A finite metric space is called here distance degree regular if its distance degree sequence is the same for every vertex. A notion of designs in such spaces is introduced that generalizes that of designs in Q-polynom...
详细信息
We construct a ternary [49,25,7] code from the row span of a Jacobsthal matrix. It is equivalent to a Generalized Quadratic Residue (GQR) code in the sense of van Lint and MacWilliams (1978). These codes are the abeli...
A miniaturized filtering power divider with wide stopband based on quarter-mode substrate integrated waveguide (QMSIW) is proposed. The physical size of the QMSIW is reduced by 3/4 comparing with the traditional SIW s...
A miniaturized filtering power divider with wide stopband based on quarter-mode substrate integrated waveguide (QMSIW) is proposed. The physical size of the QMSIW is reduced by 3/4 comparing with the traditional SIW structure, which can achieve miniaturization, and its electromagnetic field distribution has little effect. Using the metal interference column and the etched U-shaped groove to adjust the resonance frequency, so that the main mode and the first higher mode form a passband, meanwhile, suppressing the second higher mode. The simulation results show that the center frequency is 4.42 GHz with insertion loss of 0.45 dB, the 3-dB bandwidth is 4.12-4.63 GHz with a fractional bandwidths of 9.7%, and there is a great stopband up to 11 GHz with 15 dB rejection level. Besides, the return loss of passband is better than 17.5 dB. To verify the validity of this design, a prototype is fabricated and measured. The measured results demonstrate that it has a good agreement with the design simulations.
Standard Direction of Arrival (DOA) estimation methods are typically derived based on the Gaussian noise assumption, making them highly sensitive to outliers. Therefore, in the presence of impulsive noise, the perform...
详细信息
Four circulant codes form a special class of 2-generator, index 4, quasi-cyclic codes. Under some conditions on their generator matrices they can be shown to be self-dual. Artin primitive root conjecture shows the exi...
详细信息
In this work, we propose a no-reference image quality evaluation approach, aiming to solve the problem that the traditional convolutional neural network is insufficient to express the global information of the image. ...
In this work, we propose a no-reference image quality evaluation approach, aiming to solve the problem that the traditional convolutional neural network is insufficient to express the global information of the image. Therefore, in order to make the captured image features have the coherence of global context information, we combine a Transformer structure widely used in NLP (natural language processing) with the traditional CNN to realize the attention mechanism in the human visual perception characteristics. Firstly, the self-attention mechanism of Transformer is used to learn the global representation of the image from the multi-layer features extracted from different levels of CNN. Additionally, to forecast the ultimate image quality score, the global and local attributes are combined. Finally, the proposed algorithm is evaluated on three public datasets commonly used in CSIQ [1], TID2013 [2] and LIVE [3]. Compared with eight traditional no-reference image quality evaluation algorithms and five methods based on deep learning, the proposed algorithm achieves competitive results.
Standard Direction of Arrival (DOA) estimation methods are typically derived based on the Gaussian noise assumption, making them highly sensitive to outliers. Therefore, in the presence of impulsive noise, the perform...
详细信息
Previous efforts on data-based reconstruction focused on complex networks with pairwise or two-body interactions. There is a growing interest in networks with high-order or many-body interactions, raising the need to ...
详细信息
This paper describes an image compression method based on block truncation coding (BTC) and linear regression coding (LRC) hybrid strategy. BTC is simple and easy to use, but only two representative values can not ade...
详细信息
To meet the urgent requirements of ultra-reliable and low-latency communications (URLLCs) in vehicular networks, vehicular edge caching (VEC) becomes a promising solution to reduce backhaul costs and mitigate network ...
详细信息
ISBN:
(数字)9781728109602
ISBN:
(纸本)9781728109619
To meet the urgent requirements of ultra-reliable and low-latency communications (URLLCs) in vehicular networks, vehicular edge caching (VEC) becomes a promising solution to reduce backhaul costs and mitigate network congestion. However, the data requested by vehicular users may be maliciously tampered by attackers during the caching delivery phase. In this paper, we investigate the problem of secure caching placement and delivery for a VEC URLLC system. Specifically, we first analyze the lower bound of spectral efficiency for URLLCs and security metric, i.e., vulnerability. Then, an optimization problem of minimizing the maximum vulnerability among all vehicular users is formulated based on the analysis. Subsequently, we propose a secure caching placement and delivery algorithm to obtain the solutions of our formulated problem by reasonable complexity. Simulation results show that the proposed algorithm can significantly improve the performance of security for the VEC URLLC system.
暂无评论