SlideShare a Scribd company logo
1 of 2
Download to read offline
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD30535 | Volume – 4 | Issue – 3 | March-April 2020 Page 534
Review of Deep Neural Network Detectors in SM-MIMO System
Ruksana. P1, Radhika. P2
1Student, 2Assistant Professor,
1,2Cochin College of Engineering and Technology, Valanchery, Kerala, India
ABSTRACT
A deep neural network detectorforSM-MIMOhasbeenproposed.Itsdetection
principle is deep learning. For this a neural network must be trained first,and
then used for detection purpose. It doesn’t need any channel model and
instantaneous channel state information (CSI). It can provide better bit error
performance compared with conventional viterbidetector(VD)andalsoitcan
detect any length of sequences. For a MIMO system, the channel estimation
complexity can be avoided. It can detect in real time as arrives the receiver.
The main benefit is it can be used where the channel model is difficult to
design and also the channel is continuously varying with time.
KEYWORDS: Spatial Modulation, Deep Learning, Neural Network, ChannelState
Information, Viterbi Detector
How to cite this paper: Ruksana. P |
Radhika. P "Review of Deep Neural
Network Detectors in SM-MIMO System"
Published in
International Journal
of Trend in Scientific
Research and
Development
(ijtsrd), ISSN: 2456-
6470, Volume-4 |
Issue-3, April 2020,
pp.534-535, URL:
www.ijtsrd.com/papers/ijtsrd30535.pdf
Copyright © 2020 by author(s) and
International Journal ofTrendinScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
CommonsAttribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
INTRODUCTION
Multiple input multiple output (MIMO) systemistechnology
to increase better channel capacity by using multiple
antennas at both transmitter side and receiver side [1]. SM-
MIMO is the most modern communication system. It can
provide time and frequency resources, multiple users,
multiple antennas and other resources [2]. The aim of this
paper is to apply deep learning in the SM- MIMO detection
problem and understand its benefits.
One of the vital modules in reliable recovery of data sent
over a communication system is detector. A detector is
estimates the transmitted signal from a noisy and
corrupted signal at the receiver. The design and analysis of
detector depends on mathematical models that describe the
transmissionprocess, signal propagation,receivernoise, and
any different parameters in communication system [3].
For the communication system, where the channel model
maybe unknown and channel is intractable. Otherwise,
underlying channel model are known but, channel is
changing with time (instantaneous CSI). So, in this case
estimation can be achieved by transmitting and receiving
predesigned pilot sequence, which known by receiver. It
results in data transmission rate decrease. To overcomethis
problem, this paper use deep learning [4]-[6].this algorithm
is enough to perform detection under unknown channel
model and imperfect CSI
DEEP LEARNING BASED DETECTION ALGORITHM
Computer software that imitates the function of neural
network of human brain is called deep learning. It uses deep
neural network for learning. It consists of three layer, input
layer, hidden layers and output layer. The hidden layer is
made up of fully connected neurons, it receive input from
first layer and perform some mathematical operations [7].
Detection using deep learning is process of estimating
transmitted symbols from noisy received symbols. For this,
NN detectors have two phases, training phase and detection
phase. NN can be used trained by training dataset, which is
achieved by continuously transmitting and receivingknown
sequences. Then used for detection [8] and [9]. Iterate these
two phases until a tolerable level of accuracy is obtained.
TYPES OF NEURAL NETWORK DETECTOR
A. Convolutional neural networks (CNN) detector
CNN is simplest neural network architecture which are
specially designed for complex signal. It act as set filter to
