首页 > 最新文献

Wireless Personal Communications最新文献

英文 中文
A Survey on Hardware Accelerator Design of Deep Learning for Edge Devices 边缘设备深度学习硬件加速器设计调查
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-19 DOI: 10.1007/s11277-024-11443-2
Anu Samanta, Indranil Hatai, Ashis Kumar Mal

In artificial intelligence, the large role is played by machine learning (ML) in a variety of applications. This article aims at providing a comprehensive survey on summarizing recent trends and advances in hardware accelerator design for machine learning based on various hardware platforms like ASIC, FPGA and GPU. In this article, we look at different architectures that allow NN executions in respect of computational units, network topologies, dataflow optimization and accelerators based on new technologies. The important features of the various strategies for enhancing acceleration performance are highlighted. The numerous current difficulties like fair comparison, as well as potential subjects and obstacles in this field has been examined. This study intends to provide readers with a fast overview of neural network compression and acceleration, a clear evaluation of different methods, and the confidence to get started in the right path.

在人工智能领域,机器学习(ML)在各种应用中发挥着重要作用。本文旨在提供一份全面的调查报告,总结基于 ASIC、FPGA 和 GPU 等各种硬件平台的机器学习硬件加速器设计的最新趋势和进展。在本文中,我们将从计算单元、网络拓扑结构、数据流优化和基于新技术的加速器等方面,探讨允许执行 NN 的不同架构。文章强调了各种提高加速性能策略的重要特点。研究还探讨了当前存在的诸多困难,如公平比较,以及该领域的潜在课题和障碍。本研究旨在为读者提供神经网络压缩和加速的快速概览、对不同方法的清晰评估,以及在正确道路上起步的信心。
{"title":"A Survey on Hardware Accelerator Design of Deep Learning for Edge Devices","authors":"Anu Samanta, Indranil Hatai, Ashis Kumar Mal","doi":"10.1007/s11277-024-11443-2","DOIUrl":"https://doi.org/10.1007/s11277-024-11443-2","url":null,"abstract":"<p>In artificial intelligence, the large role is played by machine learning (ML) in a variety of applications. This article aims at providing a comprehensive survey on summarizing recent trends and advances in hardware accelerator design for machine learning based on various hardware platforms like ASIC, FPGA and GPU. In this article, we look at different architectures that allow NN executions in respect of computational units, network topologies, dataflow optimization and accelerators based on new technologies. The important features of the various strategies for enhancing acceleration performance are highlighted. The numerous current difficulties like fair comparison, as well as potential subjects and obstacles in this field has been examined. This study intends to provide readers with a fast overview of neural network compression and acceleration, a clear evaluation of different methods, and the confidence to get started in the right path.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"30 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism of Stellate Ganglion Block Anesthesia Inhibiting Neuronal Apoptosis in Rats by Down-regulating Bax gene 星状神经节阻滞麻醉通过下调 Bax 基因抑制大鼠神经元凋亡的机制
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-19 DOI: 10.1007/s11277-024-11468-7
Qiao Xu, Lei Li, Ke Yan, Siqi Ye

To explore the feasibility of stellate ganglion block (SGB) for the treatment of brain injury and the inhibitory effect of neuronal apoptosis. SD rats were randomly divided into control group, model group (LPS 0.6 mg/kg), and SGB group (LPS 0.6 mg/kg + lidocaine 0.2 mL). The rats were sacrificed after SGB block for 2 h to separate the hippocampus. The pathological changes of hippocampal tissue were observed by HE staining, the apoptosis of hippocampal neurons was observed by TUNEL staining, the positive expression of B-cell lymphoma-2-Associated X (Bax) in hippocampal tissue was detected by immunohistochemistry, and the expression of Bax mRNA in hippocampal tissue was detected by qRT-PCR method. Results: Compared with the control group, the hippocampal tissue of the model group was severely damaged, and the apoptosis rate of hippocampal neurons, the positive rate of Bax protein, the expression of Bax mRNA, and the protein expressions of Baxwere significantly increased, the protein expression of Bcl-2 was significantly decreased (P < 0.05).Compared with the model group, the hippocampal tissue damage of the SGB group was significantly reduced, and the hippocampal neuron apoptosis rate, Bax protein positive rate, Bax mRNA expression and Bax protein expressions were significantly decreased, and the expression of Bcl-2 protein was significantly increased (P < 0.05). Conclusion: SGB can reduce the apoptosis of neurons in rats and improve brain injury by inhibiting the expression of Bax gene.

