In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.A...In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.展开更多
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat...In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.展开更多
The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number i...The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number in millimeter wave system,the multi-task deep residual shrinkage network(MTDRSN) and transfer learning-based convolutional neural network(TCNN), namely MDTCNet, are proposed. The sampling covariance matrix based on the received signal is used as the input to the proposed network. A DRSN-based multi-task classifications model is first introduced to estimate signal sources number and multipath number simultaneously. Then, the DoAs with multi-signal and multipath are estimated by the regression model. The proposed CNN is applied for DoAs estimation with the predicted number of signal sources and paths. Furthermore, the modelbased transfer learning is also introduced into the regression model. The TCNN inherits the partial network parameters of the already formed optimization model obtained by the CNN. A series of experimental results show that the MDTCNet-based DoAs estimation method can accurately predict the signal sources number and multipath number under a range of signal-to-noise ratios. Remarkably, the proposed method achieves the lower root mean square error compared with some existing deep learning-based and traditional methods.展开更多
UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power...UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.展开更多
We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by va...We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by varying the s-wave scattering length in two ways,the cosine and the square-wave modulations.It is found that as the driving frequency increases,the Floquet spectrum exhibits two main features for both modulations,the accumulating and the spreading of the quasienergy levels,which further lead to different dynamical behaviors.The accumulation is associated with collective excitations and the persistent growth of the energy,while the spread indicates that the energy is bounded at all times.The initial scattering length,the driving frequency and amplitude can all significantly change the Floquet spectrum as well as the dynamics.However,the corresponding relation between them is valid universally.Finally,we propose a mechanism for selectively exciting the system to one specific state by using the avoided crossing of two quasienergy levels,which could guide preparation of a desired state in experiments.展开更多
To improve the bit error rate(BER)performance of multi-user signal detection in satelliteterrestrial downlink non-orthogonal multiple access(NOMA)systems,an iterative signal detection algorithm based on soft interfere...To improve the bit error rate(BER)performance of multi-user signal detection in satelliteterrestrial downlink non-orthogonal multiple access(NOMA)systems,an iterative signal detection algorithm based on soft interference cancellation with optimal power allocation is proposed.Given that power allocation has a significant impact on BER performance,the optimal power allocation is obtained by minimizing the average BER of NOMA users.According to the allocated powers,successive interference cancellation(SIC)between NOMA users is performed in descending power order.For each user,an iterative soft interference cancellation is performed,and soft symbol probabilities are calculated for soft decision.To improve detection accuracy and without increasing the complexity,the aforementioned algorithm is optimized by adding minimum mean square error(MMSE)signal estimation before detection,and in each iteration soft symbol probabilities are utilized for soft-decision of the current user and also for the update of soft interference of the previous user.Simulation results illustrate that the optimized algorithm i.e.MMSE-IDBSIC significantly outperforms joint multi-user detection and SIC detection by 7.57dB and 8.03dB in terms of BER performance.展开更多
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform...Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.展开更多
In this paper,a statistical cluster-based simulation channel model with a finite number of sinusoids is proposed for depicting the multiple-input multiple-output(MIMO)communications in vehicleto-everything(V2X)environ...In this paper,a statistical cluster-based simulation channel model with a finite number of sinusoids is proposed for depicting the multiple-input multiple-output(MIMO)communications in vehicleto-everything(V2X)environments.In the proposed sum-of-sinusoids(SoS)channel model,the waves that emerge from the transmitter undergo line-of-sight(LoS)and non-line-of-sight(NLoS)propagation to the receiver,which makes the model suitable for describing numerous V2X wireless communication scenarios for sixth-generation(6G).We derive expressions for the real and imaginary parts of the complex channel impulse response(CIR),which characterize the physical propagation characteristics of V2X wireless channels.The statistical properties of the real and imaginary parts of the complex CIRs,i.e.,autocorrelation functions(ACFs),Doppler power spectral densities(PSDs),cross-correlation functions(CCFs),and variances of ACFs and CCFs,are derived and discussed.Simulation results are generated and match those predicted by the underlying theory,demonstrating the accuracy of our derivation and analysis.The proposed framework and underlying theory arise as an efficient tool to investigate the statistical properties of 6G MIMO V2X communication systems.展开更多
Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal ...Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.展开更多
Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this pap...Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.展开更多
