Institution
Dalian University of Technology
Education•Dalian, China•
About: Dalian University of Technology is a education organization based out in Dalian, China. It is known for research contribution in the topics: Catalysis & Finite element method. The organization has 60890 authors who have published 71921 publications receiving 1188356 citations. The organization is also known as: Dàlián Lǐgōng Dàxué.
Papers published on a yearly basis
Papers
More filters
••
TL;DR: Three PA algorithms to maximize the throughput of secondary users (SUs), the energy efficiency of the network, and the requirements of SUs, respectively, while guaranteeing the quality of service (QoS) of the primary user (PU) are proposed.
Abstract: Interference alignment (IA) is a promising technique for interference management and can be applied to spectrum sharing in cognitive radio (CR) networks. However, the sum rate may fall short of the theoretical maximum, particularly at low signal-to-noise ratio (SNR), and the quality of service (QoS) of the primary user (PU) may not be guaranteed. In addition, power allocation (PA) in IA-based CR networks is largely ignored, which can further improve its performance. Thus, in this paper, PA in IA-based CR networks is studied. To guarantee the QoS requirement of the PU, its minimal transmitted power is derived. Then, we propose three PA algorithms to maximize the throughput of secondary users (SUs), the energy efficiency (EE) of the network, and the requirements of SUs, respectively, while guaranteeing the QoS of the PU. To reduce the complexity, the closed-form solutions of these algorithms are further studied in detail. The outage probability of the PU according to its rate threshold is also derived to analyze the performance of these algorithms. Moreover, we propose a transmission-mode adaptation scheme to further improve the PU's performance when its QoS requirement cannot be guaranteed at low SNR, and it can be easily combined with the proposed PA algorithms. Simulation results are presented to show the effectiveness of the proposed adaptive PA algorithms for IA-based CR networks.
197 citations
••
TL;DR: In this article, the authors investigated diamond scratching at a high speed comparable to that in a grinding process on an ultraprecision grinder and found that an amorphous layer is formed on top of the pristine Si-I phase before the onset of chip formation.
196 citations
••
TL;DR: A Se-containing heptamethine cyanine dye based fluorescent probe was successfully developed and used for HClO detection with rapid response and high selectivity based on aggregation behavior.
196 citations
••
TL;DR: In this article, the authors proposed using the fuzzy and grey Delphi methods to identify a set of reliable attributes and, based on these attributes, transforming big data to a manageable scale to consider their impacts.
196 citations
••
TL;DR: This paper proposes a security and privacy preservation scheme to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution, and implements a prototype system to evaluate the influence of security scheme on system performance.
Abstract: Face identification and resolution technology is crucial to ensure the identity consistency of humans in physical space and cyber space. In the current Internet of Things (IoT) and big data situation, the increase of applications based on face identification and resolution raises the demands of computation, communication, and storage capabilities. Therefore, we have proposed the fog computing-based face identification and resolution framework to improve processing capacity and save the bandwidth. However, there are some security and privacy issues brought by the properties of fog computing-based framework. In this paper, we propose a security and privacy preservation scheme to solve the above issues. We give an outline of the fog computing-based face identification and resolution framework, and summarize the security and privacy issues. Then the authentication and session key agreement scheme, data encryption scheme, and data integrity checking scheme are proposed to solve the issues of confidentiality, integrity, and availability in the processes of face identification and face resolution. Finally, we implement a prototype system to evaluate the influence of security scheme on system performance. Meanwhile, we also evaluate and analyze the security properties of proposed scheme from the viewpoint of logical formal proof and the confidentiality, integrity, and availability (CIA) properties of information security. The results indicate that the proposed scheme can effectively meet the requirements for security and privacy preservation.
196 citations
Authors
Showing all 61205 results
Name | H-index | Papers | Citations |
---|---|---|---|
Yang Yang | 171 | 2644 | 153049 |
Yury Gogotsi | 171 | 956 | 144520 |
Hui Li | 135 | 2982 | 105903 |
Michael I. Posner | 134 | 414 | 104201 |
Anders Hagfeldt | 129 | 600 | 79912 |
Jian Zhou | 128 | 3007 | 91402 |
Chao Zhang | 127 | 3119 | 84711 |
Bin Wang | 126 | 2226 | 74364 |
Chi Lin | 125 | 1313 | 102710 |
Tao Zhang | 123 | 2772 | 83866 |
Bo Wang | 119 | 2905 | 84863 |
Zhenyu Zhang | 118 | 1167 | 64887 |
Liang Cheng | 116 | 1779 | 65520 |
Anthony G. Fane | 112 | 565 | 40904 |
Xuelong Li | 110 | 1044 | 46648 |