期刊文献+
共找到39篇文章
< 1 2 >
每页显示 20 50 100
Redundant Data Detection and Deletion to Meet Privacy Protection Requirements in Blockchain-Based Edge Computing Environment
1
作者 Zhang Lejun Peng Minghui +6 位作者 Su Shen Wang Weizheng Jin Zilong Su Yansen Chen Huiling Guo Ran Sergey Gataullin 《China Communications》 SCIE CSCD 2024年第3期149-159,共11页
With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for clou... With the rapid development of information technology,IoT devices play a huge role in physiological health data detection.The exponential growth of medical data requires us to reasonably allocate storage space for cloud servers and edge nodes.The storage capacity of edge nodes close to users is limited.We should store hotspot data in edge nodes as much as possible,so as to ensure response timeliness and access hit rate;However,the current scheme cannot guarantee that every sub-message in a complete data stored by the edge node meets the requirements of hot data;How to complete the detection and deletion of redundant data in edge nodes under the premise of protecting user privacy and data dynamic integrity has become a challenging problem.Our paper proposes a redundant data detection method that meets the privacy protection requirements.By scanning the cipher text,it is determined whether each sub-message of the data in the edge node meets the requirements of the hot data.It has the same effect as zero-knowledge proof,and it will not reveal the privacy of users.In addition,for redundant sub-data that does not meet the requirements of hot data,our paper proposes a redundant data deletion scheme that meets the dynamic integrity of the data.We use Content Extraction Signature(CES)to generate the remaining hot data signature after the redundant data is deleted.The feasibility of the scheme is proved through safety analysis and efficiency analysis. 展开更多
关键词 blockchain data integrity edge computing privacy protection redundant data
下载PDF
LLR Processing of Polar Codes in Concatenation Systems 被引量:1
2
作者 Ya Meng Yi Fang +1 位作者 Chuan Zhang Liping Li 《China Communications》 SCIE CSCD 2019年第9期201-208,共8页
This paper studies the decoding performance of low-density parity-check(LDPC)codes in a serial concatenation system with polar codes employing the successive cancellation(SC)decoding.It is known that the absolute inco... This paper studies the decoding performance of low-density parity-check(LDPC)codes in a serial concatenation system with polar codes employing the successive cancellation(SC)decoding.It is known that the absolute incorrect log-likelihood ratio(LLR)values from the SC decoding can be very large.This phenomenon dramatically deteriorates the error correcting performance of the outer LDPC codes.In this paper,the LLR values of polar codes are regulated by a log processing before being sent to the LDPC decoder.Simulation results show that the log processing is an efficient approach with a low optimization complexity compared with the existing procedures to improve the performance of the serial concatenation systems. 展开更多
关键词 POLAR CODES SC DECODING LDPCcodes CONCATENATION
下载PDF
Fusion of multi-spectral image and panchromatic image based on support vector regression
3
作者 胡根生 梁栋 《Journal of Beijing Institute of Technology》 EI CAS 2012年第2期269-277,共9页
In our study,support vector value contourlet transform is constructed by using support vector regression model and directional filter banks.The transform is then used to decompose source images at multi-scale,multi-di... In our study,support vector value contourlet transform is constructed by using support vector regression model and directional filter banks.The transform is then used to decompose source images at multi-scale,multi-direction and multi-resolution.After that,the super-resolved multi-spectral image is reconstructed by utilizing the strong learning ability of support vector regression and the correlation between multi-spectral image and panchromatic image.Finally,the super-resolved multi-spectral image and the panchromatic image are fused based on regions at different levels.Our experiments show that,the learning method based on support vector regression can improve the effect of super-resolution of multi-spectral image.The fused image preserves both high space resolution and spectrum information of multi-spectral image. 展开更多
关键词 image processing image fusion support vector regression SUPER-RESOLUTION
下载PDF
A New Free-Standing Aqueous Zinc-Ion Capacitor Based on MnO2–CNTs Cathode and MXene Anode 被引量:7
