期刊文献+
共找到130篇文章
< 1 2 7 >
每页显示 20 50 100
WIDEBAND, INTELLIGENT AND INTEGRATED HF COMMUNICATIONS 被引量:1
1
作者 jinlong wang shaoqian li jibo wei 《China Communications》 SCIE CSCD 2018年第9期I0002-I0004,共3页
The high-frequency(HF)communication,commonly covering the frequency range between 3 and30MHz,is an effective and important long-distance communication approach.Using the ionosphere as a natural high altitude reflector... The high-frequency(HF)communication,commonly covering the frequency range between 3 and30MHz,is an effective and important long-distance communication approach.Using the ionosphere as a natural high altitude reflector,trans-horizon HF radio transmission is possible with advantages such as high mobility,convenient deployment,strong survivability and 展开更多
关键词 通讯 HF 宽带 频率范围 高周波 反射镜 电离层 地平线
在线阅读 下载PDF
The conflicts among globalization,modernization and tradition in science fiction:The case of Kirinyaga:A Fable of Utopia
2
作者 Bing Liu 《Cultures of Science》 2024年第1期3-8,共6页
Science fiction takes many forms, including academic work that calls on readers to think about social and cultural problems. This paper takes a piece of science fiction, Kirinyaga: A Fable of Utopia, as an example and... Science fiction takes many forms, including academic work that calls on readers to think about social and cultural problems. This paper takes a piece of science fiction, Kirinyaga: A Fable of Utopia, as an example and discusses the conflicts among globalization, modernization and tradition present in the text, thus highlighting the academic meaning of science fiction as a literary form. 展开更多
关键词 Science fiction ANTHROPOLOGY cultural conflict Kirinyaga:A Fable of Utopia
在线阅读 下载PDF
The relationship between science fiction and science popularization:A discussion based on literature review and conceptual analysis
3
作者 Bing Liu Xige Feng 《Cultures of Science》 2024年第2期79-86,共8页
The relationship between science fiction and science popularization has long been a controversial issue.Based on a brief historical review of the development of science fiction and science popularization in China, thi... The relationship between science fiction and science popularization has long been a controversial issue.Based on a brief historical review of the development of science fiction and science popularization in China, this paper analyses related literature and concepts and argues that the science–literature dispute can be somewhat lessened in that science fiction can be incorporated into science popularization under the framework of general science popularization. 展开更多
关键词 Science fiction sci-fi science popularization science-literature dispute
在线阅读 下载PDF
A historical study of the British and American definitions of science fiction and related controversies
4
作者 Xige Feng Bing Liu 《Cultures of Science》 2023年第4期353-362,共10页
The various definitions of science fiction reflect different understandings of science and fantasy and their relationship. Through a review of the development history of the British and American definitions of science... The various definitions of science fiction reflect different understandings of science and fantasy and their relationship. Through a review of the development history of the British and American definitions of science fiction and related controversies, we find that changes in science fiction's definition are often accompanied by the reorientation and reimagination of its position in society and culture. As people's perceptions deepen, the shifting boundary between science and fantasy has important implications for a better understanding of science fiction. 展开更多
关键词 Science fiction definitions of science fiction history of science fiction
在线阅读 下载PDF
Unmasking Social Robots’Camouflage:A GNN-Random Forest Framework for Enhanced Detection
5
作者 Weijian Fan Chunhua Wang +1 位作者 Xiao Han Chichen Lin 《Computers, Materials & Continua》 SCIE EI 2025年第1期467-483,共17页
The proliferation of robot accounts on social media platforms has posed a significant negative impact,necessitating robust measures to counter network anomalies and safeguard content integrity.Social robot detection h... The proliferation of robot accounts on social media platforms has posed a significant negative impact,necessitating robust measures to counter network anomalies and safeguard content integrity.Social robot detection has emerged as a pivotal yet intricate task,aimed at mitigating the dissemination of misleading information.While graphbased approaches have attained remarkable performance in this realm,they grapple with a fundamental limitation:the homogeneity assumption in graph convolution allows social robots to stealthily evade