183 research outputs found
3-Uniform states and orthogonal arrays
In a recent paper (Phys. Rev. A 90, 022316 (2014) ), Goyeneche et al.
established a link between the combinatorial notion of orthogonal arrays and
k-uniform states and present open issue. (B) Find for what N there are
3-uniform states of N-qubits. In this paper, we demonstrate the existence of
3-uniform states of N-qubits for N=11,..,15"
Enhanced Gradient-Based Local Feature Descriptors by Saliency Map for Egocentric Action Recognition
Egocentric video analysis is an important tool in healthcare that serves a variety of purposes, such as memory aid systems and physical rehabilitation, and feature extraction is an indispensable process for such analysis. Local feature descriptors have been widely applied due to their simple implementation and reasonable efficiency and performance in applications. This paper proposes an enhanced spatial and temporal local feature descriptor extraction method to boost the performance of action classification. The approach allows local feature descriptors to take advantage of saliency maps, which provide insights into visual attention. The effectiveness of the proposed method was validated and evaluated by a comparative study, whose results demonstrated an improved accuracy of around 2%
Seeing is Believing: Detecting Sybil Attack in FANET by Matching Visual and Auditory Domains
The flying ad hoc network (FANET) will play a crucial role in the B5G/6G era
since it provides wide coverage and on-demand deployment services in a
distributed manner. The detection of Sybil attacks is essential to ensure
trusted communication in FANET. Nevertheless, the conventional methods only
utilize the untrusted information that UAV nodes passively ``heard'' from the
``auditory" domain (AD), resulting in severe communication disruptions and even
collision accidents. In this paper, we present a novel VA-matching solution
that matches the neighbors observed from both the AD and the ``visual'' domain
(VD), which is the first solution that enables UAVs to accurately correlate
what they ``see'' from VD and ``hear'' from AD to detect the Sybil attacks.
Relative entropy is utilized to describe the similarity of observed
characteristics from dual domains. The dynamic weight algorithm is proposed to
distinguish neighbors according to the characteristics' popularity. The
matching model of neighbors observed from AD and VD is established and solved
by the vampire bat optimizer. Experiment results show that the proposed
VA-matching solution removes the unreliability of individual characteristics
and single domains. It significantly outperforms the conventional RSSI-based
method in detecting Sybil attacks. Furthermore, it has strong robustness and
achieves high precision and recall rates.Comment: 7 pages, 9 figures, 1 tabl
Dual Identities Enabled Low-Latency Visual Networking for UAV Emergency Communication
The Unmanned Aerial Vehicle (UAV) swarm networks will play a crucial role in
the B5G/6G network thanks to its appealing features, such as wide coverage and
on-demand deployment. Emergency communication (EC) is essential to promptly
inform UAVs of potential danger to avoid accidents, whereas the conventional
communication-only feedback-based methods, which separate the digital and
physical identities (DPI), bring intolerable latency and disturb the unintended
receivers. In this paper, we present a novel DPI-Mapping solution to match the
identities (IDs) of UAVs from dual domains for visual networking, which is the
first solution that enables UAVs to communicate promptly with what they see
without the tedious exchange of beacons. The IDs are distinguished dynamically
by defining feature similarity, and the asymmetric IDs from different domains
are matched via the proposed bio-inspired matching algorithm. We also consider
Kalman filtering to combine the IDs and predict the states for accurate
mapping. Experiment results show that the DPI-Mapping reduces individual
inaccuracy of features and significantly outperforms the conventional
broadcast-based and feedback-based methods in EC latency. Furthermore, it also
reduces the disturbing messages without sacrificing the hit rate.Comment: 6 pages, 6 figure
- …