简介:Large-scaleMIMO(multiple-inputmultiple-output)systemswithnumerouslow-powerantennascanprovidebetterperformanceintermsofspectrumefficiency,powersavingandlinkreliabilitythanconventionalMIMO.Forlarge-scaleMIMO,thereareseveraltechnicalissuesthatneedtobepracticallyaddressed(e.g.,pilotpatterndesignandlow-powertransmissiondesign)andtheoreticallyaddressed(e.g.,capacitybound,channelestimation,andpowerallocationstrategies).Inthispaper,weanalyzethesumrateupperboundoflarge-scaleMIMO,investigateitskeytechnologiesincludingchannelestimation,downlinkprecoding,anduplinkdetection.Wealsopresentsomeperspectivesconcerningnewchannelmodelingapproaches,advanceduserschedulingalgorithms,etc.
简介:Inordertoovercomethepoorlocalsearchabilityofgeneticalgorithm,resultinginthebasicgeneticalgorithmistime-consuming,andlowsearchabilityinthelateevolutionary,weusethegraycodinginsteadofbinarycodingatthebeginningofthecoding;weusemulti-pointcrossovertoreplacetheoriginalsingle-pointcrossoveroperation.Finally,theexperimentshowsthattheimprovedgeneticalgorithmnotonlyhasastrongsearchcapability,butalsothestabilityhasbeeneffectivelyimproved.
简介:Invideoinformationretrieval,keyframeextractionhasbeenrecognizedasoneoftheimportantresearchissues.Althoughmuchprogresshasbeenmade,theexistingapproachesareeithercomputationallyexpensiveorineffectiveincapturingsalientvisualcontent.Inthispaper,wefirstdiscusstheimportanceofkeyframeextractionandthenbrieflyreviewandevaluatetheexistingapproaches.Toovercometheshortcomingeoftheexistingapproaches,weintroduceanewalgorithmforkeyframeextractionbasedonunsupervisedclustring.Meanwhile,weprovideafeedbackchaintoadjustthegranularityoftheextractionresult.Theproposedalgorithmisbothcomputationallysimpleandabletocapturethevisualcontent.Theefficiencyandeffectivenessarevalidatedbylargeamountofreal-worldvideos.
简介:Aimingattheproblemssuchasmorerepeatedlydesignandlongerdesigncycle,inthispaper,thesimilaritytheorywasintroducedtothedesignprocessofthekeystructuresofflotationmachine.TheimpellerandU-shapedtankofflotationmachinesystemwereanalyzedassimilarityunit.Meanwhile,thelevelofsimilarityoftheunitsandthesimilarityofthesystemwerecalculated.BasedontheanalysisoftheimpellerandthesizeofU-shapedtank,thesimilaritycriteriawerederived.Thederivedconclusionsare:(1)Therelationshipbetweenthediameteroftheimpellerandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriteriaoftheimpeller;(2)TherelationshipbetweentheratiobetweentheU-shapedtank’scross-sectionalareaandimpeller’sdiameterandthevolumeofthetankwaspowerfunctionandcalculatedasthesimilaritycriterionsoftheU-shapedtank.Usingthesimilaritycriterioncombinedwithcomputertechnologyanddatabasetechnologytorealizepartandsystemserializationdesign.Theresultsshowthattheresearchcanavoidrepeatedlydesign,shortendesigncycle,andraisethedesignefficiency.
简介:Opticalmotioncaptureisanincreasinglypopularanimationtechnique.Inthelastfewyears,plentyofmethodshavebeenproposedforkey-frameextractionofmotioncapturedata,anditisacommonmethodtoextractkey-frameusingquaternion.Here,onemaindifficultyisduetothefactthatpreviousalgorithmsoftenneedtomanuallysetvariousparameters.Inaddition,itisproblematictopredefinetheappropriatethresholdwithoutknowingthedatacontent.Inthispaper,wepresentanoveladaptivethreshold-basedextractionmethod.Key-framecanbefoundaccordingtoquaterniondistance.Weproposeasimpleandefficientalgorithmtoextractkey-framefromamotionsequencebasedonadaptivethreshold.Itisconvenientwithnoneedtopredefineparameterstomeetcertaincompressionratio.Experimentalresultsofmanymotioncaptureswithdifferenttraitsdemonstrategoodperformanceoftheproposedalgorithm.Ourexperimentsshowthatonecantypicallycutdowntheprocessofextractionfromseveralminutestoacoupleofseconds.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.
简介:在中职教育中对于计算机信息技术的教学,能够对以后的职业生涯打下良好的基础,在中职教育中对于图像处理软件教学在以后学生们的工作实践中会有较大的帮助,而在所有图像处理软件中,Photoshop是一款功非常强大,并且在图像处理和设计领域的应用比较广阔,因此,在Photoshop教学中,有效传授给学生重要软件操作技巧,和设计方法,对于今后学生在职业选择方面上有比较广阔的选择权,可以从事相关Photoshop的很多职位。