detection by mingling with genuine human profiles.To unravel this challenge and thwart the camouflage tactics,this work proposed an innovative social robot detection framework based on enhanced HOmogeneity and Random Forest(HORFBot).At the core of HORFBot lies a homogeneous graph enhancement strategy,intricately woven with edge-removal techniques,tometiculously dissect the graph intomultiple revealing subgraphs.Subsequently,leveraging the power of contrastive learning,the proposed methodology meticulously trains multiple graph convolutional networks,each honed to discern nuances within these tailored subgraphs.The culminating stage involves the fusion of these feature-rich base classifiers,harmoniously aggregating their insights to produce a comprehensive detection outcome.Extensive experiments on three social robot detection datasets have shown that this method effectively improves the accuracy of social robot detection and outperforms comparative methods. 展开更多
关键词 Social robot detection graph neural networks random forest HOMOPHILY heterophily
在线阅读 下载PDF
Output Type Guided Random Test Case Generation for String Validation Routines
6
作者 Chenhui Cui Rubing Huang +1 位作者 Jinfu Chen Yunan Zhou 《Tsinghua Science and Technology》 2025年第6期2467-2486,共20页
String validation routines have been widely used in many real-world applications,such as email validation and postcode validation.String test cases are adopted to test these validation routines,to identify potential d... String validation routines have been widely used in many real-world applications,such as email validation and postcode validation.String test cases are adopted to test these validation routines,to identify potential defects and security risks.Random Testing(RT)is a well-known testing approach to randomly generate string test cases from the input domain(i.e.,the set of all possible test inputs),which is simple to implement at a low cost.However,its testing effectiveness may be unsatisfactory for string validation routines.The main reason for this is that RT may have a high probability to generate invalid rather than valid string test cases,due to its randomness property.This research proposes a new RT approach based on the output types(i.e.,valid and invalid strings)for string validation routines,namely Output-type-guided Random Testing(RTO),which attempts to randomly generate both valid and invalid string test cases with a certain probability.This research performed an empirical study involving several real-world string validation routines collected from ten Java open-source projects,to investigate and compare testing performances of RT-O against the previous two widely-used RT methods.The results show that the generated string test cases by RT-O outperform test cases generated by other RT methods. 展开更多
关键词 software testing random testing(RT) string validation routines string test cases test case generation
原文传递
High-speed encrypted traffic classification by using payload features
7
作者 Xinge Yan Liukun He +3 位作者 Yifan Xu Jiuxin Cao Liangmin Wang Guyang Xie 《Digital Communications and Networks》 2025年第2期412-423,共12页
Traffic encryption techniques facilitate cyberattackers to hide their presence and activities.Traffic classification is an important method to prevent network threats.However,due to the tremendous traffic volume and l... Traffic encryption techniques facilitate cyberattackers to hide their presence and activities.Traffic classification is an important method to prevent network threats.However,due to the tremendous traffic volume and limitations of computing,most existing traffic classification techniques are inapplicable to the high-speed network environment.In this paper,we propose a High-speed Encrypted Traffic Classification(HETC)method containing two stages.First,to efficiently detect whether traffic is encrypted,HETC focuses on randomly sampled short flows and extracts aggregation entropies with chi-square test features to measure the different patterns of the byte composition and distribution between encrypted and unencrypted flows.Second,HETC introduces binary features upon the previous features and performs fine-grained traffic classification by combining these payload features with a Random Forest model.The experimental results show that HETC can achieve a 94%F-measure in detecting encrypted flows and a 85%–93%F-measure in classifying fine-grained flows for a 1-KB flow-length dataset,outperforming the state-of-the-art comparison methods.Meanwhile,HETC does not need to wait for the end of the flow and can extract mass computing features.The average time for HETC to process each flow is only 2 or 16 ms,which is lower than the flow duration in most cases,making it a good candidate for high-speed traffic classification. 展开更多
