With their high mobility, unmanned aerial vehicles (UAVs) become appealing data collectors in hard-to-reach wide-area distributed sensor networks. Different from existing works focusing on the perspective of UAVs for ...
详细信息
ISBN:
(纸本)9781665435413
With their high mobility, unmanned aerial vehicles (UAVs) become appealing data collectors in hard-to-reach wide-area distributed sensor networks. Different from existing works focusing on the perspective of UAVs for service order optimization and UAV utility maximization, we consider the utilities of both sensors and UAVs, and innovatively model the competition among sensors (buyers) for the service of UAVs (sellers) as an auction game. A “unity makes strength” strategy is exploited. That is, to strengthen the bidding competitiveness, a group-buying coalition auction method that encourages sensors to form coalitions to bid for UAV service is proposed. Besides, we propose a parallel variable neighborhood ascent search algorithm, we can quickly determine the approximately optimal group-buying coalition structure. Numerical results show that the proposed method outperforms the joint trajectory design-task scheduling (TDTS) UAV-to-community method and the single coalition formation game (CFG) method.
The emergence of sixth-generation and beyond communication systems is expected to fundamentally transform digital experiences through introducing unparalleled levels of intelligence, efficiency, and connectivity. A pr...
详细信息
Orthogonal frequency division multiplexing (OFDM) has been widely recognized as the representative waveform for 5G wireless networks, which can directly support sensing/positioning with existing infrastructure. To gua...
详细信息
ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes of data. In this article, leading scientists, researchers and engineers discuss the transformative e...
详细信息
The goal of co-salient object detection (CoSOD) is to discover salient objects that commonly appear in a query group containing two or more relevant images. Therefore, how to effectively extract inter-image correspond...
详细信息
An active reconfigurable intelligent surface (RIS)-aided multi-user downlink communication system is investigated, where non-orthogonal multiple access (NOMA) is employed to improve spectral efficiency, and the active...
详细信息
Understanding the underlying graph structure of a nonlinear map over a particular domain is essential in evaluating its potential for real applications. In this paper, we investigate the structure of the associated fu...
详细信息
Unauthorized light injection has always been a vital threat to the practical security of a quantum-key-distribution (QKD) system. An optical-power limiter (OPL) based on the thermo-optical defocusing effect has been p...
详细信息
Unauthorized light injection has always been a vital threat to the practical security of a quantum-key-distribution (QKD) system. An optical-power limiter (OPL) based on the thermo-optical defocusing effect has been proposed and implemented, limiting the injected hacking light. As a hardware countermeasure, the performance of the OPL under various light-injection attacks will be tested to clarify the security boundary before it is widely deployed. To investigate the security boundary of the OPL in quantum cryptography, we comprehensively test and analyze the behavior of the OPL under continuous-wave (cw) light-injection attacks and pulse-illumination attacks with pulse repetition rates of 0.5 Hz, 40 MHz, and 1 GHz. The test results illuminate the security boundary of the OPL, which allows one to properly employ the OPL in use cases. The methodology of testing and analysis proposed here is applicable to other power-limitation components in a QKD system.
Few-shot learning (FSL) has emerged as an effective learning method and shows great potential. Despite the recent creative works in tackling FSL tasks, learning valid information rapidly from just a few or even zero s...
详细信息
Self-expression learning methods often obtain a coefficient matrix to measure the similarity between pairs of samples. However, directly using the raw data to represent each sample under the self-expression framework ...
详细信息
暂无评论