首页 > 最新文献

International Journal of Pervasive Computing and Communications最新文献

英文 中文
A novel Internet of Things and federated learning-based privacy protection in blockchain technology 一种新型物联网和基于联合学习的区块链技术隐私保护
IF 2.6 Q1 Computer Science Pub Date : 2022-08-10 DOI: 10.1108/ijpcc-03-2022-0123
Shoayee Alotaibi
PurposeBe that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with Internet of Things (IoT) setting. A lightweight scalable blockchain (LSB) which is improved toward IoT necessities is suggested by the authors and investigates LSB within brilliant house setup like an agent model to enable more extensive IoT apps. Less asset gadgets inside brilliant house advantage via any unified chief which lays out common units for correspondence also cycles generally approaching and active solicitations.Design/methodology/approachFederated learning and blockchain (BC) have drawn in huge consideration due to the unchanging property and the relevant safety measure and protection benefits. FL and IoT safety measures’ difficulties can be conquered possibly by BC.FindingsLSB accomplishes fragmentation through shaping any overlaid web with more asset gadgets mutually deal with a public BC and federated learning which assures complete protection also security.Originality/valueThis overlaid is coordinated as without error bunches and reduces extra efforts, also batch leader will be with answer to handle commonly known BCs. LSB joins some of advancements which also includes computations related to lesser weighing agreement, optimal belief also throughput regulatory body.
目的尽管BC可能计算成本高,通用性有限,并导致关键传输容量上升和延迟,但这些似乎不适合物联网(IoT)设置。作者提出了一种针对物联网必需品进行改进的轻量级可扩展区块链(LSB),并在出色的房屋设置中研究了LSB,如代理模型,以实现更广泛的物联网应用程序。通过任何统一的首席执行官,在辉煌的房子里使用资产较少的小工具,为通信制定共同的单元,也会循环进行普遍的接洽和积极的招揽。设计/方法论/方法联合学习和区块链(BC)由于其不变的特性以及相关的安全措施和保护效益而备受关注。FL和物联网安全措施的困难可能会被BC克服。FindingsLSB通过用更多的资产小工具塑造任何覆盖的网络来实现碎片化。这些小工具与公共BC和联邦学习相互处理,从而确保完全的保护和安全。独创性/价值这种叠加是协调的,没有错误,减少了额外的工作量,批次负责人也将负责处理常见的BC。LSB加入了一些进步,其中还包括与较小称重协议、最优信念以及吞吐量监管机构相关的计算。
{"title":"A novel Internet of Things and federated learning-based privacy protection in blockchain technology","authors":"Shoayee Alotaibi","doi":"10.1108/ijpcc-03-2022-0123","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2022-0123","url":null,"abstract":"\u0000Purpose\u0000Be that as it may, BC is computationally costly, has restricted versatility and brings about critical transmission capacity upward and postpones, those seems not to be fit with Internet of Things (IoT) setting. A lightweight scalable blockchain (LSB) which is improved toward IoT necessities is suggested by the authors and investigates LSB within brilliant house setup like an agent model to enable more extensive IoT apps. Less asset gadgets inside brilliant house advantage via any unified chief which lays out common units for correspondence also cycles generally approaching and active solicitations.\u0000\u0000\u0000Design/methodology/approach\u0000Federated learning and blockchain (BC) have drawn in huge consideration due to the unchanging property and the relevant safety measure and protection benefits. FL and IoT safety measures’ difficulties can be conquered possibly by BC.\u0000\u0000\u0000Findings\u0000LSB accomplishes fragmentation through shaping any overlaid web with more asset gadgets mutually deal with a public BC and federated learning which assures complete protection also security.\u0000\u0000\u0000Originality/value\u0000This overlaid is coordinated as without error bunches and reduces extra efforts, also batch leader will be with answer to handle commonly known BCs. LSB joins some of advancements which also includes computations related to lesser weighing agreement, optimal belief also throughput regulatory body.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42345909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems 基于Z字形三维DCT和游程编码的多媒体通信系统视频压缩
IF 2.6 Q1 Computer Science Pub Date : 2022-07-25 DOI: 10.1108/ijpcc-01-2022-0012
Sravanthi Chutke, Nandhitha. N.M, Praveen Kumar Lendale
PurposeWith the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and storage, respectively. Hence, compression of the data which is to be transmitted over the channel is unavoidable. The main purpose of the proposed system is to use the bandwidth effectively. The videos are compressed at the transmitter’s end and reconstructed at the receiver’s end. Compression techniques even help for smaller storage requirements.Design/methodology/approachThe paper proposes a novel compression technique for three-dimensional (3D) videos using a zig-zag 3D discrete cosine transform. The method operates a 3D discrete cosine transform on the videos, followed by a zig-zag scanning process. Finally, to convert the data into a single bit stream for transmission, a run-length encoding technique is used. The videos are reconstructed by using the inverse 3D discrete cosine transform, inverse zig-zag scanning (quantization) and inverse run length coding techniques. The proposed method is simple and reduces the complexity of the convolutional techniques.FindingsCoding reduction, code word reduction, peak signal to noise ratio (PSNR), mean square error, compression percent and compression ratio values are calculated, and the dominance of the proposed method over the convolutional methods is seen.Originality/valueWith zig-zag quantization and run length encoding using 3D discrete cosine transform for 3D video compression, gives compression up to 90% with a PSNR of 41.98 dB. The proposed method can be used in multimedia applications where bandwidth, storage and data expenses are the major issues.
