IET Communications最新文献

筛选
英文 中文
MMSE-based passive beamforming for reconfigurable intelligent surface aided millimeter wave MIMO
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-06 DOI: 10.1049/cmu2.12873
Prabhat Raj Gautam, Li Zhang, Pingzhi Fan
{"title":"MMSE-based passive beamforming for reconfigurable intelligent surface aided millimeter wave MIMO","authors":"Prabhat Raj Gautam,&nbsp;Li Zhang,&nbsp;Pingzhi Fan","doi":"10.1049/cmu2.12873","DOIUrl":"https://doi.org/10.1049/cmu2.12873","url":null,"abstract":"<p>Reconfigurable intelligent surfaces (RISs) have emerged as propitious solution to configure random wireless channel into suitable propagation environment by adjusting a large number of low-cost passive reflecting elements. It is considered that narrowband downlink millimeter wave (mmWave) multiple-input multiple-output (MIMO) communication is aided by deploying an RIS. Large antenna arrays are used to counter the huge propagation loss suffered by the mmWave signals. Hybrid precoding in which precoding is performed in digital and analog domains is employed to reduce the number of costly and power-consuming radio frequency (RF) chains. Passive beamforming at RIS is designed together with precoder and combiner through joint optimization problem to minimize the mean square error between the transmit signal and the estimate of signal at the receiver. The optimization problem is solved by an iterative procedure in which solution to the non-convex reflecting coefficients design problem is approximated by extracting the phases of the solution to unconstrained problem without unit amplitude constraint of the reflecting elements. It is shown that the proposed design principle also applies to the wideband channel. Simulation results show that the proposed design delivers performance better than existing state-of-the-art solutions, but at lower complexity.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12873","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143112693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-06 DOI: 10.1049/cmu2.12879
Nemalikanti Anand, Saifulla M A, Pavan Kumar Aakula, Raveendra Babu Ponnuru, Rizwan Patan, Chegireddy Rama Prakasha Reddy
{"title":"Enhancing intrusion detection against denial of service and distributed denial of service attacks: Leveraging extended Berkeley packet filter and machine learning algorithms","authors":"Nemalikanti Anand,&nbsp;Saifulla M A,&nbsp;Pavan Kumar Aakula,&nbsp;Raveendra Babu Ponnuru,&nbsp;Rizwan Patan,&nbsp;Chegireddy Rama Prakasha Reddy","doi":"10.1049/cmu2.12879","DOIUrl":"https://doi.org/10.1049/cmu2.12879","url":null,"abstract":"<p>As organizations increasingly rely on network services, the prevalence and severity of Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as significant threats. The cornerstone of effectively addressing these challenges lies in the timely and precise detection capabilities offered by advanced intrusion detection systems (IDS). Hence, an innovative IDS framework is introduced that seamlessly integrates the extended Berkeley Packet Filter (eBPF) with powerful machine learning algorithms—specifically Decision Tree (DT), Random Forest (RF), Support Vector Machine (SVM), and TwinSVM—enabling unparalleled real-time detection of DDoS attacks. This cutting-edge solution provides a robust and scalable IDS framework to combat DoS and DDoS threats with high efficiency, leveraging eBPF's capabilities within the Linux kernel to bypass typical user space constraints. The methodology encompasses several key steps: (a) Collection of data from the renowned CIC-IDS-2017 repository; (b) Processing the raw data through a meticulous series of steps, including transmission, cleaning, reduction, and discretization; (c) Utilizing an ANOVA F-test for the extraction of critical features from the preprocessed data; (d) Application of various ML algorithms (DT, RF, SVM, and TwinSVM) to analyze the extracted features for potential intrusion; (e) Implementing an eBPF program to capture network traffic and harness trained model parameters for efficient attack detection directly within the kernel. The experimental results reveal outstanding accuracy rates of 99.38%, 99.44%, 88.73%, and 93.82% for DT, RF, SVM, and TwinSVM, respectively, alongside remarkable precision values of 99.71%, 99.65%, 84.31%, and 98.49%. This high-speed, accurate detection model is ideally suited for high-traffic environments such as data centers. Furthermore, its foundational architecture paves the way for future advancements, including the potential integration of eBPF with XDP to achieve even lower-latency packet processing. The experimental code is available at the GitHub repository link: https://github.com/NemalikantiAnand/Project.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12879","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143112694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight on-edge clustering for wireless AI-driven applications
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-02 DOI: 10.1049/cmu2.12874
Mustafa Raad Kadhim, Guangxi Lu, Yinong Shi, Jianbo Wang, Wu Kui