As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and...As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and optical properties,research on mechanical aspects is limited.This article builds a vacancyordered double perovskite model,employing first-principles calculations to analyze mechanical,bonding,electronic,and optical properties.Results show Cs_(2)Hfl_(6),Cs_(2)SnBr_(6),Cs_(2)SnI_(6),and Cs_(2)PtBr_(6)have Young's moduli below 13 GPa,indicating flexibility.Geometric parameters explain flexibility variations with the changes of B and X site composition.Bonding characteristic exploration reveals the influence of B and X site electronegativity on mechanical strength.Cs_(2)SnBr_(6)and Cs_(2)PtBr_(6)are suitable for solar cells,while Cs_(2)HfI_(6)and Cs_(2)TiCl_(6)show potential for semi-transparent solar cells.Optical property calculations highlight the high light absorption coefficients of up to 3.5×10^(5) cm^(-1)for Cs_(2)HfI_(6)and Cs_(2)TiCl_(6).Solar cell simulation shows Cs_(2)PtBr_(6)achieves 22.4%of conversion effciency.Cs_(2)ZrCl_(6)holds promise for ionizing radiation detection with its 3.68 eV bandgap and high absorption coefficient.Vacancy-ordered double perovskites offer superior flexibility,providing valuable insights for designing stable and flexible devices.This understanding enhances the development of functional devices based on these perovskites,especially for applications requiring high stability and flexibility.展开更多
Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to ...Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.展开更多
The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections an...The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms.展开更多
The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback s...The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback system is accelerated.In the business model,the scenes to realize interactive functions are constantly enriched.This paper reviews the evolution process of AIGC,closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education,analyzes the application of AIGC education in 7 subdivided fields,and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix.The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.展开更多
The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functio...The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.展开更多
Lee–Yang theory clearly demonstrates where the phase transition of many-body systems occurs and the asymptotic behavior near the phase transition using the partition function under complex parameters. The complex par...Lee–Yang theory clearly demonstrates where the phase transition of many-body systems occurs and the asymptotic behavior near the phase transition using the partition function under complex parameters. The complex parameters make the direct investigation of Lee–Yang theory in practical systems challenging. Here we construct a non-Hermitian quantum system that can correspond to the one-dimensional Ising model with imaginary parameters through the equality of partition functions. By adjusting the non-Hermitian parameter,we successfully obtain the partition function under different imaginary magnetic fields and observe the Lee–Yang zeros. We also observe the critical behavior of free energy in vicinity of Lee–Yang zero that is consistent with theoretical prediction. Our work provides a protocol to study Lee–Yang zeros of the one-dimensional Ising model using a single-qubit non-Hermitian system.展开更多
To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computi...To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.展开更多
Integrated sensing and communication(ISAC)technology is a promising candidate for next-generation communication systems.However,severe co-site interference in existing ISAC systems limits the communication and sensing...Integrated sensing and communication(ISAC)technology is a promising candidate for next-generation communication systems.However,severe co-site interference in existing ISAC systems limits the communication and sensing performance,posing significant challenges for ISAC interference management.In this work,we propose a novel interference management scheme based on the normalized least mean square(NLMS)algorithm,which mitigates the impact of co-site interference by reconstructing the interference from the local transmitter and canceling it from the received signal.Simulation results demonstrate that,compared to typical adaptive interference management schemes based on recursive least square(RLS)and stochastic gradient descent(SGD)algorithms,the proposed NLMS algorithm effectively cancels co-site interference and achieves a good balance between computational complexity and convergence performance.展开更多
By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The ...By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage.In this paper,we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy.Based on the above method,we implement a detection tool-BArcherFuzzer to detect vulnerabilities of Android native system services.The experiment results show that BArcherFuzzer found four vulnerabilities of hundreds of exception messages,all of them were confirmed by Google and one was assigned a Common Vulnerabilities and Exposures(CVE)number(CVE-2020-0363).展开更多
Smart energy monitoring and management system lays a foundation for the application and development of smart energy. However, in recent years, the work efficiency of smart energy development enterprises has generally ...Smart energy monitoring and management system lays a foundation for the application and development of smart energy. However, in recent years, the work efficiency of smart energy development enterprises has generally been low, and there is an urgent need to improve the application efficiency, resilience and sustainability of smart energy monitoring and management system. Digital twin technology provides a data-centric solution to improve smart energy monitoring and management system, bringing an opportunity to transform passive infrastructure assets into data-centric systems. This paper expounds on the concept and key technologies of digital twin, and designs a smart energy monitoring and management system based on digital twin technology, which has dual significance for promoting the development of smart energy field and promoting the application of digital twin.展开更多
基金This work is partly supported by the National Key Research and Development Program of China(Grant No.2020YFB1805403)the National Natural Science Foundation of China(Grant No.62032002)the 111 Project(Grant No.B21049).