目的随着技术的出现,大量的数据正在通过互联网进行传输和接收。数据交换和存储分别需要大带宽和大存储。因此,压缩要在信道上传输的数据是不可避免的。所提出的系统的主要目的是有效地利用带宽。视频在发射机端被压缩,在接收机端被重构。压缩技术甚至有助于满足较小的存储需求。设计/方法/方法本文提出了一种新的三维视频压缩技术,该技术使用Z字形三维离散余弦变换。该方法对视频进行三维离散余弦变换,然后进行Z字形扫描。最后,为了将数据转换为单个比特流进行传输,使用了游程编码技术。通过使用逆3D离散余弦变换、逆Z字形扫描(量化)和逆游程编码技术来重建视频。该方法简单,降低了卷积技术的复杂度。结果计算了编码缩减、码字缩减、峰值信噪比(PSNR)、均方误差、压缩百分比和压缩比值,表明该方法优于卷积方法。独创性/价值采用Z字形量化和游程编码,使用3D离散余弦变换进行3D视频压缩,压缩率高达90%,PSNR为41.98 dB。所提出的方法可用于带宽、存储和数据开销是主要问题的多媒体应用中。
{"title":"Video compression based on zig-zag 3D DCT and run-length encoding for multimedia communication systems","authors":"Sravanthi Chutke, Nandhitha. N.M, Praveen Kumar Lendale","doi":"10.1108/ijpcc-01-2022-0012","DOIUrl":"https://doi.org/10.1108/ijpcc-01-2022-0012","url":null,"abstract":"\u0000Purpose\u0000With the advent of technology, a huge amount of data is being transmitted and received through the internet. Large bandwidth and storage are required for the exchange of data and storage, respectively. Hence, compression of the data which is to be transmitted over the channel is unavoidable. The main purpose of the proposed system is to use the bandwidth effectively. The videos are compressed at the transmitter’s end and reconstructed at the receiver’s end. Compression techniques even help for smaller storage requirements.\u0000\u0000\u0000Design/methodology/approach\u0000The paper proposes a novel compression technique for three-dimensional (3D) videos using a zig-zag 3D discrete cosine transform. The method operates a 3D discrete cosine transform on the videos, followed by a zig-zag scanning process. Finally, to convert the data into a single bit stream for transmission, a run-length encoding technique is used. The videos are reconstructed by using the inverse 3D discrete cosine transform, inverse zig-zag scanning (quantization) and inverse run length coding techniques. The proposed method is simple and reduces the complexity of the convolutional techniques.\u0000\u0000\u0000Findings\u0000Coding reduction, code word reduction, peak signal to noise ratio (PSNR), mean square error, compression percent and compression ratio values are calculated, and the dominance of the proposed method over the convolutional methods is seen.\u0000\u0000\u0000Originality/value\u0000With zig-zag quantization and run length encoding using 3D discrete cosine transform for 3D video compression, gives compression up to 90% with a PSNR of 41.98 dB. The proposed method can be used in multimedia applications where bandwidth, storage and data expenses are the major issues.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44569105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of cloud selection supporting model for green information and communication technology services 绿色信息通信技术服务云选择支持模型的开发
IF 2.6 Q1 Computer Science Pub Date : 2022-07-21 DOI: 10.1108/ijpcc-03-2022-0127
Sanjiv Rao Godla, J. Haro, Suresh Ch, R. Krishna
PurposeThe purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role. Because of the rapid growth of the IT business and the high level of greenhouse gas emissions, salient data centers are increasingly considering green IT techniques to reduce their environmental impacts. Both developing and underdeveloped countries are widely adopting green infrastructure and services over the cloud because of its cost-effectiveness, scalability and guaranteed high uptime. Several studies have investigated the fact that cloud computing provides beyond green information and communication technology (ICT) services and solutions. Therefore, anything offered over clouds also needs to be green to reduce the adverse influence on the environment.Design/methodology/approachThis paper examines the rationale for the use of green ICT in higher education and finds crucial success variables for the implementation of green ICT on the basis of an analysis of chosen educational organizations and interviews with key academic experts from the Universities of Ethiopia, in general, and BuleHora University, in particular.FindingsFinally, this paper described the design and development of a green cloud selection supporting model for green ICTs in higher educational institutions that helps cloud service customers choose the most green cloud-based ICT products as well as services.Originality/valueThis study may be a significant source of new information for green ICT design and implementation in higher education institutions to preserve the environment and its impact on human life.