关键词 Traffic classification Flow analysis Information entropy Machine learning Randomness test
在线阅读 下载PDF
A blockchain-based privacy-preserving and collusion-resistant scheme(PPCR)for double auctions
8
作者 Xuedan Jia Liangmin Wang +2 位作者 Ke Cheng Pujie Jing Xiangmei Song 《Digital Communications and Networks》 2025年第1期116-125,共10页
Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general public.However,most e-auction schemes involve a trusted auctioneer,which is not always cre... Electronic auctions(e-auctions)remove the physical limitations of traditional auctions and bring this mechanism to the general public.However,most e-auction schemes involve a trusted auctioneer,which is not always credible in practice.Some studies have applied cryptography tools to solve this problem by distributing trust,but they ignore the existence of collusion.In this paper,a blockchain-based Privacy-Preserving and Collusion-Resistant scheme(PPCR)for double auctions is proposed by employing both cryptography and blockchain technology,which is the first decentralized and collusion-resistant double auction scheme that guarantees bidder anonymity and bid privacy.A two-server-based auction framework is designed to support off-chain allocation with privacy preservation and on-chain dispute resolution for collusion resistance.A Dispute Resolution agreement(DR)is provided to the auctioneer to prove that they have conducted the auction correctly and the result is fair and correct.In addition,a Concise Dispute Resolution protocol(CDR)is designed to handle situations where the number of accused winners is small,significantly reducing the computation cost of dispute resolution.Extensive experimental results confirm that PPCR can indeed achieve efficient collusion resistance and verifiability of auction results with low on-chain and off-chain computational overhead. 展开更多
关键词 Privacy protection Collusion resistance Secure protocol Blockchain-based double auction Dispute resolution
在线阅读 下载PDF
Groundwater usage characterization in a tribal stretch infected with chronic kidney disease of unknown etiology(CKDu)
9
作者 Herojeet Rajkumar Rakesh K.Dewangan +2 位作者 Pradeep K.Naik Janak R.Verma Prabir K.Naik 《Journal of Environmental Sciences》 2025年第11期232-251,共20页
This reconnaissance study was carried out in urgency as residents complained of groundwater contamination in a tribal stretch infectedwith chronic kidney disease of unknown etiology in central India where at least 100... This reconnaissance study was carried out in urgency as residents complained of groundwater contamination in a tribal stretch infectedwith chronic kidney disease of unknown etiology in central India where at least 100 people have already died and more than 300 hospitalized.Multi-indexing techniques were used to evaluate groundwater quality for drinking,irrigation,and industrial purposes.The comprehensive water quality index(CWQI)classifies∼52%of the 27 collected samples suitable for drinking,and∼37%partially suitable pending certain treatment.While the relative abundance of chemical parameters stands at Ca^(2+)>Na^(+)>Mg^(2+)>K^(+)for cations and HCO_(3)^(−)>Cl^(−)>NO_(3)^(−)>SO_(4)^(2−)>F^(−)for anions,the groundwater in the area suffers from general hardness,nitrate,and fluoride contamination.It is hypothesized that fluoride ions possibly couplewith excess alkaline earth elements and anions to form metal-complexes inviting Hofmeister phenomena to act in the human kidneys through ingested groundwater.For agricultural water quality assessment,historically developed 10 irrigation indices have been used that classify most groundwater samples suitable for agriculture.Corrosivity indices reveal that the groundwater has moderate to high corrosive affinity.Although the results of the irrigation and corrosivity indices are coherent with CWQI water classes,the use of so many indices based on certain chemical parameters to evaluate water samples for agricultural purposes delivers mixed results and confuses workers about the actual water quality in the field.This calls for the development of a new,robust,and comprehensive standard for appraisal of irrigation water quality that could be used uniformly worldwide. 展开更多
关键词 FLUORIDE NITRATE Pollution Hofmeister Sustainable development goals
原文传递
考虑交通参与者的城市交叉口车速预测模型 被引量:6
10
作者 袁田 赵轩 +3 位作者 刘瑞 余强 朱西产 王姝 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2023年第2期326-333,共8页
