In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc...
详细信息
A new packet-selection based transmission scheme is proposed on a dual-hop link with buffer aided amplify-and-forward relay, where the relay with a buffer can record the channel information of source-relay hop and sto...
详细信息
ISBN:
(纸本)9781479944484
A new packet-selection based transmission scheme is proposed on a dual-hop link with buffer aided amplify-and-forward relay, where the relay with a buffer can record the channel information of source-relay hop and store the received packets. In order to satisfy the constraint of equivalent end-to-end SNR, the relay may pick up a packet in the buffer to transmit, with consideration of the channel statuses of both the source-relay hop and the relay-destination hop. Therefore, by adjusting the packet transmission order in the relay, the outage probability can be decreased in the proposed transmission scheme. Both theoretical analyses and simulation results show that the proposed scheme outperforms traditional ones by a significant margin of 2-4 dB gain in terms of outage probability.
The cross-coupling effects increase acutely as the angle of attack increases,which may result in unpredictable ***,as the angle of attack increases,the system may become static unstable and make the design of autopilo...
详细信息
ISBN:
(纸本)9781479900305
The cross-coupling effects increase acutely as the angle of attack increases,which may result in unpredictable ***,as the angle of attack increases,the system may become static unstable and make the design of autopilot more *** order to overcome the problem,a new H analytical decoupling design approach which suitable for unstable non-minimum phase(NMP) systems is applied to a high-angle-of-attack *** with other developed methods,the new H analytical decoupling design method has three evident advantages:Firstly,the design procedure is simple. No weight function needs to be ***,the design result is easy to *** resulting controller is given in an analytical ***,the performance and robustness of the closed loop system can be easily *** simulation of 5-degree-of-freedom(DOF) missile with high-angle-of-attack proves the effectiveness of the design method.
In controlling biological diseases, it is often more potent to use a combination of agents than using individual ones. However, the number of possible combinations increases exponentially with the number of agents and...
详细信息
In controlling biological diseases, it is often more potent to use a combination of agents than using individual ones. However, the number of possible combinations increases exponentially with the number of agents and their concentrations. It is prohibitive to search for effective agent combinations by trial and error as biological systems are complex and their responses to agents are often a slow process. This motivates to build a suitable model to describe the biological systems and help reduce the number of experiments. In this paper, we consider the use of fungicides to inhibit Bipolarismaydis and construct models that describe the responses to fungicide combinations. Three data-driven modeling methods, the polynomial regression, the artificial neural network and the support vector regression, are compared based on the experimental data of the inhibition rates of the southern corn leaf blight with different fungicide combinations. The analysis of the results demonstrates that the support vector regression is best suited to the construction of the response model in terms of achieving better prediction with fewer experiments.
This paper considers the problem that the virtual mobile operator (VMO) buys services from the wireless service provider (WSP) to serve its users. When faced with poor indoor coverage or at the edge of marcocell, the ...
详细信息
In this paper, a distributed model predictive control (DMPC) scheme is presented to optimize the power flow management of microgrids in smart grid environment. For a multi-microgrids system in which local microgrid li...
详细信息
A novel edge detection method based on anisotropic mathematical morphology and scale multiplication in nonsubsampled contourlet transform(NSCT) domain is proposed to obtain a superior and robust performance under heav...
详细信息
A novel edge detection method based on anisotropic mathematical morphology and scale multiplication in nonsubsampled contourlet transform(NSCT) domain is proposed to obtain a superior and robust performance under heavy noise. One preliminary result is obtained using anisotropic morphological gradient of the low-frequency component, yielding a single-pixel response with few pseudo edges. Due to the great ability of NSCT to localize distributed discontinuities such as edges, scale multiplication results of high-frequency components can get rid of a large amount of noise and produce well-localized edge candidates. The final result is a fusion of the detection results of low-frequency component and high-frequency components. Detailed experiments compared with other state-of-the-art methods demonstrate that the proposed method has a superior performance of edge detection and is quite robust even under heavy noise.
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a u...
详细信息
ISBN:
(纸本)9781479947249
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service(QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location,which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is *** privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
Memristor is a nonlinear resistor with the character of memory and is proved to be suitable for simulating synapse of neuron. This paper introduces two memristors in series with the same polarity (back-to-back) as sim...
详细信息
ISBN:
(纸本)9781479944903
Memristor is a nonlinear resistor with the character of memory and is proved to be suitable for simulating synapse of neuron. This paper introduces two memristors in series with the same polarity (back-to-back) as simulator for neuron's synapse and presents the model of recurrent neural networks with such back-to-back memristors. By analysis techniques and fixed point theory, some sufficient conditions are obtained for recurrent neural network having single attractor flow and multiple attractors flow. At last, simulation with numeric examples is presented to illustrate our results.
暂无评论