目的本研究的目的是开发一个支持云的绿色计算模型。在当今世界,信息技术发挥着重要作用。由于IT业务的快速增长和温室气体排放的高水平,重要的数据中心越来越多地考虑使用绿色IT技术来减少对环境的影响。发展中国家和欠发达国家都在广泛采用云上的绿色基础设施和服务,因为它具有成本效益、可扩展性和保证的高正常运行时间。几项研究调查了云计算提供超越绿色的信息和通信技术(ICT)服务和解决方案的事实。因此,云上提供的任何东西都需要是绿色的,以减少对环境的不利影响。设计/方法论/方法本文通过对选定的教育组织的分析,以及对埃塞俄比亚大学,特别是BuleHora大学的主要学术专家的采访,研究了在高等教育中使用绿色信息和通信技术的基本原理,并找到了实施绿色信息和通讯技术的关键成功变量。发现最后,本文描述了高等教育机构绿色ICT的绿色云选择支持模型的设计和开发,该模型帮助云服务客户选择最基于绿色云的ICT产品和服务。原创性/价值本研究可能是高等教育机构设计和实施绿色信息和通信技术的重要新信息来源,以保护环境及其对人类生活的影响。
{"title":"Development of cloud selection supporting model for green information and communication technology services","authors":"Sanjiv Rao Godla, J. Haro, Suresh Ch, R. Krishna","doi":"10.1108/ijpcc-03-2022-0127","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2022-0127","url":null,"abstract":"\u0000Purpose\u0000The purpose of the study is to develop a cloud supporting model for green computing. In today's contemporary world, information technology (IT) plays a significant role. Because of the rapid growth of the IT business and the high level of greenhouse gas emissions, salient data centers are increasingly considering green IT techniques to reduce their environmental impacts. Both developing and underdeveloped countries are widely adopting green infrastructure and services over the cloud because of its cost-effectiveness, scalability and guaranteed high uptime. Several studies have investigated the fact that cloud computing provides beyond green information and communication technology (ICT) services and solutions. Therefore, anything offered over clouds also needs to be green to reduce the adverse influence on the environment.\u0000\u0000\u0000Design/methodology/approach\u0000This paper examines the rationale for the use of green ICT in higher education and finds crucial success variables for the implementation of green ICT on the basis of an analysis of chosen educational organizations and interviews with key academic experts from the Universities of Ethiopia, in general, and BuleHora University, in particular.\u0000\u0000\u0000Findings\u0000Finally, this paper described the design and development of a green cloud selection supporting model for green ICTs in higher educational institutions that helps cloud service customers choose the most green cloud-based ICT products as well as services.\u0000\u0000\u0000Originality/value\u0000This study may be a significant source of new information for green ICT design and implementation in higher education institutions to preserve the environment and its impact on human life.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43132020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Federated learning algorithm based on matrix mapping for data privacy over edge computing 基于矩阵映射的边缘计算数据隐私联合学习算法
IF 2.6 Q1 Computer Science Pub Date : 2022-07-14 DOI: 10.1108/ijpcc-03-2022-0113
P. Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, C. L, S. .. Akilandeeswari
PurposeThis paper aims to provide the security and privacy for Byzantine clients from different types of attacks.Design/methodology/approachIn this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.FindingsBy using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.Originality/valueBy using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.
目的本文旨在为拜占庭客户端提供不同类型攻击的安全性和隐私性。设计/方法论/方法在本文中,作者使用基于矩阵映射的联合学习算法来保护边缘计算上的数据隐私。通过使用Softmax层概率分布,模型拜占庭容忍度可以在阻塞收敛攻击中从40%提高到45%,并且可以阻止边缘后门攻击。独创性/价值通过使用Softmax层概率分布对测试结果进行建模,聚合方法可以保护至少30%的拜占庭客户端。
{"title":"Federated learning algorithm based on matrix mapping for data privacy over edge computing","authors":"P. Tripathy, Anurag Shrivastava, Varsha Agarwal, Devangkumar Umakant Shah, C. L, S. .. Akilandeeswari","doi":"10.1108/ijpcc-03-2022-0113","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2022-0113","url":null,"abstract":"\u0000Purpose\u0000This paper aims to provide the security and privacy for Byzantine clients from different types of attacks.\u0000\u0000\u0000Design/methodology/approach\u0000In this paper, the authors use Federated Learning Algorithm Based On Matrix Mapping For Data Privacy over Edge Computing.\u0000\u0000\u0000Findings\u0000By using Softmax layer probability distribution for model byzantine tolerance can be increased from 40% to 45% in the blocking-convergence attack, and the edge backdoor attack can be stopped.\u0000\u0000\u0000Originality/value\u0000By using Softmax layer probability distribution for model the results of the tests, the aggregation method can protect at least 30% of Byzantine clients.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43684701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources 以年轻人为中心的企业社会权威与工业4.0联合学习:人力资源战略管理框架
IF 2.6 Q1 Computer Science Pub Date : 2022-07-12 DOI: 10.1108/ijpcc-02-2022-0056
V. Sriram, M. Sikandar, Eti Khatri, S. Choubey, Ity Patni, L. K., K. Gulati
PurposeThe young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the second largest women population among 15 years as well as 19 years was in 2017 only behind 35 and 39 years. At this time, the Brazilian male population was higher. The difficulties of the young generation affected the preceding generation and promoted social dynamism. The worldwide data shows that the generation of young and the digital world have been constantly sought, but in reality, approximately one-third of the population in 2017 had no access to the internet.Design/methodology/approachThe worldwide movement around topics such as strategy on its threefold basis and Industry 4.0 enable a link to company duty towards society to be established. This present study was produced from 1 March 2020 to 2 September 2020 via resources of human and literature evaluation relating to the idea of strategic, Industry 4.0, the responsibility of society and the creation of youth. Its motive is the global creation of youth. Two recommendations should be made after studying the literature and information gathering that enabled “analyzing social responsibility of the company and industry 4.0 with a pivot on young creation: a strategic framework for resources of human management”.FindingsThe adoption of defensible practices and technology bring forth by the revolution in industrial is emphasized worldwide.Originality/valueThe focus on the usage of these ideas is essential, so that young people can absorb the workforce in the labour market. To achieve this, the CSR idea combines this theoretical triple-created recent study.
