期刊文献+
共找到37,893篇文章
< 1 2 250 >
每页显示 20 50 100
Communication Resource-Efficient Vehicle Platooning Control With Various Spacing Policies 被引量:2
1
作者 Xiaohua Ge Qing-Long Han +1 位作者 Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期362-376,共15页
Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical cha... Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical challenge in accomplishing automated vehicle platoons is to deal with the effects of intermittent and sporadic vehicle-to-vehicle data transmissions caused by limited wireless communication resources. This paper addresses the co-design problem of dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies. The central aim is to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements, while simultaneously improving communication efficiency. Toward this aim, a dynamic event-triggered scheduling mechanism is developed such that the intervehicle data transmissions are scheduled dynamically and efficiently over time. Then, a tractable co-design criterion on the existence of both the admissible event-driven cooperative adaptive cruise control law and the desired scheduling mechanism is derived. Finally, comparative simulation results are presented to substantiate the effectiveness and merits of the obtained results. 展开更多
关键词 Automated vehicles constant time headway spacing constant spacing cooperative adaptive cruise control event-triggered communication vehicle platooning
下载PDF
Distributed Nash Equilibrium Seeking Strategies Under Quantized Communication 被引量:1
2
作者 Maojiao Ye Qing-Long Han +2 位作者 Lei Ding Shengyuan Xu Guobiao Jia 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第1期103-112,共10页
This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achi... This paper is concerned with distributed Nash equi librium seeking strategies under quantized communication. In the proposed seeking strategy, a projection operator is synthesized with a gradient search method to achieve the optimization o players' objective functions while restricting their actions within required non-empty, convex and compact domains. In addition, a leader-following consensus protocol, in which quantized informa tion flows are utilized, is employed for information sharing among players. More specifically, logarithmic quantizers and uniform quantizers are investigated under both undirected and connected communication graphs and strongly connected digraphs, respec tively. Through Lyapunov stability analysis, it is shown that play ers' actions can be steered to a neighborhood of the Nash equilib rium with logarithmic and uniform quantizers, and the quanti fied convergence error depends on the parameter of the quan tizer for both undirected and directed cases. A numerical exam ple is given to verify the theoretical results. 展开更多
关键词 CONSENSUS distributed Nash equilibrium seeking projected gradient play quantized communication
下载PDF
Energy-efficient joint UAV secure communication and 3D trajectory optimization assisted by reconfigurable intelligent surfaces in the presence of eavesdroppers
3
作者 Huang Hailong Mohsen Eskandari +1 位作者 Andrey V.Savkin Wei Ni 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第1期537-543,共7页
We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reco... We consider a scenario where an unmanned aerial vehicle(UAV),a typical unmanned aerial system(UAS),transmits confidential data to a moving ground target in the presence of multiple eavesdroppers.Multiple friendly reconfigurable intelligent surfaces(RISs) help to secure the UAV-target communication and improve the energy efficiency of the UAV.We formulate an optimization problem to minimize the energy consumption of the UAV,subject to the mobility constraint of the UAV and that the achievable secrecy rate at the target is over a given threshold.We present an online planning method following the framework of model predictive control(MPC) to jointly optimize the motion of the UAV and the configurations of the RISs.The effectiveness of the proposed method is validated via computer simulations. 展开更多
关键词 Unmanned aerial systems(UASs) Unmanned aerial vehicle(UAV) communication security Eaves-dropping Reconfigurable intelligent surfaces(RIS) Autonomous navigation and placement Path planning Model predictive control
下载PDF
BDSec:Security Authentication Protocol for BeiDou-Ⅱ Civil Navigation Message
4
作者 Wu Zhijun Zhang Yuan +2 位作者 Yang Yiming Wang Peng Yue Meng 《China Communications》 SCIE CSCD 2024年第6期206-218,共13页
Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a s... Due to the lack of authentication mechanism in BeiDou navigation satellite system(BDS),BD-Ⅱ civil navigation message(BDⅡ-CNAV) are vulnerable to spoofing attack and replay attack.To solve this problem,we present a security authentication protocol,called as BDSec,which is designed by using China’s cryptography Shangyong Mima(SM) series algorithms,such as SM2/4/9 and Zu Chongzhi(ZUC)algorithm.In BDSec protocol,both of BDⅡ-CNAV and signature information are encrypted using the SM4 algorithm(Symmetric encryption mechanism).The encrypted result is used as the subject authentication information.BDSec protocol applies SM9 algorithm(Identity-based cryptography mechanism) to protect the integrity of the BDⅡ-CNAV,adopts the SM2 algorithm(Public key cryptosystem) to guarantee the confidentiality of the important session information,and uses the ZUC algorithm(Encryption and integrity algorithm) to verify the integrity of the message authentication serial number and initial information and the information in authentication initialization sub-protocol respectively.The results of the SVO logic reasoning and performance analysis show that BDSec protocol meets security requirements for the dual user identity authentication in BDS and can realize the security authentication of BDⅡ-CNAV. 展开更多
关键词 BDII civil navigation messages(BDIICNAV) BeiDou navigation satellite system(BDS) identity-based cryptography mechanism navigation message authentication protocol(BDSec)
下载PDF
Method of improving pedestrian navigation performance based on chest card
5
作者 CHENG Hao GAO Shuang +2 位作者 CAI Xiaowen WANG Yuxuan WANG Jie 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第4期987-998,共12页
With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.T... With the development of positioning technology,loca-tion services are constantly in demand by people.As a primary location service pedestrian navigation has two main approaches based on radio and inertial navigation.The pedestrian naviga-tion based on radio is subject to environmental occlusion lead-ing to the degradation of positioning accuracy.The pedestrian navigation based on micro-electro-mechanical system inertial measurement unit(MIMU)is less susceptible to environmental interference,but its errors dissipate over time.In this paper,a chest card pedestrian navigation improvement method based on complementary correction is proposed in order to suppress the error divergence of inertial navigation methods.To suppress atti-tude errors,optimal feedback coefficients are established by pedestrian motion characteristics.To extend navigation time and improve positioning accuracy,the step length in subsequent movements is compensated by the first step length.The experi-mental results show that the positioning accuracy of the pro-posed method is improved by more than 47%and 44%com-pared with the pure inertia-based method combined with step compensation and the traditional complementary filtering com-bined method with step compensation.The proposed method can effectively suppress the error dispersion and improve the positioning accuracy. 展开更多
关键词 pedestrian navigation micro-electro-mechanical sy-stem(MEMS) inertial navigation complementary filtering
下载PDF
Building Semantic Communication System via Molecules:An End-to-End Training Approach
6
作者 Cheng Yukun Chen Wei Ai Bo 《China Communications》 SCIE CSCD 2024年第7期113-124,共12页
The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aim... The concept of semantic communication provides a novel approach for applications in scenarios with limited communication resources.In this paper,we propose an end-to-end(E2E)semantic molecular communication system,aiming to enhance the efficiency of molecular communication systems by reducing the transmitted information.Specifically,following the joint source channel coding paradigm,the network is designed to encode the task-relevant information into the concentration of the information molecules,which is robust to the degradation of the molecular communication channel.Furthermore,we propose a channel network to enable the E2E learning over the non-differentiable molecular channel.Experimental results demonstrate the superior performance of the semantic molecular communication system over the conventional methods in classification tasks. 展开更多
关键词 deep learning end-to-end learning molecular communication semantic communication
下载PDF
Recent Developments in Authentication Schemes Used in Machine-Type Communication Devices in Machine-to-Machine Communication: Issues and Challenges
7
作者 Shafi Ullah Sibghat Ullah Bazai +9 位作者 Mohammad Imran Qazi Mudassar Ilyas Abid Mehmood Muhammad Asim Saleem Muhmmad Aasim Rafique Arsalan Haider Ilyas Khan Sajid Iqbal Yonis Gulzar Kauser Hameed 《Computers, Materials & Continua》 SCIE EI 2024年第4期93-115,共23页
Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) ... Machine-to-machine (M2M) communication plays a fundamental role in autonomous IoT (Internet of Things)-based infrastructure, a vital part of the fourth industrial revolution. Machine-type communication devices(MTCDs) regularly share extensive data without human intervention while making all types of decisions. Thesedecisions may involve controlling sensitive ventilation systems maintaining uniform temperature, live heartbeatmonitoring, and several different alert systems. Many of these devices simultaneously share data to form anautomated system. The data shared between machine-type communication devices (MTCDs) is prone to risk dueto limited computational power, internal memory, and energy capacity. Therefore, securing the data and devicesbecomes challenging due to factors such as dynamic operational environments, remoteness, harsh conditions,and areas where human physical access is difficult. One of the crucial parts of securing MTCDs and data isauthentication, where each devicemust be verified before data transmission. SeveralM2Mauthentication schemeshave been proposed in the literature, however, the literature lacks a comprehensive overview of current M2Mauthentication techniques and the challenges associated with them. To utilize a suitable authentication schemefor specific scenarios, it is important to understand the challenges associated with it. Therefore, this article fillsthis gap by reviewing the state-of-the-art research on authentication schemes in MTCDs specifically concerningapplication categories, security provisions, and performance efficiency. 展开更多
关键词 AUTHENTICATION cyber security internet of things machine-type communication devices machine-to-machine communication
下载PDF
Single Photon Detection Technology in Underwater Wireless Optical Communication:Modulation Modes and Error Correction Coding Analysis
8
作者 GAI Lei LI Wendong WANG Guoyu 《Journal of Ocean University of China》 CAS CSCD 2024年第2期405-414,共10页
This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type... This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction. 展开更多
关键词 error correction coding modulation mode single photon detection underwater communication wireless optical communication
下载PDF
Call for Papers--Feature Topic Vol. 22, No. 3, 2025 Special Issue of China Communications: Convergence of 6G empowered Edge Intelligence and Generative AI: Theories, Algorithms, and Applications
9
《China Communications》 SCIE CSCD 2024年第4期I0002-I0002,共1页
Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networ... Generative artificial intelligence(AI), as an emerging paradigm in content generation, has demonstrated its great potentials in creating high-fidelity data including images, texts, and videos. Nowadays wireless networks and applications have been rapidly evolving from achieving “connected things” to embracing “connected intelligence”. 展开更多
关键词 communicationS wireless networks
下载PDF
Multi-wavelength nanowire micro-LEDs for future high speed optical communication
10
作者 Ayush Pandey Zetian Mi 《Opto-Electronic Advances》 SCIE EI CAS CSCD 2024年第3期1-3,共3页
The future of optoelectronics is directed towards small-area light sources,foremost being microLEDs.However,their use has been inhibited so far primarily due to fabrication and integration challenges,which impair effi... The future of optoelectronics is directed towards small-area light sources,foremost being microLEDs.However,their use has been inhibited so far primarily due to fabrication and integration challenges,which impair efficiency and yield.Recently,bottom-up nanostructures grown using selective area epitaxy have garnered attention as a solution to the aforementioned issues.Prof.Lan Fu et.al.have used this technique to demonstrate uniform p-i-n core-shell InGaAs/InP nanowire array light emitting diodes.The devices are capable of voltage and geometry-controlled multi-wavelength and high-speed operations.Their publication accentuates the wide capabilities of bottom-up nanostructures to resolve the difficulties of nanoscale optoelectronics. 展开更多
关键词 communication high operations
下载PDF
Adaptive Resource Allocation Algorithm for 5G Vehicular Cloud Communication
11
作者 Huanhuan Li Hongchang Wei +1 位作者 Zheliang Chen Yue Xu 《Computers, Materials & Continua》 SCIE EI 2024年第8期2199-2219,共21页
The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We pro... The current resource allocation in 5G vehicular networks for mobile cloud communication faces several challenges,such as low user utilization,unbalanced resource allocation,and extended adaptive allocation time.We propose an adaptive allocation algorithm for mobile cloud communication resources in 5G vehicular networks to address these issues.This study analyzes the components of the 5G vehicular network architecture to determine the performance of different components.It is ascertained that the communication modes in 5G vehicular networks for mobile cloud communication include in-band and out-of-band modes.Furthermore,this study analyzes the single-hop and multi-hop modes in mobile cloud communication and calculates the resource transmission rate and bandwidth in different communication modes.The study also determines