首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications LBCSC:用于安全和保护隐私的车辆通信的基于格子的变色龙签名加密方案
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-19 DOI: 10.1002/ett.5040
Jianhong Zhang, Xinyan Cui

Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.

保证车辆的匿名性和传输信息的完整性是车载 ad-hoc 网络不可或缺的两个条件。匿名签名可以实现这两个功能。然而,基于传统密码系统构建的现有匿名签名方案无法抵御量子攻击。此外,在某些情况下,这些方案还需要满足签名的不可转移性,以解决公开验证签名导致的签名滥用问题。为了抵御量子攻击并解决签名滥用问题,本文提出了一种基于网格的变色龙签名加密方案,旨在保护车辆身份和数据安全。该方案可抵御量子攻击,并满足签名不可转移性、签名者可拒绝性和不可抵赖性。特别是,我们基于误差学习问题和经典晶格小整数解问题证明了所提出的方案在标准模型中是安全的。
{"title":"LBCSC: Lattice-based chameleon signcryption scheme for secure and privacy-preserving vehicular communications","authors":"Jianhong Zhang,&nbsp;Xinyan Cui","doi":"10.1002/ett.5040","DOIUrl":"https://doi.org/10.1002/ett.5040","url":null,"abstract":"<p>Guaranteeing the anonymity of the vehicle and the integrity of the transmitted message are two indispensable conditions in vehicular ad-hoc network. Anonymous signature can achieve the two function. However, existing anonymous signature schemes constructed based on traditional cryptosystems cannot withstand quantum attacks. In addition, in some cases, the schemes need to satisfy the non-transferability of signatures to solve the problem of signature misuse due to publicly verified signatures. In order to resist quantum attacks and address the problem of signature misuse, this article proposes a lattice-based chameleon signcryption scheme, which aims to protect vehicle identity and data security. The scheme is resistant to quantum attacks and satisfies signature non-transferability, signer rejectability and non-repudiation. Especially, we prove that the proposed scheme is secure in the Standard Model based on the error learning problem and the classical lattice small integer solution problem.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142273097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization 使用时间控制水母优化增强聚类分层算法的延迟敏感和能量自适应聚类分层协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-17 DOI: 10.1002/ett.5039
Atul Kumar Agnihotri, Vishal Awasthi

Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.

无线传感器网络具有传感功能,由具有处理和通信能力的小型传感器节点组成。然而,指定单个传感器节点作为簇头的传统方法往往会导致其能源耗尽速度快于其他节点。因此,在不同的传感器节点之间定期重新分配簇头角色对于延长运行寿命和确保持续性能至关重要。因此,本研究提出了一种基于低能耗自适应聚类层次结构(EAHALEACH)协议的增强聚类层次结构算法,并结合一种增强的时间控制优化算法,通过从候选池中选择最佳簇头来提高能效。所提出的方法通过优化选择簇头提高了能效,从而降低了能耗,延长了网络的寿命。此外,还引入了一种轻量级能量感知簇头轮换算法,在传感器节点网络内有效轮换簇头角色,最大限度地减少不必要的数据传输,延长网络寿命。载波感应和时分多址(CSTDMA)相结合的混合方法通过动态分配时隙、减少碰撞和争用来优化数据包转发,从而提高数据包转发效率。与现有技术的对比分析表明,基于混合聚类的 LEACH 协议在 2000 轮吞吐量 4600 bps、能耗 50 J、延迟 1 ms 以及第 1000 个节点的网络寿命达到 3500 s 等方面表现出色。这些进步有助于提高无线传感器网络部署的运行效率和持续性能。
{"title":"Delay sensitive and energy adaptive clustering hierarchy protocol using enhanced agglomerative hierarchy algorithm with time-controlled jellyfish optimization","authors":"Atul Kumar Agnihotri,&nbsp;Vishal Awasthi","doi":"10.1002/ett.5039","DOIUrl":"https://doi.org/10.1002/ett.5039","url":null,"abstract":"<p>Wireless sensor networks have sensing functions which made up of small sensor nodes that are processing and communication capabilities. However, the traditional approach of designating a single sensor node as the cluster head often leads to a faster depletion of its energy resources than another node. So, periodic reassignment of the cluster head role among different sensor nodes is crucial to extend operational lifetime and ensure sustained performance. Therefore, this research proposes an Enhanced Agglomerative Hierarchy Algorithm based on the Low Energy Adaptive Clustering Hierarchy (EAHALEACH) protocol, coupled with an enhanced time-controlled optimization algorithm, to enhance energy efficiency by selecting the optimal cluster head from a candidate pool. The proposed method enhances energy efficiency by optimally selecting cluster heads, which reduces energy consumption and extends the lifespan of the network. Additionally, a lightweight energy-aware cluster head rotation algorithm is introduced to efficiently rotate the cluster head role within the sensor node network, minimizing unnecessary data transmissions and extending the network lifetime. A hybrid approach combining Carrier Sense and Time Division Multiple Access (CSTDMA) optimizes packet forwarding by dynamically allocating time slots, reducing collisions and contention to improve packet forwarding efficiency. Comparative analysis with existing techniques demonstrates that the hybrid clustering-based LEACH protocol achieves superior performance in terms of throughput 4600 bps by 2000 rounds, energy consumption 50 J, latency as 1 ms and network lifetime in 1000th node attains 3500 s. These advancements contribute to prolonged operational efficiency and sustained performance in wireless sensor network deployments.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142244971","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing SKALP:用于露水辅助物联网边缘计算的安全密钥协议和轻量级协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-10 DOI: 10.1002/ett.5035
Saeed Ullah Jan, Anwar Ghani, Abdulrahman Alzahrani, Muhammad Usman Tariq, Fahad Algarni, Husnain Abbas Naqvi

