The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effect...Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.展开更多
This paper proposes an efficient scheme for quantum communication between two atoms trapped in distant cavities which are connected by an optical fibre. During the operation, all the atomic system, the cavity modes an...This paper proposes an efficient scheme for quantum communication between two atoms trapped in distant cavities which are connected by an optical fibre. During the operation, all the atomic system, the cavity modes and the fibre are not excited. The quantum state is mediated by the vacuum fields. The idea can be used to realize quantum entanglement between two distant atoms via vacuum.展开更多
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication...This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.展开更多
This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple...This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。展开更多
The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents ...The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.展开更多
In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to r...In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance.展开更多
In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LE...In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained.展开更多
To facilitate emerging applications and demands of edge intelligence(EI)-empowered 6G networks,model-driven semantic communications have been proposed to reduce transmission volume by deploying artificial intelligence...To facilitate emerging applications and demands of edge intelligence(EI)-empowered 6G networks,model-driven semantic communications have been proposed to reduce transmission volume by deploying artificial intelligence(AI)models that provide abilities of semantic extraction and recovery.Nevertheless,it is not feasible to preload all AI models on resource-constrained terminals.Thus,in-time model transmission becomes a crucial problem.This paper proposes an intellicise model transmission architecture to guarantee the reliable transmission of models for semantic communication.The mathematical relationship between model size and performance is formulated by employing a recognition error function supported with experimental data.We consider the characteristics of wireless channels and derive the closed-form expression of model transmission outage probability(MTOP)over the Rayleigh channel.Besides,we define the effective model accuracy(EMA)to evaluate the model transmission performance of both communication and intelligence.Then we propose a joint model selection and resource allocation(JMSRA)algorithm to maximize the average EMA of all users.Simulation results demonstrate that the average EMA of the JMSRA algorithm outperforms baseline algorithms by about 22%.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har...Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results.展开更多
The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the info...The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement.展开更多
This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The mai...This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.展开更多
In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communicati...In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.展开更多
As the melody of Where Is the Way sounded,the westward journey of a Tang Dynasty Buddhist monk and his disciples,as portrayed by students from a Malaysian Chinese national-type primary school,won thunderous applause f...As the melody of Where Is the Way sounded,the westward journey of a Tang Dynasty Buddhist monk and his disciples,as portrayed by students from a Malaysian Chinese national-type primary school,won thunderous applause from the audience.This scene unfolded during the Malay drama competition held in October 2023 at the auditorium of Dewan Bahasa dan Pustaka in Kuala Lumpur.Although the characters and plot were familiar,the Malay rendition offered a refreshing novelty.展开更多
The mass communication model and interactive ritual chain theory,which serve as communication paradigms in the new media era,facilitate and enhance the synergy between the fields of social history of medicine and heal...The mass communication model and interactive ritual chain theory,which serve as communication paradigms in the new media era,facilitate and enhance the synergy between the fields of social history of medicine and health communication.This study employs a comprehensive framework based on the five elements of the mass communication model:information source,communication subject,communication object,message content,and post-communication feedback.Additionally,it incorporates the interactive ritual chain theory to examine the evolving dynamics and developmental trajectory of research in the social history of medicine during the new media era.Conclusively,this paper acknowledges the existing interaction gaps in the interaction between health communication and the social history of medicine research while outlining the challenges for fostering collaboration and proposing strategic optimizations for effective integration.展开更多
