Visible light communication(VLC) is expected to be a potential candidate of the key technologies in the sixth generation(6G) wireless communication system to support Internet of Things(IoT) applications. In this work,...
详细信息
Visible light communication(VLC) is expected to be a potential candidate of the key technologies in the sixth generation(6G) wireless communication system to support Internet of Things(IoT) applications. In this work, a separate least mean square(S-LMS) equalizer is proposed to compensate lowpass frequency response in VLC system. Joint optimization is employed to realize the proposed S-LMS equalizer with pre-part and post-part by introducing Lagrangian. For verification, the performance of VLC system based on multi-band carrier-less amplitude and phase(m-CAP) modulation with S-LMS equalizer is investigated and compared with that without equalizer,with LMS equalizer and with recursive least squares(RLS)-Volterra equalizer. Results indicate the proposed equalizer shows significant improved bit error ratio(BER) performance under the same conditions. Compared to the RLS-Volterra equalizer, SLMS equalizer achieves better performance under low data rate or high signal noise ratio(SNR) conditions with obviously lower computational complexity.
The growing computing power,easy acquisition of large-scale data,and constantly improved algorithms have led to a new wave of artificial intelligence(AI)applications,which change the ways we live,manufacture,and do **...
详细信息
The growing computing power,easy acquisition of large-scale data,and constantly improved algorithms have led to a new wave of artificial intelligence(AI)applications,which change the ways we live,manufacture,and do *** with this development,a rising concern is the relationship between AI and human intelligence,namely,whether AI systems may one day overtake,manipulate,or replace *** this paper,we introduce a novel concept named hybrid human-artificial intelligence(H-AI),which fuses human abilities and AI capabilities into a unified *** presents a challenging yet promising research direction that prompts secure and trusted AI innovations while keeping humans in the loop for effective *** scientifically define the concept of H-AI and propose an evolution road map for the development of AI toward *** then examine the key underpinning techniques of H-AI,such as user profile modeling,cognitive computing,and human-in-the-loop machine ***,we discuss H-AI’s potential applications in the area of smart homes,intelligent medicine,smart transportation,and smart ***,we conduct a critical analysis of current challenges and open gaps in H-AI,upon which we elaborate on future research issues and directions.
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of ...
详细信息
With the arrival of the 5G era,wireless communication technologies and services are rapidly exhausting the limited spectrum *** auctions came into being,which can effectively utilize spectrum *** of the complexity of the electronic spectrum auction network environment,the security of spectrum auction can not be *** scholars focus on researching the security of the single-sided auctions,while ignoring the practical scenario of a secure double spectrum auction where participants are composed of multiple sellers and *** begin to design the secure double spectrum auction mechanisms,in which two semi-honest agents are introduced to finish the spectrum auction *** these two agents may collude with each other or be bribed by buyers and sellers,which may create security risks,therefore,a secure double spectrum auction is proposed in this *** traditional secure double spectrum auctions,the spectrum auction server with Software Guard Extensions(SGX)component is used in this paper,which is an Ethereum blockchain platform that performs spectrum auctions.A secure double spectrum protocol is also designed,using SGX technology and cryptographic tools such as Paillier cryptosystem,stealth address technology and one-time ring signatures to well protect the private information of spectrum *** addition,the smart contracts provided by the Ethereum blockchain platform are executed to assist offline verification,and to verify important spectrum auction information to ensure the fairness and impartiality of spectrum ***,security analysis and performance evaluation of our protocol are discussed.
In this paper,we introduce a long-term follow-up specific individual searching(SIS)*** model introduces the concept of node search contributions by considering the characteristics of the network structure.A node searc...
详细信息
In this paper,we introduce a long-term follow-up specific individual searching(SIS)*** model introduces the concept of node search contributions by considering the characteristics of the network structure.A node search contribution indicates the ability of a certain node to correctly guide the search path and successfully complete an *** influencing factors of node search contributions have three components:the individual influence index,attribute similarity,and node search *** the basis of node search contributions and the PeopleRank idea,this paper proposes an SIS model based on node search contribution values and conducts comparison experiments with several mainstream SIS algorithms in three aspects:the search failure rate,the minimum number of search hops,and the search *** experimental results verify the advanced nature and operability of the model proposed in this paper,which presents theoretical and practical significance to the quantitative study of the SIS process.
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge ...
详细信息
In practical abnormal traffic detection scenarios,traffic often appears as drift,imbalanced and rare labeled streams,and how to effectively identify malicious traffic in such complex situations has become a challenge for malicious traffic *** have extensive studies on malicious traffic detection with single challenge,but the detection of complex traffic has not been widely *** adaptive random forests(QARF) is proposed to detect traffic streams with concept drift,imbalance and lack of labeled *** is an online active learning based approach which combines adaptive random forests method and adaptive margin sampling *** achieves querying a small number of instances from unlabeled traffic streams to obtain effective *** conduct experiments using the NSL-KDD dataset to evaluate the performance of *** is compared with other state-of-the-art *** experimental results show that QARF obtains 98.20% accuracy on the NSL-KDD *** performs better than other state-of-the-art methods in comparisons.
