期刊文献+

为您找到了以下期刊:

共找到1,332篇文章
< 1 2 67 >
每页显示 20 50 100
RSSI-based Algorithm for Indoor Localization 被引量:9
1
作者 Xiuyan Zhu Yuan Feng communications and network 2013年第2期37-42,共6页
Wireless node localization is one of the key technologies for wireless sensor networks. Outdoor localization can use GPS, AGPS (Assisted Global Positioning System) [6], but in buildings like supermarkets and undergrou... Wireless node localization is one of the key technologies for wireless sensor networks. Outdoor localization can use GPS, AGPS (Assisted Global Positioning System) [6], but in buildings like supermarkets and underground parking, the accuracy of GPS and even AGPS will be greatly reduced. Since Indoor localization requests higher accuracy, using GPS or AGPS for indoor localization is not feasible in the current view. RSSI-based trilateral localization algorithm, due to its low cost, no additional hardware support, and easy-understanding, it becomes the mainstream localization algorithm in wireless sensor networks. With the development of wireless sensor networks and smart devices, the number of WIFI access point in these buildings is increasing, as long as a mobile smart device can detect three or three more known WIFI hotspots’ positions, it would be relatively easy to realize self-localization (Usually WIFI access points locations are fixed). The key problem is that the RSSI value is relatively vulnerable to the influence of the physical environment, causing large calculation error in RSSI-based localization algorithm. The paper proposes an improved RSSI-based algorithm, the experimental results show that compared with original RSSI-based localization algorithms the algorithm improves the localization accuracy and reduces the deviation. 展开更多
关键词 INDOOR LOCALIZATION Algorithm RSSI-based WIFI Access POINT Smart Phones
下载PDF
Network Coding Cooperation Performance Analysis in Wireless Network over a Lossy Channel, M Users and a Destination Scenario 被引量:7
2
作者 Mohamed El-Hihi Hani Attar +1 位作者 Ahmed A. A. Solyman Lina Stankovic communications and network 2016年第4期257-280,共24页
Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years... Network coding (NC), introduced at the turn of the century, enables nodes in a network to combine data algebraically before either sending or forwarding them. Random network coding has gained popularity over the years by combining the received packet randomly before forwarding them, resulting in a complex Jordan Gaussian Elimination (JGE) decoding process. The effectiveness of random NC is through cooperation among nodes. In this paper, we propose a simple, low-complexity cooperative protocol that exploits NC in a deterministic manner resulting in improved diversity, data rate, and less complex JGE decoding process. The proposed system is applied over a lossy wireless network. The scenario under investigation is as follows: M users must send their information to a common destination D and to exchange the information between each others, over erasure channels;typically the channels between the users and the destination are worse than the channels between users. It is possible to significantly reduce the traffic among users and destination, achieving significant bandwidth savings, by combining packets from different users in simple, deterministic ways without resorting to extensive header information before being forwarded to the destination and the M users. The key problem we try to address is how to efficiently combine the packets at each user while exploiting user cooperation and the probability of successfully recovering information from all users at D with k < 2M unique linear equations, accounting for the fact that the remaining packets will be lost in the network and there are two transmission stages. Simulation results show the behaviour for two and three transmission stages. Our results show that applying NC protocols in two or three stages decreases the traffic significantly, beside the fact that the proposed protocols enable the system to retrieve the lost packets rather than asking for ARQ, resulting in improved data flow, and less power consumption. In fact, in some protocols the ARQ dropped from the r 展开更多
关键词 Network Coding Cooperative System Erasure Channel Diversity
下载PDF
Alert Device for Social Distancing
3
作者 Amer Nizar AbuAli communications and network 2024年第2期31-50,共20页
Social distancing among people is vital in minimizing spread of COVID-19 within community and can be effective in flattening the outbreak. This research work focuses on developing a close contact proximity detection s... Social distancing among people is vital in minimizing spread of COVID-19 within community and can be effective in flattening the outbreak. This research work focuses on developing a close contact proximity detection system among smartphone users, particularly of COVID-19 patient, using Bluetooth signal to identify and analyze close contact proximity and social distancing from other anonymous smartphone users in their surroundings. Covering a physical space of six feet, a mandatory safety measure in shopping centers, schools, and other crowded areas, is a social