An online trajectory planner permits autonomous unmanned vehicles to maneuver in a changing mission scenario and varying environment. However, in real-time online plannings, task performance, completeness and accuracy...
详细信息
In this paper, a zero index metamaterial lens (ZIML) based on Z-shaped meta-atom is proposed to achieve directive emission. Z-shaped meta-atom is implement as the unit cell of the ZIML to achieve near zero permittivit...
详细信息
Spectrum sensing is a key technology for cognitive *** present spectrum sensing as a classification problem and propose a sensing method based on deep learning *** normalize the received signal power to overcome the e...
详细信息
Spectrum sensing is a key technology for cognitive *** present spectrum sensing as a classification problem and propose a sensing method based on deep learning *** normalize the received signal power to overcome the effects of noise power *** train the model with as many types of signals as possible as well as noise data to enable the trained network model to adapt to untrained new *** also use transfer learning strategies to improve the performance for real-world *** experiments are conducted to evaluate the performance of this *** simulation results show that the proposed method performs better than two traditional spectrum sensing methods,i.e.,maximum-minimum eigenvalue ratio-based method and frequency domain entropy-based *** addition,the experimental results of the new untrained signal types show that our method can adapt to the detection of these new ***,the real-world signal detection experiment results show that the detection performance can be further improved by transfer ***,experiments under colored noise show that our proposed method has superior detection performance under colored noise,while the traditional methods have a significant performance degradation,which further validate the superiority of our method.
Based on stochastic geometry, this paper proposes a mathematical method to estimate the traffic in a D2D based cellular network. The purpose is to determine the normal flow of network to exclude heterogeneous Darknet ...
详细信息
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order co...
详细信息
We propose a new framework combining weak measurement and second-order correlated technique. The theoretical analysis shows that weak value amplification (WVA) experiment can also be implemented by a second-order correlated system. We then build two-dimensional second-order correlated function patterns for achieving higher amplification factor and discuss the signal-to-noise ratio influence. Several advantages can be obtained by our proposal. For instance, detectors with high resolution are not necessary. Moreover, detectors with low saturation intensity are available in WVA setup. Finally, type-one technical noise can be effectively suppressed.
As to select the important nodes from network, the key problems are to determine the basis and quantitative standard of evaluating node importance. This chapter proposes the measurement method of network node importan...
详细信息
A broadband sleeve antenna with very small ground has been presented based on impedance matching network and resistive load. The VSWR of the proposed antenna is less than 2 from 0.17GHz to 0.52GHz. The efficiency of t...
详细信息
Linear array CCD acquisition system is generally used for high precision measurement and control field. In this paper, firstly introduce a design of linear array CCD acquisition system that provide two features of adj...
详细信息
The definition and matrix description of linear cyclic code is introduced in this paper first. Then the distribution of code weight is analyzed. The distance of code weight distribution is defined according to distanc...
详细信息
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulati...
详细信息
ISBN:
(纸本)9781849198455
Role identification for network user plays a very important role in function and behaviour network analysis against criminal groups. Therefore, a network key role identification algorithm based on behaviour accumulation is proposed in the paper. Firstly, behaviour attribution of node (user) in network instance is extracted in the algorithm, description and abstraction of user behaviour by vector mode is performed, simultaneously, K mean algorithm is adopted to make clustering analysis for user behaviour;on the basis of conditions described as above, Hybrid Ant-Colony Algorithm (HBACA) is modified to search relationships between variety of grouping sets in the network instance, and identify each user role in the performing process of network instance. Simulation result shows that the algorithm can extract internal relations of communication behaviours between each network member, in order to obtain key role in a specific network instance.
暂无评论