We investigate a periodically driven Haldane model subjected to a two-stage driving scheme in the form of a step function.By using the Floquet theory,we obtain the topological phase diagram of the system.We also find ...We investigate a periodically driven Haldane model subjected to a two-stage driving scheme in the form of a step function.By using the Floquet theory,we obtain the topological phase diagram of the system.We also find that anomalous Floquet topological phases exist in the system.Focusing on examining the quench dynamics among topological phases,we analyze the site distribution of the 0-mode and p-mode edge states in long-period evolution after a quench.The results demonstrate that,under certain conditions,the site distribution of the 0-mode can be confined at the edge even in long-period evolution.Additionally,both the 0-mode and p-mode can recover and become confined at the edge in long-period evolution when the post-quench parameters(T,M_(2) /M_(1))in the phase diagram cross away from the phase boundary (M_(2)/ M_(1))=(6√3t2)/ (M_(1)−1.Furthermore,we conclude that whether the edge state is confined at the edge in the long-period evolution after a quench depends on the similarity of the edge states before and after the quench.Our findings reveal some new characteristics of quench dynamics in a periodically driven system.展开更多
The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number i...The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number in millimeter wave system,the multi-task deep residual shrinkage network(MTDRSN) and transfer learning-based convolutional neural network(TCNN), namely MDTCNet, are proposed. The sampling covariance matrix based on the received signal is used as the input to the proposed network. A DRSN-based multi-task classifications model is first introduced to estimate signal sources number and multipath number simultaneously. Then, the DoAs with multi-signal and multipath are estimated by the regression model. The proposed CNN is applied for DoAs estimation with the predicted number of signal sources and paths. Furthermore, the modelbased transfer learning is also introduced into the regression model. The TCNN inherits the partial network parameters of the already formed optimization model obtained by the CNN. A series of experimental results show that the MDTCNet-based DoAs estimation method can accurately predict the signal sources number and multipath number under a range of signal-to-noise ratios. Remarkably, the proposed method achieves the lower root mean square error compared with some existing deep learning-based and traditional methods.展开更多
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power...UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.展开更多
We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by va...We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by varying the s-wave scattering length in two ways,the cosine and the square-wave modulations.It is found that as the driving frequency increases,the Floquet spectrum exhibits two main features for both modulations,the accumulating and the spreading of the quasienergy levels,which further lead to different dynamical behaviors.The accumulation is associated with collective excitations and the persistent growth of the energy,while the spread indicates that the energy is bounded at all times.The initial scattering length,the driving frequency and amplitude can all significantly change the Floquet spectrum as well as the dynamics.However,the corresponding relation between them is valid universally.Finally,we propose a mechanism for selectively exciting the system to one specific state by using the avoided crossing of two quasienergy levels,which could guide preparation of a desired state in experiments.展开更多
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal ...Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.展开更多
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap...Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.展开更多
As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and...As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and optical properties,research on mechanical aspects is limited.This article builds a vacancyordered double perovskite model,employing first-principles calculations to analyze mechanical,bonding,electronic,and optical properties.Results show Cs_(2)Hfl_(6),Cs_(2)SnBr_(6),Cs_(2)SnI_(6),and Cs_(2)PtBr_(6)have Young's moduli below 13 GPa,indicating flexibility.Geometric parameters explain flexibility variations with the changes of B and X site composition.Bonding characteristic exploration reveals the influence of B and X site electronegativity on mechanical strength.Cs_(2)SnBr_(6)and Cs_(2)PtBr_(6)are suitable for solar cells,while Cs_(2)HfI_(6)and Cs_(2)TiCl_(6)show potential for semi-transparent solar cells.Optical property calculations highlight the high light absorption coefficients of up to 3.5×10^(5) cm^(-1)for Cs_(2)HfI_(6)and Cs_(2)TiCl_(6).Solar cell simulation shows Cs_(2)PtBr_(6)achieves 22.4%of conversion effciency.Cs_(2)ZrCl_(6)holds promise for ionizing radiation detection with its 3.68 eV bandgap and high absorption coefficient.Vacancy-ordered double perovskites offer superior flexibility,providing valuable insights for designing stable and flexible devices.This understanding enhances the development of functional devices based on these perovskites,especially for applications requiring high stability and flexibility.展开更多
Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to ...Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.展开更多
In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A...In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.展开更多
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio...The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.展开更多
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat...In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.展开更多
By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The ...By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage.In this paper,we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy.Based on the above method,we implement a detection tool-BArcherFuzzer to detect vulnerabilities of Android native system services.The experiment results show that BArcherFuzzer found four vulnerabilities of hundreds of exception messages,all of them were confirmed by Google and one was assigned a Common Vulnerabilities and Exposures(CVE)number(CVE-2020-0363).展开更多
