With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,whic...With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient workers.In this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few workers.Specifically,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each worker.Then,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate tasks.Only when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start issue.More importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker pool.Finally,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.展开更多
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ...In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often overlooked.It is frequently assumed that vehicles can be accurately modeled during actual motion processes.However,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network scenarios.Taking into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading process.The optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming problem.Due to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and transmission.Finally,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization problem.Simulation results show that the algorithm proposed in this paper is able to achieve lower latency task computation offloading.Meanwhile,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).展开更多
Based on the EAST equilibrium,the effects of boron(B)and neon(Ne)injected at different locations on the target heat load,and the distributions of B and Ne particles were investigated by transport code SOLPS-ITER.It wa...Based on the EAST equilibrium,the effects of boron(B)and neon(Ne)injected at different locations on the target heat load,and the distributions of B and Ne particles were investigated by transport code SOLPS-ITER.It was found that the B injection was more sensitive to the injection location for heat flux control than impurity Ne.The high electron and ion densities near the inner target in the discharge with impurity B injected from over X-point(R_(1))led to plasma detachment only at the inner target,and the localized B ions in the cases with injection from outer target location(R_(2))and upstream location(R_(3))led to far-SOL detachment at the outer target,but not at the inner target.In contrast,for Ne,the spatial distributions of Ne ions and electrons were found to be similar in all the cases at the three injection locations,and the detached plasma was achieved at the inner target and the electron temperature was reduced at the outer target.For locations R_(2) and R_(3),impurity B showed a more pronounced effect on the heat flux at the far-SOL of the outer target.Further analysis indicated that Ne atoms came mainly from the recycling sources,whereas B atoms came mainly from injection,and that their distinct atomic distributions resulted from the difference in the ionization threshold and ionization mean free path.In addition,the radiation proportion of B in the divertor region was larger than that of Ne when the total radiation power was similar,which suggests that B has less influence on the core region.展开更多
With the requirements of users enhanced for wireless communication, the cooperative communication will become a development trend in future. In this paper, a model based on complex networks with both preferential atta...With the requirements of users enhanced for wireless communication, the cooperative communication will become a development trend in future. In this paper, a model based on complex networks with both preferential attachment is researched to solve an actual network CCN (Cooperative Communication Network). Firstly, the evolution of CCN is given by four steps with different probabilities. At the same time, the rate equations of nodes degree are presented to analyze the evolution of CCN. Secondly, the degree distribution is analyzed by calculating the rate equation and numerical simulation. Finally, the robustness of CCN is studied by numerical simulation with random attack and intentional attack to analyze the effects of degree distribution and average path length. The results of this paper are more significant for building CCN to programme the resource of communication.展开更多
The Metaverse depicts a parallel digitalized world where virtuality and reality are fused.It has economic and social systems like those in the real world and provides intelligent services and applications.In this pape...The Metaverse depicts a parallel digitalized world where virtuality and reality are fused.It has economic and social systems like those in the real world and provides intelligent services and applications.In this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical challenges.Specifically,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of Needs.Subsequently,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical framework.Additionally,we envision open issues and challenges of the Metaverse in the technical aspect.The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.展开更多
High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication sys...High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.展开更多
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.展开更多
In this paper, a Stackelberg differential game based approach is proposed to solve the bandwidth allocation problems in satellite communication network. All the satellites are divided into two groups, one has high dow...In this paper, a Stackelberg differential game based approach is proposed to solve the bandwidth allocation problems in satellite communication network. All the satellites are divided into two groups, one has high download requirements, and the other one has low download requirements. Each satellites group has its own controller for bandwidth allocation, and can get payments from the satellites for the allocated resources. The relationships between the controllers and satellites are formed as a Stackelberg game. In our model, differential equation is introduced to describe the bandwidth dynamics for the whole satellite communication network. Combine the differential equation and Stackelberg game together, we can formulate the bandwidth allocation problems in satellite communication network as a Stackelber differential game. The solutions to the proposed game is solved based the Bellman dynamic equations. Numerical simulations are given to prove the effeteness and correctness of the proposed approach.展开更多
