The detection of small objects by oriented bounding box in aerial images is a recent hot topic. However, since the aerial images are not collected at the same height, the Ground Sample Distance (GSD) is different for ...
详细信息
Receiver plays a vital role in various electronic countermeasure systems and has always been a hot topic to research. Based on the traditional receiver digital channelization structure, this paper further researches a...
详细信息
We experimentally demonstrated the use of intelligent impairment equalization(IIE)for microwave downconversion link linearization in noncooperative *** an equalizer is realized based on an artificial neural network(AN...
详细信息
We experimentally demonstrated the use of intelligent impairment equalization(IIE)for microwave downconversion link linearization in noncooperative *** an equalizer is realized based on an artificial neural network(ANN).Once the training process is completed,the inverse link transfer function can be *** the inverse transformation for the detected signal after transmission,the third-order intermodulation distortion components are suppressed significantly without requiring any prior information from an input RF ***,fast training speed is achieved,since the configuration of ANN-based equalizer is *** results show that the spurious-free dynamic range of the proposed link is improved to 106.5 dB·Hz^(2/3),which is 11.3 dB higher than that of a link without ***,the training epochs reduce to only five,which has the potential to meet the practical engineering requirement.
The Discrete Event System (DEVS)[1] Specification provides a reference standard for the model design and simulation development of complex discrete event state system. It designs a formal mechanism to describe discret...
详细信息
The CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) mechanism is formally modeled first. Then, based on the Markov Chain theory, the analysis of the attack on CSMA/CA is introduced from two aspects wh...
详细信息
The paper proposes a self-interference cancellation (SIC) architecture based on unequal power divider. The transmission efficiency of SIC is investigated. A power divider with unequal power dividing ratio is used in t...
详细信息
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by ...
详细信息
In this paper,multi-UAV trajectory planning and resource allocation are jointly investigated to improve the information freshness for vehicular networks,where the vehicles collect time-critical traffic information by on-board sensors and upload to the UAVs through their allocated spectrum *** adopt the expected sum age of information(ESAoI)to measure the network-wide information *** is jointly affected by both the UAVs trajectory and the resource allocation,which are coupled with each other and make the analysis of ESAoI *** tackle this challenge,we introduce a joint trajectory planning and resource allocation procedure,where the UAVs firstly fly to their destinations and then hover to allocate resource blocks(RBs)during a *** on this procedure,we formulate a trajectory planning and resource allocation problem for ESAoI *** solve the mixed integer nonlinear programming(MINLP)problem with hybrid decision variables,we propose a TD3 trajectory planning and Round-robin resource allocation(TTPRRA).Specifically,we exploit the exploration and learning ability of the twin delayed deep deterministic policy gradient algorithm(TD3)for UAVs trajectory planning,and utilize Round Robin rule for the optimal resource *** TTP-RRA,the UAVs obtain their flight velocities by sensing the locations and the age of information(AoI)of the vehicles,then allocate the RBs to the vehicles in a descending order of AoI until the remaining RBs are not sufficient to support another successful *** results demonstrate that TTP-RRA outperforms the baseline approaches in terms of ESAoI and average AoI(AAoI).
Nowadays, the electromagnetic environment of radar is complex and changeable, and the traditional algorithm is no longer effective to the situation. Hence, it is difficult for radar to have better performance. In this...
详细信息
Cognitive radio network has the learning ability to adjust transmission behavior to adapt to dynamic electromagnetic environment, and it has become a research hotspot in the field of the new generation of intelligent ...
详细信息
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71...
详细信息
We propose a (L, n)-threshold quantum secret sharing protocol of secure direct communication following some ideas of Zhang's protocol [Phys. Lett. A 342 (2005) 60] and Tokunaga et al.'s protocol [Phys. Rev. A 71 (2005) 012314]. The sender distributes the classical secret shares to his or her n agents and each agent owns a secret share in advance. The sender's secure direct communication message can be extracted by an agent subset by collaboration in such a way that at least t or more agents can obtain the secret message with the mutual assistances but any t - 1 or fewer agents cannot. In contrast to the previous multiparty quantum secret sharing protocols in which the sender's secret message can be recovered only if all the agents collaborate, our protocol is more practical and more flexible.
暂无评论