Your browser doesn't support javascript.
loading
Mostrar: 20 | 50 | 100
Resultados 1 - 11 de 11
Filtrar
Mais filtros










Base de dados
Intervalo de ano de publicação
1.
Sensors (Basel) ; 23(19)2023 Oct 08.
Artigo em Inglês | MEDLINE | ID: mdl-37837136

RESUMO

With the rapid development of industrial digitalization and intelligence, there is an urgent need to accurately depict the physical world in digital space, and, in turn, regulate and optimize the behavior of physical entities based on massive data collection and analysis. As a technology that combines virtual space and physical space, digital twin can satisfy all of the above needs, and has attracted widespread attention. Due to the promising application prospects of digital twins, both academia and industry have launched research in this field, and related studies have been conducted from different perspectives. Accordingly, some articles summarizing the existing work have also been published, but they are all from a single perspective, lacking a systematic introduction and summary. Based on this, this paper conducts a comprehensive review of the existing work on digital twins from four perspectives: data, model, network and application, and strives to gain a better understanding of the development of the field from the physical to the virtual and back to the physical. Meanwhile, current research challenges and future directions for the development of digital twins are all discussed.

2.
Sensors (Basel) ; 23(10)2023 May 10.
Artigo em Inglês | MEDLINE | ID: mdl-37430532

RESUMO

With the continuous development of intelligent vehicles, people's demand for services has also rapidly increased, leading to a sharp increase in wireless network traffic. Edge caching, due to its location advantage, can provide more efficient transmission services and become an effective method to solve the above problems. However, the current mainstream caching solutions only consider content popularity to formulate caching strategies, which can easily lead to cache redundancy between edge nodes and lead to low caching efficiency. To solve these problems, we propose a hybrid content value collaborative caching strategy based on temporal convolutional network (called THCS), which achieves mutual collaboration between different edge nodes under limited cache resources, thereby optimizing cache content and reducing content delivery latency. Specifically, the strategy first obtains accurate content popularity through temporal convolutional network (TCN), then comprehensively considers various factors to measure the hybrid content value (HCV) of cached content, and finally uses a dynamic programming algorithm to maximize the overall HCV and make optimal cache decisions. We have obtained the following conclusion through simulation experiments: compared with the benchmark scheme, THCS has improved the cache hit rate by 12.3% and reduced the content transmission delay by 16.7%.

3.
Sensors (Basel) ; 23(9)2023 Apr 30.
Artigo em Inglês | MEDLINE | ID: mdl-37177603

RESUMO

The problems with network security that the Internet of Vehicles (IoV) faces are becoming more noticeable as it continues to evolve. Deep learning-based intrusion detection techniques can assist the IoV in preventing network threats. However, previous methods usually employ a single deep learning model to extract temporal or spatial features, or extract spatial features first and then temporal features in a serial manner. These methods usually have the problem of insufficient extraction of spatio-temporal features of the IoV, which affects the performance of intrusion detection and leads to a high false-positive rate. To solve the above problems, this paper proposes an intrusion detection method for IoV based on parallel analysis of spatio-temporal features (PA-STF). First, we built an optimal subset of features based on feature correlations of IoV traffic. Then, we used the temporal convolutional network (TCN) and long short-term memory (LSTM) to extract spatio-temporal features in the IoV traffic in a parallel manner. Finally, we fused the spatio-temporal features extracted in parallel based on the self-attention mechanism and used a multilayer perceptron to detect attacks in the Internet of Vehicles. The experimental results show that the PA-STF method reduces the false-positive rate by 1.95% and 1.57% on the NSL-KDD and UNSW-NB15 datasets, respectively, with the accuracy and F1 score also being superior.

4.
Entropy (Basel) ; 25(1)2023 Jan 15.
Artigo em Inglês | MEDLINE | ID: mdl-36673313

RESUMO

User alignment can associate multiple social network accounts of the same user. It has important research implications. However, the same user has various behaviors and friends across different social networks. This will affect the accuracy of user alignment. In this paper, we aim to improve the accuracy of user alignment by reducing the semantic gap between the same user in different social networks. Therefore, we propose a semantically enhanced social network user alignment algorithm (SENUA). The algorithm performs user alignment based on user attributes, user-generated contents (UGCs), and user check-ins. The interference of local semantic noise can be reduced by mining the user's semantic features for these three factors. In addition, we improve the algorithm's adaptability to noise by multi-view graph-data augmentation. Too much similarity of non-aligned users can have a large negative impact on the user-alignment effect. Therefore, we optimize the embedding vectors based on multi-headed graph attention networks and multi-view contrastive learning. This can enhance the similar semantic features of the aligned users. Experimental results show that SENUA has an average improvement of 6.27% over the baseline method at hit-precision30. This shows that semantic enhancement can effectively improve user alignment.

