Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite...Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite-ground communications,focusing on enhancing system EE via optimized transmit beamforming and satellite orbit altitude selection.This paper first establishes an optimization problem to maximize system EE in a direct uplink satelliteground covert communication scenario.To solve this non-convex optimization problem,it is decomposed into two subproblems and solved using the successive convex approximation(SCA)method.Based on the above methods,this paper proposes an overall iterative optimization algorithm.Simulation results demonstrate that the proposed algorithm surpasses the conventional baseline algorithms in terms of system EE.Furthermore,they elucidate the correlation between the amount of information received by the receiver and the variations in the satellite’s orbital altitude.展开更多
The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant e...The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant effort and expense.Monitoring is becoming more efficient thanks to technologies such as Unmanned Aerial Vehicles(UAVs),which can access hard-to-reach areas and provide real-time data.However,in disaster-affected areas,these monitoring systems may encounter many obstacles when communicating with servers or transmitting monitored data.This paper proposes an adaptive communication model to overcome the challenges faced in disaster-affected areas.A base station is responsible for collecting data(such as images and videos)captured by UAVs performing surveillance within its communication range.This station is typically a tower providing fixed cellular network service.However,in the absence of such a tower,a selected UAV may serve as the station,depending on the situation.If surveillance needs to be performed outside the coverage area,it can continue to communicate via nearby UAVs through cooperative communication.UAVs with internet support,known as the Internet of Flying Things(IoFT),will also be utilized to enhance communication capacity and efficiency.The proposed communication model is validated through experiments,showing superior data transmission performance and higher throughput.Analysis indicates it outperforms traditional systems,even in rural areas,with or without internet access.展开更多
Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace divers...Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace diversity,and demonstrate their interactions,exchanges,and integration in tourism activities.As an important preserve of the distinctive cultures of the Chinese nation and a prominent world tourist destination,Ningxia should strive to foster and consolidate the sense of a community with a shared future for the Chinese nation in developing its tourism and culture under the new historical conditions.It is imperative to advance the prosperity and development of tourism and culture in boosting ethnic interactions,exchanges,and integration through the formulation of tourism and cultural policies and plans,as well as the development and design of tourism and cultural projects.展开更多
In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorit...In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorithm under communication constraints to achieve accurate system states of the interested system.An output-based event-triggered scheme is first employed to alleviate transmission burden.Accounting for the limited-communication-induced measurement bias,a novel bias calibration algorithm following the Kalman filtering line is developed to restrain the effect of the measurement bias on system estimation,thereby achieving accurate system state estimates.Subsequently,the Field Programmable Gate Array(FPGA)implementation of the proposed algorithm is also realized with the hope of providing fast bias calibration in practical scenarios.A simulation about a numerical example and a practical example(for gyroscope’s angular velocity bias calibration)on MATLAB is provided to demonstrate the feasibility and effectiveness of the proposed algorithm.展开更多
Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing de...Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.展开更多
The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential sc...The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential scenarios is vexed by the need for more theoretical support.This paper mainly studies the communication channel between the Tx at semibasement and receiver(Rx)at outdoor.The design of an effective communication system relies on an accurate understanding of channel characteristics.Channel measurements and ray-tracing channel modeling are conducted to obtain channel data.The influence of different positions at same semi-basement is studied.Typical channel characteristics are analyzed,such as power delay profile(PDP),power angular profile(PAP),root-mean-square(RMS)delay spread(DS),channel capacity,received power,and path loss.The influence of different semi-basement placements and different floor heights is also compared.Besides,the channel measurements and simulation data fit well,which can illustrate the validity and reliability of the acquired channel data.This paper can provide theoretical support for the design and optimization of smart meter communication systems in semi-basement scenarios.展开更多
V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles c...V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles can distort trust decisions and threaten road safety,privacy-preserving trust management is essential.Lu et al.previously presented BARS,an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication.In this system,reputation certificates without a vehicle identifier ensure anonymity,while two authorities jointly manage certificate issuance and reputation updates.However,the centralized certificate updates introduce scalability limitations,and the authorities can trace vehicle behavioral information,which threatens privacy guarantees.Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage.As a result,a key challenge in this line of research remains unresolved:how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preservingV2X trustmanagement.In this paper,we propose a distributed anonymous reputation system for V2X communication,based on an anonymous reputation system for crowdsensing.In our proposed system for V2X communication,the server is distributed to a certificate authority(CA)and roadside units(RSUs).Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval,and registers a short-time public key.In the interval,the messages from the vehicle are authenticated under the public key and are scored.At the end of the interval,the nearest RSU updates the certificate anonymously.Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU.A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities.Compared with BARS,where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays,our system performs each update locally at the nearest RSUonce per interval.The required interaction consists only of a fewkilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side,while the RSU-side processing is estimated to take about 40 ms based on timingmeasurements of the underlying cryptographic operations.This distributed updatemodel avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion.展开更多
