With the exponential growth of web services, the researches on how to accurately find the trustworthy services become increasingly important. Currently, some researchers have utilized the idea of services classificati...
详细信息
Free probability theory as a main branch of random matrix theory is a valuable tool for describing the asymptotic behavior of multiple systems, especially for those with large random matrices. In this paper, by using ...
详细信息
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backsca...
详细信息
The Backscatter communication has gained widespread attention from academia and industry in recent years. In this paper, A method of resource allocation and trajectory optimization is proposed for UAV-assisted backscatter communication based on user trajectory. This paper will establish an optimization problem of jointly optimizing the UAV trajectories, UAV transmission power and BD scheduling based on the large-scale channel state signals estimated in advance of the known user trajectories, taking into account the constraints of BD data and working energy consumption, to maximize the energy efficiency of the system. The problem is a non-convex optimization problem in fractional form, and there is nonlinear coupling between optimization *** iterative algorithm is proposed based on Dinkelbach algorithm, block coordinate descent method and continuous convex optimization technology. First, the objective function is converted into a non-fractional programming problem based on Dinkelbach method,and then the block coordinate descent method is used to decompose the original complex problem into three independent sub-problems. Finally, the successive convex approximation method is used to solve the trajectory optimization sub-problem. The simulation results show that the proposed scheme and algorithm have obvious energy efficiency gains compared with the comparison scheme.
Although deep learning has dominated the ship detection domain, it still has two challenges: arbitrary-oriented densely arranged ships cause detection omissions and large scale image contains redundant areas. This pap...
详细信息
I-vector has been one of the state-of-the-art techniques in speaker recognition. The main computational load of the standard i-vector extraction is to evaluate the posterior covariance matrix, which is required in est...
详细信息
Image registration based on mutual information is widely employed in medical image processing. But this method may lead to the wrong result of registration due to the excessive local maximum points and low accuracy. A...
详细信息
Spectrum sensing in a wideband regime for cognitive radio network(CRN) faces considerably technical challenge due to the constraints on analog-to-digital converters(ADCs).To solve this problem,an eigenvalue-based comp...
详细信息
Spectrum sensing in a wideband regime for cognitive radio network(CRN) faces considerably technical challenge due to the constraints on analog-to-digital converters(ADCs).To solve this problem,an eigenvalue-based compressive wideband spectrum sensing(ECWSS) scheme using random matrix theory(RMT) was proposed in this *** ECWSS directly utilized the compressive measurements based on compressive sampling(CS) theory to perform wideband spectrum sensing without requiring signal recovery,which could greatly reduce computational complexity and data acquisition *** the ECWSS,to alleviate the communication overhead of secondary user(SU),the sensors around SU carried out compressive sampling at the sub-Nyquist rate instead of ***,the exact probability density function of extreme eigenvalues was used to set the *** analyses and simulation results show that compared with the existing eigenvalue-based sensing schemes,the ECWSS has much lower computational complexity and cost with no significant detection performance degradation.
To mitigate the severe effect of pilot contamination, a novel graph coloring (NGC) based algorithm is applied to pilot assignment in cell-free massive multiple-input multiple-output (MIMO) systems. Specifically, first...
详细信息
Because sensor nodes are typically resource-constrained, the key challenge in wirelesssensornetworks (WSNs) design is the energy-efficiency and how to deal with the trade-off between it and the QoS parameters. Data ...
详细信息
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the...
详细信息
An optical encryption scheme based on a ghost imaging system with disordered speckles is proposed to obtain a higher security with a small key. In the scheme, Alice produces the random speckle patterns and obtains the detection results with the help of a computational ghost imaging(CGI) system. Then Alice permutes the order of the random speckle patterns and shares the permutation sequence as a secure key to the authorized users. With the secure key, Bob could recover the object with the principle of the CGI system, whereas, the unauthorized users could not obtain any information of the object. The numerical simulations and experimental results show that the proposed scheme is feasible with a small key, simultaneously,it has a higher security. When the eavesdropping ratio(ER) is less than 40%, the eavesdropper cannot acquire any useful information. Meanwhile, the authorized users could recover completely with the secure key.
暂无评论