期刊文献+
共找到5,581篇文章
< 1 2 250 >
每页显示 20 50 100
Communication Resource-Efficient Vehicle Platooning Control With Various Spacing Policies 被引量:4
1
作者 Xiaohua Ge Qing-Long Han +1 位作者 Xian-Ming Zhang Derui Ding 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第2期362-376,共15页
Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical cha... Platooning represents one of the key features that connected automated vehicles may possess as it allows multiple automated vehicles to be maneuvered cooperatively with small headways on roads. However, a critical challenge in accomplishing automated vehicle platoons is to deal with the effects of intermittent and sporadic vehicle-to-vehicle data transmissions caused by limited wireless communication resources. This paper addresses the co-design problem of dynamic event-triggered communication scheduling and cooperative adaptive cruise control for a convoy of automated vehicles with diverse spacing policies. The central aim is to achieve automated vehicle platooning under various gap references with desired platoon stability and spacing performance requirements, while simultaneously improving communication efficiency. Toward this aim, a dynamic event-triggered scheduling mechanism is developed such that the intervehicle data transmissions are scheduled dynamically and efficiently over time. Then, a tractable co-design criterion on the existence of both the admissible event-driven cooperative adaptive cruise control law and the desired scheduling mechanism is derived. Finally, comparative simulation results are presented to substantiate the effectiveness and merits of the obtained results. 展开更多
关键词 Automated vehicles constant time headway spacing constant spacing cooperative adaptive cruise control event-triggered communication vehicle platooning
下载PDF
Design of Protograph LDPC-Coded MIMO-VLC Systems with Generalized Spatial Modulation 被引量:1
2
作者 Dai Lin Fang Yi +1 位作者 Guan Yongliang Mohsen Guizani 《China Communications》 SCIE CSCD 2024年第3期118-136,共19页
This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID ... This paper investigates the bit-interleaved coded generalized spatial modulation(BICGSM) with iterative decoding(BICGSM-ID) for multiple-input multiple-output(MIMO) visible light communications(VLC). In the BICGSM-ID scheme, the information bits conveyed by the signal-domain(SiD) symbols and the spatial-domain(SpD) light emitting diode(LED)-index patterns are coded by a protograph low-density parity-check(P-LDPC) code. Specifically, we propose a signal-domain symbol expanding and re-allocating(SSER) method for constructing a type of novel generalized spatial modulation(GSM) constellations, referred to as SSERGSM constellations, so as to boost the performance of the BICGSM-ID MIMO-VLC systems.Moreover, by applying a modified PEXIT(MPEXIT) algorithm, we further design a family of rate-compatible P-LDPC codes, referred to as enhanced accumulate-repeat-accumulate(EARA) codes,which possess both excellent decoding thresholds and linear-minimum-distance-growth property. Both analysis and simulation results illustrate that the proposed SSERGSM constellations and P-LDPC codes can remarkably improve the convergence and decoding performance of MIMO-VLC systems. Therefore, the proposed P-LDPC-coded SSERGSM-mapped BICGSMID configuration is envisioned as a promising transmission solution to satisfy the high-throughput requirement of MIMO-VLC applications. 展开更多
关键词 bit-interleaved coded modulation generalized spatial modulation multiple-input multipleoutput protograph LDPC codes visible light communication
下载PDF
Satellite Communications with 5G, B5G, and 6G: Challenges and Prospects 被引量:1
3
作者 Mehmet Beyaz 《International Journal of Communications, Network and System Sciences》 2024年第3期31-49,共19页
Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity comm... Satellite communications, pivotal for global connectivity, are increasingly converging with cutting-edge mobile networks, notably 5G, B5G, and 6G. This amalgamation heralds the promise of universal, high-velocity communication, yet it is not without its challenges. Paramount concerns encompass spectrum allocation, the harmonization of network architectures, and inherent latency issues in satellite transmissions. Potential mitigations, such as dynamic spectrum sharing and the deployment of edge computing, are explored as viable solutions. Looking ahead, the advent of quantum communications within satellite frameworks and the integration of AI spotlight promising research trajectories. These advancements aim to foster a seamless and synergistic coexistence between satellite communications and next-gen mobile networks. 展开更多
关键词 Satellite Communications Spectrum Allocation Edge Computing AI Integration 5G B5G 6G
下载PDF
