首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 21 毫秒
1.
吴联仁  李瑾颉  齐佳音 《物理学报》2019,68(7):78901-078901
Web 2.0时代,建模和预测在线信息流行度是信息传播中的重要问题.本文基于社交网络系统信息传播的机制,通过假设和简化,提出了分支过程的概率模型,来描述在线社交网络信息的流行度动力学过程.对典型在线社交网络系统的信息流行度数据和网络结构数据进行了分析,统计结果表明信息流行度衰减遵循幂律分布(幂指数为1.8),微博网络的入度和出度分布也均服从幂律分布(幂指数为1.5).模型仿真结果发现,该模型能够再现真实社交网络数据的若干特征,且信息流行度与网络结构相关.对模型方程进行求解得到理论预测的结果与仿真分析和实际数据结果相符合.  相似文献   

2.
Predicting and modeling of items popularity on web 2.0 have attracted great attention of many scholars. From the perspective of information competition, we propose a probabilistic model using the branching process to characterize the process in which micro-blogging gains its popularity. The model is analytically tractable and can reproduce several characteristics of empirical micro-blogging data on Sina micro-blog, the most popular microblogging system in China. We find that the information competition on micro-blog network leads to the decay of information popularity obeying power law distribution with exponent about 1.5, and the value is similar to the exponent of degree distribution of micro-blog network. Furthermore, the mean popularity is decided by the probability of innovating a new message. Our work presents evidence supporting the idea that two distinct factors affect information popularity: information competition and social network structure.  相似文献   

3.
目前Android系统是当今网络用户最对的应用系统之一,而随着科学技术的发展,对于Android系统的恶意行为软件也逐渐增多,给当前的应用用户的财产以及私人信息安全带来了很大的威胁,严重的迟缓了当前移动通信网络技术以及相关于应用客户端的推广。为此本文根据Android系统的特有机构设计出一种基于Binder信息流的自动检测恶意行为系统,以此来解决对于当前网络安全对于Android系统用户带来的负面影响。根据目前网络中的应用通信信息,检测可能存在的泄露用户信息的应用软件为目标,建立信息矢量图以此来分析当前网络中的恶意行为。通过对软件进行检测,研究可实用性和检测效果,结果显示其识别率可以达到100%,并且软件运行只占有内存的7%,结果可以达到当前的Android用户的使用范围。  相似文献   

4.
In this paper, the optimization of network performance to support the deployment of federated learning (FL) is investigated. In particular, in the considered model, each user owns a machine learning (ML) model by training through its own dataset, and then transmits its ML parameters to a base station (BS) which aggregates the ML parameters to obtain a global ML model and transmits it to each user. Due to limited radio frequency (RF) resources, the number of users that participate in FL is restricted. Meanwhile, each user uploading and downloading the FL parameters may increase communication costs thus reducing the number of participating users. To this end, we propose to introduce visible light communication (VLC) as a supplement to RF and use compression methods to reduce the resources needed to transmit FL parameters over wireless links so as to further improve the communication efficiency and simultaneously optimize wireless network through user selection and resource allocation. This user selection and bandwidth allocation problem is formulated as an optimization problem whose goal is to minimize the training loss of FL. We first use a model compression method to reduce the size of FL model parameters that are transmitted over wireless links. Then, the optimization problem is separated into two subproblems. The first subproblem is a user selection problem with a given bandwidth allocation, which is solved by a traversal algorithm. The second subproblem is a bandwidth allocation problem with a given user selection, which is solved by a numerical method. The ultimate user selection and bandwidth allocation are obtained by iteratively compressing the model and solving these two subproblems. Simulation results show that the proposed FL algorithm can improve the accuracy of object recognition by up to 16.7% and improve the number of selected users by up to 68.7%, compared to a conventional FL algorithm using only RF.  相似文献   

5.
王琦  杨雪梅  徐家品 《应用声学》2016,24(12):54-54
D-S证据理论频谱感知算法中,针对当协作用户数增加时所引起的报告数据量迅速增大、带宽开销增加问题,将本地测量统计量中不确定度分配到确定信息中,减少了向融合中心发送的数据量,有效降低了带宽开销。其次,针对高冲突数据对D-S证据理论融合结果影响大的问题,通过评估每个证据的可信度,将可信度作为权重来计算加权平均证据,降低了高冲突证据对融合结果的影响。仿真结果表明,所提方法在有效降低了报告带宽开销的同时,能够减少高冲突证据对融合结果的影响。  相似文献   

