首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Research and Implementation of a Classification Method of Industrial Big Data for Security Management 面向安全管理的工业大数据分类方法研究与实施
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-14 DOI: 10.1002/ett.70021
Haibo Huang, Min Yan, Qiang Yan, Xiaofan Zhang

Purpose/Significance

With the extensive adoption of cloud computing, big data, artificial intelligence, the Internet of Things, and other novel information technologies in the industrial field, the data flow in industrial companies is rapidly increasing, leading to an explosion in the total volume of data. Ensuring effective data security has become a critical concern for both national and industrial entities.

Method/Process

To tackle the challenges of classification management of industrial big data, this study proposed an Information Security Triad Assessment-Support Vector Machine (AIC-ASVM) model according to information security principles. Building on national policy requirements, FIPS 199 standards, and the ABC grading method, a comprehensive classification framework for industrial data, termed “two-layer classification, three-dimensional grading,” was developed. By integrating the concept of Data Protection Impact Assessment (DPIA) from the GDPR, the classification of large industrial data sets was accomplished using a Support Vector Machine (SVM) algorithm.

Result/Conclusion

Simulations conducted using MATLAB yielded a classification accuracy of 96.67%. Furthermore, comparisons with decision tree and random forest models demonstrated that AIC-ASVM outperforms these alternatives, significantly improving the efficiency of big data classification and the quality of security management.

目的/意义 随着云计算、大数据、人工智能、物联网等新型信息技术在工业领域的广泛应用,工业企业的数据流量迅速增加,导致数据总量激增。确保有效的数据安全已成为国家和工业实体的关键问题。 方法/过程 为应对工业大数据分类管理的挑战,本研究根据信息安全原则提出了信息安全三元评估-支持向量机(AIC-ASVM)模型。在国家政策要求、FIPS 199 标准和 ABC 分级法的基础上,提出了 "双层分类、立体分级 "的工业数据综合分类框架。通过整合 GDPR 中的数据保护影响评估(DPIA)概念,使用支持向量机(SVM)算法完成了大型工业数据集的分类。 结果/结论 使用 MATLAB 进行模拟,分类准确率达到 96.67%。此外,与决策树和随机森林模型的比较表明,AIC-ASVM 的性能优于这些替代方法,从而显著提高了大数据分类的效率和安全管理的质量。
{"title":"Research and Implementation of a Classification Method of Industrial Big Data for Security Management","authors":"Haibo Huang,&nbsp;Min Yan,&nbsp;Qiang Yan,&nbsp;Xiaofan Zhang","doi":"10.1002/ett.70021","DOIUrl":"https://doi.org/10.1002/ett.70021","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Purpose/Significance</h3>\u0000 \u0000 <p>With the extensive adoption of cloud computing, big data, artificial intelligence, the Internet of Things, and other novel information technologies in the industrial field, the data flow in industrial companies is rapidly increasing, leading to an explosion in the total volume of data. Ensuring effective data security has become a critical concern for both national and industrial entities.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Method/Process</h3>\u0000 \u0000 <p>To tackle the challenges of classification management of industrial big data, this study proposed an Information Security Triad Assessment-Support Vector Machine (AIC-ASVM) model according to information security principles. Building on national policy requirements, FIPS 199 standards, and the ABC grading method, a comprehensive classification framework for industrial data, termed “two-layer classification, three-dimensional grading,” was developed. By integrating the concept of Data Protection Impact Assessment (DPIA) from the GDPR, the classification of large industrial data sets was accomplished using a Support Vector Machine (SVM) algorithm.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Result/Conclusion</h3>\u0000 \u0000 <p>Simulations conducted using MATLAB yielded a classification accuracy of 96.67%. Furthermore, comparisons with decision tree and random forest models demonstrated that AIC-ASVM outperforms these alternatives, significantly improving the efficiency of big data classification and the quality of security management.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing 基于轨迹姿态假设检验的杂波环境中的移动目标检测
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-13 DOI: 10.1002/ett.70028
Lixiang Geng, Qinglin Zheng, Chengbao Zhang, Jiao Hou

Moving target detection in a heavy clutter area is a challenging problem in the field of radar automatic target detection. Within the framework of track posture hypothesis testing, the radar-blips-oriented target detection algorithms named ErgSad and RanSaD are proposed for single target and formation targets detection, respectively in this paper. With the assumption that target motion is a linear Gaussian process in a short time, the algorithms use dual blips in different scans to generate the track hypothesis and test the hypothesis with residual blips in other scans to determine the existence of moving targets. To reduce time consumption and minimize the error of model estimation, the sampling rules and the supporting domain related to timestamps of track hypothesis models were designed. Simulation data experiments show that the proposed algorithms have more superior performance to detect targets than the state-of-the-art algorithms in the serious clutter environment.

