When extracting physical layer security secret key with multiple wireless channel samples, its capacity is affected by the time difference of channel sounding, terminal's moving speed, sampling period, the number ...
详细信息
ISBN:
(纸本)9781509013296
When extracting physical layer security secret key with multiple wireless channel samples, its capacity is affected by the time difference of channel sounding, terminal's moving speed, sampling period, the number of samples, and additive noise. In order to quantitatively analyze their effects anddetermine the constrains on the optimal sampling period, a closed-form solution to the physical layer secret key capacity in the time domain is derived over the uniform scattering environment. Simulation results indicate that the results of this paper can be applied to both the uniform and non-uniform scattering environment. Furthermore, the feasibility to extract physical layer secret key from the commercial Td-LTE and the promising co-frequency co-time full duplex communication systems is verified.
To solve the problem that the positioning strategy with sliding window approache requires exhaustive search in feature pyramids,the paper proposes an object detection algorithm based on deformable part models with Bin...
详细信息
To solve the problem that the positioning strategy with sliding window approache requires exhaustive search in feature pyramids,the paper proposes an object detection algorithm based on deformable part models with Bing features to help object *** of all,input image are preprocessed with the objectness detection algorithm with Bing features and a set of potentia windows that may contain target objects are obtained,and then the deformable part model is regarde as the class-specific detector to match potential windows,at last Non-Maximum Suppression is use to merge andreduce window areas of results to obtain final detection *** experimental resul on Pascal VOC 2007 dataset show that the algorithm in the paper outperforms the original dPM in 1out of 20 classes,achieving an improvement of 2.7% mA P.
In this paper, a downlink cell-free Massive MIMO system (CF-M-MIMO-S) is considered. The CF-M-MIMO-S is a distributed M-MIMO-S, where access points (APs) with very great quantity of antennas, and a much smaller number...
详细信息
In this paper, a downlink cell-free Massive MIMO system (CF-M-MIMO-S) is considered. The CF-M-MIMO-S is a distributed M-MIMO-S, where access points (APs) with very great quantity of antennas, and a much smaller number of independent users are distributedrandomly. Firstly, an approximate expression for the capacity with perfect channel state information and conjugate beamforming scheme is derived. Secondly, an energy-efficient (EE) resource allocation strategy is advanced, which is aim to maximize system EE. Specifically, the power consumption include transmitting power, calculation power and circuit power. Simulation results indicate that the throughput of derived approximate expression is very close to theoretical value. It is also demonstrated The effectiveness of proposed algorithm and the trade-off between EE and the quantity of Aps is, meanwhile, the performance of throughput of the proposed algorithm is very well.
Acoustic features chosen from the input utterances play crucial roles in speech separation. In this paper, we propose a novel complementary feature approach that performs speech separation by combining five promising ...
详细信息
ISBN:
(纸本)9781510830028
Acoustic features chosen from the input utterances play crucial roles in speech separation. In this paper, we propose a novel complementary feature approach that performs speech separation by combining five promising features, including Gammatone filterbank power spectra(GF) and multi-resolution cochleagram(MrCG) proposedrecently especially for speech separation, as a super-vector fed into deep neural network(dNN). Additionally, based on the complementary features, we do experiments with two dNN training strategies, which are restricted Boltzmann machine(rBM) pre-training anddropout combined with rectified Linear Units(re LU), to optimize the performance of dNN. The experiment results, obtained in IEEE and TIMIT corpora using fourdifferent noises at low SNr levels of 0d B and-5d B, indicate that complementary features andrBM model improve all evaluation metrics. By contrast, dropout combined with re LU system specializes in noise suppression and objective intelligibility more.
A new propagator method for joint angle anddoppler estimation based on structured least squares(SLS)is *** defining a new propagator matrix the proposed approach reduces the loss of array *** addition,SLS which will ...
详细信息
A new propagator method for joint angle anddoppler estimation based on structured least squares(SLS)is *** defining a new propagator matrix the proposed approach reduces the loss of array *** addition,SLS which will take the specific relationship between two parts of the equation into account is utilized to enhance the estimation performance when solving the rotational invariance matrix *** results are provided verifying the effectiveness of the proposed method.
