{"title":"A Portable English Translation System through Deep Learning and Internet of Things","authors":"Nana Cao","doi":"10.1002/itl2.416","DOIUrl":"https://doi.org/10.1002/itl2.416","url":null,"abstract":"","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"734 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76797126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Traditional ethnic sports shape the Chinese nation's solid national spirit, and mobile health development has been extended to various fields. In this study, we empower mobile health to traditional ethnic sports. Sensors used for collecting health data are worn on athletes and communicated with sink nodes through the network to provide better training guidance for traditional ethnic sports athletes through data analysis. However, the devices used to collect health data may come from many companies, and aggregating the data inevitably involves data security. As a new basic artificial intelligence technology, federated learning can use the health data of athletes to train the data analysis model in the case of original data localization, to solve the security and privacy problems in health data sharing to a certain extent. To this end, a differentially private-dynamic federated learning framework for dynamic aggregation weights under an untrusted central server is proposed, which sets a dynamic model aggregation weight, and this method directly learns federated learning from the data of different participants. The learning model aggregates the weights so that it is suitable for non-independent data environments. Experimental results show that the proposed framework not only provides local privacy guarantees, but also achieves higher accuracy and improves the security of mobile health data of traditional ethnic sports athletes in federated learning.
{"title":"Mobile health-empowered traditional ethnic sports: AI-based data analysis improving security","authors":"Ning Liu, Yuzhu Jin","doi":"10.1002/itl2.417","DOIUrl":"10.1002/itl2.417","url":null,"abstract":"<p>Traditional ethnic sports shape the Chinese nation's solid national spirit, and mobile health development has been extended to various fields. In this study, we empower mobile health to traditional ethnic sports. Sensors used for collecting health data are worn on athletes and communicated with sink nodes through the network to provide better training guidance for traditional ethnic sports athletes through data analysis. However, the devices used to collect health data may come from many companies, and aggregating the data inevitably involves data security. As a new basic artificial intelligence technology, federated learning can use the health data of athletes to train the data analysis model in the case of original data localization, to solve the security and privacy problems in health data sharing to a certain extent. To this end, a differentially private-dynamic federated learning framework for dynamic aggregation weights under an untrusted central server is proposed, which sets a dynamic model aggregation weight, and this method directly learns federated learning from the data of different participants. The learning model aggregates the weights so that it is suitable for non-independent data environments. Experimental results show that the proposed framework not only provides local privacy guarantees, but also achieves higher accuracy and improves the security of mobile health data of traditional ethnic sports athletes in federated learning.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 5","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82744107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper investigates the performance of cloud radio access networks (C-RAN) in different power control scenarios in full-duplex (FD) cellular networks. Results reveal that FD C-RAN performance drastically reduces with uplink (UL) power control. We proposed a power control scheme in downlink (DL), which uplifts the UL user rate, but at the cost of DL rate. With UL and DL power control, the average rate saturates after a threshold number of base stations (BS) coordination and has little impact on coordinating additional BSs. Besides, the state-of-the-art self-interference suppression (SI) of 130 dB provides almost equal performance compared to the perfect SI cancelation. Hence co-channel interference management becomes the bottleneck for FD system design. We used the Matern cluster process (MCP) to model the network.
{"title":"Full duplex C-RAN: Effects of power control","authors":"Askar Mandali Kundu, Thazhathe Veetil Sreejith","doi":"10.1002/itl2.413","DOIUrl":"https://doi.org/10.1002/itl2.413","url":null,"abstract":"<p>This paper investigates the performance of cloud radio access networks (C-RAN) in different power control scenarios in full-duplex (FD) cellular networks. Results reveal that FD C-RAN performance drastically reduces with uplink (UL) power control. We proposed a power control scheme in downlink (DL), which uplifts the UL user rate, but at the cost of DL rate. With UL and DL power control, the average rate saturates after a threshold number of base stations (BS) coordination and has little impact on coordinating additional BSs. Besides, the state-of-the-art self-interference suppression (SI) of 130 dB provides almost equal performance compared to the perfect SI cancelation. Hence co-channel interference management becomes the bottleneck for FD system design. We used the Matern cluster process (MCP) to model the network.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50127289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The internet of things (IoT) is advancing human lives by providing various intelligent services. The advancement of cutting-edge technologies necessitates an increase in the need for cyber security. In this light, an extensive research has been conducted to address IoT security concerns. However, several security challenges must be addressed before IoT can be utilized to its full potential in real-time. Motivated by this fact, this study presents a novel integration approach of Natural Language Processing (NLP) with IoT systems to enhance its security. It investigates the current state of NLP and its applications. The key contribution of this paper is the development of a system for identifying malicious behaviors in an IoT environment using n-gram and word-embedding techniques. Several security challenges and possible future directions to enhance IoT security using NLP are also addressed in this study.