The functions of exosomes targeting astrocytes and astrocyte-derived exosomes targeting other cell types
4
作者 Hongye Xu He Li +9 位作者 Ping Zhang Yuan Gao Hongyu Ma Tianxiang Gao Hanchen Liu Weilong Hua Lei Zhang Xiaoxi Zhang Pengfei Yang Jianmin Liu 《Neural Regeneration Research》 SCIE CAS CSCD 2024年第9期1947-1953,共7页
Astrocytes are the most abundant glial cells in the central nervous system;they participate in crucial biological processes,maintain brain structure,and regulate nervous system function.Exosomes are cell-derived extra... Astrocytes are the most abundant glial cells in the central nervous system;they participate in crucial biological processes,maintain brain structure,and regulate nervous system function.Exosomes are cell-derived extracellular vesicles containing various bioactive molecules including proteins,peptides,nucleotides,and lipids secreted from their cellular sources.Increasing evidence shows that exosomes participate in a communication network in the nervous system,in which astrocyte-derived exosomes play important roles.In this review,we have summarized the effects of exosomes targeting astrocytes and the astrocyte-derived exosomes targeting other cell types in the central nervous system.We also discuss the potential research directions of the exosome-based communication network in the nervous system.The exosome-based intercellular communication focused on astrocytes is of great significance to the biological and/or pathological processes in different conditions in the brain.New strategies may be developed for the diagnosis and treatment of neurological disorders by focusing on astrocytes as the central cells and utilizing exosomes as communication mediators. 展开更多
关键词 ASTROCYTES communication EXOSOMES neurological disorders targeting mechanism
下载PDF
Cyber Security within Smart Cities:A Comprehensive Study and a Novel Intrusion Detection-Based Approach
5
作者 Mehdi Houichi Faouzi Jaidi Adel Bouhoula 《Computers, Materials & Continua》 SCIE EI 2024年第10期393-441,共49页
The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts ... The expansion of smart cities,facilitated by digital communications,has resulted in an enhancement of the quality of life and satisfaction among residents.The Internet of Things(IoT)continually generates vast amounts of data,which is subsequently analyzed to offer services to residents.The growth and development of IoT have given rise to a new paradigm.A smart city possesses the ability to consistently monitor and utilize the physical environment,providing intelligent services such as energy,transportation,healthcare,and entertainment for both residents and visitors.Research on the security and privacy of smart cities is increasingly prevalent.These studies highlight the cybersecurity risks and the challenges faced by smart city infrastructure in handling and managing personal data.To effectively uphold individuals’security and privacy,developers of smart cities must earn the trust of the public.In this article,we delve into the realms of privacy and security within smart city applications.Our comprehensive study commences by introducing architecture and various applications tailored to smart cities.Then,concerns surrounding security and privacy within these applications are thoroughly explored subsequently.Following that,we delve into several research endeavors dedicated to addressing security and privacy issues within smart city applications.Finally,we emphasize our methodology and present a case study illustrating privacy and security in smart city contexts.Our proposal consists of defining an Artificial Intelligence(AI)based framework that allows:Thoroughly documenting penetration attempts and cyberattacks;promptly detecting any deviations from security standards;monitoring malicious behaviors and accurately tracing their sources;and establishing strong controls to effectively repel and prevent such threats.Experimental results using the Edge-IIoTset(Edge Industrial Internet of Things Security Evaluation Test)dataset demonstrated good accuracy.They were compared to related state-of-theart works,which highlight the relevance of our proposal. 展开更多
关键词 Smart cities digital communications CYBERSECURITY PRIVACY intrusion detection
下载PDF
A Retrodirective Array Enabled by CMOS Chips for Two-Way Wireless Communication with Automatic Beam Tracking
6
作者 Jiacheng Guo Yizhu Shen +2 位作者 Guoqing Dong Zhuang Han Sanming Hu 《Engineering》 SCIE EI CAS CSCD 2024年第6期196-207,共12页
