As the most important large-scale communication infrastructure in the world today,submarine cable can profoundly reflect the global Internet communication pattern,and is of great significance for understanding the glo...As the most important large-scale communication infrastructure in the world today,submarine cable can profoundly reflect the global Internet communication pattern,and is of great significance for understanding the global digital divide.We used multi-scale and network analysis methods to depict the distribution pattern,network structure and spatio-temporal evolution of global submarine cables at the national and landing point scales,in order to analyze the current situation,challenges and main directions of global digital divide governance.Results show that:(1)spatial distribution of global submarine cables is unbalanced,the United States and Europe are the concentrated distribution areas of submarine cables and global information flow centers;(2)core connections of the global submarine cable network are only composed of a tiny minority of countries or regions or landing points,and have strong geographical proximity and clustered-type characteristic,noting that multitudinous landing points of developed countries are at the semi-periphery or even periphery of the network;(3)submarine cables can alleviate the global digital divide through the three paths of infrastructure universalization,digital ecosystem reconstruction and economic empowerment,and the global digital divide governance still faces the dilemma of the differences in digital strategy development and the lack of a governance system.However,due to the increasingly important position of cities in developing countries in the international communication pattern,the global digital divide problem is being alleviated.展开更多
Resilient smart urban water distribution networks are essential to ensure smooth urban operation and maintain daily water services.However,the dynamics and complexity of smart water distribution networks make its re-s...Resilient smart urban water distribution networks are essential to ensure smooth urban operation and maintain daily water services.However,the dynamics and complexity of smart water distribution networks make its re-silience study face many challenges.The introduction of digital twin technology provides an innovative solution for the resilience study of smart water distribution networks,which can more effectively support the network’s real-time monitoring and intelligent control.This paper proposes a digital twin architecture of smart water dis-tribution networks,laying the foundation for the resilience assessment of water distribution networks.Based on this,a performance evaluation model based on user satisfaction is proposed,which can more intuitively and effectively reflect the performance of urban water supply services.Meanwhile,we propose a method to quantify the importance of water distribution pipes’residual resilience,considering the time value to optimize the re-covery sequence of failed pipes and develop targeted preventive maintenance strategies.Finally,to validate the effectiveness of the proposed method,this paper applies it to a water distribution network.The results show that the proposed method can significantly improve the resilience and enhance the overall resilience of smart urban water distribution networks.展开更多
This paper proposes a concurrent neural network model to mitigate non-linear distortion in power amplifiers using a basis function generation approach.The model is designed using polynomial expansion and comprises a f...This paper proposes a concurrent neural network model to mitigate non-linear distortion in power amplifiers using a basis function generation approach.The model is designed using polynomial expansion and comprises a feedforward neural network(FNN)and a convolutional neural network(CNN).The proposed model takes the basic elements that form the bases as input,defined by the generalized memory polynomial(GMP)and dynamic deviation reduction(DDR)models.The FNN generates the basis function and its output represents the basis values,while the CNN generates weights for the corresponding bases.Through the concurrent training of FNN and CNN,the hidden layer coefficients are updated,and the complex multiplication of their outputs yields the trained in-phase/quadrature(I/Q)signals.The proposed model was trained and tested using 300 MHz and 400 MHz broadband data in an orthogonal frequency division multiplexing(OFDM)communication system.The results show that the model achieves an adjacent channel power ratio(ACPR)of less than-48 d B within a 100 MHz integral bandwidth for both the training and test datasets.展开更多
A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of ...A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image.展开更多
In order to enhance the accuracy and reliability of wireless location under non-line-of-sight (NLOS) environments,a novel neural network (NN) location approach using the digital broadcasting signals is presented. ...In order to enhance the accuracy and reliability of wireless location under non-line-of-sight (NLOS) environments,a novel neural network (NN) location approach using the digital broadcasting signals is presented. By the learning ability of the NN and the closely approximate unknown function to any degree of desired accuracy,the input-output mapping relationship between coordinates and the measurement data of time of arrival (TOA) and time difference of arrival (TDOA) is established. A real-time learning algorithm based on the extended Kalman filter (EKF) is used to train the multilayer perceptron (MLP) network by treating the linkweights of a network as the states of the nonlinear dynamic system. Since the EKF-based learning algorithm approximately gives the minimum variance estimate of the linkweights,the convergence is improved in comparison with the backwards error propagation (BP) algorithm. Numerical results illustrate thatthe proposedalgorithmcanachieve enhanced accuracy,and the performance ofthe algorithmis betterthanthat of the BP-based NN algorithm and the least squares (LS) algorithm in the NLOS environments. Moreover,this location method does not depend on a particular distribution of the NLOS error and does not need line-of-sight ( LOS ) or NLOS identification.展开更多
