This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding type...This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction.展开更多
By analyzing and comparing the current application status and advantages and disadvantages of domestic and foreign artificial material mechanical equipment classification coding systems,and conducting a comparative st...By analyzing and comparing the current application status and advantages and disadvantages of domestic and foreign artificial material mechanical equipment classification coding systems,and conducting a comparative study of the existing coding system standards in different regions of the country,a coding data model suitable for big data research needs is proposed based on the current national standard for artificial material mechanical equipment classification coding.This model achieves a horizontal connection of characteristics and a vertical penetration of attribute values for construction materials and machinery through forward automatic coding calculation and reverse automatic decoding.This coding scheme and calculation model can also establish a database file for the coding and unit price of construction materials and machinery,forming a complete big data model for construction material coding unit prices.This provides foundational support for calculating and analyzing big data related to construction material unit prices,real-time information prices,market prices,and various comprehensive prices,thus contributing to the formation of cost-related big data.展开更多
Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networ...Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.展开更多
Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information w...Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.展开更多
Sparse vector coding(SVC)is emerging as a potential technology for short packet communications.To further improve the block error rate(BLER)performance,a uniquely decomposable constellation group-based SVC(UDCG-SVC)is...Sparse vector coding(SVC)is emerging as a potential technology for short packet communications.To further improve the block error rate(BLER)performance,a uniquely decomposable constellation group-based SVC(UDCG-SVC)is proposed in this article.Additionally,in order to achieve an optimal BLER performance of UDCG-SVC,a problem to optimize the coding gain of UDCG-based superimposed constellation is formulated.Given the energy of rotation constellations in UDCG,this problem is solved by converting it into finding the maximized minimum Euclidean distance of the superimposed constellation.Simulation results demonstrate the validness of our derivation.We also find that the proposed UDCGSVC has better BLER performance compared to other SVC schemes,especially under the high order modulation scenarios.展开更多
Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately ...Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.展开更多
In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative ac...In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.展开更多
With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communi...With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communication system field.This paper focuses on using edge computing based on 5G communication in information and communication systems.First,the study analyzes the importance of combining edge computing technology with 5G communication technology,and its advantages,such as high efficiency and low latency in processing large amounts of data.The study then explores multiple application scenarios of edge computing in information and communication systems,such as integrated use in the Internet of Things,intelligent transportation,telemedicine and Industry 4.0.The research method is mainly based on theoretical analysis and experimental verification,combined with the characteristics of the 5G network to optimize the edge computing model and test the performance of edge computing in different scenarios through experimental simulation.The results show that edge computing significantly improves the data processing capacity and response speed of ICS in a 5G environment.However,there are also a series of challenges in practical application,including data security and privacy protection,the complexity of resource management and allocation,and the guarantee of quality of service(QoS).Through the case analysis and problem analysis,the paper puts forward the corresponding solution strategies,such as strengthening the data security protocol,introducing the intelligent resource scheduling system and establishing a multi-dimensional service quality monitoring mechanism.Finally,this study points out that the deep integration of edge computing and 5G communication will continue to promote the innovative development of information and communication systems,which has a far-reaching impact and important practical significance for promoting the transformation and upgrading in the field of information technology.展开更多
To cope with the impact of big data,it is proposed to integrate the traditionally individual computing,communications and storage systems,which are getting inevitably converged.An effective information system capacity...To cope with the impact of big data,it is proposed to integrate the traditionally individual computing,communications and storage systems,which are getting inevitably converged.An effective information system capacity is introduced and discussed,aimed at excavating potentials of information system under a new paradigm with more degrees of freedom.展开更多
In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by th...In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency.展开更多
We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencod...We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects.展开更多
Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires...Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursory event. Here we propose a QSDC scheme by applying the frequency coding technique to the two-step QSDC protocol, which enables the two-step QSDC protocol to work in a noisy environment. We have numerically simulated the performance of the protocol in a noisy channel, and the results show that the scheme is indeed robust against channel noise and loss. We also give an estimate of the channel noise upper bound.展开更多