In the Internet of Things(IoT),security and privacy issues of physical objects are crucial to the related applications.In order to clarify the complicated security and privacy issues,the life cycle of a physical objec...In the Internet of Things(IoT),security and privacy issues of physical objects are crucial to the related applications.In order to clarify the complicated security and privacy issues,the life cycle of a physical object is divided into three stages of pre-working,in-working,and post-working.On this basis,a physical object-based security architecture for the IoT is put forward.According to the security architecture,security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail.Considering the development of IoT technologies,potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized.At the same time,possible directions for dealing with these challenges are also pointed out.展开更多
Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things(IIoT)applications,this paper studies a simple cognitive radio non-orthogonal multiple access(CR-NOMA)downlink sys...Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things(IIoT)applications,this paper studies a simple cognitive radio non-orthogonal multiple access(CR-NOMA)downlink system.This system consists of two secondary users(SUs)dynamically interfered by the primary user(PU),and its performance is characterized by the outage probability of the SU communications.This outage probability is calculated under two conditions where,a)the transmission of PU starts after the channel state information(CSI)is acquired,so the base station(BS)is oblivious of the interference,and b)when the BS is aware of the PU interference,and the NOMA transmission is adapted to the more comprehensive knowledge of the signal to interference plus noise ratio(SINR).These results are verified by simulations,and their good agreement suggests our calculations can be used to reduce the complexity of future analysis.We find the outage probability is reduced when the SUs move further away from the primary transmitter or when the signal from PU is less powerful,and the BS always has better performance when it is aware of the interference.The findings thus emphasize the importance of monitoring the channel quality and realtime feedback to optimize the performance of CR-NOMA system.展开更多
The integration of the Internet of Vehicles(IoV)in future smart cities could help solve many traffic-related challenges,such as reducing traffic congestion and traffic accidents.Various congestion pricing and electric...The integration of the Internet of Vehicles(IoV)in future smart cities could help solve many traffic-related challenges,such as reducing traffic congestion and traffic accidents.Various congestion pricing and electric vehicle charging policies have been introduced in recent years.Nonetheless,the majority of these schemes emphasize penalizing the vehicles that opt to take the congested roads or charge in the crowded charging station and do not reward the vehicles that cooperate with the traffic management system.In this paper,we propose a novel dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in an urban smart city environment.The proposed system rewards the drivers that opt to take alternative congested-free ways and congested-free charging stations.We propose a token management system that serves as a virtual currency,where the vehicles earn these tokens if they take alternative non-congested ways and charging stations and use the tokens to pay for the charging fees.The proposed system is designed for Vehicular Ad-hoc Networks(VANETs)in the context of a smart city environment without the need to set up any expensive toll collection stations.Through large-scale traffic simulation in different smart city scenarios,it is proved that the system can reduce the traffic congestion and the total charging time at the charging stations.展开更多
A well-performed recommender system for an e-commerce web site can help customers easily find favorite items and then increase the turnover of merchants, hence it is important for both customers and merchants. In most...A well-performed recommender system for an e-commerce web site can help customers easily find favorite items and then increase the turnover of merchants, hence it is important for both customers and merchants. In most of the existing recommender systems, only the purchase information is utilized data and the navigational and behavioral data are seldom concerned. In this paper, we design a novel recommender system for comprehensive online shopping sites. In the proposed recommender system, the navigational and behavioral data, such as access, click, read, and purchase information of a customer, are utilized to calculate the preference degree to each item; then items with larger preference degrees are recommended to the customer. The proposed method has several innovations and two of them are more remarkable: one is that nonexpendable items are distinguished from expendable ones and handled by a different way; another is that the interest shifting of customers are considered. Lastly, we structure an example to show the operation procedure and the performance of the proposed recommender system. The results show that the proposed recommender method with considering interest shifting is superior to Kim et al(2011) method and the method without considering interest shifting.展开更多
Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we pre...Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy con- sumption in the loT in this paper. A service providing model is built to find the relation- ship between bandwidth and energy consump- tion using a cooperative differential game mo- del. The game solution is gotten in the condi- tion of grand coalition, feedback Nash equili- brium and intermediate coalitions and an allo- cation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the per- formance of IoT decreases with the increasing of bandwidth cost or with the decreasing of en- ergy cost; secondly, all the nodes in the IoT com- posing a grand coalition can save bandwidth and energy consumption; thirdly, when the fac- tors of bandwidth cost and energy cost are eq- ual, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.展开更多
The ergodic information rate for Orthogonal Frequency-Division Multiplexing / Orthogonal Frequency-Division Multiple Access with amplify-and-forward (AF) relaying systems in the presence of frequency offsets is eval...The ergodic information rate for Orthogonal Frequency-Division Multiplexing / Orthogonal Frequency-Division Multiple Access with amplify-and-forward (AF) relaying systems in the presence of frequency offsets is evaluated. Unlike previous work, per-subcarrier adaptive power allocation is performed on each relay to optimize the system ergodic information rate. For a given frequency offset and total number of relays M, the AF ergodic information rate is proven to be a monotonically increasing function of α (the ratio of the power allocated to the source node and the total transmit power), implying that the maximum ergodic information rate can be obtained at α=1 (i.e., there is no cooperative relay). Furthermore, the proof of "cooperative relays cannot improve the AF ergodic information rate in a quasi-static wireless channel" is also provided in this letter.展开更多
Under model uncertainty and complex disturbance, the robust control strategy should be used in suspension control systems for various Maglev vehicles to obtain ride comfort of passengers. In this paper, the robust con...Under model uncertainty and complex disturbance, the robust control strategy should be used in suspension control systems for various Maglev vehicles to obtain ride comfort of passengers. In this paper, the robust controllers are synthesized using μ approach for levitation system of electromagnetic Maglev vehicle and active suspension system of super conducting Maglev vehicle. The numerical simulations for different parameter perturbations and different disturbances are accomplished, and a comparison of μ control and H ∞ control is performed. The simulation results show that, both H ∞ control and μ control for two kinds of Maglev vehicles exhibit good stability robustness to plant model uncertainty, but μ control exhibits better performance robustness than H ∞ control, therefore better ride quality could be obtained by μ control.展开更多
Satellite networks have high requirements for security and data processing speed.In order to improve the reliability of the network,software-defined network(SDN)technology is introduced and a central controller is set...Satellite networks have high requirements for security and data processing speed.In order to improve the reliability of the network,software-defined network(SDN)technology is introduced and a central controller is set in the network.Due to the characteristics of global perspective,control data separation,and centralized control of SDN,the idea of SDN is introduced to the design of the satellite network model.As a result,satellite nodes are only responsible for data transmission,while the maintenance of the links and the calculation of routes are implemented by the controller.For the massive LEO satellite network based on SDN,a state evaluation decision routing mechanism is proposed.The designed mechanism monitors the status of the entire network effectively and reduces the on-board load on the satellite network.The best routing decision is made under the comprehensive consideration of the current and historical status of each inter-satellite link between Low Earth Orbit(LEO)satellite network nodes.The calculation and storage requirements are controlled within a reasonable range.Based on the curve parameter transmission fuzzy encryption algorithm,a safe and reliable condition assessment decision routing mechanism(CADRM)is designed.It ensures that the personal information of the LEO satellite network can be transmitted safely and effectively.The experimental simulation results show the improvement of network throughput,the reduction of packet loss rate and the enhancing of network reliability.展开更多
Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human society.With the advance...Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human society.With the advancement of technologies,robots have become more and more intelligent and have been widely used in many fields,such as disease diagnosis,customer services,healthcare for the older people,and so on.As robots made our lives much more convenient than ever before,they also brought many potential risks and challenges in technology,security,and ethic.To better understand the development of robots,we proposed a concept of a robot’s living space and analyzed the role of robots in our society.In this paper,we focus on setting a theoretical framework of the robot’s living space to further understand the human-robot relationship.The research in this paper contains three central aspects.First,we interpret the concept of the robot’s living space and the functions of each space.Second,we analyze and summarize the relative technologies which support robots living well in each space.Finally,we provide advice and improvement measures based on a discussion of potential problems caused by the developments of robots.With the trend of robots humanization and human-robot society integration,we should seriously consider how to collaborate with intelligent robots to achieve hybrid intelligence.To build a harmonious human-robot integrated society,studying the robot’s living space and its relationship with humans is the prerequisite and roadmap.展开更多
