As a promising technique, cooperative relaying has attracted more and more attention from academia and industry recently. In this paper, we investigate the scheme of decode-and-Forward Two-way relaying (dF-TWr) relyin...
详细信息
ISBN:
(纸本)9781509016990
As a promising technique, cooperative relaying has attracted more and more attention from academia and industry recently. In this paper, we investigate the scheme of decode-and-Forward Two-way relaying (dF-TWr) relying on a cross-layerdesign, which combines adaptive Network-coded Modulation (NCM) at the physical layer and truncated Automatic repeat reQuest (ArQ) at the data link layer. The relay node utilizes Network-Coded Quadrature amplitude modulation (NC-QAM) where NCM imposes only a modest signal-to-noise ratio (SNr) degradation on the single-link QAM performance. Additionally, we derive the achievable spectral efficiency in closed-form for transmission overrayleigh fading channels. It is shown that this combination of adaptive NC-QAM and truncated ArQ substantially improves the system's throughput compared to the schemes operating without ArQ.
With the integration of cores increasing, on chip network (NoC) latency and throughput get worse in traditional structures. This paper proposed a novel low latency hierarchical mesh-based network-on-chip (PHNoC) struc...
详细信息
With the integration of cores increasing, on chip network (NoC) latency and throughput get worse in traditional structures. This paper proposed a novel low latency hierarchical mesh-based network-on-chip (PHNoC) structure which uses three parameters to describe hierarchical topology for the size changing design, and three types of base clusters to construct multilevel structure. Experimental results demonstrated that the proposed structure had lower latency and higher throughput than traditional 2d mesh and conventional hierarchical NoC in different size systems, and the larger size the better performance it improved.
Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paperrepresen...
详细信息
ISBN:
(纸本)9781467399562
Network virtualization is a double-edged sword that facilitates network innovation but may cause information leakage between virtual nodes coexisting on the same substrate node via covert channels. This paperrepresents the first attempt to considerrisk-tolerant coexistence in virtual network embedding. We propose a secure virtual network embedding scheme to mitigate the risk of covert channel attacks. Simulation results show that our scheme improves the percentage of secure virtual nodes by 40%.
For the low accuracy of detection and high false-positive rate (FPr) problems in the traditional ddoS attack detection methods, the method based on conditional random fields (CrF) is introduced. The CrF-based model co...
详细信息
In this paper, we investigate a MIMO relaying network with massive antennas for serving multi-pair single-antenna users, where zero-forcing (ZF) precoding is explored at the relay. Our aim is to maximize the energy ef...
详细信息
In this paper, we investigate a MIMO relaying network with massive antennas for serving multi-pair single-antenna users, where zero-forcing (ZF) precoding is explored at the relay. Our aim is to maximize the energy efficiency (EE) by jointly optimizing the transmit power at the source-nodes and the relay, and the number of relay antennas. To solve the EE optimization problem, a lower bound of the involved spectral efficiency (SE) is derived with analytical expression. Since the original fractional optimization problem is non-convex, we transform the objective function into an equivalent parametric subtractive form by using the properties of fractional programming. Then, an iterative algorithm is developedrelying on the partial convexity of the subtractive cost function, where the analytical solutions are deduced. Finally, the effectiveness and convergence behavior of our proposed scheme are verified through the numerical results.
How to promote information diffusion models accuracy poses challenges to social networks. We propose information diffusion model based on k-core for social networks (IMK). On the basis of the compactness and centricit...
详细信息
In order to enhance the flexible and intelligent network's service ability, a novel architecture calledreconfigurable service-centric network (reSCNet) was proposed which decomposed traditional network capabiliti...
详细信息
In image recognition field, the fact is that the trained image classifier can not recognize the images, whose class type is not the same as the training data. To resolve this problem, a new image classifier is propose...
详细信息
The orthogonality of signal subspace and noise subspace could be exploited to achieve a super-resolution direction of arrival (dOA) estimation. In the implementation processing, the computation complexity of peak sear...
详细信息
Visual encoding models and visual decoding models are all used forrevealing the relationship of external visual stimuli and brain activities. On the view of the goal, visual encoding anddecoding are opposite, but th...
详细信息
ISBN:
(纸本)9781467376839
Visual encoding models and visual decoding models are all used forrevealing the relationship of external visual stimuli and brain activities. On the view of the goal, visual encoding anddecoding are opposite, but they are also complementary. With furtherresearching, we could not use a simple decoding model to excavate more complex information. The combination of visual encoding model anddecoding model is becoming a trend of visual research. This paper has built a visual encoding model based on a convolutional neural network and has proposed an approach to select features based on the visual encoding model. The results show that our predicted voxels are similar to the selectedreal voxels, the correlation coefficients of them are pretty high. On the other hand, the classification results are better than those of t-value method and principal feature analysis (PFA) method. Our approach provides a reference to the combination of visual encoding anddecoding models.
暂无评论