Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wirel...
详细信息
Space/air communications have been envisioned as an essential part of the next-generation mobile communication networks for providing highquality global connectivity. However, the inherent broadcasting nature of wireless propagation environment and the broad coverage pose severe threats to the protection of private data. Emerging covert communications provides a promising solution to achieve robust communication security. Aiming at facilitating the practical implementation of covert communications in space/air networks, we present a tutorial overview of its potentials, scenarios, and key technologies. Specifically, first, the commonly used covertness constraint model, covert performance metrics, and potential application scenarios are briefly introduced. Then, several efficient methods that introduce uncertainty into the covert system are thoroughly summarized, followed by several critical enabling technologies, including joint resource allocation and deployment/trajectory design, multi-antenna and beamforming techniques, reconfigurable intelligent surface(RIS), and artificial intelligence algorithms. Finally, we highlight some open issues for future investigation.
Multiagent Reinforcement Learning (MARL) plays a pivotal role in intelligent vehicle systems, offering solutions for complex decision-making, coordination, and adaptive behavior among autonomous agents. This review ai...
详细信息
Multiagent Reinforcement Learning (MARL) plays a pivotal role in intelligent vehicle systems, offering solutions for complex decision-making, coordination, and adaptive behavior among autonomous agents. This review aims to highlight the importance of fostering trust in MARL and emphasize the significance of MARL in revolutionizing intelligent vehicle systems. First, this paper summarizes the fundamental methods of MARL. Second, it identifies the limitations of MARL in safety, robustness, generalization, and ethical constraints and outlines the corresponding research methods. Then we summarize their applications in intelligent vehicle systems. Considering human interaction is essential to practical applications of MARL in various domains, the paper also analyzes the challenges associated with MARL's applications in human-machine systems. These challenges, when overcome, could significantly enhance the real-world implementation of MARL-based intelligent vehicle systems. IEEE
The process of cocoa hybridization produces new types that have unique chemical properties impacting the manufacturing of chocolate yet are resistant to a number of plant illnesses. Image analysis is a valuable tool f...
详细信息
This study explores the potential of Mg/Carbon Nanotubes/Baghdadite composites as biomaterials for bone regeneration and repair while addressing the obstacles to their clinical *** powder was synthesized using the sol...
详细信息
This study explores the potential of Mg/Carbon Nanotubes/Baghdadite composites as biomaterials for bone regeneration and repair while addressing the obstacles to their clinical *** powder was synthesized using the sol-gel method to ensure a fine distribution within the Mg/CNTs ***/1.5 wt.%CNT composites were reinforced with BAG at weight fractions of 0.5,1.0,and 1.5 wt.%using spark plasma sintering at 450℃and 50 MPa after homogenization via ball *** cellular bioactivity of these nanocomposites was evaluated using human osteoblast-like cells and adipose-derived mesenchymal stromal *** proliferation and attachment of MG-63cells were assessed and visualized using the methylthiazol tetrazolium(MTT)assay and SEM,while AD-MSC differentiation was measured using alkaline phosphatase activity *** were also generated to visualize the diameter distributions of particles in SEM images using image processing *** Mg/CNTs/0.5 wt.%BAG composite demonstrated optimal mechanical properties,with compressive strength,yield strength,and fracture strain of 259.75 MPa,180.25 MPa,and 31.65%,*** learning models,including CNN,LSTM,and GRU,were employed to predict stress-strain relationships across varying BAG amounts,aiming to accurately model these curves without requiring extensive physical *** shown by contact angle measurements,enhanced hydrophilicity promoted better cell adhesion and ***,corrosion resistance improved with a higher BAG *** study concludes that Mg/CNTs composites reinforced with BAG concentrations below 1.0 wt.%offer promising biodegradable implant materials for orthopedic applications,featuring adequate load-bearing capacity and improved corrosion resistance.
The work proposes a methodology for five different classes of ECG signals. The methodology utilises moving average filter and discrete wavelet transformation for the remove of baseline wandering and powerline interfer...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,a...
详细信息
The concept of the digital twin,also known colloquially as the DT,is a fundamental principle within Industry 4.0 *** recent years,the concept of digital siblings has generated considerable academic and practical ***,academia and industry have used a variety of interpretations,and the scientific literature lacks a unified and consistent definition of this *** purpose of this study is to systematically examine the definitional landscape of the digital twin concept as outlined in scholarly literature,beginning with its origins in the aerospace domain and extending to its contemporary interpretations in the manufacturing ***,this investigationwill focus on the research conducted on Industry 4.0 and smartmanufacturing,elucidating the diverse applications of digital twins in fields including aerospace,intelligentmanufacturing,intelligent transportation,and intelligent cities,among others.
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the ord...
详细信息
A recommender system is an approach performed by e-commerce for increasing smooth users’*** pattern mining is a technique of data mining used to identify the co-occurrence relationships by taking into account the order of *** work will present the implementation of sequence pattern mining for recommender systems within the domain of *** work will execute the Systolic tree algorithm for mining the frequent patterns to yield feasible rules for the recommender *** feature selec-tion's objective is to pick a feature subset having the least feature similarity as well as highest relevancy with the target *** will mitigate the feature vector's dimensionality by eliminating redundant,irrelevant,or noisy *** work pre-sents a new hybrid recommender system based on optimized feature selection and systolic *** features were extracted using Term Frequency-Inverse Docu-ment Frequency(TF-IDF),feature selection with the utilization of River Forma-tion Dynamics(RFD),and the Particle Swarm Optimization(PSO)*** systolic tree is used for pattern mining,and based on this,the recommendations are *** proposed methods were evaluated using the MovieLens dataset,and the experimental outcomes confirmed the efficiency of the *** was observed that the RFD feature selection with systolic tree frequent pattern mining with collaborativefiltering,the precision of 0.89 was achieved.
With the exponential growth in information related applications and the continuous increase in voice over IP (VoIP) applications, the carriers are expanding their networks to provide improved services to their end use...
详细信息
暂无评论