Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN t...Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article.展开更多
While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization ...While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage.展开更多
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio...The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.展开更多
Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the ...Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the AMR method of radiation source signals based on two-dimensional data matrix and improved residual neural network is proposed in this paper.First,the time series of the radiation source signals are reconstructed into two-dimensional data matrix,which greatly simplifies the signal preprocessing process.Second,the depthwise convolution and large-size convolutional kernels based residual neural network(DLRNet)is proposed to improve the feature extraction capability of the AMR model.Finally,the model performs feature extraction and classification on the two-dimensional data matrix to obtain the recognition vector that represents the signal modulation type.Theoretical analysis and simulation results show that the AMR method based on two-dimensional data matrix and improved residual network can significantly improve the accuracy of the AMR method.The recognition accuracy of the proposed method maintains a high level greater than 90% even at -14 dB SNR.展开更多
Efficiency is an important factor in quantitative and qualitative analysis of radionuclides, and the gamma point source efficiency is related to the radial angle,detection distance, and gamma-ray energy. In this work,...Efficiency is an important factor in quantitative and qualitative analysis of radionuclides, and the gamma point source efficiency is related to the radial angle,detection distance, and gamma-ray energy. In this work, on the basis of a back-propagation(BP) neural network model,a method to determine the gamma point source efficiency is developed and validated. The efficiency of the point sources ^(137)Cs and ^(60)Co at discrete radial angles, detection distances, and gamma-ray energies is measured, and the BP neural network prediction model is constructed using MATLAB. The gamma point source efficiencies at different radial angles, detection distances, and gamma-ray energies are predicted quickly and accurately using this nonlinear prediction model. The results show that the maximum error between the predicted and experimental values is 3.732% at 661.661 keV, 11π/24, and 35 cm, and those under other conditions are less than 3%. The gamma point source efficiencies obtained using the BP neural network model are in good agreement with experimental data.展开更多
A method based on multiple images captured under different light sources at different incident angles was developed to recognize the coal density range in this study.The innovation is that two new images were construc...A method based on multiple images captured under different light sources at different incident angles was developed to recognize the coal density range in this study.The innovation is that two new images were constructed based on images captured under four single light sources.Reconstruction image 1 was constructed by fusing greyscale versions of the original images into one image,and Reconstruction image2 was constructed based on the differences between the images captured under the different light sources.Subsequently,the four original images and two reconstructed images were input into the convolutional neural network AlexNet to recognize the density range in three cases:-1.5(clean coal) and+1.5 g/cm^(3)(non-clean coal);-1.8(non-gangue) and+1.8 g/cm^(3)(gangue);-1.5(clean coal),1.5-1.8(middlings),and+1.8 g/cm^(3)(gangue).The results show the following:(1) The reconstructed images,especially Reconstruction image 2,can effectively improve the recognition accuracy for the coal density range compared with images captured under single light source.(2) The recognition accuracies for gangue and non-gangue,clean coal and non-clean coal,and clean coal,middlings,and gangue reached88.44%,86.72% and 77.08%,respectively.(3) The recognition accuracy increases as the density moves further away from the boundary density.展开更多
The widespread availability of digital multimedia data has led to a new challenge in digital forensics.Traditional source camera identification algorithms usually rely on various traces in the capturing process.Howeve...The widespread availability of digital multimedia data has led to a new challenge in digital forensics.Traditional source camera identification algorithms usually rely on various traces in the capturing process.However,these traces have become increasingly difficult to extract due to wide availability of various image processing algorithms.Convolutional Neural Networks(CNN)-based algorithms have demonstrated good discriminative capabilities for different brands and even different models of camera devices.However,their performances is not ideal in case of distinguishing between individual devices of the same model,because cameras of the same model typically use the same optical lens,image sensor,and image processing algorithms,that result in minimal overall differences.In this paper,we propose a camera forensics algorithm based on multi-scale feature fusion to address these issues.The proposed algorithm extracts different local features from feature maps of different scales and then fuses them to obtain a comprehensive feature representation.This representation is then fed into a subsequent camera fingerprint classification network.Building upon the Swin-T network,we utilize Transformer Blocks and Graph Convolutional Network(GCN)modules to fuse multi-scale features from different stages of the backbone network.Furthermore,we conduct experiments on established datasets to demonstrate the feasibility and effectiveness of the proposed approach.展开更多
