{"title":"Effect of industrial robot use on China's labor market: Evidence from manufacturing industry segmentation","authors":"Xinlei Gao;Chunling Luo;Juping Shou","doi":"10.23919/ICN.2023.0011","DOIUrl":"10.23919/ICN.2023.0011","url":null,"abstract":"This paper empirically investigates the impact of industrial robot use on China's labor market using data from 13 segments of manufacturing industry between 2006 and 2016. According to the findings, the use of industrial robots has a displacement effect on labor demand in manufacturing industry. The specific performance is that for every 1% increase in industrial robot stock, labor demand falls by 1.8%. After endogenous processing and a robustness test, this conclusion remains valid. This paper also discusses the effects of industrial robots across industries and genders. According to the results, industrial robot applications have a more pronounced displacement effect in low-skilled manufacturing than in high-skilled manufacturing. In comparison to female workers, industrial robot applications are more likely to decrease the demand for male workers. Moreover, this paper indicates that the displacement effect is significantly influenced by labor costs. Finally, we make appropriate policy recommendations for the labor market's employment stability based on the findings.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"106-115"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208201.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49669614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Longyun Qi;Xiaoliang Lv;Lianwen Sun;Tianle Yao;Jianye Yu;Lei Wang
{"title":"Operating system network security enhancement scheme based on trusted storage","authors":"Longyun Qi;Xiaoliang Lv;Lianwen Sun;Tianle Yao;Jianye Yu;Lei Wang","doi":"10.23919/ICN.2023.0014","DOIUrl":"10.23919/ICN.2023.0014","url":null,"abstract":"Data storage security has become the core of many network security issues. In order to achieve trusted storage and trusted measurement of network community data, this paper proposes a secure storage model based on trust extension for existing trusted storage technologies. In the process of document encryption, the key information is encrypted as well as decentralized stored by optimizing the ciphertext inverted index structure and update policy to ensure the security of index information. In the process of user access control mechanism, SAML and XACML are used in combination with role-based access control in order to achieve flexible and efficient authorization and access control. In the process of result query, ontology technology is introduced to better express the user's query intention and improve the query accuracy. A large number of experiments demonstrate the effectiveness and feasibility of the scheme.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"127-141"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208203.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41633545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A new media content trusted dissemination architecture based on AV-blockchain and ChinaDRM","authors":"Wenqian Shang;Zaifu Yu","doi":"10.23919/ICN.2023.0015","DOIUrl":"10.23919/ICN.2023.0015","url":null,"abstract":"The diffusion of all-media content plays a vital role in guiding public opinion and ideology. However, at present, most of the media content exists on all kinds of mainstream media platforms, which poses great challenges to the effective supervision of relevant departments and society. This has led to arbitrary charges, chaotic media content, difficulties in supervision and evidence collection, and infringements of the rights and interests of original content creators. To address these problems, this paper constructs a trustworthy propagation architecture that supports multi-platform media content sharing. This architecture collaboratively builds an audio-visual blockchain through public and consortium blockchains, coupled with an improved ChinaDRM to provide digital rights management and content encryption. Simultaneously, we employ an enhanced Diffie–Hellman key agreement protocol to offer distributed encryption and decryption for media content. Within this model, various media platforms and national regulatory authorities are responsible for content storage and distribution as consortium nodes and public blockchain nodes, respectively. At the same time, users, as light nodes of public chain or service consumers of consortium blockchain, can consume and comment on content. Analysis shows that the trusted communication framework of media content based on the audio-visual blockchain has certain expansibility and practicability. It can facilitate the supervision of mainstream media platforms by national authorities and society through inter-blockchain technology, offering a novel solution for multi-platform trustworthy cooperative information sharing.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"142-157"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208202.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45384893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"KnowER: Knowledge enhancement for efficient text-video retrieval","authors":"Hongwei Kou;Yingyun Yang;Yan Hua","doi":"10.23919/ICN.2023.0009","DOIUrl":"10.23919/ICN.2023.0009","url":null,"abstract":"The widespread adoption of mobile Internet and the Internet of things (IoT) has led to a significant increase in the amount of video data. While video data are increasingly important, language and text remain the primary methods of interaction in everyday communication, text-based cross-modal retrieval has become a crucial demand in many applications. Most previous text-video retrieval works utilize implicit knowledge of pre-trained models such as contrastive language-image pre-training (CLIP) to boost retrieval performance. However, implicit knowledge only records the co-occurrence relationship existing in the data, and it cannot assist the model to understand specific words or scenes. Another type of out-of-domain knowledge—explicit knowledge—which is usually in the form of a knowledge graph, can play an auxiliary role in understanding the content of different modalities. Therefore, we study the application of external knowledge base in text-video retrieval model for the first time, and propose KnowER, a model based on knowledge enhancement for efficient text-video retrieval. The knowledge-enhanced model achieves state-of-the-art performance on three widely used text-video retrieval datasets, i.e., MSRVTT, DiDeMo, and MSVD.