期刊文献+

《Journal of Information and Intelligence》

作品数87被引量48H指数4
《信息与智能学报(英文)》的办刊宗旨是:及时反映信息与智能领域最新理论与技术发展水平,促进相关领域学科发展、科学研究、人才培养和国际学术交流,服务于科技强国建设,服务于社会主义精神文明与物质文明建设。...查看详情>>
  • 主办单位西安电子科技大学
  • 国际标准连续出版物号2097-2849
  • 国内统一连续出版物号61-1529/TN
  • 出版周期双月刊
共找到87篇文章
< 1 2 5 >
每页显示 20 50 100
D-Fi: Domain adversarial neural network based CSI fingerprint indoor localization 被引量:1
1
作者 Wei Liu Zhiqiang Dun 《Journal of Information and Intelligence》 2023年第2期104-114,共11页
Deep learning based channel state information(CSI)fingerprint indoor localization schemes need to collect massive labeled data samples for training,and the parameters of the deep neural network are used as the fingerp... Deep learning based channel state information(CSI)fingerprint indoor localization schemes need to collect massive labeled data samples for training,and the parameters of the deep neural network are used as the fingerprints.However,the indoor environment may change,and the previously constructed fingerprint may not be valid for the changed environment.In order to adapt to the changed environment,it requires to recollect massive amount of labeled data samples and perform the training again,which is labor-intensive and time-consuming.In order to overcome this drawback,in this paper,we propose one novel domain adversarial neural network(DANN)based CSI Fingerprint Indoor Localization(D-Fi)scheme,which only needs the unlabeled data samples from the changed environment to update the fingerprint to adapt to the changed environment.Specifically,the previous environment and changed environment are treated as the source domain and the target domain,respectively.The DANN consists of the classification path and the domain-adversarial path,which share the same feature extractor.In the offline phase,the labeled CSI samples are collected as source domain samples to train the neural network of the classification path,while in the online phase,for the changed environment,only the unlabeled CSI samples are collected as target domain samples to train the neural network of the domainadversarial path to update parameters of the feature extractor.In this case,the feature extractor extracts the common features from both the source domain samples corresponding to the previous environment and the target domain samples corresponding to the changed environment.Experiment results show that for the changed localization environment,the proposed D-Fi scheme significantly outperforms the existing convolutional neural network(CNN)based scheme. 展开更多
关键词 Indoor localization Domain adversarial neural network CSI FINGERPRINT Deep learning
原文传递
DLE-YOLO:An efficient object detection algorithm with dual-branch lightweight excitation network
2
作者 Peitao Cheng Xuanjiao Lei +1 位作者 Haoran Chen Xiumei Wang 《Journal of Information and Intelligence》 2025年第2期91-102,共12页
As a computer vision task,object detection algorithms can be applied to various real-world sce-narios.However,efficient algorithms often come with a large number of parameters and high computational complexity.To meet... As a computer vision task,object detection algorithms can be applied to various real-world sce-narios.However,efficient algorithms often come with a large number of parameters and high computational complexity.To meet the demand for high-performance object detection algorithms on mobile devices and embedded devices with limited computational resources,we propose a new lightweight object detection algorithm called DLE-YOLO.Firstly,we design a novel backbone called dual-branch lightweight excitation network(DLEN)for feature extraction,which is mainly constructed by dual-branch lightweight excitation units(DLEU).DLEU is stacked with different numbers of dual-branch lightweight excitation blocks(DLEB),which can extract comprehensive features and integrate information between different channels of features.Secondly,in order to enhance the network to capture key feature information in the regions of interest,the attention model HS-coordinate attention(HS-CA)is introduced into the network.Thirdly,the localization loss utilizes SIoU loss to further optimize the accuracy of the bounding box.Our method achieves a mAP value of 46.0%on the MS-COCO dataset,which is a 2%mAP improvement compared to the baseline YOLOv5-m,while bringing a 19.3%reduction in parameter count and a 12.9%decrease in GFLOPs.Furthermore,our method outperforms some advanced lightweight object detection algorithms,validating the effectiveness of our approach. 展开更多
