The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the e...The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the emergence of digital twin networks(DTNs)that create digital-physical network mappings.While DTNs enable performance analysis through emulation testbeds,current research focuses on network-level systems,neglecting equipment-level emulation of critical components like core switches and routers.To address this issue,we propose v Fabric(short for virtual switch),a digital twin emulator for high-capacity core switching equipment.This solution implements virtual switching and network processor(NP)chip models through specialized processes,deployable on single or distributed servers via socket communication.The v Fabric emulator can realize the accurate emulation for the core switching equipment with 720 ports and 100 Gbit/s per port on the largest scale.To our knowledge,this represents the first digital twin emulation framework specifically designed for large-capacity core switching equipment in communication networks.展开更多
The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becom...The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.展开更多
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se...Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.展开更多
As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been stan...As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.展开更多
Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,stati...Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,statistics are taken on the deviation between the magnitude of a single station and the average magnitude of the network. It is found that the magnitudes average deviation of each station is-0. 31-0. 68. Statistics are also taken for the period corresponding to the maximum amplitude of the record measured in each station for calculating the magnitude,and the dominant period gained is 0. 06s-0. 38s; site response of each seismic station is inverted using the Moya method,and it is found that the site response of 98 stations is in the bands of 1-20 Hz,suggesting that the site has an amplifying or suppressing effect on the signals in certain frequency bands;Considering the site response corresponding to the inherent 0. 8s period of the WoodAnderson pendulum seismograph,and comparing the magnitude deviation caused by the site response corresponding to the dominant period time of each station with the average magnitude deviation, we obtain that there is a good linear relationship between the magnitude deviation from the dominant period site response and the average deviation of the magnitude of each station,indicating that the magnitude deviation of a single station has a close relationship with the site response of the period corresponding to the maximum amplitude measured for calculating the magnitude.展开更多
The sixth-generation(6G)mobile network implements the social vision of digital twins and ubiquitous intelligence.Contrary to the fifth-generation(5G)mobile network that focuses only on communications,6G mobile network...The sixth-generation(6G)mobile network implements the social vision of digital twins and ubiquitous intelligence.Contrary to the fifth-generation(5G)mobile network that focuses only on communications,6G mobile networks must natively support new capabilities such as sensing,computing,artificial intelligence(AI),big data,and security while facilitating Everything as a Service.Although 5G mobile network deployment has demonstrated that network automation and intelligence can simplify network operation and maintenance(O&M),the addition of external functionalities has resulted in low service efficiency and high operational costs.In this study,a technology framework for a 6G autonomous radio access network(RAN)is proposed to achieve a high-level network autonomy that embraces the design of native cloud,native AI,and network digital twin(NDT).First,a service-based architecture is proposed to re-architect the protocol stack of RAN,which flexibly orchestrates the services and functions on demand as well as customizes them into cloud-native services.Second,a native AI framework is structured to provide AI support for the diverse use cases of network O&M by orchestrating communications,AI models,data,and computing power demanded by AI use cases.Third,a digital twin network is developed as a virtual environment for the training,pre-validation,and tuning of AI algorithms and neural networks,avoiding possible unexpected losses of the network O&M caused by AI applications.The combination of native AI and NDT can facilitate network autonomy by building closed-loop management and optimization for RAN.展开更多
Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports...Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations.展开更多
