6,643 research outputs found
Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems
A novel Physical Layer Security (PLS) framework is conceived for enhancing
the security of the wireless communication systems by exploiting multi-domain
polarization in Multiple-Input Multiple-Output (MIMO) systems. We design a
sophisticated key generation scheme based on multi-domain polarization, and the
corresponding receivers. An in-depth analysis of the system's secrecy rate is
provided, demonstrating the confidentiality of our approach in the presence of
eavesdroppers having strong computational capabilities. More explicitly, our
simulation results and theoretical analysis corroborate the advantages of the
proposed scheme in terms of its bit error rate (BER), block error rate (BLER),
and maximum achievable secrecy rate. Our findings indicate that the innovative
PLS framework effectively enhances the security and reliability of wireless
communication systems. For instance, in a MIMO setup, the proposed
PLS strategy exhibits an improvement of dB compared to conventional MIMO,
systems at a BLER of while the eavesdropper's BLER reaches
Co-ordinated Control Strategy for Hybrid Wind Farms with PMSG and FSIG under Unbalanced Grid Voltage Condition
Scale Attention for Learning Deep Face Representation: A Study Against Visual Scale Variation
Human face images usually appear with wide range of visual scales. The
existing face representations pursue the bandwidth of handling scale variation
via multi-scale scheme that assembles a finite series of predefined scales.
Such multi-shot scheme brings inference burden, and the predefined scales
inevitably have gap from real data. Instead, learning scale parameters from
data, and using them for one-shot feature inference, is a decent solution. To
this end, we reform the conv layer by resorting to the scale-space theory, and
achieve two-fold facilities: 1) the conv layer learns a set of scales from real
data distribution, each of which is fulfilled by a conv kernel; 2) the layer
automatically highlights the feature at the proper channel and location
corresponding to the input pattern scale and its presence. Then, we accomplish
the hierarchical scale attention by stacking the reformed layers, building a
novel style named SCale AttentioN Conv Neural Network (\textbf{SCAN-CNN}). We
apply SCAN-CNN to the face recognition task and push the frontier of SOTA
performance. The accuracy gain is more evident when the face images are blurry.
Meanwhile, as a single-shot scheme, the inference is more efficient than
multi-shot fusion. A set of tools are made to ensure the fast training of
SCAN-CNN and zero increase of inference cost compared with the plain CNN
Stability analysis of slopes with cracks using the finite element limit analysis method
There are numerous slope projects involved in railway and highway constructions, and ensuring the stability of slopes, especially those with cracks, is very important. Compared with the limit equilibrium method, the limit analysis method takes into account the soil’s stress-strain behavior and boundary conditions, thereby yielding more rigorous and accurate results. The stability of slopes with cracks was examined using the finite element limit analysis method in this study. Results indicate that the stability of the slope decreases with the crack length, especially for slope with small slope ratio (i.e., α ≤ 1:1.5) and when lc/H exceeds 25%. The influence of crack inclination angle on slope stability increases with crack length, and the safety factor is larger in cases of negative inclination value cases as compared to those in positive inclination value cases when lc/H ≥ 0.33. Values of safety factor are larger in cases of slope with reinforcement as compared to those without reinforcement, and the values of F increase by about 20%. Additionally, the slip planes for slopes with reinforcement are located 10% further away from the slope surface compared to those without reinforcement, and reinforcements enhance the slope integrity
Adapting Large Language Model with Speech for Fully Formatted End-to-End Speech Recognition
Most end-to-end (E2E) speech recognition models are composed of encoder and
decoder blocks that perform acoustic and language modeling functions.
Pretrained large language models (LLMs) have the potential to improve the
performance of E2E ASR. However, integrating a pretrained language model into
an E2E speech recognition model has shown limited benefits due to the
mismatches between text-based LLMs and those used in E2E ASR. In this paper, we
explore an alternative approach by adapting a pretrained LLMs to speech. Our
experiments on fully-formatted E2E ASR transcription tasks across various
domains demonstrate that our approach can effectively leverage the strengths of
pretrained LLMs to produce more readable ASR transcriptions. Our model, which
is based on the pretrained large language models with either an encoder-decoder
or decoder-only structure, surpasses strong ASR models such as Whisper, in
terms of recognition error rate, considering formats like punctuation and
capitalization as well
Multi-Domain Polarization for Enhancing the Physical Layer Security of MIMO Systems
A novel Physical Layer Security (PLS) framework is conceived for enhancing the security of wireless communication systems by exploiting multi-domain polarization in Multiple-Input Multiple-Output (MIMO) systems. We design a sophisticated key generation scheme based on multi-domain polarization and the corresponding receivers. An in-depth analysis of the system’s secrecy rate is provided, demonstrating the confidentiality of our approach in the presence of eavesdroppers having strong computational capabilities. More explicitly, our simulation results and theoretical analysis corroborate the advantages of the proposed scheme in terms of its bit error rate (BER), block error rate (BLER), and maximum achievable secrecy rate. Our findings indicate that the innovative PLS framework effectively enhances the security and reliability of wireless communication systems. For example, in a 4 × 4 MIMO setup, the proposed PLS strategy exhibits an improvement of 2dB compared to conventional MIMO, systems at a BLER of 2 · 10 -5 while the eavesdropper’s BLER reaches 1
Post-Domestication Selection in the Maize Starch Pathway
Modern crops have usually experienced domestication selection and subsequent genetic improvement (post-domestication selection). Chinese waxy maize, which originated from non-glutinous domesticated maize (Zea mays ssp. mays), provides a unique model for investigating the post-domestication selection of maize. In this study, the genetic diversity of six key genes in the starch pathway was investigated in a glutinous population that included 55 Chinese waxy accessions, and a selective bottleneck that resulted in apparent reductions in diversity in Chinese waxy maize was observed. Significant positive selection in waxy (wx) but not amylose extender1 (ae1) was detected in the glutinous population, in complete contrast to the findings in non-glutinous maize, which indicated a shift in the selection target from ae1 to wx during the improvement of Chinese waxy maize. Our results suggest that an agronomic trait can be quickly improved into a target trait with changes in the selection target among genes in a crop pathway
- …