期刊文献+
共找到26篇文章
< 1 2 >
每页显示 20 50 100
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems
1
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
下载PDF
A Power Data Anomaly Detection Model Based on Deep Learning with Adaptive Feature Fusion
2
作者 Xiu Liu Liang Gu +3 位作者 Xin Gong Long An Xurui Gao Juying Wu 《Computers, Materials & Continua》 SCIE EI 2024年第6期4045-4061,共17页
With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve suffi... With the popularisation of intelligent power,power devices have different shapes,numbers and specifications.This means that the power data has distributional variability,the model learning process cannot achieve sufficient extraction of data features,which seriously affects the accuracy and performance of anomaly detection.Therefore,this paper proposes a deep learning-based anomaly detection model for power data,which integrates a data alignment enhancement technique based on random sampling and an adaptive feature fusion method leveraging dimension reduction.Aiming at the distribution variability of power data,this paper developed a sliding window-based data adjustment method for this model,which solves the problem of high-dimensional feature noise and low-dimensional missing data.To address the problem of insufficient feature fusion,an adaptive feature fusion method based on feature dimension reduction and dictionary learning is proposed to improve the anomaly data detection accuracy of the model.In order to verify the effectiveness of the proposed method,we conducted effectiveness comparisons through elimination experiments.The experimental results show that compared with the traditional anomaly detection methods,the method proposed in this paper not only has an advantage in model accuracy,but also reduces the amount of parameter calculation of the model in the process of feature matching and improves the detection speed. 展开更多
关键词 data alignment dimension reduction feature fusion data anomaly detection deep learning
下载PDF
Detecting Climate Change in Using Extreme Data from Two Surface Weather Stations: Case Study Valle of Comitan and La Esperanza, Chiapas, Mexico
3
作者 Martín Mundo-Molina Eber A. Godinez-Gutiérrez +1 位作者 José Luis Pérez-Díaz Daniel Hernández-Cruz 《Journal of Water Resource and Protection》 2021年第12期1061-1075,共15页
The study area is located between the cities of Comitan (16&deg;10'43"N and 92&deg;04'20''W) a city with 150,000 inhabitants and La Esperanza (16&deg;9'15''N and 91&deg... The study area is located between the cities of Comitan (16&deg;10'43"N and 92&deg;04'20''W) a city with 150,000 inhabitants and La Esperanza (16&deg;9'15''N and 91&deg;52'5''W) a town with 3000 inhabitants. Both weather stations are 30 km from each other in the Chiapas State, México. 54 years of daily records of the series of maximum (<em>t</em><sub>max</sub>) and minimum temperatures (<em>t</em><sub>min</sub>) of the weather station 07205 Comitan that is on top of a house and 30 years of daily records of the weather station 07374 La Esperanza were analyzed. The objective is to analyze the evidence of climate change in the Comitan valley. 2.07% and 19.04% of missing data were filled, respectively, with the WS method. In order to verify homogeneity three methods were used: Standard Normal Homogeneity Test (SNHT), the Von Neumann method and the Buishand method. The heterogeneous series were homogenized using climatol. The trends of <em>t</em><sub>max</sub> and <em>t</em><sub>min</sub> for both weather stations were analyzed by simple linear regression, Sperman’s rho and Mann-Kendall tests. The Mann-Kendal test method confirmed the warming trend at the Comitan station for both variables with <em>Z<sub>MK</sub></em> statistic values equal to 1.57 (statistically not significant) and 4.64 (statistically significant). However, for the Esperanza station, it determined a cooling trend for tmin and a slight non-significant warming for <em>t</em><sub>max</sub> with a <em>Z</em><sub><em>MK</em></sub> statistic of -2.27 (statistically significant) and 1.16 (statistically not significant), for a significance level <em>α</em> = 0.05. 展开更多
关键词 detecting Climate Change in Using Extreme data from Two Surface Weather Stations: Case Study Valle of Comitan and La Esperanza CHIAPAS Mexico
下载PDF
ADS-B Anomaly Data Detection Model Based on Deep Learning and Difference of Gaussian Approach 被引量:6
4
作者 WANG Ershen SONG Yuanshang +5 位作者 XU Song GUO Jing HONG Chen QU Pingping PANG Tao ZHANG Jiantong 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第4期550-561,共12页
Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for position... Due to the influence of terrain structure,meteorological conditions and various factors,there are anomalous data in automatic dependent surveillance-broadcast(ADS-B)message.The ADS-B equipment can be used for positioning of general aviation aircraft.Aim to acquire the accurate position information of aircraft and detect anomaly data,the ADS-B anomaly data detection model based on deep learning and difference of Gaussian(DoG)approach is proposed.First,according to the characteristic of ADS-B data,the ADS-B position data are transformed into the coordinate system.And the origin of the coordinate system is set up as the take-off point.Then,based on the kinematic principle,the ADS-B anomaly data can be removed.Moreover,the details of the ADS-B position data can be got by the DoG approach.Finally,the long short-term memory(LSTM)neural network is used to optimize the recurrent neural network(RNN)with severe gradient reduction for processing ADS-B data.The position data of ADS-B are reconstructed by the sequence to sequence(seq2seq)model which is composed of LSTM neural network,and the reconstruction error is used to detect the anomalous data.Based on the real flight data of general aviation aircraft,the simulation results show that the anomaly data can be detected effectively by the proposed method of reconstructing ADS-B data with the seq2seq model,and its running time is reduced.Compared with the RNN,the accuracy of anomaly detection is increased by 2.7%.The performance of the proposed model is better than that of the traditional anomaly detection models. 展开更多
关键词 general aviation aircraft automatic dependent surveillance-broadcast(ADS-B) anomaly data detection deep learning difference of Gaussian(DoG) long short-term memory(LSTM)
下载PDF
Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator 被引量:1
5
作者 Kamayani Shrivastav R.P.Yadav K.C.Jain 《Digital Communications and Networks》 SCIE CSCD 2021年第1期55-61,共7页
This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Fr... This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori(MAP)algorithm for channel estimation and data detection in the presence of Phase Noise(PHN)in iterative Orthogonal Frequency Division Multiplexing(OFDM)receivers used for high speed and high spectral efficient wireless communication systems.The MAP cost function for joint estimation and detection is derived and optimized further with the proposed cyclic gradient descent optimization algorithm.The proposed joint estimation and detection algorithm relaxes the restriction of small PHN assumptions and utilizes the prior statistical knowledge of PHN spectral components to produce a statistically optimal solution.The frequency-domain estimation of Channel Transfer Function(CTF)in frequency selective fading makes the method simpler,compared with the estimation of Channel Impulse Response(CIR)in the time domain.Two different time-varying PHN models,produced by Free Running Oscillator(FRO)and Phase-Locked Loop(PLL)oscillator,are presented and compared for performance difference with proposed OFDM receiver.Simulation results for joint MAP channel estimation are compared with Cramer-Rao Lower Bound(CRLB),and the simulation results for joint MAP data detection are compared with“NO PHN"performance to demonstrate that the proposed joint MAP estimation and detection algorithm achieve near-optimum performance even under multipath channel fading. 展开更多
关键词 Orthogonal frequency division multiplexing Phase noise Free running oscillator Phase-locked loop oscillator Maximum a posteriori Channel estimation data detection
下载PDF
LMMSE-based SAGE channel estimation and data detection joint algorithm for MIMO-OFDM system 被引量:1
6
作者 申京 Wu Muqing 《High Technology Letters》 EI CAS 2012年第2期195-201,共7页
A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE... A new channel estimation and data detection joint algorithm is proposed for multi-input multi-output (MIMO) - orthogonal frequency division multiplexing (OFDM) system using linear minimum mean square error (LMMSE)- based space-alternating generalized expectation-maximization (SAGE) algorithm. In the proposed algorithm, every sub-frame of the MIMO-OFDM system is divided into some OFDM sub-blocks and the LMMSE-based SAGE algorithm in each sub-block is used. At the head of each sub-flame, we insert training symbols which are used in the initial estimation at the beginning. Channel estimation of the previous sub-block is applied to the initial estimation in the current sub-block by the maximum-likelihood (ML) detection to update channel estimatjon and data detection by iteration until converge. Then all the sub-blocks can be finished in turn. Simulation results show that the proposed algorithm can improve the bit error rate (BER) performance. 展开更多
关键词 multi-input multi-output (MIMO) orthogonal frequency division multiplexing (OFDM) linear minimum mean square error (LMMSE) space-alternating generalized expectation-maximization (SAGE) ITERATION channel estimation data detection joint algorithm.
