首页 > 最新文献

ICT Express最新文献

英文 中文
Transforming agricultural supply chains: Leveraging blockchain-enabled java smart contracts and IoT integration 改造农业供应链:利用区块链支持的 Java 智能合约和物联网集成
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.03.007
Adil El Mane , Khalid Tatane , Younes Chihab

The proposed idea is to give all the agricultural stakeholders secure storage. We must automate several processes utilizing brilliant codes to reduce risks and errors. The suggested schema applies Blockchain, source codes, and IoT on a farm network to enhance the analysis of agrarian datasets and tracking products to raise the productivity of agro-based supply chains. The application’s architecture will fix the faults found in earlier research. In the suggested method, sensors give us information about the environment. The Blockchain ledger stores our data in blocks. We create special agricultural automated codes in the treatment layer to automate task decisions.

我们提出的想法是为所有农业利益相关者提供安全的存储空间。我们必须利用出色的代码实现多个流程的自动化,以减少风险和错误。建议的方案将区块链、源代码和物联网应用于农场网络,以加强对农业数据集的分析和产品追踪,从而提高以农业为基础的供应链的生产率。该应用的架构将解决早期研究中发现的问题。在建议的方法中,传感器为我们提供有关环境的信息。区块链账本将我们的数据存储在区块中。我们在处理层创建特殊的农业自动化代码,以自动执行任务决策。
{"title":"Transforming agricultural supply chains: Leveraging blockchain-enabled java smart contracts and IoT integration","authors":"Adil El Mane ,&nbsp;Khalid Tatane ,&nbsp;Younes Chihab","doi":"10.1016/j.icte.2024.03.007","DOIUrl":"https://doi.org/10.1016/j.icte.2024.03.007","url":null,"abstract":"<div><p>The proposed idea is to give all the agricultural stakeholders secure storage. We must automate several processes utilizing brilliant codes to reduce risks and errors. The suggested schema applies Blockchain, source codes, and IoT on a farm network to enhance the analysis of agrarian datasets and tracking products to raise the productivity of agro-based supply chains. The application’s architecture will fix the faults found in earlier research. In the suggested method, sensors give us information about the environment. The Blockchain ledger stores our data in blocks. We create special agricultural automated codes in the treatment layer to automate task decisions.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 650-672"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000316/pdfft?md5=a218bb2ce46f59ea04ef7e15a93953e8&pid=1-s2.0-S2405959524000316-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141439073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective bi-directional overlapped sliding window decoding of SC-LDPC codes SC-LDPC 码的有效双向重叠滑动窗口解码
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.11.006
Jiho Kim , Hyeong-Gun Joo , Dong-Joon Shin

In this paper, a bi-directional sliding window decoder is proposed for spatially coupled low-density parity-check (SC-LDPC) codes, which improves the decoding complexity and performance compared to the conventional sliding window decoding (SWD) by sharing messages at the overlapped part of forward and backward decoding windows. Moreover, by using proper scaling factors that determine the weight of each message at the overlapped part of two sliding windows, good local decoding effects can be efficiently spread out to both ends of SC-LDPC code during decoding process. Such effective message updates of the proposed bi-directional overlapped sliding window decoding (BO-SWD) improve error floor performance compared to the conventional SWD. The validity of BO-SWD is verified by simulation with various SC-LDPC ensembles.

