Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC...Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.展开更多
An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the ...An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.展开更多
RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In s...RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In simulation analysis,RLS and the LMS blind adaptive multi-user detector were designed and tested for synchronous and asynchronous multi-user communication process.The results of SIR comparison and MMSE comparison show that,both of the two methods can realize blind adaptive detection when any user change in multi-user communication,during this process,the training communication sequences are not needed.The RLS algorithm has about 5 dB higher in SIR compared with LMS algorithm,and the convergence velocity of RLS algorithm is also higher than LMS algorithm when the communication users change.RLS algorithm has better ability in multi-user detection than that of LMS algorithm,and it has great attraction and guiding significance for solving the problem of multiple access interference(MAI) in multi-user communication.展开更多
Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework ...Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.展开更多
The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the...The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network systems.In this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two stages.The first stage estimates the channel parameters,and the second performsmulti-user detection.The proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural networks.This study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO receivers.The FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate.展开更多
To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural ...To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.展开更多
A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it ha...A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it has a higher computational complexity but better performance.展开更多
In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially a...In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.展开更多
Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processi...Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processing is still an openquestion. In this work, we investigate the multi-user detection problem based on thebinary coherent-state signals whose communication way is supposed to be seen as aquantum channel. A binary phase shift keying model of this multi-access channel isstudied and a novel method of quantum detection proposed according to the conclusionof the quantum measurement theory. As a result, the average interference betweendeferent users is presented and the average error probability of the quantum detection isderived theoretically. Finally, we show the maximum channel capacity of this effectivedetection for a two-access quantum channel.展开更多
Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection sch...Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection schemes with weighting factors for unsourced multiple access. First, we introduce bidirectional weighting factors in the extrinsic information passing process between the multi-user detector based on belief propagation (BP) and the LDPC decoder. Second, we incorporate bidirectional weighting factors in the message passing process between the MAC nodes and the user variable nodes in BP- based multi-user detector. The proposed schemes select the optimal weighting factors through simulations. The simulation results demonstrate that the proposed schemes exhibit significant performance improvements in terms of block error rate (BLER) compared to traditional schemes. .展开更多
Spatial modulation(SM) is a class of novel multiple-input multiple-output(MIMO) techniques toward future wireless communications,which activates only one transmit antenna in each time slot,so as to reduce the number o...Spatial modulation(SM) is a class of novel multiple-input multiple-output(MIMO) techniques toward future wireless communications,which activates only one transmit antenna in each time slot,so as to reduce the number of RF chains for saving the implement cost.Meanwhile,considering its application in 5G systems with multiple users,the detection of multi-user spatial modulation has drawn greater attention.In this paper,a pair of efficient detectors are proposed for multi-user spatial modulation.Specially,a threshold-aided approximate message passing(T-AMP) detector is proposed with the purpose of reducing the computational complexity of traditional structured approximate message passing(Str-AMP) detector.In addition,a novel probability sorting aided approximate message passing detector,called probability-ranking-aided AMP detector(P-AMP),is also proposed with the purpose of improving the performance.Simulation results show that the proposed T-AMP detector is able to achieve similar performance as traditional StrAMP with lower complexity,while the proposed P-AMP detector exhibits a better symbol error rate(SER) performance with similar complexity.展开更多
Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clona...Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clonal selection algorithm, to solve the multi-user detection problem in code-division multipleaccess communications system based on the maximum-likelihood decision rule. Through proportional cloning, hypermutation, clonal selection and clonal death, the new method performs a greedy search which reproduces individuals and selects their improved maturated progenies after the affinity maturation process. Theoretical analysis indicates that the clonal selection algorithm is suitable for solving the multi-user detection problem. Computer simulations show that the proposed approach outperforms some other approaches including two genetic algorithm-based detectors and the matched filters detector, and has the ability to find the most likely combinations.展开更多
Three-layer Adaptive Back-Propagation Neural Networks(TABPNN) are employed for the demodulation of spread spectrum signals in a multiple-access environment. A configuration employing three-layer adaptive Back-propagat...Three-layer Adaptive Back-Propagation Neural Networks(TABPNN) are employed for the demodulation of spread spectrum signals in a multiple-access environment. A configuration employing three-layer adaptive Back-propagation neural networks is put forward for the demodulation of spread-spectrum signals in asynchronous Gaussian channels. The theoretical arguments and practical performance based on the neural networks are analyzed. The results show that whether the resistance to the multiple access interference or the robust to near-far effects, the proposed detector significantly outperforms not only the conventional detector but also the BP neural networks detector and is comparable to the optimum detector.展开更多
To restrain the interference of co-channel users using space-time block coding (STBC), the proposed Gaussian-forcing soft decision multi-user detection (GFSDMUD) algorithm is applied in fiat-fading channels by usi...To restrain the interference of co-channel users using space-time block coding (STBC), the proposed Gaussian-forcing soft decision multi-user detection (GFSDMUD) algorithm is applied in fiat-fading channels by using the relation among the users' signals, which can enhance the capacity by introducing co-channel users. During iterations, extrinsic information is calculated and exchanged between a soft multi-user detector and a bank of turbo decoders to achieve refined estimates of the users' signals. The simulations show that the proposed iterative receiver techniques provide significant performance improvement around 2 dB over conventional noniterative methods. Furthermore, iterative multi-user space-time processing techniques offer substantial performance gains around 8 dB by adding the number of receiver antennas from 4 to 6, and the system performance can be enhanced by using this strategy in multi-user STBC systems, which is very important for enlarging the system capacity.展开更多
In recent years,the number of patientswith colon disease has increased significantly.Colon polyps are the precursor lesions of colon cancer.If not diagnosed in time,they can easily develop into colon cancer,posing a s...In recent years,the number of patientswith colon disease has increased significantly.Colon polyps are the precursor lesions of colon cancer.If not diagnosed in time,they can easily develop into colon cancer,posing a serious threat to patients’lives and health.A colonoscopy is an important means of detecting colon polyps.However,in polyp imaging,due to the large differences and diverse types of polyps in size,shape,color,etc.,traditional detection methods face the problem of high false positive rates,which creates problems for doctors during the diagnosis process.In order to improve the accuracy and efficiency of colon polyp detection,this question proposes a network model suitable for colon polyp detection(PD-YOLO).This method introduces the self-attention mechanism CBAM(Convolutional Block Attention Module)in the backbone layer based on YOLOv7,allowing themodel to adaptively focus on key information and ignore the unimportant parts.To help themodel do a better job of polyp localization and bounding box regression,add the SPD-Conv(Symmetric Positive Definite Convolution)module to the neck layer and use deconvolution instead of upsampling.Theexperimental results indicate that the PD-YOLO algorithm demonstrates strong robustness in colon polyp detection.Compared to the original YOLOv7,on the Kvasir-SEG dataset,PD-YOLO has shown an increase of 5.44 percentage points in AP@0.5,showcasing significant advantages over other mainstream methods.展开更多
To maintain the reliability of power systems,routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues.The increasing resolution of drone-cap...To maintain the reliability of power systems,routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues.The increasing resolution of drone-captured images has posed a challenge for traditional target detection methods,especially in identifying small objects in high-resolution images.This study presents an enhanced object detection algorithm based on the Faster Regionbased Convolutional Neural Network(Faster R-CNN)framework,specifically tailored for detecting small-scale electrical components like insulators,shock hammers,and screws in transmission line.The algorithm features an improved backbone network for Faster R-CNN,which significantly boosts the feature extraction network’s ability to detect fine details.The Region Proposal Network is optimized using a method of guided feature refinement(GFR),which achieves a balance between accuracy and speed.The incorporation of Generalized Intersection over Union(GIOU)and Region of Interest(ROI)Align further refines themodel’s accuracy.Experimental results demonstrate a notable improvement in mean Average Precision,reaching 89.3%,an 11.1%increase compared to the standard Faster R-CNN.This highlights the effectiveness of the proposed algorithm in identifying electrical components in high-resolution aerial images.展开更多