关键词 Object detection Lightweight network Attention mechanism Loss function
原文传递
Cooperative sensing,communication and computation resource allocation in mobile edge computing-enabled vehicular networks
3
作者 Zhenyu Li Yuchuan Fu +1 位作者 Mengqiu Tian Changle Li 《Journal of Information and Intelligence》 2024年第4期339-354,共16页
The combination of integrated sensing and communication(ISAC)with mobile edge computing(MEC)enhances the overall safety and efficiency for vehicle to everything(V2X)system.However,existing works have not considered th... The combination of integrated sensing and communication(ISAC)with mobile edge computing(MEC)enhances the overall safety and efficiency for vehicle to everything(V2X)system.However,existing works have not considered the potential impacts on base station(BS)sensing performance when users offload their computational tasks via uplink.This could leave insufficient resources allocated to the sensing tasks,resulting in low sensing performance.To address this issue,we propose a cooperative power,bandwidth and computation resource allocation(RA)scheme in this paper,maximizing the overall utility of Cramer-Rao bound(CRB)for sensing accuracy,computation latency for processing sensing information,and communication and computation latency for computational tasks.To solve the RA problem,a twin delayed deep deterministic policy gradient(TD3)algorithm is adopted to explore and obtain the effective solution of the RA problem.Furthermore,we investigate the performance tradeoff between sensing accuracy and summation of communication latency and computation latency for computational tasks,as well as the relationship between computation latency for processing sensing information and that of computational tasks by numerical simulations.Simulation demonstrates that compared to other benchmark methods,TD3 achieves an average utility improvement of 97.11%and 27.90%in terms of the maximum summation of communication latency and computation latency for computational tasks and improves 3.60 and 1.04 times regarding the maximum computation latency for processing sensing information. 展开更多
关键词 Integrated sensing and communication Mobile edge computing Resource allocation Reinforcement learning
原文传递
Resource allocation for coexistence of eMBB and bursty URLLC based on queueing with preemption
4
作者 Wei Guo Kai Liang +3 位作者 Yuewen Song Xiaoli Chu Gan Zheng Kai-Kit Wong 《Journal of Information and Intelligence》 2025年第3期223-241,共19页
Enhanced mobile broadband(eMBB)and ultra-reliable low-latency communication(URLLC)are two critical services in 5G mobile networks.While there has been extensive research on their coexistence,few studies have considere... Enhanced mobile broadband(eMBB)and ultra-reliable low-latency communication(URLLC)are two critical services in 5G mobile networks.While there has been extensive research on their coexistence,few studies have considered the impact of bursty URLLC on their coexistence performance.In this paper,we propose a method to allocate computing and radio resources for coexisting eMBB and bursty URLLC services by preempting both computing queues in the base station(BS)and time-frequency resources at the air interface.Specifically,we first divide the computing resources at the BS into a shared part for both URLLC and eMBB users and an exclusive part only for eMBB users,and propose a queuing mechanism with preemptive-resume priority for accessing the shared computing resources.Furthermore,we propose a preemptive puncturing method and a threshold-based queuing mechanism in the air interface to enable the multiplexing of eMBB and URLLC on shared time-frequency resources.We analytically derive the average queuing delay,average computation delay,and average transmission delay of eMBB and URLLC packets.Based on this analysis,we formulate a mixed-integer nonlinear programming problem to minimize the average delay of URLLC packets while satisfying the average delay and throughput requirements of eMBB by jointly optimizing the eMBB subcarrier allocation,the URLLC subcarrier scheduling and the computing resource allocation.We decompose this problem into three subproblems and solve them alternately using a block coordinate descent algorithm.Numerical results show that our proposed method reduces the outage probability and average delay of URLLC compared to the existing works. 展开更多
