the proceedings contain 7 papers. the special focus in this conference is on Cloud Computing. the topics include: Electronic Card Localization Algorithm Based on Visible Light Screen communication;BBServerless: A Burs...
ISBN:
(纸本)9783030963255
the proceedings contain 7 papers. the special focus in this conference is on Cloud Computing. the topics include: Electronic Card Localization Algorithm Based on Visible Light Screen communication;BBServerless: A Bursty Traffic Benchmark for Serverless;Performance Evaluation of Various RISC Processor systems: A Case Study on ARM, MIPS and RISC-V;comparative Analysis of Cloud Storage Options for Diverse Application Requirements;COS2: Detecting Large-Scale COVID-19 Misinformation in Social networks.
Smart traffic congestion reduction is actually a real challenge for big cities. Machine learning algorithms can play a significant role in traffic analysis, congestion prediction, and rerouting. In this paper, we prop...
详细信息
Withthe continuous development of social economy, intelligent acquisition terminal plays an important role in some remote and abusive environments. In this paper, an intelligent integrated acquisition terminal is pro...
详细信息
the concept of graded-index plastic optical fiber (GI-POF)-assisted indoor multi-cell wireless optical communication system for in-home networks is proposed and experimentally demonstrated in this paper. Plastic optic...
详细信息
ISBN:
(数字)9781665471565
ISBN:
(纸本)9781665471565
the concept of graded-index plastic optical fiber (GI-POF)-assisted indoor multi-cell wireless optical communication system for in-home networks is proposed and experimentally demonstrated in this paper. Plastic optical fiber (POF) is used to connect different cells, then the uplink and downlink between AP and end-user in the same cell are based on near-infrared (NIR) vertical cavity surface emitting laser (VCSEL) array and micro-light-emitting-diode (micro-LED) respectively. the real-time performance evaluation is based on simple on-off keying (OOK) modulation format. All the single links in the network can provide communication data rates above 2 Giga-bites per second (Gbps) and the dual-hop link between access point (AP) to end-users from other cells can reach 1.3 Gbps. the results showed that the proposed system represents a viable concept to offer full-duplex communication to future in-home networks.
the more crucial process and one of the world's major consumers of water in agriculture is irrigation, which has been growing as a result of population growth and the resulting rise in demand for food. the irrigat...
详细信息
this study addresses the challenges of joint computation offloading and resource allocation in low-earth orbit (LEO) satellite networks. To effectively manage the computational demands of LEO satellites, we propose a ...
详细信息
Nowadays, there is an increased use of AI-based technologies in applications ranging from smart cities to smart manufacturing, from intelligent agents to autonomous vehicles. One of the main challenges posed by all th...
详细信息
Entity disambiguation based on entity-link is a technique which constructs the mappings between entity reference items appearing in the short text and target entity in knowledge base respectively. In this paper we pro...
详细信息
this paper deals withthe development of a proximity-coupled-fed S-band array antenna intended for microwave imaging application. the array antenna which is designed to work at the center frequency of 3 GHz is employe...
详细信息
Integrated sensing and communication (ISAC) is an up-and-coming technique for future 6G networks. However, the communication message carried by the detection waveform will face the risk of being eavesdropped, which le...
详细信息
ISBN:
(纸本)9781665450850
Integrated sensing and communication (ISAC) is an up-and-coming technique for future 6G networks. However, the communication message carried by the detection waveform will face the risk of being eavesdropped, which leads to the challenge of wireless security for ISAC networks. In this paper, we leverage non-orthogonal multiple access (NOMA) to support more users for the ISAC network, withthe precoding well designed to guarantee the security. Specifically, we formulate a joint precoding optimization problem to maximize the sum secrecy rate for multiple users via artificial jamming, where the superimposed signal for NOMA users can be concurrently employed for the target detection. Since the optimization problem is non-convex, it is transformed into a convex one based on successive convex approximation (SCA). then, we propose an iterative algorithm, through which the original optimization problem can be solved effectively. Simulation results show that the proposed secure NOMA-ISAC scheme can guarantee the secure transmission while ensuring the sensing performance.
暂无评论