CN113766669B - Large-scale random access method based on deep learning network - Google Patents
Large-scale random access method based on deep learning network Download PDFInfo
- Publication number
- CN113766669B CN113766669B CN202111323583.8A CN202111323583A CN113766669B CN 113766669 B CN113766669 B CN 113766669B CN 202111323583 A CN202111323583 A CN 202111323583A CN 113766669 B CN113766669 B CN 113766669B
- Authority
- CN
- China
- Prior art keywords
- neural network
- user
- matrix
- random access
- algorithm
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W74/00—Wireless channel access, e.g. scheduled or random access
- H04W74/08—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access]
- H04W74/0833—Non-scheduled or contention based access, e.g. random access, ALOHA, CSMA [Carrier Sense Multiple Access] using a random access procedure
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/045—Combinations of networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/047—Probabilistic or stochastic networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/04—Architecture, e.g. interconnection topology
- G06N3/048—Activation functions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N3/00—Computing arrangements based on biological models
- G06N3/02—Neural networks
- G06N3/08—Learning methods
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Evolutionary Computation (AREA)
- Molecular Biology (AREA)
- Artificial Intelligence (AREA)
- Biomedical Technology (AREA)
- Biophysics (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Life Sciences & Earth Sciences (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Software Systems (AREA)
- Probability & Statistics with Applications (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a large-scale random access method based on a deep learning network, which comprises the following steps: constructing a system model based on large-scale random access; constructing a transmit signal to a user using a deep neural networkA model for detection and user access judgment; carrying out neural network training and parameter updating; and detecting the user emission signal according to the neural network after the training update, thereby judging whether the user is successfully accessed. In the large-scale random access scheme provided by the invention, a decoding algorithm with low complexity is provided, the communication performance is effectively improved, specifically, compared with the traditional algorithm, the detection algorithm based on the neural network does not need the prior statistical characteristic of a channel, the loss of the system can be greatly reduced, and the method is more suitable for the actual communication systemThe algorithm will provide better performance.
Description
Technical Field
The invention relates to a deep learning network, in particular to a large-scale random access method based on the deep learning network.
Background
With the rapid development of communication technology, base stations are more and more widely applied in social life, and the base stations are often required to be accessed to a large number of users and support uplink transmission of the large number of users; the access method of the user is very important at this time.
The traditional access strategy and the data transmission strategy are independent and are divided into two steps: firstly, active users are detected, and then channel estimation and data detection are carried out on the detected active users. This discrete strategy requires the user to complete activity detection and channel estimation through the pilot before data transmission, which can generate huge time delay and performance overhead. Therefore, it is difficult for such a conventional communication mode to satisfy the communication demand of high energy efficiency and low communication delay in a large-scale scenario. In addition, conventional access algorithms often need to know the statistical properties of the channel and the user activity characteristics, which is difficult to implement in practical situations.
Disclosure of Invention
The invention aims to overcome the defects of the prior art, provides a large-scale random access method based on a deep learning network, provides a low-complexity decoding scheme and effectively improves the communication performance.
The purpose of the invention is realized by the following technical scheme: a large-scale random access method based on a deep learning network comprises the following steps:
s1, constructing a system model based on large-scale random access;
s2, constructing a transmitting signal for a user by utilizing a deep neural networkA model for detection and user access judgment;
s3, carrying out neural network training and parameter updating;
and S4, detecting the signal emitted by the user according to the neural network after the training and updating, thereby judging whether the user is successfully accessed.
