76 results on '"Neal N. Xiong"'
Search Results
2. EDMF: Efficient Deep Matrix Factorization With Review Feature Learning for Industrial Recommender System
- Author
-
Jiazhang Wang, Zhaoli Zhang, Chao Zheng, Xiaoxuan Shen, Hai Liu, Duantengchuan Li, Zhen Zhang, Neal N. Xiong, and Ke Lin
- Subjects
Computer science ,business.industry ,Recommender system ,Machine learning ,computer.software_genre ,Convolutional neural network ,Computer Science Applications ,Matrix decomposition ,Interactivity ,Control and Systems Engineering ,Prior probability ,Feature (machine learning) ,Maximum a posteriori estimation ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Feature learning ,Information Systems - Abstract
Recommendation accuracy is a fundamental problem in the quality of the recommendation system. In this paper, we propose an efficient deep matrix factorization with review feature learning for the industrial recommender system (EDMF). Two characteristics in user's review are revealed. First, interactivity between the user and the item, which can also be considered as the former's scoring behavior on the latter, is exploited in a review. Second, the review is only a partial description of the user's preferences for the item, which is revealed as the sparsity property. Specifically, in the first characteristic, EDMF extracts the interactive features of onefold review by convolutional neural networks with word attention mechanism. Subsequently, L0 norm is leveraged to constrain the review considering that the review information is a sparse feature, which is the second characteristic. Furthermore, the loss function is constructed by maximum a posteriori estimation theory, where the interactivity and sparsity property are converted as two prior probability functions. Finally, the alternative minimization algorithm is introduced to optimize the loss functions. Experimental results on several datasets demonstrate that the proposed methods, which show good industrial conversion application prospects, outperform the state-of-the-art methods in terms of effectiveness and efficiency.
- Published
- 2022
- Full Text
- View/download PDF
3. An Efficient Computing Offloading Scheme Based on Privacy-Preserving in Mobile Edge Computing Networks
- Author
-
Shanchen Pang, Huanhuan Sun, Min Wang, Shuyu Wang, Sibo Qiao, and Neal N. Xiong
- Subjects
Article Subject ,Computer Networks and Communications ,Electrical and Electronic Engineering ,Information Systems - Abstract
Computation offloading is an important technology to achieve lower delay communication and improve the experience of service (EoS) in mobile edge computing (MEC). Due to the openness of wireless links and the limitation of computing resources in mobile computing process, the privacy of users is easy to leak, and the completion time of tasks is difficult to guarantee. In this paper, we propose an efficient computing offloading algorithm based on privacy-preserving (ECOAP), which solves the privacy problem of offloading users through the encryption technology. To avoid the algorithm falling into local optimum and reduce the offloading user energy consumption and task completion delay in the case of encryption, we use the improved fast nondominated sorting genetic algorithm (INSGA-II) to obtain the optimal offloading strategy set. We obtain the optimal offloading strategy by using the methods of min-max normalization and simple additive weighting based on the optimal offloading strategy set. The ECOAP algorithm can preserve user privacy and reduce task completion time and user energy consumption effectively by comparing with other algorithms.
- Published
- 2022
- Full Text
- View/download PDF
4. TMA-DPSO: Towards Efficient Multi-Task Allocation With Time Constraints for Next Generation Multiple Access
- Author
-
Mingfeng Huang, Victor C. M. Leung, Anfeng Liu, and Neal N. Xiong
- Subjects
Computer Networks and Communications ,Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
5. Ensuring Cryptography Chips Security by Preventing Scan-Based Side-Channel Attacks With Improved DFT Architecture
- Author
-
Xiangqi Wang, Jin Wang, Peng Liu, Neal N. Xiong, Weizheng Wang, and Shuo Cai
- Subjects
Password ,0209 industrial biotechnology ,business.industry ,Computer science ,Cryptography ,02 engineering and technology ,Encryption ,Chip ,Computer Science Applications ,Human-Computer Interaction ,020901 industrial engineering & automation ,Control and Systems Engineering ,Running key cipher ,Obfuscation ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Side channel attack ,Electrical and Electronic Engineering ,business ,Software ,Computer hardware ,Shift register - Abstract
Cryptography chips are often used in some applications, such as smart grids and Internet of Things (IoT) to ensure their security. Cryptographic chips must be strictly tested to guarantee the correctness of the encryption and decryption. Scan-based design-for-testability (DFT) provides high test quality. However, it can also be misused to steal the cipher key of cryptographic chips by hackers. In this article, we present a new scan design methodology that can resist scan-based side-channel attacks by the dynamical obfuscation of scan input data and scan output data. The scan test is managed by a test password, which consists of load password and scan password. When the chip enters into the test mode, it is required to apply the test password via some external input ports. Once the correct load password is delivered, the scan password can be loaded into a special shift register. If the scan password is also correct, the chip testing can proceed normally. In case the load password or the scan password is wrong, the data in scan chains cannot be propagated correctly. Specifically, some elusory bits are sneaked into scan chains dynamically. The advantage of the proposed method is that it has no negative impact on design performance and test flow when powerfully protecting cryptographic chips. The area penalty is also acceptably low compared with other schemes.
- Published
- 2022
- Full Text
- View/download PDF
6. Anomaly Detection Based on Convolutional Recurrent Autoencoder for IoT Time Series
- Author
-
Neal N. Xiong, Sun Zhang, Jin Wang, and Chunyong Yin
- Subjects
0209 industrial biotechnology ,business.industry ,Computer science ,Deep learning ,Feature extraction ,Pattern recognition ,02 engineering and technology ,Autoencoder ,Convolutional neural network ,Computer Science Applications ,Human-Computer Interaction ,020901 industrial engineering & automation ,Control and Systems Engineering ,Sliding window protocol ,0202 electrical engineering, electronic engineering, information engineering ,Preprocessor ,020201 artificial intelligence & image processing ,Anomaly detection ,Artificial intelligence ,Data pre-processing ,Electrical and Electronic Engineering ,business ,Software - Abstract
Internet of Things (IoT) realizes the interconnection of heterogeneous devices by the technology of wireless and mobile communication. The data of target regions are collected by widely distributed sensing devices and transmitted to the processing center for aggregation and analysis as the basis of IoT. The quality of IoT services usually depends on the accuracy and integrity of data. However, due to the adverse environment or device defects, the collected data will be anomalous. Therefore, the effective method of anomaly detection is the crucial issue for guaranteeing service quality. Deep learning is one of the most concerned technology in recent years which realizes automatic feature extraction from raw data. In this article, the integrated model of the convolutional neural network (CNN) and recurrent autoencoder is proposed for anomaly detection. Simple combination of CNN and autoencoder cannot improve classification performance, especially, for time series. Therefore, we utilize the two-stage sliding window in data preprocessing to learn better representations. Based on the characteristics of the Yahoo Webscope S5 dataset, raw time series with anomalous points are extended to fixed-length sequences with normal or anomaly label via the first-stage sliding window. Then, each sequence is transformed into continuous time-dependent subsequences by another smaller sliding window. The preprocessing of the two-stage sliding window can be considered as low-level temporal feature extraction, and we empirically prove that the preprocessing of the two-stage sliding window will be useful for high-level feature extraction in the integrated model. After data preprocessing, spatial and temporal features are extracted in CNN and recurrent autoencoder for the classification in fully connected networks. Empiric results show that the proposed model has better performances on multiple classification metrics and achieves preferable effect on anomaly detection.