We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine func...We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine function,their precise function in spinal cord injury remains unclear.To investigate the role of exosomes generated following neural stem cells necroptosis after spinal cord injury,we conducted singlecell RNA sequencing and validated that neural stem cells originate from ependymal cells and undergo necroptosis in response to spinal cord injury.Subsequently,we established an in vitro necroptosis model using neural stem cells isolated from embryonic mice aged 16-17 days and extracted exosomes.The results showed that necroptosis did not significantly impact the fundamental characteristics or number of exosomes.Transcriptome sequencing of exosomes in necroptosis group identified 108 differentially expressed messenger RNAs,104 long non-coding RNAs,720 circular RNAs,and 14 microRNAs compared with the control group.Construction of a competing endogenous RNA network identified the following hub genes:tuberous sclerosis 2(Tsc2),solute carrier family 16 member 3(Slc16a3),and forkhead box protein P1(Foxp1).Notably,a significant elevation in TSC2 expression was observed in spinal cord tissues following spinal cord injury.TSC2-positive cells were localized around SRY-box transcription factor 2-positive cells within the injury zone.Furthermore,in vitro analysis revealed increased TSC2 expression in exosomal receptor cells compared with other cells.Further assessment of cellular communication following spinal cord injury showed that Tsc2 was involved in ependymal cellular communication at 1 and 3 days post-injury through the epidermal growth factor and midkine signaling pathways.In addition,Slc16a3 participated in cellular communication in ependymal cells at 7 days post-injury via the vascular endothelial growth factor and macrophage migration inhibitory factor signaling pathways.Collectively,these findings confirm that exosomes derived from neural stem cells undergoing necroptosis play an important role in cellular communication after spinal cord injury and induce TSC2 upregulation in recipient cells.展开更多
Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought conveni...Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.展开更多
Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important a...Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.展开更多
Intercoronary communication is an uncommon congenital coronary variation.[1] There is a connection between two or more coronary arteries whose blood flow can be either unidirectional or bidirectional.[2] Therefore,thi...Intercoronary communication is an uncommon congenital coronary variation.[1] There is a connection between two or more coronary arteries whose blood flow can be either unidirectional or bidirectional.[2] Therefore,this anomalous intercoronary communications may be mistaken as a functional collateral vessel seen in the obstructive coronary artery disease (CAD). Coronary collateral vessels are usually related to severe coronary stenosis or total occlusions,while intercoronary communication is usually found in angiographically normal coronary arteries. Intercoronary communication differentiates coronary collateral vessels by angiographic features and histological structure.[3,4] The functional importance of intercoronary communication remains controversial.[1,3] We report two cases about this rare communication between left circumflex artery (LCx) and right coronary artery (RCA).展开更多
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
文摘Rapid development in Information Technology(IT)has allowed several novel application regions like large outdoor vehicular networks for Vehicle-to-Vehicle(V2V)transmission.Vehicular networks give a safe and more effective driving experience by presenting time-sensitive and location-aware data.The communication occurs directly between V2V and Base Station(BS)units such as the Road Side Unit(RSU),named as a Vehicle to Infrastructure(V2I).However,the frequent topology alterations in VANETs generate several problems with data transmission as the vehicle velocity differs with time.Therefore,the scheme of an effectual routing protocol for reliable and stable communications is significant.Current research demonstrates that clustering is an intelligent method for effectual routing in a mobile environment.Therefore,this article presents a Falcon Optimization Algorithm-based Energy Efficient Communication Protocol for Cluster-based Routing(FOA-EECPCR)technique in VANETS.The FOA-EECPCR technique intends to group the vehicles and determine the shortest route in the VANET.To accomplish this,the FOA-EECPCR technique initially clusters the vehicles using FOA with fitness functions comprising energy,distance,and trust level.For the routing process,the Sparrow Search Algorithm(SSA)is derived with a fitness function that encompasses two variables,namely,energy and distance.A series of experiments have been conducted to exhibit the enhanced performance of the FOA-EECPCR method.The experimental outcomes demonstrate the enhanced performance of the FOA-EECPCR approach over other current methods.
基金Project supported by the National Natural Science Foundation of China (Grant No.10674025)the Doctoral Foundation of the Ministry of Education of China (Grant No.20070386002)
文摘This paper proposes an efficient scheme for quantum communication between two atoms trapped in distant cavities which are connected by an optical fibre. During the operation, all the atomic system, the cavity modes and the fibre are not excited. The quantum state is mediated by the vacuum fields. The idea can be used to realize quantum entanglement between two distant atoms via vacuum.