关键词 Ultra-reliable low-latency communication(URLLC) Enhanced mobile broadband(eMBB) Resource allocation Queuing Preemption Punctured scheduling
原文传递
Aerial RIS-aided physical layer security design for satellitecommunication among similar channels 被引量:1
5
作者 Chengjun Jiang Chensi Zhang +2 位作者 Leilei Mu Zhe Zhang Jianhua Ge 《Journal of Information and Intelligence》 2023年第1期54-67,共14页
Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication netwo... Satellite communications and reconfigurable intelligent surface (RIS) are considered as twopromising technologies that can significantly improve the coverage and energy efficiency of futurewireless communication networks. The satellite communications security is often threatened dueto its broadcasting nature. To enhance the physical layer security (PLS) of satellite communications with channel similarity, an aerial RIS-aided dual full-duplex (DFD-ARIS) cooperative jamming method is presented in this paper. Specifically, unlike the existing works that relied onchannel difference, DFD-ARIS utilizes the channel similarity against the eavesdroppers with thehelp of ARIS. In addition, the power allocation is further studied in conjunction with the phasedesign of RIS to minimize the total power under the constraints of data rate, satellite powerlimitation and secrecy rate. Then, the closed-form solutions are achieved. Simulation results showthat the performance of the proposed scheme is superior to the traditional method. 展开更多
关键词 Reconfigurable intelligent surface(RIS) Satellite communication Physical layer security(PLS) Cooperative jamming Power allocation
原文传递
Radio frequency based distributed system for noncooperative UAV classification and positioning 被引量:4
6
作者 Chaozheng Xue Tao Li Yongzhao Li 《Journal of Information and Intelligence》 2024年第1期42-51,共10页
With the increasing popularity of civilian unmanned aerial vehicles(UAVs),safety issues arising from unsafe operations and terrorist activities have received growing attention.To address this problem,an accurate class... With the increasing popularity of civilian unmanned aerial vehicles(UAVs),safety issues arising from unsafe operations and terrorist activities have received growing attention.To address this problem,an accurate classification and positioning system is needed.Considering that UAVs usually use radio frequency(RF)signals for video transmission,in this paper,we design a passive distributed monitoring system that can classify and locate UAVs according to their RF signals.Specifically,three passive receivers are arranged in different locations to receive RF signals.Due to the noncooperation between a UAV and receivers,it is necessary to detect whether there is a UAV signal from the received signals.Hence,convolutional neural network(CNN)is proposed to not only detect the presence of the UAV,but also classify its type.After the UAV signal is detected,the time difference of arrival(TDOA)of the UAV signal arriving at the receiver is estimated by the cross-correlation method to obtain the corresponding distance difference.Finally,the Chan algorithm is used to calculate the location of the UAV.We deploy a distributed system constructed by three software defined radio(SDR)receivers on the campus playground,and conduct extensive experiments in a real wireless environment.The experimental results have successfully validated the proposed system. 展开更多
关键词 Unmanned aerial vehicles Noncooperative CNN CLASSIFICATION POSITIONING
原文传递
ε-arithmetics for real vectors and linear processing of real vector-valued signals
7
作者 Xiang-Gen Xia 《Journal of Information and Intelligence》 2023年第1期2-10,共9页
In this paper,we introduce a new concept,namelyε-arithmetics,for real vectors of any fixed dimension.The basic idea is to use vectors of rational values(called rational vectors)to approximate vectors of real values o... In this paper,we introduce a new concept,namelyε-arithmetics,for real vectors of any fixed dimension.The basic idea is to use vectors of rational values(called rational vectors)to approximate vectors of real values of the same dimension withinεrange.For rational vectors of a fixed dimension m,they can form a field that is an mth order extension Q(α)of the rational field Q whereαhas its minimal polynomial of degree m over Q.Then,the arithmetics,such as addition,subtraction,multiplication,and division,of real vectors can be defined by using that of their approximated rational vectors withinεrange.We also define complex conjugate of a real vector and then inner product and convolutions of two real vectors and two real vector sequences(signals)of finite length.With these newly defined concepts for real vectors,linear processing,such as linear filtering,ARMA modeling,and least squares fitting,can be implemented to real vectorvalued signals with real vector-valued coefficients,which will broaden the existing linear processing to scalar-valued signals. 展开更多