{"title":"Security in IoT systems using natural language processing: Future challenges and directions","authors":"Yogendra Kumar, Vijay Kumar","doi":"10.1002/itl2.411","DOIUrl":"https://doi.org/10.1002/itl2.411","url":null,"abstract":"<p>The internet of things (IoT) is advancing human lives by providing various intelligent services. The advancement of cutting-edge technologies necessitates an increase in the need for cyber security. In this light, an extensive research has been conducted to address IoT security concerns. However, several security challenges must be addressed before IoT can be utilized to its full potential in real-time. Motivated by this fact, this study presents a novel integration approach of Natural Language Processing (NLP) with IoT systems to enhance its security. It investigates the current state of NLP and its applications. The key contribution of this paper is the development of a system for identifying malicious behaviors in an IoT environment using n-gram and word-embedding techniques. Several security challenges and possible future directions to enhance IoT security using NLP are also addressed in this study.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"6 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50127291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The difference in farming culture is the basis for the exchange, reference, and integration of agricultural culture. We propose a method based on data fusion and extraction method for analyzing differences in farming culture between China and Japan in this paper. Specifically, we designed a farming culture difference analysis model based on deep learning technology and improved algorithm. We combined deep neural network and particle swarm algorithm to design and improve the analysis model of farming culture difference. Firstly, we introduce in detail the designed analysis model based on deep learning, namely BP neural network. Secondly, we adopt the particle swarm algorithm (PSO) to improve and upgrade the defects of the BP neural network model. The experimental and comparative analysis of the results shows the characteristics of China's vast land and abundant resources and the characteristics of Japan, an island country with limited cultivated land.
农耕文化的差异是农业文化交流、借鉴和融合的基础。本文提出了一种基于数据融合和提取的中日农耕文化差异分析方法。具体而言,我们设计了一种基于深度学习技术和改进算法的农耕文化差异分析模型。我们将深度神经网络与粒子群算法相结合,设计并改进了农耕文化差异分析模型。首先,我们详细介绍了所设计的基于深度学习的分析模型,即 BP 神经网络。其次,我们采用粒子群算法(PSO)来改进和提升 BP 神经网络模型的缺陷。实验和对比分析结果显示了中国地大物博的特点和日本作为岛国耕地有限的特点。
{"title":"Data fusion-driven difference analysis of farming culture between China and Japan","authors":"Xiaoyun Lei","doi":"10.1002/itl2.412","DOIUrl":"10.1002/itl2.412","url":null,"abstract":"<p>The difference in farming culture is the basis for the exchange, reference, and integration of agricultural culture. We propose a method based on data fusion and extraction method for analyzing differences in farming culture between China and Japan in this paper. Specifically, we designed a farming culture difference analysis model based on deep learning technology and improved algorithm. We combined deep neural network and particle swarm algorithm to design and improve the analysis model of farming culture difference. Firstly, we introduce in detail the designed analysis model based on deep learning, namely BP neural network. Secondly, we adopt the particle swarm algorithm (PSO) to improve and upgrade the defects of the BP neural network model. The experimental and comparative analysis of the results shows the characteristics of China's vast land and abundant resources and the characteristics of Japan, an island country with limited cultivated land.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91408271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information entropy based public opinion maximization in social networks","authors":"Xiaohua Li","doi":"10.1002/itl2.409","DOIUrl":"https://doi.org/10.1002/itl2.409","url":null,"abstract":"","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"125 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74624422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combining Wearable Device with Machine Learning for Intelligent Health Detection","authors":"Yu Hao","doi":"10.1002/itl2.410","DOIUrl":"https://doi.org/10.1002/itl2.410","url":null,"abstract":"","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83408773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Online Language Education Recommendation Based on Personalized Learning and Edge Computing","authors":"Ziling Wang","doi":"10.1002/itl2.408","DOIUrl":"https://doi.org/10.1002/itl2.408","url":null,"abstract":"","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72763229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Smart community construction is an integral part of smart city construction, and smart community management requires huge amounts of data as support. Currently, the data