This study examines the impact of environmental, social, and governance (ESG) factors on economic investment from a statistical perspective, aiming to develop a tested investment strategy that capitalizes on the conne...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
VGIS (Virtual Geographic information System) Platform is a unified oilfield operations management platform based on MaaS (Management as a Service) that integrates advanced technologies such as AIoT (Artificial Intelli...
详细信息
Load Forecast (LF) is an important task in the planning, control and application of public power systems. Accurate Short Term Load Forecast (STLF) is the premise of safe and economical operation of a power system. In ...
详细信息
Monitoring sugar concentration during fermentation is crucial for producing high-quality alcoholic beverages. Traditional methods for measuring sugar concentration can be costly and time-consuming, especially for smal...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Thetransformer-based semantic segmentation approaches,which divide the image into different regions by sliding windows and model the relation inside each window,have achieved outstanding ***,since the relation modelin...
详细信息
Thetransformer-based semantic segmentation approaches,which divide the image into different regions by sliding windows and model the relation inside each window,have achieved outstanding ***,since the relation modeling between windows was not the primary emphasis of previous work,it was not fully *** address this issue,we propose a Graph-Segmenter,including a graph transformer and a boundary-aware attention module,which is an effective network for simultaneously modeling the more profound relation between windows in a global view and various pixels inside each window as a local one,and for substantial low-cost boundary ***,we treat every window and pixel inside the window as nodes to construct graphs for both views and devise the graph *** introduced boundary-awareattentionmoduleoptimizes theedge information of the target objects by modeling the relationship between the pixel on the object's *** experiments on three widely used semantic segmentation datasets(Cityscapes,ADE-20k and PASCAL Context)demonstrate that our proposed network,a Graph Transformer with Boundary-aware Attention,can achieve state-of-the-art segmentation performance.
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on differe...
详细信息
Various organizations store data online rather than on physical *** the number of user’s data stored in cloud servers increases,the attack rate to access data from cloud servers also *** researchers worked on different algorithms to protect cloud data from replay *** of the papers used a technique that simultaneously detects a full-message and partial-message replay *** study presents the development of a TKN(Text,Key and Name)cryptographic algorithm aimed at protecting data from replay *** program employs distinct ways to encrypt plain text[P],a user-defined Key[K],and a Secret Code[N].The novelty of the TKN cryptographic algorithm is that the bit value of each text is linked to another value with the help of the proposed algorithm,and the length of the cipher text obtained is twice the length of the original *** the scenario that an attacker executes a replay attack on the cloud server,engages in cryptanalysis,or manipulates any data,it will result in automated modification of all associated values inside the *** mechanism has the benefit of enhancing the detectability of replay ***,the attacker cannot access data not included in any of the papers,regardless of how effective the attack strategy *** the end of paper,the proposed algorithm’s novelty will be compared with different algorithms,and it will be discussed how far the proposed algorithm is better than all other algorithms.
The aim of this paper is to analyze the implementation of intelligent lighting within the concept of smart energy based on the possibility of saving and efficient use of energy, which is largely based on non-renewable...
详细信息
An ultra-wideband (UWB) slotted compact Vivaldi antenna with a microstrip line feed was evaluated for microwave imaging (MI) applications. The recommended FR4 substrate-based Vivaldi antenna is 50×50×1.5 mm3...
详细信息
暂无评论