下载PDF
An Intelligent Early Warning Method of Press-Assembly Quality Based on Outlier Data Detection and Linear Regression
7
作者 XUE Shanliang LI Chen 《Transactions of Nanjing University of Aeronautics and Astronautics》 EI CSCD 2020年第4期597-606,共10页
Focusing on controlling the press-assembly quality of high-precision servo mechanism,an intelligent early warning method based on outlier data detection and linear regression is proposed.Linear regression is used to d... Focusing on controlling the press-assembly quality of high-precision servo mechanism,an intelligent early warning method based on outlier data detection and linear regression is proposed.Linear regression is used to deal with the relationship between assembly quality and press-assembly process,then the mathematical model of displacement-force in press-assembly process is established and a qualified press-assembly force range is defined for assembly quality control.To preprocess the raw dataset of displacement-force in the press-assembly process,an improved local outlier factor based on area density and P weight(LAOPW)is designed to eliminate the outliers which will result in inaccuracy of the mathematical model.A weighted distance based on information entropy is used to measure distance,and the reachable distance is replaced with P weight.Experiments show that the detection efficiency of the algorithm is improved by 5.6 ms compared with the traditional local outlier factor(LOF)algorithm,and the detection accuracy is improved by about 2%compared with the local outlier factor based on area density(LAOF)algorithm.The application of LAOPW algorithm and the linear regression model shows that it can effectively carry out intelligent early warning of press-assembly quality of high precision servo mechanism. 展开更多
关键词 quality early warning outlier data detection linear regression local outlier factor based on area density and P weight(LAOPW) information entropy P weight
下载PDF
On Accurate Detection of Oceanic Features from Satellite IR Data Using ICSED Method
8
作者 李俊 周风仙 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 1992年第3期373-382,共10页
ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the ... ICSED (Improved Cluster Shade Edge Detection) algorithm and other various methods to accurately and efficiently detect edges on satellite data are presented. Error rate criterion is used to statistically evaluate the performances of these methods in detecting oceanic features for both noise free and noise contaminated AVHRR (Advanced Very High Resolution Radiometer) IR image with Kuroshio. Also, practical experiments in detecting the eddy of Kuroshio with these methods are carried out for comparison. Results show that the ICSED algorithm has more advantages than other methods in detecting mesoscale features of ocean. Finally, the effectiveness of window size of ICSED method to oceanic features detection is quantitatively discussed. 展开更多
关键词 On Accurate Detection of Oceanic Features from Satellite IR data Using ICSED Method IR
下载PDF
Developing a Secure Framework Using Feature Selection and Attack Detection Technique
9
作者 Mahima Dahiya Nitin Nitin 《Computers, Materials & Continua》 SCIE EI 2023年第2期4183-4201,共19页
Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior chara... Intrusion detection is critical to guaranteeing the safety of the data in the network.Even though,since Internet commerce has grown at a breakneck pace,network traffic kinds are rising daily,and network behavior characteristics are becoming increasingly complicated,posing significant hurdles to intrusion detection.The challenges in terms of false positives,false negatives,low detection accuracy,high running time,adversarial attacks,uncertain attacks,etc.lead to insecure Intrusion Detection System(IDS).To offset the existing challenge,the work has developed a secure Data Mining Intrusion detection system(DataMIDS)framework using Functional Perturbation(FP)feature selection and Bengio Nesterov Momentum-based Tuned Generative Adversarial Network(BNM-tGAN)attack detection technique.The data mining-based framework provides shallow learning of features and emphasizes feature engineering as well as selection.Initially,the IDS data are analyzed for missing values based on the Marginal Likelihood Fisher Information Matrix technique(MLFIMT)that identifies the relationship among the missing values and attack classes.Based on the analysis,the missing values are classified as Missing Completely at Random(MCAR),Missing at random(MAR),Missing Not at Random(MNAR),and handled according to the types.Thereafter,categorical features are handled followed by feature scaling using Absolute Median Division based Robust Scalar(AMDRS)and the Handling of the imbalanced dataset.The selection of relevant features is initiated using FP that uses‘3’Feature Selection(FS)techniques i.e.,Inverse Chi Square based Flamingo Search(ICS-FSO)wrapper method,Hyperparameter Tuned Threshold based Decision Tree(HpTT-DT)embedded method,and Xavier Normal Distribution based Relief(XavND-Relief)filter method.Finally,the selected features are trained and tested for detecting attacks using BNM-tGAN.The Experimental analysis demonstrates that the introduced DataMIDS framework produces an accurate diagnosis about the attack with low computation time.The work avoids false alarm rate of attacks and remains to be relatively robust against malicious attacks as compared to existing methods. 展开更多
