首页 > 最新文献

Tsinghua Science and Technology最新文献

英文 中文
An Intelligent Traffic Monitoring System in Congested Regions with Prioritization for Emergency Vehicle Using UAV Networks 基于无人机网络的应急车辆优先级拥堵智能交通监控系统
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010078
V. D. Ambeth Kumar;Venkatesan Ramachandran;Mamoon Rashid;Abdul Rehman Javed;Shayla Islam;Abdullah Al Hejaili
Unmanned Aerial Vehicles (UAVs) are enabled to be fast and flexible in managing traffic compared to the conventional methods. However, in emergencies, this system takes more time to identify and clear the traffic because of fixed time control. To overcome this problem, an automated intelligent traffic monitoring and controlling system is designed using YOLO V3 neural architecture and implemented to detect the emergency vehicles from video stream data from UAVs using deep Convolution Neural Network (CNN) along with rerouting algorithm to provide the safest alternate route from current position to destination, in a heavy traffic environment. The real-time visual data collected through UAV video cameras are trained using machine learning algorithms to produce statistical profiles that are used continuously as updated inputs to the existing traffic simulation models for improving predictions. The proposed automated system performs exemplary in recognizing emergency vehicles and diverting them to an alternate route for quick transportation in various scenarios.
与传统交通方式相比,无人机在交通管理方面具有快速、灵活的特点。但是,在紧急情况下,由于固定的时间控制,系统需要花费更多的时间来识别和清除流量。为了克服这一问题,采用YOLO V3神经网络架构设计了自动智能交通监控系统,并利用深度卷积神经网络(CNN)和重路由算法从无人机视频流数据中检测应急车辆,从而在繁忙的交通环境中提供从当前位置到目的地的最安全替代路线。通过无人机摄像机收集的实时视觉数据使用机器学习算法进行训练,以产生统计概况,这些统计概况不断用作现有交通模拟模型的更新输入,以改进预测。所提出的自动化系统在识别紧急车辆并在各种情况下将其转移到备用路线以进行快速运输方面具有示范作用。
{"title":"An Intelligent Traffic Monitoring System in Congested Regions with Prioritization for Emergency Vehicle Using UAV Networks","authors":"V. D. Ambeth Kumar;Venkatesan Ramachandran;Mamoon Rashid;Abdul Rehman Javed;Shayla Islam;Abdullah Al Hejaili","doi":"10.26599/TST.2023.9010078","DOIUrl":"https://doi.org/10.26599/TST.2023.9010078","url":null,"abstract":"Unmanned Aerial Vehicles (UAVs) are enabled to be fast and flexible in managing traffic compared to the conventional methods. However, in emergencies, this system takes more time to identify and clear the traffic because of fixed time control. To overcome this problem, an automated intelligent traffic monitoring and controlling system is designed using YOLO V3 neural architecture and implemented to detect the emergency vehicles from video stream data from UAVs using deep Convolution Neural Network (CNN) along with rerouting algorithm to provide the safest alternate route from current position to destination, in a heavy traffic environment. The real-time visual data collected through UAV video cameras are trained using machine learning algorithms to produce statistical profiles that are used continuously as updated inputs to the existing traffic simulation models for improving predictions. The proposed automated system performs exemplary in recognizing emergency vehicles and diverting them to an alternate route for quick transportation in various scenarios.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1387-1400"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908597","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Speed Control and Reduction of Torque Ripple in Switched Reluctance Motors Using Metaheuristic Algorithms Based PID and FOPID Controllers at the Edge 基于边缘PID和FOPID控制器的元启发式算法优化开关磁阻电机的速度控制和转矩脉动减小
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010021
Mostafa Jabari;Amin Rad
This paper demonstrates the application of optimization techniques, namely the Dung Beetle Optimizer (DBO) and the Ant-Lion Optimizer (ALO), to enhance the performance of cascaded Proportional Integral Derivative (PID) and Fractional Order PID (FOPID) controllers at the edge of an industrial network for Switched Reluctance Motor (SRM) speed control and torque ripple reduction. These techniques present notable advantages in terms of faster convergence and reduced computational complexity compared to existing optimization methods. Our research employs PID and FOPID controllers to regulate the speed and torque of the SRM, with a comparative analysis of other optimization approaches. In the domain of SRM control, we highlight the significance of the hysteresis band block in mitigating sudden state transitions, especially crucial for ensuring stable operation in the presence of noisy or slightly variable input signals requiring precise control. The results underscore the superior performance of the proposed optimization strategies, particularly showcasing the DBO-based cascaded PID and FOPID controllers, which exhibit reduced torque and current ripples along with improved speed response. Our investigation encompasses diverse loading conditions and is substantiated through time-domain simulations performed using MATLAB/SIMULINK.
