In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge...In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.展开更多
Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightene...Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.展开更多
Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management....Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.展开更多
This paper improves the modeling method for the device with characteristic family presented by L. O. Chua (1977) and results in the one-dimensional fluctuating canonical piecewise-linear model. It is an efficient mode...This paper improves the modeling method for the device with characteristic family presented by L. O. Chua (1977) and results in the one-dimensional fluctuating canonical piecewise-linear model. It is an efficient model. The algorithm for canonical piecewise-linear dynamic networks with one dimensional fluctuating model is discussed in detail.展开更多
The diversity of software and hardware forces programmers to spend a great deal of time optimizing their source code,which often requires specific treatment for each platform.The problem becomes critical on embedded d...The diversity of software and hardware forces programmers to spend a great deal of time optimizing their source code,which often requires specific treatment for each platform.The problem becomes critical on embedded devices,where computational and memory resources are strictly constrained.Compilers play an essential role in deploying source code on a target device through the backend.In this work,a novel backend for the Open Neural Network Compiler(ONNC)is proposed,which exploits machine learning to optimize code for the ARM Cortex-M device.The backend requires minimal changes to Open Neural Network Exchange(ONNX)models.Several novel optimization techniques are also incorporated in the backend,such as quantizing the ONNX model’s weight and automatically tuning the dimensions of operators in computations.The performance of the proposed framework is evaluated for two applications:handwritten digit recognition on the Modified National Institute of Standards and Technology(MNIST)dataset and model,and image classification on the Canadian Institute For Advanced Research and 10(CIFAR-10)dataset with the AlexNet-Light model.The system achieves 98.90%and 90.55%accuracy for handwritten digit recognition and image classification,respectively.Furthermore,the proposed architecture is significantly more lightweight than other state-of-theart models in terms of both computation time and generated source code complexity.From the system perspective,this work provides a novel approach to deploying direct computations from the available ONNX models to target devices by optimizing compilers while maintaining high efficiency in accuracy performance.展开更多
An amorphous,colorless,and highly transparent star network polymer with a pentaerythritol core linking four PEG-block polymeric arms was synthesized from the poly(ethylene glycol)(PEG),pentaerythritol,and dichlorometh...An amorphous,colorless,and highly transparent star network polymer with a pentaerythritol core linking four PEG-block polymeric arms was synthesized from the poly(ethylene glycol)(PEG),pentaerythritol,and dichloromethane by Williamson reaction.FTIR and ~1H-NMR measurement demonstrated that the polymer repeating units were C[CH_2-OCH_2O-(CH_2CH_2O)_m-CH_2O-(CH_2CH_2O)_n-CH_2O]_4.The polymer host held well mechanical properties for pentaerythritol cross-linking.The gel polymer electrolytes based on Lithium pe...展开更多
First, the paper analyzes the advantages and disadvantages of all kinds of reactive power compensation technology, and then proposes a principle and integrated control strategy of the composite operation of TSC and SV...First, the paper analyzes the advantages and disadvantages of all kinds of reactive power compensation technology, and then proposes a principle and integrated control strategy of the composite operation of TSC and SVG, also the paper designs and develops the main controller of Network based composite power quality regulation device, based on RTDS, the real-time digital simulation model of The Device is established, and finally the prototype of the device is developed with the function of filter and split-phase compensation. The main controller determines the cooperative operation of both TSC and SVG, and the switching strategy of TSC. The simulation result in RTDS can verify the precision of the measure system and the validity of the control logic, the prototype has finished the type test according to the national standard.展开更多
5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and ...5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.展开更多
Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in emb...Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in embedded devices.Data processed by embedded devices,such as smartphones and wearables,are usually personalized,so the DNN model trained on public data sets may have poor accuracy when inferring the personalized data.As a result,retraining DNN with personalized data collected locally in embedded devices is necessary.Nevertheless,retraining needs labeled data sets,while the data collected locally are unlabeled,then how to retrain DNN with unlabeled data is a problem to be solved.This paper proves the necessity of retraining DNN model with personalized data collected in embedded devices after trained with public data sets.It also proposes a label generation method by which a fake label is generated for each unlabeled training case according to users’feedback,thus retraining can be performed with unlabeled data collected in embedded devices.The experimental results show that our fake label generation method has both good training effects and wide applicability.The advanced neural networks can be trained with unlabeled data from embedded devices and the individualized accuracy of the DNN model can be gradually improved along with personal using.展开更多