Further, the step S1 includes the following sub-steps:
s101, for the content containingCommunication system comprising a single antenna subscriber and a receiver, each subscriber being randomly connected to the receiver, i.e. transmitting information to the receiver with a certain probability in each transmission time slot, wherein the receiver is provided withA root antenna; by random variablesTo describe the userThe active nature of the slot, at each time slot,satisfies the following conditions:
s102, each user adopts a random access scheme based on free access; each user is pre-assigned a dedicated pilot sequence prior to transmissionWhereinFor pilot length, symbolsRepresentative length ofA set of complex sequences of (a); the elements of each pilot are derived from an independent identically distributed gaussian distribution,namely, it isWherein the symbolRepresents a mean of 0 and a variance ofThe complex gaussian distribution of (a) is,representative dimension ofThe identity matrix of (1); storing the pilot sequences of all users in a receiving end;
s103, each active user synchronously transmits a pilot frequency sequence and a transmission signal in each transmission time slotTo the receiving end, the received signal is represented as
whereinIs Gaussian noise, each element satisfies the conditions that the mean value of independent equal distribution is zero and the variance is(ii) a gaussian distribution of;representing a usernThe channel parameters to the receiving end are,to indicate a length ofAnd is unknown at the receiving end, is setFor the usernIs transmitted. In which the signal is transmittedIs generated from the following codebook:
whereinIs the firstA number of modulation code words is modulated,is a usernThe rate of transmission of (a) is,representing the user as inactive, i.e. inactive。
Further, the step S2 includes the following sub-steps:
s201, initialization: inputting a received signalSparse parameters of usersgRate per user(ii) a Initialization order;
S202, firstly, receiving signalsInputting into a designed neural network algorithm for interference elimination, wherein the neural network algorithm is based on a multilayer structuretThe calculation process of the layer is as follows:
wherein the content of the first and second substances,, is a matrixThe conjugate transpose of (a) is performed,tis an integer greater than zero, and the maximum number of layers is set toI.e. by;,Representing the action of a noise remover onnThe column signals are then transmitted to the display device,representing the first derivative of the denoiser function; the design of the denoiser will be implemented by a deep neural network,representative denoiserA neural network parameter of (a);
noise removing deviceThe design of (2) is as follows: firstly, a complex matrix is formedConversion into a real number matrixWhereinRepresentative dimension ofThe conversion mode of the real number matrix set is as follows:
whereinWhereinRepresentative dimension ofIs a matrixTo (1) anA section matrix; the matrix is then input into the following neural network:
wherein the content of the first and second substances,represents a combination of two neural networks;is a convolutional neural network with a number of filters ofThe kernel size is (1,1), and the step size is (1, 1);
in a convolutional networkAndadding Relu function as an activation function at the end of (1); order to,Is a soft shrinkage function:
wherein, the matrixIs a matrixTo (1) anThe number of the slices is one,is that the puncturing parameter is included in the parameter setPerforming the following steps; finally, willConversion into a complex matrix(ii) a Output signalLet us order。
wherein the content of the first and second substances,representative vectorTo middleElement to elementA vector of the composition of the individual elements,andrespectively representing real numbers and imaginary numbers; then, the obtained vector isThe input neural network, i.e.,
wherein the content of the first and second substances,andis a fully connected neural network layer, the number of neurons is respectivelyAnd(ii) a The Relu function and the Softmax function are respectively added to the networkAndat the end of the time period (c) of (c),is a parameter of the neural network;
finally, based on the obtained outputThe optimal a posteriori probability for detection is calculated, i.e.,
if it isThen, thenWhen is coming into contact withThen, thenWhereinRepresentative length ofnA zero vector of (d);
s204, after the posterior probability is obtained, the user emission information is detected by a method of maximizing the posterior probability, namely,
to obtainThen, the transmission information is obtained through the corresponding relationship of the thermal coding in step S203。
S205, passing the detected informationThus, whether the user is successfully accessed is judged: when in useThen represents the usernAnd successfully accessing the receiving end.
Further, the step S3 includes the following sub-steps:
the step S3 includes the following sub-steps:
s301, initializing and inputtingParameter ofAndtraining sampleWherein, in the step (A),is as followsjThe received signal at the time of one sample,represents the firstjUnder the samplenThe transmitted code words of the individual users are,Bis the total number of samples, positive real number;
S302, samplingThe input enters the neural network in S202,representing the output of a neural networknA line real number signal; then will beNeural network in input S203, output;
S303. utilize,And thermally encoded code wordTo neural network parametersAndupdating is carried out;
firstly, designing a loss function for training a neural network, wherein the loss function comprises three aspects:
wherein the content of the first and second substances,representative vectorTo (1) aiThe number of the elements is one,is a transmitted codeword obtained by randomly scrambling a training sample; equation ofIs given by the parameterThe design method of the neural network comprises the following steps:
wherein the content of the first and second substances,is a fully connected neural network with a number of nodes of(ii) a Is provided with(ii) a An ELU function is arranged behind each neural network as an activation function;
for each training, input samplesEnter a neural network to obtainAndthen calculating a loss function, and then using a backward iterative algorithm and an Ada optimizer to pair the parametersUpdating; make things stand moreAfter a new fixed number of times, the output is the updated neural network parameters, i.e.;
S304, the updated neural network parameters are used in the algorithm of step S2(ii) a The updated neural network can obtain more accurate transmission informationAnd the random access is more accurate.
