首页 > 最新文献

2017 International Conference on Computing Intelligence and Information System (CIIS)最新文献

英文 中文
Optimality Conditions for Discrete Variational Problems 离散变分问题最优性条件
Fang-Di Kong
In this paper we consider optimality conditions for the following discrete variational problem: minimize J(x), subject to x(0), x(N). The necessary and sufficient condition for all feasible solutions satisfying the necessary optimality condition to be optimal solutions of the above problem is established.
本文考虑以下离散变分问题的最优性条件:最小化J(x),服从于x(0), x(N)。建立了满足必要最优性条件的所有可行解为上述问题最优解的充要条件。
{"title":"Optimality Conditions for Discrete Variational Problems","authors":"Fang-Di Kong","doi":"10.1109/CIIS.2017.65","DOIUrl":"https://doi.org/10.1109/CIIS.2017.65","url":null,"abstract":"In this paper we consider optimality conditions for the following discrete variational problem: minimize J(x), subject to x(0), x(N). The necessary and sufficient condition for all feasible solutions satisfying the necessary optimality condition to be optimal solutions of the above problem is established.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129363128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensing-Throughput Tradeoff in Cognitive Radio Network Based on High Activity of Primary User 基于主用户高活跃度的认知无线网络感知吞吐量权衡
H. Cao, Shou-yi Yang
Based on primary user traffic that the sensing-throughput tradeoff of secondary user has been investigated in cognitive radio network. In this paper, the method of discrete analysis and transition probabilities are used to derive the new formulas of probability and throughput in the higher grade of primary user activity. The probabilities of false alarm and detection are considered. When the active degree of primary user is increased to the channel state of primary user is able to change twice in one frame structure of secondary user, the throughput of secondary user decreases continuously.
研究了认知无线网络中基于主用户流量的次用户感知吞吐量权衡问题。本文利用离散分析和转移概率的方法,导出了主用户活动较高等级的概率和吞吐量的新公式。考虑了虚警和检测的概率。当主用户的活跃度增加到主用户的信道状态在副用户的一个帧结构中能发生两次变化时,副用户的吞吐量不断下降。
{"title":"Sensing-Throughput Tradeoff in Cognitive Radio Network Based on High Activity of Primary User","authors":"H. Cao, Shou-yi Yang","doi":"10.1109/CIIS.2017.64","DOIUrl":"https://doi.org/10.1109/CIIS.2017.64","url":null,"abstract":"Based on primary user traffic that the sensing-throughput tradeoff of secondary user has been investigated in cognitive radio network. In this paper, the method of discrete analysis and transition probabilities are used to derive the new formulas of probability and throughput in the higher grade of primary user activity. The probabilities of false alarm and detection are considered. When the active degree of primary user is increased to the channel state of primary user is able to change twice in one frame structure of secondary user, the throughput of secondary user decreases continuously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127223464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Discretization of Continuous Variables in Bayesian Networks Based on Matrix Decomposition 基于矩阵分解的贝叶斯网络连续变量离散化
Haiteng Fang, Hongji Xu, Hui Yuan, Yingming Zhou
Discretization of continuous variables (DCV) which could directly affect the results of Bayesian network inference (BNI) has been an important issue in Bayesian network (BN). Some common methods of DCV by the equal interval, the equal frequency, etc. always result in data loss which would make the results of BNI inaccurate. In this paper, a method of DCV in BN based on matrix decomposition is presented. This method could discretize the value of continuous variable into more states with different probability rather than one state, so it's more scientific and accurate. This paper makes a BN with two nodes, height and weight of each person, as an example and the simulation result demonstrates that the proposed method of DCV based on matrix decomposition can achieve discretization without data loss and ensure the accuracy of BNI.