solution advocated by World Health Organization (WHO) officials in this COVID-19. Everyone is concerned about their safety in the COVID-19 environment, so we came up with the concept of producing this new equipment. Most of the time, our attention is drawn to those in front of us and to our sides, but we are unable to keep track of those behind us. The major goal of this project is to keep individuals at a safe distance from one another. PIR sensor is used in this proposed work. Why did the World Health Organization (WHO) put 6 feet as a social distancing? When someone coughs or sneezes, small droplets are spread from the cough or sneeze. If you are in close proximity, you can breathe in those droplets, which may contain the COVID-19 virus, according to the World Health Organization. Vanderbilt University infectious disease expert Dr. William Schaffner said the “6 feet distance” rule comes from studies of respiratory physiology. Schaffner explains that even “without a cough or sneeze, the exhaled air mixes with the surrounding air within a distance of 3 to 6 feet, which is known as the breathing zone.” Schaffner continues: “If you are standing 3 to 6 feet away from me, you may inhale droplets that spread through coughing or sneezing. Of course, if I am infected with the virus, these droplets will contain the virus.” 展开更多
关键词 Social Distancing COVID-19 Pandemic
下载PDF
Python Server Page Performance Analysis and Modeling
4
作者 Razafindraibe Marolahy Alix Randrianomenjanahary Lala Ferdinand +2 位作者 Rafamantanantsoa Fontaine Mahatody Thomas F. Angelo Raherinirina communications and network 2024年第1期1-30,共30页
Today, in the field of computer networks, new services have been developed on the Internet or intranets, including the mail server, database management, sounds, videos and the web server itself Apache. The number of s... Today, in the field of computer networks, new services have been developed on the Internet or intranets, including the mail server, database management, sounds, videos and the web server itself Apache. The number of solutions for this server is therefore growing continuously, these services are becoming more and more complex and expensive, without being able to fulfill the needs of the users. The absence of benchmarks for websites with dynamic content is the major obstacle to research in this area. These users place high demands on the speed of access to information on the Internet. This is why the performance of the web server is critically important. Several factors influence performance, such as server execution speed, network saturation on the internet or intranet, increased response time, and throughputs. By measuring these factors, we propose a performance evaluation strategy for servers that allows us to determine the actual performance of different servers in terms of user satisfaction. Furthermore, we identified performance characteristics such as throughput, resource utilization, and response time of a system through measurement and modeling by simulation. Finally, we present a simple queue model of an Apache web server, which reasonably represents the behavior of a saturated web server using the Simulink model in Matlab (Matrix Laboratory) and also incorporates sporadic incoming traffic. We obtain server performance metrics such as average response time and throughput through simulations. Compared to other models, our model is conceptually straightforward. The model has been validated through measurements and simulations during the tests that we conducted. 展开更多
关键词 Performance Analysis QUEUE Performance Model Web Server Internet World Wide Web Web Server Performance
下载PDF
An Introduction to RFID Technology 被引量:6
5
作者 Sanjay Ahuja Pavan Potti communications and network 2010年第3期183-186,共4页
RFID technology emerged some time back and was not used that much because of lack of standardization and high costs. Latest technologies have brought costs down and standards are being developed. Today RFID is mostly ... RFID technology emerged some time back and was not used that much because of lack of standardization and high costs. Latest technologies have brought costs down and standards are being developed. Today RFID is mostly used as a medium for numerous tasks including managing supply chains, tracking livestock, preventing counterfeiting, controlling building access, and supporting automated checkout. The use of RFID is limited by security concerns and delays in standardization. This paper describes RFID technology and its applications in today’s world. 展开更多
关键词 RFID RFID APPLICATIONS
下载PDF
Statistical Recognition Method of Binary BCH Code 被引量:6
6
作者 Jiafeng Wang Yang Yue Jun Yao communications and network 2011年第1期17-22,共6页