4
作者 Siliang Wang Qiang Wang +3 位作者 Wei Zeng Min Wang Limin Ruan Yanan Ma 《Nano-Micro Letters》 SCIE EI CAS CSCD 2019年第4期227-238,共12页
Restricted by their energy storage mechanism,current energy storage devices have certain drawbacks,such as low power density for batteries and low energy density for supercapacitors.Fortunately,the nearest ion capacit... Restricted by their energy storage mechanism,current energy storage devices have certain drawbacks,such as low power density for batteries and low energy density for supercapacitors.Fortunately,the nearest ion capacitors,such as lithium-ion and sodium-ion capacitors containing battery-type and capacitor-type electrodes,may allow achieving both high energy and power densities.For the inspiration,a new zinc-ion capacitor(ZIC)has been designed and realized by assembling the free-standing manganese dioxide-carbon nanotubes(MnO2-CNTs)battery-type cathode and MXene(Ti3C2Tx)capacitortype anode in an aqueous electrolyte.The ZIC can avoid the insecurity issues that frequently occurred in lithium-ion and sodium-ion capacitors in organic electrolytes.As expected,the ZIC in an aqueous liquid electrolyte exhibits excellent electrochemical performance(based on the total weight of cathode and anode),such as a high specific capacitance of 115.1 F g?1(1 mV s?1),high energy density of 98.6 Wh kg?1(77.5 W kg?1),high power density of 2480.6 W kg?1(29.7 Wh kg?1),and high capacitance retention of^83.6%of its initial capacitance(15,000 cycles).Even in an aqueous gel electrolyte,the ZIC also exhibits excellent performance.This work provides an essential strategy for designing next-generation high-performance energy storage devices. 展开更多
关键词 Energy storage Zinc-ion CAPACITOR Battery-type and capacitor-type electrodes MXene Electrochemical performance
下载PDF
Total Field and Scattered Field Technique for Fourth-Order Symplectic Finite Difference Time Domain Method 被引量:4
5
作者 沙威 黄志祥 +1 位作者 吴先良 陈明生 《Chinese Physics Letters》 SCIE CAS CSCD 2006年第1期103-105,共3页
用 symplectic 综合者增殖者,三维的 fourth-ordersymplectic 有限差别时间领域(SFDTD ) 方法被学习,它具有在两个的第四份订单时空领域。方法是非消散的并且能与传统的 FDTD 方法相比节省更多的记忆。全部的领域和散布的地(TF-SF ) ... 用 symplectic 综合者增殖者,三维的 fourth-ordersymplectic 有限差别时间领域(SFDTD ) 方法被学习,它具有在两个的第四份订单时空领域。方法是非消散的并且能与传统的 FDTD 方法相比节省更多的记忆。全部的领域和散布的地(TF-SF ) 技术被导出让 SFDTD 方法提供事件波浪来源条件。一个绝缘的范围的双性人静电干扰雷达十字节(RCS ) 被第一次使用 SFDTD 方法计算。Numericalresults 建议 SFDTD 算法与传统的 FDTD 方法相比获得更好的稳定性和精确性。 展开更多
关键词 有限差分时域法 稳定性 准确度 电介质
下载PDF
Cloud removal of remote sensing image based on multi-output support vector regression 被引量:2
6
作者 Gensheng Hu Xiaoqi Sun +1 位作者 Dong Liang Yingying Sun 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2014年第6期1082-1088,共7页
Removal of cloud cover on the satellite remote sensing image can effectively improve the availability of remote sensing images. For thin cloud cover, support vector value contourlet transform is used to achieve multi-... Removal of cloud cover on the satellite remote sensing image can effectively improve the availability of remote sensing images. For thin cloud cover, support vector value contourlet transform is used to achieve multi-scale decomposition of the area of thin cloud cover on remote sensing images. Through enhancing coefficients of high frequency and suppressing coefficients of low frequency, the thin cloud is removed. For thick cloud cover, if the areas of thick cloud cover on multi-source or multi-temporal remote sensing images do not overlap, the multi-output support vector regression learning method is used to remove this kind of thick clouds. If the thick cloud cover areas overlap, by using the multi-output learning of the surrounding areas to predict the surface features of the overlapped thick cloud cover areas, this kind of thick cloud is removed. Experimental results show that the proposed cloud removal method can effectively solve the problems of the cloud overlapping and radiation difference among multi-source images. The cloud removal image is clear and smooth. 展开更多
关键词 多时相遥感影像 支持向量回归 多输出 卫星遥感图像 学习方法 多尺度分解 表面特征 周边地区
下载PDF
The structural analysis of protein sequences based on the quasi-amino acids code 被引量:2
7
作者 朱平 唐旭清 徐振源 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第1期363-369,共7页
