期刊文献+
共找到8,060篇文章
< 1 2 250 >
每页显示 20 50 100
Efficient Digital Twin Placement for Blockchain-Empowered Wireless Computing Power Network
1
作者 Wei Wu Liang Yu +2 位作者 Liping Yang Yadong Zhang Peng Wang 《Computers, Materials & Continua》 SCIE EI 2024年第7期587-603,共17页
As an open network architecture,Wireless Computing PowerNetworks(WCPN)pose newchallenges for achieving efficient and secure resource management in networks,because of issues such as insecure communication channels and... As an open network architecture,Wireless Computing PowerNetworks(WCPN)pose newchallenges for achieving efficient and secure resource management in networks,because of issues such as insecure communication channels and untrusted device terminals.Blockchain,as a shared,immutable distributed ledger,provides a secure resource management solution for WCPN.However,integrating blockchain into WCPN faces challenges like device heterogeneity,monitoring communication states,and dynamic network nature.Whereas Digital Twins(DT)can accurately maintain digital models of physical entities through real-time data updates and self-learning,enabling continuous optimization of WCPN,improving synchronization performance,ensuring real-time accuracy,and supporting smooth operation of WCPN services.In this paper,we propose a DT for blockchain-empowered WCPN architecture that guarantees real-time data transmission between physical entities and digital models.We adopt an enumeration-based optimal placement algorithm(EOPA)and an improved simulated annealing-based near-optimal placement algorithm(ISAPA)to achieve minimum average DT synchronization latency under the constraint of DT error.Numerical results show that the proposed solution in this paper outperforms benchmarks in terms of average synchronization latency. 展开更多
关键词 Wireless computing power network blockchain digital twin placement minimum synchronization latency
下载PDF
Game theory in network security for digital twins in industry
2
作者 Hailin Feng Dongliang Chen +1 位作者 Haibin Lv Zhihan Lv 《Digital Communications and Networks》 SCIE CSCD 2024年第4期1068-1078,共11页
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ... To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry. 展开更多
关键词 digital twins Industrial internet of things network security Game theory Attack and defense
下载PDF
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
3
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 Coverage of Mobile networks and Internet digital Divide Rural and Isolated Areas Antenna Connectivity and digital Inclusion
下载PDF
Research on College Network Information Security Protection in the Digital Economy Era
4
作者 Libin Zhang 《Proceedings of Business and Economic Studies》 2024年第2期132-137,共6页
In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the p... In the era of the digital economy,the informatization degree of various industries is getting deeper and deeper,and network information security has also come into people’s eyes.Colleges and universities are in the position of training applied talents,because of the needs of teaching and education,as well as the requirements of teaching reform,the information construction of colleges and universities has been gradually improved,but the problem of network information security is also worth causing people to ponder.The low security of the network environment will cause college network information security leaks,and even hackers will attack the official website of the university and leak the personal information of teachers and students.To solve such problems,this paper studies the protection of college network information security against the background of the digital economy era.This paper first analyzes the significance of network information security protection,then points out the current and moral problems,and finally puts forward specific countermeasures,hoping to create a safe learning environment for teachers and students for reference. 展开更多
关键词 digital economy Universities and colleges network information security Protection status COUNTERMEASURES
下载PDF
A digital twin framework for efficient electric power restoration and resilient recovery in the aftermath of hurricanes considering the interdependencies with road network and essential facilities
5
作者 Abdullah M.Braik Maria Koliou 《Resilient Cities and Structures》 2024年第3期79-91,共13页
The community’s resilience in the face of natural hazards relies heavily on the rapid and efficient restoration of electric power networks,which plays a critical role in emergency response,economic recovery,and the f... The community’s resilience in the face of natural hazards relies heavily on the rapid and efficient restoration of electric power networks,which plays a critical role in emergency response,economic recovery,and the func-tionality of essential lifeline and social infrastructure systems.Leveraging the recent data revolution,the digital twin(DT)concept emerges as a promising tool to enhance the effectiveness of post-disaster recovery efforts.This paper introduces a novel framework for post-hurricane electric power restoration using a hybrid DT approach that combines physics-based and data-driven models by utilizing a dynamic Bayesian network.By capturing the complexities of power system dynamics and incorporating the road network’s influence,the framework offers a comprehensive methodology to guide real-time power restoration efforts in post-disaster scenarios.A discrete event simulation is conducted to demonstrate the proposed framework’s efficacy.The study showcases how the electric power restoration DT can be monitored and updated in real-time,reflecting changing conditions and facilitating adaptive decision-making.Furthermore,it demonstrates the framework’s flexibility to allow decision-makers to prioritize essential,residential,and business facilities and compare different restoration plans and their potential effect on the community. 展开更多