本文演示了优化技术的应用,即蜣螂优化器(DBO)和蚁狮优化器(ALO),以提高级联比例积分导数(PID)和分数阶PID (FOPID)控制器在工业网络边缘的性能,用于开关磁阻电机(SRM)速度控制和转矩脉动减小。与现有的优化方法相比,这些技术在更快的收敛和更低的计算复杂度方面具有显著的优势。我们的研究采用PID和FOPID控制器来调节SRM的速度和转矩,并对其他优化方法进行了比较分析。在SRM控制领域,我们强调了迟滞带块在减轻突然状态转换方面的重要性,特别是在需要精确控制的噪声或微变量输入信号存在时确保稳定运行至关重要。结果强调了所提出的优化策略的优越性能,特别是基于dbo的级联PID和FOPID控制器,它们显示出减少扭矩和电流波动以及提高速度响应。我们的研究涵盖了不同的加载条件,并通过使用MATLAB/SIMULINK进行的时域模拟得到了证实。
{"title":"Optimization of Speed Control and Reduction of Torque Ripple in Switched Reluctance Motors Using Metaheuristic Algorithms Based PID and FOPID Controllers at the Edge","authors":"Mostafa Jabari;Amin Rad","doi":"10.26599/TST.2024.9010021","DOIUrl":"https://doi.org/10.26599/TST.2024.9010021","url":null,"abstract":"This paper demonstrates the application of optimization techniques, namely the Dung Beetle Optimizer (DBO) and the Ant-Lion Optimizer (ALO), to enhance the performance of cascaded Proportional Integral Derivative (PID) and Fractional Order PID (FOPID) controllers at the edge of an industrial network for Switched Reluctance Motor (SRM) speed control and torque ripple reduction. These techniques present notable advantages in terms of faster convergence and reduced computational complexity compared to existing optimization methods. Our research employs PID and FOPID controllers to regulate the speed and torque of the SRM, with a comparative analysis of other optimization approaches. In the domain of SRM control, we highlight the significance of the hysteresis band block in mitigating sudden state transitions, especially crucial for ensuring stable operation in the presence of noisy or slightly variable input signals requiring precise control. The results underscore the superior performance of the proposed optimization strategies, particularly showcasing the DBO-based cascaded PID and FOPID controllers, which exhibit reduced torque and current ripples along with improved speed response. Our investigation encompasses diverse loading conditions and is substantiated through time-domain simulations performed using MATLAB/SIMULINK.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1526-1538"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908595","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash 基于哈希学习的轻量级隐私保护物联网服务推荐
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010064
Haoyang Wan;Yanping Wu;Yihong Yang;Chao Yan;Xiaoxiao Chi;Xuyun Zhang;Shigen Shen
In the Internet of Things (IoT) environment, user-service interaction data are often stored in multiple distributed platforms. In this situation, recommender systems need to integrate the distributed user-service interaction data across different platforms for making a comprehensive recommendation decision, during which user privacy is probably disclosed. Moreover, as user-service interaction records accumulate over time, they significantly reduce the efficiency of recommendations. To tackle these issues, we propose a lightweight and privacy-preserving service recommendation approach named SerRecL2H. In SerRecL2H, we employ Learning to Hash (L2H) to encapsulate sensitive user-service interaction data into less-sensitive user indices, which facilitates identifying users with similar preferences efficiently for accurate recommendations. We then validate the feasibility of our proposed SerRecL2H approach through massive experiments conducted on the popular WS-DREAM dataset. The comparative analysis with other competitive approaches demonstrates that our proposal surpasses other approaches in terms of recommendation accuracy and efficiency while protecting user privacy.
