简介:Large-scaleMIMO(multiple-inputmultiple-output)systemswithnumerouslow-powerantennascanprovidebetterperformanceintermsofspectrumefficiency,powersavingandlinkreliabilitythanconventionalMIMO.Forlarge-scaleMIMO,thereareseveraltechnicalissuesthatneedtobepracticallyaddressed(e.g.,pilotpatterndesignandlow-powertransmissiondesign)andtheoreticallyaddressed(e.g.,capacitybound,channelestimation,andpowerallocationstrategies).Inthispaper,weanalyzethesumrateupperboundoflarge-scaleMIMO,investigateitskeytechnologiesincludingchannelestimation,downlinkprecoding,anduplinkdetection.Wealsopresentsomeperspectivesconcerningnewchannelmodelingapproaches,advanceduserschedulingalgorithms,etc.
简介:Invideoinformationretrieval,keyframeextractionhasbeenrecognizedasoneoftheimportantresearchissues.Althoughmuchprogresshasbeenmade,theexistingapproachesareeithercomputationallyexpensiveorineffectiveincapturingsalientvisualcontent.Inthispaper,wefirstdiscusstheimportanceofkeyframeextractionandthenbrieflyreviewandevaluatetheexistingapproaches.Toovercometheshortcomingeoftheexistingapproaches,weintroduceanewalgorithmforkeyframeextractionbasedonunsupervisedclustring.Meanwhile,weprovideafeedbackchaintoadjustthegranularityoftheextractionresult.Theproposedalgorithmisbothcomputationallysimpleandabletocapturethevisualcontent.Theefficiencyandeffectivenessarevalidatedbylargeamountofreal-worldvideos.
简介:Identity-basedhashproofsystemisabasicandimportantprimitive.Ittographicschemesandprotocolsthataresecureagainstkey-leakageattacks.Inthisupdatableidentity-basedhashproofsystem,inwhichtherelatedmastersecretkeyiswidelyutilizedtoconstructcryp-paper,weintroducetheconceptofandtheidentitysecretkeycanbeupdatedsecurely.Then,weinstantiatethisprimitivebasedonlatticesinthestandardmodel.Moreover,weintroduceanapplicationofthisnewprimitivebygivingagenericconstructionofleakage-resilientpublic-keyencryptionschemeswithanonymity.Thisconstructioncanbeconsideredastheintegrationofthebounded-retrievalmodelandthecontinualleakagemodel.Comparedwiththeexistingleakage-resilientschemes,ourconstructionnotonlyismoreefficientbutalsocanresistmuchmorekeyleakage.