As satellite positioning has shortcomings such as susceptibility to multipath interference, we look forward to using a new algorithm to solve these problems. The method of derivative dynamic time regularization is use...
详细信息
Sentiment classification is a hot topic in the field of natural language processing. Currently, state-of-the-art classification models follow two steps: pre-training a large language model on upstream tasks, and then ...
详细信息
Most existing news-driven stock market prediction methods ignore the potential relationship between financial news and stocks. The complex relationship can help us to improve the accuracy of algorithmic trading system...
详细信息
If Toeplitz matrix is used for compression-aware ghost imaging, the imaging quality will be very low. In order to solve the problem, a new experimental scheme for ghost imaging is proposed in this paper. The scheme fi...
详细信息
In this paper, a new approach without iteration is proposed for direct position determination (DPD) with Doppler shifts in the presence of unknown direction-dependent mutual coupling (DDMC). The special banded symmetr...
详细信息
This paper mainly studies an attack effectiveness evaluation method for AD hoc networks based on rough set theory. Firstly, we use OPNET to build AD hoc network simulation scenario, design and develop attack module, a...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achi...
详细信息
Feather weight(FeW)cipher is a lightweight block cipher proposed by Kumar et *** 2019,which takes 64 bits plaintext as input and produces 64 bits *** Kumar et ***,FeW is a software oriented design with the aim of achieving high efficiency in software based *** seems that FeW is immune to many cryptographic attacks,like linear,impossible differential,differential and zero correlation ***,in recent work,Xie et *** the security of *** precisely,they proved that under the differential fault analysis(DFA)on the encryption states,an attacker can completely recover the master secret *** this paper,we revisit the block cipher FeW and consider the DFA on its key schedule algorithm,which is rather popular cryptanalysis for kinds of block *** particular,by respectively injected faults into the 30th and 29th round subkeys,one can recover about 55/80~69%bits of master *** the brute force searching remaining bits,one can obtain the full master secret *** simulations and experiment results show that our analysis is practical.
With the strong development momentum of the Internet, network not only brings convenience to our life, but also poses threats to our network security. Users can hide their IP and identity information through encryptio...
详细信息
Segment Anything Model (SAM) has recently gained much attention for its outstanding generalization to unseen data and tasks. Despite its promising prospect, the vulnerabilities of SAM, especially to universal adversar...
With the growing demand for image transmission, there is a need for solutions that offer low energy consumption and low latency. In this paper, we present a novel relay-assisted system based on non-orthogonal multiple...
详细信息
ISBN:
(数字)9798350351255
ISBN:
(纸本)9798350351262
With the growing demand for image transmission, there is a need for solutions that offer low energy consumption and low latency. In this paper, we present a novel relay-assisted system based on non-orthogonal multiple access (NOMA) and mobile edge computing (MEC). Our proposed system compresses images at the device end, decompresses them at either a relay or a cloud server (CS). The primary objective is to minimize system energy consumption under given task delay constraints. Considering that this is a non-convex optimization problem, we solve it by decomposing it into a continuous subproblem and a discrete subproblem. To solve the continuous subproblem, we convexify it by introducing new parameters and change variables to get the optimal the computing power of devices, relay and CS, sampling rate of devices, transmission power of devices and relay. To solve the discrete subproblem, we propose a cross-entropy (CE) algorithm to obtain the optimal decompression decision and subcarrier allocation decision. Simulation results demonstrate the accuracy and effectiveness of our algorithm in optimizing total energy consumption compared to the Linear Interactive and General Optimizer (LINGO) and frequency division multiple access (FDMA) methods.
暂无评论