Showing 419,921 - 419,940 results of 420,088 for search '"A', query time: 2.87s Refine Results
  1. 419921

    Recognition of PQ stego images based on identifiable statistical feature by Ji-cang LU, Fen-lin LIU, Xiang-yang LUO, Yi ZHANG

    Published 2015-03-01
    “…A PQ (perturbed quantization) stego images recognition algorithm is proposed based on identifiable statistical feature. …”
    Get full text
    Article
  2. 419922

    Multiple targets localization via compressive sensing from mere connectivity by Lei LIU, Jian-jun ZHANG, Yang LU, Xing WEI, Jiang-hong HAN

    Published 2016-05-01
    “…A multiple targets localization method was proposed from mere connectivity,and the multiple targets posi-tioning problem was converted to sparse vector resolving by compressive sensing theory,which was applied to the indoor localization of intensive references distribution.The connectivity to the references was collected as the only measurement data,and targets locations were figured out by minimum l<sub>1</sub>-norm algorithm.When measurement data was compressed tol 1 bit,the fixed point iteration algorithm combined with semi-definite relax was proposed to figure out targets locations.As for the simulation results,compared with MDS-MAP,DV-Hop and RSS-CS algorithms,the average location error is less than 1 grid by the mere connectivity of N -bit and 1-bit quantization CS localization,of which the occupied bit quan-tity are reduced to less than 4 times and 16 times of RSS localization observation value respectively.…”
    Get full text
    Article
  3. 419923

    Congestion control mechanism based on data delivery probability in DTN data dissemination network by Yi XIA, Guang-hong DENG

    Published 2015-11-01
    “…A congestion control mechanism based on data delivery probability (CCM-DP) was proposed to work out the decline of data delivery performance on account of data congestion in delay tolerant networks (DTN) network coding-based data dissemination process.Considering the node mobility model,data delivery probability and data congestion degree,the data delivery probability model was constructed,and the congestion control mechanism was designed from two aspects,on the one hand,by the means of adjusting the packet forwarding process,it equilibriums the data packet delivery to avoid node congestion caused by too many packets received; and on the other hand,through the design of efficient discarding strategy,it reduces the impact of packet loss caused by data congestion.Ultimately,it was put into use in data dissemination process and some simulations were taken,the simulation results show that,CCM-DP can improve data delivery performance in data congestion environment.…”
    Get full text
    Article
  4. 419924

    Mobility model detection method based on birth and death model in DTN environment by ENGGuang-hong D, AOWan-hua C, HANGJian Z, HENGXiong C, ENGLi F

    Published 2015-01-01
    “…A mobility model detection method based on birth and death model (MMD-BDM) in DTN environment was proposed.It first computed the connected channel capacity of sampling times according to the data traffic during the data transfer process,and then constructed the time varying intercommunication metrics at local,which composed of channel capacity between local node and others.Based on these,the connection birth and death mode of nodes based on connected edges was deduced,and then the birth and death features of the connected nodes was analyzed to detect the mobility model,which used to improve the routing strategy during the packages deliver process.Ultimately,the mobility model detection method was put into use in spray and wait routing (SWR) method and random network coding routing (RNCR) method to experiment,the simulation results show that,it can improve the opportunity routing performance of the data deliver rate and transfer latency in DTN environment.…”
    Get full text
    Article
  5. 419925

    Joint frequency and DOA estimation using spatial-temporal co-prime sampling with off-grid sources by Wang-han LYU, Hua-li WANG, Shan-xiang MU, Feng LIU

    Published 2017-02-01
    “…A method of joint frequency and direction of arrival (DOA) estimation using spatial-temporal co-prime sam-pling with off-grid sources was proposed to solve the problem of two-dimensional (2D) mismatches of signals.Firstly,the received signal was sampled by spatio-temporal co-prime sampling technique to construct 2D sparse reconstruction model with the filled coarray.Then the frequency mismatch term and angle mismatch term were incorporated into the re-ceived data model.Based on the above modified model,an improved greedy algorithm was presented to obtain the fre-quency mismatch and angle mismatch by estimating the spectrum leakage terms jointly.So the 2D off-grid sources can be corrected to accurate positions.The method can increase the degrees of freedom (DOF) in the space-frequency domain.Moreover,the method has reduced the amount of computation,and it can improve the frequency and DOA estimation accuracy in the meantime.Simulation results demonstrate the correctness and effectiveness of the proposed approach.…”
    Get full text
    Article
  6. 419926

    Outage performance of multi-relay collaborative NOMA systems supporting multiple multicast services by Yifei CHU, Xinjie YANG