在物联网环境下,用户服务交互数据通常存储在多个分布式平台上。在这种情况下,推荐系统需要整合分布在不同平台上的用户服务交互数据,以做出综合推荐决策,这可能会泄露用户的隐私。此外,随着用户服务交互记录的积累,它们会显著降低推荐的效率。为了解决这些问题,我们提出了一种轻量级且保护隐私的服务推荐方法,名为SerRecL2H。在SerRecL2H中,我们使用学习哈希(L2H)将敏感的用户服务交互数据封装到不太敏感的用户索引中,这有助于有效地识别具有相似偏好的用户,从而提供准确的推荐。然后,我们通过在流行的WS-DREAM数据集上进行的大量实验来验证我们提出的serrec2h方法的可行性。与其他竞争方法的对比分析表明,我们的建议在保护用户隐私的同时,在推荐的准确性和效率方面都优于其他方法。
{"title":"Lightweight and Privacy-Preserving IoT Service Recommendation Based on Learning to Hash","authors":"Haoyang Wan;Yanping Wu;Yihong Yang;Chao Yan;Xiaoxiao Chi;Xuyun Zhang;Shigen Shen","doi":"10.26599/TST.2024.9010064","DOIUrl":"https://doi.org/10.26599/TST.2024.9010064","url":null,"abstract":"In the Internet of Things (IoT) environment, user-service interaction data are often stored in multiple distributed platforms. In this situation, recommender systems need to integrate the distributed user-service interaction data across different platforms for making a comprehensive recommendation decision, during which user privacy is probably disclosed. Moreover, as user-service interaction records accumulate over time, they significantly reduce the efficiency of recommendations. To tackle these issues, we propose a lightweight and privacy-preserving service recommendation approach named SerRec<inf>L2H</inf>. In SerRec<inf>L2H</inf>, we employ Learning to Hash (L2H) to encapsulate sensitive user-service interaction data into less-sensitive user indices, which facilitates identifying users with similar preferences efficiently for accurate recommendations. We then validate the feasibility of our proposed SerRec<inf>L2H</inf> approach through massive experiments conducted on the popular WS-DREAM dataset. The comparative analysis with other competitive approaches demonstrates that our proposal surpasses other approaches in terms of recommendation accuracy and efficiency while protecting user privacy.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1793-1807"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908664","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143535437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock 基于注意机制和DenseBlock的海上自编码器通信系统设计
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2023.9010150
Xiaoling Han;Bin Lin;Shuai Shao;Nan Wu;Haocheng Wang;Liping Qian;Yuan Wu
As the maritime industry continues to thrive and maritime services diversify, the demand for highly reliable maritime communication systems has become increasingly prominent. However, harsh marine conditions pose significant challenges to communication systems. In this work, we propose a Maritime AutoEncoder (MAE) communication system based on Attention Mechanisms (AMs) and DenseBlock (namely AM-Dense-MAE). AM-Dense-MAE utilizes DenseBlock and long short-term memory to extract deep features and capture spatio-temporal relationships, addressing the issue of “long-term dependency”. Furthermore, the decoder incorporates spatial attention modules and convolutional block attention module to enhance the preservation of crucial information and suppress irrelevant data. We employ the Rician fading channel model to simulate maritime communication channels. A substantial volume of data is utilized for model training and parameter optimization. Simulation results demonstrate that, in comparison to the benchmarks, the proposed AM-Dense-MAE exhibits better block error rate performance under various signal-to-noise ratio conditions and showcases generalization capabilities across diverse parameter settings.
随着海运业的不断发展和海事服务的多样化,对高度可靠的海事通信系统的需求日益突出。然而,恶劣的海洋环境对通信系统构成了重大挑战。在这项工作中,我们提出了一个基于注意机制(AMs)和DenseBlock(即AM-Dense-MAE)的海事自动编码器(MAE)通信系统。AM-Dense-MAE利用DenseBlock和长短期记忆来提取深层特征并捕捉时空关系,解决“长期依赖”问题。此外,该解码器还结合了空间注意模块和卷积块注意模块,增强了关键信息的保存和无关数据的抑制。我们采用了衰落信道模型来模拟海上通信信道。大量的数据被用于模型训练和参数优化。仿真结果表明,与基准测试相比,所提出的AM-Dense-MAE在各种信噪比条件下表现出更好的块错误率性能,并展示了不同参数设置下的泛化能力。
{"title":"Design of a Maritime Autoencoder Communication System Based on Attention Mechanisms and DenseBlock","authors":"Xiaoling Han;Bin Lin;Shuai Shao;Nan Wu;Haocheng Wang;Liping Qian;Yuan Wu","doi":"10.26599/TST.2023.9010150","DOIUrl":"https://doi.org/10.26599/TST.2023.9010150","url":null,"abstract":"As the maritime industry continues to thrive and maritime services diversify, the demand for highly reliable maritime communication systems has become increasingly prominent. However, harsh marine conditions pose significant challenges to communication systems. In this work, we propose a Maritime AutoEncoder (MAE) communication system based on Attention Mechanisms (AMs) and DenseBlock (namely AM-Dense-MAE). AM-Dense-MAE utilizes DenseBlock and long short-term memory to extract deep features and capture spatio-temporal relationships, addressing the issue of “long-term dependency”. Furthermore, the decoder incorporates spatial attention modules and convolutional block attention module to enhance the preservation of crucial information and suppress irrelevant data. We employ the Rician fading channel model to simulate maritime communication channels. A substantial volume of data is utilized for model training and parameter optimization. Simulation results demonstrate that, in comparison to the benchmarks, the proposed AM-Dense-MAE exhibits better block error rate performance under various signal-to-noise ratio conditions and showcases generalization capabilities across diverse parameter settings.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1496-1510"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908674","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
EFSP-TE: End-to-End Frame-Semantic Parsing with Table Encoder 端到端帧语义解析与表编码器
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010036
Xuefeng Su;Ru Li;Xiaoli Li;Zhichao Yan