The invention has the beneficial effects that: in the large-scale random access scheme provided by the invention, a decoding algorithm with low complexity is provided, and the communication performance is effectively improved. Specifically, compared with the traditional algorithm, the detection algorithm based on the neural network does not need the prior statistical characteristic of a channel, can greatly reduce the loss of the system, and is more suitable for the actual communication system. In addition, the proposed algorithm will be more robust than the conventional algorithm, i.e. it will provide better performance, such as lower error rates, when the system a priori knowledge is not complete.
Drawings
Fig. 1 is a schematic diagram of a large scale random access channel;
FIG. 2 is a flow chart of a method of the present invention;
FIG. 3 is a schematic diagram of a neural network algorithm based on a multilayer structure;
FIG. 4 is a schematic diagram of the design principle of a de-noiser;
FIG. 5 is a schematic diagram showing a comparison of algorithms when the number of users is (4,8,28) and the sparsity is (0.2,0.1,0.2) in the embodiment;
FIG. 6 is a schematic diagram showing a comparison of the algorithm with the number of users being (8,20,12) and the sparsity being (0.1,0.2,0.3) in the embodiment;
fig. 7 is a schematic diagram showing comparison of algorithms in the embodiment in which the number of users is (4,8,28) and the sparsity is (0.1,0.2, 0.3).
Detailed Description
The technical solutions of the present invention are further described in detail below with reference to the accompanying drawings, but the scope of the present invention is not limited to the following.
As shown in fig. 1, aiming at the problem of large-scale random access in 5G communication, the invention designs a random access algorithm based on a deep learning network. Considering a large-scale random access channel as shown in fig. 1, a base station needs to support uplink transmission of a large number of users at the same time. At one transmission moment, only a few users are in an active state to transmit information to the base station, and other users are in a dormant state. As shown in fig. 2, a specific method includes the following steps:
s1, constructing a system model based on large-scale random access:
s101. forCommunication system comprising a single antenna subscriber and a receiver, each subscriber being randomly connected to the receiver, i.e. transmitting information to the receiver with a certain probability in each transmission time slot, wherein the receiver is provided withA root antenna; by random variablesTo describe the usernThe active nature of the slot, at each time slot,satisfies the following conditions:
s102, each user adopts a random access scheme based on free access; each user is pre-assigned a dedicated pilot sequence prior to transmissionWhereinFor pilot length, symbolsRepresentative length ofA set of complex sequences of (a); the elements of each pilot being derived from an independent identically distributed gaussian distribution, i.e.Wherein the symbolRepresents a mean of 0 and a variance ofThe complex gaussian distribution of (a) is,representative dimension ofThe identity matrix of (1); storing the pilot sequences of all users in a receiving end;
s103, each active user synchronously transmits a pilot frequency sequence and a transmission signal in each transmission time slotTo the receiving end, the received signal is represented as
whereinIs Gaussian noise, each element satisfies the conditions that the mean value of independent equal distribution is zero and the variance is(ii) a gaussian distribution of;representing a usernThe channel parameters to the receiving end are,to indicate a length ofMAnd is unknown at the receiving end, is setFor the usernThe transmission signal of (1); in which the signal is transmittedIs generated from the following codebook:
whereinIs the firstA number of modulation code words is modulated,is a usernThe rate of transmission of (a) is,representing the user as inactive, i.e. inactive。
S2, constructing a transmitting signal for a user by utilizing a deep neural networkA model for detection and user access judgment;
the step S2 includes:
s201, initialization: inputting a received signalSparse parameters of usersgRate per user. Initialization order ;
S202, firstly, receiving signalsInputting into a designed neural network algorithm for interference elimination, wherein the neural network algorithm is based on a multilayer structuretThe calculation process of the layer is as follows:
wherein the content of the first and second substances,, is a matrixThe conjugate transpose of (a) is performed,tis an integer greater than zero, and the maximum number of layers is set toI.e. by;,Representing the action of a noise remover onnThe column signals are then transmitted to the display device,representing the first derivative of the denoiser function; the design of the denoiser will be implemented by a deep neural network,representative denoiserA neural network parameter of (a);
