作者机构:
[Chen, Renyi; Yao, Huaxiong] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China.;[Yao, Huaxiong] Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China.
通讯机构:
[Yao, HX ] ;Cent China Normal Univ, Comp Sch, Wuhan 430079, Peoples R China.
摘要:
A detailed theoretical study is conducted on the nonlinear interference in the same-wavelength bidirectional coherent optical fiber communication systems. The Gaussian noise (GN) model used to evaluate nonlinear interference (NLI) in unidirectional systems is applied and extended to bidirectional transmission scenarios. The extended NLI model shows that in a bidirectional transmission communication system, the backward signal almost does not introduce additional nonlinear crosstalk to the forward signal due to the strong walk-off effect between forward and backward transmitted signals. Specifically, the ratio of the nonlinear crosstalk introduced by the forward and backward signals is about 21 dB, which means that the traditional GN model is also applicable in the bidirectional scenario. This conclusion is validated on the platform of a same-wavelength bidirectional coherent optical communication system based on Optisystem software.
期刊:
IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS,2023年PP:1-12 ISSN:2168-2194
作者机构:
[Xueli Pan; Frank van Harmelen] Department of Computer Science, Vrije Universiteit Amsterdam, Amsterdam, The Netherlands;Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, China;National Engineering Research Center for E-Learning, Central China Normal University, Wuhan, China;National Language Resources Monitor Research Center for Network Media, Central China Normal University, Wuhan, China;School of Computer Science, Central China Normal University, Wuhan, China
摘要:
It is commonly known that food nutrition is closely related to human health. The complex interactions between food nutrients and diseases, influenced by gut microbial metabolism, present challenges in systematizing and practically applying knowledge. To address this, we propose a method for extracting triples from a vast amount of literature, which is used to construct a comprehensive knowledge graph on nutrition and human health. Concurrently, we develop a query-based question answering system over our knowledge graph, proficiently addressing three types of questions. The results show that our proposed model outperforms other state-of-art methods, achieving a precision of 0.92, a recall of 0.81, and an F1 score of 0.86in the nutrition and disease relation extraction task. Meanwhile, our question answering system achieves an accuracy of 0.68 and an F1 score of 0.61 on our benchmark dataset, showcasing competitiveness in practical scenarios. Furthermore, we design five independent experiments to assess the quality of the data structure in the knowledge graph, ensuring results characterized by high accuracy and interpretability. In conclusion, the construction of our knowledge graph shows significant promise in facilitating diet recommendations, enhancing patient care applications, and informing decision-making in clinical research.
摘要:
This paper studies a heterogeneous multiplex network model that allows different dynamics in different layers. We explore intralayer synchronization of the multiplex network under distinct types of interlayer connections. From the perspective of spectral graph theory, we propose a set of edge weight requirements to synchronize the multiplex network. Focusing on the effect of interlayer connections to intralayer synchronization, it is found that a multiplex network can achieve intralayer synchronization with a large enough interlayer coupling strength even if a single network of one layer cannot synchronize by itself. In fact, the synchronizability of the multiplex network is found to be stronger than that of the single-layer network. These results provide insights into the practical application of multiplex network theory in engineering networks.
作者机构:
[Zhou, Jin] Cent China Normal Univ CCNU, Sch Educ Informat Technol, Wuhan, Peoples R China.;[Ye, Jun-min] Cent China Normal Univ, Sch Comp, Wuhan, Peoples R China.
通讯机构:
[Zhou, Jin] C;Cent China Normal Univ CCNU, Sch Educ Informat Technol, Wuhan, Peoples R China.
期刊:
IEEE Transactions on Geoscience and Remote Sensing,2023年61:1-11 ISSN:0196-2892
通讯作者:
Fu, LH
作者机构:
[Fu, Lihua; Chen, Xingrong; Xu, Yuejiao; Niu, Xiao] China Univ Geosci, Sch Math & Phys, Wuhan 430074, Peoples R China.;[Zhang, Meng] Cent China Normal Univ, Sch Comp Sci, Wuhan 430079, Peoples R China.