With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmi...With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmission and the computing requirements of intelligent tasks lead to the complex resource management problems.In view of the above challenges,this paper proposes a tasks-oriented joint resource allocation scheme(TOJRAS)in the scenario of Io V.First,this paper proposes a system model with sensing,communication,and computing integration for multiple intelligent tasks with different requirements in the Io V.Secondly,joint resource allocation problems for real-time tasks and delay-tolerant tasks in the Io V are constructed respectively,including communication,computing and caching resources.Thirdly,a distributed deep Q-network(DDQN)based algorithm is proposed to solve the optimization problems,and the convergence and complexity of the algorithm are discussed.Finally,the experimental results based on real data sets verify the performance advantages of the proposed resource allocation scheme,compared to the existing ones.The exploration efficiency of our proposed DDQN-based algorithm is improved by at least about 5%,and our proposed resource allocation scheme improves the m AP performance by about 0.15 under resource constraints.展开更多
Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising te...Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines.展开更多
The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback s...The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback system is accelerated.In the business model,the scenes to realize interactive functions are constantly enriched.This paper reviews the evolution process of AIGC,closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education,analyzes the application of AIGC education in 7 subdivided fields,and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix.The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.展开更多
Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including p...Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including poor flexibility of network architecture,low adaptability to dynamic environments,the lack of network intelligence,and low resource utilization.To handle these challenges,a Software defined Intelligent STN(SISTN)architecture is introduced.Specifically,the hierarchical architecture of the proposal is described and a distributed deployment scheme for SISTNs controllers is proposed to realize agile and effective network management and control.Moreover,three use cases in SISTNs are discussed.Meanwhile,key techniques and their corresponding solutions are presented,followed by the identification of several open issues in SISTNs including compatibility with existing networks,the tradeoff between network flexibility and performance,and so on.展开更多
To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computi...To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.展开更多
The whole-beach quality assessment is the basis of building and preserving beautiful beaches.The beach quality assessment index system and assessment standard have been established based on the attributes of beaches(i...The whole-beach quality assessment is the basis of building and preserving beautiful beaches.The beach quality assessment index system and assessment standard have been established based on the attributes of beaches(including the width,slope,landform,and types),sorting coefficient,and softness degree of surface sediment.The assessment weight of each index for quality evaluation was analyzed using the analytic hierarchy process,and comprehensive scores of selected beach profiles were calculated in accordance with the light assessment standard.A beach quality evaluation model based on index weight and scores was established in this paper.The factors of 12 profiles of Yangkou Beach in Qingdao City were surveyed to carry out a quality assessment,and the comprehensive scores of each profile were calculated in accordance with the evaluation model.The results showed that the quality of Yangkou Beach can be divided into four ratings:excellent,good,medium,and poor.The excellent-quality area includes a wide and flat dry beach zone and soft,flat,and clean intertidal and subtidal zones covered with well-sorted fine sand,and leisure sports,such as volleyball,running,and swimming,are suitable for tourists.The good-quality area features a slightly narrow and dry beach zone,moderately soft and uneven intertidal and subtidal zones covered with fine sand and a small tidal gully,and a small amount of foreign matter;leisure sports,such as walking and running,are suitable for tourists.This study recommends the building of fixed drainage ditches or underground culverts to reduce the tidal gully.The medium-quality area consisted of a narrow and dry beach zone,moderately soft and uneven intertidal and subtidal zones covered by poorly sorted medium sand,a tide ditch,and a small amount of foreign matter.In this area,walking is suitable for tourists.Sand should be supplemented in the intertidal zone.The poor-quality area contained a very narrow and dry beach zone covered with poor-sorted gravel,a very chaotic intertidal zone with a considerable amount of foreign matters,such as bricks and rocks,wide tidal ditches,and an uneven subtidal zone with some reefs;leisure sports are unsuitable here.Thus,foreign matter and reefs should be removed,and the dry beach zone should be supplemented with sand.Therefore,the beach quality assessment is a very useful tool for building beautiful beaches.展开更多
Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead...Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.展开更多
Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO sate...Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface(IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation(JIRPB) optimization algorithm for improving LEO satellite system throughput.The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the nonconvex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method(ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly.Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput.展开更多
基金the National Natural Science Foundation of China(Grant No.12004049).
