This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication...
详细信息
This paper investigates an unmanned aerial vehicle(UAV)-assisted multi-object offloading scheme for blockchain-enabled Vehicle-to-Everything(V2X)*** to the presence of an eavesdropper(Eve),the system’s com-munication links may be *** paper proposes deploying an intelligent reflecting surface(IRS)on the UAV to enhance the communication performance of mobile vehicles,improve system flexibility,and alleviate eavesdropping on communication *** links for uploading task data from vehicles to a base station(BS)are protected by IRS-assisted physical layer security(PLS).Upon receiving task data,the computing resources provided by the edge computing servers(MEC)are allocated to vehicles for task *** blockchain-based computation offloading schemes typically focus on improving network performance,such as minimizing energy consumption or latency,while neglecting the Gas fees for computation offloading and the costs required for MEC computation,leading to an imbalance between service fees and resource *** paper uses a utility-oriented computation offloading scheme to balance costs and *** paper proposes alternating phase optimization and power optimization to optimize the energy consumption,latency,and communication secrecy rate,thereby maximizing the weighted total utility of the *** results demonstrate a notable enhancement in the weighted total system utility and resource utilization,thereby corroborating the viability of our approach for practical applications.
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affect...
详细信息
In blockchain-based unmanned aerial vehicle(UAV)communication systems,the length of a block affects the performance of the *** transmission performance of blocks in the form of finite character segments is also affected by the block ***,it is crucial to balance the transmission performance and blockchain performance of blockchain communication systems,especially in wireless environments involving *** paper investigates a secure transmission scheme for blocks in blockchain-based UAV communication systems to prevent the information contained in blocks from being completely eavesdropped during *** our scheme,using a friendly jamming UAV to emit jamming signals diminishes the quality of the eavesdropping channel,thus enhancing the communication security performance of the source *** the constraints of maneuverability and transmission power of the UAV,the joint design of UAV trajectories,transmission power,and block length are proposed to maximize the average minimum secrecy rate(AMSR).Since the optimization problem is non-convex and difficult to solve directly,we first decompose the optimization problem into subproblems of trajectory optimization,transmission power optimization,and block length ***,based on firstorder approximation techniques,these subproblems are reformulated as convex optimization ***,we utilize an alternating iteration algorithm based on the successive convex approximation(SCA)technique to solve these subproblems *** simulation results demonstrate that our proposed scheme can achieve secure transmission for blocks while maintaining the performance of the blockchain.
Deep convolutional neural networks (CNNs) are commonly used for predicting limit order book (LOB) data. However, using only convolutional neural networks may lead to neglecting long-distance dependencies. Recent resea...
详细信息
This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the ...
详细信息
This paper builds a binary tree for the target based on the bounding volume hierarchy technology,thereby achieving strict acceleration of the shadow judgment process and reducing the computational complexity from the original O(N^(3))to O(N^(2)logN).Numerical results show that the proposed method is more efficient than the traditional *** is verified in multiple examples that the proposed method can complete the convergence of the ***,the proposed method avoids the error of judging the lit-shadow relationship based on the normal vector,which is beneficial to current iteration and *** with the brute force method,the current method can improve the simulation efficiency by 2 orders of *** proposed method is more suitable for scattering problems in electrically large cavities and complex scenarios.
This study presents a deep-learning-based method for the precise inversion of electromagnetic (EM) radiation sources, utilizing amplitude data from multichannel near-field scans to infer equivalent dipole array parame...
详细信息
With the rapid advancement of deep learning in image processing, Image Super-Resolution (ISR) has garnered extensive attention as a key technology. Recently, Transformer architectures have demonstrated immense potenti...