- Published
- 2022
- Full Text
- View/download PDF
7. Design and Analysis of a Prediction System About Influenza-Like Illness From the Latent Temporal and Spatial Information
- Author
-
Haiyan Wang, Xiaoxiang Guo, Jingli Ren, and Neal N. Xiong
- Subjects
Multivariate statistics ,Computer science ,Multivariable calculus ,Chaotic ,Missing data ,Regression ,Computer Science Applications ,Human-Computer Interaction ,symbols.namesake ,Control and Systems Engineering ,Kernel (statistics) ,Statistics ,Gaussian function ,symbols ,Electrical and Electronic Engineering ,Spatial analysis ,Software - Abstract
Influenza poses a significant risk to public health, as evidenced by the 2009 H1N1 pandemic which caused up to 203,000 deaths worldwide. Predicting the spatiotemporal information of disease in the incubation period is crucial because the prime aim of it is to provide guidance on preparing a response and avoid presumably adverse impact caused by a pandemic. This article designs and analyzes a prediction system about influenza-like illness (ILI) from the latent temporal and spatial information. In this system 1) Gaussian function model and multivariate polynomial regression are employed to investigate the temporal and spatial distribution of ILI data; 2) the phase space reconstructed by delay-coordinate embedding is used to explore the dynamical evolution behavior of the 1-D ILI series; and 3) a dynamical radial basis function neural network (DRBFNN) method which is the kernel of the system, is proposed to predict the ILI values based on the correlations between the observations space and reconstructed phase space. The performance analysis of our system shows that the regression equations coupling with spatial distribution information can be used to supplement the missing data, and the proposed DRBFNN method can predict the trends of ILI for the following one year. Furthermore, the prediction system in this article applies a model-free control schemes, i.e., there are no restriction equations between the multivariable inputs and outputs. This prediction system is expected to be used in predicting the output signals, even the chaotic output signals, in meteorology, industry, medicine, economy, and other fields. An example of predicting the Standard & Poors 500 index is given to introduce the application of our proposed system. The trend of open prices of the following eight trading days is well predicted.
- Published
- 2022
- Full Text
- View/download PDF
8. Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping
- Author
-
Runze Li, Jiaohua Qin, Yun Tan, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
9. Safety Analysis of Riding at Intersection Entrance Using Video Recognition Technology
- Author
-
Xingjian Xue, Linjuan Ge, Longxin Zeng, Weiran Li, Rui Song, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
10. Reversible Data Hiding in Encrypted Images Based on Adaptive Prediction and Labeling
- Author
-
Jiaohua Qin, Zhibin He, Xuyu Xiang, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
11. Criss-Cross Attentional Siamese Networks for Object Tracking
- Author
-
Zhangdong Wang, Jiaohua Qin, Xuyu Xiang, Yun Tan, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
12. SPPS: A Search Pattern Privacy System for Approximate Shortest Distance Query of Encrypted Graphs in IIoT
- Author
-
Jia Yu, Hanlin Zhang, Jianxi Fan, Xinrui Ge, Jianli Bai, and Neal N. Xiong
- Subjects
Security analysis ,Service (systems architecture) ,business.industry ,Computer science ,Cloud computing ,Space (commercial competition) ,Encryption ,Data structure ,Computer Science Applications ,Outsourcing ,Human-Computer Interaction ,Control and Systems Engineering ,Leverage (statistics) ,Electrical and Electronic Engineering ,business ,Software ,Computer network - Abstract
In recent years, Industrial Internet of Things (IIoT) has gradually attracted the attention of the industry owing to its accurate time synchronization, communication accuracy, and high adaptability. As an important data structure, graphs are widely used in IIoT applications, where entities and their relationships can be expressed in the form of graphs. With the widespread adoption of IIoT and cloud computing, an increasing number of individuals or organizations are outsourcing their IIoT graph data to cloud servers to enjoy the unlimited storage space and fast computing service. To protect the privacy of graph data, graphs are usually encrypted before being outsourced. In this article, we propose a search pattern privacy system for approximate shortest distance query of encrypted graphs in IIoT. To realize search pattern privacy, we adopt two noncolluded cloud servers to accomplish different tasks. We leverage the first server to store the encrypted data and perform query operations, and use the second one to rerandomize the contents and shuffle the locations of the queried records. Before queries, we generate the trapdoors by using different random numbers. After queries, we ask the second server to rerandomize the contents of the records that the first server touched. In addition, we shuffle the physical locations of original records by inserting some fake records. In this way, all contents and physical locations of the touched records change, so that the first server cannot distinguish whether two queries are the same or not. To enhance the efficiency on the user side, we further improve this system by moving some heavy workloads from the user to the cloud. The security analysis and the performance evaluation show that our work is secure and efficient.
- Published
- 2022
- Full Text
- View/download PDF
13. Aortic Dissection Diagnosis Based on Sequence Information and燚eep燣earning
- Author
-
Haikuo Peng, Yun Tan, Hao Tang, Ling Tan, Xuyu Xiang, Yongjun Wang, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2022
- Full Text
- View/download PDF
14. A UAV-Assisted Ubiquitous Trust Communication System in 5G and Beyond Networks
- Author
-
Mingfeng Huang, Neal N. Xiong, Jie Wu, and Anfeng Liu
- Subjects
Data collection ,Computer Networks and Communications ,Computer science ,Reliability (computer networking) ,Mobile broadband ,Hash function ,Communications system ,Computer security ,computer.software_genre ,Data modeling ,Data integrity ,Data verification ,Electrical and Electronic Engineering ,computer - Abstract
UAV-assisted wireless communications facilitate the applications of Internet of Things (IoT), which employ billions of devices to sense and collect data with an on-demand style. However, there are numerous malicious Mobile Data Collectors (MDCs) mixing into the network, stealing or tampering with data, which greatly damages IoT applications. So, it is urgent to build a ubiquitous trust communication system. In this paper, a UAV-assisted Ubiquitous Trust Evaluation (UUTE) framework is proposed, which combines the UAV-assisted global trust evaluation and the historical interaction based local trust evaluation. We first propose a global trust evaluation model for data collection platforms. It can accurately eliminate malicious MDCs and create a clean data collection environment, by dispatching UAVs to collect baseline data to validate the data submitted by MDCs. After that, a local trust evaluation model is proposed to help select credible MDCs for collaborative data collection. By letting UAVs distribute the data verification hash codes to MDCs, the MDCs can verify whether the exchanged data from the interacted MDCs is reliable. Extensive experiments conduct on a real-life dataset demonstrate that our UUTE system outperforms the existing trust evaluation systems in terms of accuracy and cost.
- Published
- 2021
- Full Text
- View/download PDF
15. QR-3S: A High Payload QR Code Secret Sharing System for Industrial Internet of Things in 6G Networks
- Author
-
Neal N. Xiong, Xinwei Zhong, Lizhi Xiong, and Ryan Wen Liu
- Subjects
Authentication ,Cover (telecommunications) ,business.industry ,Computer science ,Payload (computing) ,Cryptography ,Secret sharing ,Computer Science Applications ,Control and Systems Engineering ,Code (cryptography) ,Redundancy (engineering) ,Electrical and Electronic Engineering ,Error detection and correction ,business ,Information Systems ,Computer network - Abstract
The communication in a 6G-enabled network in a box (NIB) needs to meet the characteristics of fast, convenient, and safe. Secret sharing scheme has become a hot topic nowadays due to unconditional security and simple decryption. At the same time, a quick response (QR) code as a popular carrier has been widely applied in various industrial applications because of the data payload and convenience. Thus, the combination of secret sharing and QR code provides a solution by satisfying the requirements of 6G-enabled NIB. In this article, we design a QR code secret sharing scheme with authentication to protect private data and prevent cheater. In this scheme, a secret image is first divided into a series of shadows based on a polynomial, and authentication bits are generated based on the generated shadows. Then shadows and the authentication bits are embedded into the cover QR codes according to the error correction redundancy and the homomorphism of the Reed–Solomon code in the QR code. In addition, the secret can be restored with the qualified shares and the authentication bits could verify the authenticity of the embedded shadows. Compared with existing schemes, the proposed scheme not only guarantees a high capacity but also embeds more authentication bits to improve the authentication ability. In addition, experimental results have demonstrated that the proposed scheme is both robust and secure.