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilizati...The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. However, as buffer size decreases, the packet delivery decreases proportionally.展开更多
In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine...In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great progress.However,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions.In this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese network.It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus.Then,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage.Finally,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability manually.We evaluate the accuracy,robustness,scalability and vulnerability search capability of firmVulSeeker.Results show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.展开更多
Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general func...Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server functions, client functions and a database table. The software can make it convenient to monitoring a network device, and improve network efficiency.展开更多
The fifth generation(5G) of mobile communications are facing big challenges, due to the proliferation of diversified terminals and unprecedented services such as internet of things(IoT), high-definition videos, virtua...The fifth generation(5G) of mobile communications are facing big challenges, due to the proliferation of diversified terminals and unprecedented services such as internet of things(IoT), high-definition videos, virtual/augmented reality(VR/AR). To accommodate massive connections and astonish mobile traffic, an efficient 5G transport network is required. Optical transport network has been demonstrated to play an important role for carrying 5G radio signals. This paper focuses on the future challenges, recent studies and potential solutions for the 5G flexible optical transport networks with the performances on large-capacity, low-latency and high-efficiency. In addition, we discuss the technology development trends of the 5G transport networks in terms of the optical device, optical transport system, optical switching, and optical networking. Finally, we conclude the paper with the improvement of network intelligence enabled by these technologies to deterministic content delivery over 5G optical transport networks.展开更多
In the energy regulation based varibable-speed electrohydraulic drive system, the supply energy and the demanded energy, which will affect the control performance greatly, are crucial. However, they are hard to be obt...In the energy regulation based varibable-speed electrohydraulic drive system, the supply energy and the demanded energy, which will affect the control performance greatly, are crucial. However, they are hard to be obtained via conventional methods for some reasons. This paper tries to a new route: the definitive numerical values of the supply energy and the demanded energy are not required, except for their relationship which is called energy state. A three-layer back propagation(BP) neural network was built up to act as an energy analysis unit to deduce the energy state. The neural network has three inputs: the reference displacement, the actual displacement of cylinder rod and the system flowrate supply. The output of the neural network is energy state. A Chebyshev type II filter was designed to calculate the cylinder speed for the estimation of system flowrate supply. The training and testing samples of neural network were collected by the system accurate simulation model. After off-line training, the neural network was tested by the testing data. And the testing result demonstrates that the designed neural network was successful. Then, the neural network acts as the energy analysis unit in real-time experiments of cylinder position control, where it works efficiently under square-wave and sine-wave reference displacement. The experimental results validate its feasibility and adaptability. Only a position sensor and some pressure sensors, which are cheap and have quick dynamic response, are necessary for the system control. And the neural network plays the role of identifying the energy state.展开更多
This paper presents an automatic system of vehicle number-plate recognition based on neural networks. In this system, location of number-plate and recognition of characters in number-plate can be automatically complet...This paper presents an automatic system of vehicle number-plate recognition based on neural networks. In this system, location of number-plate and recognition of characters in number-plate can be automatically completed. Pixel colors of Number-plate area are classified using neural network, then color features are extracted by analyzing scanning lines of the cross-section of number-plate. It takes full use of number-plate color features to locate number-plate. Characters in number-plate can be effectively recognized using the neural networks. Experimental results show that the correct rate of number-plate location is close to 100%, and the time of number-plate location is less than 1 second. Moreover, recognition rate of characters is improved due to the known number-plate type. It is also observed that this system is not sensitive to variations of weather, illumination and vehicle speed. In addition, and also the size of number-plate need not to be known in prior. This system is of crucial significance to apply and spread the automatic system of vehicle number-plate recognition.展开更多