本文针对空间耦合低密度奇偶校验(SC-LDPC)码提出了一种双向滑动窗口解码器,与传统的滑动窗口解码(SWD)相比,该解码器通过共享前向和后向解码窗口重叠部分的信息,提高了解码复杂度和性能。此外,通过使用适当的缩放因子来确定两个滑动窗口重叠部分每个信息的权重,在解码过程中,良好的局部解码效果可以有效地扩散到 SC-LDPC 码的两端。与传统的双向重叠滑动窗口解码(SWD)相比,所提出的双向重叠滑动窗口解码(BO-SWD)的这种有效信息更新提高了误差底限性能。BO-SWD 的有效性通过各种 SC-LDPC 集合的仿真得到了验证。
{"title":"Effective bi-directional overlapped sliding window decoding of SC-LDPC codes","authors":"Jiho Kim ,&nbsp;Hyeong-Gun Joo ,&nbsp;Dong-Joon Shin","doi":"10.1016/j.icte.2023.11.006","DOIUrl":"10.1016/j.icte.2023.11.006","url":null,"abstract":"<div><p>In this paper, a bi-directional sliding window decoder is proposed for spatially coupled low-density parity-check (SC-LDPC) codes, which improves the decoding complexity and performance compared to the conventional sliding window decoding (SWD) by sharing messages at the overlapped part of forward and backward decoding windows. Moreover, by using proper scaling factors that determine the weight of each message at the overlapped part of two sliding windows, good local decoding effects can be efficiently spread out to both ends of SC-LDPC code during decoding process. Such effective message updates of the proposed bi-directional overlapped sliding window decoding (BO-SWD) improve error floor performance compared to the conventional SWD. The validity of BO-SWD is verified by simulation with various SC-LDPC ensembles.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 513-518"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001492/pdfft?md5=bce89b72cf0d60a9234fe7dd795bbcd5&pid=1-s2.0-S2405959523001492-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139291646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing wind speed forecasting accuracy using a GWO-nested CEEMDAN-CNN-BiLSTM model 利用 GWO 嵌套 CEEMDAN-CNN-BiLSTM 模型提高风速预报精度
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.11.009
Quoc Bao Phan, Tuy Tan Nguyen

This study introduces an advanced artificial model, grey wolf optimization (GWO)-nested complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN)-convolutional neural network (CNN)-bidirectional long short-term memory (BiLSTM), for wind speed forecasting. Initially, CEEMDAN with two nested layers decomposes the time series into intrinsic mode functions (IMFs) to enhance forecasting capabilities. Subsequently, CNN extracts features from IMFs, and BiLSTM captures temporal dependencies for precise predictions. GWO further enhances the accurac by selecting optimal hyperparameters based on decomposition results. Test results on diverse wind speed datasets demonstrate the model’s superiority, with a mean absolute percentage error (MAPE) of approximately 3%.

本研究介绍了一种用于风速预报的先进人工模型,即灰狼优化(GWO)-嵌套完整集合经验模式分解与自适应噪声(CEEMDAN)-卷积神经网络(CNN)-双向长短期记忆(BiLSTM)。首先,具有两个嵌套层的 CEEMDAN 将时间序列分解为固有模态函数 (IMF),以增强预测能力。随后,CNN 从 IMFs 中提取特征,BiLSTM 则捕捉时间相关性,从而进行精确预测。GWO 根据分解结果选择最佳超参数,从而进一步提高预测精度。在不同风速数据集上的测试结果证明了该模型的优越性,其平均绝对百分比误差 (MAPE) 约为 3%。
{"title":"Enhancing wind speed forecasting accuracy using a GWO-nested CEEMDAN-CNN-BiLSTM model","authors":"Quoc Bao Phan,&nbsp;Tuy Tan Nguyen","doi":"10.1016/j.icte.2023.11.009","DOIUrl":"10.1016/j.icte.2023.11.009","url":null,"abstract":"<div><p>This study introduces an advanced artificial model, grey wolf optimization (GWO)-nested complete ensemble empirical mode decomposition with adaptive noise (CEEMDAN)-convolutional neural network (CNN)-bidirectional long short-term memory (BiLSTM), for wind speed forecasting. Initially, CEEMDAN with two nested layers decomposes the time series into intrinsic mode functions (IMFs) to enhance forecasting capabilities. Subsequently, CNN extracts features from IMFs, and BiLSTM captures temporal dependencies for precise predictions. GWO further enhances the accurac by selecting optimal hyperparameters based on decomposition results. Test results on diverse wind speed datasets demonstrate the model’s superiority, with a mean absolute percentage error (MAPE) of approximately 3%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 485-490"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001522/pdfft?md5=8197c98fe29e0ede6bd7cbb98a478d22&pid=1-s2.0-S2405959523001522-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139303720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRGAN-based turbo code interleaver for underwater acoustic communications 基于 CRGAN 的水下声学通信涡轮编码交织器
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.01.005
Yongcheol Kim , Seunghwan Seol , Jaehak Chung , Hojun Lee

This paper proposes a channel response generative adversarial network (CRGAN)-based turbo code interleaver that estimates a channel response and interleaver indices at a transmitter by using a sound speed profile (SSP) and the ocean environments without feedback from a receiver. The interleaver indices are designed to allocate important bits from the turbo code to subcarriers with great channel gains, which reduces them from being affected by deep fading. Computer simulations and practical ocean experiments demonstrate that the proposed method estimates the channel response with low mean squared errors (MSEs) and improves bit error rate (BER) performances compared with the conventional method.