This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic comple... This article proposes and demonstrates a retrodirective array(RDA)for two-way wireless communication with automatic beam tracking.The proposed RDA is enabled by specifically designed chips made using a domestic complementary metal-oxide semiconductor(CMOS)process.The highly integrated CMOS chip includes a receiving(Rx)chain,a transmitting(Tx)chain,and a unique tracking phaselocked loop(PLL)for the crucial conjugated phase recovery in the RDA.This article also proposes a method to reduce the beam pointing error(BPE)in a conventional RDA.To validate the above ideas simply yet without loss of generality,a 2.4 GHz RDA is demonstrated through two-way communication links between the Rx and Tx chains,and an on-chip quadrature coupler is designed to achieve a nonretrodirective signal suppression of 23 dBc.The experimental results demonstrate that the proposed RDA,which incorporates domestically manufactured low-cost 0.18 lm CMOS chips,is capable of automatically tracking beams covering±40with a reduced BPE.Each CMOS chip in the RDA has a compact size of 4.62 mm^(2) and a low power consumption of 0.15 W.To the best of the authors’knowledge,this is the first research to demonstrate an RDA with a fully customized CMOS chip for wireless communication with automatic beam tracking。 展开更多
关键词 Automatic beam tracking CMOS Retrodirective array Two-way communication
下载PDF
Activation Distance and Capacity Analysis for Ambient Backscatter Communications with Sensitivity Constraint and Beamforming
7
作者 Mu Yunping Fan Dian +2 位作者 Wang Gongpu Xu Yongjun Kuang Lei 《China Communications》 SCIE CSCD 2024年第11期257-266,共10页
Circuit sensitivity of sensors or tags without battery is one practical constraint for ambient backscatter communication systems.This letter considers using beamforming to reduce the sensitivity constraint and evaluat... Circuit sensitivity of sensors or tags without battery is one practical constraint for ambient backscatter communication systems.This letter considers using beamforming to reduce the sensitivity constraint and evaluates the corresponding performance in terms of the tag activation distance and the system capacity.Specifically,we derive the activation probabilities of the tag in the case of single-antenna and multi-antenna transmitters.Besides,we obtain the capacity expressions for the ambient backscatter communication system with beamforming and illustrate the power allocation that maximizes the system capacity when the tag is activated.Finally,simulation results are provided to corroborate our proposed studies. 展开更多
关键词 activation distance ambient backscatter communications beamforming channel capacity power allocation sensitivity
下载PDF
Ultimately Bounded Output Feedback Control for Networked Nonlinear Systems With Unreliable Communication Channel: A Buffer-Aided Strategy
8
作者 Yuhan Zhang Zidong Wang +2 位作者 Lei Zou Yun Chen Guoping Lu 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1566-1578,共13页
This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication... This paper concerns ultimately bounded output-feedback control problems for networked systems with unknown nonlinear dynamics. Sensor-to-observer signal transmission is facilitated over networks that has communication constraints.These transmissions are carried out over an unreliable communication channel. In order to enhance the utilization rate of measurement data, a buffer-aided strategy is novelly employed to store historical measurements when communication networks are inaccessible. Using the neural network technique, a novel observer-based controller is introduced to address effects of signal transmission behaviors and unknown nonlinear dynamics.Through the application of stochastic analysis and Lyapunov stability, a joint framework is constructed for analyzing resultant system performance under the introduced controller. Subsequently, existence conditions for the desired output-feedback controller are delineated. The required parameters for the observerbased controller are then determined by resolving some specific matrix inequalities. Finally, a simulation example is showcased to confirm method efficacy. 展开更多
关键词 Buffer-aided strategy neural networks nonlinear control output-feedback control unreliable communication channel
下载PDF
Identification of an immune-related gene signature for predicting prognosis and immunotherapy efficacy in liver cancer via cell-cell communication
9
作者 Jun-Tao Li Hong-Mei Zhang +1 位作者 Wei Wang Dong-Qing Wei 《World Journal of Gastroenterology》 SCIE CAS 2024年第11期1609-1620,共12页
BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due t... BACKGROUND Liver cancer is one of the deadliest malignant tumors worldwide.Immunotherapy has provided hope to patients with advanced liver cancer,but only a small fraction of patients benefit from this treatment due to individual differences.Identifying immune-related gene signatures in liver cancer patients not only aids physicians in cancer diagnosis but also offers personalized treatment strategies,thereby improving patient survival rates.Although several methods have been developed to predict the prognosis and immunotherapeutic efficacy in patients with liver cancer,the impact of cell-cell interactions in the tumor microenvir-onment has not been adequately considered.AIM To identify immune-related gene signals for predicting liver cancer prognosis and immunotherapy efficacy.METHODS Cell grouping and cell-cell communication analysis were performed on single-cell RNA-sequencing data to identify highly active cell groups in immune-related pathways.Highly active immune cells were identified by intersecting the highly active cell groups with B cells and T cells.The significantly differentially expressed genes between highly active immune cells and other cells were subsequently selected as features,and a least absolute shrinkage and selection operator(LASSO)regression model was constructed to screen for diagnostic-related features.Fourteen genes that were selected more than 5 times in 10 LASSO regression experiments were included in a multivariable Cox regression model.Finally,3 genes(stathmin 1,cofilin 1,and C-C chemokine ligand 5)significantly associated with survival were identified and used to construct an immune-related gene signature.RESULTS The immune-related gene signature composed of stathmin 1,cofilin 1,and C-C chemokine ligand 5 was identified through cell-cell communication.The effectiveness of the identified gene signature was validated based on experi-mental results of predictive immunotherapy response,tumor mutation burden analysis,immune cell infiltration analysis,survival analysis,and expression analysis.CONCLUSION The findings suggest that the identified gene signature may contribute to a deeper understanding of the activity patterns of immune cells in the liver tumor microenvironment,providing insights for personalized treatment strategies. 展开更多
关键词 Liver cancer Cell-cell communication Gene signature PROGNOSIS IMMUNotherAPY Single-cell RNA sequencing
下载PDF
Age of Information for Short-Packet Covert Communication with Time Modulated Retrodirective Array
10
作者 Ma Yue Ma Ruiqian +4 位作者 Lin Zhi Yang Weiwei Cai Yueming Miao Chen Wu Wen 《China Communications》 SCIE CSCD 2024年第4期23-37,共15页
In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retro... In this paper,the covert age of information(CAoI),which characterizes the timeliness and covertness performance of communication,is first investigated in the short-packet covert communication with time modulated retrodirective array(TMRDA).Specifically,the TMRDA is designed to maximize the antenna gain in the target direction while the side lobe is sufficiently suppressed.On this basis,the covertness constraint and CAoI are derived in closed form.To facilitate the covert transmission design,the transmit power and block-length are jointly optimized to minimize the CAoI,which demonstrates the trade-off between covertness and timelessness.Our results illustrate that there exists an optimal block-length that yields the minimum CAoI,and the presented optimization results can achieve enhanced performance compared with the fixed block-length case.Additionally,we observe that smaller beam pointing error at Bob leads to improvements in CAoI. 展开更多
关键词 age of information covert communication retrodirective array time modulation
下载PDF
Reference-frame-independent quantum key distribution with two-way classical communication
11
作者 Chun Zhou Hai-Tao Wang +9 位作者 Yi-Fei Lu Xiao-Lei Jiang Yan-Mei Zhao Yu Zhou Yang Wang Jia-Ji Li Yan-Yang Zhou Xiang Wang Hong-Wei Li Wan-Su Bao 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第10期146-152,共7页
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In... The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest. 展开更多
关键词 quantum key distribution reference-frame-independent two-way classical communication
下载PDF
A Chinese Multi-Specialty Delphi Consensus to Optimize RAASi Usage and Hyperkalaemia Management in Patients with Chronic Kidney Disease and Heart Failure
12
作者 Ming-Hui Zhao Wei Chen +5 位作者 Hong Cheng Bi-Cheng Liu Zhi-Guo Mao Zhuang Tian Gang Xu Jing-Min Zhou 《Chinese Medical Sciences Journal》 CAS CSCD 2024年第2期79-90,共12页