The groundwater system is often polluted by different sources of contamination where the sources are difficult to detect. The presence of contamination in groundwater poses significant challenges to its delineation an...The groundwater system is often polluted by different sources of contamination where the sources are difficult to detect. The presence of contamination in groundwater poses significant challenges to its delineation and quantification. The remediation of a contaminated site requires an optimal decision making system to identify the pollutant source characteristics accurately and efficiently. The source characteristics are generally identified using contaminant concentration measurements from arbitrary or planned monitoring locations. To effectively characterize the sources of pollution, the monitoring locations should be selected appropriately. An efficient monitoring network will result in satisfactory characterization of contaminant sources. On the other hand, an appropriate design of monitoring network requires reliable source characteristics. A coupled iterative sequential source identification and dynamic monitoring network design, improves substantially the accuracy of source identification model. This paper reviews different source identification and monitoring network design methods in groundwater contaminant sites. Further, the models for sequential integration of these two models are presented. The effective integration of source identification and dedicated monitoring network design models, distributed sources, parameter uncertainty, and pollutant geo-chemistry are some of the issues which need to be addressed in efficient, accurate and widely applicable methodologies for identification of unknown pollutant sources in contaminated aquifers.展开更多
A new methodology was proposed for contamination source identification using information provided by consumer complaints from a probabilistic view.Due to the high uncertainties of information derived from users,the ob...A new methodology was proposed for contamination source identification using information provided by consumer complaints from a probabilistic view.Due to the high uncertainties of information derived from users,the objective of the proposed methodology doesn't aim to capture a unique solution,but to minimize the number of possible contamination sources.In the proposed methodology,all the possible pollution nodes are identified through the CSA methodology firstly.And then based on the principle of total probability formula,the probability of each possible contamination node is obtained through a series of calculation.According to magnitude of the probability,the number of possible pollution nodes is minimized.The effectiveness and feasibility of the methodology is demonstrated through an application to a real case of ZJ City.Four scenarios were designed to investigate the influence of different uncertainties on the results in this case.The results show that pollutant concentration,injection duration,the number of consumer complaints nodes used for calculation and the prior probability with which consumers would complaint have no particular effect on the identification of contamination source.Three nodes were selected as the most possible pollution sources in water pipe network of ZJ City which includes more than 3 000 nodes.The results show the potential of the proposed method to identify contamination source through consumer complaints.展开更多
A multipath source self repair routing (MSSRR) algorithm for mobile ad hoc networks is proposed. By using multiple paths which can be repaired by themselves to transmit packets alternately, the network's load is b...A multipath source self repair routing (MSSRR) algorithm for mobile ad hoc networks is proposed. By using multiple paths which can be repaired by themselves to transmit packets alternately, the network's load is balanced, the link state in the network can be checked in time, the number of the times the route discovery mechanism starts is decreased. If only one route which will be broken can be used to transmit the packets, the route discovery mechanism is restarted.The algorithm is implemented on the basis of dynamic source routing (DSR). The effect of MSSRR on lifetime of the access from the source to the destination and the overhead is discussed. Compared with the performance of DSR,it can be seen that the algorithm can improve the performance of the network obviously and the overhead almost does not increase if the average hop count is larger.展开更多
The penetration of new energy sources such as wind power is increasing,which consequently increases the occurrence rate of subsynchronous oscillation events.However,existing subsynchronous oscillation source-identific...The penetration of new energy sources such as wind power is increasing,which consequently increases the occurrence rate of subsynchronous oscillation events.However,existing subsynchronous oscillation source-identification methods primarily analyze fixed-mode oscillations and rarely consider time-varying features,such as frequency drift,caused by the random volatility of wind farms when oscillations occur.This paper proposes a subsynchronous oscillation sourcelocalization method that involves an enhanced short-time Fourier transform and a convolutional neural network(CNN).First,an enhanced STFT is performed to secure high-resolution time-frequency distribution(TFD)images from the measured data of the generation unit ports.Next,these TFD images are amalgamated to form a subsynchronous oscillation feature map that serves as input to the CNN to train the localization model.Ultimately,the trained CNN model realizes the online localization of subsynchronous oscillation sources.The effectiveness and accuracy of the proposed method are validated via multimachine system models simulating forced and natural oscillation events using the Power Systems Computer Aided Design platform.Test results show that the proposed method can localize subsynchronous oscillation sources online while considering unpredictable fluctuations in wind farms,thus providing a foundation for oscillation suppression in practical engineering scenarios.展开更多