Proteomics is the study of proteins and their interactions in a cell.With the successful completion of the Human Genome Project,it comes the postgenome era when the proteomics technology is emerging.This paper studies... Proteomics is the study of proteins and their interactions in a cell.With the successful completion of the Human Genome Project,it comes the postgenome era when the proteomics technology is emerging.This paper studies protein molecule from the algebraic point of view.The algebraic system(Σ,+,) is introduced,where Σ is the set of 64 codons.According to the characteristics of(Σ,+,),a novel quasi-amino acids code classification method is introduced and the corresponding algebraic operation table over the set ZU of the 16 kinds of quasi-amino acids is established.The internal relation is revealed about quasi-amino acids.The results show that there exist some very close correlations between the properties of the quasi-amino acids and the codon.All these correlation relationships may play an important part in establishing the logic relationship between codons and the quasi-amino acids during the course of life origination.According to Ma F et al(2003 J.Anhui Agricultural University 30 439),the corresponding relation and the excellent properties about amino acids code are very difficult to observe.The present paper shows that(ZU,⊕,) is a field.Furthermore,the operational results display that the codon tga has different property from other stop codons.In fact,in the mitochondrion from human and ox genomic codon,tga is just tryptophane,is not the stop codon like in other genetic code,it is the case of the Chen W C et al(2002 Acta Biophysica Sinica 18(1) 87).The present theory avoids some inexplicable events of the 20 kinds of amino acids code,in other words it solves the problem of 'the 64 codon assignments of mRNA to amino acids is probably completely wrong' proposed by Yang(2006 Progress in Modern Biomedicine 6 3). 展开更多
关键词 分子物理学 结构 性质 测定 蛋白质
下载PDF
Hybrid Lifting Wavelet-Like Transform for Solution of Electromagnetic Integral Equation 被引量:1
8
作者 陈明生 吴先良 +1 位作者 沙威 黄志祥 《Chinese Physics Letters》 SCIE CAS CSCD 2008年第3期1000-1003,共4页
一个混合上升像小浪的变换计划成功地用 Rao-Wilton-Glisson 基础功能被用于电场积分方程的答案。为了加快矩阵,转变过程,上升计划被采用。不同三维的非常电的进行目标的数字例子被考虑。与时刻的方法相比,建议矩阵变换计划能节省可... 一个混合上升像小浪的变换计划成功地用 Rao-Wilton-Glisson 基础功能被用于电场积分方程的答案。为了加快矩阵,转变过程,上升计划被采用。不同三维的非常电的进行目标的数字例子被考虑。与时刻的方法相比,建议矩阵变换计划能节省可观的中央处理器时间和存储器。 展开更多
关键词 子波转换 电磁 积分方程式 杂合方法
下载PDF
Hidden Attractors in a Delayed Memristive Differential System with Fractional Order and Chaos Synchronization 被引量:1
9
作者 Dawei Ding Yecui Weng Nian Wang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第1期67-75,共9页
As an important research branch,memristor has attracted a range of scholars to study the property of memristive chaotic systems.Additionally,time⁃delayed systems are considered a significant and newly⁃developing field... As an important research branch,memristor has attracted a range of scholars to study the property of memristive chaotic systems.Additionally,time⁃delayed systems are considered a significant and newly⁃developing field in modern research.By combining memristor and time⁃delay,a delayed memristive differential system with fractional order is proposed in this paper,which can generate hidden attractors.First,we discussed the dynamics of the proposed system where the parameter was set as the bifurcation parameter,and showed that with the increase of the parameter,the system generated rich chaotic phenomena such as bifurcation,chaos,and hypherchaos.Then we derived adequate and appropriate stability criteria to guarantee the system to achieve synchronization.Lastly,examples were provided to analyze and confirm the influence of parameter a,fractional order q,and time delayτon chaos synchronization.The simulation results confirm that the chaotic synchronization is affected by a,q andτ. 展开更多
关键词 fractional order memristive time⁃delay hidden attractors chaos synchronization
下载PDF
Stabilization of Uncertain Fractional Memristor Chaotic Time⁃Delay System Based on Fractional Order Sliding Mode Control 被引量:1
10
作者 Dawei Ding Fangfang Liu +1 位作者 Nian Wang Dong Liang 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2020年第4期74-83,共10页
Based on Lyapunov theorem and sliding mode control scheme,the chaos control of fractional memristor chaotic time⁃delay system was studied.In order to stabilize the system,a fractional sliding mode control method for f... Based on Lyapunov theorem and sliding mode control scheme,the chaos control of fractional memristor chaotic time⁃delay system was studied.In order to stabilize the system,a fractional sliding mode control method for fractional time⁃delay system was proposed.In addition,Lyapunov stability theorem was used to analyze the control scheme theoretically,which guaranteed the stability of commensurate and non⁃commensurate order systems with or without uncertainties and disturbances.Furthermore,to illustrate the feasibility of controller,the conditions for designing the controller parameters were derived.Finally,the simulation results presented the effectiveness of the designed strategy. 展开更多
