In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network techno...In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network technology,effectively reduces carbon emissions in the transportation sector,improves energy utilization efficiency,and contributes to the green transportation system through intelligent transportation management and collaborative work between vehicles,making significant contributions.This article aims to explore the development of intelligent network-connected new energy vehicle technology and applications under the dual-carbon strategy and lay the foundation for the future development direction of the automotive industry.展开更多
With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no ...With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.展开更多
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent network...Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned model.In this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first time.We emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact form.We also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.展开更多
In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with...In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.展开更多
As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artifi...As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artificial intelligence(AI)and machine learning(ML)technologies have been introduced as a powerful solution.They empower wireless networks to operate autonomously,predictively,ondemand,and with smart functionality,offering a promising resolution to intricate optimization problems.This paper aims to delve into the prevalent applications of AI/ML technologies in the optimization of wireless networks.The paper not only provides insights into the current landscape but also outlines our vision for the future and considerations regarding the development of an intelligent 6G network.展开更多
This paper proposes an intelligent vehicle auxiliary handling system based on Internet of Things(IoT)technology,featuring an innovative holding mechanism design that adjusts to the length and width of various vehicles...This paper proposes an intelligent vehicle auxiliary handling system based on Internet of Things(IoT)technology,featuring an innovative holding mechanism design that adjusts to the length and width of various vehicles.The system combines precise positioning using satellite tracking technology,intelligent recognition via OpenCV,and the interconnectivity of IoT.This intelligent vehicle auxiliary handling system can independently identify vehicle positions and plan optimal handling paths,eliminating the traditional reliance on manual operation.It offers efficient and accurate handling,setting a new trend in the handling industry.Additionally,the system integrates seamlessly with parking lot management systems,providing real-time updates on vehicle locations and statuses.This allows managers to monitor the parking lot operations clearly and efficiently.This intelligent coordination greatly enhances overall work efficiency and streamlines parking management.Overall,the innovative design of the intelligent vehicle auxiliary handling system represents a significant breakthrough in both function and performance,gaining user favor with its smooth operation.Looking ahead,continued technological advancements and the expansion of application fields will bring even more vitality and intelligence to societal development.展开更多
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D...Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.展开更多
The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot ...The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection.展开更多
Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the ...Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.展开更多
Intelligent healthcare networks represent a significant component in digital applications,where the requirements hold within quality-of-service(QoS)reliability and safeguarding privacy.This paper addresses these requi...Intelligent healthcare networks represent a significant component in digital applications,where the requirements hold within quality-of-service(QoS)reliability and safeguarding privacy.This paper addresses these requirements through the integration of enabler paradigms,including federated learning(FL),cloud/edge computing,softwaredefined/virtualized networking infrastructure,and converged prediction algorithms.The study focuses on achieving reliability and efficiency in real-time prediction models,which depend on the interaction flows and network topology.In response to these challenges,we introduce a modified version of federated logistic regression(FLR)that takes into account convergence latencies and the accuracy of the final FL model within healthcare networks.To establish the FLR framework for mission-critical healthcare applications,we provide a comprehensive workflow in this paper,introducing framework setup,iterative round communications,and model evaluation/deployment.Our optimization process delves into the formulation of loss functions and gradients within the domain of federated optimization,which concludes with the generation of service experience batches for model deployment.To assess the practicality of our approach,we conducted experiments using a hypertension prediction model with data sourced from the 2019 annual dataset(Version 2.0.1)of the Korea Medical Panel Survey.Performance metrics,including end-to-end execution delays,model drop/delivery ratios,and final model accuracies,are captured and compared between the proposed FLR framework and other baseline schemes.Our study offers an FLR framework setup for the enhancement of real-time prediction modeling within intelligent healthcare networks,addressing the critical demands of QoS reliability and privacy preservation.展开更多