Frame-Semantic Parsing (FSP) aims to extract frame-semantic structures from text. The task usually involves three subtasks sequentially: Target Identification (TI), Frame Identification (Fl), and Frame Semantic Role Labeling (FSRL). The three subtasks are closely related while most previous studies model them individually, encountering error propagation and running efficiency problems. Recently, an end-to-end graph-based model is proposed to jointly process three subtasks in one model. However, it still encounters three problems: insufficient semantic modeling between targets and arguments, span missing, and lacking knowledge incorporation of FrameNet. To address the mentioned problems, this paper presents an End-to-end FSP model with Table Encoder (EFSP-TE), which models FSP as two semantically dependent region classification problems and extracts frame-semantic structures from sentences in a one-step manner. Specifically, EFSP-TE incorporates lexical unit knowledge into context encoder via saliency embedding, and develops an effective table representation learning method based on Biaffine network and multi-layer ResNet-style-CNNs (Convolutional Neural Networks), which can fully exploit word-to-word interactions and capture the information of various levels of semantic relations between targets and arguments. In addition, it adopts two separate region-based modules to obtain potential targets and arguments, followed by two interactive classification modules to predict the frames and roles for the potential targets and arguments. Experiments on two public benchmarks show that the proposed approach achieves state-of-the-art performance in end-to-end setting.
框架语义分析(FSP)旨在从文本中提取框架语义结构。该任务通常包括三个子任务:目标识别(TI)、框架识别(Fl)和框架语义角色标记(FSRL)。这三个子任务密切相关,但以往的研究大多是单独建模,存在误差传播和运行效率问题。最近,提出了一种端到端基于图的模型来联合处理一个模型中的三个子任务。然而,它仍然面临三个问题:目标和参数之间的语义建模不足、跨度缺失和缺乏框架网的知识整合。为了解决上述问题,本文提出了一个端到端基于表编码器(Table Encoder, EFSP-TE)的FSP模型,该模型将FSP建模为两个语义相关的区域分类问题,并以一步的方式从句子中提取框架语义结构。具体而言,EFSP-TE通过显著性嵌入将词汇单元知识整合到上下文编码器中,并基于Biaffine网络和多层resnet风格的cnn(卷积神经网络)开发了一种有效的表表示学习方法,可以充分利用词与词之间的相互作用,捕获目标和论点之间不同层次的语义关系信息。此外,它采用两个独立的基于区域的模块来获取潜在目标和参数,然后采用两个交互的分类模块来预测潜在目标和参数的框架和角色。在两个公共基准上的实验表明,该方法在端到端环境下达到了最先进的性能。
{"title":"EFSP-TE: End-to-End Frame-Semantic Parsing with Table Encoder","authors":"Xuefeng Su;Ru Li;Xiaoli Li;Zhichao Yan","doi":"10.26599/TST.2024.9010036","DOIUrl":"https://doi.org/10.26599/TST.2024.9010036","url":null,"abstract":"Frame-Semantic Parsing (FSP) aims to extract frame-semantic structures from text. The task usually involves three subtasks sequentially: Target Identification (TI), Frame Identification (Fl), and Frame Semantic Role Labeling (FSRL). The three subtasks are closely related while most previous studies model them individually, encountering error propagation and running efficiency problems. Recently, an end-to-end graph-based model is proposed to jointly process three subtasks in one model. However, it still encounters three problems: insufficient semantic modeling between targets and arguments, span missing, and lacking knowledge incorporation of FrameNet. To address the mentioned problems, this paper presents an End-to-end FSP model with Table Encoder (EFSP-TE), which models FSP as two semantically dependent region classification problems and extracts frame-semantic structures from sentences in a one-step manner. Specifically, EFSP-TE incorporates lexical unit knowledge into context encoder via saliency embedding, and develops an effective table representation learning method based on Biaffine network and multi-layer ResNet-style-CNNs (Convolutional Neural Networks), which can fully exploit word-to-word interactions and capture the information of various levels of semantic relations between targets and arguments. In addition, it adopts two separate region-based modules to obtain potential targets and arguments, followed by two interactive classification modules to predict the frames and roles for the potential targets and arguments. Experiments on two public benchmarks show that the proposed approach achieves state-of-the-art performance in end-to-end setting.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1474-1495"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908675","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain Enabled Metaverse: Development and Applications 区块链启用的元宇宙:开发和应用
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010054
Haoling Meng;Jianguo Ding;Hongmei Wang;Zhimin Zhang;Xuanxia Yao;Huansheng Ning
The metaverse has gradually come into the public eye and has become a hotspot in cyberspace, but it still faces many technical difficulties to be solved. Blockchain is a key component of the metaverse, enhancing the development of the metaverse by connecting the real and virtual worlds seamlessly and solving some of the difficulties faced by the metaverse. Our paper comprehensively studies the development and application of blockchain technology in the metaverse. First, there is an introduction to blockchain and the metaverse, followed by a discussion of why blockchain should be integrated into the metaverse. Second, an overview of the main blockchain technologies is provided to evaluate blockchain's role in the metaverse and the value is summarized. Third, the development of future integration of blockchain and metaverse is presented from the perspective of social life and technology. For social life, how to use blockchain in the metaverse to enhance and improve social life is discussed. Then, from the technical perspective, it discusses how blockchain shapes the metaverse. Finally, challenges associated with the integration of blockchain into metaverses are analyzed and some promising research directions and solutions are proposed.
