首页 > 最新文献

Journal of Information and Telecommunication最新文献

英文 中文
Variable-bandwidth recursive-filter design employing cascaded stability-guaranteed 2nd-order sections using coefficient transformations 采用系数变换的级联稳定保证二阶分段的变带宽递归滤波器设计
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-14 DOI: 10.1080/24751839.2023.2267890
Tian-Bo Deng
This paper shows a 2-step procedure for obtaining a variable-bandwidth recursive digital filter whose structure contains cascaded second-order (2nd-order) sections. Such a cascade-form structure is insensitive to the round-off noises that come from filter-coefficient quantizations in hardware implementations. This paper also shows how to utilize a 2-step procedure to get a variable-bandwidth recursive filter that is absolutely stable. The first step (Step-1) of the 2-step procedure designs a series of constant-bandwidth filters for approximating a series of evenly discretized variable specifications, and the second step (Step-2) fits the coefficient values obtained from Step-1 by employing individual polynomials. To ensure the stability of the resultant constant-bandwidth filters in Step-1, coefficient transformations are first executed on the 2nd-order transfer function's denominator-coefficients, and then each coefficient of both numerator and transformed denominator is found as an individual polynomial. Once all the polynomials are obtained, the polynomials corresponding to the transformed denominator are further converted to composite functions for ensuring the stability. Hence, the 2-step procedure not only produces a cascade-form variable-bandwidth filter that has low quantization errors, but also ensures the stability. A lowpass example is included for verifying the achieved stability and showing the high approximation accuracy.
本文给出了一个包含级联二阶段的变带宽递归数字滤波器的两步法。这种级联结构对硬件实现中滤波系数量化产生的舍入噪声不敏感。本文还展示了如何利用一个两步法得到一个绝对稳定的变带宽递归滤波器。两步过程的第一步(step -1)设计了一系列恒定带宽滤波器来近似一系列均匀离散的变量规格,第二步(step -2)通过使用单个多项式来拟合从步骤1中得到的系数值。为了保证步骤1中所得到的等带宽滤波器的稳定性,首先对二阶传递函数的分母系数进行系数变换,然后将分子和变换后的分母的每个系数都作为一个单独的多项式找到。一旦得到所有的多项式,将变换后的分母对应的多项式进一步转换为复合函数,以保证稳定性。因此,两步过程不仅产生了级联形式的可变带宽滤波器,具有低量化误差,而且保证了稳定性。通过一个低通实例验证了所获得的稳定性和较高的逼近精度。
{"title":"Variable-bandwidth recursive-filter design employing cascaded stability-guaranteed 2nd-order sections using coefficient transformations","authors":"Tian-Bo Deng","doi":"10.1080/24751839.2023.2267890","DOIUrl":"https://doi.org/10.1080/24751839.2023.2267890","url":null,"abstract":"This paper shows a 2-step procedure for obtaining a variable-bandwidth recursive digital filter whose structure contains cascaded second-order (2nd-order) sections. Such a cascade-form structure is insensitive to the round-off noises that come from filter-coefficient quantizations in hardware implementations. This paper also shows how to utilize a 2-step procedure to get a variable-bandwidth recursive filter that is absolutely stable. The first step (Step-1) of the 2-step procedure designs a series of constant-bandwidth filters for approximating a series of evenly discretized variable specifications, and the second step (Step-2) fits the coefficient values obtained from Step-1 by employing individual polynomials. To ensure the stability of the resultant constant-bandwidth filters in Step-1, coefficient transformations are first executed on the 2nd-order transfer function's denominator-coefficients, and then each coefficient of both numerator and transformed denominator is found as an individual polynomial. Once all the polynomials are obtained, the polynomials corresponding to the transformed denominator are further converted to composite functions for ensuring the stability. Hence, the 2-step procedure not only produces a cascade-form variable-bandwidth filter that has low quantization errors, but also ensures the stability. A lowpass example is included for verifying the achieved stability and showing the high approximation accuracy.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135766439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Texture recognition under scale and illumination variations 尺度和光照变化下的纹理识别
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-07 DOI: 10.1080/24751839.2023.2265190
Pavel Vácha, Michal Haindl
Visual scene recognition is predominantly based on visual textures representing an object's material properties. However, the single material texture varies in scale and illumination angles due to mapping an object's shape. We present a comparative study of the colour histogram, Gabor, opponent Gabor, Local Binary Pattern (LBP), and wide-sense Markovian textural features concerning their sensitivity to simultaneous scale and illumination variations. Due to their application dominance, these textural features are selected from more than 50 published textural features. Markovian features are information preserving, and we demonstrate their superior performance for scale and illumination variable observation conditions over the standard alternative textural features. We bound the scale variation by double size, and illumination variation includes illumination spectra, acquisition devices, and 35 illumination directions spanned above a sample hemisphere. Recognition accuracy is tested on textile patterns from the University of East Anglia and wood veneers from UTIA BTF databases.
