Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairne...
详细信息
Non-Orthogonal Multiple Access(NOMA)has already proven to be an effective multiple access scheme for5th Generation(5G)wireless *** provides improved performance in terms of system throughput,spectral efficiency,fairness,and energy efficiency(EE).However,in conventional NOMA networks,performance degradation still exists because of the stochastic behavior of wireless *** combat this challenge,the concept of Intelligent Reflecting Surface(IRS)has risen to prominence as a low-cost intelligent solution for Beyond 5G(B5G)*** this paper,a modeling primer based on the integration of these two cutting-edge technologies,i.e.,IRS and NOMA,for B5G wireless networks is *** in-depth comparative analysis of IRS-assisted Power Domain(PD)-NOMA networks is provided through 3-fold ***,a primer is presented on the system architecture of IRS-enabled multiple-configuration PD-NOMA systems,and parallels are drawn with conventional network configurations,i.e.,conventional NOMA,Orthogonal Multiple Access(OMA),and IRS-assisted OMA *** by this,a comparative analysis of these network configurations is showcased in terms of significant performance metrics,namely,individual users'achievable rate,sum rate,ergodic rate,EE,and outage ***,for multi-antenna IRS-enabled NOMA networks,we exploit the active Beamforming(BF)technique by employing a greedy algorithm using a state-of-the-art branch-reduceand-bound(BRB)*** optimality of the BRB algorithm is presented by comparing it with benchmark BF techniques,i.e.,minimum-mean-square-error,zero-forcing-BF,and ***,we present an outlook on future envisioned NOMA networks,aided by IRSs,i.e.,with a variety of potential applications for 6G wireless *** work presents a generic performance assessment toolkit for wireless networks,focusing on IRS-assisted NOMA *** comparative analysis provides a solid foundation for the dev
Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems...
详细信息
Most research works nowadays deal with real-time Internetof Things (IoT) data. However, with exponential data volume increases,organizations need help storing such humongous amounts of IoT data incloud storage systems. Moreover, such systems create security issues whileefficiently using IoT and Cloud Computing technologies. Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has the potential to make IoT datamore secure and reliable in various cloud storage services. Cloud-assisted IoTssuffer from two privacy issues: access policies (public) and super polynomialdecryption times (attributed mainly to complex access structures). We havedeveloped a CP-ABE scheme in alignment with a Hidden HierarchyCiphertext-Policy Attribute-Based Encryption (HH-CP-ABE) access structure embedded within two policies, i.e., public policy and sensitive *** this proposed scheme, information is only revealed when the user’sinformation is satisfactory to the public policy. Furthermore, the proposedscheme applies to resource-constrained devices already contracted tasks totrusted servers (especially encryption/decryption/searching). Implementingthe method and keywords search resulted in higher access policy privacy andincreased security. The new scheme introduces superior storage in comparisonto existing systems (CP-ABE, H-CP-ABE), while also decreasing storage costsin HH-CP-ABE. Furthermore, a reduction in time for key generation canalso be ***, the scheme proved secure, even in handling IoT datathreats in the Decisional Bilinear Diffie-Hellman (DBDH) case.
In an Internet of Things (IoT) assisted Wireless Sensor Network (WSN), the location of the Base Station (BS) remains important. BS serves as the central hub for data collection, aggregation and communication within th...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acq...
详细信息
Images obtained from hyperspectral sensors provide information about the target area that extends beyond the visible portions of the electromagnetic ***,due to sensor limitations and imperfections during the image acquisition and transmission phases,noise is introduced into the acquired image,which can have a negative impact on downstream analyses such as classification,target tracking,and spectral *** in hyperspectral images(HSI)is modelled as a combination from several sources,including Gaussian/impulse noise,stripes,and *** HSI restoration method for such a mixed noise model is ***,a joint optimisation framework is proposed for recovering hyperspectral data corrupted by mixed Gaussian-impulse noise by estimating both the clean data as well as the sparse/impulse noise ***,a hyper-Laplacian prior is used along both the spatial and spectral dimensions to express sparsity in clean image ***,to model the sparse nature of impulse noise,anℓ_(1)−norm over the impulse noise gradient is *** the proposed methodology employs two distinct priors,the authors refer to it as the hyperspectral dual prior(HySpDualP)*** the best of authors'knowledge,this joint optimisation framework is the first attempt in this *** handle the non-smooth and nonconvex nature of the generalℓ_(p)−norm-based regularisation term,a generalised shrinkage/thresholding(GST)solver is ***,an efficient split-Bregman approach is used to solve the resulting optimisation *** results on synthetic data and real HSI datacube obtained from hyperspectral sensors demonstrate that the authors’proposed model outperforms state-of-the-art methods,both visually and in terms of various image quality assessment metrics.
The performance of the cloud-based systems is directly associated with the resource utilization. The maximum resource utilization indicates the high performance of cloud computing. Further, effective task scheduling i...
详细信息
Recognizing and analyzing medical images is crucial for disease early detection and treatment planning with appropriate treatment options based on the patient's individual needs and disease history. Deep learning ...
详细信息
Recognizing and analyzing medical images is crucial for disease early detection and treatment planning with appropriate treatment options based on the patient's individual needs and disease history. Deep learning technologies are widely used in the field of healthcare because they can analyze images rapidly and precisely. However, because each object on the image has the potential to hold illness information in medical images, it is critical to analyze the images with minimal information loss. In this context, Capsule Network (CapsNet) architecture is an important approach that aims to reduce information loss by storing the location and properties of objects in images as capsules. However, because CapsNet maintains information on each object in the image, the existence of several objects in complicated images can impair CapsNet's performance. This work proposes a new model called HMedCaps to improve the performance of CapsNet. In the proposed model, it is aimed to develop a deeper and hybrid structure by using Residual Block and FractalNet module together in the feature extraction layer. While it is aimed to obtain rich feature maps by increasing the number of features extracted by deepening the network, it is aimed to prevent the vanishing gradient problem that may occur in the network with increasing depth with these modules with skip connections. Furthermore, a new squash function is proposed to make distinctive capsules more prominent by customizing capsule activation. The CIFAR10 dataset of complex images, RFMiD dataset of retinal images, and Blood Cell Count Dataset dataset of blood cell images were used to evaluate the study. When the proposed model was compared with the basic CapsNet and studies in the literature, it was observed that the performance in complex images was improved and more accurate classification results were obtained in the field of medical image analysis. The proposed hybrid HMedCaps architecture has the potential to make more accurate dia
Background: Human physical activity recognition is challenging in various research eras, such as healthcare, surveillance, senior monitoring, athletics, and rehabilitation. The use of various sensors has attracted out...
详细信息
Background: Epilepsy is a neurological disorder that leads to seizures. This occurs due to excessive electrical discharge by the brain cells. An effective seizure prediction model can aid in improving the lifestyle of...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p...
详细信息
暂无评论