关键词 Community resilience digital twin Disaster recovery strategies Electric power restoration Hurricanes Road network
下载PDF
Digital watermarking algorithm based on neural network in multiwavelet domain 被引量:2
6
作者 王振飞 宋胜利 《Journal of Southeast University(English Edition)》 EI CAS 2007年第2期211-215,共5页
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ... A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image. 展开更多
关键词 digital watermarking neural networks multiwavelet transform
下载PDF
Wireless location algorithm using digital broadcasting signals based on neural network 被引量:1
7
作者 柯炜 吴乐南 殷奎喜 《Journal of Southeast University(English Edition)》 EI CAS 2010年第3期394-398,共5页
In order to enhance the accuracy and reliability of wireless location under non-line-of-sight (NLOS) environments,a novel neural network (NN) location approach using the digital broadcasting signals is presented. ... In order to enhance the accuracy and reliability of wireless location under non-line-of-sight (NLOS) environments,a novel neural network (NN) location approach using the digital broadcasting signals is presented. By the learning ability of the NN and the closely approximate unknown function to any degree of desired accuracy,the input-output mapping relationship between coordinates and the measurement data of time of arrival (TOA) and time difference of arrival (TDOA) is established. A real-time learning algorithm based on the extended Kalman filter (EKF) is used to train the multilayer perceptron (MLP) network by treating the linkweights of a network as the states of the nonlinear dynamic system. Since the EKF-based learning algorithm approximately gives the minimum variance estimate of the linkweights,the convergence is improved in comparison with the backwards error propagation (BP) algorithm. Numerical results illustrate thatthe proposedalgorithmcanachieve enhanced accuracy,and the performance ofthe algorithmis betterthanthat of the BP-based NN algorithm and the least squares (LS) algorithm in the NLOS environments. Moreover,this location method does not depend on a particular distribution of the NLOS error and does not need line-of-sight ( LOS ) or NLOS identification. 展开更多
关键词 digital broadcasting signals neural network extended Kalman filter (EKF) backwards error propagation algorithm multilayer perceptron
下载PDF
Digital Watermarking Algorithm Based on Wavelet Transform and Neural Network 被引量:4
8
作者 WANG Zhenfei ZHAI Guangqun WANG Nengchao 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1667-1670,共4页
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a... An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm. 展开更多
关键词 digital watermarking neural networks wavelet transform human visual system
下载PDF
A Novel Digital Image Watermarking Scheme on Copyright Protection Based on Network Manufacture Environment 被引量:2
9
作者 LIU Quan WANG Jin (School of Information Engineering,Wuhan University of Technology,Wuhan 430070,China 《武汉理工大学学报》 CAS CSCD 北大核心 2006年第S2期552-556,共5页
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th... In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on. 展开更多
关键词 network manufacture COPYRIGHT protection digital WATERMARKING wavelet transform error CORRECTING coding chaotic ENCRYPTION
下载PDF
Generative Adversarial Networks Based Digital Twin Channel Modeling for Intelligent Communication Networks 被引量:3
10
作者 Yuxin Zhang Ruisi He +5 位作者 Bo Ai Mi Yang Ruifeng Chen Chenlong Wang Zhengyu Zhang Zhangdui Zhong 《China Communications》 SCIE CSCD 2023年第8期32-43,共12页
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D... Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking. 展开更多
关键词 digital twin channel modeling generative adversarial networks intelligent communication networking
下载PDF
Optimal design study of high order FIR digital filters based on neural network algorithm 被引量:2
11
作者 Wang Xiaohua & He YigangCollege of Electrical and Information Engineering, Hunan University, Changsha 410082, P. R. China College of Electrical and Information Engineering, Changsha University of Science and Technology,Changsha 410077, P. R. China 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2004年第2期115-119,130,共6页
An optimal design approach of high order FIR digital filter is developed based on the algorithm of neural networks with cosine basis function . The main idea is to minimize the sum of the square errors between the amp... An optimal design approach of high order FIR digital filter is developed based on the algorithm of neural networks with cosine basis function . The main idea is to minimize the sum of the square errors between the amplitude response of the desired FIR filter and that of the designed by training the weights of neural networks, then obtains the impulse response of FIR digital filter . The convergence theorem of the neural networks algorithm is presented and proved, and the optimal design method is introduced by designing four kinds of FIR digital filters , i.e., low-pass, high-pass, bandpass , and band-stop FIR digital filter. The results of the amplitude responses show that attenuation in stop-bands is more than 60 dB with no ripple and pulse existing in pass-bands, and cutoff frequency of passband and stop-band is easily controlled precisely .The presented optimal design approach of high order FIR digital filter is significantly effective. 展开更多
关键词 high order FIR digital filters amplitude-frequency response neural network convergence theorem optimal design.
