The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We demonstrated a dense sub-carrier uniform division labeling transmission system by using MATLAB software. The simulation results indicated that dense sub-carrier uniform division labeling has a good advantage over that ordinary OFDM system, and the signals at a bit rate 50Gbit/s have a good performance which is more than 10 when OSNR is equal to 25dB over 1000km optical fiber channel which only...
In the speech enhancement algorithm, adding Mel-frequency domain processing will make the processed more in line with the characteristics of human ears. The implementation of this approach is based on the Wiener filter, which will be improved obviously of the sound quality, but will keep too much background noise. For this reason the output SNR(signal-to-noise ratio)reduced. At the same time, we all...
We numerically simulate the influence of mode coupling and modal delay on the transmitted signal. Then we carry out adaptive signal processing with MIMO equalizers based on recursive least squares constant modulus algorithm (RLSCMA). The simulation results show that the distorted signals are restored efficiently with fast convergence speed.
Previous studies in compressive sensing (CS) based subsurface imaging methods depended on two important assumptions; namely, that the imaging scene is modeled as a single homogeneous medium and that the relative permittivity of background environment is known. However, these assumptions are not always valid for the practical application of underground imaging with ground penetrating radar (GPR). To...
Attack graph increasingly becomes a key technique for network security analysis, however, the prevalent Attacker's Ability Monotonic Assumption (AAMA) constraint for attack graph generation could not make full use of the direction of network attack and the hierarchy of defence. As a result, using AAMA is not efficient enough in the process of attack graph generation, especially for large-scale complicated...
Attack graphs can reveal the threat of sophisticated multi-step attacks by enumerating possible sequences of exploits leading to the compromise of given critical resources. In order to resolve the current emergence methods of generating attack graphs is difficult to apply to the large-scale complex network system; this paper presents a scalable, bidirectional-based search strategy to generate attack...
The three dimensional spatial analysis applications of three dimensional GIS in Geology include slice up, palisade map constructing, virtual pit excavation, tunnel simulation etc. At present, these geological spatial analysis applications are implemented by distinct algorithm in different systems. However, those can come down to three dimensional Boolean operation between two spatial entities. Light...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.