重杂波区域的移动目标检测是雷达自动目标检测领域的一个难题。本文在轨迹态势假设检验的框架下,提出了面向雷达弹幕的目标检测算法 ErgSad 和 RanSaD,分别用于单目标和编队目标的检测。在假定目标运动是短时间内的线性高斯过程的前提下,算法利用不同扫描中的双闪点生成轨迹假说,并利用其他扫描中的残余闪点检验假说,以确定运动目标的存在。为减少时间消耗和最小化模型估计误差,设计了与轨迹假设模型时间戳相关的采样规则和支持域。仿真数据实验表明,与最先进的算法相比,所提出的算法在严重杂波环境下检测目标的性能更加优越。
{"title":"Moving Target Detection in Clutter Environment Based on Track Posture Hypothesis Testing","authors":"Lixiang Geng,&nbsp;Qinglin Zheng,&nbsp;Chengbao Zhang,&nbsp;Jiao Hou","doi":"10.1002/ett.70028","DOIUrl":"https://doi.org/10.1002/ett.70028","url":null,"abstract":"<div>\u0000 \u0000 <p>Moving target detection in a heavy clutter area is a challenging problem in the field of radar automatic target detection. Within the framework of track posture hypothesis testing, the radar-blips-oriented target detection algorithms named ErgSad and RanSaD are proposed for single target and formation targets detection, respectively in this paper. With the assumption that target motion is a linear Gaussian process in a short time, the algorithms use dual blips in different scans to generate the track hypothesis and test the hypothesis with residual blips in other scans to determine the existence of moving targets. To reduce time consumption and minimize the error of model estimation, the sampling rules and the supporting domain related to timestamps of track hypothesis models were designed. Simulation data experiments show that the proposed algorithms have more superior performance to detect targets than the state-of-the-art algorithms in the serious clutter environment.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142642269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spiking Quantum Fire Hawk Network Based Reliable Scheduling for Lifetime Maximization of Wireless Sensor Network 基于尖峰量子火鹰网络的可靠调度,实现无线传感器网络的寿命最大化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-12 DOI: 10.1002/ett.70019
W. S. Kiran, Allan J. Wilson, A. S. Radhamani

Managing energy consumption poses a substantial challenge within Wireless Sensor Networks (WSN) due to frequent communication among sensor nodes. A reliable scheduling framework presents a promising solution for maximizing WSN lifetime, minimizing energy consumption, and ensuring robust communication. Despite various proposed methods for reliable scheduling, energy consumption remains high. To address this, a spiking quantum fire hawk network-based reliable scheduling in WSN is introduced. This research incorporates clustering, duty-cycle management, and reliable routing to enhance energy efficiency. An improved Nutcracker Optimization-based Cluster Head (CH) election and Spiking Quantum Fire Hawk Network duty cycling contribute to optimal CH selection and increased network lifetime. Additionally, a Link Quality-based Energy Aware Proficient Trusted Routing Protocol (LQEAP-TRP) minimizes data transmission delay, offering reliable routing. Finally, the data communication is done in the reliable route. The developed approach is executed in Network Simulator and validated with the existing protocols. The results of the simulations indicate that the proposed approach achieves a network lifetime of 99.34% and a packet delivery ratio of 99.95%.

由于传感器节点之间的通信频繁,管理能源消耗成为无线传感器网络(WSN)的一大挑战。可靠的调度框架为最大化 WSN 的寿命、最小化能耗和确保稳健的通信提供了一个有前途的解决方案。尽管提出了各种可靠调度方法,但能耗仍然很高。为解决这一问题,我们提出了一种基于尖峰量子火鹰网络的 WSN 可靠调度方法。这项研究结合了聚类、占空比管理和可靠路由,以提高能效。基于胡桃夹优化的改进型簇头(CH)选举和尖峰量子火鹰网络占空比循环有助于优化 CH 选择和提高网络寿命。此外,基于链路质量的能量感知精通可信路由协议(LQEAP-TRP)最大限度地减少了数据传输延迟,提供了可靠的路由选择。最后,数据通信在可靠路由中完成。开发的方法在网络模拟器中执行,并与现有协议进行了验证。模拟结果表明,所提出的方法实现了 99.34% 的网络寿命和 99.95% 的数据包传送率。
{"title":"Spiking Quantum Fire Hawk Network Based Reliable Scheduling for Lifetime Maximization of Wireless Sensor Network","authors":"W. S. Kiran,&nbsp;Allan J. Wilson,&nbsp;A. S. Radhamani","doi":"10.1002/ett.70019","DOIUrl":"https://doi.org/10.1002/ett.70019","url":null,"abstract":"<div>\u0000 \u0000 <p>Managing energy consumption poses a substantial challenge within Wireless Sensor Networks (WSN) due to frequent communication among sensor nodes. A reliable scheduling framework presents a promising solution for maximizing WSN lifetime, minimizing energy consumption, and ensuring robust communication. Despite various proposed methods for reliable scheduling, energy consumption remains high. To address this, a spiking quantum fire hawk network-based reliable scheduling in WSN is introduced. This research incorporates clustering, duty-cycle management, and reliable routing to enhance energy efficiency. An improved Nutcracker Optimization-based Cluster Head (CH) election and Spiking Quantum Fire Hawk Network duty cycling contribute to optimal CH selection and increased network lifetime. Additionally, a Link Quality-based Energy Aware Proficient Trusted Routing Protocol (LQEAP-TRP) minimizes data transmission delay, offering reliable routing. Finally, the data communication is done in the reliable route. The developed approach is executed in Network Simulator and validated with the existing protocols. The results of the simulations indicate that the proposed approach achieves a network lifetime of 99.34% and a packet delivery ratio of 99.95%.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem 使用区块链和环形密码系统的安全去中心化系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-12 DOI: 10.1002/ett.70012
Dhanalakshmi Ranganayakulu, Nithisha Jesubert Thangaraj, Sathya Priya Shanmugam, Balasubramani Subbiyan