- Published
- 2021
- Full Text
- View/download PDF
16. Intelligent Detection for Key Performance Indicators in Industrial-Based Cyber-Physical Systems
- Author
-
Shiming He, Neal N. Xiong, Zhuozhou Li, and Jin Wang
- Subjects
Computer science ,020208 electrical & electronic engineering ,Feature extraction ,Minkowski distance ,Sampling (statistics) ,02 engineering and technology ,Interval (mathematics) ,computer.software_genre ,Computer Science Applications ,Matrix decomposition ,Control and Systems Engineering ,Feature (computer vision) ,0202 electrical engineering, electronic engineering, information engineering ,Anomaly detection ,Data mining ,Performance indicator ,Electrical and Electronic Engineering ,computer ,Information Systems - Abstract
Intelligent anomaly detection for key performance indicators (KPIs) is important for keeping services reliable in industrial-based cyber–physical systems (CPS). However, it is common in practice for various KPI sampling strategies to be utilized. We experimentally verify that anomaly detection is highly sensitive to irregular sampling, and accordingly go on to investigate low-cost anomaly detection for large-scale irregular KPIs. Irregular KPIs can be classified into four types: equal interval and unequal quantity (EIUQ) KPIs, unequal interval (UI) KPIs, unequal interval with equal duration (UIED) KPIs, and segmented irregular KPIs. In this article, we propose an anomaly detection framework based on these irregular types. Moreover, to handle the various lengths and phase shifts among EIUQ KPIs, we propose a normalized version of unequal cross-correlation, which slides the KPIs to enable finding the most similar position. To avoid high computational costs, we analyze the low-rank feature of KPIs data and propose a matrix factorization-based alignment algorithm for UIED KPIs; this algorithm treats UIED KPIs as an incomplete matrix and recovers the KPIs to align them before performing anomaly detection. Extensive simulations using three public datasets and two real-world datasets demonstrate that our algorithm can achieve a larger F1-score than Minkowski distance and less time than dynamic time warping distance.
- Published
- 2021
- Full Text
- View/download PDF
17. A Fast Semi-Supervised Clustering Framework for Large-Scale Time Series Data
- Author
-
Xuewen Xia, Jinrong He, Rong Peng, Guoliang He, Yanzhou Pan, and Neal N. Xiong
- Subjects
Clustering high-dimensional data ,Series (mathematics) ,Computer science ,02 engineering and technology ,Similarity measure ,computer.software_genre ,Computer Science Applications ,Human-Computer Interaction ,ComputingMethodologies_PATTERNRECOGNITION ,Similarity (network science) ,Control and Systems Engineering ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,Local consistency ,020201 artificial intelligence & image processing ,Data mining ,Electrical and Electronic Engineering ,Time series ,Cluster analysis ,computer ,Software - Abstract
Semi-supervised clustering algorithms have several limitations: 1) the computation complexity of them is very high, because calculating the similarity distances of pairs of examples is time-consuming; 2) traditional semi-supervised clustering methods have not considered how to make full use of must-link and cannot-link constraints. In the clustering, the contribution of a few pairwise constraints to the clustering performance is very limited, and some may negatively affect the outcome; and 3) these methods are not effective to handle high dimensional data, especially for time series data. Up to now, few work touched semi-supervised clustering on time series data. To efficiently cluster large-scale time series data, we first tackle contract time series clustering to produce the most accurate clustering results under a contracted time. We propose a semi-supervised time series clustering framework (STSC), which integrates a fast similarity measure and a constraint propagation approach. Based on the proposed framework, two valid semi-supervised clustering algorithms including fssK-means and fssDBSCAN are designed. Experiments on 11 datasets show that our proposed method is efficient and effective for clustering large-scale time series data.
- Published
- 2021
- Full Text
- View/download PDF
18. Using Conditional Random Fields to Optimize a Self-Adaptive Bell–LaPadula Model in Control Systems
- Author
-
Zhuo Tang, Neal N. Xiong, Jin Wang, and Li Yang
- Subjects
Conditional random field ,Computer science ,Feature vector ,0211 other engineering and technologies ,Feature selection ,Access control ,02 engineering and technology ,Viterbi algorithm ,computer.software_genre ,Data modeling ,symbols.namesake ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,021110 strategic, defence & security studies ,business.industry ,Bell–LaPadula model ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,Test set ,symbols ,020201 artificial intelligence & image processing ,Data mining ,business ,computer ,Software - Abstract
Once defined, the access control policies and regulations would never be changed in a running and state transition process. However, it will give attackers the possibility of discovering vulnerabilities in the system, and the control systems lack the ability of dynamic perception of security state and risk, causing the systems to be exposed to risks. In this article, a dynamic Bell–LaPadula (BLP) model is proposed. The conditional random field (CRF) is introduced into the BLP model to optimize the rules. First, the model formalizes the security attributes, states of system, transition rules, and constraint models on the basis of the state transition of CRFs. After the historical system access logs are processed as the original dataset, a feature selection method is proposed to extract the requests and current states as feature vectors. Second, this article presents a rules training algorithm based on L-BFGS to implement the study and training of datasets, and then marks the logs in the test set through Viterbi algorithm automatically. On the base of these, a rule generation algorithm is proposed to dynamically adjust the access control rules based on the current security status and events of the system. Third, the security of CRFs-BLP is proved by theoretical analysis. Finally, the validity and accuracy of the model are verified by estimating the value of the precision, recall, and $F1$ -score. As the system threats are shown to be decreased obviously from these experiments, this dynamic model can decrease the vulnerabilities and risk effectively.
- Published
- 2021
- Full Text
- View/download PDF
19. A Local Consensus Index Scheme for Random-Valued Impulse Noise Detection Systems
- Author
-
Chang-Dong Wang, Jianhuang Lai, Neal N. Xiong, Zhenan Sun, Xiuchun Xiao, and Jingwen Yan
- Subjects
Noise measurement ,Pixel ,Computer science ,020208 electrical & electronic engineering ,Image processing ,02 engineering and technology ,Impulse (physics) ,Impulse noise ,Computer Science Applications ,Human-Computer Interaction ,Reduction (complexity) ,Noise ,Control and Systems Engineering ,Computer Science::Computer Vision and Pattern Recognition ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Algorithm ,Software ,Image restoration - Abstract
The issue of impulse noise detection and reduction is a critical problem for image processing application systems. In order to detect impulse noises in corrupted images, a statistic named local consensus index (LCI) is proposed for quantitatively evaluating how noise free a pixel is, and then an impulse noise detection scheme based on LCI is introduced. First, the similarity between arbitrary two pixels in an image is quantified based on both their geometric distance and intensity difference, and the LCI of arbitrary pixel is calculated by summing all the similarity values of pixels in its neighborhood. As a new statistic, the value of LCI indicates the local consensus of the concerned pixel regarding its neighbors and could also tell whether a pixel is noise free or impulsive. Therefore, LCI can be directly used as an efficient indicator of impulse noise. Furthermore, to improve the performance of impulse noise detection, different strategies are applied to the pixels at flat regions and the ones with complex textures, since distributions of LCI value within those regions are totally different. As for impulse noise filtering, a hybrid graph Laplacian regularization (HGLR) method is introduced to restore the intensities of those pixels degraded by impulse noise. We conduct extensive experiments to verify the effectiveness of our impulsive noise detection and reduction method, and the results show that the proposed method outperforms the state-of-the-art techniques in terms of impulse detection and noise removal.