The dissertation studies the architecture of broadband intelligent network (BIN) and implementation of video conference based on ATM network and of multicast routing problem on video conference using BIN under the aid...The dissertation studies the architecture of broadband intelligent network (BIN) and implementation of video conference based on ATM network and of multicast routing problem on video conference using BIN under the aid of the important task Study of IN and B ISDN Integration (69896244) sponsored by National Natural Science Fund. A lot of points of view and solutions are present. The main contributions in the dissertation are as follows:\; (1) Design the new architecture of BIN and improve the architecture of BIN proposed by ITU T. It is easy to set up the connections of video conference using the new architecture of BIN.\; (2) Present the detailed scheme that BIN controls and implements video conference without specialized resource function, study the scheme of all the media on video conference transmitted and switched under the control of BIN, and discuss how to implement point to multipoint communications using BIN.\; (3) First present the scheme of implementing multicast routing algorithms on video conference using BIN.\; (4) Explicitly introduce a series of concepts including neighboring node, neighboring node set, neighboring edge, then propose an Adjustable Dynamic Multicast (ADM) routing algorithm which is suitable for video conference, analyze its performances, and prove the algorithm is appropriate and feasible.\; (5) Develop a degree constrained dynamic multicast (DADM) routing algorithm which can find less cost multicast routing tree. The results of simulation and experiments confirm that DADM algorithm can find the less cost multicast tree. Finally, analyze the relation between the size of degree constrained and value of multicast tree cost.\; (6) Present a delay constrained dynamic multicast routing algorithm suitable for video conference characteristic, and advise a series of schemes reducing the delay of transmitting all the media on videoconference.\; (7) First propose implementing the reliable multicast routing transport protocol using BIN, thereby ACK implosion problem can be solved. The protocol only requires finite memory and is scalable.展开更多
For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm...For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm, we use a leaky bucket controller in access module to filter user calls and set an appropriate finite buffer in SCF module for protection further. The results of analysis and simulation indicate that by making the call arrival rate to SCF module equal its service rate when SCP become overloaded, the call processing rate of SCP system can keep its optimal value.展开更多
In the past three years, the author has participated in several projects involved in Intelligent Network (IN). In 1997, we started our research on the project 'The Integration of IN and B ISDN' supported by N...In the past three years, the author has participated in several projects involved in Intelligent Network (IN). In 1997, we started our research on the project 'The Integration of IN and B ISDN' supported by National Science Foundation. Since 1999, the author has engaged in the project 'the Next Generation IN Based Service Platform Interworking with IP Networks' supported by the National 863 Project. While working on the project, the author made a deep research on the architecture and the key technology of the next generation IN defined by ITU T IN CS3 and CS4. In the following parts. 1. I conclude the research work and the innovation in my dissertation. The early research on the interworking of IN and Internet, despite the shortage of materials, the interworking architecture by means of IAF is analyzed. Some key techniques like triggering intelligent service and reporting dynamic IP address are solved. Some new SIBs and INAPs are added, and the dial up software of users is enhanced, too. The incoming call notification service is designed. What we have done paves the way for the future research. 2. The gateway based architecture for the interworking of IN and Internet is described. Considering the research results from ITU, PINT work group and TIPHON work group, we emphasize that the interworking scenario through MG,SCG and C/BG is promising. Based on the CIN software developed by ourselves, we provide the scenario to enhance the function entities and signaling protocol. We address the function of entities and the interaction of signaling with an example like ICW service. 3. With the introduction of mobile agent technology, the author proposes the distributed IN which can be integrated with IP networks. According to the drawbacks of the centralized IN, we address the architecture and conceptual model of distributed IN to support advanced service in IP Telephony. We try to illustrate the role and relationship between function entities. We also present a smooth evolution scenario from today's networks. 