探讨星状神经节阻滞(SGB)治疗脑损伤的可行性以及对神经细胞凋亡的抑制作用。将 SD 大鼠随机分为对照组、模型组(LPS 0.6 mg/kg)和 SGB 组(LPS 0.6 mg/kg + 利多卡因 0.2 mL)。大鼠经SGB阻滞2小时后处死,分离海马。HE 染色法观察海马组织的病理变化,TUNEL 染色法观察海马神经元的凋亡,免疫组化法检测海马组织中 B 细胞淋巴瘤-2 相关 X(Bax)的阳性表达,qRT-PCR 法检测海马组织中 Bax mRNA 的表达。结果显示与对照组相比,模型组海马组织损伤严重,海马神经元凋亡率、Bax蛋白阳性率、Bax mRNA表达量、Bax蛋白表达量均明显升高,Bcl-2蛋白表达量明显降低(P < 0.05).与模型组相比,SGB组海马组织损伤明显减轻,海马神经元凋亡率、Bax蛋白阳性率、Bax mRNA表达量、Bax蛋白表达量均明显降低,Bcl-2蛋白表达量明显升高(P < 0.05).与模型组相比,SGB组海马组织损伤明显减轻,海马神经元凋亡率、Bax蛋白阳性率、Bax mRNA表达量、Bax蛋白表达量均明显降低,Bcl-2蛋白表达量明显升高(P < 0.05).结论SGB 可通过抑制 Bax 基因的表达,减少大鼠神经元的凋亡,改善脑损伤。
{"title":"Mechanism of Stellate Ganglion Block Anesthesia Inhibiting Neuronal Apoptosis in Rats by Down-regulating Bax gene","authors":"Qiao Xu, Lei Li, Ke Yan, Siqi Ye","doi":"10.1007/s11277-024-11468-7","DOIUrl":"https://doi.org/10.1007/s11277-024-11468-7","url":null,"abstract":"<p>To explore the feasibility of stellate ganglion block (SGB) for the treatment of brain injury and the inhibitory effect of neuronal apoptosis. SD rats were randomly divided into control group, model group (LPS 0.6 mg/kg), and SGB group (LPS 0.6 mg/kg + lidocaine 0.2 mL). The rats were sacrificed after SGB block for 2 h to separate the hippocampus. The pathological changes of hippocampal tissue were observed by HE staining, the apoptosis of hippocampal neurons was observed by TUNEL staining, the positive expression of B-cell lymphoma-2-Associated X (Bax) in hippocampal tissue was detected by immunohistochemistry, and the expression of Bax mRNA in hippocampal tissue was detected by qRT-PCR method. Results: Compared with the control group, the hippocampal tissue of the model group was severely damaged, and the apoptosis rate of hippocampal neurons, the positive rate of Bax protein, the expression of Bax mRNA, and the protein expressions of Baxwere significantly increased, the protein expression of Bcl-2 was significantly decreased (<i>P</i> &lt; 0.05).Compared with the model group, the hippocampal tissue damage of the SGB group was significantly reduced, and the hippocampal neuron apoptosis rate, Bax protein positive rate, Bax mRNA expression and Bax protein expressions were significantly decreased, and the expression of Bcl-2 protein was significantly increased (<i>P</i> &lt; 0.05). Conclusion: SGB can reduce the apoptosis of neurons in rats and improve brain injury by inhibiting the expression of Bax gene.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"76 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Security and Privacy-Based IoT Smart Home Access Control Devices 基于安全和隐私的物联网智能家居门禁设备评述
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-18 DOI: 10.1007/s11277-024-11405-8
Sirisha Uppuluri, G. Lakshmeeswari

The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.

