首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
RETRACTION: Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins RETRACTION:基于智能控制的数字双胞胎动态流量调度优化
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5044

RETRACTION: Z. Chang, W. Yang, J. Guo, and Y. Cheng, “ Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4516.

The above article, published online on 3 May 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes, and was found to be out of the scope of the special issue. Therefore, the decision to retract this article was taken.

撤回:Z. Chang、W. Yang、J. Guo 和 Y. Cheng,"基于数字双胞胎智能控制的动态流量调度优化",Trans Emerg Telecommun Technol(Early View):doi:10.1002/ett.4516。.上述文章于 2022 年 5 月 3 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编徐长桥和 John Wiley & Sons Ltd.同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被录用完全是基于编辑处理和同行评审过程中的妥协,并被发现超出了特刊的范围。因此,决定撤回这篇文章。
{"title":"RETRACTION: Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins","authors":"","doi":"10.1002/ett.5044","DOIUrl":"https://doi.org/10.1002/ett.5044","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>Z. Chang</span>, <span>W. Yang</span>, <span>J. Guo</span>, and <span>Y. Cheng</span>, “ <span>Dynamic Flow Scheduling Optimization Based on Intelligent Control for Digital Twins</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4516.</p><p>The above article, published online on 3 May 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes, and was found to be out of the scope of the special issue. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5044","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Wireless Communication Channel Modeling Using Machine Learning 返回:利用机器学习进行无线通信信道建模
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5051

RETRACTION: M. Kamruzzaman, M. A. Hossin, I. Alrashdi, S. Alanazi, M. Alruwaili, N. Alshammari, S. Elaiwat, and R. Zaman, “ Wireless Communication Channel Modeling Using Machine Learning,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4661.

The above article, published online on 5 October 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken.

撤回:M. Kamruzzaman、M. A. Hossin、I. Alrashdi、S. Alanazi、M. Alruwaili、N. Alshammari、S. Elaiwat 和 R. Zaman,《使用机器学习的无线通信信道建模》,Trans Emerg Telecommun Technol (Early View):doi:10.1002/ett.4661。.上述文章于 2022 年 10 月 5 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编 Changqiao Xu 和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,杂志社注意到,文章被接受的唯一依据是编辑处理和同行评审程序有问题。此外,该稿件中的部分实验方法缺乏足够的细节,无法解释和重现研究结果。因此,决定撤回这篇文章。
{"title":"RETRACTION: Wireless Communication Channel Modeling Using Machine Learning","authors":"","doi":"10.1002/ett.5051","DOIUrl":"https://doi.org/10.1002/ett.5051","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Kamruzzaman</span>, <span>M. A. Hossin</span>, <span>I. Alrashdi</span>, <span>S. Alanazi</span>, <span>M. Alruwaili</span>, <span>N. Alshammari</span>, <span>S. Elaiwat</span>, and <span>R. Zaman</span>, “ <span>Wireless Communication Channel Modeling Using Machine Learning</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4661.</p><p>The above article, published online on 5 October 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5051","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Affirmative Data Analytics Based Data Processing Method for 6G Wireless Network Applications 返回:基于肯定式数据分析的数据处理方法,用于 6G 无线网络应用
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5045

RETRACTION: M. Jarrah, A. Abu-Khadrah, H. Alrababah, A. S. B. M. Jaya, and Z. N. M. Alqattan, “ Affirmative Data Analytics Based Data Processing Method for 6G Wireless Network Applications,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4583.

The above article, published online on 21 June 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Jarrah, on behalf of the authors, disagrees with this decision.