This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Libe...This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Liberal Arts initiative and the national curriculum ideology policy.As global interactions intensify,cultivating foreign language professionals who possess both firm cultural confidence and sophisticated intercultural competence have become a critical educational imperative.This exploratory study investigates how a three-dimensional“Value-Knowledge-Competency”framework can guide the redesign of course content,task design,and assessment to achieve organic fusion.Drawing on qualitative data from a case study,it analyzes specific implementation pathways,synthesizes teacher and student feedback,and discusses the resultant challenges and broader implications for foreign language curriculum reform.The findings suggest that such an integrated approach can effectively synergize value guidance with skill cultivation,though its success hinges on overcoming issues related to pedagogical naturalness,resource allocation,and standardized evaluation.展开更多
Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different e...Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025).展开更多
Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and env...Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs.展开更多
Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper inv...Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing.It proposes a three-stage alternating optimization(TSAO)algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-toinfrastructure(V2I)links.To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints,the algorithm decomposes the original problem into three easily solvable sub-problems:RIS reflection coefficient optimization,vehicle transmission power optimization,and spectrum sharing optimization.First,the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP)method.Second,the optimal power points are determined in the power optimization sub-problem.Finally,the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm.The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS)requirements of the V2I links.Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing.展开更多
It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on l...It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.展开更多
The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communica...The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and...August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with展开更多
An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile c...An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.展开更多
Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detail...Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.展开更多
Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich c...Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.展开更多
Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymi...Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.展开更多
A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. A...A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.展开更多
基金supported in part by the National Natural Science Foundation of China under Grants 62025110,62271093sponsored by Natural Science Foundation of Chongqing,China,under Grant CSTB2023NSCQ-LZX0108.
文摘Efficient energy utilization in covert communication sustains covertness while assuring communication quality and efficiency.This paper investigates covert communication energy efficiency(EE)in direct uplink satellite-ground communications,focusing on enhancing system EE via optimized transmit beamforming and satellite orbit altitude selection.This paper first establishes an optimization problem to maximize system EE in a direct uplink satelliteground covert communication scenario.To solve this non-convex optimization problem,it is decomposed into two subproblems and solved using the successive convex approximation(SCA)method.Based on the above methods,this paper proposes an overall iterative optimization algorithm.Simulation results demonstrate that the proposed algorithm surpasses the conventional baseline algorithms in terms of system EE.Furthermore,they elucidate the correlation between the amount of information received by the receiver and the variations in the satellite’s orbital altitude.
文摘The modern world remains vulnerable to natural disasters,including floods,earthquakes,wildfires,and others.These events remain unpredictable and inevitable,and recovering quickly and effectively requires significant effort and expense.Monitoring is becoming more efficient thanks to technologies such as Unmanned Aerial Vehicles(UAVs),which can access hard-to-reach areas and provide real-time data.However,in disaster-affected areas,these monitoring systems may encounter many obstacles when communicating with servers or transmitting monitored data.This paper proposes an adaptive communication model to overcome the challenges faced in disaster-affected areas.A base station is responsible for collecting data(such as images and videos)captured by UAVs performing surveillance within its communication range.This station is typically a tower providing fixed cellular network service.However,in the absence of such a tower,a selected UAV may serve as the station,depending on the situation.If surveillance needs to be performed outside the coverage area,it can continue to communicate via nearby UAVs through cooperative communication.UAVs with internet support,known as the Internet of Flying Things(IoFT),will also be utilized to enhance communication capacity and efficiency.The proposed communication model is validated through experiments,showing superior data transmission performance and higher throughput.Analysis indicates it outperforms traditional systems,even in rural areas,with or without internet access.