物联网(IoT)是一个网络框架,由通过互联网进行互动的可识别实体组成。其应用之一是智能家居,可以远程监控家用设备。因此,物联网系统对可靠安全解决方案的需求日益增长。安全问题是物联网智能家居设备面临的一项重大挑战,必须认真加以考虑。通过干扰或重放攻击等手段对智能家居系统进行未经授权的访问,可能会通过操纵传感器和控制装置造成风险,从而可能导致未经授权的进入。本综述论文特别关注物联网智能家居门禁控制设备的安全和隐私方面。文章首先简要概述了智能家居的安全性和隐私性,然后深入探讨了智能家居系统分类中的各种技术,如身份验证、访问控制、区块链和基于密码学的方法。此外,本文还比较了这些技术的优缺点。论文还研究了针对智能家居物联网访问控制系统的各类攻击,并对方法、攻击频率、严重程度、概率和等级等风险因素进行了评估。最后,本文讨论了挑战、应用、结论和未来方向。
{"title":"Review of Security and Privacy-Based IoT Smart Home Access Control Devices","authors":"Sirisha Uppuluri, G. Lakshmeeswari","doi":"10.1007/s11277-024-11405-8","DOIUrl":"https://doi.org/10.1007/s11277-024-11405-8","url":null,"abstract":"<p>The Internet of Things (IoT) represents a network framework comprising identifiable entities that interact through the Internet. One of its applications is the smart home, where household devices can be remotely monitored and controlled. This has led to an increased demand for reliable security solutions in IoT systems. Security presents a significant challenge in IoT smart home devices and must be carefully considered. Unauthorized access to a smart home system, facilitated by means such as jamming or replay attacks, could pose risks by manipulating sensors and controls, potentially allowing unauthorized entry. This review paper concentrates specifically on the security and privacy aspects of IoT smart home access control devices. It begins with a concise overview of smart home security and privacy, then delves into various techniques within the smart home system taxonomy, such as authentication, access control, blockchain, and cryptography-based methods. Furthermore, the paper compares the advantages and disadvantages of these techniques. It also examines various types of attacks on smart home IoT access control systems and evaluates risk factors such as methodologies, attack frequency, severity, probability, and ranking. Finally, the paper discusses challenges, applications, conclusions, and future directions.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"24 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Employing an optimisation algorithm to design an evolutionary topological structure for non-misbehaving nodes with optimal path selection 采用优化算法为非行为不端节点设计具有最优路径选择的进化拓扑结构
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-18 DOI: 10.1007/s11277-024-11305-x
S. Kanmani, M. Murali

Increasing energy utilization is one of the main obstacles to reliable interaction in dynamic digital networks. We concentrate on improving the network’s topology by taking this difficulty into account. In this study, we build a hybrid star-mesh topology to minimize both the energy usage and latency of the network. AOMDV routes is used in hybrid network topologies to create various pathways in the distance from the point of origin and the goal. When a routing path loses its energy level, the best path is selected using ChOA from the available options. The system’s energy efficiency is improved by choosing the best route. According to mimicry findings, the suggested method performs better when thinking of supply number, energy consumption, delay, and throughput.

提高能源利用率是动态数字网络可靠互动的主要障碍之一。考虑到这一困难,我们专注于改进网络的拓扑结构。在本研究中,我们构建了一种星形-网状混合拓扑结构,以最大限度地减少网络的能量消耗和延迟。在混合网络拓扑中使用 AOMDV 路由,在从起点到目标的距离上创建各种路径。当路由路径失去能量水平时,就会使用 ChOA 从可用选项中选择最佳路径。通过选择最佳路径,系统的能效得以提高。根据模仿结果,建议的方法在考虑供应数量、能量消耗、延迟和吞吐量时表现更好。
{"title":"Employing an optimisation algorithm to design an evolutionary topological structure for non-misbehaving nodes with optimal path selection","authors":"S. Kanmani, M. Murali","doi":"10.1007/s11277-024-11305-x","DOIUrl":"https://doi.org/10.1007/s11277-024-11305-x","url":null,"abstract":"<p>Increasing energy utilization is one of the main obstacles to reliable interaction in dynamic digital networks. We concentrate on improving the network’s topology by taking this difficulty into account. In this study, we build a hybrid star-mesh topology to minimize both the energy usage and latency of the network. AOMDV routes is used in hybrid network topologies to create various pathways in the distance from the point of origin and the goal. When a routing path loses its energy level, the best path is selected using ChOA from the available options. The system’s energy efficiency is improved by choosing the best route. According to mimicry findings, the suggested method performs better when thinking of supply number, energy consumption, delay, and throughput.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"1 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141739339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the LoRaWAN Publish/Subscribe IoT Data Sharing Model Using Middleman for Smart Grid Application 利用中间人增强 LoRaWAN 发布/订阅物联网数据共享模型,用于智能电网应用
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1007/s11277-024-11376-w
Sapna S. Khapre, R. Ganeshan