noise removing deviceThe design of (2) is as follows: firstly, a complex matrix is formedConversion into a real number matrixWhereinRepresentative dimension ofThe conversion mode of the real number matrix set is as follows:
whereinWhereinRepresentative dimension ofMIs a matrixTo (1) anA section matrix; the matrix is then input into the following neural network:
wherein the content of the first and second substances,represents a combination of two neural networks;is a convolutional neural network with a number of filters ofThe kernel size is (1,1), and the step size is (1, 1);
in a convolutional networkAndadding Relu function as an activation function at the end of (1); order to ,Is a soft shrink boxNumber:
wherein the content of the first and second substances,the matrix being a matrixTo (1) anThe number of the slices is one,is that the puncturing parameter is included in the parameter setPerforming the following steps; finally, willConversion into a complex matrix;
S203. in this step, we will use neural network to calculate the basisThe posterior probability of (d). First, each complex phasorConversion into real number vectorThat is to say that,
whereinRepresentative vectorTo middleElement to elementA vector of the composition of the individual elements,andrepresenting real and imaginary numbers, respectively. Then, we will get the vectorThe input neural network, i.e.,
whereinAndis a fully connected neural network layer, the number of neurons is respectivelyAnd. Relu function andsoftmax function is respectively added in the networkAndat the end of the time period (c) of (c),are parameters of the neural network. Finally, based on the obtained outputWe can calculate the optimal a posteriori probability for detection, i.e.,
whereinIs to transmit informationThe thermally encoded codeword of (a); if it isThen, thenWhen is coming into contact withThen, then
S204, after the posterior probability is obtained, the user emission information is detected by a method of maximizing the posterior probability, namely,
to obtainThen, through the correspondence relationship of the thermal coding in S203, we can obtain the transmission information。
S205, passing the detected informationThus, whether the user is successfully accessed is judged: when in useThen represents the usernAnd successfully accessing the receiving end.
Step S2 describes the specific steps of the neural network algorithm, however, the parameters of the neural network need to be trained before they can be used. To this end, we describe in detail how to train the neural network and update the parameters in S3.
The step S3 includes the following sub-steps:
s301, initializing and inputtingParameter ofAndtraining sampleWherein, in the step (A),is as followsjThe received signal at the time of one sample,represents the firstjUnder the samplenThe transmitted code words of the individual users are,Bis the total number of samples, positive real number;
S302, samplingThe input enters the neural network in S202,representing the output of a neural networknA line real number signal; then will beNeural network in input S203, output;
S303. utilize,And thermally encoded code wordTo neural network parametersAndupdating is carried out;
firstly, designing a loss function for training a neural network, wherein the loss function comprises three aspects:
wherein the content of the first and second substances,representative vectorTo (1) aiThe number of the elements is one,is a transmitted codeword obtained by randomly scrambling a training sample; equation ofIs given by the parameterThe design method of the neural network comprises the following steps:
wherein the content of the first and second substances,is a fully connected neural network with a number of nodes of(ii) a Is provided with(ii) a An ELU function is arranged behind each neural network as an activation function;
for each training, input samplesEnter a neural network to obtainAndthen calculating a loss function, and then using a backward iterative algorithm and an Ada optimizer to pair the parametersUpdating; when updated a fixed number of times, the output is the updated neural network parameters, i.e.;
S304, the updated neural network parameters are used in the algorithm of step S2(ii) a The updated neural network can obtain more accurate transmission informationAnd the random access is more accurate.
S4, detecting the user emission signal according to the neural network after training update, thereby judging whether the user is successfully accessed; when the access is determined to be successful, the steps in steps S201 to S205 are followed.
