this paper uses wireless Channel State Information (CSI) and deep learning for obtaining situational awareness through environment mapping. Algorithms are developed that permit estimation of interior room dimensions u...
详细信息
ISBN:
(数字)9781728199726
ISBN:
(纸本)9781728199733
this paper uses wireless Channel State Information (CSI) and deep learning for obtaining situational awareness through environment mapping. Algorithms are developed that permit estimation of interior room dimensions using wireless Single-Input Single-Output (SISO) Channel Impulse Responses (CIRs). the impact of signal received power, and signal bandwidth, on the ability to predict room dimensions is further investigated. Under such CIR limitations, room dimension estimation accuracy of greater than 90% is achieved using Recurrent Neural networks (RNNs) with a maximum predictive error of 0.5m. this demonstrates that existing consumer wireless systems with similar physical constraints, may be capable of accurately estimating room dimensions given multiple CIR measurements from multiple receiver locations.
For next generation wireless networks, hybrid precoding has overcome high path-loss issue in millimeter wave (mmWave) multi-user multiple-input multiple-output (MU-MIMO) communication system. In this paper, we propose...
详细信息
the future communicationnetworks tend to be denser and the use of large number of antennas becomes an attractive feature in 5G systems. However, the analysis and design of such networks become more challenging as eng...
ISBN:
(数字)9781728199726
ISBN:
(纸本)9781728199733
the future communicationnetworks tend to be denser and the use of large number of antennas becomes an attractive feature in 5G systems. However, the analysis and design of such networks become more challenging as engineers find a difficulty to deal withthe scalability problem. that is it is not trivial to define the precise achievable rate region as the number of network terminals and bandwidth size increase (i.e., mmWave communications). However, it has been noticed that the macroscopic view of the network can provide a useful abstraction. As the system gets larger, the macroscopic view can ease the network optimization solution and provide attractive engineering insights. To this end, random matrix theory (RMT) has been used to model the interaction complexity between multiple terminals in multi-antenna systems, where it can provide the asymptotic behaviour of the eigenvalue distributions of the products and sums of matrices. In this paper, we present a random matrix approach to derive the capacity of multi-antenna systems over Rayleigh fading channels. We also study the impact of channel correlation on the capacity of multiple-input multiple-output (MIMO) systems.
Device-to-Device (D2D) communication has become a promising technology to enhance the performance of cellular networks. the major challenge for resource sharing in D2D networks lies in the co-interference between cell...
详细信息
In network security, there are many applications and techniques that can be used to maintain targets of high-level security such as confidentiality, integrity, availability, and nonrepudiation for safe communication b...
详细信息
the paper presents an approach to a visual analysis of links in social networks for obtaining information on channels of inappropriate information dissemination. the offered approach is based on the formation of the k...
详细信息
ISBN:
(纸本)9783030018214
the paper presents an approach to a visual analysis of links in social networks for obtaining information on channels of inappropriate information dissemination. the offered approach is based on the formation of the knowledge base about communication between users and groups, interactive display of propagation paths of inappropriate information and the visual analysis of the received results to detect sources and repeaters of inappropriate information. the interconnections of users and groups in social networks allow the construction of connectivity graphs, and the facts of the transmission of inappropriate information through these channels provide an opportunity to identify the ways of malicious content dissemination. the results of experiments confirming the applicability of the proposed approach are outlined.
the aim of the work was to develop a model of a knowledge base of an information system that collects information from various social networks. the model should improve search efficiency and facilitate the unification...
详细信息
ISBN:
(数字)9781728173863
ISBN:
(纸本)9781728173870
the aim of the work was to develop a model of a knowledge base of an information system that collects information from various social networks. the model should improve search efficiency and facilitate the unification of data from heterogeneous sources. the work presents an ontological model for the unification of data profiles of different social networks. this model avoids data redundancy by including contextual information in annotations to ontology relations. In addition, an approach to information retrieval using syntagmatic patterns in the formation of a database tree of posts of social network users is proposed. the article also presents the results of experiments with data from the social network Facebook confirming the effectiveness of the proposed models and algorithms.
Efficient authentication across wireless devices improves the security of the overall network and can be accomplished at the physical layer. By stratifying privilege levels for different devices, security is further i...
详细信息
ISBN:
(数字)9781728199726
ISBN:
(纸本)9781728199733
Efficient authentication across wireless devices improves the security of the overall network and can be accomplished at the physical layer. By stratifying privilege levels for different devices, security is further improved. We propose the use of machine learning and received multiple-input multiple-output communications channel information to identify trusted transmitters. Our approach uses received channel state information at various signal to noise levels from multiple transmitters to train a deep neural network to make an authentication decision. We show that an adversarially-trained classifier network can correctly differentiate among transmitters using very few labeled samples from a greater dataset.
Non-orthogonal multiple access (NOMA) provides a significant impact on meeting high capacity achievements of the fifth generation (5G) wireless cellular systems. In NOMA, an efficient resource allocation is essential ...
详细信息
the aim of the study is to develop a biotechnical system of the rehabilitation type, designed to restore the motor activity of the patient's muscles through biotechnical and biological feedback. the obtained class...
详细信息
ISBN:
(数字)9781728173863
ISBN:
(纸本)9781728173870
the aim of the study is to develop a biotechnical system of the rehabilitation type, designed to restore the motor activity of the patient's muscles through biotechnical and biological feedback. the obtained classification models of surface signals of electromyograms can be used to create intelligent rehabilitation systems for patients with neurological diseases and will allow the development of diagnostic test stimulation programs that can be used to create artificial biological feedback. this will provide new predictors of the risk of socially significant diseases.
暂无评论