In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embed...In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embeddedness”to describe this trend.Unlike traditional strategic resources,which are constrained by high-value,relatively static,restricted flow,and exclusivity,digital resources demonstrate superior fluidity,non-rivalrous access,and high value-driven interdependencies.To bridge this theoretical gap,this study examines the distinctive attributes of digital resources through the dual lenses of resource orchestration theory and dynamic capability theory.Specifically,it proposes big data capability as a mediating mechanism and organizational structure flexibility as a critical moderating factor.Developing this integrated research framework aims to elucidate the underlying mechanisms through which digital innovation network embeddedness dynamically shapes new product development(NPD)performance.Ultimately,this study seeks to advance theoretical understanding and provide actionable insights for digitally empowered manufacturing enterprises to enhance their NPD outcomes.The framework is tested using data from 559 manufacturing enterprises located in South China.There are three findings.(1)An inverted U-shaped relationship exists between digital innovation network structure and NPD performance,and between relationship embeddedness and NPD performance,respectively.(2)Big data capability mediates the relationship between moderate levels of digital innovation network embeddedness and NPD performance.However,at high levels of digital innovation network embeddedness,big data capability does not significantly mediate the relationship between digital innovation network structure/relationship embeddedness and NPD performance,respectively.(3)Organizational structure flexibility positively moderates the relationship between digital innovation network relationship embeddedness,big data capability,and NPD performance.Moreover,while mediated moderation occurred,the direct moderation effect on digital innovation network embeddedness is nonsignificant.The conclusions of this study provide insights for manufacturing enterprises seeking to enhance NPD performance within the context of digital innovation network embeddedness.展开更多
A communication network can natively provide artificial intelligence(AI)training services for resourcelimited network entities to quickly build accurate digital twins and achieve high-level network autonomy.Considerin...A communication network can natively provide artificial intelligence(AI)training services for resourcelimited network entities to quickly build accurate digital twins and achieve high-level network autonomy.Considering that network entities that require digital twins and those that provide AI services may belong to different operators,incentive mechanisms are needed to maximize the utility of both.In this paper,we establish a Stackelberg game to model AI training task offloading for digital twins in native AI networks with the operator with base stations as the leader and resource-limited network entities as the followers.We analyze the Stackelberg equilibrium to obtain equilibrium solutions.Considering the time-varying wireless network environment,we further design a deep reinforcement learning algorithm to achieve dynamic pricing and task offloading.Finally,extensive simulations are conducted to verify the effectiveness of our proposal.展开更多
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th...Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert.展开更多
Development of China Digital Seismological Observational Systems during 1996~2000 and the Capital Circle Area Seismograph Network during 1999~2001 are introduced, and the station distributions, instruments used, main ...Development of China Digital Seismological Observational Systems during 1996~2000 and the Capital Circle Area Seismograph Network during 1999~2001 are introduced, and the station distributions, instruments used, main tasks of National Digital Seismograph Network, Regional Digital Seismograph Network and Portable Digital Seismograph Network are introduced chiefly.展开更多
In Chinese traditional culture, ceramic culture is a very special cultural system, With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development ...In Chinese traditional culture, ceramic culture is a very special cultural system, With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development and utilization is especially important. The idea of Web3.0 make important ceramic culture network native digital resources "reasonable configuration", t o be more embody the value of academic research. In this paper, we'll discuss the conformity utilization of ceramic culture native digital resources based on the concept of WEB3.0.展开更多
In Chinese traditional culture, ceramic culture is a very special cultural system With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development a...In Chinese traditional culture, ceramic culture is a very special cultural system With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development and utilization is especially important. The idea of Web3.0 make important ceramic culture network native digital resources "reasonable configuration", t o be more embody the value of academic research. In this paper, we'll discuss the conformity utilization of ceramic culture native digital resources based on the concept of WEB3.0.展开更多
