The energy independence, security and reliability of operating energy distribution systems, along with the use of renewable energy sources (RES), are the most important topics of energy-related research and developmen...
详细信息
The energy independence, security and reliability of operating energy distribution systems, along with the use of renewable energy sources (RES), are the most important topics of energy-related research and development in recent years.
In this paper, the problem of secrecy sum-rate maximization is addressed for a multiuser multiple-input multiple-output wiretap channel. We consider the case of a single eavesdropper, when the information signals of t...
详细信息
ISBN:
(纸本)9781467355766
In this paper, the problem of secrecy sum-rate maximization is addressed for a multiuser multiple-input multiple-output wiretap channel. We consider the case of a single eavesdropper, when the information signals of the legitimate users are spatially multiplexed by using either zero forcing beamforming (ZFB) or Tomlinson-Harashima precoding (THP). By exploiting channel correlation of legitimate users with the eavesdropper, two low-complexity user selection schemes are investigated. In both schemes, the key idea is to extract multiuser diversity in order to protect information signals from eavesdropping rather than creating jamming interference. In the first scheme, user selection is performed in the null space of the eavesdropper's channel and an iterative power allocation method is proposed. In the second scheme, the eavesdropper is considered to be a selected authorized user but its allocated power is forced to be zero. Numerical results are provided to illustrate the secrecy sum-rate performance of the proposed schemes.
This paper deals with the implementation of a Nonlinear Interference Suppressor (NIS) into a wireless LTE transceiver. This within the context of high energy efficient multi-standard transceivers controlled by a cogni...
详细信息
This paper presents a research study consisting of a comparison analysis of replication and retrieval of medical image data which use the Digital Imaging and Communications in Medicine (DICOM) standard. These data are...
详细信息
This paper presents a research study consisting of a comparison analysis of replication and retrieval of medical image data which use the Digital Imaging and Communications in Medicine (DICOM) standard. These data are stored in a relational database management system (RDBMS) and in the Hierarchical Data Format (HDF) using a distributed file system as a data backend. The importance of this work was measured by verification of elapsed-time reduction for medical image data replication and retrieval in a real telemedicine environment.
In this work, we analyzed only the patients of the NSTEMI (non ST-segment elevation myocardial infarction) who arrived at the hospital within 12 h after symptoms *** NSTEMI follow-up data within, the characteristics o...
详细信息
In this work, we analyzed only the patients of the NSTEMI (non ST-segment elevation myocardial infarction) who arrived at the hospital within 12 h after symptoms *** NSTEMI follow-up data within, the characteristics of the clinical data, the risk factor, and the blood tested in the hospital visit were analyzed for MACE (major adverse cardiac events) *** includes cardiac death, MI (myocardial infarction), Re-PCI, and CABG (coronary artery bypass graft).As a result, from the NSTEMI patients which can be followed up for over 12 m, NT-ProBNP (p=0.014) and age (p=0.045) are found to be the independent risk factors related to ***, they can be useful for the diagnosis and prognosis for NSTEMI patients as a biomarker.
The present paper demonstrates through experiments that the performance of a teleoperated robot system is strongly influenced by the quality of the communication environment, which in our case was a wireless LAN (WLAN...
详细信息
It is a big challenge to clearly identify the boundary between positive and negative streams. Several attempts have used negative feedback to solve this challenge;however, there are two issues for using negative relev...
详细信息
Intrusions in computer networks have driven the development of various techniques for intrusion detection systems (IDSs). In general, the existing approaches seek two goals: high detection rate and low false alarm rat...
详细信息
Intrusions in computer networks have driven the development of various techniques for intrusion detection systems (IDSs). In general, the existing approaches seek two goals: high detection rate and low false alarm rate. The problem with such proposed solutions is that they are usually processing intensive due to the large size of the training set in place. We propose a technique that combines a fuzzy ARTMAP neural network with the well-known Kappa coefficient to perform feature selection. By adding the Kappa coefficient to the feature selection process, we managed to reduce the training set substantially. The evaluation results show that our proposal is capable of detecting intrusions with high accuracy rates while keeping the computational cost low.
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud services. Though, due to the current restriction...
详细信息
The emergency of cloud computing and Generic Enablers (GEs) as the building blocks of Future Internet (FI) applications highlights new requirements in the area of cloud services. Though, due to the current restrictions of various certification standards related with privacy and safety of health related data, the utilization of cloud computing in such area has been in many instances unlawful. Here, we focus on demonstrating a “software to data” provisioning solution to propose a mapping of FI application use case requirements to software specifications (using GEs). The aim is to establish a provider to consumer cloud setting wherein no sensitive data will be exchanged but it will reside at the back-end site. We propose a prototype architecture that covers the cloud management layer and the operational features that manage data and Internet of Things devices. To show a real life scenario, we present the use case of the diabetes care and a FI application that includes various GEs.
The Association for the Advancement of Artificial Intelligence was pleased to present the 2012 Fall Symposium Series, held Friday through Sunday, November 2-4, at the Westin Arlington Gateway in Arlington, Virginia. T...
详细信息
暂无评论