关键词 Cyber security data mining intrusion detection system(dataMIDS) marginal likelihood fisher information matrix(MLFIM) absolute median deviation based robust scalar(AMD-RS) functional perturbation(FP) inverse chi square based flamingo search optimization(ICS-FSO) hyperparameter tuned threshold based decision tree(HpTT-DT) Xavier normal distribution based relief(XavND-relief) and Bengio Nesterov momentum-based tuned generative adversarial network(BNM-tGAN)
下载PDF
Iterative Dichotomiser Posteriori Method Based Service Attack Detection in Cloud Computing
10
作者 B.Dhiyanesh K.Karthick +1 位作者 R.Radha Anita Venaik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1099-1107,共9页
Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to acces... Cloud computing(CC)is an advanced technology that provides access to predictive resources and data sharing.The cloud environment represents the right type regarding cloud usage model ownership,size,and rights to access.It introduces the scope and nature of cloud computing.In recent times,all processes are fed into the system for which consumer data and cache size are required.One of the most security issues in the cloud environment is Distributed Denial of Ser-vice(DDoS)attacks,responsible for cloud server overloading.This proposed sys-tem ID3(Iterative Dichotomiser 3)Maximum Multifactor Dimensionality Posteriori Method(ID3-MMDP)is used to overcome the drawback and a rela-tively simple way to execute and for the detection of(DDoS)attack.First,the pro-posed ID3-MMDP method calls for the resources of the cloud platform and then implements the attack detection technology based on information entropy to detect DDoS attacks.Since because the entropy value can show the discrete or aggregated characteristics of the current data set,it can be used for the detection of abnormal dataflow,User-uploaded data,ID3-MMDP system checks and read risk measurement and processing,bug ratingfile size changes,orfile name changes and changes in the format design of the data size entropy value.Unique properties can be used whenever the program approaches any data error to detect abnormal data services.Finally,the experiment also verifies the DDoS attack detection capability algorithm. 展开更多
关键词 ID3(Iterative dichotomiser 3)maximum multifactor dimensionality posterior method(ID3-MMDP) distributed denial of service(DDoS)attacks detection of abnormal dataflow SK measurement and processing bug ratingfile size
下载PDF
Underground vibration signal detection and processing system based on LabWindows/CVI 被引量:1
11
作者 刘培珍 夏湖培 姚金杰 《Journal of Measurement Science and Instrumentation》 CAS CSCD 2015年第1期57-62,共6页
In order to detect and process underground vibration signal, this paper presents a system with the combination of software and hardware. The hardware part consists of sensor, memory chips, USB, etc. , which is respons... In order to detect and process underground vibration signal, this paper presents a system with the combination of software and hardware. The hardware part consists of sensor, memory chips, USB, etc. , which is responsible for capturing original signals from sensors. The software part is a virtual oscilloscope based on LabWindows/CVI (C vitual instrument), which not only has the functions of traditional oscilloscope but also can analyze and process vibration signals in special ways. The experimental results show that the designed system is stable, reliable and easy to be operated, which can meet practical requirements. 展开更多
关键词 virtual instrument data processing and detection vibration signal LABWINDOWS/CVI
下载PDF
Biomedical Event Extraction Using a New Error Detection Learning Approach Based on Neural Network 被引量:2
12
作者 Xiaolei Ma Yang Lu +2 位作者 Yinan Lu Zhili Pei Jichao Liu 《Computers, Materials & Continua》 SCIE EI 2020年第5期923-941,共19页
