The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. ...
详细信息
With the development of communication systems, modulation methods are becoming more and more diverse. Among them, quadrature spatial modulation(QSM) is considered as one method with less capacity and high efficiency. In QSM, the traditional signal detection methods sometimes are unable to meet the actual requirement of low complexity of the system. Therefore, this paper proposes a signal detection scheme for QSM systems using deep learning to solve the complexity problem. Results from the simulations show that the bit error rate performance of the proposed deep learning-based detector is better than that of the zero-forcing(ZF) and minimum mean square error(MMSE) detectors, and similar to the maximum likelihood(ML) detector. Moreover, the proposed method requires less processing time than ZF, MMSE,and ML.
Rule-induction models have demonstrated great power in the inductive setting of knowledge graph completion. In this setting, the models are tested on a knowledge graph entirely composed of unseen entities. These ...
详细信息
The past decade has witnessed the widespread integration of the Internet of Things (IoT) in the evolution of smart locker systems. However, many existing systems rely on a single authentication method, limiting their ...
详细信息
NR-V2X sidelink (SL) broadcast is used for the real-time exchange of position and other information between adjacent vehicles. However, its reliability degrades much in non-line-of-sight environments, where Blind ReTr...
详细信息
We are developing a miniature self-driving car for the design contest at ICCE2024, which will be driven automatically by image processing of camera images. Our implementation uses a AMD/Xilinx SoC FPGA as the central ...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under t...
详细信息
In the context of security systems,adequate signal coverage is paramount for the communication between security personnel and the accurate positioning of *** studies focus on optimizing base station deployment under the assumption of static obstacles,aiming to maximize the perception coverage of wireless RF(Radio Frequency)signals and reduce positioning blind ***,in practical security systems,obstacles are subject to change,necessitating the consideration of base station deployment in dynamic ***,research in this area still needs to be *** paper proposes a Dynamic Indoor Environment Beacon Deployment Algorithm(DIE-BDA)to address this *** algorithm considers the dynamic alterations in obstacle locations within the designated *** determines the requisite number of base stations,the requisite time,and the area’s practical and overall signal coverage *** experimental results demonstrate that the algorithm can calculate the deployment strategy in 0.12 s following a change in obstacle *** results show that the algorithm in this paper requires 0.12 s to compute the deployment strategy after the positions of obstacles *** 13 base stations,it achieves an effective coverage rate of 93.5%and an overall coverage rate of 97.75%.The algorithm can rapidly compute a revised deployment strategy in response to changes in obstacle positions within security systems,thereby ensuring the efficacy of signal coverage.
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent *** robust authentication of RFID system components is critical in providing trustworthy data delivery from/to *** t...
详细信息
Radio-Frequency IDentification(RFID)technology is an essential enabler of a multitude of intelligent *** robust authentication of RFID system components is critical in providing trustworthy data delivery from/to *** this paper,we propose an authentication protocol based on monitoring the transmissions between readers and tags in the *** proposed authentication scheme is based on injecting decoys within the exchanged communications(between RFID readers and tags)and is used in the authentication ***,the proposed authentication scheme is mathematically modeled and validated using extensive *** simulations results show that the proposed scheme provides a 100%confidence level in the authentication of tags and detection of compromised readers.
Edge Machine Learning(EdgeML)and Tiny Machine Learning(TinyML)are fast-growing fields that bring machine learning to resource-constrained devices,allowing real-time data processing and decision-making at the network’...
详细信息
Edge Machine Learning(EdgeML)and Tiny Machine Learning(TinyML)are fast-growing fields that bring machine learning to resource-constrained devices,allowing real-time data processing and decision-making at the network’s ***,the complexity of model conversion techniques,diverse inference mechanisms,and varied learning strategies make designing and deploying these models ***,deploying TinyML models on resource-constrained hardware with specific software frameworks has broadened EdgeML’s applications across various *** factors underscore the necessity for a comprehensive literature review,as current reviews do not systematically encompass the most recent findings on these ***,it provides a comprehensive overview of state-of-the-art techniques in model conversion,inference mechanisms,learning strategies within EdgeML,and deploying these models on resource-constrained edge devices using *** identifies 90 research articles published between 2018 and 2025,categorizing them into two main areas:(1)model conversion,inference,and learning strategies in EdgeML and(2)deploying TinyML models on resource-constrained hardware using specific software *** the first category,the synthesis of selected research articles compares and critically reviews various model conversion techniques,inference mechanisms,and learning *** the second category,the synthesis identifies and elaborates on major development boards,software frameworks,sensors,and algorithms used in various applications across six major *** a result,this article provides valuable insights for researchers,practitioners,and *** assists them in choosing suitable model conversion techniques,inference mechanisms,learning strategies,hardware development boards,software frameworks,sensors,and algorithms tailored to their specific needs and applications across various sectors.
Resonant beam communications (RBCom), which adopts oscillating photons between two separate retroreflectors for information transmission, exhibits potential advantages over other types of wireless optical communicatio...
详细信息
Resonant beam communications (RBCom), which adopts oscillating photons between two separate retroreflectors for information transmission, exhibits potential advantages over other types of wireless optical communications (WOC). However, echo interference generated by the modulated beam reflected from the receiver affects the transmission of the desired information. To tackle this challenge, a synchronization-based point-to-point RBCom system is proposed to eliminate the echo interference, and the design for the transmitter and receiver is discussed. Subsequently,the performance of the proposed RBCom is evaluated and compared with that of visible light communications(VLC)and free space optical communications (FOC). Finally, future research directions are outlined and several implementation challenges of RBCom systems are highlighted.
暂无评论