期刊文献+
共找到44,213篇文章
< 1 2 250 >
每页显示 20 50 100
OFDMA-Based Unsourced Random Access in LEO Satellite Internet of Things
1
作者 Jiaqi Fang Gangle Sun +2 位作者 Wenjin Wang Li You Rui Ding 《China Communications》 SCIE CSCD 2024年第1期13-23,共11页
This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform plana... This paper investigates the low earth orbit(LEO)satellite-enabled coded compressed sensing(CCS)unsourced random access(URA)in orthogonal frequency division multiple access(OFDMA)framework,where a massive uniform planar array(UPA)is equipped on the satellite.In LEO satellite communications,unavoidable timing and frequency offsets cause phase shifts in the transmitted signals,substantially diminishing the decoding performance of current terrestrial CCS URA receiver.To cope with this issue,we expand the inner codebook with predefined timing and frequency offsets and formulate the inner decoding as a tractable compressed sensing(CS)problem.Additionally,we leverage the inherent sparsity of the UPA-equipped LEO satellite angular domain channels,thereby enabling the outer decoder to support more active devices.Furthermore,the outputs of the outer decoder are used to reduce the search space of the inner decoder,which cuts down the computational complexity and accelerates the convergence of the inner decoding.Simulation results verify the effectiveness of the proposed scheme. 展开更多
关键词 LEO ofdma SATELLITE unsourced random access UPA
下载PDF
智能反射面辅助OFDMA云接入网的资源分配方法
2
作者 程麒 张昱 彭宏 《小型微型计算机系统》 CSCD 北大核心 2024年第4期943-950,共8页
本文研究了智能反射面(IRS)辅助OFDMA(Orthogonal Frequency Division Multiple Access,正交频分多址接入)云无线接入网(C-RAN)的下行链路传输系统,其中基带处理单元(BBU)池通过多个远端射频头(RRH)与多个用户进行通信.RRH到用户的接入... 本文研究了智能反射面(IRS)辅助OFDMA(Orthogonal Frequency Division Multiple Access,正交频分多址接入)云无线接入网(C-RAN)的下行链路传输系统,其中基带处理单元(BBU)池通过多个远端射频头(RRH)与多个用户进行通信.RRH到用户的接入链路采用OFDMA接入技术.对于BBU池到RRH,采用无线前传链路,并且部署多个IRS以增强链路传输能力.在BBU池和每个RRH发射功率约束下,本文提出通过联合优化前传链路和接入链路资源配置使下行用户和速率最大化.由于该资源配置问题是非凸的,首先采用连续凸逼近(SCA)对目标以及约束条件进行转换.其次,将转换后的问题拆分成三个子问题来交替性求解.最后,计算机仿真结果显示了所提出的联合资源分配方法与其他基准方案相比具有显著的传输性能增益. 展开更多
关键词 云无线接入网 正交频分多址接入 无线前传链路 智能反射面 资源配置
下载PDF
A Blockchain-Based Access Control Scheme for Reputation Value Attributes of the Internet of Things 被引量:1
3
作者 Hongliang Tian Junyuan Tian 《Computers, Materials & Continua》 SCIE EI 2024年第1期1297-1310,共14页
The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access cont... The Internet of Things(IoT)access controlmechanism may encounter security issues such as single point of failure and data tampering.To address these issues,a blockchain-based IoT reputation value attribute access control scheme is proposed.Firstly,writing the reputation value as an attribute into the access control policy,and then deploying the access control policy in the smart contract of the blockchain system can enable the system to provide more fine-grained access control;Secondly,storing a large amount of resources fromthe Internet of Things in Inter Planetary File System(IPFS)to improve system throughput;Finally,map resource access operations to qualification tokens to improve the performance of the access control system.Complete simulation experiments based on the Hyperledger Fabric platform.Fromthe simulation experimental results,it can be seen that the access control system can achieve more fine-grained and dynamic access control while maintaining high throughput and low time delay,providing sufficient reliability and security for access control of IoT devices. 展开更多
关键词 Blockchain IOT access control Hyperledger Fabric
下载PDF
混合NOMA/OFDMA可见光通信系统资源分配算法 被引量:1
4
作者 沈媛 郭心悦 《光通信技术》 北大核心 2024年第2期24-29,共6页
为了进一步降低混合非正交多址/正交频分复用多址(NOMA/OFDMA)技术的多用户多小区可见光通信系统的误码率,提出了一种功率和子载波的联合分配算法。该算法以最小化系统误符号率为优化目标,实现了子小区间载波和用户功率的联合最优分配... 为了进一步降低混合非正交多址/正交频分复用多址(NOMA/OFDMA)技术的多用户多小区可见光通信系统的误码率,提出了一种功率和子载波的联合分配算法。该算法以最小化系统误符号率为优化目标,实现了子小区间载波和用户功率的联合最优分配。首先,理论推导出系统的误符号率表达式;然后,使用Matlab软件进行仿真,模拟可见光通信系统模型,并借助遗传算法得到最优的分配结果;最后,将该算法与现有的算法进行了对比。仿真结果表明,所提算法的误符号率性能更优。 展开更多
关键词 可见光通信 非正交多址 正交频分复用多址 资源分配
下载PDF
Mapping and measuring urban-rural inequalities in accessibility to social infrastructures 被引量:1
5
作者 Chenmeng Guo Weiqi Zhou +1 位作者 Chuanbao Jing Dawa Zhaxi 《Geography and Sustainability》 CSCD 2024年第1期41-51,共11页
Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social inf... Equal access to social infrastructures is a fundamental prerequisite for sustainable development,but has long been a great challenge worldwide.Previous studies have primarily focused on the accessibility to social infras-tructures in urban areas across various scales,with less attention to rural areas,where inequality can be more severe.Particularly,few have investigated the disparities of accessibility to social infrastructures between urban and rural areas.Here,using the Changsha-Zhuzhou-Xiangtan urban agglomeration,China,as an example,we investigated the inequality of accessibility in both urban and rural areas,and further compared the urban-rural difference.Accessibility was measured by travel time of residents to infrastructures.We selected four types of social infrastructures including supermarkets,bus stops,primary schools,and health care,which were funda-mentally important to both urban and rural residents.We found large disparities in accessibility between urban and rural areas,ranging from 20 min to 2 h.Rural residents had to spend one to two more hours to bus stops than urban residents,and 20 min more to the other three types of infrastructures.Furthermore,accessibility to multiple infrastructures showed greater urban-rural differences.Rural residents in more than half of the towns had no access to any infrastructure within 15 min,while more than 60%of the urban residents could access to all infrastructures within 15 min.Our results revealed quantitative accessibility gap between urban and rural areas and underscored the necessity of social infrastructures planning to address such disparities. 展开更多
关键词 accessIBILITY Social infrastructures Urban-rural difference INEQUALITY Regional sustainability
下载PDF
The impact of Internet access on household dietary quality:Evidence from rural China 被引量:1
6
作者 Yi Cui Qiran Zhao +1 位作者 Thomas Glauben Wei Si 《Journal of Integrative Agriculture》 SCIE CAS CSCD 2024年第2期374-383,共10页
Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access sig... Over the past few decades,the Internet has rapidly diffused across China.The spread of the Internet has had a profound economic and social impact on Chinese rural areas.Existing research shows that Internet access significantly impacts agricultural production and improves smallholder farmers’income.Beyond these,the Internet can affect other dimensions of social welfare.However,research about the impact of Internet access on dietary quality in rural China remains scarce.This study utilizes multi-period panel data from Fixed Observation Point in rural China from 2009 to 2015 to estimate the impact of Internet access on dietary quality and food consumption of rural households and conducts a causal analysis.Regression models with time and household fixed effects allow robust estimation while reducing potential issues of unobserved heterogeneity.The estimates show that Internet access has significantly increased rural household dietary quality(measured by the Chinese Diet Balance Index).Further research finds that Internet access has increased the consumption of animal products,such as aquatic and dairy products.We also examine the underlying mechanisms.Internet access improves dietary quality and food consumption mainly through increasing household income and food expenditure.These results encourage the promotion of Internet access as a valuable tool for nutritional improvements,especially in rural areas. 展开更多
关键词 dietary quality fixed effect model Internet access rural China
下载PDF
Detection of Turbulence Anomalies Using a Symbolic Classifier Algorithm in Airborne Quick Access Record(QAR)Data Analysis 被引量:1
7
作者 Zibo ZHUANG Kunyun LIN +1 位作者 Hongying ZHANG Pak-Wai CHAN 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第7期1438-1449,共12页