- Published
- 2021
- Full Text
- View/download PDF
20. Improving Spectrum Efficiency of Cell-Edge Devices by Incentive Architecture Applications With Dynamic Charging
- Author
-
Lihuan Hui, Neal N. Xiong, Jinsong Gui, and Jie Wu
- Subjects
Edge device ,Computer science ,business.industry ,020208 electrical & electronic engineering ,02 engineering and technology ,Spectral efficiency ,Computer Science Applications ,Base station ,Incentive ,Control and Systems Engineering ,Backward induction ,0202 electrical engineering, electronic engineering, information engineering ,Stackelberg competition ,Electrical and Electronic Engineering ,Potential game ,business ,Information Systems ,Computer network - Abstract
The gap between the peak-hour Internet and the average level is increasing, which inevitably creates a type of temporary cellular weak coverage when there is a surge in data traffic demand, where any cell-edge device will have a low spectrum efficiency (SE). In this article, we propose a novel incentive architecture based on the dynamic radio frequency charging technology to improve the SE and use the Stackelberg game theory to formulate the problem. In such a model, a small base station (SBS) acts as the leader to offer a desired partition of the resource block obtained by a cell-edge device, while some small energy providers (SEPs) and small virtual access points (SVAPs) that are selected from user equipment act as the followers to make their decisions, respectively, to compete for the free part of such a resource block. Following the potential game rules, all the SEPs compete for a specific free resource part allocated by the SBS, and then, all the SVAPs compete for another nonoverlapping part allocated by the SBS on the basis of the results of the SEPs’ potential game. Although our incentive architecture formally has three game stages, it is essentially a two-level Stackelberg game, which is analyzed by using a backward induction method. The theoretical analysis proves the convergence of the above-mentioned game models, and the simulation results demonstrate that the proposed incentive architecture can improve the SE for each cell-edge device.
- Published
- 2021
- Full Text
- View/download PDF
21. An Atomic Cross-Chain Swap-Based Management System in Vehicular Ad Hoc Networks
- Author
-
Shaoyi Bei, Neal N. Xiong, Zhengjun Jing, and Tan Chenkai
- Subjects
Scheme (programming language) ,Technology ,Blockchain ,Article Subject ,Computer Networks and Communications ,Wireless ad hoc network ,Computer science ,Throughput ,TK5101-6720 ,02 engineering and technology ,Encryption ,0202 electrical engineering, electronic engineering, information engineering ,Bandwidth (computing) ,Electrical and Electronic Engineering ,computer.programming_language ,business.industry ,020206 networking & telecommunications ,Management system ,Scalability ,Telecommunication ,020201 artificial intelligence & image processing ,business ,computer ,Information Systems ,Computer network - Abstract
The blockchain-based management system has been regarded as a novel way to improve the efficiency and safety of Vehicular Ad Hoc Networks (VANETs). A blockchain-based scheme’s performance depends on blockchain nodes’ computing power composed from the road-side unit (RSU). However, the throughput of blockchain-based application in VANETs is limited by the network bandwidth. A single blockchain cannot record large-scale VANETs’ data. In this paper, we design an atomic cross-chain swap-based management system (ACSMS) to boost the scalability of blockchain-based application in VANETs. The blockchain-based public-key encryption with keyword search is further introduced to protect user privacy. The analysis shows that ACSMS achieves cross-chain swap without loss of CAV security privacy. The simulation results show that our method can realize multiple blockchain-based applications in VANETs.
- Published
- 2021
- Full Text
- View/download PDF
22. Risk Prediction of Aortic Dissection Operation Based on Boosting Trees
- Author
-
D. Xie, Hao Tang, Yun Tan, Ling Tan, Neal N. Xiong, Xuyu Xiang, and Jiaohua Qin
- Subjects
Aortic dissection ,Boosting (machine learning) ,Coronavirus disease 2019 (COVID-19) ,Computer science ,Critical factors ,Economic shortage ,medicine.disease ,Computer Science Applications ,Biomaterials ,Mechanics of Materials ,Postoperative mortality ,Modeling and Simulation ,medicine ,Operations management ,Data pre-processing ,Electrical and Electronic Engineering ,Decision model - Abstract
During the COVID-19 pandemic, the treatment of aortic dissection has faced additional challenges. The necessary medical resources are in serious shortage, and the preoperative waiting time has been significantly prolonged due to the requirement to test for COVID-19 infection. In this work, we focus on the risk prediction of aortic dissection surgery under the influence of the COVID-19 pandemic. A general scheme of medical data processing is proposed, which includes five modules, namely problem definition, data preprocessing, data mining, result analysis, and knowledge application. Based on effective data preprocessing, feature analysis and boosting trees, our proposed fusion decision model can obtain 100% accuracy for early postoperative mortality prediction, which outperforms machine learning methods based on a singlemodel such as LightGBM,XGBoost, andCatBoost. The results reveal the critical factors related to the postoperative mortality of aortic dissection, which can provide a theoretical basis for the formulation of clinical operation plans and help to effectively avoid risks in advance. © 2021 Tech Science Press. All rights reserved.