文摘In the Industrial Internet of Things(IIoT),sensors generate time series data to reflect the working state.When the systems are attacked,timely identification of outliers in time series is critical to ensure security.Although many anomaly detection methods have been proposed,the temporal correlation of the time series over the same sensor and the state(spatial)correlation between different sensors are rarely considered simultaneously in these methods.Owing to the superior capability of Transformer in learning time series features.This paper proposes a time series anomaly detection method based on a spatial-temporal network and an improved Transformer.Additionally,the methods based on graph neural networks typically include a graph structure learning module and an anomaly detection module,which are interdependent.However,in the initial phase of training,since neither of the modules has reached an optimal state,their performance may influence each other.This scenario makes the end-to-end training approach hard to effectively direct the learning trajectory of each module.This interdependence between the modules,coupled with the initial instability,may cause the model to find it hard to find the optimal solution during the training process,resulting in unsatisfactory results.We introduce an adaptive graph structure learning method to obtain the optimal model parameters and graph structure.Experiments on two publicly available datasets demonstrate that the proposed method attains higher anomaly detection results than other methods.
基金supported by Education and Scientific Research Special Project of Fujian Provincial Department of Finance(Research on the Application of Blockchain Technology in Prison Law Enforcement Management),Fujian Provincial Social Science Foundation Public Security Theory Research Project(FJ2023TWGA004).
文摘In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility.
基金funded by Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Center。
文摘The direction-of-arrival(DoA) estimation is one of the hot research areas in signal processing. To overcome the DoA estimation challenge without the prior information about signal sources number and multipath number in millimeter wave system,the multi-task deep residual shrinkage network(MTDRSN) and transfer learning-based convolutional neural network(TCNN), namely MDTCNet, are proposed. The sampling covariance matrix based on the received signal is used as the input to the proposed network. A DRSN-based multi-task classifications model is first introduced to estimate signal sources number and multipath number simultaneously. Then, the DoAs with multi-signal and multipath are estimated by the regression model. The proposed CNN is applied for DoAs estimation with the predicted number of signal sources and paths. Furthermore, the modelbased transfer learning is also introduced into the regression model. The TCNN inherits the partial network parameters of the already formed optimization model obtained by the CNN. A series of experimental results show that the MDTCNet-based DoAs estimation method can accurately predict the signal sources number and multipath number under a range of signal-to-noise ratios. Remarkably, the proposed method achieves the lower root mean square error compared with some existing deep learning-based and traditional methods.
基金supported by National Natural Science Foundation of China (No.62001135)the Joint funds for Regional Innovation and Development of the National Natural Science Foundation of China(No.U21A20449)the Beijing Natural Science Foundation Haidian Original Innovation Joint Fund (No.L232002)
文摘UAV-aided cellular networks,millimeter wave(mm-wave) communications and multi-antenna techniques are viewed as promising components of the solution for beyond-5G(B5G) and even 6G communications.By leveraging the power of stochastic geometry,this paper aims at providing an effective framework for modeling and analyzing a UAV-aided heterogeneous cellular network,where the terrestrial base stations(TBSs) and the UAV base stations(UBSs) coexist,and the UBSs are provided with mm-wave and multi-antenna techniques.By modeling the TBSs as a PPP and the UBSs as a Matern hard-core point process of type Ⅱ(MPH-Ⅱ),approximated but accurate analytical results for the average rate of the typical user of both tiers are derived through an approximation method based on the mean interference-to-signal ratio(MISR) gain.The influence of some relevant parameters is discussed in detail,and some insights into the network deployment and optimization are revealed.Numerical results show that some trade-offs are worthy of being considered,such as the antenna array size,the altitude of the UAVs and the power control factor of the UBSs.
基金supported by the National Natural Science Foundation of China(Grant No.12004049)the Fund of State Key Laboratory of IPOC(BUPT)(Grant Nos.600119525 and 505019124).
