This article presents a comprehensive review of the technical advancements that have been made in offshore wind turbines via the use of digital twins. It discusses the digital twin architecture, which can anticipate a...
详细信息
We investigate image-to-image translation as a solution to icon-to-icon translation problems. Icon-to-icon translation aims to translate the input icon to appear like the target domain’s icons and simultaneously pres...
详细信息
This paper introduces 'Smart Irrigation Yield Optimization (SIYO),' a sophisticated IoT-based smart irrigation system aimed at significantly improving crop yield and growth predictions. Traditional irrigation ...
详细信息
Sign Language is used by deaf and hard hearing people as it is the efficient way to communicate among themselves as well as with other people. The demand for an automated system, which converts sign language into a no...
详细信息
The vehicular edge computing(VEC)is a new paradigm that allows vehicles to offload computational tasks to base stations(BSs)with edge servers for *** general,the VEC paradigm uses the 5G for wireless communications,wh...
详细信息
The vehicular edge computing(VEC)is a new paradigm that allows vehicles to offload computational tasks to base stations(BSs)with edge servers for *** general,the VEC paradigm uses the 5G for wireless communications,where the massive multi-input multi-output(MIMO)technique will be ***,considering in the VEC environment with many vehicles,the energy consumption of BS may be very *** this paper,we study the energy optimization problem for the massive MIMO-based VEC *** at reducing the relevant BS energy consumption,we first propose a joint optimization problem of computation resource allocation,beam allocation and vehicle grouping *** the original problem is hard to be solved directly,we try to split the original problem into two subproblems and then design a heuristic algorithm to solve *** results show that our proposed algorithm efficiently reduces the BS energy consumption compared to other schemes.
In this paper we study the problem of multi-source, P2P-assisted, multimedia content delivery of 8K content. Such media constitute a big challenge for contemporary VoD services, as their media rate can surpass the cli...
详细信息
Recognizing emotions is crucial for the development of artificial intelligence in various fields. This study explores the application of quantum support vector machines (SVMs) on emotion recognition from electroenceph...
详细信息
AI algorithms were used to improve massive information retrieval overall performance as they lessen the quantity of manual work involved in data processing and retrieval. These algorithms use numerous device studying ...
详细信息
This paper offers an overview of the most Bandwidth Allocation hassle in underwater fiber optic networks. The bandwidth in optical fiber networks is traditionally allotted according to the users' needs for the gua...
详细信息
This paper proposes a novel joint channel estimation and beamforming scheme for the massive multiple-input-multiple-output(MIMO)frequency-division duplexing(FDD) wireless legitimate surveillance system. With the propo...
详细信息
This paper proposes a novel joint channel estimation and beamforming scheme for the massive multiple-input-multiple-output(MIMO)frequency-division duplexing(FDD) wireless legitimate surveillance system. With the proposed scheme,the monitor with the full duplex capability realizes the proactive eavesdropping of the suspicious link by leveraging the pilot attack approach. Specifically, exploiting the effective eavesdropping rate and the mean square error as performance metrics and setting a total power budget at the training and transmission phases,while guaranteeing the information from suspicious source can be successfully decode, joint pilot design,power allocation and beamforming strategy are formulated as optimization problems for the two objective functions: MSE and effective eavesdropping rate. A closed-form expression of the optimal pilot with the limited length can be obtained via the channel correlation. The optimal power problem at the training phase can be solved by a simple bisection method. Then,based on the obtained imperfect estimated channel,the jamming beamforming at monitor optimization algorithm is proposed by utilizing the convex Semidefinite Programming approach to maximize the effective eavesdropping rate. Numerical results show that the proposed joint pilot design, power allocation and beamforming optimization scheme can improve the surveillance performance of the legitimate monitor as compared to the existing passive eavesdropping and jamming-assisted eavesdropping.
暂无评论