extract most relevant feature. This type neural network uses
a mathematical operation called convolution. Convolution is
a special kind of linear operation. This network receives
fixed size inputs and provides fixed size outputs. CNN is a
type of feed forward artificial neural network with minimal
amounts of preprocessing. By using this type of network,
only the symbol detection is possible. It cannot use for
sequence detection.
B. Feed forward neural networks detector
The simple type of artificial neural network detector. In this,
information flows in forward direction. It receives noisy
input at the input layer, and then gives to hidden layers for
processing. The output layer gives the estimated output. It
IJTSRD30535
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD30535 | Volume – 4 | Issue – 3 | March-April 2020 Page 535
does not have any feedback. Information ends at the output
layers. For each new symbol arrives at the receiver, then
whole blocks need to be re-estimated for further detection.
This is the main drawback of feed forward neural network.
C. Recurrent neural network (RNN) detector
Recurrent neural network is a type ofdeeplearningoriented
algorithm with feedback. It’s algorithm follow a sequential
format [10]. The RNN can handle any length of input and
outputs. RNN have the memory element, information from
previous symbol is stored as state of RNN [11].Thestandard
use of RNN is processing of series time data or sequences. A
new technology is called sliding bidirectional recurrent
neural network (SBRNN) has added to conventional
recurrent neural network for better performance [12]. The
main goal of this technology is that it can detect any
arbitrary length data without any need of re-estimation.
CONCLUSION
We have presented deep neural network (DNN) detectorfor
MIMO system. It can detectthesequenceofsymbols inMIMO
system without having perfect channel model and
instantaneous channel state information. It performs
detection in a real time at the receiver. The bit error rate
performance of proposed neural network high compared to
other conventional detectors. It can detect any arbitrary
length of sequence.
REFERENCE
[1] N. Samuel, T. Diskin, and A. Wiesel, “Deep MIMO
detection,” in Proc. IEEE 18th Int. Workshop Signal
Process. Adv. Wireless Commun., Sapporo, 2017.
[2] P. Yang, Y. Xiao and M. Xiao, “Adaptive spatial
modulation MIMO based on machine learning” in J.
IEEE. Sel. communication. 2019.
[3] S. Dorner, S. Cammerer, J. Hoydis, and S.T.Brink,“Deep
learning based communicationovertheair,”IEEEJ.Sel.
Topics Signal Process., vol. 12, no. 1, pp. 132–143, Feb.
2018.
[4] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,”
Nature, vol. 521, no. 7553, pp. 436–444, May 2015.
[5] I. Goodfellow, Y. Bengio, and A. Courville, “Deep
Learning”. Cambridge, MA, USA: MIT Press, Nov. 2016.
[6] M. Ibnkahla, “Applications of neural networkstodigital
communications: A survey,” Signal Process.,vol.80,no.
7, pp. 1185–1215, 2000.
[7] U. Mitra and H. V. Poor, “Neural network techniquesfor
adaptive multiuser demodulation,” IEEE J. Sel. Areas
Commun., vol. 12, no. 9, pp. 1460–1470, Dec. 1994.
[8] S. Dorner, S. Cammerer, J. Hoydis, and S.T.Brink,“Deep
learning based communicationovertheair,”IEEEJ.Sel.
Topics Signal Process, vol. 12, no. 1, pp. 132–143, Feb.
2018.
[9] Y. Isk and N. Tas¸ pınar, “Multiuser detection with
neural network and pic in CDMA systems for AWGN
and rayleigh fading asynchronous channels,” Wireless
Personal Commun., vol. 43, no.4,pp.1185–1194,2007.
[10] K. Cho et al., “Learning phrase representations using
RNN encoder and decoder for statistical machine
translation,” in Proc. Conf. Emp. MethodsNatural Lang.
Process., 2014, pp. 1724–1734.
[11] M. Schuster and K. K. Paliwal, “Bidirectional recurrent
neural networks,” IEEE Trans. Signal Process., vol. 45,
no. 11, pp. 2673–2681, Nov. 1997.
[12] N. Farsad and A. Goldsmith, “Neural network detection
of data sequences in communication system” IEEE
transaction on signal processing. .vol.66, no.21,
nov2018.