We propose a novel source recovery algorithm for underdetermined blind source separation, which can result in better accuracy and lower computational cost. On the basis of the model of underdetermined blind source sep...We propose a novel source recovery algorithm for underdetermined blind source separation, which can result in better accuracy and lower computational cost. On the basis of the model of underdetermined blind source separation, the artificial neural network with single-layer perceptron is introduced into the proposed algorithm. Source signals are regarded as the weight vector of single-layer perceptron, and approximate ι~0-norm is taken into account for output error decision rule of the perceptron, which leads to the sparse recovery. Then the procedure of source recovery is adjusting the weight vector of the perceptron. What's more, the optimal learning factor is calculated and a descent sequence of smoothed parameter is used during iteration, which improves the performance and significantly decreases computational complexity of the proposed algorithm. The simulation results reveal that the algorithm proposed can recover the source signal with high precision, while it requires lower computational cost.展开更多
The majority of academic researchers present the results of their scientific activity on the Web. This trace can be used to derive useful information of their past, present activity and forecast the future intentions....The majority of academic researchers present the results of their scientific activity on the Web. This trace can be used to derive useful information of their past, present activity and forecast the future intentions. Hence, social network of academic researchers can be of important value for scientific community. This information can be retrieved from various data source currently available on the Web. From each of them a separate net-work can be built. In this paper we present a method which can be used to combine multiple single-relational networks into a single network which will combine all relations, hence it will be multi-relational.展开更多
Microphone array-based sound source localization(SSL)is a challenging task in adverse acoustic scenarios.To address this,a novel SSL algorithm based on deep neural network(DNN)using steered response power-phase transf...Microphone array-based sound source localization(SSL)is a challenging task in adverse acoustic scenarios.To address this,a novel SSL algorithm based on deep neural network(DNN)using steered response power-phase transform(SRP-PHAT)spatial spectrum as input feature is presented in this paper.Since the SRP-PHAT spatial power spectrum contains spatial location information,it is adopted as the input feature for sound source localization.DNN is exploited to extract the efficient location information from SRP-PHAT spatial power spectrum due to its advantage on extracting high-level features.SRP-PHAT at each steering position within a frame is arranged into a vector,which is treated as DNN input.A DNN model which can map the SRP-PHAT spatial spectrum to the azimuth of sound source is learned from the training signals.The azimuth of sound source is estimated through trained DNN model from the testing signals.Experiment results demonstrate that the proposed algorithm significantly improves localization performance whether the training and testing condition setup are the same or not,and is more robust to noise and reverberation.展开更多
This paper examines the effect of the observation time on source identification of a discrete-time susceptible-infectedrecovered diffusion process in a network with snapshot of partial nodes.We formulate the source id...This paper examines the effect of the observation time on source identification of a discrete-time susceptible-infectedrecovered diffusion process in a network with snapshot of partial nodes.We formulate the source identification problem as a maximum likelihood(ML)estimator and develop a statistical inference method based on Monte Carlo simulation(MCS)to estimate the source location and the initial time of diffusion.Experimental results in synthetic networks and real-world networks demonstrate evident impact of the observation time as well as the fraction of the observers on the concerned problem.展开更多
Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic mo...Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.展开更多
A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding t...A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding to an accident.The entire surveillant field is divided into several small sub-regions.In each sub-region,the localization algorithm based on the improved particle filter(IPF) was performed to estimate the location.Some improved methods such as weighted centroid,residual resampling were introduced to the IPF algorithm to increase the localization performance.This distributed estimation method eliminates many drawbacks inherent with the traditional centralized optimization method.Simulation results show that localization algorithm is efficient for estimating the plume source location.展开更多