The advancement of Intelligent Transport Systems (ITSs) and the Internet of Vehicles (IoVs) introduces significant security challenges, particularly in ensuring secure communication between vehicles and vehicles (V2V), vehicles and Road Side Units (V2RSU). These vulnerabilities could potentially compromise the integrity of vehicular networks, making robust security measures essential. This paper aims to develop a secure communication framework for IoV environments that addresses these security concerns by enhancing authentication and encryption processes. The proposed approach combines the Ring-Based Degree Truncated Polynomial Cryptosystem (RNTPC) with a Blockchain framework incorporating an enhanced proof-of-authentication (BEPoAuth) consensus algorithm. The approach is initiated from the registration phase and managed by a Trusted Authority (TA), ensuring secure vehicle and RSU registration. Authentication is carried out in two ways: V2V authentication through vehicle signatures and V2RSU authentication via batch verification of cluster members. Group keys are generated using RNTPC for secure communication, and blockchain technology is integrated to secure transactions within the IoV environment. The proposed methodology is evaluated using various performance metrics, demonstrating a 15%–20% improvement in throughput compared to existing techniques such as Practical Byzantine Fault Tolerance (PBFT), Secure and Highly Efficient Blockchain PBFT Consensus Algorithm (SG-PBFT), credit-based PBFT consensus algorithm (CPBFT) and Geographic-PBFT (G-PBFT). The system also exhibited minimal computational and communication latency while enhancing V2V and V2RSU communication efficiency. The RNTPC-BEPoAuth framework offers a robust and secure solution for IoV communications, significantly outperforming existing methods in terms of throughput and efficiency. This approach provides a reliable foundation for secure ITSs, addressing critical security concerns in vehicular networks.

智能交通系统(ITSs)和车联网(IoVs)的发展带来了巨大的安全挑战,尤其是在确保车辆与车辆(V2V)、车辆与路侧装置(V2RSU)之间的安全通信方面。这些漏洞可能会破坏车辆网络的完整性,因此必须采取强有力的安全措施。本文旨在为物联网环境开发一个安全通信框架,通过加强身份验证和加密过程来解决这些安全问题。所提出的方法将环形度截断多项式密码系统(RNTPC)与区块链框架相结合,并纳入了增强型验证证明(BEPoAuth)共识算法。该方法从注册阶段开始,由可信机构(TA)管理,确保车辆和 RSU 的安全注册。认证通过两种方式进行:通过车辆签名进行 V2V 验证,通过集群成员的批量验证进行 V2RSU 验证。群组密钥使用 RNTPC 生成,用于安全通信,并集成了区块链技术,以确保 IoV 环境中的交易安全。与现有技术(如实用拜占庭容错(PBFT)、安全高效区块链 PBFT 共识算法(SG-PBFT)、基于信用的 PBFT 共识算法(CPBFT)和地理 PBFT(G-PBFT))相比,所提出的方法使用各种性能指标进行了评估,显示吞吐量提高了 15%-20%。该系统还将计算和通信延迟降至最低,同时提高了 V2V 和 V2RSU 通信效率。RNTPC-BEPoAuth 框架为物联网通信提供了一个稳健而安全的解决方案,在吞吐量和效率方面明显优于现有方法。这种方法为安全的智能交通系统提供了可靠的基础,解决了车载网络中的关键安全问题。
{"title":"A Secure and Decentralized Using Blockchain and Ring-Based Cryptosystem","authors":"Dhanalakshmi Ranganayakulu,&nbsp;Nithisha Jesubert Thangaraj,&nbsp;Sathya Priya Shanmugam,&nbsp;Balasubramani Subbiyan","doi":"10.1002/ett.70012","DOIUrl":"https://doi.org/10.1002/ett.70012","url":null,"abstract":"<div>\u0000 \u0000 <p>The advancement of Intelligent Transport Systems (ITSs) and the Internet of Vehicles (IoVs) introduces significant security challenges, particularly in ensuring secure communication between vehicles and vehicles (V2V), vehicles and Road Side Units (V2RSU). These vulnerabilities could potentially compromise the integrity of vehicular networks, making robust security measures essential. This paper aims to develop a secure communication framework for IoV environments that addresses these security concerns by enhancing authentication and encryption processes. The proposed approach combines the Ring-Based Degree Truncated Polynomial Cryptosystem (RNTPC) with a Blockchain framework incorporating an enhanced proof-of-authentication (BEPoAuth) consensus algorithm. The approach is initiated from the registration phase and managed by a Trusted Authority (TA), ensuring secure vehicle and RSU registration. Authentication is carried out in two ways: V2V authentication through vehicle signatures and V2RSU authentication via batch verification of cluster members. Group keys are generated using RNTPC for secure communication, and blockchain technology is integrated to secure transactions within the IoV environment. The proposed methodology is evaluated using various performance metrics, demonstrating a 15%–20% improvement in throughput compared to existing techniques such as Practical Byzantine Fault Tolerance (PBFT), Secure and Highly Efficient Blockchain PBFT Consensus Algorithm (SG-PBFT), credit-based PBFT consensus algorithm (CPBFT) and Geographic-PBFT (G-PBFT). The system also exhibited minimal computational and communication latency while enhancing V2V and V2RSU communication efficiency. The RNTPC-BEPoAuth framework offers a robust and secure solution for IoV communications, significantly outperforming existing methods in terms of throughput and efficiency. This approach provides a reliable foundation for secure ITSs, addressing critical security concerns in vehicular networks.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimized Data Replication in Cloud Using Hybrid Optimization Approach 使用混合优化方法优化云中的数据复制
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-12 DOI: 10.1002/ett.70022
D. Rambabu, A. Govardhan