撤回:M. Jarrah、A. Abu-Khadrah、H. Alrababah、A. S. B. M. Jaya 和 Z. N. M. Alqattan,"基于肯定数据分析的 6G 无线网络应用数据处理方法",Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4583.上述文章于 2022 年 6 月 21 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编 Changqiao Xu 和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)协商,该文章已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被接受的唯一依据是编辑处理和同行评审过程中存在的纰漏。此外,作为同一特刊的一部分提交的几篇文章,包括这篇文章在内,在概念和风格上都表现出异常高的相似度。因此,我们决定撤回这篇文章。作者已被告知撤稿决定,而 Jarrah 博士则代表作者表示不同意这一决定。
{"title":"RETRACTION: Affirmative Data Analytics Based Data Processing Method for 6G Wireless Network Applications","authors":"","doi":"10.1002/ett.5045","DOIUrl":"https://doi.org/10.1002/ett.5045","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Jarrah</span>, <span>A. Abu-Khadrah</span>, <span>H. Alrababah</span>, <span>A. S. B. M. Jaya</span>, and <span>Z. N. M. Alqattan</span>, “ <span>Affirmative Data Analytics Based Data Processing Method for 6G Wireless Network Applications</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4583.</p><p>The above article, published online on 21 June 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, several articles, this one included, submitted as part of the same special issue exhibited an unusually high degree of similarity in both concept and style. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Jarrah, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5045","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Artificial Intelligence Framework-based Ultra-lightweight Communication Protocol for Prediction of Attacks in Internet of Things Environment RETRACTION:基于人工智能框架的超轻量级通信协议,用于预测物联网环境中的攻击行为
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5052

RETRACTION: M. Jammula, V. M. Vakamulla, and S. K. Kondoju, “ Artificial Intelligence Framework-based Ultra-lightweight Communication Protocol for Prediction of Attacks in Internet of Things Environment,” Trans Emerg Telecommun Technol 34, no. 1 (2023): e4680, doi:10.1002/ett.4680.

The above article, published online on 15 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, Figure 3 was found to have been sourced from a previous publication without clear attribution, and has been presented as a novel protocol. Therefore, the decision to retract this article was taken.

撤回:M. Jammula、V. M. Vakamulla 和 S. K. Kondoju,"基于人工智能框架的超轻量级通信协议用于预测物联网环境中的攻击",Trans Emerg Telecommun Technol 34,no. 1 (2023):e4680,doi:10.1002/ett.4680。.上述文章于 2022 年 11 月 15 日在线发表于《威利在线图书馆》(wileyonlinelibrary.com),经期刊主编徐长桥和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,杂志社注意到,文章被录用完全是基于编辑处理和同行评审过程中的不当之处。此外,还发现图 3 源自以前的一篇出版物,没有明确注明出处,并被作为一种新的方案提出。因此,决定撤回这篇文章。
{"title":"RETRACTION: Artificial Intelligence Framework-based Ultra-lightweight Communication Protocol for Prediction of Attacks in Internet of Things Environment","authors":"","doi":"10.1002/ett.5052","DOIUrl":"https://doi.org/10.1002/ett.5052","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Jammula</span>, <span>V. M. Vakamulla</span>, and <span>S. K. Kondoju</span>, “ <span>Artificial Intelligence Framework-based Ultra-lightweight Communication Protocol for Prediction of Attacks in Internet of Things Environment</span>,” <i>Trans Emerg Telecommun Technol</i> <span>34</span>, no. <span>1</span> (<span>2023</span>): e4680, doi:10.1002/ett.4680.</p><p>The above article, published online on 15 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, Figure 3 was found to have been sourced from a previous publication without clear attribution, and has been presented as a novel protocol. Therefore, the decision to retract this article was taken.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5052","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RETRACTION: Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol 返回:基于奥特威-里斯协议近场通信的物联网安全框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-09 DOI: 10.1002/ett.5054

RETRACTION: M. Musa Jaber, S. Yussof, M. H. Ali, S. Khalil Abd, M. M. Jassim, and A. Alkhayyat, “ Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol,” Trans Emerg Telecommun Technol (Early View): doi:10.1002/ett.4684.

The above article, published online on 13 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley & Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, the authors included irrelevant references in this article, leaving several scientific claims inadequately supported by the literature. Finally, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Musa Jaber, on behalf of the authors, disagrees with this decision.

