission signal distortion caused by the nonlinear characteristics of power amplifier (PA) in the orthogonal time frequency space (OTFS) system.The channel state information was estimated by Bussgang theorem combined with the complex coefficient polynomial of PA and the average energy of the distortion term.Based on it, the transmitted signal was reconstructed with distortion term and the estimated value was updated for the polynomial normalization.Furthermore, the iterative zero-forcing equalization algorithm was employed to complete adaptive compensation analysis of the nonlinear distortion at the receiver.The results show that the nonlinear influence on transmission signals is reduced, which caused by Saleh and Rapp models, and BER performance of OTFS system is improved effectively.…”
    Get full text
    Article
  14. 419894

    Diagnosis of Cellulitis in the Immunocompromised Host by Charles F Carey, Lawrence Dall

    Published 1990-01-01
    “…A prospective study of diagnostic techniques in cellulitis was performed on 28 patients with malignancy. …”
    Get full text
    Article
  15. 419895

    Location fingerprint optimization based access point deployment in indoor WLAN localization by Mu ZHOU, Qiao-lin PU, Zeng-shan TIAN

    Published 2015-11-01
    “…A novel access point (AP) deployment approach by optimizing the location fingerprints in indoor WLAN localization was proposed.Firstly,constructing the water-filling optimization model based on the maximum of the Euclidean distance of RSS between every two location fingerprints.Secoudly,after the process of the iterative cross-zero adjustment and discrete adjustment,the nonnegative and discrete weights of candidate AP locations were obtained.Finally,by using the criterion of maximum average weight,the APs,and consequently optimize the location fingerprints were deployed rationally.The experimental results demonstrate that the proposed approach is able to achieve high location fingerprint based localization precision,as well as consume low time overhead involved in the optimal AP location searching.…”
    Get full text
    Article
  16. 419896

    Image saliency detection in wavelet domain based on the contrast sensitivity function by Ying-chun GUO, Yan-hong FENG, Gang YAN, Ming YU

    Published 2015-10-01
    “…A method of high definition saliency detection based on contrast sensitive function and wavelet analysis was proposed in order to improve the resolution of saliency maps.Original image was filtered by contrast sensitive function in YCbCr space,which could simulate the contrast of human eyes; then wavelet decomposition was carried out in Y,Cb,and Cr three channels individually,low frequency and high frequency feature saliency maps were extracted and further combined to obtain saliency map in single channel; finally saliency maps in three channels were fused to the high resolution saliency map.Experiments result show that the saliency images have high resolution,well-defined boundaries,and whole highlight salient objects.…”
    Get full text
    Article
  17. 419897

    Optimal coalition structure generation strategy in multi-task concurrent edge computing environment by Shuxu ZHAO, Ping WEI, Xiaolong WANG

    Published 2023-02-01
    “…A discrete recent past-position updating strategy based m-ary discrete particle swarm optimization (MDPSO-DRPPUS) algorithm was proposed for the problem of large search space and low efficiency when solving the optimal coalition structure.First, the coalition structure with index-based was coded.Then, the multi-objective optimization problem was transformed into an eigenvalue function of the coalition structure.Finally, the optimal coalition structure was searched by using the MDPSO-DRPPUS algorithm.Experiments show that compared with the m-ary discrete particle swarm optimization (MDPSO) algorithm and genetic algorithm (GA), the proposed algorithm dramatically reduces the average running time, and improves the efficiency and equilibrium of the coalition structure and task completion efficiency of edge nodes.…”
    Get full text
    Article
  18. 419898

    Nonlinear robust precoding for coordinated multipoint transmission by Zhe-qi GU, Zhong-pei ZHANG

    Published 2015-10-01
    “…A nonlinear robust precoding algorithm was proposed,which redesigned the feedback matrix,the forward matrix and the scaling matrix of the traditional tomlinson-harashima precoding algorithm based on the statistical characteristics of the downlink channel state information errors.Simulation results show that the nonlinear robust precoding algorithm can achieve better performance than the traditional linear and nonlinear precoding algorithms when the downlink channel state information errors exist.Due to the different downlink channel state information errors between user equipments in the coordinated multi-point transmission,the traditional “best-first” ordering algorithm was invalid.So an improved ordering algorithm was proposed to reduce the average bit error rate of the nonlinear robust precoding algorithm.…”
    Get full text
    Article
  19. 419899

    Virtual machine placement algorithm based on cuckoo search by Donghan JIANG, Haitao LIN

    Published 2017-10-01
    “…A cuckoo search algorithm was introduced for virtual machine placement.Firstly,the virtual machine placement program was mapped to the nest,and according to the level,the fitness would be divided into top and bottom nest.Secondly,the bottom nest and the top nest were disturbed by the disturbance function.Finally,by selecting,iterations got the best placement scheme.The algorithm was used for physical integration of cloud data centers,minimizing the number of physical machines placed.The algorithm is simulated by Cloudsim and the results show that the proposed method not only avoids the local optimum,but also has higher performance advantages than the reordered grouping genetic algorithm,the group genetic algorithm,the improved least load algorithm and the improved first fit decrease algorithm.…”
    Get full text
    Article
  20. 419900

    Storage system of power grid enterprise based on PBFT blockchain technology by Chunyan YANG, Dongmei BIN, Xin LI

    Published 2021-02-01
    “…A blockchain technology based on practical Byzantine fault tolerance (PBFT)algorithm was proposed.First of all, the traditional practical Byzantine fault tolerant algorithm was explained.The traditional algorithm included six phases: pre-stage, demand, pre-preparation, preparation, confirmation, and response.However, traditional algorithms had the disadvantages of poor real-time performance, lack of penalty mechanisms, and high bandwidth.In response to these problems, the traditional algorithm was improved, which specifically involved the accounting node, the consensus process, and the view switching process.The feasibility of the improved algorithm was further proved by testing.Applying this algorithm to power grid enterprises, the federal reserve system was implemented by the constructedvirtual warehouse, which also reduced the consumption of inventory funds.And the efficiency of inventory management in power grid enterprises was improved.…”
    Get full text
    Article