An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet a...An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.展开更多
Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With D...Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.展开更多
A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined b...A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined by computing the spatial gradient of triangle and triangle edges. Outflow edge was defined by comparing the contribution area that is separated by the steepest descent of the triangle. Local channels were then tracked to build drainage networks. Both triangle edges and facets were considered to construct flow path. The algorithm has been tested in the site for Hawaiian Island of Kaho'olawe, and the results were compared with those calculated by ARCGIS as well as terrain map. The reported algorithm has been proved to be a reliable approach with high efficiency to generate well-connected and coherent drainage networks.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and...Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery.展开更多
An optimal design approach of high order FIR digital filter is developed based on the algorithm of neural networks with cosine basis function . The main idea is to minimize the sum of the square errors between the amp...An optimal design approach of high order FIR digital filter is developed based on the algorithm of neural networks with cosine basis function . The main idea is to minimize the sum of the square errors between the amplitude response of the desired FIR filter and that of the designed by training the weights of neural networks, then obtains the impulse response of FIR digital filter . The convergence theorem of the neural networks algorithm is presented and proved, and the optimal design method is introduced by designing four kinds of FIR digital filters , i.e., low-pass, high-pass, bandpass , and band-stop FIR digital filter. The results of the amplitude responses show that attenuation in stop-bands is more than 60 dB with no ripple and pulse existing in pass-bands, and cutoff frequency of passband and stop-band is easily controlled precisely .The presented optimal design approach of high order FIR digital filter is significantly effective.展开更多
A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear ph...A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear phase FIR filter is derived based on its frequency response characteristic, and the NNA, based on minimizing the square-error in the frequency-domain, is established according to the compact expression. To illustrate the stability of the NNA, the convergence theorem is presented and proved. Design examples are also given, and the results show that the ripple is considerably small in passband and stopband, and the NNA-based method is of powerful stability and requires quite little amount of computations.展开更多
To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From ...To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry.展开更多
Fault diagnosis of 5G networks faces the challenges of heavy reliance on human experience and insufficient fault samples and relevant monitoring data.The digital twin technology can realize the interaction between vir...Fault diagnosis of 5G networks faces the challenges of heavy reliance on human experience and insufficient fault samples and relevant monitoring data.The digital twin technology can realize the interaction between virtual space and physical space through the fusion of model and data,providing a new paradigm for fault diagnosis.In this paper,we first propose a network digital twin model and apply it to 5G network diagnosis.We then use an improved Average Wasserstein GAN with Gradient Penalty(AWGAN-GP)method to discover and predict failures in the twin network.Finally,we use XGBoost algorithm to locate the faults in physical network in real time.Extensive simulation results show that the proposed approach can significantly increase fault prediction and diagnosis accuracy in the case of a small number of labeled failure samples in 5G networks.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)h...Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)have shown promise in solving this problem,but their performance highly depends on the choice of hyperparameters.In this paper,we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification.We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms:Adaptive Moment Estimation(ADAM),StochasticGradientDescent(SGD),andRoot Mean Squared Propagation(RMSPROP).The model is trained and tested on a dataset of text samples collected from various authors,and the performance is evaluated using accuracy,precision,recall,and F1 score.We compare the performance of the three optimization algorithms and demonstrate the effectiveness of hyperparameter tuning in improving the accuracy of the CNN model.Our results show that the Hyper Tuned CNN model with ADAM Optimizer achieves the highest accuracy of up to 90%.Furthermore,we demonstrate that hyperparameter tuning can help achieve significant performance improvements,even using a relatively simple model architecture like CNNs.Our findings suggest that the choice of the optimization algorithm is a crucial factor in the performance of CNNs for authorship verification and that hyperparameter tuning can be an effective way to optimize this choice.Overall,this paper demonstrates the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification in digital forensic investigations.Our findings have important implications for developing accurate and reliable authorship verification systems,which are crucial for various applications in digital forensics,such as identifying the author of anonymous threatening messages or detecting cases of plagiarism.展开更多
