A brain-computer interface (BCI) establishes a direct communication pathway between the brain and an external device. Electroencephalogram (EEG) is the most popular input signal in BCIs, due to its convenience and low...
详细信息
Semantic communications offer promising prospects for enhancing data transmission efficiency. However, existing schemes have predominantly concentrated on point-to-point transmissions. In this paper, we aim to investi...
详细信息
The flexible mobility characteristics of unmanned aerial vehicle (UAV) lead to frequent handover and inter cell interference issues in traditional cellular based UAV assisted communication systems. Establishing cell-f...
The flexible mobility characteristics of unmanned aerial vehicle (UAV) lead to frequent handover and inter cell interference issues in traditional cellular based UAV assisted communication systems. Establishing cell-free UAV (CF-UAV) networks without cell boundaries will effectively alleviate this problem and has been an important research. However, the movement of the UAV results in time-varying channels. Therefore, the joint dynamic and reasonable UAV trajectory optimization and power allocation are very important for in CF-UAV networks. The expression of pilot transmission, channel estimation, uplink transmission spectrum efficiency (SE) have been derived based on the assumption of Rician channel between UAVs and access point (AP). SE optimization algorithm for CF-UAV networks combined with the Angle search and multi-UAV trajectory optimization strategy has been proposed in this paper. Simulation results show that the proposed algorithm performs better performance than comparison schemes, which SE improves by 37% compared with Angle search.
This paper presents a real-time power split strategy for a battery-supercapacitor hybrid energy storage system. The objective of the proposed strategy is to alleviate battery degradation through effective supercapacit...
详细信息
Effective strategy generation of the jammer with inaccurate or undetermined information for combating the radar system is a challenging problem and the relevant research is scarce in existing work. This paper aims at ...
详细信息
In this paper, the multi-target positioning research is carried out on the basis of a passive multi-sensor reconnaissance system, which requires an algorithm to solve the problem of multi-target data association and p...
详细信息
Accurate prediction of aero-engine remaining useful life (RUL) is essential for providing reliable maintenance or alarm decisions. The extraction of degraded features has a great impact on the accuracy of RUL predicti...
Accurate prediction of aero-engine remaining useful life (RUL) is essential for providing reliable maintenance or alarm decisions. The extraction of degraded features has a great impact on the accuracy of RUL prediction. This paper proposes a feature fusion framework that relies on a multi-dimensional convolutional neural network (MD-CNN). First, the data of each working condition is normalized separately to extract degradation features more effectively. Subsequently, the temporal features are extracted using the one-dimensional convolutional neural network (1D-CNN), while the spatial local features are captured through the utilization of the two-dimensional convolutional neural network (2D-CNN). Finally, the long short-term memory network (LSTM) is utilized as the prediction model to establish the mapping relationship from fusion features to RUL. The result shows that the performance in predicting using the proposed method surpasses that of the existing methods.
Continuous-variable quantum key distribution (CVQKD) is a mature technology that can theoretically provide an unconditional security guarantee. However, a practical CVQKD system may be vulnerable to various quantum ha...
详细信息
Continuous-variable quantum key distribution (CVQKD) is a mature technology that can theoretically provide an unconditional security guarantee. However, a practical CVQKD system may be vulnerable to various quantum hacking attacks due to imperfect devices and insufficient assumptions. In this paper, we propose a universal defense strategy called a machine-learning-based attack detection scheme (MADS). Leveraging the combined advantages of density-based spatial clustering of applications with noise (DBSCAN) and multiclass support vector machines (MCSVMs), MADS demonstrates remarkable effectiveness in detecting quantum hacking attacks. Specifically, we first establish a set of attack-related features to extract feature vectors. These vectors are then utilized as input data for DBSCAN to identify and remove any noise or outliers. Finally, the trained MCSVMs are employed to classify and predict the processed data. The predicted results can immediately determine whether or not to generate a final secret key. Simulation results show that the proposed MADS can efficiently detect most quantum hacking attacks and revise the overestimated secret key rates caused by a CVQKD system without any defense strategy to obtain a tighter security bound.
Murals are an important part of China’s cultural heritage. Because of their age, Dunhuang murals have suffered from discoloration, fading and damage. With the development of computer image restoration technology, dig...
详细信息
ISBN:
(数字)9798350380347
ISBN:
(纸本)9798350380354
Murals are an important part of China’s cultural heritage. Because of their age, Dunhuang murals have suffered from discoloration, fading and damage. With the development of computer image restoration technology, digital image processing provides strong support for mural restoration. Although there are many research results in the field of ancient mural images, there is no pre-trained model based on ancient mural images available for migration. There is a method for Dunhuang murals image restoration based on Generative Adversarial Network (GAN) with improved ResNet50 structure as an encoder in the generator. This research result proposes a generative adversarial network model with a parallel double convolutional extraction of deep features for the generator, combined with a ternary heterogeneous joint discriminator. On this basis, this paper proposes a binary classification task to distinguish ancient mural images from modern natural style images, so that the model pre-learns features such as color, texture, and structure of mural images, which are inputted into the restoration network as a priori information, in order to achieve the effect of reducing the probability of incomplete restoration of the model, and better generalization ability. The experimental results show that the method proposed in this paper has an overall improvement in the evaluation indexes such as Peak Signal to Noise Ratio(PSNR) and Structural Similarities(SSIM) when compared with other methods, and the restored images are more in line with human subjective vision, which proves the validity of the method.
In this paper, a novel scheme is proposed by introducing the concept of generalized spatial modulation (GSM) and space-time block code (STBC) into simultaneously transmitting and reflecting reconfigurable intelligent ...
详细信息
暂无评论