Along with the development of Intelligent Transportation System (ITS), artificial intelligence (AI)-based machine learning technologies have been widely utilized in Internet of Vehicles (IoVs). Neural network (NN) bas...
详细信息
This paper presents a design and implementation scheme of Marine biometrics identification and recommendation mini program based on YOLO object detection algorithm. With the development and utilization of Marine resou...
详细信息
With the rapid development of artificial intelligence technology, intelligent search assistant has become a key tool to improve the efficiency of information retrieval. This paper presents a design and implementation ...
详细信息
In this paper, we propose a hierarchical optimization approach that guarantees the maximum age of information (AoI) for unmanned aerial vehicle (UAV) assisted Internet-of-Things (IoT) data collection. Our model is bas...
详细信息
Frequency diversity array (FDA) is capable of suppressing mainlobe deceptive interference with delays exceeding one pulse relative to the true target, known as inter-pulse interference. However, current FDA-based inte...
详细信息
The satellite-terrestrial cooperative network is considered an emerging network architecture,which can adapt to various services and applications in the future communication *** recent years,the combination of satelli...
详细信息
The satellite-terrestrial cooperative network is considered an emerging network architecture,which can adapt to various services and applications in the future communication *** recent years,the combination of satellite communication and Mobile Edge Computing(MEC)has become an emerging research *** edge computing can provide users with full coverage on-orbit computing services by deploying MEC servers on *** paper studies the task offloading of multi-user and multi-edge computing satellites and proposes a novel algorithm that joint task offloading and communication computing resource optimization(JTO-CCRO).The JTO-CCRO is decoupled into task offloading and resource allocation *** the mutual iteration of the two sub-problems,the system utility function can be further *** the task offloading sub-problem,it is first confirmed that the offloading problem is a game *** offloading strategy can be obtained from the Nash equilibrium *** confirm resource optimization sub-problem is a convex optimization problem that can be solved by the Lagrange multiplier *** shows that the JTO-CCRO algorithm can converge quickly and effectively reduce the system utility function.
Recently, vehicle-to-vehicle (V2V) communications have been studied as technology to realize automated driving. To realize a reliable wireless communication system, a propagation model suitable for V2V communications ...
详细信息
A novel scheme for generating optical chaos is proposed and experimentally demonstrated,which supports to simultaneously produce two low-correlation chaotic signals with wideband spectrum and suppressed time-delay-sig...
详细信息
A novel scheme for generating optical chaos is proposed and experimentally demonstrated,which supports to simultaneously produce two low-correlation chaotic signals with wideband spectrum and suppressed time-delay-signature(TDS).In the proposed scheme,we use the output of an external-cavity semiconductor laser(ECSL)as the driving signal of a phase modulator to modulate the output of a CW *** the phase-modulated continuous-wave(CW)light is split into two parts,one is injected back into the ECSL that outputs one chaotic signal,while the other part is passed through a dispersion module for generating another chaotic signal *** experimental results prove that the proposed scheme has three ***,it can improve the bandwidth of ECSL-based chaos by several times,and simultaneously generate another wideband flat-spectrum chaotic ***,the undesired TDS characteristics of the simultaneously-generated chaotic signals can be efficiently suppressed to an indistinguishable level within a wide parameter range,as such the complexities of the chaotic signals are considerably ***,the correlation coefficient between these two simultaneously-generated chaotic signals is smaller than *** proposed scheme provides an attractive solution for parallel multiple chaos generation,and shows great potential for multiple channel chaos communications and multiple random bit generations.
P-type Mg_(3)Sb_(2)-based Zintls have attracted considerable interest in the thermoelectric(TE)field due to their environmental friendliness and low ***,compared to their n-type counterparts,they show relatively low T...
详细信息
P-type Mg_(3)Sb_(2)-based Zintls have attracted considerable interest in the thermoelectric(TE)field due to their environmental friendliness and low ***,compared to their n-type counterparts,they show relatively low TE performance,limiting their application in TE *** this work,we simultaneously introduce Bi alloying at Sb sites and Ag doping at Mg sites into the Mg_(3)Sb_(2)to coopera-tively optimize the electrical and thermal properties for the first time,acquiring the highest ZT value of∼0.85 at 723 K and a high average ZT of 0.39 in the temperature range of 323-723 K in sample Mg_(2.94)Ag_(0.06)Sb_(1.9)Bi_(0.1).The first-principle calculations show that the codoping of Ag and Bi can shift the Fermi level into the valence band and narrow the band gap,resulting in the increased carrier concentration from 3.50×10^(17)cm^(-3)in the reference Mg 3 Sb 0.9 Bi 0.1 to∼7.88×10^(19)cm^(-3)in sample Mg 2.94 Ag 0.06 Sb 0.9 Bi *** a result,a remarkable power factor of∼778.9μW m^(-1)K^(-2)at 723 K is achieved in sample Mg 2.94 Ag 0.06 Sb 0.9 Bi ***,a low lattice thermal conductivity of∼0.48 W m^(-1)K^(-1)at 723 K is also obtained with the help of phonon scattering at the distorted lattice,point defects,and nano-precipitates in sample Mg 2.94 Ag 0.06 Sb 0.9 Bi *** synergistic effect of using the multi-element co-doping/-alloying to optimize electrical properties in Mg_(3)Sb_(2)holds promise for further improving the TE performance of Zintl phase materials or even others.
The McEliece public key cryptosystem is known for its resistance to quantum attacks. However, its application potential remains limited due to challenges such as large key size and low coding efficiency. In this paper...
详细信息
暂无评论