Recently Xia and Song [Phys. Lett. A 364 (2007) 117] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charli...Recently Xia and Song [Phys. Lett. A 364 (2007) 117] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charlie, the receiver Alice can successfully extract the secret message from the sender Bob. In this letter, first we will show that within their protocol the controller Charlie's role could have been excluded if it were not for their unreasonable design. We then revise the Xia-Song CQSDC protocol such that its original advantages are reta/ned and the CQSDC can be really realized.展开更多
In this paper,a monitoring and controlling system for the safety in production and environmental parameters of a small and medium-sized coal mine has been developed after analyzing the current domestic coal production...In this paper,a monitoring and controlling system for the safety in production and environmental parameters of a small and medium-sized coal mine has been developed after analyzing the current domestic coal production and security conditions. The client computer can convert the analog signal about the safety in production and environmental parameters detected from the monitoring terminal into digital signal,and then,send the signal to the coal mine safety monitoring centre. This information can be analyzed,judged,and diagnosed by the monitoring-management-controlling software for helping the manager and technical workers to control the actual underground production and security situations. The system has many advantages including high reliability,better performance of real-time monitoring,faster data communicating and good practicability,and it can effectively prevent the occurrence of safety incidents in coal mines.展开更多
As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when ...As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm.展开更多
This comprehensive study investigates the multifaceted impact of AI-powered personalization on strategic communications, delving deeply into its opportunities, challenges, and future directions. Employing a rigorous m...This comprehensive study investigates the multifaceted impact of AI-powered personalization on strategic communications, delving deeply into its opportunities, challenges, and future directions. Employing a rigorous mixed-methods approach, we conduct an in-depth analysis of the effects of AI-driven personalization on audience engagement, brand perception, and conversion rates across various industries and communication channels. Our findings reveal that while AI-powered personalization significantly enhances communication effectiveness and offers unprecedented opportunities for audience connection, it also raises critical ethical considerations and implementation challenges. The study contributes substantially to the growing body of literature on AI in communications, offering both theoretical insights and practical guidelines for professionals navigating this rapidly evolving landscape. Furthermore, we propose a novel framework for ethical AI implementation in strategic communications and outline a robust agenda for future research in this dynamic field.展开更多
As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,...As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,e.g.,weather conditions,evaporation ducting,and ship rocking caused by waves.To ensure the data transmission reliability,the block Markov superposition transmission(BMST)codes,which are easily configurable and have predictable performance,are applied in this study.Meanwhile,the physical-layer network coding(PNC)scheme with spatial modulation(SM)is adopted to improve the spectrum utilization.For the BMST-SMPNC system,we propose an iterative algorithm,which utilizes the channel observations and the a priori information from BMST decoder,to compute the soft information corresponding to the XORed bits constructed by the relay node.The results indicate that the proposed scheme outperforms the convolutional coded SM-PNC over fast-fading Rician channels.Especially,the performance can be easily improved in high spatial correlation maritime channel by increasing the memory m.展开更多
In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The...In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.展开更多
Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmissio...Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.展开更多
Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh ma...Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh marine environment. And Luby transform(LT) codes are the first codes fully realizing the digital fountain concept. However, in conventional LT encoding/decoding algorithms, due to the imperfect coverage(IC) of input symbols and short cycles in the generator matrix, stopping sets would occur and terminate the decoding. Thus, the recovery probability is reduced,high coding overhead is required and decoding delay is increased.These issues would be disadvantages while applying LT codes in underwater acoustic communication. Aimed at solving those issues, novel encoding/decoding algorithms are proposed. First,a doping and non-uniform selecting(DNS) encoding algorithm is proposed to solve the IC and the generation of short cycles problems. And this can reduce the probability of stopping sets occur during decoding. Second, a hybrid on the fly Gaussian elimination and belief propagation(OFG-BP) decoding algorithm is designed to reduce the decoding delay and efficiently utilize the information of stopping sets. Comparisons via Monte Carlo simulation confirm that the proposed schemes could achieve better overall decoding performances in comparison with conventional schemes.展开更多
基金supported in part by the National Natural Science Foundation of China(Nos.62071441 and 61701464)in part by the Fundamental Research Funds for the Central Universities(No.202151006).
文摘This study explores the application of single photon detection(SPD)technology in underwater wireless optical communication(UWOC)and analyzes the influence of different modulation modes and error correction coding types on communication performance.The study investigates the impact of on-off keying(OOK)and 2-pulse-position modulation(2-PPM)on the bit error rate(BER)in single-channel intensity and polarization multiplexing.Furthermore,it compares the error correction performance of low-density parity check(LDPC)and Reed-Solomon(RS)codes across different error correction coding types.The effects of unscattered photon ratio and depolarization ratio on BER are also verified.Finally,a UWOC system based on SPD is constructed,achieving 14.58 Mbps with polarization OOK multiplexing modulation and 4.37 Mbps with polarization 2-PPM multiplexing modulation using LDPC code error correction.