In this paper, the complete process of constructing 3D digital core by fullconvolutional neural network is described carefully. A large number of sandstone computedtomography (CT) images are used as training input for...In this paper, the complete process of constructing 3D digital core by fullconvolutional neural network is described carefully. A large number of sandstone computedtomography (CT) images are used as training input for a fully convolutional neural networkmodel. This model is used to reconstruct the three-dimensional (3D) digital core of Bereasandstone based on a small number of CT images. The Hamming distance together with theMinkowski functions for porosity, average volume specifi c surface area, average curvature,and connectivity of both the real core and the digital reconstruction are used to evaluate theaccuracy of the proposed method. The results show that the reconstruction achieved relativeerrors of 6.26%, 1.40%, 6.06%, and 4.91% for the four Minkowski functions and a Hammingdistance of 0.04479. This demonstrates that the proposed method can not only reconstructthe physical properties of real sandstone but can also restore the real characteristics of poredistribution in sandstone, is the ability to which is a new way to characterize the internalmicrostructure of rocks.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
In an industrial park in Chonburi Province,about one-hour drive from the Thai capital of Bangkok,robotic arms on production lines move up and down,material-handling robots carrying components shuttle back and forth,an...In an industrial park in Chonburi Province,about one-hour drive from the Thai capital of Bangkok,robotic arms on production lines move up and down,material-handling robots carrying components shuttle back and forth,and Ferris wheel-shaped overhead tracks transport semi-finished products to the next destination.A factory equipped with a dedicated 5G network glows with automation,digitization,and intelligence.This is a fruit of China-Thailand cooperation on the digital economy.In recent years,Thailand’s digital economy has achieved rapid development with an average annual growth rate exceeding 15 percent,making it a star performer in Southeast Asia’s digital transformation.Chinese technology and solutions have played a pivotal role in this process.展开更多
The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the e...The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the emergence of digital twin networks(DTNs)that create digital-physical network mappings.While DTNs enable performance analysis through emulation testbeds,current research focuses on network-level systems,neglecting equipment-level emulation of critical components like core switches and routers.To address this issue,we propose v Fabric(short for virtual switch),a digital twin emulator for high-capacity core switching equipment.This solution implements virtual switching and network processor(NP)chip models through specialized processes,deployable on single or distributed servers via socket communication.The v Fabric emulator can realize the accurate emulation for the core switching equipment with 720 ports and 100 Gbit/s per port on the largest scale.To our knowledge,this represents the first digital twin emulation framework specifically designed for large-capacity core switching equipment in communication networks.展开更多
基金National Natural Science Foundation of China,No.42371175。
文摘As the most important large-scale communication infrastructure in the world today,submarine cable can profoundly reflect the global Internet communication pattern,and is of great significance for understanding the global digital divide.We used multi-scale and network analysis methods to depict the distribution pattern,network structure and spatio-temporal evolution of global submarine cables at the national and landing point scales,in order to analyze the current situation,challenges and main directions of global digital divide governance.Results show that:(1)spatial distribution of global submarine cables is unbalanced,the United States and Europe are the concentrated distribution areas of submarine cables and global information flow centers;(2)core connections of the global submarine cable network are only composed of a tiny minority of countries or regions or landing points,and have strong geographical proximity and clustered-type characteristic,noting that multitudinous landing points of developed countries are at the semi-periphery or even periphery of the network;(3)submarine cables can alleviate the global digital divide through the three paths of infrastructure universalization,digital ecosystem reconstruction and economic empowerment,and the global digital divide governance still faces the dilemma of the differences in digital strategy development and the lack of a governance system.However,due to the increasingly important position of cities in developing countries in the international communication pattern,the global digital divide problem is being alleviated.