    Published 2023-07-01
    “…A cooperative non-orthogonal multiple access (NOMA) system was proposed to support unicast primary user and multiple multicast services based on multiple relays strategy.Under the Rayleigh channel, the secondary user with the best channel condition from each multicast group was selected as full-duplex relay to decode and forward the unicast primary user’s signal, and the primary user employed the maximum ratio combining (MRC) technique to improve the signal to interference and noise ratio (SINR).The closed-form expressions for the outage probability of primary user in full-duplex and half-duplex modes with multi-relay simultaneous forwarding (MRSF) and optimal relay forwarding (ORF) were derived and verified by Monte Carlo simulations.The results verify that full-duplex relay outperforms half-duplex relay scheme.Furthermore, with same number of multicast groups, the MRSF strategy effectively improve the unicast primary user outage performance, in comparison with ORF strategy, when the number of multicast groups increases, the improvement becomes more significant.…”
    Get full text
    Article
  7. 419927

    Increasing capacity for wireless communication systems based on signal waveform collaboration by Jun SHI, Xue-jun SHA, Qin-yu ZHANG, Xiao-cheng SONG, Nai-tong ZHANG

    Published 2012-02-01
    “…A wireless communication technology based on signal waveform collaboration was proposed for resolving the conflict between limited spectrum resources and the rapidly growing service needs.The proposed technology employs linear frequency modulation (LFM) signals to transmit different users' information by utilizing the dual relationship between the energy concentration property of sinusoidal signals and that of LFM signals in the frequency and fractional domains,and the transmitted signals are superimposed on communication waveforms of the traditional sinusoidal carrier communication system on the same frequency band.At the receiver,frequency-and fractional-domain filters are applied to separate two kinds of users' signals.Moreover,the system model of the proposed technology is constructed,and theoretical analysis is also derived.The validity of the theoretical derivations is demonstrated via simulations.It has been shown that spectral efficiency can be effectively improved using signal waveform collaboration and transform-domain filtering.Theoretically,the proposed technology can achieve twice system capacity as large as that of the traditional sinusoidal carrier communication system.…”
    Get full text
    Article
  8. 419928

    Ventral Prostate Fibrosis in the Akita Mouse Is Associated with Macrophage and Fibrocyte Infiltration by Sanghee Lee, Guang Yang, William Mulligan, Jerry Gipp, Wade Bushman

    Published 2014-01-01
    “…A higher incidence of lower urinary tract symptoms (LUTS) among diabetic men is unexplained. …”
    Get full text
    Article
  9. 419929

    Multi-keyword search over encrypted data with user revocation by Qi-ying WU, Jian-feng MA, Hui LI, Jun-wei ZHANG, Qi JIANG, Yin-bin MIAO

    Published 2017-08-01
    “…A mu1ti-keyword search over encrypted data was proposec1 with fi1e-1eve1 access authorization and data user revocation scheme through emp1oying ciphertext-po1icy attribute-based encryption(CP-ABE).The scheme supports fi1e-1eve1 access authorization in the mu1ti-owner mu1ti-user settings,which means that data users cou1d on1y gain the authorized fi1es encrypted by different data owners with different keys.Moreover,the scheme cou1d achieve data user revocation.Forma1 security ana1ysis shows that the proposed scheme cou1d resist the chosen keyword attack in random orac1e.Moreover,the experimenta1 study over rea1-wor1d dataset demonstrates its efficiency and feasibi1ity in practice.…”
    Get full text
    Article
  10. 419930

    Algebraic fault attack on PRESENT by Ke-hui WU, Xin-jie ZHAO, Tao WANG, Shi-ze GUO, Hui-ying LIU

    Published 2012-08-01
    “…A new fault analysis method on PRESENT—algebraic fault attack was proposed.This attack combined conventional algebraic cryptanalysis with fault attack,firstly built equivalent Boolean algebraic equations of cipher encryption by algebraic cryptanalysis method; secondly got information of fault cryptograph by fault attack technique,and transformed differential of fault and cryptograph into additional algebraic equations; finally utilized Crypto Mini SAT solver to solve the equations and recover key.Experiments demonstrate that after injecting 4-bit fault to the 29<sup>th</sup> round of PRESENT-80,the fault location and fault value are unknown,only 2 injectings can recover 64-bit last whitening key in 50 seconds that reduce master key of PRESENT-80 searching space to 2<sup>16</sup>,then recover the master key after 1 minute brute-force-search on average; compared with previous fault attack on PRESENT,the amount of this attack sample is the smallest;meanwhile,the analysis method proposed can be applied into the algebraic fault attack of other block ciphers.…”
    Get full text
    Article
  11. 419931

    Mobile direct-sequence spread-spectrum underwater acoustic communication based on improved differential energy detector by Peng-yu DU, Long-xiang GUO, Jing-wei YIN, Gang QIAO