关键词 Arithmetics Rational vectors Real vectors Rational field Algebraic number field Field extension Algebraic number Inner product Linear processing of real vector-valued signals
原文传递
A statistical sensing method by utilizing Wi-Fi CSI subcarriers:Empirical study and performance enhancement
8
作者 Tao Deng Bowen Zheng +2 位作者 Rui Du Fan Liu Tony Xiao Han 《Journal of Information and Intelligence》 2024年第4期365-374,共10页
In modern Wi-Fi systems,channel state information(CSI)serves as a foundational support for various sensing applications.Currently,existing CSI-based techniques exhibit limitations in terms of environmental adaptabilit... In modern Wi-Fi systems,channel state information(CSI)serves as a foundational support for various sensing applications.Currently,existing CSI-based techniques exhibit limitations in terms of environmental adaptability.As such,optimizing the utilization of subcarrier CSI stands as a critical avenue for enhancing sensing performance.Within the OFDM communication framework,this work derives sensing outcomes for both detection and estimation by harnessing the CSI from every individual measured subcarrier,subsequently consolidating these outcomes.When contrasted against results derived from CSI based on specific extraction protocols or those obtained through weighted summation,the methodology introduced in this study offers substantial improvements in CSI-based detection and estimation performance.This approach not only underscores the significance but also serves as a robust exemplar for the comprehensive application of CSI. 展开更多
关键词 CSI SUBCARRIER Wi-Fi sensing
原文传递
Channel computation based on multi-scale attention residual network
9
作者 Wengang Li Deli Zhou Qiong Ye 《Journal of Information and Intelligence》 2025年第3期275-287,共13页
Orthogonal time-frequency space(OTFS)modulation can effectively counter ICI in high-speed mobile scenarios,fully enhance the spectral efficiency of communication systems in high Doppler expansion scenarios,and improve... Orthogonal time-frequency space(OTFS)modulation can effectively counter ICI in high-speed mobile scenarios,fully enhance the spectral efficiency of communication systems in high Doppler expansion scenarios,and improve the quality of communication systems.Channel estimation performance serves as a critical evaluation parameter within the OTFS modulation system.In this paper,we propose a multi-scale attention residual neural structure for improved channel estimation of OTFS waveforms in different satellite-ground scenario.Firstly,a multi-scale channel feature extraction module is designed,which applies multi-dimensional feature extraction to the channel matrix,thereby bolstering the capability to capture features at diverse scales.Subsequently,a selfattention mechanism is incorporated to concentrate on subtle yet significant features.The extracted features are then integrated and exploited through a residual convolutional architecture to derive an estimation of the channel matrix.Simulations are conducted using the satellite-ground mobile channel model outlined in 3GPP TR 38.811,with the NTN-TDL-C and NTN-TDL-B channel models representing line of sight(LoS)and non-line of sight(NLoS)conditions,respectively.Results demonstrate that the attention-based approach presented surpasses alternative neural network methodologies in terms of mean squared error(MSE),bit error rate(BER),and complexity,and meets the demands of OTFS channel estimation in satellite-ground scenario. 展开更多
关键词 Orthogonal time-frequency space(OTFS) Channel estimation Self-attention mechanism Deep learning Satellite-ground scenario
原文传递
Cluster-based RSU deployment strategy for vehicular ad hoc networks with integration of communication,sensing and computing
10
作者 Xinrui Gu Shengfeng Wang +1 位作者 Zhiqing Wei Zhiyong Feng 《Journal of Information and Intelligence》 2024年第4期325-338,共14页
