Current Issue : October-December Volume : 2021 Issue Number : 4 Articles : 5 Articles
This paper implements a deep learning-based modulation pattern recognition algorithm for communication signals using a convolutional neural network architecture as a modulation recognizer. In this paper, a multiple-parallel complex convolutional neural network architecture is proposed to meet the demand of complex baseband processing of all-digital communication signals. The architecture learns the structured features of the real and imaginary parts of the baseband signal through parallel branches and fuses them at the output according to certain rules to obtain the final output, which realizes the fitting process to the complex numerical mapping. By comparing and analyzing several commonly used time-frequency analysis methods, a timefrequency analysis method that can well highlight the differences between different signal modulation patterns is selected to convert the time-frequency map into a digital image that can be processed by a deep network. In order to fully extract the spatial and temporal characteristics of the signal, the CLP algorithm of the CNN network and LSTM network in parallel is proposed. The CNN network and LSTM network are used to extract the spatial features and temporal features of the signal, respectively, and the fusion of the two features as well as the classification is performed. Finally, the optimal model and parameters are obtained through the design of the modulation recognizer based on the convolutional neural network and the performance analysis of the convolutional neural network model. The simulation experimental results show that the improved convolutional neural network can produce certain performance gains in radio signal modulation style recognition. This promotes the application of machine learning algorithms in the field of radio signal modulation pattern recognition....
Cloud computing uses virtualization technology to provide users with different types of resources in the form of services. The third party plays a crucial role in coordinating cloud market between cloud providers and users. As for providing services or trading, the extra broker fees are required for the middleman because the third party facilitates transactions. Moreover, there is no guarantee that the third party is trusted, which can lead to information leakage, data tampering, and unfair trading. Blockchain technology is an emerging technology that can store and communicate data between entities that unnecessarily trust each other. To resolve the problems, this paper presents the blockchain-based trust and fair system and develops the smart contract of auction and transaction. The prototype system is implemented based on the Hyperledger Fabric. The experimental results prove the feasibility of the scheme....
In recent years, the application of wireless sensor networks (WSN) in power systems has received a great deal of attention. As we all know, the most important issue for the power system is security and stability, especially due to the massive outages caused by cascading trips. Therefore, in today’s era, from the perspective of cascading trips, how to effectively use WSN to analyze and evaluate the security level of the power grid is an important direction for future power development. In this paper, an algorithm based on the WSN collection of online data to calculate the corresponding security level of the system is proposed for the cascading trip phenomenon, to achieve the online evaluation of the cascading trips. First, this paper proposes a hybrid layered network structure based on WSN for monitoring system and details the acquisition of power grid parameters by its acquisition layer. Secondly, combined with the manifestation of cascading trips and the action equation of current-type line backup protection, the mathematical representation of the grid cascading trips is given, and the mathematical form corresponding to the critical situation is strictly proved, and an index for evaluating the security level of the power grid is proposed and then further combined with the actual physical constraints of the power grid and the establishment of a mathematical model for calculating the security level of the grid cascading trips. For this model, this paper relies on evolution particle swarm optimization (EPSO) to give specific ideas for solving the model. Finally, a case analysis is performed by the IEEE39 node system and the results of the case show the effectiveness of the model and method....
Machine-to-machine communication (M2M) has obtained increasing interest in recent years. However, its enhancement and broadcasting characteristics produced a new security challenge. We have suggested a novel dynamic Quadrature Amplitude Modulation (QAM) scheme for a totally elastic and dynamic mapping of user data by using chaos. This paper analyses physical layer security methods in Orthogonal Frequency Division Multiplexing-based Nonorthogonal Multiple Access (OFDM-NOMA) and introduces a secure data transmission mechanism created by dynamic QAM. The security robustness given by the suggested encryption scheme is assessed, where an overall keyspace of ~ 10163 is achieved, which is sufficient to provide security against exhaustive attacks. The result of the scheme is verified through MATLAB simulation, where the bit error rate performance of our proposed scheme is compared with an unencrypted OFDM signal, and the performance of our proposed scheme is analyzed for an illegal user. The suggested dynamic mapping fulfills the fundamental obligations of cryptography for data security. Moreover, it enhances the level of security in OFDM-NOMA....
Software-defined networking is an evolving network architecture beheading the traditional network architecture focusing its disadvantages in a limited perspective. A couple of decades before, programming and networking were viewed as different domains which today with the lights of SDN bridging themselves together. 'is is to overcome the existing challenges faced by the networking domain and an attempt to propose cost-efficient effective and feasible solutions. Changes to the existing network architecture are inevitable considering the volume of connected devices and the data being held together. SDN introduces a decoupled architecture and brings customization within the network making it easy to configure, manage, and troubleshoot. 'is paper focuses on the evolving network architecture, the software-defined networking. Unlike a generic view on the evolving network, which makes work as a review, this work addresses various perspectives of the architecture leaving it an intermediate work in between the review of the literature and implementation, contributing towards factors like the design, programmability, security, security behaviors, and security lapses. 'is paper also analyses various weak points of the architecture and evolves the attack vectors in each plane leaving a conclusion to further progress towards identifying the impacts of the attacks and proposing mitigation strategies....
Loading....