连续变量(DCV)的离散化是贝叶斯网络中的一个重要问题,它直接影响贝叶斯网络的推理结果。常用的等间隔、等频率等DCV方法往往会造成数据丢失,从而导致BNI结果不准确。本文提出了一种基于矩阵分解的矩阵变换方法。该方法可以将连续变量的值离散为多个不同概率的状态,而不是一个状态,因此更加科学和准确。本文以每个人的身高和体重为两个节点的BN为例,仿真结果表明,本文提出的基于矩阵分解的DCV方法可以在不丢失数据的情况下实现离散化,保证了BNI的准确性。
{"title":"Discretization of Continuous Variables in Bayesian Networks Based on Matrix Decomposition","authors":"Haiteng Fang, Hongji Xu, Hui Yuan, Yingming Zhou","doi":"10.1109/CIIS.2017.36","DOIUrl":"https://doi.org/10.1109/CIIS.2017.36","url":null,"abstract":"Discretization of continuous variables (DCV) which could directly affect the results of Bayesian network inference (BNI) has been an important issue in Bayesian network (BN). Some common methods of DCV by the equal interval, the equal frequency, etc. always result in data loss which would make the results of BNI inaccurate. In this paper, a method of DCV in BN based on matrix decomposition is presented. This method could discretize the value of continuous variable into more states with different probability rather than one state, so it's more scientific and accurate. This paper makes a BN with two nodes, height and weight of each person, as an example and the simulation result demonstrates that the proposed method of DCV based on matrix decomposition can achieve discretization without data loss and ensure the accuracy of BNI.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121744535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks 一种基于格子的无线传感器网络公钥加密与密钥搜索方案
Fugeng Zeng
With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.
随着技术的飞速发展,无线传感器网络(WSNs)已经引起了学术界的广泛关注。然而,由于节点通信和计算能力的限制,传统的公钥加密算法不能有效地应用。随着后量子时代的到来,配对相关的假设变得脆弱。晶格是构建抗量子攻击的安全加密方案的理想选择。在此基础上,提出了一种基于格的公钥搜索加密方案。与现有的公共可搜索加密算法相比,本文提出的加密算法计算时间更少,安全级别更高。
{"title":"A Lattice-Based Public Encryption with Key Search Scheme for Wireless Sensor Networks","authors":"Fugeng Zeng","doi":"10.1109/CIIS.2017.27","DOIUrl":"https://doi.org/10.1109/CIIS.2017.27","url":null,"abstract":"With the rapid progress in technology, wireless sensor networks (WSNs) have attracted people's interest in the research community. However, due to the limited node communication and computing power, the traditional public key encryption algorithm can't be effectively applied. And as step into post-quantum era, pairing related assumption is fragile. Lattice is an ideal choice for building secure encryption scheme against quantum attack. Based on this, we propose a public encryption with key search scheme from lattice for wireless sensor networks. Compared with the existing public searchable encryption algorithm, the proposed encryption algorithm requires less computation time and achieves more security level.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132740194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Combined Forecasting Model of Traffic Flow Based on DGM(1,1) and GRNN 基于DGM(1,1)和GRNN的交通流联合预测模型
Zhiheng Yu, Kecheng Liu, Chengli Zhao, Y. Liu
In order to improve the prediction accuracy of traffic flow, this paper proposes a combined forecasting models with residual correction based on DGM(1,1). After introducing the modeling steps of DGM(1,1), DGM-GRNN combination model is established. In the model, the GRNN is used to predict the residual of DGM(1,1) model. Finally, we sum up the predict result of DGM(1,1) model and the residual correction model, and get the final prediction result of the combined forecasting model. We predicted the traffic flow of shangsan expressway by the model in this paper and then compared the results with the experimental results of DGM(1,1). The validity and feasibility of the proposed method are verified.