下载PDF
Optimal decision-making method for equipment maintenance to enhance the resilience of power digital twin system under extreme disaster
12
作者 Song Gao Wei Wang +2 位作者 Jingyi Chen Xinyu Wu Junyan Shao 《Global Energy Interconnection》 EI CSCD 2024年第3期336-346,共11页
Digital twins and the physical assets of electric power systems face the potential risk of data loss and monitoring failures owing to catastrophic events,causing surveillance and energy loss.This study aims to refine ... Digital twins and the physical assets of electric power systems face the potential risk of data loss and monitoring failures owing to catastrophic events,causing surveillance and energy loss.This study aims to refine maintenance strategies for the monitoring of an electric power digital twin system post disasters.Initially,the research delineates the physical electric power system along with its digital counterpart and post-disaster restoration processes.Subsequently,it delves into communication and data processing mechanisms,specifically focusing on central data processing(CDP),communication routers(CRs),and phasor measurement units(PMUs),to re-establish an equipment recovery model based on these data transmission methodologies.Furthermore,it introduces a mathematical optimization model designed to enhance the digital twin system’s post-disaster monitoring efficacy by employing the branch-and-bound method for its resolution.The efficacy of the proposed model was corroborated by analyzing an IEEE-14 system.The findings suggest that the proposed branch-and-bound algorithm significantly augments the observational capabilities of a power system with limited resources,thereby bolstering its stability and emergency response mechanisms. 展开更多
关键词 Phasor measurement units Through-sequence optimization Resilience enhancement Communication networks digital twins
下载PDF
Design of twodimensional digital filters using neural networks 被引量:1
13
作者 Wang Xiaohua He Yigang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第4期767-771,共5页
A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear ph... A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear phase FIR filter is derived based on its frequency response characteristic, and the NNA, based on minimizing the square-error in the frequency-domain, is established according to the compact expression. To illustrate the stability of the NNA, the convergence theorem is presented and proved. Design examples are also given, and the results show that the ripple is considerably small in passband and stopband, and the NNA-based method is of powerful stability and requires quite little amount of computations. 展开更多
关键词 2-D linear-phase FIR digital filters neural network convergence theorem stability.
下载PDF
Quality-Aware Massive Content Delivery in Digital Twin-Enabled Edge Networks 被引量:1
14
作者 Yun Gao Junqi Liao +1 位作者 Xin Wei Liang Zhou 《China Communications》 SCIE CSCD 2023年第2期1-13,共13页
Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and... Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery. 展开更多
关键词 content delivery digital twin edge networks QoD QOE
下载PDF
Home Network and Digital Rights Management Technology 被引量:2
15
作者 Yang Cheng 1Wang Yongbin 2Yang Yixian 3(1. Information Engineering School, Communication University of China, Beijing 100024, China 2. Computer and Software School, Communication University of China, Beijing 100024, China 3. Information Security Center, Beijing University of Posts and Telecommunications, Beijing 100876, China) 《ZTE Communications》 2006年第4期12-18,共7页
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom... The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description. 展开更多
关键词 HDCP Home network and digital Rights Management Technology ZTE ISDB ATSC
下载PDF
Hyper-Tuned Convolutional Neural Networks for Authorship Verification in Digital Forensic Investigations 被引量:1
16
作者 Asif Rahim Yanru Zhong +2 位作者 Tariq Ahmad Sadique Ahmad Mohammed A.ElAffendi 《Computers, Materials & Continua》 SCIE EI 2023年第8期1947-1976,共30页
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)h... Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)have shown promise in solving this problem,but their performance highly depends on the choice of hyperparameters.In this paper,we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification.We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms:Adaptive Moment Estimation(ADAM),StochasticGradientDescent(SGD),andRoot Mean Squared Propagation(RMSPROP).The model is trained and tested on a dataset of text samples collected from various authors,and the performance is evaluated using accuracy,precision,recall,and F1 score.We compare the performance of the three optimization algorithms and demonstrate the effectiveness of hyperparameter tuning in improving the accuracy of the CNN model.Our results show that the Hyper Tuned CNN model with ADAM Optimizer achieves the highest accuracy of up to 90%.Furthermore,we demonstrate that hyperparameter tuning can help achieve significant performance improvements,even using a relatively simple model architecture like CNNs.Our findings suggest that the choice of the optimization algorithm is a crucial factor in the performance of CNNs for authorship verification and that hyperparameter tuning can be an effective way to optimize this choice.Overall,this paper demonstrates the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification in digital forensic investigations.Our findings have important implications for developing accurate and reliable authorship verification systems,which are crucial for various applications in digital forensics,such as identifying the author of anonymous threatening messages or detecting cases of plagiarism. 展开更多
