The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Inter-cell interference is one of important factors in drone small cells (DSCs). However, most works investigated the network performance of DSC networks with an assumption of interference-free. To achieve a realistic analysis, we analyze the coverage probability and achievable rate of DSC networks under inter-cell interference. However, the air-to-ground channel between DSCs and ground users consists...
In recent years, unmanned aerial vehicle(UAV) has been developing rapidly which is also widely concerned in the military field, but the research on the communication services for the battlefield is seriously lack of development. Multi-UAV cooperative applications have better performance than single UAV, but the cooperative communication problems between UAVs need to be solved urgently. Therefore,...
The quasi-optical network (QON) system generally requires that it has a feature of multi-frequency and multi-polarization for transmitting or receiving more channels in a small space to reduce the satellite load. The wire grid polarizer (WGP) can be mainly used into separating double different signals with horizontal polarization or vertical polarization. Due to its frequency irrelevant attribute,...
Subspace learning has been widely used in signal processing, machine learning, computer vision and so on. Matrix rank minimizing is a fundamental model. Nuclear norm is a convex relaxation for rank minimizing. In this paper, we propose a polynomial function to smoothen the nuclear norm. Lagrange multipliers method is employed to solve the problem. The optimal solution is obtained by iterative procedure...
Image segmentation is a fundamental problem in image processing and computer vision. Its goal is to separate an image into a collection of distinct regions, after which other high-level tasks can be performed. Nomalized cut (Ncut) algorithm is the most popular one in image segmentation algorithms. However, the number of segmentation regions needs to be specified by users or experts before the Ncut...
Counterfeit integrated circuits (ICs) have posed a major security and safety threat on commercial and mission-critical systems. In this paper, we propose to develop a comprehensive counterfeit ICs detection and prevention strategy, consisting of an innovative multi-functional on-chip sensor and a related post-fabrication authentication methodology. We target at many counterfeit ICs including the recycled/remarked/out-of-spec...
Web browsing is an activity that billions of mobile users perform on a daily basis. Battery life is a primary concern to many mobile users who often find their phone has died at most inconvenient times. The heterogeneous multi-core architecture is a solution for energy-efficient processing. However, the current mobile web browsers rely on the operating system to exploit the underlying hardware, which...
We consider nonlinear transceiver design for downlink multiuser multi-antenna secure communications with an external multi-antenna eavesdropper. The multi-antenna transmitter simultaneously transmits confidential-message-bearing signals and artificial noise (AN) using nonlinear Tomlinson Harashima precoding based on the limited channel state information feedback. For the proposed nonlinear secure...
Due to the agility, low-cost and robustness, UAV (Unmanned Aerial Vehicle) Ad Hoc Networks formed by small UAVs have popular application in the battlefield. Considering the high mobility of UAV which may exit and join in the networks frequently, random access is critical for UAV Ad Hoc Networks. Due to the complex and serious electromagnetic environment in the battlefield, how to identify the MAC...
A FEM simulation of AFM indentation of soft biomaterials was made in ANSYS based on five-parameter hyperelastic Mooney Rivlin model. The simulation result shows that: The finite thickness film behavior is stiffer than the thicker film at larger indentations.
A diagnostic system was setup to test the ferroelectric micro-plasma thruster(FMPT). The V-I characteristic of the FMPT was measured. The optical spectrum of microplasma generated in FMPT was obtained. Additionally, the electron temperature has been found to be ∼3.43 eV from atomic Boltzmann plots of neutral Ag I lines.
MicroRNAs (miRNAs) are 21–24 nucleotide riboregulators, which selectively repress gene expression through transcript cleavage and/or translational inhibition. It was thought that most plant miRNAs act through target transcript cleavage due to the high degree of complementarity between miRNAs and their targets. However, recent studies have suggested widespread translational inhibition by miRNAs in...
In order to fit well into the heterogeneous MANET, various protocols have been proposed, and these protocols can be divided into two types, “flat” and “hierarchical” routing, according to their routing structure. Generally, “flat” routing protocols like OLSR, which can't distinguish the difference in performance among different interfaces and make best use of the higher capacity links, do not scale...
Data centers have been widely used in many pervasive computing applications. This paper shows the cost-aware virtual machine allocation problem for off-grid green data centers is an integer programming problem which is NP-hard. The paper presents a cost-aware virtual machine allocation algorithm which attempts to utilize renewable energy sources and minimize the energy cost of fossil fuel while maintaining...
Due to the agility and low-cost, small Unmanned Aerial Vehicle (UAV) has recently captured great attention of academia and industry. However, since the capability limitation of single device, an ad hoc network formed by small UAVs is very promising. But compared to ordinary ad hoc networks, because of the unmanned characteristic and the diversity of missions, the protocols of UAV ad hoc networks require...
We present an advanced dialog state tracking system designed for the 5th Dialog State Tracking Challenge (DSTC5). The main task of DSTC5 is to track the dialog state in a human-human dialog. For each utterance, the tracker emits a frame of slot-value pairs considering the full history of the dialog up to the current turn. Our system includes an encoder-decoder architecture with an attention mechanism...
Traffic offloading and Long Term Evaluation Unlicensed (LTE-U) are two significant techniques proposed to cope with the ongoing heavy burden of cellular wireless networks. Though many works has focused on developing coexistence mechanisms for WiFi and LTE-U on the unlicensed bands, much less have paid the attention to offload traffic from LTE-U to WiFi. In this paper, we consider the maximization...
In this paper, a novel sliding mode (SM) control is developed for vehicle lane keeping. The proposed SM controller can enable the vehicle to track the reference road center-line and yaw direction with zero errors. The idea behind the SM controller are as follows: first, lateral vehicle dynamics system is divided into two subsystems. Lateral position error dynamics system is recognized as a predominant...
In this paper, a sliding mode learning controller is developed for connection-oriented communication networks. Firstly, a networking system is modelled as discrete-time nth-order dynamic system subject to time-varying delay, the congestion control problem in communication networks is then addressed by adopting a novel sliding mode learning controller. The proposed learning controller not only suppresses...
Authentication based access control and integrity constraints are the major approaches applied in commercial database systems to guarantee information and data integrity. However, due to operational mistakes, malicious intent of insiders or identity fraud exploited by outsiders, data secured in a database can still be corrupted. Once attacked, database systems using current survivability technologies...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.