{"title":"Lightweight on-edge clustering for wireless AI-driven applications","authors":"Mustafa Raad Kadhim,&nbsp;Guangxi Lu,&nbsp;Yinong Shi,&nbsp;Jianbo Wang,&nbsp;Wu Kui","doi":"10.1049/cmu2.12874","DOIUrl":"https://doi.org/10.1049/cmu2.12874","url":null,"abstract":"<p>Advanced wireless communication is important in distribution systems for sharing information among Internet of Things (IoT) edges. Artificial intelligence (AI) analyzed the generated IoT data to make these decisions, ensuring efficient and effective operations. These technologies face significant security challenges, such as eavesdropping and adversarial attacks. Recent studies addressed this issue by using clustering analysis (CA) to uncover hidden patterns to provide AI models with clear interpretations. The high volume of overlapped samples in IoT data affects partitioning, interpretation, and reliability of CAs. Recent CA models have integrated machine learning techniques to address these issues, but struggle in the limited resources of IoT environments. These challenges are addressed by proposing a novel unsupervised lightweight distance clustering (DC) model based on data separation (<span></span><math>\u0000 <semantics>\u0000 <mi>β</mi>\u0000 <annotation>$beta$</annotation>\u0000 </semantics></math>). <span></span><math>\u0000 <semantics>\u0000 <mi>β</mi>\u0000 <annotation>$beta$</annotation>\u0000 </semantics></math> raises the tension between samples using cannot-link relations to separate the overlap, thus DC provides the interpretations. The optimal time and space complexity enables DC-<span></span><math>\u0000 <semantics>\u0000 <mi>β</mi>\u0000 <annotation>$beta$</annotation>\u0000 </semantics></math> to be implemented on on-edge computing, reducing data transmission overhead, and improving the robustness of the AI-IoT application. Extensive experiments were conducted across various datasets under different circumstances. The results show that the data separated by <span></span><math>\u0000 <semantics>\u0000 <mi>β</mi>\u0000 <annotation>$beta$</annotation>\u0000 </semantics></math> improved the efficiency of the proposed solution, with DC outperforming the baseline model.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12874","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
K $K$ -user cyclic shift-aided serial concatenated code for Gaussian multiple access channel
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-02 DOI: 10.1049/cmu2.12875
Meilin He, Mingjue Zhu, Zhaoyang Zhang, Rui Guo, Haiquan Wang
{"title":"K\u0000 $K$\u0000 -user cyclic shift-aided serial concatenated code for Gaussian multiple access channel","authors":"Meilin He,&nbsp;Mingjue Zhu,&nbsp;Zhaoyang Zhang,&nbsp;Rui Guo,&nbsp;Haiquan Wang","doi":"10.1049/cmu2.12875","DOIUrl":"https://doi.org/10.1049/cmu2.12875","url":null,"abstract":"<p>A <span></span><math>\u0000 <semantics>\u0000 <mi>K</mi>\u0000 <annotation>$K$</annotation>\u0000 </semantics></math>-user cyclic shift-aided serial concatenated code (SCC) is proposed over a Gaussian multiple access channel (MAC). In this code, a cyclic shift-aided SCC, which integrates a regular repeat-accumulate code with rate-<span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mn>1</mn>\u0000 <mo>/</mo>\u0000 <mi>q</mi>\u0000 </mrow>\u0000 <annotation>$1/q$</annotation>\u0000 </semantics></math> and cyclic shift spreading (CSS), is employed for each user. Here, CSS consists of a length-<span></span><math>\u0000 <semantics>\u0000 <mi>L</mi>\u0000 <annotation>$L$</annotation>\u0000 </semantics></math> bit spreading, a same chip-level interleaver and a user-specific cyclic shifter. This change avoids repeated complex interleaver generation operation and the main objective is to replace the random interleaver. At the receiver, iterative decoding is considered. For the design and optimization of the proposed code, a fixed point analysis (FPA) is developed to obtain the optimal <span></span><math>\u0000 <semantics>\u0000 <msup>\u0000 <mi>q</mi>\u0000 <mo>∗</mo>\u0000 </msup>\u0000 <annotation>$q^*$</annotation>\u0000 </semantics></math> and <span></span><math>\u0000 <semantics>\u0000 <msup>\u0000 <mi>L</mi>\u0000 <mo>∗</mo>\u0000 </msup>\u0000 <annotation>$L^*$</annotation>\u0000 </semantics></math> that achieves the maximum sum rate. Then, an analytic expression of collision probability is derived as a function of <span></span><math>\u0000 <semantics>\u0000 <mi>q</mi>\u0000 <annotation>$q$</annotation>\u0000 </semantics></math> and <span></span><math>\u0000 <semantics>\u0000 <mi>L</mi>\u0000 <annotation>$L$</annotation>\u0000 </semantics></math>. Finally, the advantage is analysed by comparing the generation time of interleaver. Moreover, FPA provides lower computation complexity in optimizing system parameters than the traditional EXIT chart method. Numerical results show that the design and optimization of the proposed code is more accurate, and support distinguishing between the users. The proposed code not only outperforms the traditional IDMA scheme in the bit error rate performance, but also provides much lower generation time of interleaver, especially for multiuser scenarios.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12875","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fair power allocation in dual function radar and communication systems