为了提高交通流的预测精度,本文提出了一种基于DGM(1,1)的残差校正组合预测模型。在引入DGM(1,1)的建模步骤后,建立了DGM- grnn组合模型。在模型中,使用GRNN来预测DGM(1,1)模型的残差。最后,对DGM(1,1)模型和残差修正模型的预测结果进行汇总,得到组合预测模型的最终预测结果。本文利用该模型对上三高速公路交通流进行了预测,并与DGM(1,1)的实验结果进行了比较。验证了该方法的有效性和可行性。
{"title":"Combined Forecasting Model of Traffic Flow Based on DGM(1,1) and GRNN","authors":"Zhiheng Yu, Kecheng Liu, Chengli Zhao, Y. Liu","doi":"10.1109/CIIS.2017.17","DOIUrl":"https://doi.org/10.1109/CIIS.2017.17","url":null,"abstract":"In order to improve the prediction accuracy of traffic flow, this paper proposes a combined forecasting models with residual correction based on DGM(1,1). After introducing the modeling steps of DGM(1,1), DGM-GRNN combination model is established. In the model, the GRNN is used to predict the residual of DGM(1,1) model. Finally, we sum up the predict result of DGM(1,1) model and the residual correction model, and get the final prediction result of the combined forecasting model. We predicted the traffic flow of shangsan expressway by the model in this paper and then compared the results with the experimental results of DGM(1,1). The validity and feasibility of the proposed method are verified.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"332 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134454027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Bid Evaluation Model in the Bidding Management for Power Grid Corporations 电网公司招投标管理中的评标模型研究
Xiaojing Wei, Caiyun Guo
Bid evaluation is the core in the bidding process. At present, a wide range of bid evaluation methods are adopted in the bidding process. On the basis of analyzing the characteristics of various bid evaluation methods, this paper established a new bid evaluation model. The model made some improvements and perfection in some important links, such as the establishment of the evaluation index system, the weight of the evaluation indexes and evaluating mathematical models. The whole process of bid evaluation was objectively described and the essence of the bid evaluation problem was factually reflected. It is conducive for the bidder to select the best bidding corporation through comprehensively evaluating the economic strength, technical strength and corporation reputation along with market behavior of the bidding corporations.
评标是招标过程中的核心环节。目前,在招投标过程中采用的评标方法多种多样。在分析各种评标方法特点的基础上,建立了一种新的评标模型。该模型在评价指标体系的建立、评价指标的权重和评价数学模型等重要环节进行了改进和完善。客观地描述了评标的全过程,真实地反映了评标问题的本质。通过对投标企业的经济实力、技术实力、企业声誉及市场行为进行综合评价,有利于投标人选择最优的投标企业。
{"title":"Research on Bid Evaluation Model in the Bidding Management for Power Grid Corporations","authors":"Xiaojing Wei, Caiyun Guo","doi":"10.1109/CIIS.2017.72","DOIUrl":"https://doi.org/10.1109/CIIS.2017.72","url":null,"abstract":"Bid evaluation is the core in the bidding process. At present, a wide range of bid evaluation methods are adopted in the bidding process. On the basis of analyzing the characteristics of various bid evaluation methods, this paper established a new bid evaluation model. The model made some improvements and perfection in some important links, such as the establishment of the evaluation index system, the weight of the evaluation indexes and evaluating mathematical models. The whole process of bid evaluation was objectively described and the essence of the bid evaluation problem was factually reflected. It is conducive for the bidder to select the best bidding corporation through comprehensively evaluating the economic strength, technical strength and corporation reputation along with market behavior of the bidding corporations.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115702084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm 基于三维模型的水印算法研究与实现
Aoshuang Dong, Rui Zeng
In this paper, a digital watermarking technique is proposed for 3D model. Through the three-dimensional model file model into a two-dimensional image, this paper uses watermark embedding in the transform domain of two - dimensional image to achieve 3D model copyright protection. First, the watermark embedding process is used to analyze the principal components, the normalization and the choice of the projection viewpoint. Then based on the X-axis projection to get three-dimensional model projection RGB color pictures. Wavelet transform, discrete cosine transform and singular value decomposition of the blind watermarking algorithm are used to carry out image transformation of two-dimensional images and embed watermark. Experimental results show that the invisibility of the watermark is higher in the 3D watermarking model and the capabilities of anti-rotation, anti-translation and anti-noise attack are stronger.