Digital surveillance systems are ubiquitous and continuously generate massive amounts of data,and manual monitoring is required in order to recognise human activities in public areas.Intelligent surveillance systems t...Digital surveillance systems are ubiquitous and continuously generate massive amounts of data,and manual monitoring is required in order to recognise human activities in public areas.Intelligent surveillance systems that can automatically identify normal and abnormal activities are highly desirable,as these would allow for efficient monitoring by selecting only those camera feeds in which abnormal activities are occurring.This paper proposes an energy-efficient camera prioritisation framework that intelligently adjusts the priority of cameras in a vast surveillance network using feedback from the activity recognition system.The proposed system addresses the limitations of existing manual monitoring surveillance systems using a three-step framework.In the first step,the salient frames are selected from the online video stream using a frame differencing method.A lightweight 3D convolutional neural network(3DCNN)architecture is applied to extract spatio-temporal features from the salient frames in the second step.Finally,the probabilities predicted by the 3DCNN network and the metadata of the cameras are processed using a linear threshold gate sigmoid mechanism to control the priority of the camera.The proposed system performs well compared to state-of-theart violent activity recognition methods in terms of efficient camera prioritisation in large-scale surveillance networks.Comprehensive experiments and an evaluation of activity recognition and camera prioritisation showed that our approach achieved an accuracy of 98%with an F1-score of 0.97 on the Hockey Fight dataset,and an accuracy of 99%with an F1-score of 0.98 on the Violent Crowd dataset.展开更多
In the vision of the incoming 5G era,billions of people as well as trillions of ma chines are expected to be connected by the next generation mobile network.However,functions of massive communication devices have been...In the vision of the incoming 5G era,billions of people as well as trillions of ma chines are expected to be connected by the next generation mobile network.However,functions of massive communication devices have been substantially limited by insufficient power supply.As an efficient solution,dedicated RF sig nals are capable of carrying wellcontrolled energy towards the rechargeable devices in order to achieve ondemand energy transfer.Although RF signals are capable of simulta neously carrying both data and energy,diverse requirements of data and energy trans fers pose huge challenges in their effective integration.For example,the energy receiver and the data receiver have diverse sensitivity to the received power.The received power as low as-80 dBm is sufficient for recovering contaminated packets,thanks to thestate oftheart channel encoding/decoding techniques.However,only when the received pow er is higher than-20 dBm,the energy reception circuit can be effectively activated for converting a fraction of the energy carried by RF signals to the direct current(DC).展开更多
To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robu...To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement.展开更多
文摘In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study.
基金The financial support from the Program for Science and Technology of Henan Province of China(Grant No.242102210148)Henan Center for Outstanding Overseas Scientists(Grant No.GZS2022011)Songshan Laboratory Pre-Research Project(Grant No.YYJC032022022).
文摘Intelligent electronic devices(IEDs)are interconnected via communication networks and play pivotal roles in transmitting grid-related operational data and executing control instructions.In the context of the heightened security challenges within smart grids,IEDs pose significant risks due to inherent hardware and software vulner-abilities,as well as the openness and vulnerability of communication protocols.Smart grid security,distinct from traditional internet security,mainly relies on monitoring network security events at the platform layer,lacking an effective assessment mechanism for IEDs.Hence,we incorporate considerations for both cyber-attacks and physical faults,presenting security assessment indicators and methods specifically tailored for IEDs.Initially,we outline the security monitoring technology for IEDs,considering the necessary data sources for their security assessment.Subsequently,we classify IEDs and establish a comprehensive security monitoring index system,incorporating factors such as running states,network traffic,and abnormal behaviors.This index system contains 18 indicators in 3 categories.Additionally,we elucidate quantitative methods for various indicators and propose a hybrid security assessment method known as GRCW-hybrid,combining grey relational analysis(GRA),analytic hierarchy process(AHP),and entropy weight method(EWM).According to the proposed assessment method,the security risk level of IEDs can be graded into 6 levels,namely 0,1,2,3,4,and 5.The higher the level,the greater the security risk.Finally,we assess and simulate 15 scenarios in 3 categories,which are based on monitoring indicators and real-world situations encountered by IEDs.The results show that calculated security risk level based on the proposed assessment method are consistent with actual simulation.Thus,the reasonableness and effectiveness of the proposed index system and assessment method are validated.
文摘Edge devices in Internet of Things(IoT)applications can form peers to communicate in peer-to-peer(P2P)networks over P2P protocols.Using P2P networks ensures scalability and removes the need for centralized management.However,due to the open nature of P2P networks,they often suffer from the existence of malicious peers,especially malicious peers that unite in groups to raise each other’s ratings.This compromises users’safety and makes them lose their confidence about the files or services they are receiving.To address these challenges,we propose a neural networkbased algorithm,which uses the advantages of a machine learning algorithm to identify whether or not a peer is malicious.In this paper,a neural network(NN)was chosen as the machine learning algorithm due to its efficiency in classification.The experiments showed that the NNTrust algorithm is more effective and has a higher potential of reducing the number of invalid files and increasing success rates than other well-known trust management systems.