Objective Variations are present in common clinical practices regarding best practice in managing hyperkalaemia(HK),there is therefore a need to establish a multi-specialty approach to optimal renin angiotension-aldos... Objective Variations are present in common clinical practices regarding best practice in managing hyperkalaemia(HK),there is therefore a need to establish a multi-specialty approach to optimal renin angiotension-aldosterone system inhibitors(RAASi)usage and HK management in patients with chronic kidney disease(CKD)&heart failure(HF).This study aimed to establish a multi-speciality approach to the optimal use of RAASi and the management of HK in patients with CKD and HF.Methods A steering expert group of cardiology and nephrology experts across China were convened to discuss challenges to HK management through a nominal group technique.The group then created a list of 41 statements for a consensus questionnaire,which was distributed for a further survey in extended panel group of cardiologists and nephrologists across China.Consensus was assessed using a modified Delphi technique,with agreement defined as"strong"(≥75%and<90%)and"very strong"(≥90%).The steering group,data collection,and analysis were aided by an independent facilitator.Results A total of 150 responses from 21 provinces across China were recruited in the survey.Respondents were comprised of an even split(n=75,50%)between cardiologists and nephrologists.All 41 statements achieved the 75%consensus agreement threshold,of which 27 statements attained very strong consensus(≥90%agreement)and 14 attained strong consensus(agreement between 75%and 90%).Conclusion Based on the agreement levels from respondents,the steering group agreed a set of recommendations intended to improve patient outcomes in the use of RAASi therapy and HK management in China. 展开更多
关键词 Sardiorenal syndrome chronic kidney failure heart failure HYPERKALEMIA multidisciplinary communication RAASi
下载PDF
A Single-Cell Landscape of Human Liver Transplantation Reveals a Pathogenic Immune Niche Associated with Early Allograft Dysfunction
13
作者 Xin Shao Zheng Wang +8 位作者 Kai Wang Xiaoyan Lu Ping Zhang Rongfang Guo Jie Liao Penghui Yang Shusen Zheng Xiao Xu Xiaohui Fan 《Engineering》 SCIE EI CAS CSCD 2024年第5期193-208,共16页
Liver transplantation(LT)is the standard therapy for individuals afflicted with end-stage liver disease.Despite notable advancements in LT technology,the incidence of early allograft dysfunction(EAD)remains a critical... Liver transplantation(LT)is the standard therapy for individuals afflicted with end-stage liver disease.Despite notable advancements in LT technology,the incidence of early allograft dysfunction(EAD)remains a critical concern,exacerbating the current organ shortage and detrimentally affecting the prognosis of recipients.Unfortunately,the perplexing hepatic heterogeneity has impeded characterization of the cellular traits and molecular events that contribute to EAD.Herein,we constructed a pioneering single-cell transcriptomic landscape of human transplanted livers derived from non-EAD and EAD patients,with 12 liver samples collected from 7 donors during the cold perfusion and portal reperfusion stages.Comparison of the 75231 cells of non-EAD and EAD patients revealed an EAD-associated immune niche comprising mucosal-associated invariant T cells,granzyme B^(+)(GZMB^(+))granzyme K^(+)(GZMK^(+))natural killer cells,and S100 calcium binding protein A12^(+)(S100A12^(+))neutrophils.Moreover,we verified this immune niche and its association with EAD occurrence in two independent cohorts.Our findings elucidate the cellular characteristics of transplanted livers and the EAD-associated pathogenic immune niche at the single-cell level,thus,offering valuable insights into EAD onset. 展开更多
关键词 Human liver transplantation Early allograft dysfunction Pathogenic immune niche Single-cell analysis Cell-cell communication
下载PDF
Task-Oriented Semantic Communication with Foundation Models
14
作者 Chen Mingkai Liu Minghao +2 位作者 Zhang Zhe Xu Zhiping Wang Lei 《China Communications》 SCIE CSCD 2024年第7期65-77,共13页
In the future development direction of the sixth generation(6G)mobile communication,several communication models are proposed to face the growing challenges of the task.The rapid development of artificial intelligence... In the future development direction of the sixth generation(6G)mobile communication,several communication models are proposed to face the growing challenges of the task.The rapid development of artificial intelligence(AI)foundation models provides significant support for efficient and intelligent communication interactions.In this paper,we propose an innovative semantic communication paradigm called task-oriented semantic communication system with foundation models.First,we segment the image by using task prompts based on the segment anything model(SAM)and contrastive language-image pretraining(CLIP).Meanwhile,we adopt Bezier curve to enhance the mask to improve the segmentation accuracy.Second,we have differentiated semantic compression and transmission approaches for segmented content.Third,we fuse different semantic information based on the conditional diffusion model to generate high-quality images that satisfy the users'specific task requirements.Finally,the experimental results show that the proposed system compresses the semantic information effectively and improves the robustness of semantic communication. 展开更多