文摘We investigate the Floquet spectrum and excitation properties of a two-ultracold-atom system with periodically driven interaction in a three-dimensional harmonic trap.The interaction between the atoms is changed by varying the s-wave scattering length in two ways,the cosine and the square-wave modulations.It is found that as the driving frequency increases,the Floquet spectrum exhibits two main features for both modulations,the accumulating and the spreading of the quasienergy levels,which further lead to different dynamical behaviors.The accumulation is associated with collective excitations and the persistent growth of the energy,while the spread indicates that the energy is bounded at all times.The initial scattering length,the driving frequency and amplitude can all significantly change the Floquet spectrum as well as the dynamics.However,the corresponding relation between them is valid universally.Finally,we propose a mechanism for selectively exciting the system to one specific state by using the avoided crossing of two quasienergy levels,which could guide preparation of a desired state in experiments.
基金supported by the National Key Research and Development Program of China(No.2021YFB2900602)the National Natural Science Foundation of China(No.61875230).
文摘To improve the bit error rate(BER)performance of multi-user signal detection in satelliteterrestrial downlink non-orthogonal multiple access(NOMA)systems,an iterative signal detection algorithm based on soft interference cancellation with optimal power allocation is proposed.Given that power allocation has a significant impact on BER performance,the optimal power allocation is obtained by minimizing the average BER of NOMA users.According to the allocated powers,successive interference cancellation(SIC)between NOMA users is performed in descending power order.For each user,an iterative soft interference cancellation is performed,and soft symbol probabilities are calculated for soft decision.To improve detection accuracy and without increasing the complexity,the aforementioned algorithm is optimized by adding minimum mean square error(MMSE)signal estimation before detection,and in each iteration soft symbol probabilities are utilized for soft-decision of the current user and also for the update of soft interference of the previous user.Simulation results illustrate that the optimized algorithm i.e.MMSE-IDBSIC significantly outperforms joint multi-user detection and SIC detection by 7.57dB and 8.03dB in terms of BER performance.
基金supported by the Natural Science Foundation of China (No.62171051)。
文摘Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.
基金supported by National Natural Science Foundation of China(NSFC)(No.62101274 and 62101275)Natural Science Foundation of Jiangsu Province(BK20210640)Open Research Fund of National Mobile Communications Research Laboratory Southeast University under Grant 2021D03。
文摘In this paper,a statistical cluster-based simulation channel model with a finite number of sinusoids is proposed for depicting the multiple-input multiple-output(MIMO)communications in vehicleto-everything(V2X)environments.In the proposed sum-of-sinusoids(SoS)channel model,the waves that emerge from the transmitter undergo line-of-sight(LoS)and non-line-of-sight(NLoS)propagation to the receiver,which makes the model suitable for describing numerous V2X wireless communication scenarios for sixth-generation(6G).We derive expressions for the real and imaginary parts of the complex channel impulse response(CIR),which characterize the physical propagation characteristics of V2X wireless channels.The statistical properties of the real and imaginary parts of the complex CIRs,i.e.,autocorrelation functions(ACFs),Doppler power spectral densities(PSDs),cross-correlation functions(CCFs),and variances of ACFs and CCFs,are derived and discussed.Simulation results are generated and match those predicted by the underlying theory,demonstrating the accuracy of our derivation and analysis.The proposed framework and underlying theory arise as an efficient tool to investigate the statistical properties of 6G MIMO V2X communication systems.
基金supported by National Key Research and Development Program of China(2018YFC1504502).
文摘Mobile edge computing(MEC)-enabled satellite-terrestrial networks(STNs)can provide Internet of Things(IoT)devices with global computing services.Sometimes,the network state information is uncertain or unknown.To deal with this situation,we investigate online learning-based offloading decision and resource allocation in MEC-enabled STNs in this paper.The problem of minimizing the average sum task completion delay of all IoT devices over all time periods is formulated.We decompose this optimization problem into a task offloading decision problem and a computing resource allocation problem.A joint optimization scheme of offloading decision and resource allocation is then proposed,which consists of a task offloading decision algorithm based on the devices cooperation aided upper confidence bound(UCB)algorithm and a computing resource allocation algorithm based on the Lagrange multiplier method.Simulation results validate that the proposed scheme performs better than other baseline schemes.
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant 62371082 and 62001076in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX0726 and cstc2020jcyjmsxmX0878.
