The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,s...The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.展开更多
Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields...Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.展开更多
Given the scarcity of Satellite Frequency and Orbit(SFO)resources,it holds paramount importance to establish a comprehensive knowledge graph of SFO field(SFO-KG)and employ knowledge reasoning technology to automatical...Given the scarcity of Satellite Frequency and Orbit(SFO)resources,it holds paramount importance to establish a comprehensive knowledge graph of SFO field(SFO-KG)and employ knowledge reasoning technology to automatically mine available SFO resources.An essential aspect of constructing SFO-KG is the extraction of Chinese entity relations.Unfortunately,there is currently no publicly available Chinese SFO entity Relation Extraction(RE)dataset.Moreover,publicly available SFO text data contain numerous NA(representing for“No Answer”)relation category sentences that resemble other relation sentences and pose challenges in accurate classification,resulting in low recall and precision for the NA relation category in entity RE.Consequently,this issue adversely affects both the accuracy of constructing the knowledge graph and the efficiency of RE processes.To address these challenges,this paper proposes a method for extracting Chinese SFO text entity relations based on dynamic integrated learning.This method includes the construction of a manually annotated Chinese SFO entity RE dataset and a classifier combining features of SFO resource data.The proposed approach combines integrated learning and pre-training models,specifically utilizing Bidirectional Encoder Representation from Transformers(BERT).In addition,it incorporates one-class classification,attention mechanisms,and dynamic feedback mechanisms to improve the performance of the RE model.Experimental results show that the proposed method outperforms the traditional methods in terms of F1 value when extracting entity relations from both balanced and long-tailed datasets.展开更多
Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving a...Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.展开更多
In this paper,a double-effect DNN-based Digital Back-Propagation(DBP)scheme is proposed and studied to achieve the Integrated Communication and Sensing(ICS)ability,which can not only realize nonlinear damage mitigatio...In this paper,a double-effect DNN-based Digital Back-Propagation(DBP)scheme is proposed and studied to achieve the Integrated Communication and Sensing(ICS)ability,which can not only realize nonlinear damage mitigation but also monitor the optical power and dispersion profile over multi-span links.The link status information can be extracted by the characteristics of the learned optical fiber parameters without any other measuring instruments.The efficiency and feasibility of this method have been investigated in different fiber link conditions,including various launch power,transmission distance,and the location and the amount of the abnormal losses.A good monitoring performance can be obtained while the launch optical power is 2 dBm which does not affect the normal operation of the optical communication system and the step size of DBP is 20 km which can provide a better distance resolution.This scheme successfully detects the location of single or multiple optical attenuators in long-distance multi-span fiber links,including different abnormal losses of 2 dB,4 dB,and 6 dB in 360 km and serval combinations of abnormal losses of(1 dB,5 dB),(3 dB,3 dB),(5 dB,1 dB)in 360 km and 760 km.Meanwhile,the transfer relationship of the estimated coefficient values with different step sizes is further investigated to reduce the complexity of the fiber nonlinear damage compensation.These results provide an attractive approach for precisely sensing the optical fiber link status information and making correct strategies timely to ensure optical communication system operations.展开更多
The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devic...The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.展开更多
To protect user privacy and data security,the integration of Federated Learning(FL)and blockchain has become an emerging research hotspot.However,the limited throughput and high communication complexity of traditional...To protect user privacy and data security,the integration of Federated Learning(FL)and blockchain has become an emerging research hotspot.However,the limited throughput and high communication complexity of traditional blockchains limit their application in large-scale FL tasks,and the synchronous traditional FL will also reduce the training efficiency.To address these issues,in this paper,we propose a Directed Acyclic Graph(DAG)blockchain-enabled generalized Federated Dropout(FD)learning strategy,which could improve the efficiency of FL while ensuring the model generalization.Specifically,the DAG maintained by multiple edge servers will guarantee the security and traceability of the data,and the Reputation-based Tips Selection Algorithm(RTSA)is proposed to reduce the blockchain consensus delay.Second,the semi-asynchronous training among Intelligent Devices(IDs)is adopted to improve the training efficiency,and a reputation-based FD technology is proposed to prevent overfitting of the model.In addition,a Hybrid Optimal Resource Allocation(HORA)algorithm is introduced to minimize the network delay.Finally,simulation results demonstrate the effectiveness and superiority of the proposed algorithms.展开更多
Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of...Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications.展开更多
