In this paper, the performance of joint transmit/receive zero-forcing (ZF) is analyzed for multiple-input multiple-out (IV11MO) amplify-and-forward (AT) two-way relay network when the relay has two antennas. The perfo...
详细信息
ISBN:
(纸本)9781849198011
In this paper, the performance of joint transmit/receive zero-forcing (ZF) is analyzed for multiple-input multiple-out (IV11MO) amplify-and-forward (AT) two-way relay network when the relay has two antennas. The performance is studied by deriving exact expressions of the overall outage probability and the diversity order under the uncorrelated Rayleigh fading channel and relay-corr elated Rayleigh fading channel as well. Analysis and simulation results indicate that, compared to uncorrelated Rayleigh fading, spatial correlation at the relay deteriorates the performance of the system greatly, but does not affect the diversity order of the system.
This paper attempts to research and implement the data collection technology and trusted mechanism in network communities, and explore how to improve the reliability and credibility of the data collection process from...
详细信息
Dynamic and overlapping are common features of community structures of many real world complex networks. There are few studies on detecting dynamic overlapping communities, but those studies consider only single optim...
详细信息
Bus scheduling is vital to ensure service quality and save operational costs. Current studies typically consider the problem as an optimization problem and solve it using exact or heuristic approaches. In this paper, ...
详细信息
SM2 cryptographic algorithm is an elliptic curve public key algorithm released by China's State Cryptography Administration, which includes digital signature algorithms, key exchange protocols, public key encrypti...
详细信息
The traffic flow is critical for the traffic control and traffic guidance. As the short-term traffic flow has the characteristics of highly nonlinear, complexity and chaos, the traditional neural networks can not tota...
详细信息
The traffic flow is critical for the traffic control and traffic guidance. As the short-term traffic flow has the characteristics of highly nonlinear, complexity and chaos, the traditional neural networks can not totally satisfy the performance in the aspects of prediction accuracy, training speed and stability. In order to solve those problems, a novel traffic flow prediction model based on echo state networks (ESN) is proposed. The model is established based on the chaotic property of traffic flow. Firstly, through phase space reconstruction of chaotic traffic flow data, the suitable input and output of ESN can be obtained. Then, by optimizing its key parameters of ESN, the ESN can make full use of the chaotic property of the input and output data to get more accurate prediction results. The propose model is applied to a real-world traffic flow prediction problem in the area of Xizhimen bridge of Beijing city, and compare with back-propagation neural networks (BPNN), Elman neural networks (Elman) and wavelet neural networks (WNN). The prediction results show that the model outperforms comparative other models in accuracy, training speed and stability.
This paper investigates the joint optimization of layered caching and beamforming design for scalable videos delivered by Dynamic Adaptive Streaming over HTTP in the multicell cloud radio access network. To transmit d...
详细信息
In this paper, we consider a downlink non-orthogonal multiple access system, in which base station emits secret messages to two legitimate users in the presence of multiple eavesdroppers, and all the eavesdroppers col...
详细信息
keystroke-based behavioral biometrics have been proven effective for continuous user *** state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some *** remains a c...
详细信息
keystroke-based behavioral biometrics have been proven effective for continuous user *** state-of-the-art algorithms have achieved outstanding results in long text or short text collected by doing some *** remains a considerable challenge to authenticate users continuously and accurately with short keystroke inputs collected in uncontrolled *** this work,we propose a Timely keystroke-based method for Continuous user Authentication,named *** integrates the key name and two kinds of timing features through an embedding *** it captures the relationship between context keystrokes by the Bidirectional Long Short-Term Memory(Bi-LSTM)*** conduct a series of experiments to validate it on a public dataset-the Clarkson II dataset collected in a completely uncontrolled and natural *** results show that the proposed TKCA achieves state-of-the-art performance with 8.28%of EER when using only 30 keystrokes and 2.78%of EER when using 190 keystrokes.
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends ...
详细信息
The harm caused by malware in cloud computing environment is more and more serious. Traditional anti-virus software is in danger of being attacked when it is deployed in virtual machine on a large scale, and it tends not to be accepted by tenants in terms of performance. In this paper, a method of scanning malicious programs outside the virtual machine is proposed, and the prototype is implemented. This method transforms the memory of the virtual machine to the host machine so that the latter can access it. The user space and kernel space of virtual machine memory are analyzed via semantics, and suspicious processes are scanned by signature database. Experimental results show that malicious programs can be effectively scanned outside the virtual machine, and the performance impact on the virtual machine is low, meeting the needs of tenants.
暂无评论