首页 > 最新文献

ICT Express最新文献

英文 中文
Metaverse search system: Architecture, challenges, and potential applications 元搜索系统:架构、挑战和潜在应用
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.12.006
Soorim Yang, Hyeong-jun Joo, Jaeho Kim

Like numerous new websites created globally every day on the web, new spaces are constantly produced in the metaverse and interconnected to each other through the Internet. The continuous expansion of the metaverse space requires a search system that supports efficiently navigating and retrieving globally distributed spaces. Current metaverse search systems are limited to text-based retrieval within local platforms, and web search systems have critical limitations to apply to the metaverse. In this study, we propose an architecture for a metaverse search system that overcomes these limitations, enabling global space search across the distributed metaverse. We analyze the gaps between the web and the metaverse, identify challenges and technologies in developing a metaverse search system, and explore potential applications from different user perspectives. This study sets the foundation for a seamless browsing experience in the metaverse, enabling users to navigate three-dimensional spaces easily and freely, similar to surfing the traditional web.

就像网络上每天在全球创建无数新网站一样,元宇宙中也不断产生新的空间,并通过互联网相互连接。元宇宙空间的不断扩展需要一个搜索系统来支持高效地导航和检索全球分布的空间。目前的元宇宙搜索系统仅限于在本地平台内进行基于文本的检索,而网络搜索系统在应用于元宇宙时存在严重的局限性。在本研究中,我们提出了一种元宇宙搜索系统架构,它能克服这些限制,在分布式元宇宙中进行全局空间搜索。我们分析了网络与元宇宙之间的差距,确定了开发元宇宙搜索系统所面临的挑战和技术,并从不同的用户角度探讨了潜在的应用。这项研究为元宇宙中的无缝浏览体验奠定了基础,使用户能够轻松自由地浏览三维空间,就像在传统网络上冲浪一样。
{"title":"Metaverse search system: Architecture, challenges, and potential applications","authors":"Soorim Yang,&nbsp;Hyeong-jun Joo,&nbsp;Jaeho Kim","doi":"10.1016/j.icte.2023.12.006","DOIUrl":"10.1016/j.icte.2023.12.006","url":null,"abstract":"<div><p>Like numerous new websites created globally every day on the web, new spaces are constantly produced in the metaverse and interconnected to each other through the Internet. The continuous expansion of the metaverse space requires a search system that supports efficiently navigating and retrieving globally distributed spaces. Current metaverse search systems are limited to text-based retrieval within local platforms, and web search systems have critical limitations to apply to the metaverse. In this study, we propose an architecture for a metaverse search system that overcomes these limitations, enabling global space search across the distributed metaverse. We analyze the gaps between the web and the metaverse, identify challenges and technologies in developing a metaverse search system, and explore potential applications from different user perspectives. This study sets the foundation for a seamless browsing experience in the metaverse, enabling users to navigate three-dimensional spaces easily and freely, similar to surfing the traditional web.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001649/pdfft?md5=fd634ac2ea1dac7299970eaeba342a5a&pid=1-s2.0-S2405959523001649-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139187909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bayesian Stackelberg game approach for cyber mission impact assessment 网络任务影响评估的贝叶斯-斯塔克尔伯格博弈方法
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.11.003
Donghwan Lee, Donghwa Kim, Myung Kil Ahn, Seongkee Lee

Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions. Existing approaches merely provide partial, manual analysis methods to support CMIA and lack the ability to provide optimal defense measures. In this paper, we propose a novel CMIA framework enabling a streamlined, automated CMIA procedure, based on the Bayesian Stackelburg game. Unlike conventional approaches, our framework provides the most probable cyber threat and the optimal defense, i.e., countermeasures against the cyber threat in a given mission environment, securing the resilience of mission-critical systems.

