Research and industry interest in high-level synthesis has been renewed in the last few years, proven by the introduction of new tools or improved versions of existing tools. Academic tools like Gaut or CCC have recen...
详细信息
The conventional outage in wireless communication systems is caused by the deterioration of the wireless communication link, i.e., the received signal power is less than the minimum received signal power. Is there a p...
详细信息
The conventional outage in wireless communication systems is caused by the deterioration of the wireless communication link, i.e., the received signal power is less than the minimum received signal power. Is there a p...
详细信息
ISBN:
(数字)9781728109626
ISBN:
(纸本)9781728109633
The conventional outage in wireless communication systems is caused by the deterioration of the wireless communication link, i.e., the received signal power is less than the minimum received signal power. Is there a possibility that the outage occurs in wireless communication systems with a good channel state? Based on both communication and heat transfer theories, a power-consumption outage in the wireless communication between millimeter wave (mmWave) massive multiple-input multiple-output (MIMO) base stations (BSs) and smartphones has been modeled and analyzed. Moreover, the total transmission time model with respect to the number of power-consumption outages is derived for mmWave massive MIMO communication systems. Simulation results indicate that the total transmission time is extended by the power-consumption outage, which deteriorates the average transmission rate of mmWave massive MIMO BSs.
This paper presents a new simple and efficient technique for secret sharing. This technique inherits the effectiveness of Progressive Visual Secret Sharing (PVSS), in which the quality of recovered secret image is imp...
This paper presents a new simple and efficient technique for secret sharing. This technique inherits the effectiveness of Progressive Visual Secret Sharing (PVSS), in which the quality of recovered secret image is improved if more shared images are stacked together using the eXclusive-OR (XOR) operation. The proposed method also extends the usability of PVSS approach into the Friendly Visual Secret Sharing (PVSS). The content of shared image is converted into more friendly appearances rather than in the noise-like shared image. The proposed method offers promising result for grayscale and color image. It also produces recovered secret image in the lossless condition. The proposed method can be regarded as a good candidate for secret sharing.
The intention of this paper is to discuss the mathematical model of causality introduced by C.W.J. Granger in 1969. The Granger's model of causality has become well-known and often used in various econometric mode...
详细信息
OPTIONAL is a key feature in SPARQL for dealing with missing inf.rmation. While this operator is used extensively, it is also known for its complexity, which can make efficient evaluation of queries with OPTIONAL chal...
详细信息
This paper considers a two-hop network consisting of a source, two parallel half-duplex relay nodes, and two destinations. While the destinations have an adequate power supply, the source and relay nodes rely on harve...
详细信息
It is important to understand how the outcome of an election can be modified by an agent with control over the structure of the election. Electoral control has been studied for many election systems, but for all studi...
详细信息
In this paper, a novel Graph-based Technique for Extracting Keyphrases in a single document (GTEK) is introduced to be used in extractive summarization of text. GTEK is based on the graph-based representation of text,...
详细信息
In this paper, a novel Graph-based Technique for Extracting Keyphrases in a single document (GTEK) is introduced to be used in extractive summarization of text. GTEK is based on the graph-based representation of text, which depends on terms and phrase numeration in sentences rather than some structural document features. GTEK considers the impact of the sentence on the phrases in a document, motivated by the fact that a phrase may be important if it appears in the most important sentences in the document. The Graph-based Growing Self-Organizing Map (G-GSOM) is used to group the sentences into graph-based clusters. TextRank algorithm is applied on graphs of clusters under the assumption that the top-ranked nodes should represent the most important sentences, where the most frequent phrases in these sentences are selected as document keyphrases. Experimental results show that our innovative technique extracts the most keyphrases of two datasets.
Morphological attribute profiles (APs) are among the most effective methods to model the spatial and contextual inf.rmation for the analysis of remote sensing images, especially for classification task. Since their fi...
详细信息
暂无评论