首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
Enhanced Cooperative Compressive Spectrum Sensing in Cognitive Radio Networks 认知无线电网络中的增强型合作压缩频谱传感
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-21 DOI: 10.1002/ett.70000
Hadj Abdelkader Benzater, Djamal Teguig, Nacerredine Lassami

The demand for bandwidth in cognitive radio networks (CRNs) is growing as applications become increasingly data intensive. Techniques such as compressed spectrum sensing (CSS) and cooperative spectrum sensing (C-SS) are employed to address this challenge. C-SS enhances overall detection accuracy and reliability by enabling multiple nodes to share and combine their local sensing data. Conversely, CSS effectively reduces the required information for spectrum usage decision making, thereby improving bandwidth utilization. Integrating these two methods allows CRNs to utilize the spectrum reliably and efficiently, leading to increased spectral efficiency. To further improve reconstruction performance, we leverage the sparsity concept to transcend hardware constraints and merge restrictions from both real and synthesized channels. This approach involves the virtual synthesis of channels, which linearly enhances the signal-to-noise ratio (SNR) within the network's size range. Simulation results demonstrate that our proposed method offers significant advantages over single-node recovery, as validated by simulations and software defined radio (SDR) Implementation. The integration of spectral estimations from various local CR detectors enhances spatial diversity gain and sensing quality, particularly in fading channels. Compared to traditional approaches, our method achieves superior performance, evidenced by an increase in (from 93.97% to 96.52%) with almost the same .

随着应用的数据密集度越来越高,认知无线电网络(CRN)对带宽的需求也越来越大。压缩频谱传感(CSS)和合作频谱传感(C-SS)等技术被用来应对这一挑战。C-SS 可使多个节点共享和组合其本地传感数据,从而提高整体检测精度和可靠性。相反,CSS 可有效减少频谱使用决策所需的信息,从而提高带宽利用率。综合这两种方法,CRN 可以可靠、高效地利用频谱,从而提高频谱效率。为了进一步提高重构性能,我们利用稀疏性概念来超越硬件限制,合并来自真实信道和合成信道的限制。这种方法涉及信道的虚拟合成,可在网络规模范围内线性提高信噪比(SNR)。仿真结果表明,与单节点恢复相比,我们提出的方法具有显著优势,仿真和软件定义无线电(SDR)实施验证了这一点。整合来自不同本地 CR 探测器的频谱估计可提高空间分集增益和传感质量,尤其是在衰落信道中。与传统方法相比,我们的方法实现了更优越的性能,具体表现为在几乎相同的.NET信道条件下,我们的信道恢复率从93.97%提高到96.52%。
{"title":"Enhanced Cooperative Compressive Spectrum Sensing in Cognitive Radio Networks","authors":"Hadj Abdelkader Benzater,&nbsp;Djamal Teguig,&nbsp;Nacerredine Lassami","doi":"10.1002/ett.70000","DOIUrl":"https://doi.org/10.1002/ett.70000","url":null,"abstract":"<div>\u0000 \u0000 <p>The demand for bandwidth in cognitive radio networks (CRNs) is growing as applications become increasingly data intensive. Techniques such as compressed spectrum sensing (CSS) and cooperative spectrum sensing (C-SS) are employed to address this challenge. C-SS enhances overall detection accuracy and reliability by enabling multiple nodes to share and combine their local sensing data. Conversely, CSS effectively reduces the required information for spectrum usage decision making, thereby improving bandwidth utilization. Integrating these two methods allows CRNs to utilize the spectrum reliably and efficiently, leading to increased spectral efficiency. To further improve reconstruction performance, we leverage the sparsity concept to transcend hardware constraints and merge restrictions from both real and synthesized channels. This approach involves the virtual synthesis of channels, which linearly enhances the signal-to-noise ratio (SNR) within the network's size range. Simulation results demonstrate that our proposed method offers significant advantages over single-node recovery, as validated by simulations and software defined radio (SDR) Implementation. The integration of spectral estimations from various local CR detectors enhances spatial diversity gain and sensing quality, particularly in fading channels. Compared to traditional approaches, our method achieves superior performance, evidenced by an increase in <span></span><math></math> (from 93.97% to 96.52%) with almost the same <span></span><math></math>.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to “Optimized LightGBM Model for Security and Privacy Issues in Cyber-Physical Systems” 对 "针对网络物理系统安全和隐私问题的优化 LightGBM 模型 "的更正
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-21 DOI: 10.1002/ett.5059

Dalal, S, Poongodi, M, Lilhore, UK, et al. Optimized LightGBM model for security and privacy issues in cyber-physical systems. Trans Emerging Tel Tech. 2023; 34(6):e4771. https://doi.org/10.1002/ett.4771.

