RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
        • 등재정보
        • 학술지명
        • 주제분류
        • 발행연도
        • 작성언어
        • 저자
          펼치기

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재

        Deep Learning-Based Modulation Detection for NOMA Systems

        ( Wenwu Xie ),( Jian Xiao ),( Jinxia Yang ),( Ji Wang ),( Xin Peng ),( Chao Yu ),( Peng Zhu ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.2

        Since the signal with strong power need be demodulated first for successive interference cancellation (SIC) receiver in non-orthogonal multiple access (NOMA) systems, the base station (BS) need inform the near user terminal (UT), which has allocated higher power, of the far UT’s modulation mode. To avoid unnecessary signaling overhead of control channel, a blind detection algorithm of NOMA signal modulation mode is designed in this paper. Taking the joint constellation density diagrams of NOMA signal as the detection features, the deep residual network is built for classification, so as to detect the modulation mode of NOMA signal. In view of the fact that the joint constellation diagrams are easily polluted by high intensity noise and lose their real distribution pattern, the wavelet denoising method is adopted to improve the quality of constellations. The simulation results represent that the proposed algorithm can achieve satisfactory detection accuracy in NOMA systems. In addition, the factors affecting the recognition performance are also verified and analyzed.

      • KCI등재

        Multi-objective optimization design of a centrifugal impeller by positioning splitters using GMDH, NSGA-Ⅲ and entropy weight-TOPSIS

        Xing Xie,Zhenlin Li,Baoshan Zhu,Hong Wang,Wenwu Zhang 대한기계학회 2021 JOURNAL OF MECHANICAL SCIENCE AND TECHNOLOGY Vol.35 No.5

        A centrifugal impeller with splitters was designed by three-dimensional (3D) inverse design method, and its efficiency, velocity non-uniformity at impeller exit and maximum equivalent stress of blades were optimized by providing the suitable blade stacking angle, work ratio and circumferential location of the splitter. First, 80 samples were generated by optimal Latin hypercube technique and the corresponding impellers were designed by 3D inverse design. Using computational fluid dynamics (CFD) and fluid structure interaction (FSI), the optimization objectives were obtained. Then, the group method of data handling (GMDH) artificial neural networks was established to link the design parameters and objectives by the specific formulas. The reference-point-based non-dominated sorting genetic algorithm (NSGA-Ⅲ) was applied to search the Pareto front. Finally, the preferred impeller was selected by adopting entropy weight and the method of technique for order preference by similarity to an ideal solution (TOPSIS). The results showed that the splitter of the preferred impeller had a circumferential location of 0.58, blade stacking angle of 28° and work ratio of 0.48. The nonuniformity at impeller exit and maximum equivalent stress of blades of preferred impeller obtained by NSGA-Ⅲ were decreased, while the efficiency was improved.

      • KCI등재

        An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

        Jiping Li,Yuanyuan Zhang,Lixiang Shen,Jing Cao,Wenwu Xie,Yizheng,Shouyin Liu 한국인터넷정보학회 2024 KSII Transactions on Internet and Information Syst Vol.18 No.3

        For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