This study addresses the link between social media use and pro-environmental civic participation considering the moderating effect of social media affordances (public realm) on one hand, and lifestyle behaviors and cl...This study addresses the link between social media use and pro-environmental civic participation considering the moderating effect of social media affordances (public realm) on one hand, and lifestyle behaviors and climate change experiences (personal realm) on the other. We combine communication theory and behavioral models and using a sample of USA individuals (N = 7225) based on the American Trends Panel to predict variations in pro-environmental behavior. We show that social networks rather than information are more effective in predicting pro-environmental behavior. Moreover, a pro-environmental lifestyle as well as climate change experiences at the community level increase the likelihood for pro-environmental participation. However, affordances related to socioeconomic variations generate variations to pro-environmental civic participation. We conclude that in order to capture the depth of pro-environmental civic participation, it is necessary to theoretically and empirically bridge between private and public expressions of pro-environmental awareness.展开更多
The purpose of this research was to suggest an applicable procedure for computing the centroid moment tensor(CMT)automatically and in real time from earthquakes that occur in Indonesia and the surrounding areas.Gisola...The purpose of this research was to suggest an applicable procedure for computing the centroid moment tensor(CMT)automatically and in real time from earthquakes that occur in Indonesia and the surrounding areas.Gisola software was used to estimate the CMT solution by selecting the velocity model that best suited the local and regional geological conditions in Indonesia and the surrounding areas.The data used in this study were earthquakes with magnitudes of 5.4 to 8.0.High-quality,real-time broadband seismographic data were provided by the International Federation of Digital Seismograph Networks Web Services(FDSNWS)and the European Integrated Data Archive(EIDA)Federation in Indonesia and the surrounding areas.Furthermore,the inversion process and filter adjustment were carried out on the seismographic data to obtain good CMT solutions.The CMT solutions from Gisola provided good-quality solutions,in which all earthquake data had A-level quality(high quality,with good variant reduction).The Gisola CMT solution was justified with the Global CMT(GCMT)solution by using the Kagan angle value,with an average of approximately 11.2°.This result suggested that the CMT solution generated from Gisola was trustworthy and reliable.The Gisola CMT solution was typically available within approximately 15 minutes after an earthquake occurred.Once it met the quality requirement,it was automatically published on the internet.The catalog of local and regional earthquake records obtained through this technology holds great promise for improving the current understanding of regional seismic activity and ongoing tectonic processes.The accurate and real-time CMT solution generated by implementing the Gisola algorithm consisted of moment tensors and moment magnitudes,which provided invaluable insights into earthquakes occurring in Indonesia and the surrounding areas.展开更多
In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization ...In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.展开更多
Single-relay selection techniques based on themax-min criterion can achieve the highest bit error rate(BER)performance with full diversity gain as compared to the state-of-the-art single-relay selection techniques.The...Single-relay selection techniques based on themax-min criterion can achieve the highest bit error rate(BER)performance with full diversity gain as compared to the state-of-the-art single-relay selection techniques.Therefore,in this work,we propose a modified max-min criterion by considering the differences among the close value channels of all relays while selecting the best relay node.The proposed criterion not only enjoys full diversity gain but also offers a significant improvement in the achievable coding gain as compared to the conventional one.Basically,in this article,an improved bi-directional three-phase single-relay selection technique using the decodeand-forward protocol for wireless cooperative communication networks that enhances the overall network performance in terms of BER is proposed and its performance is proved analytically and through Monte-Carlo simulations.More specifically,the proposed criterion is first used to select the best relaynode.After that the selected relay-node forwards the information symbols of the communicating terminals after performing a digital network coding to minimize power consumptions.In our simulations,we show that our proposed technique outperforms the best-known single relay selection techniques.Furthermore,we prove that the BER results obtained from our conducted simulations perfectly match those obtained from the theoretical analysis.展开更多
With the gradual development of the 5G industry network and applications,each industry application has various network performance requirements,while customers hope to upgrade their industrial structures by leveraging...With the gradual development of the 5G industry network and applications,each industry application has various network performance requirements,while customers hope to upgrade their industrial structures by leveraging 5G technologies.The guarantee of service level agreement(SLA)requirements is becoming more and more important,especially SLA performance indicators,such as delay,jitter,bandwidth,etc.For network operators to fulfill customer’s requirements,emerging network technologies such as time-sensitive networking(TSN),edge computing(EC)and network slicing are introduced into the mobile network to improve network performance,which increase the complexity of the network operation and maintenance(O&M),as well as the network cost.As a result,operators urgently need new solutions to achieve low-cost and high-efficiency network SLA management.In this paper,a digital twin network(DTN)solution is innovatively proposed to achieve the mapping and full lifecycle management of the end-to-end physical network.All the network operation policies such as configuration and modification can be generated and verified inside the digital twin network first to make sure that the SLA requirements can be fulfilled without affecting the related network environment and the performance of the other network services,making network operation and maintenance more effective and accurate.展开更多