基金supported in part by the National Natural Science Foundation of China (61933007,62273087,U22A2044,61973102,62073180)the Shanghai Pujiang Program of China (22PJ1400400)+1 种基金the Royal Society of the UKthe Alexander von Humboldt Foundation of Germany。
文摘This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy.
基金supported in part by the National Key Research and Development Program of China(2019YFB2204701)in part by the National Natural Science Foundation of China(61831006,62022023,and 62250610223)in part by the Big Data Computing Center at Southeast University for numerical calculation.
文摘This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。
文摘The working of a Mobile Ad hoc NETwork(MANET)relies on the supportive cooperation among the network nodes.But due to its intrinsic features,a misbehaving node can easily lead to a routing disorder.This paper presents two trust-based routing schemes,namely Trust-based Self-Detection Routing(TSDR)and Trust-based Cooperative Routing(TCOR)designed with an Ad hoc On-demand Distance Vector(AODV)protocol.The proposed work covers a wide range of security challenges,including malicious node identification and prevention,accurate trust quantification,secure trust data sharing,and trusted route maintenance.This brings a prominent solution for mitigating misbehaving nodes and establishing efficient communication in MANET.It is empirically validated based on a performance comparison with the current Evolutionary Self-Cooperative Trust(ESCT)scheme,Generalized Trust Model(GTM),and the conventional AODV protocol.The extensive simulations are conducted against three different varying network scenarios.The results affirm the improved values of eight popular performance metrics overcoming the existing routing schemes.Among the two proposed works,TCOR is more suitable for highly scalable networks;TSDR suits,however,the MANET application better with its small size.This work thus makes a significant contribution to the research community,in contrast to many previous works focusing solely on specific security aspects,and results in a trade-off in the expected values of evaluation parameters and asserts their efficiency.
基金supported in part by the National Natural Science Foundation of China(No.61941105,No.61901327 and No.62101450)in part by the National Natural Science Foundation for Distinguished Young Scholar(No.61825104)+1 种基金in part by the Fundamental Research Funds for the Central Universities(JB210109)in part by the Foundation of State Key Laboratory of Integrated Services Networks of Xidian University(ISN22-03)。
文摘In this work,we investigate the covert communication in cognitive radio(CR)networks with the existence of multiple cognitive jammers(CJs).Specifically,the secondary transmitter(ST)helps the primary transmitter(PT)to relay information to primary receiver(PR),as a reward,the ST can use PT's spectrum to transmit private information against the eavesdropper(Eve)under the help of one selected cognitive jammer(CJ).Meanwhile,we propose three jammer-selection schemes,namely,link-oriented jammer selection(LJS),min-max jammer selection(MMJS)and random jammer selection(RJS).For each scheme,we analyze the average covert throughput(ACT)and covert outage probability(COP).Our simulation results show that CJ is helpful to ST's covert communication,the expected minimum detection error probability and ACT can be significantly improved with the increase of false alarm of CJ.Moreover,the LJS scheme achieves best performance in ACT and COP,followed by RJS scheme,and MMJS scheme shows the worst performance.
基金supported in part by the National Natural Science Foundation for Distinguished Young Scholar 61825104in part by the National Natural Science Foundation of China under Grant 62201582+4 种基金in part by the National Nature Science Foundation of China under Grants 62101450in part by the Key R&D Plan of Shaan Xi Province Grants 2023YBGY037in part by National Key R&D Program of China(2022YFC3301300)in part by the Natural Science Basic Research Program of Shaanxi under Grant 2022JQ-632in part by Innovative Cultivation Project of School of Information and Communication of National University of Defense Technology under Grant YJKT-ZD-2202。
文摘In this paper,we study the covert performance of the downlink low earth orbit(LEO)satellite communication,where the unmanned aerial vehicle(UAV)is employed as a cooperative jammer.To maximize the covert rate of the LEO satellite transmission,a multi-objective problem is formulated to jointly optimize the UAV’s jamming power and trajectory.For practical consideration,we assume that the UAV can only have partial environmental information,and can’t know the detection threshold and exact location of the eavesdropper on the ground.To solve the multiobjective problem,we propose the data-driven generative adversarial network(DD-GAN)based method to optimize the power and trajectory of the UAV,in which the sample data is collected by using genetic algorithm(GA).Simulation results show that the jamming solution of UAV generated by DD-GAN can achieve an effective trade-off between covert rate and probability of detection errors when only limited prior information is obtained.
