<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Neural network approach to 5G digital modulation recognition under a priory uncertainty of parameters</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Bohdan Kotyk</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Denys Bakhtiiarov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Bohdan Chumachenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yuliia Burmak</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Chumachenko</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Lavrynenko</string-name>
          <email>oleksandrlavrynenko@tks.kai.edu.ua</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Maksym Zalizniak Str., 3/6, Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>State University “Kyiv Aviation Institute”</institution>
          ,
          <addr-line>Liubomyra Huzara Ave., 1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>In digital communication, the correct identification of modulation types has huge importance, and it can enhance the reliability of signal processing. This work describes an approach to recognizing digital modulation types when the signal parameter, carrier frequency, initial phase, etc., is uncertain. The basis of the classification method is the 9th order of cumulants- indeed, it is the key feature enabling an accurate classification. This article employs a multilayer neural network, which, in turn, is combined with a data normalization scheme to determine possible modulation type factors (i.e., QAM-8, APSK-8, QAM-64, PSK-8) even when the corresponding parameter factors are unknown. The results of the simulation study indicate that suboptimal performance of the system has almost been eliminated concerning present inaccuracies in carrier frequency ofset or initial phase ofset. Thus, this methodology can easily be used as a firm base extending to other modulation types and, thus, to similar uncertainties in other signal parameters.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;machine learning</kwd>
        <kwd>neural network</kwd>
        <kwd>5G</kwd>
        <kwd>high order cumulants</kwd>
        <kwd>digital modulation</kwd>
        <kwd>ReLU</kwd>
        <kwd>softmax</kwd>
        <kwd>backpropagation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>(2)

 = act(,1) = 0(,1) + ∑︁</p>
      <p>(,1)
=1
(3)
where (,1) = ︁( 0(,1), 1(,1), (,1))︁ ,  = (1, 1) - row vector of synaptic connections for the -th
neuron 1 - Number of neurons in the input layer,  - Number of input features,  - Row vector of the
-th input.</p>
      <p>
        And the subsequent related formulas which govern the activations of the neurons, and also the
backpropagation weight updates are presented. The principal novelty of this research emanates from the
aviation of high-order cumulants as good descriptors to take into consideration the inherent statistical
properties of modulated signals. Some of the properties of cumulants that have been revealed include
their resistance to the characteristic Gaussian noise and ability to resolve distinctions between various
modulation schemes. This diference summarized the moments and that was a positive groundwork
toward distinguishing the diferent modulations, for example, QAM and PSK, among several others
[
        <xref ref-type="bibr" rid="ref3 ref4 ref5">3, 4, 5</xref>
        ].
      </p>
      <p>
        That dataset comprised 10,000 signal samples for training and was later broken down into training,
validation, and testing datasets. The optimization of the neural network used the Adam algorithm.
Another model that reported having an SNR of 5 dB and three hidden layers configured to give just
about 99% recognition accuracy was reported [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ]. That subsection also elaborates on how changes in
the architecture of the network and the hidden layer number influence performance; this injects more
evidence towards the efective performance of cumulant-based feature extraction and neural training
process.
      </p>
      <p>A multilayer perceptron optimized with Adam using high-order cumulants for feature descriptors
presents itself as a dependable methodology for recognition of digital modulations under ideal synchrony.</p>
      <p>
        In modern information transmission systems, the transmitted signal may contain service information
for synchronization between the transmitter and receiver, but often upon reception of the signal
its carrier frequency and initial phase are known with some error. For example, this occurs when
analyzing the received signal in the case of the Doppler efect, when the frequency of the received
oscillations changes according to a law associated with the movement of the transmitter and receiver
of these oscillations, or, for example, due to the instability of the frequencies of the transmitter and the
heterodynes of the receiver [
        <xref ref-type="bibr" rid="ref10 ref8 ref9">8, 9, 10</xref>
        ].