元宇宙逐渐进入公众视野,成为网络空间的热点,但仍面临许多技术难题需要解决。区块链是虚拟世界的关键组件,通过无缝连接真实世界和虚拟世界来促进虚拟世界的发展,并解决虚拟世界面临的一些困难。本文全面研究了区块链技术在元宇宙中的发展与应用。首先,介绍区块链和虚拟世界,然后讨论为什么区块链应该集成到虚拟世界中。其次,概述了区块链的主要技术,以评估区块链在元宇宙中的作用,并总结了区块链的价值。第三,从社会生活和技术的角度提出区块链与虚拟世界未来融合的发展方向。在社交生活方面,讨论了如何在元空间中使用区块链来增强和改善社交生活。然后,从技术角度讨论区块链如何塑造虚拟世界。最后,分析了区块链集成到元数据中所面临的挑战,并提出了一些有前景的研究方向和解决方案。
{"title":"Blockchain Enabled Metaverse: Development and Applications","authors":"Haoling Meng;Jianguo Ding;Hongmei Wang;Zhimin Zhang;Xuanxia Yao;Huansheng Ning","doi":"10.26599/TST.2024.9010054","DOIUrl":"https://doi.org/10.26599/TST.2024.9010054","url":null,"abstract":"The metaverse has gradually come into the public eye and has become a hotspot in cyberspace, but it still faces many technical difficulties to be solved. Blockchain is a key component of the metaverse, enhancing the development of the metaverse by connecting the real and virtual worlds seamlessly and solving some of the difficulties faced by the metaverse. Our paper comprehensively studies the development and application of blockchain technology in the metaverse. First, there is an introduction to blockchain and the metaverse, followed by a discussion of why blockchain should be integrated into the metaverse. Second, an overview of the main blockchain technologies is provided to evaluate blockchain's role in the metaverse and the value is summarized. Third, the development of future integration of blockchain and metaverse is presented from the perspective of social life and technology. For social life, how to use blockchain in the metaverse to enhance and improve social life is discussed. Then, from the technical perspective, it discusses how blockchain shapes the metaverse. Finally, challenges associated with the integration of blockchain into metaverses are analyzed and some promising research directions and solutions are proposed.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1552-1582"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908672","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HEDMGame: Fragmentation-Aware Mitigation of Heterogeneous Edge DoS Attacks 异构边缘DoS攻击的碎片感知缓解
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010061
Jie Pan;Qiang He;Guangming Cui;Yiwen Zhang;Yun Yang
Mobile Edge Computing (MEC) is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users. However, resource-constrained edge servers fall victim to Denial-of-Service (DoS) attacks easily. Failures to mitigate DoS attacks effectively hinder the delivery of reliable and sustainable edge services. Conventional DoS mitigation solutions in cloud computing environments are not directly applicable in MEC environments because their design did not factor in the unique characteristics of MEC environments, e.g., constrained resources on edge servers and requirements for low service latency. Existing solutions mitigate edge DoS attacks by transferring user requests from edge servers under attacks to others for processing. Furthermore, the heterogeneity in end-users' resource demands can cause resource fragmentation on edge servers and undermine the ability of these solutions to mitigate DoS attacks effectively. User requests often have to be transferred far away for processing, which increases the service latency. To tackle this challenge, this paper presents a fragmentation-aware gaming approach called HEDMGame that attempts to minimize service latency by matching user requests to edge servers' remaining resources while making request-transferring decisions. Through theoretical analysis and experimental evaluation, we validate the effectiveness and efficiency of HEDMGame, and demonstrate its superiority over the state-of-the-art solution.
