6,643 research outputs found

    Coordination Control of Distributed Spacecraft System

    Get PDF

    Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems

    Full text link
    A novel Physical Layer Security (PLS) framework is conceived for enhancing the security of the wireless communication systems by exploiting multi-domain polarization in Multiple-Input Multiple-Output (MIMO) systems. We design a sophisticated key generation scheme based on multi-domain polarization, and the corresponding receivers. An in-depth analysis of the system's secrecy rate is provided, demonstrating the confidentiality of our approach in the presence of eavesdroppers having strong computational capabilities. More explicitly, our simulation results and theoretical analysis corroborate the advantages of the proposed scheme in terms of its bit error rate (BER), block error rate (BLER), and maximum achievable secrecy rate. Our findings indicate that the innovative PLS framework effectively enhances the security and reliability of wireless communication systems. For instance, in a 4×44\times4 MIMO setup, the proposed PLS strategy exhibits an improvement of 22dB compared to conventional MIMO, systems at a BLER of 2⋅10−52\cdot 10^{-5} while the eavesdropper's BLER reaches 11

    Co-ordinated Control Strategy for Hybrid Wind Farms with PMSG and FSIG under Unbalanced Grid Voltage Condition

    Get PDF

    Scale Attention for Learning Deep Face Representation: A Study Against Visual Scale Variation

    Full text link
    Human face images usually appear with wide range of visual scales. The existing face representations pursue the bandwidth of handling scale variation via multi-scale scheme that assembles a finite series of predefined scales. Such multi-shot scheme brings inference burden, and the predefined scales inevitably have gap from real data. Instead, learning scale parameters from data, and using them for one-shot feature inference, is a decent solution. To this end, we reform the conv layer by resorting to the scale-space theory, and achieve two-fold facilities: 1) the conv layer learns a set of scales from real data distribution, each of which is fulfilled by a conv kernel; 2) the layer automatically highlights the feature at the proper channel and location corresponding to the input pattern scale and its presence. Then, we accomplish the hierarchical scale attention by stacking the reformed layers, building a novel style named SCale AttentioN Conv Neural Network (\textbf{SCAN-CNN}). We apply SCAN-CNN to the face recognition task and push the frontier of SOTA performance. The accuracy gain is more evident when the face images are blurry. Meanwhile, as a single-shot scheme, the inference is more efficient than multi-shot fusion. A set of tools are made to ensure the fast training of SCAN-CNN and zero increase of inference cost compared with the plain CNN

    Stability analysis of slopes with cracks using the finite element limit analysis method

    Get PDF
    There are numerous slope projects involved in railway and highway constructions, and ensuring the stability of slopes, especially those with cracks, is very important. Compared with the limit equilibrium method, the limit analysis method takes into account the soil’s stress-strain behavior and boundary conditions, thereby yielding more rigorous and accurate results. The stability of slopes with cracks was examined using the finite element limit analysis method in this study. Results indicate that the stability of the slope decreases with the crack length, especially for slope with small slope ratio (i.e., α ≤ 1:1.5) and when lc/H exceeds 25%. The influence of crack inclination angle on slope stability increases with crack length, and the safety factor is larger in cases of negative inclination value cases as compared to those in positive inclination value cases when lc/H ≥ 0.33. Values of safety factor are larger in cases of slope with reinforcement as compared to those without reinforcement, and the values of F increase by about 20%. Additionally, the slip planes for slopes with reinforcement are located 10% further away from the slope surface compared to those without reinforcement, and reinforcements enhance the slope integrity

    Adapting Large Language Model with Speech for Fully Formatted End-to-End Speech Recognition

    Full text link
    Most end-to-end (E2E) speech recognition models are composed of encoder and decoder blocks that perform acoustic and language modeling functions. Pretrained large language models (LLMs) have the potential to improve the performance of E2E ASR. However, integrating a pretrained language model into an E2E speech recognition model has shown limited benefits due to the mismatches between text-based LLMs and those used in E2E ASR. In this paper, we explore an alternative approach by adapting a pretrained LLMs to speech. Our experiments on fully-formatted E2E ASR transcription tasks across various domains demonstrate that our approach can effectively leverage the strengths of pretrained LLMs to produce more readable ASR transcriptions. Our model, which is based on the pretrained large language models with either an encoder-decoder or decoder-only structure, surpasses strong ASR models such as Whisper, in terms of recognition error rate, considering formats like punctuation and capitalization as well

    Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems

    Get PDF
    A novel Physical Layer Security (PLS) framework is conceived for enhancing the security of wireless communication systems by exploiting multi-domain polarization in Multiple-Input Multiple-Output (MIMO) systems. We design a sophisticated key generation scheme based on multi-domain polarization and the corresponding receivers. An in-depth analysis of the system’s secrecy rate is provided, demonstrating the confidentiality of our approach in the presence of eavesdroppers having strong computational capabilities. More explicitly, our simulation results and theoretical analysis corroborate the advantages of the proposed scheme in terms of its bit error rate (BER), block error rate (BLER), and maximum achievable secrecy rate. Our findings indicate that the innovative PLS framework effectively enhances the security and reliability of wireless communication systems. For example, in a 4 × 4 MIMO setup, the proposed PLS strategy exhibits an improvement of 2dB compared to conventional MIMO, systems at a BLER of 2 · 10 -5 while the eavesdropper’s BLER reaches 1

    Coresidence with elderly parents and female labor supply in China

    Full text link

    Post-Domestication Selection in the Maize Starch Pathway

    Get PDF
    Modern crops have usually experienced domestication selection and subsequent genetic improvement (post-domestication selection). Chinese waxy maize, which originated from non-glutinous domesticated maize (Zea mays ssp. mays), provides a unique model for investigating the post-domestication selection of maize. In this study, the genetic diversity of six key genes in the starch pathway was investigated in a glutinous population that included 55 Chinese waxy accessions, and a selective bottleneck that resulted in apparent reductions in diversity in Chinese waxy maize was observed. Significant positive selection in waxy (wx) but not amylose extender1 (ae1) was detected in the glutinous population, in complete contrast to the findings in non-glutinous maize, which indicated a shift in the selection target from ae1 to wx during the improvement of Chinese waxy maize. Our results suggest that an agronomic trait can be quickly improved into a target trait with changes in the selection target among genes in a crop pathway
    • …
    corecore