文摘Fog computing is considered as a solution to accommodate the emergence of booming requirements from a large variety of resource-limited Internet of Things(IoT)devices.To ensure the security of private data,in this paper,we introduce a blockchain-enabled three-layer device-fog-cloud heterogeneous network.A reputation model is proposed to update the credibility of the fog nodes(FN),which is used to select blockchain nodes(BN)from FNs to participate in the consensus process.According to the Rivest-Shamir-Adleman(RSA)encryption algorithm applied to the blockchain system,FNs could verify the identity of the node through its public key to avoid malicious attacks.Additionally,to reduce the computation complexity of the consensus algorithms and the network overhead,we propose a dynamic offloading and resource allocation(DORA)algorithm and a reputation-based democratic byzantine fault tolerant(R-DBFT)algorithm to optimize the offloading decisions and decrease the number of BNs in the consensus algorithm while ensuring the network security.Simulation results demonstrate that the proposed algorithm could efficiently reduce the network overhead,and obtain a considerable performance improvement compared to the related algorithms in the previous literature.
基金supported by the National Natural Science Foundation of China(62305261,62305262)the Natural Science Foundation of Shaanxi Province(2024JC-YBMS-021,2024JC-YBMS-788,2023-JC-YB-065,2023-JC-QN-0693,2022JQ-652)+1 种基金the Xi’an Science and Technology Bureau of University Service Enterprise Project(23GXFW0043)the Cross disciplinary Research and Cultivation Project of Xi’an University of Architecture and Technology(2023JCPY-17)。
文摘As interest in double perovskites is growing,especially in applications like photovoltaic devices,understanding their mechanical properties is vital for device durability.Despite extensive exploration of structure and optical properties,research on mechanical aspects is limited.This article builds a vacancyordered double perovskite model,employing first-principles calculations to analyze mechanical,bonding,electronic,and optical properties.Results show Cs_(2)Hfl_(6),Cs_(2)SnBr_(6),Cs_(2)SnI_(6),and Cs_(2)PtBr_(6)have Young's moduli below 13 GPa,indicating flexibility.Geometric parameters explain flexibility variations with the changes of B and X site composition.Bonding characteristic exploration reveals the influence of B and X site electronegativity on mechanical strength.Cs_(2)SnBr_(6)and Cs_(2)PtBr_(6)are suitable for solar cells,while Cs_(2)HfI_(6)and Cs_(2)TiCl_(6)show potential for semi-transparent solar cells.Optical property calculations highlight the high light absorption coefficients of up to 3.5×10^(5) cm^(-1)for Cs_(2)HfI_(6)and Cs_(2)TiCl_(6).Solar cell simulation shows Cs_(2)PtBr_(6)achieves 22.4%of conversion effciency.Cs_(2)ZrCl_(6)holds promise for ionizing radiation detection with its 3.68 eV bandgap and high absorption coefficient.Vacancy-ordered double perovskites offer superior flexibility,providing valuable insights for designing stable and flexible devices.This understanding enhances the development of functional devices based on these perovskites,especially for applications requiring high stability and flexibility.
基金supported by the National Natural Science Foundation of China(No.62001045)Beijing Municipal Natural Science Foundation(No.4214059)+1 种基金Fund of State Key Laboratory of IPOC(BUPT)(No.IPOC2021ZT17)Fundamental Research Funds for the Central Universities(No.2022RC09).
文摘Inter-datacenter elastic optical networks(EON)need to provide the service for the requests of cloud computing that require not only connectivity and computing resources but also network survivability.In this paper,to realize joint allocation of computing and connectivity resources in survivable inter-datacenter EONs,a survivable routing,modulation level,spectrum,and computing resource allocation algorithm(SRMLSCRA)algorithm and three datacenter selection strategies,i.e.Computing Resource First(CRF),Shortest Path First(SPF)and Random Destination(RD),are proposed for different scenarios.Unicast and manycast are applied to the communication of computing requests,and the routing strategies are calculated respectively.Simulation results show that SRMLCRA-CRF can serve the largest amount of protected computing tasks,and the requested calculation blocking probability is reduced by 29.2%,28.3%and 30.5%compared with SRMLSCRA-SPF,SRMLSCRA-RD and the benchmark EPS-RMSA algorithms respectively.Therefore,it is more applicable to the networks with huge calculations.Besides,SRMLSCRA-SPF consumes the least spectrum,thereby exhibiting its suitability for scenarios where the amount of calculation is small and communication resources are scarce.The results demonstrate that the proposed methods realize the joint allocation of computing and connectivity resources,and could provide efficient protection for services under single-link failure and occupy less spectrum.
