Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system secur...
详细信息
Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr...
详细信息
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-driven autonomous *** distributed consensus algorithm is the core component that directly dictates the performance and properties of blockchain ***,the inherent characteristics of the shared wireless medium,such as fading,interference,and openness,pose significant challenges to achieving consensus within these networks,especially in the presence of malicious jamming *** cope with the severe consensus problem,in this paper,we present a distributed jamming-resilient consensus algorithm for blockchain networks in wireless environments,where the adversary can jam the communication channel by injecting jamming *** on a non-binary slight jamming model,we propose a distributed four-stage algorithm to achieve consensus in the wireless blockchain network,including leader election,leader broadcast,leader aggregation,and leader announcement *** high probability,we prove that our jamming-resilient algorithm can ensure the validity,agreement,termination,and total order properties of consensus with the time complexity of O(n).Both theoretical analyses and empirical simulations are conducted to verify the consistency and efficiency of our algorithm.
Natural language processing technology is an important research area in artificial intelligence which occupies a pivotal position in deep learning. This paper describes in detail the research of NLP based on Transform...
详细信息
1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves ...
详细信息
1 Introduction On-device deep learning(DL)on mobile and embedded IoT devices drives various applications[1]like robotics image recognition[2]and drone swarm classification[3].Efficient local data processing preserves privacy,enhances responsiveness,and saves ***,current ondevice DL relies on predefined patterns,leading to accuracy and efficiency *** is difficult to provide feedback on data processing performance during the data acquisition stage,as processing typically occurs after data acquisition.
Electrolyte solvents have a critical impact on the design of high performance and safe ***'s donor number(DN) and acceptor number(AN) values are two important parameters to screen and design superior electrolyte s...
详细信息
Electrolyte solvents have a critical impact on the design of high performance and safe ***'s donor number(DN) and acceptor number(AN) values are two important parameters to screen and design superior electrolyte solvents. However, it is more time-consuming and expensive to obtain DN and AN values through experimental measurements. Therefore, it is essential to develop a method to predict DN and AN values. This paper presented the prediction models for DN and AN based on molecular structure descriptors of solvents, using four machine learning algorithms such as Cat Boost(Categorical Boosting), GBRT(Gradient Boosting Regression Tree), RF(Random Forest) and RR(Ridge Regression).The results showed that the DN and AN prediction models based on Cat Boost algorithm possesses satisfactory prediction ability, with R^(2) values of the testing set are 0.860 and 0.96. Moreover, the study analyzed the molecular structure parameters that impact DN and AN. The results indicated that TDB02m(3D Topological distance based descriptors-lag 2 weighted by mass) had a significant effect on DN, while HATS1s(leverage-weighted autocorrelation of lag 1/weighted by I-state) plays an important role in AN. The work provided an efficient approach for accurately predicting DN and AN values, which is useful for screening and designing electrolyte solvents.
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har...
详细信息
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware *** research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)*** designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network *** solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 ***,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,*** on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC *** the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into ***,we prove the proposed analytical model has the ***,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results.
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(L...
详细信息
Data analysis tasks aim to provide insightful analysis for given data by incorporating background knowledge of the represented phenomenon, which in turn supports decision-making. While existing large language models(LLMs) can describe data trends, they still lag behind human data analysts in terms of integrating external knowledge and in-depth data analysis. Therefore, we propose a multi-agent data analysis framework based on LLMs. The framework decomposes the data analysis task into subtasks by employing three different agents. By empowering agents with the ability to utilize data search tools, the framework enables them to search for arbitrary relevant knowledge during the analysis process, leading to more insightful analysis. Moreover, to enhance the quality of the analysis results, we propose a multi-stage iterative optimization method that iteratively performs data analysis to form more in-depth conclusions. To validate the performance of our framework, we apply it to three real-world problems in the research development of higher education in China data. Experimental results demonstrate that our approach can achieve more insightful data analysis results compared to directly using LLMs alone.
With the development of deep learning and computer vision, face detection has achieved rapid progress owing. Face detection has several application domains, including identity authentication, security protection, medi...
详细信息
INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognitio...
INTRODUCTION Store signboards provide important information in street view images,andcharacter recognition in natural scenes is an important research direction in computer *** view store signboard character recognition technology,acombination of the two,
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of t...
详细信息
The self-cascade(SC) method is an effective technique for chaos enhancement and complexity increasing in chaos ***, the controllable self-cascade(CSC) method allows for more accurate control of Lyapunov exponents of the discrete map. In this work, the SC and CSC systems of the original map are derived, which enhance the chaotic performance while preserving the fundamental dynamical characteristics of the original map. Higher Lyapunov exponent of chaotic sequences corresponding to higher frequency are obtained in SC and CSC systems. Meanwhile, the Lyapunov exponent could be linearly controlled with greater flexibility in the CSC system. The verification of the numerical simulation and theoretical analysis is carried out based on the platform of CH32.
暂无评论