Autonomous vehicles will revolutionize the future automotive industry by reducing or eliminating human errors and increasing vehicle safety. The design of autonomous vehicles will bring together many modern technologi...
详细信息
The study aims to identify the benefits and problematic aspects of applying e-learning technologies at Ukrainian universities, taking into account several influential factors, such as technical capabilities, the neces...
详细信息
Approximately 10% of newborns need some assistance to start breathing and 5% proper ventilation. It is crucial that interventions are initiated as soon as possible after birth. Accurate documentation of Time of Birth ...
详细信息
Beamforming design has been widely investigated for integrated sensing and communication (ISAC) systems with full-duplex (FD) sensing and half-duplex (HD) communication, where the base station (BS) transmits and recei...
详细信息
Zero-Touch Networks (ZTNs) represent a state-of-the-art paradigm shift towards fully automated and intelligent network management, enabling the automation and intelligence required to manage the complexity, scale, and...
详细信息
Wireless Sensor Networks(WSN)interlink numerous Sensor Nodes(SN)to support Internet of Things(loT)*** the data gathered from SNs can be divulged,tempered,and *** WSN data processes manage the data in a centralized for...
详细信息
Wireless Sensor Networks(WSN)interlink numerous Sensor Nodes(SN)to support Internet of Things(loT)*** the data gathered from SNs can be divulged,tempered,and *** WSN data processes manage the data in a centralized format at terminal *** devices are prone to attacks and the security of systems can get *** is a distributed and decentralized technique that has the ability to handle security issues in *** security issues include transactions that may be copied and spread across numerous nodes in a peer-peer network *** breaches the mutual trust and allows data immutability which in turn permits the network to go *** some instances,few nodes die or get compromised due to heavy power *** current article develops an Energy Aware Chaotic Pigeon Inspired Optimization based Clustering scheme for Blockchain assisted WSN technique abbreviated as EACPIO-CB *** primary objective of the proposed EACPIO-CB model is to proficiently group the sensor nodes into clusters and exploit Blockchain(BC)for inter-cluster communication in the *** select ClusterHeads(CHs)and organize the clusters,the presented EACPIO-CB model designs a fitness function that involves distinct input ***,BC technology enables the communication between one CH and the other and with the Base Station(BS)in the *** authors conducted comprehensive set of simulations and the outcomes were investigated under different *** simulation results confirmed the better performance of EACPIO-CB method over recent methodologies.
Feature selection is an expensive challenging task in machine learning and data mining aimed at removing irrelevant and redundant features. This contributes to an improvement in classification accuracy, as well as the...
Feature selection is an expensive challenging task in machine learning and data mining aimed at removing irrelevant and redundant features. This contributes to an improvement in classification accuracy, as well as the budget and memory requirements for classification, or any other post-processing task conducted after feature selection. In this regard, we define feature selection as a multi-objective binary optimization task with the objectives of maximizing classification accuracy and minimizing the number of selected features. In order to select optimal features, we have proposed a binary Compact NSGA-II (CNSGA-II) algorithm. Compactness represents the population as a probability distribution to enhance evolutionary algorithms not only to be more memory-efficient but also to reduce the number of fitness evaluations. Instead of holding two populations during the optimization process, our proposed method uses several Probability Vectors (PVs) to generate new individuals. Each PV efficiently explores a region of the search space to find non-dominated solutions instead of generating candidate solutions from a small population as is the common approach in most evolutionary algorithms. To the best of our knowledge, this is the first compact multi-objective algorithm proposed for feature selection. The reported results for expensive optimization cases with a limited budget on five datasets show that the CNSGA-II performs more efficiently than the well-known NSGA-II method in terms of the hypervolume (HV) performance metric requiring less memory. The proposed method and experimental results are explained and analyzed in detail.
Digital beamforming is a crucial technology that enables fifth-generation (5G) devices to operate on millimeter wave (mmW) radio frequencies. However, linearizing massive arrays at the transmitter (TX) side remains a ...
Digital beamforming is a crucial technology that enables fifth-generation (5G) devices to operate on millimeter wave (mmW) radio frequencies. However, linearizing massive arrays at the transmitter (TX) side remains a significant challenge as the complexity scales with the number of antennas. This work focuses on the orthogonal frequency division multiplexing (OFDM) modulation in 5G and beyond networks and presents low-complexity linearization approaches that can be used before the precoder. These approaches do not scale with the number of antennas and provide flexible control of the linearization performance across different parts of the spectrum. Simulation results for a 64-element uniform linear array (ULA) demonstrate that the proposed techniques can achieve performance comparable to conventional multi-digital pre-distortion (DPD) with only 8.91% and 3.52% of the complexity.
This paper considers a Gaussian multi-input multi-output (MIMO) multiple access wiretap (MAC-WT) channel, where an eavesdropper (Eve) wants to extract the confidential information of all users. Assuming that both the ...
详细信息
ISBN:
(纸本)9781665459761
This paper considers a Gaussian multi-input multi-output (MIMO) multiple access wiretap (MAC-WT) channel, where an eavesdropper (Eve) wants to extract the confidential information of all users. Assuming that both the legitimate receiver and Eve jointly decode their interested messages, we aim to maximize the sum secrecy rate of the system by precoder design. Although this problem could be solved by first using the iterative majorization minimization (MM) based algorithm to get a sequence of convex log-determinant optimization subproblems and then using some general tools, e.g., the interior point method, to deal with each subproblem, this strategy involves quite high computational complexity. Therefore, we propose a simultaneous diagonalization based low-complexity (SDLC) method to maximize the secrecy rate of a simple one-user wiretap channel, and then use this method to iteratively optimize the covariance matrix of each user. Simulation results show that in contrast to the existing approaches, the SDLC scheme achieves similar secrecy performance but requires much lower complexity.
Fast and secure network connectivity is essential for emerging Internet of Things (IoT) applications and services. Distributed Blockchain technology offers compelling opportunities to solve IoT security, privacy, and ...
详细信息
暂无评论