This research aims to analyze and determine the impact of the Covid-19 pandemic on people’s behavior in Indonesia by using the Ojek online application during the Covid-19 pandemic. The research method that used in th...
详细信息
With the recent development of deep learning (DL), DL-based autoencoder techniques provide a novel paradigm for end-to-end physical layer optimization. In this paper, we address the dynamic interference in an end-to-e...
详细信息
ISBN:
(数字)9798350303582
ISBN:
(纸本)9798350303599
With the recent development of deep learning (DL), DL-based autoencoder techniques provide a novel paradigm for end-to-end physical layer optimization. In this paper, we address the dynamic interference in an end-to-end communication system with a multiuser Gaussian interference channel. In this context, the standard constellation is not optimal under high interference conditions. To address this issue, we propose an adaptive learning algorithm for learning and predicting dynamic interference. Note that existing DL-based autoencoders are unable to train end-to-end learning systems by deep learning without a known channel. Thus, we propose a generative adversarial network (GAN)-based training scheme to imitate the real channel. Simulation results show that compared with traditional PSK and QAM modulation schemes, our proposed adaptive learning-based auto encoder can achieve significantly lower block error rate (BLER) in presence of interference. Besides, the BLER performance of our proposed GAN-based training scheme is close to that of the optimal training scheme with known channel on different channel models.
The existing image steganography methods either sequentially conceal secret images or conceal a concatenation of multiple images. In such ways, the interference of information among multiple images will become increas...
The existing image steganography methods either sequentially conceal secret images or conceal a concatenation of multiple images. In such ways, the interference of information among multiple images will become increasingly severe when the number of secret images becomes larger, thus restrict the development of very large capacity image steganography. In this paper, we propose an Invertible Mosaic Image Hiding Network (InvMIHNet) which realizes very large capacity image steganography with high quality by concealing a single mosaic secret image. InvMIHNet consists of an Invertible Image Rescaling (IIR) module and an Invertible Image Hiding (IIH) module. The IIR module works for downscaling the single mosaic secret image form by spatially splicing the multiple secret images, and the IIH module then conceal this mosaic image under the cover image. The proposed InvMIHNet successfully conceal and reveal up to 16 secret images with a small number of parameters and memory consumption. Extensive experiments on ImageNet-1K, COCO and DIV2K show InvMIHNet outperforms state-of-the-art methods in terms of both the imperceptibility of stego image, recover accuracy of secret image and security against steganlysis methods. The code is available at https://***/Brittany-Chen/InvMIHNet.
Happiness is the core function behind all activities. There are various factors that influence happiness of a person. Generally, we constitute happiness with consumption of goods and items. In this paper, we will try ...
详细信息
1 Introduction With sharply rising quantity of urban vehicles over the past few decades,traffic jams and safety have gradually become outstanding *** recent years,Vehicular Ad hoc Network(VANET)is appeared and utilize...
详细信息
1 Introduction With sharply rising quantity of urban vehicles over the past few decades,traffic jams and safety have gradually become outstanding *** recent years,Vehicular Ad hoc Network(VANET)is appeared and utilized to solve traffic related *** is a type of self-organized and open-structured network,and provides Vehicle-to-Everything(V2X)*** all kinds of applications in VANET rely on efficient data transmission and interaction[1-3].
With the growing popularity of API-driven multiservice application (mashup) development, the burgeoning web APIs have left developers drowning in the sea of web API selections. Matching developers with the most approp...
详细信息
Classification is one of the data mining processes used to predict predetermined target classes with data learning *** study discusses data classification using a fuzzy soft set method to predict target classes *** st...
详细信息
Classification is one of the data mining processes used to predict predetermined target classes with data learning *** study discusses data classification using a fuzzy soft set method to predict target classes *** study aims to form a data classification algorithm using the fuzzy soft set *** this study,the fuzzy soft set was calculated based on the normalized Hamming *** parameter in this method is mapped to a power set from a subset of the fuzzy set using a fuzzy approximation *** the classification step,a generalized normalized Euclidean distance is used to determine the similarity between two sets of fuzzy soft *** experiments used the University of California(UCI)Machine Learning dataset to assess the accuracy of the proposed data classification *** dataset samples were divided into training(75%of samples)and test(25%of samples)*** were performed in MATLAB R2010a *** experiments showed that:(1)The fastest sequence is matching function,distance measure,similarity,normalized Euclidean distance,(2)the proposed approach can improve accuracy and recall by up to 10.3436%and 6.9723%,respectively,compared with baseline ***,the fuzzy soft set method is appropriate for classifying data.
Social media has now become a place for others to exchange information in the form of writing, photos, videos, and audio. Social media has become a place for humans to interact from all over the world. In the use of s...
详细信息
This study aimed to identify the impact of digital transformation on Islamic banks operating in Jordan by using the descriptive analytical method. Primary data were obtained through a questionnaire and distributed to ...
详细信息
Cellular-connected unmanned aerial vehicles (UAVs) play an essential role in cellular networks. Combined with non-orthogonal multiple access (NOMA) technique, UAVs can provide better performance in various communicati...
详细信息
ISBN:
(数字)9798350387414
ISBN:
(纸本)9798350387421
Cellular-connected unmanned aerial vehicles (UAVs) play an essential role in cellular networks. Combined with non-orthogonal multiple access (NOMA) technique, UAVs can provide better performance in various communication scenarios. In this paper, we investigate a NOMA-enhanced UAV-assisted cellular network where multiple UAVs are deployed as aerial base stations to provide communication services for mobile ground users in the presence of a malicious jammer. We propose a two-step learning-based resource scheduling approach. First, an algorithm based on K-means clustering is proposed to partition ground users (GUs) to reduce mutual interference. Moreover, a cooperative multi-agent twin delayed deep deterministic algorithm is proposed to jointly optimize UAVs' trajectories, power allocation and GU association to maximize the system energy efficiency (EE) while guaranteeing minimum quality-of-service (QoS) requirements. Extensive results demonstrate that the proposed solution can efficiently improve EE and QoS performances under jamming attacks compared with existing popular approaches.
暂无评论