撤回:M. Musa Jaber、S. Yussof、M. H. Ali、S. Khalil Abd、M. M. Jassim 和 A. Alkhayyat,"基于近场通信与奥特维里斯协议的物联网安全框架",Trans Emerg Telecommun Technol (Early View):doi:10.1002/ett.4684.上述文章于 2022 年 11 月 13 日在线发表于 Wiley Online Library (wileyonlinelibrary.com),经期刊主编 Changqiao Xu 和 John Wiley & Sons Ltd.(约翰-威利父子有限公司)同意,已被撤回。这篇文章是作为特邀编辑特刊的一部分提交的。文章发表后,本刊注意到,该文章被录用完全是基于编辑处理和同行评审过程中的不当之处。此外,作者还在这篇文章中加入了不相关的参考文献,使得一些科学主张得不到文献的充分支持。最后,该稿件中的部分实验方法缺乏足够的细节来解释和复制研究结果。因此,我们决定撤回这篇文章。穆萨-贾比尔博士代表作者表示不同意这一决定。
{"title":"RETRACTION: Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol","authors":"","doi":"10.1002/ett.5054","DOIUrl":"https://doi.org/10.1002/ett.5054","url":null,"abstract":"<p>\u0000 <b>RETRACTION</b>: <span>M. Musa Jaber</span>, <span>S. Yussof</span>, <span>M. H. Ali</span>, <span>S. Khalil Abd</span>, <span>M. M. Jassim</span>, and <span>A. Alkhayyat</span>, “ <span>Internet of Things Security Framework Based on Near Field Communication With Otway Rees Protocol</span>,” <i>Trans Emerg Telecommun Technol</i> (Early View): doi:10.1002/ett.4684.</p><p>The above article, published online on 13 November 2022 in Wiley Online Library (wileyonlinelibrary.com), has been retracted by agreement between the journal Editor-in-Chief, Changqiao Xu; and John Wiley &amp; Sons Ltd. The article was submitted as part of a guest-edited special issue. Following publication, it has come to the attention of the journal that the article was accepted solely on the basis of compromised editorial handling and peer review processes. Furthermore, the authors included irrelevant references in this article, leaving several scientific claims inadequately supported by the literature. Finally, parts of the experimental methods in this manuscript lack sufficient detail to interpret and reproduce the findings. Therefore, the decision to retract this article was taken. The authors have been informed of the retraction and Dr. Musa Jaber, on behalf of the authors, disagrees with this decision.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.5054","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment 雾环境中基于节能松鼠搜索的任务调度机制
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-07 DOI: 10.1002/ett.5057
Raj Mohan Singh, Geeta Sikka, Lalit Kumar Awasthi

The swift explosion of Internet of Things (IoT) devices in the past few years has resulted in a deluge of data that requires timely processing. However, transmitting such massive amounts of data in and out from cloud leads to high latency and network bandwidth. Consequently, the field of fog computing has turned out as a feasible platform for utilizing resources within the vicinity of IoT devices for providing services in a timely manner. The resource constrained trait of fog nodes demands judicious management of resources in satisfying the requirements of IoT applications. This makes energy efficiency a core issue in fog networks. This article addresses the issue of energy efficiency by proposing an energy conscious squirrel search algorithm (EcSSA) for scheduling tasks in fog environment. A salient feature of EcSSA lies in the novel objective function that aims to optimize the energy consumption by minimizing the cumulative active time of all nodes in the network. Simulation studies conducted as part of this work demonstrate that the proposed approach significantly improves average energy consumption, average makespan, and carbon dioxide emission rate in comparison to the existing algorithms.

