电脑桌面
添加小米粒文库到电脑桌面
安装后可以在桌面快捷访问

国际会议演讲稿VIP免费

国际会议演讲稿_第1页
1/6
国际会议演讲稿_第2页
2/6
国际会议演讲稿_第3页
3/6
自我介绍Thankyou,Mr./Ms.Chair./professorMynameissangqian.Iamveryhonoredtobeheretodooralpresentation.IamaMasterstudentfromHohaiUniversityandIamcurrentlydoingsomeresearchonphysicallayersecurity.Today,Iwouldliketosharewithyousomeofmyresearchonrelayselectionincooperativecommunication.(external/ekˈstərnəl;ɪkˈstərnəl/)内容安排:Mypresentationincludesthesefiveparts.First,somebackgroundinformationaboutthisresearch;Second,systemmodelwehavedone;Third,NN-basedrelayselectionschemewehaveproposedForth,SimulationandresultsanalysisAndlast,someconclusionswehavegotP4Partone,introductionFirstly,Iwouldliketogiveyouabitofbackground.Differingfromthetraditionalcryptographictechniquesbasedonsecretkeys,wecanmakeuseofwirelesschannelcharacteristicstoenhancephysicallayersecurity.Cooperativecommunicationhasbeenwidelyrecognizedasaneffectivewaytocombatwirelessfadingandprovidediversitygainwhichisoneoftheresearchhotspots.Machinelearningasanemergingtechnologyhasbeenwidelyappliedinimageprocessing,cancerprediction,stockanalysisandotherfields.Sowhynottryitinwirelesscommunication?P5:Next,IwanttotalkalittlebitaboutpresentstudyRecentstudiesondeeplearningforwirelesscommunicationsystemshaveproposedalternativeapproachestoenhancecertainpartsoftheconventionalcommunicationsystemsuchasmodulationrecognition、channelencodinganddecoding、channelestimationanddetectionandanautoencoderwhichcanreplacethetotalsystemwithanovelarchitecture【modulationrecognition:AnNNarchitectureformodulationrecognitionthatconsistsofa4-layerNNandtwotwo-layerNNs。channelencodinganddecoding:AplainDNNarchitectureforchanneldecodingtodecodekbitsmessagesfromNbitsnoisycodewords。channelestimationanddetection:Adense-Netforsymbol-to-symboldetectioncanadoptlongshort-termmemory(LSTM)todetectanestimatedsymbol.Autoencoder:theautoencodercanrepresenttheentirecommunicationsystemandjointlyoptimizethetransmitterandreceiveroveranAWGNchannel.】P6Sowhydidweconductthisresearch?Well,wewanttoexploitthepotentialbenefitsofdeeplearninginenhancingphysicallayersecurityincooperative(/kəʊ'ɒpərətɪv/wirelesscommunicationandreducethefeedbackoverheadinlimitedspectrumresoucebyourourproposedscheme.P8Nowletmemoveontoparttwo-systemmodelHere,youcanseeafigurewhichisasystemmodel.Thisisthesource;thesearetherelaynodesandthisisthedestination,thisistheeavesdropperThewholeprocessofcooperativewirelesscommunicationcanbedividedintotwophases.Inthefirstphase,thesourcebroadcaststhesignaltotheoptimalrelaywhichguaranteesperfectsecurity.AsshowninFig1,representsafadingcoefficientofthechannelfromthesourcetotherelaynode(.)Inthesecondphase,theoptimalrelayforwardsascaledversionofitsreceivedsignaltothedestinationinthepresenceoftheeavesdropper,wheretheoptimalrelayisconsideredtoadoptamplify-and-forward(AF)relayscheme.Inthisfigure,representsafadingcoefficientofthechannelfromtherelaytothedestinationrepresentsafadingcoefficientofthechannelfromtherelaytotheeavesdropper.P9:Hereyoucanseesomefollowingexpressions.Iamnotgoingtowasteourprecioustimeonthelengthyderivation.Iwouldliketoinviteyoutodirectlytakealookattheequationinitsfinalform.Thisistheoptimalindexoftheselectedrelaywiththeconventionalrelayselectionscheme.Amaongthisexpressionrepresentstheachievablesecrecyrateofsystemmodelwhentherelayisselected.P11Nowletmemovetopartthree-----NN-basedRelaySelectionHereyoucanseeafigurewhichshowsconventional3-la...

1、当您付费下载文档后,您只拥有了使用权限,并不意味着购买了版权,文档只能用于自身使用,不得用于其他商业用途(如 [转卖]进行直接盈利或[编辑后售卖]进行间接盈利)。
2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。
3、如文档内容存在违规,或者侵犯商业秘密、侵犯著作权等,请点击“违规举报”。

碎片内容

国际会议演讲稿

确认删除?
VIP
微信客服
  • 扫码咨询
会员Q群
  • 会员专属群点击这里加入QQ群
客服邮箱
回到顶部