Facial micro-expressions are short and imperceptible expressions that involuntarily reveal the true emotions that a person may be attempting to suppress,hide,disguise,or conceal.Such expressions can reflect a person...Facial micro-expressions are short and imperceptible expressions that involuntarily reveal the true emotions that a person may be attempting to suppress,hide,disguise,or conceal.Such expressions can reflect a person's real emotions and have a wide range of application in public safety and clinical diagnosis.The analysis of facial micro-expressions in video sequences through computer vision is still relatively recent.In this research,a comprehensive review on the topic of spotting and recognition used in micro expression analysis databases and methods,is conducted,and advanced technologies in this area are summarized.In addition,we discuss challenges that remain unresolved alongside future work to be completed in the field of micro-expression analysis.展开更多
Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional ...Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional attention schemes have not considered the impact of lesion type differences on grading,resulting in unreasonable extraction of important lesion features.Therefore,this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator(MPAG)and a lesion localization module(LLM).Firstly,MPAGis used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained in the patches,fully considering the impact of lesion type differences on grading,solving the problem that the attention maps of lesions cannot be further refined and then adapted to the final DR diagnosis task.Secondly,the LLM generates a global attention map based on localization.Finally,the weighted attention map and global attention map are weighted with the fundus map to fully explore effective DR lesion information and increase the attention of the classification network to lesion details.This paper demonstrates the effectiveness of the proposed method through extensive experiments on the public DDR dataset,obtaining an accuracy of 0.8064.展开更多
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and d...A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).展开更多
基金supported by the National Natural Science Foundation of China under Grant No.62072475 and No.62302062in part by the Hunan Provincial Natural Science Foundation of China under Grant Number 2023JJ40081。
文摘With the unprecedented prevalence of Industrial Internet of Things(IIoT)and 5G technology,various applications supported by industrial communication systems have generated exponentially increased processing tasks,which makes task assignment inefficient due to insufficient workers.In this paper,an Intelligent and Trustworthy task assignment method based on Trust and Social relations(ITTS)is proposed for scenarios with many tasks and few workers.Specifically,ITTS first makes initial assignments based on trust and social influences,thereby transforming the complex large-scale industrial task assignment of the platform into the small-scale task assignment for each worker.Then,an intelligent Q-decision mechanism based on workers'social relation is proposed,which adopts the first-exploration-then-utilization principle to allocate tasks.Only when a worker cannot cope with the assigned tasks,it initiates dynamic worker recruitment,thus effectively solving the worker shortage problem as well as the cold start issue.More importantly,we consider trust and security issues,and evaluate the trust and social circles of workers by accumulating task feedback,to provide the platform a reference for worker recruitment,thereby creating a high-quality worker pool.Finally,extensive simulations demonstrate ITTS outperforms two benchmark methods by increasing task completion rates by 56.49%-61.53%and profit by 42.34%-47.19%.
文摘In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often overlooked.It is frequently assumed that vehicles can be accurately modeled during actual motion processes.However,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network scenarios.Taking into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading process.The optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming problem.Due to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and transmission.Finally,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization problem.Simulation results show that the algorithm proposed in this paper is able to achieve lower latency task computation offloading.Meanwhile,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).
基金Project supported by the National Key R&D Program of China(Grant No.2019YFE03030004)the National Natural Science Foundation of China(Grant No.12275040)+1 种基金the Users with Excellence Program of Hefei Science Center CAS(Grant No.2020HSC-UE010)This research is also sponsored in part by the U.S.Department of Energy under contract DEAC02-09CH11466.
文摘Based on the EAST equilibrium,the effects of boron(B)and neon(Ne)injected at different locations on the target heat load,and the distributions of B and Ne particles were investigated by transport code SOLPS-ITER.It was found that the B injection was more sensitive to the injection location for heat flux control than impurity Ne.The high electron and ion densities near the inner target in the discharge with impurity B injected from over X-point(R_(1))led to plasma detachment only at the inner target,and the localized B ions in the cases with injection from outer target location(R_(2))and upstream location(R_(3))led to far-SOL detachment at the outer target,but not at the inner target.In contrast,for Ne,the spatial distributions of Ne ions and electrons were found to be similar in all the cases at the three injection locations,and the detached plasma was achieved at the inner target and the electron temperature was reduced at the outer target.For locations R_(2) and R_(3),impurity B showed a more pronounced effect on the heat flux at the far-SOL of the outer target.Further analysis indicated that Ne atoms came mainly from the recycling sources,whereas B atoms came mainly from injection,and that their distinct atomic distributions resulted from the difference in the ionization threshold and ionization mean free path.In addition,the radiation proportion of B in the divertor region was larger than that of Ne when the total radiation power was similar,which suggests that B has less influence on the core region.