The Kunlunshan Mountain Ms8.1 earthquake, occurred in Nov.14, 2001, is the first event with magnitude more than 8 in the China earthquake monitoring history, specifically at the beginning of digital techniques in prec...The Kunlunshan Mountain Ms8.1 earthquake, occurred in Nov.14, 2001, is the first event with magnitude more than 8 in the China earthquake monitoring history, specifically at the beginning of digital techniques in precursor monitoring networks. Any investigation of recorded data on this earthquake is very important for testing the operation of the digital monitoring networks and understanding the preparation, occurrence, and adjustment of stress/strain of strong continental earthquakes. In this paper we investigated the coseismic response changes of well water level of groundwater and volume strain meter of bore hole in digital earthquake monitoring network of Capital area and its vicinity, due to the Nov.14, 2001 Ms8.1 Kunlun Mountain earthquake. The responding time, shapes or manners, amplitudes, and lasting time of well water level and strain-meters to seismic wave are studied in comparison. Then we discussed the possibility that the response changes of groundwater to strong distant earthquakes can be understood as one kind of observing evidence of stress/strain changes induced by distant earthquake.展开更多
基金supported in part by the National Natural Science Foundation of China(NSFC)under Grant Nos.62171085,62272428,62001087,U20A20156,and 61871097the ZTE Industry-University-Institute Cooperation Funds under Grant No.HC-CN-20220722010。
文摘The proliferation of heterogeneous networks,such as the Internet of Things(IoT),unmanned aerial vehicle(UAV)networks,and edge networks,has increased the complexity of network operation and administration,driving the emergence of digital twin networks(DTNs)that create digital-physical network mappings.While DTNs enable performance analysis through emulation testbeds,current research focuses on network-level systems,neglecting equipment-level emulation of critical components like core switches and routers.To address this issue,we propose v Fabric(short for virtual switch),a digital twin emulator for high-capacity core switching equipment.This solution implements virtual switching and network processor(NP)chip models through specialized processes,deployable on single or distributed servers via socket communication.The v Fabric emulator can realize the accurate emulation for the core switching equipment with 720 ports and 100 Gbit/s per port on the largest scale.To our knowledge,this represents the first digital twin emulation framework specifically designed for large-capacity core switching equipment in communication networks.
基金China Next Generation Internet Project(No.CNGI-04-12-2A)
文摘The home network is a major concern for the growth of digital and information society. Yet, how to guarantee the security of its digital content and protect the legal benefits for each section of the value chain becomes a crucial "bottleneck" in the home network development. The Digital Rights Management (DRM) technology provides total solution for usage, storage, transfer, and tracing the digital contents and rights. Its basic features are systematic and controllability. Considering the growth of the new media and services and the requirements of the Intellectual Property Rights (IPR) protection in a home network, it's necessary to solve consistency problems in usage, storage, and transfer of contents and rights. In addition, it is inevitable to conduct researches of key techniques such as end-to-end secure transmission, conditional access and play, and right description.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 the National High Technology Research and Development Program of China(863 Program) under Grants No.2012AA012506,No.2012AA012901,No.2012AA012903+9 种基金 Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032 the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065 the Opening Project of Key Lab of Information Network Security of Ministry of Public Security(The Third Research Institute of Ministry of Public Security) under Grant No.C13613 the China Postdoctoral Science Foundation General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012 the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24 the Beijing Municipal Natural Science Foundation Sponsored by Hunan Postdoctoral Scientific Program Open Research Fund of Beijing Key Laboratory of Trusted Computing Funds for the Central Universities, Contract No.2012JBM030
文摘Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators.
