Blockchain technology (BT) allows market participants to keep track of digital transactions without central recordkeeping. The features of blockchain, including decentralization, persistency, and attack resistance, al...
详细信息
This article introduces a novel Multi-agent path planning scheme based on Conflict Based Search (CBS) for heterogeneous holonomic and non-holonomic agents, designated as Heterogeneous CBS (HCBS). The proposed methodol...
详细信息
This paper addresses the passive source localization problem using hybrid angle-of-arrival (AOA) and time-difference-of-arrival (TDOA) measurements observed by single stationary receiver at several time intervals, whe...
详细信息
This paper demonstrates the novel approach of sub-micron-thick InGaAs broadband photodetectors(PDs)designed for high-resolution imaging from the visible to short-wavelength infrared(SWIR)*** approaches encounter chall...
详细信息
This paper demonstrates the novel approach of sub-micron-thick InGaAs broadband photodetectors(PDs)designed for high-resolution imaging from the visible to short-wavelength infrared(SWIR)*** approaches encounter challenges such as low resolution and crosstalk issues caused by a thick absorption layer(AL).Therefore,we propose a guided-mode resonance(GMR)structure to enhance the quantum efficiency(QE)of the InGaAs PDs in the SWIR region with only sub-micron-thick *** TiOx/Au-based GMR structure compensates for the reduced AL thickness,achieving a remarkably high QE(>70%)from 400 to 1700 nm with only a 0.98μm AL InGaAs PD(defined as 1μm AL PD).This represents a reduction in thickness by at least 2.5 times compared to previous results while maintaining a high ***,the rapid transit time is highly expected to result in decreased electrical *** effectiveness of the GMR structure is evident in its ability to sustain QE even with a reduced AL thickness,simultaneously enhancing the transit *** breakthrough offers a viable solution for high-resolution and low-noise broadband image sensors.
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)hav...
详细信息
High penetration of renewable energy sources(RESs)induces sharply-fluctuating feeder power,leading to volt-age deviation in active distribution *** prevent voltage violations,multi-terminal soft open points(M-sOPs)have been integrated into the distribution systems to enhance voltage con-trol ***,the M-SOP voltage control recalculated in real time cannot adapt to the rapid fluctuations of photovol-taic(PV)power,fundamentally limiting the voltage controllabili-ty of *** address this issue,a full-model-free adaptive graph deep deterministic policy gradient(FAG-DDPG)model is proposed for M-SOP voltage ***,the attention-based adaptive graph convolutional network(AGCN)is lever-aged to extract the complex correlation features of nodal infor-mation to improve the policy learning ***,the AGCN-based surrogate model is trained to replace the power flow cal-culation to achieve model-free ***,the deep deterministic policy gradient(DDPG)algorithm allows FAG-DDPG model to learn an optimal control strategy of M-SOP by continuous interactions with the AGCN-based surrogate *** tests have been performed on modified IEEE 33-node,123-node,and a real 76-node distribution systems,which demonstrate the effectiveness and generalization ability of the proposed FAG-DDPGmodel.
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high d...
详细信息
In this paper,we analyze a hybrid Heterogeneous Cellular Network(HCNet)framework by deploying millimeter Wave(mmWave)small cells with coexisting traditional sub-6GHz macro cells to achieve improved coverage and high data *** consider randomly-deployed macro base stations throughout the network whereas mmWave Small Base Stations(SBSs)are deployed in the areas with high User Equipment(UE)*** user centric deployment of mmWave SBSs inevitably incurs correlation between UE and *** a realistic scenario where the UEs are distributed according to Poisson cluster process and directional beamforming with line-of-sight and non-line-of-sight transmissions is adopted for mmWave *** using tools from stochastic geometry,we develop an analytical framework to analyze various performance metrics in the downlink hybrid HCNets under biased received power *** UE clustering we considered Thomas cluster process and derive expressions for the association probability,coverage probability,area spectral efficiency,and energy *** also provide Monte Carlo simulation results to validate the accuracy of the derived ***,we analyze the impact of mmWave operating frequency,antenna gain,small cell biasing,and BSs density to get useful engineering insights into the performance of hybrid mmWave *** results show that network performance is significantly improved by deploying millimeter wave SBS instead of microwave BS in hot spots.
Advances in Internet-of-Things (IoT) wearable sensors and Edge-Artificial Intelligence (Edge-AI) have enabled practical realizations of Machine Learning (ML)-enabled mobile sensing applications like Human Activity Rec...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distri...
详细信息
Recommender systems are effective in mitigating information overload, yet the centralized storage of user data raises significant privacy concerns. Cross-user federated recommendation(CUFR) provides a promising distributed paradigm to address these concerns by enabling privacy-preserving recommendations directly on user devices. In this survey, we review and categorize current progress in CUFR, focusing on four key aspects: privacy, security, accuracy, and efficiency. Firstly,we conduct an in-depth privacy analysis, discuss various cases of privacy leakage, and then review recent methods for privacy protection. Secondly, we analyze security concerns and review recent methods for untargeted and targeted *** untargeted attack methods, we categorize them into data poisoning attack methods and parameter poisoning attack methods. For targeted attack methods, we categorize them into user-based methods and item-based methods. Thirdly,we provide an overview of the federated variants of some representative methods, and then review the recent methods for improving accuracy from two categories: data heterogeneity and high-order information. Fourthly, we review recent methods for improving training efficiency from two categories: client sampling and model compression. Finally, we conclude this survey and explore some potential future research topics in CUFR.
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Securi...
详细信息
The advent of the Internet of Things (IoT) has revolutionized connectivity by interconnecting a vast array of devices, underscoring the critical need for robust data security, particularly at the Physical Layer Security (PLS). Ensuring data confidentiality and integrity during wireless communications poses a primary challenge in IoT environments. Additionally, within the constrained frequency bands available, Cognitive Radio Networks (CRNs) has emerged as an urgent necessity to optimize spectrum utilization. This technology enables intelligent management of radio frequencies, enhancing network efficiency and adaptability to dynamic environmental changes. In this research, we focus on examining the PLS for the primary channel within the underlying CRNs. Our proposed model involves a primary source-destination pair and a secondary transmitter-receiver pair sharing the same frequency band simultaneously. In the presence of a common eavesdropper, the primary concern lies in securing the primary link communication. The secondary user (SU) acts as cooperative jamming, strategically allocating a portion of its transmission power to transmit artificial interference, thus confusing the eavesdropper and protecting the primary user's (PU) communication. The transmit power of the SU is regulated by the maximum interference power tolerated by the primary network's receiver. To evaluate the effectiveness of our proposed protocol, we develop closed-form mathematical expressions for intercept probability ((Formula presented.)) and outage probability (OP) along the primary communication link. Additionally, we derive mathematical expressions for OP along the secondary communications network. Furthermore, we investigate the impact of transmit power allocation on intercept and outage probabilities across various links. Through both simulation and theoretical analysis, our protocol aims to enhance protection and outage efficiency for the primary link while ensuring appropriate secondary
In the Internet of Things (IoT), optimizing machine performance through data analysis and improved connectivity is pivotal. Addressing the growing need for environmentally friendly IoT solutions, we focus on "gre...
详细信息
暂无评论