简介:Large-scaleMIMO(multiple-inputmultiple-output)systemswithnumerouslow-powerantennascanprovidebetterperformanceintermsofspectrumefficiency,powersavingandlinkreliabilitythanconventionalMIMO.Forlarge-scaleMIMO,thereareseveraltechnicalissuesthatneedtobepracticallyaddressed(e.g.,pilotpatterndesignandlow-powertransmissiondesign)andtheoreticallyaddressed(e.g.,capacitybound,channelestimation,andpowerallocationstrategies).Inthispaper,weanalyzethesumrateupperboundoflarge-scaleMIMO,investigateitskeytechnologiesincludingchannelestimation,downlinkprecoding,anduplinkdetection.Wealsopresentsomeperspectivesconcerningnewchannelmodelingapproaches,advanceduserschedulingalgorithms,etc.
简介:Inordertoovercomethepoorlocalsearchabilityofgeneticalgorithm,resultinginthebasicgeneticalgorithmistime-consuming,andlowsearchabilityinthelateevolutionary,weusethegraycodinginsteadofbinarycodingatthebeginningofthecoding;weusemulti-pointcrossovertoreplacetheoriginalsingle-pointcrossoveroperation.Finally,theexperimentshowsthattheimprovedgeneticalgorithmnotonlyhasastrongsearchcapability,butalsothestabilityhasbeeneffectivelyimproved.
简介:Invideoinformationretrieval,keyframeextractionhasbeenrecognizedasoneoftheimportantresearchissues.Althoughmuchprogresshasbeenmade,theexistingapproachesareeithercomputationallyexpensiveorineffectiveincapturingsalientvisualcontent.Inthispaper,wefirstdiscusstheimportanceofkeyframeextractionandthenbrieflyreviewandevaluatetheexistingapproaches.Toovercometheshortcomingeoftheexistingapproaches,weintroduceanewalgorithmforkeyframeextractionbasedonunsupervisedclustring.Meanwhile,weprovideafeedbackchaintoadjustthegranularityoftheextractionresult.Theproposedalgorithmisbothcomputationallysimpleandabletocapturethevisualcontent.Theefficiencyandeffectivenessarevalidatedbylargeamountofreal-worldvideos.
简介:Aimingattheproblemssuchasmorerepeatedlydesignandlongerdesigncycle,inthispaper,thesimilaritytheorywasintroducedtothedesignprocessofthekeystructuresofflotationmachine.TheimpellerandU-shapedtankofflotationmachinesystemwereanalyzedassimilarityunit.Meanwhile,thelevelofsimilarityoftheunitsandthesimilarityofthesystemwerecalculated.BasedontheanalysisoftheimpellerandthesizeofU-shapedtank,thesimilaritycriteriawerederived.Thederivedconclusionsare:(1)Therelationshipbetweenthediameteroftheimpellerandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriteriaoftheimpeller;(2)TherelationshipbetweentheratiobetweentheU-shapedtank’scross-sectionalareaandimpeller’sdiameterandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriterionsoftheU-shapedtank.Usingthesimilaritycriterioncombinedwithcomputertechnologyanddatabasetechnologytorealizepartandsystemserializationdesign.Theresultsshowthattheresearchcanavoidrepeatedlydesign,shortendesigncycle,andraisethedesignefficiency.
简介:Opticalmotioncaptureisanincreasinglypopularanimationtechnique.Inthelastfewyears,plentyofmethodshavebeenproposedforkey-frameextractionofmotioncapturedata,anditisacommonmethodtoextractkey-frameusingquaternion.Here,onemaindifficultyisduetothefactthatpreviousalgorithmsoftenneedtomanuallysetvariousparameters.Inaddition,itisproblematictopredefinetheappropriatethresholdwithoutknowingthedatacontent.Inthispaper,wepresentanoveladaptivethreshold-basedextractionmethod.Key-framecanbefoundaccordingtoquaterniondistance.Weproposeasimpleandefficientalgorithmtoextractkey-framefromamotionsequencebasedonadaptivethreshold.Itisconvenientwithnoneedtopredefineparameterstomeetcertaincompressionratio.Experimentalresultsofmanymotioncaptureswithdifferenttraitsdemonstrategoodperformanceoftheproposedalgorithm.Ourexperimentsshowthatonecantypicallycutdowntheprocessofextractionfromseveralminutestoacoupleofseconds.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.