Data as well as pilot symbols are nonlinearly distorted due to signal clipping in practical OFDM systems. The distortion inflicted on pilot symbols has great negative effect on the channel estimation. To solve this is...
详细信息
This paper deals with single-channel speech separation. First, it is proved that when the sparse bases of the signal sources satisfy certain conditions, all the sources can be perfectly separated from a single mixture...
详细信息
This paper deals with single-channel speech separation. First, it is proved that when the sparse bases of the signal sources satisfy certain conditions, all the sources can be perfectly separated from a single mixture by l0 optimization. Then, a special case where the single mixture is generated by two independent speech sources is studied in more detail. It is revealed that the ideal quasi- KLT bases constructed from the original sources satisfy the sufficient conditions for perfect separation of mixed signals. Considering the fact that the ideal quasi-KLT bases cannot be obtained in practice, template-matching based quasi- KLT bases generated from the single mixture are also pro- posed to perform single-channel speech separation. Finally, simulation results demonstrating the effective performance of single-channel separation of two speech sources by l0op- timization using the template-matching based quasi-KLT bases are presented.
To solve the problem of rapid QoS declining under network situation as well as improve the judging and dynamical adjusting ability that network system towards user QoS, in this paper, we proposed a dynamical self-conf...
详细信息
This paper focused on the study of cognitive networks (CNs) oriented multi-parameter constraint Quality of Service (QoS) routing optimization. With the foundation of CNs multi-parameter QoS routing requirement, referr...
详细信息
wirelesssensornetworks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the *** this paper,we present a Distribut...
详细信息
wirelesssensornetworks(WSN) are mainly characterized by a potentially large number of distributed sensor nodes which collectively transmit information about sensed events to the *** this paper,we present a Distributed Wavelet Basis Generation(DWBG) algorithm performing at the sink to obtain the distributed wavelet basis in *** on this basis,a Wavelet Transform-based Distributed Compressed Sensing(WTDCS) algorithm is proposed to compress and reconstruct the sensed data with spatial ***,we make a detailed analysis of relationship between reconstruction performance and WTDCS algorithm parameters such as the compression ratio,the channel Signal-to-Noise Ratio(SNR),the observation noise power and the correlation decay parameter by *** simulation results show that WTDCS can achieve high performance in terms of energy and reconstruction accuracy,as compared to the conventional distributed wavelet transform algorithm.
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggre...
详细信息
To reduce the size of certificate chains and the ciphertext size in secure routing protocols, a General Aggregate Signcryption Scheme (GASC) is presented. In GASC, an identity-based signcryption algorithm and an aggregate signature algorithm are combined in a practical and secure manner to form the general aggregate signcryption scheme's schema and concept, and a new secure, efficiently general aggregate signcryption scheme, which allows the aggregation of n distinct signcryptions by n distinct users on n distinct messages, is proposed. First, the correction of the GASC scheme is analyzed. Then, we formally prove the security of GASC in the random oracle models IND-CCA2 and EUF-CMA under the DBDHP assumption and the DLP assumption, respectively. The results show that the GASC scheme is not only secure against any probabilistic polynomial-time IND-GASC-CCA2 and EUF-GASC-CMA adversary in the random oracle models but also efficient in pairing ê computations. In addition, the GASC scheme gives an effective remedy to the key escrow problem, which is an inherent issue in IBC by splitting the private key into two parts, and reduces the communication complexity by eliminating the interaction among the senders (signers) before the signcryption generation.
In this paper,we introduce a new kind of homomorphic signature,which is suitable for identity authentication in cloud computing.A user firstly computes the full signature on its all identity attributes,and sends the f...
详细信息
In this paper,we introduce a new kind of homomorphic signature,which is suitable for identity authentication in cloud computing.A user firstly computes the full signature on its all identity attributes,and sends the full signature to the intermediate channel server (the intermediate channel server should check and verify it).During the valid period of his full signature,if the user wants to require a cloud service on a special identity (only involves part of identity attributes),he only needs to securely send a {0,1}n vector to the intermediate channel *** intermediate channel server who doesn't know the secret key can compute the partial signature on the special identity,and then sends it to the cloud *** give a formal secure definition of this homomorphic signature,and construct a scheme from GHR *** prove that our scheme is secure under GHR signature.
In wirelesssensornetworks (WSNs) where the nodes operate on batteries, for which replacement and recharging is almost impossible. So it is critical to prolon g the network lifetime by minimizing the total energy con...
详细信息
In wirelesssensornetworks (WSNs) where the nodes operate on batteries, for which replacement and recharging is almost impossible. So it is critical to prolon g the network lifetime by minimizing the total energy consumption, while satisfying given throughput requirements. With this objective in mind, an automatic retransmission request (ARQ) protocol for exploiting cooperative communication is introduced and a generalized model is proposed for analyzing the throughput and energy efficiency of the scheme. The numerical results reveal that the throughput and energy efficiency of the scheme is much better than that of the traditional ARQ scheme.
wireless multimedia sensornetworks have become the focus of research in a wide variety of areas in recent years. The camera sensor nodes observe the phenomenon at different locations in the field, and the spatially p...
详细信息
wireless multimedia sensornetworks have become the focus of research in a wide variety of areas in recent years. The camera sensor nodes observe the phenomenon at different locations in the field, and the spatially proximal cameras could have highly overlapped field of views (FoVs). Based on the three-dimensional sensing model of camera sensor node, a FoVs correlation model was proposed in this paper. Then, a grid-based and a relative position-based approach were respectively designed to calculate the correlation coefficient between two cameras. Simulation results and algorithm complexity analysis demonstrate that the relative position-based method has highly efficiency and nearly reduces two orders of magnitude of time complexity to the former.
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wirelesssensornetworks, which is largely determined the various service-quality improvement of wirelesssensor netwo...
详细信息
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wirelesssensornetworks, which is largely determined the various service-quality improvement of wirelesssensornetworks. In order to improve the coverage of the target area, this paper presents a distributed algorithm of coverage control. Assume that nodes initially deployed on the surface of the water and can only move in vertical direction in 3-D space, the algorithm is first to control the nodes in-depth and relocate the nodes at different depths, then the nodes continue to adjust their depths until there is no augment for improving their coverage, and to achieve efficient coverage of the three-dimensional sensornetworks ultimately. Experimental results show that compared with traditional random deployment method, the proposed coverage control algorithm can improve coverage of network effectively.
暂无评论