4. A novel service control software based on mobile agent technology is proposed. With the adiquately understanding of CIN 02 SCP, we present the OO based framework of MA SCP. And we explore how our new SCP works. We prove that our solution can work efficiently by a service called VPN in IP Telephony. 5. The concept, architecture and related research of active networks are introduced. We take the ticket order service as an example, give the simulation results and prove that active networks can improve the performance of distributed applications. We also compare active networks with mobile agent based IN. We highlight that the two techniques can complement each other and borrow lessons from the other one. 6. The architecture of Broadband IN is discussed. From the angles of architecture, access mode and software structure, a novel B IP that can support multimedia services such as VoD and B VPN is given. Moreover, B IP is introduced into VoD service. To improve the performance of VoD, we present a novel replacement algorithm with the multi layer decision with multi factors.展开更多
Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new n...Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper,an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given. The architectural model is to build the INM system to meet the need of managing modern network systems.展开更多
This paper reported the design and implementation of a bit rate adaptive Optical Electronic Optical(O/E/O)transponder accomplishing almost full data rate transparency up to 2.5 Gb/s with 3R(Reamplifying,Reshaping and ...This paper reported the design and implementation of a bit rate adaptive Optical Electronic Optical(O/E/O)transponder accomplishing almost full data rate transparency up to 2.5 Gb/s with 3R(Reamplifying,Reshaping and Retiming)processing in electronic domain.Based on the chipsets performing clock recovery in several continuous bit rate ranges,a clock and data regenerating circuit self adaptive to the bit rate of input signal was developed.Key design issues were presented,laying stress on the functional building blocks and scheme for the bit rate adaptive retiming circuit.The experimental results show a good scalability performance.展开更多
The factors, such as the network optimization or the network amelioration by fixed telecommunication network operators, the convergence of the Personal Handy-phone System (PHS) network and the Public Switched Telephon...The factors, such as the network optimization or the network amelioration by fixed telecommunication network operators, the convergence of the Personal Handy-phone System (PHS) network and the Public Switched Telephone Network (PSTN), the integration of PSTN and the Third Generation Mobile Communication (3G) Network, the broadband and multimedia based communication networks, causes the requirement for fixed network’s intelligentization. The Softswitch is a feasible approach to meet this kind of requirement. The solution to make the network comprehensively intelligent based on Softswitch is highly advantageous, which enriches communication services and promotes Fixed and Mobile Convergence (FMC).展开更多
Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and mo...Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.展开更多
Microwave transmission in a space network is greatly restricted due to precious radio spectrum resources. To meet the demand for large-bandwidth, global seamless coverage and on-demanding access, the Space All-Optical...Microwave transmission in a space network is greatly restricted due to precious radio spectrum resources. To meet the demand for large-bandwidth, global seamless coverage and on-demanding access, the Space All-Optical Network(SAON) becomes a promising paradigm. In this paper, the related space optical communications and network programs around the world are first briefly introduced. Then the intelligent Space All-Optical Network(i-SAON), which can be deemed as an advanced SAON, is illustrated, with the emphasis on its features of high survivability, sensing and reconfiguration intelligence, and large capacity for all optical load and switching. Moreover, some key technologies for i-SAON are described, including the rapid adjustment and control of the laser beam direction, the deep learning-based multi-path anti-fault routing, the intelligent multi-fault diagnosis and switching selection mechanism, and the artificial intelligence-based spectrum sensing and situational forecasting.展开更多
The All-pairs shortest path problem(ALL-SPP)aims to find the shortest path joining all the vertices in a given graph.This study proposed a new optimal method,Dhouib-matrix-ALL-SPP(DM-ALL-SPP)to solve the ALL-SPP based...The All-pairs shortest path problem(ALL-SPP)aims to find the shortest path joining all the vertices in a given graph.This study proposed a new optimal method,Dhouib-matrix-ALL-SPP(DM-ALL-SPP)to solve the ALL-SPP based on column-row navigation through the adjacency matrix.DM-ALL-SPP is designed to generate in a single execution the shortest path with details among all-pairs of vertices for a graph with positive and negative weighted edges.Even for graphs with a negative cycle,DM-ALL-SPP reported a negative cycle.In addition,DM-ALL-SPP continues to work for directed,undirected and mixed graphs.Furthermore,it is characterized by two phases:the first phase consists of adding by column repeated(n)iterations(where n is the number of vertices),and the second phase resides in adding by row executed in the worst case(n∗log(n))iterations.The first phase,focused on improving the elements of each column by adding their values to each row and modifying them with the smallest value.The second phase is emphasized by rows only for the elements modified in the first phase.Different instances from the literature were used to test the performance of the proposed DM-ALL-SPP method,which was developed using the Python programming language and the results were compared to those obtained by the Floyd-Warshall algorithm.展开更多
