Suggested Topics within your search.
Suggested Topics within your search.
-
15061
Full-diversity design criterion for multi-user STBC based on integer-forcing detection
Published 2019-03-01“…Multi-user space time block code systems have the problem of high decoding complexity.To ensure good system performance with low decoding complexity at the same time,low complexity integer-forcing (IF) detection algorithm was applied to multi-user space time block code.Then the upper bound of error probability for IF detection was derived by minimizing the equivalent noise power.To obtain good multi-user space time block code when decoded with IF detection,a full-diversity design criterion was proposed.It was proved that full diversity could be achieved if every user’s space time block code had property of non-vanishing singular value.Simulation result shows that the code gain is found related to the minimum singular value.…”
Get full text
Article -
15062
Cross-layer multi-channel MAC protocol combined with QoS search for cognitive wireless multi-hop networks
Published 2013-04-01“…In cognitive wireless multi-hop networks,the spectrum resources are highly variable and diverse.A cross-layer multi-channel MAC protocol combined with QoS search was proposed.The protocol combines the on-demand QoS search with dynamic spectrum allocation via cross-layer method,which only permits the transmission nodes to participate in the spectrum allocation and can guarantee the allocation results meet the QoS requirement.Besides,frequency division duplex transceivers are introduced to continuously listen to the common control channel,and an access algorithm is carefully designed to realize hybrid communication between nodes with erent number of transceivers.Extensive simulations show that our protocol can efficiently guarantees the QoS requirement for end-to-end transmission and significantly improves end-to-end throughput and delay.…”
Get full text
Article -
15063
Channel estimation method for MIMO-OFDM systems based on pilots and modified Kalman filter
Published 2007-01-01“…A combined channel estimation method of time-frequency-selective fading channels in MIMO-OFDM systems was proposed.The time-varying channel was modeled as an autoregressive(AR) process and a low-dimensional Kalman filter based on pilots was used to estimate the AR parameters,and the LS(least square) algorithm was adopted to track the time-varying channel fading factors.The Kalman estimator explored the time-domain correlation of the channel,and a minimum mean square error(MMSE) combiner was used to modify the Kalman estimates.The proposed solution could reduce the complexity of the high-dimensional Kalman filter and track the channel both in frequency and time domains.The simulation results show that this method improves the LS estimates and has a comparable performance to the com-plex high-dimensional Kalman channel estimation method.…”
Get full text
Article -
15064
Parabolic Equation Accumulated Split Error and Its Correction Method for Tropospheric Radio Propagation
Published 2018-01-01“…An increasingly popular approach of modeling electromagnetic wave propagation in the troposphere is to use the slip-step Fourier transform (SSFT) numerical algorithm to solve a parabolic equation (PE). However, available SSFT does not provide perfect solutions by introducing accumulated split error (ASE) for its step-by-step iteration process with a fixed propagation range step. …”
Get full text
Article -
15065
Confirmation method for the detection of malicious encrypted traffic with data privacy protection
Published 2022-02-01“…In order to solve the problem that excessive false positives in the detection of encrypted malicious traffic based on machine learning, secure two-party computation was used to compare character segments between network traffic and intrusion detection rulers without revealing the data content.Based on the comparison results, an intrusion detection feature matching algorithm was designed to accurately match keywords.A random verification strategy for users’ input was also proposed to facilitate the method.As a result, malicious users couldn’t use arbitrary data to participate in secure two-party calculations and avoid confirmation.The security and resource consumption of the method were theoretically analyzed and verified by a combination of real deployment and simulation experiments.The experimental results show that the proposed method can significantly improve the detection performance with low system resources.…”
Get full text
Article -
15066
Single image visibility restoration using optical compensation and pixel-by-pixel transmission estimation
Published 2017-05-01“…Aiming at image degradation in hazy and sandstorm weather,an optical compensation color restoration and pixel-by-pixel transmissvity estimation algorithm was proposed.The blue light was absorbed by sandstorm particles.The color shift phenomenon could be eliminated by optical compensate method,which convert the sandstorm images into hazy images.Then the ratio relationship between the minimum channel and its Gaussian function as the transmissivity,and median filter was used to eliminate its texture effects.The depth of the restored transmissivity alternated obviously and the edge was well preserved,which did not need the time-consuming postprocessing operativity.Finally,the image was restored by the atmospheric scattering model.The experimental results show that recovered sandstorm image treatment is better,and the saturation of the haze image is appropriate,the bright area is more nature,and running time is faster.…”
Get full text
Article -
15067
Planar ESPAR Array Design with Nonsymmetrical Pattern by Means of Finite-Element Method, Domain Decomposition, and Spherical Wave Expansion
Published 2012-01-01“…This procedure has been firstly validated by analyzing an array of monopoles on a ground plane, and then it has been applied to synthesize a prescribed radiation pattern optimizing the reactive loads connected to the feeding ports of the array of circular patches by means of a genetic algorithm.…”
Get full text
Article -
15068
Credit risk identification of high-risk online lending enterprises based on neural network model
Published 2017-12-01“…The rapid development of online lending alleviates the difficulty of financing for small and micro enterprises to a certain extent,but it also exposes the credit risk identification problem of online lending platform.In order to fully identify the characteristics of high-risk network lending enterprises,small and medium-sized network lending companies were selected as samples,and indicators that were highly correlated with risk identification were chosen as indicators variables.And by using the BP neural network algorithm model,the credit risk identification rate and credit risk classification accuracy rate of high risk network lending enterprises,under different conditions,were obtained.The results show that the credit risks of high-risk network lending enterprises are highly recognized,and have the characteristics of high recall rate and high accuracy.…”
