




已阅读5页,还剩1页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
自我介绍Thank you, Mr./Ms. Chair. /professorMy name is sang qian. I am very honored to be here to do oral presentation.I am a Master student from Hohai University and I am currently doing some research on physical layer security.Today, I would like to share with you some of my research on relay selection in cooperative communication. (external /ekstrnl; kstrnl/)内容安排:My presentation includes these five parts.First, some background information about this research;Second, system model we have done;Third, NN-based relay selection scheme we have proposedForth, Simulation and results analysisAnd last, some conclusions we have got P4Part one, introductionFirstly, I would like to give you a bit of background.Differing from the traditional cryptographic techniques based on secret keys, we can make use of wireless channel characteristics to enhance physical layer security.Cooperative communication has been widely recognized as an effective way to combat wireless fading and provide diversity gain which is one of the research hot spots.Machine learning as an emerging technology has been widely applied in image processing, cancer prediction, stock analysis and other fields. So why not try it in wireless communication?P5:Next, I want to talk a little bit about present studyRecent studies on deep learning for wireless communication systems have proposed alternative approaches to enhance certain parts of the conventional communication system such as modulation recognition、 channel encoding and decoding、channel estimation and detection and an autoencoder which can replace the total system with a novel architecture【modulation recognition:An NN architecture for modulation recognition that consists of a 4-layer NN and two two-layer NNs。channel encoding and decoding:A plain DNN architecture for channel decoding to decode k bitsmessages from N bits noisy codewords。channel estimation and detection :A dense-Net for symbol-to-symbol detection can adopt long short-term memory (LSTM) to detect an estimated symbol. Autoencoder:the autoencoder can represent the entire communication system and jointly optimize the transmitter and receiver over an AWGN channel.】P6So why did we conduct this research? Well, we want to exploit the potential benefits of deep learning in enhancing physical layer security in cooperative(/kprtv/ wireless communication and reduce the feedback overhead in limited spectrum resouce by our our proposed scheme.P8 Now let me move onto part two -system modelHere, you can see a figure which is a system model.This is the source ; these are the relay nodes and this is the destination ,this is the eavesdropperThe whole process of cooperative wireless communication can be divided into two phases.In the first phase, the source broadcasts the signal to the optimal relay which guarantees perfect security. As shown in Fig 1,represents a fading coefficient of the channel from the source to the relay node( . )In the second phase, the optimal relay forwards a scaled version of its received signal to the destination in the presence of the eavesdropper, where the optimal relay is considered to adopt amplify-and-forward (AF) relay scheme. In this figure,represents a fading coefficient of the channel from the relay to the destination represents a fading coefficient of the channel from the relay to the eavesdropper. P9: Here you can see some following expressions. I am not going to waste our precious time on the lengthy derivation. I would like to invite you to directly take a look at the equation in its final form.This is the optimal index of the selected relay with the conventional relay selection scheme.Amaong this expression represents the achievable secrecy rate of system model when the relay is selected.P11Now let me move to part three -NN-based Relay SelectionHere you can see a figure which shows conventional 3-layer neural network . It consists of input layer, hidden layer 1, hidden (/hdn/)layer 2 and output layer. Neural network can learn features from raw data automatically and adjust parameters(/prmt(r)z/)flexibly(/fleksbli/) such as weights and biases.In complex (/kmpleks/)conditions (scenarios(/snr /),) Neural network has promising applications in relay selection for several reasons.First, the deep network has superior(/supr/) learning ability despite(/dspat/)the complex channel conditions.Second, Neural network can handle large data sets because of distributed(/dstrbjtd/) and parallel(/prlel/)computing(/kmpjut/s, which ensure computation(/kmpjte()n/)speed and processing capacity(/kpst/).Third, various libraries or frameworks, such as TensorFlow, Theano,and Caffe give it wide applicationsIn this paper, the problem of the relay selection is modeled as a multi(/mlt/,ao)-classification problem. We adopt simple neural network(NN) to select the optimal relay to guarantees perfect secrecy performance of relay cooperative communication system.