In the embodiments of the present application, some simulation results are given to verify the feasibility of the proposed random access scheme. The experimental parameters were selected as: number of usersN=40, sequence lengthK= 30. Three different transmission rates are considered: the codebook of users in group 1 isThe codebook of users in group 2 isThe codebook of users in group 3 is. The channels satisfying a Rice distribution, i.e.. Channel parameters for each userAre all composed ofK-the factor rice distribution is randomly generated. We compare the proposed algorithm with the traditional message-based algorithm and set the parametersTo measure the estimation error for the channel profile, i.e.. The parameters of the neural network are designed as:,. Number of training samples is。
In the experiment of fig. 5, we set the number of users in user groups 1, 2, and 3 to be (4,8, and 28), respectively, and the sparsity to be (0.2,0.1, and 0.2), respectively. As shown in fig. 5, our proposed algorithm is more robust than the conventional message passing algorithm. The neural network algorithm we propose has better performance when there is error to the channel profile estimate. In fig. 6, we change the number of users in the user group to (8,20,12), and the sparsity to (0.1,0.2, 0.3). As shown in fig. 6, the performance of our proposed algorithm still has better performance in robustness than the message passing algorithm.
In fig. 7, we investigated the effect of the number of antennas on performance. We set the number of users in user groups 1, 2, 3 to be (12,20,8), and the sparsity to be (0.1,0.2, 0.1). As shown in fig. 7, as the number of antennas increases, the error rate of the proposed algorithm decreases and is more robust than the conventional message passing algorithm.
The foregoing is a preferred embodiment of the present invention, it is to be understood that the invention is not limited to the form disclosed herein, but is not to be construed as excluding other embodiments, and is capable of other combinations, modifications, and environments and is capable of changes within the scope of the inventive concept as expressed herein, commensurate with the above teachings, or the skill or knowledge of the relevant art. And that modifications and variations may be effected by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.
Claims (2)
1. A large-scale random access method based on a deep learning network is characterized in that: the method comprises the following steps:
s1, constructing a system model based on large-scale random access;
s2, constructing a transmitting signal for a user by utilizing a deep neural networkA model for detection and user access judgment;
s3, carrying out neural network training and parameter updating;
s4, detecting the user emission signal according to the neural network after training update, thereby judging whether the user is successfully accessed;
the step S1 includes the following sub-steps:
s101, for the content containingCommunication between single antenna user and receiving endA system for transmitting information to a receiver with a certain probability in each transmission time slot, wherein each user randomly accesses the receiver, and the receiver is provided withA root antenna; by random variablesTo describe the userThe active nature of the slot, at each time slot,satisfies the following conditions:;
s102, each user adopts a random access scheme based on free access; each user is pre-assigned a dedicated pilot sequence prior to transmissionWhereinFor pilot length, symbolsRepresentative length ofA set of complex sequences of (a); the elements of each pilot being derived from an independent identically distributed gaussian distribution, i.e.Wherein the symbolRepresents a mean of 0 and a variance ofThe complex gaussian distribution of (a) is,representative dimension ofThe identity matrix of (1); storing the pilot sequences of all users in a receiving end;
s103, each active user synchronously transmits a pilot frequency sequence and a transmission signal in each transmission time slotTo the receiving end, the received signal is represented as
whereinIs Gaussian noise, each element satisfies the conditions that the mean value of independent equal distribution is zero and the variance isGauss ofDistributing;representing a usernThe channel parameters to the receiving end are,to indicate a length ofAnd is unknown at the receiving end, is setFor the usernThe transmission signal of (1); in which the signal is transmittedIs generated from the following codebook:
whereinIs the firstA number of modulation code words is modulated,is a usernThe rate of transmission of (a) is,representing the user as inactive, i.e. inactive;