Get full text
Article -
15069
Digital media representation under complex number base and its application on information hiding
Published 2016-12-01“…With the rapid development and wide application of the digital media technology,the information security problem is becoming more and more highly attention.Because of the various kinds of medias,previous research works have focused on a specific digital media from,such as text,image,audio and video.As a fact that all the objects were expressed in digital forms under the environment of computer and network,a unified form for all kinds of digital media under the complex number base system was proposed.The algorithm of the digital media signal and the complex number intercom version were given,so the relationship among the digital media could be converted to the corresponding geometric relationship on the complex plane.In the experiments,the proposed method was applied to the application of the digital media information hiding.…”
Get full text
Article -
15070
Multi-user fine-grained task offloading scheduling strategy under cloud-edge-end collaboration
Published 2024-04-01“…Then, a multi-user subtask scheduling scheme was proposed and an improved simulated annealing particle swarm algorithm was designed to minimize the total system cost to achieve the optimal offloading decision. …”
Get full text
Article -
15071
Connectivity analysis of IoV based on scale-free network
Published 2021-04-01“…The connectivity of moving vehicles is one of the critical metrics in Internet of vehicles (IoV) that critically influence the performance of data transmission.Due to the high-frequency dynamic changes of the network topology of the IoV, which causes the link to be easily disconnected frequently.It is a critical issue to reduce the probability of link disconnection, and reducing the randomness of link establishment improves the overall network connectivity.To solve the above problems, the network’s connectivity was analyzed under the line of sight path loss model and the interference model, and the dynamic growth (DN) algorithm was designed through the characterization of the IoV link in the real world.Moreover, a scale-free VANET was built through the network’s addition and deletion of nodes and link preference connections.Simulation results indicate that the overall connectivity of the network is improved by 16%.…”
Get full text
Article -
15072
Assessment of technological capabilities to counter fraudulent practices in the banking sector
Published 2022-11-01“…The purpose of the article is to assess the possibility of using machine learning technology by banks and develop an algorithm for detecting fraudulent transactions based on programming. …”
Get full text
Article -
15073
Adaptive Dynamic Programming-based Tracking Controls of Multi-Motor Driven Systems
Published 2025-01-01“…The optimal feedback controls are obtained with an approximate dynamic programming algorithm, which can be used to research the saddle point and minimized the performance index. …”
Get full text
Article -
15074
Temperature Prediction of Photovoltaic Panels Based on Support Vector Machine with Pigeon-Inspired Optimization
Published 2020-01-01“…Meanwhile, the delay factor (DF) is added to improve the PIO algorithm for avoiding the problem of local optimum. …”
Get full text
Article -
15075
Accurate Anisotropic Fast Marching for Diffusion-Based Geodesic Tractography
Published 2008-01-01“…Here, we propose an improved fast marching algorithm to infer on geodesic paths. Specifically, this procedure is designed to achieve accurate front propagation in an anisotropic elliptic medium, such as DTI data. …”
Get full text
Article -
15076
Optimization of Urban Cold Chain Transport Routes under Time-Varying Network Conditions
Published 2021-01-01“…An optimization model of urban cold chain transportation with the objective function as the minimum total cost is constructed under the premise of service reliability, and an artificial immune particle swarm optimization algorithm is designed to solve the model. For an empirical analysis of Xiamen’s cold chain transportation, a two-stage solution involving “static optimization and dynamic optimization” is used to verify the effectiveness of the model and the practical value of this research. …”
Get full text
Article -
15077
Iterative GA Optimization Scheme for Synthesis of Radiation Pattern of Linear Array Antenna
Published 2016-01-01“…This research has proposed the iterative genetic algorithm (GA) optimization scheme to synthesize the radiation pattern of an aperiodic (nonuniform) linear array antenna. …”
Get full text
Article -
15078
Privacy-preserving indoor localization scheme based on Wi-Fi fingerprint with outsourced computing
Published 2024-02-01“…To solve the privacy-preserving problem of both the user and the server in indoor positioning, outsourcing part of the calculation to cloud server in the process of using Paillier encryption was considered.The scheme not only protected the privacy of the user and the positioning server, but also avoided excessive computing and communication overhead.The main idea of the scheme was that the fingerprint database in the offline stage was established by the server firstly.The k-anonymity algorithm was combined with Paillier encryption in the online stage by the user, and the encrypted Wi-Fi fingerprints were sent to the positioning server.An aggregation of the received Wi-Fi fingerprints and database fingerprints were performed by the server.Then they were outsourced to the cloud server for decryption and distance calculation by the positioning server.Finally, the positioning result was obtained.Theoretical analysis and experimental results show that the proposed scheme is safe, effective and practical.…”
Get full text
Article -
15079
Fault diagnosis and auto dispatchin of power communication network based on unsupervised clustering and frequent subgraph mining
Published 2021-11-01“…Fault diagnosis is one of the most challenging tasks in power communication.The fault diagnosis based on rules can no longer meet the demand of massive alarms processing.The existing approaches based on the supervised learning need large sets of the labeled data and sufficient time to train models for processing continuous data instead of alarms, which are far behind the feasibility of deployment.As for alarm correlation and fault pattern discovery, a self-learning algorithm based on the density-based clustering and frequent subgraph mining was proposed.A novel approach for automatic fault diagnosis and dispatch were also introduced, which provided the scalable and self-renewing ability and had been deployed to the automatic fault dispatch system.Experiments in the real-world datasets authorized the effectiveness for timely fault discovery and targeted fault dispatch.…”
Get full text
Article -
15080
Results of research on the formation of students readiness to keep the professional ethics
Published 2016-06-01“…The article suggests the algorithm formation of professionally significant qualities of students in different activities.…”
Get full text
Article