Supervised machine learning approaches are effective in text mining,but their success relies heavily on manually annotated corpora.However,there are limited numbers of annotated biomedical event corpora,and the availa... Supervised machine learning approaches are effective in text mining,but their success relies heavily on manually annotated corpora.However,there are limited numbers of annotated biomedical event corpora,and the available datasets contain insufficient examples for training classifiers;the common cure is to seek large amounts of training samples from unlabeled data,but such data sets often contain many mislabeled samples,which will degrade the performance of classifiers.Therefore,this study proposes a novel error data detection approach suitable for reducing noise in unlabeled biomedical event data.First,we construct the mislabeled dataset through error data analysis with the development dataset.The sample pairs’vector representations are then obtained by the means of sequence patterns and the joint model of convolutional neural network and long short-term memory recurrent neural network.Following this,the sample identification strategy is proposed,using error detection based on pair representation for unlabeled data.With the latter,the selected samples are added to enrich the training dataset and improve the classification performance.In the BioNLP Shared Task GENIA,the experiments results indicate that the proposed approach is competent in extract the biomedical event from biomedical literature.Our approach can effectively filter some noisy examples and build a satisfactory prediction model. 展开更多
关键词 Biomedical event extraction pair representation error data detection sample identification
下载PDF
Real and Fitted Spherical Indentations 被引量:2
13
作者 Gerd Kaupp 《Advances in Materials Physics and Chemistry》 2020年第10期207-229,共23页
Spherical indentations that rely on original date are analyzed with the physically correct mathematical formula and its integration that take into account the radius over depth changes upon penetration. Linear plots, ... Spherical indentations that rely on original date are analyzed with the physically correct mathematical formula and its integration that take into account the radius over depth changes upon penetration. Linear plots, phase-transition onsets, energies, and pressures are algebraically obtained for germanium, zinc-oxide and gallium-nitride. There are low pressure phase-transitions that correspond to, or are not resolved by hydrostatic anvil onset pressures. This enables the attribution of polymorph structures, by comparing with known structures from pulsed laser deposition or molecular beam epitaxy and twinning. The spherical indentation is the easiest way for the synthesis and further characterization of polymorphs, now available in pure form under diamond calotte and in contact with their corresponding less dense polymorph. The unprecedented results and new possibilities require loading curves from experimental data. These are now easily distinguished from data that are “fitted” to make them concur with widely used unphysical Johnson’s formula for spheres (“<span style="white-space:nowrap;"><em>P</em> = (4/3)<em>h</em><sup>3/2</sup><em>R</em><sup>1/2</sup><em>E</em><sup><span style="white-space:nowrap;">&#8727;</span></sup></span>”) not taking care of the <em>R/h</em> variation. Its challenge is indispensable, because its use involves “fitting equations” for making the data concur. These faked reports (no “experimental” data) provide dangerous false moduli and theories. The fitted spherical indentation reports with radii ranging from 4 to 250 μm are identified for PDMS, GaAs, Al, Si, SiC, MgO, and Steel. The detailed analysis reveals characteristic features. 展开更多
关键词 Spherical Indentations Correct Formula Phase-Transition Onset Pressure False Johnson Formula Detection of data Fittings
下载PDF
Detection of false data injection attacks on power systems using graph edge-conditioned convolutional networks 被引量:1
14
作者 Bairen Chen Q.H.Wu +1 位作者 Mengshi Li Kaishun Xiahou 《Protection and Control of Modern Power Systems》 SCIE EI 2023年第2期1-12,共12页
State estimation plays a vital role in the stable operation of modern power systems,but it is vulnerable to cyber attacks.False data injection attacks(FDIA),one of the most common cyber attacks,can tamper with measure... State estimation plays a vital role in the stable operation of modern power systems,but it is vulnerable to cyber attacks.False data injection attacks(FDIA),one of the most common cyber attacks,can tamper with measure-ment data and bypass the bad data detection(BDD)mechanism,leading to incorrect results of power system state estimation(PSSE).This paper presents a detection framework of FDIA for PSSE based on graph edge-conditioned convolutional networks(GECCN),which use topology information,node features and edge features.Through deep graph architecture,the correlation of sample data is effectively mined to establish the mapping relationship between the estimated values of measurements and the actual states of power systems.In addition,the edge-conditioned convolution operation allows processing data sets with different graph structures.Case studies are undertaken on the IEEE 14-bus system under different attack intensities and degrees to evaluate the performance of GECCN.Simulation results show that GECCN has better detection performance than convolutional neural networks,deep neural net-works and support vector machine.Moreover,the satisfactory detection performance obtained with the data sets of the IEEE 14-bus,30-bus and 118-bus systems verifies the effective scalability of GECCN. 展开更多