The integration of communications,sensing and computing(I-CSC)has significant applications in vehicular ad hoc networks(VANETs).A roadside unit(RSU)plays an important role in I-CSC by performing functions such as info... The integration of communications,sensing and computing(I-CSC)has significant applications in vehicular ad hoc networks(VANETs).A roadside unit(RSU)plays an important role in I-CSC by performing functions such as information transmission and edge computing in vehicular communication.Due to the constraints of limited resources,RSU cannot achieve full coverage and deploying RSUs at key cluster heads of hierarchical structures of road networks is an effective management method.However,direct extracting the hierarchical structures for the resource allocation in VANETs is an open issue.In this paper,we proposed a network-based renormalization method based on information flow and geographical location to hierarchically deploy the RSU on the road networks.The renormalization method is compared with two deployment schemes:genetic algorithm(GA)and memetic framework-based optimal RSU deployment(MFRD),to verify the improvement of communication performance.Our results show that the renormalization method is superior to other schemes in terms of RSU coverage and information reception rate. 展开更多
关键词 Roadside unit(RSU)deployment strategy Vehicular ad hoc networks(VANETs) Hierarchical structures Renormalization group Complex network
原文传递
An electromechanically reconfigurable intelligent surface for enhancing sub-6G wireless communication signal 被引量:1
11
作者 Kai Qu Ke Chen +5 位作者 Jianmin Zhao Na Zhang Qi Hu Junming Zhao Tian Jiang Yijun Feng 《Journal of Information and Intelligence》 2023年第3期207-216,共10页
Reconfigurable intelligent surface(RIS)is emerged as a promising technique to solve the challenges faced by future wireless communication networks.Although the most commonly used electrically-controlled RISs can achie... Reconfigurable intelligent surface(RIS)is emerged as a promising technique to solve the challenges faced by future wireless communication networks.Although the most commonly used electrically-controlled RISs can achieve millisecond-scale speed of dynamic switch,they have a large number of microwave circuit elements(such as PIN diodes or varactors)which will bring non-negligible insertion loss,and the complicity of the bias network to electrically addressing each element will increase with the expansion of the RIS aperture.Aiming at further reducing the fabrication cost and power consumption,herein an electromechanical RIS used for sub-6G wireless communication is proposed.The electromechanical RIS is designed with a passive metasurface and step-motor driver modules,providing simultaneous high-efficiency reflection(over 80%)and continuous reflection phase coverage of 360.Through electromechanical control,the RIS system can realize different reflective wavefront shaping,and has been employed in the indoor sub-6G wireless environment demonstrating a maximum signal improvement of 8.3 dB.The proposed electromechanical RIS is particularly useful for wireless signal enhancement in static blind area,and has the obvious advantage of not requiring continuous power supply after the RIS being regulated.Therefore,it greatly reduces the overall cost and power consumption which may have potentials in indoor application scenarios for improving wireless communication performance. 展开更多
关键词 Reconfigurable intelligent surface ELECTROMECHANICAL Sub-6G Signal enhancement
原文传递
Time-varying formation control with obstacle avoidance for fractional-order multi-agent systems
12
作者 Yangyang Cai Sulan Li +1 位作者 Yongliang Wei Yunru Zhu 《Journal of Information and Intelligence》 2025年第4期289-302,共14页
Aiming at the consensus of relative position considering obstacle avoidance for fractional-order multi-agent system,a novel distributed control algorithm is proposed in this paper.Firstly,a synthetic error of each age... Aiming at the consensus of relative position considering obstacle avoidance for fractional-order multi-agent system,a novel distributed control algorithm is proposed in this paper.Firstly,a synthetic error of each agent under the influence of obstacles is introduced.The consensus pro-tocols are designed based on this eror according to sliding mode theory for the order increasing and decreasing,respectively.Then,the Lyapunov function is used to prove the stable convergence of the protocols.Finally,the simulation results show that the protocols can not only prevent the agents from colliding with obstacles,but also enable the agents to quickly recover the expected formation and achieve consensus of the relative position. 展开更多