移动边缘计算(MEC)是一项关键技术,它通过在最终用户附近部署计算和存储资源来提供敏捷响应服务。然而,资源受限的边缘服务器很容易成为拒绝服务(DoS)攻击的受害者。未能有效减轻DoS攻击会阻碍可靠和可持续的边缘服务的交付。云计算环境中的传统DoS缓解解决方案并不直接适用于MEC环境,因为它们的设计没有考虑到MEC环境的独特特征,例如边缘服务器上的资源受限以及对低服务延迟的要求。现有的解决方案通过将用户请求从遭受攻击的边缘服务器转移到其他服务器进行处理来缓解边缘DoS攻击。此外,终端用户资源需求的异质性可能导致边缘服务器上的资源碎片化,并削弱这些解决方案有效减轻DoS攻击的能力。用户请求通常必须传输到很远的地方进行处理,这增加了服务延迟。为了应对这一挑战,本文提出了一种名为HEDMGame的碎片感知游戏方法,该方法在做出请求传输决策时,试图通过将用户请求与边缘服务器的剩余资源相匹配来最小化服务延迟。通过理论分析和实验评估,我们验证了HEDMGame的有效性和效率,并证明了其优于当前最先进的解决方案。
{"title":"HEDMGame: Fragmentation-Aware Mitigation of Heterogeneous Edge DoS Attacks","authors":"Jie Pan;Qiang He;Guangming Cui;Yiwen Zhang;Yun Yang","doi":"10.26599/TST.2024.9010061","DOIUrl":"https://doi.org/10.26599/TST.2024.9010061","url":null,"abstract":"Mobile Edge Computing (MEC) is a pivotal technology that provides agile-response services by deploying computation and storage resources in proximity to end-users. However, resource-constrained edge servers fall victim to Denial-of-Service (DoS) attacks easily. Failures to mitigate DoS attacks effectively hinder the delivery of reliable and sustainable edge services. Conventional DoS mitigation solutions in cloud computing environments are not directly applicable in MEC environments because their design did not factor in the unique characteristics of MEC environments, e.g., constrained resources on edge servers and requirements for low service latency. Existing solutions mitigate edge DoS attacks by transferring user requests from edge servers under attacks to others for processing. Furthermore, the heterogeneity in end-users' resource demands can cause resource fragmentation on edge servers and undermine the ability of these solutions to mitigate DoS attacks effectively. User requests often have to be transferred far away for processing, which increases the service latency. To tackle this challenge, this paper presents a fragmentation-aware gaming approach called HEDMGame that attempts to minimize service latency by matching user requests to edge servers' remaining resources while making request-transferring decisions. Through theoretical analysis and experimental evaluation, we validate the effectiveness and efficiency of HEDMGame, and demonstrate its superiority over the state-of-the-art solution.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1724-1743"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908668","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing 基于角色识别的社会边缘计算网络欺凌分析方法
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010066
Runyu Wang;Tun Lu;Peng Zhang;Ning Gu
Over the past few years, many efforts have been dedicated to studying cyberbullying in social edge computing devices, and most of them focus on three roles: victims, perpetrators, and bystanders. If we want to obtain a deep insight into the formation, evolution, and intervention of cyberbullying in devices at the edge of the Internet, it is necessary to explore more fine-grained roles. This paper presents a multi-level method for role feature modeling and proposes a differential evolution-assisted K-means (DEK) method to identify diverse roles. Our work aims to provide a role identification scheme for cyberbullying scenarios for social edge computing environments to alleviate the general safety issues that cyberbullying brings. The experiments on ten real-world datasets obtained from Weibo and five public datasets show that the proposed DEK outperforms the existing approaches on the method level. After clustering, we obtain nine roles and analyze the characteristics of each role and their evolution trends under different cyberbullying scenarios. Our work in this paper can be placed in devices at the edge of the Internet, leading to better real-time identification performance and adapting to the broad geographic location and high mobility of mobile devices.