网络威胁越来越多地针对军事和私营部门的关键任务系统。为了减轻此类网络威胁并确保关键任务的恢复能力,CMIA 应运而生。现有的方法仅提供部分人工分析方法来支持 CMIA,缺乏提供最佳防御措施的能力。在本文中,我们提出了一个新颖的 CMIA 框架,该框架基于贝叶斯斯塔克堡博弈,可实现简化的自动 CMIA 程序。与传统方法不同,我们的框架提供了最有可能的网络威胁和最佳防御措施,即在给定任务环境中针对网络威胁的应对措施,从而确保关键任务系统的恢复能力。
{"title":"Bayesian Stackelberg game approach for cyber mission impact assessment","authors":"Donghwan Lee,&nbsp;Donghwa Kim,&nbsp;Myung Kil Ahn,&nbsp;Seongkee Lee","doi":"10.1016/j.icte.2023.11.003","DOIUrl":"10.1016/j.icte.2023.11.003","url":null,"abstract":"<div><p>Cyber threats increasingly target mission-critical systems in the military and private sectors. CMIA has emerged to mitigate such cyber threats and assure the resilience of critical missions. Existing approaches merely provide partial, manual analysis methods to support CMIA and lack the ability to provide optimal defense measures. In this paper, we propose a novel CMIA framework enabling a streamlined, automated CMIA procedure, based on the Bayesian Stackelburg game. Unlike conventional approaches, our framework provides the most probable cyber threat and the optimal defense, i.e., countermeasures against the cyber threat in a given mission environment, securing the resilience of mission-critical systems.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001467/pdfft?md5=d933ea3811e8e768564d1f3be7d664ab&pid=1-s2.0-S2405959523001467-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135671428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto coding system based on the turbo codes with secret keys 基于带有密钥的涡轮编码的密码编码系统
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.007
Viacheslav Kovtun, Yuriy Ivanov

In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.

1997 年,美国国家科学基金会认识到有必要将研究界联合起来,共同解决密码学和纠错编码的共同问题、克服挑战、未来发展和实际应用。该领域的最新研究成果与涡轮编码有关,涡轮编码具有提供接近理论值的信息传输纠错特性的特殊能力。此外,它们还用于电视(DVB-RCS、DVB-RCT)、无线局域网(WiMAX)、软件定义无线电系统、移动(3G、4G、Inmarsat)和空间(CCSDS)通信等。本文介绍的加密编码系统基于带有交织器使用的密钥的涡轮编码。所有计算都在数据编码过程中进行,从而降低了数据预加密的计算复杂度。文章介绍了必要的数学装置,估算了通信系统的安全等级,对纠错特性进行了模拟,并处理了多媒体信息。经典的和拟议的涡轮编解码器的工作特性在统计上没有差异。研究结果可用于各种功能的通信系统。
{"title":"Crypto coding system based on the turbo codes with secret keys","authors":"Viacheslav Kovtun,&nbsp;Yuriy Ivanov","doi":"10.1016/j.icte.2023.08.007","DOIUrl":"10.1016/j.icte.2023.08.007","url":null,"abstract":"<div><p>In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001091/pdfft?md5=9532dae942c22d37249cbfc5f48de222&pid=1-s2.0-S2405959523001091-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74510105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of mmWave multi-UAV mounted RISs using budget constraint Thompson sampling with collision avoidance 利用预算约束汤普森采样与防碰撞技术部署毫米波多无人飞行器安装的 RIS
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.07.011
Ehab Mahmoud Mohamed

In this paper, we will consider the problem of multi-unmanned aerial vehicles (UAVs) deployment among users’ hotspots. UAVs carry reconfigurable intelligent surface (RIS) boards to strengthen millimeter wave (mmWave) coverage at these hotspots. UAVs should maximize hotspots’ sum data rates while minimizing their flights’ cost, i.e., hovering and flying energy consumptions. Moreover, collisions should be avoided among UAVs, i.e., one hotspot should be served by only one UAV at a time. In this paper, this problem is considered as a multi-player multi-armed bandit (MP-MAB) game with budget constraint and collision avoidance. In this context, budget constraint Thompson sampling (TS) with collision avoidance MAB algorithm (BTSCA-MAB) is proposed to efficiently implement the formulated MP-MAB game. Numerical analysis confirms the superior performance of the proposed BTSCA-MAB over other benchmarks.