文摘In responding to the“dual carbon”strategy,intelligent networked new energy vehicle technology plays a crucial role.This type of vehicle combines the advantages of new energy technology and intelligent network technology,effectively reduces carbon emissions in the transportation sector,improves energy utilization efficiency,and contributes to the green transportation system through intelligent transportation management and collaborative work between vehicles,making significant contributions.This article aims to explore the development of intelligent network-connected new energy vehicle technology and applications under the dual-carbon strategy and lay the foundation for the future development direction of the automotive industry.
文摘With the rapid development of electronic communication technology,various new technical elements are constantly added to it,bringing many changes to people’s lives and work.The traditional data diversion mode can no longer truly meet the needs of actual work,and the electronic communication mode plays a huge role and occupies an important position in the communication market.Regarding how to develop and apply intelligent electronic communication technology more perfectly,there will be an overview of the specific principle of intelligent electronic communication technology,from the multi-faceted impact of electronic communication technology on human society.The article put forward the future development trend of electronic communication technology based on intelligent networks,emphasized expanding the scale of technology coverage,improved the comprehensive quality of technical products,optimized the structure of the communication industry,and formed a perfect industrial chain,so as to improve the intelligent level of electronic communication technology.
基金This work was supported in part by the National Natural Science Foundation of China under Grants 62002104 and 61872416the Natural Science Foundation of Hubei Province of China under Grant 2019CFB191the special fund for Wuhan Yellow Crane Talents(Excellent Young Scholar).
文摘Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human life.However,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned model.In this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first time.We emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact form.We also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.
基金supported by the Natural Science Foundation of Beijing Municipality under Grant L192034。
文摘In this paper,we develop a 6G wireless powered Internet of Things(IoT)system assisted by unmanned aerial vehicles(UAVs)to intelligently supply energy and collect data at the same time.In our dual-UAV scheme,UAV-E,with a constant power supply,transmits energy to charge the IoT devices on the ground,whereas UAV-B serves the IoT devices by data collection as a base station.In this framework,the system's energy efficiency is maximized,which we define as a ratio of the sum rate of IoT devices to the energy consumption of two UAVs during a fixed working duration.With the constraints of duration,transmit power,energy,and mobility,a difficult non-convex issue is presented by optimizing the trajectory,time duration allocation,and uplink transmit power of concurrently.To tackle the non-convex fractional optimization issue,we deconstruct it into three subproblems and we solve each of them iteratively using the descent method in conjunction with sequential convex approximation(SCA)approaches and the Dinkelbach algorithm.The simulation findings indicate that the suggested cooperative design has the potential to greatly increase the energy efficiency of the 6G intelligent UAV-assisted wireless powered IoT system when compared to previous benchmark systems.
基金supported in part by the National Natural Science Foundation of China under Grant No.62201266in part by the Natural Science Foundation of Jiangsu Province under Grant No.BK20210335.
文摘As the wireless communication network undergoes continuous expansion,the challenges associated with network management and optimization are becoming increasingly complex.To address these challenges,the emerging artificial intelligence(AI)and machine learning(ML)technologies have been introduced as a powerful solution.They empower wireless networks to operate autonomously,predictively,ondemand,and with smart functionality,offering a promising resolution to intricate optimization problems.This paper aims to delve into the prevalent applications of AI/ML technologies in the optimization of wireless networks.The paper not only provides insights into the current landscape but also outlines our vision for the future and considerations regarding the development of an intelligent 6G network.