Dual-function communication radar systems use common Radio Frequency(RF)signals are used for both communication and detection.For better compatibility with existing communication systems,we adopt Multiple-Input Multip...Dual-function communication radar systems use common Radio Frequency(RF)signals are used for both communication and detection.For better compatibility with existing communication systems,we adopt Multiple-Input Multiple-Output(MIMO)Orthogonal Frequency Division Multiplexing(OFDM)signals as integrated signals and investigate the estimation performance of MIMO-OFDM signals.First,we analyze the Cramer-Rao Lower Bound(CRLB)of parameter estimation.Then,the transmit powers over different subcarriers are optimized to achieve the best tradeoff between the transmission rate and the estimation performance.Finally,we propose a more accurate estimation method that uses Canonical Polyadic Decomposition(CPD)of the third-order tensor to obtain the parameter matrices.Due to the characteristic of the column structure of the parameter matrices,we only need to use DFT/IDFT to recover the parameters of multiple targets.The simulation results show that tensor-based estimation method can achieve a performance close to CRLB,and the estimation performance can be improved by optimizing the transmit powers.展开更多
To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(...To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time.展开更多
It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sens...It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes.展开更多
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(...In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP.展开更多
The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton textile...The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton textiles.By fusing band combination optimization with deep learning,this study aims to achieve more efficient and accurate detection of film impurities in seed cotton on the production line.By applying hyperspectral imaging and a one-dimensional deep learning algorithm,we detect and classify impurities in seed cotton after harvest.The main categories detected include pure cotton,conveyor belt,film covering seed cotton,and film adhered to the conveyor belt.The proposed method achieves an impurity detection rate of 99.698%.To further ensure the feasibility and practical application potential of this strategy,we compare our results against existing mainstream methods.In addition,the model shows excellent recognition performance on pseudo-color images of real samples.With a processing time of 11.764μs per pixel from experimental data,it shows a much improved speed requirement while maintaining the accuracy of real production lines.This strategy provides an accurate and efficient method for removing impurities during cotton processing.展开更多
In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this neces...In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.展开更多
Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed ...Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency.展开更多
Sixth Generation(6G)mobile communication networks will involve sensing as a new function,with the overwhelming trend of Integrated Sensing And Communications(ISAC).Although expanding the serving range of the networks,...Sixth Generation(6G)mobile communication networks will involve sensing as a new function,with the overwhelming trend of Integrated Sensing And Communications(ISAC).Although expanding the serving range of the networks,there exists performance trade-offbetween communication and sensing,in that they have competitions on the physical resources.Different resource allocation schemes will result in different sensing and communication performance,thus influencing the system’s overall performance.Therefore,how to model the system’s overall performance,and how to optimize it are key issues for ISAC.Relying on the large-scale deployment of the networks,cooperative ISAC has the advantages of wider coverage,more robust performance and good compatibility of multiple monostatic and multistatic sensing,compared to the non-cooperative ISAC.How to capture the performance gain of cooperation is a key issue for cooperative ISAC.To address the aforementioned vital problems,in this paper,we analyze the sensing accuracy gain,propose a unified ISAC performance evaluation framework and design several optimization methods in cooperative ISAC systems.The cooperative sensing accuracy gain is theoretically analyzed via Cramér Rao lower bound.The unified ISAC performance evaluation model is established by converting the communication mutual information to the effective minimum mean squared error.To optimize the unified ISAC performance,we design the optimization algorithms considering three factors:base stations’working modes,power allocation schemes and waveform design.Through simulations,we show the performance gain of the cooperative ISAC system and the effectiveness of the proposed optimization methods.展开更多
As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods fa...As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods face challenges:some are too simplistic to capture complex traffic patterns effectively,and others are overly complex,leading to excessive communication overhead between cloud and edge devices.Moreover,the problem of single point failure limits their robustness and reliability in real-world applications.To tackle these challenges,this paper proposes a new method,CMBA-FL,a Communication-Mitigated and Blockchain-Assisted Federated Learning model.First,CMBA-FL improves the client model’s ability to capture temporal traffic patterns by employing the Encoder-Decoder framework for each edge device.Second,to reduce the communication overhead during federated learning,we introduce a verification method based on parameter update consistency,avoiding unnecessary parameter updates.Third,to mitigate the risk of a single point of failure,we integrate consensus mechanisms from blockchain technology.To validate the effectiveness of CMBA-FL,we assess its performance on two widely used traffic datasets.Our experimental results show that CMBA-FL reduces prediction error by 11.46%,significantly lowers communication overhead,and improves security.展开更多
Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signatu...Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.展开更多
Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privac...Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.展开更多
The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and ...The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.展开更多
基金supported in part by the National Natural Science Foundation of China under Grant 62371181in part by the Changzhou Science and Technology International Cooperation Program under Grant CZ20230029+1 种基金supported by a National Research Foundation of Korea(NRF)grant funded by the Korea government(MSIT)(2021R1A2B5B02087169)supported under the framework of international cooperation program managed by the National Research Foundation of Korea(2022K2A9A1A01098051)。
文摘The Intelligent Internet of Things(IIoT)involves real-world things that communicate or interact with each other through networking technologies by collecting data from these“things”and using intelligent approaches,such as Artificial Intelligence(AI)and machine learning,to make accurate decisions.Data science is the science of dealing with data and its relationships through intelligent approaches.Most state-of-the-art research focuses independently on either data science or IIoT,rather than exploring their integration.Therefore,to address the gap,this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT)system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics.The paper analyzes the data science or big data security and privacy features,including network architecture,data protection,and continuous monitoring of data,which face challenges in various IoT-based systems.Extensive insights into IoT data security,privacy,and challenges are visualized in the context of data science for IoT.In addition,this study reveals the current opportunities to enhance data science and IoT market development.The current gap and challenges faced in the integration of data science and IoT are comprehensively presented,followed by the future outlook and possible solutions.
基金supported in part by the National Natural Science Foundation of China under Grant 62072351in part by the Key Research Project of Shaanxi Natural Science Foundation under Grant 2023-JCZD-35in part by the open research project of ZheJiang Lab under grant 2021PD0AB01。
文摘Blockchain technology is increasingly popular and has been widely applied in many industrial fields,due to its unique properties of decentralization,immutability,and traceability.Blockchain systems in different fields vary,with different block structures,consensus mechanisms and access permission models.These differences make it hard for different blockchain systems to interoperate with each other,which isolates them.Cross-chain technologies have been developed to solve this isolation problem in order to improve the interoperability of blockchains.Although some surveys on cross-chain technologies can be found,they are unable to keep up with the latest research progress due to their extremely fast pace of development.Moreover,the literature misses general criteria to evaluate the quality of cross-chain technologies.In this paper,a comprehensive literature review of cross-chain technologies is conducted by employing a comprehensive set of evaluation criteria.The preliminaries on blockchain interoperability are first presented.Then,a set of evaluation criteria is proposed in terms of security,privacy,performance,and functionality.The latest cutting-edge works are reviewed based on the proposed taxonomy of cross-chain technologies and their performance is evaluated against our proposed criteria.Finally,some open issues and future directions of cross-chain research are pointed out.
文摘Given the scarcity of Satellite Frequency and Orbit(SFO)resources,it holds paramount importance to establish a comprehensive knowledge graph of SFO field(SFO-KG)and employ knowledge reasoning technology to automatically mine available SFO resources.An essential aspect of constructing SFO-KG is the extraction of Chinese entity relations.Unfortunately,there is currently no publicly available Chinese SFO entity Relation Extraction(RE)dataset.Moreover,publicly available SFO text data contain numerous NA(representing for“No Answer”)relation category sentences that resemble other relation sentences and pose challenges in accurate classification,resulting in low recall and precision for the NA relation category in entity RE.Consequently,this issue adversely affects both the accuracy of constructing the knowledge graph and the efficiency of RE processes.To address these challenges,this paper proposes a method for extracting Chinese SFO text entity relations based on dynamic integrated learning.This method includes the construction of a manually annotated Chinese SFO entity RE dataset and a classifier combining features of SFO resource data.The proposed approach combines integrated learning and pre-training models,specifically utilizing Bidirectional Encoder Representation from Transformers(BERT).In addition,it incorporates one-class classification,attention mechanisms,and dynamic feedback mechanisms to improve the performance of the RE model.Experimental results show that the proposed method outperforms the traditional methods in terms of F1 value when extracting entity relations from both balanced and long-tailed datasets.
