Aided by device-to-device(D2D) connections, unmanned aerial vehicle(UAV) can significantly enhance the coverage of wireless communications. In this paper, we consider a data collection system with the assistance of D2...
详细信息
Aided by device-to-device(D2D) connections, unmanned aerial vehicle(UAV) can significantly enhance the coverage of wireless communications. In this paper, we consider a data collection system with the assistance of D2D, where two fixed-wing UAVs as aerial base stations cooperatively serve the ground devices. To accommodate more devices, we propose two effective algorithms to establish the multi-hop D2D connections. Then, the user scheduling, UAV trajectory, and transmit power are jointly optimized to maximize the energy efficiency, which is a non-convex problem. Accordingly, we decompose it into three subproblems. The scheduling optimization is first converted into a linear programming. Then, the trajectory design and the transmit power optimization are reformulated as two convex problems by the Dinkelbach method. Finally, an iterative algorithm is proposed to effectively solve the original problem. Simulation results are presented to verify the effectiveness of the proposed scheme.
In the realm of cybersecurity,the detection and analysis of obfuscated malware remain a critical challenge,especially in the context of memory *** research paper presents a novel machine learning-based framework desig...
详细信息
In the realm of cybersecurity,the detection and analysis of obfuscated malware remain a critical challenge,especially in the context of memory *** research paper presents a novel machine learning-based framework designed to enhance the detection and analytical capabilities against such elusive threats for binary and multi type’s *** approach leverages a comprehensive dataset comprising benign and malicious memory dumps,encompassing a wide array of obfuscated malware types including Spyware,Ransomware,and Trojan Horses with their *** begin by employing rigorous data preprocessing methods,including the normalization of memory dumps and encoding of categorical *** tackle the issue of class imbalance,a Synthetic Minority Over-sampling Technique is utilized,ensuring a balanced representation of various malware *** selection is meticulously conducted through Chi-Square tests,mutual information,and correlation analyses,refning the model’s focus on the most indicative attributes of obfuscated *** heart of our framework lies in the deployment of an Ensemble-based Classifer,chosen for its robustness and efectiveness in handling complex data *** model’s performance is rigorously evaluated using a suite of metrics,including accuracy,precision,recall,F1-score,and the area under the ROC curve(AUC)with other evaluation metrics to assess the model’s *** proposed model demonstrates a detection accuracy exceeding 99%across all cases,surpassing the performance of all existing models in the realm of malware detection.
The research and development efforts for the sixth generation(6G) wireless communication are underway to fulfill the growing demands for wireless communications. 6G is expected to become the key enabler for diverse ne...
The research and development efforts for the sixth generation(6G) wireless communication are underway to fulfill the growing demands for wireless communications. 6G is expected to become the key enabler for diverse new applications and services [1]. To achieve the excellent performance, 6G will implement extremely large-scale antenna arrays(ELAAs), terahertz [2], and new types of antennas with metamaterials, leading to a paradigm shift for the electromagnetic characteristics.
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. Howeve...
详细信息
Integrated sensing and communication (ISAC) is a promising technique to increase spectral efficiency and support various emerging applications by sharing the spectrum and hardware between these functionalities. However, the traditional ISAC schemes are highly dependent on the accurate mathematical model and suffer from the challenges of high complexity and poor performance in practical scenarios. Recently, artificial intelligence (AI) has emerged as a viable technique to address these issues due to its powerful learning capabilities, satisfactory generalization capability, fast inference speed, and high adaptability for dynamic environments, facilitating a system design shift from model-driven to data-driven. Intelligent ISAC, which integrates AI into ISAC, has been a hot topic that has attracted many researchers to investigate. In this paper, we provide a comprehensive overview of intelligent ISAC, including its motivation, typical applications, recent trends, and challenges. In particular, we first introduce the basic principle of ISAC, followed by its key techniques. Then, an overview of AI and a comparison between model-based and AI-based methods for ISAC are provided. Furthermore, the typical applications of AI in ISAC and the recent trends for AI-enabled ISAC are reviewed. Finally, the future research issues and challenges of intelligent ISAC are discussed.
The Morris-Lecar model is a neuronal model designed to replicate the oscillatory activity of barnacle giant muscle *** work presents a three-dimensional Morris-Lecar model with a novel fast-slow *** model introduces a...
详细信息
The Morris-Lecar model is a neuronal model designed to replicate the oscillatory activity of barnacle giant muscle *** work presents a three-dimensional Morris-Lecar model with a novel fast-slow *** model introduces a current containing slow variables,thereby forming a new fast-slow structure with the membrane *** results reveal the existence of two independent unstable foci and complex dynamical behaviors that include period-doubling bifurcations and spiking/bursting *** types of bifurcation mechanisms for bursting activities are elucidated through theoretical analysis based on four typical bursting ***,a digital neuronal circuit was developed based on FPGA,and experimental results show good consistency with numerical results.
Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traver...