为了提高车辆在城市交叉口自由行驶状态下的车速预测性能,提出一种考虑本车与其他交通参与者交互特性的车速预测新方法.首先,提出一种车辆目标细分方法来区分其他车辆相对于本车的行驶方向,并应用目标检测算法YOLOv5识别潜在的交通冲突... 为了提高车辆在城市交叉口自由行驶状态下的车速预测性能,提出一种考虑本车与其他交通参与者交互特性的车速预测新方法.首先,提出一种车辆目标细分方法来区分其他车辆相对于本车的行驶方向,并应用目标检测算法YOLOv5识别潜在的交通冲突和弱势交通参与者;然后,将识别的交通参与者信息与历史车速信息相结合,建立基于长短期记忆网络的车速预测模型,在左转、右转以及直行3种不同的驾驶场景下验证交通参与者信息对于提高车速预测性能的有效性.结果表明:与仅以历史车速为输入的基准模型相比,考虑交通参与者的车速预测模型表现出更好的性能,其在很大程度上解决了预测模型在一个预测时域内精度逐渐下降的问题,并对城市交叉口的复杂交通环境表现出更强的适应性. 展开更多
关键词 智能驾驶 车速预测 长短期记忆网络 交通参与者 城市交叉口
在线阅读 下载PDF
A Bandwidth-Link Resources Cooperative Allocation Strategy of Data Communication in Intelligent Transportation Systems 被引量:5
11
作者 Xiaoming Jiang Kangfei Li +2 位作者 Haobin Jiang Na Zhu Xin Tong 《China Communications》 SCIE CSCD 2019年第4期234-249,共16页
The bandwidth resources allocation strategies of the existing Internet of Vehicles(IoV) are mainly base on the communication architecture of the traditional 802.11 x in the wireless local area network(WLAN). The tradi... The bandwidth resources allocation strategies of the existing Internet of Vehicles(IoV) are mainly base on the communication architecture of the traditional 802.11 x in the wireless local area network(WLAN). The traditional communication architecture of IoV will easily cause significant delay and low Packet Delivery Ratio(PDR) for disseminating critical security beacons under the condition of high-speed movement, distance-varying communication, and mixed traffic. This paper proposes a novel bandwidth-link resources cooperative allocation strategy to achieve better communication performance under the road conditions of intelligent transportation systems(ITS). Firstly, in traffic scenarios, based on the characteristic to predict the relative position of the mobile transceivers, a strategy is developed to cooperate on the mobile cellular network and the Dedicated Short-Range Communications(DSRC). Secondly, by adopting the general network simulator NS3, the dedicated mobile channel models that are suitable for the data interaction of ITS, is applied to confirm the feasibility and reliability of the strategy. Finally, by the simulation, comparison, and analysis of some critical performance parame-ters, we conclude that the novel strategy does not only reduce the system delay but also improve the other communication performance indicators, such as the PDR and communication capacity. 展开更多
关键词 IoV bandwidth-link RESOURCES COOPERATIVE ALLOCATION strategy system delay PDR
在线阅读 下载PDF
Feasibility of central loop TEM method for prospecting multilayer water-fi lled goaf 被引量:9
12
作者 Yan Shu Xue Gou-Qiang +2 位作者 Qiu Wei-Zhong Li Hai Zhong Hua-Sen 《Applied Geophysics》 SCIE CSCD 2016年第4期587-597,736,共12页
With deep mining of coal mines, prospecting multilayer water-filled goaf has become a new content that results from geophysical exploration in coalfields. The central loop transient electromagnetic (TEM) method is f... With deep mining of coal mines, prospecting multilayer water-filled goaf has become a new content that results from geophysical exploration in coalfields. The central loop transient electromagnetic (TEM) method is favorable for prospecting conductive layers because of the coupling relationship between its field structure and formation. However, the shielding effect of conductive overburden would not only require a longer observation time when prospecting the same depth but also weaken the anomalous response of underlying layers. Through direct time domain numerical simulation and horizontal layered earth forward modeling, this paper estimates the length of observation time required to prospect the target, and the distinguishable criterion of multilayer water-filled goal is presented with observation error according to the effect of noise on observation data. The observed emf curves from Dazigou Coal Mine, Shanxi Province can distinguish multilayer water-filled goaf. In quantitative inversion interpretation of observed curves, using electric logging data as initial parameters restrains the equivalence caused by coal formation thin layers. The deduced three-layer and two-layer water-filled goals are confirmed by the drilling hole. The result suggests that when observation time is long enough and with the anomalous situation of underlying layers being greater than the observation error, the use of the central loop TEM method to orosoect a multilaver water-filled goaf is feasible. 展开更多
关键词 central loop TEM method prospecting multilayer water-filled goaf conductive shielding layer numerical and theoretical analysis length of observation time observation error distinguishable criterion
在线阅读 下载PDF
A Method for Software Vulnerability Detection Based on Improved Control Flow Graph 被引量:2
13
作者 ZHOU Minmin CHEN Jinfu +4 位作者 LIU Yisong ACKAH-ARTHUR Hilary CHEN Shujie ZHANG Qingchen ZENG Zhifeng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第2期149-160,共12页