过去几年中,物联网(IoT)设备的迅猛发展带来了大量需要及时处理的数据。然而,从云端进出传输如此大量的数据会导致高延迟和高网络带宽。因此,雾计算领域成为利用物联网设备附近资源及时提供服务的可行平台。雾节点的资源受限特性要求对资源进行明智的管理,以满足物联网应用的要求。这使得能效成为雾网络的核心问题。本文针对能效问题,提出了一种在雾环境中调度任务的节能松鼠搜索算法(EcSSA)。EcSSA 的一个显著特点在于其新颖的目标函数,旨在通过最小化网络中所有节点的累计活动时间来优化能耗。作为这项工作的一部分进行的仿真研究表明,与现有算法相比,所提出的方法显著改善了平均能耗、平均间隔时间和二氧化碳排放率。
{"title":"Energy Conscious Squirrel Search based Task Scheduling Mechanism in Fog Environment","authors":"Raj Mohan Singh,&nbsp;Geeta Sikka,&nbsp;Lalit Kumar Awasthi","doi":"10.1002/ett.5057","DOIUrl":"https://doi.org/10.1002/ett.5057","url":null,"abstract":"<div>\u0000 \u0000 <p>The swift explosion of Internet of Things (IoT) devices in the past few years has resulted in a deluge of data that requires timely processing. However, transmitting such massive amounts of data in and out from cloud leads to high latency and network bandwidth. Consequently, the field of fog computing has turned out as a feasible platform for utilizing resources within the vicinity of IoT devices for providing services in a timely manner. The resource constrained trait of fog nodes demands judicious management of resources in satisfying the requirements of IoT applications. This makes energy efficiency a core issue in fog networks. This article addresses the issue of energy efficiency by proposing an energy conscious squirrel search algorithm (EcSSA) for scheduling tasks in fog environment. A salient feature of EcSSA lies in the novel objective function that aims to optimize the energy consumption by minimizing the cumulative active time of all nodes in the network. Simulation studies conducted as part of this work demonstrate that the proposed approach significantly improves average energy consumption, average makespan, and carbon dioxide emission rate in comparison to the existing algorithms.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games 使用潜能博弈的基于隐私保护属性的实用车辆雾关键词搜索系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-10-06 DOI: 10.1002/ett.5042
Zahra Seyedi, Farhad Rahmati, Mohammad Ali

The growth of fog computing drives Internet of Things users to outsource data for services like storage and sharing. To ensure secure and efficient data search, extensive research has been conducted on searchable encryption, specifically attribute-based keyword search (ABKS). ABKS facilitates precise access control over encrypted data while maintaining search functionality. However, delegating complex search operations to fog nodes introduces challenges like latency limitations, compromised search results, and unauthorized occupation of server resources. In this manuscript, we propose a Time-Efficient Data Retrieval (TEDR) scheme to address these challenges. Our scheme incorporates two access policies, allowing data owners (DOs) and data users (DUs) to control data access and search queries. TEDR enables fog nodes to verify search queries before decryption, avoiding unnecessary decryption for invalid queries. We introduce a decentralized query submitting framework to allocate search queries among fog nodes, addressing redundancy concerns and latency issues. We analyze the decentralized query submitting game and classify it as a potential game, making it suitable for decentralized decision-making. We evaluate TEDR performance on real-world datasets, demonstrating practicality and efficiency. Our scheme reduces computational and communication costs by approximately 30% compared to existing methods.