    Published 2017-03-01
    “…A Doppler estimation method based on the structural features of spread spectrum signal was proposed,which could achieve real-time Doppler estimation for received spread spectrum signals by energy detecting the result of matching correlation calculation of adjacent received spreading symbols.In addition,this method made full use of the spread spectrum processing gain and could do Doppler estimation under low SNR condition.Improved differential energy detector was further proposed,which can effectively deal with the rapid carrier phase fluctuation interference caused by Doppler effect and time-varying multi-path interference by detecting the output energy of two correlators.Simulation verified the robustness of improved differential energy detector algorithm and the Doppler estimation method based on spread spectrum signal.At-sea data shows that improved differential energy detector combined with the proposed Doppler estimation method can achieve low bit error rate communication for direct-sequence spread spectrum underwater acoustic communication with large time-varying Doppler interference when SNR is −10 dB.…”
    Get full text
    Article
  12. 419932

    Artificial noise-aided robust secure information and power transmission scheme in heterogeneous networks with simultaneous wireless information and power transfer by Bo ZHANG, Kaizhi HUANG, Zhou ZHONG, Yajun CHEN

    Published 2019-03-01
    “…A heterogeneous network with simultaneous wireless information and power transfer under the stochastic channel state information (CSI) error was considered.In this network,to guarantee the security and reliability of information and energy transmission,an artificial noise (AN)-aided robust secure information and power transmission scheme was proposed.By jointly designing the downlink information beamforming and AN matrix of macrocell base station and femtocell base stations,the eavesdroppers were jammed and the energy receiving performance of system was improved simultaneously.The problem of maximizing the energy receiving performance was modeled under the constraints on the base station power,the outage probability of information transfer and confidential information eavesdropped.Due to the probabilistic and rank-one constraints,this problem was non-convex.To obtain the solution,the original problem was first transformed into an equivalent form,which was easy to process.Then,the Bernstein-type inequality and the Large-deviation inequality was utilized to transform the outage probability limits into convex linear matrix inequalities,respectively.Finally,the rank-one beamforming constraints were processed with quadratic equality constraint procedure.Simulation results show that the proposed scheme has higher energy receiving performance and feasible performance in comparison with compared schemes,which validates the effectiveness and the robustness of our proposed scheme.…”
    Get full text
    Article
  13. 419933

    Distributed IOS-SM transmission scheme with joint antenna and IOS unit selection for high-speed railway scenario by Qingfeng DING, Song WANG

    Published 2023-04-01
    “…A distributed intelligent omni-surface (IOS) -assisted spatial modulation (SM) transmission scheme was proposed to address the problem of transmission rate degradation caused by the high signal penetration loss in closed carriages in the high-speed railway scenarios.Firstly, SM technology was utilized to ensure that the indexed information section was not affected by penetration loss.Then, to reduce the high path loss and power loss of the long-range IOS windows, the distributed IOS was selected by traversal algorithm according to the principle of maximizing the received signal-to-noise ratio, and the best IOS window was activated to transmit the SM modulated information.Finally, to reduce the impact of the missing direct view path gain on the overall system performance, the antenna removal principle and the sequential selection method were used to dynamically and selectively activate the receiving antenna and IOS unit under the power consumption model.The simulation results show that the proposed scheme is more suitable for the high-speed railway wireless communication scenario than the conventional relay-forwarding and reconfigurable intelligence surface -SM (RIS-SM) schemes.And with the power loss model, the distributed IOS-SM scheme chosen by the combined antenna and IOS unit is still able to guarantee high performance transmission of the system.…”
    Get full text
    Article
  14. 419934

    2D+t Wavelet Domain Video Watermarking by Deepayan Bhowmik, Charith Abhayaratne

    Published 2012-01-01
    “…A novel watermarking framework for scalable coded video that improves the robustness against quality scalable compression is presented in this paper. …”
    Get full text
    Article
  15. 419935
  16. 419936
  17. 419937
  18. 419938

    Afectividad y memoria subjetiva en pacientes con epilepsia del lóbulo temporal medial intratable by Marilyn Zaldivar Bermúdez, Lilia Morales Chacón, Margarita Báez Martín, Abel Sánchez Curuneaux, María Eugenia García, Yordanka Rodríguez Yero

    Published 2014-12-01
    “…<p><strong>Fundamento</strong>: al revisar la literatura relacionada con epilepsia del lóbulo temporal medial intratable, se aprecia cierta divergencia en cuanto a los factores que pueden estar incidiendo en las quejas de memoria de los pacientes con dicha enfermedad.…”
    Get full text
    Article
  19. 419939
  20. 419940

    Industry News

    Published 1994-01-01
    Get full text
    Article