基金the financial support for this research from the Program for the Program for young backbone teachers in Universities of Henan Province(No.2021GGJS007).
文摘Resilient smart urban water distribution networks are essential to ensure smooth urban operation and maintain daily water services.However,the dynamics and complexity of smart water distribution networks make its re-silience study face many challenges.The introduction of digital twin technology provides an innovative solution for the resilience study of smart water distribution networks,which can more effectively support the network’s real-time monitoring and intelligent control.This paper proposes a digital twin architecture of smart water dis-tribution networks,laying the foundation for the resilience assessment of water distribution networks.Based on this,a performance evaluation model based on user satisfaction is proposed,which can more intuitively and effectively reflect the performance of urban water supply services.Meanwhile,we propose a method to quantify the importance of water distribution pipes’residual resilience,considering the time value to optimize the re-covery sequence of failed pipes and develop targeted preventive maintenance strategies.Finally,to validate the effectiveness of the proposed method,this paper applies it to a water distribution network.The results show that the proposed method can significantly improve the resilience and enhance the overall resilience of smart urban water distribution networks.
基金supported by ZTE Industry-University-Institute Cooperation Funds under Grant No.HC-CN-20220722010。
文摘This paper proposes a concurrent neural network model to mitigate non-linear distortion in power amplifiers using a basis function generation approach.The model is designed using polynomial expansion and comprises a feedforward neural network(FNN)and a convolutional neural network(CNN).The proposed model takes the basic elements that form the bases as input,defined by the generalized memory polynomial(GMP)and dynamic deviation reduction(DDR)models.The FNN generates the basis function and its output represents the basis values,while the CNN generates weights for the corresponding bases.Through the concurrent training of FNN and CNN,the hidden layer coefficients are updated,and the complex multiplication of their outputs yields the trained in-phase/quadrature(I/Q)signals.The proposed model was trained and tested using 300 MHz and 400 MHz broadband data in an orthogonal frequency division multiplexing(OFDM)communication system.The results show that the model achieves an adjacent channel power ratio(ACPR)of less than-48 d B within a 100 MHz integral bandwidth for both the training and test datasets.
基金The National Natural Science Foundation of China(No60473015)
文摘A novel blind digital watermarking algorithm based on neural networks and multiwavelet transform is presented. The host image is decomposed through multiwavelet transform. There are four subblocks in the LL- level of the multiwavelet domain and these subblocks have many similarities. Watermark bits are added to low- frequency coefficients. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results demonstrate that the new algorithm is robust against a variety of attacks, especially, the watermark extraction does not require the original image.
基金The National High Technology Research and Development Program of China (863 Program) (No.2008AA01Z227)the Cultivatable Fund of the Key Scientific and Technical Innovation Project of Ministry of Education of China (No.706028)
文摘In order to enhance the accuracy and reliability of wireless location under non-line-of-sight (NLOS) environments,a novel neural network (NN) location approach using the digital broadcasting signals is presented. By the learning ability of the NN and the closely approximate unknown function to any degree of desired accuracy,the input-output mapping relationship between coordinates and the measurement data of time of arrival (TOA) and time difference of arrival (TDOA) is established. A real-time learning algorithm based on the extended Kalman filter (EKF) is used to train the multilayer perceptron (MLP) network by treating the linkweights of a network as the states of the nonlinear dynamic system. Since the EKF-based learning algorithm approximately gives the minimum variance estimate of the linkweights,the convergence is improved in comparison with the backwards error propagation (BP) algorithm. Numerical results illustrate thatthe proposedalgorithmcanachieve enhanced accuracy,and the performance ofthe algorithmis betterthanthat of the BP-based NN algorithm and the least squares (LS) algorithm in the NLOS environments. Moreover,this location method does not depend on a particular distribution of the NLOS error and does not need line-of-sight ( LOS ) or NLOS identification.