      </p>
      <p>In this article, we study the problem of recognizing the types of digital modulation of the received
signal with parametric a priori uncertainty, in particular, uncertainty of the carrier frequency or initial
phase. The received high-frequency signal is subjected to preliminary processing, where the received
signal is transferred to the zero frequency by multiplying by the oscillations cos(2 0 + 0), and
sin(2 0 + 0), generated by the heterodyne, the received signal is passed through a low-pass filter
and discretized for further digital processing. As a result of preliminary processing, the received signal
can be expressed as follows:
() =
() {cos [2Δ  + () + Δ
0] −  sin [2Δ  + () + Δ
0]} = () + (), (4)
where Δ is the carrier frequency ofset, and Δ 0 is the initial phase ofset.</p>
      <p>
        The obtained in-phase () and quadrature () components are grouped into a complex signal
() = () + () and its complex conjugate *() = () −  (), which are the initial data for
calculating the moments and cumulants. To overcome a priori uncertainty, it is proposed to continue
using the capabilities of a neural network. This requires an increase in the number of hypotheses tested
by the neural network. For example, with completely known signal parameters, there was only one
hypothesis that the signal had PSK-8 modulation. With the unknown signal frequency, the hypotheses
have appeared that the signal modulation is PSK-8, and the frequency shift is 0 Hz; that the signal
modulation is PSK-8 and the frequency shift is 500 Hz; and so on. Figure 1 shows an algorithm for
recognizing modulation types and estimating the value of the detuning from the carrier frequency or
the initial phase using high-order cumulants as informative features [
        <xref ref-type="bibr" rid="ref11">11, 12, 13</xref>
        ].
      </p>
      <p>In contrast to the algorithm studied in previous work, in this case the cumulants for diferent types
of modulation are calculated at a specific SNR value, and the ofset from the carrier frequency varies
from 0 Hz to 2000 Hz with a step of 500 Hz, and the ofset from the initial phase - from 0 rad. to 0.09
rad. with a step of 0.01 rad. Despite the fact that in this case it is necessary to have a large number
of databases for the ANN input, this method does not require an additional algorithm for estimating
the value of the carrier frequency and the initial phase [14, 15]. This algorithm is uniform and allows
recognizing the types of digital modulation of the received signal with an acceptable time spent in the
process of processing the received signal. Table 1 shows examples of cumulant values up to the 9th
order for QAM-64 and PSK-8 modulation with diferent values of the carrier frequency ofset Δ and
the initial phase Δ 0 at SNR = 3 dB. The analysis of the obtained cumulant values allows us to assert
that the information content of one or another cumulant about the type of signal modulation depends
significantly on the ofsets Δ and Δ 0. For example, in the absence of ofsets, the first cumulant 2,2
in the table for both distinguished types of modulation QAM-64 and PSK-8 has the same negative sign,
at Δ = 900 Hz the signs of the cumulants are diferent, at Δ 0 = 0.04 rad the signs of the cumulants
are positive [16, 17, 18].</p>
      <p>Figures 2 and 3 show the dependencies of the cumulant values 2,2 and 5,4 for the GMSK signal
with diferent values of Δ . At Δ = 0 Hz (curve 1), Δ = 500 Hz (curve 2) and Δ = 1000 Hz
(curve 3), the values of the cumulants 2,2 and 5,4 remain virtually unchanged for diferent signal
realizations, although the values depend on the frequency shift. In the case of Δ = 1500 Hz (curve 4),
the values of the cumulants 2,2 and 5,4 begin to change noticeably for diferent realizations.</p>
      <p>Figure 4 shows the values of the cumulant 5,3 for the GMSK signal at diferent values of Δ .</p>
      <p>From the graphs, it is evident that at Δ = 0 rad. (curve 1) and Δ = 0.02 rad. (curve 2) the value
of 5,3 changes insignificantly for diferent implementations, but the value of cumulants itself depends
significantly on the phase shift. And at Δ 0 = 0.05 rad. (curve 3) the value of the cumulant begins
to change significantly for diferent implementations. From the results of cumulant behavior analysis,
it may be said that the approximated to cumulant features improve the recognition accuracy of the
types of digital modulation of signals for nonzero ofsets from the carrier frequency and initial phase
[19, 20, 21]. Modeling of a multilayer neural network was done in the Python program. At an SNR
of 5 dB, four databases were created for the recognition of types of digital modulation with a priori
uncertainty of initial phase. Each database includes 10,000 signals (1000 signals per modulation type),
where 7200 signals are for training, 1800 for validation, and 1000 for testing.</p>
      <p>Figures 5 show the results of the experimental evaluation of the average value of the accuracy of
recognizing types of digital modulation of signals for diferent values of Δ 0.</p>
      <p>It follows from the graphs that at SNR = 5 dB and a value of Δ 0 = 0.02 rad. the average accuracy is
0.891, at Δ 0 = 0.05 rad. for QAM-8, APSK-16, APSK-32 and BPSK modulation the accuracy is 0.99, and
for GMSK, QAM-16, QAM-64, QPSK, 8-PSK-8 and FSK-2 modulation the accuracy drops due to the fact
that the cumulant values have unstable behavior for diferent signal implementations, and the cumulant
values themselves for these types of modulation difer insignificantly [ 22, 23, 24]. Even at Δ 0 = 0.09
rad., recognition of digital modulation types is practically impossible; the average accuracy is 0.112.