基金supported in part by the National Key R&D Program of China No.2020YFB1806905the National Natural Science Foundation of China No.62201079+1 种基金the Beijing Natural Science Foundation No.L232051the Major Key Project of Peng Cheng Laboratory(PCL)Department of Broadband Communication。
文摘To facilitate emerging applications and demands of edge intelligence(EI)-empowered 6G networks,model-driven semantic communications have been proposed to reduce transmission volume by deploying artificial intelligence(AI)models that provide abilities of semantic extraction and recovery.Nevertheless,it is not feasible to preload all AI models on resource-constrained terminals.Thus,in-time model transmission becomes a crucial problem.This paper proposes an intellicise model transmission architecture to guarantee the reliable transmission of models for semantic communication.The mathematical relationship between model size and performance is formulated by employing a recognition error function supported with experimental data.We consider the characteristics of wireless channels and derive the closed-form expression of model transmission outage probability(MTOP)over the Rayleigh channel.Besides,we define the effective model accuracy(EMA)to evaluate the model transmission performance of both communication and intelligence.Then we propose a joint model selection and resource allocation(JMSRA)algorithm to maximize the average EMA of all users.Simulation results demonstrate that the average EMA of the JMSRA algorithm outperforms baseline algorithms by about 22%.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金supported by the National Natural Science Foundation of China(No.61772386)National Key Research and Development Project(No.2018YFB1305001)Fundamental Research Funds for the Central Universities(No.KJ02072021-0119).
文摘Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results.
基金New Brunswick Innovation Foundation(NBIF)for the financial support of the global project.
文摘The demands on conventional communication networks are increasing rapidly because of the exponential expansion of connected multimedia content.In light of the data-centric aspect of contemporary communication,the information-centric network(ICN)paradigm offers hope for a solution by emphasizing content retrieval by name instead of location.If 5G networks are to meet the expected data demand surge from expanded connectivity and Internet of Things(IoT)devices,then effective caching solutions will be required tomaximize network throughput andminimize the use of resources.Hence,an ICN-based Cooperative Caching(ICN-CoC)technique has been used to select a cache by considering cache position,content attractiveness,and rate prediction.The findings show that utilizing our suggested approach improves caching regarding the Cache Hit Ratio(CHR)of 84.3%,Average Hop Minimization Ratio(AHMR)of 89.5%,and Mean Access Latency(MAL)of 0.4 s.Within a framework,it suggests improved caching strategies to handle the difficulty of effectively controlling data consumption in 5G networks.These improvements aim to make the network run more smoothly by enhancing content delivery,decreasing latency,and relieving congestion.By improving 5G communication systems’capacity tomanage the demands faced by modern data-centric applications,the research ultimately aids in advancement.
文摘This paper focuses on wireless-powered communication systems,which are increasingly relevant in the Internet of Things(IoT)due to their ability to extend the operational lifetime of devices with limited energy.The main contribution of the paper is a novel approach to minimize the secrecy outage probability(SOP)in these systems.Minimizing SOP is crucial for maintaining the confidentiality and integrity of data,especially in situations where the transmission of sensitive data is critical.Our proposed method harnesses the power of an improved biogeography-based optimization(IBBO)to effectively train a recurrent neural network(RNN).The proposed IBBO introduces an innovative migration model.The core advantage of IBBO lies in its adeptness at maintaining equilibrium between exploration and exploitation.This is accomplished by integrating tactics such as advancing towards a random habitat,adopting the crossover operator from genetic algorithms(GA),and utilizing the global best(Gbest)operator from particle swarm optimization(PSO)into the IBBO framework.The IBBO demonstrates its efficacy by enabling the RNN to optimize the system parameters,resulting in significant outage probability reduction.Through comprehensive simulations,we showcase the superiority of the IBBO-RNN over existing approaches,highlighting its capability to achieve remarkable gains in SOP minimization.This paper compares nine methods for predicting outage probability in wireless-powered communications.The IBBO-RNN achieved the highest accuracy rate of 98.92%,showing a significant performance improvement.In contrast,the standard RNN recorded lower accuracy rates of 91.27%.The IBBO-RNN maintains lower SOP values across the entire signal-to-noise ratio(SNR)spectrum tested,suggesting that the method is highly effective at optimizing system parameters for improved secrecy even at lower SNRs.