提出了一种针对三维模型的数字水印技术。通过将三维模型文件模型转化为二维图像,在二维图像的变换域中利用水印嵌入实现三维模型版权保护。首先,对水印嵌入过程进行主成分分析、归一化和投影视点的选择;然后基于x轴投影得到三维模型投影的RGB彩色图像。利用盲水印算法中的小波变换、离散余弦变换和奇异值分解对二维图像进行图像变换并嵌入水印。实验结果表明,该三维水印模型具有较高的水印不可见性,并且具有较强的抗旋转、抗平移和抗噪声攻击能力。
{"title":"Research and Implementation Based on Three-Dimensional Model Watermarking Algorithm","authors":"Aoshuang Dong, Rui Zeng","doi":"10.1109/CIIS.2017.47","DOIUrl":"https://doi.org/10.1109/CIIS.2017.47","url":null,"abstract":"In this paper, a digital watermarking technique is proposed for 3D model. Through the three-dimensional model file model into a two-dimensional image, this paper uses watermark embedding in the transform domain of two - dimensional image to achieve 3D model copyright protection. First, the watermark embedding process is used to analyze the principal components, the normalization and the choice of the projection viewpoint. Then based on the X-axis projection to get three-dimensional model projection RGB color pictures. Wavelet transform, discrete cosine transform and singular value decomposition of the blind watermarking algorithm are used to carry out image transformation of two-dimensional images and embed watermark. Experimental results show that the invisibility of the watermark is higher in the 3D watermarking model and the capabilities of anti-rotation, anti-translation and anti-noise attack are stronger.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114672270","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Research on Forecasting Model Based on Support Vector Machine and Discrete Grey System 基于支持向量机和离散灰色系统的预测模型研究
Chengli Zhao, Zhiheng Yu
In order to improve the prediction accuracy, this paper proposes a combined forecasting model based on the residual correction of DGM (1,1). After introducing the basic DGM(1,1) model and LSSVM regression model, DGM-LSSVM combination model is established. In this model, DGM(1, 1) is used to predict the original data sequence and obtain the predictive value and residual value. Then LSSVM model is used to correct the residual errors. Finally, the predicted results of DGM (1, 1) and residual correction of LSSVM model are combined, and the final prediction result is obtained by the combination forecasting model. Experimental results demonstrate that the proposed model has the advantages of effectiveness and feasibility.
为了提高预测精度,本文提出了一种基于DGM(1,1)残差校正的组合预测模型。在引入基本的DGM(1,1)模型和LSSVM回归模型后,建立了DGM-LSSVM组合模型。在该模型中,利用DGM(1,1)对原始数据序列进行预测,得到预测值和残值。然后利用LSSVM模型对残差进行校正。最后,将DGM(1,1)的预测结果与LSSVM模型的残差校正相结合,通过组合预测模型得到最终的预测结果。实验结果表明,该模型具有有效性和可行性。
{"title":"The Research on Forecasting Model Based on Support Vector Machine and Discrete Grey System","authors":"Chengli Zhao, Zhiheng Yu","doi":"10.1109/CIIS.2017.24","DOIUrl":"https://doi.org/10.1109/CIIS.2017.24","url":null,"abstract":"In order to improve the prediction accuracy, this paper proposes a combined forecasting model based on the residual correction of DGM (1,1). After introducing the basic DGM(1,1) model and LSSVM regression model, DGM-LSSVM combination model is established. In this model, DGM(1, 1) is used to predict the original data sequence and obtain the predictive value and residual value. Then LSSVM model is used to correct the residual errors. Finally, the predicted results of DGM (1, 1) and residual correction of LSSVM model are combined, and the final prediction result is obtained by the combination forecasting model. Experimental results demonstrate that the proposed model has the advantages of effectiveness and feasibility.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121134658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Robust Adaptive Optimization Algorithm for Stability Control of Electric Patrol Survey UAV 电动巡测无人机稳定性控制的鲁棒自适应优化算法
Zhifang Wang, Jie Shen, Xingjian Fu, Boyuan Chen
In this paper, a mathematical model of flight pattern and flight attitude is established and analyzed. The flight pattern of the power patrol flight is analyzed. Based on the original linear quadratic optimal control algorithm, the motion and optimal control model of the unmanned aerial vehicle (UAV) patrol process is established to meet the unmanned aerial vehicle (UAV) inspection constraints, then a linear quadratic optimization Control based optimal control algorithm is proposed. In this paper, four-rotor aircraft as an example for simulation research, different motion models with different optimization control, and add different interference signals and the corresponding filter algorithm for antijamming performance testing. The simulation results show that the UAV can obtain good control effect by the linear quadratic optimal control, and its stability and anti - jamming performance can be improved obviously.
