首页 > 最新文献

2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)最新文献

英文 中文
FIDGAN: A Generative Adversarial Network with An Inception Distance 具有初始距离的生成对抗网络
Jina Lee, Minhyeok Lee
Two evaluation metrics for GAN models have been proposed in existing studies: Inception score (IS) and Fréchet Inception distance (FID). We propose a new GAN model based on the idea that backpropagating the FID score would guide the GAN to efficiently learn the distribution of real images and generate high-quality images. Based on such an idea, we propose a training loss for the generator to minimize a modified FID loss. Trained with the CIFAR-10 dataset, FIDGAN exhibited an FID of 11.78, which corresponds to a reduced FID compared to an existing model called BigGAN by 20.0%.
已有研究提出了两种GAN模型的评价指标:Inception score (IS)和fr Inception distance (FID)。我们提出了一种新的GAN模型,该模型基于反向传播FID分数可以指导GAN有效地学习真实图像的分布并生成高质量的图像。基于这一思想,我们提出了一个训练损失的发电机,以减少修改后的FID损失。使用CIFAR-10数据集进行训练,FIDGAN的FID为11.78,与现有的BigGAN模型相比,FID降低了20.0%。
{"title":"FIDGAN: A Generative Adversarial Network with An Inception Distance","authors":"Jina Lee, Minhyeok Lee","doi":"10.1109/ICAIIC57133.2023.10066964","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10066964","url":null,"abstract":"Two evaluation metrics for GAN models have been proposed in existing studies: Inception score (IS) and Fréchet Inception distance (FID). We propose a new GAN model based on the idea that backpropagating the FID score would guide the GAN to efficiently learn the distribution of real images and generate high-quality images. Based on such an idea, we propose a training loss for the generator to minimize a modified FID loss. Trained with the CIFAR-10 dataset, FIDGAN exhibited an FID of 11.78, which corresponds to a reduced FID compared to an existing model called BigGAN by 20.0%.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115582768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Mini Literature Review on Integrating Cybersecurity for Business Continuity 整合网络安全业务连续性的小型文献综述
Safa Altaha, Mohammad Sohel Rahman
Governments, organizations, and companies shall implement some measures to ensure the security and continuity of their business operations especially those with high criticality and availability. If cyber threats can bring down a company for a long time and create reputational impacts which cause painful financial losses of hundreds of thousands or millions of Saudi riyals and significant disruptions to business operations, then we should think of business continuity. As a result, as organizations build their business continuity and disaster recovery plans and procedures, cybersecurity measures must be integrated throughout the entire process. This paper focuses on falling the gaps between cybersecurity and business continuity and integrating them in order to establish resilience systems and enable organizations to ensure that the proper processes are being put in place and resources are allocated to help facilitate a smooth transition as they recover from cyber incidents.
政府、组织和公司应采取一些措施,以确保其业务运营的安全性和连续性,特别是那些具有高临界性和可用性的业务运营。如果网络威胁可以使一家公司长期瘫痪,并造成声誉影响,造成数十万或数百万沙特里亚尔的痛苦经济损失,并对业务运营造成重大干扰,那么我们应该考虑业务连续性。因此,当组织建立业务连续性和灾难恢复计划和程序时,必须将网络安全措施集成到整个过程中。本文的重点是缩小网络安全和业务连续性之间的差距,并将它们整合起来,以建立弹性系统,并使组织能够确保适当的流程到位,并分配资源,以帮助组织在从网络事件中恢复时顺利过渡。
{"title":"A Mini Literature Review on Integrating Cybersecurity for Business Continuity","authors":"Safa Altaha, Mohammad Sohel Rahman","doi":"10.1109/ICAIIC57133.2023.10067127","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067127","url":null,"abstract":"Governments, organizations, and companies shall implement some measures to ensure the security and continuity of their business operations especially those with high criticality and availability. If cyber threats can bring down a company for a long time and create reputational impacts which cause painful financial losses of hundreds of thousands or millions of Saudi riyals and significant disruptions to business operations, then we should think of business continuity. As a result, as organizations build their business continuity and disaster recovery plans and procedures, cybersecurity measures must be integrated throughout the entire process. This paper focuses on falling the gaps between cybersecurity and business continuity and integrating them in order to establish resilience systems and enable organizations to ensure that the proper processes are being put in place and resources are allocated to help facilitate a smooth transition as they recover from cyber incidents.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125354082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Suspicious Activity Trigger System using YOLOv6 Convolutional Neural Network 使用YOLOv6卷积神经网络的可疑活动触发系统
S. Awang, Mohd Qhairel Rafiqi Rokei, J. Sulaiman
Property theft is one of the crimes that increases in which leads to a major concern in Malaysia. Despite of having surveillance cameras (CCTV) everywhere, the crimes keep occur due to the lack of security system. The security system can be developed by utilizing the existence of CCTVs specifically home surveillance CCTV. Therefore, this paper introduces a security system known as Suspicious Activity Trigger System (SATS) that able to automatically trigger an alarm or an alert message whenever suspicious activity is detected from the CCTV video image. The activity will be detected in a video image using Deep Learning technique which is YOLOv6 Convolutional Neural Network (CNN) algorithm. The algorithm will detect an object which is a person in the video and classify it as a suspicious activity or not. If the activity is classified as the suspicious activity, the system will automatically display a trigger message to alert SATS user. The user can therefore take whatever appropriate measure to prevent being a victim. Experiments have been conducted using a dataset taken from Google Open Image. We also implemented the experiments on the self-obtained dataset. Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. Therefore, YOLOv6 can be implemented in the security system to prevent crimes in residency areas.