本文提出了一种基于信道响应生成对抗网络(CRGAN)的涡轮编码交织器,该交织器通过声速剖面(SSP)和海洋环境估计发射机的信道响应和交织器指数,而无需接收机的反馈。设计交织器指数的目的是将涡轮编码中的重要比特分配给具有较大信道增益的子载波,从而减少它们受深度衰落的影响。计算机模拟和实际海洋实验证明,与传统方法相比,所提出的方法能以较低的均方误差(MSE)估算信道响应,并提高误码率(BER)性能。
{"title":"CRGAN-based turbo code interleaver for underwater acoustic communications","authors":"Yongcheol Kim ,&nbsp;Seunghwan Seol ,&nbsp;Jaehak Chung ,&nbsp;Hojun Lee","doi":"10.1016/j.icte.2024.01.005","DOIUrl":"10.1016/j.icte.2024.01.005","url":null,"abstract":"<div><p>This paper proposes a channel response generative adversarial network (CRGAN)-based turbo code interleaver that estimates a channel response and interleaver indices at a transmitter by using a sound speed profile (SSP) and the ocean environments without feedback from a receiver. The interleaver indices are designed to allocate important bits from the turbo code to subcarriers with great channel gains, which reduces them from being affected by deep fading. Computer simulations and practical ocean experiments demonstrate that the proposed method estimates the channel response with low mean squared errors (MSEs) and improves bit error rate (BER) performances compared with the conventional method.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 498-506"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000055/pdfft?md5=02a368496e3f0356682b8dfb605afb57&pid=1-s2.0-S2405959524000055-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139637034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Short-term photovoltaic power forecasting based on hybrid quantum gated recurrent unit 基于混合量子门控递归单元的短期光伏功率预测
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.005
Seon-Geun Jeong , Quang Vinh Do , Won-Joo Hwang

Photovoltaic power generation forecasting is crucial for energy management, smart grid construction, and energy markets. This study proposes a hybrid quantum–classical gated recurrent unit (HQGRU)-based framework for forecasting short-term photovoltaic power generation in a time-series manner. The HQGRU model uses a classical layer followed by a quantum embedding circuit to convert classical data into quantum data. Subsequently, variational quantum circuits are used for feature extraction. To demonstrate the performance of the proposed model, we used practical data on photovoltaic power generation and the weather in Busan, Republic of Korea. The results demonstrate the high accuracy of the proposed HQGRU model.

光伏发电预测对能源管理、智能电网建设和能源市场至关重要。本研究提出了一种基于混合量子-经典门控递归单元(HQGRU)的框架,用于以时间序列方式预测短期光伏发电量。HQGRU 模型使用经典层和量子嵌入电路将经典数据转换为量子数据。随后,变量子电路用于特征提取。为了证明所提模型的性能,我们使用了光伏发电和大韩民国釜山天气的实际数据。结果表明,所提出的 HQGRU 模型具有很高的准确性。
{"title":"Short-term photovoltaic power forecasting based on hybrid quantum gated recurrent unit","authors":"Seon-Geun Jeong ,&nbsp;Quang Vinh Do ,&nbsp;Won-Joo Hwang","doi":"10.1016/j.icte.2023.12.005","DOIUrl":"10.1016/j.icte.2023.12.005","url":null,"abstract":"<div><p>Photovoltaic power generation forecasting is crucial for energy management, smart grid construction, and energy markets. This study proposes a hybrid quantum–classical gated recurrent unit (HQGRU)-based framework for forecasting short-term photovoltaic power generation in a time-series manner. The HQGRU model uses a classical layer followed by a quantum embedding circuit to convert classical data into quantum data. Subsequently, variational quantum circuits are used for feature extraction. To demonstrate the performance of the proposed model, we used practical data on photovoltaic power generation and the weather in Busan, Republic of Korea. The results demonstrate the high accuracy of the proposed HQGRU model.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 608-613"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001637/pdfft?md5=e515a3c6c04e51daf95fcc99b997c0f5&pid=1-s2.0-S2405959523001637-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139013853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making TSM better: Preserving foundational philosophy for efficient action recognition 改进 TSM:保留基本理念,实现高效行动识别
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.004
Seok Ryu , Sungjun Hong , Sangyun Lee

In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.