More Related Content

What's hot

5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46Alexander Decker
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...sipij
 
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...IJMER
 
Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...IJECEIAES
 
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...A Generalized Regression Neural Network Approach to Wireless Signal Strength ...
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...ijtsrd
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object DetectionIRJET Journal
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksIDES Editor
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKIJNSA Journal
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageIDES Editor
 
Spectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosSpectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosKonstantinos Bountouris
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Techniqueijsrd.com
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIJERA Editor
 

What's hot (18)

5.a robust frame of wsn utilizing localization technique 36-46
5.a robust frame of wsn utilizing localization technique  36-465.a robust frame of wsn utilizing localization technique  36-46
5.a robust frame of wsn utilizing localization technique 36-46
 
O026084087
O026084087O026084087
O026084087
 
I045075155
I045075155I045075155
I045075155
 
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
A ROBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICA...
 
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...Single User Eigenvalue Based Detection For Spectrum Sensing In  Cognitive Rad...
Single User Eigenvalue Based Detection For Spectrum Sensing In Cognitive Rad...
 
Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...Enhanced signal detection slgorithm using trained neural network for cognitiv...
Enhanced signal detection slgorithm using trained neural network for cognitiv...
 
Indoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor NetworksIndoor Localization in Wireless Sensor Networks
Indoor Localization in Wireless Sensor Networks
 
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...A Generalized Regression Neural Network Approach to Wireless Signal Strength ...
A Generalized Regression Neural Network Approach to Wireless Signal Strength ...
 
O010528791
O010528791O010528791
O010528791
 
F33022028
F33022028F33022028
F33022028
 
IRJET- Deep Learning Techniques for Object Detection
IRJET-  	  Deep Learning Techniques for Object DetectionIRJET-  	  Deep Learning Techniques for Object Detection
IRJET- Deep Learning Techniques for Object Detection
 
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor NetworksKey Management Schemes for Secure Communication in Heterogeneous Sensor Networks
Key Management Schemes for Secure Communication in Heterogeneous Sensor Networks
 
F010524057
F010524057F010524057
F010524057
 
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORKCODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
CODE AWARE DYNAMIC SOURCE ROUTING FOR DISTRIBUTED SENSOR NETWORK
 
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network CoverageA Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
A Fuzzy Based Priority Approach in Mobile Sensor Network Coverage
 
Spectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive RadiosSpectrum Sensing Techiniques for Cognitive Radios
Spectrum Sensing Techiniques for Cognitive Radios
 
A survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing TechniqueA survey of Network Intrusion Detection using soft computing Technique
A survey of Network Intrusion Detection using soft computing Technique
 
Intelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural NetworkIntelligent Handwritten Digit Recognition using Artificial Neural Network
Intelligent Handwritten Digit Recognition using Artificial Neural Network
 

Similar to Review of Deep Neural Network Detectors in SM MIMO System

Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...IJECEIAES
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...IJERA Editor
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A ReviewIRJET Journal
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsIOSR Journals
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkIJMTST Journal
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classificationgerogepatton
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET Journal
 
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONijaia
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classificationgerogepatton
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...IJCNCJournal
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...IJCNCJournal
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...IRJET Journal
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...IJMER
 

Similar to Review of Deep Neural Network Detectors in SM MIMO System (20)

Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...Wide-band spectrum sensing with convolution neural network using spectral cor...
Wide-band spectrum sensing with convolution neural network using spectral cor...
 
40120140507007
4012014050700740120140507007
40120140507007
 
40120140507007
4012014050700740120140507007
40120140507007
 
Ijnsa050209
Ijnsa050209Ijnsa050209
Ijnsa050209
 
An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...An Ant colony optimization algorithm to solve the broken link problem in wire...
An Ant colony optimization algorithm to solve the broken link problem in wire...
 
E010412433
E010412433E010412433
E010412433
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 
IRJET - Deep Learning Applications and Frameworks – A Review
IRJET -  	  Deep Learning Applications and Frameworks – A ReviewIRJET -  	  Deep Learning Applications and Frameworks – A Review
IRJET - Deep Learning Applications and Frameworks – A Review
 
Wireless Micro-Sensor Network Models
Wireless Micro-Sensor Network ModelsWireless Micro-Sensor Network Models
Wireless Micro-Sensor Network Models
 
Reliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor NetworkReliable and Efficient Data Acquisition in Wireless Sensor Network
Reliable and Efficient Data Acquisition in Wireless Sensor Network
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classification
 
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
IRJET- Enhanced ID based Data Aggregation and Detection Against Sybil Attack ...
 
