The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sparse-code multiple-access (SCMA) is a novel multiplexing method to increase the capacity of wireless communication systems. By giving users non-orthogonal codebook with few non-zero entries, the SCMA approach can highly improve the spectral efficiency, compared with traditional orthogonal ones such as CDMA, with tolerable detection complexity. Therefore, it has been considered as an option for 5G...
In this paper, we consider the privacy preserving problem in an agreement network under interception attacks. First, we introduce a consensus protocol with privacy preserving, where each node hides their initial states into a set of random sequences, and then injects the sequences into the process of consensus. Second, we assume that an attacker with limited power can intercept the data transmitted...
Recent advances in convolutional neural networks have shown promising results in 3D shape completion. But due to GPU memory limitations, these methods can only produce low-resolution outputs. To inpaint 3D models with semantic plausibility and contextual details, we introduce a hybrid framework that combines a 3D Encoder-Decoder Generative Adversarial Network (3D-ED-GAN) and a Longterm Recurrent Convolutional...
We present a novel method to realistically puppeteer and animate a face from a single RGB image using a source video sequence. We begin by fitting a multilinear PCA model to obtain the 3D geometry and a single texture of the target face. In order for the animation to be realistic, however, we need dynamic per-frame textures that capture subtle wrinkles and deformations corresponding to the animated...
Based on cellular automata model, the impact of information suggestion on the traffic flow of a three-route system has been studied. In the model, we assume that a speed limit bottleneck exists on one route. When vehicles drive past this bottleneck, their speed will be reduced to 0. By simulation, it was found that a big traffic jam appears before this bottleneck. To alleviate this kind of traffic...
In this Web 2.0 era, billions of social media users contribute massive amounts of information that have already been presented in earth observation (EO) applications such as earthquake information reporting, flood monitoring, and wildfire alerting. Nevertheless, applying social media data in geo-sensing missions directly and effectively remains a challenge. In this paper, we examine how to design...
The matrix-matrix multiplication is an essential building block that can be found in various scientific and engineering applications. High-performance implementations of the matrix-matrix multiplication on state-of-the-art processors may be of great importance for both the vendors and the users. In this paper, we present a detailed methodology of implementing and optimizing the double-precision general...
In this paper, we consider the privacy preserving problem of consensus protocol. First, we introduce a privacy preserving scheme, where each node produces and transmits a sequence of random values with their mean equaling to the node's initial state. We show that the network can reach average consensus with privacy preserving scheme, and provide a sufficient condition under which the initial state...
This paper is concerned with the formation control of multiple fight vehicles, and by introducing the energy states, an energy-based cooperative method is proposed. The fight vehicle system is modelled with the communication topology and formation description. Then, the cooperative formation strategy is discussed with collision avoidance. It provides the formation commands which are transformed into...
Recent advances in deep learning have shown exciting promise in filling large holes in natural images with semantically plausible and context aware details, impacting fundamental image manipulation tasks such as object removal. While these learning-based methods are significantly more effective in capturing high-level features than prior techniques, they can only handle very low-resolution inputs...
Patents signal a start-up's technological and innovative capability. Venture Capital (VC) investors can evaluate the true potential and behavior of start-ups through their patents. While, VC would have effect in enterprises' innovation output. The detailed interaction between VC and patent activities in China is different and attractive. This paper tries to explore this relationship in two levels,...
We experimentally demonstrate sixth-order filters by constructing a triple-cavity photonic molecule with backscattering-induced mode splittings in high-β silica microtoroid cavities. The realized sixth-order filter has a narrow bandwidth of 159 MHz with sharp roll-off slope larger than 300 dB/GHz.
In this paper, we study the stabilization of an elastic beam system with axial force and a tip mass. The system is modeled as a Rayleigh beam equation. We propose a boundary feedback control moment to stabilize the closed-loop system. We first present the asymptotic expressions for the eigenpairs of the system and then show that the generalized eigenfunctions form a Riesz basis in the state space...
The prevalence of malware in Android marketplaces is a growing and significant problem. Most existing studies focus on detecting Android malware or designing new security exten-sions to defend against specific types of attacks. In this paper, we perform an empirical study on analyzing the market-level and network-level behaviors of the Android malware ecosystem. We focus on studying whether there...
Vital signs, such as respiration and heartbeat, are useful to health monitoring since such signals provide important clues of medical conditions. Effective solutions are needed to provide contact-free, easy deployment, low-cost, and long-term vital sign monitoring. In this paper, we present PhaseBeat to exploit channel state information (CSI) phase difference data to monitor breathing and heartbeat...
The replication and dissemination of multimedia data become increasingly convenient and efficient, so a lot of redundant multimedia data, especially image files, have been generated and stored on the Internet. Therefore, it is necessary to perform deduplication of images. However, the existing deduplication methods of regular files are hash-based, which cannot be applied to the deduplication of images...
One of the major advantages of smart grid is to allow a large number of electric vehicles (EVs) to participate in energy dispatch as elastic energy storage devices via vehicle-to-grid (V2G) technology. As mechanism design for V2G energy trading can stimulate energy interaction between EVs and grids, it is really significant to V2G systems. This paper focuses on efficient mechanism design for energy...
Interference management through power control in wireless ad hoc networks has both the hidden terminal problem which induces collisions, and the exposed terminal problem which prohibits concurrent transmissions. Both problems are caused by the varied interference range induced by the adjusted transmission power. Through observing that the nodes adopt the power control mechanism induces collisions...
Stencil computation arises from a broad set of scientific and engineering applications and often plays a critical role in the performance of extreme-scale simulations. Due to the memory bound nature, it is a challenging task to opti- mize stencil computation kernels on modern supercomputers with relatively high computing throughput whilst relatively low data-moving capability. This work serves as...
Taking Mianyuan River Basin as case study, the co-seismic landslides were detected automatically using decision-making tree method on ALOS satellite imagery post the 2008 Wenchuan earthquake. These landslides cover an area of 48.5km2. The distribution of landslides was dominated by the seismogenic fault. Furthermore, the lithology determined the type of landslides. Shallow disrupted falls were mainly...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.