详细信息
ISBN:
(纸本)9798350394375
With the rapid advancement of deep learning in image processing, Image Super-Resolution (ISR) has garnered extensive attention as a key technology. Recently, Transformer architectures have demonstrated immense potential across various domains, owing to their excellent ability to capture long-range dependencies. This paper explores a novel approach to incorporating Transformer architecture into the task of image super-resolution. We propose a new super-resolution model that fuses traditional Convolutional Neural Networks (CNNs) with Transformer architecture, particularly in the feature extraction and image reconstruction phases. The model includes a Residual in Residual Dense Block Network (RRDBNet) for initial feature extraction, followed by a novel module named DenseResidualTransformer for further enhancement of feature *** DenseResidualTransformer module combines the self-attention mechanism of Transformers with densely connected MLPs to capture global dependencies and complex textures in images. This module significantly enhances the expressiveness of feature maps through its multi-layered attention and MLP structure, while preserving the fine details of the original image. Despite the additional computational and memory overhead introduced by Transformers, our experimental results demonstrate superior image super-resolution performance on multiple standard datasets, with 31.67db of PSNR and 0.88 of SSIM, particularly in reconstructing high-frequency details and complex ***, we provide a detailed analysis of the application of Transformers in image super-resolution tasks, discussing the benefits and challenges it brings. The results show that incorporating Transformer architecture offers an effective way to enhance the performance of super-resolution models, especially in handling images with complex structures and textures. Our work not only demonstrates the potential of applying cutting-edge deep learning technologies to image s
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell Computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
We propose an approach for generating robust two-dimensional(2D)vortex clusters(VCs)in a Rydberg atomic system by utilizing parity-time(PT)symmetric optical Bessel *** show that the system supports novel multicore VCs...
详细信息
We propose an approach for generating robust two-dimensional(2D)vortex clusters(VCs)in a Rydberg atomic system by utilizing parity-time(PT)symmetric optical Bessel *** show that the system supports novel multicore VCs with four and eight cores,corresponding to topological charges 2 and 4,*** stability of these VCs can be dynamically adjusted through the manipulation of the gain-loss component,Kerr nonlinearities,and the degree of nonlocality inherent in the Rydberg *** VCs are confined within the first lattice well of the Bessel potential,and both the power and width of lights undergo a quasi-periodic breathing phenomenon,which is attributed to the power exchange between the light fields and Bessel *** self-attractive and self-repulsive Kerr interactions can sustain robust VCs within this *** insights presented here not only facilitate the creation and manipulation of 2D VCs through PT-symmetric potentials but also pave the way for potential applications in optical information processing and transmission.
The 0.93(Na_(0.5)Bi_(0.5))_(1–x)Sm_(x)TiO_(3)-0.07BaTiO_(3) multifunctional ceramics were prepared by solid-phase reaction *** phase structure,microstructure,electrical and photoluminescent properties were systematic...
详细信息
The 0.93(Na_(0.5)Bi_(0.5))_(1–x)Sm_(x)TiO_(3)-0.07BaTiO_(3) multifunctional ceramics were prepared by solid-phase reaction *** phase structure,microstructure,electrical and photoluminescent properties were systematically *** increasing x,the ceramics undergoes the phase transition from rhombohedral to tetragonal with some rhombohedral distortion,along with a reduced grain size and increased relative *** the other hand,the Sm^(3+)doping enhances the electric-field driven reversible phase transition and domain size,and reduces the domain walls,thereby contributing to improved piezoelectricity and decreased depolarization temperature(T_(d))from 91℃ to 40℃.Excellent piezoelectric properties of d_(33)=213 pC/N and kp=29.9% are achieved in the x=0.010 *** excitation(407 nm),the Sm^(3+)-doped ceramic exhibits bright reddish-orange fluorescence at 564,599,646 nm and 710 nm.A polarization-induced enhancement of photoluminescence is obtained in BNBT-_(x)Sm ceramics with an improved relative intensity of emission band at 646 *** results indicate that Sm^(3+)-doped BNBT ceramics show great potential in electro-optic integration and coupling device applications.
For switched cyber-physical systems with disturbances and actuator faults, we address fault detection and isolation problems. First, the preconditions relative to subsystems are discussed in detail,and the original su...
详细信息
For switched cyber-physical systems with disturbances and actuator faults, we address fault detection and isolation problems. First, the preconditions relative to subsystems are discussed in detail,and the original subsystems are turned into an overall system. Second, the frequency ranges of faults are considered to belong to the finite-frequency domain, and the observer, which makes the residual robust against disturbances and sensitive to faults, is designed by combining the finite-frequency H-technique with the mixed L2-L∞/H∞technique. Third, design conditions, which guarantee that the error system is stable and satisfies the mixed performance, are derived using the average dwell time method and Lyapunov functionals. Finally, a traffic density dynamic model is proposed to demonstrate the validity and effectiveness of the proposed method.
暂无评论