学科分类
/ 1
3 个结果
  • 简介:Large-scaleMIMO(multiple-inputmultiple-output)systemswithnumerouslow-powerantennascanprovidebetterperformanceintermsofspectrumefficiency,powersavingandlinkreliabilitythanconventionalMIMO.Forlarge-scaleMIMO,thereareseveraltechnicalissuesthatneedtobepracticallyaddressed(e.g.,pilotpatterndesignandlow-powertransmissiondesign)andtheoreticallyaddressed(e.g.,capacitybound,channelestimation,andpowerallocationstrategies).Inthispaper,weanalyzethesumrateupperboundoflarge-scaleMIMO,investigateitskeytechnologiesincludingchannelestimation,downlinkprecoding,anduplinkdetection.Wealsopresentsomeperspectivesconcerningnewchannelmodelingapproaches,advanceduserschedulingalgorithms,etc.

  • 标签: MIMO技术 多输入多输出 信道估计 模式设计 上行链路 频谱效率
  • 简介:Invideoinformationretrieval,keyframeextractionhasbeenrecognizedasoneoftheimportantresearchissues.Althoughmuchprogresshasbeenmade,theexistingapproachesareeithercomputationallyexpensiveorineffectiveincapturingsalientvisualcontent.Inthispaper,wefirstdiscusstheimportanceofkeyframeextractionandthenbrieflyreviewandevaluatetheexistingapproaches.Toovercometheshortcomingeoftheexistingapproaches,weintroduceanewalgorithmforkeyframeextractionbasedonunsupervisedclustring.Meanwhile,weprovideafeedbackchaintoadjustthegranularityoftheextractionresult.Theproposedalgorithmisbothcomputationallysimpleandabletocapturethevisualcontent.Theefficiencyandeffectivenessarevalidatedbylargeamountofreal-worldvideos.

  • 标签: 数字视频 视频信息检索 反馈调整
  • 简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.

  • 标签: public-key ENCRYPTION IDENTITY-BASED HASH proof system