19 research outputs found

    DAFNet: A dual attention-guided fuzzy network for cardiac MRI segmentation

    Get PDF
    Background: In clinical diagnostics, magnetic resonance imaging (MRI) technology plays a crucial role in the recognition of cardiac regions, serving as a pivotal tool to assist physicians in diagnosing cardiac diseases. Despite the notable success of convolutional neural networks (CNNs) in cardiac MRI segmentation, it remains a challenge to use existing CNNs-based methods to deal with fuzzy information in cardiac MRI. Therefore, we proposed a novel network architecture named DAFNet to comprehensively address these challenges. Methods: The proposed method was used to design a fuzzy convolutional module, which could improve the feature extraction performance of the network by utilizing fuzzy information that was easily ignored in medical images while retaining the advantage of attention mechanism. Then, a multi-scale feature refinement structure was designed in the decoder portion to solve the problem that the decoder structure of the existing network had poor results in obtaining the final segmentation mask. This structure further improved the performance of the network by aggregating segmentation results from multi-scale feature maps. Additionally, we introduced the dynamic convolution theory, which could further increase the pixel segmentation accuracy of the network. Result: The effectiveness of DAFNet was extensively validated for three datasets. The results demonstrated that the proposed method achieved DSC metrics of 0.942 and 0.885, and HD metricd of 2.50mm and 3.79mm on the first and second dataset, respectively. The recognition accuracy of left ventricular end-diastolic diameter recognition on the third dataset was 98.42%. Conclusion: Compared with the existing CNNs-based methods, the DAFNet achieved state-of-the-art segmentation performance and verified its effectiveness in clinical diagnosis

    Multi-Antenna Jammer-Assisted Secure Short Packet Communications in IoT Networks

    No full text
    In this work, we exploit a multi-antenna cooperative jammer to enable secure short packet communications in Internet of Things (IoT) networks. Specifically, we propose three jamming schemes to combat eavesdropping, i.e., the zero forcing beamforming (ZFB) scheme, null-space artificial noise (NAN) scheme, and transmit antenna selection (TAS) scheme. Assuming Rayleigh fading, we derive new closed-form approximations for the secrecy throughput with finite blocklength coding. To gain further insights, we also analyze the asymptotic performance of the secrecy throughput in the case of infinite blocklength. Furthermore, we investigate the optimization problem in terms of maximizing the secrecy throughput with the latency and reliability constraints to determine the optimal blocklength. Simulation results validate the accuracy of the approximations and evaluate the impact of key parameters such as the jamming power and the number of antennas at the jammer on the secrecy throughput

    Advances in Software-Defined Technologies for Underwater Acoustic Sensor Networks: A Survey

    No full text
    Underwater Acoustic Sensor Networks (UASNs) are an important technical means to explore the ocean realm. However, most UASNs rely on hardware infrastructures with poor flexibility and versatility. The systems typically deploy in a redundant manner, which not only leads to waste but also causes serious signal interference due to multiple noises in designated underwater regions. Software-Defined Networking (SDN) is a novel network paradigm, which provides an innovative approach to improve flexibility and reduce development risks greatly. Although SDN and UASNs are hot topics, there are currently few studies built on both. In this paper, we provide a comprehensive review on the advances in software-defined UASNs. First, we briefly present the background, and then we review the progress of the Software-Defined Radio (SDR), Cognitive Radio (CR), and SDN. Next, we introduce the current issues and potential research areas. Finally, we conclude the paper and present discussions. Based on this work, we hope to inspire more active studies and take a further step on software-defined UASNs with high performances

    Optimal Channel Training Design for Secure Short-Packet Communications

    No full text
    Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes

    Optimal Channel Training Design for Secure Short-Packet Communications

    No full text
    Physical layer security is a promising technique to ensure the confidentiality of short-packet communications, since no additional channel uses are needed. Motivated by the fact of finite coding blocklength in short-packet communications, we attempt to investigate the problem of how many the channel uses utilized for channel training should be allocated to perform secure communications. Based on the finite blocklength information theory, we derive a closed-form expression to approximate the average achievable secrecy throughput. To gain more insights, we also present the asymptotic average secrecy throughput under two special cases, i.e., high signal-to-noise ratio (SNR) and infinite blocklength. Moreover, we determine the optimal channel training length to maximize the average secrecy throughput under the reliability constraint and given blocklength. Numerical results are provided to validate the analysis and demonstrate that the performance gain achieved by the optimal channel training length is remarkable, relative to other benchmark schemes

    Quantum Cutting in KGd(CO<sub>3</sub>)<sub>2</sub>:Tb<sup>3+</sup> Green Phosphor

    No full text
    Phosphors with a longer excitation wavelength exhibit higher energy conversion efficiency. Herein, quantum cutting KGd(CO3)2:Tb3+ phosphors excited by middle-wave ultraviolet were synthesized via a hydrothermal method. All the KGd(CO3)2:xTb3+ phosphors remain in monoclinic structures in a large Tb3+ doping range. In the KGd(CO3)2 host, 6D3/2 and 6I17/2 of Gd3+ were employed for quantum cutting in sensitizing levels. The excited state electrons could easily transfer from Gd3+ to Tb3+ with high efficiency. There are three efficient excited bands for quantum cutting. The excited wavelengths of 244, 273, and 283 nm correspond to the transition processes of 8S7/2→6D3/2 (Gd3+), 8S7/2→6I17/2 (Gd3+), and 7F6→5F4 (Tb3+), and the maximum quantum yields of KGd(CO3)2:Tb3+ can reach 163.5, 119, and 143%, respectively. The continuous and efficient excitation band of 273–283 nm can well match the commercial 275 nm LED chip to expand the usage of solid-state light sources. Meanwhile, the phosphor also shows good excitation efficiency at 365 nm in a high Tb3+ doping concentration. Therefore, KGd(CO3)2:Tb3+ is an efficient green-emitting phosphor for ultraviolet-excited solid-state light sources

    Some remarks on locally perfect rings

    No full text
    corecore