文摘Ningxia is an ethnic gathering area boasting abundant tourism and cultural resources.Developing the cause of tourism and culture is an important way to encourage all ethnic groups to respect differences,embrace diversity,and demonstrate their interactions,exchanges,and integration in tourism activities.As an important preserve of the distinctive cultures of the Chinese nation and a prominent world tourist destination,Ningxia should strive to foster and consolidate the sense of a community with a shared future for the Chinese nation in developing its tourism and culture under the new historical conditions.It is imperative to advance the prosperity and development of tourism and culture in boosting ethnic interactions,exchanges,and integration through the formulation of tourism and cultural policies and plans,as well as the development and design of tourism and cultural projects.
基金support from the National Natural Science Foundation of China(Grant Nos.U2330206,U2230206,62173068)Sichuan Science and Technology Program(Grants Nos.2024NSFSC1483,2024ZYD0156,2023NSFC1962,DQ202412).
文摘In data communication,limited communication resources often lead to measurement bias,which adversely affects subsequent system estimation if not effectively handled.This paper proposes a novel bias calibration algorithm under communication constraints to achieve accurate system states of the interested system.An output-based event-triggered scheme is first employed to alleviate transmission burden.Accounting for the limited-communication-induced measurement bias,a novel bias calibration algorithm following the Kalman filtering line is developed to restrain the effect of the measurement bias on system estimation,thereby achieving accurate system state estimates.Subsequently,the Field Programmable Gate Array(FPGA)implementation of the proposed algorithm is also realized with the hope of providing fast bias calibration in practical scenarios.A simulation about a numerical example and a practical example(for gyroscope’s angular velocity bias calibration)on MATLAB is provided to demonstrate the feasibility and effectiveness of the proposed algorithm.
基金The author Dr.Arshiya S.Ansari extends the appreciation to the Deanship of Postgraduate Studies and Scientific Research at Majmaah University for funding this research work through the project number(R-2025-1538).
文摘Voice, motion, and mimicry are naturalistic control modalities that have replaced text or display-driven control in human-computer communication (HCC). Specifically, the vocals contain a lot of knowledge, revealing details about the speaker’s goals and desires, as well as their internal condition. Certain vocal characteristics reveal the speaker’s mood, intention, and motivation, while word study assists the speaker’s demand to be understood. Voice emotion recognition has become an essential component of modern HCC networks. Integrating findings from the various disciplines involved in identifying vocal emotions is also challenging. Many sound analysis techniques were developed in the past. Learning about the development of artificial intelligence (AI), and especially Deep Learning (DL) technology, research incorporating real data is becoming increasingly common these days. Thus, this research presents a novel selfish herd optimization-tuned long/short-term memory (SHO-LSTM) strategy to identify vocal emotions in human communication. The RAVDESS public dataset is used to train the suggested SHO-LSTM technique. Mel-frequency cepstral coefficient (MFCC) and wiener filter (WF) techniques are used, respectively, to remove noise and extract features from the data. LSTM and SHO are applied to the extracted data to optimize the LSTM network’s parameters for effective emotion recognition. Python Software was used to execute our proposed framework. In the finding assessment phase, Numerous metrics are used to evaluate the proposed model’s detection capability, Such as F1-score (95%), precision (95%), recall (96%), and accuracy (97%). The suggested approach is tested on a Python platform, and the SHO-LSTM’s outcomes are contrasted with those of other previously conducted research. Based on comparative assessments, our suggested approach outperforms the current approaches in vocal emotion recognition.
基金supported by the Natural Science Foundation of Shandong Province under Grant ZR2024MF062the open research fund of National Mobile Communications Research Laboratory,Southeast University under Grants 2025D03+1 种基金the Future Plan Program for Young Scholars of Shandong University,and the Innovation and Technology Support Program for Young Scholars of Colleges and Universities in Shandong Province under Grant 2022KJ009The B6G R&D Group in Shandong University is greatly thanked for channel measurements.