关键词 Power system state estimation(PSSE) Bad data detection(BDD) False data injection attacks(FDIA) Graph edge-conditioned convolutional networks(GECCN)
原文传递
A PILOT-ASSISTED NON-CYCLIC PREFIXED MIMO-SCFDE SYSTEM
15
作者 Ren Shubo Guo Junqi Xiang Haige 《Journal of Electronics(China)》 2009年第4期479-486,共8页
A non-Cyclic Prefixed Multiple-Input Multiple-Output Single-Carrier Frequency-Domain Equalization (non-CP MIMO-SCFDE) system based on a recursive algorithm of Joint Channel Es- timation and Data Detection (recursive-J... A non-Cyclic Prefixed Multiple-Input Multiple-Output Single-Carrier Frequency-Domain Equalization (non-CP MIMO-SCFDE) system based on a recursive algorithm of Joint Channel Es- timation and Data Detection (recursive-JCEDD) is proposed in this paper. Unlike the traditional CP MIMO-SCFDE system, the transmitted block of the proposed system is designed in the way that block-type pilot sequences and Single-Carrier (SC) information sequences have been arranged alter- nately without any cyclic prefix before each SC information sequence. Moreover, a recursive-JCEDD algorithm based on interference cancellation is proposed for the corresponding receivers. Simulation results show that the Bit Error Rate (BER) of the proposed system based on the recursive-JCEDD algorithm is lower than traditional CP MIMO-SCFDE or MIMO-OFDM with channel estimation for more than 0.5 dB. 展开更多
关键词 Non-Cyclic Prefixed Multiple-Input Multiple-Output Single-Carrier Frequency-Domain Equalization (non-CP MIMO-SCFDE) Recursive algorithm of Joint Channel Estimation and data Detection (recursive-JCEDD) Interference cancellation
下载PDF
Symbiotic Radio Systems:Detection and Performance Analysis
16
作者 CUI Ziqi WANG Gongpu +2 位作者 WANG Zhigang AI Bo XIAO Huahua 《ZTE Communications》 2022年第3期93-98,共6页
Symbiotic radio(SR)is an emerging green technology for the Internet of Things(IoT).One key challenge of the SR systems is to design efficient and low-complexity detectors,which is the focus of this paper.We first driv... Symbiotic radio(SR)is an emerging green technology for the Internet of Things(IoT).One key challenge of the SR systems is to design efficient and low-complexity detectors,which is the focus of this paper.We first drive the mathematical expression of the optimal maximum-likelihood(ML)detector,and then propose a suboptimal iterative detector with low complexity.Finally,we show through numerical results that our proposed detector can obtain near-optimal bit error rate(BER)performance at a low computational cost. 展开更多
关键词 bit error rate data detection Internet of Things symbiotic radio system wireless communication
下载PDF
A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention
17
作者 Alese Boniface Kayode Alowolodu Olufunso Dayo Adekunle Adewale Uthman 《Communications and Network》 2021年第2期68-78,共11页
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention ... With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews. 展开更多
关键词 Mobile Agent Distribution Model data Leakage Detection data Leakage Prevention DLP SECURITY Distributed Computing
下载PDF
Temporal-spatial dynamic characteristics of vehicle emissions on intercity roads in Guangdong Province based on vehicle identity detection data
18
作者 Hui Ding Yongming Zhao +2 位作者 Shenhua Miao Tong Chen Yonghong Liu 《Journal of Environmental Sciences》 SCIE EI CAS CSCD 2023年第8期126-138,共13页
Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics ... Estimating intercity vehicle emissions precisely would benefit collaborative control in multiple cities.Considering the variability of emissions caused by vehicles,roads,and traffic,the 24-hour change characteristics of air pollutants(CO,HC,NO_(X),PM_(2.5))on the intercity road network of Guangdong Province by vehicle categories and road links were revealed based on vehicle identity detection data in real-life traffic for each hour in July 2018.The results showed that the spatial diversity of emissions caused by the unbalanced economywas obvious.The vehicle emissions in the Pearl River Delta region(PRD)with a higher economic level were approximately 1–2 times those in the non-Pearl RiverDelta region(non-PRD).Provincial roads with high loads became potential sources of high emissions.Therefore,emission control policies must emphasize the PRD and key roads by travel guidance to achieve greater reduction.Gasoline passenger cars with a large proportion of traffic dominated morning and evening peaks in the 24-hour period and were the dominant contributors to CO and HC emissions,contributing more than 50%in the daytime(7:00–23:00)and higher than 26%at night(0:00–6:00).Diesel trucks made up 10%of traffic,but were the dominant player at night,contributed 50%–90%to NO_(X) and PM_(2.5) emissions,with amarked 24-hour change rule of more than 80%at night(23:00–5:00)and less than 60%during daytime.Therefore,targeted control measures by time-section should be set up on collaborative control.These findings provide time-varying decision support for variable vehicle emission control on a large scale. 展开更多
