首页 > 最新文献

ICT Express最新文献

英文 中文
SmartHealth: An intelligent framework to secure IoMT service applications using machine learning 智能健康:利用机器学习确保 IoMT 服务应用安全的智能框架
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.10.001
Sita Rani , Sachin Kumar , Aman Kataria , Hong Min

Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns have been raised in the past. It provisions the attackers to hamper the working of SHS in a variety of ways, e.g., injection of false data to replace vital signs, tampering of medical devices to prevent informing critical situations, etc. In this work, a novel ML-based framework, i.e., SmartHealth is proposed to secure IoMT devices in SHS. SmartHealth watches the vital signs gathered through different IoMT to analyze the change in various body activities to differentiate between normal activities and dangerous security attacks. The performance of the SmartHealth is also analyzed for three different dangerous attacks. During performance analysis, it has been observed that SmartHealth can identify wicked activities in IoMT 92% times accurately with an F1-score of 90%.

由于智能医疗系统(SHS)功能复杂,过去曾引发过许多安全问题。它规定攻击者可以通过各种方式妨碍智能医疗系统的工作,例如,注入虚假数据以取代生命体征,篡改医疗设备以防止通报危急情况等。在这项工作中,我们提出了一种基于 ML 的新型框架,即 SmartHealth,以确保 SHS 中 IoMT 设备的安全。SmartHealth 观察通过不同 IoMT 收集到的生命体征,分析各种身体活动的变化,以区分正常活动和危险的安全攻击。此外,还针对三种不同的危险攻击分析了 SmartHealth 的性能。在性能分析过程中观察到,SmartHealth 对 IoMT 中邪恶活动的识别准确率为 92%,F1 分数为 90%。
{"title":"SmartHealth: An intelligent framework to secure IoMT service applications using machine learning","authors":"Sita Rani ,&nbsp;Sachin Kumar ,&nbsp;Aman Kataria ,&nbsp;Hong Min","doi":"10.1016/j.icte.2023.10.001","DOIUrl":"10.1016/j.icte.2023.10.001","url":null,"abstract":"<div><p>Due to the complex functioning of Smart Healthcare Systems (SHS), many security concerns have been raised in the past. It provisions the attackers to hamper the working of SHS in a variety of ways, e.g., injection of false data to replace vital signs, tampering of medical devices to prevent informing critical situations, etc. In this work, a novel ML-based framework, i.e., SmartHealth is proposed to secure IoMT devices in SHS. SmartHealth watches the vital signs gathered through different IoMT to analyze the change in various body activities to differentiate between normal activities and dangerous security attacks. The performance of the SmartHealth is also analyzed for three different dangerous attacks. During performance analysis, it has been observed that SmartHealth can identify wicked activities in IoMT 92% times accurately with an F1-score of 90%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 425-430"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001170/pdfft?md5=144439fcd5ccb7bc21527f663e6a247a&pid=1-s2.0-S2405959523001170-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135605569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function traffic-aware VNF migration for service restoration in an NFV-enabled IoT system 在支持 NFV 的物联网系统中进行功能流量感知 VNF 迁移以恢复服务
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.11.004
Tuan-Minh Pham , Thi-Minh Nguyen

Maintaining a service continuum is crucial for providing a reliable service in an Internet-of-Things (IoT) system based on Network Function Virtualization (NFV) due to the distribution of Virtual Network Functions (VNF). We address the optimization problem of VNF migration in an NFV-enabled IoT system (NIoT), considering the dynamics of traffic volume processed by an individual IoT function. We develop an optimization model based on integer linear programming and a function traffic-aware heuristic algorithm to solve the problem. The evaluation results show that our proposed heuristic algorithm offers an approximation solution very close to the optimal VNF migration in significantly reduced time. It outperforms a benchmark solution based on Simulated Annealing in both the service restoration cost and computation time. Furthermore, our findings provide valuable insights into an investment strategy for an IoT service provider seeking to enhance the system performance in the presence of a failure.