文摘As an important branch of telecommunication technology, digital home networks have quickly developed in recent years. Although architecture of the digital home network based on telecommunication networks has been standardized in China, only wireless access is defined to be allowable. Therefore, it becomes the focus of further research how to establish a wireless digital home network. This article proposes the concept and shows the architecture of ubiquitous access for wireless digital home networks. Moreover, key technologies for ubiquitous access are discussed here, including cognitive radio, the concept of wireless Mesh, generic link transfer mechanism, Quality of Service (QoS) guarantee mechanism, Electromagnetic Compatibility (EMC) and coexistence of heterogeneous systems.
文摘Using the records of 3,069 regional earthquake events from the Fujian Digital Seismic Network from October 2008 to December 2015,in which the magnitude of each of the events was measured by at least six stations,statistics are taken on the deviation between the magnitude of a single station and the average magnitude of the network. It is found that the magnitudes average deviation of each station is-0. 31-0. 68. Statistics are also taken for the period corresponding to the maximum amplitude of the record measured in each station for calculating the magnitude,and the dominant period gained is 0. 06s-0. 38s; site response of each seismic station is inverted using the Moya method,and it is found that the site response of 98 stations is in the bands of 1-20 Hz,suggesting that the site has an amplifying or suppressing effect on the signals in certain frequency bands;Considering the site response corresponding to the inherent 0. 8s period of the WoodAnderson pendulum seismograph,and comparing the magnitude deviation caused by the site response corresponding to the dominant period time of each station with the average magnitude deviation, we obtain that there is a good linear relationship between the magnitude deviation from the dominant period site response and the average deviation of the magnitude of each station,indicating that the magnitude deviation of a single station has a close relationship with the site response of the period corresponding to the maximum amplitude measured for calculating the magnitude.
基金supported by the National Key Research and Development Program of China(No.2024YFE0200600)。
文摘The sixth-generation(6G)mobile network implements the social vision of digital twins and ubiquitous intelligence.Contrary to the fifth-generation(5G)mobile network that focuses only on communications,6G mobile networks must natively support new capabilities such as sensing,computing,artificial intelligence(AI),big data,and security while facilitating Everything as a Service.Although 5G mobile network deployment has demonstrated that network automation and intelligence can simplify network operation and maintenance(O&M),the addition of external functionalities has resulted in low service efficiency and high operational costs.In this study,a technology framework for a 6G autonomous radio access network(RAN)is proposed to achieve a high-level network autonomy that embraces the design of native cloud,native AI,and network digital twin(NDT).First,a service-based architecture is proposed to re-architect the protocol stack of RAN,which flexibly orchestrates the services and functions on demand as well as customizes them into cloud-native services.Second,a native AI framework is structured to provide AI support for the diverse use cases of network O&M by orchestrating communications,AI models,data,and computing power demanded by AI use cases.Third,a digital twin network is developed as a virtual environment for the training,pre-validation,and tuning of AI algorithms and neural networks,avoiding possible unexpected losses of the network O&M caused by AI applications.The combination of native AI and NDT can facilitate network autonomy by building closed-loop management and optimization for RAN.
基金The article has been supported by the College of Engineering and Technology,American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘Rotman lens,which is a radio frequency beam-former that consists of multiple input and multiple output beam ports,can be used in industrial,scientific,and medical applications as a beam steering device.The input ports collect the signals to be propagated through the lens cavity toward the output ports before being transmitted by the antenna arrays to the destination in order to enhance the error performance by optimizing the overall signal to noise ratio(SNR).In this article,a low-cost Rotman lens antenna is designed and deployed to enhance the overall performance of the conventional cooperative communication systems without needing any additional power,extra time or frequency slots.In the suggested system,the smart Rotman lens antennas generate a beam steering in the direction of the destination to maximize the received SNR at the destination by applying the proposed optimal beamforming technique.The suggested optimal beamforming technique enjoys high diversity,as well as,low encoding and decoding complexity.Furthermore,we proved the advantages of our suggested strategy through both theoretical results and simulations using Monte Carlo runs.The Monte Carlo simulations show that the suggested strategy enjoys better error performance compared to the current state-of-the-art distributed multiantenna strategies.In addition,the bit error rate(BER)curves drawn from the analytical results are closely matching to those drawn from our conducted Monte Carlo simulations.