雾计算的发展促使物联网用户为存储和共享等服务外包数据。为确保安全高效的数据搜索,人们对可搜索加密,特别是基于属性的关键字搜索(ABKS)进行了广泛研究。ABKS 既能对加密数据进行精确的访问控制,又能保持搜索功能。然而,将复杂的搜索操作委托给雾节点会带来各种挑战,如延迟限制、搜索结果受损和未经授权占用服务器资源等。在本手稿中,我们提出了一种省时数据检索(TEDR)方案来应对这些挑战。我们的方案包含两种访问策略,允许数据所有者(DO)和数据用户(DU)控制数据访问和搜索查询。TEDR 允许雾节点在解密前验证搜索查询,避免对无效查询进行不必要的解密。我们引入了分散式查询提交框架,在雾节点之间分配搜索查询,解决了冗余问题和延迟问题。我们分析了分散式查询提交博弈,并将其归类为潜在博弈,使其适用于分散式决策。我们在实际数据集上评估了 TEDR 的性能,证明了它的实用性和效率。与现有方法相比,我们的方案降低了约 30% 的计算和通信成本。
{"title":"A practical vehicular-fog-based privacy-preserving attribute-based keyword search system using potential games","authors":"Zahra Seyedi,&nbsp;Farhad Rahmati,&nbsp;Mohammad Ali","doi":"10.1002/ett.5042","DOIUrl":"https://doi.org/10.1002/ett.5042","url":null,"abstract":"<p>The growth of fog computing drives Internet of Things users to outsource data for services like storage and sharing. To ensure secure and efficient data search, extensive research has been conducted on searchable encryption, specifically attribute-based keyword search (ABKS). ABKS facilitates precise access control over encrypted data while maintaining search functionality. However, delegating complex search operations to fog nodes introduces challenges like latency limitations, compromised search results, and unauthorized occupation of server resources. In this manuscript, we propose a Time-Efficient Data Retrieval (TEDR) scheme to address these challenges. Our scheme incorporates two access policies, allowing data owners (DOs) and data users (DUs) to control data access and search queries. TEDR enables fog nodes to verify search queries before decryption, avoiding unnecessary decryption for invalid queries. We introduce a decentralized query submitting framework to allocate search queries among fog nodes, addressing redundancy concerns and latency issues. We analyze the decentralized query submitting game and classify it as a potential game, making it suitable for decentralized decision-making. We evaluate TEDR performance on real-world datasets, demonstrating practicality and efficiency. Our scheme reduces computational and communication costs by approximately 30% compared to existing methods.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-10-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142429436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Holistic learning and optimization scheme for wireless networks 无线网络的整体学习和优化方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-30 DOI: 10.1002/ett.5036
Arif Husen, Muhammad Hasanain Chaudary, Farooq Ahmad, Abid Sohail

Future networks are expected to use Artificial Intelligence and machine learning applications intensely. The primary focus of machine learning techniques will be on intelligent automation and decision-making based on information learned from network functions, resources, and users. The research community has studied several schemes for using machine learning in communications and networks in the last two decades. However, the schemes mainly focus on learning the state information of individual network functions and resources and performing their optimization in a standalone fashion. Recently, a study group from the International Telecommunication Union has outlined machine learning pipeline requirements. It addresses several aspects of machine learning operations, such as model selection, data sources, and action points. However, the mechanisms to define the state of network functions and resources for different network layers and domains are yet to be explored. Therefore, in addition to the above, specific studies are required for cross-layer and administrative domain knowledge sharing and holistic optimization. Without considering the holistic view, applying machine learning to optimizing individual functions and resources may result in nonoptimal and unexpected behaviors instead of having any positive effect. The need for global and deep holistic learning has recently been identified in the literature; however, no implementation of the above scheme has been studied or evaluated for networks. This article proposes a novel approach, implementing global and deep holistic learning in wireless networks toward fulfilling the requirements of future intelligent networks. It also proposes an objective function-based feature engineering for wireless networks. Experimental results of the proposed scheme show significant improvements in the network performance and accuracy of the machine learning models. Moreover, applications of transfer learning to base learners for network functions and resources can significantly expedite decision-making with reduced computational costs.

