In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DO...
详细信息
ISBN:
(纸本)9781509041183
In this paper, a new method for two-dimensional (2-D) direction-of-arrival (DOA) estimation is proposed. We first reconstruct the covariance matrix of the coarray with block-Toeplitz structure and then retrieve the DOAs. Our method is computationally efficient as supported by the derived closed-form expression for the estimated covariance matrix. Unlike other methods, which require fully loaded arrays, the proposed method can be applied in the case of common rectangular arrays with arbitrary geometries. The estimated azimuth and elevation angles are automatically paired. Moreover, our method is of high estimation accuracy and immune to the angle ambiguity effect. Numerical simulations are carried out to verify the effectiveness of the proposed method.
A novel trust transmission method which is based on the similarities of nodes in trust models is proposed in this paper. Trust transmission is evaluated by calculating the similarity between recommenders when trustor ...
详细信息
Existing Ethernet Passive Optical network(EPON) Dynamic Bandwidth Allocation(DBA) algorithms suffer from the disadvantage of idle time loss,which lower the upstream bandwidth *** letter proposes an improved upstream t...
详细信息
Existing Ethernet Passive Optical network(EPON) Dynamic Bandwidth Allocation(DBA) algorithms suffer from the disadvantage of idle time loss,which lower the upstream bandwidth *** letter proposes an improved upstream transmission scheme with idle-time eliminating *** analysis and numerical calculation prove that the improved scheme can ef-fectively eliminate the idle time and enhance the efficiency of upstream link *** results have shown that the bandwidth utilization can be raised up to 15% in heavy-load scenarios while the time delay performance of Assured Forwarding(AF) and Best Effort(BE) services are improved simultaneously.
Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with ...
详细信息
Measurement device-independent quantum key distribution(MDI-QKD) protocols are immune to all possible attacks on the photon detectors during quantum communication, but their key generation rates are low compared with those of other QKD *** each individual photon’s channel capacity is an efficient way to increase the key generation rate, and high-dimensional(HD) encoding is a powerful tool for increasing the channel capacity of photons. In this paper, we propose an HD MDI-QKD protocol with qudits hyper-encoded in spatial mode and polarization degrees of freedom(DOFs). In the proposed protocol, keys can be generated using the spatial mode and polarization DOFs simultaneously. The proposed protocol is unconditionally secure,even for weak coherent pulses with decoy states. The proposed MDI-QKD protocol may be useful for future quantum secure communication applications.
This paper aims to propose a design of dynamic context management scheme for low-power wireless personal area networks based on IPv6 (6LoWPAN). In the scheme, a prefix auto-configuration mechanism is established to up...
详细信息
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method,...
详细信息
Ghost imaging could be used to make a quick identification of orthogonal objects by means of photocurrent correlation measurements. In this paper, we extend the method to identify nonorthogonal objects. In the method, an object is illuminated by one photon from an entangled pair, and the other one is diffracted into a particular direction by a pre-established multiple-exposure hologram in the idler arm. By the correlation measurements, the nonorthogonal object in the signal arm could be discriminated within a very short time. The constraints for the identification of nonorthogonal objects are presented, which show that the nonorthogonal objects can be discriminated when the overlapping portion between any two objects is less than half of all the objects in the set. The numerical simulations further verify the result.
To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a...
详细信息
This paper presents an Mobile Agent based Coding Aware Routing (MA-CAMR) for wirelesssensornetwork, which exploits mobile agent to discovery the routing and coding opportunities, reducing complexity of node design. ...
详细信息
In this paper, we propose a cooperative beamforming (BF) scheme for unmanned aerial vehicle (UAV)-assisted relay networks, where multiple UAVs are deployed as cognitive relays to assist the signal transmission between...
详细信息
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock o...
详细信息
To cope with the arbitrariness of the network delays,a novel method,referred to as the composite particle filter approach based on variational Bayesian(VB-CPF),is proposed herein to estimate the clock skew and clock offset in wirelesssensor ***-CPF is an improvement of the Gaussian mixture kalman particle filter(GMKPF)*** GMKPF,Expectation-Maximization(EM)algorithm needs to determine the number of mixture components in advance,and it is easy to generate overfitting and *** Bayesian EM(VB-EM)algorithm is introduced in this paper to determine the number of mixture components adaptively according to the ***,to solve the problem of data packet loss caused by unreliable links,we propose a robust time synchronization(RTS)method in this *** establishes an autoregressive model for clock skew,and calculates the clock parameters based on the established autoregressive model in case of packet *** final simulation results illustrate that VB-CPF yields much more accurate results relative to GMKPF when the network delays are modeled in terms of an asymmetric Gaussian ***,RTS shows good robustness to the continuous and random dropout of time messages.
暂无评论