The power grid, manufacturing, and industrial automation are just a few Internet of Things (IoT) settings where publish/subscribe (p/s) systems are increasingly prevalent. These systems may handle a wide range of middleware and communication protocols, ensuring compatibility. The most well-liked publish/subscribe protocol is the Message Queue Telemetry Transport Protocol (MQTT), which uses an agent to transfer information between publishers and subscribers on certain subjects. MQTT can be quickly and simply deployed for IoT settings using a popular wireless MAC layer protocol like Long Range Wide Area Network (LoRaWAN), however, this has not been properly validated. MQTT can be readily set up in cloud environments to do research experiments. To provide an MQTT-based publication design that can handle the LoRaWAN proactive steps, the authors design and provide a simulation framework in NS-3 in this study. To do this, the authors make use of the LoRaWAN library from NS-3 and include connecting it with a middleman that links to numerous publications as well as clients. The authors support many topics at the broker while enabling unicast capabilities from the broker to LoRaWAN end devices. In other words, the proposed work activates the unicast capability from the middleman to LoRaWAN peripheral devices while handling multiple topics at the mediator. To illustrate the viability of our IoT architecture and evaluate its performance at scale, the authors performed several scenarios under it.

电网、制造业和工业自动化只是发布/订阅(p/s)系统日益普及的几个物联网(IoT)环境。这些系统可以处理各种中间件和通信协议,确保兼容性。最受欢迎的发布/订阅协议是消息队列遥测传输协议(MQTT),它使用代理在发布者和订阅者之间传输有关某些主题的信息。使用流行的无线 MAC 层协议(如长距离广域网 (LoRaWAN)),MQTT 可以快速、简单地部署到物联网设置中,但这一点尚未得到适当验证。MQTT 可在云环境中轻松设置,以进行研究实验。为了提供一种能处理 LoRaWAN 主动步骤的基于 MQTT 的发布设计,作者在本研究中设计并提供了一个 NS-3 模拟框架。为此,作者使用了 NS-3 中的 LoRaWAN 库,并将其与一个中间人连接起来,该中间人可链接到众多出版物和客户端。作者在中间商处支持许多主题,同时实现了从中间商到 LoRaWAN 终端设备的单播功能。换句话说,建议的工作激活了从中间商到 LoRaWAN 外围设备的单播功能,同时在中间商处处理多个主题。为了说明我们的物联网架构的可行性并评估其规模性能,作者在该架构下执行了几个场景。
{"title":"Enhancing the LoRaWAN Publish/Subscribe IoT Data Sharing Model Using Middleman for Smart Grid Application","authors":"Sapna S. Khapre, R. Ganeshan","doi":"10.1007/s11277-024-11376-w","DOIUrl":"https://doi.org/10.1007/s11277-024-11376-w","url":null,"abstract":"<p>The power grid, manufacturing, and industrial automation are just a few Internet of Things (IoT) settings where publish/subscribe (p/s) systems are increasingly prevalent. These systems may handle a wide range of middleware and communication protocols, ensuring compatibility. The most well-liked publish/subscribe protocol is the Message Queue Telemetry Transport Protocol (MQTT), which uses an agent to transfer information between publishers and subscribers on certain subjects. MQTT can be quickly and simply deployed for IoT settings using a popular wireless MAC layer protocol like Long Range Wide Area Network (LoRaWAN), however, this has not been properly validated. MQTT can be readily set up in cloud environments to do research experiments. To provide an MQTT-based publication design that can handle the LoRaWAN proactive steps, the authors design and provide a simulation framework in NS-3 in this study. To do this, the authors make use of the LoRaWAN library from NS-3 and include connecting it with a middleman that links to numerous publications as well as clients. The authors support many topics at the broker while enabling unicast capabilities from the broker to LoRaWAN end devices. In other words, the proposed work activates the unicast capability from the middleman to LoRaWAN peripheral devices while handling multiple topics at the mediator. To illustrate the viability of our IoT architecture and evaluate its performance at scale, the authors performed several scenarios under it.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"20 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141718401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of Resource Distribution on Performance of Fog Computing Infrastructure 资源分配对雾计算基础设施性能的影响
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1007/s11277-024-11272-3
Sara Jamil, Rehan Qureshi, Sohaib Ahmed, Osama Rehman