The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.

物联网(IoT)是一项变革性技术,已被应用于自动化、物流、电网、交通、医疗保健等多个领域。在这些领域,物联网系统会产生大量数据,这些数据可以存储在云中。然而,在某些操作复杂、对延迟敏感的物联网应用中,云计算可能并不实用。为解决这一问题,人们引入了雾计算和边缘计算范例,但它们的正常运行依赖于可靠的互联网连接。露计算范例是一个新颖的概念,它允许在有或没有互联网连接的情况下,在物联网环境中执行各种应用。然而,在这样的环境中,如何确保数据在传输和存储过程中的保密性和完整性仍然是一个重大挑战。因此,一种万无一失且高效的安全机制仍有待提出。本研究介绍了一种利用椭圆曲线密码学和安全哈希算法来设计安全密钥协议和轻量级协议(SKALP)的协议。本研究利用 BAN(Burrows-Abadi-Needham)逻辑、ROM(Random Oracle Model)、RoR(Real-Or-Random)模型和 ProVerif(Protocol Verifier)模拟对 SKALP 的安全性进行了正式分析,同时对其进行了非正式讨论,以评估其对众所周知的攻击的抵抗能力。此外,SKALP 的性能分析还考虑了与通信和计算相关的成本。比较分析的结果表明,SKALP 比其竞争对手表现出更高的优越性。
{"title":"SKALP: Secure key agreement and lightweight protocol for dew-assisted IoT enabled edge computing","authors":"Saeed Ullah Jan,&nbsp;Anwar Ghani,&nbsp;Abdulrahman Alzahrani,&nbsp;Muhammad Usman Tariq,&nbsp;Fahad Algarni,&nbsp;Husnain Abbas Naqvi","doi":"10.1002/ett.5035","DOIUrl":"https://doi.org/10.1002/ett.5035","url":null,"abstract":"<p>The Internet of Things (IoT) is a transformative technology that has found applications in diverse domains, including automation, logistics, grid, transportation, healthcare, and more. In these domains, IoT systems generate a significant amount of data, which can be stored in a cloud. However, cloud computing may not be practical in certain delay-sensitive IoT applications with complex operations. To address this, fog and edge computing paradigms have been introduced, but they rely on a reliable internet connection for proper functioning. The dew computing paradigm, a novel concept, allows the execution of various applications in the IoT environment, with or without internet connectivity. However, ensuring data confidentiality and integrity during transmission and storage in such an environment remains a significant challenge. Therefore, a fail-safe and highly effective security mechanism is yet to be proposed. This study introduces a protocol that utilizes the elliptic curve cryptography and secure hash algorithm to design a secure key agreement and lightweight protocol (SKALP). SKALP security is formally analyzed using BAN (Burrows-Abadi-Needham) logic, ROM (Random Oracle Model), RoR (Real-Or-Random) model, and ProVerif (Protocol Verifier) simulation while informally discussing it to evaluate its resistance against well-known attacks. Additionally, the performance analysis of SKALP considers the costs associated with communication and computation. The findings from the comparative analysis indicate that the SKALP demonstrates a higher level of superiority than its competitors.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142169856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition RF-GCN:利用多模态的残差融合图卷积网络进行面部情绪识别
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-07 DOI: 10.1002/ett.5031
D. Vishnu Sakthi, P. Ezhumalai

Background

The emotional state of individuals is difficult to identify and it is developing now a days because of vast interest in recognition. Many technologies have been developed to identify this emotional expression based on facial expressions, vocal expressions, physiological signals, and body expressions. Among these, facial emotion is very expressive for recognition using multimodalities. Understanding facial emotions has applications in mental well-being, decision-making, and even social change, as emotions play a crucial role in our lives. This recognition is complicated by the high dimensionality of data and non-linear interactions across modalities. Moreover, the way emotion is expressed by people varies and these feature identification remains challenging, where these limitations are overcome by Deep learning models.