由于虚拟网络功能(VNF)的分布,要在基于网络功能虚拟化(NFV)的物联网(IoT)系统中提供可靠的服务,保持服务连续性至关重要。考虑到单个物联网功能所处理流量的动态变化,我们解决了 NFV 支持的物联网系统(NIoT)中 VNF 迁移的优化问题。我们开发了一种基于整数线性规划的优化模型和一种功能流量感知启发式算法来解决该问题。评估结果表明,我们提出的启发式算法能在显著缩短的时间内提供非常接近最佳 VNF 迁移的近似解决方案。在服务恢复成本和计算时间方面,它都优于基于模拟退火的基准解决方案。此外,我们的研究结果还为物联网服务提供商寻求在出现故障时提高系统性能的投资策略提供了宝贵的见解。
{"title":"Function traffic-aware VNF migration for service restoration in an NFV-enabled IoT system","authors":"Tuan-Minh Pham ,&nbsp;Thi-Minh Nguyen","doi":"10.1016/j.icte.2023.11.004","DOIUrl":"10.1016/j.icte.2023.11.004","url":null,"abstract":"<div><p>Maintaining a service continuum is crucial for providing a reliable service in an Internet-of-Things (IoT) system based on Network Function Virtualization (NFV) due to the distribution of Virtual Network Functions (VNF). We address the optimization problem of VNF migration in an NFV-enabled IoT system (NIoT), considering the dynamics of traffic volume processed by an individual IoT function. We develop an optimization model based on integer linear programming and a function traffic-aware heuristic algorithm to solve the problem. The evaluation results show that our proposed heuristic algorithm offers an approximation solution very close to the optimal VNF migration in significantly reduced time. It outperforms a benchmark solution based on Simulated Annealing in both the service restoration cost and computation time. Furthermore, our findings provide valuable insights into an investment strategy for an IoT service provider seeking to enhance the system performance in the presence of a failure.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 374-379"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001479/pdfft?md5=5724545eb5624775a6223c255874b9ce&pid=1-s2.0-S2405959523001479-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135670292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis and optimization of UAV-assisted NOMA short packet communication systems 无人机辅助 NOMA 短数据包通信系统的性能分析与优化
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.001
Tran Manh Hoang , Le The Dung , Ba Cao Nguyen , Taejoon Kim

In this paper, we propose and analyze an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) short packet communication (SPC) system, where finite-size data packets are transmitted from a UAV to multiple users. The block error rate (BLER), throughput, and energy efficiency (EE) are used as metrics to evaluate the proposed system performance. We adopt the Gaussian-Chebyshev quadrature and the first-order Riemann integral to derive the approximate expressions of BLERs. The accuracy of the derived expressions is verified by presenting that numerical results are perfectly matched with analysis results. We also formulate optimization problems to maximize the throughput with respect to the number of transmitted bits and the altitude of the UAV. Numerical results in this paper provide useful knowledge about the relationships among BLER, throughput, EE, transmitted packet size, the altitude of the UAV, and the Rician factor.

在本文中,我们提出并分析了一种无人机辅助非正交多址(NOMA)短数据包通信(SPC)系统,该系统从无人机向多个用户传输有限大小的数据包。块错误率 (BLER)、吞吐量和能效 (EE) 被用作评估拟议系统性能的指标。我们采用高斯-切比雪夫正交和一阶黎曼积分来推导 BLER 的近似表达式。通过展示数值结果与分析结果的完美匹配,验证了推导表达式的准确性。我们还提出了优化问题,以最大限度地提高与传输比特数和无人机高度相关的吞吐量。本文中的数值结果提供了有关 BLER、吞吐量、EE、传输数据包大小、无人机高度和 Rician 因子之间关系的有用知识。
{"title":"Performance analysis and optimization of UAV-assisted NOMA short packet communication systems","authors":"Tran Manh Hoang ,&nbsp;Le The Dung ,&nbsp;Ba Cao Nguyen ,&nbsp;Taejoon Kim","doi":"10.1016/j.icte.2023.08.001","DOIUrl":"10.1016/j.icte.2023.08.001","url":null,"abstract":"<div><p>In this paper, we propose and analyze an unmanned aerial vehicle (UAV)-assisted non-orthogonal multiple access (NOMA) short packet communication (SPC) system, where finite-size data packets are transmitted from a UAV to multiple users. The block error rate (BLER), throughput, and energy efficiency (EE) are used as metrics to evaluate the proposed system performance. We adopt the Gaussian-Chebyshev quadrature and the first-order Riemann integral to derive the approximate expressions of BLERs. The accuracy of the derived expressions is verified by presenting that numerical results are perfectly matched with analysis results. We also formulate optimization problems to maximize the throughput with respect to the number of transmitted bits and the altitude of the UAV. Numerical results in this paper provide useful knowledge about the relationships among BLER, throughput, EE, transmitted packet size, the altitude of the UAV, and the Rician factor.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 292-298"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523000942/pdfft?md5=8baab726bf524fbba5712a809d6359ee&pid=1-s2.0-S2405959523000942-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136135941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deployment of mmWave multi-UAV mounted RISs using budget constraint Thompson sampling with collision avoidance 利用预算约束汤普森采样与防碰撞技术部署毫米波多无人飞行器安装的 RIS
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.07.011
Ehab Mahmoud Mohamed

