Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.03.007
Adil El Mane , Khalid Tatane , Younes Chihab
The proposed idea is to give all the agricultural stakeholders secure storage. We must automate several processes utilizing brilliant codes to reduce risks and errors. The suggested schema applies Blockchain, source codes, and IoT on a farm network to enhance the analysis of agrarian datasets and tracking products to raise the productivity of agro-based supply chains. The application’s architecture will fix the faults found in earlier research. In the suggested method, sensors give us information about the environment. The Blockchain ledger stores our data in blocks. We create special agricultural automated codes in the treatment layer to automate task decisions.
{"title":"Transforming agricultural supply chains: Leveraging blockchain-enabled java smart contracts and IoT integration","authors":"Adil El Mane , Khalid Tatane , Younes Chihab","doi":"10.1016/j.icte.2024.03.007","DOIUrl":"https://doi.org/10.1016/j.icte.2024.03.007","url":null,"abstract":"<div><p>The proposed idea is to give all the agricultural stakeholders secure storage. We must automate several processes utilizing brilliant codes to reduce risks and errors. The suggested schema applies Blockchain, source codes, and IoT on a farm network to enhance the analysis of agrarian datasets and tracking products to raise the productivity of agro-based supply chains. The application’s architecture will fix the faults found in earlier research. In the suggested method, sensors give us information about the environment. The Blockchain ledger stores our data in blocks. We create special agricultural automated codes in the treatment layer to automate task decisions.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 650-672"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000316/pdfft?md5=a218bb2ce46f59ea04ef7e15a93953e8&pid=1-s2.0-S2405959524000316-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141439073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.11.006
Jiho Kim , Hyeong-Gun Joo , Dong-Joon Shin
In this paper, a bi-directional sliding window decoder is proposed for spatially coupled low-density parity-check (SC-LDPC) codes, which improves the decoding complexity and performance compared to the conventional sliding window decoding (SWD) by sharing messages at the overlapped part of forward and backward decoding windows. Moreover, by using proper scaling factors that determine the weight of each message at the overlapped part of two sliding windows, good local decoding effects can be efficiently spread out to both ends of SC-LDPC code during decoding process. Such effective message updates of the proposed bi-directional overlapped sliding window decoding (BO-SWD) improve error floor performance compared to the conventional SWD. The validity of BO-SWD is verified by simulation with various SC-LDPC ensembles.
{"title":"Effective bi-directional overlapped sliding window decoding of SC-LDPC codes","authors":"Jiho Kim , Hyeong-Gun Joo , Dong-Joon Shin","doi":"10.1016/j.icte.2023.11.006","DOIUrl":"10.1016/j.icte.2023.11.006","url":null,"abstract":"<div><p>In this paper, a bi-directional sliding window decoder is proposed for spatially coupled low-density parity-check (SC-LDPC) codes, which improves the decoding complexity and performance compared to the conventional sliding window decoding (SWD) by sharing messages at the overlapped part of forward and backward decoding windows. Moreover, by using proper scaling factors that determine the weight of each message at the overlapped part of two sliding windows, good local decoding effects can be efficiently spread out to both ends of SC-LDPC code during decoding process. Such effective message updates of the proposed bi-directional overlapped sliding window decoding (BO-SWD) improve error floor performance compared to the conventional SWD. The validity of BO-SWD is verified by simulation with various SC-LDPC ensembles.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 513-518"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001492/pdfft?md5=bce89b72cf0d60a9234fe7dd795bbcd5&pid=1-s2.0-S2405959523001492-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.11.009
Quoc Bao Phan, Tuy Tan Nguyen
This study introduces an advanced artificial model, grey wolf optimization (GWO)-nested complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN)-convolutional neural network (CNN)-bidirectional long short-term memory (BiLSTM), for wind speed forecasting. Initially, CEEMDAN with two nested layers decomposes the time series into intrinsic mode functions (IMFs) to enhance forecasting capabilities. Subsequently, CNN extracts features from IMFs, and BiLSTM captures temporal dependencies for precise predictions. GWO further enhances the accurac by selecting optimal hyperparameters based on decomposition results. Test results on diverse wind speed datasets demonstrate the model’s superiority, with a mean absolute percentage error (MAPE) of approximately 3%.