To study the influence of the SNR value on the accuracy of recognition of digital modulation types at
diferent values of ofset from the initial phase, 71 databases were formed. Each database corresponds
to one SNR value, which varies from -20 dB to 14 dB with a step of 0.5 dB. The simulation result is
shown in Figures 6 and 7. It is evident from the graphs that with an increase in the ofset from the initial
phase, the average accuracy of recognition of digital modulation types decreases because high-order
cumulants at a large ofset from the initial phase have large values [ 25], which is evident in Figures 2–4.</p>
      <p>Similarly, with a priori uncertainty of the carrier frequency, four databases were formed. Figure 8
shows the results of the experimental evaluation of the average value of the accuracy of recognizing
types of digital signal modulation for diferent values of Δ at SNR = 5 dB.</p>
      <p>The graphs clearly show that at Δ = 500 Hz and Δ = 1000 Hz, the average accuracy for GMSK,
8-QAM, APSK-16, APSK-32, BPSK and QPSK modulation is greater than 0.94, and for other types of
modulation it is significantly lower. At large frequency ofsets, for example, at Δ = 1500 Hz and
Δ = 2000 Hz, the average accuracy is low. 71 databases were created to study the efect of the
SNR value on the accuracy of recognizing digital modulation types at diferent ofsets from the carrier
frequency. Each database corresponds to one SNR value, which varies from -20 dB to 14 dB with a step
of 0.5 dB. The simulation result is shown in Figure 9.</p>
      <p>From graphs 6 and 9, we can conclude that in order to ensure acceptable reliability of modulation
type recognition by the neural network, the maximum value of Δ should not exceed 1.5 kHz, and the
phase shift Δ 0 should not be greater than 0.05 rad.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Multilayer perceptron in the problem of recognizing QAM and PSK modulation under parametric a priori uncertainty</title>
      <p>The study of the algorithms for recognizing modulation types showed that, compared to the recognition
of other modulation types, the separation of QAM-8 and APSK-16, as well as QAM-64 and PSK-8 at
low SNRs occurs with less reliability. In this section, a study is conducted on the recognition of these
modulation types with uncertainty in the carrier frequency and initial phase [26, 27, 28]. From the
graphs of the previous section, it is clear that with large ofsets from the carrier frequency or initial
phase, the average accuracy of correct recognition of these modulation types decreases due to the fact
that high-order cumulants under this condition have a large value compared to low-order cumulants,
therefore, the eficiency of the cumulant separation property decreases [ 29, 30]. For example, in Table 1
at Δ = 900 Hz for the QAM-64 signal, the value of the cumulant 5,4 is greater than the cumulant
2,2 in 520.2952.714 ≈ 5680 times.</p>
      <p>It is resolved by applying the Database Standardization process available in the ANN. The
standardization method (Standard Scaler) in ML is one of the data preprocessing methods used to scale
all original values in the dataset based on values drawn from a distribution with a mean of zero and
standard deviation of one. The two steps are appending columns and fitting the model. In the first step,
the mean and standard deviation of each feature in the data set are calculated. In the second step, each
feature value is transformed according to the formula:
 =</p>
      <p>,
 − 

(5)
where  is the original feature value,  and  are the mean and standard deviation of the feature.</p>
      <p>The standardization method results in a standardized scale that determines the place of each value in
the data set by measuring its deviation from the mean in standard deviation units. This makes the data
comparable and usable for machine learning. As an example, the cumulant values obtained as a result
of standardization for QAM-64 and PSK-8 modulation and certain frequency and initial phase detuning
of the signal are presented in Table 2.</p>
      <p>As a result of standardization of the database for the QAM-64 signal, the ratio between the cumulants
5,4 and 2,2 decreases to −0.3782/ − 0.4208 ≈ 0.9.</p>
      <p>Four databases have been formed to recognize two modulation groups: QAM-8 and APSK-16,
QAM64 and PSK-8. The first two databases have been formed to recognize these modulation types under
carrier frequency ofset conditions; each database consists of 12,800 signals (800 signals for each carrier
frequency ofset value). Under initial phase ofset conditions, two databases have also been formed;
each database consists of 16,000 signals (800 signals for each initial phase ofset value). The results of