Methods

This research work aims at facial emotion recognition through the utilization of a deep learning model, named the proposed Residual Fused-Graph Convolution Network (RF-GCN). Here, multimodal data included is video as well as an Electroencephalogram (EEG) signal. Also, the Non-Local Means (NLM) filter is used for pre-processing input video frames. Here, the feature selection process is carried out using chi-square, after feature extraction, which is done in both pre-processed video frames and input EEG signals. Finally, facial emotion recognition and its types are determined by RF-GCN, which is a combination of both the Deep Residual Network (DRN) and Graph Convolutional Network (GCN).

Results

Further, RF-GCN is evaluated for performance by metrics such as accuracy, recall, and precision, with superior values of 91.6%, 96.5%, and 94.7%.

Conclusions

RF-GCN captures the nuanced relationships between different emotional states and improves recognition accuracy. The model is trained and evaluated on the dataset and reflects real-world conditions.

背景 个人的情绪状态很难识别,如今由于人们对识别的极大兴趣,这种技术正在不断发展。目前已开发出许多技术,可根据面部表情、声音表情、生理信号和肢体表情来识别这种情绪表达。其中,面部情绪对于使用多模态技术进行识别具有很强的表现力。由于情绪在我们的生活中起着至关重要的作用,因此了解面部情绪在心理健康、决策甚至社会变革方面都有应用。数据的高维度和跨模态的非线性交互使识别变得复杂。此外,人们表达情绪的方式各不相同,这些特征识别仍然具有挑战性,而深度学习模型可以克服这些限制。 方法 本研究工作旨在通过利用一种名为 "残差融合图卷积网络(RF-GCN)"的深度学习模型进行面部情绪识别。这里的多模态数据包括视频和脑电图(EEG)信号。此外,非局部均值(NLM)滤波器用于预处理输入视频帧。在这里,特征提取后的特征选择过程是在预处理过的视频帧和输入的脑电图信号中进行的。最后,面部情绪识别及其类型由 RF-GCN 确定,RF-GCN 是深度残差网络(DRN)和图卷积网络(GCN)的结合体。 结果 通过准确率、召回率和精确率等指标对 RF-GCN 的性能进行了进一步评估,结果显示 RF-GCN 的准确率、召回率和精确率分别达到 91.6%、96.5% 和 94.7%。 结论 RF-GCN 能够捕捉不同情绪状态之间的细微关系,提高识别准确率。该模型在数据集上进行了训练和评估,反映了真实世界的情况。
{"title":"RF-GCN: Residual fused-graph convolutional network using multimodalities for facial emotion recognition","authors":"D. Vishnu Sakthi,&nbsp;P. Ezhumalai","doi":"10.1002/ett.5031","DOIUrl":"https://doi.org/10.1002/ett.5031","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <h3> Background</h3>\u0000 \u0000 <p>The emotional state of individuals is difficult to identify and it is developing now a days because of vast interest in recognition. Many technologies have been developed to identify this emotional expression based on facial expressions, vocal expressions, physiological signals, and body expressions. Among these, facial emotion is very expressive for recognition using multimodalities. Understanding facial emotions has applications in mental well-being, decision-making, and even social change, as emotions play a crucial role in our lives. This recognition is complicated by the high dimensionality of data and non-linear interactions across modalities. Moreover, the way emotion is expressed by people varies and these feature identification remains challenging, where these limitations are overcome by Deep learning models.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Methods</h3>\u0000 \u0000 <p>This research work aims at facial emotion recognition through the utilization of a deep learning model, named the proposed Residual Fused-Graph Convolution Network (RF-GCN). Here, multimodal data included is video as well as an Electroencephalogram (EEG) signal. Also, the Non-Local Means (NLM) filter is used for pre-processing input video frames. Here, the feature selection process is carried out using chi-square, after feature extraction, which is done in both pre-processed video frames and input EEG signals. Finally, facial emotion recognition and its types are determined by RF-GCN, which is a combination of both the Deep Residual Network (DRN) and Graph Convolutional Network (GCN).</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Results</h3>\u0000 \u0000 <p>Further, RF-GCN is evaluated for performance by metrics such as accuracy, recall, and precision, with superior values of 91.6%, 96.5%, and 94.7%.</p>\u0000 </section>\u0000 \u0000 <section>\u0000 \u0000 <h3> Conclusions</h3>\u0000 \u0000 <p>RF-GCN captures the nuanced relationships between different emotional states and improves recognition accuracy. The model is trained and evaluated on the dataset and reflects real-world conditions.</p>\u0000 </section>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142152180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning 利用深度强化学习实现城域网云中的可靠信息传递和动态链路利用
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-09-04 DOI: 10.1002/ett.5028
Shuhong Kuang, Jiyong Zhang, Amin Mohajer