预计未来的网络将大量使用人工智能和机器学习应用。机器学习技术的主要重点将是根据从网络功能、资源和用户那里了解到的信息进行智能自动化和决策。在过去的二十年里,研究界已经研究了几种在通信和网络中使用机器学习的方案。不过,这些方案主要侧重于学习单个网络功能和资源的状态信息,并以独立的方式对其进行优化。最近,国际电信联盟的一个研究小组概述了机器学习管道的要求。它涉及机器学习操作的几个方面,如模型选择、数据源和行动点。然而,定义不同网络层和域的网络功能和资源状态的机制还有待探索。因此,除上述内容外,还需要对跨层和管理域知识共享和整体优化进行具体研究。如果不从整体角度考虑,将机器学习应用于优化单个功能和资源可能会导致非最佳和意想不到的行为,而不会产生任何积极影响。最近有文献指出了对全局和深度整体学习的需求,但还没有研究或评估过上述方案在网络中的实施情况。本文提出了一种新方法,在无线网络中实施全局和深度整体学习,以满足未来智能网络的要求。它还提出了一种基于目标函数的无线网络特征工程。所提方案的实验结果表明,网络性能和机器学习模型的准确性都有显著提高。此外,将迁移学习应用于网络功能和资源的基础学习器,可以大大加快决策速度,降低计算成本。
{"title":"Holistic learning and optimization scheme for wireless networks","authors":"Arif Husen,&nbsp;Muhammad Hasanain Chaudary,&nbsp;Farooq Ahmad,&nbsp;Abid Sohail","doi":"10.1002/ett.5036","DOIUrl":"https://doi.org/10.1002/ett.5036","url":null,"abstract":"<p>Future networks are expected to use Artificial Intelligence and machine learning applications intensely. The primary focus of machine learning techniques will be on intelligent automation and decision-making based on information learned from network functions, resources, and users. The research community has studied several schemes for using machine learning in communications and networks in the last two decades. However, the schemes mainly focus on learning the state information of individual network functions and resources and performing their optimization in a standalone fashion. Recently, a study group from the International Telecommunication Union has outlined machine learning pipeline requirements. It addresses several aspects of machine learning operations, such as model selection, data sources, and action points. However, the mechanisms to define the state of network functions and resources for different network layers and domains are yet to be explored. Therefore, in addition to the above, specific studies are required for cross-layer and administrative domain knowledge sharing and holistic optimization. Without considering the holistic view, applying machine learning to optimizing individual functions and resources may result in nonoptimal and unexpected behaviors instead of having any positive effect. The need for global and deep holistic learning has recently been identified in the literature; however, no implementation of the above scheme has been studied or evaluated for networks. This article proposes a novel approach, implementing global and deep holistic learning in wireless networks toward fulfilling the requirements of future intelligent networks. It also proposes an objective function-based feature engineering for wireless networks. Experimental results of the proposed scheme show significant improvements in the network performance and accuracy of the machine learning models. Moreover, applications of transfer learning to base learners for network functions and resources can significantly expedite decision-making with reduced computational costs.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks 合作式水下声学通信网络的鲁棒联合多资源分配算法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-29 DOI: 10.1002/ett.5038
Song Han, Aijia Li, Xiaotong Jiang, Xinbin Li, Zhixin Liu, Lei Yan, Tongwei Zhang

In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.

本文研究了一个联合中继选择、功率控制和时间分配问题,以最大化合作水下声学通信网络的能量效率。由于多种资源的强耦合性和水下声学通信场景的不确定性特征,联合优化问题充满挑战。针对这一问题,我们采用了最坏情况法,将原来的不确定问题转化为确定性问题。此外,我们还提出了基于块坐标下降的方法,将强耦合的多资源分配问题解耦为三个相对独立的子问题。多个资源的耦合被完全解耦,从而大大降低了求解难度。此外,考虑到分数目标函数的子问题仍然是非凸求解,因此提出了基于 Dinkelbach 的方法,将分数目标函数转化为减函数形式。最后,将中继选择子问题转化为整数编程问题,将时间分配子问题转化为线性编程问题,通过一些成熟的求解方法可以得到其最优解。功率分配问题被转化为一个凸优化问题,可用拉格朗日对偶法求解。最后,在所提出的迭代结构中,三个子问题交替求解,直至收敛。仿真结果表明了所提算法的效率和鲁棒性。
{"title":"Robust joint multiple resources allocation algorithm for cooperative underwater acoustic communication networks","authors":"Song Han,&nbsp;Aijia Li,&nbsp;Xiaotong Jiang,&nbsp;Xinbin Li,&nbsp;Zhixin Liu,&nbsp;Lei Yan,&nbsp;Tongwei Zhang","doi":"10.1002/ett.5038","DOIUrl":"https://doi.org/10.1002/ett.5038","url":null,"abstract":"<p>In this article, a joint relay selection, power control and time allocation problem is studied to maximize the energy efficiency for the cooperative underwater acoustic communication networks. The joint optimization problem is full of challenges due to the strong coupling of multiple resources and the uncertain characteristics of the underwater acoustic communication scenario. To address this issue, the worst-case method is employed to transform an original uncertain problem into a deterministic problem. Furthermore, we propose the block coordinate descent-based method to decouple the strongly coupling multi-resource allocation problem into three relatively independent sub-problems. The coupling of multiple resources is completely decoupled, thereby greatly reducing the solving difficulty. In addition, given that the sub-problems with the fractional objective function are still non-convex and hard to solve, the Dinkelbach-based method is proposed to transform the fractional objective function into a subtractive form. At last, the relay selection sub-problem is transformed into a integer programming problem, and the time allocation sub-problem is transformed into a linear programming problem, whose optimal solutions can be obtained by some well-established solution methods. The power allocation problem is transformed into a convex optimization problem, which can be solved by the Lagrangian dual method. Finally, in the proposed iteration structure, the three sub-problems are alternatingly solved until convergence. Simulation results are presented to demonstrate the efficiency and robustness of the proposed algorithm.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142359827","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine learning solutions for mobile internet of things security: A literature review and research agenda 移动物联网安全的机器学习解决方案:文献综述与研究议程
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-25 DOI: 10.1002/ett.5041
Hadjer Messabih, Chaker Abdelaziz Kerrache, Youssra Cheriguene, Marica Amadeo, Farhan Ahmad