关键词 fractional order system time⁃delay chaos control uncertainty sliding mode control
下载PDF
Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain 被引量:1
11
作者 Lejun Zhang Minghui Peng +3 位作者 Weizheng Wang Yansen Su Shuna Cui Seokhoon Kim 《Computers, Materials & Continua》 SCIE EI 2021年第1期499-515,共17页
In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical data.The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dy... In the digital era,electronic medical record(EMR)has been a major way for hospitals to store patients’medical data.The traditional centralized medical system and semi-trusted cloud storage are difficult to achieve dynamic balance between privacy protection and data sharing.The storage capacity of blockchain is limited and single blockchain schemes have poor scalability and low throughput.To address these issues,we propose a secure and efficient medical data storage and sharing scheme based on double blockchain.In our scheme,we encrypt the original EMR and store it in the cloud.The storage blockchain stores the index of the complete EMR,and the shared blockchain stores the index of the shared part of the EMR.Users with different attributes can make requests to different blockchains to share different parts according to their own permissions.Through experiments,it was found that cloud storage combined with blockchain not only solved the problem of limited storage capacity of blockchain,but also greatly reduced the risk of leakage of the original EMR.Content Extraction Signature(CES)combined with the double blockchain technology realized the separation of the privacy part and the shared part of the original EMR.The symmetric encryption technology combined with Ciphertext-Policy Attribute-Based Encryption(CP–ABE)not only ensures the safe storage of data in the cloud,but also achieves the consistency and convenience of data update,avoiding redundant backup of data.Safety analysis and performance analysis verified the feasibility and effectiveness of our scheme. 展开更多
关键词 Cloud storage blockchain electronic medical records access control data sharing PRIVACY
下载PDF
Recognition of Group Activities Using Complex Wavelet Domain Based Cayley-Klein Metric Learning
12
作者 Gensheng Hu Min Li +2 位作者 Dong Liang Mingzhu Wan Wenxia Bao 《Journal of Beijing Institute of Technology》 EI CAS 2018年第4期592-603,共12页
A group activity recognition algorithm is proposed to improve the recognition accuracy in video surveillance by using complex wavelet domain based Cayley-Klein metric learning.Non-sampled dual-tree complex wavelet pac... A group activity recognition algorithm is proposed to improve the recognition accuracy in video surveillance by using complex wavelet domain based Cayley-Klein metric learning.Non-sampled dual-tree complex wavelet packet transform(NS-DTCWPT)is used to decompose the human images in videos into multi-scale and multi-resolution.An improved local binary pattern(ILBP)and an inner-distance shape context(IDSC)combined with bag-of-words model is adopted to extract the decomposed high and low frequency coefficient features.The extracted coefficient features of the training samples are used to optimize Cayley-Klein metric matrix by solving a nonlinear optimization problem.The group activities in videos are recognized by using the method of feature extraction and Cayley-Klein metric learning.Experimental results on behave video set,group activity video set,and self-built video set show that the proposed algorithm has higher recognition accuracy than the existing algorithms. 展开更多
关键词 video SURVEILLANCE group activity RECOGNITION non-sampled dual-tree complex wavelet PACKET transform (NS-DTCWPT) Cayley-Klein metric learning
下载PDF
A note on equicontinuous maps of graph space
13
作者 乔宗敏 《Journal of Chongqing University》 CAS 2005年第2期121-124,共4页