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATIONENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
ENSEMBLE LEARNING APPROACH FOR DIGITAL COMMUNICATION MODULATION’S CLASSIFICATION
 
Ensemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s ClassificationEnsemble Learning Approach for Digital Communication Modulation’s Classification
Ensemble Learning Approach for Digital Communication Modulation’s Classification
 
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
ON THE PERFORMANCE OF INTRUSION DETECTION SYSTEMS WITH HIDDEN MULTILAYER NEUR...
 
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
On The Performance of Intrusion Detection Systems with Hidden Multilayer Neur...
 
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
An Approach of Mobile Wireless Sensor Network for Target Coverage and Network...
 
Kn2518431847
Kn2518431847Kn2518431847
Kn2518431847
 
Kn2518431847
Kn2518431847Kn2518431847
Kn2518431847
 
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
An Efficient Security Way of Authentication and Pair wise Key Distribution wi...
 

More from ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

More from ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Recently uploaded

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Review of Deep Neural Network Detectors in SM MIMO System

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 4 Issue 3, April 2020 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD30535 | Volume – 4 | Issue – 3 | March-April 2020 Page 534 Review of Deep Neural Network Detectors in SM-MIMO System Ruksana. P1, Radhika. P2 1Student, 2Assistant Professor, 1,2Cochin College of Engineering and Technology, Valanchery, Kerala, India ABSTRACT A deep neural network detectorforSM-MIMOhasbeenproposed.Itsdetection principle is deep learning. For this a neural network must be trained first,and then used for detection purpose. It doesn’t need any channel model and instantaneous channel state information (CSI). It can provide better bit error performance compared with conventional viterbidetector(VD)andalsoitcan detect any length of sequences. For a MIMO system, the channel estimation complexity can be avoided. It can detect in real time as arrives the receiver. The main benefit is it can be used where the channel model is difficult to design and also the channel is continuously varying with time. KEYWORDS: Spatial Modulation, Deep Learning, Neural Network, ChannelState Information, Viterbi Detector How to cite this paper: Ruksana. P | Radhika. P "Review of Deep Neural Network Detectors in SM-MIMO System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-4 | Issue-3, April 2020, pp.534-535, URL: www.ijtsrd.com/papers/ijtsrd30535.pdf Copyright © 2020 by author(s) and International Journal ofTrendinScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative CommonsAttribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) INTRODUCTION Multiple input multiple output (MIMO) systemistechnology to increase better channel capacity by using multiple antennas at both transmitter side and receiver side [1]. SM- MIMO is the most modern communication system. It can provide time and frequency resources, multiple users, multiple antennas and other resources [2]. The aim of this paper is to apply deep learning in the SM- MIMO detection problem and understand its benefits. One of the vital modules in reliable recovery of data sent over a communication system is detector. A detector is estimates the transmitted signal from a noisy and corrupted signal at the receiver. The design and analysis of detector depends on mathematical models that describe the transmissionprocess, signal propagation,receivernoise, and any different parameters in communication system [3]. For the communication system, where the channel model maybe unknown and channel is intractable. Otherwise, underlying channel model are known but, channel is changing with time (instantaneous CSI). So, in this case estimation can be achieved by transmitting and receiving predesigned pilot sequence, which known by receiver. It results in data transmission rate decrease. To overcomethis problem, this paper use deep learning [4]-[6].this algorithm is enough to perform detection under unknown channel model and imperfect CSI DEEP LEARNING BASED DETECTION ALGORITHM Computer software that imitates the function of neural network of human brain is called deep learning. It uses deep neural network for learning. It consists of three layer, input layer, hidden layers and output layer. The hidden layer is made up of fully connected neurons, it receive input from first layer and perform some