modeling the recognition of the modulation type under carrier frequency ofset conditions are shown
in Figure 10 and 11.</p>
      <p>The figures are in the form of tables, the rows and columns of which correspond to the signal
modulation type and carrier frequency ofset. The cells contain the results of recognizing the modulation
type. For example, for Figure 10: when recognizing QAM-8 signals with a zero-frequency shift (the
ifrst row in the figure is QAM-8 0), all 80 signals involved in the computer experiment were recognized
correctly. When recognizing a QAM-8 signal with a frequency shift of 1800 Hz (QAM-8 1800), 75 signals
were recognized correctly, and an erroneous decision was made for five signals that it was APSK-16
1800. The figures clearly show that the use of a multilayer neural network allows not only recognizing
modulation types, but also determining the carrier frequency ofset values [ 31, 32]. Above, the accuracy
of recognizing a certain modulation type was understood as the probability of correctly identifying this
type of signal modulation among all the modulation types under consideration. In the modeling, this
probability was estimated as a sample average, i.e., as the ratio of the number of correctly recognized
signals with a given modulation type to the total number of realizations of diferent signals involved in
the computer experiment [33, 34, 35]. Recognition accuracy is of QAM-8 and APSK-16 modulations
with diferent values, thus, 0.96. Figure 12 and Figure 13 show recognition results when an Initial Phase
Ofset condition was used.</p>
      <p>It can be seen from Figures 11 and 13 that the accuracy of QAM-64 and PSK-8 modulation recognition
decreases at large frequency and phase detuning. Values of multiple cumulants at large detuning
show unstable behavior when it comes to diferent implementations of signals, whereas the values of
these multiple cumulants for particular modulation types vary insignificantly. However, the use of a
multilayer neural network ensures high accuracy in estimating the values of Δ and Δ0.</p>
      <p>Figure 14 shows the results of an experiment on recognizing a received signal with an unknown
value of Δ . The experiment showed that the accuracy of recognition is 0.53 for QAM-64 modulation
and 0.47 for PSK-8 modulation. At the same time, the value of detuning from the carrier frequency Δ ,
equal to 600 Hz, is determined by the algorithm with high reliability.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Conclusions</title>
      <p>This article considers the approach to recognize digital modulation types of signals in cases of inaccurate
knowledge of signal parameters, including the carrier frequency and initial phase. It shows that to
recognize signal modulation types, it is preferable to use cumulants up to the 9th order. The simulation
results have confirmed that in the region of small values of either the carrier frequency ofset or the
initial phase of the signal, this method indeed ensures high accuracy in recognizing modulation types.
Furthermore, the results of the simulation give us the possibility and advisability of expanding the list
of classified modulation types. A method of recognizing digital modulation types (QAM–8, APSK–8,
QAM–64, PSK–8), in the case of inaccurate knowledge of signal parameters, including the carrier
frequency and initial phase, is considered. A multilayer neural network is built. Data normalization
is used as a data preparation technique. Simulation results confirm that in the case of inaccurate
determination of carrier frequency and initial phase, a multilayer neural network using cumulants as an
information feature can not only recognize types of digital modulation with high probability but also
estimate the very values. The technique applied to solving the problem of a priori uncertainty about
the parameters of the signal can be applied to the case of simultaneous uncertainty about values of the
carrier frequency and initial phase, as well as the amplitude of the signal, its time position, etc.</p>
    </sec>
    <sec id="sec-4">
      <title>Declaration on Generative AI</title>
      <p>The authors have not employed any Generative AI tools.
[12] R. Odarchenko, V. Pevnev, A. Pinchuk, O. Polihenko, Optimization of the integrated video
surveillance system with elements of data analysis, CEUR Workshop Proceedings 3925 (2025)
47–63. URL: https://ceur-ws.org/Vol-3925/paper05.pdf.
[13] M. Abdollahi, R. Sabzalizadeh, S. Javadinia, S. Mashhadi, S. S. Mehrizi, A. Baniasadi, Automatic
modulation classification for nlos 5g signals with deep learning approaches, in: Proceedings of the 2023
10th International Conference on Wireless Networks and Mobile Communications (WINCOM),
IEEE, Istanbul, Turkiye, 2023, pp. 1–6. doi:10.1109/WINCOM59760.2023.10322928.