5.
Sci Rep ; 12(1): 15238, 2022 09 08.
Artigo em Inglês | MEDLINE | ID: mdl-36076015

RESUMO

The spread of false content on microblogging platforms has created information security threats for users and platforms alike. The confusion caused by false content complicates feature selection during credibility evaluation. To solve this problem, a collaborative key point-based content credibility evaluation model, CECKP, is proposed in this paper. The model obtains the key points of the microblog text from the word level to the sentence level, then evaluates the credibility according to the semantics of the key points. In addition, a rumor lexicon constructed collaboratively during word-level coding strengthens the semantics of related words and solves the feature selection problem when using deep learning methods for content credibility evaluation. Experimental results show that, compared with the Att-BiLSTM model, the F1 score of the proposed model increases by 3.83% and 3.8% when the evaluation results are true and false respectively. The proposed model accordingly improves the performance of content credibility evaluation based on optimized feature selection.


Assuntos
Idioma , Semântica
6.
Sensors (Basel) ; 22(15)2022 Jul 23.
Artigo em Inglês | MEDLINE | ID: mdl-35898011

RESUMO

In federated learning (FL), model parameters of deep learning are communicated between clients and the central server. To better train deep learning models, the spectrum resource and transmission security need to be guaranteed. Toward this end, we propose a secrecy transmission protocol based on energy harvesting and jammer selection for FL, in which the secondary transmitters can harvest energy from the primary source. Specifically, a secondary transmitter STi is first selected, which can offer the best transmission performance for the secondary users to access the primary frequency spectrum. Then, another secondary transmitter STn, which has the best channel for eavesdropping, is also chosen as a friendly jammer to provide secrecy service. Furthermore, we use outage probability (OP) and intercept probability (IP) as metrics to evaluate performance. Meanwhile, we also derive closed-form expressions of OP and IP of primary users and OP of secondary users for the proposed protocol, respectively. We also conduct a theoretical analysis of the optimal secondary transmission selection (OSTS) protocol. Finally, the performance of the proposed protocol is validated through numerical experiments. The results show that the secrecy performance of the proposed protocol is better than the OSTS and OCJS, respectively.


Assuntos
Confidencialidade , Humanos , Fenômenos Físicos , Probabilidade
7.
Entropy (Basel) ; 24(4)2022 Apr 01.
Artigo em Inglês | MEDLINE | ID: mdl-35455158

RESUMO

Identifying users across social media has practical applications in many research areas, such as user behavior prediction, commercial recommendation systems, and information retrieval. In this paper, we propose a multiple salient features-based user identification across social media (MSF-UI), which extracts and fuses the rich redundant features contained in user display name, network topology, and published content. According to the differences between users' different features, a multi-module calculation method is used to obtain the similarity between various redundant features. Finally, the bidirectional stable marriage matching algorithm is used for user identification across social media. Experimental results show that: (1) Compared with single-attribute features, the multi-dimensional information generated by users is integrated to optimize the universality of user identification; (2) Compared with baseline methods such as ranking-based cross-matching (RCM) and random forest confirmation algorithm based on stable marriage matching (RFCA-SMM), this method can effectively improve precision rate, recall rate, and comprehensive evaluation index (F1).

8.
Sensors (Basel) ; 21(15)2021 Jul 24.
Artigo em Inglês | MEDLINE | ID: mdl-34372270

RESUMO

With the explosive growth of smart devices and mobile applications, mobile core networks face the challenge of exponential growth in traffic and computing demand. Edge caching is one of the most promising solutions to the problem. The main purpose of edge caching is to place popular content that users need at the edge of the network, borrow free space to reduce user waiting time, and lighten the network load by reducing the amount of duplicate data. Due to the promising advantages of edge caching, there have been many efforts motivated by this topic. In this paper, we have done an extensive survey on the existing work from our own perspectives. Distinguished from the existing review articles, our work not only investigates the latest articles in this area, but more importantly, covers all the researches of the total process of edge caching from caching placement optimization, policy design, to the content delivery process. In particular, we discuss the benefits of caching placement optimization from the perspective of different stakeholders, detail the delivery process, and conduct in-depth discussions from the five phases, i.e., requested content analysis, user model analysis, content retrieval, delivery, and update. Finally, we put forward several challenges and potential future directions, and hope to bring some ideas for the follow-up researches in this area.