关键词 Fractional-order multi-agent systems Time-varyingformation Sliding mode control Artificial potential field method
原文传递
Constructions of correlation immnue S-boxes with high nonlinearity
13
作者 Yanhan Ji Zhuo Ma +1 位作者 Luyang Li Yujuan Sun 《Journal of Information and Intelligence》 2024年第3期253-260,共8页
S-boxes play a central role in the design of symmetric cipher schemes.For stream cipher appli-cations,an s-box should satisfy several criteria such as high nonlinearity,balanceness,correlation immunity,and so on.In th... S-boxes play a central role in the design of symmetric cipher schemes.For stream cipher appli-cations,an s-box should satisfy several criteria such as high nonlinearity,balanceness,correlation immunity,and so on.In this paper,by using disjoint linear codes,a class of s-boxes possessing high nonlinearity and 1st-order correlation immunity is given.It is shown that the constructed correlation immune S-boxes can possess currently best known nonlinearity,which is confirmed by the example 1st-order correlation immune(12,3)s-box with nonlinearity 2000.In addition,two other frameworks concerning the criteria of balanced and resiliency are obtained respectively. 展开更多
关键词 Boolean function S-boxes NONLINEARITY Correlation immunity Balanceness
原文传递
Journal of Information and Intelligence Editorial Board
14
《Journal of Information and Intelligence》 2024年第3期F0002-F0002,共1页
原文传递
A heuristic mixed real-time task allocation of virtual utilization in multi-core processor 被引量:4
15
作者 Hongbiao Liu Mengfei Yang +3 位作者 Tingyu Wang Chenghao Song Shenghui Zhu Xi Chen 《Journal of Information and Intelligence》 2023年第2期156-177,共22页
Multi-core processor is widely used as the running platform for safety-critical real-time systems such as spacecraft,and various types of real-time tasks are dynamically added at runtime.In order to improve the utiliz... Multi-core processor is widely used as the running platform for safety-critical real-time systems such as spacecraft,and various types of real-time tasks are dynamically added at runtime.In order to improve the utilization of multi-core processors and ensure the real-time performance of the system,it is necessary to adopt a reasonable real-time task allocation method,but the existing methods are only for single-core processors or the performance is too low to be applicable.Aiming at the task allocation problem when mixed real-time tasks are dynamically added,we propose a heuristic mixed real-time task allocation algorithm of virtual utilization VU-WF(Virtual Utilization Worst Fit)in multi-core processor.First,a 4-tuple task model is established to describe the fixedpoint task and the sporadic task in a unified manner.Then,a VDS(Virtual Deferral Server)for serving execution requests of fixed-point task is constructed and a schedulability test of the mixed task set is derived.Finally,combined with the analysis of VDS's capacity,VU-WF is proposed,which selects cores in ascending order of virtual utilization for the schedulability test.Experiments show that the overall performance of VU-WF is better than available algorithms,not only has a good schedulable ratio and load balancing but also has the lowest runtime overhead.In a 4-core processor,compared with available algorithms of the same schedulability ratio,the load balancing is improved by 73.9%,and the runtime overhead is reduced by 38.3%.In addition,we also develop a visual multi-core mixed task scheduling simulator RT-MCSS(open source)to facilitate the design and verification of multi-core scheduling for users.As the high performance,VU-WF can be widely used in resource-constrained and safety-critical real-time systems,such as spacecraft,self-driving cars,industrial robots,etc. 展开更多
关键词 Mixed real-time task set Multi-core scheduling Task dynamical adding Virtual utilization Scheduling simulator
原文传递
Boosting brain-computer interface performance through cognitive training: A brain-centric approach
16
作者 Ziyuan Zhang Ziyu Wang +3 位作者 Kaitai Guo Yang Zheng Minghao Dong Jimin Liang 《Journal of Information and Intelligence》 2025年第1期19-35,共17页
Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plastic... Previous efforts to boost the performance of brain-computer interfaces (BCIs) have predominantly focused on optimizing algorithms for decoding brain signals. However, the untapped potential of leveraging brain plasticity for optimization remains underexplored. In this study, we enhanced the temporal resolution of the human brain in discriminating visual stimuli by eliminating the attentional blink (AB) through color-salient cognitive training, and we confirmed that the mechanism was an attention-based improvement. Using the rapid serial visual presentation (RSVP)-based BCI, we evaluated the behavioral and electroencephalogram (EEG) decoding performance of subjects before and after cognitive training in high target percentage (with AB) and low target percentage (without AB) surveillance tasks, respectively. The results consistently demonstrated significant improvements in the trained subjects. Further analysis indicated that this improvement was attributed to the cognitively trained brain producing more discriminative EEG. Our work highlights the feasibility of cognitive training as a means of brain enhancement to boost BCI performance. 展开更多
关键词 Attentional blink(AB) Brain-computer interface(BCI) Cognitive training Electroencephalogram(EEG) Rapid serial visual presentation(RSVP) Representational discriminability
原文传递
In-situ manipulation of wireless link with reinforcement-learningdriven programmable metasurface in indoor environment 被引量:1
17
作者 Jiawen Xu Rong Zhang +2 位作者 Jie Ma Hanting Zhao Lianlin Li 《Journal of Information and Intelligence》 2023年第3期217-227,共11页
It is of great importance to control flexibly wireless links in the modern society,especially with the advent of the Internet of Things(IoT),fifth-generation communication(5G),and beyond.Recently,we have witnessed tha... It is of great importance to control flexibly wireless links in the modern society,especially with the advent of the Internet of Things(IoT),fifth-generation communication(5G),and beyond.Recently,we have witnessed that programmable metasurface(PM)or reconfigurable intelligent surface(RIS)has become a key enabling technology for manipulating flexibly the wireless link;however,one fundamental but challenging issue is to online design the PM's control sequence in a complicated wireless environment,such as the real-world indoor environment.Here,we propose a reinforcement learning(RL)approach to online control of the PM and thus in-situ improve the quality of the underline wireless link.We designed an inexpensive one-bit PM working at around 2.442 GHz and developed associated RL algorithms,and demonstrated experimentally that it is capable of enhancing the quality of commodity wireless link by a factor of about 10 dB and beyond in multiple scenarios,even if the wireless transmitter is in the glancing angle of the PM in the realworld indoor environment.Moreover,we also prove that our RL algorithm can be extended to improve the wireless signals of receivers in dual-receiver scenario.We faithfully expect that the presented technique could hold important potentials in future wireless communication,smart homes,and many other fields. 展开更多
关键词 Programmable metasurface Reconfigurable intelligent surface Reinforcement learning Wireless link
原文传递
Composite fixed-length ordered features with index-of-max transformation for high-performing and secure palmprint template protection
18
作者 Zhicheng Cao Weiqiang Zhao +1 位作者 Heng Zhao Liaojun Pang 《Journal of Information and Intelligence》 2025年第1期51-67,共17页
Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints,in that it is larger in area,richer in information and able to work at a distance.H... Palmprint recognition has attracted considerable attention due to its advantages over other biometric modalities such as fingerprints,in that it is larger in area,richer in information and able to work at a distance.However,the issue of palmprint privacy and security(especially palmprint template protection)remains under-studied.Among the very few research works,most of them only use orientational features of the palmprint with transformation processing,yielding unsatisfactory recognition and protection performance.Thus,this research work proposes a palmprint feature extraction method for palmprint template protection that is fixed-length and ordered in nature,by fusing point features and orientational features.Firstly,dual orientations are