基金supported by the Post-Funded Project of the National Social Science Fund of China(No.23FGLB088)the General Project of the National Natural Science Foundation of China(No.71974059)+2 种基金the Ministry of Education in China Liberal Arts and Social Sciences Foundation(No.23YJA630124)the Development of Philosophy and Social Sciences in Guangzhou in 2021(No.2021GZYB12)the Guangdong Basic and Applied Basic Research Foundation(No.2024A1515030110).
文摘In the digital economy era,many manufacturing enterprises are leveraging digital service enterprises to enhance their digital innovation processes.This paper introduces the concept of“digital innovation network embeddedness”to describe this trend.Unlike traditional strategic resources,which are constrained by high-value,relatively static,restricted flow,and exclusivity,digital resources demonstrate superior fluidity,non-rivalrous access,and high value-driven interdependencies.To bridge this theoretical gap,this study examines the distinctive attributes of digital resources through the dual lenses of resource orchestration theory and dynamic capability theory.Specifically,it proposes big data capability as a mediating mechanism and organizational structure flexibility as a critical moderating factor.Developing this integrated research framework aims to elucidate the underlying mechanisms through which digital innovation network embeddedness dynamically shapes new product development(NPD)performance.Ultimately,this study seeks to advance theoretical understanding and provide actionable insights for digitally empowered manufacturing enterprises to enhance their NPD outcomes.The framework is tested using data from 559 manufacturing enterprises located in South China.There are three findings.(1)An inverted U-shaped relationship exists between digital innovation network structure and NPD performance,and between relationship embeddedness and NPD performance,respectively.(2)Big data capability mediates the relationship between moderate levels of digital innovation network embeddedness and NPD performance.However,at high levels of digital innovation network embeddedness,big data capability does not significantly mediate the relationship between digital innovation network structure/relationship embeddedness and NPD performance,respectively.(3)Organizational structure flexibility positively moderates the relationship between digital innovation network relationship embeddedness,big data capability,and NPD performance.Moreover,while mediated moderation occurred,the direct moderation effect on digital innovation network embeddedness is nonsignificant.The conclusions of this study provide insights for manufacturing enterprises seeking to enhance NPD performance within the context of digital innovation network embeddedness.
基金supported by the National Key R&D Program of China(No.2022YFB2902100)。
文摘A communication network can natively provide artificial intelligence(AI)training services for resourcelimited network entities to quickly build accurate digital twins and achieve high-level network autonomy.Considering that network entities that require digital twins and those that provide AI services may belong to different operators,incentive mechanisms are needed to maximize the utility of both.In this paper,we establish a Stackelberg game to model AI training task offloading for digital twins in native AI networks with the operator with base stations as the leader and resource-limited network entities as the followers.We analyze the Stackelberg equilibrium to obtain equilibrium solutions.Considering the time-varying wireless network environment,we further design a deep reinforcement learning algorithm to achieve dynamic pricing and task offloading.Finally,extensive simulations are conducted to verify the effectiveness of our proposal.
基金supported by the National Natural Science Foundation of China under Grant No.60903166 and 61170262the National High-Tech Research and Development Plan of China under Grant Nos.2012AA012506+4 种基金Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20121103120032the Humanity and Social Science Youth Foundation of Ministry of Education of China under Grant No.13YJCZH065General Program of Science and Technology Development Project of Beijing Municipal Education Commission of China under Grant No.km201410005012the Research on Education and Teaching of Beijing University of Technology under Grant No.ER2013C24Open Research Fund of Beijing Key Laboratory of Trusted Computing
文摘Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert.
文摘Development of China Digital Seismological Observational Systems during 1996~2000 and the Capital Circle Area Seismograph Network during 1999~2001 are introduced, and the station distributions, instruments used, main tasks of National Digital Seismograph Network, Regional Digital Seismograph Network and Portable Digital Seismograph Network are introduced chiefly.
