The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In a conventional cellular wireless networks, single cell processing (SCP) is usually considered where inter-cell interference is treated as noise. As we know, interference can cause severe information leakage for secret communication, the paper studies the secrecy performance with coordination beamforming (CBf) scheme in the downlink of a two-cell multi-user MIMO (MU-MIMO) cellular network. For CBf,...
In the paper, we study the problem of secure connectivity in general Multiple input and Multiple output (MIMO) stochastic networks, where legitimate users and eavesdroppers are equipped with multi antennas, and designed to distribute on a two- dimensional plane according to two independent Poisson point process(PPP)s. The non-colluding and colluding eavesdroppers scenarios are considered. Transmit-receive...
Consider secure transmissions over the downlink of a multiuser MISO system with independent confidential messages, each of which is intended for one of the users and should keep secret from others. We are interested in a scenario where users have individual secrecy rate requirements. This scenario is practical but has drawn little attention in the literature so far. In this paper, we propose a secrecy...
In this paper, an affine invariant weighted method is proposed to estimate affine transformation parameters. Affine covariant images are constructed from the original image by assigning an affine invariant weight to each point in the image. Based on the first order moment of these affine covariant images, a system of linear equations is constructed to estimate the affine transformation parameters...
The filtering for target tracking is discussed in the paper, in order to find a method with better accuracy and reliability than extended kalman(EKF) filtering and unscented kalman filtering(UKF), this paper built a non-linear system model - turn model, then a method of auxiliary particle filters combination with data fusion is proposed. Auxiliary particle filtering for character of the turn model...
To solve the problems of most communication signals modulation recognition methods' computational complexity and classifier training difficulties, a method of modulation recognition is proposed based on particle swarm optimization(PSO) and support vector machine (SVM). Combine wavelet decomposition theory with the modulated signals' instantaneous characteristics, high-order cumulants and fractal theory...
RFID systems, especially the UHF RFID systems which work in the frequency range 860-960MHz, are regarded as a bridge to connect the physical world and the cyber space. One main challenge which affects the universal adoption of the RFID systems is the efficient resolution of the tag collision and the rapid identification of tags. In this paper, time efficiency is proposed as an important metric to...
In this paper, a combination method is presented to estimate the PN sequence's period of the direct sequence spread spectrum (DSSS) signal in strong narrow-band interference environment. An overlapping windowed FFT algorithm is first used to transform the received data signals to the frequency-domain where the elimination or drastical attenuation of the strong narrow-band interference is performed...
The widely use of cooled storage technology in our country will be an irreversible trend with the development and improvement of the TOU price policy. Naturally stratified Chilled water-storage is a very important cool storage technology. In this paper, the effect of using uniform flow orifice in naturally stratified water-storage with slotted pipe diffuser is studied by contrast experiments firstly...
The power consumption of air conditioner is the major reason for load peak and off-peak difference in power system, and the cooling storage technology used in air conditioner can improve the power supply and demand. The most popular cooling storage technology in air conditioner is the water stratification method. In this paper, a cuboid water pool is employed to analyze the influence of Reynolds Number...
A method for the direction of arrival (DOA) estimation of coherent wideband linear frequency modulated (LFM) signals is researched based on fractional Fourier transform (FRFT) and virtual array transform. In this algorithm, the observed signals are first transformed to fractional Fourier domain, and then construct correlation signals matrix of the fractional Fourier domain, and the decorrelation ability...
Based on the dataset of the male Visible Human and the VOXEL-MAN software, original work for 3D representation of acupoints and acupuncture treatment has been reported. To get a realistic model, segmentation is one of the most important procedures in the whole process. The interactive segmentation of objects on the basis of ellipsoidal regions in RGB-space greatly enhances the realism of 3D reconstructions...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.