基金Supported by National Natural Science Foundation of China
文摘This paper improves the modeling method for the device with characteristic family presented by L. O. Chua (1977) and results in the one-dimensional fluctuating canonical piecewise-linear model. It is an efficient model. The algorithm for canonical piecewise-linear dynamic networks with one dimensional fluctuating model is discussed in detail.
基金This work was supported in part by the Ministry of Science and Technology of Taiwan,R.O.C.,the Grant Number of project 108-2218-E-194-007.
文摘The diversity of software and hardware forces programmers to spend a great deal of time optimizing their source code,which often requires specific treatment for each platform.The problem becomes critical on embedded devices,where computational and memory resources are strictly constrained.Compilers play an essential role in deploying source code on a target device through the backend.In this work,a novel backend for the Open Neural Network Compiler(ONNC)is proposed,which exploits machine learning to optimize code for the ARM Cortex-M device.The backend requires minimal changes to Open Neural Network Exchange(ONNX)models.Several novel optimization techniques are also incorporated in the backend,such as quantizing the ONNX model’s weight and automatically tuning the dimensions of operators in computations.The performance of the proposed framework is evaluated for two applications:handwritten digit recognition on the Modified National Institute of Standards and Technology(MNIST)dataset and model,and image classification on the Canadian Institute For Advanced Research and 10(CIFAR-10)dataset with the AlexNet-Light model.The system achieves 98.90%and 90.55%accuracy for handwritten digit recognition and image classification,respectively.Furthermore,the proposed architecture is significantly more lightweight than other state-of-theart models in terms of both computation time and generated source code complexity.From the system perspective,this work provides a novel approach to deploying direct computations from the available ONNX models to target devices by optimizing compilers while maintaining high efficiency in accuracy performance.
文摘An amorphous,colorless,and highly transparent star network polymer with a pentaerythritol core linking four PEG-block polymeric arms was synthesized from the poly(ethylene glycol)(PEG),pentaerythritol,and dichloromethane by Williamson reaction.FTIR and ~1H-NMR measurement demonstrated that the polymer repeating units were C[CH_2-OCH_2O-(CH_2CH_2O)_m-CH_2O-(CH_2CH_2O)_n-CH_2O]_4.The polymer host held well mechanical properties for pentaerythritol cross-linking.The gel polymer electrolytes based on Lithium pe...
文摘First, the paper analyzes the advantages and disadvantages of all kinds of reactive power compensation technology, and then proposes a principle and integrated control strategy of the composite operation of TSC and SVG, also the paper designs and develops the main controller of Network based composite power quality regulation device, based on RTDS, the real-time digital simulation model of The Device is established, and finally the prototype of the device is developed with the function of filter and split-phase compensation. The main controller determines the cooperative operation of both TSC and SVG, and the switching strategy of TSC. The simulation result in RTDS can verify the precision of the measure system and the validity of the control logic, the prototype has finished the type test according to the national standard.
文摘5G is a new generation of mobile networking that aims to achieve unparalleled speed and performance. To accomplish this, three technologies, Device-to-Device communication (D2D), multi-access edge computing (MEC) and network function virtualization (NFV) with ClickOS, have been a significant part of 5G, and this paper mainly discusses them. D2D enables direct communication between devices without the relay of base station. In 5G, a two-tier cellular network composed of traditional cellular network system and D2D is an efficient method for realizing high-speed communication. MEC unloads work from end devices and clouds platforms to widespread nodes, and connects the nodes together with outside devices and third-party providers, in order to diminish the overloading effect on any device caused by enormous applications and improve users’ quality of experience (QoE). There is also a NFV method in order to fulfill the 5G requirements. In this part, an optimized virtual machine for middle-boxes named ClickOS is introduced, and it is evaluated in several aspects. Some middle boxes are being implemented in the ClickOS and proved to have outstanding performances.
基金supported by the National Natural Science Foundation of China under Grants No.61534002,No.61761136015,No.61701095.