As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The ... As the risks associated with air turbulence are intensified by climate change and the growth of the aviation industry,it has become imperative to monitor and mitigate these threats to ensure civil aviation safety.The eddy dissipation rate(EDR)has been established as the standard metric for quantifying turbulence in civil aviation.This study aims to explore a universally applicable symbolic classification approach based on genetic programming to detect turbulence anomalies using quick access recorder(QAR)data.The detection of atmospheric turbulence is approached as an anomaly detection problem.Comparative evaluations demonstrate that this approach performs on par with direct EDR calculation methods in identifying turbulence events.Moreover,comparisons with alternative machine learning techniques indicate that the proposed technique is the optimal methodology currently available.In summary,the use of symbolic classification via genetic programming enables accurate turbulence detection from QAR data,comparable to that with established EDR approaches and surpassing that achieved with machine learning algorithms.This finding highlights the potential of integrating symbolic classifiers into turbulence monitoring systems to enhance civil aviation safety amidst rising environmental and operational hazards. 展开更多
关键词 turbulence detection symbolic classifier quick access recorder data
下载PDF
Modeling and Analysis of OFDMA-NOMA-RA Protocol Considering Imperfect SIC in Multi-User Uplink WLANs
8
作者 Hailing Yang Suoping Li Duo Peng 《Computers, Materials & Continua》 SCIE EI 2024年第6期5273-5294,共22页
To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios,this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal... To address the problems of network congestion and spectrum resources shortage in multi-user large-scale scenarios,this paper proposes a twice random access OFDMA-NOMA-RA protocol combining the advantages of orthogonal frequency division multiple access(OFDMA)and non-orthogonal multiple access(NOMA).The idea of this protocol is that OFMDA is used to divide the entire frequency field into multiple orthogonal resource units(RUs),and NOMA is used on each RU to enable more users to access the channel and improve spectrum efficiency.Based on the protocol designed in this paper,in the case of imperfect successive interference cancellation(SIC),the probability of successful competition subchannels and the outage probability are derived for two scenarios:Users occupy the subchannel individually and users share the subchannel.Moreover,when two users share the channel,the decoding order of the users and the corresponding probabilities are considered.Then,the system throughput is obtained.To achieve better outage performance in the system,the optimal power allocation algorithm is proposed in this paper,which enables the optimal power allocation strategy to be obtained.Numerical results show that the larger the imperfect SIC coefficient,the worse the outage performance of weak users.Compared with pure OFDMA and NOMA,OFDMA-NOMA-RA always maintains an advantage when the imperfect SIC coefficient is less than a specific value. 展开更多
关键词 Orthogonal frequency division multiple access(ofdma) non-orthogonal multiple access(NOMA) random access(RA) imperfect successive interference cancellation(Imperfect SIC) outage probability
下载PDF
Access数据库技术及其应用研究 被引量:1
9
作者 侯培杰 《信息与电脑》 2024年第3期149-151,共3页
文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于... 文章主要研究Access数据库技术及其应用,首先介绍Access数据库技术的理论基础,包括数据库结构、数据库安全性、数据库存储空间,然后探讨Access数据库技术的应用方法,包括数据存储和管理、报表生成和打印、数据库设计和开发等,最后对基于Access数据库的实例应用进行分析,展示Access数据库在提高工作效率、优化数据管理和增强决策能力等方面的作用。 展开更多
关键词 access 数据库技术 应用
下载PDF
基于BOPPPS模型和思维导图的Access数据库课程教学设计
10
作者 于惠雯 赵艺洁 《集成电路应用》 2024年第1期82-83,共2页
阐述BOPPPS模式和思维导图开展Access数据库课程教学设计,分析BOPPPS模型和思维导图的特点,探讨Access数据库课程教学设计中的应用,包括课堂引入、课程目标、参与式学习、考试评估。
关键词 思维导图 access数据库 课程设计 BOPPPS模型
下载PDF
Power-Domain Collision-Tolerant Random Access Method with Auxiliary Beam for Satellite Internet of Things:A New Solution
11
作者 Xu Yuanyuan Liu Ziwei +1 位作者 Bian Dongming Zhang Gengxin 《China Communications》 SCIE CSCD 2024年第8期236-248,共13页