在本文中,我们将考虑在用户热点之间部署多无人机(UAV)的问题。无人飞行器携带可重构智能表面(RIS)板,以加强这些热点的毫米波(mmWave)覆盖。无人机应最大限度地提高热点的总数据传输率,同时最大限度地降低飞行成本,即悬停和飞行能耗。此外,还应避免无人飞行器之间发生碰撞,即一个热点每次只能由一个无人飞行器提供服务。本文将这一问题视为具有预算约束和避免碰撞的多人多臂强盗(MP-MAB)博弈。在此背景下,提出了预算约束汤普森采样(TS)与避免碰撞 MAB 算法(BTSCA-MAB),以有效实现所制定的 MP-MAB 博弈。数值分析证实了所提出的 BTSCA-MAB 算法的性能优于其他基准算法。
{"title":"Deployment of mmWave multi-UAV mounted RISs using budget constraint Thompson sampling with collision avoidance","authors":"Ehab Mahmoud Mohamed","doi":"10.1016/j.icte.2023.07.011","DOIUrl":"10.1016/j.icte.2023.07.011","url":null,"abstract":"<div><p>In this paper, we will consider the problem of multi-unmanned aerial vehicles (UAVs) deployment among users’ hotspots. UAVs carry reconfigurable intelligent surface (RIS) boards to strengthen millimeter wave (mmWave) coverage at these hotspots. UAVs should maximize hotspots’ sum data rates while minimizing their flights’ cost, i.e., hovering and flying energy consumptions. Moreover, collisions should be avoided among UAVs, i.e., one hotspot should be served by only one UAV at a time. In this paper, this problem is considered as a multi-player multi-armed bandit (MP-MAB) game with budget constraint and collision avoidance. In this context, budget constraint Thompson sampling (TS) with collision avoidance MAB algorithm (BTSCA-MAB) is proposed to efficiently implement the formulated MP-MAB game. Numerical analysis confirms the superior performance of the proposed BTSCA-MAB over other benchmarks.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523000905/pdfft?md5=0235934103d5a555f223bcbfaaf7fc42&pid=1-s2.0-S2405959523000905-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76979847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of re-configurable intelligent surface-assisted underwater and free-space wireless optical communication in the skip-zones 可重新配置的智能水面辅助水下和自由空间无线光通信跳区性能评估
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.004
Prasad Naik Ramavath , Wan-Young Chung

Note that 40% of the world’s population, i.e., three billion people, live within 100 km of the ocean or seashore surfaces. To explore and experience marine life, human activities in ocean-based environments are increasing day-by-day. To make human activities safer and stronger, highly efficient and reliable wireless communication is crucial for conveying any unnatural things that occur in oceans. Exploring the vast environment is difficult because of its rapidly changing characteristics, which creates various levels of skip-zone, resulting in the loss of information. A re-configurable intelligent surface (RIS)-assisted optical link is employed to mitigate the effects of skip-zones and enable high-speed and efficient communication links. In addition to this, it is also necessary to convey information to the coastal line through a RIS-assisted free-space optical (FSO) link. In this study, we propose a RIS-assisted dual-hop underwater wireless optical communication (UWOC)-FSO communication system. For the proposed RIS-based dual-hop UWOC-FSO system, closed-form expressions for the outage probability (OP), bit error rate (BER) for coherent and non-coherent type binary phase-shift keying, binary frequency shift keying modulation schemes are derived and results are corroborated with the Monte-Carlo simulations and asymptotic analysis.