6.
Small-scale fading is one of the main problems in wireless communication systems. Multiple transmit/receive antennas, providing spatial diversity, are a common solution to combat fading, but practical constraints at the user location may limit their use. User cooperation is an efficient technique to introduce spatial diversity when multiple antennas are not suitable. In this paper we study the physical-layer performance of a cooperative system based on distributed linear block coding. Analytical results in terms of bit error rate and outage probability are presented when perfect decoding at the user location is assumed. Simulation results in terms of bit error rate are shown, taking into account the impact of errors on decoding and channel estimation at both the user location and the receiver location. Two scenarios are considered, representing uplink communications from static users to a static or mobile base station.  相似文献   

7.
朱江  王雁  杨甜 《物理学报》2018,67(5):50201-050201
宽带无线通信用户大多处在复杂的环境中,其时变多径传播和开放特性将严重影响通信系统的性能.针对物理层安全研究中的窃听信道问题,提出了一种适用于宽带无线多径信道的联合时间反演技术和发端人工噪声的物理层安全传输机制.首先,在一个典型窃听信道模型中采用时间反演技术,利用其时空聚焦性来提高信息在传输过程中的安全性;其次,由于时间反演的时空聚焦性,信息在聚焦点附近容易被窃听,通过在发送端加入人工噪声来扰乱窃听用户对保密信息的窃听,由于合法用户采用零空间人工噪声法,人工噪声对合法用户没有影响.理论分析和仿真结果表明,与已有物理层安全机制相比,所提机制可以有效地提高系统的保密信干噪比和可达保密速率,降低合法用户的误比特率,系统的保密性能得到提升.  相似文献   

8.
Cognitive radio (CR) technology seems to be a promising candidate for solving the radio frequency (RF) spectrum occupancy problem. CRs strive to utilize the white holes in the RF spectrum in an opportunistic manner. Because interference is an inherent and a very critical design parameter for all sorts of wireless communication systems, many of the recently emerging wireless technologies prefer smaller size coverage with reduced transmit power in order to decrease interference. Prominent examples of short-range communication systems trying to achieve low interference power levels are CR relays in CR networks and femtocells in next generation wireless networks (NGWNs). It is clear that a comprehensive interference model including mobility is essential especially in elaborating the performance of such short-range communication scenarios. Therefore, in this study, a physical layer interference model in a mobile radio communication environment is investigated by taking into account all of the basic propagation mechanisms such as large- and small-scale fading under a generic single primary user (PU) and single secondary user (SU) scenario. Both one-dimensional (1D) and two-dimensional (2D) random walk models are incorporated into the physical layer signal model. The analysis and corresponding numerical results are given along with the relevant discussions.  相似文献   

9.
In this paper, we investigate the physical-layer security of a secure communication in single-input multiple-output (SIMO) cognitive radio networks (CRNs) in the presence of two eavesdroppers. In particular, both primary user (PU) and secondary user (SU) share the same spectrum, but they face with different eavesdroppers who are equipped with multiple antennas. In order to protect the PU communication from the interference of the SU and the risks of eavesdropping, the SU must have a reasonable adaptive transmission power which is set on the basis of channel state information, interference and security constraints of the PU. Accordingly, an upper bound and lower bound for the SU transmission power are derived. Furthermore, a power allocation policy, which is calculated on the convex combination of the upper and lower bound of the SU transmission power, is proposed. On this basis, we investigate the impact of the PU transmission power and channel mean gains on the security and system performance of the SU. Closed-form expressions for the outage probability, probability of non-zero secrecy capacity, and secrecy outage probability are obtained. Interestingly, our results show that the strong channel mean gain of the PU transmitter to the PU’s eavesdropper in the primary network can enhance the SU performance.  相似文献   