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-02 DOI: 10.1049/cmu2.12876
Pengzun Gao, Long Zhao, Kan Zheng
{"title":"A fair power allocation in dual function radar and communication systems","authors":"Pengzun Gao,&nbsp;Long Zhao,&nbsp;Kan Zheng","doi":"10.1049/cmu2.12876","DOIUrl":"https://doi.org/10.1049/cmu2.12876","url":null,"abstract":"<p>The dual function radar and communication technology plays a crucial role in Internet of Vehicles. However, fewer studies have focused on optimizing the joint performance of sensing and communication in full-duplex Internet of Vehicles while considering fairness. Therefore, this paper considers the scenario that the full-duplex gNB employs dual function radar and communication technology to simultaneously achieve vehicle localization and communication with multiple half-duplex vehicles. By leveraging a reasonable beamforming scheme to mitigate the residual self-interference of the echo signal, an optimization problem that maximizing the joint performance metric of sensing and communication is formulated with limited power at the gNB. After problem transformation, a double descent iteration power allocation algorithm is proposed to solve the non-convex optimization problem and the complexity of the algorithm is analysed. Simulation results demonstrate that the proposed algorithm converges and could fairly improve both the sensing and communication performance.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12876","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Scaling AI filmmaking with collaborative networking
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2025-01-02 DOI: 10.1049/cmu2.12877
Haohong Wang, Daniel Smith, Ugur Demir
{"title":"Scaling AI filmmaking with collaborative networking","authors":"Haohong Wang,&nbsp;Daniel Smith,&nbsp;Ugur Demir","doi":"10.1049/cmu2.12877","DOIUrl":"https://doi.org/10.1049/cmu2.12877","url":null,"abstract":"<p>In this work, MineStudio is introduced, a novel AI filmmaking framework designed to facilitate future creative collaborative networks. MineStudio uses a hybrid digitization approach that involves reconstructing 3D digital environments, capturing 2D live-action performances, employing AI tools to generate synthetic images and videos, and compositing with AI assistance. This method effectively addresses the main challenges in the current AI video generation, including consistency, directability, and issues with human actions and interactions. MineStudio has been utilized to create pioneering AI films, such as the love story “Next Stop Paris” and the sci-fi short film “Message in a Bot”, and has been recognized as a trailblazer in the AI filmmaking industry.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12877","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110849","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-set recognition of specific emitter based on complex-valued convolutional neural network
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-12-22 DOI: 10.1049/cmu2.12726
Chengyuan Sun, Tao Zhang, Yihang Du, Jiang Zhang
{"title":"Open-set recognition of specific emitter based on complex-valued convolutional neural network","authors":"Chengyuan Sun,&nbsp;Tao Zhang,&nbsp;Yihang Du,&nbsp;Jiang Zhang","doi":"10.1049/cmu2.12726","DOIUrl":"https://doi.org/10.1049/cmu2.12726","url":null,"abstract":"<p>Specific emitter identification (SEI) plays an important role in enhancing physical layer transmission security. However, with the promotion of wireless technology, the environment is filled with a large number of unknown wireless signals. SEI will face a more challenging scenario referred to as “open set.” To cope with the above difficulties, an open-set recognition (OSR) model based on complex-valued convolutional neural network (CVCNN) is proposed. The CVCNN can adapt to IQ signal input and extract complex domain features. Furthermore, a novel inter-class loss is proposed to effectively improve the classification performance. Finally, the classifier is designed based on the incremental approach. It can continuously learn new classes to achieve the recognition of multiple unknown emitters. The experiments show that compared with the real-valued convolutional neural network and the single loss function, the accuracy is improved by 3.8% and 10%, respectively.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12726","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143117998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi global context-aware transformer for ship name recognition in IoT
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-12-17 DOI: 10.1049/cmu2.12773
Yunting Xian, Lu Lu, Xuanrui Qiu, Jing Xian