In this paper, we will consider the problem of multi-unmanned aerial vehicles (UAVs) deployment among users’ hotspots. UAVs carry reconfigurable intelligent surface (RIS) boards to strengthen millimeter wave (mmWave) coverage at these hotspots. UAVs should maximize hotspots’ sum data rates while minimizing their flights’ cost, i.e., hovering and flying energy consumptions. Moreover, collisions should be avoided among UAVs, i.e., one hotspot should be served by only one UAV at a time. In this paper, this problem is considered as a multi-player multi-armed bandit (MP-MAB) game with budget constraint and collision avoidance. In this context, budget constraint Thompson sampling (TS) with collision avoidance MAB algorithm (BTSCA-MAB) is proposed to efficiently implement the formulated MP-MAB game. Numerical analysis confirms the superior performance of the proposed BTSCA-MAB over other benchmarks.

在本文中,我们将考虑在用户热点之间部署多无人机(UAV)的问题。无人飞行器携带可重构智能表面(RIS)板,以加强这些热点的毫米波(mmWave)覆盖。无人机应最大限度地提高热点的总数据传输率,同时最大限度地降低飞行成本,即悬停和飞行能耗。此外,还应避免无人飞行器之间发生碰撞,即一个热点每次只能由一个无人飞行器提供服务。本文将这一问题视为具有预算约束和避免碰撞的多人多臂强盗(MP-MAB)博弈。在此背景下,提出了预算约束汤普森采样(TS)与避免碰撞 MAB 算法(BTSCA-MAB),以有效实现所制定的 MP-MAB 博弈。数值分析证实了所提出的 BTSCA-MAB 算法的性能优于其他基准算法。
{"title":"Deployment of mmWave multi-UAV mounted RISs using budget constraint Thompson sampling with collision avoidance","authors":"Ehab Mahmoud Mohamed","doi":"10.1016/j.icte.2023.07.011","DOIUrl":"10.1016/j.icte.2023.07.011","url":null,"abstract":"<div><p>In this paper, we will consider the problem of multi-unmanned aerial vehicles (UAVs) deployment among users’ hotspots. UAVs carry reconfigurable intelligent surface (RIS) boards to strengthen millimeter wave (mmWave) coverage at these hotspots. UAVs should maximize hotspots’ sum data rates while minimizing their flights’ cost, i.e., hovering and flying energy consumptions. Moreover, collisions should be avoided among UAVs, i.e., one hotspot should be served by only one UAV at a time. In this paper, this problem is considered as a multi-player multi-armed bandit (MP-MAB) game with budget constraint and collision avoidance. In this context, budget constraint Thompson sampling (TS) with collision avoidance MAB algorithm (BTSCA-MAB) is proposed to efficiently implement the formulated MP-MAB game. Numerical analysis confirms the superior performance of the proposed BTSCA-MAB over other benchmarks.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 277-284"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523000905/pdfft?md5=0235934103d5a555f223bcbfaaf7fc42&pid=1-s2.0-S2405959523000905-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76979847","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto coding system based on the turbo codes with secret keys 基于带有密钥的涡轮编码的密码编码系统
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.007
Viacheslav Kovtun, Yuriy Ivanov

In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.