[14] G. Tonn, J. P. Kesan, L. Zhang, J. Czajkowski, Cyber risk and insurance for transportation
infrastructure, Transport Policy 79 (2019) 103–114. URL: https://www.sciencedirect.com/science/
article/pii/S0967070X18307248. doi:10.1016/j.tranpol.2019.04.019.
[15] S. J. Aljarrah, S. Cherbal, A. Mashaleh, J. A. Karaki, A. Gawanmeh, On the comparative analysis of
trends in cybersecurity risk assessment, governance, and compliance frameworks, in: 2024
International Jordanian Cybersecurity Conference (IJCC), 2024, pp. 136–142. doi:10.1109/IJCC64742.
2024.10847280.
[16] P. Sadhukhan, J. Bhaumik, Automatic modulation classification using convolutional neural network
with batch normalization: A novel approach, in: Proceedings of the 2024 4th International
Conference on Computer, Communication, Control &amp; Information Technology (C3IT), IEEE,
Hooghly, India, 2024, pp. 1–4. doi:10.1109/C3IT60531.2024.10829439.
[17] D. I. Putra, S. Ekariani, Enhancing the coexistence of 802.11 wlan and 5g networks using a
multi-task learning with convolutional neural network model, in: Proceedings of the 2024 2nd
International Symposium on Information Technology and Digital Innovation (ISITDI), IEEE,
Bukittinggi, Indonesia, 2024, pp. 167–172. doi:10.1109/ISITDI62380.2024.10796737.
[18] K. S. Mayer, C. Müller, J. A. Soares, F. C. C. de Castro, D. S. Arantes, Deep phase-transmittance rbf
neural network for beamforming with multiple users, IEEE Wireless Communications Letters 11
(2022) 1498–1502. doi:10.1109/LWC.2022.3177162.
[19] M. Zaliskyi, et al., Model building for diagnostic variables during aviation equipment maintenance,
in: International Scientific and Technical Conference on Computer Sciences and Information
Technologies (CSIT), 2022, pp. 160–164. doi:10.1109/CSIT56902.2022.10000556.
[20] B. Shamasundar, S. Venkatesh, G. D. Surabhi, A. K. R. Chavva, Ai-aided opportunistic quantization
for channel aging mitigation and fronthaul overhead reduction in o-ran systems, in: Proceedings
of the 2024 IEEE 100th Vehicular Technology Conference (VTC2024-Fall), IEEE, Washington, DC,
USA, 2024, pp. 1–5. doi:10.1109/VTC2024-Fall63153.2024.10757837.
[21] O. Solomentsev, M. Zaliskyi, T. Herasymenko, O. Kozhokhina, Y. Petrova, Eficiency of operational
data processing for radio electronic equipment, Aviation 23 (2020) 71–77. doi:10.3846/aviation.
2019.11849.
[22] J. Pihlajasalo, et al., Deep learning ofdm receivers for improved power eficiency and coverage,
IEEE Transactions on Wireless Communications 22 (2023) 5518–5535. doi:10.1109/TWC.2023.
3235059.
[23] X. Chen, X. Wang, H. Zhao, Z. Fei, Deep learning-based joint modulation and coding scheme
recognition for 5g new radio protocols, in: 2022 IEEE 22nd International Conference on Communication
Technology (ICCT), 2022, pp. 1411–1416. doi:10.1109/ICCT56141.2022.10072789.
[24] M. Zaliskyi, Y. Petrova, M. Asanov, E. Bekirov, Statistical data processing during wind generators
operation, International Journal of Electrical and Electronic Engineering and Telecommunications
8 (2019) 33–38. doi:10.18178/ijeetc.8.1.33-38.
[25] G. Dede, A. M. Petsa, S. Kavalaris, E. Serrelis, S. Evangelatos, I. Oikonomidis, T. Kamalakis,
Cybersecurity as a contributor toward resilient internet of things (iot) infrastructure and sustainable
economic growth, Information 15 (2024). doi:10.3390/info15120798.
[26] H. Li, Computer network connection enhancement optimization algorithm based on
convolutional neural network, in: 2021 International Conference on Networking, Communications and
Information Technology (NetCIT), 2021, pp. 281–284. doi:10.1109/NetCIT54147.2021.00063.