文摘The 6th generation mobile networks(6G)network is a kind of multi-network interconnection and multi-scenario coexistence network,where multiple network domains break the original fixed boundaries to form connections and convergence.In this paper,with the optimization objective of maximizing network utility while ensuring flows performance-centric weighted fairness,this paper designs a reinforcement learning-based cloud-edge autonomous multi-domain data center network architecture that achieves single-domain autonomy and multi-domain collaboration.Due to the conflict between the utility of different flows,the bandwidth fairness allocation problem for various types of flows is formulated by considering different defined reward functions.Regarding the tradeoff between fairness and utility,this paper deals with the corresponding reward functions for the cases where the flows undergo abrupt changes and smooth changes in the flows.In addition,to accommodate the Quality of Service(QoS)requirements for multiple types of flows,this paper proposes a multi-domain autonomous routing algorithm called LSTM+MADDPG.Introducing a Long Short-Term Memory(LSTM)layer in the actor and critic networks,more information about temporal continuity is added,further enhancing the adaptive ability changes in the dynamic network environment.The LSTM+MADDPG algorithm is compared with the latest reinforcement learning algorithm by conducting experiments on real network topology and traffic traces,and the experimental results show that LSTM+MADDPG improves the delay convergence speed by 14.6%and delays the start moment of packet loss by 18.2%compared with other algorithms.
基金supported by a grant from 2022 National Natural Science Foundation of China project“Research on key technology of generalization of human-computer collaborative learning ability based on domain adaptation algorithm”.(No.62277002)。
文摘The explosion of ChatGPT is considered to be a milestone in the normalization of artificial intelligence education applications.On the technical line,the cross-modal AI generation application based on human feedback system is accelerated.In the business model,the scenes to realize interactive functions are constantly enriched.This paper reviews the evolution process of AIGC,closely follows the current situation of the coexistence of business acceleration and technical worries in the application of artificial intelligence education,analyzes the application of AIGC education in 7 subdivided fields,and analyzes the optimization direction of application cases from the perspective of perception-cognition-creation technology maturity matrix.The 3 recommendations and 2 follow-up research directions will promote the scientific application of artificial intelligence education in the AIGC period.
基金supported by National Key RD Program of China(Grant No.2022YFB3104402,the Research on Digital Identity Trust System for Massive Heterogeneous Terminals in Road Traffic System)the Fundamental Research Funds for the Central Universities(Grant Nos.3282023015,3282023035,3282023051)National First-Class Discipline Construction Project of Beijing Electronic Science and Technology Institute(No.3201012).
文摘The Internet of Things(IoT)is a network system that connects physical devices through the Internet,allowing them to interact.Nowadays,IoT has become an integral part of our lives,offering convenience and smart functionality.However,the growing number of IoT devices has brought about a corresponding increase in cybersecurity threats,such as device vulnerabilities,data privacy concerns,and network susceptibilities.Integrating blockchain technology with IoT has proven to be a promising approach to enhance IoT security.Nevertheless,the emergence of quantum computing poses a significant challenge to the security of traditional classical cryptography used in blockchain,potentially exposing it to quantum cyber-attacks.To support the growth of the IoT industry,mitigate quantum threats,and safeguard IoT data,this study proposes a robust blockchain solution for IoT that incorporates both classical and post-quantum security measures.Firstly,we present the Quantum-Enhanced Blockchain Architecture for IoT(QBIoT)to ensure secure data sharing and integrity protection.Secondly,we propose an improved Proof of Authority consensus algorithm called“Proof of Authority with Random Election”(PoARE),implemented within QBIoT for leader selection and new block creation.Thirdly,we develop a publickey quantum signature protocol for transaction verification in the blockchain.Finally,a comprehensive security analysis of QBIoT demonstrates its resilience against cyber threats from both classical and quantum adversaries.In summary,this research introduces an innovative quantum-enhanced blockchain solution to address quantum security concernswithin the realmof IoT.The proposedQBIoT framework contributes to the ongoing development of quantum blockchain technology and offers valuable insights for future research on IoT security.