generated by some smart communities is scattered, and this data needs further analysis to realize value. This paper primarily studies data classification and parameter optimization. First, a novel K-means clustering group support vector machines (SVM) method is proposed for data classification. For the parameter optimization problem of SVMs, evolutionary computation is used to seek the optimal solution through iterative evolution in a population composed of some feasible solutions. Then, the improved gray wolf optimization (iGWO) algorithm is used to optimize parameters and select features of SVM. Finally, to alleviate the situation that the minority samples are easily misjudged as noise samples due to the redundant features in the initial data, an oversampling method based on the iGWO and synthetic minority oversampling technique (SMOTE) is proposed, called iGWO–SMOTE–SVM. The experimental results demonstrate that the suggested approach on the six UCI datasets has acceptable accuracy, F1, and G-Mean, which can well serve the construction of smart communities.
{"title":"An evolutionary intelligent data analysis in promoting smart community","authors":"Zhi Zhao","doi":"10.1002/itl2.407","DOIUrl":"10.1002/itl2.407","url":null,"abstract":"<p>Smart community construction is an integral part of smart city construction, and smart community management requires huge amounts of data as support. Currently, the data generated by some smart communities is scattered, and this data needs further analysis to realize value. This paper primarily studies data classification and parameter optimization. First, a novel K-means clustering group support vector machines (SVM) method is proposed for data classification. For the parameter optimization problem of SVMs, evolutionary computation is used to seek the optimal solution through iterative evolution in a population composed of some feasible solutions. Then, the improved gray wolf optimization (iGWO) algorithm is used to optimize parameters and select features of SVM. Finally, to alleviate the situation that the minority samples are easily misjudged as noise samples due to the redundant features in the initial data, an oversampling method based on the iGWO and synthetic minority oversampling technique (SMOTE) is proposed, called iGWO–SMOTE–SVM. The experimental results demonstrate that the suggested approach on the six UCI datasets has acceptable accuracy, F1, and G-Mean, which can well serve the construction of smart communities.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75202246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The Internet of Things is an essential component in the growth of an ecosystem that enables quick and precise judgments to be made for communication on the battleground. The usage of the battlefield of things (BoT) is, however, subject to several restrictions for a variety of reasons. There is a potential for instances of replay, data manipulation, breaches of privacy, and other similar occurrences. As a direct result of this, the implementation of a security mechanism to protect the communication that occurs within BoT has turned into an absolute requirement. To this aim, we propose a blockchain-based solution that is both safe and private for use in communications inside the BoT ecosystem. In addition, research is conducted on the benefits of integrating blockchain technology and cybersecurity into BoT application implementations. This work elaborates on the importance of integrating cybersecurity and blockchain-based tools, techniques and methodologies for BoT.
{"title":"Role of cybersecurity and Blockchain in battlefield of things","authors":"Gaurav Sharma, Deepak Kumar Sharma, Adarsh Kumar","doi":"10.1002/itl2.406","DOIUrl":"https://doi.org/10.1002/itl2.406","url":null,"abstract":"<p>The Internet of Things is an essential component in the growth of an ecosystem that enables quick and precise judgments to be made for communication on the battleground. The usage of the battlefield of things (BoT) is, however, subject to several restrictions for a variety of reasons. There is a potential for instances of replay, data manipulation, breaches of privacy, and other similar occurrences. As a direct result of this, the implementation of a security mechanism to protect the communication that occurs within BoT has turned into an absolute requirement. To this aim, we propose a blockchain-based solution that is both safe and private for use in communications inside the BoT ecosystem. In addition, research is conducted on the benefits of integrating blockchain technology and cybersecurity into BoT application implementations. This work elaborates on the importance of integrating cybersecurity and blockchain-based tools, techniques and methodologies for BoT.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"6 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50133402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}