Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de...Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.展开更多
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l...It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.展开更多
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica...The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and...August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with展开更多
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c...An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich c...Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.展开更多
Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymi...Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.展开更多
A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. A...A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.展开更多
This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system e...This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system encourages the sender to take the emotional perspective of the message receiver by giving the sender a sense of how his message may affect the intended receiver, and by allowing the sender to reconsider sending the message or revise it. The objective of an emotionally enhanced communication system is to raise awareness to the ease in which a written word might be misinterpreted since emotions are too often unseen due to the nature of lean communication media. In order to show the receiver’s assumed emotion, the written text would be parsed before sending the message. An algorithm, for demonstrating the prediction of the emotion a written message might evoke, will choose a facial expression from a pool of 7 expressions, according to the words and phrases inserted in the message. We conducted a user test to evaluate the acceptance and attitudes toward such an emotionally enhanced communication system and received a high level of acceptance and favorable attitudes towards using it.展开更多
Brain-computer interfaces(BCIs)represent an emerging technology that facilitates direct communication between the brain and external devices.In recent years,numerous review articles have explored various aspects of BC...Brain-computer interfaces(BCIs)represent an emerging technology that facilitates direct communication between the brain and external devices.In recent years,numerous review articles have explored various aspects of BCIs,including their fundamental principles,technical advancements,and applications in specific domains.However,these reviews often focus on signal processing,hardware development,or limited applications such as motor rehabilitation or communication.This paper aims to offer a comprehensive review of recent electroencephalogram(EEG)-based BCI applications in the medical field across 8 critical areas,encompassing rehabilitation,daily communication,epilepsy,cerebral resuscitation,sleep,neurodegenerative diseases,anesthesiology,and emotion recognition.Moreover,the current challenges and future trends of BCIs were also discussed,including personal privacy and ethical concerns,network security vulnerabilities,safety issues,and biocompatibility.展开更多
Advancements in mode-division multiplexing(MDM)techniques,aimed at surpassing the Shannon limit and augmenting transmission capacity,have garnered significant attention in optical fiber communica-tion,propelling the d...Advancements in mode-division multiplexing(MDM)techniques,aimed at surpassing the Shannon limit and augmenting transmission capacity,have garnered significant attention in optical fiber communica-tion,propelling the demand for high-quality multiplexers and demultiplexers.However,the criteria for ideal-mode multiplexers/demultiplexers,such as performance,scalability,compatibility,and ultra-compactness,have only partially been achieved using conventional bulky devices(e.g.,waveguides,grat-ings,and free space optics)—an issue that will substantially restrict the application of MDM techniques.Here,we present a neuro-meta-router(NMR)optimized through deep learning that achieves spatial multi-mode division and supports multi-channel communication,potentially offering scalability,com-patibility,and ultra-compactness.An MDM communication system based on an NMR is theoretically designed and experimentally demonstrated to enable simultaneous and independent multi-dataset transmission,showcasing a capacity of up to 100 gigabits per second(Gbps)and a symbol error rate down to the order of 104,all achieved without any compensation technologies or correlation devices.Our work presents a paradigm that merges metasurfaces,fiber communications,and deep learning,with potential applications in intelligent metasurface-aided optical interconnection,as well as all-optical pat-tern recognition and classification.展开更多
In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its as...In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.展开更多
In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(...In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP.展开更多
With the boom in maritime activities,the need for highly reliable maritime communication is becoming urgent,which is an important component of 5G/6G communication networks.However,the bandwidth reuse characteristic of...With the boom in maritime activities,the need for highly reliable maritime communication is becoming urgent,which is an important component of 5G/6G communication networks.However,the bandwidth reuse characteristic of 5G/6G networks will inevitably lead to severe interference,resulting in degradation in the communication performance of maritime users.In this paper,we propose a safe deep reinforcement learning based interference coordination scheme to jointly optimize the power control and bandwidth allocation in maritime communication systems,and exploit the quality-of-service requirements of users as the risk value references to evaluate the communication policies.In particular,this scheme designs a deep neural network to select the communication policies through the evaluation network and update the parameters using the target network,which improves the communication performance and speeds up the convergence rate.Moreover,the Nash equilibrium of the interference coordination game and the computational complexity of the proposed scheme are analyzed.Simulation and experimental results verify the performance gain of the proposed scheme compared with benchmarks.展开更多
When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current ...When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained.展开更多
The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the sev...The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.展开更多
1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their...1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their incredible speed of development and wide-reaching impact,mobile communications serve as the cornerstone of the Internet of Everything,profoundly reshaping human cognitive abilities and ways of thinking.Furthermore,mobile communications are altering the patterns of production and life,driving leaps in productivity quality,and strongly promot-ing innovation within human civilization.展开更多
Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing...Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing the way devices interact and communicate in dynamic and uncertain situations.Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system.Therefore,it leads to the design of effective and trusted routing to support sustainable smart cities.This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model,which combines big data analytics and analysis rules to evaluate user feedback.The sentiment analysis is utilized to assess the perception of network performance,allowing the classification of device behavior as positive,neutral,or negative.By integrating sentiment-driven insights,the IoT network adjusts the system configurations to enhance the performance using network behaviour in terms of latency,reliability,fault tolerance,and sentiment score.Accordingly to the analysis,the proposed model categorizes the behavior of devices as positive,neutral,or negative,facilitating real-time monitoring for crucial applications.Experimental results revealed a significant improvement in the proposed model for threat prevention and network efficiency,demonstrating its resilience for real-time IoT applications.展开更多
基金The author Dr.Arshiya S.Ansari extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number(R-2025-1538).
