scispace - formally typeset
Search or ask a question
Institution

Dalian University of Technology

EducationDalian, China
About: Dalian University of Technology is a education organization based out in Dalian, China. It is known for research contribution in the topics: Catalysis & Finite element method. The organization has 60890 authors who have published 71921 publications receiving 1188356 citations. The organization is also known as: Dàlián Lǐgōng Dàxué.


Papers
More filters
Journal ArticleDOI
TL;DR: Three PA algorithms to maximize the throughput of secondary users (SUs), the energy efficiency of the network, and the requirements of SUs, respectively, while guaranteeing the quality of service (QoS) of the primary user (PU) are proposed.
Abstract: Interference alignment (IA) is a promising technique for interference management and can be applied to spectrum sharing in cognitive radio (CR) networks. However, the sum rate may fall short of the theoretical maximum, particularly at low signal-to-noise ratio (SNR), and the quality of service (QoS) of the primary user (PU) may not be guaranteed. In addition, power allocation (PA) in IA-based CR networks is largely ignored, which can further improve its performance. Thus, in this paper, PA in IA-based CR networks is studied. To guarantee the QoS requirement of the PU, its minimal transmitted power is derived. Then, we propose three PA algorithms to maximize the throughput of secondary users (SUs), the energy efficiency (EE) of the network, and the requirements of SUs, respectively, while guaranteeing the QoS of the PU. To reduce the complexity, the closed-form solutions of these algorithms are further studied in detail. The outage probability of the PU according to its rate threshold is also derived to analyze the performance of these algorithms. Moreover, we propose a transmission-mode adaptation scheme to further improve the PU's performance when its QoS requirement cannot be guaranteed at low SNR, and it can be easily combined with the proposed PA algorithms. Simulation results are presented to show the effectiveness of the proposed adaptive PA algorithms for IA-based CR networks.

197 citations

Journal ArticleDOI
TL;DR: In this article, the authors investigated diamond scratching at a high speed comparable to that in a grinding process on an ultraprecision grinder and found that an amorphous layer is formed on top of the pristine Si-I phase before the onset of chip formation.

196 citations

Journal ArticleDOI
TL;DR: A Se-containing heptamethine cyanine dye based fluorescent probe was successfully developed and used for HClO detection with rapid response and high selectivity based on aggregation behavior.

196 citations

Journal ArticleDOI
TL;DR: In this article, the authors proposed using the fuzzy and grey Delphi methods to identify a set of reliable attributes and, based on these attributes, transforming big data to a manageable scale to consider their impacts.

196 citations

Journal ArticleDOI
TL;DR: This paper proposes a security and privacy preservation scheme to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution, and implements a prototype system to evaluate the influence of security scheme on system performance.
Abstract: Face identification and resolution technology is crucial to ensure the identity consistency of humans in physical space and cyber space. In the current Internet of Things (IoT) and big data situation, the increase of applications based on face identification and resolution raises the demands of computation, communication, and storage capabilities. Therefore, we have proposed the fog computing-based face identification and resolution framework to improve processing capacity and save the bandwidth. However, there are some security and privacy issues brought by the properties of fog computing-based framework. In this paper, we propose a security and privacy preservation scheme to solve the above issues. We give an outline of the fog computing-based face identification and resolution framework, and summarize the security and privacy issues. Then the authentication and session key agreement scheme, data encryption scheme, and data integrity checking scheme are proposed to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution. Finally, we implement a prototype system to evaluate the influence of security scheme on system performance. Meanwhile, we also evaluate and analyze the security properties of proposed scheme from the viewpoint of logical formal proof and the confidentiality, integrity, and availability (CIA) properties of information security. The results indicate that the proposed scheme can effectively meet the requirements for security and privacy preservation.

196 citations


Authors

Showing all 61205 results

NameH-indexPapersCitations
Yang Yang1712644153049
Yury Gogotsi171956144520
Hui Li1352982105903
Michael I. Posner134414104201
Anders Hagfeldt12960079912
Jian Zhou128300791402
Chao Zhang127311984711
Bin Wang126222674364
Chi Lin1251313102710
Tao Zhang123277283866
Bo Wang119290584863
Zhenyu Zhang118116764887
Liang Cheng116177965520
Anthony G. Fane11256540904
Xuelong Li110104446648
Network Information
Related Institutions (5)
Tsinghua University
200.5K papers, 4.5M citations

95% related

University of Science and Technology of China
101K papers, 2.4M citations

95% related

Zhejiang University
183.2K papers, 3.4M citations

93% related

Chinese Academy of Sciences
634.8K papers, 14.8M citations

93% related

Shanghai Jiao Tong University
184.6K papers, 3.4M citations

92% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
2023167
2022838
20216,974
20206,457
20196,261
20185,375