在本研究中,我们提出了判别时移模块(D-TSM),它是时移模块(TSM)的增强版,用于动作识别。TSM 在捕捉错综复杂的时间动态方面存在局限性,原因在于其简单的特征移动。D-TSM 通过在移位前引入减法操作来解决这一问题。这样就能提取相邻帧之间的鉴别特征,从而实现有效的动作识别,将微妙的运动作为关键线索。它保留了 TSM 的基本理念,优先考虑最小的计算开销和无附加参数。我们的实验证明,D-TSM 显著提高了 TSM 的性能,并优于其他领先的基于二维 CNN 的方法。
{"title":"Making TSM better: Preserving foundational philosophy for efficient action recognition","authors":"Seok Ryu ,&nbsp;Sungjun Hong ,&nbsp;Sangyun Lee","doi":"10.1016/j.icte.2023.12.004","DOIUrl":"10.1016/j.icte.2023.12.004","url":null,"abstract":"<div><p>In this study, we present the Discriminative Temporal Shift Module (D-TSM), an enhancement of the Temporal Shift Module (TSM) for action recognition. TSM has limitations in capturing intricate temporal dynamics due to its simplistic feature shifting. D-TSM addresses this by introducing a subtraction operation before the shifting. This enables the extraction of discriminative features between adjacent frames, thereby allowing for effective action recognition where subtle motions serve as crucial cues. It preserves TSM’s foundational philosophy, prioritizing minimal computational overhead and no additional parameters. Our experiments demonstrate that D-TSM significantly improves performance of TSM and outperforms other leading 2D CNN-based methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 570-575"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001625/pdfft?md5=7071ddbe7afa0f6d6c37f5b8286e72a6&pid=1-s2.0-S2405959523001625-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139020768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study of the relationship of malware detection mechanisms using Artificial Intelligence 利用人工智能研究恶意软件检测机制之间的关系
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.03.005
Jihyeon Song , Sunoh Choi , Jungtae Kim , Kyungmin Park , Cheolhee Park , Jonghyun Kim , Ikkyun Kim

Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.

利用人工智能(AI)进行恶意软件检测已成为打击不断演变的各类恶意软件的重要研究课题。研究人员利用浅层学习和深度学习模型实施了各种检测机制,以应对新的恶意软件,如今他们仍在继续开发这些机制。然而,在利用人工智能检测恶意软件领域,数据收集存在困难,很难将研究内容和绩效与相关研究进行比较。同时,条理清晰的论文数量不足以了解这些相关研究的整体研究流程。在开始新的研究之前,研究人员需要分析他们想要研究的恶意软件检测领域的研究现状。因此,根据这些要求,我们总结了与恶意软件检测相关的一般标准和检测机制分类表。此外,我们还整理了各类恶意软件检测领域的许多研究,以便一目了然。我们希望所提供的调查报告能帮助新研究人员快速了解基于人工智能的恶意软件检测领域的研究流程,并确定未来的研究方向。
{"title":"A study of the relationship of malware detection mechanisms using Artificial Intelligence","authors":"Jihyeon Song ,&nbsp;Sunoh Choi ,&nbsp;Jungtae Kim ,&nbsp;Kyungmin Park ,&nbsp;Cheolhee Park ,&nbsp;Jonghyun Kim ,&nbsp;Ikkyun Kim","doi":"10.1016/j.icte.2024.03.005","DOIUrl":"10.1016/j.icte.2024.03.005","url":null,"abstract":"<div><p>Implementation of malware detection using Artificial Intelligence (AI) has emerged as a significant research theme to combat evolving various types of malwares. Researchers implement various detection mechanisms using shallow and deep learning models to counter new malware, and they continue to develop these mechanisms today. However, in the field of malware detection using AI, there are difficulties in collecting data, and it is difficult to compare research content and performance with related studies. Meanwhile, the number of well-organized papers is not sufficient to understand the overall research flow of these related studies. Before starting new research, researchers need to analyze the current state of research in the malware detection field they want to study. Therefore, based on these requirements, we present a summary of the general criteria related to malware detection and a classification table for detection mechanisms. Additionally, we have organized many studies in the field of various types of malware detection so that they can be viewed at a glance. We hope that the provided survey can help new researchers quickly understand the research flow in the field of AI-based malware detection and establish the direction for future research.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 632-649"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000298/pdfft?md5=8c3370dad7e696a91dedc176306bffcb&pid=1-s2.0-S2405959524000298-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems 基于深度神经网络的多飞行可重构智能表面支持散装系统聚类算法
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2023.12.009
Yuna Sim , Seungseok Sin , Jina Ma , Sangmi Moon , Young-Hwan You , Cheol Hong Kim , Intae Hwang

Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.