Microphone array-based sound source localization(SSL)is widely used in a variety of occasions such as video conferencing,robotic hearing,speech enhancement,speech recognition and so on.The traditional SSL methods cann...Microphone array-based sound source localization(SSL)is widely used in a variety of occasions such as video conferencing,robotic hearing,speech enhancement,speech recognition and so on.The traditional SSL methods cannot achieve satisfactory performance in adverse noisy and reverberant environments.In order to improve localization performance,a novel SSL algorithm using convolutional residual network(CRN)is proposed in this paper.The spatial features including time difference of arrivals(TDOAs)between microphone pairs and steered response power-phase transform(SRPPHAT)spatial spectrum are extracted in each Gammatone sub-band.The spatial features of different sub-bands with a frame are combine into a feature matrix as the input of CRN.The proposed algorithm employ CRN to fuse the spatial features.Since the CRN introduces the residual structure on the basis of the convolutional network,it reduce the difficulty of training procedure and accelerate the convergence of the model.A CRN model is learned from the training data in various reverberation and noise environments to establish the mapping regularity between the input feature and the sound azimuth.Through simulation verification,compared with the methods using traditional deep neural network,the proposed algorithm can achieve a better localization performance in SSL task,and provide better generalization capacity to untrained noise and reverberation.展开更多
Asynchronous Transfer Mode(ATM)technique is regarded as an efficient approach forthe integration of diverse types of services in Broadband Integrated Services Digital Network(B-ISDN).The Asynchronous-Time-Division(ATD...Asynchronous Transfer Mode(ATM)technique is regarded as an efficient approach forthe integration of diverse types of services in Broadband Integrated Services Digital Network(B-ISDN).The Asynchronous-Time-Division(ATD)Statistical Multiplexing and FastPacket Switching in ATM networks bring serious uncertainty to the end-to-end Cell DelayVariation(CDV)of the CBR traffic(e.g.voice,audio,CBR video,etc.)and cause troublesfor the Source Timing Recovery(STR)of CBR services.This paper discusses the originsand features of the CDV,two STR implementation methods proposed by the InternationalTelecommunication Union(ITU),and an optimal STR scheme with a Digital-to-AnalogConverter(DAC)based Phase-Locked Loop(PLL).展开更多
MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical,...MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.展开更多
基金supported by UniversitiKebangsaan Malaysia,under Dana Impak Perdana 2.0.(Ref:DIP–2022–020).
文摘Software Defined Networking(SDN)is programmable by separation of forwarding control through the centralization of the controller.The controller plays the role of the‘brain’that dictates the intelligent part of SDN technology.Various versions of SDN controllers exist as a response to the diverse demands and functions expected of them.There are several SDN controllers available in the open market besides a large number of commercial controllers;some are developed tomeet carrier-grade service levels and one of the recent trends in open-source SDN controllers is the Open Network Operating System(ONOS).This paper presents a comparative study between open source SDN controllers,which are known as Network Controller Platform(NOX),Python-based Network Controller(POX),component-based SDN framework(Ryu),Java-based OpenFlow controller(Floodlight),OpenDayLight(ODL)and ONOS.The discussion is further extended into ONOS architecture,as well as,the evolution of ONOS controllers.This article will review use cases based on ONOS controllers in several application deployments.Moreover,the opportunities and challenges of open source SDN controllers will be discussed,exploring carriergrade ONOS for future real-world deployments,ONOS unique features and identifying the suitable choice of SDN controller for service providers.In addition,we attempt to provide answers to several critical questions relating to the implications of the open-source nature of SDN controllers regarding vendor lock-in,interoperability,and standards compliance,Similarly,real-world use cases of organizations using open-source SDN are highlighted and how the open-source community contributes to the development of SDN controllers.Furthermore,challenges faced by open-source projects,and considerations when choosing an open-source SDN controller are underscored.Then the role of Artificial Intelligence(AI)and Machine Learning(ML)in the evolution of open-source SDN controllers in light of recent research is indicated.In addition,the challenges and limitations associated with deploying open-source SDN controllers in production networks,how can they be mitigated,and finally how opensource SDN controllers handle network security and ensure that network configurations and policies are robust and resilient are presented.Potential opportunities and challenges for future Open SDN deployment are outlined to conclude the article.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62103375 and 62006106)the Zhejiang Provincial Philosophy and Social Science Planning Project(Grant No.22NDJC009Z)+1 种基金the Education Ministry Humanities and Social Science Foundation of China(Grant Nos.19YJCZH056 and 21YJC630120)the Natural Science Foundation of Zhejiang Province of China(Grant Nos.LY23F030003 and LQ21F020005).