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of acc...
详细信息
In the evolving landscape of surveillance and security applications, the task of person re-identification(re-ID) has significant importance, but also presents notable difficulties. This task entails the process of accurately matching and identifying persons across several camera views that do not overlap with one another. This is of utmost importance to video surveillance, public safety, and person-tracking applications. However, vision-related difficulties, such as variations in appearance, occlusions, viewpoint changes, cloth changes, scalability, limited robustness to environmental factors, and lack of generalizations, still hinder the development of reliable person re-ID methods. There are few approaches have been developed based on these difficulties relied on traditional deep-learning techniques. Nevertheless, recent advancements of transformer-based methods, have gained widespread adoption in various domains owing to their unique architectural properties. Recently, few transformer-based person re-ID methods have developed based on these difficulties and achieved good results. To develop reliable solutions for person re-ID, a comprehensive analysis of transformer-based methods is necessary. However, there are few studies that consider transformer-based techniques for further investigation. This review proposes recent literature on transformer-based approaches, examining their effectiveness, advantages, and potential challenges. This review is the first of its kind to provide insights into the revolutionary transformer-based methodologies used to tackle many obstacles in person re-ID, providing a forward-thinking outlook on current research and potentially guiding the creation of viable applications in real-world scenarios. The main objective is to provide a useful resource for academics and practitioners engaged in person re-ID. IEEE
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution *** order to solve the issues of high storage cost and inadequate security ab...
详细信息
The attacker in white-box model has full access to software implementation of a cryptographic algorithm and full control over its execution *** order to solve the issues of high storage cost and inadequate security about most current white-box cryptographic schemes,WAS,an improved white-box cryptographic algorithm over AS iteration is *** scheme utilizes the AS iterative structure to construct a lookup table with a fvelayer ASASA structure,and the maximum distance separable matrix is used as a linear layer to achieve complete difusion in a small number of *** can be prevented from recovering the key under black-box *** length of nonlinear layer S and afne layer A in lookup table is 16 bits,which efectively avoids decomposition attack against the ASASA structure and makes the algorithm possess anti-key extraction security under the whitebox model,while WAS possesses weak white-box(32 KB,112)-space hardness to satisfy anti-code lifting *** has provable security and better storage cost than existing schemes,with the same anti-key extraction security and anti-code lifting security,only 128 KB of memory space is required in WAS,which is only 14%of SPACE-16 algorithm and 33%of Yoroi-16 algorithm.
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction t...
详细信息
As a frontier technology,holography has important research values in fields such as bio-micrographic imaging,light feld modulation and data ***,the real-time acquisition of 3D scenes and high-fidelity reconstruction technology has not yet made a breakthrough,which has seriously hindered the development of ***,a novel holographic camera is proposed to solve the above inherent problems *** proposed holographic camera consists of the acquisition end and the calculation *** the acquisition end of the holographic camera,specially configured liquid materials and liquid lens structure based on voice-coil motor-driving are used to produce the liquid camera,so that the liquid camera can quickly capture the focus stack of the real 3D scene within 15 *** the calculation end,a new structured focus stack network(FS-Net)is designed for hologram *** training the FS-Net with the focus stack renderer and learnable Zernike phase,it enables hologram calculation within 13 *** the first device to achieve real-time incoherent acquisition and high-fidelity holographic reconstruction of a real 3D scene,our proposed holographic camera breaks technical bottlenecks of difficulty in acquiring the real 3D scene,low quality of the holographic reconstructed image,and incorrect defocus *** experimental results demonstrate the effectiveness of our holographic camera in the acquisition of focal plane information and hologram calculation of the real 3D *** proposed holographic camera opens up a new way for the application of holography in fields such as 3D display,light field modulation,and 3D measurement.
Data envelopment analysis (DEA) is widely used in various fields and for various models. Inverted data envelopment analysis (inverted DEA) is an extended model of DEA. Regression analysis (RA) is a statistical process...
详细信息
The new applications surge with the rapid evolution of the mobile *** explosive growth of the data traffic aroused by the new applications has posed great computing pressure on the local *** is essential to innovate t...
详细信息
The new applications surge with the rapid evolution of the mobile *** explosive growth of the data traffic aroused by the new applications has posed great computing pressure on the local *** is essential to innovate the computation offloading methods to alleviate the local computing burden and improve the offloading *** edge computing(MEC)assisted by reflecting intelligent surfaces(RIS)-based unmanned aerial vehicle(UAV)is a promising method to assist the users in executing the computation tasks in proximity at low *** this paper,we propose an energy-efficient MEC system assisted by RIS-based UAV,where the UAV with RIS mounted relays the computation tasks to the MEC *** energy efficiency maximization problem is formulated by jointly optimizing the UAV's trajectory,the transmission power of all users,and the phase shifts of the reflecting elements placed on the *** that the optimization problem is non-convex,we propose a deep deterministic policy gradient(DDPG)-based *** combining the DDPG algorithm with the energy efficiency maximization problem,the optimization problem can be ***,the numerical results are illustrated to show the performance of the system and the superiority compared with the benchmark schemes.
暂无评论