请注意,全世界 40% 的人口,即 30 亿人,居住在距离海洋或海岸表面 100 公里以内的地方。为了探索和体验海洋生物,人类在海洋环境中的活动与日俱增。为了使人类的活动更加安全和有力,高效可靠的无线通信对于传递海洋中发生的任何非自然现象至关重要。由于海洋环境瞬息万变,会产生不同程度的 "跳区",导致信息丢失,因此探索海洋环境十分困难。采用可重新配置的智能表面(RIS)辅助光链路可减轻跳区的影响,实现高速高效的通信链路。除此之外,还需要通过 RIS 辅助自由空间光(FSO)链路向海岸线传输信息。在本研究中,我们提出了一种基于 RIS 的双跳水下无线光通信(UWOC)-FSO 通信系统。针对所提出的基于 RIS 的双跳 UWOC-FSO 系统,推导出了相干型和非相干型二进制相移键控、二进制频移键控调制方案的中断概率 (OP) 和误码率 (BER) 的闭式表达,并通过蒙特卡洛模拟和渐近分析证实了结果。
{"title":"Performance evaluation of re-configurable intelligent surface-assisted underwater and free-space wireless optical communication in the skip-zones","authors":"Prasad Naik Ramavath ,&nbsp;Wan-Young Chung","doi":"10.1016/j.icte.2023.08.004","DOIUrl":"10.1016/j.icte.2023.08.004","url":null,"abstract":"<div><p>Note that 40% of the world’s population, <span><math><mrow><mi>i</mi><mo>.</mo><mi>e</mi><mo>.</mo><mo>,</mo></mrow></math></span> three billion people, live within 100 km of the ocean or seashore surfaces. To explore and experience marine life, human activities in ocean-based environments are increasing day-by-day. To make human activities safer and stronger, highly efficient and reliable wireless communication is crucial for conveying any unnatural things that occur in oceans. Exploring the vast environment is difficult because of its rapidly changing characteristics, which creates various levels of skip-zone, resulting in the loss of information. A re-configurable intelligent surface (RIS)-assisted optical link is employed to mitigate the effects of skip-zones and enable high-speed and efficient communication links. In addition to this, it is also necessary to convey information to the coastal line through a RIS-assisted free-space optical (FSO) link. In this study, we propose a RIS-assisted dual-hop underwater wireless optical communication (UWOC)-FSO communication system. For the proposed RIS-based dual-hop UWOC-FSO system, closed-form expressions for the outage probability (OP), bit error rate (BER) for coherent and non-coherent type binary phase-shift keying, binary frequency shift keying modulation schemes are derived and results are corroborated with the Monte-Carlo simulations and asymptotic analysis.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523000978/pdfft?md5=386779693ebbbf34148555fd972addb2&pid=1-s2.0-S2405959523000978-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78239118","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SmartHealth: An intelligent framework to secure IoMT service applications using machine learning 智能健康:利用机器学习确保 IoMT 服务应用安全的智能框架
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.10.001
Sita Rani , Sachin Kumar , Aman Kataria , Hong Min

Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns have been raised in the past. It provisions the attackers to hamper the working of SHS in a variety of ways, e.g., injection of false data to replace vital signs, tampering of medical devices to prevent informing critical situations, etc. In this work, a novel ML-based framework, i.e., SmartHealth is proposed to secure IoMT devices in SHS. SmartHealth watches the vital signs gathered through different IoMT to analyze the change in various body activities to differentiate between normal activities and dangerous security attacks. The performance of the SmartHealth is also analyzed for three different dangerous attacks. During performance analysis, it has been observed that SmartHealth can identify wicked activities in IoMT 92% times accurately with an F1-score of 90%.

由于智能医疗系统(SHS)功能复杂,过去曾引发过许多安全问题。它规定攻击者可以通过各种方式妨碍智能医疗系统的工作,例如,注入虚假数据以取代生命体征,篡改医疗设备以防止通报危急情况等。在这项工作中,我们提出了一种基于 ML 的新型框架,即 SmartHealth,以确保 SHS 中 IoMT 设备的安全。SmartHealth 观察通过不同 IoMT 收集到的生命体征,分析各种身体活动的变化,以区分正常活动和危险的安全攻击。此外,还针对三种不同的危险攻击分析了 SmartHealth 的性能。在性能分析过程中观察到,SmartHealth 对 IoMT 中邪恶活动的识别准确率为 92%,F1 分数为 90%。
{"title":"SmartHealth: An intelligent framework to secure IoMT service applications using machine learning","authors":"Sita Rani ,&nbsp;Sachin Kumar ,&nbsp;Aman Kataria ,&nbsp;Hong Min","doi":"10.1016/j.icte.2023.10.001","DOIUrl":"10.1016/j.icte.2023.10.001","url":null,"abstract":"<div><p>Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns have been raised in the past. It provisions the attackers to hamper the working of SHS in a variety of ways, e.g., injection of false data to replace vital signs, tampering of medical devices to prevent informing critical situations, etc. In this work, a novel ML-based framework, i.e., SmartHealth is proposed to secure IoMT devices in SHS. SmartHealth watches the vital signs gathered through different IoMT to analyze the change in various body activities to differentiate between normal activities and dangerous security attacks. The performance of the SmartHealth is also analyzed for three different dangerous attacks. During performance analysis, it has been observed that SmartHealth can identify wicked activities in IoMT 92% times accurately with an F1-score of 90%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001170/pdfft?md5=144439fcd5ccb7bc21527f663e6a247a&pid=1-s2.0-S2405959523001170-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135605569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function traffic-aware VNF migration for service restoration in an NFV-enabled IoT system 在支持 NFV 的物联网系统中进行功能流量感知 VNF 迁移以恢复服务
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.11.004
Tuan-Minh Pham , Thi-Minh Nguyen