本文建立并分析了飞行姿态与飞行模式的数学模型。分析了动力巡逻飞行的飞行模式。在原有线性二次优化控制算法的基础上,建立了无人机巡逻过程的运动和最优控制模型,以满足无人机的巡检约束,在此基础上提出了一种基于线性二次优化控制的最优控制算法。本文以四旋翼飞行器为例进行仿真研究,采用不同的运动模型进行不同的优化控制,并添加不同的干扰信号和相应的滤波算法进行抗干扰性能测试。仿真结果表明,采用线性二次型最优控制能获得较好的控制效果,其稳定性和抗干扰性能得到明显提高。
{"title":"Robust Adaptive Optimization Algorithm for Stability Control of Electric Patrol Survey UAV","authors":"Zhifang Wang, Jie Shen, Xingjian Fu, Boyuan Chen","doi":"10.1109/CIIS.2017.25","DOIUrl":"https://doi.org/10.1109/CIIS.2017.25","url":null,"abstract":"In this paper, a mathematical model of flight pattern and flight attitude is established and analyzed. The flight pattern of the power patrol flight is analyzed. Based on the original linear quadratic optimal control algorithm, the motion and optimal control model of the unmanned aerial vehicle (UAV) patrol process is established to meet the unmanned aerial vehicle (UAV) inspection constraints, then a linear quadratic optimization Control based optimal control algorithm is proposed. In this paper, four-rotor aircraft as an example for simulation research, different motion models with different optimization control, and add different interference signals and the corresponding filter algorithm for antijamming performance testing. The simulation results show that the UAV can obtain good control effect by the linear quadratic optimal control, and its stability and anti - jamming performance can be improved obviously.","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123963566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Non-orthogonal Pulse Shape Modulation for Wireless Relay D2D Communication 无线中继D2D通信的非正交脉冲形状调制
Jie Shen, Ou Wang, Jianguo Yu
This paper presents a novel multilevel Nonorthogonal Pulse Shape Modulation (NPSM) method, which based on the prolate spheroidal wave function (PSWF) and utilizes the spectral overlap to obtain the excellent power spectrum characteristic, and utilizes the complete characteristic of the frame function to effectively eliminate the inter symbol interference while improving the system band utilization rate. We also give the architecture used for D2D Non-Orthogonal Multiplex Access (NOMA) relay wireless system, which can be decoded by genetic algorithm. Through simulation different environments, it shows such codes have higher spectrum efficiency and 3dB out performance over the traditional QAM
本文提出了一种新的多电平非正交脉冲形状调制(NPSM)方法,该方法基于长球面波函数(PSWF),利用频谱重叠获得了优异的功率谱特性,并利用帧函数的完整特性有效地消除了码间干扰,同时提高了系统的频带利用率。本文还给出了D2D非正交多路接入(NOMA)中继无线系统的结构,该系统可以用遗传算法进行解码。通过对不同环境的仿真,表明该编码比传统的QAM具有更高的频谱效率和3dB输出性能
{"title":"Non-orthogonal Pulse Shape Modulation for Wireless Relay D2D Communication","authors":"Jie Shen, Ou Wang, Jianguo Yu","doi":"10.1109/CIIS.2017.63","DOIUrl":"https://doi.org/10.1109/CIIS.2017.63","url":null,"abstract":"This paper presents a novel multilevel Nonorthogonal Pulse Shape Modulation (NPSM) method, which based on the prolate spheroidal wave function (PSWF) and utilizes the spectral overlap to obtain the excellent power spectrum characteristic, and utilizes the complete characteristic of the frame function to effectively eliminate the inter symbol interference while improving the system band utilization rate. We also give the architecture used for D2D Non-Orthogonal Multiplex Access (NOMA) relay wireless system, which can be decoded by genetic algorithm. Through simulation different environments, it shows such codes have higher spectrum efficiency and 3dB out performance over the traditional QAM","PeriodicalId":254342,"journal":{"name":"2017 International Conference on Computing Intelligence and Information System (CIIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129162573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2017 International Conference on Computing Intelligence and Information System (CIIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1