视觉场景识别主要基于代表物体材质属性的视觉纹理。然而,由于映射对象的形状,单个材料纹理在比例和照明角度上有所不同。我们对颜色直方图、Gabor、反Gabor、局部二值模式(LBP)和广义马尔可夫纹理特征进行了比较研究,研究了它们对同步尺度和光照变化的敏感性。由于它们的应用优势,这些纹理特征是从50多个已发表的纹理特征中挑选出来的。马尔可夫特征是信息保存的,我们证明了它们在尺度和光照变量观测条件下比标准替代纹理特征具有更好的性能。我们将尺度变化限定为两倍大小,照明变化包括照明光谱、采集设备和样本半球上方的35个照明方向。识别的准确性测试了来自东安格利亚大学的纺织品图案和来自UTIA BTF数据库的木饰面。
{"title":"Texture recognition under scale and illumination variations","authors":"Pavel Vácha, Michal Haindl","doi":"10.1080/24751839.2023.2265190","DOIUrl":"https://doi.org/10.1080/24751839.2023.2265190","url":null,"abstract":"Visual scene recognition is predominantly based on visual textures representing an object's material properties. However, the single material texture varies in scale and illumination angles due to mapping an object's shape. We present a comparative study of the colour histogram, Gabor, opponent Gabor, Local Binary Pattern (LBP), and wide-sense Markovian textural features concerning their sensitivity to simultaneous scale and illumination variations. Due to their application dominance, these textural features are selected from more than 50 published textural features. Markovian features are information preserving, and we demonstrate their superior performance for scale and illumination variable observation conditions over the standard alternative textural features. We bound the scale variation by double size, and illumination variation includes illumination spectra, acquisition devices, and 35 illumination directions spanned above a sample hemisphere. Recognition accuracy is tested on textile patterns from the University of East Anglia and wood veneers from UTIA BTF databases.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135253276","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Uplink and downlink of energy harvesting NOMA system: performance analysis 能量收集NOMA系统的上行和下行:性能分析
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-28 DOI: 10.1080/24751839.2023.2260230
Duong Hien Thuan, Nhat-Tien Nguyen, Xuan Tien Nguyen, Nguyen Thi Hau, Bui Vu Minh, Tan N. Nguyen
In this paper, we consider an uplink non-orthogonal multiple access (NOMA) for energy harvesting at the base station or access point in the wireless system. By exploiting energy enough, a base station or access point can serve many users at the downlink. The fixed power allocation factors are adopted, and the power splitting energy harvesting protocol brings many benefits to both the uplink and downlink of a wireless system. The closed-form expressions of outage probability are investigated and examined in a group of two users. Moreover, the optimal outage probability for two users is shown numerically. Finally, Monte Carlo simulations are presented to further support the validity of our framework and findings.