In this paper, a statistical recognition method of the binary BCH code is proposed. The method is applied to both primitive and non-primitive binary BCH code. The block length is first recognized based on the cyclic f... In this paper, a statistical recognition method of the binary BCH code is proposed. The method is applied to both primitive and non-primitive binary BCH code. The block length is first recognized based on the cyclic feature under the condition of the frame length known. And then candidate polynomials are achieved which meet the restrictions. Among the candidate polynomials, the most optimal polynomial is selected based on the minimum rule of the weights sum of the syndromes. Finally, the best polynomial was factorized to get the generator polynomial recognized. Simulation results show that the method has strong capability of anti-random bit error. Besides, the algorithm proposed is very simple, so it is very practical for hardware im-plementation. 展开更多
关键词 BINARY BCH CODE BLIND Recognition CODE Length GENERATOR POLYNOMIAL
下载PDF
Developing Healthcare Infrastructure in Saudi Arabia Using Smart Technologies: Challenges and Opportunities
7
作者 Amani Uraif communications and network 2024年第3期51-73,共23页
This study aims to explore the challenges and opportunities associated with developing healthcare infrastructure in Saudi Arabia through the implementation of smart technologies. The healthcare sector in Saudi Arabia ... This study aims to explore the challenges and opportunities associated with developing healthcare infrastructure in Saudi Arabia through the implementation of smart technologies. The healthcare sector in Saudi Arabia is undergoing significant transformation, and the integration of smart technologies has the potential to revolutionize healthcare delivery, improve patient outcomes, and enhance the overall healthcare experience. However, several challenges need to be addressed in order to fully leverage the benefits of smart technologies in healthcare infrastructure development. This research identifies and analyzes these challenges while also highlighting the opportunities that arise from the adoption of smart technologies in the Saudi Arabian healthcare system. The findings contribute to the understanding of the current state of healthcare infrastructure in Saudi Arabia and provide insights into the strategies and policies required to overcome challenges and maximize the benefits of smart technologies in healthcare. 展开更多
关键词 Healthcare Infrastructure Saudi Arabia Smart Technologies CHALLENGES OPPORTUNITIES
下载PDF
Space-Time Chaos Filtering for the Incoherent Paradigm for 6G Wireless System Design from Theoretic Perspective
8
作者 Valeri Kontorovich communications and network 2024年第3期74-89,共16页
The following material is devoted to the generalization of the chaos modeling to random fields in communication channels and its application on the space-time filtering for the incoherent paradigm;that is the purpose ... The following material is devoted to the generalization of the chaos modeling to random fields in communication channels and its application on the space-time filtering for the incoherent paradigm;that is the purpose of this research. The approach, presented hereafter, is based on the “Markovian” trend in modeling of random fields, and it is applied for the first time to the chaos field modeling through the well-known concept of the random “treatment” of deterministic dynamic systems, first presented by A. Kolmogorov, M. Born, etc. The material presents the generalized Stratonovich-Kushner Equations (SKE) for the optimum filtering of chaotic models of random fields and its simplified quasi-optimum solutions. In addition to this, the application of the multi-moment algorithms for quasi-optimum solutions is considered and, it is shown, that for scenarios, when the covariation interval of the input random field is less than the distance between the antenna elements, the gain of the space-time algorithms against their “time” analogies is significant. This is the general result presented in the following. 展开更多
关键词 Chaotic Fields Variation (Functional) Derivatives Quasi-Optimum Algorithms for Chaotic Models
下载PDF
A Review of Artificial Intelligence Applications in Contemporary Computer Network Technologies
9
作者 Ackim Lutepo Kai Zhang communications and network 2024年第3期90-107,共18页
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni... Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology. 展开更多
关键词 Artificial Intelligence Network Technology Internet of Things (IoT) CYBERSECURITY Mobile Communication
下载PDF
Optimization of Stealthwatch Network Security System for the Detection and Mitigation of Distributed Denial of Service (DDoS) Attack: Application to Smart Grid System
10
作者 Emmanuel S. Kolawole Penrose S. Cofie +4 位作者 John H. Fuller Cajetan M. Akujuobi Emmanuel A. Dada Justin F. Foreman Pamela H. Obiomon communications and network 2024年第3期108-134,共27页