- Published
- 2021
- Full Text
- View/download PDF
23. Algorithm of Helmet Wearing Detection Based on AT-YOLO Deep Mode
- Author
-
Neal N. Xiong, Jiaohua Qin, Qingyang Zhou, Yun Tan, and Xuyu Xiang
- Subjects
Biomaterials ,Mechanics of Materials ,Computer science ,Modeling and Simulation ,Acoustics ,Mode (statistics) ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2021
- Full Text
- View/download PDF
24. An Adaptive Lasso Grey Model for Regional FDI Statistics Prediction
- Author
-
Juan Huang, Bifang Zhou, Huajun Huang, Jianjiang Liu, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2021
- Full Text
- View/download PDF
25. Ecological Security Evaluation Algorithm for Resource-Exhausted Cities Based on the PSR Model
- Author
-
Qi Jin, Zhenggang Xu, Neal N. Xiong, Yunlin Zhao, Yuanyuan Fu, and Xiaozhou Li
- Subjects
Biomaterials ,Resource (biology) ,Mechanics of Materials ,Computer science ,Modeling and Simulation ,Evaluation algorithm ,Ecological security ,Electrical and Electronic Engineering ,Environmental economics ,Computer Science Applications - Published
- 2021
- Full Text
- View/download PDF
26. AF-Net: A Medical Image Segmentation Network Based on Attention Mechanism and Feature Fusion
- Author
-
Guimin Hou, Jiaohua Qin, Xuyu Xiang, Yun Tan, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2021
- Full Text
- View/download PDF
27. Adaptive Positioning Systems Based on Multiple Wireless Interfaces for Industrial IoT in Harsh Manufacturing Environments
- Author
-
Jordi Mongay Batalla, Jozef Wozniak, Constandinos X. Mavromoustakis, Neal N. Xiong, and George Mastorakis
- Subjects
Positioning system ,Computer Networks and Communications ,Electromagnetic environment ,business.industry ,Computer science ,Distributed computing ,Testbed ,020206 networking & telecommunications ,02 engineering and technology ,Indoor positioning system ,0202 electrical engineering, electronic engineering, information engineering ,Wireless ,Electrical and Electronic Engineering ,Transceiver ,Internet of Things ,business - Abstract
As the industrial sector is becoming ever more flexible in order to improve productivity, legacy interfaces for industrial applications must evolve to enhance efficiency and must adapt to achieve higher elasticity and reliability in harsh manufacturing environments. The localization of machines, sensors and workers inside the industrial premises is one of such interfaces used by many applications. Current localization-based systems are unable to deal with highly variable conditions, meaning that the solutions working well in stationary systems suffer from considerable difficulties in harsh environments, such as factories. As a result, the precision of localization techniques is not satisfactory in most industrial applications. This paper fills in the existing gap between static approaches and dynamic indoor positioning systems, by presenting a solution adapting the system to highly changeable conditions. The proposed solution makes use of a Machine Learning-based feedback loop that learns the variability of the environment. This feedback makes continuous fingerprint calibration feasible even in the presence of different machines and Industrial Internet of Things sensors that introduce variations to the electromagnetic environment. This paper also presents a comprehensive indoor positioning system solution that reduces complexity of hardware, meaning that a multi-standard-transceiver infrastructure may be adopted with reduced capital and operational expenditures. We have developed the system from scratch and have conducted an extensive range of testbed experiments showing that the multi-technology transceiver feature is capable of increasing positioning accuracy, as well as of introducing permanent fingerprints calibration at harsh industrial premises.
- Published
- 2020
- Full Text
- View/download PDF
28. A Novel Weber Local Binary Descriptor for Fingerprint Liveness Detection
- Author
-
Chengsheng Yuan, Xingming Sun, Zhihua Xia, Neal N. Xiong, Rui Lv, and Yun Q. Shi
- Subjects
Mahalanobis distance ,Biometrics ,Computer science ,business.industry ,Feature vector ,Liveness ,Fingerprint (computing) ,Feature extraction ,020207 software engineering ,Pattern recognition ,02 engineering and technology ,Fingerprint recognition ,Computer Science Applications ,Human-Computer Interaction ,Support vector machine ,Control and Systems Engineering ,Fingerprint ,Histogram ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Software - Abstract
In recent years, fingerprint authentication systems have been extensively deployed in various applications, including attendance systems, authentications on smartphones, mobile payment authorizations, as well as various safety certifications. However, similar to the other biometric identification technologies, fingerprint recognition is vulnerable to artificial replicas made from cheap materials, such as silicon, gelatin, etc. Thus, it is especially necessary to distinguish whether a given fingerprint is a live or a spoof one prior to such authentication. In order to solve the problems above, a novel local descriptor named Weber local binary descriptor for fingerprint liveness detection (FLD) has been proposed in this paper. The method consists of two components: the local binary differential excitation component that extracts intensity-variance features and the local binary gradient orientation component that extracts orientation features. The co-occurrence probability of the two components is calculated to construct a discriminative feature vector, which is fed into support vector machine (SVM) classifiers. The effectiveness of the proposed method is intuitively analyzed on the image samples and numerically demonstrated by Mahalanobis distance. Experiments are performed on two public databases from FLD competitions from 2011 and 2013. The results have proved that the proposed method obtains the best detection accuracy among the existing image local descriptors in FLD.
- Published
- 2020
- Full Text
- View/download PDF
29. An Intelligent Data Analysis System Combining ARIMA and LSTM for Persistent Organic Pollutants Concentration Prediction
- Author
-
Lu Yu, Chunxue Wu, and Neal N. Xiong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering ,data analysis ,time series ,LSTM model ,ARIMA model ,concentration prediction - Abstract
Persistent Organic Pollutants (POPs) are toxic and difficult to degrade, which will cause huge damages to human life and the ecological environment. Therefore, based on historical measurements, it is important to use intelligent methods and data analysis technologies to build an intelligent prediction system to accurately predict the future POPs concentrations in advance. This work has extremely important significance for policy formulation, human health, environmental protection and the sustainable development of society. Since the POPs concentrations sequence contains both linear and nonlinear components, this paper proposes an intelligent data analysis system combining autoregressive integrated moving average (ARIMA) and long short-term memory network (LSTM) to analyze and predict the POPs concentrations in the Great Lakes region. ARIMA is used to capture linear components while LSTM is used to process nonlinear components, which overcomes the deficiency of single models. Moreover, a one-class SVM algorithm is used to detect outliers during data preprocessing. Bayesian information criterion and grid search methods are also used to obtain the optimal parameter combinations of ARIMA and LSTM, respectively. This paper compares our intelligent data analysis system with other single baseline models by using multiple evaluation indicators and finds that our system has the smallest MAE, RMSE and SMAPE values on all datasets. Meanwhile, our system can predict the trends of concentration changes well and the predicted values are closer to true values, which prove that it can effectively improve the precision of prediction. Finally, our system is used to predict concentration values of sites in the Great Lakes region in the next 5 years. The predicted concentrations present a large fluctuation trend in each year, but the overall trend is downward.
- Published
- 2022
- Full Text
- View/download PDF
30. Matrix Measure-Based Projective Synchronization on Coupled Neural Networks With Clustering Trees
- Author
-
Chenhui Jiang, Ze Tang, Neal N. Xiong, and Ju H. Park
- Subjects
Lyapunov stability ,Artificial neural network ,Topology ,Measure (mathematics) ,Computer Science Applications ,Human-Computer Interaction ,Matrix (mathematics) ,Rate of convergence ,Control and Systems Engineering ,Synchronization (computer science) ,Electrical and Electronic Engineering ,Cluster analysis ,Realization (systems) ,Software ,Information Systems ,Mathematics - Abstract
This article mainly studies the projective quasisynchronization for an array of nonlinear heterogeneous-coupled neural networks with mixed time-varying delays and a cluster-tree topology structure. For the sake of the mismatched parameters and the mutual influence among distinct clusters, the exponential and global quasisynchronization within a prescribed error bound instead of complete synchronization for the coupled neural networks with clustering trees is investigated. A kind of pinning impulsive controllers is designed, which will be imposed on the selected neural networks with some largest norms of error states at each impulsive instant in different clusters. By employing the concept of the average impulsive interval, the matrix measure method, and the Lyapunov stability theorem, sufficient conditions for the realization of the cluster projective quasisynchronization are derived. Meanwhile, in terms of the formula of variation of parameters and the comparison principle for the impulsive systems with mixed time-varying delays, the convergence rate and the synchronization error bound are precisely estimated. Furthermore, the synchronization error bound is efficiently optimized based on different functions of the impulsive effects. Finally, a numerical experiment is given to prove the results of theoretical analysis.