mathematical operations [7]. Detection using deep learning is process of estimating transmitted symbols from noisy received symbols. For this, NN detectors have two phases, training phase and detection phase. NN can be used trained by training dataset, which is achieved by continuously transmitting and receivingknown sequences. Then used for detection [8] and [9]. Iterate these two phases until a tolerable level of accuracy is obtained. TYPES OF NEURAL NETWORK DETECTOR A. Convolutional neural networks (CNN) detector CNN is simplest neural network architecture which are specially designed for complex signal. It act as set filter to extract most relevant feature. This type neural network uses a mathematical operation called convolution. Convolution is a special kind of linear operation. This network receives fixed size inputs and provides fixed size outputs. CNN is a type of feed forward artificial neural network with minimal amounts of preprocessing. By using this type of network, only the symbol detection is possible. It cannot use for sequence detection. B. Feed forward neural networks detector The simple type of artificial neural network detector. In this, information flows in forward direction. It receives noisy input at the input layer, and then gives to hidden layers for processing. The output layer gives the estimated output. It IJTSRD30535
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD30535 | Volume – 4 | Issue – 3 | March-April 2020 Page 535 does not have any feedback. Information ends at the output layers. For each new symbol arrives at the receiver, then whole blocks need to be re-estimated for further detection. This is the main drawback of feed forward neural network. C. Recurrent neural network (RNN) detector Recurrent neural network is a type ofdeeplearningoriented algorithm with feedback. It’s algorithm follow a sequential format [10]. The RNN can handle any length of input and outputs. RNN have the memory element, information from previous symbol is stored as state of RNN [11].Thestandard use of RNN is processing of series time data or sequences. A new technology is called sliding bidirectional recurrent neural network (SBRNN) has added to conventional recurrent neural network for better performance [12]. The main goal of this technology is that it can detect any arbitrary length data without any need of re-estimation. CONCLUSION We have presented deep neural network (DNN) detectorfor MIMO system. It can detectthesequenceofsymbols inMIMO system without having perfect channel model and instantaneous channel state information. It performs detection in a real time at the receiver. The bit error rate performance of proposed neural network high compared to other conventional detectors. It can detect any arbitrary length of sequence. REFERENCE [1] N. Samuel, T. Diskin, and A. Wiesel, “Deep MIMO detection,” in Proc. IEEE 18th Int. Workshop Signal Process. Adv. Wireless Commun., Sapporo, 2017. [2] P. Yang, Y. Xiao and M. Xiao, “Adaptive spatial modulation MIMO based on machine learning” in J. IEEE. Sel. communication. 2019. [3] S. Dorner, S. Cammerer, J. Hoydis, and S.T.Brink,“Deep learning based communicationovertheair,”IEEEJ.Sel. Topics Signal Process., vol. 12, no. 1, pp. 132–143, Feb. 2018. [4] Y. LeCun, Y. Bengio, and G. Hinton, “Deep learning,” Nature, vol. 521, no. 7553, pp. 436–444, May 2015. [5] I. Goodfellow, Y. Bengio, and A. Courville, “Deep Learning”. Cambridge, MA, USA: MIT Press, Nov. 2016. [6] M. Ibnkahla, “Applications of neural networkstodigital communications: A survey,” Signal Process.,vol.80,no. 7, pp. 1185–1215, 2000. [7] U. Mitra and H. V. Poor, “Neural network techniquesfor adaptive multiuser demodulation,” IEEE J. Sel. Areas Commun., vol. 12, no. 9, pp. 1460–1470, Dec. 1994. [8] S. Dorner, S. Cammerer, J. Hoydis, and S.T.Brink,“Deep learning based communicationovertheair,”IEEEJ.Sel. Topics Signal Process, vol. 12, no. 1, pp. 132–143, Feb. 2018. [9] Y. Isk and N. Tas¸ pınar, “Multiuser detection with neural network and pic in CDMA systems for AWGN and rayleigh fading asynchronous channels,” Wireless Personal Commun., vol. 43, no.4,pp.1185–1194,2007. [10] K. Cho et al., “Learning phrase representations using RNN encoder and decoder for statistical machine translation,” in Proc. Conf. Emp. MethodsNatural Lang. Process., 2014, pp. 1724–1734. [11] M. Schuster and K. K. Paliwal, “Bidirectional recurrent neural networks,” IEEE Trans. Signal Process., vol. 45, no. 11, pp. 2673–2681, Nov. 1997. [12] N. Farsad and A. Goldsmith, “Neural network detection of data sequences in communication system” IEEE transaction on signal processing. .vol.66, no.21, nov2018.