10.
Bipartite network based recommendations have attracted extensive attentions in recent years. Differing from traditional object-oriented recommendations, the recommendation in a Microblog network has two crucial differences. One is high authority users or one’s special friends usually play a very active role in tweet-oriented recommendation. The other is that the object in a Microblog network corresponds to a set of tweets on same topic instead of an actual and single entity, e.g. goods or movies in traditional networks. Thus repeat recommendations of the tweets in one’s collected topics are indispensable. Therefore, this paper improves network based inference (NBI) algorithm by original link matrix and link weight on resource allocation processes. This paper finally proposes the Microblog recommendation model based on the factors of improved network based inference and user influence model. Adjusting the weights of these two factors could generate the best recommendation results in algorithm accuracy and recommendation personalization.  相似文献   

11.
Cooperative Non-Orthogonal Multiple Access (NOMA) with Simultaneous Wireless Information and Power Transfer (SWIPT) communication can not only effectively improve the spectrum efficiency and energy efficiency of wireless networks but also extend their coverage. An important design issue is to incentivize a full duplex (FD) relaying center user to participate in the cooperative process and achieve a win–win situation for both the base station (BS) and the center user. Some private information of the center users are hidden from the BS in the network. A contract theory-based incentive mechanism under this asymmetric information scenario is applied to incentivize the center user to join the cooperative communication to maximize the BS’s benefit utility and to guarantee the center user’s expected payoff. In this work, we propose a matching theory-based Gale–Shapley algorithm to obtain the optimal strategy with low computation complexity in the multi-user pairing scenario. Simulation results indicate that the network performance of the proposed FD cooperative NOMA and SWIPT communication is much better than the conventional NOMA communication, and the benefit utility of the BS with the stable match strategy is nearly close to the multi-user pairing scenario with complete channel state information (CSI), while the center users get the satisfied expected payoffs.  相似文献   

12.
We propose a novel handover scheme for indoor microcellular visible light communication (VLC) network. With such a scheme, the room, which is fully coverage by light, is divided into several microcells according to the layout of light-emitting diodes (LEDs). However, the directionality of light arises new challenges in keeping the connectivity between the mobile devices and light source under the mobile circumstances. The simplest solution is that all LEDs broadcast data of every user simultaneously, but it wastes too much bandwidth resource, especially when the amount of users increases. To solve this key problem, we utilize the optical positioning assisting handover procedure in this paper. In the positioning stage, the network manager obtains the location information of user device via downlink and uplink signal strength information, which is white light and infrared, respectively. After that, a Kalman filter is utilized for improving the tracking performance of a mobile device. Then, the network manager decides how to initiate the handover process by the previous information. Results show that the proposed scheme can achieve low-cost, seamless data communication, and a high probability of successful handover.  相似文献   

13.
The boom in social media with regard to producing and consuming information simultaneously implies the crucial role of online user influence in determining content popularity. In particular, understanding behavior variations between the influential elites and the mass grassroots is an important issue in communication. However, how their behavior varies across user categories and content domains and how these differences influence content popularity are rarely addressed. From a novel view of seven content domains, a detailed picture of the behavior variations among five user groups, from the views of both the elites and mass, is drawn on Weibo, one of the most popular Twitter-like services in China. Interestingly, elites post more diverse content with video links, while the mass possess retweeters of higher loyalty. According to these variations, user-oriented actions for enhancing content popularity are discussed and testified. The most surprising finding is that the diverse content does not always bring more retweets, and the mass and elites should promote content popularity by increasing their retweeter counts and loyalty, respectively. For the first time, our results demonstrate the possibility of highly individualized strategies of popularity promotions in social media, instead of a universal principle.  相似文献   

14.
This paper applies dolphin whistles to covert underwater acoustic (UWA) communication and proposes a UWA communication scheme based on M-ary bionic signal coding. At the transmitter end, the scheme maps multiple information bits into a dolphin whistle through a signal selector. At the receiver end, passive time reversal mirror (PTRM) is used for channel equalization and source information is restored according to the decision of which whistle is transmitted. The scheme has high spread spectrum gain. The anti multi-path performance is greatly improved when using PTRM. Different from traditional covert UWA communication methods, this mimicked signal is unlikely to alert an adversary even in high SNRs because of its real existence in marine environment. A tank experiment is conducted for the scheme, at communication rate of 50 bit/s with SNR −5 dB user information is recovered at a very low bit error rate. The results of tank experiment demonstrate the feasibility of this covert UWA communication scheme.  相似文献   