基金Supported by the National Natural Science Foun-dation of China ( 60473015)
文摘An effective blind digital watermarking algorithm based on neural networks in the wavelet domain is presented. Firstly, the host image is decomposed through wavelet transform. The significant coefficients of wavelet are selected according to the human visual system (HVS) characteristics. Watermark bits are added to them. And then effectively cooperates neural networks to learn the characteristics of the embedded watermark related to them. Because of the learning and adaptive capabilities of neural networks, the trained neural networks almost exactly recover the watermark from the watermarked image. Experimental results and comparisons with other techniques prove the effectiveness of the new algorithm.
基金supported by National Key R&D Program of China under Grant 2021YFB3901302 and 2021YFB2900301the National Natural Science Foundation of China under Grant 62271037,62001519,62221001,and U21A20445+1 种基金the State Key Laboratory of Advanced Rail Autonomous Operation under Grant RCS2022ZZ004the Fundamental Research Funds for the Central Universities under Grant 2022JBQY004.
文摘Integration of digital twin(DT)and wireless channel provides new solution of channel modeling and simulation,and can assist to design,optimize and evaluate intelligent wireless communication system and networks.With DT channel modeling,the generated channel data can be closer to realistic channel measurements without requiring a prior channel model,and amount of channel data can be significantly increased.Artificial intelligence(AI)based modeling approach shows outstanding performance to solve such problems.In this work,a channel modeling method based on generative adversarial networks is proposed for DT channel,which can generate identical statistical distribution with measured channel.Model validation is conducted by comparing DT channel characteristics with measurements,and results show that DT channel leads to fairly good agreement with measured channel.Finally,a link-layer simulation is implemented based on DT channel.It is found that the proposed DT channel model can be well used to conduct link-layer simulation and its performance is comparable to using measurement data.The observations and results can facilitate the development of DT channel modeling and provide new thoughts for DT channel applications,as well as improving the performance and reliability of intelligent communication networking.
基金the National Basic Research Program(973)of China(No.2007CB714103)
文摘A new algorithm to automatically extract drainage networks and catchments based on triangulation irregular networks(TINs) digital elevation model(DEM) was developed. The flow direction in this approach is determined by computing the spatial gradient of triangle and triangle edges. Outflow edge was defined by comparing the contribution area that is separated by the steepest descent of the triangle. Local channels were then tracked to build drainage networks. Both triangle edges and facets were considered to construct flow path. The algorithm has been tested in the site for Hawaiian Island of Kaho'olawe, and the results were compared with those calculated by ARCGIS as well as terrain map. The reported algorithm has been proved to be a reliable approach with high efficiency to generate well-connected and coherent drainage networks.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
基金partly supported by the National Natural Science Foundation of China (Grants No.62231017 and No.62071254)the Priority Academic Program Development of Jiangsu Higher Education Institutions。
文摘Massive content delivery will become one of the most prominent tasks of future B5G/6G communication.However,various multimedia applications possess huge differences in terms of object oriented(i.e.,machine or user)and corresponding quality evaluation metric,which will significantly impact the design of encoding or decoding within content delivery strategy.To get over this dilemma,we firstly integrate the digital twin into the edge networks to accurately and timely capture Quality-of-Decision(QoD)or Quality-of-Experience(QoE)for the guidance of content delivery.Then,in terms of machinecentric communication,a QoD-driven compression mechanism is designed for video analytics via temporally lightweight frame classification and spatially uneven quality assignment,which can achieve a balance among decision-making,delivered content,and encoding latency.Finally,in terms of user-centric communication,by fully leveraging haptic physical properties and semantic correlations of heterogeneous streams,we develop a QoE-driven video enhancement scheme to supply high data fidelity.Numerical results demonstrate the remarkable performance improvement of massive content delivery.
基金This project was supported by the National Natural Science Foundation of China (50277010)Doctoral Special Fund of Ministry of Education (20020532016) and Fund of Outstanding Young Scientist of Hunan University.
