-
12821
A peak-to-average power ratio reduction method for mixed-numerology multi-carrier systems
Published 2023-10-01“…In order to support diverse service demands of communication scenarios, 5G adopts the mixed-numerology system based on orthogonal frequency division multiplexing (OFDM).The mixed-numerology systems still have the problem of high peak-to-average power ratio (PAPR).Furthermore, its design structure makes it difficult to apply traditional PAPR suppression methods straight forwardly, in which mixed signals are generated by superimposing multiple sub-signals with different parameters.An optimization model for minimizing PAPR in mixed-numerology systems was established based on tone reservation method.Utilizing the characteristic of single-peak of time-domain kernel, the multiple copies were generated in different numerologies based on the peak position of the mixed signal.The mixed time-domain kernel was then superimposed to reduce the peaks of the mixed signal.Since the proposed algorithm didn’t require inverse fast Fourier transform (IFFT)/ fast Fourier transform (FFT) operations during iteration, it had relatively low computational complexity.Simulation results show that the proposed algorithm effectively reduces the PAPR of mixed signals.…”
Get full text
Article -
12822
Lightweight detection system of shared spam attacks
Published 2015-07-01“…Spam is one of the most serious attacks against online social networks (OSN).Recently a new type of spam attack occurs,which named shared spam attack.The shared spam attack can separate the storage and dissemination of spam content,making the existing detection systems no longer effective.To address this problem,an empirical analysis of the process and properties of this new spam attack is performed.A novel lightweight iterative detection algorithm (LIDA) is proposed to detect spam accounts in OSN with these properties.LIDA contains two steps:target filter and content detection.It also noteworthy that LIDA is a lightweight algorithm to infer more spam accounts by exploiting spam accounts’ sharing instead of scanning or analyzing all accounts.Experimental results in RenRen,which has successfully detected 9 568 spam accounts,30 732 spam albums and 2 626 780 spam URL in four round iterations,indicate that LIDA is effective and efficiency in detecting shared spam accounts.…”
Get full text
Article -
12823
Incremental Gene Expression Programming Classifier with Metagenes and Data Reduction
Published 2018-01-01“…A detailed description of the algorithm is followed by the extensive computational experiment. …”
Get full text
Article -
12824
Steel Plate Defect Recognition of Deep Neural Network Recognition Based on Space-Time Constraints
Published 2022-01-01“…In order to improve the effect of real-time defect recognition in steel plate online production, this paper studies the method of steel plate defect recognition based on the deep neural network algorithm based on space-time constraints. Moreover, this paper improves the space-time constraint algorithm, optimizes the encryption structure of the traditional ABE scheme, and obtains a neural network feature recognition method based on space-time constraints. …”
Get full text
Article -
12825
Dynamic Response of Crossanisotropic Layered Media with Imperfect Interface under Axisymmetric Loads
Published 2022-01-01“…The algorithm used two equivalent contact parameters to simulate the relationship between the discontinuity of the displacement and stress. …”
Get full text
Article -
12826
Efficient and safe auditable mixed-coin service scheme based on blind signature
Published 2020-08-01“…The mixed-coin service can provide solutions for the privacy problem of blockchain,but it still faces efficiency bottlenecks and security risks.To further improve the efficiency and security protection of the mixed-coin service,an efficient and safe auditable mixed-coin service scheme based on blind signature was proposed.Firstly,this scheme added audit measures.It added an audit blockchain to the traditional mix-coin model to record the behavior of users and mixers,achieving traceability and accountability.Then,this method used elliptic curves algorithm to construct blind signatures instead of blind signature schemes based on bilinear pairs or RSA.Finally,this scheme proposed an auditable blind mix-coin service agreement based on the auditable mix-coin model and the blind signature algorithm based on elliptic curve.Simulation analysis shows that the proposed scheme has six security features,such as auditability and anti-theft attack,while providing privacy protection.Under the same security intensity,the proposed scheme can effectively reduce the computational overhead and storage overhead.…”