the scenario of one-way and two-way vehicle lane cloud communication network connectivity,calculates the probability of vehicle network connectivity under different mobile cloud communication radii,and determines the amount of cloud communication resources required by vehicles in different lane scenarios.Based on the communication status of users in 5G vehicular networks,this study calculates the bandwidth and transmission rate of the allocated channels using Shannon’s formula.It determines the adaptive allocation of cloud communication resources,introduces an objective function to obtain the optimal solution after allocation,and completes the adaptive allocation process.The experimental results demonstrate that,with the application of the proposed method,the maximum utilization of user communication resources reaches approximately 99%.The balance coefficient curve approaches 1,and the allocation time remains under 2 s.This indicates that the proposed method has higher adaptive allocation efficiency. 展开更多
关键词 5G vehicular networks mobile cloud communication resource allocation channel capacity network connectivity communication radius objective function
下载PDF
Effect of navigation endoscopy combined with threedimensional printing technology in the treatment of orbital blowout fractures
12
作者 Jin-Hai Yu Yao-Hua Wang +3 位作者 Qi-Hua Xu Chao Xiong An-An Wang Hong-Fei Liao 《International Journal of Ophthalmology(English edition)》 SCIE CAS 2024年第3期570-576,共7页
●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospectiv... ●AIM:To explore the combined application of surgical navigation nasal endoscopy(NNE)and three-dimensional printing technology(3DPT)for the adjunctive treatment of orbital blowout fractures(OBF).●METHODS:Retrospective analysis was conducted on the data of patients with OBF who underwent surgical treatment at the Affiliated Eye Hospital of Nanchang University between July 2012 and November 2022.The control group consisted of patients who received traditional surgical treatment(n=43),while the new surgical group(n=52)consisted of patients who received NNE with 3DPT.The difference in therapeutic effects between the two groups was evaluated by comparing the duration of the operation,best corrected visual acuity(BCVA),enophthalmos difference,recovery rate of eye movement disorder,recovery rate of diplopia,and incidence of postoperative complications.●RESULTS:The study included 95 cases(95 eyes),with 63 men and 32 women.The patients’age ranged from 5 to 67y(35.21±15.75y).The new surgical group and the control group exhibited no statistically significant differences in the duration of the operation,BCVA and enophthalmos difference.The recovery rates of diplopia in the new surgical group were significantly higher than those in the control group at 1mo[OR=0.03,95%CI(0.01–0.15),P<0.0000]and 3mo[OR=0.11,95%CI(0.03–0.36),P<0.0000]postoperation.Additionally,the recovery rates of eye movement disorders at 1 and 3mo after surgery were OR=0.08,95%CI(0.03–0.24),P<0.0000;and OR=0.01,95%CI(0.00–0.18),P<0.0000.The incidence of postoperative complications was lower in the new surgical group compared to the control group[OR=4.86,95%CI(0.95–24.78),P<0.05].●CONCLUSION:The combination of NNE and 3DPT can shorten the recovery time of diplopia and eye movement disorder in patients with OBF. 展开更多
关键词 orbital blowout fracture three-dimensional printing ENDOSCOPY surgical navigation
下载PDF
Optimization of Cooperative RelayingMolecular Communications for Nanomedical Applications
13
作者 Eman S.Attia Ashraf A.M.Khalaf +4 位作者 Fathi E.Abd El-Samie Saied M.Abd El-atty Konstantinos A.Lizos Osama Alfarraj Heba M.El-Hoseny 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1259-1275,共17页
Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,becaus... Recently,nano-systems based on molecular communications via diffusion(MCvD)have been implemented in a variety of nanomedical applications,most notably in targeted drug delivery system(TDDS)scenarios.Furthermore,because the MCvD is unreliable and there exists molecular noise and inter symbol interference(ISI),cooperative nano-relays can acquire the reliability for drug delivery to targeted diseased cells,especially if the separation distance between the nano transmitter and nano receiver is increased.In this work,we propose an approach for optimizing the performance of the nano system using cooperative molecular communications with a nano relay scheme,while accounting for blood flow effects in terms of drift velocity.The fractions of the molecular drug that should be allocated to the nano transmitter and nano relay positioning are computed using a collaborative optimization problem solved by theModified Central Force Optimization(MCFO)algorithm.Unlike the previous work,the probability of bit error is expressed in a closed-form expression.It is used as an objective function to determine the optimal velocity of the drug molecules and the detection threshold at the nano receiver.The simulation results show that the probability of bit error can be dramatically reduced by optimizing the drift velocity,detection threshold,location of the nano-relay in the proposed nano system,and molecular drug budget. 展开更多
