Digital Communications and Networks最新文献

筛选
英文 中文
An autoencoder-based feature level fusion for speech emotion recognition 基于自动编码器的语音情感识别特征级融合
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.10.018
Peng Shixin, Chen Kai, Tian Tian, Chen Jingying
{"title":"An autoencoder-based feature level fusion for speech emotion recognition","authors":"Peng Shixin,&nbsp;Chen Kai,&nbsp;Tian Tian,&nbsp;Chen Jingying","doi":"10.1016/j.dcan.2022.10.018","DOIUrl":"10.1016/j.dcan.2022.10.018","url":null,"abstract":"<div><div>Although speech emotion recognition is challenging, it has broad application prospects in human-computer interaction. Building a system that can accurately and stably recognize emotions from human languages can provide a better user experience. However, the current unimodal emotion feature representations are not distinctive enough to accomplish the recognition, and they do not effectively simulate the inter-modality dynamics in speech emotion recognition tasks. This paper proposes a multimodal method that utilizes both audio and semantic content for speech emotion recognition. The proposed method consists of three parts: two high-level feature extractors for text and audio modalities, and an autoencoder-based feature fusion. For audio modality, we propose a structure called Temporal Global Feature Extractor (TGFE) to extract the high-level features of the time-frequency domain relationship from the original speech signal. Considering that text lacks frequency information, we use only a Bidirectional Long Short-Term Memory network (BLSTM) and attention mechanism to simulate an intra-modal dynamic. Once these steps have been accomplished, the high-level text and audio features are sent to the autoencoder in parallel to learn their shared representation for final emotion classification. We conducted extensive experiments on three public benchmark datasets to evaluate our method. The results on Interactive Emotional Motion Capture (IEMOCAP) and Multimodal EmotionLines Dataset (MELD) outperform the existing method. Additionally, the results of CMU Multi-modal Opinion-level Sentiment Intensity (CMU-MOSI) are competitive. Furthermore, experimental results show that compared to unimodal information and autoencoder-based feature level fusion, the joint multimodal information (audio and text) improves the overall performance and can achieve greater accuracy than simple feature concatenation.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1341-1351"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47336974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy-preserving authentication scheme based on zero trust architecture 基于零信任体系结构的隐私保护认证方案
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.01.021
Fei Tang , Chunliang Ma , Kefei Cheng
{"title":"Privacy-preserving authentication scheme based on zero trust architecture","authors":"Fei Tang ,&nbsp;Chunliang Ma ,&nbsp;Kefei Cheng","doi":"10.1016/j.dcan.2023.01.021","DOIUrl":"10.1016/j.dcan.2023.01.021","url":null,"abstract":"<div><div>Zero trust architecture is an end-to-end approach for server resources and data security which contains identity authentication, access control, dynamic evaluation, and so on. This work focuses on authentication technology in the zero trust network. In this paper, a Traceable Universal Designated Verifier Signature (TUDVS) is used to construct a privacy-preserving authentication scheme for zero trust architecture. Specifically, when a client requests access to server resources, we want to protect the client's access privacy which means that the server administrator cannot disclose the client's access behavior to any third party. In addition, the security of the proposed scheme is proved and its efficiency is analyzed. Finally, TUDVS is applied to the single packet authorization scenario of the zero trust architecture to prove the practicability of the proposed scheme.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1211-1220"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46147599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A learning automata based edge resource allocation approach for IoT-enabled smart cities 基于学习自动机的物联网智能城市边缘资源分配方法
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.11.009
Sampa Sahoo , Kshira Sagar Sahoo , Bibhudatta Sahoo , Amir H. Gandomi
{"title":"A learning automata based edge resource allocation approach for IoT-enabled smart cities","authors":"Sampa Sahoo ,&nbsp;Kshira Sagar Sahoo ,&nbsp;Bibhudatta Sahoo ,&nbsp;Amir H. Gandomi","doi":"10.1016/j.dcan.2023.11.009","DOIUrl":"10.1016/j.dcan.2023.11.009","url":null,"abstract":"<div><div>The development of the Internet of Things (IoT) technology is leading to a new era of smart applications such as smart transportation, buildings, and smart homes. Moreover, these applications act as the building blocks of IoT-enabled smart cities. The high volume and high velocity of data generated by various smart city applications are sent to flexible and efficient cloud computing resources for processing. However, there is a high computation latency due to the presence of a remote cloud server. Edge