财产盗窃是日益增加的犯罪之一,在马来西亚引起了很大的关注。尽管到处都有监控摄像头(CCTV),但由于缺乏安全系统,犯罪事件不断发生。安全系统可以利用现有的闭路电视,特别是家庭监控闭路电视来开发。因此,本文介绍了一种称为可疑活动触发系统(SATS)的安全系统,该系统能够在从CCTV视频图像中检测到可疑活动时自动触发警报或警报消息。使用深度学习技术,即YOLOv6卷积神经网络(CNN)算法,将在视频图像中检测活动。该算法将检测视频中是否有人的物体,并将其归类为可疑活动。如果该活动被归类为可疑活动,系统将自动显示触发消息以提醒SATS用户。因此,用户可以采取任何适当的措施来防止成为受害者。实验使用了来自Google Open Image的数据集。我们还在自己获得的数据集上进行了实验。实验结果表明,该算法的准确率为96.6%,精密度为92.53%。因此,YOLOv6可以在安全系统中实施,以防止居民区的犯罪。
{"title":"Suspicious Activity Trigger System using YOLOv6 Convolutional Neural Network","authors":"S. Awang, Mohd Qhairel Rafiqi Rokei, J. Sulaiman","doi":"10.1109/ICAIIC57133.2023.10066970","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10066970","url":null,"abstract":"Property theft is one of the crimes that increases in which leads to a major concern in Malaysia. Despite of having surveillance cameras (CCTV) everywhere, the crimes keep occur due to the lack of security system. The security system can be developed by utilizing the existence of CCTVs specifically home surveillance CCTV. Therefore, this paper introduces a security system known as Suspicious Activity Trigger System (SATS) that able to automatically trigger an alarm or an alert message whenever suspicious activity is detected from the CCTV video image. The activity will be detected in a video image using Deep Learning technique which is YOLOv6 Convolutional Neural Network (CNN) algorithm. The algorithm will detect an object which is a person in the video and classify it as a suspicious activity or not. If the activity is classified as the suspicious activity, the system will automatically display a trigger message to alert SATS user. The user can therefore take whatever appropriate measure to prevent being a victim. Experiments have been conducted using a dataset taken from Google Open Image. We also implemented the experiments on the self-obtained dataset. Based on the experiment, 92.53% for precision and 96.6% of the accuracy is obtained using this algorithm. Therefore, YOLOv6 can be implemented in the security system to prevent crimes in residency areas.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124865768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi-network based MAC Protocol Identification with Decision Fusion 基于决策融合的多网络MAC协议识别
Anibal Roque Seraponzo, Qinggeng Guo, Shengliang Peng
Media access control (MAC) protocol identification is key to obtain the full awareness of wireless environments in both civil as well as military communications. In recent years, deep learning (DL) based MAC protocol identification has attracted great attention due to flourishing of deep neural networks (DNNs). However, existing research on DL based MAC protocol identification mostly exploits only one DNN to complete the identification task, which inevitably suffers from low identification accuracy. To combat the problem, this paper proposes a multi-network based algorithm that utilizes three DNNs, including a convolutional neural network (CNN), a long short-term memory (LSTM), and a gated recurrent unit (GRU), for MAC protocol identification. A decision fusion rule is adopted to fuse the individual results of three DNNs and make the final decision. Experiment results show that the proposed multi-network based algorithm performs better than the DL based methods using the single network.
媒体访问控制(MAC)协议识别是在民用和军用通信中获得无线环境充分感知的关键。近年来,随着深度神经网络(dnn)的蓬勃发展,基于深度学习的MAC协议识别备受关注。然而,现有的基于深度学习的MAC协议识别研究大多只利用一个DNN来完成识别任务,不可避免地存在识别准确率较低的问题。为了解决这个问题,本文提出了一种基于多网络的算法,该算法利用三种dnn,包括卷积神经网络(CNN),长短期记忆(LSTM)和门控循环单元(GRU),用于MAC协议识别。采用决策融合规则对三个深度神经网络的单个结果进行融合,做出最终决策。实验结果表明,基于多网络的算法优于基于单网络的深度学习算法。
{"title":"Multi-network based MAC Protocol Identification with Decision Fusion","authors":"Anibal Roque Seraponzo, Qinggeng Guo, Shengliang Peng","doi":"10.1109/ICAIIC57133.2023.10067028","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067028","url":null,"abstract":"Media access control (MAC) protocol identification is key to obtain the full awareness of wireless environments in both civil as well as military communications. In recent years, deep learning (DL) based MAC protocol identification has attracted great attention due to flourishing of deep neural networks (DNNs). However, existing research on DL based MAC protocol identification mostly exploits only one DNN to complete the identification task, which inevitably suffers from low identification accuracy. To combat the problem, this paper proposes a multi-network based algorithm that utilizes three DNNs, including a convolutional neural network (CNN), a long short-term memory (LSTM), and a gated recurrent unit (GRU), for MAC protocol identification. A decision fusion rule is adopted to fuse the individual results of three DNNs and make the final decision. Experiment results show that the proposed multi-network based algorithm performs better than the DL based methods using the single network.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122744998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning-based Ultra Short Baseline Underwater Positioning 基于深度学习的超短基线水下定位
Hojun Lee, Kye-Won Kim, Tae-Ho Chung, Haklim Ko
In ultra-short baseline (USBL), the locations of near-field sources are estimated by using the difference between the propagation delays for the received signals of sensors. Since the sensor spacing is very narrow in the USBL, the difference between the propagation delays for the received signals is very small, which induces ambiguities in positioning for the sources. For low sampling rate scenarios with low signal-to-noise power ratios (SNRs), the ambiguities increase significantly because not only the sample delays for the received signals may not be exactly estimated, but also the difference between the sample delays for the received signals decreases. To solve this problem, this paper proposes a deep learning-based USBL positioning network. The inputs of the proposed network are the estimated distances from the source to the sensors, which are measured by cross-correlation, and the outputs are the range and direction-of-arrival (DOA) of the near-field source. The proposed network improves the positioning performances even if outliers, i.e., incorrectly estimated sample delays, are mixed in the input by learning the relationship between the input and output. Computer simulations demonstrate that the proposed network has 50 times better positioning performances than the conventional method in low SNR regions.
在超短基线(USBL)中,利用传感器接收信号的传播延迟差来估计近场源的位置。由于USBL中的传感器间距非常窄,因此接收信号的传播延迟之间的差异非常小,这导致了源定位的模糊性。对于低信噪比(SNRs)的低采样率场景,模糊性显著增加,因为不仅接收信号的采样延迟可能无法准确估计,而且接收信号的采样延迟之间的差异也会减小。为了解决这一问题,本文提出了一种基于深度学习的USBL定位网络。该网络的输入是源到传感器的估计距离,通过互相关测量,输出是近场源的距离和到达方向(DOA)。该网络通过学习输入和输出之间的关系,即使输入中混入异常值(即错误估计的样本延迟),也能提高定位性能。计算机仿真结果表明,该网络在低信噪比区域的定位性能是传统方法的50倍。
{"title":"Deep Learning-based Ultra Short Baseline Underwater Positioning","authors":"Hojun Lee, Kye-Won Kim, Tae-Ho Chung, Haklim Ko","doi":"10.1109/ICAIIC57133.2023.10067090","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067090","url":null,"abstract":"In ultra-short baseline (USBL), the locations of near-field sources are estimated by using the difference between the propagation delays for the received signals of sensors. Since the sensor spacing is very narrow in the USBL, the difference between the propagation delays for the received signals is very small, which induces ambiguities in positioning for the sources. For low sampling rate scenarios with low signal-to-noise power ratios (SNRs), the ambiguities increase significantly because not only the sample delays for the received signals may not be exactly estimated, but also the difference between the sample delays for the received signals decreases. To solve this problem, this paper proposes a deep learning-based USBL positioning network. The inputs of the proposed network are the estimated distances from the source to the sensors, which are measured by cross-correlation, and the outputs are the range and direction-of-arrival (DOA) of the near-field source. The proposed network improves the positioning performances even if outliers, i.e., incorrectly estimated sample delays, are mixed in the input by learning the relationship between the input and output. Computer simulations demonstrate that the proposed network has 50 times better positioning performances than the conventional method in low SNR regions.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122817046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PUFDid: PUF-based Drone IDentifier and Its Application PUFDid:基于puf的无人机标识及其应用
J. Byun
All drone-based communication protocols have used an unique pseudonym as a drone identifier (Did). Despite Did's obvious applications, however, its properties have not been much studied. In this paper, we study how to securely make a Did based on physically unclonable function (PUF). For this, first we propose four Did properties (uniqueness, identification, authenticity, and privacy) and present two PUF-based drone identifiers (PUFDid) that securely include own identifier and PUF's evaluation. We show that our PUFDid satisfies four properties proposed. We also apply our PUFDid into an inquiry system and analyze its security.
所有基于无人机的通信协议都使用唯一的假名作为无人机标识符(Did)。然而,尽管Did有明显的应用,但它的性质还没有得到很多研究。本文研究了基于物理不可克隆函数(PUF)的Did安全制作方法。为此,我们首先提出了四个Did属性(唯一性、识别性、真实性和隐私性),并提出了两个基于PUF的无人机标识符(PUFDid),它们安全地包含了自己的标识符和PUF的评估。我们证明了我们的PUFDid满足所提出的四个性质。将PUFDid应用到一个查询系统中,并对其安全性进行了分析。
{"title":"PUFDid: PUF-based Drone IDentifier and Its Application","authors":"J. Byun","doi":"10.1109/ICAIIC57133.2023.10067041","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067041","url":null,"abstract":"All drone-based communication protocols have used an unique pseudonym as a drone identifier (Did). Despite Did's obvious applications, however, its properties have not been much studied. In this paper, we study how to securely make a Did based on physically unclonable function (PUF). For this, first we propose four Did properties (uniqueness, identification, authenticity, and privacy) and present two PUF-based drone identifiers (PUFDid) that securely include own identifier and PUF's evaluation. We show that our PUFDid satisfies four properties proposed. We also apply our PUFDid into an inquiry system and analyze its security.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123084147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Systematic Literature Review of Virtual Reality Implementation in Sports 虚拟现实技术在体育运动中的应用综述
Ezra Gabriel Malachi, Ritchie Tunggara, Yohannes Cahyadi, Meiliana, Muhamad Fajar
Virtual Reality is a major step in the technology field. Recently, Virtual Reality has been used in various fields, one of which is in the field of sports. In the field of sports, the relationship between experimental and subject behavior in real conditions is a major problem. Virtual Reality can be used in sports because of its situational productivity and animation control in situations that are similar to the real world. This paper presents a research review to understand the use of Virtual Reality in sports. This paper uses a systematic literature review (SLR) as a research method. Research Question(RQ) was determined in the first step. Popular database journals included IEEE Xplore, Science Direct, ACM Digital Library, Springer Open, JSTOR. Twenty-five related articles were produced from the search, then reviewed. The study concluded that there were four purposes of using virtual reality for sports, three types of Virtual Reality Devices used, and three types of approaches.
虚拟现实是技术领域的重大进步。近年来,虚拟现实技术已被应用于各个领域,其中之一就是体育领域。在体育领域,实验行为和被试行为在真实条件下的关系是一个主要问题。虚拟现实可以用于体育运动,因为它的情景生产力和动画控制在类似于现实世界的情况下。本文对虚拟现实技术在体育运动中的应用进行了综述。本文采用系统文献回顾法(SLR)作为研究方法。第一步确定研究问题(Research Question, RQ)。常用数据库期刊包括IEEE explore、Science Direct、ACM Digital Library、b施普林格Open、JSTOR等。从搜索中产生了25篇相关文章,然后进行了审查。该研究得出结论,在体育运动中使用虚拟现实有四个目的,使用的虚拟现实设备有三种类型,方法有三种类型。
{"title":"A Systematic Literature Review of Virtual Reality Implementation in Sports","authors":"Ezra Gabriel Malachi, Ritchie Tunggara, Yohannes Cahyadi, Meiliana, Muhamad Fajar","doi":"10.1109/ICAIIC57133.2023.10067095","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067095","url":null,"abstract":"Virtual Reality is a major step in the technology field. Recently, Virtual Reality has been used in various fields, one of which is in the field of sports. In the field of sports, the relationship between experimental and subject behavior in real conditions is a major problem. Virtual Reality can be used in sports because of its situational productivity and animation control in situations that are similar to the real world. This paper presents a research review to understand the use of Virtual Reality in sports. This paper uses a systematic literature review (SLR) as a research method. Research Question(RQ) was determined in the first step. Popular database journals included IEEE Xplore, Science Direct, ACM Digital Library, Springer Open, JSTOR. Twenty-five related articles were produced from the search, then reviewed. The study concluded that there were four purposes of using virtual reality for sports, three types of Virtual Reality Devices used, and three types of approaches.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133556392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unscented Kalman Filter-based Beam Tracking in NR MIMO System using Hybrid Beamforming 基于无气味卡尔曼滤波的混合波束形成NR MIMO系统波束跟踪
Yuna Sim, S. Sin, Ji-Haeng Cho, Kyunam Kim, Sangmi Moon, I. Hwang
Unmanned aerial vehicles (UAVs) and millimeter wave frequencies play a key role in supporting 5G wireless communication systems. They expand the area of wireless communication by increasing the data capacity in communication systems and supporting high data rates. However, short wavelengths, due to their high millimeter wave frequencies cause problems arising from signal attenuation and path loss. To address these limitations, research centered on high directional beamforming technology continues to gather interest. Furthermore, due to the mobility of UAVs, it is essential to track the beam angle accurately to obtain full beamforming gain. In this study, we propose a beam tracking method based on the unscented Kalman filter using hybrid beamforming. By expanding analog beamforming to hybrid beamforming, our proposed algorithm can be used even in multi-user and multi-stream environments, increasing the data capacity, and, thus increasing utilization in new radio multiple-input multiple-output orthogonal frequency diversity multiplexing systems.
无人机(uav)和毫米波频率在支持5G无线通信系统中发挥着关键作用。它们通过增加通信系统中的数据容量和支持高数据速率来扩展无线通信的领域。然而,短波长由于其高毫米波频率而引起信号衰减和路径损耗的问题。为了解决这些限制,以高定向波束形成技术为中心的研究不断引起人们的兴趣。此外,由于无人机的机动性,为了获得完整的波束形成增益,必须准确跟踪波束角。在本研究中,我们提出了一种基于混合波束形成的无气味卡尔曼滤波波束跟踪方法。通过将模拟波束形成扩展到混合波束形成,我们提出的算法甚至可以在多用户和多流环境中使用,增加了数据容量,从而提高了新的无线电多输入多输出正交频分集复用系统的利用率。
{"title":"Unscented Kalman Filter-based Beam Tracking in NR MIMO System using Hybrid Beamforming","authors":"Yuna Sim, S. Sin, Ji-Haeng Cho, Kyunam Kim, Sangmi Moon, I. Hwang","doi":"10.1109/ICAIIC57133.2023.10067030","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067030","url":null,"abstract":"Unmanned aerial vehicles (UAVs) and millimeter wave frequencies play a key role in supporting 5G wireless communication systems. They expand the area of wireless communication by increasing the data capacity in communication systems and supporting high data rates. However, short wavelengths, due to their high millimeter wave frequencies cause problems arising from signal attenuation and path loss. To address these limitations, research centered on high directional beamforming technology continues to gather interest. Furthermore, due to the mobility of UAVs, it is essential to track the beam angle accurately to obtain full beamforming gain. In this study, we propose a beam tracking method based on the unscented Kalman filter using hybrid beamforming. By expanding analog beamforming to hybrid beamforming, our proposed algorithm can be used even in multi-user and multi-stream environments, increasing the data capacity, and, thus increasing utilization in new radio multiple-input multiple-output orthogonal frequency diversity multiplexing systems.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130021747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of AI Educational Datasets Library Using Synthetic Dataset Generation Method 基于合成数据集生成方法的人工智能教育数据集库开发
Seulki Kim, Kwi-Ok Kim, Taeyoung Kim
Recently, as the impact of AI technology on society has increased, education to develop students' AI capabilities has been emphasized. Along with the importance of AI technology, the importance of datasets, which are an axis of technological development, is being emphasized, and many studies on datasets for AI are being conducted. In order to provide meaningful AI education to students from an educational perspective, this paper reconstructs libraries to utilize synthetic dataset generation libraries in different classroom instruction environments and confirms the applicability of educational purposes.
最近,随着人工智能技术对社会的影响越来越大,培养学生人工智能能力的教育受到了重视。随着人工智能技术的重要性,作为技术发展轴心的数据集的重要性也被强调,许多关于人工智能数据集的研究正在进行。为了从教育的角度为学生提供有意义的人工智能教育,本文重构了图书馆,在不同的课堂教学环境中利用合成数据集生成库,并确认了其教育目的的适用性。
{"title":"Development of AI Educational Datasets Library Using Synthetic Dataset Generation Method","authors":"Seulki Kim, Kwi-Ok Kim, Taeyoung Kim","doi":"10.1109/ICAIIC57133.2023.10067000","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067000","url":null,"abstract":"Recently, as the impact of AI technology on society has increased, education to develop students' AI capabilities has been emphasized. Along with the importance of AI technology, the importance of datasets, which are an axis of technological development, is being emphasized, and many studies on datasets for AI are being conducted. In order to provide meaningful AI education to students from an educational perspective, this paper reconstructs libraries to utilize synthetic dataset generation libraries in different classroom instruction environments and confirms the applicability of educational purposes.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114003760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting TAS schemes to Enhance the PHY-security in Cooperative NOMA Networks: A Deep Learning Approach 利用TAS方案增强协同NOMA网络中的物理安全性:一种深度学习方法
Y. Pramitarini, R. Perdana, Kyusung Shim, Beongku An
In this paper, we propose a novel antenna selection scheme to enhance the secrecy performance in a relay-aided non-orthogonal multiple access (NOMA) network against an eavesdropper. Different from the conventional antenna selection schemes that does not use channel information, the proposed antenna selection scheme can employ each channel information to maximize the main channel capacity and minimize the eaves-dropper channel capacity, respectively. In order to evaluate the secrecy performance, we propose a deep learning (DL)-based framework that can do real-time configuration since the DL-based framework is based on a compact mapping function. In detail, the proposed min-max relay transmit antenna selection (MMRTAS) scheme can improve the secrecy performance compared to that of the benchmark scheme. Numerical results show that the proposed MMRTAS scheme improves the secrecy performance compared to that of the benchmark scheme. The proposed DL-based framework can estimate the main channel and eavesdropper channel capacities for the near user and far user with an accuracy of 99.79%, respectively.
本文提出了一种新的天线选择方案,以提高中继辅助非正交多址(NOMA)网络对窃听者的保密性能。与传统的不使用信道信息的天线选择方案不同,本文提出的天线选择方案可以利用各信道信息分别实现主信道容量最大化和窃听信道容量最小化。为了评估保密性能,我们提出了一个基于深度学习(DL)的框架,该框架可以进行实时配置,因为基于DL的框架是基于紧凑的映射函数。与基准方案相比,所提出的最小-最大中继发射天线选择(MMRTAS)方案可以提高保密性能。数值结果表明,与基准方案相比,所提出的MMRTAS方案提高了保密性能。提出的基于dl的框架可以估计近用户和远用户的主信道和窃听信道容量,准确率分别为99.79%。
{"title":"Exploiting TAS schemes to Enhance the PHY-security in Cooperative NOMA Networks: A Deep Learning Approach","authors":"Y. Pramitarini, R. Perdana, Kyusung Shim, Beongku An","doi":"10.1109/ICAIIC57133.2023.10067050","DOIUrl":"https://doi.org/10.1109/ICAIIC57133.2023.10067050","url":null,"abstract":"In this paper, we propose a novel antenna selection scheme to enhance the secrecy performance in a relay-aided non-orthogonal multiple access (NOMA) network against an eavesdropper. Different from the conventional antenna selection schemes that does not use channel information, the proposed antenna selection scheme can employ each channel information to maximize the main channel capacity and minimize the eaves-dropper channel capacity, respectively. In order to evaluate the secrecy performance, we propose a deep learning (DL)-based framework that can do real-time configuration since the DL-based framework is based on a compact mapping function. In detail, the proposed min-max relay transmit antenna selection (MMRTAS) scheme can improve the secrecy performance compared to that of the benchmark scheme. Numerical results show that the proposed MMRTAS scheme improves the secrecy performance compared to that of the benchmark scheme. The proposed DL-based framework can estimate the main channel and eavesdropper channel capacities for the near user and far user with an accuracy of 99.79%, respectively.","PeriodicalId":105769,"journal":{"name":"2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132051638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1