文摘This paper proposes an intelligent vehicle auxiliary handling system based on Internet of Things(IoT)technology,featuring an innovative holding mechanism design that adjusts to the length and width of various vehicles.The system combines precise positioning using satellite tracking technology,intelligent recognition via OpenCV,and the interconnectivity of IoT.This intelligent vehicle auxiliary handling system can independently identify vehicle positions and plan optimal handling paths,eliminating the traditional reliance on manual operation.It offers efficient and accurate handling,setting a new trend in the handling industry.Additionally,the system integrates seamlessly with parking lot management systems,providing real-time updates on vehicle locations and statuses.This allows managers to monitor the parking lot operations clearly and efficiently.This intelligent coordination greatly enhances overall work efficiency and streamlines parking management.Overall,the innovative design of the intelligent vehicle auxiliary handling system represents a significant breakthrough in both function and performance,gaining user favor with its smooth operation.Looking ahead,continued technological advancements and the expansion of application fields will bring even more vitality and intelligence to societal development.
基金supported by National Key R&D Program of China under Grant 2021YFB3901302 and 2021YFB2900301the National Natural Science Foundation of China under Grant 62271037,62001519,62221001,and U21A20445+1 种基金the State Key Laboratory of Advanced Rail Autonomous Operation under Grant RCS2022ZZ004the Fundamental Research Funds for the Central Universities under Grant 2022JBQY004.
文摘Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.
基金supported in part by the Hainan Provincial Natural Science Foundation of China (No.620MS067)the Intelligent Medical Project of Chongqing Medical University (ZHYXQNRC202101)the Student Scientific Research and Innovation Experiment Project of the Medical Information College of Chongqing Medical University (No.2020C006).
文摘The field of healthcare is considered to be the most promising application of intelligent sensor networks.However,the security and privacy protection ofmedical images collected by intelligent sensor networks is a hot problem that has attracted more and more attention.Fortunately,digital watermarking provides an effective method to solve this problem.In order to improve the robustness of the medical image watermarking scheme,in this paper,we propose a novel zero-watermarking algorithm with the integer wavelet transform(IWT),Schur decomposition and image block energy.Specifically,we first use IWT to extract low-frequency information and divide them into non-overlapping blocks,then we decompose the sub-blocks by Schur decomposition.After that,the feature matrix is constructed according to the relationship between the image block energy and the whole image energy.At the same time,we encrypt watermarking with the logistic chaotic position scrambling.Finally,the zero-watermarking is obtained by XOR operation with the encrypted watermarking.Three indexes of peak signal-to-noise ratio,normalization coefficient(NC)and the bit error rate(BER)are used to evaluate the robustness of the algorithm.According to the experimental results,most of the NC values are around 0.9 under various attacks,while the BER values are very close to 0.These experimental results show that the proposed algorithm is more robust than the existing zero-watermarking methods,which indicates it is more suitable for medical image privacy and security protection.
基金supported by the China Postdoctoral Science Foundation (Grant No.2020M673687)。
文摘Intellectualization has been an inevitable trend in the information network,allowing the network to achieve the capabilities of self-learning,self-optimization,and self-evolution in the dynamic environment.Due to the strong adaptability to the environment,the cognitive theory methods from psychology gradually become an excellent approach to construct the intelligent information network(IIN),making the traditional definition of the intelligent information network no longer appropriate.Moreover,the thinking capability of existing IINs is always limited.This paper redefines the intelligent information network and illustrates the required properties of the architecture,core theory,and critical technologies by analyzing the existing intelligent information network.Besides,we innovatively propose a novel network cognition model with the network knowledge to implement the intelligent information network.The proposed model can perceive the overall environment data of the network and extract the knowledge from the data.As the model’s core,the knowledge guides the model to generate the optimal decisions adapting to the environmental changes.At last,we present the critical technologies needed to accomplish the proposed network cognition model.