computing, which brings the computation close to the data source is introduced to overcome this problem. In an IoT-enabled smart city environment, one of the main concerns is to consume the least amount of energy while executing tasks that satisfy the delay constraint. An efficient resource allocation at the edge is helpful to address this issue. In this paper, an energy and delay minimization problem in a smart city environment is formulated as a bi-objective edge resource allocation problem. First, we presented a three-layer network architecture for IoT-enabled smart cities. Then, we designed a learning automata-based edge resource allocation approach considering the three-layer network architecture to solve the said bi-objective minimization problem. Learning Automata (LA) is a reinforcement-based adaptive decision-maker that helps to find the best task and edge resource mapping. An extensive set of simulations is performed to demonstrate the applicability and effectiveness of the LA-based approach in the IoT-enabled smart city environment.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1258-1266"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139021138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization 效率优化的6G:一种基于增强粒子群优化的虚拟网络资源协调策略
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.06.008
Sai Zou , Junrui Wu , Haisheng Yu , Wenyong Wang , Lisheng Huang , Wei Ni , Yan Liu
{"title":"Efficiency-optimized 6G: A virtual network resource orchestration strategy by enhanced particle swarm optimization","authors":"Sai Zou ,&nbsp;Junrui Wu ,&nbsp;Haisheng Yu ,&nbsp;Wenyong Wang ,&nbsp;Lisheng Huang ,&nbsp;Wei Ni ,&nbsp;Yan Liu","doi":"10.1016/j.dcan.2023.06.008","DOIUrl":"10.1016/j.dcan.2023.06.008","url":null,"abstract":"<div><div>The future Sixth-Generation (6G) wireless systems are expected to encounter emerging services with diverse requirements. In this paper, 6G network resource orchestration is optimized to support customized network slicing of services, and place network functions generated by heterogeneous devices into available resources. This is a combinatorial optimization problem that is solved by developing a Particle Swarm Optimization (PSO) based scheduling strategy with enhanced inertia weight, particle variation, and nonlinear learning factor, thereby balancing the local and global solutions and improving the convergence speed to globally near-optimal solutions. Simulations show that the method improves the convergence speed and the utilization of network resources compared with other variants of PSO.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1221-1233"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46688400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LOS and NLOS identification in real indoor environment using deep learning approach 使用深度学习方法识别真实室内环境中的直瞄和非直瞄
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.05.009
Alicja Olejniczak, Olga Blaszkiewicz, Krzysztof K. Cwalina, Piotr Rajchowski, Jaroslaw Sadowski
{"title":"LOS and NLOS identification in real indoor environment using deep learning approach","authors":"Alicja Olejniczak,&nbsp;Olga Blaszkiewicz,&nbsp;Krzysztof K. Cwalina,&nbsp;Piotr Rajchowski,&nbsp;Jaroslaw Sadowski","doi":"10.1016/j.dcan.2023.05.009","DOIUrl":"10.1016/j.dcan.2023.05.009","url":null,"abstract":"<div><div>Visibility conditions between antennas, i.e. Line-of-Sight (LOS) and Non-Line-of-Sight (NLOS) can be crucial in the context of indoor localization, for which detecting the NLOS condition and further correcting constant position estimation errors or allocating resources can reduce the negative influence of multipath propagation on wireless communication and positioning. In this paper a Deep Learning (DL) model to classify LOS/NLOS condition while analyzing two Channel Impulse Response (CIR) parameters: Total Power (TP) [dBm] and First Path Power (FP) [dBm] is proposed. The experiments were conducted using DWM1000 DecaWave radio module based on measurements collected in a real indoor environment and the proposed architecture provides LOS/NLOS identification with an accuracy of more than 100% and 95% in static and dynamic senarios, respectively. The proposed model improves the classification rate by 2-5% compared to other Machine Learning (ML) methods proposed in the literature.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1305-1312"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49035926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges 支持 IRS 的 NOMA 通信系统:网络架构入门与未来趋势和挑战
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.09.002
Haleema Sadia , Ahmad Kamal Hassan , Ziaul Haq Abbas , Ghulam Abbas , Muhammad Waqas , Zhu Han