Assuntos
Políticas
9.
Sensors (Basel) ; 19(19)2019 Sep 29.
Artigo em Inglês | MEDLINE | ID: mdl-31569568

RESUMO

Wireless body area networks will inevitably bring tremendous convenience to human society in future development, and also enable people to benefit from ubiquitous technological services. However, one of the reasons hindering development is the limited energy of the network nodes. Therefore, the energy consumption in the selection of the next hop must be minimized in multi-hop routing. To solve this problem, this paper proposes an energy efficient routing protocol for reliable data transmission in a wireless body area network. The protocol takes multiple parameters of the network node into account, such as residual energy, transmission efficiency, available bandwidth, and the number of hops to the sink. We construct the maximum benefit function to select the next hop node by normalizing the node parameters, and dynamically select the node with the largest function value as the next hop node. Based on the above work, the proposed method can achieve efficient multi-hop routing transmission of data and improve the reliability of network data transmission. Compared with the priority-based energy-efficient routing algorithm (PERA) and modified new-attempt routing protocol (NEW-ATTEMPT), the simulation results show that the proposed routing protocol uses the maximum benefit function to select the next hop node dynamically, which not only improves the reliability of data transmission, but also significantly improves the energy utilization efficiency of the node and prolongs the network lifetime.


Assuntos
Algoritmos , Monitorização Fisiológica/métodos , Tecnologia sem Fio , Corpo Humano , Humanos , Armazenamento e Recuperação da Informação
10.
Sensors (Basel) ; 19(7)2019 Apr 05.
Artigo em Inglês | MEDLINE | ID: mdl-30959817

RESUMO

The emergence of wireless body area network (WBAN) technology has brought hope and dawn to solve the problems of population aging, various chronic diseases, and medical facility shortage. The increasing demand for real-time applications in such networks, stimulates many research activities. Designing such a scheme of critical events while preserving the energy efficiency is a challenging task, due to the dynamic of the network topology, severe constraints on the power supply, and the limited computation power. The design of routing protocols becomes an essential part of WBANs and plays an important role in the communication stacks and has a significant impact on the network performance. In this paper, we briefly introduce WBAN and focus on the analysis of the routing protocol, classify, and compare the advantages and disadvantages of various routing protocols. Lastly, we put forward some problems and suggestions, which provides ideas for the follow-up routing design.


Assuntos
Atenção à Saúde/métodos , Tecnologia sem Fio , Algoritmos , Redes de Comunicação de Computadores
11.
Med Eng Phys ; 28(6): 596-603, 2006 Jul.
Artigo em Inglês | MEDLINE | ID: mdl-16256404

RESUMO

The conventionally used spectral estimation technique for Doppler blood flow signal analysis is short-time Fourier transform (STFT). But this method requires stationarity of the signal during the window interval. Wavelet transform (WT), which has a flexible time-frequency window, is particularly suitable for nonstationary signals. In recently years, the WT has been used to investigate its advantages and limitations for the analysis of Doppler blood flow signals. In these studies, the estimated spectral width of Doppler blood flow signals using the WT might include significant window and nonstationarity broadening errors. These broadening errors of the time-varying spectrum were clearly undesirable since it would tend to mask the effect of flow disturbance on the spectra width. In this paper, a closed form expression for window and nonstationary root-mean-squared (rms) spectral width is given when using the WT to estimate the Doppler blood flow spectrum. The increases in the rms spectral width can be calculated and then the spectral width estimation based on the WT can be corrected.


Assuntos
Engenharia Biomédica/métodos , Velocidade do Fluxo Sanguíneo , Técnicas de Diagnóstico Cardiovascular , Processamento de Sinais Assistido por Computador , Ultrassonografia Doppler de Pulso/métodos , Algoritmos , Fenômenos Biomecânicos/métodos , Simulação por Computador , Análise de Fourier , Humanos , Interpretação de Imagem Assistida por Computador , Modelos Estatísticos , Miocárdio/patologia , Fatores de Tempo
SELEÇÃO DE REFERÊNCIAS
DETALHE DA PESQUISA
...