In this paper, we address the problem of answering questions about preconditions in the law, e.g. "When can the court terminate the guardianship of a natural person?". When answering legal questions, it is i...
详细信息
Event extraction (EE) is one of most important researches in the field of Natural Language Processing (NLP). Numerous significant events occur every day all over the world, and it published in various media outlets wi...
详细信息
The applications of a wireless sensor network rely heavily on the network's ability to function for an extended period. By separating the sensors into groups, each of which may keep an eye on the entire area of in...
详细信息
The purpose of this research is to help save electricity within organizations and workplaces that use computers. Due to the behavior of general users today, they do not give importance to saving electricity. This work...
详细信息
This research aims to study, design, and develop a brain tumor classification system using artificial intelligence, specifically decision tree algorithms. The system's primary objective is to assist medical person...
详细信息
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ...
详细信息
As the demand for global connectivity increases, non-terrestrial networks (NTNs), particularly satellite-based systems, have gained significant attention in communication network standardization. The 3rd Generation Pa...
详细信息
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or ...
详细信息
ISBN:
(数字)9798350304053
ISBN:
(纸本)9798350304060
Cellular networks are potential targets of jamming attacks to disrupt wireless communications. Since the fifth generation (5G) of cellular networks enables mission-critical applications, such as autonomous driving or smart manufacturing, the resulting malfunctions can cause serious damage. This paper proposes to detect broadband jammers by an online classification of spectrograms. These spectrograms are computed from a stream of in-phase and quadrature (IQ) samples of 5G radio signals. We obtain these signals experimentally and describe how to design a suitable dataset for training. Based on this data, we compare two classification methods: a supervised learning model built on a basic convolutional neural network (CNN) and an unsupervised learning model based on a convolutional autoencoder (CAE). After comparing the structure of these models, their performance is assessed in terms of accuracy and computational complexity.
The purpose of this research is to help save electricity within organizations and workplaces that use computers. Due to the behavior of general users today, they do not give importance to saving electricity. The resea...
详细信息
Federated learning is an important technique for training language models, which are frequently used for next-word prediction since federated learning allows utilising large quantities of real-life data without compro...
详细信息
暂无评论