We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illumi...
详细信息
We propose a compressed ghost imaging scheme based on differential speckle patterns,named *** the scheme,a series of bucket detector signals are acquired when a series of random speckle patterns are employed to illuminate an unknown *** the differential speckle patterns(differential bucket detector signals)are obtained by taking the difference between present random speckle patterns(present bucket detector signals)and previous random speckle patterns(previous bucket detector signals).Finally,the image of object can be obtained directly by performing the compressed sensing algorithm on the differential speckle patterns and differential bucket detector *** experimental and simulated results reveal that CGI-DSP can improve the imaging quality and reduce the number of measurements comparing with the traditional compressed ghost imaging schemes because our scheme can remove the environmental illuminations efficiently.
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemen...
详细信息
network Coding (NC) brings correlation between the coded signals from different sources, which makes the system more vulnerable to the decode error at relay. Conventional Cyclic Redundancy Code (CRC) has been implemented for error bit detection. However, its error correction is simply ignored. To fully exploit this feature, this paper proposes a novel joint Log-Likelihood Ratio (LLR) CRC error mitigation for NC two way relay channel. Specific thresholds are designed to estimate the error number of data block and identify those which can be recovered if the number is within the error correction scope of CRC. We examine two modes of the thresholds, one based on the average Bit Error Rate (BER) of source-relay link, while the other based on that of instantaneous one. We provide the full analysis for the Pair-wise Error Probability (PEP) performance of the scheme. A variety of numerical results are presented to reveal the superiority of the proposed scheme to conventional CRC NC under independent Rayleigh fading channels. Moreover, the efficiencies of the proposed thresholds are also validated.
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In th...
详细信息
ISBN:
(纸本)9781849196413
In an underlay cognitive two-way Amplify-and-Forward (AF) relaying network, secondary users (SUS) and primary user (PU) can share the licensed spectrum simultaneously under the interference threshold constraint. In this paper, the joint power allocation and optimal relay selection scheme is proposed for allocating radio resource on cognitive nodes effectively. For power allocation problem, the objective function is to maximize the achieved minimum Signal to Interference plus Noise Ratio (SINR) at SUS, and the constraints include the total transmit power of cognitive nodes and PU interference threshold, the optimal power allocation algorithm and a simple distributed power allocation algorithm are proposed. Furthermore, based on these results, an optimal two-way relay selection scheme is proposed. Simulation results show that the proposed joint power allocation algorithms and relay selection scheme can achieve excellent system performance.
Device-to-device (D2D) communication has been widely studied to improve network performance and been considered as a potential technological component for the next generation communication. As Quality of Experience (Q...
详细信息
An improved super-resolution algorithm through neighbor embedding with new feature selection and example training is proposed for single image super resolution reconstruction. Firstly, we take the DCT coefficients as ...
详细信息
ISBN:
(纸本)9781467321969
An improved super-resolution algorithm through neighbor embedding with new feature selection and example training is proposed for single image super resolution reconstruction. Firstly, we take the DCT coefficients as the feature vectors, and then adaptively choose neighbors by k-means clustering algorithm. Finally, we learn the neighborhood relationship between interpolated image from low resolution image and its corresponding high resolution image. The experimental results show that the improved algorithm can not only achieve a better recovery of a single low resolution image comparing with the original neighbor embedding algorithm, but also reduce the computational complexity.
Standard TCP perform poorly in satellite networks since the long delay, high bit error ratio and other characters. A new TCP variant, called BIPR for satellite networks is presented in this paper. Using the binary inc...
详细信息
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pai...
详细信息
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing.
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual...
详细信息
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate users on the other side of the STAR-RIS. We utilize an integrated architecture that combines the fully-connected(FC)-RIS, an emerging type of beyond-diagonal(BD)-RIS, with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR) schemes to strike a balance between sensing and communications performance. Thereafter, observing the security-reliability performance tradeoff of the downlink ISAMC, we conduct closed-form analyses to compare COPs of round-robin scheduling(RS) and multiuser scheduling(MS) with the aid of a TS-based STAR-FC-RIS. Furthermore, we derive closed-form expressions of the sensing outage probability, communications outage probability(COP), and communications intercept probability, where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA) of the *** results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security. Moreover, an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.
In this paper,an expression for the user’s achievable data rate in the multi-user multiple-input multiple-output(MU-MIMO)system with limited feedback(LF)of channel state information(CSI)is *** energy efficiency(EE)is...
详细信息
In this paper,an expression for the user’s achievable data rate in the multi-user multiple-input multiple-output(MU-MIMO)system with limited feedback(LF)of channel state information(CSI)is *** energy efficiency(EE)is optimized through power allocation under quality of service(QoS)*** on mathematical equivalence and Lagrange multiplier approach,an energy-efficient unequal power allocation(EEUPA)with LF of CSI scheme is *** simulation results show that as the number of transmitting antennas increases,the EE also increases which is promising for the next generation wirelesscommunication ***,it can be seen that the QoS requirement has an effect on the EE of the ***,the proposed EEUPA with LF of CSI algorithm performs better than the existing energy-efficient equal power allocation(EEEPA)with LF of CSI schemes.
To solve the localization problem of multipath propagation in complex indoor circumstance, a localization method of signal subspace matching based on fingerprint database is proposed by using small antenna array in th...
详细信息
ISBN:
(纸本)9781509039456;9781509039449
To solve the localization problem of multipath propagation in complex indoor circumstance, a localization method of signal subspace matching based on fingerprint database is proposed by using small antenna array in the indoor environment. Compared to the RSSI, the signal subspace fingerprint can obtain better effect by utilizing more space information. The received signal from each array is firstly processed with self-correlation and it's eigenvalue decomposed to create the signal subspace fingerprint. Location is then determined by the smallest angle between the received signal subspace and the fingerprint database. Simulation results show that the proposed algorithm has made a great improvement in localization accuracy.
暂无评论