文摘Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.
文摘It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.
文摘The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with
基金National Natural Science Foundation of China(No.69372004)
文摘An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.
文摘Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.
文摘A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.
文摘This paper describes the design of a prototype for an emotionally enhanced computer mediated communication system which is aimed at compensating for the emotional distance between communicators. The prototype system encourages the sender to take the emotional perspective of the message receiver by giving the sender a sense of how his message may affect the intended receiver, and by allowing the sender to reconsider sending the message or revise it. The objective of an emotionally enhanced communication system is to raise awareness to the ease in which a written word might be misinterpreted since emotions are too often unseen due to the nature of lean communication media. In order to show the receiver’s assumed emotion, the written text would be parsed before sending the message. An algorithm, for demonstrating the prediction of the emotion a written message might evoke, will choose a facial expression from a pool of 7 expressions, according to the words and phrases inserted in the message. We conducted a user test to evaluate the acceptance and attitudes toward such an emotionally enhanced communication system and received a high level of acceptance and favorable attitudes towards using it.
基金supported by the National Key R&D Program of China(2021YFF1200602)the National Science Fund for Excellent Overseas Scholars(0401260011)+3 种基金the National Defense Science and Technology Innovation Fund of Chinese Academy of Sciences(c02022088)the Tianjin Science and Technology Program(20JCZDJC00810)the National Natural Science Foundation of China(82202798)the Shanghai Sailing Program(22YF1404200).
文摘Brain-computer interfaces(BCIs)represent an emerging technology that facilitates direct communication between the brain and external devices.In recent years,numerous review articles have explored various aspects of BCIs,including their fundamental principles,technical advancements,and applications in specific domains.However,these reviews often focus on signal processing,hardware development,or limited applications such as motor rehabilitation or communication.This paper aims to offer a comprehensive review of recent electroencephalogram(EEG)-based BCI applications in the medical field across 8 critical areas,encompassing rehabilitation,daily communication,epilepsy,cerebral resuscitation,sleep,neurodegenerative diseases,anesthesiology,and emotion recognition.Moreover,the current challenges and future trends of BCIs were also discussed,including personal privacy and ethical concerns,network security vulnerabilities,safety issues,and biocompatibility.
基金supported by the National Key Research and Development Program of China(2023YFB2804704)the National Natural Science Foundation of China(12174292,12374278,and 62105250).
文摘Advancements in mode-division multiplexing(MDM)techniques,aimed at surpassing the Shannon limit and augmenting transmission capacity,have garnered significant attention in optical fiber communica-tion,propelling the demand for high-quality multiplexers and demultiplexers.However,the criteria for ideal-mode multiplexers/demultiplexers,such as performance,scalability,compatibility,and ultra-compactness,have only partially been achieved using conventional bulky devices(e.g.,waveguides,grat-ings,and free space optics)—an issue that will substantially restrict the application of MDM techniques.Here,we present a neuro-meta-router(NMR)optimized through deep learning that achieves spatial multi-mode division and supports multi-channel communication,potentially offering scalability,com-patibility,and ultra-compactness.An MDM communication system based on an NMR is theoretically designed and experimentally demonstrated to enable simultaneous and independent multi-dataset transmission,showcasing a capacity of up to 100 gigabits per second(Gbps)and a symbol error rate down to the order of 104,all achieved without any compensation technologies or correlation devices.Our work presents a paradigm that merges metasurfaces,fiber communications,and deep learning,with potential applications in intelligent metasurface-aided optical interconnection,as well as all-optical pat-tern recognition and classification.
基金supported by Beijing Natural Science Fund–Haidian Original Innovation Joint Fund(L232040 and L232045).
文摘In this paper,we investigate a multi-UAV aided NOMA communication system,where multiple UAV-mounted aerial base stations are employed to serve ground users in the downlink NOMA communication,and each UAV serves its associated users on its own bandwidth.We aim at maximizing the overall common throughput in a finite time period.Such a problem is a typical mixed integer nonlinear problem,which involves both continuous-variable and combinatorial optimizations.To efficiently solve this problem,we propose a two-layer algorithm,which separately tackles continuous-variable and combinatorial optimization.Specifically,in the inner layer given one user association scheme,subproblems of bandwidth allocation,power allocation and trajectory design are solved based on alternating optimization.In the outer layer,a small number of candidate user association schemes are generated from an initial scheme and the best solution can be determined by comparing all the candidate schemes.In particular,a clustering algorithm based on K-means is applied to produce all candidate user association schemes,the successive convex optimization technique is adopted in the power allocation subproblem and a logistic function approximation approach is employed in the trajectory design subproblem.Simulation results show that the proposed NOMA scheme outperforms three baseline schemes in downlink common throughput,including one solution proposed in an existing literature.