通讯机构:
[Fu, LH ] C;China Univ Geosci, Sch Math & Phys, Wuhan 430074, Peoples R China.
关键词:
Tensors;Three-dimensional displays;Matrix decomposition;Correlation;Singular value decomposition;Frequency-domain analysis;Spectral analysis;3-D seismic data reconstruction;fully connected tensor network (FCTN);Hankel tensor;low rank
摘要:
Rank-reduction approaches assume that seismic data in the frequency–space domain is of low-rank after a specific pretransformation. The presence of noise or missing traces will increase the rank; therefore, seismic data can be denoised and recovered via rank-reduction techniques. The iterative weighted projection onto convex sets (POCS) framework can be used for noise attenuation and data reconstruction simultaneously. Multichannel singular spectrum analysis (MSSA) is a classic 3-D seismic data reconstruction algorithm that rearranges the temporal frequency slices of the data with missing traces into a block Hankel matrix and then uses randomized singular value decomposition (RSVD) to interpolate slices. To further improve the efficiency and precision of 3-D seismic data reconstruction, we introduce the fully connected tensor network (FCTN) decomposition over the Hankel tensor of the frequency slices. We show that our novel rank-reduction method estimates fewer parameters than MSSA, yielding more accurate and robust results. Moreover, FCTN decomposes a fourth-order tensor into four factor contractions, which breaks the limitations that traditional tensor decomposition methods, such as CANDECOMP/PARAFAC (CP) and Tucker decomposition, cannot establish the connections between different factors and are less effective at characterizing relationships. The newly proposed approach does not require singular value decomposition (SVD), leading to an overall reduction in computational complexity. Synthetic and field examples are used to compare the performance of our method with MSSA, and our numerical results reveal the better performance of the proposed FCTN decomposition method for seismic data with large gaps or a high missing ratio.
期刊:
Peer-to-Peer Networking and Applications,2023年16(3):1340-1353 ISSN:1936-6442
通讯作者:
Wu, AML
作者机构:
[Wu, AML; Wu, Anmulin; Guo, Yajun] Cent China Normal Univ, Sch Comp, Wuhan 430079, Peoples R China.;[Guo, Yimin] Zhongnan Univ Econ & Law, Sch Informat & Safety Engn, Wuhan 430073, Peoples R China.
通讯机构:
[Wu, AML ] C;Cent China Normal Univ, Sch Comp, Wuhan 430079, Peoples R China.
关键词:
Internet of Vehicles;Blockchain;Mobile edge computing;Authentication mechanism;Privacy protection
摘要:
Blockchain technology can provide excellent support for identity authentication and access control mechanisms. In particular, blockchain technology can ensure that large amounts of confidential data generated by the Internet of Vehicles devices are stored and transmitted in a safe and reliable environment, which is the key to making system services optimal. In addition, mobile edge computing is the best solution for IoV applications to deal with low latency and limited computing and storage capacity of vehicle-mounted devices. Mobile edge computing can help IoV systems achieve a variety of functions and features, the most important of which is the ability to process terminal data in real-time. Even though the amount of data generated by IoV devices is growing rapidly, the system is still characterized by low latency and high efficiency. Because the communication between IoV devices is carried out in an untrusted environment, it is particularly important to design a secure and effective identity authentication scheme. Therefore, this paper proposes an efficient, safe, and time-sensitive authentication mechanism for devices on the Internet of Vehicles, which applies to a large number of scenarios. The mechanism is based on the blockchain concept and mobile edge computing technology. Security analysis shows that the proposed scheme meets the security requirements of the Internet of Vehicles and is resistant to many known attacks. By comparing with existing advanced IoT authentication schemes, the performance evaluation of the mechanism shows that the scheme enhances security features while reducing computation and communication overhead.
