Target tracking has broad applications like disaster relief, and unmanned aerial vehicles (UAVs) have been universally applied in target tracking in recent years. Due to the strong responsiveness to deceptive reward s...
详细信息
Estimating high-dimensional covariance matrices is crucial in various domains. This work considers a scenario where two collaborating agents access disjoint dimensions of m samples from a high-dimensional random vecto...
详细信息
Estimating high-dimensional covariance matrices is crucial in various domains. This work considers a scenario where two collaborating agents access disjoint dimensions of m samples from a high-dimensional random vector, and they can only communicate a limited number of bits to a central server, which wants to accurately approximate the covariance matrix. We analyze the fundamental trade-off between communication cost, number of samples, and estimation accuracy. We prove a lower bound on the error achievable by any estimator, highlighting the impact of dimensions, number of samples, and communication budget. Furthermore, we present an algorithm that achieves this lower bound up to a logarithmic factor, demonstrating its near-optimality in practical settings. Copyright 2024 by the author(s)
Ultradense low-Earth orbit (LEO) satellite-terrestrial network (ULSN) has evolved as a new paradigm to provide ubiquitous and high-capacity communications in next generation wireless networks. However, the direct LEO ...
详细信息
The purpose of this note is to correct an error made by Con et al. (2023), specifically in the proof of Theorem 9. Here we correct the proof but as a consequence we get a slightly weaker result. In Theorem9, we claime...
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and peo...
详细信息
With the rise of the Internet of Things(IoT),the word“intelligent medical care”has increasingly become a major *** medicine adopts the most advanced IoT technology to realize the interaction between patients and people,medical institutions,andmedical ***,with the openness of network transmission,the security and privacy of information transmission have become a major ***,Masud et *** a lightweight anonymous user authentication protocol for IoT medical treatment,claiming that their method can resist various ***,through analysis of the protocol,we observed that their protocol cannot effectively resist privileged internal attacks,sensor node capture attacks,and stolen authentication attacks,and their protocol does not have perfect forward ***,we propose a new protocol to resolve the security vulnerabilities in Masud’s protocol and remove some redundant parameters,so as tomake the protocolmore compact and *** addition,we evaluate the security and performance of the new protocol and prove that the overall performance of the new protocol is better than that of other related protocols.
The present study introduces a novel binary meta-heuristic optimizer, referred to as the Binary Growth Optimizer (BGO), which is specifically developed to address discrete optimization problems. The BGO utilizes trans...
详细信息
This paper is concerned with the adaptive neural network event-triggered control (ETC) problem for stochastic nonlinear systems with output constraint. The influence of stochastic disturbance inevitably exists in many...
详细信息
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual ***,integrity,security,identification,and authentication problems are still *** video...
详细信息
Video conferencing applications help people communicate via the Internet and provide a significant and consistent basis for virtual ***,integrity,security,identification,and authentication problems are still *** video conference technologies typically rely on cloud systems to provide a stable and secure basis for executing tasks and *** the same time,video conferencing applications are being migrated from centralized to decentralized solutions for better performance without the need for third-party *** article demonstrates a decentralized smart identification scheme for video conferencing applications based on biometric technology,machine learning,and a decentralized hash table combined with blockchain *** store users'information on a distributed hash table and transactional events on the distributed ledger after identifying users by implementing machine learning ***,we leverage distributed ledger technology's immutability and traceability properties and distributed hash table unlimited storage feature to improve the system's storage capacity and immutability by evaluating three possible *** experimental results show that an architecture based on blockchain and distributed hash table has better efficiency but needs a longer time to execute than the two other architectures using a centralized database.
Rapid advancements in 5G communication and the Internet-of-things have prompted the development of cognitive radio sensing for spectrum monitoring and malicious attack detection. An end-to-end radio classification sys...
详细信息
In this paper,through experiments and DEM simulations,it is found that there is a ring-shaped region named Quasi-static Region between the particles expanding outward and the particles collapsing inward during the imp...
详细信息
In this paper,through experiments and DEM simulations,it is found that there is a ring-shaped region named Quasi-static Region between the particles expanding outward and the particles collapsing inward during the impact ***-static Region is always generated from the impact point at the same time,and then spreads out at a uniform *** the propagation of Quasi-static Region,the velocity of the particles in the particle extend region varies linearly in space and *** the change rate is only related to the properties of the particle *** simulation results show that the particle flow in Quasi-static Region is elastic-inertial flow,while the particle flow expanding outward and collapsing inward is inertial flow.
暂无评论