Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,esp...
详细信息
Recommendation systems provide ease and convenience for users to address information overload problems while interacting with online platforms such as social media and ***,it raises several questions about privacy,especially for users who prefer to remain anonymous,especially on online social networks(OSNs).Moreover,due to the commercialization of online users'data,some service providers sell users'data to third parties at the blind side of the users,which leads to trust issues between users and service *** matters call for a system that gives online users much-needed control and autonomy of their *** the advancement of blockchain technology,many research institutions are experimenting with decentralized technologies to resolve the OSN user dilemma of privacy intrusion against third parties and *** resolve these limitations,we propose RecGuard,a privacy preservation blockchain-based network *** developed two smart contracts,RG-SH and RG-ST,to ensure the security and privacy of user *** RG-SH manages user data,whereas the RGST stores data.A graph convolutional network(GCN)was integrated with the blockchain-based system to detect malicious ***,we implemented our framework prototype on a locally simulated *** analysis and experiment results show that the proposed scheme demonstrates the effectiveness and privacy of users in our framework.
Over the past decade, the antecedents of electronic payment (e-payment) adoption have been studied extensively in the extant literature. Nonetheless, these studies have often investigated how individual antecedents af...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulati...
详细信息
This paper aimed to propose two algorithms,DA-M and RF-M,of reducing the impact of multipath interference(MPI)on intensity modulation direct detection(IM-DD)systems,particularly for four-level pulse amplitude modulation(PAM4)***-M reduced the fluctuation by averaging the signal in blocks,RF-M estimated MPI by subtracting the decision value of the corresponding block from the mean value of a signal block,and then generated interference-reduced samples by subtracting the interference signal from the product of the corresponding MPI estimate and then weighting *** paper firstly proposed to separate the signal before decision-making into multiple blocks,which significantly reduced the complexity of DA-M and *** results showed that the MPI noise of 28 GBaud IMDD system under the linewidths of 1e5 Hz,1e6 Hz and 10e6 Hz can be effectively alleviated.
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable inte...
详细信息
MXenes obtained significant attention in the field of energy storage devices due to their characteristic layered structure,modifiable surface functional groups,large electrochemically active surface,and regulable interlayer ***,the self-restacking and sluggish ions diffusion kinetics performance of MXenes during the alkali metal ions insertion/extraction process severely impedes their cycle stability and rate *** paper proposes an aniline molecule welding strategy for welding p-phenylenediamine(PPDA) into the interlayers of Ti2C through a dehydration condensation *** welded PPDA molecules can contribute pillar effect to the layered structure of *** pillar effect effectively maintains the structural stability during the sodium ions insertion/extraction process and effectively expands the interlayer spacing of Ti2C from 1.16 to 1.38 nm,thereby enhancing ions diffusion kinetics performance and improving the long-term cycle *** Ti2C-PPDA demonstrates outstanding Na+storage capability,exhibiting a specific capacity of 100.2 mAh·g-1at a current density of 0.1 A·g-1over 960 cycles and delivering a remarkable rate capability 81.2 mAh·g-1at a current density of 5 A·*** study demonstrates that expanding interlayer spacing is a promising strategy to enhance the Na+storage capacity and improve long-term cycling stability,which provides significant guidance for the design of two-dimensional Na+storage materials with high-rate capability and cycle stability.
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirem...
详细信息
Effective resource allocation can exploit the advantage of intelligent reflective surface(IRS)assisted mobile edge computing(MEC)***,it is challenging to balance the limited energy of MTs and the strict delay requirement of their *** this paper,in order to tackle the challenge,we jointly optimize the offloading delay and energy consumption of mobile terminals(MTs)to realize the delay-energy tradeoff in an IRS-assisted MEC network,in which non-orthogonal multiple access(NOMA)and multiantenna are applied to improve spectral *** achieve the optimal delay-energy tradeoff,an offloading cost minimization model is proposed,in which the edge computing resource allocation,signal detecting vector,uplink transmission power,and IRS phase shift coefficient are needed to be jointly *** optimization of the model is a multi-level fractional problem in complex fields with some coupled high dimension *** solve the intractable problem,we decouple the original problem into a computing subproblem and a wireless transmission subproblem based on the uncoupled relationship between different variable *** computing subproblem is proved convex and the closed-form solution is obtained for the edge computing resource ***,the wireless transmission subproblem is solved iteratively through decoupling the residual *** each iteration,the closed-form solution of residual variables is obtained through different successive convex approximation(SCA)*** verify the proposed algorithm can converge to an optimum with polynomial *** results indicate the proposed method achieves average saved costs of 65.64%,11.24%,and 9.49%over three benchmark methods respectively.
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce th...
详细信息
The Metaverse depicts a parallel digitalized world where virtuality and reality are *** has economic and social systems like those in the real world and provides intelligent services and *** this paper,we introduce the Metaverse from a new technology perspective,including its essence,corresponding technical framework,and potential technical ***,we analyze the essence of the Metaverse from its etymology and point out breakthroughs promising to be made in time,space,and contents of the Metaverse by citing Maslow's Hierarchy of ***,we conclude four pillars of the Metaverse,named ubiquitous connections,space convergence,virtuality and reality interaction,and human-centered communication,and establish a corresponding technical ***,we envision open issues and challenges of the Metaverse in the technical *** work proposes a new technology perspective of the Metaverse and will provide further guidance for its technology development in the future.
The surge in online activities has led to the increasing popularity of sharing video data across diverse applications, including online education tutorials, social networking, video calling, and OTT platforms. Encrypt...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task ...
详细信息
In current research on task offloading and resource scheduling in vehicular networks,vehicles are commonly assumed to maintain constant speed or relatively stationary states,and the impact of speed variations on task offloading is often *** is frequently assumed that vehicles can be accurately modeled during actual motion ***,in vehicular dynamic environments,both the tasks generated by the vehicles and the vehicles’surroundings are constantly changing,making it difficult to achieve real-time modeling for actual dynamic vehicular network *** into account the actual dynamic vehicular scenarios,this paper considers the real-time non-uniform movement of vehicles and proposes a vehicular task dynamic offloading and scheduling algorithm for single-task multi-vehicle vehicular network scenarios,attempting to solve the dynamic decision-making problem in task offloading *** optimization objective is to minimize the average task completion time,which is formulated as a multi-constrained non-linear programming *** to the mobility of vehicles,a constraint model is applied in the decision-making process to dynamically determine whether the communication range is sufficient for task offloading and ***,the proposed vehicular task dynamic offloading and scheduling algorithm based on muti-agent deep deterministic policy gradient(MADDPG)is applied to solve the optimal solution of the optimization *** results show that the algorithm proposed in this paper is able to achieve lower latency task computation ***,the average task completion time of the proposed algorithm in this paper can be improved by 7.6%compared to the performance of the MADDPG scheme and 51.1%compared to the performance of deep deterministic policy gradient(DDPG).
A distributed flexible assembly flowshop scheduling problem(DFAFSP), which holds significant applications in modern large-scale manufacturing systems, is investigated in this paper. A PPO-guided multi-population co-ev...
详细信息
暂无评论