With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great signific... With the rapid development of software technology, software vulnerability has become a major threat to computer security. The timely detection and repair of potential vulnerabilities in software, are of great significance in reducing system crashes and maintaining system security and integrity. This paper focuses on detecting three common types of vulnerabilities: Unused_Variable, Use_of_Uninitialized_Variable, and Use_After_ Free. We propose a method for software vulnerability detection based on an improved control flow graph(ICFG) and several predicates of vulnerability properties for each type of vulnerability. We also define a set of grammar rules for analyzing and deriving the three mentioned types of vulnerabilities, and design three vulnerability detection algorithms to guide the process of vulnerability detection. In addition, we conduct cases studies of the three mentioned types of vulnerabilities with real vulnerability program segments from Common Weakness Enumeration(CWE). The results of the studies show that the proposed method can detect the vulnerability in the tested program segments. Finally, we conduct manual analysis and experiments on detecting the three types of vulnerability program segments(30 examples for each type) from CWE, to compare the vulnerability detection effectiveness of the proposed method with that of the existing detection tool Cpp Check. The results show that the proposed method performs better. In summary, the method proposed in this paper has certain feasibility and effectiveness in detecting the three mentioned types of vulnerabilities, and it will also have guiding significance for the detection of other common vulnerabilities. 展开更多
关键词 SOFTWARE SECURITY SOFTWARE VULNERABILITY IMPROVED control FLOW GRAPH VULNERABILITY detection algorithm
原文传递
Supervised and Semi-supervised Methods for Abdominal Organ Segmentation: A Review 被引量:4
14
作者 Isaac Baffour Senkyire Zhe Liu 《International Journal of Automation and computing》 EI CSCD 2021年第6期887-914,共28页
Abdominal organ segmentation is the segregation of a single or multiple abdominal organ(s) into semantic image segments of pixels identified with homogeneous features such as color and texture, and intensity. The abdo... Abdominal organ segmentation is the segregation of a single or multiple abdominal organ(s) into semantic image segments of pixels identified with homogeneous features such as color and texture, and intensity. The abdominal organ(s) condition is mostly connected with greater morbidity and mortality. Most patients often have asymptomatic abdominal conditions and symptoms, which are often recognized late;hence the abdomen has been the third most common cause of damage to the human body. That notwithstanding,there may be improved outcomes where the condition of an abdominal organ is detected earlier. Over the years, supervised and semi-supervised machine learning methods have been used to segment abdominal organ(s) in order to detect the organ(s) condition. The supervised methods perform well when the used training data represents the target data, but the methods require large manually annotated data and have adaptation problems. The semi-supervised methods are fast but record poor performance than the supervised if assumptions about the data fail to hold. Current state-of-the-art methods of supervised segmentation are largely based on deep learning techniques due to their good accuracy and success in real world applications. Though it requires a large amount of training data for automatic feature extraction, deep learning can hardly be used. As regards the semi-supervised methods of segmentation, self-training and graph-based techniques have attracted much research attention. Self-training can be used with any classifier but does not have a mechanism to rectify mistakes early. Graph-based techniques thrive on their convexity, scalability, and effectiveness in application but have an out-of-sample problem. In this review paper, a study has been carried out on supervised and semi-supervised methods of performing abdominal organ segmentation. An observation of the current approaches, connection and gaps are identified, and prospective future research opportunities are enumerated. 展开更多
关键词 Abdominal organ supervised segmentation semi-supervised segmentation evaluation metrics image segmentation machine learning
原文传递
Performability analysis of avionics system with multilayer HM/FM using stochastic Petri nets 被引量:4
15
作者 Wan Jianxiong Xiang Xudong +3 位作者 Bai Xiaoying Lin Chuang Kong Xiangzhen Li Jianxiang 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2013年第2期363-377,共15页