[27] J. P. Nzabahimana, Analysis of security and privacy challenges in internet of things, in: 2018
IEEE 9th International Conference on Dependable Systems, Services and Technologies (DESSERT),
2018, pp. 175–178. doi:10.1109/DESSERT.2018.8409122.
[28] O. Solomentsev, M. Zaliskyi, O. Kozhokhina, T. Herasymenko, Eficiency of data processing for UAV
operation system, in: IEEE 4th International Conference on Actual Problems of Unmanned Aerial
Vehicles Developments (APUAVD), 2017, pp. 27–31. doi:10.1109/APUAVD.2017.8308769.
[29] P. Ruijie, A. Sali, L. Li, M. Z. Mohyedin, S. Qahtan, Evaluation of personal radiation exposure
from wireless signals in indoor and outdoor environments, IEEE Access 13 (2025) 106489–106510.
doi:10.1109/ACCESS.2025.3579085.
[30] T. Song, C. Lim, A. Nirmalathas, Performance analysis of a 28 ghz wideband analog radio-over-fiber
fronthaul with channel nonlinearity compensation, Journal of Lightwave Technology 42 (2024)
7588–7595. doi:10.1109/JLT.2024.3416046.
[31] O. Solomentsev, M. Zaliskyi, O. Zuiev, Estimation of quality parameters in the radio flight support
operational system, Aviation 20 (2016) 123–128. doi:10.3846/16487788.2016.1227541.
[32] M. H. Rahman, M. Shahjalal, Y. M. Jang, Ensemble classifier based modulation recognition
for beyond 5g massive mimo (mmimo) communication, in: 2021 International Conference on
Artificial Intelligence in Information and Communication (ICAIIC), 2021, pp. 483–487. doi: 10.
1109/ICAIIC51459.2021.9415269.
[33] E. S. Hidalgo, J. Xavier Salvat Lozano, J. A. Ayala-Romero, A. Garcia-Saavedra, X. Li, X. Costa-Perez,
Memorai: Energy-eficient last-level cache memory optimization for virtualized rans, in: 2024 IEEE
International Conference on Machine Learning for Communication and Networking (ICMLCN),
2024, pp. 25–30. doi:10.1109/ICMLCN59089.2024.10624821.
[34] O. Lavrynenko, R. Odarchenko, G. Konakhovych, A. Taranenko, D. Bakhtiiarov, T. Dyka, Method
of semantic coding of speech signals based on empirical wavelet transform, in: 2021 IEEE 4th
International Conference on Advanced Information and Communication Technologies (AICT),
2021, pp. 18–22. doi:10.1109/AICT52120.2021.9628985.
[35] M. Khalid, S. Omatu, A neural network based control scheme with an adaptive neural model
reference structure, in: [Proceedings] 1991 IEEE International Joint Conference on Neural Networks,
1991, pp. 2128–2133 vol.3. doi:10.1109/IJCNN.1991.170702.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>D. I.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>G. F.</given-names>
            <surname>Konakhovych</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O. Y.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <article-title>An approach to modernization of the hat and cost 231 model for improvement of electromagnetic compatibility in premises for navigation and motion control equipment</article-title>
          ,
          <source>in: 2018 IEEE 5th International Conference on Methods and Systems of Navigation and Motion Control (MSNMC)</source>
          ,
          <year>2018</year>
          , pp.
          <fpage>271</fpage>
          -
          <lpage>274</lpage>
          . doi:
          <volume>10</volume>
          .1109/MSNMC.
          <year>2018</year>
          .
          <volume>8576260</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Kotyk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Chumachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Antonov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chupryn</surname>
          </string-name>
          ,
          <article-title>Neural network approach to 5g digital modulation recognition</article-title>
          ,
          <source>in: Proceedings of the Workshop on Cyber Hygiene Conflict Management in Global Information Networks</source>
          , volume
          <volume>3925</volume>
          <source>of CEUR Workshop Proceedings</source>
          ,
          <year>2025</year>
          , pp.