基金Research project of the Construction Department of Hubei Province(Project No.2023-64).
文摘By analyzing and comparing the current application status and advantages and disadvantages of domestic and foreign artificial material mechanical equipment classification coding systems,and conducting a comparative study of the existing coding system standards in different regions of the country,a coding data model suitable for big data research needs is proposed based on the current national standard for artificial material mechanical equipment classification coding.This model achieves a horizontal connection of characteristics and a vertical penetration of attribute values for construction materials and machinery through forward automatic coding calculation and reverse automatic decoding.This coding scheme and calculation model can also establish a database file for the coding and unit price of construction materials and machinery,forming a complete big data model for construction material coding unit prices.This provides foundational support for calculating and analyzing big data related to construction material unit prices,real-time information prices,market prices,and various comprehensive prices,thus contributing to the formation of cost-related big data.
基金supported by the Natural Science Foundation of China under Grants 61971084,62025105,62001073,62272075the National Natural Science Foundation of Chongqing under Grants cstc2021ycjh-bgzxm0039,cstc2021jcyj-msxmX0031+1 种基金the Science and Technology Research Program for Chongqing Municipal Education Commission KJZD-M202200601the Support Program for Overseas Students to Return to China for Entrepreneurship and Innovation under Grants cx2021003,cx2021053.
文摘Semantic Communication(SC)has emerged as a novel communication paradigm that provides a receiver with meaningful information extracted from the source to maximize information transmission throughput in wireless networks,beyond the theoretical capacity limit.Despite the extensive research on SC,there is a lack of comprehensive survey on technologies,solutions,applications,and challenges for SC.In this article,the development of SC is first reviewed and its characteristics,architecture,and advantages are summarized.Next,key technologies such as semantic extraction,semantic encoding,and semantic segmentation are discussed and their corresponding solutions in terms of efficiency,robustness,adaptability,and reliability are summarized.Applications of SC to UAV communication,remote image sensing and fusion,intelligent transportation,and healthcare are also presented and their strategies are summarized.Finally,some challenges and future research directions are presented to provide guidance for further research of SC.
基金Acknowledgements The work was supported by National Natural Science Foundation of China (Grant No.60972008). The corresponding author is Jiang Wei.
文摘Cognitive radio and cooperative communication can greatly improve the spectrum efficiency in wireless communications.We study a cognitive radio network where two secondary source terminals exchange their information with the assistance of a relay node under interference power constraints.In order to enhance the transmit rate and maintain fairness between two source terminals,a practical 2-phase analog network coding protocol is adopted and its optimal power allocation algorithm is proposed.Numerical results verify the superiority of the proposed algorithm over the conventional direct transmission protocol and 4-phase amplify-and-forward relay protocol.
基金supported by the National Science Fundation of China(NSFC)under grant 62001423the Henan Provincial Key Research,Development and Promotion Project under grant 212102210175the Henan Provincial Key Scientific Research Project for College and University under grant 21A510011.
文摘Sparse vector coding(SVC)is emerging as a potential technology for short packet communications.To further improve the block error rate(BLER)performance,a uniquely decomposable constellation group-based SVC(UDCG-SVC)is proposed in this article.Additionally,in order to achieve an optimal BLER performance of UDCG-SVC,a problem to optimize the coding gain of UDCG-based superimposed constellation is formulated.Given the energy of rotation constellations in UDCG,this problem is solved by converting it into finding the maximized minimum Euclidean distance of the superimposed constellation.Simulation results demonstrate the validness of our derivation.We also find that the proposed UDCGSVC has better BLER performance compared to other SVC schemes,especially under the high order modulation scenarios.
基金supported by the National Natural Science Foundation of China(No.61971439 and No.61702543)the Natural Science Foundation of the Jiangsu Province of China(No.BK20191329)+1 种基金the China Postdoctoral Science Foundation Project(No.2019T120987)the Startup Foundation for Introducing Talent of NUIST(No.2020r100).
文摘Communication behavior recognition is an issue with increasingly importance in the antiterrorism and national defense area.However,the sensing data obtained in actual environment is often not sufficient to accurately analyze the communication behavior.Traditional means can hardly utilize the scarce and crude spectrum sensing data captured in a real scene.Thus,communication behavior recognition using raw sensing data under smallsample condition has become a new challenge.In this paper,a data enhanced communication behavior recognition(DECBR)scheme is proposed to meet this challenge.Firstly,a preprocessing method is designed to make the raw spectrum data suitable for the proposed scheme.Then,an adaptive convolutional neural network structure is exploited to carry out communication behavior recognition.Moreover,DCGAN is applied to support data enhancement,which realize communication behavior recognition under small-sample condition.Finally,the scheme is verified by experiments under different data size.The results show that the DECBR scheme can greatly improve the accuracy and efficiency of behavior recognition under smallsample condition.