Cloud computing (CC), in contrast to traditional high-performance computing environments, is a group of imaginary and networked resources of computing that are controlled by one unified maximum-performance computing power. Here, this work aims to develop a novel data replication method in the cloud. The data replication is carried out with a new multi-objective technique that considers constraints like cost, the distance between data centers, trust, and risk. Moreover, for optimal data replication, a new hybrid algorithm termed poor rich strategy assisted grasshopper optimization (PRS-GO) is introduced. To increase the accessibility of the system, the data used continuously should be duplicated in various areas. A minimal mean value of 0.66 is gained with the PRS-GO scheme, whereas Particle Swarm Optimization-Tabu Search (PSO + TS), Receding Horizon Control (RHC), Sun Flower Optimization (SFO), Cat Mouse-Based Optimization (CMBO), Hunger Games Search Optimization (HGSO), Seagull Optimization (SGO), Poor And Rich Optimization (PRO), and Grasshopper Optimization Algorithm (GOA) have got a high mean value of 0.722, 0.71, 0.71, 0.71, 0.7, 0.7, 0.7, and 0.69.

与传统的高性能计算环境不同,云计算(CC)是一组虚构的网络化计算资源,由统一的最高性能计算能力控制。本研究旨在开发一种新型的云计算数据复制方法。数据复制采用一种新的多目标技术,该技术考虑了成本、数据中心之间的距离、信任和风险等约束条件。此外,为了优化数据复制,引入了一种新的混合算法,称为穷富策略辅助蚱蜢优化(PRS-GO)。为了提高系统的可访问性,连续使用的数据应在不同区域进行复制。PRS-GO 方案的最小平均值为 0.66,而粒子群优化-塔布搜索(PSO + TS)、后退地平线控制(RHC)、太阳花优化(SFO)、基于猫鼠的优化(CMBO)、饥饿游戏搜索优化(HGSO)、海鸥优化(SGO)、贫富优化(PRO)和蚱蜢优化算法(GOA)的平均值分别为 0.722、0.71、0.71、0.71、0.7、0.7、0.7 和 0.69。
{"title":"Optimized Data Replication in Cloud Using Hybrid Optimization Approach","authors":"D. Rambabu,&nbsp;A. Govardhan","doi":"10.1002/ett.70022","DOIUrl":"https://doi.org/10.1002/ett.70022","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud computing (CC), in contrast to traditional high-performance computing environments, is a group of imaginary and networked resources of computing that are controlled by one unified maximum-performance computing power. Here, this work aims to develop a novel data replication method in the cloud. The data replication is carried out with a new multi-objective technique that considers constraints like cost, the distance between data centers, trust, and risk. Moreover, for optimal data replication, a new hybrid algorithm termed poor rich strategy assisted grasshopper optimization (PRS-GO) is introduced. To increase the accessibility of the system, the data used continuously should be duplicated in various areas. A minimal mean value of 0.66 is gained with the PRS-GO scheme, whereas Particle Swarm Optimization-Tabu Search (PSO + TS), Receding Horizon Control (RHC), Sun Flower Optimization (SFO), Cat Mouse-Based Optimization (CMBO), Hunger Games Search Optimization (HGSO), Seagull Optimization (SGO), Poor And Rich Optimization (PRO), and Grasshopper Optimization Algorithm (GOA) have got a high mean value of 0.722, 0.71, 0.71, 0.71, 0.7, 0.7, 0.7, and 0.69.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Sparse Channel Estimation Framework for MU-MIMO-OFDM System With Adaptive Extreme Learning and Heuristic Mechanism 采用自适应极限学习和启发式机制的 MU-MIMO-OFDM 系统自动稀疏信道估计框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-12 DOI: 10.1002/ett.70015
Y. Roji, K. Jayasankar, L. Nirmala Devi

Compressed sensing is used for channel estimation in Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, but large-scale networks face challenges regarding the antenna elements and spatial non-stationarities. To enhance spectral efficiency in Multi User-MIMO (MU-MIMO) systems, essential signals are collected by Quadrature Phase Shift Keying (QPSK) in the transformer phase. Further, the modulated signals are provided to the “Pulse Shaping Algorithm (PSA)” for neglecting the inter-symbol interference rate along with inter-carrier interference. Subsequently, in the transmitter phase, the “Inverse Fast Fourier Transforms (IFFT)” technique is performed to map the symbols and then provide the signal to the receiver side. The spare channel is validated using a semi-blind sparse algorithm, with parameters tuned using the Opposition Mud Ring Algorithm (OMRA). Then, the estimated sparse channel values are used for generating the new data, and the Adaptive Extreme Learning Model (AELM) is trained to predict the spare channel outcome. The main objective is to reduce the Minimum Mean Square Error (MMSE) in the channel. Thus, the spare channel outcome is predicted automatically using the AELM. Then, diverse evaluations are executed in the suggested spare channel estimation approach over the different mechanisms to observe their effectualness rate.

