We propose a new deep residual network for Automatic Modulation Classification, OPResNet-18. It achieves state-of-the-art accuracy on the RadioML 2016.10a data set. We train the proposed model and other state-of-the-a...
详细信息
We propose a new deep residual network for Automatic Modulation Classification, OPResNet-18. It achieves state-of-the-art accuracy on the RadioML 2016.10a data set. We train the proposed model and other state-of-the-art networks with augmented data by adding a Carrier Frequency Offset (CFO). We find that the previously proposed IQNet-3 is robust to CFO. We demonstrate that this robustness allows the performance of IQNet-3 to be further improved through data augmentation in contrast to existing neural networks that cannot handle CFO. Finally, we provide evidence that standard data pre-processing techniques for time-domain data that reportedly perform well in many domains do not perform as well as a simple alternative, the outer product, in the IQ domain.
The availability of health check facilities that are increasingly affordable in terms of cost and distance is very useful for the community. Therefore, the presence of a healthcare kiosk that is installed everywhere w...
详细信息
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issue...
详细信息
ISBN:
(数字)9798350372632
ISBN:
(纸本)9798350372649
the design decisions made in the architecture of a software system are essential to its maintainability, and thus its quality is of great importance. Architecture smells (ASs) can be used to identify any quality issues within the system. To further explore the relationships between ASs, stability, and reusability, Spearman correlation coefficients will be calculated. This paper seeks to examine the connection between architecture smells, software stability, and reusability. To do this, we utilized a dataset created by other researchers and conducted an empirical study of the associations between five types of architecture smells and software stability and reusability. This research is necessary as there is a lack of in-depth research on architecture smells and their relationship to software stability and reusability. We found a relationship between the presence of Feature Concentration in package and the stability and reusability of the package. Also, package's stability is affected by both Cyclic Dependency and Unstable Dependency. A slight positive correlation has been found between God Class and stability, as well as a very weak negative correlation between Unstable Dependency and reusability. Finally, we found a slight negative correlation between package stability and reusability.
Facial appearance variations due to occlusion has been one of the main challenges for face recognition systems. To facilitate further research in this area, it is necessary and important to have occluded face datasets...
详细信息
Given the circumstances the healthcare system, the Internet of Things (IoT) is crucial. IoT gadgets offer patient data for the framework of healthcare monitoring. IoT is a key component in every aspect of the health c...
Given the circumstances the healthcare system, the Internet of Things (IoT) is crucial. IoT gadgets offer patient data for the framework of healthcare monitoring. IoT is a key component in every aspect of the health care management system since people can use smart devices to check on their health. Lung cancer is a fatal malignancy, and the likelihood of survival is increased by early identification. Because of the computational difficulty involved in gathering characteristics, it is imperative to design an approach using machine learning techniques for categorising cancer disease because the classification results given by the current methods are inadequate. With the use of the synthetic minority oversampling methods (SMOTE) methodology, the incoming data is pre-processed and balanced. With the help of the binary grey wolf optimisation algorithm (BGWOA), the pertinent features are best chosen. Finally, the suggested model's hyper-parameters are best chosen by the tunicate swarm optimisation (TSA) model, and the classification is carried out by the extreme gradient boosting (XGBoost) model. The experimental analysis demonstrates that the suggested model attained accuracy and recall values of 98% and 95%, respectively, compared to 95% and 95%, respectively, for the identical proposed model without the feature selection (FS) method.
Along with the development of social media, there are various abuses and deviations from the ethics of interaction by its users. One form of social media abuse is cyberbullying. Recently, cyberbullying has become more...
详细信息
Along with the development of social media, there are various abuses and deviations from the ethics of interaction by its users. One form of social media abuse is cyberbullying. Recently, cyberbullying has become more frequent and these events are still difficult to detect. Therefore, researchers conducted an analysis of cyberbullying on Twitter social media using the Support Vector Machine (SVM). The data used is the crawled data of Twitter in Indonesian. This is included in non-linear data so it requires the kernel to carry out the text mining process. However, to date there has been no specific research on what kernels are good to use in cases of cyberbullying. Therefore, researchers conducted an experiment to implement SVM on tweet classification. The researchers will also look for the best kernels among the four kernels, namely Polynomial, Radial Basis Function (RBF), Sigmoid, and Linear. From the results of the experiments conducted, the SVM method can be used for the classification of cyberbullying. In addition, it is known that the sigmoid kernel has the highest accuracy of 83.85%.
Online booking platform eases customer to book hotel easily prior to the arrival date. However, problem arises if customer thinks hotel quality is not as good as promised on online booking platform. Hotel rating which...
详细信息
The objective of the study is to analyze how tourism demand impacts, in the sustainable Inca infrastructure of Ollantaytambo in Cusco during 2020 in COVID-19. Based on bibliographic reviews presented in other research...
详细信息
This paper presents the generation of a virtual obstacle to enhance subtargets algorithm that is implemented on robot soccer. One thing that we need to consider is the behavior of our robot when dealing with obstacles...
详细信息
In this paper, a micro-MRC receiver with L branches operating in a correlated gamma-shadowed η-μ fading channel is considered. For such a system, the channel capacity (CC) is determined based on the maximum signal-t...
详细信息
ISBN:
(数字)9798331515799
ISBN:
(纸本)9798331515805
In this paper, a micro-MRC receiver with L branches operating in a correlated gamma-shadowed η-μ fading channel is considered. For such a system, the channel capacity (CC) is determined based on the maximum signal-to-noise ratio (SNR) at the L branches at the input of the MRC receiver. The results are presented graphically to illustrate the impact of different system parameters on performance and the improvements that result from the advantages of combined diversity. Additionally, we introduce the application of Large Language Models (LLMs) to make network experimentation more practical, using the previously presented expression as a case study. Moreover, a Vision Language Model (VLM) aided method aiming to make model-driven network design and experimentation more convenient is introduced and evaluated for the previously considered case study
暂无评论