1997 年,美国国家科学基金会认识到有必要将研究界联合起来,共同解决密码学和纠错编码的共同问题、克服挑战、未来发展和实际应用。该领域的最新研究成果与涡轮编码有关,涡轮编码具有提供接近理论值的信息传输纠错特性的特殊能力。此外,它们还用于电视(DVB-RCS、DVB-RCT)、无线局域网(WiMAX)、软件定义无线电系统、移动(3G、4G、Inmarsat)和空间(CCSDS)通信等。本文介绍的加密编码系统基于带有交织器使用的密钥的涡轮编码。所有计算都在数据编码过程中进行,从而降低了数据预加密的计算复杂度。文章介绍了必要的数学装置,估算了通信系统的安全等级,对纠错特性进行了模拟,并处理了多媒体信息。经典的和拟议的涡轮编解码器的工作特性在统计上没有差异。研究结果可用于各种功能的通信系统。
{"title":"Crypto coding system based on the turbo codes with secret keys","authors":"Viacheslav Kovtun,&nbsp;Yuriy Ivanov","doi":"10.1016/j.icte.2023.08.007","DOIUrl":"10.1016/j.icte.2023.08.007","url":null,"abstract":"<div><p>In 1997, the US National Science Foundation recognized the need to unite research communities together to solve mutual problems, overcome challenges, future development and practical applications of cryptography and error correction coding. Recent works in this area are connected with turbo codes, which have a special ability to provide error correction characteristics of the information transmission close to theoretically obtained values. Besides, they are used for television (DVB-RCS, DVB-RCT), wireless local networks (WiMAX), software-defined radio systems, mobile (3G, 4G, Inmarsat) and space (CCSDS) communications etc. In this article is presented the crypto coding system based on turbo codes with secret keys used by interleavers. All calculations are performed during data encoding, which reduces the computational complexity of data pre-encryption. The necessary mathematical apparatus was presented, the security level of the communication system was estimated, a simulation of the error correction characteristics was performed, and multimedia information was processed. The working characteristics of the classical and proposed turbo codecs do not differ statistically. The results can be used in communication systems for various functional purposes.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 330-335"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001091/pdfft?md5=9532dae942c22d37249cbfc5f48de222&pid=1-s2.0-S2405959523001091-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74510105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of packet transmission scheduling and node parent selection for 802.15.4e Time Slotted Channel Hopping (TSCH) 优化 802.15.4e 时隙信道跳频 (TSCH) 的数据包传输调度和节点父节点选择
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.12.002
S.K. Wijayasekara , P. Sasithong , H.-Y. Hsieh , P. Saengudomlert , C.-B Chae , L. Wuttisittikulkij

This work investigates the problem of efficient packet scheduling and transmission for IEEE 802.15.4e TSCH based on the Traffic-Aware Scheduling Algorithm (TASA). Three Integer Linear Programming (ILP) formulations are proposed, namely ILP1, ILP2, and ILP3, to comprehensively address key aspects of how packets are optimally delivered from child nodes to the root node, including node parent selection, packet scheduling, and frequency assignment. ILP1 is proposed to model the fundamental operations of TASA including packet scheduling and frequency assignment, while ILP2 further takes node parent selection into consideration for jointly optimizing node parent selection, packet scheduling, and frequency assignment. Despite its superior performance, ILP2 is only applicable to relatively small network problems due to high computational complexity. Therefore, we finally propose ILP3 for fast and efficient node parent selection. ILP3 can be combined with ILP1 and, most importantly, TASA for achieving effective node parent selection atop packet scheduling and frequency assignment for practical TSCH networks. ILP3 combined with ILP 1 led to computational complexity while ILP3 combined with TASA yielded good performance where it required less than one second of execution time and less packet delivery time.

这项研究探讨了基于流量感知调度算法(TASA)的 IEEE 802.15.4e TSCH 的高效数据包调度和传输问题。本文提出了三种整数线性规划(ILP)公式,即 ILP1、ILP2 和 ILP3,以全面解决如何将数据包从子节点优化传输到根节点的关键问题,包括节点父节点选择、数据包调度和频率分配。ILP1 用于模拟 TASA 的基本操作,包括数据包调度和频率分配,而 ILP2 则进一步考虑了节点父节点选择,以共同优化节点父节点选择、数据包调度和频率分配。尽管 ILP2 性能优越,但由于计算复杂度较高,仅适用于相对较小的网络问题。因此,我们最终提出了用于快速高效选择节点父节点的 ILP3。ILP3 可以与 ILP1 以及最重要的 TASA 结合使用,从而在实际 TSCH 网络的分组调度和频率分配中实现有效的节点父节点选择。ILP3 与 ILP1 的结合导致了计算复杂度的增加,而 ILP3 与 TASA 的结合则产生了良好的性能,它所需的执行时间不到一秒,数据包传送时间更短。
{"title":"Optimization of packet transmission scheduling and node parent selection for 802.15.4e Time Slotted Channel Hopping (TSCH)","authors":"S.K. