论文部分内容阅读
Two security transmission realization schemes for MIMO Gaussian wiretap channel with one helper
【机 构】
:
School of Communication and Information Engineering,Chongqing University of Posts and Telecommunicat
【出 处】
:
中国邮电高校学报(英文版)
【发表日期】
:
2015年4期
其他文献
Cloud download service,as a new application which downloads the requested content offiine and reserves it in cloud storage until users retrieve it,has recently become a trend attracting millions of users in China.In the face of the dilemma between the gro
Rough set theory is an important tool to solve uncertain problems.Attribute reduction,as one of the core issues of rough set theory,has been proven to be an effective method for knowledge acquisition.Most of heuristic attribute reduction algorithms usuall
Modeling and reachability analysis of synchronizing transitions bounded Petri net systems based upon
The reachability problem of synchronizing transitions bounded Petri net systems (BPNSs) is investigated in this paper by constructing a mathematical model for dynamics of BPNS.Using the semi-tensor product (STP) of matrices,the dynamics of BPNSs,which can
The rapid development of location-based social networks (LBSNs) has provided an unprecedented opportunity for better location-based services through point-of-interest (POI) recommendation.POI recommendation is personalized,location-aware,and context depen
The authentication codes with arbitration are able to solve dispute between the sender and the receiver.The authentication codes with trusted arbitration are called A2-codes,the authentication codes with distrust arbitration are called A3-codes.As an expa