关键词 diffusion model foundation model joint source-channel coding task-oriented semantic communication
下载PDF
Distributed Fault Estimation for Nonlinear Systems With Sensor Saturation and Deception Attacks Using Stochastic Communication Protocols
15
作者 Weiwei Sun Xinci Gao +1 位作者 Lusong Ding Xiangyu Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第8期1865-1876,共12页
This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimati... This paper is aimed at the distributed fault estimation issue associated with the potential loss of actuator efficiency for a type of discrete-time nonlinear systems with sensor saturation.For the distributed estimation structure under consideration,an estimation center is not necessary,and the estimator derives its information from itself and neighboring nodes,which fuses the state vector and the measurement vector.In an effort to cut down data conflicts in communication networks,the stochastic communication protocol(SCP)is employed so that the output signals from sensors can be selected.Additionally,a recursive security estimator scheme is created since attackers randomly inject malicious signals into the selected data.On this basis,sufficient conditions for a fault estimator with less conservatism are presented which ensure an upper bound of the estimation error covariance and the mean-square exponential boundedness of the estimating error.Finally,a numerical example is used to show the reliability and effectiveness of the considered distributed estimation algorithm. 展开更多
关键词 Actuator fault deception attacks distributed estimation sensor saturation stochastic communication protocol(SCP).
下载PDF
Multi-layer network embedding on scc-based network with motif
16
作者 Lu Sun Xiaona Li +4 位作者 Mingyue Zhang Liangtian Wan Yun Lin Xianpeng Wang Gang Xu 《Digital Communications and Networks》 SCIE CSCD 2024年第3期546-556,共11页
Interconnection of all things challenges the traditional communication methods,and Semantic Communication and Computing(SCC)will become new solutions.It is a challenging task to accurately detect,extract,and represent... Interconnection of all things challenges the traditional communication methods,and Semantic Communication and Computing(SCC)will become new solutions.It is a challenging task to accurately detect,extract,and represent semantic information in the research of SCC-based networks.In previous research,researchers usually use convolution to extract the feature information of a graph and perform the corresponding task of node classification.However,the content of semantic information is quite complex.Although graph convolutional neural networks provide an effective solution for node classification tasks,due to their limitations in representing multiple relational patterns and not recognizing and analyzing higher-order local structures,the extracted feature information is subject to varying degrees of loss.Therefore,this paper extends from a single-layer topology network to a multi-layer heterogeneous topology network.The Bidirectional Encoder Representations from Transformers(BERT)training word vector is introduced to extract the semantic features in the network,and the existing graph neural network is improved by combining the higher-order local feature module of the network model representation network.A multi-layer network embedding algorithm on SCC-based networks with motifs is proposed to complete the task of end-to-end node classification.We verify the effectiveness of the algorithm on a real multi-layer heterogeneous network. 展开更多
关键词 Semantic communication and computing Multi-layer network Graph neural network MOTIF
下载PDF
Chaotic Map-Based Authentication and Key Agreement Protocol with Low-Latency for Metasystem
17
作者 Guojun Wang Qi Liu 《Computers, Materials & Continua》 SCIE EI 2024年第3期4471-4488,共18页
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t... With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions. 展开更多
关键词 Metasystem authentication and key agreement chaotic map secure communication
下载PDF
Nonlinear Filtering With Sample-Based Approximation Under Constrained Communication:Progress, Insights and Trends
18
作者 Weihao Song Zidong Wang +2 位作者 Zhongkui Li Jianan Wang Qing-Long Han 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第7期1539-1556,共18页