压缩传感用于多输入多输出-正交频分复用(MIMO-OFDM)系统中的信道估计,但大规模网络面临着天线元件和空间非稳态的挑战。为了提高多用户多输入多输出(MU-MIMO)系统的频谱效率,在变压器相位中通过正交相移键控(QPSK)采集基本信号。然后,将调制信号提供给 "脉冲整形算法(PSA)",以忽略符号间干扰率和载波间干扰。随后,在发射器阶段,采用 "快速傅里叶变换逆变换(IFFT)"技术映射符号,然后将信号提供给接收器端。备用信道使用半盲稀疏算法进行验证,参数使用对立泥环算法(OMRA)进行调整。然后,使用估计的稀疏信道值生成新数据,并训练自适应极限学习模型(AELM)来预测备用信道结果。主要目标是降低信道的最小均方误差(MMSE)。因此,备用信道结果可通过 AELM 自动预测。然后,在建议的备用信道估计方法中,对不同的机制进行了不同的评估,以观察它们的有效率。
{"title":"An Automated Sparse Channel Estimation Framework for MU-MIMO-OFDM System With Adaptive Extreme Learning and Heuristic Mechanism","authors":"Y. Roji,&nbsp;K. Jayasankar,&nbsp;L. Nirmala Devi","doi":"10.1002/ett.70015","DOIUrl":"https://doi.org/10.1002/ett.70015","url":null,"abstract":"<div>\u0000 \u0000 <p>Compressed sensing is used for channel estimation in Multiple Input Multiple Output-Orthogonal Frequency Division Multiplexing (MIMO-OFDM) systems, but large-scale networks face challenges regarding the antenna elements and spatial non-stationarities. To enhance spectral efficiency in Multi User-MIMO (MU-MIMO) systems, essential signals are collected by Quadrature Phase Shift Keying (QPSK) in the transformer phase. Further, the modulated signals are provided to the “Pulse Shaping Algorithm (PSA)” for neglecting the inter-symbol interference rate along with inter-carrier interference. Subsequently, in the transmitter phase, the “Inverse Fast Fourier Transforms (IFFT)” technique is performed to map the symbols and then provide the signal to the receiver side. The spare channel is validated using a semi-blind sparse algorithm, with parameters tuned using the Opposition Mud Ring Algorithm (OMRA). Then, the estimated sparse channel values are used for generating the new data, and the Adaptive Extreme Learning Model (AELM) is trained to predict the spare channel outcome. The main objective is to reduce the Minimum Mean Square Error (MMSE) in the channel. Thus, the spare channel outcome is predicted automatically using the AELM. Then, diverse evaluations are executed in the suggested spare channel estimation approach over the different mechanisms to observe their effectualness rate.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Green Computation Offloading With DRL in Multi-Access Edge Computing 在多接入边缘计算中利用 DRL 实现绿色计算卸载
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-08 DOI: 10.1002/ett.70003
Changkui Yin, Yingchi Mao, Meng Chen, Yi Rong, Yinqiu Liu, Xiaoming He

In multi-access edge computing (MEC), computational task offloading of mobile terminals (MT) is expected to provide the green applications with the restriction of energy consumption and service latency. Nevertheless, the diverse statuses of a range of edge servers and mobile terminals, along with the fluctuating offloading routes, present a challenge in the realm of computational task offloading. In order to bolster green applications, we present an innovative computational task offloading model as our initial approach. In particular, the nascent model is constrained by energy consumption and service latency considerations: (1) Smart mobile terminals with computational capabilities could serve as carriers; (2) The diverse computational and communication capacities of edge servers have the potential to enhance the offloading process; (3) The unpredictable routing paths of mobile terminals and edge servers could result in varied information transmissions. We then propose an improved deep reinforcement learning (DRL) algorithm named PS-DDPG with the prioritized experience replay (PER) and the stochastic weight averaging (SWA) mechanisms based on deep deterministic policy gradients (DDPG) to seek an optimal offloading mode, saving energy consumption. Next, we introduce an enhanced deep reinforcement learning (DRL) algorithm named PS-DDPG, incorporating the prioritized experience replay (PER) and stochastic weight averaging (SWA) techniques rooted in deep deterministic policy gradients (DDPG). This approach aims to identify an efficient offloading strategy, thereby reducing energy consumption. Fortunately, algorithm is proposed for each MT, which is responsible for making decisions regarding task partition, channel allocation, and power transmission control. Our developed approach achieves the ultimate estimation of observed values and enhances memory via write operations. The replay buffer holds data from previous time slots to upgrade both the actor and critic networks, followed by a buffer reset. Comprehensive experiments validate the superior performance, including stability and convergence, of our algorithm when juxtaposed with prior studies.