在过去的几年里,人们致力于研究社交边缘计算设备中的网络欺凌,其中大多数集中在三个角色上:受害者、肇事者和旁观者。如果我们想要深入了解网络边缘设备中网络欺凌的形成、演变和干预,有必要探索更细粒度的角色。本文提出了一种多层次的角色特征建模方法,并提出了一种差分进化辅助K-means (DEK)方法来识别不同的角色。我们的工作旨在为社会边缘计算环境下的网络欺凌场景提供角色识别方案,以缓解网络欺凌带来的一般安全问题。在微博上的10个真实数据集和5个公开数据集上的实验表明,本文提出的DEK方法在方法层面上优于现有方法。聚类后,我们得到了9个角色,并分析了每个角色在不同网络欺凌场景下的特征及其演变趋势。我们在本文中的工作可以放置在互联网边缘的设备中,从而获得更好的实时识别性能,并适应移动设备的广泛地理位置和高移动性。
{"title":"Role Identification Based Method for Cyberbullying Analysis in Social Edge Computing","authors":"Runyu Wang;Tun Lu;Peng Zhang;Ning Gu","doi":"10.26599/TST.2024.9010066","DOIUrl":"https://doi.org/10.26599/TST.2024.9010066","url":null,"abstract":"Over the past few years, many efforts have been dedicated to studying cyberbullying in social edge computing devices, and most of them focus on three roles: victims, perpetrators, and bystanders. If we want to obtain a deep insight into the formation, evolution, and intervention of cyberbullying in devices at the edge of the Internet, it is necessary to explore more fine-grained roles. This paper presents a multi-level method for role feature modeling and proposes a differential evolution-assisted K-means (DEK) method to identify diverse roles. Our work aims to provide a role identification scheme for cyberbullying scenarios for social edge computing environments to alleviate the general safety issues that cyberbullying brings. The experiments on ten real-world datasets obtained from Weibo and five public datasets show that the proposed DEK outperforms the existing approaches on the method level. After clustering, we obtain nine roles and analyze the characteristics of each role and their evolution trends under different cyberbullying scenarios. Our work in this paper can be placed in devices at the edge of the Internet, leading to better real-time identification performance and adapting to the broad geographic location and high mobility of mobile devices.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1659-1684"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908657","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks 无人机- irs辅助海上边缘计算网络的资源管理和轨迹优化
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010074
Chaoyue Zhang;Bin Lin;Xu Hu;Shuang Qi;Liping Qian;Yuan Wu
With the exponential growth of maritime wireless devices and the rapid development of maritime applications, traditional maritime communication networks encounter communication and computation limitations in supporting computation-intensive and latency-critical tasks. Edge computing and Intelligent Reflecting Surface (IRS) have emerged as promising techniques to improve communication and computation services for maritime devices with limited computation capabilities and battery capacity. This paper studies an IRS Mounted on Unmanned Aerial Vehicle (UIRS) assisted maritime edge computing network, in which the UIRS is deployed to assist the transmission from Unmanned Surface Vehicles (USVs) to the edge server via Non-Orthogonal Multiple Access (NOMA) protocol. We propose a resource management and trajectory optimization scheme by jointly optimizing subslot duration, offloading ratios, transmit power, edge computation capability allocation, UIRS phase shifts and UIRS trajectory, aiming at minimizing the overall energy consumption. Since the non-convex nature of the optimization problem, we propose a two-layered method by decomposing the original problem into two subproblems. The top-layered subproblem is solved by the Semi-Definite Relaxation (SDR) method and the underlying-layered subproblem is solved by the Deep Deterministic Policy Gradient (DDPG) algorithm. Numerical results demonstrate that our proposed scheme can effectively and efficiently reduce overall energy consumption.
随着海事无线设备的指数级增长和海事应用的快速发展,传统的海事通信网络在支持计算密集型和延迟关键型任务时遇到了通信和计算的限制。边缘计算和智能反射表面(IRS)已经成为有前途的技术,可以改善计算能力和电池容量有限的海事设备的通信和计算服务。研究了一种机载IRS辅助海上边缘计算网络,该网络通过非正交多址(NOMA)协议,协助无人水面飞行器(usv)向边缘服务器传输数据。我们提出了一种资源管理和轨迹优化方案,通过联合优化子槽时长、卸载比、发射功率、边缘计算能力分配、UIRS相移和UIRS轨迹,以最小化总体能耗。由于优化问题的非凸性,我们提出了一种将原问题分解为两个子问题的两层方法。顶层子问题采用半确定松弛(SDR)方法求解,底层子问题采用深度确定性策略梯度(DDPG)算法求解。数值结果表明,该方案能够有效地降低整体能耗。
{"title":"Resource Management and Trajectory Optimization for UAV-IRS Assisted Maritime Edge Computing Networks","authors":"Chaoyue Zhang;Bin Lin;Xu Hu;Shuang Qi;Liping Qian;Yuan Wu","doi":"10.26599/TST.2024.9010074","DOIUrl":"https://doi.org/10.26599/TST.2024.9010074","url":null,"abstract":"With the exponential growth of maritime wireless devices and the rapid development of maritime applications, traditional maritime communication networks encounter communication and computation limitations in supporting computation-intensive and latency-critical tasks. Edge computing and Intelligent Reflecting Surface (IRS) have emerged as promising techniques to improve communication and computation services for maritime devices with limited