文摘An optimal design approach of high order FIR digital filter is developed based on the algorithm of neural networks with cosine basis function . The main idea is to minimize the sum of the square errors between the amplitude response of the desired FIR filter and that of the designed by training the weights of neural networks, then obtains the impulse response of FIR digital filter . The convergence theorem of the neural networks algorithm is presented and proved, and the optimal design method is introduced by designing four kinds of FIR digital filters , i.e., low-pass, high-pass, bandpass , and band-stop FIR digital filter. The results of the amplitude responses show that attenuation in stop-bands is more than 60 dB with no ripple and pulse existing in pass-bands, and cutoff frequency of passband and stop-band is easily controlled precisely .The presented optimal design approach of high order FIR digital filter is significantly effective.
文摘A new approach for the design of two-dimensional (2-D) linear phase FIR digital filters based on a new neural networks algorithm (NNA) is provided. A compact expression for the transfer function of a 2-D linear phase FIR filter is derived based on its frequency response characteristic, and the NNA, based on minimizing the square-error in the frequency-domain, is established according to the compact expression. To illustrate the stability of the NNA, the convergence theorem is presented and proved. Design examples are also given, and the results show that the ripple is considerably small in passband and stopband, and the NNA-based method is of powerful stability and requires quite little amount of computations.
文摘To ensure the safe operation of industrial digital twins network and avoid the harm to the system caused by hacker invasion,a series of discussions on network security issues are carried out based on game theory.From the perspective of the life cycle of network vulnerabilities,mining and repairing vulnerabilities are analyzed by applying evolutionary game theory.The evolution process of knowledge sharing among white hats under various conditions is simulated,and a game model of the vulnerability patch cooperative development strategy among manufacturers is constructed.On this basis,the differential evolution is introduced into the update mechanism of the Wolf Colony Algorithm(WCA)to produce better replacement individuals with greater probability from the perspective of both attack and defense.Through the simulation experiment,it is found that the convergence speed of the probability(X)of white Hat 1 choosing the knowledge sharing policy is related to the probability(x0)of white Hat 2 choosing the knowledge sharing policy initially,and the probability(y0)of white hat 2 choosing the knowledge sharing policy initially.When y0?0.9,X converges rapidly in a relatively short time.When y0 is constant and x0 is small,the probability curve of the“cooperative development”strategy converges to 0.It is concluded that the higher the trust among the white hat members in the temporary team,the stronger their willingness to share knowledge,which is conducive to the mining of loopholes in the system.The greater the probability of a hacker attacking the vulnerability before it is fully disclosed,the lower the willingness of manufacturers to choose the"cooperative development"of vulnerability patches.Applying the improved wolf colonyco-evolution algorithm can obtain the equilibrium solution of the"attack and defense game model",and allocate the security protection resources according to the importance of nodes.This study can provide an effective solution to protect the network security for digital twins in the industry.
基金supported by Natural Science Foundation of China(61871237,92067101)Program to Cultivate Middle-aged and Young Science Leaders of Universities of Jiangsu Province+1 种基金Key R&D plan of Jiangsu Province(BE2021013-3)。
文摘Fault diagnosis of 5G networks faces the challenges of heavy reliance on human experience and insufficient fault samples and relevant monitoring data.The digital twin technology can realize the interaction between virtual space and physical space through the fusion of model and data,providing a new paradigm for fault diagnosis.In this paper,we first propose a network digital twin model and apply it to 5G network diagnosis.We then use an improved Average Wasserstein GAN with Gradient Penalty(AWGAN-GP)method to discover and predict failures in the twin network.Finally,we use XGBoost algorithm to locate the faults in physical network in real time.Extensive simulation results show that the proposed approach can significantly increase fault prediction and diagnosis accuracy in the case of a small number of labeled failure samples in 5G networks.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
基金Prince Sultan University for funding this publication’s Article Process Charges(APC).