There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The re... There are numerous terminals in the satellite Internet of Things(IoT).To save cost and reduce power consumption,the system needs terminals to catch the characteristics of low power consumption and light control.The regular random access(RA)protocols may generate large amounts of collisions,which degrade the system throughout severally.The near-far effect and power control technologies are not applicable in capture effect to obtain power difference,resulting in the collisions that cannot be separated.In fact,the optimal design at the receiving end can also realize the condition of packet power domain separation,but there are few relevant researches.In this paper,an auxiliary beamforming scheme is proposed for power domain signal separation.It adds an auxiliary reception beam based on the conventional beam,utilizing the correlation of packets in time-frequency domain between the main and auxiliary beam to complete signal separation.The roll-off belt of auxiliary beam is used to create the carrier-to-noise ratio(CNR)difference.This paper uses the genetic algorithm to optimize the auxiliary beam direction.Simulation results show that the proposed scheme outperforms slotted ALOHA(SA)in terms of system throughput per-formance and without bringing terminals additional control burden. 展开更多
关键词 beamforming non-orthogonal multiple access random access satellite Internet of Things
下载PDF
The Extended Hybrid Carrier-Based Multiple Access Technology for High Mobility Scenarios 被引量:1
12
作者 Ge Song Xiaojie Fang Xuejun Sha 《China Communications》 SCIE CSCD 2024年第1期53-68,共16页
The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communicatio... The hybrid carrier(HC)system rooted in the carrier fusion concept is gradually garnering attention.In this paper,we study the extended hybrid carrier(EHC)multiple access scheme to ensure reliable wireless communication.By employing the EHC modulation,a power layered multiplexing framework is realized,which exhibits enhanced interference suppression capability owing to the more uniform energy distribution design.The implementation method and advantage mechanism are explicated respectively for the uplink and downlink,and the performance analysis under varying channel conditions is provided.In addition,considering the connectivity demand,we explore the non-orthogonal multiple access(NOMA)method of the EHC system and develop the EHC sparse code multiple access scheme.The proposed scheme melds the energy spread superiority of EHC with the access capacity of NOMA,facilitating superior support for massive connectivity in high mobility environments.Simulation results have verified the feasibility and advantages of the proposed scheme.Compared with existing HC multiple access schemes,the proposed scheme exhibits robust bit error rate performance and can better guarantee multiple access performance in complex scenarios of nextgeneration communications. 展开更多
关键词 extended hybrid carrier system high mo-Received:Jun.09 2023 Revised:Nov.20 2023 Editor:Yuanwei Liu bility communications multiple access
下载PDF
Which Neighborhoods Have Easier Access to Online Home Delivery Services?A Spatiotemporal Accessibility Analysis in Nanjing,China
13
作者 KONG Yu ZHEN Feng +1 位作者 ZHANG Shanqi SHEN Lizhen 《Chinese Geographical Science》 SCIE CSCD 2024年第4期722-738,共17页
The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about ... The rise in online home delivery services(OHDS)has had a significant impact on how urban services are supplied and used in recent years.Studies on the spatial accessibility of OHDS are emerging,but few is known about the temporal dimension of OHDS accessibility as well as the geographic and socioeconomic differences in the spatiotemporal accessibility of OHDS.This study measures the spatiotemporal accessibility of four types of OHDS,namely leisure,fresh and convenient,medical,and catering services.The geographic and socioeconomic disparities in the spatiotemporal accessibility of these four types of OHDS are then identified using spatial statistical methods and the Kruskal-Wallis test(K-W test).The case study in Nanjing,China,suggests that:1)spatiotemporal accessibility better reflects the temporal variation of OHDS accessibility and avoids overestimation of OHDS accessibility when only considering its spatial dimension.2)The spatiotemporal accessibility of OHDS varies geographically and socioeconomically.Neighborhoods located in the main city or neighborhoods with higher housing prices,higher population density,and higher point of interest(POI)mix have better OHDS spatiotemporal accessibility.Our study contributes to the understanding of OHDS accessibility from a spatiotemporal perspective,and the empirical insights can assist policymakers in creating intervention plans that take into account variations in OHDS spatiotemporal accessibility. 展开更多
