In our research, we employ the multicriteria decision-making (MCD) method, which incorporates Euclidean distance, the creation of ideal and anti-ideal profiles, and the weighting of criteria to express preferences. Th...
详细信息
This paper proposes using the unmanned aerial vehicle (UAV)-mounted intelligent reflecting surface (IRS) as a flying relay to enable the communication between the base station (BS) and suburb access points (APs). Sinc...
详细信息
electrical grids are increasingly congested, which causes stability and safety risks. To get more insights in how congestion can be managed, this paper analyses whether bus characteristics exist that have a consistent...
详细信息
ISBN:
(数字)9798350390421
ISBN:
(纸本)9798350390438
electrical grids are increasingly congested, which causes stability and safety risks. To get more insights in how congestion can be managed, this paper analyses whether bus characteristics exist that have a consistent influence on grid loading. To study this, a metric for quantifying bus influence on grid loading is introduced and applied in two case studies. The first case study investigates if there are characteristics that correlate with congestion consistently, regardless of grid topology. The results from this case study suggest that none of the evaluated characteristics consistently correlate with grid loading. These results imply that topology should be explicitly considered in congestion management. The second case study investigates the variance in the correlation between bus characteristics and influence, within a single topology, over a variety of conditions. The results of the second case study suggest that this correlation is robust to reasonable changes in bus loads.
The time allocation problem in multi-function cognitive radar systems focuses on the trade-off between scanning for newly emerging targets and tracking the previously detected targets. We formulate this as a multi-obj...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
The time allocation problem in multi-function cognitive radar systems focuses on the trade-off between scanning for newly emerging targets and tracking the previously detected targets. We formulate this as a multi-objective optimization problem and employ deep reinforcement learning to find Pareto-optimal solutions and compare deep deterministic policy gradient (DDPG) and soft actor-critic (SAC) algorithms. Our results demonstrate the effectiveness of both algorithms in adapting to various scenarios, with SAC showing improved stability and sample efficiency compared to DDPG. We further employ the NSGA-II algorithm to estimate an upper bound on the Pareto front of the considered problem. This work contributes to the development of more efficient and adaptive cognitive radar systems capable of balancing multiple competing objectives in dynamic environments.
Cryptographic security measures are typically unsuitable for IoT and UAV networks because of their inherent computational and energy limitations. As a result, lightweight alternatives like radio frequency fingerprinti...
详细信息
ISBN:
(数字)9798331520960
ISBN:
(纸本)9798331520977
Cryptographic security measures are typically unsuitable for IoT and UAV networks because of their inherent computational and energy limitations. As a result, lightweight alternatives like radio frequency fingerprinting (RFF) have recently gained significant attention. RFF utilizes deep learning (DL) techniques, such as Convolutional Neural Networks (CNNs), to identify and detect unique fingerprints. However, CNNs present several challenges: they require large training sets, struggle to detect malicious devices not included in the training process, and require retraining the entire model when new devices are added to the network. To overcome these limitations, in this research we propose the use of a Siamese network for device identification. A Siamese network can measure the similarity or difference between the outputs of two input data points. It requires a smaller training set, can easily detect outliers, and does not need retraining when new devices are added to the network. The transmission of wireless signals from 25 different devices is simulated, collecting 600 MB of I/Q samples using MATLAB. The simulation introduces three physical layer imperfections in the transmitter devices: phase noise, DC offset, and frequency offset. Also, the Similarity-Based Device Identification and Outlier Detection Algorithm (SDIODA) is developed to identify known devices, detect outliers, and utilize the collected dataset and the designed Siamese network to verify the performance of the algorithm. The results demonstrate that the Siamese network achieves nearly 100% accuracy in identifying known devices and detecting outliers with the simulated datasets.
We have known artificial intelligence, deep learning models can be trained with a certain type of input format to perform a task e.g., OCR models takes input in the form of image to read the text characters from the i...
详细信息
The proliferation of the Internet of Things (IoT) over the 2.4GHz has transformed the way people interact with the world in their daily lives. For emerging applications requiring diverse types of data, using IoT devic...
详细信息
ISBN:
(数字)9798350375961
ISBN:
(纸本)9798350375978
The proliferation of the Internet of Things (IoT) over the 2.4GHz has transformed the way people interact with the world in their daily lives. For emerging applications requiring diverse types of data, using IoT devices from different protocols, such as Wi-Fi, Bluetooth, and ZigBee, for data collection will help fulfill designated objectives. Hence, the increasing use of these IoT devices will form a heterogeneous environment with inevitable wireless coexistence. Due to the dynamic IoT environment, the wireless transmission among heterogeneous IoT devices becomes unknown and notoriously hard to manage, where the network performance is always compromised. This paper leverages the RF sensing information to develop a deep learning-based framework for mitigating the cross-technology interference of the Wi-Fi-based IoT system. Each IoT device can provide detailed Channel State Information (CSI) of the transmission link, by which the gateway uses Generative Adversarial Networks (GAN) for building a detailed environmental RF map. Then, we propose a CSI-inspired gateway topology management strategy to find the optimal gateway location, anticipating reaching the highest network throughput. To enhance the efficiency of the proposed scheme, we also adopt the advanced differentiable augmentation approach to reduce the training data size for gateway deployment. Extensive experimental results have demonstrated both the feasibility and efficiency of our design.
The utilization of fifth-generation wireless technology (5G) and artificial intelligence (AI) has opened many paths toward making solar power utility systems run more efficiently. 5G and AI have emerged within the las...
详细信息
ISBN:
(数字)9798331508050
ISBN:
(纸本)9798331508067
The utilization of fifth-generation wireless technology (5G) and artificial intelligence (AI) has opened many paths toward making solar power utility systems run more efficiently. 5G and AI have emerged within the last couple of years as competent technologies that can be used in various settings, including within the field of utility delivery. The main concern about this is how these technologies should be used in renewable energy systems and to what extent they improve operations. This research work is about 5G-enabled solar power systems. One of the models used AI-based implementation, while the other does not. Data for both models pertained to parameters such as power, state of charge, harmonic distortion, and voltage are collected. The results are then compared to determine the effectiveness of using AI with the system. Analysis has shown that implementing AI technology with 5G in a solar power system greatly improves power efficiency by stabilizing the voltage of the model. Furthermore, integrating AI with this model has proven to show unparalleled accuracy compared to a version of the model that does not use AI. It can therefore be inferred that usage of 5G with AI technologies will generally be an improvement over solar power implementations that do not use them.
The nonlinear Hall effect arises in materials without inversion symmetry, and the intrinsic contribution is typically from the Berry curvature dipole of nonuniversal Fermi pockets. Here we propose that the nonlinear H...
详细信息
The nonlinear Hall effect arises in materials without inversion symmetry, and the intrinsic contribution is typically from the Berry curvature dipole of nonuniversal Fermi pockets. Here we propose that the nonlinear Hall effect can reach quantization in chiral Weyl semimetals without mirror symmetries. The energy shift between a pair of Weyl nodes leads to chirally asymmetric intranode relaxation, and the net trace of nonlinear Hall conductivity is thus quantized in units of e3/ℏ2 and determined by the sum of monopole charge weighted by the transport relaxation time. Our theory also applies to mirror symmetric Weyl and Dirac semimetals with chiral anomalies. Additionally, besides dc transport probes, we anticipate that nonlinear circular dichroism measurements can detect chiral asymmetry-induced currents.
Autonomous mobile robots (AMRs) have seen rapid adoption due to their ability to autonomously navigate, avoid obstacles, and collaborate efficiently in complex environments. AMRs equipped with light detection and rang...
详细信息
暂无评论