文摘We investigate a periodically driven Haldane model subjected to a two-stage driving scheme in the form of a step function.By using the Floquet theory,we obtain the topological phase diagram of the system.We also find that anomalous Floquet topological phases exist in the system.Focusing on examining the quench dynamics among topological phases,we analyze the site distribution of the 0-mode and p-mode edge states in long-period evolution after a quench.The results demonstrate that,under certain conditions,the site distribution of the 0-mode can be confined at the edge even in long-period evolution.Additionally,both the 0-mode and p-mode can recover and become confined at the edge in long-period evolution when the post-quench parameters(T,M_(2) /M_(1))in the phase diagram cross away from the phase boundary (M_(2)/ M_(1))=(6√3t2)/ (M_(1)−1.Furthermore,we conclude that whether the edge state is confined at the edge in the long-period evolution after a quench depends on the similarity of the edge states before and after the quench.Our findings reveal some new characteristics of quench dynamics in a periodically driven system.
基金funded by Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center。
文摘The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number in millimeter wave system,the multi-task deep residual shrinkage network(MTDRSN) and transfer learning-based convolutional neural network(TCNN), namely MDTCNet, are proposed. The sampling covariance matrix based on the received signal is used as the input to the proposed network. A DRSN-based multi-task classifications model is first introduced to estimate signal sources number and multipath number simultaneously. Then, the DoAs with multi-signal and multipath are estimated by the regression model. The proposed CNN is applied for DoAs estimation with the predicted number of signal sources and paths. Furthermore, the modelbased transfer learning is also introduced into the regression model. The TCNN inherits the partial network parameters of the already formed optimization model obtained by the CNN. A series of experimental results show that the MDTCNet-based DoAs estimation method can accurately predict the signal sources number and multipath number under a range of signal-to-noise ratios. Remarkably, the proposed method achieves the lower root mean square error compared with some existing deep learning-based and traditional methods.
基金supported by National Natural Science Foundation of China (No.62001135)the Joint funds for Regional Innovation and Development of the National Natural Science Foundation of China(No.U21A20449)the Beijing Natural Science Foundation Haidian Original Innovation Joint Fund (No.L232002)
文摘UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.
基金supported by the National Natural Science Foundation of China(Grant No.12004049)the Fund of State Key Laboratory of IPOC(BUPT)(Grant Nos.600119525 and 505019124).
文摘We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by varying the s-wave scattering length in two ways,the cosine and the square-wave modulations.It is found that as the driving frequency increases,the Floquet spectrum exhibits two main features for both modulations,the accumulating and the spreading of the quasienergy levels,which further lead to different dynamical behaviors.The accumulation is associated with collective excitations and the persistent growth of the energy,while the spread indicates that the energy is bounded at all times.The initial scattering length,the driving frequency and amplitude can all significantly change the Floquet spectrum as well as the dynamics.However,the corresponding relation between them is valid universally.Finally,we propose a mechanism for selectively exciting the system to one specific state by using the avoided crossing of two quasienergy levels,which could guide preparation of a desired state in experiments.