基金Project supported by the Natural Science Foundation of Beijing(Grant No.4152035)the National Natural Science Foundation of China(Grant No.61272507)
文摘With the requirements of users enhanced for wireless communication, the cooperative communication will become a development trend in future. In this paper, a model based on complex networks with both preferential attachment is researched to solve an actual network CCN (Cooperative Communication Network). Firstly, the evolution of CCN is given by four steps with different probabilities. At the same time, the rate equations of nodes degree are presented to analyze the evolution of CCN. Secondly, the degree distribution is analyzed by calculating the rate equation and numerical simulation. Finally, the robustness of CCN is studied by numerical simulation with random attack and intentional attack to analyze the effects of degree distribution and average path length. The results of this paper are more significant for building CCN to programme the resource of communication.
文摘The Metaverse depicts a parallel digitalized world where virtuality and reality are fused.It has economic and social systems like those in the real world and provides intelligent services and applications.In this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical challenges.Specifically,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of Needs.Subsequently,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical framework.Additionally,we envision open issues and challenges of the Metaverse in the technical aspect.The work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
基金supported in part by the National Natural Science Foundation of China under grants 61771255in part by the Provincial and Ministerial Key Laboratory Open Project under grant 20190904in part by the Key Technologies R&D Program of Jiangsu (Prospective and Key Technologies for Industry)under Grants BE2022067,BE2022067-1 and BE2022067-2。
文摘High reliability applications in dense access scenarios have become one of the main goals of 6G environments.To solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)scheme.In this scheme,the preamble arrangement is combined with the access control.The preamble arrangement is realized by preamble slices which is from the virtual preamble pool.The access devices learn to queue orderly by deep reinforcement learning.The orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access time.The orderly queue is determined by interaction information among multiple agents.With the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of agents.Finally,the access performance of PSOQA is compared with other random contention schemes in different load scenarios.Simulation results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
基金supported in part by the National Natural Science Foundation of China under Grant 61941113,Grant 61971033,and Grant 61671057by the Henan Provincial Department of Science and Technology Project(No.212102210408)by the Henan Provincial Key Scientific Research Project(No.22A520041).
文摘5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular networks.However,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular networks.Moreover,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable requirement.In order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on blockchain.Firstly,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication security.Secondly,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving vehicles.Finally,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular networks.Performance analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
基金supported by National Science Foundation Project of P. R. China (No. 61501026, U1603116)
文摘In this paper, a Stackelberg differential game based approach is proposed to solve the bandwidth allocation problems in satellite communication network. All the satellites are divided into two groups, one has high download requirements, and the other one has low download requirements. Each satellites group has its own controller for bandwidth allocation, and can get payments from the satellites for the allocated resources. The relationships between the controllers and satellites are formed as a Stackelberg game. In our model, differential equation is introduced to describe the bandwidth dynamics for the whole satellite communication network. Combine the differential equation and Stackelberg game together, we can formulate the bandwidth allocation problems in satellite communication network as a Stackelber differential game. The solutions to the proposed game is solved based the Bellman dynamic equations. Numerical simulations are given to prove the effeteness and correctness of the proposed approach.
基金This work was supported by the National Natural Science Foundation of China under Grant 61872038,61811530335in part by the UK Royal Society-Newton Mobility Grant(No.IEC∖NSFC∖170067).
文摘In the Internet of Things(IoT),security and privacy issues of physical objects are crucial to the related applications.In order to clarify the complicated security and privacy issues,the life cycle of a physical object is divided into three stages of pre-working,in-working,and post-working.On this basis,a physical object-based security architecture for the IoT is put forward.According to the security architecture,security and privacy requirements and related protecting technologies for physical objects in different working stages are analyzed in detail.Considering the development of IoT technologies,potential security and privacy challenges that IoT objects may face in the pervasive computing environment are summarized.At the same time,possible directions for dealing with these challenges are also pointed out.