全球的年轻人口是指年龄在15至24岁之间的人。根据巴西地理研究所Estatística (IBGE)的统计数据,2017年,15岁和19岁的第二大女性人口仅落后于35岁和39岁。在这个时候,巴西的男性人口更高。年轻一代的困难影响了上一代,促进了社会的活力。全球数据显示,人们一直在寻找年轻一代和数字世界,但实际上,2017年约有三分之一的人口无法上网。设计/方法/方法围绕着诸如基于三重基础的战略和工业4.0等主题的全球运动,使公司对社会的责任得以建立。本研究是在2020年3月1日至2020年9月2日期间通过与战略、工业4.0、社会责任和青年创造有关的人力资源和文献评估进行的。其动机是全球青年的创造。在研究了“以青年创造为中心分析企业社会责任和工业4.0:人力资源管理战略框架”的文献和信息收集后,应提出两点建议。全世界都在强调采用由工业革命带来的可辩护的做法和技术。创意/价值关注这些想法的使用是至关重要的,这样年轻人才能吸收劳动力市场上的劳动力。为了实现这一目标,企业社会责任理念结合了这一理论三重创造的最新研究。
{"title":"Federate learning of corporate social authority and industry 4.0 that focus on young people: a strategic management framework for human resources","authors":"V. Sriram, M. Sikandar, Eti Khatri, S. Choubey, Ity Patni, L. K., K. Gulati","doi":"10.1108/ijpcc-02-2022-0056","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0056","url":null,"abstract":"\u0000Purpose\u0000The young population of the globe is defined by individuals aged 15 to 24 years. Based on statistics from the Instituto Brasileiro de Geografia e Estatística (IBGE), the second largest women population among 15 years as well as 19 years was in 2017 only behind 35 and 39 years. At this time, the Brazilian male population was higher. The difficulties of the young generation affected the preceding generation and promoted social dynamism. The worldwide data shows that the generation of young and the digital world have been constantly sought, but in reality, approximately one-third of the population in 2017 had no access to the internet.\u0000\u0000\u0000Design/methodology/approach\u0000The worldwide movement around topics such as strategy on its threefold basis and Industry 4.0 enable a link to company duty towards society to be established. This present study was produced from 1 March 2020 to 2 September 2020 via resources of human and literature evaluation relating to the idea of strategic, Industry 4.0, the responsibility of society and the creation of youth. Its motive is the global creation of youth. Two recommendations should be made after studying the literature and information gathering that enabled “analyzing social responsibility of the company and industry 4.0 with a pivot on young creation: a strategic framework for resources of human management”.\u0000\u0000\u0000Findings\u0000The adoption of defensible practices and technology bring forth by the revolution in industrial is emphasized worldwide.\u0000\u0000\u0000Originality/value\u0000The focus on the usage of these ideas is essential, so that young people can absorb the workforce in the labour market. To achieve this, the CSR idea combines this theoretical triple-created recent study.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42434799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficient multi-tasking for edge computing using federated learning 使用联邦学习的边缘计算节能多任务
IF 2.6 Q1 Computer Science Pub Date : 2022-07-08 DOI: 10.1108/ijpcc-03-2022-0106
Mukesh Soni, N. Nayak, Ashima Kalra, S. Degadwala, Nikhil Kumar Singh, Shweta Singh
PurposeThe purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.Design/methodology/approachThe new greedy algorithm is proposed to balance the energy consumption in edge computing.FindingsThe new greedy algorithm can balance energy more efficiently than the random approach by an average of 66.59 percent.Originality/valueThe results are shown in this paper which are better as compared to existing algorithms.
本文的目的是改进现有的边缘计算范式,以保持平衡的能源使用。设计/方法/方法为了平衡边缘计算中的能量消耗,提出了一种新的贪婪算法。结果贪心算法的能量平衡效率比随机算法平均高66.59%。与现有的算法相比,本文给出了更好的结果。
{"title":"Energy efficient multi-tasking for edge computing using federated learning","authors":"Mukesh Soni, N. Nayak, Ashima Kalra, S. Degadwala, Nikhil Kumar Singh, Shweta Singh","doi":"10.1108/ijpcc-03-2022-0106","DOIUrl":"https://doi.org/10.1108/ijpcc-03-2022-0106","url":null,"abstract":"\u0000Purpose\u0000The purpose of this paper is to improve the existing paradigm of edge computing to maintain a balanced energy usage.\u0000\u0000\u0000Design/methodology/approach\u0000The new greedy algorithm is proposed to balance the energy consumption in edge computing.\u0000\u0000\u0000Findings\u0000The new greedy algorithm can balance energy more efficiently than the random approach by an average of 66.59 percent.\u0000\u0000\u0000Originality/value\u0000The results are shown in this paper which are better as compared to existing algorithms.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47170438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning IIBES:一个改进基于身份的加密系统以确保联邦学习安全的拟议框架
IF 2.6 Q1 Computer Science Pub Date : 2022-06-24 DOI: 10.1108/ijpcc-02-2022-0073
Maitri Patel, Rajan Patel, Nimisha Patel, P. Shah, K. Gulati
PurposeIn the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.Design/methodology/approachThis paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.FindingsFurthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.Originality/valueAs a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.