摘要:
Group signatures allow users to sign messages on behalf of a group without revealing authority is capable of identifying the user who generated it. However, the exposure of the user's signing key will severely damage the group signature scheme. In order to reduce the loss caused by signing key leakage, Song proposed the first forward-secure group signature. If a group signing key is revealed at the current time period, the previous signing key will not be affected. This means that the attacker cannot forge group signatures regarding messages signed in the past. To resist quantum attacks, many lattice-based forward-secure group signatures have been proposed. However, their key-update algorithm is expensive since they require some costly computations such as the Hermite normal form (HNF) operations and conversion from a full-rank set of lattice vectors into a basis.
In this paper, we propose the group signature with forward security from lattice. In comparison with previous works, we have several advantages: Firstly, our scheme is more effective since we only need to sample some vectors independently from a discrete Gaussian during the key-update algorithm. Secondly, the derived secret key size is linear instead of quadratic with the lattice dimensions, which is more friendly towards lightweight applications. Anonymous authentication plays an increasingly critical role in protecting privacy and security in the environment where private information could be collected for intelligent analysis. Our work contributes to the anonymous authentication in the post-quantum setting, which has wide potential applications in the IoT environment.
期刊:
JOURNAL OF SUPERCOMPUTING,2023年79(12):13724-13743 ISSN:0920-8542
通讯作者:
Xiang Li
作者机构:
[Wu, Fei; Li, Xiang; Zhang, Maoyuan] Cent China Normal Univ, Hubei Prov Key Lab Artificial Intelligence & Smart, Wuhan 430079, Hubei, Peoples R China.;[Wu, Fei; Li, Xiang; Zhang, Maoyuan] Cent China Normal Univ, Sch Comp, Wuhan 430079, Hubei, Peoples R China.;[Wu, Fei; Li, Xiang; Zhang, Maoyuan] Cent China Normal Univ, Natl Language Resources Monitor & Res Ctr Network, Wuhan 430079, Hubei, Peoples R China.
通讯机构:
[Xiang Li] H;Hubei Provincial Key Laboratory of Artificial Intelligence and Smart Learning, Central China Normal University, Wuhan, China<&wdkj&>School of Computer, Central China Normal University, Wuhan, China<&wdkj&>National Language Resources Monitor and Research Center for Network Media, Central China Normal University, Wuhan, China
摘要:
Cross-domain sentiment analysis (CDSA) aims to overcome domain discrepancy to judge the sentiment polarity of the target domain lacking labeled data. Recent research has focused on using domain adaptation approaches to address such domain migration problems. Among them, adversarial learning performs domain distribution alignment via domain confusion to transfer domain-invariant knowledge. However, this method that transforms feature representations to be domain-invariant tends to align only the marginal distribution, and may inevitably distort the original feature representations containing discriminative knowledge, thus making the conditional distribution inconsistent. To alleviate this problem, we propose adversarial domain adaptation with model-oriented knowledge adaptation (Moka-ADA) for the CDSA task. We adopt the adversarial discriminative domain adaptation (ADDA) framework to learn domain-invariant knowledge for marginal distribution alignment, based on which knowledge adaptation is conducted between the source and target models for conditional distribution alignment. Specifically, we design a dual structure with similarity constraints on intermediate feature representations and final classification probabilities, so that the target model in training learns discriminative knowledge from the trained source model. Experimental results on a publicly available sentiment analysis dataset show that our method achieves new state-of-the-art performance.