详细信息
Conservative chaotic systems have unique advantages over dissipative chaotic systems in the fields of secure communication and pseudo-random number generator because they do not have attractors but possess good traversal and pseudorandomness. In this work, a novel five-dimensional(5D) Hamiltonian conservative hyperchaotic system is proposed based on the 5D Euler equation. The proposed system can have different types of coordinate transformations and time reversal symmetries. In this work, Hamilton energy and Casimir energy are analyzed firstly, and it is proved that the new system satisfies Hamilton energy conservation and can generate chaos. Then, the complex dynamic characteristics of the system are demonstrated and the conservatism and chaos characteristics of the system are verified through the correlation analysis methods such as phase diagram, equilibrium point, Lyapunov exponent, bifurcation diagram, and SE complexity. In addition, a detailed analysis of the multistable characteristics of the system reveals that many energy-related coexisting orbits exist. Based on the infinite number of center-type and saddle-type equilibrium points, the dynamic characteristics of the hidden multistability of the system are revealed. Then, the National Institute of Standards and technology(NIST)test of the new system shows that the chaotic sequence generated by the system has strong pseudo-random. Finally, the circuit simulation and hardware circuit experiment of the system are carried out with Multisim simulation software and digital signal processor(DSP) respectively. The experimental results confirm that the new system has good ergodicity and realizability.
Significant advancements have beenwitnessed in visual tracking applications leveragingViT in recent years,mainly due to the formidablemodeling capabilities of Vision Transformer(ViT).However,the strong performance of ...
详细信息
Significant advancements have beenwitnessed in visual tracking applications leveragingViT in recent years,mainly due to the formidablemodeling capabilities of Vision Transformer(ViT).However,the strong performance of such trackers heavily relies on ViT models pretrained for long periods,limitingmore flexible model designs for tracking *** address this issue,we propose an efficient unsupervised ViT pretraining method for the tracking task based on masked autoencoders,called *** pretraining,we employ two shared-parameter ViTs,serving as the appearance encoder and motion encoder,*** appearance encoder encodes randomly masked image data,while the motion encoder encodes randomly masked pairs of video ***,an appearance decoder and a motion decoder separately reconstruct the original image data and video frame data at the pixel *** this way,ViT learns to understand both the appearance of images and the motion between video frames *** results demonstrate that ViT-Base and ViT-Large models,pretrained with TrackMAE and combined with a simple tracking head,achieve state-of-the-art(SOTA)performance without additional ***,compared to the currently popular MAE pretraining methods,TrackMAE consumes only 1/5 of the training time,which will facilitate the customization of diverse models for *** instance,we additionally customize a lightweight ViT-XS,which achieves SOTA efficient tracking performance.
For a sub-connected hybrid multiple-input multiple-output(MIMO) receiver with K subarrays and N antennas, there exists a challenging problem of how to rapidly remove phase ambiguity in only single time-slot. A directi...
详细信息
For a sub-connected hybrid multiple-input multiple-output(MIMO) receiver with K subarrays and N antennas, there exists a challenging problem of how to rapidly remove phase ambiguity in only single time-slot. A direction of arrival(DOA) estimator of maximizing received power(Max-RP) is proposed to find the maximum value of K-subarray output powers, where each subarray is in charge of one sector, and the center angle of the sector corresponding to the maximum output is the estimated true DOA. To make an enhancement on precision, Max-RP plus quadratic interpolation(Max-RP-QI) method is designed. In the proposed Max-RP-QI, a quadratic interpolation scheme is adopted to interpolate the three DOA values corresponding to the largest three receive powers of *** achieve the Cramer Rao lower bound, a Root-MUSIC plus Max-RP-QI scheme is developed. Simulation results show that the proposed three methods eliminate the phase ambiguity during one time-slot and also show low computational complexities. The proposed Root-MUSIC plus Max-RP-QI scheme can reach the Cramer Rao lower bound,and the proposed Max-RP and Max-RP-QI are still some performance losses 2–4 d B compared to the Cramer Rao lower bound.
To address the challenges of low delivery rate in proactive routing protocols and high forwarding delay in opportunistic routing protocols caused by network sparsity, node mobility, and localization difficulties in dy...
详细信息
Pulse repetition interval(PRI)modulation recognition and pulse sequence search are significant for effective electronic support *** modern electromagnetic environments,different types of inter-pulse slide radars are h...
详细信息
Pulse repetition interval(PRI)modulation recognition and pulse sequence search are significant for effective electronic support *** modern electromagnetic environments,different types of inter-pulse slide radars are highly *** are few available training samples in practical situations,which leads to a low recognition accuracy and poor search effect of the pulse *** this paper,an approach based on bi-directional long short-term memory(BiLSTM)networks and the temporal correlation algorithm for PRI modulation recognition and sequence search under the small sample prerequisite is *** simulation results demonstrate that the proposed algorithm can recognize unilinear,bilinear,sawtooth,and sinusoidal PRI modulation types with 91.43% accuracy and complete the pulse sequence search with 30% missing pulses and 50% spurious pulses under the small sample prerequisite.
暂无评论