基金supported by the National Natural Science Fandation of China (6067208960772075)
文摘In consultative committee for space data systems(CCSDS) file delivery protocol(CFDP) recommendation of reliable transmission,there are no detail transmission procedure and delay calculation of prompted negative acknowledge and asynchronous negative acknowledge models.CFDP is designed to provide data and storage management,story and forward,custody transfer and reliable end-to-end delivery over deep space characterized by huge latency,intermittent link,asymmetric bandwidth and big bit error rate(BER).Four reliable transmission models are analyzed and an expected file-delivery time is calculated with different trans-mission rates,numbers and sizes of packet data units,BERs and frequencies of external events,etc.By comparison of four CFDP models,the requirement of BER for typical missions in deep space is obtained and rules of choosing CFDP models under different uplink state informations are given,which provides references for protocol models selection,utilization and modification.
文摘With the rapid development of information technology,5G communication technology has gradually entered real life,among which the application of edge computing is particularly significant in the information and communication system field.This paper focuses on using edge computing based on 5G communication in information and communication systems.First,the study analyzes the importance of combining edge computing technology with 5G communication technology,and its advantages,such as high efficiency and low latency in processing large amounts of data.The study then explores multiple application scenarios of edge computing in information and communication systems,such as integrated use in the Internet of Things,intelligent transportation,telemedicine and Industry 4.0.The research method is mainly based on theoretical analysis and experimental verification,combined with the characteristics of the 5G network to optimize the edge computing model and test the performance of edge computing in different scenarios through experimental simulation.The results show that edge computing significantly improves the data processing capacity and response speed of ICS in a 5G environment.However,there are also a series of challenges in practical application,including data security and privacy protection,the complexity of resource management and allocation,and the guarantee of quality of service(QoS).Through the case analysis and problem analysis,the paper puts forward the corresponding solution strategies,such as strengthening the data security protocol,introducing the intelligent resource scheduling system and establishing a multi-dimensional service quality monitoring mechanism.Finally,this study points out that the deep integration of edge computing and 5G communication will continue to promote the innovative development of information and communication systems,which has a far-reaching impact and important practical significance for promoting the transformation and upgrading in the field of information technology.
基金supported by the Huawei HIRP Flagship Project(5G Networks&Big Data)the National Natural Science Foundation of China(No.61325005)the European Union EU FP7 QUICK project(No.PIRSES-GA-2013-612652)
文摘To cope with the impact of big data,it is proposed to integrate the traditionally individual computing,communications and storage systems,which are getting inevitably converged.An effective information system capacity is introduced and discussed,aimed at excavating potentials of information system under a new paradigm with more degrees of freedom.
基金supported by the China Postdoctoral Science Foundation (Grant Nos. 2021TQ0042, 2021M700435, 2021TQ0041)the National Natural Science Foundation of China (Grant No. 62102027)the Shandong Provincial Key Research and Development Program (2021CXGC010106)
文摘In this paper,we propose a novel fuzzy matching data sharing scheme named FADS for cloudedge communications.FADS allows users to specify their access policies,and enables receivers to obtain the data transmitted by the senders if and only if the two sides meet their defined certain policies simultaneously.Specifically,we first formalize the definition and security models of fuzzy matching data sharing in cloud-edge environments.Then,we construct a concrete instantiation by pairing-based cryptosystem and the privacy-preserving set intersection on attribute sets from both sides to construct a concurrent matching over the policies.If the matching succeeds,the data can be decrypted.Otherwise,nothing will be revealed.In addition,FADS allows users to dynamically specify the policy for each time,which is an urgent demand in practice.A thorough security analysis demonstrates that FADS is of provable security under indistinguishable chosen ciphertext attack(IND-CCA)in random oracle model against probabilistic polynomial-time(PPT)adversary,and the desirable security properties of privacy and authenticity are achieved.Extensive experiments provide evidence that FADS is with acceptable efficiency.