Get full text
Article -
12827
Multi-values discrete particle swarm optimization for cross layer resource allocation in cooperative OFDMA systems
Published 2014-04-01“…Unlike the traditional discrete particle swarm optimization (DPSO) algorithm, the proposed one denotes the parti-cle position by discrete multi-value variable. …”
Get full text
Article -
12828
Belong and Nonbelong Relations on Double-Framed Soft Sets and Their Applications
Published 2021-01-01“…Second, we give an educational application of optimal choices using the idea of double-framed soft sets. We provide an algorithm of this application with an example to show how this algorithm is carried out.…”
Get full text
Article -
12829
A Cutting Plane and Level Stabilization Bundle Method with Inexact Data for Minimizing Nonsmooth Nonconvex Functions
Published 2014-01-01“…Another merit is that our algorithm makes a distinction between affine pieces that exhibit a convex or a concave behavior relative to the current iterate. …”
Get full text
Article -
12830
Research and realization of the Trojan detection engine based on Android
Published 2016-10-01“…A feature code detection algorithm called FCPA got the sourceDir of the known malicious APK files through calling system API. …”
Get full text
Article -
12831
Intelligent CSI feedback method for fast time-varying FDD massive MIMO system
Published 2021-07-01“…In the frequency division duplexing (FDD) massive multiple-input multiple-output (MIMO) system, the channel state information (CSI) matrix existed noise caused by the wireless channel interference and the time correlation caused by Doppler shift.Because of these effects, the communication system couldn’t guarantee the requirements of reliability and low delay.An intelligent CSI feedback method was adopted.The convolutional neural network (CNN) and batch normalization (BN) network was used to extract the noise in the CSI matrix and learned the spatial structure of the channel.The time correlation between the CSI matrices through the attention mechanism was extracted to improve the accuracy of CSI reconstruction.The data was generated by the standard fast time-varying channel model simulation to train the network offline.System simulation and analysis show that the proposed method can effectively suppress the influence of noise and extract the time correlation caused by Doppler.Compared with the traditional CSI compression feedback algorithm and CsiNet algorithm, the proposed method has better NMSE and cosine similarity performance.…”
Get full text
Article -
12832
Fast loop-free path migration strategy in software defined network
Published 2022-05-01“…Aiming at the problems of slow and faulty path migration caused by distributed deployment and asynchronous operation of data plane forwarding devices in software defined network, a fast loop-free path migration strategy was proposed.First, a fast loop detection algorithm based on node ranking was proposed.By comparing the position differences of adjacent nodes on the old and new paths of the flow, whether there was a forwarding loop in the path migration process and the location detection where the loop occurs could be quickly determined.Then, a greedy update mechanism based on node relaxation dependency was proposed.The fast loop detection algorithm was used to uncover the relaxation dependency between the common switches on the old and new paths, and the number of switches updated in each round of the migration process was ensured to be maximized.Simulation results show that the proposed strategy can effectively avoid migration loops and obtain the optimal update time overhead under different network states compared with existing migration schemes.…”
Get full text
Article -
12833
Research of LBS privacy preserving based on sensitive location diversity
