Soft Computing for Robust Secure Wireless Reception

被引:0
|
作者
Sarma, E. Gopalakrishna [1 ]
Pillai, Sakuntala S. [2 ]
机构
[1] Lourdes Matha Coll Sci & Technol, Trivandrum 695574, Kerala, India
[2] Mar Baselios Coll Engn & Technol, Trivandrum 695015, Kerala, India
关键词
Soft computing; neural networks; fuzzy logic; genetic algorithm; robust secure wireless reception; higher-order statistics;
D O I
10.14429/dsj.59.1554
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
Soft computing is a collection of different coinputing methodologies that include neuro computing, fuzzy logic, evolutionary computing, and probabilistic reasoning. These are aimed to exploit the tolerance for imprecision and uncertainty to achieve tractability, robustness, and low solution cost. This paper presents a brief overview of soft computing components, followed by typical realization, via simulation of a wireless receiver employing a hybrid soft computing technique to illustrate its application in a fading signal propagation scenario.
引用
收藏
页码:517 / 523
页数:7
相关论文
共 50 条
  • [1] Robust Secure Wireless Powered MISO Cognitive Mobile Edge Computing
    Liu, Boyang
    Song, Jiajia
    Wang, Jin
    Sun, Haijian
    Wang, Qun
    IEEE ACCESS, 2020, 8 (08): : 62356 - 62366
  • [2] Robust voice activity detector for wireless communications using soft computing
    Univ of Catania, Catania, Italy
    IEEE J Sel Areas Commun, 9 (1818-1829):
  • [3] A robust voice activity detector for wireless communications using soft computing
    Beritelli, F
    Casale, S
    Cavallaro, A
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 1998, 16 (09) : 1818 - 1829
  • [4] Soft computing and wireless communication
    Kostrzewski, AA
    Jannson, TP
    Kupiec, S
    APPLICATIONS AND SCIENCE OF NEURAL NETWORKS, FUZZY SYSTEMS, AND EVOLUTIONARY COMPUTATION IV, 2001, 4479 : 70 - 74
  • [5] On Secure Wireless Communications for Service Oriented Computing
    Zhang, Yuanyu
    Shen, Yulong
    Wang, Hua
    Zhang, Yanchun
    Jiang, Xiaohong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2018, 11 (02) : 318 - 328
  • [6] Supporting secure authentication and privacy in wireless computing
    Hong, Seong-Pyo
    Lee, Joon
    2006 INTERNATIONAL CONFERENCE ON HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2006, : 594 - +
  • [7] SOFT COMPUTING IN WIRELESS SENSORS NETWORKS
    Averkin, A. N.
    Belenki, A. G.
    NEW DIMENSIONS IN FUZZY LOGIC AND RELATED TECHNOLOGIES, VOL I, PROCEEDINGS, 2007, : 387 - +
  • [8] Special issue on natural and secure computing in modern soft computing application
    You, Ilsun
    Ogiela, Marek R.
    Leu, Fang-Yie
    SOFT COMPUTING, 2016, 20 (05) : 1667 - 1669
  • [9] Special issue on natural and secure computing in modern soft computing application
    Ilsun You
    Marek R. Ogiela
    Fang-Yie Leu
    Soft Computing, 2016, 20 : 1667 - 1669
  • [10] Overhead of using Secure Wireless Communications in Mobile Computing
    Almenares, Florina
    Arias, Patricia, Jr.
    Marin, Andres
    Diaz-Sanchez, Daniel
    Sanchez, Rosa, Jr.
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2013, 59 (02) : 335 - 342