关键词 Nanomedical system molecular communication cooperative relay OPTIMIZATION
下载PDF
Cooperative Covert Communication in Multi-Antenna Broadcast Channels
14
作者 Qiao Sen Liu Guangjie +1 位作者 Ji Xiaopeng Liu Weiwei 《China Communications》 SCIE CSCD 2024年第6期246-260,共15页
With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two... With the gradual popularization of 5G communications,the application of multi-antenna broadcasting technology has become widespread.Therefore,this study aims to investigate the wireless covert communication in the two-user cooperative multi-antenna broadcast channel.We focus on the issue that the deteriorated reliability and undetectability are mainly affected by the transmission power.To tackle this issue,we design a scheme based on beamforming to increase the reliability and undetectability of wireless covert communication in the multi-antenna broadcast channel.We first modeled and analyzed the cooperative multi-antenna broadcasting system,and put forward the target question.Then we use the SCA(successive convex approximation)algorithm to transform the target problem into a series of convex subproblems.Then the convex problems are solved and the covert channel capacity is calculated.In order to verify the effectiveness of the scheme,we conducted simulation verification.The simulation results show that the proposed beamforming scheme can effectively improve the reliability and undetectability of covert communication in multi-antenna broadcast channels. 展开更多
关键词 BEAMFORMING covert communication multi-antenna broadcast channels OFDM
下载PDF
A dual adaptive unscented Kalman filter algorithm for SINS-based integrated navigation system
15
作者 LYU Xu MENG Ziyang +4 位作者 LI Chunyu CAI Zhenyu HUANG Yi LI Xiaoyong YU Xingkai 《Journal of Systems Engineering and Electronics》 SCIE CSCD 2024年第3期732-740,共9页
In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual ... In this study, the problem of measuring noise pollution distribution by the intertial-based integrated navigation system is effectively suppressed. Based on nonlinear inertial navigation error modeling, a nested dual Kalman filter framework structure is developed. It consists of unscented Kalman filter (UKF)master filter and Kalman filter slave filter. This method uses nonlinear UKF for integrated navigation state estimation. At the same time, the exact noise measurement covariance is estimated by the Kalman filter dependency filter. The algorithm based on dual adaptive UKF (Dual-AUKF) has high accuracy and robustness, especially in the case of measurement information interference. Finally, vehicle-mounted and ship-mounted integrated navigation tests are conducted. Compared with traditional UKF and the Sage-Husa adaptive UKF (SH-AUKF), this method has comparable filtering accuracy and better filtering stability. The effectiveness of the proposed algorithm is verified. 展开更多
关键词 Kalman filter dual-adaptive integrated navigation unscented Kalman filter(UKF) ROBUST
下载PDF
Cognitive Navigation for Intelligent Mobile Robots:A Learning-Based Approach With Topological Memory
16
作者 Qiming Liu Xinru Cui +1 位作者 Zhe Liu Hesheng Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第9期1933-1943,共11页
Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a lear... Autonomous navigation for intelligent mobile robots has gained significant attention,with a focus on enabling robots to generate reliable policies based on maintenance of spatial memory.In this paper,we propose a learning-based visual navigation pipeline that uses topological maps as memory configurations.We introduce a unique online topology construction approach that fuses odometry pose estimation and perceptual similarity estimation.This tackles the issues of topological node redundancy and incorrect edge connections,which stem from the distribution gap between the spatial and perceptual domains.Furthermore,we propose a differentiable graph extraction structure,the topology multi-factor transformer(TMFT).This structure utilizes graph neural networks to integrate global memory and incorporates a multi-factor attention mechanism to underscore elements closely related to relevant target cues for policy generation.Results from photorealistic simulations on image-goal navigation tasks highlight the superior navigation performance of our proposed pipeline compared to existing memory structures.Comprehensive validation through behavior visualization,interpretability tests,and real-world deployment further underscore the adapt-ability and efficacy of our method. 展开更多