基金supported by Institute of Information&Communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(No.RS2022-00167197Development of Intelligent 5G/6G Infrastructure Technology for the Smart City)+2 种基金in part by the National Research Foundation of Korea(NRF),Ministry of Education,through Basic Science Research Program under Grant NRF-2020R1I1A3066543in part by BK21 FOUR(Fostering Outstanding Universities for Research)under Grant 5199990914048in part by the Soonchunhyang University Research Fund.
文摘Intelligent healthcare networks represent a significant component in digital applications,where the requirements hold within quality-of-service(QoS)reliability and safeguarding privacy.This paper addresses these requirements through the integration of enabler paradigms,including federated learning(FL),cloud/edge computing,softwaredefined/virtualized networking infrastructure,and converged prediction algorithms.The study focuses on achieving reliability and efficiency in real-time prediction models,which depend on the interaction flows and network topology.In response to these challenges,we introduce a modified version of federated logistic regression(FLR)that takes into account convergence latencies and the accuracy of the final FL model within healthcare networks.To establish the FLR framework for mission-critical healthcare applications,we provide a comprehensive workflow in this paper,introducing framework setup,iterative round communications,and model evaluation/deployment.Our optimization process delves into the formulation of loss functions and gradients within the domain of federated optimization,which concludes with the generation of service experience batches for model deployment.To assess the practicality of our approach,we conducted experiments using a hypertension prediction model with data sourced from the 2019 annual dataset(Version 2.0.1)of the Korea Medical Panel Survey.Performance metrics,including end-to-end execution delays,model drop/delivery ratios,and final model accuracies,are captured and compared between the proposed FLR framework and other baseline schemes.Our study offers an FLR framework setup for the enhancement of real-time prediction modeling within intelligent healthcare networks,addressing the critical demands of QoS reliability and privacy preservation.
文摘The dissertation studies the architecture of broadband intelligent network (BIN) and implementation of video conference based on ATM network and of multicast routing problem on video conference using BIN under the aid of the important task Study of IN and B ISDN Integration (69896244) sponsored by National Natural Science Fund. A lot of points of view and solutions are present. The main contributions in the dissertation are as follows:\; (1) Design the new architecture of BIN and improve the architecture of BIN proposed by ITU T. It is easy to set up the connections of video conference using the new architecture of BIN.\; (2) Present the detailed scheme that BIN controls and implements video conference without specialized resource function, study the scheme of all the media on video conference transmitted and switched under the control of BIN, and discuss how to implement point to multipoint communications using BIN.\; (3) First present the scheme of implementing multicast routing algorithms on video conference using BIN.\; (4) Explicitly introduce a series of concepts including neighboring node, neighboring node set, neighboring edge, then propose an Adjustable Dynamic Multicast (ADM) routing algorithm which is suitable for video conference, analyze its performances, and prove the algorithm is appropriate and feasible.\; (5) Develop a degree constrained dynamic multicast (DADM) routing algorithm which can find less cost multicast routing tree. The results of simulation and experiments confirm that DADM algorithm can find the less cost multicast tree. Finally, analyze the relation between the size of degree constrained and value of multicast tree cost.\; (6) Present a delay constrained dynamic multicast routing algorithm suitable for video conference characteristic, and advise a series of schemes reducing the delay of transmitting all the media on videoconference.\; (7) First propose implementing the reliable multicast routing transport protocol using BIN, thereby ACK implosion problem can be solved. The protocol only requires finite memory and is scalable.
基金This workis supported by Specialized Research Fundfor the Doctoral Programof Higher Education(20030013006) ,and National Specialized R&DPro-ject for the Product of Mobile Communications.