基金supported in part by the National Key R&D Program of China under Grant 2022YFB3104503in part by the National Natural Science Foundation of China under Grant 62202054,and Grant 61931001+2 种基金in part by the National Natural Science Foundation of China No.62202054the Young Elite Scientists Sponsorship Program of the China Association for Science and Technology under Grant 2023QNRC001in part by the U.S.National Science Foundation under Grant 2136202.
文摘Recognized as a pivotal facet in Beyond Fifth-Generation(B5G)and the upcoming Sixth-Generation(6G)wireless networks,Unmanned Aerial Vehicle(UAV)communications pose challenges due to limited capabilities when serving as mobile base stations,leading to suboptimal service for edge users.To address this,the collaborative formation of Coordinated Multi-Point(CoMP)networks proves instrumental in alleviating the issue of the poor Quality of Service(QoS)at edge users in the network periphery.This paper introduces a groundbreaking solution,the Hybrid Uplink-Downlink Non-Orthogonal Multiple Access(HUD-NOMA)scheme for UAV-aided CoMP networks.Leveraging network coding and NOMA technology,our proposed HUD-NOMA effectively enhances transmission rates for edge users,notwithstanding a minor reduction in signal reception reliability for strong signals.Importantly,the system’s overall sum rate is elevated.The proposed HUD-NOMA demonstrates resilience against eavesdroppers by effectively managing intended interferences without the need for additional artificial noise injection.The study employs a stochastic geometry approach to derive the Secrecy Outage Probability(SOP)for the transmissions in the CoMP network,revealing superior performance in transmission rates and lower SOP compared to existing methods through numerical verification.Furthermore,guided by the theoretical SOP derivation,this paper proposes a power allocation strategy to further reduce the system’s SOP.
基金supported by the National Key Research and Development Program of China (2019YFB1803905)the National Natural Science Foundation of China (No.62171022)+2 种基金Beijing Natural Science Foundation (4222009)Guangdong Basic and Applied Basic Research Foundation (2021B1515120057)the Scientific and Technological Innovation Foundation of Shunde Graduate School,USTB (No.BK19AF005)。
文摘In this paper,a double-effect DNN-based Digital Back-Propagation(DBP)scheme is proposed and studied to achieve the Integrated Communication and Sensing(ICS)ability,which can not only realize nonlinear damage mitigation but also monitor the optical power and dispersion profile over multi-span links.The link status information can be extracted by the characteristics of the learned optical fiber parameters without any other measuring instruments.The efficiency and feasibility of this method have been investigated in different fiber link conditions,including various launch power,transmission distance,and the location and the amount of the abnormal losses.A good monitoring performance can be obtained while the launch optical power is 2 dBm which does not affect the normal operation of the optical communication system and the step size of DBP is 20 km which can provide a better distance resolution.This scheme successfully detects the location of single or multiple optical attenuators in long-distance multi-span fiber links,including different abnormal losses of 2 dB,4 dB,and 6 dB in 360 km and serval combinations of abnormal losses of(1 dB,5 dB),(3 dB,3 dB),(5 dB,1 dB)in 360 km and 760 km.Meanwhile,the transfer relationship of the estimated coefficient values with different step sizes is further investigated to reduce the complexity of the fiber nonlinear damage compensation.These results provide an attractive approach for precisely sensing the optical fiber link status information and making correct strategies timely to ensure optical communication system operations.