基金This work is funded by National Major Project(No.2017ZX03001021-005)National Key R&D Program of China(No.2017YFB1001600)+1 种基金Standard Development and Test bed Construction for Smart Factory Virtual Mapping Model and Digitized Delivery(No.MIIT 2019-00899-3-1)2018 Sugon Intelligent Factory on Advanced Computing Devices(No.MIIT 2018-265-137).
文摘Aiming for ultra-reliable low-latency wireless communications required in industrial internet of things(IIoT)applications,this paper studies a simple cognitive radio non-orthogonal multiple access(CR-NOMA)downlink system.This system consists of two secondary users(SUs)dynamically interfered by the primary user(PU),and its performance is characterized by the outage probability of the SU communications.This outage probability is calculated under two conditions where,a)the transmission of PU starts after the channel state information(CSI)is acquired,so the base station(BS)is oblivious of the interference,and b)when the BS is aware of the PU interference,and the NOMA transmission is adapted to the more comprehensive knowledge of the signal to interference plus noise ratio(SINR).These results are verified by simulations,and their good agreement suggests our calculations can be used to reduce the complexity of future analysis.We find the outage probability is reduced when the SUs move further away from the primary transmitter or when the signal from PU is less powerful,and the BS always has better performance when it is aware of the interference.The findings thus emphasize the importance of monitoring the channel quality and realtime feedback to optimize the performance of CR-NOMA system.
基金supported by the Fundamental Research Funds for Central Universities of China(No.FRF-GF-18-009B,No.FRF-BD-18-001A)the 111 Project(Grant No.B12012).
文摘The integration of the Internet of Vehicles(IoV)in future smart cities could help solve many traffic-related challenges,such as reducing traffic congestion and traffic accidents.Various congestion pricing and electric vehicle charging policies have been introduced in recent years.Nonetheless,the majority of these schemes emphasize penalizing the vehicles that opt to take the congested roads or charge in the crowded charging station and do not reward the vehicles that cooperate with the traffic management system.In this paper,we propose a novel dynamic traffic congestion pricing and electric vehicle charging management system for the internet of vehicles in an urban smart city environment.The proposed system rewards the drivers that opt to take alternative congested-free ways and congested-free charging stations.We propose a token management system that serves as a virtual currency,where the vehicles earn these tokens if they take alternative non-congested ways and charging stations and use the tokens to pay for the charging fees.The proposed system is designed for Vehicular Ad-hoc Networks(VANETs)in the context of a smart city environment without the need to set up any expensive toll collection stations.Through large-scale traffic simulation in different smart city scenarios,it is proved that the system can reduce the traffic congestion and the total charging time at the charging stations.
基金supported by theNational High-Tech R&D Program (863 Program) No. 2015AA01A705the National Natural Science Foundation of China under Grant No. 61572072+2 种基金the National Science and Technology Major Project No. 2015ZX03001041Fundamental Research Funds for the Central Universities No. FRF-TP-15-027A3Yunnan Provincial Department of Education Foundation Project (No. 2014Y087)
文摘A well-performed recommender system for an e-commerce web site can help customers easily find favorite items and then increase the turnover of merchants, hence it is important for both customers and merchants. In most of the existing recommender systems, only the purchase information is utilized data and the navigational and behavioral data are seldom concerned. In this paper, we design a novel recommender system for comprehensive online shopping sites. In the proposed recommender system, the navigational and behavioral data, such as access, click, read, and purchase information of a customer, are utilized to calculate the preference degree to each item; then items with larger preference degrees are recommended to the customer. The proposed method has several innovations and two of them are more remarkable: one is that nonexpendable items are distinguished from expendable ones and handled by a different way; another is that the interest shifting of customers are considered. Lastly, we structure an example to show the operation procedure and the performance of the proposed recommender system. The results show that the proposed recommender method with considering interest shifting is superior to Kim et al(2011) method and the method without considering interest shifting.
基金ACKNOWLEDGEMENT We gratefully acknowledge anonymous revie- wers who read drafts and made many helpful suggestions. This work was supported by the National Natural Science Foundation of China under Grant No. 61202079 the China Post- doctoral Science Foundation under Grant No. 2013M530526+2 种基金 the Foundation of Beijing En- gineering the Fundamental Research Funds for the Central Universities under Grant No. FRF-TP-13-015A and the Technology Centre for Convergence Networks and Ubiquitous Services.