- Published
- 2021
31. DePET: A Decentralized Privacy-Preserving Energy Trading Scheme for Vehicular Energy Network via Blockchain and K - Anonymity
- Author
-
Yuling Chen, Hui Dou, Wei Ren, Yangyang Long, and Neal N. Xiong
- Subjects
blockchain ,Blockchain ,General Computer Science ,Computer science ,location privacy ,02 engineering and technology ,k-anonymity ,Computer security ,computer.software_genre ,K-anonymity ,Vehicular energy networks ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Electrical and Electronic Engineering ,Processing delay ,020208 electrical & electronic engineering ,General Engineering ,020206 networking & telecommunications ,Groundwater recharge ,energy trading ,Privacy preserving ,Information sensitivity ,Energy trading ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,computer ,lcsh:TK1-9971 - Abstract
With the gradually opening of energy markets and popularization of Electric Vehicles (EVs), EVs can transmit, dispatch and recharge energy in different markets and domains dynamically. However, in Vehicular Energy Network, EVs may randomly enter and leave a market, it imposes a difficult problem in that how to schedule and distribute energy effectively. Additionally, the location of EV owners usually includes sensitive information such as home addresses, company names, hospital traces, and so on, which may be collected by attackers and may result in the privacy leakage about EV owners. In this article, we propose a decentralized blockchain-enabled energy trading scheme that can trade cross over various domains efficiently, which enables reliable transactions between EVs and energy nodes within short processing delay. It can also preserve the privacy of EV owners, by adopting the k-anonymity method in constructing a united request to hide the location information and creating a clocking area based on undirected graphs. Even though the server is maliciously attacked, the attacker cannot distinguish among EV owners, which breaks the linkage between real locations and identities to preserve EV owners’ privacy. Finally, we conduct a comprehensive experimental evaluation to evaluate the trading performance and location privacy protection performance. The simulation results show that our proposed architecture outperforms over most state-of-the-art schemes in terms of processing delay and location privacy awareness.
- Published
- 2020
32. Image Recognition of Citrus Diseases Based on Deep Learning
- Author
-
Neal N. Xiong, Jiaohua Qin, Zongshuai Liu, YunTan, Xuyu Xiang, and Qin Zhang
- Subjects
Biomaterials ,Mechanics of Materials ,business.industry ,Computer science ,Modeling and Simulation ,Deep learning ,Pattern recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
33. Coverless Image Steganography Based on Image Segmentation
- Author
-
Zhibin He, Xuyu Xiang, Yuanjing Luo, Jiaohua Qin, Yun Tan, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Computer science ,business.industry ,Modeling and Simulation ,Computer vision ,Image segmentation ,Image steganography ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
34. Privacy Protection for Medical Images based on DenseNet and Coverless Steganography
- Author
-
Hao Tang, Yun Tan, Neal N. Xiong, Jiaohua Qin, Xuyu Xiang, and Ling Tan
- Subjects
Biomaterials ,Steganography ,Mechanics of Materials ,Computer science ,Modeling and Simulation ,Privacy protection ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,computer ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
35. An Improved Method for the Fitting and Prediction of the Number of COVID-19 Confirmed Cases Based on LSTM
- Author
-
Xiangyan Tang, Yize Zhou, Boyi Liu, Jun Wang, Qi Zou, Wenxuan Tu, Bingjie Yan, Guopeng Zheng, Yao Lu, and Neal N. Xiong
- Subjects
Estimation ,Data processing ,education.field_of_study ,010504 meteorology & atmospheric sciences ,Coronavirus disease 2019 (COVID-19) ,Artificial neural network ,Series (mathematics) ,Computer science ,Differential equation ,Population ,020206 networking & telecommunications ,02 engineering and technology ,computer.software_genre ,01 natural sciences ,Computer Science Applications ,Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,0202 electrical engineering, electronic engineering, information engineering ,Data mining ,Electrical and Electronic Engineering ,education ,computer ,Predictive modelling ,0105 earth and related environmental sciences - Abstract
New coronavirus disease (COVID-19) has constituted a global pandemic and has spread to most countries and regions in the world Through understanding the development trend of confirmed cases in a region, the government can control the pandemic by using the corresponding policies However, the common traditional mathematical differential equations and population prediction models have limitations for time series population prediction, and even have large estimation errors To address this issue, we propose an improved method for predicting confirmed cases based on LSTM (Long -Short Term Memory) neural network This work compares the deviation between the experimental results of the improved LSTM prediction model and the digital prediction models (such as Logistic and Hill equations) with the real data as reference Furthermore, this work uses the goodness of fitting to evaluate the fitting effect of the improvement Experiments show that the proposed approach has a smaller prediction deviation and a better fitting effect Compared with the previous forecasting methods, the contributions of our proposed improvement methods are mainly in the following aspects: 1) we have fully considered the spatiotemporal characteristics of the data, rather than single standardized data 2) the improved parameter settings and evaluation indicators are more accurate for fitting and forecasting 3) we consider the impact of the epidemic stage and conduct reasonable data processing for different stage
- Published
- 2020
- Full Text
- View/download PDF
36. News Text Topic Clustering Optimized Method Based on TF-IDF Algorithm on Spark
- Author
-
Neal N. Xiong, Jiaohua Qin, Yun Tan, Xuyu Xiang, Zhuo Zhou, and Qiang Liu
- Subjects
Biomaterials ,Mechanics of Materials ,Computer science ,Modeling and Simulation ,Spark (mathematics) ,Data mining ,Electrical and Electronic Engineering ,Cluster analysis ,tf–idf ,computer.software_genre ,computer ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
37. A Privacy-Preserving Outsourcing Scheme for Image Local Binary Pattern in Secure Industrial Internet of Things
- Author
-
Xiaohe Ma, Wenyuan Yang, Leqi Jiang, Neal N. Xiong, Puzhao Ji, and Zhihua Xia
- Subjects
Scheme (programming language) ,Security analysis ,business.industry ,Computer science ,020208 electrical & electronic engineering ,Process (computing) ,02 engineering and technology ,Encryption ,Computer security ,computer.software_genre ,Computer Science Applications ,Outsourcing ,Control and Systems Engineering ,Feature (computer vision) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,Electrical and Electronic Engineering ,business ,computer ,Information Systems ,computer.programming_language - Abstract
In the era of Industrial Internet of Things (IIoT), huge amounts of data are generated, and companies are highly motivated to store the data on cloud servers for cost saving and efficient application. However, the IIoT data are always of great value. The direct outsourcing of such data can leak the important information of the companies and cause great business losses. A straightforward solution is to encrypt the data by using standard encryption methods before outsourcing. Nevertheless, this will make data utilization quite inconvenient. This paper focuses on the secure process of image data on cloud servers. Images are stored on cloud servers in encrypted form, and the local binary pattern feature can be directly extracted from the encrypted images for applications. The security analysis and experimental results demonstrate the security and effectiveness of our scheme.