基金supported by the CAS Project for Young Scientists in Basic Research under Grant YSBR-035Jiangsu Provincial Key Research and Development Program under Grant BE2021013-2.
文摘In covert communications,joint jammer selection and power optimization are important to improve performance.However,existing schemes usually assume a warden with a known location and perfect Channel State Information(CSI),which is difficult to achieve in practice.To be more practical,it is important to investigate covert communications against a warden with uncertain locations and imperfect CSI,which makes it difficult for legitimate transceivers to estimate the detection probability of the warden.First,the uncertainty caused by the unknown warden location must be removed,and the Optimal Detection Position(OPTDP)of the warden is derived which can provide the best detection performance(i.e.,the worst case for a covert communication).Then,to further avoid the impractical assumption of perfect CSI,the covert throughput is maximized using only the channel distribution information.Given this OPTDP based worst case for covert communications,the jammer selection,the jamming power,the transmission power,and the transmission rate are jointly optimized to maximize the covert throughput(OPTDP-JP).To solve this coupling problem,a Heuristic algorithm based on Maximum Distance Ratio(H-MAXDR)is proposed to provide a sub-optimal solution.First,according to the analysis of the covert throughput,the node with the maximum distance ratio(i.e.,the ratio of the distances from the jammer to the receiver and that to the warden)is selected as the friendly jammer(MAXDR).Then,the optimal transmission and jamming power can be derived,followed by the optimal transmission rate obtained via the bisection method.In numerical and simulation results,it is shown that although the location of the warden is unknown,by assuming the OPTDP of the warden,the proposed OPTDP-JP can always satisfy the covertness constraint.In addition,with an uncertain warden and imperfect CSI,the covert throughput provided by OPTDP-JP is 80%higher than the existing schemes when the covertness constraint is 0.9,showing the effectiveness of OPTDP-JP.
文摘With the boom in maritime activities,the need for highly reliable maritime communication is becoming urgent,which is an important component of 5G/6G communication networks.However,the bandwidth reuse characteristic of 5G/6G networks will inevitably lead to severe interference,resulting in degradation in the communication performance of maritime users.In this paper,we propose a safe deep reinforcement learning based interference coordination scheme to jointly optimize the power control and bandwidth allocation in maritime communication systems,and exploit the quality-of-service requirements of users as the risk value references to evaluate the communication policies.In particular,this scheme designs a deep neural network to select the communication policies through the evaluation network and update the parameters using the target network,which improves the communication performance and speeds up the convergence rate.Moreover,the Nash equilibrium of the interference coordination game and the computational complexity of the proposed scheme are analyzed.Simulation and experimental results verify the performance gain of the proposed scheme compared with benchmarks.
文摘When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained.
文摘The rapid development of communication technology and computer networks has brought a lot of convenience to production and life,but it also increases the security problem.Information security has become one of the severe challenges faced by people in the digital age.Currently,the security problems facing the field of communication technology and computer networks in China mainly include the evolution of offensive technology,the risk of large-scale data transmission,the potential vulnerabilities introduced by emerging technology,and the dilemma of user identity verification.This paper analyzes the frontier challenges of communication technology and computer network security,and puts forward corresponding solutions,hoping to provide ideas for coping with the security challenges of communication technology and computer networks.
基金supported by the National Key Research and Develop-ment Program of China(2019YFB1803400).
文摘1.Introduction Mobile communications have catalyzed a new era of informa-tion technology revolution,significantly broadening and deepen-ing human-to-human,human-to-machine,and machine-to-machine connections.With their incredible speed of development and wide-reaching impact,mobile communications serve as the cornerstone of the Internet of Everything,profoundly reshaping human cognitive abilities and ways of thinking.Furthermore,mobile communications are altering the patterns of production and life,driving leaps in productivity quality,and strongly promot-ing innovation within human civilization.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University under Grant No.DGSSR-2024-02-01011.
文摘Wireless technologies and the Internet of Things(IoT)are being extensively utilized for advanced development in traditional communication systems.This evolution lowers the cost of the extensive use of sensors,changing the way devices interact and communicate in dynamic and uncertain situations.Such a constantly evolving environment presents enormous challenges to preserving a secure and lightweight IoT system.Therefore,it leads to the design of effective and trusted routing to support sustainable smart cities.This research study proposed a Genetic Algorithm sentiment-enhanced secured optimization model,which combines big data analytics and analysis rules to evaluate user feedback.The sentiment analysis is utilized to assess the perception of network performance,allowing the classification of device behavior as positive,neutral,or negative.By integrating sentiment-driven insights,the IoT network adjusts the system configurations to enhance the performance using network behaviour in terms of latency,reliability,fault tolerance,and sentiment score.Accordingly to the analysis,the proposed model categorizes the behavior of devices as positive,neutral,or negative,facilitating real-time monitoring for crucial applications.Experimental results revealed a significant improvement in the proposed model for threat prevention and network efficiency,demonstrating its resilience for real-time IoT applications.