目的在密码学领域,任何基于计算机的系统都可以通过使用密钥来实现身份验证、保密和识别。需要获得CA认可的证书,以证明用户可以交换编码通信,这是广泛识别PKC的最重要限制之一,因为该技术需要太多时间,而且容易出错。IBC降低了PKC的证书和密钥管理操作成本。IBE是IBC的重要开端。提出IBE方案背后的想法是降低证书和密钥管理的复杂性,但它也带来了密钥托管和密钥吊销问题,这为未经授权的用户提供了访问加密信息的机会。设计/方法论/方法本文旨在将IIBES的结果与现有系统进行比较,并对其进行安全分析,所提出的系统可用于联合学习中的安全性。Findings此外,它可以使用其他加密/解密算法(如椭圆曲线密码术(ECC))来实现,以比较执行效率。所提出的系统可以用于联合学习中的安全性。因此,提出了一种新的增强型IBE方案:IIBES,并使用RSA算法在JAVA编程语言中实现,该方案通过使用子KGC(SKGC)和带有nonce的共享密钥来消除密钥托管问题和密钥撤销问题,从而消除了密钥托管问题。IIBES还通过IBS提供身份验证,并可用于保护联合学习中的数据。
{"title":"IIBES: a proposed framework to improve the identity-based encryption system for securing federated learning","authors":"Maitri Patel, Rajan Patel, Nimisha Patel, P. Shah, K. Gulati","doi":"10.1108/ijpcc-02-2022-0073","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0073","url":null,"abstract":"\u0000Purpose\u0000In the field of cryptography, authentication, secrecy and identification can be accomplished by use of secret keys for any computer-based system. The need to acquire certificates endorsed through CA to substantiate users for the barter of encoded communications is one of the most significant constraints for the extensive recognition of PKC, as the technique takes too much time and susceptible to error. PKC’s certificate and key management operating costs are reduced with IBC. IBE is a crucial primeval in IBC. The thought behind presenting the IBE scheme was to diminish the complexity of certificate and key management, but it also gives rise to key escrow and key revocation problem, which provides access to unauthorised users for the encrypted information.\u0000\u0000\u0000Design/methodology/approach\u0000This paper aims to compare the result of IIBES with the existing system and to provide security analysis for the same and the proposed system can be used for the security in federated learning.\u0000\u0000\u0000Findings\u0000Furthermore, it can be implemented using other encryption/decryption algorithms like elliptic curve cryptography (ECC) to compare the execution efficiency. The proposed system can be used for the security in federated learning.\u0000\u0000\u0000Originality/value\u0000As a result, a novel enhanced IBE scheme: IIBES is suggested and implemented in JAVA programming language using RSA algorithm, which eradicates the key escrow problem through eliminating the need for a KGC and key revocation problem by sing sub-KGC (SKGC) and a shared secret with nonce. IIBES also provides authentication through IBS as well as it can be used for securing the data in federated learning.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44933815","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment 利用选择方案设计安全方法和云环境下的联合学习,优化高效的多用户数据共享
IF 2.6 Q1 Computer Science Pub Date : 2022-06-22 DOI: 10.1108/ijpcc-02-2022-0047
Shubangini Patil, Rekha Patil
PurposeUntil now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that
到目前为止,已经进行了大量的研究和应用,以提供从一个用户到另一个用户的安全性和原始数据,例如第三方审计和几种保护数据的方案,例如借助Rivest-Shamir-Adleman等加密算法生成密钥。这里是一些之前已经完成的相关工作。Yan等人(2017)提出了基于最小带宽的远程损伤控制复苏(RDCR)方案。通过使第三方能够执行公共诚信的验证。虽然它支持损坏数据的修复管理,并尝试恢复原始数据,但在实际应用中无法做到这一点,因此比我们提出的系统需要更多的计算和通信成本。在Chen等人(2015)的一篇论文中,使用广播加密,开发了云存储数据共享的想法。该技术旨在实现广播数据和动态共享,允许用户在不影响电子新闻包(EPK)的情况下加入和离开一个组。在这种情况下,理论概念是正确的和新的,但系统的实用性和效率是不可接受的,并且系统的安全性也受到了损害,因为它提出了在不更改任何密钥的情况下增加成员。在本研究中,研究了用于数据共享的基于身份的加密策略,以及用于提高模型安全性的密钥管理和元数据技术(Jiang和Guo, 2017)。这里提供正向和反向密文安全性。然而,它很难付诸实践,其局限性之一是它只能用于非常大量的云存储。在这里,它通过批处理审计扩展了对动态数据修改的支持。云存储方案中安全有效的隐私保护可证明数据拥有的重要特征是支持每一个重要特征,包括数据动态、隐私保护、批量审计和不可信和外包存储模型的拦截器验证(Pathare和Chouragadec, 2017)。为了防止使用基于新id的公钥证书,设计了一种同态签名机制。该签名系统被证明能够抵抗随机oracle模型的id攻击和伪造消息攻击(Nayak and Tripathy, 2018;Lin等人,2017)。在公共云中存储数据时,一个问题是数据所有者必须向用户提供大量密钥,以便他们访问文件。在这里,知识辅助软件工程(KASE)计划首次公开亮相。在共享大量文档时,数据所有者只需向用户提供特定的密钥,而用户只需要提供单个活板门。虽然这个概念是创新的,但KASE技术并不适用于日益常见的人造云。Cui等人(2016)认为,随着数据量的增长,分销管理系统(DMS)将无法处理它。因此,已经开发了各种经过验证的数据占有(PDP)方案,实际上所有数据都缺乏安全性。因此,在这些证书中,引入了基于双线性配对的PDP。由于其健壮和高效的特点,这主要适用于DMS。本研究的主要目的是设计和实现一个安全的云基础设施,用于共享组数据。本研究为云中的多用户数据提供了一种高效且安全的协议,允许多用户轻松共享数据。本文的研究方法和贡献如下:本研究的主要目标是设计和实现一个安全的云基础设施,用于共享组数据。本研究为云中的多用户数据提供了一种高效、安全的协议,使多个用户可以轻松共享数据。本研究的主要目的是设计和实现一个安全的云基础设施,用于共享组数据。本研究针对云中的多用户数据开发了一种高效且安全的协议,允许众多用户轻松交换数据。选择方案设计(SSD)包括两种算法;算法1针对有限用户进行了设计,算法2针对多用户进行了重新设计。此外,作者还设计了固态硬盘安全协议,该协议包括一个三阶段模型,即第一阶段、第二阶段和第三阶段。第一阶段生成参数并分发私钥,第二阶段为所有可用的用户生成通用密钥,第三阶段旨在防止不诚实的用户在数据共享中进行欺骗。 发现云计算中的数据共享为企业和个人提供了无限的计算资源和存储空间;此外,云计算还会导致一些隐私和安全问题,如容错、可靠性、机密性和数据完整性。密钥共识机制是安全通信的基本密码原语;此外,在这种现象的激励下,作者开发了数据共享模型中包含多个用户的ssd机制。为了安全起见,在云中共享的原创性/价值文件应该加密;稍后对这些文件进行解密,以便用户访问该文件。此外,密钥共识过程是安全通信的关键密码原语;此外,由于这种现象,作者设计了SSD机制,该机制在数据共享模型中包含了众多用户。对于SSD方法的评估,作者考虑了系统的理想环境,即作者使用java作为编程语言,eclipse作为集成的驱动电子工具对所提出的模型进行评估。该模型的硬件配置是这样的,它包含4 GB RAM和i7处理器,作者使用PBC库进行配对操作(PBC库,2022)。此外,在本文的下一节中,为了与现有的方法RDIC进行比较,用户数量有所不同(Li et al., 2020)。出于ssd安全协议的目的,选择一个素数作为此工作中的用户数量。
{"title":"An optimized and efficient multiuser data sharing using the selection scheme design secure approach and federated learning in cloud environment","authors":"Shubangini Patil, Rekha Patil","doi":"10.1108/ijpcc-02-2022-0047","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0047","url":null,"abstract":"\u0000Purpose\u0000Until now, a lot of research has been done and applied to provide security and original data from one user to another, such as third-party auditing and several schemes for securing the data, such as the generation of the key with the help of encryption algorithms like Rivest–Shamir–Adleman and others. Here are some of the related works that have been done previously. Remote damage control resuscitation (RDCR) scheme by Yan et al. (2017) is proposed based on the minimum bandwidth. By enabling the third party to perform the verification of public integrity. Although it supports the repair management for the corrupt data and tries to recover the original data, in practicality it fails to do so, and thus it takes more computation and communication cost than our proposed system. In a paper by Chen et al. (2015), using broadcast encryption, an idea for cloud storage data sharing has been developed. This technique aims to accomplish both broadcast data and dynamic sharing, allowing users to