Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Holistic learning and optimization scheme for wireless networks 无线网络的整体学习和优化方案
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-30 DOI: 10.1002/ett.5036
Arif Husen, Muhammad Hasanain Chaudary, Farooq Ahmad, Abid Sohail
{"title":"Holistic learning and optimization scheme for wireless networks","authors":"Arif Husen,&nbsp;Muhammad Hasanain Chaudary,&nbsp;Farooq Ahmad,&nbsp;Abid Sohail","doi":"10.1002/ett.5036","DOIUrl":"https://doi.org/10.1002/ett.5036","url":null,"abstract":"<p>Future networks are expected to use Artificial Intelligence and machine learning applications intensely. The primary focus of machine learning techniques will be on intelligent automation and decision-making based on information learned from network functions, resources, and users. The research community has studied several schemes for using machine learning in communications and networks in the last two decades. However, the schemes mainly focus on learning the state information of individual network functions and resources and performing their optimization in a standalone fashion. Recently, a study group from the International Telecommunication Union has outlined machine learning pipeline requirements. It addresses several aspects of machine learning operations, such as model selection, data sources, and action points. However, the mechanisms to define the state of network functions and resources for different network layers and domains are yet to be explored. Therefore, in addition to the above, specific studies are required for cross-layer and administrative domain knowledge sharing and holistic optimization. Without considering the holistic view, applying machine learning to optimizing individual functions and resources may result in nonoptimal and unexpected behaviors instead of having any positive effect. The need for global and deep holistic learning has recently been identified in the literature; however, no implementation of the above scheme has been studied or evaluated for networks. This article proposes a novel approach, implementing global and deep holistic learning in wireless networks toward fulfilling the requirements of future intelligent networks. It also proposes an objective function-based feature engineering for wireless networks. Experimental results of the proposed scheme show significant improvements in the network performance and accuracy of the machine learning models. Moreover, applications of transfer learning to base learners for network functions and resources can significantly expedite decision-making with reduced computational costs.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks 合作式水下声学通信网络的鲁棒联合多资源分配算法
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-29 DOI: 10.1002/ett.5038
Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang
{"title":"Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks","authors":"Song Han,&nbsp;Aijia Li,&nbsp;Xiaotong Jiang,&nbsp;Xinbin Li,&nbsp;Zhixin Liu,&nbsp;Lei Yan,&nbsp;Tongwei Zhang","doi":"10.1002/ett.5038","DOIUrl":"https://doi.org/10.1002/ett.5038","url":null,"abstract":"<p>In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning solutions for mobile internet of things security: A literature review and research agenda 移动物联网安全的机器学习解决方案:文献综述与研究议程
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-25 DOI: 10.1002/ett.5041
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Marica Amadeo, Farhan Ahmad
{"title":"Machine learning solutions for mobile internet of things security: A literature review and research agenda","authors":"Hadjer Messabih,&nbsp;Chaker Abdelaziz Kerrache,&nbsp;Youssra Cheriguene,&nbsp;Marica Amadeo,&nbsp;Farhan Ahmad","doi":"10.1002/ett.5041","DOIUrl":"https://doi.org/10.1002/ett.5041","url":null,"abstract":"<p>In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications LBCSC:用于安全和保护隐私的车辆通信的基于格子的变色龙签名加密方案
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-19 DOI: 10.1002/ett.5040
Jianhong Zhang, Xinyan Cui
{"title":"LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications","authors":"Jianhong Zhang,&nbsp;Xinyan Cui","doi":"10.1002/ett.5040","DOIUrl":"https://doi.org/10.1002/ett.5040","url":null,"abstract":"<p>Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142273097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization 使用时间控制水母优化增强聚类分层算法的延迟敏感和能量自适应聚类分层协议
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-17 DOI: 10.1002/ett.5039
Atul Kumar Agnihotri, Vishal Awasthi
{"title":"Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization","authors":"Atul Kumar Agnihotri,&nbsp;Vishal Awasthi","doi":"10.1002/ett.5039","DOIUrl":"https://doi.org/10.1002/ett.5039","url":null,"abstract":"<p>Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142244971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing SKALP:用于露水辅助物联网边缘计算的安全密钥协议和轻量级协议
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-10 DOI: 10.1002/ett.5035
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Husnain Abbas Naqvi
{"title":"SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing","authors":"Saeed Ullah Jan,&nbsp;Anwar Ghani,&nbsp;Abdulrahman Alzahrani,&nbsp;Muhammad Usman Tariq,&nbsp;Fahad Algarni,&nbsp;Husnain Abbas Naqvi","doi":"10.1002/ett.5035","DOIUrl":"https://doi.org/10.1002/ett.5035","url":null,"abstract":"<p>The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition RF-GCN:利用多模态的残差融合图卷积网络进行面部情绪识别
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-07 DOI: 10.1002/ett.5031
D. Vishnu Sakthi, P. Ezhumalai
{"title":"RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition","authors":"D. Vishnu Sakthi,&nbsp;P. Ezhumalai","doi":"10.1002/ett.5031","DOIUrl":"https://doi.org/10.1002/ett.5031","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>The emotional state of individuals is difficult to identify and it is developing now a days because of vast interest in recognition. Many technologies have been developed to identify this emotional expression based on facial expressions, vocal expressions, physiological signals, and body expressions. Among these, facial emotion is very expressive for recognition using multimodalities. Understanding facial emotions has applications in mental well-being, decision-making, and even social change, as emotions play a crucial role in our lives. This recognition is complicated by the high dimensionality of data and non-linear interactions across modalities. Moreover, the way emotion is expressed by people varies and these feature identification remains challenging, where these limitations are overcome by Deep learning models.