近来,随着无线设备需求的快速增长和数据流量的影响,数据需求也随之增加,各种支持数据需求的技术也在不断发展。其中,具有丰富频谱和高数据传输速率的毫米波(mmWave)频率存在路径损耗大的问题。因此,人们对无人驾驶飞行器(UAV)和可重构智能表面(RIS)的兴趣与日俱增,它们可以被用来重建无线通信环境。因此,本研究考虑了一个由多个用户和飞行 RIS 组成的大型系统,将无人机和 RIS 结合起来以提高算法利用率。我们提出了一种基于深度神经网络的算法,可将飞行 RIS 放置在适当的位置,以便为尽可能多的用户提供支持。仿真结果证实,与现有技术相比,所提出的技术能在大规模系统中以更高的精度和速度将飞行 RIS 放置在有效的位置。
{"title":"Deep neural network-based clustering algorithm for multiple flying reconfigurable intelligent surfaces-supported bulk systems","authors":"Yuna Sim ,&nbsp;Seungseok Sin ,&nbsp;Jina Ma ,&nbsp;Sangmi Moon ,&nbsp;Young-Hwan You ,&nbsp;Cheol Hong Kim ,&nbsp;Intae Hwang","doi":"10.1016/j.icte.2023.12.009","DOIUrl":"10.1016/j.icte.2023.12.009","url":null,"abstract":"<div><p>Recently, as data demand has increased owing to the rapidly increasing demand for wireless devices and the influence of data traffic, various technologies are being developed to support it. Among them, millimeter-wave (mmWave) frequencies with rich spectra and high data-transmission rates suffer from the problem of large path loss. Accordingly, there is a growing interest in unmanned aerial vehicles (UAVs) and reconfigurable intelligent surfaces (RISs), which can be utilized advantageously to reconstruct wireless communication environments. Therefore, this work considers a large-scale system comprising a number of users and Flying RISs, combining UAVs and RISs to increase algorithm utilization. We propose a deep neural network-based algorithm that places Flying RISs in an appropriate location so that they can support as many users as possible. Simulation results confirmed that the proposed technique could place Flying RISs in an efficient location with higher accuracy and speed in large-scale systems compared to existing techniques.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 583-587"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001674/pdfft?md5=dd4ee824a5b20f3fe5bb80495e43d67c&pid=1-s2.0-S2405959523001674-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139395104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Context-aware cyber-threat attribution based on hybrid features 基于混合特征的情境感知网络威胁归因
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.04.005
Ehtsham Irshad, Abdul Basit Siddiqui

With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical & and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.

随着技术的快速发展,识别网络攻击背后的攻击者变得越来越复杂。为应对这一现象,当前的网络威胁归因过程包括战术、技术和程序(TTP)、工具、目标国家/公司和应用等特征。它们不包括攻击者的背景和动机;因此,它们需要更精细的特征。要更好地了解攻击者的背景、动机和目标,在这一过程中加入行为特征至关重要。本研究强调了在现有技术特征基础上添加行为特征对确定实际攻击者的影响。行为特征是从泰国 CERT 发布的数据集 Threat actor encyclopedia 中提取的。本研究调查还分析了混合特征(技术特征和行为特征)的影响。为此,我们采用了特征选择技术来选择最佳特征。在实证结果中,我们使用了威胁行为者百科全书(由泰国计算机应急小组发布的数据集)来提取行为属性。通过使用机器/深度学习算法进行增强,我们在准确率、精确度、召回率和 F1 测量方面分别取得了 97%、98.8%、97% 和 97.2% 的高分。
{"title":"Context-aware cyber-threat attribution based on hybrid features","authors":"Ehtsham Irshad,&nbsp;Abdul Basit Siddiqui","doi":"10.1016/j.icte.2024.04.005","DOIUrl":"10.1016/j.icte.2024.04.005","url":null,"abstract":"<div><p>With the rapid technological development, identifying the attackers behind cyber-attacks is getting more sophisticated. To cope with this phenomenon, the current process of cyber-threat attribution includes features like tactics techniques and procedures (TTP), tools, target country/ company and application. They do not include attacker context and motives; thus, they demand more refined traits. Adding behavioral features to this process is essential to better understand the attacker’s context, motivations and goals. This research study accentuates the impact of adding behavioral features with existing technical features in determining the actual actor. The behavioral features are extracted from Threat actor encyclopedia, a dataset published by Thai CERT. This research investigation also analyzes the impact of hybrid features (technical &amp; and behavioral). For this procedure, the best features are chosen by implementing feature selection techniques. For empirical results, we use the threat actor encyclopedia, a data set published by Thai Cert, for extraction of behavioral attributes. With this augmentation, we achieve elevated results of 97%, 98.8%, 97%, and 97.2% in terms of accuracy, precision, recall and F1-measure using machine/deep learning algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 553-569"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000420/pdfft?md5=acf5e622fa03761320f62de48e4bf144&pid=1-s2.0-S2405959524000420-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140785956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna 带定向天线的分布式认知无线电网络中基于多代理强化学习的最佳能量感应阈值控制
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-06-01 DOI: 10.1016/j.icte.2024.01.001
Thi Thu Hien Pham , Wonjong Noh , Sungrae Cho