join and leave a group without affecting the electronic press kit (EPK). In this case, the theoretical notion was true and new, but the system’s practicality and efficiency were not acceptable, and the system’s security was also jeopardised because it proposed adding a member without altering any keys. In this research, an identity-based encryption strategy for data sharing was investigated, as well as key management and metadata techniques to improve model security (Jiang and Guo, 2017). The forward and reverse ciphertext security is supplied here. However, it is more difficult to put into practice, and one of its limitations is that it can only be used for very large amounts of cloud storage. Here, it extends support for dynamic data modification by batch auditing. The important feature of the secure and efficient privacy preserving provable data possession in cloud storage scheme was to support every important feature which includes data dynamics, privacy preservation, batch auditing and blockers verification for an untrusted and an outsourced storage model (Pathare and Chouragadec, 2017). A homomorphic signature mechanism was devised to prevent the usage of the public key certificate, which was based on the new id. This signature system was shown to be resistant to the id attack on the random oracle model and the assault of forged message (Nayak and Tripathy, 2018; Lin et al., 2017). When storing data in a public cloud, one issue is that the data owner must give an enormous number of keys to the users in order for them to access the files. At this place, the knowledge assisted software engineering (KASE) plan was publicly unveiled for the first time. While sharing a huge number of documents, the data owner simply has to supply the specific key to the user, and the user only needs to provide the single trapdoor. Although the concept is innovative, the KASE technique does not apply to the increasingly common manufactured cloud. Cui et al. (2016) claim that","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44543744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks 物联网网络中工业4.0应用的ai联合新型延迟感知链路调度
IF 2.6 Q1 Computer Science Pub Date : 2022-06-22 DOI: 10.1108/ijpcc-12-2021-0297
Suvarna Patil, Prasad Gokhale
PurposeWith the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network and by reducing the latency of transmitted data. The communications in IIoT and Industry 4.0 requires handshaking of multiple technologies for supporting heterogeneous networks and diverse protocols. IIoT applications may gather and analyse sensor data, allowing operators to monitor and manage production systems, resulting in considerable performance gains in automated processes. All IIoT applications are responsible for generating a vast set of data based on diverse characteristics. To obtain an optimum throughput in an IIoT environment requires efficiently processing of IIoT applications over communication channels. Because computing resources in the IIoT are limited, equitable resource allocation with the least amount of delay is the need of the IIoT applications. Although some existing scheduling strategies address delay concerns, faster transmission of data and optimal throughput should also be addressed along with the handling of transmission delay. Hence, this study aims to focus on a fair mechanism to handle throughput, transmission delay and faster transmission of data. The proposed work provides a link-scheduling algorithm termed as delay-aware resource allocation that allocates computing resources to computational-sensitive tasks by reducing overall latency and by increasing the overall throughput of the network. First of all, a multi-hop delay model is developed with multistep delay prediction using AI-federated neural network long–short-term memory (LSTM), which serves as a foundation for future design. Then, link-scheduling algorithm is designed for data routing in an efficient manner. The extensive experimental results reveal that the average end-to-end delay by considering processing, propagation, queueing and transmission delays is minimized with the proposed strategy. Experiments show that advances in machine learning have led to developing a smart, collaborative link scheduling algorithm for fairness-driven resource allocation with minimal delay and optimal throughput. The prediction performance of AI-federated LSTM is compared with the existing approaches and it outperforms over other techniques by achieving 98.2% accuracy.Design/methodology/approachWith an increase of IoT devices, the demand for more IoT gateways has increased, which increases the cost of network infrastructure. As a result, the proposed system uses low-cost intermediate gateways in this study. Each gateway may use a different communication technology for data transmission within an IoT network. As a result, gateways are heterogeneous, with hardware support limited to the technologies associated with the wireless sensor networks. Data communication fairness at each gateway is achieved in an IoT network by considering dynamic IoT traffic and link-scheduling problems to achi
目的随着人工智能联合技术的出现,通过提高网络吞吐量和减少传输数据的延迟,可以在工业物联网(IIoT)环境中执行复杂任务。工业物联网和工业4.0中的通信需要多种技术的握手,以支持异构网络和各种协议。工业物联网应用可以收集和分析传感器数据,使运营商能够监控和管理生产系统,从而在自动化过程中获得可观的性能提升。所有工业物联网应用程序都负责生成基于不同特征的大量数据。为了在工业物联网环境中获得最佳吞吐量,需要通过通信通道有效地处理工业物联网应用程序。由于工业物联网中的计算资源是有限的,因此工业物联网应用需要以最小的延迟公平地分配资源。尽管一些现有的调度策略解决了延迟问题,但在处理传输延迟的同时,还应该解决更快的数据传输和最佳吞吐量。因此,本研究旨在研究一种公平的机制来处理吞吐量、传输延迟和更快的数据传输。提出的工作提供了一种称为延迟感知资源分配的链路调度算法,该算法通过减少总体延迟和增加网络的总体吞吐量,将计算资源分配给计算敏感的任务。首先,利用人工智能联合神经网络长短期记忆(LSTM)建立了多跳延迟模型,并进行了多步延迟预测,为后续设计奠定了基础。然后,设计了链路调度算法,实现了高效的数据路由。大量的实验结果表明,该策略能最大限度地降低处理、传播、排队和传输延迟的端到端平均延迟。实验表明,机器学习的进步已经导致开发出一种智能的、协作的链路调度算法,用于公平驱动的资源分配,具有最小的延迟和最佳的吞吐量。将人工智能联合LSTM的预测性能与现有方法进行了比较,准确率达到98.2%,优于其他技术。设计/方法/方法随着物联网设备的增加,对更多物联网网关的需求增加,这增加了网络基础设施的成本。因此,本研究提出的系统使用低成本的中间网关。每个网关可以使用不同的通信技术在物联网网络中进行数据传输。因此,网关是异构的,其硬件支持仅限于与无线传感器网络相关的技术。通过考虑物联网动态流量和链路调度问题,实现物联网网络中各网关的数据通信公平性,实现物联网网络资源的有效分配。针对这些问题,提出了两阶段的解决方案,以提高异构网络中数据通信的公平性。在第一阶段,使用LSTM网络模型预测流量,预测动态流量。在第二阶段,根据所支持的蓝牙、Wi-Fi和Zigbee等不同技术的预测负载、网关之间的距离、链路容量和所需时间,实现每种技术的高效选路和链路调度。它增强了所有网关的数据传输公平性,使更多的数据传输达到最大的吞吐量。我们提出的方法通过实现最大的网络吞吐量而优于其他方法,并且通过仿真证明了更少的数据包延迟。结果表明,本文提出的方法在实现最大网络吞吐量方面具有优势,并且通过仿真验证了该方法具有较小的数据包延迟。它还表明,人工智能和物联网联合设备可以在工业4.0的物联网网络上无缝通信。这个概念是原创研究工作的一部分,可以被工业4.0采用,以实现人工智能和物联网联合设备的轻松无缝连接。