在本文中,我们考虑在无线系统的基站或接入点的能量收集上行非正交多址(NOMA)。通过充分利用能量,基站或接入点可以在下行链路上为许多用户提供服务。采用固定的功率分配系数,功率分裂能量收集协议给无线系统的上行链路和下行链路都带来了许多好处。研究了两个用户组的停电概率的封闭表达式。此外,还用数值方法给出了两个用户的最优停机概率。最后,给出了蒙特卡罗模拟来进一步支持我们的框架和研究结果的有效性。
{"title":"Uplink and downlink of energy harvesting NOMA system: performance analysis","authors":"Duong Hien Thuan, Nhat-Tien Nguyen, Xuan Tien Nguyen, Nguyen Thi Hau, Bui Vu Minh, Tan N. Nguyen","doi":"10.1080/24751839.2023.2260230","DOIUrl":"https://doi.org/10.1080/24751839.2023.2260230","url":null,"abstract":"In this paper, we consider an uplink non-orthogonal multiple access (NOMA) for energy harvesting at the base station or access point in the wireless system. By exploiting energy enough, a base station or access point can serve many users at the downlink. The fixed power allocation factors are adopted, and the power splitting energy harvesting protocol brings many benefits to both the uplink and downlink of a wireless system. The closed-form expressions of outage probability are investigated and examined in a group of two users. Moreover, the optimal outage probability for two users is shown numerically. Finally, Monte Carlo simulations are presented to further support the validity of our framework and findings.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135385418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
January 6th on Twitter: measuring social media attitudes towards the Capitol riot through unhealthy online conversation and sentiment analysis 1月6日在Twitter上:通过不健康的在线对话和情绪分析来衡量社会媒体对国会大厦骚乱的态度
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-26 DOI: 10.1080/24751839.2023.2262067
Kovacs Erik-Robert, Cotfas Liviu-Adrian, Delcea Camelia
While social media can serve as public discussion forums of great benefit to democratic debate, discourse propagated through them can also stoke political polarization and partisanship. A particularly dramatic example is the January 6, 2021 incident in Washington D.C., when a group of protesters besieged the US Capitol, resulting in several deaths. The public reacted by posting messages on social media, discussing the actions of the participants. Aiming to understand their perspectives under the broad concept of unhealthy online conversation (i.e. bad faith argumentation, overly hostile or destructive discourse, or other behaviours that discourage engagement), we sample 1,300,000 Twitter posts taken from the #Election2020 dataset dating from January 2021. Using a fine-tuned XLNet model trained on the Unhealthy Comment Corpus (UCC) dataset, we label these texts as healthy or unhealthy, furthermore using a taxonomy of 7 unhealthy attributes. Using the NRCLex sentiment analysis lexicon, we also detect the emotional patterns associated with each attribute. We observe that these conversations contain accusatory language aimed at the ‘other side’, limiting engagement by defining others in terms they do not themselves use or identify with. We find evidence of three attribute clusters, in addition to sarcasm, a divergent attribute that we argue should be researched separately. We find that emotions identified from the text do not correlate with the attributes, the two approaches revealing complementary characteristics of online discourse. Using latent Dirichlet allocation (LDA), we identify topics discussed within the attribute-sentiment pairs, linking them to each other using similarity measures. The results we present aim to help social media stakeholders, government regulators, and the general public better understand the contents and the emotional profile of the debates arising on social media platforms, especially as they relate to the political realm.
虽然社交媒体可以作为公共讨论论坛,对民主辩论大有裨益,但通过社交媒体传播的话语也可能引发政治两极分化和党派之争。一个特别戏剧性的例子是2021年1月6日在华盛顿特区发生的事件,当时一群抗议者包围了美国国会大厦,导致数人死亡。公众的反应是在社交媒体上发布消息,讨论参与者的行为。为了了解他们在不健康在线对话(即恶意争论,过度敌对或破坏性话语或其他阻碍参与的行为)的广泛概念下的观点,我们从2021年1月的#Election2020数据集中抽取了130万条推特帖子。使用在不健康评论语料库(UCC)数据集上训练的微调XLNet模型,我们将这些文本标记为健康或不健康,并进一步使用7个不健康属性的分类法。使用NRCLex情感分析词典,我们还检测与每个属性相关的情感模式。我们观察到,这些对话包含针对“对方”的指责性语言,通过用他们自己不使用或不认同的术语来定义他人,从而限制了参与。我们发现了三种属性集群的证据,除了讽刺,我们认为应该单独研究的发散属性。我们发现从文本中识别的情感与属性并不相关,这两种方法揭示了在线话语的互补特征。使用潜在狄利克雷分配(LDA),我们识别属性-情感对中讨论的主题,并使用相似度度量将它们彼此连接起来。我们提出的结果旨在帮助社交媒体利益相关者、政府监管机构和公众更好地理解社交媒体平台上出现的辩论的内容和情感特征,特别是当它们与政治领域相关时。
