In this work, a deep learning (DL)-based massive multiple-input multiple-output (mMIMO) orthogonal frequency division multiplexing (OFDM) system is investigated over the tapped delay line type C (TDL-C) model with a Rayleigh fading distribution at frequencies ranging from 0.5 to 100 GHz. The proposed bi-directional long short-term memory (Bi-LSTM) channel state information (CSI) estimator uses online learning during training and offline learning during the practical implementation phase. The design of the estimator takes into account situations in which prior knowledge of channel statistics is limited and targets excellent performance, even with limited pilot symbols (PS). Three separate loss functions (mean square logarithmic error [MSLE], Huber, and Kullback–Leibler Distance [KLD]) are assessed in three classification layers. The symbol error rate (SER) and outage probability performance of the proposed estimator are evaluated using a number of optimization techniques, such as stochastic gradient descent (SGD), momentum, and the adaptive gradient (AdaGrad) algorithm. The Bi-LSTM-based CSI estimator is trained considering a specific number of PS. It can be readily seen that by incorporating a cyclic prefix (CP), the system becomes more resilient to channel impairments, resulting in a lower SER. Simulations show that the SGD optimization approach and Huber loss function-trained Bi-LSTM-based CSI estimator have the lowest SER and very high estimation accuracy. By using deep neural networks (DNNs), the Bi-LSTM method for CSI estimation achieves a superior channel capacity (in bps/Hz) at 10 dB than long short-term memory (LSTM) and other conventional CSI estimators, such as minimum mean square error (MMSE) and least squares (LS). The simulation results validate the analytical results in the study. 相似文献
Internet of Things (IoT) security is the act of securing IoT devices and networks. IoT devices, including industrial machines, smart energy grids, and building automation, are extremely vulnerable. With the goal of shielding network systems from illegal access in cloud servers and IoT systems, Intrusion Detection Systems (IDSs) and Network-based Intrusion Prevention Systems (NBIPSs) are proposed in this study. An intrusion prevention system is proposed to realize NBIPS to safeguard top to bottom engineering. The proposed NBIPS inspects network activity streams to identify and counteract misuse instances. The NBIPS is usually located specifically behind a firewall, and it provides a reciprocal layer of investigation that adversely chooses unsafe substances. Network-based IPS sensors can be installed either in an inline or a passive model. An inline sensor is installed to monitor the traffic passing through it. The sensors are installed to stop attacks by blocking the traffic using an IoT signature-based protocol. 相似文献
Engineering with Computers - Plate structures are the integral parts of any maritime engineering platform. With the recent focus on composite structures, the need for optimizing their design and... 相似文献
In recent years, we face an increasing interest in protecting multimedia data and copyrights due to the high exchange of information. Attackers are trying to get confidential information from various sources, which brings the importance of securing the data. Many researchers implemented techniques to hide secret information to maintain the integrity and privacy of data. In order to protect confidential data, histogram-based reversible data hiding with other cryptographic algorithms are widely used. Therefore, in the proposed work, a robust method for securing digital video is suggested. We implemented histogram bit shifting based reversible data hiding by embedding the encrypted watermark in featured video frames. Histogram bit shifting is used for hiding highly secured watermarks so that security for the watermark symbol is also being achieved. The novelty of the work is that only based on the quality threshold a few unique frames are selected, which holds the encrypted watermark symbol. The optimal value for this threshold is obtained using the Firefly Algorithm. The proposed method is capable of hiding high-capacity data in the video signal. The experimental result shows the higher capacity and video quality compared to other reversible data hiding techniques. The recovered watermark provides better identity identification against various attacks. A high value of PSNR and a low value of BER and MSE is reported from the results.
