For the low accuracy of detection and high false-positive rate (FPr) problems in the traditional ddoS attack detection methods, the method based on conditional random fields (CrF) is introduced. The CrF-based model co...
详细信息
How to promote information diffusion models accuracy poses challenges to social networks. We propose information diffusion model based on k-core for social networks (IMK). On the basis of the compactness and centricit...
详细信息
Most communication systems for localization use the measurements based on joint estimation of time-difference of arrival (TdOA) and frequency-difference of arrival (FdOA). In this study, an efficient androbust method...
详细信息
In image recognition field, the fact is that the trained image classifier can not recognize the images, whose class type is not the same as the training data. To resolve this problem, a new image classifier is propose...
详细信息
In this paper, we investigate both the reliable and secure transmission fordevice-to-device (d2d) communications underlaying cellular networks where eavesdroppers are according to the Poisson point process (PPP) dist...
详细信息
ISBN:
(纸本)9781509053773
In this paper, we investigate both the reliable and secure transmission fordevice-to-device (d2d) communications underlaying cellular networks where eavesdroppers are according to the Poisson point process (PPP) distribution. The transmission secrecy outage probability (TSOP) is proposed to comprehensively characterize the joint performance of the reliability and the security. Firstly their connection outage probabilities (COPs) and secrecy outage probabilities (SOPs) are derived in the non-colluding eavesdroppers case. Then, their corresponding TSOPs are presented. We furtherdiscuss the impact of various factors on theirreliable and secure transmission performances, such as the node intensity, the target threshold and the large-scale path loss.
As a promising technique, cooperative relaying has attracted more and more attention from academia and industry recently. In this paper, we investigate the scheme of decode-and-Forward Two-way relaying (dF-TWr) relyin...
详细信息
ISBN:
(纸本)9781509016990
As a promising technique, cooperative relaying has attracted more and more attention from academia and industry recently. In this paper, we investigate the scheme of decode-and-Forward Two-way relaying (dF-TWr) relying on a cross-layerdesign, which combines adaptive Network-coded Modulation (NCM) at the physical layer and truncated Automatic repeat reQuest (ArQ) at the data link layer. The relay node utilizes Network-Coded Quadrature amplitude modulation (NC-QAM) where NCM imposes only a modest signal-to-noise ratio (SNr) degradation on the single-link QAM performance. Additionally, we derive the achievable spectral efficiency in closed-form for transmission overrayleigh fading channels. It is shown that this combination of adaptive NC-QAM and truncated ArQ substantially improves the system's throughput compared to the schemes operating without ArQ.
The orthogonality of signal subspace and noise subspace could be exploited to achieve a super-resolution direction of arrival (dOA) estimation. In the implementation processing, the computation complexity of peak sear...
详细信息
In this paper, we investigate a MIMO relaying network with massive antennas for serving multi-pair single-antenna users, where zero-forcing (ZF) precoding is explored at the relay. Our aim is to maximize the energy ef...
详细信息
In this paper, we investigate a MIMO relaying network with massive antennas for serving multi-pair single-antenna users, where zero-forcing (ZF) precoding is explored at the relay. Our aim is to maximize the energy efficiency (EE) by jointly optimizing the transmit power at the source-nodes and the relay, and the number of relay antennas. To solve the EE optimization problem, a lower bound of the involved spectral efficiency (SE) is derived with analytical expression. Since the original fractional optimization problem is non-convex, we transform the objective function into an equivalent parametric subtractive form by using the properties of fractional programming. Then, an iterative algorithm is developedrelying on the partial convexity of the subtractive cost function, where the analytical solutions are deduced. Finally, the effectiveness and convergence behavior of our proposed scheme are verified through the numerical results.
In order to enhance the flexible and intelligent network's service ability, a novel architecture calledreconfigurable service-centric network (reSCNet) was proposed which decomposed traditional network capabiliti...
详细信息
暂无评论