The data being produced by the devices connected to the Internet is ever growing. The large volume of data is also required to be processed and stored. Cloud computing provides data processing and storage services by using IT resources at gegraphically distributed locations. However, the cloud computing resources are usually far away from the sites where data is produced and processing is needed, which results in communication latencies that may not be acceptable for some appliations. This issue is addressed by Fog computing by brining data processing closer to the edge of the Internet. As fog infrastructures are significantly different from cloud in terms of scale, processing capacity, bandwidth etc.; more focused analysis is needed to explore avenues for performance improvement. In this paper, we analyze effects of resource distribution in small-scale fog computing infrastructure on its performance and resource utilization. We examine different topological arrangements of fog devices with varying resources. Our results show that the topological arrangement of fog nodes has a significant impact on the overall performance of fog computing infrastructure.

连接到互联网的设备所产生的数据与日俱增。大量数据也需要处理和存储。云计算通过使用分布在全球各地的 IT 资源来提供数据处理和存储服务。然而,云计算资源通常远离产生和处理数据的地点,这就造成了通信延迟,某些应用可能无法接受这种延迟。雾计算通过使数据处理更接近互联网边缘来解决这一问题。由于雾基础设施在规模、处理能力、带宽等方面与云计算有很大不同,因此需要进行更有针对性的分析,以探索提高性能的途径。本文分析了小规模雾计算基础设施中资源分配对其性能和资源利用率的影响。我们研究了具有不同资源的雾设备的不同拓扑排列。结果表明,雾节点的拓扑排列对雾计算基础设施的整体性能有显著影响。
{"title":"Impact of Resource Distribution on Performance of Fog Computing Infrastructure","authors":"Sara Jamil, Rehan Qureshi, Sohaib Ahmed, Osama Rehman","doi":"10.1007/s11277-024-11272-3","DOIUrl":"https://doi.org/10.1007/s11277-024-11272-3","url":null,"abstract":"<p>The data being produced by the devices connected to the Internet is ever growing. The large volume of data is also required to be processed and stored. Cloud computing provides data processing and storage services by using IT resources at gegraphically distributed locations. However, the cloud computing resources are usually far away from the sites where data is produced and processing is needed, which results in communication latencies that may not be acceptable for some appliations. This issue is addressed by Fog computing by brining data processing closer to the edge of the Internet. As fog infrastructures are significantly different from cloud in terms of scale, processing capacity, bandwidth etc.; more focused analysis is needed to explore avenues for performance improvement. In this paper, we analyze effects of resource distribution in small-scale fog computing infrastructure on its performance and resource utilization. We examine different topological arrangements of fog devices with varying resources. Our results show that the topological arrangement of fog nodes has a significant impact on the overall performance of fog computing infrastructure.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"72 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141718404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem 利用立方全等和中文余数定理的确定性拉宾密码系统
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1007/s11277-024-11416-5
Maroti Deshmukh, Kanchan Bisht, Arjun Singh Rawat

The Rabin Cryptosystem is a public-key cryptosystem known for providing security levels comparable to RSA but with reduced computational overhead. Despite these advantages, it has not been widely adopted for practical use due to its lack of a deterministic nature. This paper addresses this limitation by introducing a new Deterministic Rabin Cryptosystem (DRCS). The DRCS framework includes processes for key generation, encryption, and decryption, leveraging the concept of cubic congruence and the Chinese Remainder Theorem to ensure the decryption process is unambiguous and deterministic. This design not only retains the computational efficiency of the original Rabin Cryptosystem but also enhances its security. Our comparative analysis shows that the DRCS achieves similar performance to the traditional Rabin system in terms of computational overhead. While the encryption process in DRCS is less demanding, its decryption process is more complex, and overall, it maintains a polynomial time complexity. Furthermore, a detailed security analysis indicates that the DRCS is significantly harder to factorize compared to previous models, underscoring its improved security features.

