Due to the broadcast nature of wireless communication, it is susceptible to eavesdropping by unauthorized users. Artificial noise, as an important physical layer security technique, is different from traditional crypt...
Due to the broadcast nature of wireless communication, it is susceptible to eavesdropping by unauthorized users. Artificial noise, as an important physical layer security technique, is different from traditional cryptography-based communication security mechanisms with high computational complexity, and cannot be cracked by the rapidly advancing computing power. The theoretical research on the security of artificial noise-assisted multiple input multiple output (MIMO) communication systems is quite comprehensive. However, since artificial noise is deeply dependent on the accurate instantaneous channel feedback, its practical application effect still lacks further experiment verification in actual MIMO systems. Based on LabVIEW and universal software radio peripheral (USRP) software defined radio technology, this paper presents a hardware simulation platform of artificial noise-assisted MIMO communication systems. The experimental data obtained from this platform demonstrates that artificial noise can effectively enhance system security with a slight influence on the system reliability.
Machine learning (ML) is becoming increasingly sought after in diverse domains. Unfortunately for this objective, most ML research has focused on improving performance on evaluation metrics such as accuracy. However, ...
详细信息
ISBN:
(纸本)9781728190495
Machine learning (ML) is becoming increasingly sought after in diverse domains. Unfortunately for this objective, most ML research has focused on improving performance on evaluation metrics such as accuracy. However, to make important decisions, ML models need to be interpretable. We propose an approach to approximate kinematics of a robotic arm using interpretable artificial neural networks (ANNs). This work is based on approximating nonlinear functions where domain knowledge and visually observable features of the data are used to design ANNs. After analyzing existing work, we present a feasibility study approximating the kinematics of a simplified robotic arm and extend the work to multiple hidden layers. We generalize the existing work and extend its use for a different application, noting the challenges that arise while extending this work to multiple hidden layers.
In recent years, autonomous navigation of mobile robots has become one of the hot topics in research. An improved Q-learning method (IQL) combining action selec.ion strategy and Q function update method is proposed. A...
详细信息
This letter proposes a deep-learning-based fingerprinting indoor positioning method, aiming to mitigate catastrophic forgetting in the process of depth transfer learning. Recently indoor positioning methods based on f...
This letter proposes a deep-learning-based fingerprinting indoor positioning method, aiming to mitigate catastrophic forgetting in the process of depth transfer learning. Recently indoor positioning methods based on fingerprint have made great development. The deep transfer learning technique has been applied to transfer the positioning network among different scenarios. But catastrophic forgetting is a big challenge during the supervised transfer learning, which results in poor performance of fine-tuned network in source scenario. In order to solve this issue, the proposed method improves the fine-tuning learning procedure according to the importance of network parameters. It can adaptively control the ratio of network parameters by adding regularization factor to loss function. Simulation results show that the proposed method can effectively improve the positioning accuracy in source scenario without reducing the positioning accuracy in target scenario, especially for the transfer learning in multiple scenarios.
Facial Expression Recognition (FER) is an emerging field of research because of the latest advancement in the computing field making the user's experience a clear priority. The proposed framework focuses on facial...
详细信息
The rapid diffusion of mobile communication technology and smart phone devices has raised the concerns about the security problems of mobile phone accessories. Despite a few effort has been made in this aspect, there ...
详细信息
In internet of things we deal with real life objects so we use Constrained Application Protocol (CoAP) instead of the conventional HTTP (in web). Current Research in the WOT (Web of Things) generally takes things in b...
详细信息
We apply the chaos supremacy of laser chaos system to the high stabilization of THz waves. Stability was demonstrated by down converting the optical beats between laser longitudinal modes in the THz domain to the radi...
详细信息
Learning directed acyclic graph (DAG) that describes the causality of observed data is a very challenging but important task. Due to the limited quantity and quality of observed data, and non-identifiability of causal...
详细信息
暂无评论