(enhance physical layer security)P12Before training the classification model, we need to make some preparation for deep learning to acquire a training set and a testing set.First, we need to produce real feature vector for each example according to channel state information;because the channel state information matrices is composed of complex numbers but feature vectors are generally composed of real numbers.So we need to change complex numbers into real numbers with absolute(/bslut/) value operation. Moreover, in order to improve the classification performance(precision), it is necessary to normalize the feature vectors.Second, we need to design key performance indicator (KPI).In order to effectively prevent the eavesdropper from intercepting information, we choose achievable secrecy rate as the KPI of system. This KPI indicates(represents/shows) the difference of the achievable rate from the source to the destination and the achievable rate from the source to the eavesdropper.Third,we can make labels for examples according to KPI. the index of the relay which obtains the maximum(/mksmm/) KPI is regarded as the class label of the example.P13Classification model This picture(is about) shows the whole process of building classification model.The whole process of building classification can be divided into two phases, namely training phase and testing phase. In the first phase, we need to choose suitable hyper (/hap/)parameters to train neural network model. In the second phase, we can predict(/prdkt/) labels of optimal relay according to input data and assess classification performance.P15Now let me move to part four -Simulation and Results(/rzlts/) AnalysisHere, you can see a figure which shows the relationship between the average transmit (/trnzmt/)power of the source and the achievable secrecy rate with different numbers of relays.In this figure, the blue line represents the conventional relay selection scheme and the red line represents the NN-based scheme.In this figure, as the numbers of relay and the average transmit power of the source increases, the achievable secrecy rate increases accordingly,.which means increasing the number of relays can effectively improve the secret performance.The red line are almost(/lmst/) close to the blue line, 【whch indicates that our proposed scheme (i.e. the NN-based scheme) achieves almost the same secrecy rates as those of the conventional scheme for all values of , 】which validates effectiveness(/fektvns/) of our proposed schemes.P16This table shows the the normalized(/nrmlazd/) mean square(/skwe/) error(NMSES)values of dirrerent relay nodes. The value of NMSE means the performance difference between the conventional scheme and our proposed scheme. The values of NMSE are below(/bl/) negative(negtv/) 20 (), which validates effectiveness of our proposed scheme again.P17 Now, let me move to the last part -ConclusionOkay, now we are going to take a look at the last part -Conclusion.P18We have got the following conclusions.First, In complex (conditions)scenarios, Neural network has promising applications in relay selection for superior learning ability , computation speed and processing capacity.Second, Compared with the conventional relay selection scheme, our proposed scheme achieves almost the same secrecy performance.And last, Our proposed scheme has an advantage(/dvntd/) of relatively small feedback overhead, indicating that proposed scheme can be applied to the conditions (scenarios)where the feedback is limited.(If the conventional scheme needs feedback of complex numbers, NN-based scheme will only need feedback of real numbers. Therefore, the feedback overhead of our proposed scheme is half(/hf/) of that of the conventional scheme,)Q&A1、 计算复杂度Computational complexityThe biggest drawback is the highly selection complexities with a small number of relay nodes.If number of relay node is big, it will have a advantage. This need our further research.Q: The experiment shows that secrecy rate is almost the same as traditional method and what is the promotion of using NN to relay selection.(what is meaning of introducing NN to relay selection)A:That our proposed scheme (i.e. the NN-based scheme) achieves almost the same achievable secrecy rate as that of the conventional scheme indicates that our proposed scheme is effective and it can select optimal relay node which obtains maximum achievable secrecy rate.One reason (the first reason) is that Adopting NN for relay selection is a novel idea.Another reason is that the spectrum resource is relative limited and our proposed scheme has small feedback overhead.Q:whats the meaning of “perfect secrecy performance”? Whats the meaning of “Compared to the conventional relay selection scheme”?A: “perfect secrecy performance” means the achievable secrecy rate is the biggest one which can enhance physical layer security.In fact, the conventional relay selection scheme is the exhaustive search. The index of relay selection with this scheme is the best one.Q:“It is obvious that the feed
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年工业叉车操作人员综合能力培养与资质考核服务合同
- 2025新型LED路灯安装及老旧设施淘汰合同
- 2025年汽车商业险代理销售及理赔服务合同
- 2025年5G基站建设与信号优化服务合同
- 2025年幼儿园教职工儿童安全紧急疏散服务合同
- 2025年度园林苗木品种优化与区域推广专项合同
- 2025年度远程医疗技术服务人员劳动合同(含综合服务保障)
- 2025年新型钻探设备技术研发、制造与国内外销售联营合同
- 2025年智能新能源汽车租赁风险防控服务合同
- 2025年生态农业种子培育与推广合作研发协议
- 2025年内河船员考试(主推进动力装置2103·一类三管轮)历年参考题库含答案详解(5套)
- 感染性腹主动脉瘤护理
- 公司不交社保合作协议书
- 城市轨道交通工程监测技术
- 骨灰管理员职业技能鉴定经典试题含答案
- 火锅店股东协议合同范本
- 村流动人口管理办法细则
- 2025年4月安全生产会议记录
- 2025年江苏省苏豪控股集团有限公司校园招聘笔试备考试题及答案详解(各地真题)
- 存款保险宣传培训
- 质量检查员基础知识培训
评论
0/150
提交评论