在多接入边缘计算(MEC)中,移动终端(MT)的计算任务卸载有望为绿色应用提供能耗和服务延迟限制。然而,一系列边缘服务器和移动终端的状态各不相同,而且卸载路线也不固定,这给计算任务卸载领域带来了挑战。为了支持绿色应用,我们提出了一种创新的计算任务卸载模型作为初步方法。具体而言,该新生模型受到能耗和服务延迟因素的制约:(1)具有计算能力的智能移动终端可作为载体;(2)边缘服务器的不同计算和通信能力有可能增强卸载过程;(3)移动终端和边缘服务器的路由路径不可预测,可能导致信息传输的变化。因此,我们提出了一种名为 PS-DDPG 的改进型深度强化学习(DRL)算法,该算法具有基于深度确定性策略梯度(DDPG)的优先经验重放(PER)和随机权重平均(SWA)机制,可寻求最佳卸载模式,从而节省能耗。接下来,我们介绍了一种名为 PS-DDPG 的增强型深度强化学习(DRL)算法,它将优先经验重放(PER)和随机权重平均(SWA)技术融入了深度确定性策略梯度(DDPG)。这种方法旨在确定有效的卸载策略,从而降低能耗。幸运的是,我们为每个 MT 提出了算法,由其负责做出任务分区、信道分配和功率传输控制方面的决策。我们开发的方法实现了对观测值的最终估算,并通过写操作增强了内存。重放缓冲区保存前一时间段的数据,以升级行动者和批评者网络,然后重置缓冲区。综合实验验证了我们的算法在稳定性和收敛性等方面的优越性能。
{"title":"Green Computation Offloading With DRL in Multi-Access Edge Computing","authors":"Changkui Yin,&nbsp;Yingchi Mao,&nbsp;Meng Chen,&nbsp;Yi Rong,&nbsp;Yinqiu Liu,&nbsp;Xiaoming He","doi":"10.1002/ett.70003","DOIUrl":"https://doi.org/10.1002/ett.70003","url":null,"abstract":"<div>\u0000 \u0000 <p>In multi-access edge computing (MEC), computational task offloading of mobile terminals (MT) is expected to provide the green applications with the restriction of energy consumption and service latency. Nevertheless, the diverse statuses of a range of edge servers and mobile terminals, along with the fluctuating offloading routes, present a challenge in the realm of computational task offloading. In order to bolster green applications, we present an innovative computational task offloading model as our initial approach. In particular, the nascent model is constrained by energy consumption and service latency considerations: (1) Smart mobile terminals with computational capabilities could serve as carriers; (2) The diverse computational and communication capacities of edge servers have the potential to enhance the offloading process; (3) The unpredictable routing paths of mobile terminals and edge servers could result in varied information transmissions. We then propose an improved deep reinforcement learning (DRL) algorithm named PS-DDPG with the prioritized experience replay (PER) and the stochastic weight averaging (SWA) mechanisms based on deep deterministic policy gradients (DDPG) to seek an optimal offloading mode, saving energy consumption. Next, we introduce an enhanced deep reinforcement learning (DRL) algorithm named PS-DDPG, incorporating the prioritized experience replay (PER) and stochastic weight averaging (SWA) techniques rooted in deep deterministic policy gradients (DDPG). This approach aims to identify an efficient offloading strategy, thereby reducing energy consumption. Fortunately, <span></span><math></math> algorithm is proposed for each MT, which is responsible for making decisions regarding task partition, channel allocation, and power transmission control. Our developed approach achieves the ultimate estimation of observed values and enhances memory via write operations. The replay buffer holds data from previous <span></span><math></math> time slots to upgrade both the actor and critic networks, followed by a buffer reset. Comprehensive experiments validate the superior performance, including stability and convergence, of our algorithm when juxtaposed with prior studies.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Optimization With Deep Spiking Equilibrium Neural Network for Software Defined Network Based Congestion Prevention Routing 利用深度尖峰平衡神经网络进行混合优化,实现基于软件定义网络的拥塞预防路由选择
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70018
Sadanand R. Inamdar, L. Sadananda, D. Shyam Prasad

In the Internet of Things (IoT) network, within a period of time it constructs a huge network of millions and billions of things that incorporate with each other, leading to various technical and application problems. Also, on-time delivery of packets is significant in software-defined networks. In the current software-defined network, the bandwidth overhead is not considered when an enormous amount of traffic enters the network; this may lead to network congestion. To overcome this issue, a novel method is proposed to detect network congestion based on hybrid optimization, namely, the Hybrid Gannet with Pelican Optimization (HGPO) algorithm. The node-level congestions and the link-level congestions, which means the buffer overflow and the multiple nodes trying to utilize the channel at the same time, must be controlled efficiently. Once the network congestion gets controlled, the shortest route path selection and congestion prevention are performed perfectly with the aid of the proposed Deep Spiking Equilibrium Neural Network (DSENN). A few route discovery frequency vectors, such as the interroute discovery time and route discovery time of each node, are determined to prevent congestion. Finally, it is implemented in the Python platform successfully, and the achieved throughput, delay, packet loss ratio, packet delivery ratio, end-to-end delay, and performance measures of the proposed method are 140 Mbit/s, 17 ms, 3.8%, 0.35 s, and 100%, respectively, which outperforms the other compared traditional algorithms.

在物联网(IoT)网络中,数以百万计甚至数十亿计的事物会在一段时间内构建一个庞大的网络,这些事物会相互结合,从而导致各种技术和应用问题。此外,在软件定义网络中,数据包的按时交付也非常重要。在当前的软件定义网络中,当大量流量进入网络时,没有考虑带宽开销,这可能会导致网络拥塞。为解决这一问题,本文提出了一种基于混合优化的新型网络拥塞检测方法,即混合甘尼特与鹈鹕优化(HGPO)算法。节点级拥塞和链路级拥塞,即缓冲区溢出和多个节点同时试图使用信道,必须得到有效控制。一旦网络拥塞得到控制,借助所提出的深度尖峰均衡神经网络(DSENN),就能完美地完成最短路由路径选择和拥塞预防。为防止拥塞,还确定了一些路由发现频率向量,如每个节点的路由间发现时间和路由发现时间。最后,该方法在 Python 平台上成功实现,其吞吐量、延迟、丢包率、送包率、端到端延迟和性能指标分别为 140 Mbit/s、17 ms、3.8%、0.35 s 和 100%,优于其他传统算法。
{"title":"Hybrid Optimization With Deep Spiking Equilibrium Neural Network for Software Defined Network Based Congestion Prevention Routing","authors":"Sadanand R. Inamdar,&nbsp;L. Sadananda,&nbsp;D. Shyam Prasad","doi":"10.1002/ett.70018","DOIUrl":"https://doi.org/10.1002/ett.70018","url":null,"abstract":"<div>\u0000 \u0000 <p>In the Internet of Things (IoT) network, within a period of time it constructs a huge network of millions and billions of things that incorporate with each other, leading to various technical and application problems. Also, on-time delivery of packets is significant in software-defined networks. In the current software-defined network, the bandwidth overhead is not considered when an enormous amount of traffic enters the network; this may lead to network congestion. To overcome this issue, a novel method is proposed to detect network congestion based on hybrid optimization, namely, the Hybrid Gannet with Pelican Optimization (HGPO) algorithm. The node-level congestions and the link-level congestions, which means the buffer overflow and the multiple nodes trying to utilize the channel at the same time, must be controlled efficiently. Once the network congestion gets controlled, the shortest route path selection and congestion prevention are performed perfectly with the aid of the proposed Deep Spiking Equilibrium Neural Network (DSENN). A few route discovery frequency vectors, such as the interroute discovery time and route discovery time of each node, are determined to prevent congestion. Finally, it is implemented in the Python platform successfully, and the achieved throughput, delay, packet loss ratio, packet delivery ratio, end-to-end delay, and performance measures of the proposed method are 140 Mbit/s, 17 ms, 3.8%, 0.35 s, and 100%, respectively, which outperforms the other compared traditional algorithms.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placement and Power Assignment for Hierarchical UAV Networks Under Hovering Fluctuations in mmWave Communications 毫米波通信中悬停波动条件下分层无人机网络的布局和功率分配
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70002
Hosein Azarhava, Mehran Pourmohammad Abdollahi, Javad Musevi Niya

In this article, we investigate the successful transmission probability of an aerial cellular network in which an unmanned aerial vehicle (UAV), as a macrocell base station (UAV-BS) serves other UAVs as aerial users. The antennas with beamforming capability are mounted on the UAVs, to increase the throughput of the network. The random effects of inner forces such as controlling errors or outer forces like the air conditions, result in the random fluctuations in the hovering UAVs. We assume Rician fading distribution over the links between the UAV-BS and other UAVs. Then, we calculate the distribution of the corresponding channel gain under hovering fluctuations and we derive the closed form expressions for successful transmission probability for each user. Defining an optimization problem on the average successful transmission probability of the network, we obtain the best placement of UAV-BS along with the resource allocation. The problem turns out to be a non-convex problem and time consuming via numerical exhaustive search methods. We obtain a lower bound for the average successful transmission probability and we solve the optimization problem for this lower bound. Maximization problem for the achieved lower bound is equivalent to maximize the main problem. Using some approximations, we convert the problem to a low complex one, then, the problem becomes convex which is solved by KKT conditions and yields the location of UAV-BS. The theoretical results reveal the influence of fluctuations on the throughput of the network and show that optimizing the lower bound probability achieves the suboptimal solution for power assignment and placement problem, which is verified by simulation results.

在本文中,我们研究了空中蜂窝网络的成功传输概率,在该网络中,无人飞行器(UAV)作为宏蜂窝基站(UAV-BS)为其他作为空中用户的无人飞行器提供服务。无人飞行器上安装了具有波束成形功能的天线,以提高网络的吞吐量。内力(如控制误差)或外力(如空气条件)的随机影响导致悬停的无人机出现随机波动。我们假设无人机-BS 与其他无人机之间的链路具有 Rician fading 分布。然后,我们计算悬停波动下相应信道增益的分布,并推导出每个用户成功传输概率的闭式表达式。根据网络的平均成功传输概率定义一个优化问题,我们可以得到无人机-BS 的最佳位置和资源分配。该问题是一个非凸问题,通过数值穷举搜索方法会耗费大量时间。我们获得了平均成功传输概率的下限,并解决了该下限的优化问题。实现下限的最大化问题等同于最大化主问题。利用一些近似方法,我们将问题转换为低复杂度问题,然后,问题变成凸问题,通过 KKT 条件求解,得到无人机-BS 的位置。理论结果揭示了波动对网络吞吐量的影响,并表明优化下限概率可实现功率分配和位置问题的次优解,这一点已通过仿真结果得到验证。
{"title":"Placement and Power Assignment for Hierarchical UAV Networks Under Hovering Fluctuations in mmWave Communications","authors":"Hosein Azarhava,&nbsp;Mehran Pourmohammad Abdollahi,&nbsp;Javad Musevi Niya","doi":"10.1002/ett.70002","DOIUrl":"https://doi.org/10.1002/ett.70002","url":null,"abstract":"<div>\u0000 \u0000 <p>In this article, we investigate the successful transmission probability of an aerial cellular network in which an unmanned aerial vehicle (UAV), as a macrocell base station (UAV-BS) serves other UAVs as aerial users. The antennas with beamforming capability are mounted on the UAVs, to increase the throughput of the network. The random effects of inner forces such as controlling errors or outer forces like the air conditions, result in the random fluctuations in the hovering UAVs. We assume Rician fading distribution over the links between the UAV-BS and other UAVs. Then, we calculate the distribution of the corresponding channel gain under hovering fluctuations and we derive the closed form expressions for successful transmission probability for each user. Defining an optimization problem on the average successful transmission probability of the network, we obtain the best placement of UAV-BS along with the resource allocation. The problem turns out to be a non-convex problem and time consuming via numerical exhaustive search methods. We obtain a lower bound for the average successful transmission probability and we solve the optimization problem for this lower bound. Maximization problem for the achieved lower bound is equivalent to maximize the main problem. Using some approximations, we convert the problem to a low complex one, then, the problem becomes convex which is solved by KKT conditions and yields the location of UAV-BS. The theoretical results reveal the influence of fluctuations on the throughput of the network and show that optimizing the lower bound probability achieves the suboptimal solution for power assignment and placement problem, which is verified by simulation results.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain With Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image 区块链与分层自动关联多项式卷积神经网络相结合的图像加密技术
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-11-06 DOI: 10.1002/ett.70013
V. Deepa Priya, M. Sundaram