The affiliation of Sultan Mesfer Aldossary is not correct. The correct affiliation is below.

Department of Computer Sciences, College of Arts and Sciences, Prince Sattam Bin Abdulaziz University, Wadi Aldawaser 18 411, Saudi Arabia.

We apologize for this error.

Dalal,S,Poongodi,M,Lilhore,UK,et al.Trans Emerging Tel Tech. 2023; 34(6):e4771. https://doi.org/10.1002/ett.4771.The Sultan Mesfer Aldossary 的所属单位不正确。正确的单位如下:Department of Computer Sciences, College of Arts and Sciences, Prince Sattam Bin Abdulaziz University, Wadi Aldawaser 18 411, Saudi Arabia.We apologize for this error.
{"title":"Correction to “Optimized LightGBM Model for Security and Privacy Issues in Cyber-Physical Systems”","authors":"","doi":"10.1002/ett.5059","DOIUrl":"https://doi.org/10.1002/ett.5059","url":null,"abstract":"<p> <span>Dalal, S</span>, <span>Poongodi, M</span>, <span>Lilhore, UK</span>, et al. <span>Optimized LightGBM model for security and privacy issues in cyber-physical systems</span>. <i>Trans Emerging Tel Tech</i>. <span>2023</span>; <span>34</span>(<span>6</span>):e4771. https://doi.org/10.1002/ett.4771.</p><p>The affiliation of Sultan Mesfer Aldossary is not correct. The correct affiliation is below.</p><p>Department of Computer Sciences, College of Arts and Sciences, Prince Sattam Bin Abdulaziz University, Wadi Aldawaser 18 411, Saudi Arabia.</p><p>We apologize for this error.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5059","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Free Space Optical System Over Inverse Gaussian Gamma Turbulence Channel 反高斯伽马湍流信道上的自由空间光学系统性能分析
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-21 DOI: 10.1002/ett.70009
Rekha Rani, N. Jayanthi, Anup K. Mandpura

Free space optical (FSO) communication is a proficient technology with potential applications in the next generation of wireless communication. This article evaluates the performance of the FSO system under inverse Gaussian gamma (IGG) fading. A novel closed-form equation for the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) is presented by employing an intensity modulation/direct detection (IM/DD) scheme. The analytical expressions for various performance metrics such as outage probability (OP), amount of fading (AOF), and average bit error probability (ABEP) are derived for various digital modulation schemes based on the system's probability density function (PDF) and CDF. Additionally, this article presents an upper bound on OP and asymptotic analysis for the performance metrics to gain deeper insights. It is revealed that the small-scale eddy turbulence parameter can affect the diversity order by a factor of β/2. The results demonstrate that atmospheric turbulence considerably reduces the system's performance. Finally, Monte-Carlo simulation is performed to ascertain the correctness of the derived mathematical expressions.

自由空间光学(FSO)通信是一种成熟的技术,在下一代无线通信中具有潜在的应用价值。本文评估了 FSO 系统在反高斯伽马(IGG)衰减下的性能。通过采用强度调制/直接检测(IM/DD)方案,提出了接收信噪比(SNR)累积分布函数(CDF)的新型闭式方程。根据系统的概率密度函数 (PDF) 和 CDF,推导出了各种数字调制方案的各种性能指标的解析表达式,如中断概率 (OP)、衰减量 (AOF) 和平均比特误差概率 (ABEP)。此外,本文还提出了 OP 的上界,并对性能指标进行了渐近分析,以获得更深入的见解。研究发现,小尺度涡流湍流参数会以 β/2 的系数影响分集阶。结果表明,大气湍流大大降低了系统的性能。最后,进行了蒙特卡洛模拟,以确定推导出的数学表达式的正确性。
{"title":"Performance Analysis of Free Space Optical System Over Inverse Gaussian Gamma Turbulence Channel","authors":"Rekha Rani,&nbsp;N. Jayanthi,&nbsp;Anup K. Mandpura","doi":"10.1002/ett.70009","DOIUrl":"https://doi.org/10.1002/ett.70009","url":null,"abstract":"<div>\u0000 \u0000 <p>Free space optical (FSO) communication is a proficient technology with potential applications in the next generation of wireless communication. This article evaluates the performance of the FSO system under inverse Gaussian gamma (IGG) fading. A novel closed-form equation for the cumulative distribution function (CDF) of the received signal-to-noise ratio (SNR) is presented by employing an intensity modulation/direct detection (IM/DD) scheme. The analytical expressions for various performance metrics such as outage probability (OP), amount of fading (AOF), and average bit error probability (ABEP) are derived for various digital modulation schemes based on the system's probability density function (PDF) and CDF. Additionally, this article presents an upper bound on OP and asymptotic analysis for the performance metrics to gain deeper insights. It is revealed that the small-scale eddy turbulence parameter can affect the diversity order by a factor of <i>β</i>/2. The results demonstrate that atmospheric turbulence considerably reduces the system's performance. Finally, Monte-Carlo simulation is performed to ascertain the correctness of the derived mathematical expressions.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies 揭开僵尸网络的面纱:关于不断演变的威胁和防御策略的全面调查
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-20 DOI: 10.1002/ett.5056
Mehdi Asadi, Mohammad Ali Jabraeil Jamali, Arash Heidari, Nima Jafari Navimipour

Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively.

僵尸网络已成为一种重大的互联网安全威胁,它由指挥与控制(C&C)服务器控制下的被入侵计算机网络组成。这些恶意实体可以实施一系列恶意活动,从拒绝服务(DoS)攻击到垃圾邮件分发和网络钓鱼。每个僵尸在易受攻击的主机上作为恶意二进制代码运行,向攻击者授予远程控制权,攻击者可以利用这些受攻击主机的综合处理能力,在保持匿名的情况下进行同步的高破坏性攻击。本调查探讨了僵尸网络及其演变,涉及僵尸网络的生命周期、C&C 模型、僵尸网络通信协议、检测方法、僵尸网络运行的独特环境以及躲避检测工具的策略等方面。它分析了与僵尸网络有关的研究挑战和未来方向,特别关注规避和检测技术,包括加密和使用隐蔽渠道进行检测和强化僵尸网络等方法。通过回顾现有研究,本调查报告全面概述了僵尸网络,从僵尸网络的起源到僵尸网络不断演变的策略,并评估了僵尸网络如何逃避检测以及如何应对僵尸网络的活动。调查的主要目的是让研究界了解僵尸网络不断变化的情况以及应对这些威胁所面临的挑战,通过强调规避和检测方法,为有效解决安全问题提供指导。调查报告最后提出了未来的研究方向,包括使用加密和隐蔽渠道进行检测,以及加强僵尸网络的策略。这旨在指导研究人员开发更强大的安全措施,有效打击僵尸网络。
{"title":"Botnets Unveiled: A Comprehensive Survey on Evolving Threats and Defense Strategies","authors":"Mehdi Asadi,&nbsp;Mohammad Ali Jabraeil Jamali,&nbsp;Arash Heidari,&nbsp;Nima Jafari Navimipour","doi":"10.1002/ett.5056","DOIUrl":"https://doi.org/10.1002/ett.5056","url":null,"abstract":"<div>\u0000 \u0000 <p>Botnets have emerged as a significant internet security threat, comprising networks of compromised computers under the control of command and control (C&amp;C) servers. These malevolent entities enable a range of malicious activities, from denial of service (DoS) attacks to spam distribution and phishing. Each bot operates as a malicious binary code on vulnerable hosts, granting remote control to attackers who can harness the combined processing power of these compromised hosts for synchronized, highly destructive attacks while maintaining anonymity. This survey explores botnets and their evolution, covering aspects such as their life cycles, C&amp;C models, botnet communication protocols, detection methods, the unique environments botnets operate in, and strategies to evade detection tools. It analyzes research challenges and future directions related to botnets, with a particular focus on evasion and detection techniques, including methods like encryption and the use of covert channels for detection and the reinforcement of botnets. By reviewing existing research, the survey provides a comprehensive overview of botnets, from their origins to their evolving tactics, and evaluates how botnets evade detection and how to counteract their activities. Its primary goal is to inform the research community about the changing landscape of botnets and the challenges in combating these threats, offering guidance on addressing security concerns effectively through the highlighting of evasion and detection methods. The survey concludes by presenting future research directions, including using encryption and covert channels for detection and strategies to strengthen botnets. This aims to guide researchers in developing more robust security measures to combat botnets effectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 11","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142524728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip 返回:利用基于多优先级的迭代循环匹配和滑动设计与实现片上网络路由器
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5043

RETRACTION: S. Singh, J. V. R. Ravindra, and B. R. Naik, “ Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip,” Transactions on Emerging Telecommunications Technologies (Early View): doi:10.1002/ett.4514.