Maintaining a service continuum is crucial for providing a reliable service in an Internet-of-Things (IoT) system based on Network Function Virtualization (NFV) due to the distribution of Virtual Network Functions (VNF). We address the optimization problem of VNF migration in an NFV-enabled IoT system (NIoT), considering the dynamics of traffic volume processed by an individual IoT function. We develop an optimization model based on integer linear programming and a function traffic-aware heuristic algorithm to solve the problem. The evaluation results show that our proposed heuristic algorithm offers an approximation solution very close to the optimal VNF migration in significantly reduced time. It outperforms a benchmark solution based on Simulated Annealing in both the service restoration cost and computation time. Furthermore, our findings provide valuable insights into an investment strategy for an IoT service provider seeking to enhance the system performance in the presence of a failure.

由于虚拟网络功能(VNF)的分布,要在基于网络功能虚拟化(NFV)的物联网(IoT)系统中提供可靠的服务,保持服务连续性至关重要。考虑到单个物联网功能所处理流量的动态变化,我们解决了 NFV 支持的物联网系统(NIoT)中 VNF 迁移的优化问题。我们开发了一种基于整数线性规划的优化模型和一种功能流量感知启发式算法来解决该问题。评估结果表明,我们提出的启发式算法能在显著缩短的时间内提供非常接近最佳 VNF 迁移的近似解决方案。在服务恢复成本和计算时间方面,它都优于基于模拟退火的基准解决方案。此外,我们的研究结果还为物联网服务提供商寻求在出现故障时提高系统性能的投资策略提供了宝贵的见解。
{"title":"Function traffic-aware VNF migration for service restoration in an NFV-enabled IoT system","authors":"Tuan-Minh Pham ,&nbsp;Thi-Minh Nguyen","doi":"10.1016/j.icte.2023.11.004","DOIUrl":"10.1016/j.icte.2023.11.004","url":null,"abstract":"<div><p>Maintaining a service continuum is crucial for providing a reliable service in an Internet-of-Things (IoT) system based on Network Function Virtualization (NFV) due to the distribution of Virtual Network Functions (VNF). We address the optimization problem of VNF migration in an NFV-enabled IoT system (NIoT), considering the dynamics of traffic volume processed by an individual IoT function. We develop an optimization model based on integer linear programming and a function traffic-aware heuristic algorithm to solve the problem. The evaluation results show that our proposed heuristic algorithm offers an approximation solution very close to the optimal VNF migration in significantly reduced time. It outperforms a benchmark solution based on Simulated Annealing in both the service restoration cost and computation time. Furthermore, our findings provide valuable insights into an investment strategy for an IoT service provider seeking to enhance the system performance in the presence of a failure.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001479/pdfft?md5=5724545eb5624775a6223c255874b9ce&pid=1-s2.0-S2405959523001479-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135670292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis and optimization of UAV-assisted NOMA short packet communication systems 无人机辅助 NOMA 短数据包通信系统的性能分析与优化
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.001
Tran Manh Hoang , Le The Dung , Ba Cao Nguyen , Taejoon Kim

In this paper, we propose and analyze an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) short packet communication (SPC) system, where finite-size data packets are transmitted from a UAV to multiple users. The block error rate (BLER), throughput, and energy efficiency (EE) are used as metrics to evaluate the proposed system performance. We adopt the Gaussian-Chebyshev quadrature and the first-order Riemann integral to derive the approximate expressions of BLERs. The accuracy of the derived expressions is verified by presenting that numerical results are perfectly matched with analysis results. We also formulate optimization problems to maximize the throughput with respect to the number of transmitted bits and the altitude of the UAV. Numerical results in this paper provide useful knowledge about the relationships among BLER, throughput, EE, transmitted packet size, the altitude of the UAV, and the Rician factor.