关键词 Intercity roads Dynamic vehicle emissions Vehicle identity detection data Diesel trucks
原文传递
Integration system research and development for three-dimensional laser scanning information visualization in goaf 被引量:1
19
作者 罗周全 黄俊杰 +2 位作者 罗贞焱 汪伟 秦亚光 《Transactions of Nonferrous Metals Society of China》 SCIE EI CAS CSCD 2016年第7期1985-1994,共10页
An integration processing system of three-dimensional laser scanning information visualization in goaf was developed. It is provided with multiple functions, such as laser scanning information management for goaf, clo... An integration processing system of three-dimensional laser scanning information visualization in goaf was developed. It is provided with multiple functions, such as laser scanning information management for goaf, cloud data de-noising optimization, construction, display and operation of three-dimensional model, model editing, profile generation, calculation of goaf volume and roof area, Boolean calculation among models and interaction with the third party soft ware. Concerning this system with a concise interface, plentiful data input/output interfaces, it is featured with high integration, simple and convenient operations of applications. According to practice, in addition to being well-adapted, this system is favorably reliable and stable. 展开更多
关键词 GOAF laser scanning visualization integration system 1 Introduction The goaf formed through underground mining of mineral resources is one of the main disaster sources threatening mine safety production [1 2]. Effective implementation of goaf detection and accurate acquisition of its spatial characteristics including the three-dimensional morphology the spatial position as well as the actual boundary and volume are important basis to analyze predict and control disasters caused by goaf. In recent years three-dimensional laser scanning technology has been effectively applied in goaf detection [3 4]. Large quantities of point cloud data that are acquired for goaf by means of the three-dimensional laser scanning system are processed relying on relevant engineering software to generate a three-dimensional model for goaf. Then a general modeling analysis and processing instrument are introduced to perform subsequent three-dimensional analysis and calculation [5 6]. Moreover related development is also carried out in fields such as three-dimensional detection and visualization of hazardous goaf detection and analysis of unstable failures in goaf extraction boundary acquisition in stope visualized computation of damage index aided design for pillar recovery and three-dimensional detection
下载PDF
Bad Data Detection Algorithm for PMU Based on Spectral Clustering 被引量:11
20
作者 Zhiwei Yang Hao Liu +1 位作者 Tianshu Bi Qixun Yang 《Journal of Modern Power Systems and Clean Energy》 SCIE EI CSCD 2020年第3期473-483,共11页
Phasor measurement units(PMUs) can provide real-time measurement data to construct the ubiquitous electric of the Internet of Things. However, due to complex factors on site, PMU data can be easily compromised by inte... Phasor measurement units(PMUs) can provide real-time measurement data to construct the ubiquitous electric of the Internet of Things. However, due to complex factors on site, PMU data can be easily compromised by interference or synchronization jitter. It will lead to various levels of PMU data quality issues, which can directly affect the PMU-based application and even threaten the safety of power systems. In order to improve the PMU data quality, a data-driven PMU bad data detection algorithm based on spectral clustering using single PMU data is proposed in this paper. The proposed algorithm does not require the system topology and parameters. Firstly, a data identification method based on a decision tree is proposed to distinguish event data and bad data by using the slope feature of each data. Then, a bad data detection method based on spectral clustering is developed. By analyzing the weighted relationships among all the data, this method can detect the bad data with a small deviation. Simulations and results of field recording data test illustrate that this data-driven method can achieve bad data identification and detection effectively. This technique can improve PMU data quality to guarantee its applications in the power systems. 展开更多
关键词 Phasor measurement units(PMUs) bad data detection event data identification decision tree spectral clustering
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部