5 research outputs found

    Turing–Hopf bifurcation and spatiotemporal patterns in a Gierer–Meinhardt system with gene expression delay

    Get PDF
    In this paper, we consider the dynamics of delayed Gierer–Meinhardt system, which is used as a classic example to explain the mechanism of pattern formation. The conditions for the occurrence of Turing, Hopf and Turing–Hopf bifurcation are established by analyzing the characteristic equation. For Turing–Hopf bifurcation, we derive the truncated third-order normal form based on the work of Jiang et al. [11], which is topologically equivalent to the original equation, and theoretically reveal system exhibits abundant spatial, temporal and spatiotemporal patterns, such as semistable spatially inhomogeneous periodic solutions, as well as tristable patterns of a pair of spatially inhomogeneous steady states and a spatially homogeneous periodic solution coexisting. Especially, we theoretically explain the phenomenon that time delay inhibits the formation of heterogeneous steady patterns, found by S. Lee, E. Gaffney and N. Monk [The influence of gene expression time delays on Gierer–Meinhardt pattern formation systems, Bull. Math. Biol., 72(8):2139–2160, 2010.

    Opportunistic Wiretapping/Jamming: A New Attack Model in Millimeter-Wave Wireless Networks

    Full text link
    While the millimeter-wave (mmWave) communication is robust against the conventional wiretapping attack due to its short transmission range and directivity, this paper proposes a new opportunistic wiretapping and jamming (OWJ) attack model in mmWave wireless networks. With OWJ, an eavesdropper can opportunistically conduct wiretapping or jamming to initiate a more hazardous attack based on the instantaneous costs of wiretapping and jamming. We also provide three realizations of the OWJ attack, which are mainly determined by the cost models relevant to distance, path loss and received power, respectively. To understand the impact of the new attack on mmWave network security, we first develop novel approximation techniques to characterize the irregular distributions of wiretappers, jammers and interferers under three OWJ realizations. With the help of the results of node distributions, we then derive analytical expressions for the secrecy transmission capacity to depict the network security performance under OWJ. Finally, we provide extensive numerical results to illustrate the effect of OWJ and to demonstrate that the new attack can more significantly degrade the network security performance than the pure wiretapping or jamming attack

    A High-Precision Vehicle Detection and Tracking Method Based on the Attention Mechanism

    No full text
    Vehicle detection and tracking technology plays an important role in intelligent transportation management and control systems. This paper proposes a novel vehicle detection and tracking method for small target vehicles to achieve high detection and tracking accuracy based on the attention mechanism. We first develop a new vehicle detection model (YOLOv5-NAM) by adding the normalization-based attention module (NAM) to the classical YOLOv5s model. By exploiting the YOLOv5-NAM model as the vehicle detector, we then propose a real-time small target vehicle tracking method (JDE-YN), where the feature extraction process is embedded in the prediction head for joint training. Finally, we present extensive experimental results to verify our method on the UA-DETRAC dataset and to demonstrate that the method can effectively detect small target vehicles in real time. It is shown that compared with the original YOLOv5s model, the mAP value of the YOLOv5-NAM vehicle detection model is improved by 1.6%, while the MOTA value of the JDE-YN method improved by 0.9% compared with the original JDE method

    Secure Beamforming for Full-Duplex MIMO Two-Way Untrusted Relay Systems

    No full text

    A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security

    No full text
    Satellite internet serves as an indispensable component of the upcoming sixth-generation networks for providing global broadband internet access service. Due to the open nature of satellite-ground communication, security issue in satellite internet has always been an important concern for both industry and academia. Although many researchers focus on secure communications in satellite internet, the literature is surprisingly sparse, with no comprehensive overview of the state-of-the-art security techniques. This paper provides an in-depth survey of secure communications for various satellite internet scenarios. Based on different security mechanisms, we first categorize the existing works of secure communications in satellite internet into two categories: cryptography-based and physical layer security-based. The former includes classical encryption-based and quantum encryption-based secure communication, and the latter is further divided into precoding-based, cooperative jamming-based, relay selection-based, and physical-layer authentication-based secure communication depending on the applied techniques. Finally, we provide some future research directions
    corecore