在本文中,我们提出并分析了一种无人机辅助非正交多址(NOMA)短数据包通信(SPC)系统,该系统从无人机向多个用户传输有限大小的数据包。块错误率 (BLER)、吞吐量和能效 (EE) 被用作评估拟议系统性能的指标。我们采用高斯-切比雪夫正交和一阶黎曼积分来推导 BLER 的近似表达式。通过展示数值结果与分析结果的完美匹配,验证了推导表达式的准确性。我们还提出了优化问题,以最大限度地提高与传输比特数和无人机高度相关的吞吐量。本文中的数值结果提供了有关 BLER、吞吐量、EE、传输数据包大小、无人机高度和 Rician 因子之间关系的有用知识。
{"title":"Performance analysis and optimization of UAV-assisted NOMA short packet communication systems","authors":"Tran Manh Hoang ,&nbsp;Le The Dung ,&nbsp;Ba Cao Nguyen ,&nbsp;Taejoon Kim","doi":"10.1016/j.icte.2023.08.001","DOIUrl":"10.1016/j.icte.2023.08.001","url":null,"abstract":"<div><p>In this paper, we propose and analyze an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) short packet communication (SPC) system, where finite-size data packets are transmitted from a UAV to multiple users. The block error rate (BLER), throughput, and energy efficiency (EE) are used as metrics to evaluate the proposed system performance. We adopt the Gaussian-Chebyshev quadrature and the first-order Riemann integral to derive the approximate expressions of BLERs. The accuracy of the derived expressions is verified by presenting that numerical results are perfectly matched with analysis results. We also formulate optimization problems to maximize the throughput with respect to the number of transmitted bits and the altitude of the UAV. Numerical results in this paper provide useful knowledge about the relationships among BLER, throughput, EE, transmitted packet size, the altitude of the UAV, and the Rician factor.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523000942/pdfft?md5=8baab726bf524fbba5712a809d6359ee&pid=1-s2.0-S2405959523000942-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136135941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of packet transmission scheduling and node parent selection for 802.15.4e Time Slotted Channel Hopping (TSCH) 优化 802.15.4e 时隙信道跳频 (TSCH) 的数据包传输调度和节点父节点选择
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.12.002
S.K. Wijayasekara , P. Sasithong , H.-Y. Hsieh , P. Saengudomlert , C.-B Chae , L. Wuttisittikulkij

This work investigates the problem of efficient packet scheduling and transmission for IEEE 802.15.4e TSCH based on the Traffic-Aware Scheduling Algorithm (TASA). Three Integer Linear Programming (ILP) formulations are proposed, namely ILP1, ILP2, and ILP3, to comprehensively address key aspects of how packets are optimally delivered from child nodes to the root node, including node parent selection, packet scheduling, and frequency assignment. ILP1 is proposed to model the fundamental operations of TASA including packet scheduling and frequency assignment, while ILP2 further takes node parent selection into consideration for jointly optimizing node parent selection, packet scheduling, and frequency assignment. Despite its superior performance, ILP2 is only applicable to relatively small network problems due to high computational complexity. Therefore, we finally propose ILP3 for fast and efficient node parent selection. ILP3 can be combined with ILP1 and, most importantly, TASA for achieving effective node parent selection atop packet scheduling and frequency assignment for practical TSCH networks. ILP3 combined with ILP 1 led to computational complexity while ILP3 combined with TASA yielded good performance where it required less than one second of execution time and less packet delivery time.