{"title":"January 6th on Twitter: measuring social media attitudes towards the Capitol riot through unhealthy online conversation and sentiment analysis","authors":"Kovacs Erik-Robert, Cotfas Liviu-Adrian, Delcea Camelia","doi":"10.1080/24751839.2023.2262067","DOIUrl":"https://doi.org/10.1080/24751839.2023.2262067","url":null,"abstract":"While social media can serve as public discussion forums of great benefit to democratic debate, discourse propagated through them can also stoke political polarization and partisanship. A particularly dramatic example is the January 6, 2021 incident in Washington D.C., when a group of protesters besieged the US Capitol, resulting in several deaths. The public reacted by posting messages on social media, discussing the actions of the participants. Aiming to understand their perspectives under the broad concept of unhealthy online conversation (i.e. bad faith argumentation, overly hostile or destructive discourse, or other behaviours that discourage engagement), we sample 1,300,000 Twitter posts taken from the #Election2020 dataset dating from January 2021. Using a fine-tuned XLNet model trained on the Unhealthy Comment Corpus (UCC) dataset, we label these texts as healthy or unhealthy, furthermore using a taxonomy of 7 unhealthy attributes. Using the NRCLex sentiment analysis lexicon, we also detect the emotional patterns associated with each attribute. We observe that these conversations contain accusatory language aimed at the ‘other side’, limiting engagement by defining others in terms they do not themselves use or identify with. We find evidence of three attribute clusters, in addition to sarcasm, a divergent attribute that we argue should be researched separately. We find that emotions identified from the text do not correlate with the attributes, the two approaches revealing complementary characteristics of online discourse. Using latent Dirichlet allocation (LDA), we identify topics discussed within the attribute-sentiment pairs, linking them to each other using similarity measures. The results we present aim to help social media stakeholders, government regulators, and the general public better understand the contents and the emotional profile of the debates arising on social media platforms, especially as they relate to the political realm.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134960479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The formalization of interlanguage: the example of object clitic pronouns acquisition in French L2* 中介语的形式化:以法语第二语言宾格代词习得为例*
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-10 DOI: 10.1080/24751839.2023.2254956
Amina Affes, Ismaïl Biskri, Adel Jebali
The interlanguage of second and foreign language French learners presents certain patterns that offer a formal framework within the context of the Applicative Combinatory Categorical Grammar. These patterns manifest in the acquisition of object clitics which presents considerable difficulties for French second language learners. To address this, we thoroughly analysed the object clitic pronouns that appeared in a corpus of texts by examining the different facets of these pronouns. A formal analysis was then proposed. The objective of this research is to establish an automated system for processing learners’ interlanguage in terms of the ACCG.
第二语言和外语法语学习者的中介语表现出一定的模式,这些模式在应用组合直言语法的语境中提供了一个正式的框架。这些模式表现在宾语定语的习得上,这给法语第二语言学习者带来了相当大的困难。为了解决这个问题,我们通过检查这些代词的不同方面,彻底分析了在文本语料库中出现的宾语代词。然后提出了一项形式分析。本研究的目的是建立一个自动处理学习者中介语的ACCG系统。
{"title":"The formalization of interlanguage: the example of object clitic pronouns acquisition in French L2*","authors":"Amina Affes, Ismaïl Biskri, Adel Jebali","doi":"10.1080/24751839.2023.2254956","DOIUrl":"https://doi.org/10.1080/24751839.2023.2254956","url":null,"abstract":"The interlanguage of second and foreign language French learners presents certain patterns that offer a formal framework within the context of the Applicative Combinatory Categorical Grammar. These patterns manifest in the acquisition of object clitics which presents considerable difficulties for French second language learners. To address this, we thoroughly analysed the object clitic pronouns that appeared in a corpus of texts by examining the different facets of these pronouns. A formal analysis was then proposed. The objective of this research is to establish an automated system for processing learners’ interlanguage in terms of the ACCG.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136071235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of Ethereum gas prices using DeepAR and probabilistic forecasting 使用DeepAR和概率预测预测以太坊天然气价格
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-06 DOI: 10.1080/24751839.2023.2250113
Andras Ferenczi, C. Bǎdicǎ
{"title":"Prediction of Ethereum gas prices using DeepAR and probabilistic forecasting","authors":"Andras Ferenczi, C. Bǎdicǎ","doi":"10.1080/24751839.2023.2250113","DOIUrl":"https://doi.org/10.1080/24751839.2023.2250113","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47534826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting higher order mutation score based on machine learning 基于机器学习的高阶突变分数预测
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-31 DOI: 10.1080/24751839.2023.2252186
Van-Nho Do, Quang-Vu Nguyen, Thanh-Binh Nguyen
{"title":"Predicting higher order mutation score based on machine learning","authors":"Van-Nho Do, Quang-Vu Nguyen, Thanh-Binh Nguyen","doi":"10.1080/24751839.2023.2252186","DOIUrl":"https://doi.org/10.1080/24751839.2023.2252186","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46978345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks MSA-SDMN:多域软件定义移动网络的组播源认证方案