文摘While progress has been made in information source localization,it has overlooked the prevalent friend and adversarial relationships in social networks.This paper addresses this gap by focusing on source localization in signed network models.Leveraging the topological characteristics of signed networks and transforming the propagation probability into effective distance,we propose an optimization method for observer selection.Additionally,by using the reverse propagation algorithm we present a method for information source localization in signed networks.Extensive experimental results demonstrate that a higher proportion of positive edges within signed networks contributes to more favorable source localization,and the higher the ratio of propagation rates between positive and negative edges,the more accurate the source localization becomes.Interestingly,this aligns with our observation that,in reality,the number of friends tends to be greater than the number of adversaries,and the likelihood of information propagation among friends is often higher than among adversaries.In addition,the source located at the periphery of the network is not easy to identify.Furthermore,our proposed observer selection method based on effective distance achieves higher operational efficiency and exhibits higher accuracy in information source localization,compared with three strategies for observer selection based on the classical full-order neighbor coverage.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.62103375,62006106,61877055,and 62171413)the Philosophy and Social Science Planning Project of Zhejinag Province,China(Grant No.22NDJC009Z)+1 种基金the Education Ministry Humanities and Social Science Foundation of China(Grant No.19YJCZH056)the Natural Science Foundation of Zhejiang Province,China(Grant Nos.LY23F030003,LY22F030006,and LQ21F020005).
文摘The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2.
基金National Natural Science Foundation of China under Grant No.61973037China Postdoctoral Science Foundation under Grant No.2022M720419。
文摘Automatic modulation recognition(AMR)of radiation source signals is a research focus in the field of cognitive radio.However,the AMR of radiation source signals at low SNRs still faces a great challenge.Therefore,the AMR method of radiation source signals based on two-dimensional data matrix and improved residual neural network is proposed in this paper.First,the time series of the radiation source signals are reconstructed into two-dimensional data matrix,which greatly simplifies the signal preprocessing process.Second,the depthwise convolution and large-size convolutional kernels based residual neural network(DLRNet)is proposed to improve the feature extraction capability of the AMR model.Finally,the model performs feature extraction and classification on the two-dimensional data matrix to obtain the recognition vector that represents the signal modulation type.Theoretical analysis and simulation results show that the AMR method based on two-dimensional data matrix and improved residual network can significantly improve the accuracy of the AMR method.The recognition accuracy of the proposed method maintains a high level greater than 90% even at -14 dB SNR.
基金supported by the National Natural Science Foundation of China(Nos.41374130 and 41604154)Science and Technology Program of Sichuan,China(No.2017GZ0359)+1 种基金Science and Technology Support Program of Sichuan,China(No.2015JY0007)Open Foundation for Artificial Intelligence Key Laboratory of Sichuan Province of China(No.2016RYJ08)
文摘Efficiency is an important factor in quantitative and qualitative analysis of radionuclides, and the gamma point source efficiency is related to the radial angle,detection distance, and gamma-ray energy. In this work, on the basis of a back-propagation(BP) neural network model,a method to determine the gamma point source efficiency is developed and validated. The efficiency of the point sources ^(137)Cs and ^(60)Co at discrete radial angles, detection distances, and gamma-ray energies is measured, and the BP neural network prediction model is constructed using MATLAB. The gamma point source efficiencies at different radial angles, detection distances, and gamma-ray energies are predicted quickly and accurately using this nonlinear prediction model. The results show that the maximum error between the predicted and experimental values is 3.732% at 661.661 keV, 11π/24, and 35 cm, and those under other conditions are less than 3%. The gamma point source efficiencies obtained using the BP neural network model are in good agreement with experimental data.
文摘A method based on multiple images captured under different light sources at different incident angles was developed to recognize the coal density range in this study.The innovation is that two new images were constructed based on images captured under four single light sources.Reconstruction image 1 was constructed by fusing greyscale versions of the original images into one image,and Reconstruction image2 was constructed based on the differences between the images captured under the different light sources.Subsequently,the four original images and two reconstructed images were input into the convolutional neural network AlexNet to recognize the density range in three cases:-1.5(clean coal) and+1.5 g/cm^(3)(non-clean coal);-1.8(non-gangue) and+1.8 g/cm^(3)(gangue);-1.5(clean coal),1.5-1.8(middlings),and+1.8 g/cm^(3)(gangue).The results show the following:(1) The reconstructed images,especially Reconstruction image 2,can effectively improve the recognition accuracy for the coal density range compared with images captured under single light source.(2) The recognition accuracies for gangue and non-gangue,clean coal and non-clean coal,and clean coal,middlings,and gangue reached88.44%,86.72% and 77.08%,respectively.(3) The recognition accuracy increases as the density moves further away from the boundary density.