文摘In Chinese traditional culture, ceramic culture is a very special cultural system, With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development and utilization is especially important. The idea of Web3.0 make important ceramic culture network native digital resources "reasonable configuration", t o be more embody the value of academic research. In this paper, we'll discuss the conformity utilization of ceramic culture native digital resources based on the concept of WEB3.0.
文摘In Chinese traditional culture, ceramic culture is a very special cultural system With the advent of the era of network and the particularity of ceramic culture, Make the network native digital resources development and utilization is especially important. The idea of Web3.0 make important ceramic culture network native digital resources "reasonable configuration", t o be more embody the value of academic research. In this paper, we'll discuss the conformity utilization of ceramic culture native digital resources based on the concept of WEB3.0.
文摘This study addresses the link between social media use and pro-environmental civic participation considering the moderating effect of social media affordances (public realm) on one hand, and lifestyle behaviors and climate change experiences (personal realm) on the other. We combine communication theory and behavioral models and using a sample of USA individuals (N = 7225) based on the American Trends Panel to predict variations in pro-environmental behavior. We show that social networks rather than information are more effective in predicting pro-environmental behavior. Moreover, a pro-environmental lifestyle as well as climate change experiences at the community level increase the likelihood for pro-environmental participation. However, affordances related to socioeconomic variations generate variations to pro-environmental civic participation. We conclude that in order to capture the depth of pro-environmental civic participation, it is necessary to theoretically and empirically bridge between private and public expressions of pro-environmental awareness.
基金Universitas Negeri Surabaya,Universitas Sebelas Maret,and Universitas Syiah Kuala for providing research grants for the Indonesian Collaborative Research(RKI)scheme。
文摘The purpose of this research was to suggest an applicable procedure for computing the centroid moment tensor(CMT)automatically and in real time from earthquakes that occur in Indonesia and the surrounding areas.Gisola software was used to estimate the CMT solution by selecting the velocity model that best suited the local and regional geological conditions in Indonesia and the surrounding areas.The data used in this study were earthquakes with magnitudes of 5.4 to 8.0.High-quality,real-time broadband seismographic data were provided by the International Federation of Digital Seismograph Networks Web Services(FDSNWS)and the European Integrated Data Archive(EIDA)Federation in Indonesia and the surrounding areas.Furthermore,the inversion process and filter adjustment were carried out on the seismographic data to obtain good CMT solutions.The CMT solutions from Gisola provided good-quality solutions,in which all earthquake data had A-level quality(high quality,with good variant reduction).The Gisola CMT solution was justified with the Global CMT(GCMT)solution by using the Kagan angle value,with an average of approximately 11.2°.This result suggested that the CMT solution generated from Gisola was trustworthy and reliable.The Gisola CMT solution was typically available within approximately 15 minutes after an earthquake occurred.Once it met the quality requirement,it was automatically published on the internet.The catalog of local and regional earthquake records obtained through this technology holds great promise for improving the current understanding of regional seismic activity and ongoing tectonic processes.The accurate and real-time CMT solution generated by implementing the Gisola algorithm consisted of moment tensors and moment magnitudes,which provided invaluable insights into earthquakes occurring in Indonesia and the surrounding areas.
基金supported in part by the National Science Foundation(NSF)of the USA(2146497,2416872,2315596 and 2244219).