The above article, published online on 22 April 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes, and was found to be out of the scope of the special issue. Therefore, the decision to retract this article was taken.

撤回:S. Singh、J. V. R. Ravindra 和 B. R. Naik,"使用基于多优先级的迭代轮循匹配与滑动设计和实现片上网络路由器",《新兴电信技术期刊》(早期刊物):doi:10.1002/ett.4514。.上述文章于 2022 年 4 月 22 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编徐长桥和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被录用完全是基于编辑处理和同行评审过程中的妥协,并被发现超出了特刊的范围。因此,决定撤回这篇文章。
{"title":"RETRACTION: Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip","authors":"","doi":"10.1002/ett.5043","DOIUrl":"https://doi.org/10.1002/ett.5043","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>S. Singh</span>, <span>J. V. R. Ravindra</span>, and <span>B. R. Naik</span>, “ <span>Design and Implementation of Network-on-chip Router Using Multi-priority Based Iterative Round-robin Matching With Slip</span>,” <i>Transactions on Emerging Telecommunications Technologies</i> (Early View): doi:10.1002/ett.4514.</p><p>The above article, published online on 22 April 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes, and was found to be out of the scope of the special issue. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5043","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications RETRACTION:基于物联网的智能应用的轻量级访问管理方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5046

RETRACTION: A. Saad, A. Shalaby, and A. A. Mohamed, “ A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4600.

The above article, published online on 17 July 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Mohamed, on behalf of the authors, disagrees with this decision.

撤回:A. Saad, A. Shalaby, and A. A. Mohamed, " A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications," Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4600.The above article, published online on 17 July 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. "上述文章于2022年7月17日在线发表于威利在线图书馆(wileyonlinelibrary.com)。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被接受的唯一依据是编辑处理和同行评审过程中存在的纰漏。此外,作为同一特刊的一部分提交的几篇文章,包括这篇文章在内,在概念和风格上都表现出异常高的相似度。因此,我们决定撤回这篇文章。已将撤稿决定通知作者,穆罕默德博士代表作者表示不同意撤稿决定。
{"title":"RETRACTION: A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications","authors":"","doi":"10.1002/ett.5046","DOIUrl":"https://doi.org/10.1002/ett.5046","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>A. Saad</span>, <span>A. Shalaby</span>, and <span>A. A. Mohamed</span>, “ <span>A Lightweight Access Management Scheme for the Internet of Things Based Smart Applications</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4600.</p><p>The above article, published online on 17 July 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Mohamed, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5046","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition RETRACTION:基于激活的递归学习方法,用于人类活动识别中的可穿戴传感器数据处理
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5053

RETRACTION: C.-H. Hsu, H. Wu, W. Lin, A. Kobusinska, and F. Xia, “ Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4682.

The above article, published online on 11 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.

retraction: C.-H.Hsu, H. Wu, W. Lin, A. Kobusinska, and F. Xia, " Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition," Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4682.上述文章于 2022 年 11 月 11 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编徐长桥和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被接受的唯一依据是编辑处理和同行评审过程中存在的纰漏。此外,作为同一特刊的一部分提交的几篇文章,包括这篇文章在内,在概念和风格上都表现出异常高的相似度。因此,决定撤回这篇文章。
{"title":"RETRACTION: Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition","authors":"","doi":"10.1002/ett.5053","DOIUrl":"https://doi.org/10.1002/ett.5053","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>C.-H. Hsu</span>, <span>H. Wu</span>, <span>W. Lin</span>, <span>A. Kobusinska</span>, and <span>F. Xia</span>, “ <span>Activation-based Recurrent Learning Method for Wearable Sensor Data Processing in Human Activity Recognition</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4682.</p><p>The above article, published online on 11 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5053","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks 返回:稳定路由的数据定位集成:无线传感器网络中的稳定和优化数据传输
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5049

RETRACTION: A. Gayathri, D. Ruby, N. Manikandan, T. Gopalakrishnan, K. Anusha, and P. Narayanasamy, “ Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4627.

The above article, published online on 22 August 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Ruby, on behalf of the authors, disagrees with this decision.