The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communicati... The Smart Grid is an enhancement of the traditional grid system and employs new technologies and sophisticated communication techniques for electrical power transmission and distribution. The Smart Grid’s communication network shares information about status of its several integrated IEDs (Intelligent Electronic Devices). However, the IEDs connected throughout the Smart Grid, open opportunities for attackers to interfere with the communications and utilities resources or take clients’ private data. This development has introduced new cyber-security challenges for the Smart Grid and is a very concerning issue because of emerging cyber-threats and security incidents that have occurred recently all over the world. The purpose of this research is to detect and mitigate Distributed Denial of Service [DDoS] with application to the Electrical Smart Grid System by deploying an optimized Stealthwatch Secure Network analytics tool. In this paper, the DDoS attack in the Smart Grid communication networks was modeled using Stealthwatch tool. The simulated network consisted of Secure Network Analytic tools virtual machines (VMs), electrical Grid network communication topology, attackers and Target VMs. Finally, the experiments and simulations were performed, and the research results showed that Stealthwatch analytic tool is very effective in detecting and mitigating DDoS attacks in the Smart Grid System without causing any blackout or shutdown of any internal systems as compared to other tools such as GNS3, NeSSi2, NISST Framework, OMNeT++, INET Framework, ReaSE, NS2, NS3, M5 Simulator, OPNET, PLC & TIA Portal management Software which do not have the capability to do so. Also, using Stealthwatch tool to create a security baseline for Smart Grid environment, contributes to risk mitigation and sound security hygiene. 展开更多
关键词 Smart Grid System Distributed Denial of Service (DDoS) Attack Intrusion Detection and Prevention Systems DETECTION Mitigation and Stealthwatch
下载PDF
Research on An Improved PMF-FFT Fast PN Code Acquisition Algorithm 被引量:5
11
作者 Ning-qing Liu Bin Sun Chun-meng Guan communications and network 2013年第3期266-270,共5页
To solve the problem of the large Doppler frequency offset in the LEO communication system, this paper studies a rapid PN code acquisition method based on the PMF-FFT architecture, which searches the phase and frequen... To solve the problem of the large Doppler frequency offset in the LEO communication system, this paper studies a rapid PN code acquisition method based on the PMF-FFT architecture, which searches the phase and frequency offset and at the same time reduces the acquisition time. It presents an improved method equivalent to windowing function and uses windowing process to overcome the attenuation of related peak envelope caused by partial matched filters. 展开更多
关键词 DOPPLER Frequency OFFSET Rapid PN Code ACQUISITION ALGORITHM PMF-FFT WINDOWING
下载PDF
A Cooperative Cognitive Radio Spectrum Sensing Based on Correlation Sum Method with Linear Equalization
12
作者 Entesar Gemeay Ahmed Lebda communications and network 2023年第1期1-14,共14页
For moving forward toward the next generations of information technology and wireless communication, it is becoming necessary to find new resources of spectrum to fulfill the requirements of next generations from high... For moving forward toward the next generations of information technology and wireless communication, it is becoming necessary to find new resources of spectrum to fulfill the requirements of next generations from higher data rates and more capacity. Increasing efficiency of the spectrum usage is an urgent need as an intrinsic result of the rapidly increasing number of wireless users and the conversion of voice-oriented applications to multimedia applications. Spectrum sensing techniques in cognitive radio technology work upon an optimal usage of the available spectrum determined by the Federal Communication Commission (FCC). In this paper, the performance of a cooperative cognitive radio spectrum sensing detection based on the correlation sum method by utilizing the multiuser multiple input multiple output (MU_MIMO) technique over fading and Additive White Gaussian Noise (AWGN) channel is analyzed. Equalization is used at the receiver to compensate the effect of fading channels and improve the reliability of spectrum sensing. The performance is compared with the performance of Energy detection technique. The simulation results show that the detection performance of cooperative correlation sum method is more efficient than that obtained for the cooperative Energy detection technique. 展开更多
关键词 Spectrum Sensing Cognitive Radio MIMO EQUALIZATION
下载PDF
Analyses of Virtual MIMO Multi-User System Performance with Linear Precoding Schemes Using Indoor Measurements at 5 GHz
13
作者 Balla Moussa Coulibaly communications and network 2023年第1期15-24,共10页
In this paper, based on 5 GHz indoor multi-user measurements, linear precoding schemes such as zero-forcing (ZF), minimum mean square error (MMSE) and successive interference cancelation (SIC) are applied in the base ... In this paper, based on 5 GHz indoor multi-user measurements, linear precoding schemes such as zero-forcing (ZF), minimum mean square error (MMSE) and successive interference cancelation (SIC) are applied in the base station in order to investigate the performance of virtual multi-input multi-output (MIMO) over single-user MIMO system. However, to form a virtual MIMO multi-user system, the resources of two users are brought together. In order to achieve a low spatial correlation, two spaced antennas in the MS have been chosen and four spaced antennas elements in BS have been selected. Therefore, the resources of two users (U1 and U2) are brought together to form a 4 × 4 virtual MIMO multi-user system with the BS. The properties of the user_1 (U1) and user_2 (U2) will be analyzed and compared to those properties of virtual MIMO multi-user system formed by U1 and U2. In most cases, the maximum achievable rate is seen with virtual MIMO multi-user compared to single-user MIMO. So virtual MIMO multi-user is desirable for boosting system capacity than single-user MIMO. . 展开更多