{"title":"IRS-enabled NOMA communication systems: A network architecture primer with future trends and challenges","authors":"Haleema Sadia ,&nbsp;Ahmad Kamal Hassan ,&nbsp;Ziaul Haq Abbas ,&nbsp;Ghulam Abbas ,&nbsp;Muhammad Waqas ,&nbsp;Zhu Han","doi":"10.1016/j.dcan.2023.09.002","DOIUrl":"10.1016/j.dcan.2023.09.002","url":null,"abstract":"<div><div>Non-Orthogonal Multiple Access (NOMA) has already proven to be an effective multiple access scheme for 5th Generation (5G) wireless networks. It provides improved performance in terms of system throughput, spectral efficiency, fairness, and energy efficiency (EE). However, in conventional NOMA networks, performance degradation still exists because of the stochastic behavior of wireless channels. To combat this challenge, the concept of Intelligent Reflecting Surface (IRS) has risen to prominence as a low-cost intelligent solution for Beyond 5G (B5G) networks. In this paper, a modeling primer based on the integration of these two cutting-edge technologies, i.e., IRS and NOMA, for B5G wireless networks is presented. An in-depth comparative analysis of IRS-assisted Power Domain (PD)-NOMA networks is provided through 3-fold investigations. First, a primer is presented on the system architecture of IRS-enabled multiple-configuration PD-NOMA systems, and parallels are drawn with conventional network configurations, i.e., conventional NOMA, Orthogonal Multiple Access (OMA), and IRS-assisted OMA networks. Followed by this, a comparative analysis of these network configurations is showcased in terms of significant performance metrics, namely, individual users' achievable rate, sum rate, ergodic rate, EE, and outage probability. Moreover, for multi-antenna IRS-enabled NOMA networks, we exploit the active Beamforming (BF) technique by employing a greedy algorithm using a state-of-the-art branch-reduce-and-bound (BRB) method. The optimality of the BRB algorithm is presented by comparing it with benchmark BF techniques, i.e., minimum-mean-square-error, zero-forcing-BF, and maximum-ratio-transmission. Furthermore, we present an outlook on future envisioned NOMA networks, aided by IRSs, i.e., with a variety of potential applications for 6G wireless networks. This work presents a generic performance assessment <em>toolkit</em> for wireless networks, focusing on IRS-assisted NOMA networks. This comparative analysis provides a solid foundation for the development of future IRS-enabled, energy-efficient wireless communication systems.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1503-1528"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135347605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure data rate maximization for full-duplex UAV-enabled base station 全双工无人机基站的安全数据速率最大化
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.11.012
Chunlong He , Xinjie Li , Yin Huang , Jianzhen Lin , Gongbin Qian , Xingquan Li
{"title":"Secure data rate maximization for full-duplex UAV-enabled base station","authors":"Chunlong He ,&nbsp;Xinjie Li ,&nbsp;Yin Huang ,&nbsp;Jianzhen Lin ,&nbsp;Gongbin Qian ,&nbsp;Xingquan Li","doi":"10.1016/j.dcan.2022.11.012","DOIUrl":"10.1016/j.dcan.2022.11.012","url":null,"abstract":"<div><div>Unmanned Aerial Vehicle (UAV) is an air base station featuring flexible deployment and mobility. It can significantly improve the communication quality of the system due to its line-of-sight channel connection with ground devices. However, due to the openness of UAV-to-Ground channels, the communication between ground users’ devices and UAV is easily eavesdropped. In this paper, we aim to improve the security of communication system by using full-duplex UAV as a mobile air base station. The UAV sends interference signals to eavesdroppers and receives signals from ground devices. We jointly optimize the scheduling between the UAV and ground devices, the transmission power of the UAV and ground devices, as well as the trajectory of the UAV to maximize the minimum average security communication data rate. This optimization problem is mixed with integers and non-convex expressions. Therefore, this problem is not a standard convex optimization problem, which can not be solved with standard methods. With this in mind, we propose an effective algorithm which solves this problem iteratively by applying Successive Convex Approximation (SCA), variable relaxation and substitution. Finally, numerical results demonstrate the effectiveness of the proposed algorithm.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1387-1393"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46434399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing 粒度分类器:基于粒度计算构建加密流量分类的流量粒度
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2022.12.017
Xuyang Jing , Jingjing Zhao , Zheng Yan , Witold Pedrycz , Xian Li
{"title":"Granular classifier: Building traffic granules for encrypted traffic classification based on granular computing","authors":"Xuyang Jing ,&nbsp;Jingjing Zhao ,&nbsp;Zheng Yan ,&nbsp;Witold Pedrycz ,&nbsp;Xian Li","doi":"10.1016/j.dcan.2022.12.017","DOIUrl":"10.1016/j.dcan.2022.12.017","url":null,"abstract":"<div><div>Accurate classification of encrypted traffic plays an important role in network management. However, current methods confronts several problems: inability to characterize traffic that exhibits great dispersion, inability to classify traffic with multi-level features, and degradation due to limited training traffic size. To address these problems, this paper proposes a traffic granularity-based cryptographic traffic classification method, called