文摘Authorship verification is a crucial task in digital forensic investigations,where it is often necessary to determine whether a specific individual wrote a particular piece of text.Convolutional Neural Networks(CNNs)have shown promise in solving this problem,but their performance highly depends on the choice of hyperparameters.In this paper,we explore the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification.We conduct experiments using a Hyper Tuned CNN model with three popular optimization algorithms:Adaptive Moment Estimation(ADAM),StochasticGradientDescent(SGD),andRoot Mean Squared Propagation(RMSPROP).The model is trained and tested on a dataset of text samples collected from various authors,and the performance is evaluated using accuracy,precision,recall,and F1 score.We compare the performance of the three optimization algorithms and demonstrate the effectiveness of hyperparameter tuning in improving the accuracy of the CNN model.Our results show that the Hyper Tuned CNN model with ADAM Optimizer achieves the highest accuracy of up to 90%.Furthermore,we demonstrate that hyperparameter tuning can help achieve significant performance improvements,even using a relatively simple model architecture like CNNs.Our findings suggest that the choice of the optimization algorithm is a crucial factor in the performance of CNNs for authorship verification and that hyperparameter tuning can be an effective way to optimize this choice.Overall,this paper demonstrates the effectiveness of hyperparameter tuning in improving the performance of CNNs for authorship verification in digital forensic investigations.Our findings have important implications for developing accurate and reliable authorship verification systems,which are crucial for various applications in digital forensics,such as identifying the author of anonymous threatening messages or detecting cases of plagiarism.
基金the National Natural Science Foundation of China(No.41274129)Chuan Qing Drilling Engineering Company's Scientific Research Project:Seismic detection technology and application of complex carbonate reservoir in Sulige Majiagou Formation and the 2018 Central Supporting Local Co-construction Fund(No.80000-18Z0140504)the Construction and Development of Universities in 2019-Joint Support for Geophysics(Double First-Class center,80000-19Z0204)。
文摘In this paper, the complete process of constructing 3D digital core by fullconvolutional neural network is described carefully. A large number of sandstone computedtomography (CT) images are used as training input for a fully convolutional neural networkmodel. This model is used to reconstruct the three-dimensional (3D) digital core of Bereasandstone based on a small number of CT images. The Hamming distance together with theMinkowski functions for porosity, average volume specifi c surface area, average curvature,and connectivity of both the real core and the digital reconstruction are used to evaluate theaccuracy of the proposed method. The results show that the reconstruction achieved relativeerrors of 6.26%, 1.40%, 6.06%, and 4.91% for the four Minkowski functions and a Hammingdistance of 0.04479. This demonstrates that the proposed method can not only reconstructthe physical properties of real sandstone but can also restore the real characteristics of poredistribution in sandstone, is the ability to which is a new way to characterize the internalmicrostructure of rocks.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
文摘In an industrial park in Chonburi Province,about one-hour drive from the Thai capital of Bangkok,robotic arms on production lines move up and down,material-handling robots carrying components shuttle back and forth,and Ferris wheel-shaped overhead tracks transport semi-finished products to the next destination.A factory equipped with a dedicated 5G network glows with automation,digitization,and intelligence.This is a fruit of China-Thailand cooperation on the digital economy.In recent years,Thailand’s digital economy has achieved rapid development with an average annual growth rate exceeding 15 percent,making it a star performer in Southeast Asia’s digital transformation.Chinese technology and solutions have played a pivotal role in this process.
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant Nos.62171085,62272428,62001087,U20A20156,and 61871097the ZTE Industry-University-Institute Cooperation Funds under Grant No.HC-CN-20220722010。
文摘The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the emergence of digital twin networks(DTNs)that create digital-physical network mappings.While DTNs enable performance analysis through emulation testbeds,current research focuses on network-level systems,neglecting equipment-level emulation of critical components like core switches and routers.To address this issue,we propose v Fabric(short for virtual switch),a digital twin emulator for high-capacity core switching equipment.This solution implements virtual switching and network processor(NP)chip models through specialized processes,deployable on single or distributed servers via socket communication.The v Fabric emulator can realize the accurate emulation for the core switching equipment with 720 ports and 100 Gbit/s per port on the largest scale.To our knowledge,this represents the first digital twin emulation framework specifically designed for large-capacity core switching equipment in communication networks.