基金This work was funded by the National Natural Science Foundation of China(Grant No.62172132)Public Welfare Technology Research Project of Zhejiang Province(Grant No.LGF21F020014)the Opening Project of Key Laboratory of Public Security Information Application Based on Big-Data Architecture,Ministry of Public Security of Zhejiang Police College(Grant No.2021DSJSYS002).
文摘The widespread availability of digital multimedia data has led to a new challenge in digital forensics.Traditional source camera identification algorithms usually rely on various traces in the capturing process.However,these traces have become increasingly difficult to extract due to wide availability of various image processing algorithms.Convolutional Neural Networks(CNN)-based algorithms have demonstrated good discriminative capabilities for different brands and even different models of camera devices.However,their performances is not ideal in case of distinguishing between individual devices of the same model,because cameras of the same model typically use the same optical lens,image sensor,and image processing algorithms,that result in minimal overall differences.In this paper,we propose a camera forensics algorithm based on multi-scale feature fusion to address these issues.The proposed algorithm extracts different local features from feature maps of different scales and then fuses them to obtain a comprehensive feature representation.This representation is then fed into a subsequent camera fingerprint classification network.Building upon the Swin-T network,we utilize Transformer Blocks and Graph Convolutional Network(GCN)modules to fuse multi-scale features from different stages of the backbone network.Furthermore,we conduct experiments on established datasets to demonstrate the feasibility and effectiveness of the proposed approach.
文摘The groundwater system is often polluted by different sources of contamination where the sources are difficult to detect. The presence of contamination in groundwater poses significant challenges to its delineation and quantification. The remediation of a contaminated site requires an optimal decision making system to identify the pollutant source characteristics accurately and efficiently. The source characteristics are generally identified using contaminant concentration measurements from arbitrary or planned monitoring locations. To effectively characterize the sources of pollution, the monitoring locations should be selected appropriately. An efficient monitoring network will result in satisfactory characterization of contaminant sources. On the other hand, an appropriate design of monitoring network requires reliable source characteristics. A coupled iterative sequential source identification and dynamic monitoring network design, improves substantially the accuracy of source identification model. This paper reviews different source identification and monitoring network design methods in groundwater contaminant sites. Further, the models for sequential integration of these two models are presented. The effective integration of source identification and dedicated monitoring network design models, distributed sources, parameter uncertainty, and pollutant geo-chemistry are some of the issues which need to be addressed in efficient, accurate and widely applicable methodologies for identification of unknown pollutant sources in contaminated aquifers.
基金Project(50908165) supported by the National Natural Science Foundation of China
文摘A new methodology was proposed for contamination source identification using information provided by consumer complaints from a probabilistic view.Due to the high uncertainties of information derived from users,the objective of the proposed methodology doesn't aim to capture a unique solution,but to minimize the number of possible contamination sources.In the proposed methodology,all the possible pollution nodes are identified through the CSA methodology firstly.And then based on the principle of total probability formula,the probability of each possible contamination node is obtained through a series of calculation.According to magnitude of the probability,the number of possible pollution nodes is minimized.The effectiveness and feasibility of the methodology is demonstrated through an application to a real case of ZJ City.Four scenarios were designed to investigate the influence of different uncertainties on the results in this case.The results show that pollutant concentration,injection duration,the number of consumer complaints nodes used for calculation and the prior probability with which consumers would complaint have no particular effect on the identification of contamination source.Three nodes were selected as the most possible pollution sources in water pipe network of ZJ City which includes more than 3 000 nodes.The results show the potential of the proposed method to identify contamination source through consumer complaints.
文摘A multipath source self repair routing (MSSRR) algorithm for mobile ad hoc networks is proposed. By using multiple paths which can be repaired by themselves to transmit packets alternately, the network's load is balanced, the link state in the network can be checked in time, the number of the times the route discovery mechanism starts is decreased. If only one route which will be broken can be used to transmit the packets, the route discovery mechanism is restarted.The algorithm is implemented on the basis of dynamic source routing (DSR). The effect of MSSRR on lifetime of the access from the source to the destination and the overhead is discussed. Compared with the performance of DSR,it can be seen that the algorithm can improve the performance of the network obviously and the overhead almost does not increase if the average hop count is larger.