The integrated modular avionics (IMA) architecture is an open standard in avionics industry, in which the number of functionalities implemented by software is greater than ever before. In the IMA architecture, the r... The integrated modular avionics (IMA) architecture is an open standard in avionics industry, in which the number of functionalities implemented by software is greater than ever before. In the IMA architecture, the reliability of the avionics system is highly affected by the software applications. In order to enhance the fault tolerance feature with regard to software application failures, many industrial standards propose a layered health monitoring/fault management (HM/FM) scheme to periodically check the health status of software application processes and recover the malfunctioning software process whenever an error is located. In this paper, we make an analytical study of the HM/FM system for avionics application software. We use the stochastic Petri nets (SPN) to build a formal model of each component and present a method to combine the components together to form a complete system model with respect to three interlayer query strategies. We further investigate the effectiveness of these strategies in an illustrative system. 展开更多
关键词 Health monitoring/fault management system Integrated modular avionics MULTILAYER Performability analysis Stochastic Petri nets
原文传递
Hybrid and Full-Digital Beamforming in mmWave Massive MIMO Systems: A Comparison Considering Low-Resolution ADCs 被引量:2
16
作者 Wence Zhang Xiaoxuan Xia +1 位作者 Yinkai Fu Xu Bao 《China Communications》 SCIE CSCD 2019年第6期91-102,共12页
In a millimeter-wave(mmWave)Massive multiple-input multiple-output(MIMO)systems,full-digital beamforming(i.e.,connecting each antenna with a specific radio-frequency(RF)chain)becomes inefficient due to the hardware co... In a millimeter-wave(mmWave)Massive multiple-input multiple-output(MIMO)systems,full-digital beamforming(i.e.,connecting each antenna with a specific radio-frequency(RF)chain)becomes inefficient due to the hardware cost and power consumption.Therefore,hybrid analog and digital transceiver where the number of RF chains are much smaller than that of the antennas has drawn great research interest.In this work,we investigate the use of low-resolution analog-to-digital converters(ADCs)in the uplink of multi-user hybrid and full-digital mmWave Massive MIMO systems.To be specific,we compare the performance of full-digital minimum mean square error(MMSE)and hybrid MMSE beamforming in both sum rates and energy efficiency.Accurate approximations of sum rates and energy efficiency are provided for both schemes,which captures the dominant factors.The analytical results show that full-digital beamforming outperforms hybrid beamforming in terms of sum rates and requires only a small portion(γ)of antennas used by hybrid beamforming to achieve the same sum rates.We given sufficient condition for full-digital beamforming to outperform hybrid beamforming in terms of energy efficiency.Moreover,an algorithm is proposed to search for the optimal ADC resolution bits.Numerical results demonstrate the correctness of the analysis. 展开更多
关键词 HYBRID MASSIVE MIMO mmWave MMSE low-resolution ADCS
在线阅读 下载PDF
Medical data publishing based on average distribution and clustering 被引量:3
17
作者 Tong Yi Minyong Shi Haibin Zhu 《CAAI Transactions on Intelligence Technology》 SCIE EI 2022年第3期381-394,共14页
Most of the data publishing methods have not considered sensitivity protection,and hence the adversary can disclose privacy by sensitivity attack.Faced with this problem,this paper presents a medical data publishing m... Most of the data publishing methods have not considered sensitivity protection,and hence the adversary can disclose privacy by sensitivity attack.Faced with this problem,this paper presents a medical data publishing method based on sensitivity determination.To protect the sensitivity,the sensitivity of disease information is determined by semantics.To seek the trade-off between information utility and privacy security,the new method focusses on the protection of sensitive values with high sensitivity and assigns the highly sensitive disease information to groups as evenly as possible.The experiments are conducted on two real-world datasets,of which the records include various attributes of patients.To measure sensitivity protection,the authors define a metric,which can evaluate the degree of sensitivity disclosure.Besides,additional information loss and discernability metrics are used to measure the availability of released tables.The experimental results indicate that the new method can provide better privacy than the traditional one while the information utility is guaranteed.Besides value protection,the proposed method can provide sensitivity protection and available releasing for medical data. 展开更多