          <fpage>82</fpage>
          -
          <lpage>92</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3925</volume>
          /paper07.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Lishchynovska</surname>
          </string-name>
          , I. Basiuk, T. Prykhodko,
          <article-title>Methods for assessment and forecasting of electromagnetic radiation levels in urban environments</article-title>
          , Informatyka, Automatyka,
          <source>Pomiary w Gospodarce i Ochronie Środowiska</source>
          <volume>11</volume>
          (
          <year>2021</year>
          )
          <fpage>24</fpage>
          -
          <lpage>27</lpage>
          . doi:
          <volume>10</volume>
          .35784/ iapgos.2430.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Chumachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Chupryn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Antonov</surname>
          </string-name>
          ,
          <article-title>Distribute load among concurrent servers</article-title>
          ,
          <source>in: CEUR Workshop Proceedings</source>
          , volume
          <volume>3826</volume>
          , CEUR-WS.org,
          <year>2024</year>
          , pp.
          <fpage>260</fpage>
          -
          <lpage>266</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3826</volume>
          /short15.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          , et al.,
          <article-title>Integration of MEMS inertial and magnetic field sensors for tracking power lines</article-title>
          ,
          <source>in: International Conference on Perspective Technologies and Methods in MEMS Design (MEMSTECH)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>33</fpage>
          -
          <lpage>36</lpage>
          . doi:
          <volume>10</volume>
          .1109/MEMSTECH55132.
          <year>2022</year>
          .
          <volume>10002907</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>S.</given-names>
            <surname>Jawhar</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C. E.</given-names>
            <surname>Kimble</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J. R.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Bitar</surname>
          </string-name>
          ,
          <article-title>Enhancing cyber resilience with ai-powered cyber insurance risk assessment</article-title>
          ,
          <source>in: 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC)</source>
          ,
          <year>2024</year>
          , pp.
          <fpage>0435</fpage>
          -
          <lpage>0438</lpage>
          . doi:
          <volume>10</volume>
          .1109/CCWC60891.
          <year>2024</year>
          .
          <volume>10427965</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>A. A.</given-names>
            <surname>Sunna</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Sultana</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Kshetri</surname>
          </string-name>
          ,
          <string-name>
            <surname>M. M. Uddin</surname>
          </string-name>
          ,
          <article-title>Assesscica: Assessing and mitigating financial losses from cyber attacks with role of cyber insurance in post-pandemic era</article-title>
          ,
          <source>in: 2025 13th International Symposium on Digital Forensics and Security (ISDFS)</source>
          ,
          <year>2025</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/ ISDFS65363.
          <year>2025</year>
          .
          <volume>11012092</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Chumachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Lavrynenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Antonov</surname>
          </string-name>
          ,
          <article-title>Evaluating the uav's communication channels energy availability in the context of enemy electronic countermeasures</article-title>
          ,
          <source>2024 IEEE 7th International Conference on Actual Problems of Unmanned Aerial Vehicles Development, APUAVD 2024 - Proceedings</source>
          (
          <year>2024</year>
          )
          <fpage>159</fpage>
          -
          <lpage>164</lpage>
          . doi:
          <volume>10</volume>
          .1109/APUAVD64488.
          <year>2024</year>
          .
          <volume>10765900</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>N.</given-names>
            <surname>Yehorov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zaliskyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Chumachenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Bakhtiiarov</surname>
          </string-name>
          ,
          <article-title>A method for deterministic signal detection on the background of noise based on the neural network</article-title>
          ,
          <source>in: Proceedings of the 2024 IEEE 5th KhPI Week on Advanced Technology (KhPIWeek)</source>
          , IEEE, Kharkiv, Ukraine,
          <year>2024</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>6</lpage>
          . doi:
          <volume>10</volume>
          .1109/KhPIWeek61434.
          <year>2024</year>
          .
          <volume>10878073</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>O.</given-names>
            <surname>Sushchenko</surname>
          </string-name>
          , et al.,
          <article-title>Airborne sensor for measuring components of terrestrial magnetic field</article-title>
          ,
          <source>in: IEEE International Conference on Electronics and Nanotechnology (ELNANO)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>687</fpage>
          -
          <lpage>691</lpage>
          . doi:
          <volume>10</volume>
          .1109/ELNANO54667.
          <year>2022</year>
          .
          <volume>9926760</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>R.</given-names>
            <surname>Odarchenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Pinchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Polihenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Skurativskyi</surname>
          </string-name>
          ,
          <article-title>A comparative analysis of cyber threat intelligence models</article-title>
          ,
          <source>CEUR Workshop Proceedings</source>
          <volume>3925</volume>
          (
          <year>2025</year>
          )
          <fpage>3</fpage>
          -
          <lpage>12</lpage>
          . URL: https://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>3925</volume>
          /paper01.pdf.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>