Modern networking demands efficient and reliable information delivery within Mobile Ad-hoc Network (MANET) and cloud environments. This paper introduces a novel approach that employs Multi-Agent Deep Learning (MADL) for adaptive resource allocation, addressing the challenges of optimizing traffic and ensuring dependable information delivery while adhering to Service Level Agreement (SLA) constraints. Our method dynamically allocates resources across nodes, leveraging the synergy between Advanced Cloud Computing and Edge Computing to balance centralized processing and localized adaptability. The integration of Graph Neural Networks (GNNs) further enhances this process by adapting resource allocation decisions based on network topology. Through iterative learning, our algorithm fine-tunes continuous-time resource optimization policies, resulting in substantial improvements in throughput and latency minimization. Simulations validate the effectiveness of our approach, demonstrating its potential to contribute to the advancement of MANET cloud networks by offering adaptability, efficiency, and real-time optimization for reliable information delivery and dynamic link utilization.

现代网络要求在移动无线局域网(MANET)和云环境中实现高效可靠的信息传输。本文介绍了一种采用多代理深度学习(MADL)进行自适应资源分配的新方法,以应对优化流量和确保可靠信息传输的挑战,同时遵守服务级别协议(SLA)约束。我们的方法可跨节点动态分配资源,利用先进云计算和边缘计算之间的协同作用,在集中处理和本地化适应性之间实现平衡。图神经网络(GNN)的集成可根据网络拓扑调整资源分配决策,从而进一步增强这一过程。通过迭代学习,我们的算法对连续时间资源优化策略进行了微调,从而大幅提高了吞吐量和延迟最小化。仿真验证了我们的方法的有效性,证明了它通过为可靠的信息传输和动态链路利用提供适应性、效率和实时优化,为推进城域网云网络的发展做出贡献的潜力。
{"title":"Reliable information delivery and dynamic link utilization in MANET cloud using deep reinforcement learning","authors":"Shuhong Kuang,&nbsp;Jiyong Zhang,&nbsp;Amin Mohajer","doi":"10.1002/ett.5028","DOIUrl":"https://doi.org/10.1002/ett.5028","url":null,"abstract":"<p>Modern networking demands efficient and reliable information delivery within Mobile Ad-hoc Network (MANET) and cloud environments. This paper introduces a novel approach that employs Multi-Agent Deep Learning (MADL) for adaptive resource allocation, addressing the challenges of optimizing traffic and ensuring dependable information delivery while adhering to Service Level Agreement (SLA) constraints. Our method dynamically allocates resources across nodes, leveraging the synergy between Advanced Cloud Computing and Edge Computing to balance centralized processing and localized adaptability. The integration of Graph Neural Networks (GNNs) further enhances this process by adapting resource allocation decisions based on network topology. Through iterative learning, our algorithm fine-tunes continuous-time resource optimization policies, resulting in substantial improvements in throughput and latency minimization. Simulations validate the effectiveness of our approach, demonstrating its potential to contribute to the advancement of MANET cloud networks by offering adaptability, efficiency, and real-time optimization for reliable information delivery and dynamic link utilization.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142137706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A semantic axiomatic design for integrity in IoT 物联网完整性的语义公理设计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-27 DOI: 10.1002/ett.5032
Maryam Nooraei Abadeh

In the complex, critical, and rapidly evolving era of Industry 4.0 manufacturing, mature engineering disciplines can be developed to validate system designs at an abstract level, enabling effective fault-free environments. However, designing integrated IoT platforms presents significant challenges due to their inherent complexity and interoperability issues. To address this challenge, the proposed framework integrates axiomatic design principles with considerations for data integrity and domain ontology. Furthermore, this paper introduces a multi-level integrity rule repository for IoT application to provides a robust foundation for designing and maintaining IoT systems. To validate the effectiveness of this approach, we conducted a study across four domains of smart cities. The design's quality was assessed using model quality parameters, including completeness, consistency and validity. Our analysis shows that the semantic-aware axiomatic design framework can effectively address the problem of inconsistencies and low-quality design in scientific IoT environments, providing a more reliable and efficient solution.