Published 2015-04-01“…Before getting location-based query service,constructing a cloaking region or picking an anchor which is still in a sensitive area is vulnerable to lead location privacy exposure.An algorithm of selecting anchor is proposed based on sensitive location diversity.By defining sensitive locations and filtering different ones according to users’ visiting number and peak time,locations with similar features are chosen to construct a diversity zone,and the centroid of the zone is chosen as an anchor that raises location diversity.Referring to SpaceTwist,a query algorithm (HINN) is proposed to get places of interest (PoI),and query results can be inferred without providing any user’s actual location.The defect in SpaceTwist that PoIs are found around the anchor is modified,which improves querying accuracy.The experiments show that users’ location privacy is protected well when the user is staying at a sensitive place,and the method has good working performances.…”
Get full text
Article -
12834
FORMING THE BACHELOR’S RESEARCH SKILLS IN THE COURSEWORK DEVELOPMENT
Published 2015-10-01“…The second phase is connected with the choice of a computing algorithm. The third phase is software development for the implementation of the model and algorithm with using the information and communication technologies.…”
Get full text
Article -
12835
Accurate 2-D AOA Estimation and Ambiguity Resolution for a Single Source under Fixed Uniform Circular Arrays
Published 2017-01-01“…This paper presents an analytic algorithm for accurate two-dimensional (2-D) angle of arrival (AOA) estimation of a single source under fixed uniform circular arrays (UCAs). …”
Get full text
Article -
12836
Semantic Detection of Vehicle Violation Video Based on Computer 3D Vision
Published 2022-01-01“…The MOTA of the CEM algorithm is 78.4%, FP is 1.1%, and FN is 3.5%, and the MOTA of the 3-DCMK algorithm is 88.6%, FP is 0.9%, and FN is 1.9%. …”
Get full text
Article -
12837
Customer Churn Modeling via the Grey Wolf Optimizer and Ensemble Neural Networks
Published 2022-01-01“…This study proposes a hybrid system based on fuzzy entropy criterion selection algorithm with similar classifiers, grey wolf optimization algorithm, and artificial neural network to predict the customer churn of those companies that suffer losses from losing customers over time. …”
Get full text
Article -
12838
RESEARCH ON MAGNETIC INVERSION OF 304 STAINLESS STEEL ARTIFICIAL DEFECTS WEAK MAGNETIC SIGNAL BASED ON LIBSVM
Published 2021-01-01“…Aiming at 304 austenitic stainless steel paramagnetic material,a multi-class classification support vector machine LIBSVM algorithm was carried out for the magnetic anomaly inversion of weak magnetic signals. …”
Get full text
Article -
12839
Cooperative modulation recognition based on one-dimensional convolutional neural network for MIMO-OSTBC signal
Published 2021-07-01“…To recognize the modulation style adopted in multiple-input-multiple-output orthogonal space-time block code (MIMO-OSTBC) systems, a cooperative modulation recognition algorithm based on the one-dimensional convolutional neural network (1D-CNN) was proposed.With the lossless I/Q signal selected as shallow features, the zero-forcing blind equalization was first leveraged to improve the discrimination of different modulation signals.Then the 1D-CNN recognition model was devised and trained to extract deep features from shallow ones.Later, two decision fusion strategies of voting-based and confidence-based were leveraged in the multiple-antenna receiver to improve recognition accuracy.Experimental results show that the proposed algorithm can effectively recognize five modulation types {BPSK, 4PSK,8PSK,16QAM,4PAM}, with a 100% recognition accuracy when the signal-to-noise is equal or greater than-2 dB.…”
Get full text
Article -
12840
Radar emitter identification based on unintentional phase modulation on pulse characteristic
Published 2020-05-01“…Aiming at the problem of poor performance of the classification model in the case of unintentional phase modulation on pulse (UPMOP) to achieve radar specific emitter identification,a method for radar specific emitter identification with long and short-term memory and full convolutional networks (LSTM-FCN) was proposed.Firstly,a simplified observation model of the intrapulse signal phase considering the intentional modulation was presented,and the observation phase sequence was deramp to extract the noisy estimate of the UPMOP.Then Bezier curve was utilized to fit the UPMOP to reduce the influence of noise and obtain a more accurate description of UPMOP.Finally,the LSTM-FCN was used to extract the joint features of UPMOP sequence to realize the radar specific emitter automatic identification.Both the simulation experiments and the measured data experiments verify the feasibility and effectiveness of the proposed algorithm.Moreover,the proposed algorithm has high identification accuracy and short time consumption.…”
Get full text
Article