期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on Metaverse Security and Forensics
1
作者 Guangjun Liang Jianfang Xin +3 位作者 Qun Wang xueli ni Xiangmin Guo Pu Chen 《Computers, Materials & Continua》 SCIE EI 2023年第10期799-825,共27页
As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment circles.However,while the metaverse brings ... As a subversive concept,the metaverse has recently attracted widespread attention around the world and has set off a wave of enthusiasm in academic,industrial,and investment circles.However,while the metaverse brings unprecedented opportunities for transformation to human society,it also contains related risks.Metaverse is a digital living space with information infrastructure,interoperability system,content production system,and value settlement system as the underlying structure in which the inner core is to connect real residents through applications and identities.Through social incentives and governance rules,the metaverse reflects the digital migration of human society.This article will conduct an in-depth analysis of the metaverse from the perspective of electronic data forensics.First,from the perspective of Internet development,the background and development process of the metaverse is discussed.By systematically elaborating on the concept and connotation of the metaverse,this paper summarizes the different views of current practitioners,experts,and scholars on the metaverse.Secondly,from the perspective of metaverse security,the social risk and crime risks of the metaverse are discussed.Then the importance of metaverse forensics is raised.Third,from the perspective of blockchain,smart wearable devices,and virtual reality devices,the objects and characteristics of metaverse forensics have been studied in depth.Taking smart wearable devices as an example,this paper gives the relevant experimental process of smart bracelet forensics.Finally,many challenges faced by metaverse forensics are summarized by us which provide readers with some exploratory guidance. 展开更多
关键词 Metaverse FORENSICS blockchain smart wear virtual reality
下载PDF
Analysis on D2D Heterogeneous Networks with State-Dependent Priority Traffic
2
作者 Guangjun Liang Jianfang Xin +2 位作者 Linging Xia xueli ni Yi Cao 《Computers, Materials & Continua》 SCIE EI 2023年第2期2981-2998,共18页
In this work,we consider the performance analysis of state dependent priority traffic and scheduling in device to device(D2D)heterogeneous networks.There are two priority transmission types of data in wireless communi... In this work,we consider the performance analysis of state dependent priority traffic and scheduling in device to device(D2D)heterogeneous networks.There are two priority transmission types of data in wireless communication,such as video or telephone,which always meet the requirements of high priority(HP)data transmission first.If there is a large amount of low priority(LP)data,there will be a large amount of LP data that cannot be sent.This situation will cause excessive delay of LP data and packet dropping probability.In order to solve this problem,the data transmission process of high priority queue and low priority queue is studied.Considering the priority jump strategy to the priority queuing model,the queuing process with two priority data is modeled as a two-dimensionalMarkov chain.A state dependent priority jump queuing strategy is proposed,which can improve the discarding performance of low priority data.The quasi birth and death process method(QBD)and fixed point iterationmethod are used to solve the causality,and the steady-state probability distribution is further obtained.Then,performance parameters such as average queue length,average throughput,average delay and packet dropping probability for both high and low priority data can be expressed.The simulation results verify the correctness of the theoretical derivation.Meanwhile,the proposed priority jump queuing strategy can significantly improve the drop performance of low-priority data. 展开更多
关键词 Stochastic geometry queuing theory D2D heterogeneous networks quasi-birth and death process
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部