Abstract: With the improvement of the informatization degree of various industries in the national economy and the deep cross integration between industries, the Cyber-Physical System (CPS) is becoming the key technology to support this development. It is also...
Abstract: In this paper, based on linear filter, a deep Reinforcement Learning (RL) strategy is proposed, then a novel intelligent control method is put forward for quadrotor Unmanned Aerial Vehicles (UAVs), which improves effectively the robustness against di...
Abstract: The resource scheduling method of 5G URLLC (Ultra-Reliable and Low Latency Communication) is studied in this paper to assure the Quality of Service (QoS) of various power business, which utilizes the limited spectrum and power in low-band cellular co...
Abstract: Edge caching mechanism for heterogeneous network is one of the reliable technologies to solve the excessive link load of the traditional backhaul mechanism, but the existing caching policies often can not match the popularity of the required data. To...
Abstract: As an important confidential attribute, state opacity can characterize the ability of intruders to steal system privacy information. For the Cyber Physical Systems (CPSs) with unobservable events, an algebraic state space method based on the Semi-Ten...
Abstract: In order to solve the problem of exact matching between scholars and articles, a new method of author name disambiguation is proposed based on semi-supervised learning with graph convolutional network. In this method, the SciBERT pre-training languag...
Abstract: Recommendation systems based on reviews generally use convolutional neural networks to identify the semantics. However, due to the “invariance” of convolutional neural networks, that is, they only pay attention to the existence of features and ignore...
Abstract: The intelligent Particle Filter (PF) based on the genetic algorithm can reduce particle degradation. An adaptive processing strategy for low weight particles is proposed for an Intelligent Particle Filter (IPF) based on the genetic algorithm. After t...
Abstract: Freezing of Gait (FoG) is a common symptom among patients with Parkinson’s Disease (PD). In this paper, a vision-based method is proposed to recognize automatically the shuffling step symptom from the Timed Up-and-Go (TUG) videos based. In this metho...
Abstract: Establishing correspondence between the target model and the input image is an important step for the pose estimation of non-cooperative space target. Current methods always rely on complex image features and generation of candidate, which can be cos...
Abstract: In order to reduce the communication cost of classic Gossip algorithm for information dissemination, an improved Gossip algorithm BEBG (Gossip with Binary Exponential Backoff) is proposed, which combines the binary exponential backoff algorithm with ...
Abstract: To solve the problem that the doctors' clinical experience is not fully integrated into the algorithm design in PET-CT lung tumor segmentation, a hybrid active contour model named RSF_ML based on variational level set is proposed by combining with th...
Abstract: AI+thermal imaging human body temperature monitoring system is widely used for real-time temperature measurement of human body in dense crowds. The artificial intelligence method used in such systems detects the human head region for temperature meas...
Abstract: Due to the absorption and scattering, color degradation and detail blurring often occur in underwater images, which will affect the underwater visual tasks. A multi-scale underwater image enhancement network based on attention mechanism is designed i...
Abstract: The knowledge graph as auxiliary information can effectively alleviate the cold start problem of traditional recommendation models. But when extracting structured information, the existing models ignore the neighbor relationship between entities in t...
Abstract: Hashing is widely used for image retrieval tasks. In view of the limitations of existing deep supervised hashing methods, a new Asymmetric Supervised Deep Discrete Hashing (ASDDH) method is proposed to maintain the semantic structure between differen...
Abstract: To tackle the problem that the existing channel attention mechanism uses global average pooling to generate channel-wise statistics while ignoring its local spatial information, two improved channel attention modules are proposed for human action rec...
Abstract: With the high-speed development of Location-Based Social Networking (LBSN) technology, Point-Of-Interest(POI) recommendation for providing personalized services to mobile users has become the focus of attention. Because POI recommendation is faced wi...
Abstract: To improve the spectrum efficiency of the Unmanned Aerial Vehicle (UAV) relaying communication systems, a UAV alternate relay scheme is proposed, where two UAV relays alternately forward information from the source to the destination. To coordinate t...
Abstract: Combing Mobile Edge Computing (MEC) and Non-Orthogonal Multiple Access (NOMA) technologies while considering fairness, this paper studies the fair energy efficiency of the MEC system using NOMA partial offloading. First, the ratio of user rate to pow...
Abstract: Multiple-Input Multiple-Output (MIMO)-based Heterogeneous Network (HetNet) can improve system capacity and achieve more connectivity, which is dramatically concerned by academia and industry. Therefore, it becomes one of the key technologies in the n...
Abstract: In order to improve the security of Non-Orthogonal Multiple Access (NOMA) based Mobile Edge Computation (MEC) system when computation tasks are partially offloading, the physical layer security of MEC network in the presence of eavesdroppers is consi...
Abstract: To solve the problem of the abnormal performance of multiple service function chains caused by the failure of the underlying physical node under the 5G end-to-end network slicing scenario, a service function chain fault diagnosis algorithm based on D...