关键词 online home delivery services(OHDS) spatiotemporal accessibility neighborhoods accessibility differences Nanjing City China
下载PDF
6G New Multiple Access Technology
14
作者 Yifei Yuan Yongpeng Wu +3 位作者 Lei Wang Zhifeng Yuan Wei Bai Yuanwei Liu 《China Communications》 SCIE CSCD 2024年第1期I0002-I0005,共4页
As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generatio... As a basic technology at physical layer of mobile communications,non-orthogonal multiple access has been attracting wide attention across the academia and the industry.During the standardization of the fifth-generation(5G)of mobile communications,3GPP conducted preliminary study on non-orthogonal multiple access without reaching the consensus to standardize the technology. 展开更多
关键词 TECHNOLOGY access attracting
下载PDF
Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment
15
作者 Aljuaid Turkea Ayedh M Ainuddin Wahid Abdul Wahab Mohd Yamani Idna Idris 《Computers, Materials & Continua》 SCIE EI 2024年第9期4663-4686,共24页
Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control sy... Organizations are adopting the Bring Your Own Device(BYOD)concept to enhance productivity and reduce expenses.However,this trend introduces security challenges,such as unauthorized access.Traditional access control systems,such as Attribute-Based Access Control(ABAC)and Role-Based Access Control(RBAC),are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources.This paper proposes a method for enforcing access decisions that is adaptable and dynamic,based on multilayer hybrid deep learning techniques,particularly the Tabular Deep Neural Network Tabular DNN method.This technique transforms all input attributes in an access request into a binary classification(allow or deny)using multiple layers,ensuring accurate and efficient access decision-making.The proposed solution was evaluated using the Kaggle Amazon access control policy dataset and demonstrated its effectiveness by achieving a 94%accuracy rate.Additionally,the proposed solution enhances the implementation of access decisions based on a variety of resource and user attributes while ensuring privacy through indirect communication with the Policy Administration Point(PAP).This solution significantly improves the flexibility of access control systems,making themmore dynamic and adaptable to the evolving needs ofmodern organizations.Furthermore,it offers a scalable approach to manage the complexities associated with the BYOD environment,providing a robust framework for secure and efficient access management. 展开更多
关键词 BYOD security access control access control decision-enforcement deep learning neural network techniques TabularDNN MULTILAYER dynamic adaptable FLEXIBILITY bottlenecks performance policy conflict
下载PDF
Cross-Domain Bilateral Access Control on Blockchain-Cloud Based Data Trading System
16
作者 Youngho Park Su Jin Shin Sang Uk Shin 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第10期671-688,共18页
Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly... Data trading enables data owners and data requesters to sell and purchase data.With the emergence of blockchain technology,research on blockchain-based data trading systems is receiving a lot of attention.Particularly,to reduce the on-chain storage cost,a novel paradigm of blockchain and cloud fusion has been widely considered as a promising data trading platform.Moreover,the fact that data can be used for commercial purposes will encourage users and organizations from various fields to participate in the data marketplace.In the data marketplace,it is a challenge how to trade the data securely outsourced to the external cloud in a way that restricts access to the data only to authorized users across multiple domains.In this paper,we propose a cross-domain bilateral access control protocol for blockchain-cloud based data trading systems.We consider a system model that consists of domain authorities,data senders,data receivers,a blockchain layer,and a cloud provider.The proposed protocol enables access control and source identification of the outsourced data by leveraging identity-based cryptographic techniques.In the proposed protocol,the outsourced data of the sender is encrypted under the target receiver’s identity,and the cloud provider performs policy-match verification on the authorization tags of the sender and receiver generated by the identity-based signature scheme.Therefore,data trading can be achieved only if the identities of the data sender and receiver simultaneously meet the policies specified by each other.To demonstrate efficiency,we evaluate the performance of the proposed protocol and compare it with existing studies. 展开更多
关键词 Bilateral access control blockchain data sharing policy-match
下载PDF
Big Data Access Control Mechanism Based on Two-Layer Permission Decision Structure
17
作者 Aodi Liu Na Wang +3 位作者 Xuehui Du Dibin Shan Xiangyu Wu Wenjuan Wang 《Computers, Materials & Continua》 SCIE EI 2024年第4期1705-1726,共22页
Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policy... Big data resources are characterized by large scale, wide sources, and strong dynamics. Existing access controlmechanisms based on manual policy formulation by security experts suffer from drawbacks such as low policymanagement efficiency and difficulty in accurately describing the access control policy. To overcome theseproblems, this paper proposes a big data access control mechanism based on a two-layer permission decisionstructure. This mechanism extends the attribute-based access control (ABAC) model. Business attributes areintroduced in the ABAC model as business constraints between entities. The proposed mechanism implementsa two-layer permission decision structure composed of the inherent attributes of access control entities and thebusiness attributes, which constitute the general permission decision algorithm based on logical calculation andthe business permission decision algorithm based on a bi-directional long short-term memory (BiLSTM) neuralnetwork, respectively. The general permission decision algorithm is used to implement accurate policy decisions,while the business permission decision algorithm implements fuzzy decisions based on the business constraints.The BiLSTM neural network is used to calculate the similarity of the business attributes to realize intelligent,adaptive, and efficient access control permission decisions. Through the two-layer permission decision structure,the complex and diverse big data access control management requirements can be satisfied by considering thesecurity and availability of resources. Experimental results show that the proposed mechanism is effective andreliable. In summary, it can efficiently support the secure sharing of big data resources. 展开更多
关键词 Big data access control data security BiLSTM
下载PDF
Scenario Modeling-Aided AP Placement Optimization Method for Indoor Localization and Network Access
18
作者 Pan Hao Chen Yu +1 位作者 Qi Xiaogang Liu Meili 《China Communications》 SCIE CSCD 2024年第3期37-50,共14页
Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)sig... Owing to the ubiquity of wireless networks and the popularity of WiFi infrastructures,received signal strength(RSS)-based indoor localization systems have received much attention.The placement of access points(APs)significantly influences localization accuracy and network access.However,the indoor scenario and network access are not fully considered in previous AP placement optimization methods.This study proposes a practical scenario modelingaided AP placement optimization method for improving localization accuracy and network access.In order to reduce the gap between simulation-based and field measurement-based