文摘For there is no overload control signal between Service Switch Point and Service Control Point at CALEL 2 stage of mobile intelligent network, we provide an overload control algorithm realized in SCP. In the algorithm, we use a leaky bucket controller in access module to filter user calls and set an appropriate finite buffer in SCF module for protection further. The results of analysis and simulation indicate that by making the call arrival rate to SCF module equal its service rate when SCP become overloaded, the call processing rate of SCP system can keep its optimal value.
文摘In the past three years, the author has participated in several projects involved in Intelligent Network (IN). In 1997, we started our research on the project 'The Integration of IN and B ISDN' supported by National Science Foundation. Since 1999, the author has engaged in the project 'the Next Generation IN Based Service Platform Interworking with IP Networks' supported by the National 863 Project. While working on the project, the author made a deep research on the architecture and the key technology of the next generation IN defined by ITU T IN CS3 and CS4. In the following parts. 1. I conclude the research work and the innovation in my dissertation. The early research on the interworking of IN and Internet, despite the shortage of materials, the interworking architecture by means of IAF is analyzed. Some key techniques like triggering intelligent service and reporting dynamic IP address are solved. Some new SIBs and INAPs are added, and the dial up software of users is enhanced, too. The incoming call notification service is designed. What we have done paves the way for the future research. 2. The gateway based architecture for the interworking of IN and Internet is described. Considering the research results from ITU, PINT work group and TIPHON work group, we emphasize that the interworking scenario through MG,SCG and C/BG is promising. Based on the CIN software developed by ourselves, we provide the scenario to enhance the function entities and signaling protocol. We address the function of entities and the interaction of signaling with an example like ICW service. 3. With the introduction of mobile agent technology, the author proposes the distributed IN which can be integrated with IP networks. According to the drawbacks of the centralized IN, we address the architecture and conceptual model of distributed IN to support advanced service in IP Telephony. We try to illustrate the role and relationship between function entities. We also present a smooth evolution scenario from today's networks. 4. A novel service control software based on mobile agent technology is proposed. With the adiquately understanding of CIN 02 SCP, we present the OO based framework of MA SCP. And we explore how our new SCP works. We prove that our solution can work efficiently by a service called VPN in IP Telephony. 5. The concept, architecture and related research of active networks are introduced. We take the ticket order service as an example, give the simulation results and prove that active networks can improve the performance of distributed applications. We also compare active networks with mobile agent based IN. We highlight that the two techniques can complement each other and borrow lessons from the other one. 6. The architecture of Broadband IN is discussed. From the angles of architecture, access mode and software structure, a novel B IP that can support multimedia services such as VoD and B VPN is given. Moreover, B IP is introduced into VoD service. To improve the performance of VoD, we present a novel replacement algorithm with the multi layer decision with multi factors.
基金Jiangsu Provincial Natural Science Foundation of ChinaNational "863"High-Tech Programme National "973" Fundamental Rese
文摘Traditional network management approach involves the management of each vendor's equipment and network segment in isolation through its own proprietary element management system. It is necessary to set up a new network management architecture that calls for operation consolidation across vendor and technology boundaries. In this paper,an architectural model for Intelligent Network Management (INM) is presented. The INM system includes a manager system, which controls all subsystems and coordinates different management tasks; an expert system, which is responsible for handling particularly difficult problems, and intelligent agents, which bring the management closer to applications and user requirements by spreading intelligent agents through network segments or domain. In the expert system model proposed, especially an intelligent fault management system is given. The architectural model is to build the INM system to meet the need of managing modern network systems.
基金National High Project Fund(863)(No.2001AA121073)
文摘This paper reported the design and implementation of a bit rate adaptive Optical Electronic Optical(O/E/O)transponder accomplishing almost full data rate transparency up to 2.5 Gb/s with 3R(Reamplifying,Reshaping and Retiming)processing in electronic domain.Based on the chipsets performing clock recovery in several continuous bit rate ranges,a clock and data regenerating circuit self adaptive to the bit rate of input signal was developed.Key design issues were presented,laying stress on the functional building blocks and scheme for the bit rate adaptive retiming circuit.The experimental results show a good scalability performance.