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"93-105"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10208200.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48029650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance evaluation model of cross border e-commerce supply chain based on LMBP feedback neural network","authors":"Ling Tan","doi":"10.23919/ICN.2023.0013","DOIUrl":"10.23919/ICN.2023.0013","url":null,"abstract":"In recent years, with the support of national policies, Cross Border E-Commerce (CBEC) has developed rapidly. This business model not only brings significant benefits to the national economy, but also has many unique challenges, especially at the level of supply chain management. Therefore, to enable CBEC enterprises to develop sustainable supply chain, this study discusses the performance evaluation model of supply chain and proposes a CBEC Supply Chain Performance Evaluation Model (CBECSC-EM) based on the Levenberg-Marquardt Backpropagation (LMBP) algorithm. This experiment constructs performance evaluation indicators for the supply chain of CBEC enterprises. On this basis, the LMBP algorithm is introduced, and improved in the experiment to make the overall performance of the evaluation model more scientific and reasonable. In the verification set, the maximum F1 values of LMBP, DEA, SBM, and BP are 98.46%, 93.78%, 87.29%, and 78.95%, respectively. The MAPE value of LMBP model is 0.102%, which is lower than the other three methods (0.282%, 0.343%, and 0.385%) selected in the experiment. The maximum standard deviation rates of importance and operability of the evaluation indexes are 0.1346 and 0.1405, respectively, and there is a significant consistency between the expert scores. Therefore, the LMBP algorithm has broad application prospects in supply chain performance evaluation of CBEC enterprises.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 2","pages":"168-180"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10207889/10207890.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48088644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards a multi-agent reinforcement learning approach for joint sensing and sharing in cognitive radio networks","authors":"Kagiso Rapetswa;Ling Cheng","doi":"10.23919/ICN.2023.0005","DOIUrl":"10.23919/ICN.2023.0005","url":null,"abstract":"The adoption of the Fifth Generation (5G) and beyond 5G networks is driving the demand for learning approaches that enable users to co-exist harmoniously in a multi-user distributed environment. Although resource-constrained, the Cognitive Radio (CR) has been identified as a key enabler of distributed 5G and beyond networks due to its cognitive abilities and ability to access idle spectrum opportunistically. Reinforcement learning is well suited to meet the demand for learning in 5G and beyond 5G networks because it does not require the learning agent to have prior information about the environment in which it operates. Intuitively, CRs should be enabled to implement reinforcement learning to efficiently gain opportunistic access to spectrum and co-exist with each other. However, the application of reinforcement learning is straightforward in a single-agent environment and complex and resource intensive in a multi-agent and multi-objective learning environment. In this paper, (1) we present a brief history and overview of reinforcement learning and its limitations; (2) we provide a review of recent multi-agent learning methods proposed and multi-agent learning algorithms applied in Cognitive Radio (CR) networks; and (3) we further present a novel framework for multi-CR reinforcement learning and conclude with a synopsis of future research directions and recommendations.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 1","pages":"50-75"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10134533/10134538.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42033200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online search for UAV relay placement for free-space optical communication under shadowing","authors":"Yuanshuai Zheng;Yinjun Wang;Junting Chen","doi":"10.23919/ICN.2023.0003","DOIUrl":"10.23919/ICN.2023.0003","url":null,"abstract":"Unmanned aerial vehicle (UAV) relaying is promising to overcome the challenge of signal blockage in free-space optical (FSO) communications for users in dense urban area. Existing works on UAV relay placement are mostly based on simplified line-of-sight (LOS) channel models or probabilistic channel models, and thus fail to capture the actual LOS status of the optical communication link. By contrast, this paper studies three-dimensional (3D) online placement for a UAV to construct relay links to two ground users in deep shadow with LOS guarantees. By analyzing the properties of the UAV relay placement problem, it is found that searching on a plane that approximates the equipotential surface can achieve a good performance and complexity trade-off for a good placement of the UAV relay in 3D. Based on these insights, a two-stage online search algorithm on an equipotential plane (TOSEP) is developed for a special case where the equipotential surface turns out to be an equipotential plane. For the general case, a strategy called gradient projected online search algorithm on an approximated equipotential plane (GOSAEP) is developed, which approximates the equipotential surface with a perpendicular plane using the gradient projection method. Numerical experiments are conducted over a real-world city topology, and it is shown that the GOSAEP achieves over 95% of the performance of the exhaustive 3D search scheme within a 300-m search length.