基金supported in part by the Fundamental Research Funds for the Central Universities under Grant No.2024ZCJH01in part by the National Natural Science Foundation of China(NSFC)under Grant No.62271081in part by the National Key Research and Development Program of China under Grant No.2020YFA0711302.
文摘In unmanned aerial vehicle(UAV)networks,the high mobility of nodes leads to frequent changes in network topology,which brings challenges to the neighbor discovery(ND)for UAV networks.Integrated sensing and communication(ISAC),as an emerging technology in 6G mobile networks,has shown great potential in improving communication performance with the assistance of sensing information.ISAC obtains the prior information about node distribution,reducing the ND time.However,the prior information obtained through ISAC may be imperfect.Hence,an ND algorithm based on reinforcement learning is proposed.The learning automaton(LA)is applied to interact with the environment and continuously adjust the probability of selecting beams to accelerate the convergence speed of ND algorithms.Besides,an efficient ND algorithm in the neighbor maintenance phase is designed,which applies the Kalman filter to predict node movement.Simulation results show that the LA-based ND algorithm reduces the ND time by up to 32%compared with the Scan-Based Algorithm(SBA),which proves the efficiency of the proposed ND algorithms.
文摘As the melody of Where Is the Way sounded,the westward journey of a Tang Dynasty Buddhist monk and his disciples,as portrayed by students from a Malaysian Chinese national-type primary school,won thunderous applause from the audience.This scene unfolded during the Malay drama competition held in October 2023 at the auditorium of Dewan Bahasa dan Pustaka in Kuala Lumpur.Although the characters and plot were familiar,the Malay rendition offered a refreshing novelty.
基金University of Science and Technology of China Quality Project History of Medicine(2023YCZX02)Digital Museum Construction Project of Chinese Centre for Disease Control and Prevention(BB2110240080)The National Key R&D project granted by the Ministry of Science and Technology(2018YFA0902400).
文摘The mass communication model and interactive ritual chain theory,which serve as communication paradigms in the new media era,facilitate and enhance the synergy between the fields of social history of medicine and health communication.This study employs a comprehensive framework based on the five elements of the mass communication model:information source,communication subject,communication object,message content,and post-communication feedback.Additionally,it incorporates the interactive ritual chain theory to examine the evolving dynamics and developmental trajectory of research in the social history of medicine during the new media era.Conclusively,this paper acknowledges the existing interaction gaps in the interaction between health communication and the social history of medicine research while outlining the challenges for fostering collaboration and proposing strategic optimizations for effective integration.