在复杂、关键和快速发展的工业 4.0 制造业时代,成熟的工程学科可以在抽象层面验证系统设计,从而实现有效的无故障环境。然而,由于其固有的复杂性和互操作性问题,设计集成的物联网平台面临着巨大的挑战。为应对这一挑战,本文提出的框架将公理设计原则与数据完整性和领域本体的考虑因素整合在一起。此外,本文还为物联网应用引入了一个多层次的完整性规则库,为设计和维护物联网系统奠定了坚实的基础。为了验证这种方法的有效性,我们对智慧城市的四个领域进行了研究。我们使用模型质量参数(包括完整性、一致性和有效性)对设计质量进行了评估。我们的分析表明,语义感知公理设计框架能有效解决科学物联网环境中的不一致性和低质量设计问题,提供更可靠、更高效的解决方案。
{"title":"A semantic axiomatic design for integrity in IoT","authors":"Maryam Nooraei Abadeh","doi":"10.1002/ett.5032","DOIUrl":"https://doi.org/10.1002/ett.5032","url":null,"abstract":"<p>In the complex, critical, and rapidly evolving era of Industry 4.0 manufacturing, mature engineering disciplines can be developed to validate system designs at an abstract level, enabling effective fault-free environments. However, designing integrated IoT platforms presents significant challenges due to their inherent complexity and interoperability issues. To address this challenge, the proposed framework integrates axiomatic design principles with considerations for data integrity and domain ontology. Furthermore, this paper introduces a multi-level integrity rule repository for IoT application to provides a robust foundation for designing and maintaining IoT systems. To validate the effectiveness of this approach, we conducted a study across four domains of smart cities. The design's quality was assessed using model quality parameters, including completeness, consistency and validity. Our analysis shows that the semantic-aware axiomatic design framework can effectively address the problem of inconsistencies and low-quality design in scientific IoT environments, providing a more reliable and efficient solution.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142089773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming 利用 EfficientNet-B7 驱动的深度学习波束成形技术增强 5G 大规模 MIMO 系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-26 DOI: 10.1002/ett.5034
Bendjillali Ridha Ilyas, Bendelhoum Mohammed Sofiane, Tadjeddine Ali Abderrazak, Kamline Miloud

The development of wireless communication systems is a challenging and constantly evolving field and the issue of gaining optimal performance is of utmost importance. This work intends to give a thorough and detailed description of massive MIMO technology and its properties, with a significant emphasis on digital beamforming (FDB) and hybrid beamforming (HBF) techniques and the potential of combining them with the most recent and exciting frontier of research: deep learning. On one hand, FDB provides accurate signal control but, on the other hand, it deals with substantial needs like high-power consumption. This challenge makes the focus shift to HBF—the innovative technology successfully coupled with deep learning's powerful potential. The chosen research explores extensively the major areas of application and compatibility of this operating mode in a diverse range of operational situations in the interference environment as well as in different levels of noise conditions. Moreover, the study offers a comprehensive comparison, which is highly effective in exploring further methods that focus on improving spectral efficiency. Significantly, the “Proposed Method” is suggested to be at the leading position, which demonstrates superior performance. Showing outstanding generalization capability, versatile robustness, and efficiency of usage in the proposed framework rely on EfficientNet-B7 as the major portion. This makes it adaptive to its dynamic surroundings and puts it as a powerful tool in the world of advanced connectivity and massive MIMO technology. Due to its core ability to respond to changes in conditions effectively and efficiently, the proposed framework is seen as one of the most powerful approaches that could be used to change wireless communication systems.

