The table-manipulation method plays a important role in optimizing resource scheduling, scientifically location chosen, task assignment, investment distribution and so on. Most literatures introduction the table-manip...
详细信息
Collaborative simulation technology is an important factor in improving the efficiency of complex product design. Although High Level Architecture (HLA)-based simulation technology can meet the needs for simulation in...
详细信息
In the classical computation theory, the language of a system features the computational behavior of the system but it does not distinguish the determinism and nondeterminism of actions. However, Milner found that the...
详细信息
Reducing noise disturbances in the frequency segment of high frequency (HF) ground wave radar and restraining the sidelobes of strong targets that interfere with the detection of weak targets are the interesting Topic...
详细信息
ISBN:
(纸本)9789955690184
Reducing noise disturbances in the frequency segment of high frequency (HF) ground wave radar and restraining the sidelobes of strong targets that interfere with the detection of weak targets are the interesting Topic. A new method based on an adaptive techniques that solves these problems is proposed. By changing the working time of the frequency spectrum monitor (FSM), we have shown not only that radar can run in the frequency segments with lower noise disturbances, but also that the noise data produced by FSM can be exploited effectively. There is no correlation between the noise and the useful echo signal, though the correlation between noises over very short time periods is strong,. Exploiting the phenomena, we can adjust system parameters in real-time by adaptive methods to solve the two problems,namely sidelobe disturbance of strong targets and noise distrubance in the frequency segment.
In this paper we propose a novel Frequency Selective SRS (FS-SRS) scheme to improve the quality of CSI. According to the CQIs (channel quality indications), which are periodically reported by each user, and the bandwi...
详细信息
ISBN:
(纸本)9781479935130
In this paper we propose a novel Frequency Selective SRS (FS-SRS) scheme to improve the quality of CSI. According to the CQIs (channel quality indications), which are periodically reported by each user, and the bandwidth requirement of each user, BSs dynamically schedule each user to send SRSs only on the requisite bandwidth with best CQIs instead of on full bandwidth or on specified sub-bandwidth as in the current LTE TDD systems. Simulation results show that the proposed FS-SRS scheme outperforms the current schemes in estimation accuracy for various frequency-selective and/or time-selective fading channels. In addition, the proposed FS-SRS scheme offers unique advantages over the current schemes. Firstly, it is robust to frequency selective channels. Secondly, it is hardly impacted by timing offset. Thirdly, it is adaptive to the change of the underlying scheduler. Fourthly, it can increase SRS capacity. Finally, it can be extended to multi-user MIMO (multiple-input multiple-output) systems, called extended FS-SRS scheme. Moreover, the proposed schemes are applicable to the uplink SRS design in LTE-Advanced systems.
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to access data from sensor nodes. Recently, M.L. Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. Later, Khan and Alghathbar (K-A) pointed out that Das’ scheme has some security pitfalls and showed several improvements to overcome these weaknesses. However, we demonstrate that in the K-A-scheme, there is no provision of non-repudiation, it is susceptible to the attack due to a lost smart card, and mutual authentication between the user and the GW-node does not attained. Moreover, the GW-node cannot prove that the first message comes from the user. To overcome these security weaknesses of the K-A-scheme, we propose security patches and prove our scheme.
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework.
This paper aims at developing a clustering approach with spectral images directly from the compressive measurements of coded aperture snapshot spectral imager (CASSI). Assuming that compressed measurements often lie a...
详细信息
ISBN:
(数字)9781728163956
ISBN:
(纸本)9781728163963
This paper aims at developing a clustering approach with spectral images directly from the compressive measurements of coded aperture snapshot spectral imager (CASSI). Assuming that compressed measurements often lie approximately in low dimensional subspaces corresponding to multiple classes, state of the art methods generally obtains optimal solution for each step separately but cannot guarantee that it will achieve the globally optimal clustering results. In this paper, a low-rank subspace representation (LRSR) algorithm is proposed to perform clustering on the compressed measurements. In addition, a subspace structured norm is added into the objective of low-rank representation problem exploiting the fact that each point in a union of subspaces can be expressed as a sparse linear combination of all other points and that the matrix of the points within each subspace is low rank. Simulation with real dataset illustrates the accuracy of the proposed spectral image clustering approach.
Supervisory control reconfiguration has been paid more attention due to its capacity of handling the uncertainties including resource failures, capability degradation, and task changes in discrete event systems. Howev...
详细信息
In the initialization of the traditional semi-supervised k-means, the mean of some labeled data belonging to one same class was regarded as one initial center and the number of the initial centers is equal to the numb...
详细信息
暂无评论