基金supported by the National Natural Science Foundation of China,No.81801907(to NC)Shenzhen Key Laboratory of Bone Tissue Repair and Translational Research,No.ZDSYS20230626091402006(to NC)+2 种基金Sanming Project of Medicine in Shenzhen,No.SZSM201911002(to SL)Foundation of Shenzhen Committee for Science and Technology Innovation,Nos.JCYJ20230807110310021(to NC),JCYJ20230807110259002(to JL)Science and Technology Program of Guangzhou,No.2024A04J4716(to TL)。
文摘We previously demonstrated that inhibiting neural stem cells necroptosis enhances functional recovery after spinal cord injury.While exosomes are recognized as playing a pivotal role in neural stem cells exocrine function,their precise function in spinal cord injury remains unclear.To investigate the role of exosomes generated following neural stem cells necroptosis after spinal cord injury,we conducted singlecell RNA sequencing and validated that neural stem cells originate from ependymal cells and undergo necroptosis in response to spinal cord injury.Subsequently,we established an in vitro necroptosis model using neural stem cells isolated from embryonic mice aged 16-17 days and extracted exosomes.The results showed that necroptosis did not significantly impact the fundamental characteristics or number of exosomes.Transcriptome sequencing of exosomes in necroptosis group identified 108 differentially expressed messenger RNAs,104 long non-coding RNAs,720 circular RNAs,and 14 microRNAs compared with the control group.Construction of a competing endogenous RNA network identified the following hub genes:tuberous sclerosis 2(Tsc2),solute carrier family 16 member 3(Slc16a3),and forkhead box protein P1(Foxp1).Notably,a significant elevation in TSC2 expression was observed in spinal cord tissues following spinal cord injury.TSC2-positive cells were localized around SRY-box transcription factor 2-positive cells within the injury zone.Furthermore,in vitro analysis revealed increased TSC2 expression in exosomal receptor cells compared with other cells.Further assessment of cellular communication following spinal cord injury showed that Tsc2 was involved in ependymal cellular communication at 1 and 3 days post-injury through the epidermal growth factor and midkine signaling pathways.In addition,Slc16a3 participated in cellular communication in ependymal cells at 7 days post-injury via the vascular endothelial growth factor and macrophage migration inhibitory factor signaling pathways.Collectively,these findings confirm that exosomes derived from neural stem cells undergoing necroptosis play an important role in cellular communication after spinal cord injury and induce TSC2 upregulation in recipient cells.
文摘Rapid advancement in science and technology has seen computer network technology being upgraded constantly, and computer technology, in particular, has been applied more and more extensively, which has brought convenience to people’s lives. The number of people using the internet around the globe has also increased significantly, exerting a profound influence on artificial intelligence. Further, the constant upgrading and development of artificial intelligence has led to the continuous innovation and improvement of computer technology. Countries around the world have also registered an increase in investment, paying more attention to artificial intelligence. Through an analysis of the current development situation and the existing applications of artificial intelligence, this paper explicates the role of artificial intelligence in the face of the unceasing expansion of computer network technology.
基金the Deanship of Graduate Studies and Scientific Research at Qassim University for financial support(QU-APC-2024-9/1).
文摘Control signaling is mandatory for the operation and management of all types of communication networks,including the Third Generation Partnership Project(3GPP)mobile broadband networks.However,they consume important and scarce network resources such as bandwidth and processing power.There have been several reports of these control signaling turning into signaling storms halting network operations and causing the respective Telecom companies big financial losses.This paper draws its motivation from such real network disaster incidents attributed to signaling storms.In this paper,we present a thorough survey of the causes,of the signaling storm problems in 3GPP-based mobile broadband networks and discuss in detail their possible solutions and countermeasures.We provide relevant analytical models to help quantify the effect of the potential causes and benefits of their corresponding solutions.Another important contribution of this paper is the comparison of the possible causes and solutions/countermeasures,concerning their effect on several important network aspects such as architecture,additional signaling,fidelity,etc.,in the form of a table.This paper presents an update and an extension of our earlier conference publication.To our knowledge,no similar survey study exists on the subject.
基金supported by grant from the National Natural Science Foundation of Hubei Province (No. 2017 CFB671)
文摘Intercoronary communication is an uncommon congenital coronary variation.[1] There is a connection between two or more coronary arteries whose blood flow can be either unidirectional or bidirectional.[2] Therefore,this anomalous intercoronary communications may be mistaken as a functional collateral vessel seen in the obstructive coronary artery disease (CAD). Coronary collateral vessels are usually related to severe coronary stenosis or total occlusions,while intercoronary communication is usually found in angiographically normal coronary arteries. Intercoronary communication differentiates coronary collateral vessels by angiographic features and histological structure.[3,4] The functional importance of intercoronary communication remains controversial.[1,3] We report two cases about this rare communication between left circumflex artery (LCx) and right coronary artery (RCA).