无线通信系统的开发是一个充满挑战且不断发展的领域,获得最佳性能的问题至关重要。本著作旨在全面、详细地介绍大规模多输入多输出技术及其特性,重点关注数字波束成形(FDB)和混合波束成形(HBF)技术,以及将它们与最新、最激动人心的研究前沿--深度学习--相结合的潜力。一方面,FDB 可提供精确的信号控制,但另一方面,它也需要处理大量需求,如高功耗。这一挑战使得研究重点转向 HBF--一种成功结合深度学习强大潜力的创新技术。所选研究广泛探讨了这种工作模式在干扰环境和不同噪声水平条件下各种运行情况下的主要应用领域和兼容性。此外,这项研究还提供了全面的比较,这对于进一步探索提高频谱效率的方法非常有效。值得注意的是,"拟议方法 "被认为处于领先地位,表现出卓越的性能。提议的框架以 EfficientNet-B7 为主要部分,显示出出色的泛化能力、多变的鲁棒性和使用效率。这使其能够适应动态环境,成为先进连接和大规模多输入多输出(MIMO)技术领域的有力工具。由于其对条件变化做出有效和高效反应的核心能力,拟议框架被视为可用于改变无线通信系统的最强大方法之一。
{"title":"Enhancing 5G massive MIMO systems with EfficientNet-B7-powered deep learning-driven beamforming","authors":"Bendjillali Ridha Ilyas,&nbsp;Bendelhoum Mohammed Sofiane,&nbsp;Tadjeddine Ali Abderrazak,&nbsp;Kamline Miloud","doi":"10.1002/ett.5034","DOIUrl":"https://doi.org/10.1002/ett.5034","url":null,"abstract":"<p>The development of wireless communication systems is a challenging and constantly evolving field and the issue of gaining optimal performance is of utmost importance. This work intends to give a thorough and detailed description of massive MIMO technology and its properties, with a significant emphasis on digital beamforming (FDB) and hybrid beamforming (HBF) techniques and the potential of combining them with the most recent and exciting frontier of research: deep learning. On one hand, FDB provides accurate signal control but, on the other hand, it deals with substantial needs like high-power consumption. This challenge makes the focus shift to HBF—the innovative technology successfully coupled with deep learning's powerful potential. The chosen research explores extensively the major areas of application and compatibility of this operating mode in a diverse range of operational situations in the interference environment as well as in different levels of noise conditions. Moreover, the study offers a comprehensive comparison, which is highly effective in exploring further methods that focus on improving spectral efficiency. Significantly, the “Proposed Method” is suggested to be at the leading position, which demonstrates superior performance. Showing outstanding generalization capability, versatile robustness, and efficiency of usage in the proposed framework rely on EfficientNet-B7 as the major portion. This makes it adaptive to its dynamic surroundings and puts it as a powerful tool in the world of advanced connectivity and massive MIMO technology. Due to its core ability to respond to changes in conditions effectively and efficiently, the proposed framework is seen as one of the most powerful approaches that could be used to change wireless communication systems.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142077839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things 工业物联网中基于消息队列遥测传输(MQTT)协议的混合入侵检测方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-20 DOI: 10.1002/ett.5030
Georg Thamer Francis, Alireza Souri, Nihat İnanç

The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.

在过去几年中,针对工业物联网(IIoT)设备的攻击数量不断增加,尤其是针对消息队列遥测传输(MQTT)等广泛使用的通信协议的攻击。IIoT 应用的快速增长给网络安全带来了严峻挑战和技术差距。另一方面,传统的网络攻击检测方法无法解决和支持物联网环境的运行时责任。本研究提出了一种混合遗传算法和随机森林(GA_RF)方法,用于检测 IIoT 环境中使用 MQTT 协议的工业控制机(ICS)中的网络攻击。该架构将 ICS 与边缘设备和云服务器集成在一起,使用 GA_RF 算法检测传感器收集的数据中的异常情况。正常数据在本地进行处理,然后发送到云端进行存储和返回,从而确保持续监控和安全性。此外,MQTT-IOT-IDS2020 数据集作为一个真实的测试案例,用于预测所提出的 GA_RF 方法,并与其他一些强大的机器和深度学习模型进行比较。实验结果表明,所提出的 GA_RF 方法在检测网络攻击方面具有 99.87%-100% 的最佳准确率。该混合算法的平均绝对误差(MAE)也达到了 0-0.0015,精确度、召回率和 F 分数均为 100%。根据这一结果,提出了在 IIoT 环境中运行 GA_RF 的同时将 ICS 连接到服务器的架构。总之,本研究表明了 GA_RF 的有效性,旨在通过在 IIoT 中使用 MQTT 协议来提高安全性。
{"title":"A hybrid intrusion detection approach based on message queuing telemetry transport (MQTT) protocol in industrial internet of things","authors":"Georg Thamer Francis,&nbsp;Alireza Souri,&nbsp;Nihat İnanç","doi":"10.1002/ett.5030","DOIUrl":"https://doi.org/10.1002/ett.5030","url":null,"abstract":"<p>The number of attacks against Industrial Internet of Things (IIoT) devices has increased over the past years, particularly on widely used communication protocols like Message Queuing Telemetry Transfer (MQTT). The fast increase in IIoT applications brings both critical challenges and technical gaps in cybersecurity. On the other hand, traditional cyber-attack detection approaches scrap to address and support the run-time responsibilities of IIoT environments. This study presents a hybrid Genetic Algorithm and Random Forest (GA_RF) method for detecting cyber-attacks in Industrial Control Machines (ICS) that use MQTT protocol in the IIoT environment. This architecture integrates ICS with edge devices and cloud servers, using a GA_RF algorithm to detect anomalies in data collected by sensors. Normal data is processed locally and then sent to the cloud for storage and return, ensuring continuous monitoring and security. Also, the MQTT-IOT-IDS2020 dataset as a real test case was applied for prediction of the proposed GA_RF method with compare to some other powerful machine and deep learning models. The experimental results show that the proposed GA_RF method has an optimum accuracy of 99.87%–100% for detecting cyber-attacks. This hybrid algorithm also achieved 0–0.0015 in Mean Absolute Error (MAE) and 100% in Precision, Recall, and F-score factors. This result led to the proposed architecture, which connects the ICS to a server while running GA_RF on the IIoT environment. In conclusion, this study indicates the effectiveness of GA_RF and aims to improve security by using the MQTT protocol in IIoT.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Construction of switch information security protection system based on software-defined networking 构建基于软件定义网络的交换机信息安全保护系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-20 DOI: 10.1002/ett.5033
Xueda Huang, Kuanlei Zheng, Sisi Chen, Zhaoren He