- Published
- 2020
- Full Text
- View/download PDF
38. Multi-Index Image Retrieval Hash Algorithm Based on Multi-View Feature Coding
- Author
-
Rong Duan, Junshan Tan, Jiaohua Qin, Xuyu Xiang, Yun Tan, and Neal N. Xiong
- Subjects
Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
39. An Adaptive Image Calibration Algorithm for Steganalysis
- Author
-
Jiaohua Qin, Junshan Tan, Xuyu Xiang, and Neal N. Xiong
- Subjects
Biomaterials ,Steganalysis ,Mechanics of Materials ,business.industry ,Computer science ,Modeling and Simulation ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Image calibration ,Computer Science Applications - Published
- 2020
- Full Text
- View/download PDF
40. A Novel Convolution-Based Algorithm for the Acyclic Network Symbolic Reliability Function Problem
- Author
-
Wei-Chang Yeh, Cheng-Feng Hu, Chia-Ling Huang, Zhifeng Hao, Neal N. Xiong, and Yi-Zhu Su
- Subjects
General Computer Science ,Network reliability ,Computer science ,General Engineering ,acyclic network ,minimal path (MP) ,Function problem ,the pivotal decomposition ,Convolution ,convolution ,General Materials Science ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Electrical and Electronic Engineering ,lcsh:TK1-9971 ,Algorithm ,Reliability (statistics) - Abstract
Acyclic (binary-state) networks are commonly implemented in many diverse disciplines and applications, including information systems, processes management, project management. These networks owe their popularity to the fact that they do not use directed cycles. Network reliability is the most commonly used tool for evaluating and managing systems modeled on acyclic networks, and minimal paths (MPs) play a significant role in evaluating this reliability. This study therefore proposes a new algorithm based on a novel convolution concept for evaluating acyclic network reliability. The proposed algorithm is able to find all convolution-based MP sets within polynomial time, and then obtain the symbolic function of the acyclic network reliability in terms of those convolution-based MP sets based on the pivotal decomposition. Its total time complexity is O(2n), which is the best among all existing MP algorithms which are at least O(2|P|), where O(|P|) = O(2n), and n and |P| are the number of nodes and MPs, respectively. The correctness and time complexity of the proposed algorithm is proven and examined. An example is used to display the novel convolution-based algorithm is implemented to solve the acyclic network reliability problem.
- Published
- 2020
- Full Text
- View/download PDF
41. Content Propagation for Content-Centric Networking Systems From Location-Based Social Networks
- Author
-
Weihua Gui, Neal N. Xiong, Tian Wang, Anfeng Liu, and Yuxin Liu
- Subjects
Network architecture ,business.product_category ,Social network ,business.industry ,Computer science ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,Server ,Content centric networking ,0202 electrical engineering, electronic engineering, information engineering ,Internet access ,020201 artificial intelligence & image processing ,The Internet ,Enhanced Data Rates for GSM Evolution ,Electrical and Electronic Engineering ,Mobile data offloading ,business ,Software ,Computer network - Abstract
Pervasive sensing devices make an unprecedented increase in data sensing, collection, and processing in edge network and they form the edge content server system. The edge content server system combines the content-centric network (CCN) to form a huge content propagation system which makes it challenging to achieve efficient content propagation. Different from IP-based, host-oriented Internet architecture, the CCN systems focus on the information that is contained in network and directly accessible, providing more secure and flexible Internet services. This emerging network architecture supports a number of novel applications, such as common interests sharing, mobile data offloading, and information dissemination without Internet access. In this paper, an analytical framework is proposed to address the problem of content propagation among users with the same interests in leveraging location-based social networks, where the check-in patterns of users are recorded. Particularly, we propose a content propagation effectiveness quantitative model that considers the distance between users, users’ interests, and contact rates to formulate the propagation effect and latency. We also apply our framework to two real-world datasets for the evaluation of its effectiveness. Compared with previous studies, our simulated annealing-based algorithm can greatly improve the effects by as much as 25.4%–65.6%, and the contents can be disseminated faster by about 24.6%–57.8%.
- Published
- 2019
- Full Text
- View/download PDF
42. Intelligent Campus System Design Based on Digital Twin
- Author
-
Xu Han, Hua Yu, Wenhao You, Chengxu Huang, Baohua Tan, Xingru Zhou, and Neal N. Xiong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering ,digital twins ,point cloud modeling ,system availability ,smart campus ,Unity3D ,virtual simulation - Abstract
Amid the COVID-19 pandemic, prevention and control measures became normalized, prompting the development of campuses from digital to intelligent, eventually evolving to become wise. Current cutting-edge technologies include big data, Internet of Things, cloud computing, and artificial intelligence drive campus innovation, but there are still problems of unintuitive scenes, lagging monitoring information, untimely processing, and high operation and maintenance costs. Based on this, this study proposes the use of digital twin technology to digitally construct the physical campus scene, fully digitally represent it, accurately map the physical campus to the virtual campus with real-time sensing, and remotely control it to achieve the reverse control of the twin virtual campus to the physical campus. The research is guided by the theoretical model proposed by the digital twin technology, using UAV tilt photography and 3D modelling to collaboratively build the virtual campus scene. At the design stage, the interactive channel of the system is developed based on Unity3D to the realize real-time monitoring, decision making and prevention of dual spatial data. A design scheme of the spiral optimization system life cycle is formed. The modules of the smart campus system were evaluated using a system usability scale based on student experience. The experimental results show that the virtual-real campus system can enhance school management and teaching, providing important implications for promoting the development and application of campus intelligent systems.
- Published
- 2022
- Full Text
- View/download PDF
43. Dynamic malware attack dataset leveraging virtual machine monitor audit data for the detection of intrusions in cloud
- Author
-
S. Sudhakar Ilango, S. Vimal, A. Alfred Raja Melvin, Neal N. Xiong, Seungmin Rho, Yunyoung Nam, and G. Jaspher W. Kathrine
- Subjects
Computer science ,business.industry ,Operating system ,Malware ,Cloud computing ,Hypervisor ,Audit ,Electrical and Electronic Engineering ,computer.software_genre ,business ,computer - Published
- 2021
- Full Text
- View/download PDF
44. Algorithm of Computer Mainboard Quality Detection for Real-Time Based on QD-YOLO
- Author
-
Guangming Tu, Jiaohua Qin, and Neal N. Xiong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,Electrical and Electronic Engineering ,deep learning ,YOLO ,composite attention ,computer mainboard quality detection ,real-time detection - Abstract
Automated industrial quality detection (QD) boosts quality-detection efficiency and reduces costs. However, current quality-detection algorithms have drawbacks such as low efficiency, easily missed detections, and false detections. We propose QD-YOLO, an attention-based method to enhance quality-detection efficiency on computer mainboards. Firstly, we propose a composite attention module for the network’s backbone to highlight appropriate feature channels and improve the feature fusion structure, allowing the network to concentrate on the crucial information in the feature map. Secondly, we employ the Meta-ACON activation function to dynamically learn whether the activation function is linear or non-linear for various input data and adapt it to varied input scenarios with varying linearity. Additionally, we adopt Ghost convolution instead of ordinary convolution, using linear operations as possible to reduce the number of parameters and speed up detection. Experimental results show that our method can achieve improved real-time performance and accuracy on the self-created mainboard quality defect dataset, with a mean average precision (mAP) of 98.85% and a detection speed of 31.25 Frames Per Second (FPS). Compared with the original YOLOv5s model, the improved method improves mAP@0.5 by 2.09% and detection speed by 2.67 FPS.
- Published
- 2022
- Full Text
- View/download PDF
45. Complex Network Construction of Multivariate Time Series Using Information Geometry
- Author
-
Jiancheng Sun, Liyun Dai, Jianguo Luo, Neal N. Xiong, Xiangdong Peng, and Yong Yang
- Subjects
Geodesic ,Complex system ,02 engineering and technology ,Machine learning ,computer.software_genre ,01 natural sciences ,010305 fluids & plasmas ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,Information geometry ,Electrical and Electronic Engineering ,Mathematics ,Series (mathematics) ,business.industry ,Covariance matrix ,Cyber-physical system ,Complex network ,Covariance ,Computer Science Applications ,Human-Computer Interaction ,Control and Systems Engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,computer ,Algorithm ,Software - Abstract
Cyber physical systems (CPS) is a tightly coupled integration and interaction between computational and physical components. In many cases, information collection in CPS is provided through a group of distributed sensors and all of them change continuously with time. Thus the sensor information is usually in the form of time series. One particularly interesting application in time series analysis is use of complex networks to represent and study behaviors of system. Complex networks has been playing an important role for analyzing complex systems as it helps understanding the topology structure of systems with different interacting units. In this paper, we proposed a reliable method for constructing complex networks from multivariate time series (MTSs) in the cases of single and multisensor based on information geometry theory, which allows the information in the time series to be extracted by analyzing the associated complex network. We first estimate covariance matrices and then a geodesic-based distance between the covariance matrices is introduced. Consequently, the network can be constructed on a Riemannian manifold where the nodes and edges correspond to the covariance matrix and the geodesic-based distance, respectively. The proposed method provides us with a nonlinear relationship and intrinsic geometry viewpoint to understand the MTSs and also an alternative approach to fuse, model, represent, and visualize the multisensor data in CPS. A number of experimental studies and numerical examples are presented to demonstrate the generality and the effectiveness of our approach with both synthetic and real datasets.