基金supported by the Science and Technology Project of State Grid Corporation of China(5100202199536A-0-5-ZN)。
文摘The penetration of new energy sources such as wind power is increasing,which consequently increases the occurrence rate of subsynchronous oscillation events.However,existing subsynchronous oscillation source-identification methods primarily analyze fixed-mode oscillations and rarely consider time-varying features,such as frequency drift,caused by the random volatility of wind farms when oscillations occur.This paper proposes a subsynchronous oscillation sourcelocalization method that involves an enhanced short-time Fourier transform and a convolutional neural network(CNN).First,an enhanced STFT is performed to secure high-resolution time-frequency distribution(TFD)images from the measured data of the generation unit ports.Next,these TFD images are amalgamated to form a subsynchronous oscillation feature map that serves as input to the CNN to train the localization model.Ultimately,the trained CNN model realizes the online localization of subsynchronous oscillation sources.The effectiveness and accuracy of the proposed method are validated via multimachine system models simulating forced and natural oscillation events using the Power Systems Computer Aided Design platform.Test results show that the proposed method can localize subsynchronous oscillation sources online while considering unpredictable fluctuations in wind farms,thus providing a foundation for oscillation suppression in practical engineering scenarios.
基金supported by National Nature Science Foundation of China under Grant (61201134, 61401334)Key Research and Development Program of Shaanxi (Contract No. 2017KW-004, 2017ZDXM-GY-022)
文摘We propose a novel source recovery algorithm for underdetermined blind source separation, which can result in better accuracy and lower computational cost. On the basis of the model of underdetermined blind source separation, the artificial neural network with single-layer perceptron is introduced into the proposed algorithm. Source signals are regarded as the weight vector of single-layer perceptron, and approximate ι~0-norm is taken into account for output error decision rule of the perceptron, which leads to the sparse recovery. Then the procedure of source recovery is adjusting the weight vector of the perceptron. What's more, the optimal learning factor is calculated and a descent sequence of smoothed parameter is used during iteration, which improves the performance and significantly decreases computational complexity of the proposed algorithm. The simulation results reveal that the algorithm proposed can recover the source signal with high precision, while it requires lower computational cost.
文摘The majority of academic researchers present the results of their scientific activity on the Web. This trace can be used to derive useful information of their past, present activity and forecast the future intentions. Hence, social network of academic researchers can be of important value for scientific community. This information can be retrieved from various data source currently available on the Web. From each of them a separate net-work can be built. In this paper we present a method which can be used to combine multiple single-relational networks into a single network which will combine all relations, hence it will be multi-relational.
基金This work is supported by the National Nature Science Foundation of China(NSFC)under Grant No.61571106Jiangsu Natural Science Foundation under Grant No.BK20170757the Natural Science Foundation of the Jiangsu Higher Education Institutions of China under grant No.17KJD510002.
文摘Microphone array-based sound source localization(SSL)is a challenging task in adverse acoustic scenarios.To address this,a novel SSL algorithm based on deep neural network(DNN)using steered response power-phase transform(SRP-PHAT)spatial spectrum as input feature is presented in this paper.Since the SRP-PHAT spatial power spectrum contains spatial location information,it is adopted as the input feature for sound source localization.DNN is exploited to extract the efficient location information from SRP-PHAT spatial power spectrum due to its advantage on extracting high-level features.SRP-PHAT at each steering position within a frame is arranged into a vector,which is treated as DNN input.A DNN model which can map the SRP-PHAT spatial spectrum to the azimuth of sound source is learned from the training signals.The azimuth of sound source is estimated through trained DNN model from the testing signals.Experiment results demonstrate that the proposed algorithm significantly improves localization performance whether the training and testing condition setup are the same or not,and is more robust to noise and reverberation.
基金the National Natural Science Foundation of China(Grant Nos.61673027 and 62106047)the Beijing Social Science Foundation(Grant No.21GLC042)the Humanity and Social Science Youth foundation of Ministry of Education,China(Grant No.20YJCZH228)。
文摘This paper examines the effect of the observation time on source identification of a discrete-time susceptible-infectedrecovered diffusion process in a network with snapshot of partial nodes.We formulate the source identification problem as a maximum likelihood(ML)estimator and develop a statistical inference method based on Monte Carlo simulation(MCS)to estimate the source location and the initial time of diffusion.Experimental results in synthetic networks and real-world networks demonstrate evident impact of the observation time as well as the fraction of the observers on the concerned problem.