The step S2 includes the following sub-steps:
s201, initialization: inputting a received signalSparse parameters of usersgRate per user(ii) a Initialization order;
S202, firstly, receiving signalsInputting into a designed neural network algorithm for interference elimination, wherein the neural network algorithm is based on a multilayer structuretThe calculation process of the layer is as follows:
wherein the content of the first and second substances,, is a matrixThe conjugate transpose of (a) is performed,tis an integer greater than zero, and the maximum number of layers is set toI.e. by;,Representing the action of a noise remover onnThe column signals are then transmitted to the display device,representing the first derivative of the denoiser function; the design of the denoiser will be implemented by a deep neural network,representative denoiserA neural network parameter of (a);
noise removing deviceThe design of (2) is as follows: firstly, a complex matrix is formedConversion into a real number matrixWhereinRepresentative dimension ofThe conversion mode of the real number matrix set is as follows:
whereinWhereinRepresentative dimension ofIs a matrixTo (1) anA section matrix; the matrix is then input into the following neural network:
wherein the content of the first and second substances,represents a combination of two neural networks;is a convolutional neural network with a number of filters ofThe kernel size is (1,1), and the step size is (1, 1);
in a convolutional networkAndadding Relu function as an activation function at the end of (1); order to,Is a soft shrinkage function:
wherein, the matrixIs a matrixTo (1) anThe number of the slices is one,is that the puncturing parameter is included in the parameter setPerforming the following steps; finally, willConversion into a complex matrix(ii) a Output signalLet us order;
wherein the content of the first and second substances,representative vectorTo middleElement to elementA vector of the composition of the individual elements,andrespectively representing real numbers and imaginary numbers; then, the obtained vector isThe input neural network, i.e.,
wherein the content of the first and second substances,andis a fully connected neural network layer, the number of neurons is respectivelyAnd(ii) a The Relu function and the Softmax function are respectively added to the networkAndat the end of the time period (c) of (c),is a parameter of the neural network;
finally, based on the obtained outputThe optimal a posteriori probability for detection is calculated, i.e.,
if it isThen, thenWhen is coming into contact withThen, thenWhereinRepresentative length ofnA zero vector of (d);
s204, after the posterior probability is obtained, the user emission information is detected by a method of maximizing the posterior probability, namely,
to obtainThen, the transmission information is obtained through the corresponding relationship of the thermal coding in step S203;
2. The large-scale random access method based on the deep learning network as claimed in claim 1, wherein: the step S3 includes the following sub-steps:
s301, initializing and inputtingParameter ofAndtraining sampleWherein, in the step (A),is as followsjThe received signal at the time of one sample,represents the firstjUnder the samplenThe transmitted code words of the individual users are,Bis the total number of samples, positive real number;
S302, samplingThe input enters the neural network in S202,representing the output of a neural networknA line real number signal; then will beInput deviceNeural network, output in S203;
S303. utilize,And thermally encoded code wordTo neural network parametersAndupdating is carried out;
firstly, designing a loss function for training a neural network, wherein the loss function comprises three aspects:
wherein the content of the first and second substances,representative vectorTo (1) aiThe number of the elements is one,is a transmitted codeword obtained by randomly scrambling a training sample; equation ofIs given by the parameterThe design method of the neural network comprises the following steps:
wherein the content of the first and second substances,is a fully connected neural network with a number of nodes of(ii) a Is provided with(ii) a An ELU function is arranged behind each neural network as an activation function;
for each training, input samplesEnter a neural network to obtainAndthen calculating a loss function and then using backward iterative calculationsFarad and Ada optimizer Pair parametersUpdating; when updated a fixed number of times, the output is the updated neural network parameters, i.e.;