关键词 Virtual MIMO Capacity ZF MMSE SIC
下载PDF
Impact of Heat Treatments and Hole Density (p) on the Structural, Electrical, and Superconducting Properties of LnSrBaCu3O6+z (Ln = Eu, Sm, Nd) Compounds
14
作者 Mohammed Bellioua Mohamed Id El Amel +8 位作者 Fatima Bouzit Mohamed Errai Driss Soubane Aderrahim Ait Khlifa Mohammed Khenfouch Issam Mouhti Ahmed Tirbiyine Essediq Youssef El Yakoubi Abdelhakim Nafidi communications and network 2023年第4期83-97,共15页
In this study, we thoroughly examined the impact of heat treatments and hole count (p) on the properties of LnSrBaCu<sub>3</sub>O<sub>6+z</sub> (Ln = Eu, Sm, Nd) compounds. We focused on prepar... In this study, we thoroughly examined the impact of heat treatments and hole count (p) on the properties of LnSrBaCu<sub>3</sub>O<sub>6+z</sub> (Ln = Eu, Sm, Nd) compounds. We focused on preparation, X-ray diffraction with Rietveld refinement, AC susceptibility, DC resistivity measurements, and heat treatment effects. Two heat treatment types were applied: oxygen annealing [O] and argon annealing followed by oxygen annealing [AO]. As the rare earth Ln’s ionic radius increased, certain parameters notably changed. Specifically, c parameter, surface area S, and volume V increased, while critical temperature Tc and holes (p) in the CuO<sub>2</sub> plane decreased. The evolution of these parameters with rare earth Ln’s ionic radius in [AO] heat treatment is linear. Regardless of the treatment, the structure is orthorhombic for Ln = Eu, tetragonal for Ln = Nd, orthorhombic for Ln = Sm [AO], and pseudo-tetragonal for Sm [O]. The highest critical temperature is reached with Ln = Eu (Tc [AO] = 87.1 K). Notably, for each sample, Tc [AO] surpasses Tc [O]. Observed data stems from factors including rare earth ionic size, improved cationic and oxygen chain order, holes count p in Cu(2)O<sub>2</sub> planes, and in-phase purity of [AO] samples. Our research strives to clearly demonstrate that the density of holes (p) within the copper plane stands as a determinant impacting the structural, electrical, and superconducting properties of these samples. Meanwhile, the other aforementioned parameters contribute to shaping this density (p). 展开更多
关键词 High-Tc Superconductors Heat Treatments Hole Density (p) Tc Parameter c Surface ab Electrical Resistance X-Ray Diffraction
下载PDF
Design and Simulation of an Audio Signal Alerting and Automatic Control System
15
作者 Winfred Adjardjah John Awuah Addor +1 位作者 Wisdom Opare Isaac Mensah Ayipeh communications and network 2023年第4期98-119,共22页
A large part of our daily lives is spent with audio information. Massive obstacles are frequently presented by the colossal amounts of acoustic information and the incredibly quick processing times. This results in th... A large part of our daily lives is spent with audio information. Massive obstacles are frequently presented by the colossal amounts of acoustic information and the incredibly quick processing times. This results in the need for applications and methodologies that are capable of automatically analyzing these contents. These technologies can be applied in automatic contentanalysis and emergency response systems. Breaks in manual communication usually occur in emergencies leading to accidents and equipment damage. The audio signal does a good job by sending a signal underground, which warrants action from an emergency management team at the surface. This paper, therefore, seeks to design and simulate an audio signal alerting and automatic control system using Unity Pro XL to substitute manual communication of emergencies and manual control of equipment. Sound data were trained using the neural network technique of machine learning. The metrics used are Fast Fourier transform magnitude, zero crossing rate, root mean square, and percentage error. Sounds were detected with an error of approximately 17%;thus, the system can detect sounds with an accuracy of 83%. With more data training, the system can detect sounds with minimal or no error. The paper, therefore, has critical policy implications about communication, safety, and health for underground mine. 展开更多
关键词 Emergency Response Emergency Management Team Audio Signal Alerting Automatic Control System Uni Pro XL Manual Communication Fast Fourier Transform Magnitude Zero Crossing Rate Root Means Square
下载PDF
A New Model for Spreading Malware over SMS Using Network Automata
16
作者 Erick Iván Medina-Salas Ana Lilia Laureano-Cruces Ma. Elena Lárraga-Ramírez communications and network 2023年第4期120-143,共24页