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-25 DOI: 10.1080/24751839.2023.2250123
Hamdi Eltaief, Ali El kamel, H. Youssef
{"title":"MSA-SDMN: multicast source authentication scheme for multi-domain software defined mobile networks","authors":"Hamdi Eltaief, Ali El kamel, H. Youssef","doi":"10.1080/24751839.2023.2250123","DOIUrl":"https://doi.org/10.1080/24751839.2023.2250123","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43599465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel solution for energy-saving and lifetime-maximizing of LoRa wireless mesh networks LoRa无线网状网络节能和寿命最大化的新解决方案
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-05 DOI: 10.1080/24751839.2023.2235114
Hoang Hai Son, Vo Phuc Tinh, Duc Ngoc Minh Dang, Bui Thi Duyen, Duy-Dong Le, Thai-Thinh Dang, Q. Nguyen, Thanh-Qui Pham, Van-Luong Nguyen, Tran Anh Khoa, Nguyen Hoang Nam
{"title":"A novel solution for energy-saving and lifetime-maximizing of LoRa wireless mesh networks","authors":"Hoang Hai Son, Vo Phuc Tinh, Duc Ngoc Minh Dang, Bui Thi Duyen, Duy-Dong Le, Thai-Thinh Dang, Q. Nguyen, Thanh-Qui Pham, Van-Luong Nguyen, Tran Anh Khoa, Nguyen Hoang Nam","doi":"10.1080/24751839.2023.2235114","DOIUrl":"https://doi.org/10.1080/24751839.2023.2235114","url":null,"abstract":"","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":" ","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47367923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning 基于大数据技术和迁移学习的工业控制系统入侵检测分布式深度学习方法
IF 2.7 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-25 DOI: 10.1080/24751839.2023.2239617
Ahlem Abid, F. Jemili, O. Korbaa
ABSTRACT Industry 4.0 refers to a new generation of connected and intelligent factories that is driven by the emergence of new technologies such as artificial intelligence, Cloud computing, Big Data and industrial control systems (ICS) in order to automate all phases of industrial operations. The presence of connected systems in industrial environments poses a considerable security challenge, moreover with the huge amount of data generated daily, there are complex attacks that occur in seconds and target production lines and their integrity. But, until now, factories do not have all the necessary tools to protect themselves, they mainly use traditional protection. In order to improve industrial control systems in terms of efficiency and response time, the present paper propose a new distributed intrusion detection approach using artificial intelligence methods, Big Data techniques and deployed in a cloud environment. A variety of Machine Learning and Deep Learning algorithms, basically convolutional neural networks (CNN), have been tested to compare performance and choose the most suitable model for the classification. We test the performance of our model by using the industrial dataset SWat.
{"title":"Distributed deep learning approach for intrusion detection system in industrial control systems based on big data technique and transfer learning","authors":"Ahlem Abid, F. Jemili, O. Korbaa","doi":"10.1080/24751839.2023.2239617","DOIUrl":"https://doi.org/10.1080/24751839.2023.2239617","url":null,"abstract":"ABSTRACT Industry 4.0 refers to a new generation of connected and intelligent factories that is driven by the emergence of new technologies such as artificial intelligence, Cloud computing, Big Data and industrial control systems (ICS) in order to automate all phases of industrial operations. The presence of connected systems in industrial environments poses a considerable security challenge, moreover with the huge amount of data generated daily, there are complex attacks that occur in seconds and target production lines and their integrity. But, until now, factories do not have all the necessary tools to protect themselves, they mainly use traditional protection. In order to improve industrial control systems in terms of efficiency and response time, the present paper propose a new distributed intrusion detection approach using artificial intelligence methods, Big Data techniques and deployed in a cloud environment. A variety of Machine Learning and Deep Learning algorithms, basically convolutional neural networks (CNN), have been tested to compare performance and choose the most suitable model for the classification. We test the performance of our model by using the industrial dataset SWat.","PeriodicalId":32180,"journal":{"name":"Journal of Information and Telecommunication","volume":"1 1","pages":""},"PeriodicalIF":2.7,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41982654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Information and Telecommunication
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1