基金supported by Hong Kong Government general research fund (GRF) under project number PolyU152757/16ENational Natural Science Foundation China under project numbers 61435006 and 61401020
文摘We study the effects of quantization and additive white Gaussian noise(AWGN) in transmitting latent representations of images over a noisy communication channel. The latent representations are obtained using autoencoders(AEs). We analyze image reconstruction and classification performance for different channel noise powers, latent vector sizes, and number of quantization bits used for the latent variables as well as AEs’ parameters. The results show that the digital transmission of latent representations using conventional AEs alone is extremely vulnerable to channel noise and quantization effects. We then propose a combination of basic AE and a denoising autoencoder(DAE) to denoise the corrupted latent vectors at the receiver. This approach demonstrates robustness against channel noise and quantization effects and enables a significant improvement in image reconstruction and classification performance particularly in adverse scenarios with high noise powers and significant quantization effects.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.11175094,91221205,and 11547035)the National Basic Research Program of China(Grant No.2015CB921002)
文摘Quantum secure direct communication (QSDC) is an important branch of quantum cryptography. It can transmit secret information directly without establishing a key first, unlike quantum key distribution which requires this precursory event. Here we propose a QSDC scheme by applying the frequency coding technique to the two-step QSDC protocol, which enables the two-step QSDC protocol to work in a noisy environment. We have numerically simulated the performance of the protocol in a noisy channel, and the results show that the scheme is indeed robust against channel noise and loss. We also give an estimate of the channel noise upper bound.
基金The project supported by the Program of New Century Excellent Talents at the University of China under Grant No.NCET-06-0554National Natural Science Foundation of China under Grant Nos.60677001 and 10747146+3 种基金the Science-Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806the Natural Science Foundation of Hubei Province under Grant No.2006ABA354
文摘Recently Xia and Song [Phys. Lett. A 364 (2007) 117] have proposed a controlled quantum secure direct communication (CQSDC) protocol. They claimed that in their protocol only with the help of the controller Charlie, the receiver Alice can successfully extract the secret message from the sender Bob. In this letter, first we will show that within their protocol the controller Charlie's role could have been excluded if it were not for their unreasonable design. We then revise the Xia-Song CQSDC protocol such that its original advantages are reta/ned and the CQSDC can be really realized.
基金supported by Technologies R&D of State Administration of Work Safety (06-399)Technologies R&D of Hunan Province ( No.05FJ4071)
文摘In this paper,a monitoring and controlling system for the safety in production and environmental parameters of a small and medium-sized coal mine has been developed after analyzing the current domestic coal production and security conditions. The client computer can convert the analog signal about the safety in production and environmental parameters detected from the monitoring terminal into digital signal,and then,send the signal to the coal mine safety monitoring centre. This information can be analyzed,judged,and diagnosed by the monitoring-management-controlling software for helping the manager and technical workers to control the actual underground production and security situations. The system has many advantages including high reliability,better performance of real-time monitoring,faster data communicating and good practicability,and it can effectively prevent the occurrence of safety incidents in coal mines.
基金supported by the National Natural Science Foundation of China(NSFC)(62102232,62122042,61971269)Natural Science Foundation of Shandong Province Under(ZR2021QF064)。
文摘As a combination of edge computing and artificial intelligence,edge intelligence has become a promising technique and provided its users with a series of fast,precise,and customized services.In edge intelligence,when learning agents are deployed on the edge side,the data aggregation from the end side to the designated edge devices is an important research topic.Considering the various importance of end devices,this paper studies the weighted data aggregation problem in a single hop end-to-edge communication network.Firstly,to make sure all the end devices with various weights are fairly treated in data aggregation,a distributed end-to-edge cooperative scheme is proposed.Then,to handle the massive contention on the wireless channel caused by end devices,a multi-armed bandit(MAB)algorithm is designed to help the end devices find their most appropriate update rates.Diffe-rent from the traditional data aggregation works,combining the MAB enables our algorithm a higher efficiency in data aggregation.With a theoretical analysis,we show that the efficiency of our algorithm is asymptotically optimal.Comparative experiments with previous works are also conducted to show the strength of our algorithm.
文摘This comprehensive study investigates the multifaceted impact of AI-powered personalization on strategic communications, delving deeply into its opportunities, challenges, and future directions. Employing a rigorous mixed-methods approach, we conduct an in-depth analysis of the effects of AI-driven personalization on audience engagement, brand perception, and conversion rates across various industries and communication channels. Our findings reveal that while AI-powered personalization significantly enhances communication effectiveness and offers unprecedented opportunities for audience connection, it also raises critical ethical considerations and implementation challenges. The study contributes substantially to the growing body of literature on AI in communications, offering both theoretical insights and practical guidelines for professionals navigating this rapidly evolving landscape. Furthermore, we propose a novel framework for ethical AI implementation in strategic communications and outline a robust agenda for future research in this dynamic field.