基金supported by the National Key R&D Program of China (Grant No. 2021YFB3202800)the National Natural Science Foundation of China (Grant No. 12174373)+2 种基金the Chinese Academy of Sciences (Grant No. GJJSTD20200001)the Innovation Program for Quantum Science and Technology (Grant No. 2021ZD0302200)Anhui Initiative in Quantum Information Technologies (Grant No. AHY050000)。
文摘Lee–Yang theory clearly demonstrates where the phase transition of many-body systems occurs and the asymptotic behavior near the phase transition using the partition function under complex parameters. The complex parameters make the direct investigation of Lee–Yang theory in practical systems challenging. Here we construct a non-Hermitian quantum system that can correspond to the one-dimensional Ising model with imaginary parameters through the equality of partition functions. By adjusting the non-Hermitian parameter,we successfully obtain the partition function under different imaginary magnetic fields and observe the Lee–Yang zeros. We also observe the critical behavior of free energy in vicinity of Lee–Yang zero that is consistent with theoretical prediction. Our work provides a protocol to study Lee–Yang zeros of the one-dimensional Ising model using a single-qubit non-Hermitian system.
基金jointly supported by the Beijing University of Posts and Telecommunications-China Mobile Research Institute Joint Innovation Centerthe National Key Research and Development Program of China under Grant 2021YFB2900200the National Natural Science Foundation of China under Grant 62201073 and 61925101。
文摘To accommodate the diversified emerging use cases in 5G,radio access networks(RAN)is required to be more flexible,open,and versatile.It is evolving towards cloudification,intelligence and openness.By embedding computing capabilities within RAN,it helps to transform RAN into a natural cost effective radio edge computing platform,offering great opportunity to further enhance RAN agility for diversified services and improve users’quality of experience(Qo E).In this article,a logical architecture enabling deep convergence of communication and computing in RAN is proposed based on O-RAN.The scenarios and potential benefits of sharing RAN computing resources are first analyzed.Then,the requirements,design principles and logical architecture are introduced.Involved key technologies are also discussed,including heterogeneous computing infrastructure,unified computing and communication task modeling,joint communication and computing orchestration and RAN computing data routing.Followed by that,a VR use case is studied to illustrate the superiority of the joint communication and computing optimization.Finally,challenges and future trends are highlighted to provide some insights on the potential future work for researchers in this field.
基金supported in part by the National Key Research and Development Program of China under Grant No.2021YFB2900200in part by National Natural Science Foundation of China under Grant Nos.61925101 and 62271085in part by Beijing Natural Science Foundation under Grant No.L223007-2.
文摘Integrated sensing and communication(ISAC)technology is a promising candidate for next-generation communication systems.However,severe co-site interference in existing ISAC systems limits the communication and sensing performance,posing significant challenges for ISAC interference management.In this work,we propose a novel interference management scheme based on the normalized least mean square(NLMS)algorithm,which mitigates the impact of co-site interference by reconstructing the interference from the local transmitter and canceling it from the received signal.Simulation results demonstrate that,compared to typical adaptive interference management schemes based on recursive least square(RLS)and stochastic gradient descent(SGD)algorithms,the proposed NLMS algorithm effectively cancels co-site interference and achieves a good balance between computational complexity and convergence performance.
基金This work was supported by the National Key R&D Program of China(2023YFB3106800)the National Natural Science Foundation of China(Grant No.62072051).We are overwhelmed in all humbleness and gratefulness to acknowledge my depth to all those who have helped me to put these ideas.
文摘By the analysis of vulnerabilities of Android native system services,we find that some vulnerabilities are caused by inconsistent data transmission and inconsistent data processing logic between client and server.The existing research cannot find the above two types of vulnerabilities and the test cases of them face the problem of low coverage.In this paper,we propose an extraction method of test cases based on the native system services of the client and design a case construction method that supports multi-parameter mutation based on genetic algorithm and priority strategy.Based on the above method,we implement a detection tool-BArcherFuzzer to detect vulnerabilities of Android native system services.The experiment results show that BArcherFuzzer found four vulnerabilities of hundreds of exception messages,all of them were confirmed by Google and one was assigned a Common Vulnerabilities and Exposures(CVE)number(CVE-2020-0363).
文摘Smart energy monitoring and management system lays a foundation for the application and development of smart energy. However, in recent years, the work efficiency of smart energy development enterprises has generally been low, and there is an urgent need to improve the application efficiency, resilience and sustainability of smart energy monitoring and management system. Digital twin technology provides a data-centric solution to improve smart energy monitoring and management system, bringing an opportunity to transform passive infrastructure assets into data-centric systems. This paper expounds on the concept and key technologies of digital twin, and designs a smart energy monitoring and management system based on digital twin technology, which has dual significance for promoting the development of smart energy field and promoting the application of digital twin.