With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed...With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.展开更多
The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charg...The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure.展开更多
Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource surveys.It is crucial in enabling autonomous underwater robot operations ...Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource surveys.It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration.Nevertheless,low imaging quality,harsh underwater environments,and obscured objects considerably increase the difficulty of detecting underwater targets,making it difficult for current detection methods to achieve optimal performance.In order to enhance underwater object perception and improve target detection precision,we propose a lightweight underwater target detection method using You Only Look Once(YOLO)v8 with multi-scale cross-channel attention(MSCCA),named YOLOv8-UOD.In the proposed multiscale cross-channel attention module,multi-scale attention(MSA)augments the variety of attentional perception by extracting information from innately diverse sensory fields.The cross-channel strategy utilizes RepVGGbased channel shuffling(RCS)and one-shot aggregation(OSA)to rearrange feature map channels according to specific rules.It aggregates all features only once in the final feature mapping,resulting in the extraction of more comprehensive and valuable feature information.The experimental results show that the proposed YOLOv8-UOD achieves a mAP50 of 95.67%and FLOPs of 23.8 G on the Underwater Robot Picking Contest 2017(URPC2017)dataset,outperforming other methods in terms of detection precision and computational cost-efficiency.展开更多
Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhance...Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods.展开更多
基金supported by the National Natural Science Foundation of China(6104000561001126+5 种基金61271262)the China Postdoctoral Science Foundation Funded Project(201104916382012T50789)the Natural Science Foundation of Shannxi Province of China(2011JQ8036)the Special Fund for Basic Scientific Research of Central Colleges (CHD2012ZD005)the Research Fund of Zhejiang University of Technology(20100244)
文摘Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values.
基金Sponsored by the National"863"Program Projects (2007AA012293)
文摘An improved wavelet packet domain least mean square (IWPD-LMS) based adaptive muhiuser detection algorithm is proposed. The algorithm employs the wavelet packet transform to rewhiten the input data, and chooses the best wavelet packet basis according to a novel convergence contribution function rather than the conventional Shannon entropy. The theoretic analyses show that the inadequacy of the eigenvalue spread of the tap-input correlation matrix is ameliorated, thus the convergence performance is improved greatly. The simulation result of convergence performance and bit error rate(BER) performance as a function of the signal power to noise power ratio(SNR) are presented finally to prove the validity of the proposed algorithm.
基金financially supported by Key Technologies R&D Program of Shandong Province(2015GSF115018)Natural Science Foundation of Shandong Province(ZR2013FL027+1 种基金ZR2013DM 014)Youth Foundation of Shandong Academy of Science(2013QN030)
文摘RLS and LMS blind adaptive multi-user detection algorithm and multi-user detector was proposed to solve the problem of multi-user signal detection problem encountered in underwater acoustic communication networks.In simulation analysis,RLS and the LMS blind adaptive multi-user detector were designed and tested for synchronous and asynchronous multi-user communication process.The results of SIR comparison and MMSE comparison show that,both of the two methods can realize blind adaptive detection when any user change in multi-user communication,during this process,the training communication sequences are not needed.The RLS algorithm has about 5 dB higher in SIR compared with LMS algorithm,and the convergence velocity of RLS algorithm is also higher than LMS algorithm when the communication users change.RLS algorithm has better ability in multi-user detection than that of LMS algorithm,and it has great attraction and guiding significance for solving the problem of multiple access interference(MAI) in multi-user communication.
文摘Multi-user detection (MUD) based on multirate transmission in code division multiple access (CDMA) system is discussed. Under the requirement of signal interference ratio (SIR) detection at base station and framework with parallel interference cancellation, a supervision decision algorithm based on pre-decision of probabilistic data association (PDA) and hard decision is proposed. The detection performance is analyzed and simulation is implemented to show that the supervision decision algorithm improves the detection performance effectively.