这项研究探讨了基于流量感知调度算法(TASA)的 IEEE 802.15.4e TSCH 的高效数据包调度和传输问题。本文提出了三种整数线性规划(ILP)公式,即 ILP1、ILP2 和 ILP3,以全面解决如何将数据包从子节点优化传输到根节点的关键问题,包括节点父节点选择、数据包调度和频率分配。ILP1 用于模拟 TASA 的基本操作,包括数据包调度和频率分配,而 ILP2 则进一步考虑了节点父节点选择,以共同优化节点父节点选择、数据包调度和频率分配。尽管 ILP2 性能优越,但由于计算复杂度较高,仅适用于相对较小的网络问题。因此,我们最终提出了用于快速高效选择节点父节点的 ILP3。ILP3 可以与 ILP1 以及最重要的 TASA 结合使用,从而在实际 TSCH 网络的分组调度和频率分配中实现有效的节点父节点选择。ILP3 与 ILP1 的结合导致了计算复杂度的增加,而 ILP3 与 TASA 的结合则产生了良好的性能,它所需的执行时间不到一秒,数据包传送时间更短。
{"title":"Optimization of packet transmission scheduling and node parent selection for 802.15.4e Time Slotted Channel Hopping (TSCH)","authors":"S.K. Wijayasekara ,&nbsp;P. Sasithong ,&nbsp;H.-Y. Hsieh ,&nbsp;P. Saengudomlert ,&nbsp;C.-B Chae ,&nbsp;L. Wuttisittikulkij","doi":"10.1016/j.icte.2023.12.002","DOIUrl":"10.1016/j.icte.2023.12.002","url":null,"abstract":"<div><p>This work investigates the problem of efficient packet scheduling and transmission for IEEE 802.15.4e TSCH based on the Traffic-Aware Scheduling Algorithm (TASA). Three Integer Linear Programming (ILP) formulations are proposed, namely ILP1, ILP2, and ILP3, to comprehensively address key aspects of how packets are optimally delivered from child nodes to the root node, including node parent selection, packet scheduling, and frequency assignment. ILP1 is proposed to model the fundamental operations of TASA including packet scheduling and frequency assignment, while ILP2 further takes node parent selection into consideration for jointly optimizing node parent selection, packet scheduling, and frequency assignment. Despite its superior performance, ILP2 is only applicable to relatively small network problems due to high computational complexity. Therefore, we finally propose ILP3 for fast and efficient node parent selection. ILP3 can be combined with ILP1 and, most importantly, TASA for achieving effective node parent selection atop packet scheduling and frequency assignment for practical TSCH networks. ILP3 combined with ILP 1 led to computational complexity while ILP3 combined with TASA yielded good performance where it required less than one second of execution time and less packet delivery time.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001601/pdfft?md5=2f5adadfd16bccc191bfbbd20ab8866e&pid=1-s2.0-S2405959523001601-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research category classification of scientific articles on human health risks of electromagnetic fields using pre-trained BERT 使用预训练 BERT 对有关电磁场对人体健康危害的科学文章进行研究类别分类
IF 5.4 3区 计算机科学 Q1 Computer Science Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.006
Sang-Woo Lee , Jung-Hyok Kwon , Dongwan Kim , Eui-Jik Kim

This paper presents bidirectional encoder representations from transformers (BERT)-based deep learning model for the classification of scientific articles. This model aims to increase the efficiency and reliability of human health risk assessments related to electromagnetic fields (EMF). The proposed model takes the title and abstract of EMF-related articles and classifies them into four categories: animal exposure experiment, cell exposure experiment, human exposure experiment, and epidemiological study. We conducted a performance evaluation to verify the superiority of the proposed model. The results demonstrated that the proposed model outperforms other deep learning models that use pre-trained embeddings, with an average accuracy of 98.33%.

本文提出了基于变压器双向编码器表示(BERT)的深度学习模型,用于科学文章的分类。该模型旨在提高与电磁场(EMF)相关的人类健康风险评估的效率和可靠性。该模型根据电磁场相关文章的标题和摘要将其分为四类:动物暴露实验、细胞暴露实验、人类暴露实验和流行病学研究。我们进行了性能评估,以验证所提模型的优越性。结果表明,所提出的模型优于其他使用预训练嵌入的深度学习模型,平均准确率为 98.33%。
{"title":"Research category classification of scientific articles on human health risks of electromagnetic fields using pre-trained BERT","authors":"Sang-Woo Lee ,&nbsp;Jung-Hyok Kwon ,&nbsp;Dongwan Kim ,&nbsp;Eui-Jik Kim","doi":"10.1016/j.icte.2023.08.006","DOIUrl":"10.1016/j.icte.2023.08.006","url":null,"abstract":"<div><p>This paper presents bidirectional encoder representations from transformers (BERT)-based deep learning model for the classification of scientific articles. This model aims to increase the efficiency and reliability of human health risk assessments related to electromagnetic fields (EMF). The proposed model takes the title and abstract of EMF-related articles and classifies them into four categories: animal exposure experiment, cell exposure experiment, human exposure experiment, and epidemiological study. We conducted a performance evaluation to verify the superiority of the proposed model. The results demonstrated that the proposed model outperforms other deep learning models that use pre-trained embeddings, with an average accuracy of 98.33%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":null,"pages":null},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S240595952300108X/pdfft?md5=15f9324a2d9c0d5df63909e1b4a2ea6f&pid=1-s2.0-S240595952300108X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72479890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1