关键词 data publishing information utility SECURITY SEMANTICS sensitive values sensitivity
在线阅读 下载PDF
LED Adaptive Deployment Optimization in Indoor VLC Networks 被引量:1
18
作者 Jiangtao Li Xu Bao Wence Zhang 《China Communications》 SCIE CSCD 2021年第6期201-213,共13页
Driven by the continuous penetration of high data rate services and applications,a large amount of unregulated visible light spectrum is used for communication to fully meet the needs of 6th generation(6G)mobile techn... Driven by the continuous penetration of high data rate services and applications,a large amount of unregulated visible light spectrum is used for communication to fully meet the needs of 6th generation(6G)mobile technologies.Visible light communication(VLC)faces many challenges as a solution that complements existing radio frequency(RF)networks.This paper studies the optimal configuration of LEDs in indoor environments under the constraints of illumination and quality of experience(QoE).Based on the Voronoi tessellation(VT)and centroidal Voronoi tessellation(CVT)theory,combined with the Lloyd’s algorithm,we propose two approaches for optimizing LED deployments to meet the illumination and QoE requirements of all users.Focusing on(i)the minimization of the number of LEDs to be installed in order to meet illumination and average QoE constraints,and(ii)the maximization of the average QoE of users to be served with a fixed number of LEDs.Monte Carlo simulations are carried out for different user distribution compared with hexagonal,square and VT deployment.The simulation results illustrate that under the same conditions,the proposed deployment approach can provide less LEDs and achieve better QoE performance. 展开更多
关键词 visible light communication lightemitting diodes centroidal Voronoi tessellation quality of experience optimal deployment
在线阅读 下载PDF
New Feedback Control Model in the Lattice Hydrodynamic Model Considering the Historic Optimal Velocity Difference Effect 被引量:2
19
作者 Guang-Han Peng Shu-Hong Yang Hong-Zhuan Zhao 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第12期803-807,共5页
A feedback control model of lattice hydrodynamic model is proposed by taking the information of the historic optimal velocity into account for the traffic system. The modern control theory is applied for the linear st... A feedback control model of lattice hydrodynamic model is proposed by taking the information of the historic optimal velocity into account for the traffic system. The modern control theory is applied for the linear stability condition with feedback control signal. The result shows that the stability of traffic flow is closely related to the information of the historic optimal velocity. Furthermore, numerical simulations conform that the new feedback control did increase the stability of traffic flow efficiently, which is in accord with theoretical analysis. 展开更多
关键词 TRAFFIC flow LATTICE HYDRODYNAMIC model control method TRAFFIC JAM
原文传递
Robust Watermarking of Mobile Video Resistant against Barrel Distortion 被引量:2
20
作者 Huawei Tian Yanhui Xiao +2 位作者 Gang Cao Jianwei Ding Bo Ou 《China Communications》 SCIE CSCD 2016年第9期131-138,共8页
In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the orig... In head mounted display(HMD),in order to cancel pincushion distortion,the images displayed on the mobile should be prewarped with barrel distortion.The copyright of the mobile video should be verified on both the original view and the pre-warped virtual view.A robust watermarking resistant against barrel distortion for HMDs is proposed in this paper.Watermark mask is embedded into image in consideration of imperceptibility and robustness of watermarking.In order to detect watermark from the pre-warped image with barrel distortion,an estimation method of the barrel distortion is proposed for HMDs.Then,the same warp is enforced on the embedded watermark mask with the estimated parameters of barrel distortion.The correlation between the warped watermark and the pre-warped image is computed to predicate the existence of watermark.As shown in experimental results,watermark of mobile video can be detected not only from the original views,but also from the pre-warped virtual view.It also shows that the proposed scheme is resistant against combined barrel distortion and common post-processing,such as JPEG compression. 展开更多
关键词 mobile video HMD with mobile robust watermarking
在线阅读 下载PDF
上一页 1 2 7 下一页 到第
使用帮助 返回顶部