文摘The numbers of multimedia applications and their users increase with each passing day.Different multi-carrier systems have been developed along with varying techniques of space-time coding to address the demand of the future generation of network systems.In this article,a fuzzy logic empowered adaptive backpropagation neural network(FLeABPNN)algorithm is proposed for joint channel and multi-user detection(CMD).FLeABPNN has two stages.The first stage estimates the channel parameters,and the second performsmulti-user detection.The proposed approach capitalizes on a neuro-fuzzy hybrid systemthat combines the competencies of both fuzzy logic and neural networks.This study analyzes the results of using FLeABPNN based on a multiple-input andmultiple-output(MIMO)receiver with conventional partial oppositemutant particle swarmoptimization(POMPSO),total-OMPSO(TOMPSO),fuzzy logic empowered POMPSO(FL-POMPSO),and FL-TOMPSO-based MIMO receivers.The FLeABPNN-based receiver renders better results than other techniques in terms of minimum mean square error,minimum mean channel error,and bit error rate.
文摘To improve the computational speed, the ROLS-AWS algorithm was employed in the RBF based MUD receiver. The radial basis function was introduced into the multi-user detection (MUD) firstly. Then a three-layer neural network demodulation spread-spectrum signal model in the synchronous Gauss channel was given and the multi-user detection receiver was analyzed intensively. Simulations by computer illustrate that the proposed RBF based MUD receiver employing the ROKS-AWS algorithm is better than conventional detectors and common BP neural network based MUD receivers on suppressing multiple access interference and near-far resistance.
文摘A graph model is constructed for the Multi-user Detection of DS-CDMA system. Based on it, a Hopfield-like algorithm is put forward for the implementation of optimum receiver. Compared with the Hopfield approach, it has a higher computational complexity but better performance.
基金Supported by the National Natural Science Foundation of China(No.62001001)。
文摘In the uplink grant-free non-orthogonal multiple access(NOMA)scenario,since the active user at the sender has a structured sparsity transmission characteristic,the compressive sensing recovery algorithm is initially applied to the joint detection of the active user and the transmitted data.However,the existing compressed sensing recovery algorithms with unknown sparsity often require noise power or signal-to-noise ratio(SNR)as the priori conditions,which greatly reduces the algorithm adaptability in multi-user detection.Therefore,an algorithm based on cross validation aided structured sparsity adaptive orthogonal matching pursuit(CVA-SSAOMP)is proposed to realize multi-user detection in dynamic change communication scenario of channel state information(CSI).The proposed algorithm transforms the structured sparsity model into a block sparse model,and without the priori conditions above,the cross validation method in the field of statistics and machine learning is used to adaptively estimate the sparsity of active user through the residual update of cross validation.The simulation results show that,compared with the traditional orthogonal matching pursuit(OMP)algorithm,subspace pursuit(SP)algorithm and cross validation aided block sparsity adaptive subspace pursuit(CVA-BSASP)algorithm,the proposed algorithm can effectively improve the accurate estimation of the sparsity of active user and the performance of system bit error ratio(BER),and has the advantage of low-complexity.
基金Supported by the National Natural Science Foundation of Chinaunder Grant Nos. 61501247, 61373131 and 61702277the Six Talent Peaks Project ofJiangsu Province (Grant No. 2015-XXRJ-013)+2 种基金Natural Science Foundation of JiangsuProvince (Grant No. BK20171458)the Natural Science Foundation of the HigherEducation Institutions of Jiangsu Province (China under Grant No. 16KJB520030)theNUIST Research Foundation for Talented Scholars under Grant Nos. 2015r014, PAPDand CICAEET funds.
文摘Multi-user detection is one of the important technical problems for moderncommunications. In the field of quantum communication, the multi-access channel onwhich we apply the technology of quantum information processing is still an openquestion. In this work, we investigate the multi-user detection problem based on thebinary coherent-state signals whose communication way is supposed to be seen as aquantum channel. A binary phase shift keying model of this multi-access channel isstudied and a novel method of quantum detection proposed according to the conclusionof the quantum measurement theory. As a result, the average interference betweendeferent users is presented and the average error probability of the quantum detection isderived theoretically. Finally, we show the maximum channel capacity of this effectivedetection for a two-access quantum channel.