The insulation resistance of conventional atmospheric plasma-sprayed alumina coatings with 10–15% porosity is ~1011 Ω. The presence of pores, lamellae boundaries, and other non-fillings dampens the insulation resistance of the coating. In the present study, aluminum phosphate was used to seal the surface of plasma-sprayed alumina coating and evaluate the effect of sealing on the insulation resistance and its thermal cycling response. Sealing was carried out with three concentrations of sealant (P/Al molar ratio of 3, 10, and 15). Characterization by X-ray diffraction and scanning electron microscopy revealed the primary sealing phase as aluminum metaphosphate and effective sealing of the pores by the aluminum phosphate phases. Insulation resistance is improved by two orders of magnitude after sealing the coated samples. Sealing with P/Al molar ratio 3 exhibited maximum insulation resistance of ~1013 Ω at room temperature. Thermal cycling studies between 650°C and 200°C on the sealed samples showed deterioration in thermal cycling life after sealing. 相似文献
A vendor-managed inventory (VMI) relationship between a downstream retailer and an upstream vendor consists of two distinct components: (i) information sharing (IS) and (ii) a shift in decision-making responsibility. This study compares these two components of VMI in a two-stage serial supply chain based on the ‘static uncertainty’ strategy under dynamic and random demand with fill rate constraints. Numerical experiments are conducted using analytical models to identify the conditions where the incremental value of VMI over IS is significant. The results provide guidelines relevant to academia and supply chain practitioners in taking VMI adoption decision above and beyond IS according to their specific business environment. 相似文献
Burnishing avoids the need for super finishing operations after the conventional turning process, to enhance the surface quality. This paper deals with the surface modifications of Al(B4C)p Metal Matrix Composites (MMC) workpiece material after burnishing with a TiAlN coated WC roller. The burnishing speed, lubrication type, burnishing passes, and coating were the input parameters. Surface hardness and roughness after the burnishing were studied. It was found that the coating on the WC roller had enhanced the hardness in the workpiece after burnishing in the case of Al-5?wt.% (B4C)p, under all conditions. The effect of the coating on the work piece surface hardness was not significant with Al-10?wt.% (B4C)p. While burnishing Al-5?wt.% (B4C)p, the minimum surface roughness combined with maximum surface hardness was obtained, during the third pass under dry condition using uncoated rollers. The number of passes to achieve the desired surface conditions reduced, on using coated rollers with kerosene as the lubricant. 相似文献
Micro-drilling in carbon fiber reinforced plastic (CFRP) composite material is challenging because this material machining is difficult due to anisotropic, abrasive and non-homogeneous properties and also downscaling of cutting process parameters affect the cutting forces and micro-drilled hole quality extensively. In this work, experimental results based statistical analysis is applied to investigate feed and cutting speed effect on cutting force components and hole quality. Analysis of variance based regression equation is used to predict cutting forces and hole quality and their trend are described by response surface methodology. Results show that roundness error and delamination factor have similar trends to those of radial forces and thrust force, respectively. Non-linear trends of cutting forces and hole quality errors are observed during downscaling of the micro-drill feed value. Optimization results show that cutting forces and hole quality errors are minimum at a feed value which is almost equal to the tool edge radius rather than at the lowest feed value. Therefore, the presented results clearly show the influences of size effects on cutting forces and hole quality parameters in micro-drilling of CFRP composite material. 相似文献
Selection of a robot for a specific industrial application is one of the most challenging problems in real time manufacturing environment. It has become more and more complicated due to increase in complexity, advanced features and facilities that are continuously being incorporated into the robots by different manufacturers. At present, different types of industrial robots with diverse capabilities, features, facilities and specifications are available in the market. Manufacturing environment, product design, production system and cost involved are some of the most influencing factors that directly affect the robot selection decision. The decision maker needs to identify and select the best suited robot in order to achieve the desired output with minimum cost and specific application ability. This paper attempts to solve the robot selection problem using two most appropriate multi-criteria decision-making (MCDM) methods and compares their relative performance for a given industrial application. The first MCDM approach is ‘VIsekriterijumsko KOmpromisno Rangiranje’ (VIKOR), a compromise ranking method and the other one is ‘ELimination and Et Choice Translating REality’ (ELECTRE), an outranking method. Two real time examples are cited in order to demonstrate and validate the applicability and potentiality of both these MCDM methods. It is observed that the relative rankings of the alternative robots as obtained using these two MCDM methods match quite well with those as derived by the past researchers. 相似文献