Let G be a graph and f: G→ G be a continuous map with at least one periodic point. Using the quote space method, the paper addresses that f is an equicontinuous map if and only if one of the following End(G)+2k+1 con... Let G be a graph and f: G→ G be a continuous map with at least one periodic point. Using the quote space method, the paper addresses that f is an equicontinuous map if and only if one of the following End(G)+2k+1 conditions holds: 1) {f jm(End(G)+2k)!}∞j=1 is uniformly convergent, in which m=1,2,…, End(G)+2k; and 2) There is a positive integer n esuring that {f jn}∞j=1 is uniformly convergent. 展开更多
关键词 曲线图 同等连续映射 周期点 收敛性
下载PDF
Analysis of asymptotically tight approximation SER for cooperative NOMA systems
14
作者 徐磊 Cai Jing +3 位作者 Yao Yijing Zhu Dingcheng Fang Hongyu Li Xiaohui 《High Technology Letters》 EI CAS 2021年第3期249-255,共7页
The closed-form formula derivation of the power domain cooperative non-orthogonal multiple access(NOMA)system is of great significance for further improving the performance of the system.However,the system performance... The closed-form formula derivation of the power domain cooperative non-orthogonal multiple access(NOMA)system is of great significance for further improving the performance of the system.However,the system performance formulas of the channel capacity and the paired bit error rate pairwise error probability(PEP)are too complicated,which have increased the difficulty in system performance optimization.Therefore,based on the amplify forward(AF)relay cooperative NOMA model,the signal interference noise ratio(SINR)formulas of the two user nodes are constructed.Through the assumption of that,the symbol error rate(SER)of each user is fair,the simplification condition of moment generating function(MGF)with the harmonic mean form is satisfied.Combined with the SER calculation formula of MGF,the system SER asymptotically tight approximation formula with simple structure is derived at high signal-to-noise ratio(SNR).The Monte Carlo simulation results show that,the formula can accurately describe the SER performance of the power domain cooperative NOMA system with the non-ideal successive interference cancellation(SIC)system when SNR is high.Under the condition of certain total power,the optimal power allocation factor is solved in order to minimize the total system SER. 展开更多
关键词 non-orthogonal multiple access(NOMA) amplify forward(AF) symbol error rate(SER) moment generating function(MGF)
下载PDF
A Fast Clustering Based Evolutionary Algorithm for Super-Large-Scale Sparse Multi-Objective Optimization 被引量:4
15
作者 Ye Tian Yuandong Feng +1 位作者 Xingyi Zhang Changyin Sun 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第4期1048-1063,共16页
During the last three decades,evolutionary algorithms(EAs)have shown superiority in solving complex optimization problems,especially those with multiple objectives and non-differentiable landscapes.However,due to the ... During the last three decades,evolutionary algorithms(EAs)have shown superiority in solving complex optimization problems,especially those with multiple objectives and non-differentiable landscapes.However,due to the stochastic search strategies,the performance of most EAs deteriorates drastically when handling a large number of decision variables.To tackle the curse of dimensionality,this work proposes an efficient EA for solving super-large-scale multi-objective optimization problems with sparse optimal solutions.The proposed algorithm estimates the sparse distribution of optimal solutions by optimizing a binary vector for each solution,and provides a fast clustering method to highly reduce the dimensionality of the search space.More importantly,all the operations related to the decision variables only contain several matrix calculations,which can be directly accelerated by GPUs.While existing EAs are capable of handling fewer than 10000 real variables,the proposed algorithm is verified to be effective in handling 1000000 real variables.Furthermore,since the proposed algorithm handles the large number of variables via accelerated matrix calculations,its runtime can be reduced to less than 10%of the runtime of existing EAs. 展开更多
关键词 Evolutionary computation fast clustering sparse multi-objective optimization super-large-scale optimization
下载PDF
Overlapping community‐based particle swarm optimization algorithm for influence maximization in social networks
16
作者 Lei Zhang Yutong Liu +3 位作者 Haipeng Yang Fan Cheng Qi Liu Xingyi Zhang 《CAAI Transactions on Intelligence Technology》 SCIE EI 2023年第3期893-913,共21页
Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour s... Influence maximization,whose aim is to maximise the expected number of influenced nodes by selecting a seed set of k influential nodes from a social network,has many applications such as goods advertising and rumour suppression.Among the existing influence maximization methods,the community‐based ones can achieve a good balance between effectiveness and efficiency.However,this kind of algorithm usually utilise the network community structures by viewing each node as a non‐overlapping node.In fact,many nodes in social networks are overlapping ones,which play more important role in influence spreading.To this end,an overlapping community‐based particle swarm opti-mization algorithm named OCPSO for influence maximization in social networks,which can make full use of overlapping nodes,non‐overlapping nodes,and their interactive information is proposed.Specifically,an overlapping community detection algorithm is used to obtain the information of overlapping community structures,based on which three novel evolutionary strategies,such as initialisation,mutation,and local search are designed in OCPSO for better finding influential nodes.Experimental results in terms of influence spread and running time on nine real‐world social networks demonstrate that the proposed OCPSO is competitive and promising comparing to several state‐of‐the‐arts(e.g.CGA,CMA‐IM,CIM,CDH‐SHRINK,CNCG,and CFIN). 展开更多
关键词 computational intelligence data mining social network
下载PDF
A Privacy Preservation Method for Attributed Social Network Based on Negative Representation of Information
17
作者 Hao Jiang Yuerong Liao +2 位作者 Dongdong Zhao Wenjian Luo Xingyi Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期1045-1075,共31页
Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself disc... Due to the presence of a large amount of personal sensitive information in social networks,privacy preservation issues in social networks have attracted the attention of many scholars.Inspired by the self-nonself discrimination paradigmin the biological immune system,the negative representation of information indicates features such as simplicity and efficiency,which is very suitable for preserving social network privacy.Therefore,we suggest a method to preserve the topology privacy and node attribute privacy of attribute social networks,called AttNetNRI.Specifically,a negative survey-based method is developed to disturb the relationship between nodes in the social network so that the topology structure can be kept private.Moreover,a negative database-based method is proposed to hide node attributes,so that the privacy of node attributes can be preserved while supporting the similarity estimation between different node attributes,which is crucial to the analysis of social networks.To evaluate the performance of the AttNetNRI,empirical studies have been conducted on various attribute social networks and compared with several state-of-the-art methods tailored to preserve the privacy of social networks.The experimental results show the superiority of the developed method in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topology disturbing and attribute hiding parts.The experimental results show the superiority of the developed methods in preserving the privacy of attribute social networks and demonstrate the effectiveness of the topological interference and attribute-hiding components. 展开更多
关键词 Attributed social network topology privacy node attribute privacy negative representation of information negative survey negative database
下载PDF
Dielectric Resonator Magnetoelectric Dipole Arrays with Low Cross Polarization,Backward Radiation,and Mutual Coupling for MIMO Base Station Applications
18
作者 Song Simin Da Yiran +4 位作者 Qian Bingyi Huang Xiaoyu Chen Xiaoming Li Yingsong Ahmed AKishk 《China Communications》 SCIE 2024年第6期290-304,共15页
Dielectric resonator magnetoelectric dipole(DRMED)arrays with enhanced isolation,reduced cross-polarization,and backward radiation are proposed for base station(BS)applications.The proposed antenna comprises an elevat... Dielectric resonator magnetoelectric dipole(DRMED)arrays with enhanced isolation,reduced cross-polarization,and backward radiation are proposed for base station(BS)applications.The proposed antenna comprises an elevated dielectric resonator antenna(DRA)on a small metal plate above a sizeable common ground plane.The DRA is designed in its T Eδ11 mode,acting like a magnetic dipole.The surface current excited by the differential probes flowing on the small ground plane is equivalent to an