{"title":"Enhancing wind speed forecasting accuracy using a GWO-nested CEEMDAN-CNN-BiLSTM model","authors":"Quoc Bao Phan, Tuy Tan Nguyen","doi":"10.1016/j.icte.2023.11.009","DOIUrl":"10.1016/j.icte.2023.11.009","url":null,"abstract":"<div><p>This study introduces an advanced artificial model, grey wolf optimization (GWO)-nested complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN)-convolutional neural network (CNN)-bidirectional long short-term memory (BiLSTM), for wind speed forecasting. Initially, CEEMDAN with two nested layers decomposes the time series into intrinsic mode functions (IMFs) to enhance forecasting capabilities. Subsequently, CNN extracts features from IMFs, and BiLSTM captures temporal dependencies for precise predictions. GWO further enhances the accurac by selecting optimal hyperparameters based on decomposition results. Test results on diverse wind speed datasets demonstrate the model’s superiority, with a mean absolute percentage error (MAPE) of approximately 3%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 485-490"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001522/pdfft?md5=8197c98fe29e0ede6bd7cbb98a478d22&pid=1-s2.0-S2405959523001522-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.01.005
Yongcheol Kim , Seunghwan Seol , Jaehak Chung , Hojun Lee
This paper proposes a channel response generative adversarial network (CRGAN)-based turbo code interleaver that estimates a channel response and interleaver indices at a transmitter by using a sound speed profile (SSP) and the ocean environments without feedback from a receiver. The interleaver indices are designed to allocate important bits from the turbo code to subcarriers with great channel gains, which reduces them from being affected by deep fading. Computer simulations and practical ocean experiments demonstrate that the proposed method estimates the channel response with low mean squared errors (MSEs) and improves bit error rate (BER) performances compared with the conventional method.
{"title":"CRGAN-based turbo code interleaver for underwater acoustic communications","authors":"Yongcheol Kim , Seunghwan Seol , Jaehak Chung , Hojun Lee","doi":"10.1016/j.icte.2024.01.005","DOIUrl":"10.1016/j.icte.2024.01.005","url":null,"abstract":"<div><p>This paper proposes a channel response generative adversarial network (CRGAN)-based turbo code interleaver that estimates a channel response and interleaver indices at a transmitter by using a sound speed profile (SSP) and the ocean environments without feedback from a receiver. The interleaver indices are designed to allocate important bits from the turbo code to subcarriers with great channel gains, which reduces them from being affected by deep fading. Computer simulations and practical ocean experiments demonstrate that the proposed method estimates the channel response with low mean squared errors (MSEs) and improves bit error rate (BER) performances compared with the conventional method.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 498-506"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000055/pdfft?md5=02a368496e3f0356682b8dfb605afb57&pid=1-s2.0-S2405959524000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139637034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.005
Seon-Geun Jeong , Quang Vinh Do , Won-Joo Hwang
Photovoltaic power generation forecasting is crucial for energy management, smart grid construction, and energy markets. This study proposes a hybrid quantum–classical gated recurrent unit (HQGRU)-based framework for forecasting short-term photovoltaic power generation in a time-series manner. The HQGRU model uses a classical layer followed by a quantum embedding circuit to convert classical data into quantum data. Subsequently, variational quantum circuits are used for feature extraction. To demonstrate the performance of the proposed model, we used practical data on photovoltaic power generation and the weather in Busan, Republic of Korea. The results demonstrate the high accuracy of the proposed HQGRU model.
{"title":"Short-term photovoltaic power forecasting based on hybrid quantum gated recurrent unit","authors":"Seon-Geun Jeong , Quang Vinh Do , Won-Joo Hwang","doi":"10.1016/j.icte.2023.12.005","DOIUrl":"10.1016/j.icte.2023.12.005","url":null,"abstract":"<div><p>Photovoltaic power generation forecasting is crucial for energy management, smart grid construction, and energy markets. This study proposes a hybrid quantum–classical gated recurrent unit (HQGRU)-based framework for forecasting short-term photovoltaic power generation in a time-series manner. The HQGRU model uses a classical layer followed by a quantum embedding circuit to convert classical data into quantum data. Subsequently, variational quantum circuits are used for feature extraction. To demonstrate the performance of the proposed model, we used practical data on photovoltaic power generation and the weather in Busan, Republic of Korea. The results demonstrate the high accuracy of the proposed HQGRU model.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 608-613"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001637/pdfft?md5=e515a3c6c04e51daf95fcc99b997c0f5&pid=1-s2.0-S2405959523001637-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139013853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.004
Seok Ryu , Sungjun Hong , Sangyun Lee
In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.