文摘In recent years,immense developments have occurred in the field of Artificial Intelligence(AI)and the spread of broadband and ubiquitous connectivity technologies.This has led to the development and commercialization of Digital Twin(DT)technology.The widespread adoption of DT has resulted in a new network paradigm called Digital Twin Networks(DTNs),which orchestrate through the networks of ubiquitous DTs and their corresponding physical assets.DTNs create virtual twins of physical objects via DT technology and realize the co-evolution between physical and virtual spaces through data processing,computing,and DT modeling.The high volume of user data and the ubiquitous communication systems in DTNs come with their own set of challenges.The most serious issue here is with respect to user data privacy and security because users of most applications are unaware of the data that they are sharing with these platforms and are naive in understanding the implications of the data breaches.Also,currently,there is not enough literature that focuses on privacy and security issues in DTN applications.In this survey,we first provide a clear idea of the components of DTNs and the common metrics used in literature to assess their performance.Next,we offer a standard network model that applies to most DTN applications to provide a better understanding of DTN’s complex and interleaved communications and the respective components.We then shed light on the common applications where DTNs have been adapted heavily and the privacy and security issues arising from the DTNs.We also provide different privacy and security countermeasures to address the previously mentioned issues in DTNs and list some state-of-the-art tools to mitigate the issues.Finally,we provide some open research issues and problems in the field of DTN privacy and security.
基金This work was supported by College of Engineering and Technology,the American University of the Middle East,Kuwait.Homepage:https://www.aum.edu.kw.
文摘Single-relay selection techniques based on themax-min criterion can achieve the highest bit error rate(BER)performance with full diversity gain as compared to the state-of-the-art single-relay selection techniques.Therefore,in this work,we propose a modified max-min criterion by considering the differences among the close value channels of all relays while selecting the best relay node.The proposed criterion not only enjoys full diversity gain but also offers a significant improvement in the achievable coding gain as compared to the conventional one.Basically,in this article,an improved bi-directional three-phase single-relay selection technique using the decodeand-forward protocol for wireless cooperative communication networks that enhances the overall network performance in terms of BER is proposed and its performance is proved analytically and through Monte-Carlo simulations.More specifically,the proposed criterion is first used to select the best relaynode.After that the selected relay-node forwards the information symbols of the communicating terminals after performing a digital network coding to minimize power consumptions.In our simulations,we show that our proposed technique outperforms the best-known single relay selection techniques.Furthermore,we prove that the BER results obtained from our conducted simulations perfectly match those obtained from the theoretical analysis.
基金This work was supported by the National Key Research and Development Program of China(2020YFB1806801,2020YFB1806800)the National Natural Science Foundation of China(61773382).
文摘With the gradual development of the 5G industry network and applications,each industry application has various network performance requirements,while customers hope to upgrade their industrial structures by leveraging 5G technologies.The guarantee of service level agreement(SLA)requirements is becoming more and more important,especially SLA performance indicators,such as delay,jitter,bandwidth,etc.For network operators to fulfill customer’s requirements,emerging network technologies such as time-sensitive networking(TSN),edge computing(EC)and network slicing are introduced into the mobile network to improve network performance,which increase the complexity of the network operation and maintenance(O&M),as well as the network cost.As a result,operators urgently need new solutions to achieve low-cost and high-efficiency network SLA management.In this paper,a digital twin network(DTN)solution is innovatively proposed to achieve the mapping and full lifecycle management of the end-to-end physical network.All the network operation policies such as configuration and modification can be generated and verified inside the digital twin network first to make sure that the SLA requirements can be fulfilled without affecting the related network environment and the performance of the other network services,making network operation and maintenance more effective and accurate.
基金supported by Natural Science Foundation of China(41274061 and 40374019)
文摘The Kunlunshan Mountain Ms8.1 earthquake, occurred in Nov.14, 2001, is the first event with magnitude more than 8 in the China earthquake monitoring history, specifically at the beginning of digital techniques in precursor monitoring networks. Any investigation of recorded data on this earthquake is very important for testing the operation of the digital monitoring networks and understanding the preparation, occurrence, and adjustment of stress/strain of strong continental earthquakes. In this paper we investigated the coseismic response changes of well water level of groundwater and volume strain meter of bore hole in digital earthquake monitoring network of Capital area and its vicinity, due to the Nov.14, 2001 Ms8.1 Kunlun Mountain earthquake. The responding time, shapes or manners, amplitudes, and lasting time of well water level and strain-meters to seismic wave are studied in comparison. Then we discussed the possibility that the response changes of groundwater to strong distant earthquakes can be understood as one kind of observing evidence of stress/strain changes induced by distant earthquake.