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>This research work aims at facial emotion recognition through the utilization of a deep learning model, named the proposed Residual Fused-Graph Convolution Network (RF-GCN). Here, multimodal data included is video as well as an Electroencephalogram (EEG) signal. Also, the Non-Local Means (NLM) filter is used for pre-processing input video frames. Here, the feature selection process is carried out using chi-square, after feature extraction, which is done in both pre-processed video frames and input EEG signals. Finally, facial emotion recognition and its types are determined by RF-GCN, which is a combination of both the Deep Residual Network (DRN) and Graph Convolutional Network (GCN).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>Further, RF-GCN is evaluated for performance by metrics such as accuracy, recall, and precision, with superior values of 91.6%, 96.5%, and 94.7%.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusions</h3>\u0000 \u0000 <p>RF-GCN captures the nuanced relationships between different emotional states and improves recognition accuracy. The model is trained and evaluated on the dataset and reflects real-world conditions.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142152180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning 利用深度强化学习实现城域网云中的可靠信息传递和动态链路利用
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-09-04 DOI: 10.1002/ett.5028
Shuhong Kuang, Jiyong Zhang, Amin Mohajer
{"title":"Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning","authors":"Shuhong Kuang,&nbsp;Jiyong Zhang,&nbsp;Amin Mohajer","doi":"10.1002/ett.5028","DOIUrl":"https://doi.org/10.1002/ett.5028","url":null,"abstract":"<p>Modern networking demands efficient and reliable information delivery within Mobile Ad-hoc Network (MANET) and cloud environments. This paper introduces a novel approach that employs Multi-Agent Deep Learning (MADL) for adaptive resource allocation, addressing the challenges of optimizing traffic and ensuring dependable information delivery while adhering to Service Level Agreement (SLA) constraints. Our method dynamically allocates resources across nodes, leveraging the synergy between Advanced Cloud Computing and Edge Computing to balance centralized processing and localized adaptability. The integration of Graph Neural Networks (GNNs) further enhances this process by adapting resource allocation decisions based on network topology. Through iterative learning, our algorithm fine-tunes continuous-time resource optimization policies, resulting in substantial improvements in throughput and latency minimization. Simulations validate the effectiveness of our approach, demonstrating its potential to contribute to the advancement of MANET cloud networks by offering adaptability, efficiency, and real-time optimization for reliable information delivery and dynamic link utilization.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142137706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semantic axiomatic design for integrity in IoT 物联网完整性的语义公理设计
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-08-27 DOI: 10.1002/ett.5032
Maryam Nooraei Abadeh
{"title":"A semantic axiomatic design for integrity in IoT","authors":"Maryam Nooraei Abadeh","doi":"10.1002/ett.5032","DOIUrl":"https://doi.org/10.1002/ett.5032","url":null,"abstract":"<p>In the complex, critical, and rapidly evolving era of Industry 4.0 manufacturing, mature engineering disciplines can be developed to validate system designs at an abstract level, enabling effective fault-free environments. However, designing integrated IoT platforms presents significant challenges due to their inherent complexity and interoperability issues. To address this challenge, the proposed framework integrates axiomatic design principles with considerations for data integrity and domain ontology. Furthermore, this paper introduces a multi-level integrity rule repository for IoT application to provides a robust foundation for designing and maintaining IoT systems. To validate the effectiveness of this approach, we conducted a study across four domains of smart cities. The design's quality was assessed using model quality parameters, including completeness, consistency and validity. Our analysis shows that the semantic-aware axiomatic design framework can effectively address the problem of inconsistencies and low-quality design in scientific IoT environments, providing a more reliable and efficient solution.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming 利用 EfficientNet-B7 驱动的深度学习波束成形技术增强 5G 大规模 MIMO 系统
IF 2.5 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-08-26 DOI: 10.1002/ett.5034
Bendjillali Ridha Ilyas, Bendelhoum Mohammed Sofiane, Tadjeddine Ali Abderrazak, Kamline Miloud
{"title":"Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming","authors":"Bendjillali Ridha Ilyas,&nbsp;Bendelhoum Mohammed Sofiane,&nbsp;Tadjeddine Ali Abderrazak,&nbsp;Kamline Miloud","doi":"10.1002/ett.5034","DOIUrl":"https://doi.org/10.1002/ett.5034","url":null,"abstract":"<p>The development of wireless communication systems is a challenging and constantly evolving field and the issue of gaining optimal performance is of utmost importance. This work intends to give a thorough and detailed description of massive MIMO technology and its properties, with a significant emphasis on digital beamforming (FDB) and hybrid beamforming (HBF) techniques and the potential of combining them with the most recent and exciting frontier of research: deep learning. On one hand, FDB provides accurate signal control but, on the other hand, it deals with substantial needs like high-power consumption. This challenge makes the focus shift to HBF—the innovative technology successfully coupled with deep learning's powerful potential. The chosen research explores extensively the major areas of application and compatibility of this operating mode in a diverse range of operational situations in the interference environment as well as in different levels of noise conditions. Moreover, the study offers a comprehensive comparison, which is highly effective in exploring further methods that focus on improving spectral efficiency. Significantly, the “Proposed Method” is suggested to be at the leading position, which demonstrates superior performance. Showing outstanding generalization capability, versatile robustness, and efficiency of usage in the proposed framework rely on EfficientNet-B7 as the major portion. This makes it adaptive to its dynamic surroundings and puts it as a powerful tool in the world of advanced connectivity and massive MIMO technology. Due to its core ability to respond to changes in conditions effectively and efficiently, the proposed framework is seen as one of the most powerful approaches that could be used to change wireless communication systems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信