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111323583.8A CN113766669B (en) | 2021-11-10 | 2021-11-10 | Large-scale random access method based on deep learning network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111323583.8A CN113766669B (en) | 2021-11-10 | 2021-11-10 | Large-scale random access method based on deep learning network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113766669A CN113766669A (en) | 2021-12-07 |
CN113766669B true CN113766669B (en) | 2021-12-31 |
Family
ID=78784916
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111323583.8A Active CN113766669B (en) | 2021-11-10 | 2021-11-10 | Large-scale random access method based on deep learning network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113766669B (en) |
Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743103A (en) * | 2017-10-26 | 2018-02-27 | 北京交通大学 | The multinode access detection of MMTC systems based on deep learning and channel estimation methods |
CN107820321A (en) * | 2017-10-31 | 2018-03-20 | 北京邮电大学 | Large-scale consumer intelligence Access Algorithm in a kind of arrowband Internet of Things based on cellular network |
CN108882301A (en) * | 2018-07-25 | 2018-11-23 | 西安交通大学 | The nonopiate accidental access method kept out of the way in extensive M2M network based on optimal power |
CN109862567A (en) * | 2019-03-28 | 2019-06-07 | 电子科技大学 | A kind of method of cell mobile communication systems access unlicensed spectrum |
CN111182649A (en) * | 2020-01-03 | 2020-05-19 | 浙江工业大学 | Random access method based on large-scale MIMO |
CN111224905A (en) * | 2019-12-25 | 2020-06-02 | 西安交通大学 | Multi-user detection method based on convolution residual error network in large-scale Internet of things |
CN111343730A (en) * | 2020-04-15 | 2020-06-26 | 上海交通大学 | Large-scale MIMO passive random access method under space correlation channel |
CN111641570A (en) * | 2020-04-17 | 2020-09-08 | 浙江大学 | Joint equipment detection and channel estimation method based on deep learning |
CN111683023A (en) * | 2020-04-17 | 2020-09-18 | 浙江大学 | Model-driven large-scale equipment detection method based on deep learning |
CN112188539A (en) * | 2020-10-10 | 2021-01-05 | 南京理工大学 | Interference cancellation scheduling code design method based on deep reinforcement learning |
CN112492686A (en) * | 2020-11-13 | 2021-03-12 | 辽宁工程技术大学 | Cellular network power distribution method based on deep double-Q network |
CN112910806A (en) * | 2021-01-19 | 2021-06-04 | 北京理工大学 | Joint channel estimation and user activation detection method based on deep neural network |
CN113303022A (en) * | 2019-01-10 | 2021-08-24 | 苹果公司 | 2-step RACH fallback procedure |
CN113344212A (en) * | 2021-05-14 | 2021-09-03 | 香港中文大学(深圳) | Model training method and device, computer equipment and readable storage medium |
CN113438746A (en) * | 2021-08-27 | 2021-09-24 | 香港中文大学(深圳) | Large-scale random access method based on energy modulation |
CN113573284A (en) * | 2021-06-21 | 2021-10-29 | 吉林大学 | Random access backoff method for large-scale machine type communication based on machine learning |
US11164348B1 (en) * | 2020-06-29 | 2021-11-02 | Tsinghua University | Systems and methods for general-purpose temporal graph computing |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11188035B2 (en) * | 2018-07-19 | 2021-11-30 | International Business Machines Corporation | Continuous control of attention for a deep learning network |
US11874897B2 (en) * | 2020-04-09 | 2024-01-16 | Micron Technology, Inc. | Integrated circuit device with deep learning accelerator and random access memory |
-
2021
- 2021-11-10 CN CN202111323583.8A patent/CN113766669B/en active Active
Patent Citations (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107743103A (en) * | 2017-10-26 | 2018-02-27 | 北京交通大学 | The multinode access detection of MMTC systems based on deep learning and channel estimation methods |
CN107820321A (en) * | 2017-10-31 | 2018-03-20 | 北京邮电大学 | Large-scale consumer intelligence Access Algorithm in a kind of arrowband Internet of Things based on cellular network |
CN108882301A (en) * | 2018-07-25 | 2018-11-23 | 西安交通大学 | The nonopiate accidental access method kept out of the way in extensive M2M network based on optimal power |
CN113303022A (en) * | 2019-01-10 | 2021-08-24 | 苹果公司 | 2-step RACH fallback procedure |
CN109862567A (en) * | 2019-03-28 | 2019-06-07 | 电子科技大学 | A kind of method of cell mobile communication systems access unlicensed spectrum |
CN111224905A (en) * | 2019-12-25 | 2020-06-02 | 西安交通大学 | Multi-user detection method based on convolution residual error network in large-scale Internet of things |
CN111182649A (en) * | 2020-01-03 | 2020-05-19 | 浙江工业大学 | Random access method based on large-scale MIMO |
CN111343730A (en) * | 2020-04-15 | 2020-06-26 | 上海交通大学 | Large-scale MIMO passive random access method under space correlation channel |
CN111641570A (en) * | 2020-04-17 | 2020-09-08 | 浙江大学 | Joint equipment detection and channel estimation method based on deep learning |
CN111683023A (en) * | 2020-04-17 | 2020-09-18 | 浙江大学 | Model-driven large-scale equipment detection method based on deep learning |
US11164348B1 (en) * | 2020-06-29 | 2021-11-02 | Tsinghua University | Systems and methods for general-purpose temporal graph computing |
CN112188539A (en) * | 2020-10-10 | 2021-01-05 | 南京理工大学 | Interference cancellation scheduling code design method based on deep reinforcement learning |
CN112492686A (en) * | 2020-11-13 | 2021-03-12 | 辽宁工程技术大学 | Cellular network power distribution method based on deep double-Q network |
CN112910806A (en) * | 2021-01-19 | 2021-06-04 | 北京理工大学 | Joint channel estimation and user activation detection method based on deep neural network |
CN113344212A (en) * | 2021-05-14 | 2021-09-03 | 香港中文大学(深圳) | Model training method and device, computer equipment and readable storage medium |
CN113573284A (en) * | 2021-06-21 | 2021-10-29 | 吉林大学 | Random access backoff method for large-scale machine type communication based on machine learning |
CN113438746A (en) * | 2021-08-27 | 2021-09-24 | 香港中文大学(深圳) | Large-scale random access method based on energy modulation |
Non-Patent Citations (5)
Title |
---|
R3-206092 "Initial Analyse on the Interface Impact with AI-based RAN Architecture";ZTE Corporation等;《3GPP tsg_ran\wg3_iu》;20201023;全文 * |
R3-206403 "Use cases, AI/ML algorithms, and general concepts";Intel Corporation;《3GPP tsg_ran\wg3_iu》;20201022;全文 * |
去蜂窝大规模MIMO系统研究进展与发展趋势;章嘉懿;《重庆邮电大学学报(自然科学版)》;20190615(第03期);全文 * |
智简6G无线接入网:架构、技术和展望;彭木根等;《北京邮电大学学报》;20201120(第03期);全文 * |
面向5G/B5G通信的智能无线资源管理技术;史清江等;《中国科学基金》;20200425(第02期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113766669A (en) | 2021-12-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Ye et al. | Power of deep learning for channel estimation and signal detection in OFDM systems | |
CN111224906B (en) | Approximate message transfer large-scale MIMO signal detection algorithm based on deep neural network | |
CN109246038B (en) | Dual-drive GFDM receiver and method for data model | |
CN102104574B (en) | Orthogonal frequency division multiplexing (OFDM)-transform domain communication system (TDCS) signal transmission and receiving methods, devices and system | |
CN111698182A (en) | Time-frequency blocking sparse channel estimation method based on compressed sensing | |
CN111740934A (en) | Underwater sound FBMC communication signal detection method based on deep learning | |
Zhang et al. | Deep learning based on orthogonal approximate message passing for CP-free OFDM | |
CN110430013B (en) | RCM method based on deep learning | |
CN113438746B (en) | Large-scale random access method based on energy modulation | |
CN110233628B (en) | Self-adaptive belief propagation list decoding method for polarization code | |
CN107864029A (en) | A kind of method for reducing Multiuser Detection complexity | |
CN110572340A (en) | turbo time domain equalization method for short wave communication | |
Essai Ali | Deep learning‐based pilot‐assisted channel state estimator for OFDM systems | |
CN113112028A (en) | Machine learning time synchronization method based on label design | |
CN112215335A (en) | System detection method based on deep learning | |
CN114500322B (en) | Method for detecting device activity and estimating channel under unauthorized large-scale access scene | |
CN113766669B (en) | Large-scale random access method based on deep learning network | |
CN102882654A (en) | Encoding constraint and probability calculation based encoding and decoding synchronization method | |
Yuan et al. | Channel estimation and pilot design for uplink sparse code multiple access system based on complex-valued sparse autoencoder | |
CN115412416A (en) | Low-complexity OTFS signal detection method for high-speed mobile scene | |
CN106911431B (en) | Improved partial edge information transmission method applied to demodulation process of sparse code multiple access system | |
Wang et al. | A Signal processing method of OFDM communication receiver based on CNN | |
Baek et al. | Interference cancellation and signal detection technique based on QRD‐M algorithm for FTN signalling | |
Sakoda et al. | Residue Effect of Parallel Interference Canceller in Belief Propagation Decoding in Massive MIMO Systems | |
CN110912651A (en) | FTN index modulation signal detection method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |