scholarly journals A Novel Neural Network-Based Method for Decoding and Detecting of the DS8-PSK Scheme in an OCC System

2019 ◽  
Vol 9 (11) ◽  
pp. 2242 ◽  
Author(s):  
Tung Lam Pham ◽  
Huy Nguyen ◽  
Trang Nguyen ◽  
Yeong Min Jang

This paper proposes a novel method of training and applying a neural network to act as an adaptive decoder for a modulation scheme used in optical camera communication (OCC). We present a brief discussion on trending artificial intelligence applications, the contemporary ways of applying them in a wireless communication field, such as visible light communication (VLC), optical wireless communication (OWC) and OCC, and its potential contribution in the development of this research area. Furthermore, we proposed an OCC vehicular system architecture with artificial intelligence (AI) functionalities, where dimmable spatial 8-phase shift keying (DS8-PSK) is employed as one out of two modulation schemes to form a hybrid waveform. Further demonstration of simulating the blurring process on a transmitter image, as well as our proposed method of using a neural network as a decoder for DS8-PSK, is provided in detail. Finally, experimental results are given to prove the effectiveness and efficiency of the proposed method over an investigating channel condition.

Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2203
Author(s):  
Jain-Shing Wu ◽  
Ting-Hsuan Chien ◽  
Li-Ren Chien ◽  
Chin-Yi Yang

During the COVID-19 epidemic, most programming courses were revised to distance learning. However, many problems occurred, such as students pretending to be actively learning while actually being absent and students engaging in plagiarism. In most existing systems, obtaining status updates on the progress of a student’s learning is hard. In this paper, we first define the term “class loyalty”, which means that a student studies hard and is willing to learn without using any tricks. Then, we propose a novel method combined with the parsing trees of program codes and the fuzzy membership function to detect plagiarism. Additionally, the fuzzy membership functions combined with a convolution neural network (CNN) are used to predict which students obtain high scores and high class loyalty. Two hundred and twenty-six students were involved in the experiments. The dataset was randomly separated into the training datasets and the test datasets for twenty runs. The average accuracies of the experiment in predicting which students obtain high scores using the fuzzy membership function combined with a CNN and using the duration and number of actions are 93.34% and 92.62%. The average accuracies of the experiment in predicting which students have high class loyalty are 95.00% and 92.74%. Both experiments show that our proposed method not only can detect plagiarism but also can be used to detect which students are diligent.


2016 ◽  
Vol 4 (2) ◽  
pp. 172-180
Author(s):  
Barkha Pandey ◽  
Raghu Harsh Kalia ◽  
Monica Kaushik ◽  
Monika Arora

In a last few decades there has been tremendous growth and a drastic rise in wireless communication technologies. The major issue that the world is facing today with the advent of so many sophisticated wireless communication devices is efficient utilization of the spectrum. Spectrum efficiency comes together with a tradeoff factor of energy consumption. Thus, the need of the hour is an energy and bandwidth efficient technique. DS-CDMA is one of the competitive and most investigated technique in wireless communication which caters the large demand at the same time with limited bandwidth. Existing modulation techniques does not promise to provide better performance in case of higher noise. Therefore, one looks for a better BER stipulated modulation format to improve and enhance the performance of the system. This article revisits conventional Binary phase shift keying method and compares its performance in terms of BER with a special Extended Binary Phase Shift Keying (EBPSK) modulation format for a DS- CDMA system. EBPSK scheme is flexible and simple which is easily integrated in a network and assures improved and enhanced performance.


2019 ◽  
Vol 9 (15) ◽  
pp. 3022 ◽  
Author(s):  
AbdelMoniem ◽  
Gasser ◽  
El-Mahallawy ◽  
Fakhr ◽  
Soliman

Non-orthogonal multiple access (NOMA) is the technique proposed for multiple access in the fifth generation (5G) cellular network. In NOMA, different users are allocated different power levels and are served using the same time/frequency resource blocks (RBs). The main challenges in existing NOMA systems are the limited channel feedback and the difficulty of merging it with advanced adaptive coding and modulation schemes. Unlike formerly proposed solutions, in this paper, we propose an effective channel estimation (CE) algorithm based on the long-short term memory (LSTM) neural network. The LSTM has the advantage of adapting dynamically to the behavior of the fluctuating channel state. On average, the use of LSTM results in a 10% lower outage probability and a 37% increase in the user sum rate as well as a maximal reduction in the bit error rate (BER) of 50% in comparison to the conventional NOMA system. Furthermore, we propose a novel power coefficient allocation algorithm based on binomial distribution and Pascal’s triangle. This algorithm is used to divide power among N users according to each user’s channel condition. In addition, we introduce adaptive code rates and rotated constellations with cyclic Q-delay in the quadri-phase shift keying (QPSK) and quadrature amplitude modulation (QAM) modulators. This modified modulation scheme overcomes channel fading effects and helps to restore the transmitted sequences with fewer errors. In addition to the initial LSTM stage, the added adaptive coding and modulation stages result in a 73% improvement in the BER in comparison to the conventional NOMA system.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Taowen Xiao ◽  
Zijian Cai ◽  
Cong Lin ◽  
Qiong Chen

Image sonar is a widely used wireless communication technology for detecting underwater objects, but the detection process often leads to increased difficulty in object identification due to the lack of equipment resolution. In view of the remarkable results achieved by artificial intelligence techniques in the field of underwater wireless communication research, we propose an object detection method based on convolutional neural network (CNN) and shadow information capture to improve the object recognition and localization effect of underwater sonar images by making full use of the shadow information of the object. We design a Shadow Capture Module (SCM) that can capture the shadow information in the feature map and utilize them. SCM is compatible with CNN models that have a small increase in parameters and a certain degree of portability, and it can effectively alleviate the recognition difficulties caused by the lack of device resolution through referencing shadow features. Through extensive experiments on the underwater sonar data set provided by Pengcheng Lab, the proposed method can effectively improve the feature representation of the CNN model and enhance the difference between class and class features. Under the main evaluation standard of PASCAL VOC 2012, the proposed method improved from an average accuracy (mAP) of 69.61% to 75.73% at an IOU threshold of 0.7, which exceeds many existing conventional deep learning models, while the lightweight design of our proposed module is more helpful for the implementation of artificial intelligence technology in the field of underwater wireless communication.