文摘Because of computational complexity,the deep neural network(DNN)in embedded devices is usually trained on high-performance computers or graphic processing units(GPUs),and only the inference phase is implemented in embedded devices.Data processed by embedded devices,such as smartphones and wearables,are usually personalized,so the DNN model trained on public data sets may have poor accuracy when inferring the personalized data.As a result,retraining DNN with personalized data collected locally in embedded devices is necessary.Nevertheless,retraining needs labeled data sets,while the data collected locally are unlabeled,then how to retrain DNN with unlabeled data is a problem to be solved.This paper proves the necessity of retraining DNN model with personalized data collected in embedded devices after trained with public data sets.It also proposes a label generation method by which a fake label is generated for each unlabeled training case according to users’feedback,thus retraining can be performed with unlabeled data collected in embedded devices.The experimental results show that our fake label generation method has both good training effects and wide applicability.The advanced neural networks can be trained with unlabeled data from embedded devices and the individualized accuracy of the DNN model can be gradually improved along with personal using.
文摘The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the automatic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. However, as buffer size decreases, the packet delivery decreases proportionally.
文摘In recent years,with the development of the natural language processing(NLP)technologies,security analyst began to use NLP directly on assembly codes which were disassembled from binary executables in order to examine binary similarity,achieved great progress.However,we found that the existing frameworks often ignored the complex internal structure of instructions and didn’t fully consider the long-term dependencies of instructions.In this paper,we propose firmVulSeeker—a vulnerability search tool for embedded firmware images,based on BERT and Siamese network.It first builds a BERT MLM task to observe and learn the semantics of different instructions in their context in a very large unlabeled binary corpus.Then,a finetune mode based on Siamese network is constructed to guide training and matching semantically similar functions using the knowledge learned from the first stage.Finally,it will use a function embedding generated from the fine-tuned model to search in the targeted corpus and find the most similar function which will be confirmed whether it’s a real vulnerability manually.We evaluate the accuracy,robustness,scalability and vulnerability search capability of firmVulSeeker.Results show that it can greatly improve the accuracy of matching semantically similar functions,and can successfully find more real vulnerabilities in real-world firmware than other tools.
文摘Effective network management software ensures networks to run credibly. In this paper we discuss the design and implementation of network device fault management based on Pure Java. It includes designs of general functions, server functions, client functions and a database table. The software can make it convenient to monitoring a network device, and improve network efficiency.
基金supported by the National Nature Science Foundation of China Projects(No.61871051,61771073)the Nature Science Foundation of Beijing project(No.4192039)
文摘The fifth generation(5G) of mobile communications are facing big challenges, due to the proliferation of diversified terminals and unprecedented services such as internet of things(IoT), high-definition videos, virtual/augmented reality(VR/AR). To accommodate massive connections and astonish mobile traffic, an efficient 5G transport network is required. Optical transport network has been demonstrated to play an important role for carrying 5G radio signals. This paper focuses on the future challenges, recent studies and potential solutions for the 5G flexible optical transport networks with the performances on large-capacity, low-latency and high-efficiency. In addition, we discuss the technology development trends of the 5G transport networks in terms of the optical device, optical transport system, optical switching, and optical networking. Finally, we conclude the paper with the improvement of network intelligence enabled by these technologies to deterministic content delivery over 5G optical transport networks.
基金supported by National Natural Science Foundation of China (Grant No. 50505042)
文摘In the energy regulation based varibable-speed electrohydraulic drive system, the supply energy and the demanded energy, which will affect the control performance greatly, are crucial. However, they are hard to be obtained via conventional methods for some reasons. This paper tries to a new route: the definitive numerical values of the supply energy and the demanded energy are not required, except for their relationship which is called energy state. A three-layer back propagation(BP) neural network was built up to act as an energy analysis unit to deduce the energy state. The neural network has three inputs: the reference displacement, the actual displacement of cylinder rod and the system flowrate supply. The output of the neural network is energy state. A Chebyshev type II filter was designed to calculate the cylinder speed for the estimation of system flowrate supply. The training and testing samples of neural network were collected by the system accurate simulation model. After off-line training, the neural network was tested by the testing data. And the testing result demonstrates that the designed neural network was successful. Then, the neural network acts as the energy analysis unit in real-time experiments of cylinder position control, where it works efficiently under square-wave and sine-wave reference displacement. The experimental results validate its feasibility and adaptability. Only a position sensor and some pressure sensors, which are cheap and have quick dynamic response, are necessary for the system control. And the neural network plays the role of identifying the energy state.