文摘Internet of Things (IoT) refers to an infrastructure which enables the forms of com- munication and collaboration between people and things, and between things themselves. In order to improve its performance, we present a tradeoff between bandwidth and energy con- sumption in the loT in this paper. A service providing model is built to find the relation- ship between bandwidth and energy consump- tion using a cooperative differential game mo- del. The game solution is gotten in the condi- tion of grand coalition, feedback Nash equili- brium and intermediate coalitions and an allo- cation policy is obtain by Shapley theory. The results are shown as follows. Firstly, the per- formance of IoT decreases with the increasing of bandwidth cost or with the decreasing of en- ergy cost; secondly, all the nodes in the IoT com- posing a grand coalition can save bandwidth and energy consumption; thirdly, when the fac- tors of bandwidth cost and energy cost are eq- ual, the obtained number of provided services is an optimised value which is the trade-off between energy and bandwidth consumption.
基金the 863 project No.2014AA01A701,the National Natural Science Foundation of China,Program for New Century Excellent Talents in University,the open research fund of National Mobile Communications Research Laboratory Southeast University,the Research Foundation of China Mobile,and the Foundation of Beijing Engineering and Technology Center for Convergence Networks and Ubiquitous Services
文摘The ergodic information rate for Orthogonal Frequency-Division Multiplexing / Orthogonal Frequency-Division Multiple Access with amplify-and-forward (AF) relaying systems in the presence of frequency offsets is evaluated. Unlike previous work, per-subcarrier adaptive power allocation is performed on each relay to optimize the system ergodic information rate. For a given frequency offset and total number of relays M, the AF ergodic information rate is proven to be a monotonically increasing function of α (the ratio of the power allocated to the source node and the total transmit power), implying that the maximum ergodic information rate can be obtained at α=1 (i.e., there is no cooperative relay). Furthermore, the proof of "cooperative relays cannot improve the AF ergodic information rate in a quasi-static wireless channel" is also provided in this letter.
文摘Under model uncertainty and complex disturbance, the robust control strategy should be used in suspension control systems for various Maglev vehicles to obtain ride comfort of passengers. In this paper, the robust controllers are synthesized using μ approach for levitation system of electromagnetic Maglev vehicle and active suspension system of super conducting Maglev vehicle. The numerical simulations for different parameter perturbations and different disturbances are accomplished, and a comparison of μ control and H ∞ control is performed. The simulation results show that, both H ∞ control and μ control for two kinds of Maglev vehicles exhibit good stability robustness to plant model uncertainty, but μ control exhibits better performance robustness than H ∞ control, therefore better ride quality could be obtained by μ control.
基金This work is supported by Fundamental Research Funds for the Central Universities of China(328201911),C.G.(Chao Guo)the Open Project Program of National Engineering Laboratory for Agri-product Quality Traceability,C.G.(Chao Guo),Beijing Technology and Business University(BTBU)No.AQT-2018Y-B4,C.G.(Chao Guo)Higher Education Department of the Ministry of Education Industry-university Cooperative Education Project,C.G.(Chao Guo),and Education and Teaching Reform Project of Beijing Electronic and Technology Institute,C.G.(Chao Guo).
文摘Satellite networks have high requirements for security and data processing speed.In order to improve the reliability of the network,software-defined network(SDN)technology is introduced and a central controller is set in the network.Due to the characteristics of global perspective,control data separation,and centralized control of SDN,the idea of SDN is introduced to the design of the satellite network model.As a result,satellite nodes are only responsible for data transmission,while the maintenance of the links and the calculation of routes are implemented by the controller.For the massive LEO satellite network based on SDN,a state evaluation decision routing mechanism is proposed.The designed mechanism monitors the status of the entire network effectively and reduces the on-board load on the satellite network.The best routing decision is made under the comprehensive consideration of the current and historical status of each inter-satellite link between Low Earth Orbit(LEO)satellite network nodes.The calculation and storage requirements are controlled within a reasonable range.Based on the curve parameter transmission fuzzy encryption algorithm,a safe and reliable condition assessment decision routing mechanism(CADRM)is designed.It ensures that the personal information of the LEO satellite network can be transmitted safely and effectively.The experimental simulation results show the improvement of network throughput,the reduction of packet loss rate and the enhancing of network reliability.