基金supported by the National Natural Science Foundation of China(62202215)Liaoning Province Applied Basic Research Program(Youth Special Project,2023JH2/101600038)+2 种基金Shenyang Youth Science and Technology Innovation Talent Support Program(RC220458)Guangxuan Program of Shenyang Ligong University(SYLUGXRC202216)Basic Research Special Funds for Undergraduate Universities in Liaoning Province(LJ212410144067).
文摘The 6G smart Fog Radio Access Network(F-RAN)is an integration of 6G network intelligence technologies and the F-RAN architecture.Its aim is to provide low-latency and high-performance services for massive access devices.However,the performance of current 6G network intelligence technologies and its level of integration with the architecture,along with the system-level requirements for the number of access devices and limitations on energy consumption,have impeded further improvements in the 6G smart F-RAN.To better analyze the root causes of the network problems and promote the practical development of the network,this study used structured methods such as segmentation to conduct a review of the topic.The research results reveal that there are still many problems in the current 6G smart F-RAN.Future research directions and difficulties are also discussed.
基金supported in part by the National Key R&D Program of China under Grant 2021YFB1714100in part by the National Natural Science Foundation of China(NSFC)under Grant 62371082 and 62001076in part by the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-MSX0726 and cstc2020jcyjmsxmX0878.
文摘To protect user privacy and data security,the integration of Federated Learning(FL)and blockchain has become an emerging research hotspot.However,the limited throughput and high communication complexity of traditional blockchains limit their application in large-scale FL tasks,and the synchronous traditional FL will also reduce the training efficiency.To address these issues,in this paper,we propose a Directed Acyclic Graph(DAG)blockchain-enabled generalized Federated Dropout(FD)learning strategy,which could improve the efficiency of FL while ensuring the model generalization.Specifically,the DAG maintained by multiple edge servers will guarantee the security and traceability of the data,and the Reputation-based Tips Selection Algorithm(RTSA)is proposed to reduce the blockchain consensus delay.Second,the semi-asynchronous training among Intelligent Devices(IDs)is adopted to improve the training efficiency,and a reputation-based FD technology is proposed to prevent overfitting of the model.In addition,a Hybrid Optimal Resource Allocation(HORA)algorithm is introduced to minimize the network delay.Finally,simulation results demonstrate the effectiveness and superiority of the proposed algorithms.
文摘Taxation,the primary source of fiscal revenue,has profound implications in guiding resource allocation,promoting economic growth,adjusting social wealth distribution,and enhancing cultural influence.The development of e-taxation provides a enhanced security for taxation,but it still faces the risk of inefficiency and tax data leakage.As a decentralized ledger,blockchain provides an effective solution for protecting tax data and avoiding tax-related errors and fraud.The introduction of blockchain into e-taxation protocols can ensure the public verification of taxes.However,balancing taxpayer identity privacy with regulation remains a challenge.In this paper,we propose a blockchain-based anonymous and regulatory e-taxation protocol.This protocol ensures the supervision and tracking of malicious taxpayers while maintaining honest taxpayer identity privacy,reduces the storage needs for public key certificates in the public key infrastructure,and enables selfcertification of taxpayers’public keys and addresses.We formalize the security model of unforgeability for transactions,anonymity for honest taxpayers,and traceability for malicious taxpayers.Security analysis shows that the proposed protocol satisfies unforgeability,anonymity,and traceability.The experimental results of time consumption show that the protocol is feasible in practical applications.
基金supported by the National Natural Science Foundation of China under grants 62072229,U1936201,62071220,61976113joint project of China Mobile Research Institute&X-NET。
文摘Dual-function communication radar systems use common Radio Frequency(RF)signals are used for both communication and detection.For better compatibility with existing communication systems,we adopt Multiple-Input Multiple-Output(MIMO)Orthogonal Frequency Division Multiplexing(OFDM)signals as integrated signals and investigate the estimation performance of MIMO-OFDM signals.First,we analyze the Cramer-Rao Lower Bound(CRLB)of parameter estimation.Then,the transmit powers over different subcarriers are optimized to achieve the best tradeoff between the transmission rate and the estimation performance.Finally,we propose a more accurate estimation method that uses Canonical Polyadic Decomposition(CPD)of the third-order tensor to obtain the parameter matrices.Due to the characteristic of the column structure of the parameter matrices,we only need to use DFT/IDFT to recover the parameters of multiple targets.The simulation results show that tensor-based estimation method can achieve a performance close to CRLB,and the estimation performance can be improved by optimizing the transmit powers.
