Tsakmalis et al., 2017 - Google Patents
Constrained Bayesian active learning of interference channels in cognitive radio networksTsakmalis et al., 2017
View PDF- Document ID
- 7564564530324541668
- Author
- Tsakmalis A
- Chatzinotas S
- Ottersten B
- Publication year
- Publication venue
- IEEE Journal of Selected Topics in Signal Processing
External Links
Snippet
In this paper, a sequential probing method for interference constraint learning is proposed to allow a centralized cognitive radio network (CRN) accessing the frequency band of a primary user (PU) in an underlay cognitive scenario with a designed PU protection …
- 230000001149 cognitive 0 title abstract description 25
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATIONS NETWORKS
- H04W52/00—Power Management, e.g. TPC [Transmission Power Control], power saving or power classes
- H04W52/04—TPC [Transmission power control]
- H04W52/18—TPC being performed according to specific parameters
- H04W52/24—TPC being performed according to specific parameters using SIR [Signal to Interference Ratio] or other wireless path parameters
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L25/00—Baseband systems
- H04L25/02—Details ; Arrangements for supplying electrical power along data transmission lines
- H04L25/03—Shaping networks in transmitter or receiver, e.g. adaptive shaping networks ; Receiver end arrangements for processing baseband signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L27/00—Modulated-carrier systems
- H04L27/001—Modulated-carrier systems using chaotic signals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computer systems utilising knowledge based models
- G06N5/04—Inference methods or devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04B—TRANSMISSION
- H04B7/00—Radio transmission systems, i.e. using radiation field
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L5/00—Arrangements affording multiple use of the transmission path
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Meng et al. | Power allocation in multi-user cellular networks: Deep reinforcement learning approaches | |
Zhang et al. | Beam alignment and tracking for millimeter wave communications via bandit learning | |
Liu et al. | Stochastic successive convex approximation for non-convex constrained stochastic optimization | |
Matthiesen et al. | A globally optimal energy-efficient power control framework and its efficient implementation in wireless interference networks | |
Lee et al. | Deep learning for distributed optimization: Applications to wireless resource management | |
Ge et al. | Deep reinforcement learning for distributed dynamic MISO downlink-beamforming coordination | |
Abbas et al. | Recent advances on artificial intelligence and learning techniques in cognitive radio networks | |
Liu et al. | Intelligent reflecting surface aided MISO uplink communication network: Feasibility and power minimization for perfect and imperfect CSI | |
Yan et al. | Federated cooperation and augmentation for power allocation in decentralized wireless networks | |
Saxena et al. | Reinforcement learning for efficient and tuning-free link adaptation | |
Geng et al. | Hierarchical reinforcement learning for relay selection and power optimization in two-hop cooperative relay network | |
Nasir et al. | Deep actor-critic learning for distributed power control in wireless mobile networks | |
Matthiesen et al. | Mixed monotonic programming for fast global optimization | |
Liu et al. | Wireless federated langevin monte carlo: Repurposing channel noise for bayesian sampling and privacy | |
Letizia et al. | Capacity-driven autoencoders for communications | |
Shah-Mohammadi et al. | Neural network cognitive engine for autonomous and distributed underlay dynamic spectrum access | |
Tsakmalis et al. | Interference constraint active learning with uncertain feedback for cognitive radio networks | |
Kang | Reinforcement learning based adaptive resource allocation for wireless powered communication systems | |
Hakimi et al. | Optimized distributed automatic modulation classification in wireless sensor networks using information theoretic measures | |
Aung et al. | Deep reinforcement learning based joint spectrum allocation and configuration design for STAR-RIS-assisted V2X communications | |
Tsakmalis et al. | Constrained Bayesian active learning of interference channels in cognitive radio networks | |
Yan et al. | Gaussian process reinforcement learning for fast opportunistic spectrum access | |
Paul et al. | Deep reinforcement learning based reliable spectrum sensing under SSDF attacks in cognitive radio networks | |
Hoang et al. | Physical layer authentication and security design in the machine learning era | |
Dong et al. | Optimization-Driven DRL-Based Joint Beamformer Design for IRS-Aided ITSN Against Smart Jamming Attacks |