{"title":"Making TSM better: Preserving foundational philosophy for efficient action recognition","authors":"Seok Ryu , Sungjun Hong , Sangyun Lee","doi":"10.1016/j.icte.2023.12.004","DOIUrl":"10.1016/j.icte.2023.12.004","url":null,"abstract":"<div><p>In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 570-575"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001625/pdfft?md5=7071ddbe7afa0f6d6c37f5b8286e72a6&pid=1-s2.0-S2405959523001625-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.03.005
Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim
Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.
{"title":"A study of the relationship of malware detection mechanisms using Artificial Intelligence","authors":"Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim","doi":"10.1016/j.icte.2024.03.005","DOIUrl":"10.1016/j.icte.2024.03.005","url":null,"abstract":"<div><p>Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 632-649"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000298/pdfft?md5=8c3370dad7e696a91dedc176306bffcb&pid=1-s2.0-S2405959524000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2023.12.009
Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang
Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.
{"title":"Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems","authors":"Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang","doi":"10.1016/j.icte.2023.12.009","DOIUrl":"10.1016/j.icte.2023.12.009","url":null,"abstract":"<div><p>Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 583-587"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001674/pdfft?md5=dd4ee824a5b20f3fe5bb80495e43d67c&pid=1-s2.0-S2405959523001674-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139395104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.04.005
Ehtsham Irshad, Abdul Basit Siddiqui
With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.
随着技术的快速发展,识别网络攻击背后的攻击者变得越来越复杂。为应对这一现象,当前的网络威胁归因过程包括战术、技术和程序(TTP)、工具、目标国家/公司和应用等特征。它们不包括攻击者的背景和动机;因此,它们需要更精细的特征。要更好地了解攻击者的背景、动机和目标,在这一过程中加入行为特征至关重要。本研究强调了在现有技术特征基础上添加行为特征对确定实际攻击者的影响。行为特征是从泰国 CERT 发布的数据集 Threat actor encyclopedia 中提取的。本研究调查还分析了混合特征(技术特征和行为特征)的影响。为此,我们采用了特征选择技术来选择最佳特征。在实证结果中,我们使用了威胁行为者百科全书(由泰国计算机应急小组发布的数据集)来提取行为属性。通过使用机器/深度学习算法进行增强,我们在准确率、精确度、召回率和 F1 测量方面分别取得了 97%、98.8%、97% 和 97.2% 的高分。
{"title":"Context-aware cyber-threat attribution based on hybrid features","authors":"Ehtsham Irshad, Abdul Basit Siddiqui","doi":"10.1016/j.icte.2024.04.005","DOIUrl":"10.1016/j.icte.2024.04.005","url":null,"abstract":"<div><p>With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 553-569"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000420/pdfft?md5=acf5e622fa03761320f62de48e4bf144&pid=1-s2.0-S2405959524000420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140785956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-01DOI: 10.1016/j.icte.2024.01.001
Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho
In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.
在 CRN 中,开发一种能持续提供准确信道状态信息的高效可靠的频谱检测器至关重要。在这项工作中,我们研究了完全分布式环境中的 CSS,在这种环境中,所有次级用户(SU)都配备了定向天线,并且仅根据其本地知识做出决策,SU 之间不共享信息。首先,我们建立了一个随机顺序优化问题(NP-hard),通过对能量感应/检测阈值的动态优化控制,最大化 SU 的检测精度。它能使 SU 在不对主网络造成干扰的情况下选择可用信道和扇区。为了在分布式环境中解决这个问题,我们将其转化为一个分布式部分观测马尔可夫决策过程(Dec-POMDP)问题。其次,为了在实际环境中确定 Dec-POMDP 的最佳控制,而无需事先了解状态-行动转换概率,我们开发了一种基于多代理深度确定性策略梯度(MADDPG)的算法,简称为 MA-DCSS。该算法采用集中训练和分散执行(CTDE)架构。第三,我们分析了该算法的计算复杂度,并通过计算复杂度的多项式(以信道、扇区和 SU 的数量为单位)展示了所提方法的可扩展性。最后,仿真证实,与基线算法相比,所提出的方案在收敛速度、精确检测和误报概率等方面都具有更高的性能。
{"title":"Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna","authors":"Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho","doi":"10.1016/j.icte.2024.01.001","DOIUrl":"10.1016/j.icte.2024.01.001","url":null,"abstract":"<div><p>In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 472-478"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000018/pdfft?md5=d4778771f73447943cd1a8d63fc1e1b7&pid=1-s2.0-S2405959524000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}