关键词 Convolutional Neural network(CNN) hyper-tuning authorship verification digital forensics
下载PDF
Digital Literacy in the Rural Environment of Rivers State, Nigeria
17
作者 Priye E.Iyalla-Amadi 《Sino-US English Teaching》 2024年第2期83-88,共6页
While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include mo... While literacy can generally be defined as the basic ability to read,write,and also count,digital literacy can be described as the ability to perform all these tasks using electronic means.These means would include modern electronic gadgets,such as mobile phones,tablets,computers,kindle books,and the like.To be digitally literate would therefore require the existence of modern technologies such as internet facilities that would make it possible to access online reading and writing.The rural environment,particularly in developing areas,is usually characterised by a seeming lack of modern amenities and even worse,digital internet networks.Yet,those who live in the rural areas of Rivers State belong to the modern digital era and deserve to be digitally literate.This paper examines the prerequisites for digital literacy and explores how these can be achieved for citizens who inhabit the rural areas of an industrially-nascent state like Rivers State. 展开更多
关键词 digital literacy electronic means internet networks rural areas
下载PDF
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
18
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
下载PDF
Investigation on Analog and Digital Modulations Recognition Using Machine Learning Algorithms
19
作者 Jean Ndoumbe Ivan Basile Kabeina +1 位作者 Gaelle Patricia Talotsing Soubiel-Noël Nkomo Biloo 《World Journal of Engineering and Technology》 2024年第4期867-884,共18页
In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to m... In the field of radiocommunication, modulation type identification is one of the most important characteristics in signal processing. This study aims to implement a modulation recognition system on two approaches to machine learning techniques, the K-Nearest Neighbors (KNN) and Artificial Neural Networks (ANN). From a statistical and spectral analysis of signals, nine key differentiation features are extracted and used as input vectors for each trained model. The feature extraction is performed by using the Hilbert transform, the forward and inverse Fourier transforms. The experiments with the AMC Master dataset classify ten (10) types of analog and digital modulations. AM_DSB_FC, AM_DSB_SC, AM_USB, AM_LSB, FM, MPSK, 2PSK, MASK, 2ASK, MQAM are put forward in this article. For the simulation of the chosen model, signals are polluted by the Additive White Gaussian Noise (AWGN). The simulation results show that the best identification rate is the MLP neuronal method with 90.5% of accuracy after 10 dB signal-to-noise ratio value, with a shift of more than 15% from the k-nearest neighbors’ algorithm. 展开更多
关键词 Automatic Recognition Artificial Neural networks K-Nearest Neighbors Machine Learning Analog Modulations digital Modulations
下载PDF
Low Complexity Digital Pre-Distortion (DPD) for Multi-Band Radio over Fiber Transmission Systems
20
作者 Zijian Cheng Xiupu Zhang 《Journal of Computer and Communications》 2024年第11期241-262,共22页
Nonlinear distortion is one of key limiting factors in radio over fiber (RoF) transmission systems. To suppress the nonlinear distortion, digital pre-distortion (DPD) has been investigated considerably. However, for m... Nonlinear distortion is one of key limiting factors in radio over fiber (RoF) transmission systems. To suppress the nonlinear distortion, digital pre-distortion (DPD) has been investigated considerably. However, for multi-band signals, DPD becomes very complex, which limits the applications. To reduce the complexity, many simplified DPDs have been proposed. In this work, a new multidimensional DPD is proposed, in which in-band and out-of-band distortion are separated and the out-of-band distortion is evaluated by sum and differences of all input signals instead of all individual input signals, thus complexity is reduced. An up to 6-band 64-QAM orthogonal frequency division multiplexing (OFDM) signal with each bandwidth of 200 MHz in simulations and a 5-band 20 MHz 64-QAM OFDM signal in experiments are used to validate the pro-posed DPD. The validation is illustrated in the means of power spectrum, AM/AM and AM/PM distortion, and error vector magnitude (EVM) of the received signal constellations. The average EVM improvement by simulation for 3-band, 4-band, 5-band and 6-band signals is 19.97 dB, 18.65 dB, 16.64 dB and 15.44 dB, respectively. The average EVM improvement by experiments for 5-band signals is 8.1 dB. Considering the ten times of bandwidth difference, experiments and simulation agree well. 展开更多
关键词 Multidimensional digital Predistortion (DPD) Memorial Polynomial (MP) Power Amplifier (PA) Radio over Fiber Fronthaul networks 5G
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部