extracted and encoded with more accuracy based on the modified finite Radon transform(MFRAT).Then,SURF feature points are extracted and converted to be fixed-length and ordered features.Finally,composite fixed-length ordered features that fuse up the dual orientations and SURF points are transformed using the irreversible transformation of index-of-max(IoM)to generate the revocable palmprint templates.Experiments show that the matching accuracy of the proposed method of fixed-length and ordered point features are superior to all other feature extraction methods on the PolyU and CASIA datasets.It is also demonstrated that the EERs before and after IoM transformation are better than all other representative template protection methods.A thorough security and privacy analysis including brute-force attack,false accept attack,birthday attack,attack via record multiplicity,irreversibility,unlinkability and revocability is also given,which proves that our proposed method has both high performance and security. 展开更多
关键词 Palmprint recognition Template protection Composite features Fixed-length ordered features SURF MFRAT
原文传递
A lightweight hardware implementation of CRYSTALS-Kyber 被引量:1
19
作者 Shiyang He Hui Li +1 位作者 Fenghua Li Ruhui Ma 《Journal of Information and Intelligence》 2024年第2期167-176,共10页
The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future.Since December 2016,the National Institute of Standards and Technology(N... The security of cryptographic algorithms based on integer factorization and discrete logarithm will be threatened by quantum computers in future.Since December 2016,the National Institute of Standards and Technology(NIST)has begun to solicit post-quantum cryptographic(PQC)algorithms worldwide.CRYSTALS-Kyber was selected as the standard of PQC algorithm after 3 rounds of evaluation.Meanwhile considering the large resource consumption of current implementation,this paper presents a lightweight architecture for ASICs and its implementation on FPGAs for prototyping.In this implementation,a novel compact modular multiplication unit(MMU)and compression/decompression module is proposed to save hardware resources.We put forward a specially optimized schoolbook polynomial multiplication(SPM)instead of number theoretic transform(NTT)core for polynomial multiplication,which can reduce about 74%SLICE cost.We also use signed number representation to save memory resources.In addition,we optimize the hardware implementation of the Hash module,which cuts off about 48%of FF consumption by register reuse technology.Our design can be implemented on Kintex-7(XC7K325T-2FFG900I)FPGA for prototyping,which occupations of 4777/4993 LUTs,2661/2765 FFs,1395/1452 SLICEs,2.5/2.5 BRAMs,and 0/0 DSP respective of client/server side.The maximum clock frequency can reach at 244 MHz.As far as we know,our design consumes the least resources compared with other existing designs,which is very friendly to resource-constrained devices. 展开更多
关键词 CRYSTALS-Kyber Learning with errors(LWE) Post-quantum cryptography(PQC) Application specific integrated circuit(ASIC) Field-programmable gate array(FPGA)
原文传递
The interference range of the spatial outage capacity in bipolar wireless networks
20
作者 Min Ouyang Tong Wang +3 位作者 Pei Xiao Jiyi Wu Shan Gao Liwei Chen 《Journal of Information and Intelligence》 2025年第4期345-360,共16页
Interference range plays a critical role in wireless network performance,significantly impacting both link reliability and resource utilization.This paper studies the interference range associated with the spatial out... Interference range plays a critical role in wireless network performance,significantly impacting both link reliability and resource utilization.This paper studies the interference range associated with the spatial outage capacity(SOC),which is the maximum density of reliable links of bipolar networks.We establish a recursive equation based on the transmitter's active probability,estab-lishing a link between the interference range and the SOC.The analytical results are then verified through numerical and network simulations.The experimental results indicate that the interfer-ence range may improve the SOC of Poisson bipolar networks while deteriorating the SOC of Poisson cellular networks and random distance bipolar networks. 展开更多
关键词 Interference range Spatial outage capacity Bipolar networks Stochastic geometry
原文传递
上一页 1 2 5 下一页 到第
使用帮助 返回顶部