基金supported by National Key Research and Development Program of China(2018YFC1504502).
文摘Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62371082 and 62001076in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX0726 and cstc2020jcyjmsxmX0878.
文摘Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.
基金supported by the National Natural Science Foundation of China(62305261,62305262)the Natural Science Foundation of Shaanxi Province(2024JC-YBMS-021,2024JC-YBMS-788,2023-JC-YB-065,2023-JC-QN-0693,2022JQ-652)+1 种基金the Xi’an Science and Technology Bureau of University Service Enterprise Project(23GXFW0043)the Cross disciplinary Research and Cultivation Project of Xi’an University of Architecture and Technology(2023JCPY-17)。
文摘As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and optical properties,research on mechanical aspects is limited.This article builds a vacancyordered double perovskite model,employing first-principles calculations to analyze mechanical,bonding,electronic,and optical properties.Results show Cs_(2)Hfl_(6),Cs_(2)SnBr_(6),Cs_(2)SnI_(6),and Cs_(2)PtBr_(6)have Young's moduli below 13 GPa,indicating flexibility.Geometric parameters explain flexibility variations with the changes of B and X site composition.Bonding characteristic exploration reveals the influence of B and X site electronegativity on mechanical strength.Cs_(2)SnBr_(6)and Cs_(2)PtBr_(6)are suitable for solar cells,while Cs_(2)HfI_(6)and Cs_(2)TiCl_(6)show potential for semi-transparent solar cells.Optical property calculations highlight the high light absorption coefficients of up to 3.5×10^(5) cm^(-1)for Cs_(2)HfI_(6)and Cs_(2)TiCl_(6).Solar cell simulation shows Cs_(2)PtBr_(6)achieves 22.4%of conversion effciency.Cs_(2)ZrCl_(6)holds promise for ionizing radiation detection with its 3.68 eV bandgap and high absorption coefficient.Vacancy-ordered double perovskites offer superior flexibility,providing valuable insights for designing stable and flexible devices.This understanding enhances the development of functional devices based on these perovskites,especially for applications requiring high stability and flexibility.
基金supported by the National Natural Science Foundation of China(No.62001045)Beijing Municipal Natural Science Foundation(No.4214059)+1 种基金Fund of State Key Laboratory of IPOC(BUPT)(No.IPOC2021ZT17)Fundamental Research Funds for the Central Universities(No.2022RC09).
文摘Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.
基金This work is partly supported by the National Key Research and Development Program of China(Grant No.2020YFB1805403)the National Natural Science Foundation of China(Grant No.62032002)the 111 Project(Grant No.B21049).
文摘In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.
基金supported by National Key RD Program of China(Grant No.2022YFB3104402,the Research on Digital Identity Trust System for Massive Heterogeneous Terminals in Road Traffic System)the Fundamental Research Funds for the Central Universities(Grant Nos.3282023015,3282023035,3282023051)National First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute(No.3201012).
文摘The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.
基金supported by Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004).
文摘In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.
基金This work was supported by the National Key R&D Program of China(2023YFB3106800)the National Natural Science Foundation of China(Grant No.62072051).We are overwhelmed in all humbleness and gratefulness to acknowledge my depth to all those who have helped me to put these ideas.
文摘By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage.In this paper,we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy.Based on the above method,we implement a detection tool-BArcherFuzzer to detect vulnerabilities of Android native system services.The experiment results show that BArcherFuzzer found four vulnerabilities of hundreds of exception messages,all of them were confirmed by Google and one was assigned a Common Vulnerabilities and Exposures(CVE)number(CVE-2020-0363).