15.
In the method of tapering the cross section of the interaction structure for broadbanding a gyro-TWT, the different portions of the interaction length of the tapered-cross-section waveguide become effective for different frequency ranges if the magnetic field and beam parameters are profiled to maintain the condition of electron cyclotron resonance throughout the interaction length. In the present paper, the study of profiling the magnetic field and beam parameters in steps of the stepped analytical model of a double-tapered disc-loaded circular waveguide was made throughout the steps of the model. In the observed profile, the magnetic flux density in a typical step relative to its value in first-step decreases from first-step (gun-end) to end-step (collector-end) of the model considering the up-tapering schemes, in which structure parameters increase from gun-end to collector-end. Also, the transverse beam velocity in a typical step relative to its value in first-step decreases from gun-end to collector-end. However, the Larmor radius in a typical step relative to its value in first-step as well as the hollow-beam radius in a typical step relative to its value in first-step, both increase from gun-end to collector-end in the model considering the up-tapering schemes.  相似文献   

16.
Signal space diversity is a powerful technique that increases reliability of detection over fading channels. In this paper, we explore the ability of this technique to provide secure communication. We enhance the security of OFDM systems in frequency selective fading channels by providing more diversity gain to the legitimate user compared to an eavesdropper. This is done by adapting the interleaving pattern to the channel of the legitimate user in rich multipath environments, where spatially separated channels are typically independent to each other. This ensures secrecy in a time division duplex system, where the eavesdropper has no information regarding the channel of the legitimate user. The scheme can also be used in the conventional frequency division duplex system, which is more challenging in terms of security aspects because of the channel state information leakage. A theoretical analysis is presented on the bit-error probability in Rayleigh fading environment. The numerical results support the conclusion that adapting the interleaving pattern to the CSI of the legitimate user provides a gain in the bit-error rate performance over the eavesdropper.  相似文献   

17.
18.
We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the database provider without revealing which item he or she retrieved: if the provider tries to obtain information on the query, the person querying the database can find it out. The protocol ensures also perfect data privacy of the database: the information that the user can retrieve in a single query is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction in communication complexity and in running-time computational complexity.  相似文献   

19.
华雪东  王炜  王昊 《物理学报》2016,65(1):10502-010502
基于Newell跟驰模型,建立考虑车与车互联(vehicle-to-vehicle,V2V)通讯技术的单车道跟驰模型.根据V2V技术的特征,引入参数α以表征驾驶员在收到V2V技术所提供的实时交通信息后的提前反应程度.根据线性稳定分析方法,得到V2V跟驰模型的中性稳定条件.通过计算机的模拟,研究V2V技术对交通流运行的影响,分析小扰动下V2V跟驰模型对参数变化的敏感性,研究不同α取值下交通流密度波及迟滞回环的变化.研究发现:1)与全速度差跟驰模型相比,在引入V2V后,交通流在加速起步、减速刹车及遇到突发事件时,车辆运行的安全性和舒适性均得到不同程度的提升;2)V2V跟驰模型对参数α及T的变化较为敏感,且在交通流较为拥堵时,V2V技术的引入可以提升交通流的平均速度;3)参数α的增大、T的减小可以有效提升V2V跟驰模型在不同交通环境下的运行稳定性.由于可以实时地获取交通流运行的状态并针对性地改变车辆自身的运行,V2V交通流跟驰模型提升了交通流运行的稳定性.  相似文献   

20.
In order to analyze and simulate the impact collapse or seismic response of the reinforced concrete(RC)structures,a combined fiber beam model is proposed by dividing the cross section of RC beam into concrete fiber and steel fiber.The stress-strain relationship of concrete fiber is based on a model proposed by concrete codes for concrete structures.The stress-strain behavior of steel fiber is based on a model suggested by others.These constitutive models are implemented into a general finite element program ABAQUS through the user defined subroutines to provide effective computational tools for the inelastic analysis of RC frame structures.The fiber model proposed in this paper is validated by comparing with experiment data of the RC column under cyclical lateral loading.The damage evolution of a three-dimension frame subjected to impact loading is also investigated.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号