文摘Multi-user detection techniques are currently being studied as highly promising technologies for improving the performance of unsourced multiple access systems. In this paper, we propose joint multi-user detection schemes with weighting factors for unsourced multiple access. First, we introduce bidirectional weighting factors in the extrinsic information passing process between the multi-user detector based on belief propagation (BP) and the LDPC decoder. Second, we incorporate bidirectional weighting factors in the message passing process between the MAC nodes and the user variable nodes in BP- based multi-user detector. The proposed schemes select the optimal weighting factors through simulations. The simulation results demonstrate that the proposed schemes exhibit significant performance improvements in terms of block error rate (BLER) compared to traditional schemes. .
基金The financial support is gratefully acknowledged by the National Science Foundation of China under Grant numbers 61471090the Open Research Fund of National Mobile Communications Research Laboratory,Southeast University(No.2015D09)+1 种基金the Foundation Project of Science and Technology on Electronic Information Control Laboratory under Grant JS17041403811(201606071370-004001)the Foundation Project of National Key Lab.of Sci.and Tech.on Comm.under Grant 6142102010702
文摘Spatial modulation(SM) is a class of novel multiple-input multiple-output(MIMO) techniques toward future wireless communications,which activates only one transmit antenna in each time slot,so as to reduce the number of RF chains for saving the implement cost.Meanwhile,considering its application in 5G systems with multiple users,the detection of multi-user spatial modulation has drawn greater attention.In this paper,a pair of efficient detectors are proposed for multi-user spatial modulation.Specially,a threshold-aided approximate message passing(T-AMP) detector is proposed with the purpose of reducing the computational complexity of traditional structured approximate message passing(Str-AMP) detector.In addition,a novel probability sorting aided approximate message passing detector,called probability-ranking-aided AMP detector(P-AMP),is also proposed with the purpose of improving the performance.Simulation results show that the proposed T-AMP detector is able to achieve similar performance as traditional StrAMP with lower complexity,while the proposed P-AMP detector exhibits a better symbol error rate(SER) performance with similar complexity.
基金Supported by the National Natural Science Foundation of China (Grant Nos. 60703107, 60703108)the National High-Tech Research & Develop-ment Program of China (Grant No. 2009AA12Z210)+1 种基金the Program for New Century Excellent Talents in University (Grant No. NCET-08-0811)the Program for Cheung Kong Scholars and Innovative Research Team in University (Grant No. IRT-06-45)
文摘Artificial immune systems (AIS) are a kind of new computational intelligence methods which draw inspiration from the human immune system. In this study, we introduce an AIS-based optimization algorithm, called clonal selection algorithm, to solve the multi-user detection problem in code-division multipleaccess communications system based on the maximum-likelihood decision rule. Through proportional cloning, hypermutation, clonal selection and clonal death, the new method performs a greedy search which reproduces individuals and selects their improved maturated progenies after the affinity maturation process. Theoretical analysis indicates that the clonal selection algorithm is suitable for solving the multi-user detection problem. Computer simulations show that the proposed approach outperforms some other approaches including two genetic algorithm-based detectors and the matched filters detector, and has the ability to find the most likely combinations.
文摘Three-layer Adaptive Back-Propagation Neural Networks(TABPNN) are employed for the demodulation of spread spectrum signals in a multiple-access environment. A configuration employing three-layer adaptive Back-propagation neural networks is put forward for the demodulation of spread-spectrum signals in asynchronous Gaussian channels. The theoretical arguments and practical performance based on the neural networks are analyzed. The results show that whether the resistance to the multiple access interference or the robust to near-far effects, the proposed detector significantly outperforms not only the conventional detector but also the BP neural networks detector and is comparable to the optimum detector.
文摘To restrain the interference of co-channel users using space-time block coding (STBC), the proposed Gaussian-forcing soft decision multi-user detection (GFSDMUD) algorithm is applied in fiat-fading channels by using the relation among the users' signals, which can enhance the capacity by introducing co-channel users. During iterations, extrinsic information is calculated and exchanged between a soft multi-user detector and a bank of turbo decoders to achieve refined estimates of the users' signals. The simulations show that the proposed iterative receiver techniques provide significant performance improvement around 2 dB over conventional noniterative methods. Furthermore, iterative multi-user space-time processing techniques offer substantial performance gains around 8 dB by adding the number of receiver antennas from 4 to 6, and the system performance can be enhanced by using this strategy in multi-user STBC systems, which is very important for enlarging the system capacity.