- Published
- 2019
- Full Text
- View/download PDF
46. A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things
- Author
-
Weiwen Kong, Baowei Wang, Wei Li, and Neal N. Xiong
- Subjects
Scheme (programming language) ,Computer science ,business.industry ,Watermark ,Computer Science Applications ,Dual (category theory) ,Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Data integrity ,Chaining ,Electrical and Electronic Engineering ,business ,Internet of Things ,computer ,computer.programming_language ,Computer network - Published
- 2019
- Full Text
- View/download PDF
47. Adaptive Median Filtering Algorithm Based on Divide and Conquer and Its Application in CAPTCHA Recognition
- Author
-
Yuanjing Luo, Jiaohua Qin, Yun Tan, Neal N. Xiong, Wentao Ma, and Xuyu Xiang
- Subjects
Divide and conquer algorithms ,CAPTCHA ,Computer science ,business.industry ,Pattern recognition ,computer.software_genre ,Computer Science Applications ,Biomaterials ,Mechanics of Materials ,Modeling and Simulation ,Median filter ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer - Published
- 2019
- Full Text
- View/download PDF
48. WGAN-E: A Generative Adversarial Networks for Facial Feature Security
- Author
-
Neal N. Xiong, Chunxue Wu, Bobo Ju, Sheng Zhang, and Yan Wu
- Subjects
Biometrics ,Computer Networks and Communications ,Computer science ,Local binary patterns ,Hash function ,0211 other engineering and technologies ,neurocryptography ,lcsh:TK7800-8360 ,02 engineering and technology ,Encryption ,Machine learning ,computer.software_genre ,Facial recognition system ,Field (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Feature (machine learning) ,Electrical and Electronic Engineering ,021110 strategic, defence & security studies ,business.industry ,Deep learning ,lcsh:Electronics ,wasserstein gan ,Hardware and Architecture ,Control and Systems Engineering ,Signal Processing ,020201 artificial intelligence & image processing ,Artificial intelligence ,facial feature ,generative adversarial networks ,business ,computer ,face recognition - Abstract
Artificial intelligence technology plays an increasingly important role in human life. For example, distinguishing different people is an essential capability of many intelligent systems. To achieve this, one possible technical means is to perceive and recognize people by optical imaging of faces, so-called face recognition technology. After decades of research and development, especially the emergence of deep learning technology in recent years, face recognition has made great progress with more and more applications in the fields of security, finance, education, social security, etc. The field of computer vision has become one of the most successful branch areas. With the wide application of biometrics technology, bio-encryption technology came into being. Aiming at the problems of classical hash algorithm and face hashing algorithm based on Multiscale Block Local Binary Pattern (MB-LBP) feature improvement, this paper proposes a method based on Generative Adversarial Networks (GAN) to encrypt face features. This work uses Wasserstein Generative Adversarial Networks Encryption (WGAN-E) to encrypt facial features. Because the encryption process is an irreversible one-way process, it protects facial features well. Compared with the traditional face hashing algorithm, the experimental results show that the face feature encryption algorithm has better confidentiality.
- Published
- 2020
49. TCSA: A Traffic Congestion Situation Assessment Scheme Based on Multi-Index Fuzzy Comprehensive Evaluation in 5G-IoV
- Author
-
Li Liu, Minjie Lian, Caiwu Lu, Sai Zhang, Ruimin Liu, and Neal N. Xiong
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Control and Systems Engineering ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Signal Processing ,Electrical and Electronic Engineering ,traffic congestion situation assessment (TCSA) ,dynamic multi-model adaptive exponential smoothing (DMMAES) ,fuzzy comprehensive evaluation ,Internet of Vehicles (IoV) - Abstract
The traffic congestion situation is an important reference indicator for the orderly control and management of traffic systems. As intelligent transport systems (ITS) become increasingly popular, the challenge of realizing real-time traffic congestion situation assessments (TCSAs) in the post-traffic era is particularly important. In this study, we propose a TCSA scheme for multi-metric fuzzy integrated evaluation based on three predicted vehicle traffic parameters for the 5G Internet of Vehicles (5G-IoV) environment, which is dedicated to accelerating the development of ITS. Firstly, the scheme uses dynamic multi-model adaptive exponential smoothing (DMMAES), which can calculate the optimal smoothing coefficients and weight of each model based on historical prediction errors to predict the average speed and traffic volume and then calculate the predicted traffic speed, traffic flow density, and road saturation of the three traffic congestion indicators. Secondly, the predicted values of the three traffic congestion indicators are used as fuzzy comprehensive evaluation, taking into account the vagueness of the traffic congestion levels, the uncertainty of the indicators, and the conflict among the indicators, using a trapezoidal affiliation function to determine the degree of affiliation of each indicator through the adaptive CRITIC method to determine the weights. Finally, the predicted traffic congestion situations are classified into five levels. The effectiveness of the scheme was verified by the measured data of Yanta North Road in Xi’an. The results showed that the traffic congestion level predicted by TCSA was basically consistent with the actual situation and had a high prediction accuracy.
- Published
- 2022
- Full Text
- View/download PDF
50. Optimized Multioperator Image Retargeting Based on Perceptual Similarity Measure
- Author
-
Zhijun Fang, Feiniu Yuan, Yong Yang, Neal N. Xiong, Shouyuan Yang, and Yuming Fang
- Subjects
Similarity (geometry) ,Computer science ,Structural similarity ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Seam carving ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Computer vision ,Electrical and Electronic Engineering ,Image warping ,business.industry ,Distortion (optics) ,020206 networking & telecommunications ,Computer Science Applications ,Visualization ,Human-Computer Interaction ,Control and Systems Engineering ,Human visual system model ,Retargeting ,020201 artificial intelligence & image processing ,Artificial intelligence ,Hardware_CONTROLSTRUCTURESANDMICROPROGRAMMING ,business ,Cropping ,Software - Abstract
With various emerging mobile devices, the visual content have be to resized into different sizes or aspect ratios for good viewing experiences. In this paper, we propose a new multioperator retargeting algorithm by using four retargeting operators of seam carving, cropping, warping, and scaling iteratively. To determine which retargeting operator should be used at each iteration, we adopt structural similarity (SSIM) to evaluate the similarity between the original and retargeted images. The retargeting operator sequence is constructed based on the four types of retargeting operators by an optimization process. Since the sizes of original and retargeted images are different, scale-invariant feature transform flow is used for dense correspondence between the original and retargeted images for similarity evaluation. Additionally, visual saliency is used to weight SSIM results based on the characteristics of the human visual system. Experimental results on a public image retargeting database have shown the promising performance of the proposed multioperator retargeting algorithm.
- Published
- 2017
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.