拉宾密码系统是一种公钥密码系统,其安全等级与 RSA 相当,但计算开销较低。尽管具有这些优点,但由于它缺乏确定性,在实际应用中并未得到广泛采用。本文通过引入一种新的确定性拉宾密码系统(DRCS)来解决这一局限性。DRCS 框架包括密钥生成、加密和解密过程,利用立方全等概念和中文余数定理确保解密过程的明确性和确定性。这种设计不仅保留了原始拉宾密码系统的计算效率,还增强了其安全性。我们的比较分析表明,就计算开销而言,DRCS 与传统的拉宾系统性能相似。虽然 DRCS 的加密过程要求较低,但其解密过程却更为复杂,总体而言,它保持了多项式时间复杂度。此外,详细的安全分析表明,与以前的模型相比,DRCS 的因式分解难度明显降低,突出了其改进的安全特性。
{"title":"Deterministic Rabin Cryptosystem Using Cubic Congruence and Chinese Remainder Theorem","authors":"Maroti Deshmukh, Kanchan Bisht, Arjun Singh Rawat","doi":"10.1007/s11277-024-11416-5","DOIUrl":"https://doi.org/10.1007/s11277-024-11416-5","url":null,"abstract":"<p>The Rabin Cryptosystem is a public-key cryptosystem known for providing security levels comparable to RSA but with reduced computational overhead. Despite these advantages, it has not been widely adopted for practical use due to its lack of a deterministic nature. This paper addresses this limitation by introducing a new Deterministic Rabin Cryptosystem (DRCS). The DRCS framework includes processes for key generation, encryption, and decryption, leveraging the concept of cubic congruence and the Chinese Remainder Theorem to ensure the decryption process is unambiguous and deterministic. This design not only retains the computational efficiency of the original Rabin Cryptosystem but also enhances its security. Our comparative analysis shows that the DRCS achieves similar performance to the traditional Rabin system in terms of computational overhead. While the encryption process in DRCS is less demanding, its decryption process is more complex, and overall, it maintains a polynomial time complexity. Furthermore, a detailed security analysis indicates that the DRCS is significantly harder to factorize compared to previous models, underscoring its improved security features.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"10 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141718402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy and Security Aware Hybrid Optimal Cluster-based Routing in Wireless Sensor Network 无线传感器网络中基于集群的能量和安全意识混合优化路由选择
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1007/s11277-024-11288-9
M. Selvi, G. Kalaiarasi, Suja Cherukullapurath Mana, R. Yogitha, R. Padmavathy

Clustering is a main component for establishing WSN routing since it promotes scalability and increases network lifetime. Cluster heads (CHs) in a clustered WSN allocate their maximum energy to a different node. Despite the widespread use of WSNs, only a few applications require rapid data transport with less interruption. Many applications concentrate on throughput while paying little attention to latency. Thereby, there arises the need to develop a new secure-aware routing in WSN. This paper aims to propose a WSN cluster-based routing model that follows: (i) Cluster head selection (CHS) and (ii) Routing. Initially, the CHS is made optimal to ensure the appropriate clustering of nodes in the WSN. Moreover, the CHS is carried out by considering risk, delay, energy and distance. This parameter consideration ensures the energy efficiency and the security aspect while routing the data packets. For this optimal CHS, a new Remora Customized Shark Optimization (RCSO) is introduced. After clustering using the optimal CH, optimal routing takes place by concerning link quality (proposed evaluation), trust (proposed trust evaluation) and distance (inter-cluster and intra-cluster distance). The optimal routing is performed using a novel RCSO algorithm. At last, the performance of the suggested RCSO is analyzed over conventional approaches with regard to several factors. The residual energy using RCSO is maximum around 0.28 at the 2000th iteration when compared to conventional methods.