The communications industry has a new, forward-thinking architecture: software-defined networks (SDN). The inflexible structure of conventional networks severely hinders their ability to service modern organizations. The increased adaptability and transparency of SDN-powered networks makes them more vulnerable to security hazards like Distributed denial of service (DDoS) assaults. The switch information system introduces protection at the cost of some degree of adaptability. The information and software layers are potential entry points for DDoS assaults. The flow-based policies frequently collide at the application layer, giving rise to safety issues. The central nervous system of the network's components is the SDN controller located at the control layer. The centrally located controller interacts with networking hardware via switches. Attacks on control devices, switches, and communication channels can cause vulnerabilities in SDN networks. The study proposes Blockchain-SDN-based switch information security (BC-SDN-SIS) to address the information security problems. SDN applications operate at the highest level of SDN controllers, facilitating the easy rollout of new network services. The suggested design uses a distributed BC approach to guarantee confidentiality, anonymity, privacy, and scalability. The proposed BC-SDN-SIS model increases the accuracy ratio of 97.45%, precision ratio of 98.43, recall ratio of 97.34, effectiveness ratio of 97.6%, bandwidth of 2.5 Mbps, latency rate of .04 ms and F1-score ratio of 98.28% compared to other existing models.

通信行业拥有一种全新的前瞻性架构:软件定义网络(SDN)。传统网络僵化的结构严重阻碍了它们为现代组织提供服务的能力。由 SDN 驱动的网络具有更强的适应性和透明度,因此更容易受到分布式拒绝服务 (DDoS) 攻击等安全隐患的影响。交换机信息系统以一定程度的适应性为代价引入保护。信息层和软件层是 DDoS 攻击的潜在切入点。基于流量的策略经常在应用层发生冲突,从而引发安全问题。网络组件的中枢神经系统是位于控制层的 SDN 控制器。位于中心位置的控制器通过交换机与网络硬件交互。对控制设备、交换机和通信通道的攻击会导致 SDN 网络出现漏洞。本研究提出了基于区块链-SDN的交换机信息安全(BC-SDN-SIS)来解决信息安全问题。SDN 应用程序在 SDN 控制器的最高层运行,便于轻松推出新的网络服务。建议的设计采用分布式 BC 方法,以保证保密性、匿名性、隐私性和可扩展性。与其他现有模型相比,建议的 BC-SDN-SIS 模型的准确率提高了 97.45%,精确率提高了 98.43%,召回率提高了 97.34%,有效率提高了 97.6%,带宽提高了 2.5 Mbps,延迟率提高了 0.04 ms,F1 分数提高了 98.28%。
{"title":"Construction of switch information security protection system based on software-defined networking","authors":"Xueda Huang,&nbsp;Kuanlei Zheng,&nbsp;Sisi Chen,&nbsp;Zhaoren He","doi":"10.1002/ett.5033","DOIUrl":"https://doi.org/10.1002/ett.5033","url":null,"abstract":"<p>The communications industry has a new, forward-thinking architecture: software-defined networks (SDN). The inflexible structure of conventional networks severely hinders their ability to service modern organizations. The increased adaptability and transparency of SDN-powered networks makes them more vulnerable to security hazards like Distributed denial of service (DDoS) assaults. The switch information system introduces protection at the cost of some degree of adaptability. The information and software layers are potential entry points for DDoS assaults. The flow-based policies frequently collide at the application layer, giving rise to safety issues. The central nervous system of the network's components is the SDN controller located at the control layer. The centrally located controller interacts with networking hardware via switches. Attacks on control devices, switches, and communication channels can cause vulnerabilities in SDN networks. The study proposes Blockchain-SDN-based switch information security (BC-SDN-SIS) to address the information security problems. SDN applications operate at the highest level of SDN controllers, facilitating the easy rollout of new network services. The suggested design uses a distributed BC approach to guarantee confidentiality, anonymity, privacy, and scalability. The proposed BC-SDN-SIS model increases the accuracy ratio of 97.45%, precision ratio of 98.43, recall ratio of 97.34, effectiveness ratio of 97.6%, bandwidth of 2.5 Mbps, latency rate of .04 ms and F1-score ratio of 98.28% compared to other existing models.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges 回顾基于网络物理系统的网络入侵检测系统:特点、工业协议、攻击、数据集和挑战
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-08-19 DOI: 10.1002/ett.5029
Ram Ji, Devanand Padha, Yashwant Singh, Surbhi Sharma