基金supported by National Natural Science Foundation of China under Grant U23A20279China Electronics Tian’ao Innovation Theory and Technology Group Fund under Grand 20221193-04-04.
文摘To overcome the challenges of poor real-time performance,limited scalability,and low intelligence in conventional jamming pattern recognition methods,this paper proposes a method based on Wavelet Packet Decomposition(WPD)and enhanced deep learning techniques.In the proposed method,an agent at the receiver processes the received signal using WPD to generate an initial Spectrogram Waterfall(SW),which is subsequently segmented using a sliding window to serve as the input for the jamming recognition network.The network employs a bilateral filter to preprocess the input SW,thereby enhancing the edge features of the jamming signals.To extract abstract features,depthwise separable convolution is utilized instead of traditional convolution,thereby reducing the network’s parameter count and enhancing real-time performance.A pyramid pooling layer is integrated before the fully connected layer to enable the network to process input SW of varying sizes,thus enhancing scalability.During network training,adaptive moment estimation is employed as the optimizer,allowing the network to dynamically adjust the learning rate and accelerate convergence.A comprehensive comparison between the proposed jamming recognition network and six other models is conducted,along with Ablation Experiments(AE)based on numerical simulations.Simulation results demonstrate that the proposed method based on WPD and enhanced deep learning achieves high-precision recognition of various jamming patterns while maintaining a favorable balance among prediction accuracy,network complexity,and prediction time.
文摘It is difficult to improve both energy consumption and detection accuracy simultaneously,and even to obtain the trade-off between them,when detecting and tracking moving targets,especially for Underwater Wireless Sensor Networks(UWSNs).To this end,this paper investigates the relationship between the Degree of Target Change(DoTC)and the detection period,as well as the impact of individual nodes.A Hierarchical Detection and Tracking Approach(HDTA)is proposed.Firstly,the network detection period is determined according to DoTC,which reflects the variation of target motion.Secondly,during the network detection period,each detection node calculates its own node detection period based on the detection mutual information.Taking DoTC as pheromone,an ant colony algorithm is proposed to adaptively adjust the network detection period.The simulation results show that the proposed HDTA with the optimizations of network level and node level significantly improves the detection accuracy by 25%and the network energy consumption by 10%simultaneously,compared to the traditional adaptive period detection schemes.
基金supported by the CAS Project for Young Scientists in Basic Research under Grant YSBR-035Jiangsu Provincial Key Research and Development Program under Grant BE2021013-2.
文摘In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP.
基金supported in part by the Six Talent Peaks Project in Jiangsu Province under Grant 013040315in part by the China Textile Industry Federation Science and Technology Guidance Project under Grant 2017107+1 种基金in part by the National Natural Science Foundation of China under Grant 31570714in part by the China Scholarship Council under Grant 202108320290。
文摘The cleanliness of seed cotton plays a critical role in the pre-treatment of cotton textiles,and the removal of impurity during the harvesting process directly determines the quality and market value of cotton textiles.By fusing band combination optimization with deep learning,this study aims to achieve more efficient and accurate detection of film impurities in seed cotton on the production line.By applying hyperspectral imaging and a one-dimensional deep learning algorithm,we detect and classify impurities in seed cotton after harvest.The main categories detected include pure cotton,conveyor belt,film covering seed cotton,and film adhered to the conveyor belt.The proposed method achieves an impurity detection rate of 99.698%.To further ensure the feasibility and practical application potential of this strategy,we compare our results against existing mainstream methods.In addition,the model shows excellent recognition performance on pseudo-color images of real samples.With a processing time of 11.764μs per pixel from experimental data,it shows a much improved speed requirement while maintaining the accuracy of real production lines.This strategy provides an accurate and efficient method for removing impurities during cotton processing.
基金supported by the National Key Research and Development Program of China(No.2021YFB2900504).