基金funded by the Undergraduate Higher Education Teaching and Research Project(No.FBJY20230216)Research Projects of Putian University(No.2023043)the Education Department of the Fujian Province Project(No.JAT220300).
文摘In recent years,the number of patientswith colon disease has increased significantly.Colon polyps are the precursor lesions of colon cancer.If not diagnosed in time,they can easily develop into colon cancer,posing a serious threat to patients’lives and health.A colonoscopy is an important means of detecting colon polyps.However,in polyp imaging,due to the large differences and diverse types of polyps in size,shape,color,etc.,traditional detection methods face the problem of high false positive rates,which creates problems for doctors during the diagnosis process.In order to improve the accuracy and efficiency of colon polyp detection,this question proposes a network model suitable for colon polyp detection(PD-YOLO).This method introduces the self-attention mechanism CBAM(Convolutional Block Attention Module)in the backbone layer based on YOLOv7,allowing themodel to adaptively focus on key information and ignore the unimportant parts.To help themodel do a better job of polyp localization and bounding box regression,add the SPD-Conv(Symmetric Positive Definite Convolution)module to the neck layer and use deconvolution instead of upsampling.Theexperimental results indicate that the PD-YOLO algorithm demonstrates strong robustness in colon polyp detection.Compared to the original YOLOv7,on the Kvasir-SEG dataset,PD-YOLO has shown an increase of 5.44 percentage points in AP@0.5,showcasing significant advantages over other mainstream methods.
基金supported by the Shanghai Science and Technology Innovation Action Plan High-Tech Field Project(Grant No.22511100601)for the year 2022 and Technology Development Fund for People’s Livelihood Research(Research on Transmission Line Deep Foundation Pit Environmental Situation Awareness System Based on Multi-Source Data).
文摘To maintain the reliability of power systems,routine inspections using drones equipped with advanced object detection algorithms are essential for preempting power-related issues.The increasing resolution of drone-captured images has posed a challenge for traditional target detection methods,especially in identifying small objects in high-resolution images.This study presents an enhanced object detection algorithm based on the Faster Regionbased Convolutional Neural Network(Faster R-CNN)framework,specifically tailored for detecting small-scale electrical components like insulators,shock hammers,and screws in transmission line.The algorithm features an improved backbone network for Faster R-CNN,which significantly boosts the feature extraction network’s ability to detect fine details.The Region Proposal Network is optimized using a method of guided feature refinement(GFR),which achieves a balance between accuracy and speed.The incorporation of Generalized Intersection over Union(GIOU)and Region of Interest(ROI)Align further refines themodel’s accuracy.Experimental results demonstrate a notable improvement in mean Average Precision,reaching 89.3%,an 11.1%increase compared to the standard Faster R-CNN.This highlights the effectiveness of the proposed algorithm in identifying electrical components in high-resolution aerial images.
基金supported by the National Fund Cultivation Project from China People’s Police University(Grant Number:JJPY202402)National Natural Science Foundation of China(Grant Number:62172165).
文摘With the rapid advancement of visual generative models such as Generative Adversarial Networks(GANs)and stable Diffusion,the creation of highly realistic Deepfake through automated forgery has significantly progressed.This paper examines the advancements inDeepfake detection and defense technologies,emphasizing the shift from passive detection methods to proactive digital watermarking techniques.Passive detection methods,which involve extracting features from images or videos to identify forgeries,encounter challenges such as poor performance against unknown manipulation techniques and susceptibility to counter-forensic tactics.In contrast,proactive digital watermarking techniques embed specificmarkers into images or videos,facilitating real-time detection and traceability,thereby providing a preemptive defense againstDeepfake content.We offer a comprehensive analysis of digitalwatermarking-based forensic techniques,discussing their advantages over passivemethods and highlighting four key benefits:real-time detection,embedded defense,resistance to tampering,and provision of legal evidence.Additionally,the paper identifies gaps in the literature concerning proactive forensic techniques and suggests future research directions,including cross-domain watermarking and adaptive watermarking strategies.By systematically classifying and comparing existing techniques,this review aims to contribute valuable insights for the development of more effective proactive defense strategies in Deepfake forensics.