The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical significance.The main objective of nonlinear filt... The nonlinear filtering problem has enduringly been an active research topic in both academia and industry due to its ever-growing theoretical importance and practical significance.The main objective of nonlinear filtering is to infer the states of a nonlinear dynamical system of interest based on the available noisy measurements. In recent years, the advance of network communication technology has not only popularized the networked systems with apparent advantages in terms of installation,cost and maintenance, but also brought about a series of challenges to the design of nonlinear filtering algorithms, among which the communication constraint has been recognized as a dominating concern. In this context, a great number of investigations have been launched towards the networked nonlinear filtering problem with communication constraints, and many samplebased nonlinear filters have been developed to deal with the highly nonlinear and/or non-Gaussian scenarios. The aim of this paper is to provide a timely survey about the recent advances on the sample-based networked nonlinear filtering problem from the perspective of communication constraints. More specifically, we first review three important families of sample-based filtering methods known as the unscented Kalman filter, particle filter,and maximum correntropy filter. Then, the latest developments are surveyed with stress on the topics regarding incomplete/imperfect information, limited resources and cyber security.Finally, several challenges and open problems are highlighted to shed some lights on the possible trends of future research in this realm. 展开更多
关键词 Communication constraints maximum correntropy filter networked nonlinear filtering particle filter sample-based approximation unscented Kalman filter
下载PDF
Physical Layer Security of 6G Vehicular Networks with UAV Systems:First Order Secrecy Metrics,Optimization,and Bounds
19
作者 Sagar Kavaiya Hiren Mewada +3 位作者 Sagarkumar Patel Dharmendra Chauhan Faris A.Almalki Hana Mohammed Mujlid 《Computers, Materials & Continua》 SCIE EI 2024年第9期3685-3711,共27页
The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundes... The mobility and connective capabilities of unmanned aerial vehicles(UAVs)are becoming more and more important in defense,commercial,and research domains.However,their open communication makes UAVs susceptible toundesirablepassive attacks suchas eavesdroppingor jamming.Recently,the inefficiencyof traditional cryptography-based techniques has led to the addition of Physical Layer Security(PLS).This study focuses on the advanced PLS method for passive eavesdropping in UAV-aided vehicular environments,proposing a solution to complement the conventional cryptography approach.Initially,we present a performance analysis of first-order secrecy metrics in 6G-enabled UAV systems,namely hybrid outage probability(HOP)and secrecy outage probability(SOP)over 2×2 Nakagami-m channels.Later,we propose a novel technique for mitigating passive eavesdropping,which considers first-order secrecy metrics as an optimization problem and determines their lower and upper bounds.Finally,we conduct an analysis of bounded HOP and SOP using the interactive Nakagami-m channel,considering the multiple-input-multiple-output configuration of the UAV system.The findings indicate that 2×2 Nakagami-mis a suitable fadingmodel under constant velocity for trustworthy receivers and eavesdroppers.The results indicate that UAV mobility has some influence on an eavesdropper’s intrusion during line-of-sight-enabled communication and can play an important role in improving security against passive eavesdroppers. 展开更多
关键词 Physical layer security 3D positioning 6G communications UAV systems
下载PDF
Dynamic Event-Triggered Consensus Control for Input Constrained Multi-Agent Systems With a Designable Minimum Inter-Event Time
20
作者 Meilin Li Yue Long +2 位作者 Tieshan Li Hongjing Liang C.L.Philip Chen 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第3期649-660,共12页
This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynami... This paper investigates the consensus control of multi-agent systems(MASs) with constrained input using the dynamic event-triggered mechanism(ETM).Consider the MASs with small-scale networks where a centralized dynamic ETM with global information of the MASs is first designed.Then,a distributed dynamic ETM which only uses local information is developed for the MASs with large-scale networks.It is shown that the semi-global consensus of the MASs can be achieved by the designed bounded control protocol where the Zeno phenomenon is eliminated by a designable minimum inter-event time.In addition,it is easier to find a trade-off between the convergence rate and the minimum inter-event time by an adjustable parameter.Furthermore,the results are extended to regional consensus of the MASs with the bounded control protocol.Numerical simulations show the effectiveness of the proposed approach. 展开更多
关键词 Constrained input designable minimum inter-event time directed communication topology dynamic event-triggered mechanism MASs consensus control
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部