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 1","pages":"28-40"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10134533/10134536.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41604984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Denoising enabled channel estimation for underwater acoustic communications: A sparsity-aware model-driven learning approach","authors":"Sicong Liu;Younan Mou;Xianyao Wang;Danping Su;Ling Cheng","doi":"10.23919/ICN.2023.0001","DOIUrl":"10.23919/ICN.2023.0001","url":null,"abstract":"It has always been difficult to achieve accurate information of the channel for underwater acoustic communications because of the severe underwater propagation conditions, including frequency-selective property, high relative mobility, long propagation latency, and intensive ambient noise, etc. To this end, a deep unfolding neural network based approach is proposed, in which multiple layers of the network mimic the iterations of the classical iterative sparse approximation algorithm to extract the inherent sparse features of the channel by exploiting deep learning, and a scheme based on the Sparsity-Aware DNN (SA-DNN) for UAC estimation is proposed to improve the estimation accuracy. Moreover, we propose a Denoising Sparsity-Aware DNN (DeSA-DNN) based enhanced method that integrates a denoising CNN module in the sparsity-aware deep network, so that the degradation brought by intensive ambient noise could be eliminated and the estimation accuracy can be further improved. Simulation results demonstrate that the performance of the proposed schemes is superior to the state-of-the-art compressed sensing based and iterative sparse recovery schems in the aspects of channel recovery precision, pilot overhead, and robustness, particularly under unideal circumstances of intensive ambient noise or inadequate measurement pilots.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 1","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10134533/10134537.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42850457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-efficient multiuser and multitask computation offloading optimization method","authors":"Meini Pan;Zhihua Li;Junhao Qian","doi":"10.23919/ICN.2023.0007","DOIUrl":"10.23919/ICN.2023.0007","url":null,"abstract":"For dynamic application scenarios of Mobile Edge Computing (MEC), an Energy-efficient Multiuser and Multitask Computation Offloading (EMMCO) optimization method is proposed. Under the consideration of multiuser and multitask computation offloading, first, the EMMCO method takes into account the existence of dependencies among different tasks within an implementation, abstracts these dependencies as a Directed Acyclic Graph (DAG), and models the computation offloading problem as a Markov decision process. Subsequently, the task embedding sequence in the DAG is fed to the RNN encoder-decoder neural network with combination of the attention mechanism, the long-term dependencies among different tasks are successfully captured by this scheme. Finally, the Improved Policy Loss Clip-based PPO2 (IPLC-PPO2) algorithm is developed, and the RNN encoder-decoder neural network is trained by the developed algorithm. The loss function in the IPLC-PPO2 algorithm is utilized as a preference for the training process, and the neural network parameters are continuously updated to select the optimal offloading scheduling decisions. Simulation results demonstrate that the proposed EMMCO method can achieve lower latency, reduce energy consumption, and obtain a significant improvement in the Quality of Service (QoS) than the compared algorithms under different situations of mobile edge network.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 1","pages":"76-92"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10134533/10134539.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41354620","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lin Tang;Sumin Wang;Meng Zhou;Yinfan Ding;Chao Wang;Shengbo Wang;Zhen Sun;Jie Wu
{"title":"Research on recognition algorithm for gesture page turning based on wireless sensing","authors":"Lin Tang;Sumin Wang;Meng Zhou;Yinfan Ding;Chao Wang;Shengbo Wang;Zhen Sun;Jie Wu","doi":"10.23919/ICN.2023.0002","DOIUrl":"10.23919/ICN.2023.0002","url":null,"abstract":"When a human body moves within the coverage range of Wi-Fi signals, the reflected Wi-Fi signals by the various parts of the human body change the propagation path, so analysis of the channel state data can achieve the perception of the human motion. By extracting the Channel State Information (CSI) related to human motion from the Wi-Fi signals and analyzing it with the introduced machine learning classification algorithm, the human motion in the spatial environment can be perceived. On the basis of this theory, this paper proposed an algorithm of human behavior recognition based on CSI wireless sensing to realize deviceless and over-the-air slide turning. This algorithm collects the environmental information containing upward or downward wave in a conference room scene, uses the local outlier factor detection algorithm to segment the actions, and then the time domain features are extracted to train Support Vector Machine (SVM) and eXtreme Gradient Boosting (XGBoost) classification modules. The experimental results show that the average accuracy of the XGBoost module sensing slide flipping can reach 94%, and the SVM module can reach 89%, so the module could be extended to the field of smart classroom and significantly improve speech efficiency.","PeriodicalId":100681,"journal":{"name":"Intelligent and Converged Networks","volume":"4 1","pages":"15-27"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/9195266/10134533/10134534.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41377168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}