375 research outputs found

    機械学習を用いたコグニティブ無線における変調方式識別に関する研究

    Get PDF
    The current spectrum allocation cannot satisfy the demand for future wireless communications, which prompts extensive studies in search of feasible solutions for the spectrum scarcity. The burden in terms of the spectral efficiency on the radio frequency terminal is intended to be small by cognitive radio (CR) systems that prefer low power transmission, changeable carrier frequencies, and diverse modulation schemes. However, the recent surge in the application of the CR has been accompanied by an indispensable component: the spectrum sensing, to avoid interference towards the primary user. This requirement leads to a complex strategy for sensing and transmission and an increased demand for signal processing at the secondary user. However, the performance of the spectrum sensing can be extended by a robust modulation classification (MC) scheme to distinguish between a primary user and a secondary user along with the interference identification. For instance, the underlying paradigm that enables a concurrent transmission of the primary and secondary links may need a precise measure of the interference that the secondary users cause to the primary users. An adjustment to the transmission power should be made, if there is a change in the modulation of the primary users, implying a noise oor excess at the primary user location; else, the primary user will be subject to interference and a collision may occur.Alternatively, the interweave paradigm that progresses the spectrum efficiency by reusing the allocated spectrum over a temporary space, requires a classification of the intercepted signal into primary and secondary systems. Moreover, a distinction between noise and interference can be accomplished by modulation classification, if spectrum sensing is impossible. Therefore, modulation classification has been a fruitful area of study for over three decades.In this thesis, the modulation classification algorithms using machine learning are investigated while new methods are proposed. Firstly, a supervised machine learning based modulation classification algorithm is proposed. The higher-order cumulants are selected as features, due to its robustness to noise. Stacked denoising autoencoders,which is an extended edition of the neural network, is chosen as the classifier. On one hand stacked pre-train overcomes the shortcoming of local optimization, on the other, denoising function further enhances the anti-noise performance. The performance of this method is compared with the conventional methods in terms of the classification accuracy and execution speed. Secondly, an unsupervised machine learning based modulation classification algorithm is proposed.The features from time-frequency distribution are extracted. Density-based spatial clustering of applications with noise (DBSCAN) is used as the classifier because it is impossible to decide the number of clusters in advance. The simulation reveals that this method has higher classification accuracy than the conventional methods. Moreover, the training phase is unnecessary for this method. Therefore, it has higher workability then supervised method. Finally, the advantages and dis-advantages of them are summarized.For the future work, algorithm optimization is still a challenging task, because the computation capability of hardware is limited. On one hand, for the supervised machine learning, GPU computation is a potential solution for supervised machine learning, to reduce the execution cost. Altering the modulation pool, the network structure has to be redesigned as well. On the other hand, for the unsupervised machine learning, that shifting the symbols to carrier frequency consumes extra computing resources.電気通信大学201

    Scaling Laws of Cognitive Networks

    Full text link
    We consider a cognitive network consisting of n random pairs of cognitive transmitters and receivers communicating simultaneously in the presence of multiple primary users. Of interest is how the maximum throughput achieved by the cognitive users scales with n. Furthermore, how far these users must be from a primary user to guarantee a given primary outage. Two scenarios are considered for the network scaling law: (i) when each cognitive transmitter uses constant power to communicate with a cognitive receiver at a bounded distance away, and (ii) when each cognitive transmitter scales its power according to the distance to a considered primary user, allowing the cognitive transmitter-receiver distances to grow. Using single-hop transmission, suitable for cognitive devices of opportunistic nature, we show that, in both scenarios, with path loss larger than 2, the cognitive network throughput scales linearly with the number of cognitive users. We then explore the radius of a primary exclusive region void of cognitive transmitters. We obtain bounds on this radius for a given primary outage constraint. These bounds can help in the design of a primary network with exclusive regions, outside of which cognitive users may transmit freely. Our results show that opportunistic secondary spectrum access using single-hop transmission is promising.Comment: significantly revised and extended, 30 pages, 13 figures, submitted to IEEE Journal of Special Topics in Signal Processin

    Application of an electronic nose coupled with fuzzy-wavelet network for the detection of meat spoilage

    Get PDF
    Food product safety is one of the most promising areas for the application of electronic noses. During the last twenty years, these sensor-based systems have made odour analyses possible. Their application into the area of food is mainly focused on quality control, freshness evaluation, shelf-life analysis and authenticity assessment. In this paper, the performance of a portable electronic nose has been evaluated in monitoring the spoilage of beef fillets stored either aerobically or under modified atmosphere packaging, at different storage temperatures. A novel multi-output fuzzy wavelet neural network model has been developed, which incorporates a clustering pre-processing stage for the definition of fuzzy rules. The dual purpose of the proposed modelling approach is not only to classify beef samples in the relevant quality class (i.e. fresh, semi-fresh and spoiled), but also to predict their associated microbiological population. Comparison results against advanced machine learning schemes indicated that the proposed modelling scheme could be considered as a valuable detection methodology in food microbiology

    Security for 5G Mobile Wireless Networks

    Get PDF
    The advanced features of 5G mobile wireless network systems yield new security requirements and challenges. This paper presents a comprehensive survey on security of 5G wireless network systems compared to the traditional cellular networks. The paper starts with a review on 5G wireless networks particularities as well as on the new requirements and motivations of 5G wireless security. The potential attacks and security services with the consideration of new service requirements and new use cases in 5G wireless networks are then summarized. The recent development and the existing schemes for the 5G wireless security are presented based on the corresponding security services including authentication, availability, data confidentiality, key management and privacy. The paper further discusses the new security features involving different technologies applied to 5G such as heterogeneous networks, device-to-device communications, massive multiple-input multiple-output, software defined networks and Internet of Things. Motivated by these security research and development activities, we propose a new 5G wireless security architecture, based on which the analysis of identity management and flexible authentication is provided. As a case study, we explore a handover procedure as well as a signaling load scheme to show the advantage of the proposed security architecture. The challenges and future directions of 5G wireless security are finally summarized
    corecore