文摘In 6th Generation Mobile Networks(6G),the Space-Integrated-Ground(SIG)Radio Access Network(RAN)promises seamless coverage and exceptionally high Quality of Service(QoS)for diverse services.However,achieving this necessitates effective management of computation and wireless resources tailored to the requirements of various services.The heterogeneity of computation resources and interference among shared wireless resources pose significant coordination and management challenges.To solve these problems,this work provides an overview of multi-dimensional resource management in 6G SIG RAN,including computation and wireless resource.Firstly it provides with a review of current investigations on computation and wireless resource management and an analysis of existing deficiencies and challenges.Then focusing on the provided challenges,the work proposes an MEC-based computation resource management scheme and a mixed numerology-based wireless resource management scheme.Furthermore,it outlines promising future technologies,including joint model-driven and data-driven resource management technology,and blockchain-based resource management technology within the 6G SIG network.The work also highlights remaining challenges,such as reducing communication costs associated with unstable ground-to-satellite links and overcoming barriers posed by spectrum isolation.Overall,this comprehensive approach aims to pave the way for efficient and effective resource management in future 6G networks.
基金supported by the National Natural Science Foundation of China under Grant U21A20449in part by Jiangsu Provincial Key Research and Development Program under Grant BE2021013-2。
文摘Wireless communication-enabled Cooperative Adaptive Cruise Control(CACC)is expected to improve the safety and traffic capacity of vehicle platoons.Existing CACC considers a conventional communication delay with fixed Vehicular Communication Network(VCN)topologies.However,when the network is under attack,the communication delay may be much higher,and the stability of the system may not be guaranteed.This paper proposes a novel communication Delay Aware CACC with Dynamic Network Topologies(DADNT).The main idea is that for various communication delays,in order to maximize the traffic capacity while guaranteeing stability and minimizing the following error,the CACC should dynamically adjust the VCN network topology to achieve the minimum inter-vehicle spacing.To this end,a multi-objective optimization problem is formulated,and a 3-step Divide-And-Conquer sub-optimal solution(3DAC)is proposed.Simulation results show that with 3DAC,the proposed DADNT with CACC can reduce the inter-vehicle spacing by 5%,10%,and 14%,respectively,compared with the traditional CACC with fixed one-vehicle,two-vehicle,and three-vehicle look-ahead network topologies,thereby improving the traffic efficiency.
文摘Sixth Generation(6G)mobile communication networks will involve sensing as a new function,with the overwhelming trend of Integrated Sensing And Communications(ISAC).Although expanding the serving range of the networks,there exists performance trade-offbetween communication and sensing,in that they have competitions on the physical resources.Different resource allocation schemes will result in different sensing and communication performance,thus influencing the system’s overall performance.Therefore,how to model the system’s overall performance,and how to optimize it are key issues for ISAC.Relying on the large-scale deployment of the networks,cooperative ISAC has the advantages of wider coverage,more robust performance and good compatibility of multiple monostatic and multistatic sensing,compared to the non-cooperative ISAC.How to capture the performance gain of cooperation is a key issue for cooperative ISAC.To address the aforementioned vital problems,in this paper,we analyze the sensing accuracy gain,propose a unified ISAC performance evaluation framework and design several optimization methods in cooperative ISAC systems.The cooperative sensing accuracy gain is theoretically analyzed via Cramér Rao lower bound.The unified ISAC performance evaluation model is established by converting the communication mutual information to the effective minimum mean squared error.To optimize the unified ISAC performance,we design the optimization algorithms considering three factors:base stations’working modes,power allocation schemes and waveform design.Through simulations,we show the performance gain of the cooperative ISAC system and the effectiveness of the proposed optimization methods.
基金supported by the National Natural Science Foundation of China under Grant No.U20A20182.
