Results 61 to 70 of about 4,676 (137)

Learning a Structured Neural Network Policy for a Hopping Task

open access: yes, 2018
In this work we present a method for learning a reactive policy for a simple dynamic locomotion task involving hard impact and switching contacts where we assume the contact location and contact timing to be unknown.
Herzog, Alexander   +3 more
core   +1 more source

Cyrus+: A DRL-Based Puncturing Solution to URLLC/eMBB Multiplexing in O-RAN

open access: yesIEEE Transactions on Machine Learning in Communications and Networking
Puncturing is a promising technique in 3GPP to multiplex Enhanced Mobile Broadband (eMBB) and Ultra-Reliable Low Latency Communications (URLLC) traffic on the same 5G New Radio (NR) air interface. The essence of puncturing is to transmit URLLC packets on
Ehsan Ghoreishi   +5 more
doaj   +1 more source

Exploring Y1 Communications and Services in O-RAN: Background, Privacy, and Security

open access: yesIEEE Open Journal of the Communications Society
In the latest open radio access network (O-RAN) architecture, the Y1 interface has been introduced to grant authorized parties, known as Y1 consumers, access to and utilization of Y1 data within the near-real-time RAN intelligent controller (Near-RT RIC).
Sachinkumar B. Mallikarjun   +5 more
doaj   +1 more source

Mobilized ad-hoc networks: A reinforcement learning approach [PDF]

open access: yes, 2003
Research in mobile ad-hoc networks has focused on situations in which nodes have no control over their movements. We investigate an important but overlooked domain in which nodes do have control over their movements. Reinforcement learning methods can be
Chang, Yu-Han   +2 more
core   +3 more sources

Open Wireless Digital Twin: End-to-End 5G Mobility Emulation With OpenAirInterface and Ray Tracing

open access: yesIEEE Access
This study presents an end-to-end wireless digital twin platform constructed using open-source software and open data to enhance the evaluation of mobile communication systems.
Tetsuya Iye   +7 more
doaj   +1 more source

COMIX: Generalized Conflict Management in O-RAN xApps—Architecture, Workflow, and a Power Control Case

open access: yesIEEE Access
Open Radio Access Network (O-RAN) is transforming the telecommunications landscape by enabling flexible, intelligent, and multi-vendor networks. Central to its architecture are xApps hosted on the Near-Real-Time RAN Intelligent Controller (Near-RT RIC ...
Anastasios E. Giannopoulos   +4 more
doaj   +1 more source

Integrating Zero Trust Architecture in O-RAN: A Comprehensive Survey and Analysis

open access: yesIEEE Open Journal of the Communications Society
Open Radio Access Network (O-RAN) is a new approach to mobile networks that disaggregates the network architecture into multi-vendor interoperable physical and software-defined network components connected through standardized open interfaces.
Ali Mehrban   +3 more
doaj   +1 more source

Is There Light at the Ends of the Tunnel? Wireless Sensor Networks for Adaptive Lighting in Road Tunnels [PDF]

open access: yes, 2011
Existing deployments of wireless sensor networks (WSNs) are often conceived as stand-alone monitoring tools. In this paper, we report instead on a deployment where the WSN is a key component of a closed-loop control system for adaptive lighting in ...
Ceriotti, Matteo   +13 more
core   +4 more sources

Mitigating ML-Driven Adversarial Attacks on xApps Using Dynamic Defense Mechanisms

open access: yesIEEE Open Journal of the Communications Society
The open radio access network architecture (O-RAN) architecture leverages intelligent near-real-time applications, known as xApps, to optimize network performance and services.
Prudhvi Kumar Kakani   +4 more
doaj   +1 more source

Learning Control Lyapunov Functions from Counterexamples and Demonstrations

open access: yes, 2019
We present a technique for learning control Lyapunov-like functions, which are used in turn to synthesize controllers for nonlinear dynamical systems that can stabilize the system, or satisfy specifications such as remaining inside a safe set, or ...
Ravanbakhsh, Hadi   +1 more
core   +1 more source

Home - About - Disclaimer - Privacy