AP placement optimization methods,we introduce an indoor scenario modeling and Gaussian process-based RSS prediction method.After that,the localization and network access metrics are implemented in the multiple objective particle swarm optimization(MOPSO)solution,Pareto front criterion and virtual repulsion force are applied to determine the optimal AP placement.Finally,field experiments demonstrate the effectiveness of the proposed indoor scenario modeling method and RSS prediction model.A thorough comparison confirms the localization and network access improvement attributed to the proposed anchor placement method. 展开更多
关键词 indoor localization MOPSO network access RSS prediction
下载PDF
Al-modified yolk-shell silica particle-supported NiMo catalysts for ultradeep hydrodesulfurization of dibenzothiophene and 4,6-dimethyldibenzothiophene:Efficient accessibility of active sites and suitable acidity
19
作者 Ke Yu Wei-Min Kong +3 位作者 Zhen Zhao Ai-Jun Duan Lian Kong Xi-Long Wang 《Petroleum Science》 SCIE EI CAS CSCD 2024年第1期654-666,共13页
Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proporti... Yolk-shell SiO2 particles(YP)with center-radial meso-channels were fabricated through a simple and effective method.Al-containing YP-supported NiMo catalysts with different Al amounts(NiMo/AYP-x,x=Si/Al molar proportion)were prepared and dibenzothiophene(DBT)and 4,6-dimethyl-dibenzothiophene(4,6-DMDBT)were employed as the probes to evaluate the hydrodesulfurization(HDS)catalytic performance.The as-prepared AYP-x carriers and corresponding catalysts were characterized by some advanced characterizations to obtain deeper correlations between physicochemical properties and the HDS performance.The average pore sizes of series AYP-x supports are above 6.0 nm,which favors the mass transfer of organic sulfides.The cavity between the yolk and the shell is beneficial for the enrichment of S-containing compounds and the accessibility between reactants and active metals.Aluminum embedded into the silica framework could facilitate the formation of Lewis(L)and Brønsted(B)acid sites and adjust the metal-support interaction(MSI).Among all the as-synthesized catalysts,NiMo/AYP-20 catalyst shows the highest HDS activities.The improved HDS activity of NiMo/AYP-20 catalyst is attributed to the perfect combination of excellent structural properties of the yolk-shell mesoporous silica,enhanced acidity,moderate MSI,and good accessibility/dispersion of active components. 展开更多
关键词 Al-containing yolk-shell silica particles accessIBILITY ACIDITY Metal-support interaction Hydrodesulfurization
下载PDF
Blockchain-Enabled Privacy Protection and Access Control Scheme Towards Sensitive Digital Assets Management
20
作者 Duan Pengfei Ma Zhaofeng +2 位作者 Zhang Yuqing Wang Jingyu Luo Shoushan 《China Communications》 SCIE CSCD 2024年第7期224-236,共13页
With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,howeve... With the growth of requirements for data sharing,a novel business model of digital assets trading has emerged that allows data owners to sell their data for monetary gain.In the distributed ledger of blockchain,however,the privacy of stakeholder's identity and the confidentiality of data content are threatened.Therefore,we proposed a blockchainenabled privacy-preserving and access control scheme to address the above problems.First,the multi-channel mechanism is introduced to provide the privacy protection of distributed ledger inside the channel and achieve coarse-grained access control to digital assets.Then,we use multi-authority attribute-based encryption(MAABE)algorithm to build a fine-grained access control model for data trading in a single channel and describe its instantiation in detail.Security analysis shows that the scheme has IND-CPA secure and can provide privacy protection and collusion resistance.Compared with other schemes,our solution has better performance in privacy protection and access control.The evaluation results demonstrate its effectiveness and practicability. 展开更多
关键词 access control data trading MAABE multi-channel privacy preserving
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部