By the year 2026, it is estimated that the number of smartphone users in Mexico will be approximately 118.1 million. Each smartphone has the functionality of sending and receiving SMS (Short Message Service) messages,... By the year 2026, it is estimated that the number of smartphone users in Mexico will be approximately 118.1 million. Each smartphone has the functionality of sending and receiving SMS (Short Message Service) messages, which pose a significant threat to all users, as it makes any device vulnerable to a malware attack. In particular, worm-type malware takes advantage of this means of communication in order to spread. Studying the dynamics of malware propagation can help understand and prevent massive contagion between mobile devices. In this work, a model based on Network Automata and compartmental epidemiological models is presented, aiming to simulate, analyze and study the spread of worm-like malware through sending SMS on smartphones. 展开更多
关键词 Cellular Automaton Malware Spread Complex Systems Network Automaton
下载PDF
ADS-B Reception Error Correction Based on the LSTM Neural-Network Model
17
作者 Jamal Habibi Markani Syed Ibtehaj Raza Rizvi +2 位作者 Abdessamad Amrhar Jean-Marc Gagné René Jr. Landry communications and network 2023年第2期25-42,共18页
Standard automatic dependent surveillance broadcast (ADS-B) reception algorithms offer considerable performance at high signal-to-noise ratios (SNRs). However, the performance of ADS-B algorithms in applications can b... Standard automatic dependent surveillance broadcast (ADS-B) reception algorithms offer considerable performance at high signal-to-noise ratios (SNRs). However, the performance of ADS-B algorithms in applications can be problematic at low SNRs and in high interference situations, as detecting and decoding techniques may not perform correctly in such circumstances. In addition, conventional error correction algorithms have limitations in their ability to correct errors in ADS-B messages, as the bit and confidence values may be declared inaccurately in the event of low SNRs and high interference. The principal goal of this paper is to deploy a Long Short-Term Memory (LSTM) recurrent neural network model for error correction in conjunction with a conventional algorithm. The data of various flights are collected and cleaned in an initial stage. The clean data is divided randomly into training and test sets. Next, the LSTM model is trained based on the training dataset, and then the model is evaluated based on the test dataset. The proposed model not only improves the ADS-B In packet error correction rate (PECR), but it also enhances the ADS-B In terms of sensitivity. The performance evaluation results reveal that the proposed scheme is achievable and efficient for the avionics industry. It is worth noting that the proposed algorithm is not dependent on conventional algorithms’ prerequisites. 展开更多
关键词 ADS-B Long Short-Term Memory Packet Error Correction Rate Error Correction Bit Error Rate
下载PDF
A Meta-Learning Approach for Aircraft Trajectory Prediction
18
作者 Syed Ibtehaj Raza Rizvi Jamal Habibi Markani René Jr. Landry communications and network 2023年第2期43-64,共22页
The aviation industry has seen significant advancements in safety procedures over the past few decades, resulting in a steady decline in aviation deaths worldwide. However, the safety standards in General Aviation (GA... The aviation industry has seen significant advancements in safety procedures over the past few decades, resulting in a steady decline in aviation deaths worldwide. However, the safety standards in General Aviation (GA) are still lower compared to those in commercial aviation. With the anticipated growth in air travel, there is an imminent need to improve operational safety in GA. One way to improve aircraft and operational safety is through trajectory prediction. Trajectory prediction plays a key role in optimizing air traffic control and improving overall flight safety. This paper proposes a meta-learning approach to predict short- to mid-term trajectories of aircraft using historical real flight data collected from multiple GA aircraft. The proposed solution brings together multiple models to improve prediction accuracy. In this paper, we are combining two models, Random Forest Regression (RFR) and Long Short-term Memory (LSTM), using k-Nearest Neighbors (k-NN), to output the final prediction based on the combined output of the individual models. This approach gives our model an edge over single-model predictions. We present the results of our meta-learner and evaluate its performance against individual models using the Mean Absolute Error (MAE), Absolute Altitude Error (AAE), and Root Mean Squared Error (RMSE) evaluation metrics. The proposed methodology for aircraft trajectory forecasting is discussed in detail, accompanied by a literature review and an overview of the data preprocessing techniques used. The results demonstrate that the proposed meta-learner outperforms individual models in terms of accuracy, providing a more robust and proactive approach to improve operational safety in GA. 展开更多
关键词 Trajectory Prediction General Aviation Safety META-LEARNING Random Forest Regression Long Short-Term Memory Short to Mid-Term Trajectory Prediction Operational Safety
下载PDF
Why the Incoherent Paradigm Is for the Future Wireless Networks?
