Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne...
详细信息
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairness,and energy efficiency(EE).However,in conventional NOMA networks,performance degradation still exists because of the stochastic behavior of wireless *** combat this challenge,the concept of Intelligent Reflecting Surface(IRS)has risen to prominence as a low-cost intelligent solution for Beyond 5G(B5G)*** this paper,a modeling primer based on the integration of these two cutting-edge technologies,i.e.,IRS and NOMA,for B5G wireless networks is *** in-depth comparative analysis of IRS-assisted Power Domain(PD)-NOMA networks is provided through 3-fold ***,a primer is presented on the system architecture of IRS-enabled multiple-configuration PD-NOMA systems,and parallels are drawn with conventional network configurations,i.e.,conventional NOMA,Orthogonal Multiple Access(OMA),and IRS-assisted OMA *** by this,a comparative analysis of these network configurations is showcased in terms of significant performance metrics,namely,individual users'achievable rate,sum rate,ergodic rate,EE,and outage ***,for multi-antenna IRS-enabled NOMA networks,we exploit the active Beamforming(BF)technique by employing a greedy algorithm using a state-of-the-art branch-reduceand-bound(BRB)*** optimality of the BRB algorithm is presented by comparing it with benchmark BF techniques,i.e.,minimum-mean-square-error,zero-forcing-BF,and ***,we present an outlook on future envisioned NOMA networks,aided by IRSs,i.e.,with a variety of potential applications for 6G wireless *** work presents a generic performance assessment toolkit for wireless networks,focusing on IRS-assisted NOMA *** comparative analysis provides a solid foundation for the dev
Interactive video object segmentation (iVOS), which aims to efficiently produce high-quality segmentation masks of the target object in a video with user interactions. Recently, numerous works are proposed to advance ...
详细信息
The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton *** fus...
详细信息
The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton *** fusing band combination optimization with deep learning,this study aims to achieve more efficient and accurate detection of film impurities in seed cotton on the production *** applying hyperspectral imaging and a one-dimensional deep learning algorithm,we detect and classify impurities in seed cotton after *** main categories detected include pure cotton,conveyor belt,film covering seed cotton,and film adhered to the conveyor *** proposed method achieves an impurity detection rate of 99.698%.To further ensure the feasibility and practical application potential of this strategy,we compare our results against existing mainstream *** addition,the model shows excellent recognition performance on pseudo-color images of real *** a processing time of 11.764μs per pixel from experimental data,it shows a much improved speed requirement while maintaining the accuracy of real production *** strategy provides an accurate and efficient method for removing impurities during cotton processing.
Unlike traditional networks, Software-defined networks (SDNs) provide an overall view and centralized control of all the devices in the network. SDNs enable the network administrator to implement the network policy by...
详细信息
This paper proposes a highly reliable multilayer encryption scheme with constellation shaping based on joint index modulation. Multilayer encryption is used to ensure the security of the scheme. We utilize the 3D-Zhan...
详细信息
This paper proposes a highly reliable multilayer encryption scheme with constellation shaping based on joint index modulation. Multilayer encryption is used to ensure the security of the scheme. We utilize the 3D-Zhang chaotic system to realize the multidimensional perturbation of bits, subcarriers, and symbols of the original signal. The key information is masked with the signal using joint index modulation (JIM). The cooperative transmission of the initial value of the chaotic system is realized through the position information of the silent subcarriers and the constellation modes of the corresponding subcarriers. The scheme interleaves the initial values of the two chaotic systems to encode them as index bits, realizing the first layer of masked keys. Additional constellation shaping is achieved by optimizing the index mapping rules and changing the distribution of constellation points in the center and in the dual mode. The rotational encryption of the constellation is realized using a one-dimensional sinusoidal chaotic system after the completion of JIM, and the second layer of spherical shell masking of the key information is completed. The experimental implementation demonstrates the successful transmission of a 14 Gb/s 3D-JIM -8QAM signal over a 2 km weakly coupled seven-core fiber. Results confirm that the multi-layer encryption approach ensures secure signal transmission even under partial key leakage, without introducing degradation to the system's transmission performance. Compared to a random constellation distribution, the optimized index mapping scheme provides a coding gain of 0.75 dB at an FEC (Forward Error Correction) threshold of 3.8×10-3. The proposed scheme achieves error-free key transmission, with a bit error rate (BER) consistently maintained at 0. Notably, even minor key misalignments result in a BER of 0.5, facilitating timely key updates. The scheme boasts a vast key space of 10150, effectively resisting brute-force attacks. Due to its hi
Obstacle detection systems serve as a linchpin in ensuring the safety of autonomous vehicles. While contemporary detection techniques grapple with intricate results, diminished efficiency, and substantial computationa...
详细信息
Very recently, a memory-efficient version (called MeZO) of simultaneous perturbation stochastic approximation (SPSA), one well-established zeroth-order optimizer from the automatic control community, has shown competi...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary t...
详细信息
Encryption algorithms are one of the methods to protect dataduring its transmission through an unsafe transmission medium. But encryptionmethods need a lot of time during encryption and decryption, so itis necessary to find encryption algorithms that consume little time whilepreserving the security of the data. In this paper, more than one algorithmwas combined to obtain high security with a short implementation time. Achaotic system, DNA computing, and Salsa20 were combined. A proposed5D chaos system was used to generate more robust keys in a Salsa algorithmand DNA computing. Also, the confusion is performed using a new *** proposed chaos system achieves three positive Lyapunov *** results demonstrate of the proposed scheme has a sufficient peak signalto-noise ratio, a low correlation, and a large key space. These factors makeit more efficient than its classical counterpart and can resist statistical anddifferential attacks. The number of changing pixel rates (NPCR) and theunified averaged changed intensity (UACI) values were 0.99710 and UACI33.68. The entropy oscillates from 7.9965 to 7.9982 for the tested encryptedimages. The suggested approach is resistant to heavy attacks and takes lesstime to execute than previously discussed methods, making it an efficient,lightweight image encryption scheme. The method provides lower correlationcoefficients than other methods, another indicator of an efficient imageencryption system. Even though the proposed scheme has useful applicationsin image transmission, it still requires profound improvement in implementingthe high-intelligence scheme and verifying its feasibility on devices with theInternet of Things (IoT) enabled.
The collaborative interaction between power systems and the Internet of Things (IoT) is strengthening, with IoT devices facilitating real-time monitoring and governance of the power grid, pushing power systems to the ...
详细信息
This work addresses bi-objective hybrid flow shop scheduling problems considering consistent sublots(Bi-HFSP_CS).The objectives are to minimize the makespan and total energy ***,the Bi-HFSP_CS is formalized,followed b...
详细信息
This work addresses bi-objective hybrid flow shop scheduling problems considering consistent sublots(Bi-HFSP_CS).The objectives are to minimize the makespan and total energy ***,the Bi-HFSP_CS is formalized,followed by the establishment of a mathematical ***,enhanced version of the artificial bee colony(ABC)algorithms is proposed for tackling the Bi-HFSP_***,fourteen local search operators are employed to search for better *** different Q-learning tactics are developed to embed into the ABC algorithm to guide the selection of operators throughout the iteration ***,the proposed tactics are assessed for their efficacy through a comparison of the ABC algorithm,its three variants,and three effective algorithms in resolving 95 instances of 35 different *** experimental results and analysis showcase that the enhanced ABC algorithm combined with Q-learning(QABC1)demonstrates as the top performer for solving concerned *** study introduces a novel approach to solve the Bi-HFSP_CS and illustrates its efficacy and superior competitive strength,offering beneficial perspectives for exploration and research in relevant domains.
暂无评论