文摘The smart meter communication system has substantial application value for the construction and upgrading of the entire power system.The deployment of the transmitter(Tx)of the smart meter system in the residential scenarios is vexed by the need for more theoretical support.This paper mainly studies the communication channel between the Tx at semibasement and receiver(Rx)at outdoor.The design of an effective communication system relies on an accurate understanding of channel characteristics.Channel measurements and ray-tracing channel modeling are conducted to obtain channel data.The influence of different positions at same semi-basement is studied.Typical channel characteristics are analyzed,such as power delay profile(PDP),power angular profile(PAP),root-mean-square(RMS)delay spread(DS),channel capacity,received power,and path loss.The influence of different semi-basement placements and different floor heights is also compared.Besides,the channel measurements and simulation data fit well,which can illustrate the validity and reliability of the acquired channel data.This paper can provide theoretical support for the design and optimization of smart meter communication systems in semi-basement scenarios.
文摘V2X communication enables vehicles to share real-time traffic and road-condition data,but binding messages to persistent identifiers enables location tracking.Furthermore,since forged reports from malicious vehicles can distort trust decisions and threaten road safety,privacy-preserving trust management is essential.Lu et al.previously presented BARS,an anonymous reputation mechanism founded on blockchain technology to establish a privacy-preserving trust architecture for V2X communication.In this system,reputation certificates without a vehicle identifier ensure anonymity,while two authorities jointly manage certificate issuance and reputation updates.However,the centralized certificate updates introduce scalability limitations,and the authorities can trace vehicle behavioral information,which threatens privacy guarantees.Several subsequent systems derived from BARS still rely on centralized certificate management and are subject to authority-side privacy leakage.As a result,a key challenge in this line of research remains unresolved:how to decentralize the certificate-update process while preserving privacy against the authorities in privacy-preservingV2X trustmanagement.In this paper,we propose a distributed anonymous reputation system for V2X communication,based on an anonymous reputation system for crowdsensing.In our proposed system for V2X communication,the server is distributed to a certificate authority(CA)and roadside units(RSUs).Each vehicle shows the reputation level to the nearest RSU at the beginning of each time interval,and registers a short-time public key.In the interval,the messages from the vehicle are authenticated under the public key and are scored.At the end of the interval,the nearest RSU updates the certificate anonymously.Our solution decentralizes the certificate-update process by assigning each update to the nearest RSU.A zero-knowledge-proof-based show protocol removes the need for any central authority to handle vehicle certificates and thus prevents the authorities from tracing vehicle activities.Compared with BARS,where centralized authorities must update the reputation certificates of many vehicles and may incur communication and processing delays,our system performs each update locally at the nearest RSUonce per interval.The required interaction consists only of a fewkilobytes of communication and a zero-knowledge proof that is almost fully precomputed on the vehicle side,while the RSU-side processing is estimated to take about 40 ms based on timingmeasurements of the underlying cryptographic operations.This distributed updatemodel avoids the centralized bottleneck of BARS and simultaneously removes the privacy risk arising from authority collusion.
基金Funding Source:2024 Heilongjiang Province Higher Education Teaching Reform Key Research Project.Project Name:Practice and Exploration of Curriculum-Based Political Education in the Intercultural Communication Course Under the New Liberal Arts Framework(Grant No.SJGZB2024063).
文摘This study investigates how to pedagogically integrate ideological education with competency development in the Intercultural Communication course,a challenge arising from China’s dual reform contexts of the New Liberal Arts initiative and the national curriculum ideology policy.As global interactions intensify,cultivating foreign language professionals who possess both firm cultural confidence and sophisticated intercultural competence have become a critical educational imperative.This exploratory study investigates how a three-dimensional“Value-Knowledge-Competency”framework can guide the redesign of course content,task design,and assessment to achieve organic fusion.Drawing on qualitative data from a case study,it analyzes specific implementation pathways,synthesizes teacher and student feedback,and discusses the resultant challenges and broader implications for foreign language curriculum reform.The findings suggest that such an integrated approach can effectively synergize value guidance with skill cultivation,though its success hinges on overcoming issues related to pedagogical naturalness,resource allocation,and standardized evaluation.
基金supported by the National Natural Science Foundation of China(62462040)the Yunnan Fundamental Research Projects(202501AT070345)the Major Science and Technology Projects in Yunnan Province(202202AD080013).