关键词 Graph neural networks(GNNs) spatial memory topological map visual navigation
下载PDF
Mutual Information Maximization via Joint Power Allocation in Integrated Sensing and Communications System
17
作者 Jia Zhu Junsheng Mu +1 位作者 Yuanhao Cui Xiaojun Jing 《China Communications》 SCIE CSCD 2024年第2期129-142,共14页
In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ... In this paper, we focus on the power allocation of Integrated Sensing and Communication(ISAC) with orthogonal frequency division multiplexing(OFDM) waveform. In order to improve the spectrum utilization efficiency in ISAC, we propose a design scheme based on spectrum sharing, that is,to maximize the mutual information(MI) of radar sensing while ensuring certain communication rate and transmission power constraints. In the proposed scheme, three cases are considered for the scattering off the target due to the communication signals,as negligible signal, beneficial signal, and interference signal to radar sensing, respectively, thus requiring three power allocation schemes. However,the corresponding power allocation schemes are nonconvex and their closed-form solutions are unavailable as a consequence. Motivated by this, alternating optimization(AO), sequence convex programming(SCP) and Lagrange multiplier are individually combined for three suboptimal solutions corresponding with three power allocation schemes. By combining the three algorithms, we transform the non-convex problem which is difficult to deal with into a convex problem which is easy to solve and obtain the suboptimal solution of the corresponding optimization problem. Numerical results show that, compared with the allocation results of the existing algorithms, the proposed joint design algorithm significantly improves the radar performance. 展开更多
关键词 COEXISTENCE communicationS multicarrier radar mutual information spectrum sharing
下载PDF
Detecting LLM-assisted writing in scientific communication:Are we there yet?
18
作者 Teddy Lazebnik Ariel Rosenfeld 《Journal of Data and Information Science》 CSCD 2024年第3期4-13,共10页
Large Language Models(LLMs),exemplified by ChatGPT,have significantly reshaped text generation,particularly in the realm of writing assistance.While ethical considerations underscore the importance of transparently ac... Large Language Models(LLMs),exemplified by ChatGPT,have significantly reshaped text generation,particularly in the realm of writing assistance.While ethical considerations underscore the importance of transparently acknowledging LLM use,especially in scientific communication,genuine acknowledgment remains infrequent.A potential avenue to encourage accurate acknowledging of LLM-assisted writing involves employing automated detectors.Our evaluation of four cutting-edge LLM-generated text detectors reveals their suboptimal performance compared to a simple ad-hoc detector designed to identify abrupt writing style changes around the time of LLM proliferation.We contend that the development of specialized detectors exclusively dedicated to LLM-assisted writing detection is necessary.Such detectors could play a crucial role in fostering more authentic recognition of LLM involvement in scientific communication,addressing the current challenges in acknowledgment practices. 展开更多
关键词 LLM-assisted writing Scientific communication Writing style
下载PDF
A Retrodirective Array Enabled by CMOS Chips for Two-Way Wireless Communication with Automatic Beam Tracking
19
作者 Jiacheng Guo Yizhu Shen +2 位作者 Guoqing Dong Zhuang Han Sanming Hu 《Engineering》 SCIE EI CAS CSCD 2024年第6期196-207,共12页
This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple... This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。 展开更多
关键词 Automatic beam tracking CMOS Retrodirective array Two-way communication
下载PDF
Navigation Finsler metrics on a gradient Ricci soliton
20
作者 LI Ying MO Xiao-huan WANG Xiao-yang 《Applied Mathematics(A Journal of Chinese Universities)》 SCIE CSCD 2024年第2期266-275,共10页
In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to b... In this paper,we study a class of Finsler metrics defined by a vector field on a gradient Ricci soliton.We obtain a necessary and sufficient condition for these Finsler metrics on a compact gradient Ricci soliton to be of isotropic S-curvature by establishing a new integral inequality.Then we determine the Ricci curvature of navigation Finsler metrics of isotropic S-curvature on a gradient Ricci soliton generalizing result only known in the case when such soliton is of Einstein type.As its application,we obtain the Ricci curvature of all navigation Finsler metrics of isotropic S-curvature on Gaussian shrinking soliton. 展开更多
关键词 gradient Ricci soliton navigation Finsler metric isotropic S-curvature Ricci curvature Gaussian shrinking soliton
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部