2020 ◽  
pp. 1-11
Author(s):  
Wenjuan Ma ◽  
Xuesi Zhao ◽  
Yuxiu Guo

The application of artificial intelligence and machine learning algorithms in education reform is an inevitable trend of teaching development. In order to improve the teaching intelligence, this paper builds an auxiliary teaching system based on computer artificial intelligence and neural network based on the traditional teaching model. Moreover, in this paper, the optimization strategy is adopted in the TLBO algorithm to reduce the running time of the algorithm, and the extracurricular learning mechanism is introduced to increase the adjustable parameters, which is conducive to the algorithm jumping out of the local optimum. In addition, in this paper, the crowding factor in the fish school algorithm is used to define the degree or restraint of teachers’ control over students. At the same time, students in the crowded range gather near the teacher, and some students who are difficult to restrain perform the following behavior to follow the top students. Finally, this study builds a model based on actual needs, and designs a control experiment to verify the system performance. The results show that the system constructed in this paper has good performance and can provide a theoretical reference for related research.


2020 ◽  
Vol 2 ◽  
pp. 58-61 ◽  
Author(s):  
Syed Junaid ◽  
Asad Saeed ◽  
Zeili Yang ◽  
Thomas Micic ◽  
Rajesh Botchu

The advances in deep learning algorithms, exponential computing power, and availability of digital patient data like never before have led to the wave of interest and investment in artificial intelligence in health care. No radiology conference is complete without a substantial dedication to AI. Many radiology departments are keen to get involved but are unsure of where and how to begin. This short article provides a simple road map to aid departments to get involved with the technology, demystify key concepts, and pique an interest in the field. We have broken down the journey into seven steps; problem, team, data, kit, neural network, validation, and governance.


2019 ◽  
Vol 17 (1) ◽  
pp. 69-76
Author(s):  
Mohammad Shiddiq Ghozali

Perkembangan Teknologi Informasi dan Komunikasi begitu pesat di zaman sekarang ini. Diikuti pula dengan perkembangan di bidang Artificial Intelligence (AI) atau Kecerdasan Buatan. Di Indonesia sendiri masih belum begitu populer dikalangan masyarakat akan tetapi perusahaan-perusahaan IT berlomba-lomba menciptakan inovasi dibidang Kecerdasan Buatan dan penerapan Kecerdasan Buatan disegala aspek kehidupan. Contoh kasus di Automated Teller Machine (ATM), seringkali terjadi kejahatan di ATM seperti pengintaian nomor pin, skimming, lebanese loop dan kejahatan lainnya. Walaupun di ATM sudah terdapat CCTV akan tetapi penjahat menggunakan alat bantu untuk menutupi wajahnya seperti helm, topi, masker dan kacamata hitam. Biasanya didepan pintu masuk ATM terpampang larangan untuk tidak menggunakan helm, topi, masker dan kacamata hitam serta tidak membawa rokok. Akan tetapi larangan itu masih tetap ada yang melanggar, dikarenakan tidak ada tindak lanjut ketika seseorang menggunakan benda-benda yang dilarang dibawa kedalam ATM. Oleh karena itu penulis membuat sistem pendeteksi obyek di bidang Kecerdasan Buatan untuk mendeteksi benda-benda yang dilarang digunakan ketika berada di ATM. Salah satu metode yang digunakan untuk menciptakan Object Detection yaitu You Only Look Once (YOLO). Implementasi ide ini tersedia pada DARKNET (open source neural network). Cara kerja YOLO yaitu dengan melihat seluruh gambar sekali, kemudian melewati jaringan saraf sekali langsung mendeteksi object yang ada. Oleh karena itu disebut You Only Look Once (YOLO). Pada penelitian ini, penulis membuat sistem yang masih dalam bentuk pengembangan, sehingga menjalankannya masih menggunakan command prompt. Keywords : Automated Teller Machine (ATM), Kecerdasan Buatan, Pendeteksi Obyek, You Only Look Once (YOLO)  


2020 ◽  
Vol 96 (3s) ◽  
pp. 585-588
Author(s):  
С.Е. Фролова ◽  
Е.С. Янакова

Предлагаются методы построения платформ прототипирования высокопроизводительных систем на кристалле для задач искусственного интеллекта. Изложены требования к платформам подобного класса и принципы изменения проекта СнК для имплементации в прототип. Рассматриваются методы отладки проектов на платформе прототипирования. Приведены результаты работ алгоритмов компьютерного зрения с использованием нейросетевых технологий на FPGA-прототипе семантических ядер ELcore. Methods have been proposed for building prototyping platforms for high-performance systems-on-chip for artificial intelligence tasks. The requirements for platforms of this class and the principles for changing the design of the SoC for implementation in the prototype have been described as well as methods of debugging projects on the prototyping platform. The results of the work of computer vision algorithms using neural network technologies on the FPGA prototype of the ELcore semantic cores have been presented.


IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Wirot Yotsawat ◽  
Pakaket Wattuya ◽  
Anongnart Srivihok

Sign in / Sign up

Export Citation Format

Share Document