electric dipole.Since these two equivalent dipoles are orthogonal,they have the magnetoelectric dipole characteristics with reduced backward radiation.Meanwhile,the small ground planes can be treated as decoupling structures to provide a neutralization path to cancel the original coupling path.A linearly-polarized 4-element prototype array was verified experimentally in previous work.Here,a dual-polarized DRMED antenna is presented to construct a 2-element and 4×4 array for BS applications.To investigate its MIMO performance,sophisticated multi-cell scenario simulations are carried out.By using the proposed dualpolarized DRMED array,the cellular system capacityis improved by 118.6%compared to a conventional DRA array.This significant MIMO system improvement is mainly due to the reduced backward radiation and,therefore,reduced inter-cell interferences.Measurements align well with the simulations. 展开更多
关键词 backward radiation dielectric resonator antennas(DRAs) isolation magnetoelectric-dipole(ME-dipole)antennas
下载PDF
An Anti-Eavesdrop Transmission Scheduling Scheme Based on Maximizing Secrecy Outage Probability in Ad Hoc Networks 被引量:1
19
作者 WANG Yajun LIAO Tongqing WANG Chuanan 《China Communications》 SCIE CSCD 2016年第1期176-184,共9页
In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optim... In this paper,we consider a wireless ad hoc network consisting of multiple source nodes transmitting to their respective destinations,where an eavesdropper attempts to intercept their transmissions.We propose an optimal transmission scheduling scheme to defend against the eavesdropper,where a source node having the highest secrecy rate is scheduled to access the wireless medium for transmitting to its destination in an opportunistic manner.To be specific,the secrecy rate between a pair of the source and destination in the presence of an eavesdropper varies temporally due to the wireless fading effect.The proposed optimal transmission scheduling scheme opportunistically selects a source node with the highest secrecy rate to transmit its data for the sake of maximizing the security of the ad hoc network against eavesdropping attacks.For comparison purposes,we also consider the conventional round-robin scheduling as a benchmark,where multiple source nodes take turns in accessing their shared wireless medium for transmitting to their respective destinations.We derive closed-form secrecy outage probability expressions of both the round-robin scheduling and the proposed optimal scheduling schemes over Rayleigh fading environments.Numerical results show that the proposed transmission scheduling scheme outperforms the conventional round-robin method in terms of its secrecy outage probability.Additionally,upon increasing the number of source-destination pairs,the secrecy outage probability of the round-robin scheme keeps unchanged,whereas the secrecy outage performance of the proposed transmission scheduling significantly improves,showing the security benefits of exploiting transmission scheduling for protecting wireless ad hoc networks against eavesdropping. 展开更多
关键词 最优调度方案 传输数据 无线AD 中断概率 网络窃听 防窃听 保密 最大化
下载PDF
Sliding Mode Control of Fractional-Order Delayed Memristive Chaotic System with Uncertainty and Disturbance 被引量:1
20
作者 丁大为 刘芳芳 +2 位作者 陈辉 王年 梁栋 《Communications in Theoretical Physics》 SCIE CAS CSCD 2017年第12期741-748,共8页
In this paper, a simplest fractional-order delayed memristive chaotic system is proposed in order to control the chaos behaviors via sliding mode control strategy. Firstly, we design a sliding mode control strategy fo... In this paper, a simplest fractional-order delayed memristive chaotic system is proposed in order to control the chaos behaviors via sliding mode control strategy. Firstly, we design a sliding mode control strategy for the fractionalorder system with time delay to make the states of the system asymptotically stable. Then, we obtain theoretical analysis results of the control method using Lyapunov stability theorem which guarantees the asymptotic stability of the noncommensurate order and commensurate order system with and without uncertainty and an external disturbance. Finally,numerical simulations are given to verify that the proposed sliding mode control method can eliminate chaos and stabilize the fractional-order delayed memristive system in a finite time. 展开更多
关键词 fractional-order system memristive system time delay sliding mode control stability theorem
原文传递
上一页 1 2 下一页 到第
使用帮助 返回顶部