In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.

在 CRN 中,开发一种能持续提供准确信道状态信息的高效可靠的频谱检测器至关重要。在这项工作中,我们研究了完全分布式环境中的 CSS,在这种环境中,所有次级用户(SU)都配备了定向天线,并且仅根据其本地知识做出决策,SU 之间不共享信息。首先,我们建立了一个随机顺序优化问题(NP-hard),通过对能量感应/检测阈值的动态优化控制,最大化 SU 的检测精度。它能使 SU 在不对主网络造成干扰的情况下选择可用信道和扇区。为了在分布式环境中解决这个问题,我们将其转化为一个分布式部分观测马尔可夫决策过程(Dec-POMDP)问题。其次,为了在实际环境中确定 Dec-POMDP 的最佳控制,而无需事先了解状态-行动转换概率,我们开发了一种基于多代理深度确定性策略梯度(MADDPG)的算法,简称为 MA-DCSS。该算法采用集中训练和分散执行(CTDE)架构。第三,我们分析了该算法的计算复杂度,并通过计算复杂度的多项式(以信道、扇区和 SU 的数量为单位)展示了所提方法的可扩展性。最后,仿真证实,与基线算法相比,所提出的方案在收敛速度、精确检测和误报概率等方面都具有更高的性能。
{"title":"Multi-agent reinforcement learning based optimal energy sensing threshold control in distributed cognitive radio networks with directional antenna","authors":"Thi Thu Hien Pham ,&nbsp;Wonjong Noh ,&nbsp;Sungrae Cho","doi":"10.1016/j.icte.2024.01.001","DOIUrl":"10.1016/j.icte.2024.01.001","url":null,"abstract":"<div><p>In CRNs, it is crucial to develop an efficient and reliable spectrum detector that consistently provides accurate information about the channel state. In this work, we investigate a CSS in a fully-distributed environment where all secondary users (SUs) are equipped with directional antennas and make decisions based solely on their local knowledge without information sharing between SUs. First, we establish a stochastic sequential optimization problem, which is an NP-hard, that maximizes the SU’s detection accuracy by the dynamic and optimal control of the energy sensing/detection threshold. It can enable SUs to select an available channel and sector without causing interference to the primary network. To address it in a distributed environment, the problem is transformed into a decentralized partially observed Markov decision process (Dec-POMDP) problem. Second, in order to determine the best control for the Dec-POMDP in a practical environment without any prior knowledge of state–action transition probabilities, we develop a multi-agent deep deterministic policy gradient (MADDPG)-based algorithm, which is referred to as MA-DCSS. This algorithm adopts the centralized training and decentralized execution (CTDE) architecture. Third, we analyzed its computational complexity and showed the proposed approach’s scalability by the polynomial computational complexity, in terms of the number of channels, sectors, and SUs. Lastly, the simulation confirms that the proposed scheme provides enhanced performance in terms of convergence speed, accurate detection, and false alarm probabilities when it is compared to baseline algorithms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 3","pages":"Pages 472-478"},"PeriodicalIF":4.1,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000018/pdfft?md5=d4778771f73447943cd1a8d63fc1e1b7&pid=1-s2.0-S2405959524000018-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139540350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1