In multiuser networks, selfish users refuse to provide other users with their own energy and computing resources. In order to encourage selfish users to offer theirresources, a cooperation incentive mechanism based o...
详细信息
In multiuser networks, selfish users refuse to provide other users with their own energy and computing resources. In order to encourage selfish users to offer theirresources, a cooperation incentive mechanism based on users trust degree evaluation is proposed. The mechanism helps relays to decide whether to participate in the cooperation or not by comparing trust value. Selfish users with lower trust value will be rejected on higher probability, while cooperation can improve trust value and their own communication security. Several experiments demonstrate the effectiveness of the proposed scheme in this paper. Selfish users actively participate in the cooperation comparing situations without encouragement. At the same time, the communication quality of the users is close to the cooperation with selfless relays.
Image segmentation can be used in non-destructive testing, tracking andrecognition. Level set method for image segmentation has poor performance on efficiency. In this paper, we propose to use max-flow algorithm to o...
详细信息
Image segmentation can be used in non-destructive testing, tracking andrecognition. Level set method for image segmentation has poor performance on efficiency. In this paper, we propose to use max-flow algorithm to optimize a locally improved Chan-Vese model for image segmentation in the presence of intensity inhomogeneity. The energy function of local Chan-Vese model is introduced firstly. This model consists of global term, local term and penalty term and the local term contributes the segmentation for images with intensity inhomogeneity. Then, we convert this energy function to the frame of Graph Cut whose energy function can be efficiently minimized by max-flow algorithm. As a result, the process of optimization of local Chan-Vese model can be accelerated by using max-flow algorithm. The experiments demonstrate that the proposed method can achieve satisfactory segmentation for images with intensity inhomogeneity as well as very high efficiency.
Emotion recognition, as an important part of human-computer interaction, has been extensively researched. Various studies have already verified the relationship between emotion and the event-related potentials (ErPs)....
详细信息
Emotion recognition, as an important part of human-computer interaction, has been extensively researched. Various studies have already verified the relationship between emotion and the event-related potentials (ErPs). In this paper, a new methodology for emotion recognition is investigated by detecting single-trial ErPs related to some specific level of emotions. First, a spatial filter is constructed to estimate the ErP components. Then the most discriminative spatial and temporal features of the entire ErP waveform are extracted with lineardiscriminant analysis. The performance of this method is tested by classifying the emotional valence on three levels, the extremely negative, the moderately negative and the neutral, with the support vector machine (SVM). The result shows that the proposed method is effective.
Modifying flow rule attack is a type of attack against controllers in SdN, leading to severe influence on network. In this paper, we propose Mcad-SA, an aware decision-making security architecture with multi-controlle...
详细信息
ISBN:
(纸本)9781467399562
Modifying flow rule attack is a type of attack against controllers in SdN, leading to severe influence on network. In this paper, we propose Mcad-SA, an aware decision-making security architecture with multi-controller, to deal with it. It schedules the controllers in a dynamic andrandom way and adopts the vote results from the majority of controllers to determine valid flow rules. Theory analysis proves its validity.
This paper investigates the joint power allocation problem for a three-node massive MIMO relaying system with maximum ratio combining/maximum ratio transmission (MrC/MrT) precoding strategy. Our goal is to pursuit the...
详细信息
This paper investigates the joint power allocation problem for a three-node massive MIMO relaying system with maximum ratio combining/maximum ratio transmission (MrC/MrT) precoding strategy. Our goal is to pursuit the energy efficiency (EE) maximization while taking a quality-of-service (QoS) requirement into account by optimizing the source-relay transmit power simultaneously. To handle the EE based problem, we first derive a closed-form expression of the involved spectral efficiency (SE) by leveraging the tools of determinate equivalent approximation technique. Then, the optimal power solutions at the source and the relay are deduced in analytical forms by exploring the Lagrangian dual technology and the Lambert W function. What's more, one can find that the optimal power values at the relay and the source satisfy a specific ratio, which is determined by the system parameters and the large-scale fading factors of the two-hop channels. Numerical results illustrate the performance advantages of ourdeveloped power allocation method.
暂无评论