摘要:
延迟容忍网络(delay tolerant network,DTN)中,由于节点的移动性、休眠调度、资源受限以及网络误码率较高等因素,消息成功投递的可能性较低.为了解决上述DTN中存在的问题,有大量的路由算法被提出,其中...展开更多 延迟容忍网络(delay tolerant network,DTN)中,由于节点的移动性、休眠调度、资源受限以及网络误码率较高等因素,消息成功投递的可能性较低.为了解决上述DTN中存在的问题,有大量的路由算法被提出,其中Prophet路由算法作为DTN中重要的路由之一,主要思想是根据DTN中节点的相遇频率进行节点之间消息的传递,但该算法没有考虑节点的交互意愿和中继节点的缓存大小.针对这一问题,本文提出一种基于连接分离时间的概率路由算法P-AVF(Prophet routing based on Average fluctuation).该算法主要根据节点在时间窗口T内的连接分离时间以及节点间运动轨迹的差异性来定义节点连接的平均波动,进而引出节点连接紧密性与可靠性的概念,使得连接能力更优异的节点与它相遇过的节点保持更大的投递预测值,从而能综合挑选出合适转发消息的中继节点.同时利用消息接收节点的缓存占用比和该节点与其他节点连接分离的总时间作为影响该节点投递预测值衰减的一部分,使得投递预测值的衰减更准确.仿真结果表明,基于连接分离时间的概率路由算法P-AVF在消息的投递率、网络负载率和平均跳数等方面均优于其他对比路由算法.收起
作者机构:
[Guo, Jinglei; Meng, Haoyu; Shi, Zeyuan; Guo, JL] Cent China Normal Univ, Sch Comp Sci, Wuhan, Peoples R China.
会议名称:
Genetic and Evolutionary Computation Conference (GECCO)
会议时间:
JUL 15-19, 2023
会议地点:
Lisbon, PORTUGAL
会议主办单位:
[Meng, Haoyu;Guo, Jinglei;Shi, Zeyuan] Cent China Normal Univ, Sch Comp Sci, Wuhan, Peoples R China.
关键词:
ant colony optimization;traveling salesman problem;outlier;route construction
摘要:
Constructing a finite set of candidates for each node has been proved that it is an effective means in ant colony optimization (ACO) for solving the travelling salesman problem (TSP). However, some neighbor nodes in the optimal routes are two nodes with large separation distance. To solve this problem, this paper proposes an ACO with pre -exploration of outliers (ACO-EO). The techniques in ACO-EO include: a) the outliers selection, b) pre -exploration adjacent nodes for outliers. To verify the effectiveness of the ACO-EO, a number of experiments are conducted using 30 benchmark instances (ranging from 101 nodes to 1784 nodes in topologies) taken from the well-known TSPLIB. From the comparison with state-of-the-art ACO-based methods, ACO-EO outperforms these competitors in terms of convergence and solution accurancy.
作者:
Yao, Shixiong;Tian, Xingjian;Chen, Jiageng*;Xiong, Yi
期刊:
International Journal of Network Management,2023年33(3):e2193- ISSN:1055-7148
通讯作者:
Chen, Jiageng
作者机构:
[Xiong, Yi; Yao, Shixiong; Chen, Jiageng] Cent China Normal Univ, Comp Sch, 152 Luoyu Rd, Wuhan, Hubei, Peoples R China.;[Yao, Shixiong] Wuhan Univ, Key Lab Aerosp Informat Secur & Trust Comp, Minist Educ, Wuhan, Peoples R China.;[Tian, Xingjian] Cent China Normal Univ, Cent China Normal Univ Wollongong Joint Inst, Wuhan, Peoples R China.
通讯机构:
[Chen, Jiageng] C;Cent China Normal Univ, Comp Sch, 152 Luoyu Rd, Wuhan, Hubei, Peoples R China.
摘要:
Smart grid has drawn a lot of attention and investment in recent years, which not only helps the modern generation and distribution of traditional power but also highly widens the application of renewable energy sources. However, the main challenges in the application of smart grid are 1. the privacy preservation of users' information and 2. the trustful transmission channel among peers. In order to solve these problems, VPN and blockchain can be considered since they have some features perfectly suitable for these situations. In this paper, we propose a smart grid system based on WireGuard and Hyperledger Fabric to solve the problems mentioned above. And we also implement the whole system and give a view by web application. What's more, all the functionalities are displayed and tested, including building a smart device simulator, deploying data visualization and making some performance evaluations about transactions and WireGuard communication. Experiment results show that the introduction of WireGuard into network infrastructure does not cause too much loss of bandwidth and delay, but it ensures a certain degree of communication security. And Fabric provides the consistency and traceability of transactions in smart grid system.