文摘Federated learning often experiences slow and unstable convergence due to edge-side data heterogeneity.This problem becomes more severe when edge participation rate is low,as the information collected from different edge devices varies significantly.As a result,communication overhead increases,which further slows down the convergence process.To address this challenge,we propose a simple yet effective federated learning framework that improves consistency among edge devices.The core idea is clusters the lookahead gradients collected from edge devices on the cloud server to obtain personalized momentum for steering local updates.In parallel,a global momentum is applied during model aggregation,enabling faster convergence while preserving personalization.This strategy enables efficient propagation of the estimated global update direction to all participating edge devices and maintains alignment in local training,without introducing extra memory or communication overhead.We conduct extensive experiments on benchmark datasets such as Cifar100 and Tiny-ImageNet.The results confirm the effectiveness of our framework.On CIFAR-100,our method reaches 55%accuracy with 37 fewer rounds and achieves a competitive final accuracy of 65.46%.Even under extreme non-IID scenarios,it delivers significant improvements in both accuracy and communication efficiency.The implementation is publicly available at https://github.com/sjmp525/CollaborativeComputing/tree/FedCCM(accessed on 20 October 2025).
基金supported in part by the National Natural Science Foundation of China(Key Program)under Grant No.62031021。
文摘Cascading failures pose a serious threat to the survivability of underwater unmanned swarm networks(UUSNs),significantly limiting their service ability in collaborative missions such as military reconnaissance and environmental monitoring.Existing failure models primarily focus on power grids and traffic systems,and don't address the unique challenges of weak-communication UUSNs.In UUSNs,cascading failure present a complex and dynamic process driven by the coupling of unstable acoustic channels,passive node drift,adversarial attacks,and network heterogeneity.To address these challenges,a directed weighted graph model of UUSNs is first developed,in which node positions are updated according to ocean-current-driven drift and link weights reflect the probability of successful acoustic transmission.Building on this UUSNs graph model,a cascading failure model is proposed that integrates a normal-failure-recovery state-cycle mechanism,multiple attack strategies,and routingbased load redistribution.Finally,under a five-level connectivity UUSNs scheme,simulations are conducted to analyze how dynamic topology,network load,node recovery delay,and attack modes jointly affect network survivability.The main findings are:(1)moderate node drift can improve survivability by activating weak links;(2)based-energy routing(BER)outperform based-depth routing(BDR)in harsh conditions;(3)node self-recovery time is critical to network survivability;(4)traditional degree-based critical node metrics are inadequate for weak-communication UUSNs.These results provide a theoretical foundation for designing robust survivability mechanisms in weak-communication UUSNs.
基金National Natural Science Foundation of China(Nos.61772130,71171045 and 61901104)Innovation Program of Shanghai Municipal Education Commission,China(No.14YZ130)。
文摘Vehicular communication systems rely on secure vehicle-to-vehicle(V2V)communications for safety-critical information exchange.However,the presence of eavesdropping vehicles poses a significant challenge.This paper investigates the security of V2V communications in reconfigurable intelligent surface(RIS)-assisted vehicular communication systems with spectrum sharing.It proposes a three-stage alternating optimization(TSAO)algorithm to address the complex problem of multiple eavesdropped V2V links that reuse the spectrum already occupied by vehicle-toinfrastructure(V2I)links.To solve the mixed-integer and non-convex optimization problem due to coupled variables and complex constraints,the algorithm decomposes the original problem into three easily solvable sub-problems:RIS reflection coefficient optimization,vehicle transmission power optimization,and spectrum sharing optimization.First,the RIS reflection coefficients are optimized by using the penalty convex-concave procedure(CCP)method.Second,the optimal power points are determined in the power optimization sub-problem.Finally,the spectrum sharing optimization sub-problem is constructed as a weighted bipartite graph matching problem and solved by using the optimal matching algorithm.The TSAO algorithm not only maximizes the sum V2V secrecy rate but also ensures the quality-of-service(QoS)requirements of the V2I links.Simulation results validate the superiority of the proposed algorithm and highlight the improvement in the sum V2V secrecy rate achieved by utilizing RIS technology in vehicular communication systems with spectrum sharing.
文摘It has been suggested that text-based computer-mediated communication can help learners to use target language both in classrooms and in social contexts.It’s necessary to investigate the effect of text-based CMC on learners’communicative competence by conducting the method of systematic review.The findings implied that text-based CMC settings allowed learners to interact.The interaction provided learners with more opportunities to develop their communicative competence of target language.