{"title":"Multi global context-aware transformer for ship name recognition in IoT","authors":"Yunting Xian,&nbsp;Lu Lu,&nbsp;Xuanrui Qiu,&nbsp;Jing Xian","doi":"10.1049/cmu2.12773","DOIUrl":"https://doi.org/10.1049/cmu2.12773","url":null,"abstract":"<p>Scene text recognition has gained increasing attention in recent years, as it can connect products without an open interface in IoT. The non-local network is particularly popular in text recognition, as it can aggregate the temporal message of the input. However, existing text recognition methods based on RNN encoder-decoder structures encounter the problem of attention drift, especially in complex ship name recognition scenarios, because the features extracted by these methods are extremely similar. To address this problem, this paper proposes a novel text recognition approach named Multi Global Context-aware Transformer (MG-Cat). The proposed approach has two main properties: (1) a Global Context block that captures the global relationships among pixels inside the encoder, and (2) multiple global context-aware attention modules stacked in the encoder process. This way, the MG-Cat approach can learn a more robust intermediate feature representation in the text recognition pipeline. Moreover, the paper collected a new ship name dataset to evaluate the proposed approach. Extensive experiments were conducted on the collected dataset to verify the effectiveness of the proposed approach. The experimental results show the generalization ability of our squeeze-and-excitation global context attention module.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12773","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Audio steganalysis using multi-scale feature fusion-based attention neural network
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-12-16 DOI: 10.1049/cmu2.12806
Jinghui Peng, Yi Liao, Shanyu Tang
{"title":"Audio steganalysis using multi-scale feature fusion-based attention neural network","authors":"Jinghui Peng,&nbsp;Yi Liao,&nbsp;Shanyu Tang","doi":"10.1049/cmu2.12806","DOIUrl":"https://doi.org/10.1049/cmu2.12806","url":null,"abstract":"<p>Deep learning techniques have shown promise in audio steganalysis, which involves detecting the presence of hidden information (steganography) in audio files. However, deep learning models are prone to overfitting, particularly when there is limited data or when the model architecture is too complex relative to the available data for VoIP steganography. To address these issues, new deep-learning approaches need to be explored. In this study, a new convolutional neural network for audio steganalysis, incorporating a multi-scale feature fusion method and an attention mechanism, was devised to enhance the detection of steganographic content in audio signals encoded with G729a. To improve the network's adaptability, a multi-scale parallel multi-branch architecture was employed, allowing characteristic signals to be sampled with varying granularities and adjusting the receptive field effectively. The attention mechanism enables weight learning on the feature information after multi-scale processing, capturing the most relevant information for steganalysis. By combining multiple feature representations using a weighted combination, the deep learning model's performance was significantly enhanced. Through rigorous experimentation, an impressive accuracy rate of 94.55% was achieved in detecting malicious steganography. This outcome demonstrates the efficacy of the proposed neural network, leveraging both the multi-scale feature fusion method and the attention mechanism.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12806","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143115709","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on a high-performance signal distribution reconstruction algorithm for wireless communication networks
IF 1.5 4区 计算机科学
IET Communications Pub Date : 2024-12-13 DOI: 10.1049/cmu2.12765
Zhimeng Li, Hongjun Wang, Zhexian Shen
{"title":"Research on a high-performance signal distribution reconstruction algorithm for wireless communication networks","authors":"Zhimeng Li,&nbsp;Hongjun Wang,&nbsp;Zhexian Shen","doi":"10.1049/cmu2.12765","DOIUrl":"https://doi.org/10.1049/cmu2.12765","url":null,"abstract":"<p>With the rapid development of communication technology and the increasing demand for coverage refinement in wireless communication networks, the optimization of wireless communication networks is faced with unprecedented challenges. Obtaining the signal distribution map of wireless communication networks efficiently has become a popular area of study in this field. This paper considers a distributed sensing network architecture, a radial basis function neural network is used to process electromagnetic data and optimize the parameters of the random forest model. Then, interpolation processing of incomplete electromagnetic data is achieved by the improved random forest model, based on which a signal distribution map of the wireless communication network is reconstructed. The results indicate that the proposed algorithm yields high interpolation accuracy. The average error between the real signal distribution and the reconstructed signal distribution is 2.7973 dBm when the proportion of sampled nodes is 1%, and the similarity of the reconstructed signal distribution map to the original signal distribution map is good, demonstrating certain application prospects.</p>","PeriodicalId":55001,"journal":{"name":"IET Communications","volume":"19 1","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cmu2.12765","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143114664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信