Results 11 to 20 of about 1,277,780 (284)

Deep Reinforcement Learning Heterogeneous Channels for Poisson Multiple Access

open access: yesMathematics, 2023
This paper proposes a medium access control (MAC) protocol based on deep reinforcement learning (DRL), i.e., multi-channel transmit deep-reinforcement learning multi-channel access (MCT-DLMA) in heterogeneous wireless networks (HetNets).
Xu Zhang   +3 more
doaj   +1 more source

The neural multiple access channel [PDF]

open access: yesNeurocomputing, 2003
In many neural systems, independently encoded information must at some point be transmitted over the spike train of one neuron. We introduce a method for quantitatively studying the effects of the signal encoding and transmission processes on the rates of transmission of multiple sources of information over one spike train, using the multiple access ...
Brian J, Fischer, M Brandon, Westover
openaire   +2 more sources

Joint Pre-Equalization and Receiver Combining Design for Federated Learning With Misaligned Over-the-Air Computation

open access: yesIEEE Open Journal of the Communications Society, 2023
With the growth of terminal devices and data traffic, privacy concerns have inspired an innovative edge learning framework, called federated learning (FL).
Jianda Wang, Shuaishuai Guo
doaj   +1 more source

Efficient Coding of the Embedded Signal in Steganographic Systems with Multiple Access [PDF]

open access: yesProblems of the Regional Energetics, 2021
Today, steganographic systems with multiple access are of considerable importance. In such sys-tems, the orthogonal Walsh-Hadamard transform is most often used for multiplexing and divid-ing channels, which leads to the need for efficient coding of the ...
Kobozeva A.A., Kobozeva A.A.,
doaj   +1 more source

Subgradient Descent Learning Over Fading Multiple Access Channels With Over-the-Air Computation

open access: yesIEEE Access, 2023
We focus on a distributed learning problem in a communication network, consisting of $N$ distributed nodes and a central parameter server (PS). The PS is responsible for performing the computation based on data received from the nodes, which are ...
Tamir L. S. Gez, Kobi Cohen
doaj   +1 more source

The dirty MIMO multiple-access channel [PDF]

open access: yes2016 IEEE International Symposium on Information Theory (ISIT), 2016
To appear, IEEE Transactions on Information ...
Anatoly Khina, Yuval Kochman, Uri Erez
openaire   +4 more sources

Deterministic multiple access wiretap channel [PDF]

open access: yes2010 IEEE International Conference on Information Theory and Information Security, 2010
Two-user Multiple Access Channel with a Wire-Tapper (MAC-WT) is considered. A general outer bound for the secrecy capacity region is given. Also, we have defined the Deterministic MAC-WT, where the channel input of each user is a deterministic function of the channel output and the channel input of the other user.
Vahid Jahandideh   +2 more
  +7 more sources

Analyses of Space Division Multiple Access (SDMA) Schemes for Global Mobile Satellite Communications (GMSC) [PDF]

open access: yesTransNav, 2020
This paper describes analyzes of the Space Division Multiple Access (SDMA) technique and their hybrids with other Multiple Access Technique (MAT) such as Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), and Code Division ...
Stojce Dimov Ilcev
doaj   +1 more source

On Separation for Multiple Access Channels [PDF]

open access: yes, 2007
We examine the issue of separation for multiple access channels. We demonstrate that source-channel separation holds for noisy multiple access channels, when the channel operates over a common finite field.
Effros, Michelle   +3 more
core   +1 more source

Homologous Codes for Multiple Access Channels [PDF]

open access: yesIEEE Transactions on Information Theory, 2017
Building on recent development by Padakandla and Pradhan, and by Lim, Feng, Pastore, Nazer, and Gastpar, this paper studies the potential of structured nested coset coding as a complete replacement for random coding in network information theory. The roles of two techniques used in nested coset coding to generate nonuniform codewords, namely, shaping ...
Pinar Sen, Young-Han Kim
openaire   +2 more sources

Home - About - Disclaimer - Privacy