基金the Key Development Plan Project of Science and Technology (No.991p0111).
文摘This paper presents an automatic system of vehicle number-plate recognition based on neural networks. In this system, location of number-plate and recognition of characters in number-plate can be automatically completed. Pixel colors of Number-plate area are classified using neural network, then color features are extracted by analyzing scanning lines of the cross-section of number-plate. It takes full use of number-plate color features to locate number-plate. Characters in number-plate can be effectively recognized using the neural networks. Experimental results show that the correct rate of number-plate location is close to 100%, and the time of number-plate location is less than 1 second. Moreover, recognition rate of characters is improved due to the known number-plate type. It is also observed that this system is not sensitive to variations of weather, illumination and vehicle speed. In addition, and also the size of number-plate need not to be known in prior. This system is of crucial significance to apply and spread the automatic system of vehicle number-plate recognition.
基金Institute of Information&communications Technology Planning&Evaluation(IITP)grant funded by the Korea government(MSIT)(2019-0-00136,Development of AI-Convergence Technologies for Smart City Industry Productivity Innovation).
文摘Digital surveillance systems are ubiquitous and continuously generate massive amounts of data,and manual monitoring is required in order to recognise human activities in public areas.Intelligent surveillance systems that can automatically identify normal and abnormal activities are highly desirable,as these would allow for efficient monitoring by selecting only those camera feeds in which abnormal activities are occurring.This paper proposes an energy-efficient camera prioritisation framework that intelligently adjusts the priority of cameras in a vast surveillance network using feedback from the activity recognition system.The proposed system addresses the limitations of existing manual monitoring surveillance systems using a three-step framework.In the first step,the salient frames are selected from the online video stream using a frame differencing method.A lightweight 3D convolutional neural network(3DCNN)architecture is applied to extract spatio-temporal features from the salient frames in the second step.Finally,the probabilities predicted by the 3DCNN network and the metadata of the cameras are processed using a linear threshold gate sigmoid mechanism to control the priority of the camera.The proposed system performs well compared to state-of-theart violent activity recognition methods in terms of efficient camera prioritisation in large-scale surveillance networks.Comprehensive experiments and an evaluation of activity recognition and camera prioritisation showed that our approach achieved an accuracy of 98%with an F1-score of 0.97 on the Hockey Fight dataset,and an accuracy of 99%with an F1-score of 0.98 on the Violent Crowd dataset.
文摘In the vision of the incoming 5G era,billions of people as well as trillions of ma chines are expected to be connected by the next generation mobile network.However,functions of massive communication devices have been substantially limited by insufficient power supply.As an efficient solution,dedicated RF sig nals are capable of carrying wellcontrolled energy towards the rechargeable devices in order to achieve ondemand energy transfer.Although RF signals are capable of simulta neously carrying both data and energy,diverse requirements of data and energy trans fers pose huge challenges in their effective integration.For example,the energy receiver and the data receiver have diverse sensitivity to the received power.The received power as low as-80 dBm is sufficient for recovering contaminated packets,thanks to thestate oftheart channel encoding/decoding techniques.However,only when the received pow er is higher than-20 dBm,the energy reception circuit can be effectively activated for converting a fraction of the energy carried by RF signals to the direct current(DC).
基金The National Key Research and Development Program of China(No.2018YFB1802400)the National Natural Science Foundation of China(No.61571123)the Research Fund of National M obile Communications Research Laboratory,Southeast University(No.2020A03)
文摘To solve the problem of variations in radio frequency characteristics among different devices,transfer learning is applied to transform device diversity to domain adaptation in the indoor localization algorithm.A robust indoor localization algorithm based on the aligned fingerprints and ensemble learning called correlation alignment for localization(CALoc)is proposed with low computational complexity.The second-order statistical properties of fingerprints in the offline and online phase are needed to be aligned.The real-time online calibration method mitigates the impact of device heterogeneity largely.Without any time-consuming deep learning retraining process,CALoc online only needs 0.11 s.The effectiveness and efficiency of CALoc are verified by realistic experiments.The results show that compared to the traditional algorithms,a significant performance gain is achieved and that it achieves better positioning accuracy with a 19%improvement.