文摘As an effective strategy to address urban traffic congestion,traffic flow prediction has gained attention from Federated-Learning(FL)researchers due FL’s ability to preserving data privacy.However,existing methods face challenges:some are too simplistic to capture complex traffic patterns effectively,and others are overly complex,leading to excessive communication overhead between cloud and edge devices.Moreover,the problem of single point failure limits their robustness and reliability in real-world applications.To tackle these challenges,this paper proposes a new method,CMBA-FL,a Communication-Mitigated and Blockchain-Assisted Federated Learning model.First,CMBA-FL improves the client model’s ability to capture temporal traffic patterns by employing the Encoder-Decoder framework for each edge device.Second,to reduce the communication overhead during federated learning,we introduce a verification method based on parameter update consistency,avoiding unnecessary parameter updates.Third,to mitigate the risk of a single point of failure,we integrate consensus mechanisms from blockchain technology.To validate the effectiveness of CMBA-FL,we assess its performance on two widely used traffic datasets.Our experimental results show that CMBA-FL reduces prediction error by 11.46%,significantly lowers communication overhead,and improves security.
基金supported by the National Key R&D Program of China(2022YFB2701500)the National Natural Science Foundation of China(62272385,62311540156)+2 种基金Shaanxi Distinguished Youth Project(2022JC-47)the Key Research and Development Program of Shaanxi(2021ZDLGY06-04)Major Program of Shandong Provincial Natural Science Foundation for the Fundamental Research(ZR2022ZD03).
文摘Adaptor signature,a new primitive that alleviates the scalability issue of blockchain to some extent,has been widely adopted in the off-chain payment channel and atomic swap.As an extension of standard digital signature,adaptor signature can bind the release of a complete digital signature with the exchange of a secret value.Existing constructions of adaptor signatures are mainly based on Schnorr or ECDSA signature algorithms,which suffer low signing efficiency and long signature length.In this paper,to address these issues,we propose a new construction of adaptor signature using randomized EdDSA,which has Schnorr-like structure with higher signing efficiency and shorter signature length.We prove the required security properties,including unforgeability,witness extractability and pre-signature adaptability,of the new adaptor signature scheme in the random oracle model.We conduct a comparative analysis with an ECDSA-based adaptor signature scheme to demonstrate the effectiveness and feasibility of our new proposal.
文摘Distributed Federated Learning(DFL)technology enables participants to cooperatively train a shared model while preserving the privacy of their local datasets,making it a desirable solution for decentralized and privacy-preserving Web3 scenarios.However,DFL faces incentive and security challenges in the decentralized framework.To address these issues,this paper presents a Hierarchical Blockchain-enabled DFL(HBDFL)system,which provides a generic solution framework for the DFL-related applications.The proposed system consists of four major components,including a model contribution-based reward mechanism,a Proof of Elapsed Time and Accuracy(PoETA)consensus algorithm,a Distributed Reputation-based Verification Mechanism(DRTM)and an Accuracy-Dependent Throughput Management(ADTM)mechanism.The model contribution-based rewarding mechanism incentivizes network nodes to train models with their local datasets,while the PoETA consensus algorithm optimizes the tradeoff between the shared model accuracy and system throughput.The DRTM improves the system efficiency in consensus,and the ADTM mechanism guarantees that the throughput performance remains within a predefined range while improving the shared model accuracy.The performance of the proposed HBDFL system is evaluated by numerical simulations,with the results showing that the system improves the accuracy of the shared model while maintaining high throughput and ensuring security.
文摘The Internet of Things(IoT)has gained substantial attention in both academic research and real-world applications.The proliferation of interconnected devices across various domains promises to deliver intelligent and advanced services.However,this rapid expansion also heightens the vulnerability of the IoT ecosystem to security threats.Consequently,innovative solutions capable of effectively mitigating risks while accommodating the unique constraints of IoT environments are urgently needed.Recently,the convergence of Blockchain technology and IoT has introduced a decentralized and robust framework for securing data and interactions,commonly referred to as the Internet of Blockchained Things(IoBT).Extensive research efforts have been devoted to adapting Blockchain technology to meet the specific requirements of IoT deployments.Within this context,consensus algorithms play a critical role in assessing the feasibility of integrating Blockchain into IoT ecosystems.The adoption of efficient and lightweight consensus mechanisms for block validation has become increasingly essential.This paper presents a comprehensive examination of lightweight,constraint-aware consensus algorithms tailored for IoBT.The study categorizes these consensus mechanisms based on their core operations,the security of the block validation process,the incorporation of AI techniques,and the specific applications they are designed to support.