聚类是建立 WSN 路由的主要组成部分,因为它能提高可扩展性并延长网络寿命。集群 WSN 中的簇头(CH)将其最大能量分配给不同的节点。尽管 WSN 的应用非常广泛,但只有少数应用需要快速传输数据并减少中断。许多应用只关注吞吐量,而很少关注延迟。因此,有必要在 WSN 中开发一种新的安全感知路由。本文旨在提出一种基于 WSN 集群的路由模型,具体如下:(i) 簇头选择(CHS)和 (ii) 路由。最初,CHS 是最优的,以确保 WSN 中节点的适当聚类。此外,CHS 还考虑了风险、延迟、能量和距离。这一参数考虑确保了数据包路由时的能源效率和安全性。为实现最优 CHS,引入了新的 Remora 定制鲨鱼优化(RCSO)。使用最优 CH 进行聚类后,通过链路质量(建议的评估)、信任(建议的信任评估)和距离(簇间和簇内距离)进行优化路由。优化路由是通过一种新颖的 RCSO 算法实现的。最后,分析了建议的 RCSO 与传统方法相比在多个因素方面的性能。与传统方法相比,使用 RCSO 的剩余能量在第 2000 次迭代时达到最大值 0.28 左右。
{"title":"Energy and Security Aware Hybrid Optimal Cluster-based Routing in Wireless Sensor Network","authors":"M. Selvi, G. Kalaiarasi, Suja Cherukullapurath Mana, R. Yogitha, R. Padmavathy","doi":"10.1007/s11277-024-11288-9","DOIUrl":"https://doi.org/10.1007/s11277-024-11288-9","url":null,"abstract":"<p>Clustering is a main component for establishing WSN routing since it promotes scalability and increases network lifetime. Cluster heads (CHs) in a clustered WSN allocate their maximum energy to a different node. Despite the widespread use of WSNs, only a few applications require rapid data transport with less interruption. Many applications concentrate on throughput while paying little attention to latency. Thereby, there arises the need to develop a new secure-aware routing in WSN. This paper aims to propose a WSN cluster-based routing model that follows: (i) Cluster head selection (CHS) and (ii) Routing. Initially, the CHS is made optimal to ensure the appropriate clustering of nodes in the WSN. Moreover, the CHS is carried out by considering risk, delay, energy and distance. This parameter consideration ensures the energy efficiency and the security aspect while routing the data packets. For this optimal CHS, a new Remora Customized Shark Optimization (RCSO) is introduced. After clustering using the optimal CH, optimal routing takes place by concerning link quality (proposed evaluation), trust (proposed trust evaluation) and distance (inter-cluster and intra-cluster distance). The optimal routing is performed using a novel RCSO algorithm. At last, the performance of the suggested RCSO is analyzed over conventional approaches with regard to several factors. The residual energy using RCSO is maximum around 0.28 at the 2000th iteration when compared to conventional methods.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"65 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141718403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SNR Based Adaptive Quantized Iterative Thresholding for Sparse Approximation 基于信噪比的稀疏逼近自适应量化迭代阈值法
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-17 DOI: 10.1007/s11277-024-11281-2
Shabnam Afkari, Mohammad Ali Tinati, Tohid Yousefi Rezaii

Different compression techniques necessitate the signal to be sparse or have a sparse representation in a suitable domain. Among these methods, compressed sensing is regarded as highly efficient. Sparse coding seeks to identify a sparse group of coefficients that effectively depicts a signal from a predetermined overcomplete dictionary. In the context of practical signal processing, quantization of sampled signals marks a crucial step in digitizing signals, and subsequently, realizing their high-efficiency transmission. In this study, we introduce a novel approach that integrates the challenges inherent in the approximation of sparse signals with coefficient quantization. In this study, a new method called Adaptive Quantized Iterative Thresholding is introduced, which utilizes Signal-to-Noise Ratio (SNR) to enhance classical iterative thresholding techniques for identifying sparse signal representations. Simulation outcomes demonstrate a notable enhancement in operational SNR performance when compared to Quantized Iterative Thresholding methods.