Granular Classifier (GC). In this paper, a novel Cardinality-based Constrained Fuzzy C-Means (CCFCM) clustering algorithm is proposed to address the problem caused by limited training traffic, considering the ratio of cardinality that must be linked between flows to achieve good traffic partitioning. Then, an original representation format of traffic is presented based on granular computing, named Traffic Granules (TG), to accurately describe traffic structure by catching the dispersion of different traffic features. Each granule is a compact set of similar data with a refined boundary by excluding outliers. Based on TG, GC is constructed to perform traffic classification based on multi-level features. The performance of the GC is evaluated based on real-world encrypted network traffic data. Experimental results show that the GC achieves outstanding performance for encrypted traffic classification with limited size of training traffic and keeps accurate classification in dynamic network conditions.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1428-1438"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44647460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring OFDM稀疏信道估计中的能量泄漏:OMP的缺点和图像去模糊的应用
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-10-01 DOI: 10.1016/j.dcan.2023.08.003
Gang Qiao , Xizhu Qiang , Lei Wan , Hanbo Jia
{"title":"Energy leakage in OFDM sparse channel estimation: The drawback of OMP and the application of image deblurring","authors":"Gang Qiao ,&nbsp;Xizhu Qiang ,&nbsp;Lei Wan ,&nbsp;Hanbo Jia","doi":"10.1016/j.dcan.2023.08.003","DOIUrl":"10.1016/j.dcan.2023.08.003","url":null,"abstract":"<div><div>In this paper, in order to reduce the energy leakage caused by the discretized representation in sparse channel estimation for Orthogonal Frequency Division Multiplexing (OFDM) systems, we systematically have analyzed the optimal locations of atoms with discrete delays for each path reconstruction from the perspective of linear fitting theory. Then, we have investigated the adverse effects of the non-ideal inner product function on the iteration in one of the most widely used channel estimation method, Orthogonal Matching Pursuit (OMP). The study shows that the distance between the selected atoms for each path in OMP can be larger than the sampling interval, which prevents OMP-based methods from achieving better performance. To overcome this drawback, the image deblurring-based channel estimation method, in which the channel estimation problem is analogized to one-dimensional image deblurring, was proposed to improve the large compensation distance of traditional OMP. The advantage of the proposed method was validated by the results of numerical simulation and sea trial data decoding.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 5","pages":"Pages 1280-1288"},"PeriodicalIF":7.5,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45194656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model 基于 Wiener-Hammerstein 模型的多波段无源互调数字消除技术
IF 7.5 2区 计算机科学
Digital Communications and Networks Pub Date : 2024-08-01 DOI: 10.1016/j.dcan.2024.06.002
Jinxiang Liu , Xiaotao Zhang , Jun Yang , Huiping Yang
{"title":"Digital cancellation of multi-band passive inter-modulation based on Wiener-Hammerstein model","authors":"Jinxiang Liu ,&nbsp;Xiaotao Zhang ,&nbsp;Jun Yang ,&nbsp;Huiping Yang","doi":"10.1016/j.dcan.2024.06.002","DOIUrl":"10.1016/j.dcan.2024.06.002","url":null,"abstract":"<div><p>Utilizing multi-band and multi-carrier techniques enhances throughput and capacity in Long-Term Evolution (LTE)-Advanced and 5G New Radio (NR) mobile networks. However, these techniques introduce Passive Inter-Modulation (PIM) interference in Frequency-Division Duplexing (FDD) systems. In this paper, a novel multi-band Wiener-Hammerstein model is presented to digitally reconstruct PIM interference signals, thereby achieving effective PIM Cancellation (PIMC) in multi-band scenarios. In the model, transmitted signals are independently processed to simulate Inter-Modulation Distortions (IMDs) and Cross-Modulation Distortions (CMDs). Furthermore, the Finite Impulse Response (FIR) filter, basis function generation, and B-spline function are applied for precise PIM product estimation and generation in multi-band scenarios. Simulations involving 4 carrier components from diverse NR frequency bands at varying transmitting powers validate the feasibility of the model for multi-band PIMC, achieving up to 19 dB in PIMC performance. Compared to other models, this approach offers superior PIMC performance, exceeding them by more than 5 dB in high transmitting power scenarios. Additionally, its lower sampling rate requirement reduces the hardware complexity associated with implementing multi-band PIMC.</p></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"10 4","pages":"Pages 1189-1197"},"PeriodicalIF":7.5,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2352864824000695/pdfft?md5=2a6267187794fafdb2d9a61eec6727df&pid=1-s2.0-S2352864824000695-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142148977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信