This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactiv...
详细信息
This study presents an overview on intelligent reflecting surface(IRS)-enabled sensing and communication for the forthcoming sixth-generation(6G) wireless networks, in which IRSs are strategically deployed to proactively reconfigure wireless environments to improve both sensing and communication(S&C) performance. First, we exploit a single IRS to enable wireless sensing in the base station's(BS's) non-line-of-sight(NLoS) area. In particular, we present three IRS-enabled NLoS target sensing architectures with fully-passive, semi-passive, and active IRSs, respectively. We compare their pros and cons by analyzing the fundamental sensing performance limits for target detection and parameter estimation. Next, we consider a single IRS to facilitate integrated sensing and communication(ISAC), in which the transmit signals at the BS are used for achieving both S&C functionalities, aided by the IRS through reflective beamforming. We present joint transmit signal and receiver processing designs for realizing efficient ISAC, and jointly optimize the transmit beamforming at the BS and reflective beamforming at the IRS to balance the fundamental performance tradeoff between S&C. Furthermore, we discuss multi-IRS networked ISAC, by particularly focusing on multi-IRS-enabled multi-link ISAC, multi-region ISAC, and ISAC signal routing, respectively. Finally, we highlight various promising research topics in this area to motivate future work.
Due to its decentralized and tamper-proof features, blockchain is frequently employed in the financial, traceability, and distributed storage industries. The agreement algorithm, which is a crucial component of the bl...
详细信息
This paper investigates the cooperative output regulation problem of heterogeneous linear parameter-varying multi-agent systems under denial-of-service(DoS) attacks. The matrix and state of the exosystem are taken to ...
详细信息
This paper investigates the cooperative output regulation problem of heterogeneous linear parameter-varying multi-agent systems under denial-of-service(DoS) attacks. The matrix and state of the exosystem are taken to be unknown to the followers. Moreover, with the assumption that only a directed spanning tree exists in the communication topology, a resilient observer is proposed to exponentially estimate the global information, which can also be effective under DoS attacks with a certain intensity. Afterward,to avoid using the exact value of the exosystem matrix, a distributed online algorithm is proposed, through which the linear parameter-varying output regulation equation is asymptotically solved. Based on the resilient observer and the solution of the output regulation equation, a distributed regulator is proposed to achieve asymptotic cooperative output regulation for all agents. Some numerical simulations are conducted to verify the effectiveness of the proposed observer, algorithm, and controller.
Scene text detection is an important task in computer *** this paper,we present YOLOv5 Scene Text(YOLOv5ST),an optimized architecture based on YOLOv5 v6.0 tailored for fast scene text *** primary goal is to enhance in...
详细信息
Scene text detection is an important task in computer *** this paper,we present YOLOv5 Scene Text(YOLOv5ST),an optimized architecture based on YOLOv5 v6.0 tailored for fast scene text *** primary goal is to enhance inference speed without sacrificing significant detection accuracy,thereby enabling robust performance on resource-constrained devices like drones,closed-circuit television cameras,and other embedded *** achieve this,we propose key modifications to the network architecture to lighten the original backbone and improve feature aggregation,including replacing standard convolution with depth-wise convolution,adopting the C2 sequence module in place of C3,employing Spatial Pyramid Pooling Global(SPPG)instead of Spatial Pyramid Pooling Fast(SPPF)and integrating Bi-directional Feature Pyramid Network(BiFPN)into the *** results demonstrate a remarkable 26%improvement in inference speed compared to the baseline,with only marginal reductions of 1.6%and 4.2%in mean average precision(mAP)at the intersection over union(IoU)thresholds of 0.5 and 0.5:0.95,*** work represents a significant advancement in scene text detection,striking a balance between speed and accuracy,making it well-suited for performance-constrained environments.
Nowadays, voice input on earphones has become one of the most paramount human-computer interaction approaches. Traditional voice interaction is built on the air channel, which is highly noise-susceptible and suffers f...
详细信息
WiFi-based gait recognition technologies have seen significant advancements in recent years. However, most existing approaches rely on a critical assumption: users must walk continuously and maintain a consistent body...
详细信息
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relatio...
详细信息
Effective data communication is a crucial aspect of the Social Internet of Things(SIoT)and continues to be a significant research *** paper proposes a data forwarding algorithm based on Multidimensional Social Relations(MSRR)in SIoT to solve this *** proposed algorithm separates message forwarding into intra-and cross-community forwarding by analyzing interest traits and social connections among *** new metrics are defined:the intensity of node social relationships,node activity,and community *** the community,messages are sent by determining which node is most similar to the sender by weighing the strength of social connections and node *** a node performs cross-community forwarding,the message is forwarded to the most reasonable relay community by measuring the node activity and the connection between *** proposed algorithm was compared to three existing routing algorithms in simulation *** indicate that the proposed algorithmsubstantially improves message delivery efficiency while lessening network overhead and enhancing connectivity and coordination in the SIoT context.
For a sub-connected hybrid multiple-input multiple-output(MIMO) receiver with K subarrays and N antennas, there exists a challenging problem of how to rapidly remove phase ambiguity in only single time-slot. A directi...
详细信息
For a sub-connected hybrid multiple-input multiple-output(MIMO) receiver with K subarrays and N antennas, there exists a challenging problem of how to rapidly remove phase ambiguity in only single time-slot. A direction of arrival(DOA) estimator of maximizing received power(Max-RP) is proposed to find the maximum value of K-subarray output powers, where each subarray is in charge of one sector, and the center angle of the sector corresponding to the maximum output is the estimated true DOA. To make an enhancement on precision, Max-RP plus quadratic interpolation(Max-RP-QI) method is designed. In the proposed Max-RP-QI, a quadratic interpolation scheme is adopted to interpolate the three DOA values corresponding to the largest three receive powers of *** achieve the Cramer Rao lower bound, a Root-MUSIC plus Max-RP-QI scheme is developed. Simulation results show that the proposed three methods eliminate the phase ambiguity during one time-slot and also show low computational complexities. The proposed Root-MUSIC plus Max-RP-QI scheme can reach the Cramer Rao lower bound,and the proposed Max-RP and Max-RP-QI are still some performance losses 2–4 d B compared to the Cramer Rao lower bound.
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness af...
详细信息
Software trustworthiness is an essential criterion for evaluating software quality. In componentbased software, different components play different roles and different users give different grades of trustworthiness after using the software. The two elements will both affect the trustworthiness of software. When the software quality is evaluated comprehensively, it is necessary to consider the weight of component and user feedback. According to different construction of components, the different trustworthiness measurement models are established based on the weight of components and user feedback. Algorithms of these trustworthiness measurement models are designed in order to obtain the corresponding trustworthiness measurement value automatically. The feasibility of these trustworthiness measurement models is demonstrated by a train ticket purchase system.
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
暂无评论