基金the National Key Research and Development Program of China(No.2017YFE0112600)the National Science Foundation of China[No.61971454,No.91438101&No.61771499]the National Science Foundation of Guangdong,China[No.2016A030308008].
文摘As an alternative to satellite communications,multi-hop relay networks can be deployed for maritime long-distance communications.Distinct from terrestrial environment,marine radio signals are affected by many factors,e.g.,weather conditions,evaporation ducting,and ship rocking caused by waves.To ensure the data transmission reliability,the block Markov superposition transmission(BMST)codes,which are easily configurable and have predictable performance,are applied in this study.Meanwhile,the physical-layer network coding(PNC)scheme with spatial modulation(SM)is adopted to improve the spectrum utilization.For the BMST-SMPNC system,we propose an iterative algorithm,which utilizes the channel observations and the a priori information from BMST decoder,to compute the soft information corresponding to the XORed bits constructed by the relay node.The results indicate that the proposed scheme outperforms the convolutional coded SM-PNC over fast-fading Rician channels.Especially,the performance can be easily improved in high spatial correlation maritime channel by increasing the memory m.
基金financial support of National Natural Science Foundation of China(NSFC),No.U1705263 and 61971102GF Innovative Research Programthe Sichuan Science and Technology Program,No.2019YJ0194。
文摘In order to satisfy the ever-increasing energy appetite of the massive battery-powered and batteryless communication devices,radio frequency(RF)signals have been relied upon for transferring wireless power to them.The joint coordination of wireless power transfer(WPT)and wireless information transfer(WIT)yields simultaneous wireless information and power transfer(SWIPT)as well as data and energy integrated communication network(DEIN).However,as a promising technique,few efforts are invested in the hardware implementation of DEIN.In order to make DEIN a reality,this paper focuses on hardware implementation of a DEIN.It firstly provides a brief tutorial on SWIPT,while summarising the latest hardware design of WPT transceiver and the existing commercial solutions.Then,a prototype design in DEIN with full protocol stack is elaborated,followed by its performance evaluation.
基金financially supported by National Natural Science Foundation of China(No.61475094)National 973 Program of China(No.2013CB329202)
文摘Simultaneous dimming controlling and data transmission are usually required in a white LED based indoor visible light communication system.However,the diming controlling of LED normally interferes the data transmission due to the modulation nonlinearity of LED.In order to solve this problem,a scheme by separating the LEDs for the functions of dimming control and data transmission respectively is proposed in this paper.In the scheme,the LEDs used for dimming control function are driven by a dc amplified circuit,and the LEDs for data transmission are driven by a digital modulation circuit respectively.In this way,the modulation distortion to the data signal caused by the modulation nonlinearity can be avoided even if the dimming is at high level dc driven current.The proof-of-concept experiment of a 2.5Mbit/s visible light communication system demonstrates that the dimming controlling and data transmission can be realized simultaneously in a simple way,and the data transmission is not affected by the dimming controlling function.Compared to previous methods,the scheme in this paper is simpler and cost effective,and makes sense when high rate data is transmitted in a visible light communication system.
基金supported by the National Natural Science Foundation of China(61371099)the Fundamental Research Funds for the Central Universities of China(HEUCF150812/150810)
文摘Fountain codes are considered to be a promising coding technique in underwater acoustic communication(UAC) which is challenged with the unique propagation features of the underwater acoustic channel and the harsh marine environment. And Luby transform(LT) codes are the first codes fully realizing the digital fountain concept. However, in conventional LT encoding/decoding algorithms, due to the imperfect coverage(IC) of input symbols and short cycles in the generator matrix, stopping sets would occur and terminate the decoding. Thus, the recovery probability is reduced,high coding overhead is required and decoding delay is increased.These issues would be disadvantages while applying LT codes in underwater acoustic communication. Aimed at solving those issues, novel encoding/decoding algorithms are proposed. First,a doping and non-uniform selecting(DNS) encoding algorithm is proposed to solve the IC and the generation of short cycles problems. And this can reduce the probability of stopping sets occur during decoding. Second, a hybrid on the fly Gaussian elimination and belief propagation(OFG-BP) decoding algorithm is designed to reduce the decoding delay and efficiently utilize the information of stopping sets. Comparisons via Monte Carlo simulation confirm that the proposed schemes could achieve better overall decoding performances in comparison with conventional schemes.