文摘The factors, such as the network optimization or the network amelioration by fixed telecommunication network operators, the convergence of the Personal Handy-phone System (PHS) network and the Public Switched Telephone Network (PSTN), the integration of PSTN and the Third Generation Mobile Communication (3G) Network, the broadband and multimedia based communication networks, causes the requirement for fixed network’s intelligentization. The Softswitch is a feasible approach to meet this kind of requirement. The solution to make the network comprehensively intelligent based on Softswitch is highly advantageous, which enriches communication services and promotes Fixed and Mobile Convergence (FMC).
基金This work is supported by National Natural Science Foundation of China(Grant:62272109).
文摘Target signal acquisition and detection based on sonar images is a challenging task due to the complex underwater environment.In order to solve the problem that some semantic information in sonar images is lost and model detection performance is degraded due to the complex imaging environment,we proposed a more effective and robust target detection framework based on deep learning,which can make full use of the acoustic shadow information in the forward-looking sonar images to assist underwater target detection.Firstly,the weighted box fusion method is adopted to generate a fusion box by weighted fusion of prediction boxes with high confidence,so as to obtain accurate acoustic shadow boxes.Further,the acoustic shadow box is cut down to get the feature map containing the acoustic shadow information,and then the acoustic shadow feature map and the target information feature map are adaptively fused to make full use of the acoustic shadow feature information.In addition,we introduce a threshold processing module to improve the attention of the model to important feature information.Through the underwater sonar dataset provided by Pengcheng Laboratory,the proposed method improved the average accuracy by 3.14%at the IoU threshold of 0.7,which is better than the current traditional target detection model.
基金supported by CAST Fund for Distinguished Young TalentsCASC Scientific and Technological Innovative Research and Design Projects
文摘Microwave transmission in a space network is greatly restricted due to precious radio spectrum resources. To meet the demand for large-bandwidth, global seamless coverage and on-demanding access, the Space All-Optical Network(SAON) becomes a promising paradigm. In this paper, the related space optical communications and network programs around the world are first briefly introduced. Then the intelligent Space All-Optical Network(i-SAON), which can be deemed as an advanced SAON, is illustrated, with the emphasis on its features of high survivability, sensing and reconfiguration intelligence, and large capacity for all optical load and switching. Moreover, some key technologies for i-SAON are described, including the rapid adjustment and control of the laser beam direction, the deep learning-based multi-path anti-fault routing, the intelligent multi-fault diagnosis and switching selection mechanism, and the artificial intelligence-based spectrum sensing and situational forecasting.
文摘The All-pairs shortest path problem(ALL-SPP)aims to find the shortest path joining all the vertices in a given graph.This study proposed a new optimal method,Dhouib-matrix-ALL-SPP(DM-ALL-SPP)to solve the ALL-SPP based on column-row navigation through the adjacency matrix.DM-ALL-SPP is designed to generate in a single execution the shortest path with details among all-pairs of vertices for a graph with positive and negative weighted edges.Even for graphs with a negative cycle,DM-ALL-SPP reported a negative cycle.In addition,DM-ALL-SPP continues to work for directed,undirected and mixed graphs.Furthermore,it is characterized by two phases:the first phase consists of adding by column repeated(n)iterations(where n is the number of vertices),and the second phase resides in adding by row executed in the worst case(n∗log(n))iterations.The first phase,focused on improving the elements of each column by adding their values to each row and modifying them with the smallest value.The second phase is emphasized by rows only for the elements modified in the first phase.Different instances from the literature were used to test the performance of the proposed DM-ALL-SPP method,which was developed using the Python programming language and the results were compared to those obtained by the Floyd-Warshall algorithm.