基金supported by Jiangsu Provincial Science and Technology Project,grant number J2023124.Jing Guo received this grant,the URLs of sponsors’website is https://kxjst.jiangsu.gov.cn/(accessed on 06 June 2024).
文摘The rapid proliferation of electric vehicle(EV)charging infrastructure introduces critical cybersecurity vulnerabilities to power grids system.This study presents an innovative anomaly detection framework for EV charging stations,addressing the unique challenges posed by third-party aggregation platforms.Our approach integrates node equations-based on the parameter identification with a novel deep learning model,xDeepCIN,to detect abnormal data reporting indicative of aggregation attacks.We employ a graph-theoretic approach to model EV charging networks and utilize Markov Chain Monte Carlo techniques for accurate parameter estimation.The xDeepCIN model,incorporating a Compressed Interaction Network,has the ability to capture complex feature interactions in sparse,high-dimensional charging data.Experimental results on both proprietary and public datasets demonstrate significant improvements in anomaly detection performance,with F1-scores increasing by up to 32.3%for specific anomaly types compared to traditional methods,such as wide&deep and DeepFM(Factorization-Machine).Our framework exhibits robust scalability,effectively handling networks ranging from 8 to 85 charging points.Furthermore,we achieve real-time monitoring capabilities,with parameter identification completing within seconds for networks up to 1000 nodes.This research contributes to enhancing the security and reliability of renewable energy systems against evolving cyber threats,offering a comprehensive solution for safeguarding the rapidly expanding EV charging infrastructure.
基金supported in part by the National Natural Science Foundation of China Grants 62402085,61972062,62306060the Liaoning Doctoral Research Start-Up Fund 2023-BS-078+1 种基金the Dalian Youth Science and Technology Star Project 2023RQ023the Liaoning Basic Research Project 2023JH2/101300191.
文摘Underwater target detection is extensively applied in domains such as underwater search and rescue,environmental monitoring,and marine resource surveys.It is crucial in enabling autonomous underwater robot operations and promoting ocean exploration.Nevertheless,low imaging quality,harsh underwater environments,and obscured objects considerably increase the difficulty of detecting underwater targets,making it difficult for current detection methods to achieve optimal performance.In order to enhance underwater object perception and improve target detection precision,we propose a lightweight underwater target detection method using You Only Look Once(YOLO)v8 with multi-scale cross-channel attention(MSCCA),named YOLOv8-UOD.In the proposed multiscale cross-channel attention module,multi-scale attention(MSA)augments the variety of attentional perception by extracting information from innately diverse sensory fields.The cross-channel strategy utilizes RepVGGbased channel shuffling(RCS)and one-shot aggregation(OSA)to rearrange feature map channels according to specific rules.It aggregates all features only once in the final feature mapping,resulting in the extraction of more comprehensive and valuable feature information.The experimental results show that the proposed YOLOv8-UOD achieves a mAP50 of 95.67%and FLOPs of 23.8 G on the Underwater Robot Picking Contest 2017(URPC2017)dataset,outperforming other methods in terms of detection precision and computational cost-efficiency.
文摘Software-defined networking(SDN)is an innovative paradigm that separates the control and data planes,introducing centralized network control.SDN is increasingly being adopted by Carrier Grade networks,offering enhanced networkmanagement capabilities than those of traditional networks.However,because SDN is designed to ensure high-level service availability,it faces additional challenges.One of themost critical challenges is ensuring efficient detection and recovery from link failures in the data plane.Such failures can significantly impact network performance and lead to service outages,making resiliency a key concern for the effective adoption of SDN.Since the recovery process is intrinsically dependent on timely failure detection,this research surveys and analyzes the current literature on both failure detection and recovery approaches in SDN.The survey provides a critical comparison of existing failure detection techniques,highlighting their advantages and disadvantages.Additionally,it examines the current failure recovery methods,categorized as either restoration-based or protection-based,and offers a comprehensive comparison of their strengths and limitations.Lastly,future research challenges and directions are discussed to address the shortcomings of existing failure recovery methods.