Nowadays, the image security is one of the most challenging issues to address the technological age. Security is the primary issue in data management and transmission because of the original data form that is read, abused and destroyed. The cloud companies struggle to secure the file. The cloud security is the major concern in cloud computing context. Numerous researches have been presented so far to protect the cloud environment. But, none of them provides the sufficient security. Therefore, this paper proposes a Blockchain-based technique for Image Security that combines Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography (BC-SIE-HAPCNN-FODCE). The Flickr30k dataset is used to collect the input images. At that point, cryptographic pixel values of picture are kept on blockchain to defend security of picture information. It uses Delegated Proof of Stake Consensus (DT-DPoS) approach appointed confirmation of stake agreement approach. The performance parameters, like processing time, reaction time, runtime, correlation coefficient analysis, entropy analysis, mean square error, and availability are used to determine the efficacy of the proposed BC-SIE-HAPCNN-FODCE approach. The performance of the proposed technique attains 18.81%, 32.05%, and 22.28% higher correlation coefficient and 25.38%, 20.81%, and 26.04% higher entropy compared with existing methods, such as Multiple Rossler lightweight Logistic sine mapping dependent Federated convolutional method with cyber blockchain in medical image encryption (BC-SIE-FCAL-MRLLSM), color image encryption under Hénon-zigzag map with chaotic restricted Boltzmann machine over Blockchain (BC-SIE-CRBM-HZM) and blockchain-assisted safe picture transmission along detection method on Internet of Medical Things Environment (BC-SIE-ECC-DBN), respectively.

如今,图像安全性是技术时代最具挑战性的问题之一。安全是数据管理和传输中的首要问题,因为原始数据形式会被读取、滥用和破坏。云计算公司努力确保文件安全。云安全是云计算背景下的主要问题。迄今为止,已经有许多研究提出要保护云环境。但是,它们都没有提供足够的安全性。因此,本文提出了一种基于区块链的图像安全技术,该技术结合了分层自动关联多项式卷积神经网络加密技术(BC-SIE-HAPCNN-FODCE)。Flickr30k 数据集用于收集输入图像。此时,图片的加密像素值被保存在区块链上,以保护图片信息的安全。区块链使用委托权益共识证明(DT-DPoS)方法指定权益协议确认方法。处理时间、反应时间、运行时间、相关系数分析、熵分析、均方误差和可用性等性能参数用于确定所提议的 BC-SIE-HAPCNN-FODCE 方法的有效性。与现有方法相比,所提技术的相关系数分别提高了 18.81%、32.05% 和 22.28%,熵分别提高了 25.38%、20.81% 和 26.04%。与现有方法相比,如医学图像加密中的多Rossler轻量级Logistic正弦映射依赖联邦卷积法与网络区块链(BC-SIE-FCAL-MRLLSM)、区块链上的混沌受限玻尔兹曼机Hénon-zigzag映射下的彩色图像加密(BC-SIE-CRBM-HZM)和医疗物联网环境下的区块链辅助安全图片传输沿检测方法(BC-SIE-ECC-DBN),熵值分别提高了18.81%、32.05%和22.28%。
{"title":"Blockchain With Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography for Securing Image","authors":"V. Deepa Priya,&nbsp;M. Sundaram","doi":"10.1002/ett.70013","DOIUrl":"https://doi.org/10.1002/ett.70013","url":null,"abstract":"<div>\u0000 \u0000 <p>Nowadays, the image security is one of the most challenging issues to address the technological age. Security is the primary issue in data management and transmission because of the original data form that is read, abused and destroyed. The cloud companies struggle to secure the file. The cloud security is the major concern in cloud computing context. Numerous researches have been presented so far to protect the cloud environment. But, none of them provides the sufficient security. Therefore, this paper proposes a Blockchain-based technique for Image Security that combines Hierarchical Auto-Associative Polynomial Convolutional Neural Network Fostered Cryptography (BC-SIE-HAPCNN-FODCE). The Flickr30k dataset is used to collect the input images. At that point, cryptographic pixel values of picture are kept on blockchain to defend security of picture information. It uses Delegated Proof of Stake Consensus (DT-DPoS) approach appointed confirmation of stake agreement approach. The performance parameters, like processing time, reaction time, runtime, correlation coefficient analysis, entropy analysis, mean square error, and availability are used to determine the efficacy of the proposed BC-SIE-HAPCNN-FODCE approach. The performance of the proposed technique attains 18.81%, 32.05%, and 22.28% higher correlation coefficient and 25.38%, 20.81%, and 26.04% higher entropy compared with existing methods, such as Multiple Rossler lightweight Logistic sine mapping dependent Federated convolutional method with cyber blockchain in medical image encryption (BC-SIE-FCAL-MRLLSM), color image encryption under Hénon-zigzag map with chaotic restricted Boltzmann machine over Blockchain (BC-SIE-CRBM-HZM) and blockchain-assisted safe picture transmission along detection method on Internet of Medical Things Environment (BC-SIE-ECC-DBN), respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142641364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1