19
作者 Valeri Kontorovich communications and network 2023年第3期65-82,共18页
This material is aimed to attract attention to the “incoherent approach for power NOMA-RIS-MIMO transmission in wireless channels”. Such kind of approach might be successfully applied in future dense networks formed... This material is aimed to attract attention to the “incoherent approach for power NOMA-RIS-MIMO transmission in wireless channels”. Such kind of approach might be successfully applied in future dense networks formed by High-Speed Vehicles (HSV networks, etc.). Those scenarios take place in doubly selective communication channels typical for such kind of radio networks. The proposal for the presented hereafter incoherent view (“paradigm”) is based on several basic principles: 1) Shift from the “coherent “ideology”, i.e. rejection of the application of any type of Channel State Information (CSI, CSIT);2) Application of the so-called “invariant” to the communication channel’s features (distortions) modulation technique together with its incoherent demodulation;3) Orthogonal channel decomposition by means of “universal” eigen basis (in the form of Prolate Spheroidal Wave Functions, PSWF) as “artificial trajectories” of wave propagation;4) Chaotic filtering (chaos parameter settings as UE signatures) together with sequential multiuser parallel detection algorithms for users’ identification (classification). It is shown that the proposed approach might provide an effective use of the radio resource and it is relatively simple for implementation. 展开更多
关键词 Incoherent Processing Universal Eigen Functions Chaos Filtering Invariant Modulation
下载PDF
OFDM Wireless Downhole Transmission Systems and Proposed SLM Method for PAPR Reduction 被引量:4
20
作者 Renze Luo Yupu Dang +1 位作者 Rui Li Jiao Yang communications and network 2014年第1期9-14,共6页
At present, mud pulse transmission systems are widely used in downhole data transmission. But the systems are very low in transmission efficiency, only 5-10 bits/s, with very large anti-inter-symbol-interference (ISI)... At present, mud pulse transmission systems are widely used in downhole data transmission. But the systems are very low in transmission efficiency, only 5-10 bits/s, with very large anti-inter-symbol-interference (ISI). It cannot meet high requirements for high-speed transmission of modern logging system. The development of communication technology has laid some foundation for this requirement. For this purpose, the Orthogonal Frequency Division Multiplexing (OFDM) Wireless Downhole Transmission Systems are proposed for the first time because of their high transmission rate, anti-inter-symbol-interference (ISI), and high spectral efficiency, etc. Due to non-linear power amplifier (PA) of logging systems with limited dynamic range, the drawbacks of high peak-average power ratio (PAPR) may outweigh all the potential benefits of OFDM wireless downhole transmission systems. Selective mapping (SLM) method can reduce the PAPR of OFDM logging signals without distortion. But at the receiver, the conventional SLM method needs exact bits of side information (SI) to recover the data signal. The probability of erroneous SI detection has a significant influence on the error performance of the system. And individual transmissions of SI result in the reduction of bandwidth efficiency. To restore the exact data signal, our scheme codes the SI bits by linear block codes (LBC), and is easily decoded by syndrome decoding. And then the coding SI bits are superimposed onto the logging signals to omit SI bits transmission. The theory and simulation results show that the proposed method has better performance than the conventional one. Accordingly, the OFDM wireless downhole transmission systems can tackle the high PAPR problem, and highten the transmission rate of logging signals. 展开更多
关键词 ORTHOGONAL Frequency DIVISION MULTIPLEXING WIRELESS DOWNHOLE Transmission Systems ORTHOGONAL Frequency DIVISION MULTIPLEXING (OFDM) Logging While Drilling (LWD) Peak-to-Average Power Ratio (PAPR) Selected Mapping (SLM)
下载PDF
上一页 1 2 67 下一页 到第
使用帮助 返回顶部