不同的压缩技术要求信号稀疏或在合适的域中有稀疏的表示。在这些方法中,压缩传感被认为是高效的方法。稀疏编码旨在从预先确定的过完整字典中找出一组能有效描述信号的稀疏系数。在实际信号处理中,对采样信号进行量化是信号数字化的关键步骤,也是实现信号高效传输的关键步骤。在本研究中,我们引入了一种新方法,将稀疏信号逼近与系数量化中固有的挑战融为一体。在这项研究中,我们引入了一种名为 "自适应量化迭代阈值 "的新方法,它利用信噪比(SNR)来增强用于识别稀疏信号表示的经典迭代阈值技术。仿真结果表明,与量化迭代阈值法相比,操作信噪比性能显著提高。
{"title":"SNR Based Adaptive Quantized Iterative Thresholding for Sparse Approximation","authors":"Shabnam Afkari, Mohammad Ali Tinati, Tohid Yousefi Rezaii","doi":"10.1007/s11277-024-11281-2","DOIUrl":"https://doi.org/10.1007/s11277-024-11281-2","url":null,"abstract":"<p>Different compression techniques necessitate the signal to be sparse or have a sparse representation in a suitable domain. Among these methods, compressed sensing is regarded as highly efficient. Sparse coding seeks to identify a sparse group of coefficients that effectively depicts a signal from a predetermined overcomplete dictionary. In the context of practical signal processing, quantization of sampled signals marks a crucial step in digitizing signals, and subsequently, realizing their high-efficiency transmission. In this study, we introduce a novel approach that integrates the challenges inherent in the approximation of sparse signals with coefficient quantization. In this study, a new method called Adaptive Quantized Iterative Thresholding is introduced, which utilizes Signal-to-Noise Ratio (SNR) to enhance classical iterative thresholding techniques for identifying sparse signal representations. Simulation outcomes demonstrate a notable enhancement in operational SNR performance when compared to Quantized Iterative Thresholding methods.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"11 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141718405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Deep Learning Techniques for Neurological Disorders Detection 深度学习技术在神经系统疾病检测中的应用综述
IF 2.2 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2024-07-14 DOI: 10.1007/s11277-024-11464-x
Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari

Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its premature stages is complicated, and no biomarker is comprehended to be thorough in witnessing neurological disorders in their earlier stages. Deep learning approaches have attracted much attention in the scientific community using scanned images. They differ from simple machine learning (ML) algorithms in that they study the most favorable depiction of untreated images. Deep learning is helpful in the neuroimaging analysis of neurological diseases with subtle and dispersed changes because it can discover abstract and complicated patterns. The current study discusses a vital part of deep learning and looks at past work that has been used to switch between different ML algorithms that can predict neurological diseases. Convolution Neural Networks, Generative Adversarial Network, Recurrent Neural Network, Deep Belief Network, Auto Encoder, and other algorithms for Alzheimer’s illness prediction have been considered. Many publications on preprocessing methods, such as scaling, correction, stripping, and normalizing, have been evaluated.

神经系统疾病是最常见的痴呆类型之一,主要涉及老年人。在临床方法中,识别神经系统疾病的早期阶段非常复杂,没有一种生物标志物能彻底识别神经系统疾病的早期阶段。利用扫描图像进行深度学习的方法在科学界引起了广泛关注。它们不同于简单的机器学习(ML)算法,因为它们研究的是未经处理的图像的最有利描述。深度学习可以发现抽象而复杂的模式,因此有助于对具有细微而分散变化的神经系统疾病进行神经影像分析。当前的研究讨论了深度学习的一个重要部分,并研究了过去的工作,这些工作用于在不同的 ML 算法之间切换,从而预测神经系统疾病。研究考虑了卷积神经网络、生成对抗网络、循环神经网络、深度信念网络、自动编码器和其他用于阿尔茨海默病预测的算法。许多出版物对缩放、校正、剥离和归一化等预处理方法进行了评估。
{"title":"Review of Deep Learning Techniques for Neurological Disorders Detection","authors":"Akhilesh Kumar Tripathi, Rafeeq Ahmed, Arvind Kumar Tiwari","doi":"10.1007/s11277-024-11464-x","DOIUrl":"https://doi.org/10.1007/s11277-024-11464-x","url":null,"abstract":"<p>Neurological disease is one of the most common types of dementia that predominantly concerns the elderly. In clinical approaches, identifying its premature stages is complicated, and no biomarker is comprehended to be thorough in witnessing neurological disorders in their earlier stages. Deep learning approaches have attracted much attention in the scientific community using scanned images. They differ from simple machine learning (ML) algorithms in that they study the most favorable depiction of untreated images. Deep learning is helpful in the neuroimaging analysis of neurological diseases with subtle and dispersed changes because it can discover abstract and complicated patterns. The current study discusses a vital part of deep learning and looks at past work that has been used to switch between different ML algorithms that can predict neurological diseases. Convolution Neural Networks, Generative Adversarial Network, Recurrent Neural Network, Deep Belief Network, Auto Encoder, and other algorithms for Alzheimer’s illness prediction have been considered. Many publications on preprocessing methods, such as scaling, correction, stripping, and normalizing, have been evaluated.</p>","PeriodicalId":23827,"journal":{"name":"Wireless Personal Communications","volume":"55 1","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Wireless Personal Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1