转载请注明:A. Gayathri、D. Ruby、N. Manikandan、T. Gopalakrishnan、K. Anusha 和 P. Narayanasamy," Data Location Integration With Stable Routing:上述文章于 2022 年 8 月 22 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编 Changqiao Xu 和 John Wiley & Sons Ltd.同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,杂志社注意到,该文章被录用完全是基于编辑处理和同行评审过程中的不当之处。此外,该稿件中的部分实验方法缺乏足够的细节,无法解释和重现研究结果。因此,决定撤回这篇文章。作者已被告知撤稿决定,鲁比博士代表作者对此决定表示异议。
{"title":"RETRACTION: Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks","authors":"","doi":"10.1002/ett.5049","DOIUrl":"https://doi.org/10.1002/ett.5049","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>A. Gayathri</span>, <span>D. Ruby</span>, <span>N. Manikandan</span>, <span>T. Gopalakrishnan</span>, <span>K. Anusha</span>, and <span>P. Narayanasamy</span>, “ <span>Data Location Integration With Stable Routing: Stable and Optimal Data Transmission in Wireless Sensor Networks</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4627.</p><p>The above article, published online on 22 August 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Ruby, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5049","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Improving Mobile Cloud Computing Service Efficiency Using Energy Competent and Federated Learning Process 返回:利用能源胜任能力和联合学习过程提高移动云计算服务效率
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5050

RETRACTION: M. Thirunavukkarasu, and P. Shanmugapriya, “ Improving Mobile Cloud Computing Service Efficiency Using Energy Competent And Federated Learning Process,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4643.

The above article, published online on 8 September 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.

撤稿:M. Thirunavukkarasu 和 P. Shanmugapriya," Improving Mobile Cloud Computing Service Efficiency Using Energy Competent And Federated Learning Process," Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4643.上述文章于 2022 年 9 月 8 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编徐长桥和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被接受的唯一依据是编辑处理和同行评审过程中存在的纰漏。此外,作为同一特刊的一部分提交的几篇文章,包括这篇文章在内,在概念和风格上都表现出异常高的相似度。因此,决定撤回这篇文章。
{"title":"RETRACTION: Improving Mobile Cloud Computing Service Efficiency Using Energy Competent and Federated Learning Process","authors":"","doi":"10.1002/ett.5050","DOIUrl":"https://doi.org/10.1002/ett.5050","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Thirunavukkarasu</span>, and <span>P. Shanmugapriya</span>, “ <span>Improving Mobile Cloud Computing Service Efficiency Using Energy Competent And Federated Learning Process</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4643.</p><p>The above article, published online on 8 September 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5050","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems RETRACTION:基于多目标元启发式优化的聚类与网络切片技术,用于 5G 系统中的物联网无线传感器网络
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5048

RETRACTION: B. G. Sheena, and N. Snehalatha, “ Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems,” Trans Emerg Telecommun Technol 34, no. 8 (2023): e4626, 10.1002/ett.4626.

The above article, published online on 22 August 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Finally, some scientific statements in this manuscript are not sufficiently supported by references to the literature. Therefore, the decision to retract this article was taken.

撤稿:B. G. Sheena 和 N. Snehalatha,《基于多目标元启发式优化的5G系统中物联网无线传感器网络的网络切片技术聚类》,《新兴电信技术》(Trans Emerg Telecommun Technol)34,第8期(2023年):e4626,10.1002/ett.4626.上述文章于 2022 年 8 月 22 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编 Changqiao Xu 和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)协商,该文章已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被接受的唯一依据是编辑处理和同行评审过程中存在的纰漏。此外,作为同一特刊的一部分提交的几篇文章,包括这篇文章在内,在概念和风格上都表现出异常高的相似度。最后,这篇稿件中的一些科学论述没有充分的参考文献支持。因此,我们决定撤回这篇文章。
{"title":"RETRACTION: Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems","authors":"","doi":"10.1002/ett.5048","DOIUrl":"https://doi.org/10.1002/ett.5048","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>B. G. Sheena</span>, and <span>N. Snehalatha</span>, “ <span>Multi-objective Metaheuristic Optimization-based Clustering With Network Slicing Technique for Internet of Things-enabled Wireless Sensor Networks in 5G Systems</span>,” <i>Trans Emerg Telecommun Technol</i> <span>34</span>, no. <span>8</span> (<span>2023</span>): e4626, 10.1002/ett.4626.</p><p>The above article, published online on 22 August 2022 in Wiley Online Library (\u0000wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Finally, some scientific statements in this manuscript are not sufficiently supported by references to the literature. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5048","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1