2020
DOI: 10.1109/access.2020.3038926
|View full text |Cite
|
Sign up to set email alerts
|

Vision-Aided Radio: User Identity Match in Radio and Video Domains Using Machine Learning

Abstract: 5G is designed to be an essential enabler and a leading infrastructure provider in the communication technology industry by supporting the demand for the growing data traffic and a variety of services with distinct requirements. The use of deep learning and computer vision tools has the means to increase the environmental awareness of the network with information from visual data. Information extracted via computer vision tools such as user position, movement direction, and speed can be promptly available for … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
12
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 17 publications
0
12
0
Order By: Relevance
“…This combines wireless data and vision data in order to overcome blockage, assist in the prediction of mMIMO channel subspace, enhance hand-over mechanism, enable context-aware communication, and provide proactive network management [329]- [331]. Examples of application of ML techniques in vision-aided wireless communication have been explored in [329]- [332] with potential benefits. However, the deployment of JCAS opens up new challenges such as the need for signal processing for the detection of the presence and shape of objects, interference, optimal overheads, and enhanced protocols for different radar re-quirements [326].…”
Section: J I-mmimo Jcasmentioning
confidence: 99%
See 1 more Smart Citation
“…This combines wireless data and vision data in order to overcome blockage, assist in the prediction of mMIMO channel subspace, enhance hand-over mechanism, enable context-aware communication, and provide proactive network management [329]- [331]. Examples of application of ML techniques in vision-aided wireless communication have been explored in [329]- [332] with potential benefits. However, the deployment of JCAS opens up new challenges such as the need for signal processing for the detection of the presence and shape of objects, interference, optimal overheads, and enhanced protocols for different radar re-quirements [326].…”
Section: J I-mmimo Jcasmentioning
confidence: 99%
“…However, the deployment of JCAS opens up new challenges such as the need for signal processing for the detection of the presence and shape of objects, interference, optimal overheads, and enhanced protocols for different radar re-quirements [326]. In addition, the creation of an effective framework that captures scenario-dependent data and system configurations for vision-aided wireless communication is a promising area [329], [332].…”
Section: J I-mmimo Jcasmentioning
confidence: 99%
“…Nevertheless, if BS is obliged to take images, then additional characteristic information of the MS is required by BS to identify the MS from all detected objects inside one image, i.e., to match the MS's radio signal with the corresponding visual information [17]. Therefore, in [13]- [16], the BS needs to rely on the previous beam sequences or the location fed back by MS to achieve the blockage/handover prediction or beam tracking/selection, which leads to inevitable communication overhead.…”
Section: Introductionmentioning
confidence: 99%
“…Once the user has been matched to its visual image, the latter can be tracked continuously by the state-of-the-art object tracking techniques [16]- [17] without any communications overhead. To handle the user matching task, the authors in [18] design a classification DNN to distinguish user from all the environmental objects by the channel of the user and the detected object bounding boxes (BBoxes) in the image. Nevertheless, the algorithm of [18] can only handle two environmental objects, whereas the object number is random in realistic environment, and the channel is hard to obtain especially for the system with large scale antenna arrays.…”
Section: Introductionmentioning
confidence: 99%