Cyber-Physical Systems (CPSs) provide critical infrastructure for the betterment of human lives thereby integrating cyber and physical components but the fusion of physical and digital components leads to an increase in the attack surface, which in turn provides opportunities for the attackers to intrude on these systems, which can affect the critical services like health care, water treatment facility, the electrical grid, hydropower plant, and so forth. The existing intrusion detection systems (IDSs) in CPSs are facing issues like poor detection accuracy, high false alarm rate and more computation time. Also, existing intrusion detection systems cannot identify new attacks that is, zero-day assaults. Prerequisite exists for the design of the framework for detecting intrusions using artificial intelligence inspired approaches grounded on the principle of ensemble techniques. Intrusion detection framework assimilating ensemble-based technique for CPS has been proposed. Since the proposed framework incorporates privileges of multiple techniques for intrusion detection and classification, hence the proposed framework may overcome the limitations of existing IDSs for CPS. Overview of cutting-edge incursion identification methods for CPSs is presented. Several characteristics of CPS, industrial protocols, and anomaly detection techniques for intrusion detection are analyzed. Taxonomy of IDS for CPS has been proposed, taxonomy of attacks and threats on CPS has been intended. Research challenges for IDS in CPS are also uncovered from this review.

网络物理系统(CPS)提供了改善人类生活的关键基础设施,从而将网络和物理组件整合在一起,但物理和数字组件的融合导致攻击面的增加,这反过来又为攻击者入侵这些系统提供了机会,从而可能影响医疗保健、水处理设施、电网、水电站等关键服务。现有的 CPS 入侵检测系统(IDS)面临着检测精度低、误报率高和计算时间长等问题。此外,现有的入侵检测系统无法识别新的攻击,即零日攻击。利用基于集合技术原理的人工智能方法来设计入侵检测框架是有前提条件的。针对 CPS 提出的入侵检测框架吸收了基于集合的技术。由于所提议的框架融合了多种入侵检测和分类技术,因此可以克服现有 CPS IDS 的局限性。概述了 CPS 的前沿入侵识别方法。分析了 CPS 的几个特征、工业协议和用于入侵检测的异常检测技术。提出了 CPS IDS 的分类法,并打算对 CPS 的攻击和威胁进行分类。本综述还揭示了 CPS 中 IDS 的研究挑战。
{"title":"Review of intrusion detection system in cyber-physical system based networks: Characteristics, industrial protocols, attacks, data sets and challenges","authors":"Ram Ji,&nbsp;Devanand Padha,&nbsp;Yashwant Singh,&nbsp;Surbhi Sharma","doi":"10.1002/ett.5029","DOIUrl":"https://doi.org/10.1002/ett.5029","url":null,"abstract":"<p>Cyber-Physical Systems (CPSs) provide critical infrastructure for the betterment of human lives thereby integrating cyber and physical components but the fusion of physical and digital components leads to an increase in the attack surface, which in turn provides opportunities for the attackers to intrude on these systems, which can affect the critical services like health care, water treatment facility, the electrical grid, hydropower plant, and so forth. The existing intrusion detection systems (IDSs) in CPSs are facing issues like poor detection accuracy, high false alarm rate and more computation time. Also, existing intrusion detection systems cannot identify new attacks that is, zero-day assaults. Prerequisite exists for the design of the framework for detecting intrusions using artificial intelligence inspired approaches grounded on the principle of ensemble techniques. Intrusion detection framework assimilating ensemble-based technique for CPS has been proposed. Since the proposed framework incorporates privileges of multiple techniques for intrusion detection and classification, hence the proposed framework may overcome the limitations of existing IDSs for CPS. Overview of cutting-edge incursion identification methods for CPSs is presented. Several characteristics of CPS, industrial protocols, and anomaly detection techniques for intrusion detection are analyzed. Taxonomy of IDS for CPS has been proposed, taxonomy of attacks and threats on CPS has been intended. Research challenges for IDS in CPS are also uncovered from this review.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1