{"title":"AI-federated novel delay-aware link-scheduling for Industry 4.0 applications in IoT networks","authors":"Suvarna Patil, Prasad Gokhale","doi":"10.1108/ijpcc-12-2021-0297","DOIUrl":"https://doi.org/10.1108/ijpcc-12-2021-0297","url":null,"abstract":"\u0000Purpose\u0000With the advent of AI-federated technologies, it is feasible to perform complex tasks in industrial Internet of Things (IIoT) environment by enhancing throughput of the network and by reducing the latency of transmitted data. The communications in IIoT and Industry 4.0 requires handshaking of multiple technologies for supporting heterogeneous networks and diverse protocols. IIoT applications may gather and analyse sensor data, allowing operators to monitor and manage production systems, resulting in considerable performance gains in automated processes. All IIoT applications are responsible for generating a vast set of data based on diverse characteristics. To obtain an optimum throughput in an IIoT environment requires efficiently processing of IIoT applications over communication channels. Because computing resources in the IIoT are limited, equitable resource allocation with the least amount of delay is the need of the IIoT applications. Although some existing scheduling strategies address delay concerns, faster transmission of data and optimal throughput should also be addressed along with the handling of transmission delay. Hence, this study aims to focus on a fair mechanism to handle throughput, transmission delay and faster transmission of data. The proposed work provides a link-scheduling algorithm termed as delay-aware resource allocation that allocates computing resources to computational-sensitive tasks by reducing overall latency and by increasing the overall throughput of the network. First of all, a multi-hop delay model is developed with multistep delay prediction using AI-federated neural network long–short-term memory (LSTM), which serves as a foundation for future design. Then, link-scheduling algorithm is designed for data routing in an efficient manner. The extensive experimental results reveal that the average end-to-end delay by considering processing, propagation, queueing and transmission delays is minimized with the proposed strategy. Experiments show that advances in machine learning have led to developing a smart, collaborative link scheduling algorithm for fairness-driven resource allocation with minimal delay and optimal throughput. The prediction performance of AI-federated LSTM is compared with the existing approaches and it outperforms over other techniques by achieving 98.2% accuracy.\u0000\u0000\u0000Design/methodology/approach\u0000With an increase of IoT devices, the demand for more IoT gateways has increased, which increases the cost of network infrastructure. As a result, the proposed system uses low-cost intermediate gateways in this study. Each gateway may use a different communication technology for data transmission within an IoT network. As a result, gateways are heterogeneous, with hardware support limited to the technologies associated with the wireless sensor networks. Data communication fairness at each gateway is achieved in an IoT network by considering dynamic IoT traffic and link-scheduling problems to achi","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-06-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43806530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning 基于联合学习的能量最小化自适应阈值梯度节点定位的混合累积方法
IF 2.6 Q1 Computer Science Pub Date : 2022-06-17 DOI: 10.1108/ijpcc-02-2022-0045
A. I., K. Selvakumar
PurposeLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed adaptive threshold gradient feature (ATGF) model. A received signal strength indicator (RSSI) model with node estimated features is implicated with localization problem and enhanced with hybrid cumulative approach (HCA) algorithm for node optimizations with distance predicting.Design/methodology/approachUsing a theoretical or empirical signal propagation model, the RSSI (known transmitting power) is converted to distance, the received power (measured at the receiving node) is converted to distance and the distance is converted to RSSI (known receiving power). As a result, the approximate distance between the transceiver node and the receiver may be determined by measuring the intensity of the received signal. After acquiring information on the distance between the anchor node and the unknown node, the location of the unknown node may be determined using either the trilateral technique or the maximum probability estimate approach, depending on the circumstances using federated learning.FindingsImprovisation of localization for wireless sensor network has become one of the prime design features for estimating the different conditional changes externally and internally. One such feature of improvement is observed in this paper, via HCA where each feature of localization is depicted with machine learning algorithms imparting the energy reduction problem for each newer localized nodes in Section 5. All affected parametric features on energy levels and localization problem for newer and extinct nodes are implicated with hybrid cumulative approach as in Section 4. The proposed algorithm (HCA with AGTF) has implicated with significant change in energy levels of nodes which are generated newly and which are non-active for a stipulated time which are mentioned and tabulated in figures and tables in Section 6.Originality/valueLocalization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed ATGF model. An RSSI model with node estimated features is implicated with localization problem and enhanced with HCA algorithm for node optimizations with distance predicting.