In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.

近年来,无线技术和传感器网络的进步推动了移动物联网(MIoT)模式的发展。然而,MIoT 网络的独特性使其面临着巨大的安全漏洞和威胁,因此有必要采取强有力的网络安全措施,包括有效的攻击检测和缓解技术。在这些策略中,人工智能(AI),特别是基于机器学习(ML)的方法,成为加强 MIoT 安全的关键方法。在本文中,我们将对有关利用 ML 增强 MIoT 安全性的文献进行全面调查。通过对现有研究文章的详尽评述,我们分析了为保护 MIoT 生态系统而采用的各种基于 ML 的方法,并提供了对当前格局的整体理解,阐明了现有方法的优势和局限性。我们提出了一种结构化分类法,通过区分基于浅层监督学习(SSL)、浅层无监督学习(SUL)、深度学习(DL)和强化学习(RL)的方法,对该领域的最新研究成果进行分类。通过划分 MIoT 网络安全的现有挑战和潜在未来方向,我们旨在激发讨论,启发新方法,以实现更具弹性和更安全的 MIoT 生态系统。
{"title":"Machine learning solutions for mobile internet of things security: A literature review and research agenda","authors":"Hadjer Messabih,&nbsp;Chaker Abdelaziz Kerrache,&nbsp;Youssra Cheriguene,&nbsp;Marica Amadeo,&nbsp;Farhan Ahmad","doi":"10.1002/ett.5041","DOIUrl":"https://doi.org/10.1002/ett.5041","url":null,"abstract":"<p>In recent years, the advancements in wireless technologies and sensor networks have promoted the Mobile Internet of Things (MIoT) paradigm. However, the unique characteristics of MIoT networks expose them to significant security vulnerabilities and threats, necessitating robust cybersecurity measures, including effective attack detection and mitigation techniques. Among these strategies, Artificial Intelligence (AI), and particularly Machine Learning- (ML) based approaches, emerge as a pivotal method for bolstering MIoT security. In this paper, we present a comprehensive literature survey regarding the utilization of ML for enhancing security in MIoT. Through an exhaustive review of existing research articles, we analyze the diverse array of ML-based approaches employed to safeguard MIoT ecosystems and provide a holistic understanding of the current landscape, elucidating the strengths and limitations of prevailing methodologies. We propose a structured taxonomy to categorize recent works in this domain, by distinguishing approaches based on Shallow Supervised Learning (SSL), Shallow Unsupervised Learning (SUL), Deep Learning (DL), and Reinforcement Learning (RL). By delineating existing challenges and potential future directions for cybersecurity in MIoT, we aim to stimulate discourse and inspire novel approaches towards more resilient and secure MIoT ecosystems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142320612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1