文摘The development of science and technology has made it not only possible but very convenient for people living in different parts of the world to communicate with each other, thus bringing forth a new form of communication: computer-mediated communication (CMC). Text-based CMC is one of the most popular forms of CMC in which people send instant messages to others in different settings. Since this mode of interaction combines features of both the written and spoken language (Greenfield & Subrahmanyam, 2003), it's of great interest whether it follows the same sequential rule as the telephone conversation. However, compared to telephone conversations, computer-mediated communication has received much less attention, let alone text-based CMC. The existing body of literature mostly focuses on content analysis and linguistic features but neglects the sequential organization of such interaction (Paolillo, 1999; Greenfield and Subrahmanyam, 2003; Herring, 1999). In light of this, this paper examines the opening moves of instant message exchanges among Chinese adults in an attempt to find out the unique features characterizing the way they open an online chat. The framework that was chosen for data analysis was the sequential model proposed by Schegloff for American telephone openings.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hypercoverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experi-ence greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reali¬ty(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘August 4-August 7, 2014 Shanghai, China http:/www.icccn.org/icccn14/ICCCN is one of the leading international conferences for presenting noel ideas and fundamental advances in the fields of computer communications and networks. ICCCN serves to foster communication among researchers and practitioners with
基金National Natural Science Foundation of China(No.69372004)
文摘An adaptive statistic model for mobile communication channel is studied and simulated in this paper. According to the model parameters, an error sequence describing the long burst error characteristics of the mobile communication channel is generated on a computer. A test method using threshold technique is presented to verify the accuracy of the adaptive channel model.
文摘Following the massive commercialization of 5G mobile communication systems,both academia and industry are initiating research activities to shape the next-generation communication systems,namely,6G.Although the detailed killer-applications and key technologies of 6G have not been clearly defined yet,it is commonly expected that 6G will provide hyper-coverage and hyper-connectivity.Enabled by these capabilities,the 6G communication systems are especially aiming at improving the user’s experience greatly,or more ambitiously,to change the way of human’s everyday life.So far,many new services with more stringent requirements,such as truly immersive extended reality(XR),high-fidelity mobile hologram,and digital replica,are expected to be satisfied by the 6G communication systems.
文摘Computer video games,which are based on personal computers,game consoles,and portable devices,can be played solo or multiplayer,and over networks. Interaction,which is the basic characteristic of games,provides rich communication opportunities for audiences. Meanwhile,narrative is a far more diverse concept to be considered as a distinctly important way of communication. This essay will compare and contrast the communication opportunities provided by narratives and computer games.
文摘Anonymity, an important feature of computer-mediated communication (CMC), is embedded in this new technology. With the penetration of the Internet in society, many daily activities involve online interactions. Anonymity affects both the task and social aspects of online communication including information exchange, decision making, and relationship development. This review examines the effects of anonymity on human behavior. It outlines how the prior literature has attempted to address this issue and how the Social Identity Deindividuation (SIDE) model has developed as an attempt to tackle this question. More importantly, it discusses a framework describing the multidimensions of anonymity in CMC [1], and subsequently raised five propositions inspired by this framework. Furthermore, using McLeod’s framework, this review evaluates SIDE studies with regard to their anonymity manipulations. This critique reveals possible future research directions for refining the SIDE model and better studying the effect of anonymity in virtual environment.
文摘A peculiarity of control network systems is the automatic implementation mode of monitoring and control, without outside intervention in a control process. This mode imposes rigid restrictions upon transmitted data. All circulating data should comply to the defined time interval in which their reliability is definite. In other word communication has to be predictable and time-constrained in order to produce control output in time. This characteristic corresponds to concept 《determinism》 that characterizes an ability of a protocol to guarantee equivalent and opportune network access with the delay not exceeding definite time interval. For development of a deterministic and noise-resistant protocol is necessary to carry out analysis of an error model obtained by the computer simulation of an electromagnetic process in conditions of variety and intensity of interference. The formalization of the error model gives computer simulation an ability to get the error sequence directly without simulation of the electromagnetic process. The results of the simulation of an error sequence can be used for the expediency analysis of a noise-resistant encoding and the analysis of an error-correcting ability.