目的节点的定位对于获得不同节点的访问至关重要,这些节点将在网络无法访问的极端区域提供服务。节点的定位特征已经成为一项重要的研究,其中距离模型上的多个特征涉及到每一组定位参数的预测和启发式模型,这些参数控制着所提出的自适应阈值梯度特征(ATGF)模型的能量最小化设计。将具有节点估计特征的接收信号强度指标(RSSI)模型与定位问题联系起来,并用混合累积方法(HCA)算法对其进行了改进,用于距离预测的节点优化。设计/方法/方法使用理论或经验信号传播模型,将RSSI(已知发射功率)转换为距离,将接收功率(在接收节点测量)转换为间距,并将间距转换为RSSI(未知接收功率)。结果,可以通过测量接收信号的强度来确定收发器节点和接收器之间的近似距离。在获取关于锚节点和未知节点之间的距离的信息之后,根据使用联合学习的情况,可以使用三边技术或最大概率估计方法来确定未知节点的位置。发现改进无线传感器网络的定位已成为估计外部和内部不同条件变化的主要设计特征之一。本文通过HCA观察到了一个这样的改进特征,其中在第5节中,用机器学习算法描述了定位的每个特征,为每个新的定位节点赋予能量减少问题。如第4节所述,所有受影响的能级参数特征以及新节点和已灭绝节点的定位问题都与混合累积方法有关。所提出的算法(带有AGTF的HCA)涉及新生成的节点的能级的显著变化,这些节点在规定的时间内处于非活动状态,如第6节中的图表所述。起源/价值节点的定位对于获得不同节点的访问至关重要,这些节点将在网络无法访问。节点的定位特征已经成为一项重要的研究,其中距离模型上的多个特征涉及到每一组定位参数的预测和启发式模型,这些参数控制着所提出的ATGF模型的能量最小化设计。将具有节点估计特征的RSSI模型与定位问题联系起来,并用HCA算法对具有距离预测的节点优化进行了改进。
{"title":"Hybrid cumulative approach for localization of nodes with adaptive threshold gradient feature on energy minimization using federated learning","authors":"A. I., K. Selvakumar","doi":"10.1108/ijpcc-02-2022-0045","DOIUrl":"https://doi.org/10.1108/ijpcc-02-2022-0045","url":null,"abstract":"\u0000Purpose\u0000Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed adaptive threshold gradient feature (ATGF) model. A received signal strength indicator (RSSI) model with node estimated features is implicated with localization problem and enhanced with hybrid cumulative approach (HCA) algorithm for node optimizations with distance predicting.\u0000\u0000\u0000Design/methodology/approach\u0000Using a theoretical or empirical signal propagation model, the RSSI (known transmitting power) is converted to distance, the received power (measured at the receiving node) is converted to distance and the distance is converted to RSSI (known receiving power). As a result, the approximate distance between the transceiver node and the receiver may be determined by measuring the intensity of the received signal. After acquiring information on the distance between the anchor node and the unknown node, the location of the unknown node may be determined using either the trilateral technique or the maximum probability estimate approach, depending on the circumstances using federated learning.\u0000\u0000\u0000Findings\u0000Improvisation of localization for wireless sensor network has become one of the prime design features for estimating the different conditional changes externally and internally. One such feature of improvement is observed in this paper, via HCA where each feature of localization is depicted with machine learning algorithms imparting the energy reduction problem for each newer localized nodes in Section 5. All affected parametric features on energy levels and localization problem for newer and extinct nodes are implicated with hybrid cumulative approach as in Section 4. The proposed algorithm (HCA with AGTF) has implicated with significant change in energy levels of nodes which are generated newly and which are non-active for a stipulated time which are mentioned and tabulated in figures and tables in Section 6.\u0000\u0000\u0000Originality/value\u0000Localization of the nodes is crucial for gaining access of different nodes which would provision in extreme areas where networks are unreachable. The feature of localization of nodes has become a significant study where multiple features on distance model are implicated on predictive and heuristic model for each set of localization parameters that govern the design on energy minimization with proposed ATGF model. An RSSI model with node estimated features is implicated with localization problem and enhanced with HCA algorithm for node optimizations with distance predicting.\u0000","PeriodicalId":43952,"journal":{"name":"International Journal of Pervasive Computing and Communications","volume":null,"pages":null},"PeriodicalIF":2.6,"publicationDate":"2022-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42247435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Pervasive Computing and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1