Abstract: A three-level name lookup method based on deep Bloom filter is proposed to improve the searching efficiency of content name in the routing progress of the Named Data Networking (NDN). Firstly, in this method, the Long Short Term Memory (LSTM) is comb...
Abstract: Considering dealing with the problem of random and dynamic communication requests of ground users in a UAV(Unmanned Aerial Vehicle) mounted base station communication system, which can not be tackled by an offline trajectory design scheme, an online ...
Abstract: To improve the bit error rate performance of LoRa (Long Range) in fading channels, a lightweight Enhanced Long Range (EnLoRa) physical layer is designed. First, Cyclic Code Shift Keying (CCSK) is chosen as the error correction code, and the diagonal ...
Abstract: In order to alleviate the pressure of terminal devices to deal with the big-data and low-delay services, a resource allocation algorithm is studied for mobile edge computing networks with full-duplex relays. Firstly, the constraints of the maximum ta...
Abstract: The essence of network security is confrontation. In view of at the problem that the existing research lacks to analyze the relationship between network attack and defense behavior and situation evolution from the perspective of game, a Network Attac...
Abstract: The Direction Of Arrival (DOA) estimation is a hot topic for a monostatic Multiple Input Multiple Output (MIMO) radar in recent years. The conventional Estimation of Signal Parameters via Rotational Invariance Technique (ESPRIT) algorithms need to pa...
Abstract: When the airborne weather radar detects low-altitude wind shear in a complex terrain environment, the non-uniform characteristics of ground clutter make it difficult to accurately obtain clutter statistical characteristics, which in turn affects the ...
Abstract: In view of the phenomenon that the navigation receiver loses tracking of the satellites due to ElectroMagnetic Interference (EMI) in the complex battlefield electromagnetic environment, the effect prediction model of the navigation receiver’ tracking...
Abstract: Soil materials can exhibit strongly dispersive properties in the operating frequency range of a physical system, and the uncertain parameters of the dispersive materials introduce uncertainties in the simulation result of propagating waves. It is ess...
Abstract: The Robust Principal Component Analysis (RPCA) based speech enhancement algorithm plays an important role for single channel speech processing in white Gaussian noise environment, but it has a poor processing effect on low-rank speech components and ...
Abstract: Under certain environmental conditions, when the measurement equation of the system is not verified or calibrated, the use of the measurement equation will often produce unknown system errors, resulting in large filtering errors. Similarly, when the ...
Abstract: The underdetermined Direction Of Arrival (DOA) estimation method based on the coprime array will degrade in the presence of nonuniform noise. To address this problem, a robust DOA estimation method based on covariance matrix reconstruction and matrix...
Abstract: In this paper, a method of beam pattern optimization based on Radial Basis Function Neural Network (RBFNN) is proposed for controlling sidelobe level of arbitrary geometry array. The proposed method takes advantage of the nonlinear mapping between th...
Abstract: In order to adapt to various array layouts, a direction-finding method with arbitrary planar array interferometer based on mixed baselines is proposed. Firstly, based on the analysis of the mathematical model without phase ambiguity, the direction-fi...
Abstract: Seismic signal is of great significance in the detection of geological lithology, reservoir, fluid and sedimentary facies, as well as the identification of stratigraphic interface, reservoir analysis, seismic data processing and interpretation. In vi...
Abstract: To improve the effective resolution of the Time-Interleaved Analog-to-Digital Converter (TIADC), it is necessary to estimate and compensate the linear/non-linear mismatch error between its channels. An adaptive blind correction algorithm is proposed ...
Abstract: A new low complexity and reconfigurable Low Density Parity Check (LDPC) encoder design based on the Consultative Committee for Space Data Systems (CCSDS) standard is proposed to meet the high throughput, low latency and high reliability requirement f...
Abstract: The power output curve of the photovoltaic array exhibits multi-peak characteristics under partial shading conditions, and the traditional control algorithm can not track the maximum power point continuously and accurately. A method for tracking the ...
Abstract: A high-performance crypto module prescribed in this paper offers advanced security solutions in big data applications. A module architecture, which consists of a high throughput interface, Central Manage & Monitor Module (CMMM) and multiple chann...
Abstract: In distributed storage system, when a node fails, Locally Repairable Code (LRC) can access other nodes to recover data. However, the locality of LRC is not the same. Quaternary LRC with short code length and small locality is constructed. When code l...
Abstract: In order to study the dynamic behavior of memristor switch circuit, a memristor-based switched chaotic circuit with multiple coexisting attractors is designed. There exists multiple attractor bifurcation in this circuit system. When boundary collisio...
Abstract: Digital image encryption algorithm based on chaos is widely used because of its large key space and high key sensitivity. The sinusoidal feedback is introduced into the classical Logistic mapping to form a new discrete mapping, and the chaotic behavi...