基金supported by the Key the Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security)and Civil Aviation Joint Funds of the National Natural Science Foundation of China(Grant No.U1633121).
文摘Robot’s living space Human-robot relationship Robot humanization Hybrid intelligence Human-robot integrated society Robots,as the creation of humans,became an irreplaceable component in human society.With the advancement of technologies,robots have become more and more intelligent and have been widely used in many fields,such as disease diagnosis,customer services,healthcare for the older people,and so on.As robots made our lives much more convenient than ever before,they also brought many potential risks and challenges in technology,security,and ethic.To better understand the development of robots,we proposed a concept of a robot’s living space and analyzed the role of robots in our society.In this paper,we focus on setting a theoretical framework of the robot’s living space to further understand the human-robot relationship.The research in this paper contains three central aspects.First,we interpret the concept of the robot’s living space and the functions of each space.Second,we analyze and summarize the relative technologies which support robots living well in each space.Finally,we provide advice and improvement measures based on a discussion of potential problems caused by the developments of robots.With the trend of robots humanization and human-robot society integration,we should seriously consider how to collaborate with intelligent robots to achieve hybrid intelligence.To build a harmonious human-robot integrated society,studying the robot’s living space and its relationship with humans is the prerequisite and roadmap.
文摘Facial micro-expressions are short and imperceptible expressions that involuntarily reveal the true emotions that a person may be attempting to suppress,hide,disguise,or conceal.Such expressions can reflect a person's real emotions and have a wide range of application in public safety and clinical diagnosis.The analysis of facial micro-expressions in video sequences through computer vision is still relatively recent.In this research,a comprehensive review on the topic of spotting and recognition used in micro expression analysis databases and methods,is conducted,and advanced technologies in this area are summarized.In addition,we discuss challenges that remain unresolved alongside future work to be completed in the field of micro-expression analysis.
基金supported in part by the Research on the Application of Multimodal Artificial Intelligence in Diagnosis and Treatment of Type 2 Diabetes under Grant No.2020SK50910in part by the Hunan Provincial Natural Science Foundation of China under Grant 2023JJ60020.
文摘Early screening of diabetes retinopathy(DR)plays an important role in preventing irreversible blindness.Existing research has failed to fully explore effective DR lesion information in fundus maps.Besides,traditional attention schemes have not considered the impact of lesion type differences on grading,resulting in unreasonable extraction of important lesion features.Therefore,this paper proposes a DR diagnosis scheme that integrates a multi-level patch attention generator(MPAG)and a lesion localization module(LLM).Firstly,MPAGis used to predict patches of different sizes and generate a weighted attention map based on the prediction score and the types of lesions contained in the patches,fully considering the impact of lesion type differences on grading,solving the problem that the attention maps of lesions cannot be further refined and then adapted to the final DR diagnosis task.Secondly,the LLM generates a global attention map based on localization.Finally,the weighted attention map and global attention map are weighted with the fundus map to fully explore effective DR lesion information and increase the attention of the classification network to lesion details.This paper demonstrates the effectiveness of the proposed method through extensive experiments on the public DDR dataset,obtaining an accuracy of 0.8064.
基金supported by the Scientific Research Fund of Hunan Provincial Education Department(Grant No.21B0345)the Postgraduate Scientific Research Innovation Project of Changsha University of Science and Technology(Grant Nos.CX2021SS69 and CX2021SS72)+3 种基金the Postgraduate Scientific Research Innovation Project of Hunan Province,China(Grant No.CX20200884)the Natural Science Foundation of Hunan Province,China(Grant Nos.2019JJ50648,2020JJ4622,and 2020JJ4221)the National Natural Science Foundation of China(Grant No.62172058)the Special Funds for the Construction of Innovative Provinces of Hunan Province,China(Grant Nos.2020JK4046 and 2022SK2007)。
文摘A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation gradient.The MHNN is simulated and dynamically analyzed,and implemented on FPGA.Then,a new pseudo-random number generator(PRNG)based on MHNN is proposed.The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of PRNG.The experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming language.The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high performance.Finally,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).