基金The National Natural Science Foundation ofChia(No60372076)The Important cienceand Technology Key Item of Shanghai Science and Technology Bureau ( No05dz15004)
文摘Real traffic information was analyzed in the statistical characteristics and approximated as a Gaussian time series. A data source model, called two states constant bit rate (TSCBR), was proposed in dynamic traffic monitoring sensor networks. Analysis of autocorrelation of the models shows that the proposed TSCBR model matches with the statistical characteristics of real data source closely. To further verify the validity of the TSCBR data source model, the performance metrics of power consumption and network lifetime was studied in the evaluation of sensor media access control (SMAC) algorithm. The simulation results show that compared with traditional data source models, TSCBR model can significantly improve accuracy of the algorithm evaluation.
基金National High Technology Research and Development Program of China(863Program,No.2004AA412050)
文摘A hierarchical wireless sensor networks(WSN) was proposed to estimate the plume source location.Such WSN can be of tremendous help to emergency personnel trying to protect people from terrorist attacks or responding to an accident.The entire surveillant field is divided into several small sub-regions.In each sub-region,the localization algorithm based on the improved particle filter(IPF) was performed to estimate the location.Some improved methods such as weighted centroid,residual resampling were introduced to the IPF algorithm to increase the localization performance.This distributed estimation method eliminates many drawbacks inherent with the traditional centralized optimization method.Simulation results show that localization algorithm is efficient for estimating the plume source location.
基金supported by Nature Science Research Project of Higher Education Institutions in Jiangsu Province under Grant No.21KJB510018National Nature Science Foundation of China (NSFC)under Grant No.62001215.
文摘Microphone array-based sound source localization(SSL)is widely used in a variety of occasions such as video conferencing,robotic hearing,speech enhancement,speech recognition and so on.The traditional SSL methods cannot achieve satisfactory performance in adverse noisy and reverberant environments.In order to improve localization performance,a novel SSL algorithm using convolutional residual network(CRN)is proposed in this paper.The spatial features including time difference of arrivals(TDOAs)between microphone pairs and steered response power-phase transform(SRPPHAT)spatial spectrum are extracted in each Gammatone sub-band.The spatial features of different sub-bands with a frame are combine into a feature matrix as the input of CRN.The proposed algorithm employ CRN to fuse the spatial features.Since the CRN introduces the residual structure on the basis of the convolutional network,it reduce the difficulty of training procedure and accelerate the convergence of the model.A CRN model is learned from the training data in various reverberation and noise environments to establish the mapping regularity between the input feature and the sound azimuth.Through simulation verification,compared with the methods using traditional deep neural network,the proposed algorithm can achieve a better localization performance in SSL task,and provide better generalization capacity to untrained noise and reverberation.
文摘Asynchronous Transfer Mode(ATM)technique is regarded as an efficient approach forthe integration of diverse types of services in Broadband Integrated Services Digital Network(B-ISDN).The Asynchronous-Time-Division(ATD)Statistical Multiplexing and FastPacket Switching in ATM networks bring serious uncertainty to the end-to-end Cell DelayVariation(CDV)of the CBR traffic(e.g.voice,audio,CBR video,etc.)and cause troublesfor the Source Timing Recovery(STR)of CBR services.This paper discusses the originsand features of the CDV,two STR implementation methods proposed by the InternationalTelecommunication Union(ITU),and an optimal STR scheme with a Digital-to-AnalogConverter(DAC)based Phase-Locked Loop(PLL).
文摘MORPAS is a special GIS (geographic information system) software system, based on the MAPGIS platform whose aim is to prospect and evaluate mineral resources quantificationally by synthesizing geological, geophysical, geochemical and remote sensing data. It overlays geological database management, geological background and geological abnormality analysis, image processing of remote sensing and comprehensive abnormality analysis, etc.. It puts forward an integrative solution for the application of GIS in basic-level units and the construction of information engineering in the geological field. As the popularization of computer networks and the request of data sharing, it is necessary to extend its functions in data management so that all its data files can be accessed in the network server. This paper utilizes some MAPGIS functions for the second development and ADO (access data object) technique to access multi-source geological data in SQL Server databases. Then remote visiting and congruous management will be realized in the MORPAS system.