computation capabilities and battery capacity. This paper studies an IRS Mounted on Unmanned Aerial Vehicle (UIRS) assisted maritime edge computing network, in which the UIRS is deployed to assist the transmission from Unmanned Surface Vehicles (USVs) to the edge server via Non-Orthogonal Multiple Access (NOMA) protocol. We propose a resource management and trajectory optimization scheme by jointly optimizing subslot duration, offloading ratios, transmit power, edge computation capability allocation, UIRS phase shifts and UIRS trajectory, aiming at minimizing the overall energy consumption. Since the non-convex nature of the optimization problem, we propose a two-layered method by decomposing the original problem into two subproblems. The top-layered subproblem is solved by the Semi-Definite Relaxation (SDR) method and the underlying-layered subproblem is solved by the Deep Deterministic Policy Gradient (DDPG) algorithm. Numerical results demonstrate that our proposed scheme can effectively and efficiently reduce overall energy consumption.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1600-1616"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908662","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hyperbolic Graph Wavelet Neural Network 双曲图小波神经网络
IF 6.6 1区 计算机科学 Q1 Multidisciplinary Pub Date : 2025-03-03 DOI: 10.26599/TST.2024.9010032
Wenjie Zheng;Guofeng Zhang;Xiaoran Zhao;Zhikang Feng;Lekang Song;Huaizhen Kou
Graph neural networks (GNNs), grounded in spatial or spectral domains, have achieved remarkable success in learning graph representations in Euclidean space. Recent advances in spatial GNNs reveal that embedding graph nodes with hierarchical structures into hyperbolic space is more effective, reducing distortion compared to Euclidean embeddings. However, extending spectral GNNs to hyperbolic space remains several challenges, particularly in defining spectral graph convolution and enabling message passing within the hyperbolic geometry. To address these challenges, we propose the hyperbolic graph wavelet neural network (HGWNN), a novel approach for modeling spectral GNNs in hyperbolic space. Specifically, we first define feature transformation and spectral graph wavelet convolution on the hyperboloid manifold using exponential and logarithmic mappings, without increasing model parameter complexity. Moreover, we enable non-linear activation on the Poincaré manifold and efficient message passing via diffeomorphic transformations between the hyperboloid and Poincaré models. Experiments on four benchmark datasets demonstrate the effectiveness of our proposed HGWNN over baseline systems.
基于空间域或谱域的图神经网络(gnn)在学习欧几里得空间中的图表示方面取得了显著的成功。空间gnn的最新进展表明,与欧几里得嵌入相比,将具有层次结构的图节点嵌入双曲空间更有效,减少了失真。然而,将谱gnn扩展到双曲空间仍然存在一些挑战,特别是在定义谱图卷积和在双曲几何中实现信息传递方面。为了解决这些挑战,我们提出了双曲图小波神经网络(HGWNN),这是一种在双曲空间中建模谱gnn的新方法。具体来说,我们首先在不增加模型参数复杂度的情况下,使用指数和对数映射在双曲面流形上定义特征变换和谱图小波卷积。此外,我们实现了在庞卡罗莱流形上的非线性激活,并通过双曲面模型和庞卡罗莱模型之间的微分同构变换实现了有效的消息传递。在四个基准数据集上的实验证明了我们所提出的HGWNN优于基线系统的有效性。
{"title":"Hyperbolic Graph Wavelet Neural Network","authors":"Wenjie Zheng;Guofeng Zhang;Xiaoran Zhao;Zhikang Feng;Lekang Song;Huaizhen Kou","doi":"10.26599/TST.2024.9010032","DOIUrl":"https://doi.org/10.26599/TST.2024.9010032","url":null,"abstract":"Graph neural networks (GNNs), grounded in spatial or spectral domains, have achieved remarkable success in learning graph representations in Euclidean space. Recent advances in spatial GNNs reveal that embedding graph nodes with hierarchical structures into hyperbolic space is more effective, reducing distortion compared to Euclidean embeddings. However, extending spectral GNNs to hyperbolic space remains several challenges, particularly in defining spectral graph convolution and enabling message passing within the hyperbolic geometry. To address these challenges, we propose the hyperbolic graph wavelet neural network (HGWNN), a novel approach for modeling spectral GNNs in hyperbolic space. Specifically, we first define feature transformation and spectral graph wavelet convolution on the hyperboloid manifold using exponential and logarithmic mappings, without increasing model parameter complexity. Moreover, we enable non-linear activation on the Poincaré manifold and efficient message passing via diffeomorphic transformations between the hyperboloid and Poincaré models. Experiments on four benchmark datasets demonstrate the effectiveness of our proposed HGWNN over baseline systems.","PeriodicalId":48690,"journal":{"name":"Tsinghua Science and Technology","volume":"30 4","pages":"1511-1525"},"PeriodicalIF":6.6,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10908594","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143553338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Tsinghua Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1