基金supported by The Fundamental Research Funds for the Central Universities(No.2021XD-A01-1)The National Natural Science Foundation of China(No.92067202)。
文摘With the development of artificial intelligence(AI)and 5G technology,the integration of sensing,communication and computing in the Internet of Vehicles(Io V)is becoming a trend.However,the large amount of data transmission and the computing requirements of intelligent tasks lead to the complex resource management problems.In view of the above challenges,this paper proposes a tasks-oriented joint resource allocation scheme(TOJRAS)in the scenario of Io V.First,this paper proposes a system model with sensing,communication,and computing integration for multiple intelligent tasks with different requirements in the Io V.Secondly,joint resource allocation problems for real-time tasks and delay-tolerant tasks in the Io V are constructed respectively,including communication,computing and caching resources.Thirdly,a distributed deep Q-network(DDQN)based algorithm is proposed to solve the optimization problems,and the convergence and complexity of the algorithm are discussed.Finally,the experimental results based on real data sets verify the performance advantages of the proposed resource allocation scheme,compared to the existing ones.The exploration efficiency of our proposed DDQN-based algorithm is improved by at least about 5%,and our proposed resource allocation scheme improves the m AP performance by about 0.15 under resource constraints.
基金supported by the National Natural Science Foundation of China under Grant No.61971057。
文摘Heterogeneous base station deployment enables to provide high capacity and wide area coverage.Network slicing makes it possible to allocate wireless resource for heterogeneous services on demand.These two promising technologies contribute to the unprecedented service in 5G.We establish a multiservice heterogeneous network model,which aims to raise the transmission rate under the delay constraints for active control terminals,and optimize the energy efficiency for passive network terminals.A policygradient-based deep reinforcement learning algorithm is proposed to make decisions on user association and power control in the continuous action space.Simulation results indicate the good convergence of the algorithm,and higher reward is obtained compared with other baselines.
基金supported by a grant from 2022 National Natural Science Foundation of China project“Research on key technology of generalization of human-computer collaborative learning ability based on domain adaptation algorithm”.(No.62277002)。
文摘The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback system is accelerated.In the business model,the scenes to realize interactive functions are constantly enriched.This paper reviews the evolution process of AIGC,closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education,analyzes the application of AIGC education in 7 subdivided fields,and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix.The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.
基金This work was supported in part by the National Key Research and Development Program of China under Grant 2020YFB1806703in part by the National Natural Science Foundation of China under Grant 62001053,Grant 61831002,and Grant 61925101in part by Young Elite Scientist Sponsorship Program by China Institute of Communications,and in part by the BUPT Excellent Ph.D.Students Foundation under Grant CX2020106.
文摘Satellite-Terrestrial integrated Networks(STNs)have been advocated by both academia and industry as a promising network paradigm to achieve service continuity and ubiquity.However,STNs suffer from problems including poor flexibility of network architecture,low adaptability to dynamic environments,the lack of network intelligence,and low resource utilization.To handle these challenges,a Software defined Intelligent STN(SISTN)architecture is introduced.Specifically,the hierarchical architecture of the proposal is described and a distributed deployment scheme for SISTNs controllers is proposed to realize agile and effective network management and control.Moreover,three use cases in SISTNs are discussed.Meanwhile,key techniques and their corresponding solutions are presented,followed by the identification of several open issues in SISTNs including compatibility with existing networks,the tradeoff between network flexibility and performance,and so on.
基金jointly supported by the Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Centerthe National Key Research and Development Program of China under Grant 2021YFB2900200the National Natural Science Foundation of China under Grant 62201073 and 61925101。
文摘To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.
基金supported by the Intercollegiate Cooperation Plan of Innovation and Entrepreneurship Training Program for College Students of Beijing City(No.202211012).
文摘The whole-beach quality assessment is the basis of building and preserving beautiful beaches.The beach quality assessment index system and assessment standard have been established based on the attributes of beaches(including the width,slope,landform,and types),sorting coefficient,and softness degree of surface sediment.The assessment weight of each index for quality evaluation was analyzed using the analytic hierarchy process,and comprehensive scores of selected beach profiles were calculated in accordance with the light assessment standard.A beach quality evaluation model based on index weight and scores was established in this paper.The factors of 12 profiles of Yangkou Beach in Qingdao City were surveyed to carry out a quality assessment,and the comprehensive scores of each profile were calculated in accordance with the evaluation model.The results showed that the quality of Yangkou Beach can be divided into four ratings:excellent,good,medium,and poor.The excellent-quality area includes a wide and flat dry beach zone and soft,flat,and clean intertidal and subtidal zones covered with well-sorted fine sand,and leisure sports,such as volleyball,running,and swimming,are suitable for tourists.The good-quality area features a slightly narrow and dry beach zone,moderately soft and uneven intertidal and subtidal zones covered with fine sand and a small tidal gully,and a small amount of foreign matter;leisure sports,such as walking and running,are suitable for tourists.This study recommends the building of fixed drainage ditches or underground culverts to reduce the tidal gully.The medium-quality area consisted of a narrow and dry beach zone,moderately soft and uneven intertidal and subtidal zones covered by poorly sorted medium sand,a tide ditch,and a small amount of foreign matter.In this area,walking is suitable for tourists.Sand should be supplemented in the intertidal zone.The poor-quality area contained a very narrow and dry beach zone covered with poor-sorted gravel,a very chaotic intertidal zone with a considerable amount of foreign matters,such as bricks and rocks,wide tidal ditches,and an uneven subtidal zone with some reefs;leisure sports are unsuitable here.Thus,foreign matter and reefs should be removed,and the dry beach zone should be supplemented with sand.Therefore,the beach quality assessment is a very useful tool for building beautiful beaches.
基金supported by the National Natural Science Foundation of China(NSFC)under Grant 62071179.
文摘Although Federated Deep Learning(FDL)enables distributed machine learning in the Internet of Vehicles(IoV),it requires multiple clients to upload model parameters,thus still existing unavoidable communication overhead and data privacy risks.The recently proposed Swarm Learning(SL)provides a decentralized machine learning approach for unit edge computing and blockchain-based coordination.A Swarm-Federated Deep Learning framework in the IoV system(IoV-SFDL)that integrates SL into the FDL framework is proposed in this paper.The IoV-SFDL organizes vehicles to generate local SL models with adjacent vehicles based on the blockchain empowered SL,then aggregates the global FDL model among different SL groups with a credibility weights prediction algorithm.Extensive experimental results show that compared with the baseline frameworks,the proposed IoV-SFDL framework reduces the overhead of client-to-server communication by 16.72%,while the model performance improves by about 5.02%for the same training iterations.
基金supported by the National Key R&D Program of China under Grant 2020YFB1807900the National Natural Science Foundation of China (NSFC) under Grant 61931005Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center。
文摘Lower Earth Orbit(LEO) satellite becomes an important part of complementing terrestrial communication due to its lower orbital altitude and smaller propagation delay than Geostationary satellite. However, the LEO satellite communication system cannot meet the requirements of users when the satellite-terrestrial link is blocked by obstacles. To solve this problem, we introduce Intelligent reflect surface(IRS) for improving the achievable rate of terrestrial users in LEO satellite communication. We investigated joint IRS scheduling, user scheduling, power and bandwidth allocation(JIRPB) optimization algorithm for improving LEO satellite system throughput.The optimization problem of joint user scheduling and resource allocation is formulated as a non-convex optimization problem. To cope with this problem, the nonconvex optimization problem is divided into resource allocation optimization sub-problem and scheduling optimization sub-problem firstly. Second, we optimize the resource allocation sub-problem via alternating direction multiplier method(ADMM) and scheduling sub-problem via Lagrangian dual method repeatedly.Third, we prove that the proposed resource allocation algorithm based ADMM approaches sublinear convergence theoretically. Finally, we demonstrate that the proposed JIRPB optimization algorithm improves the LEO satellite communication system throughput.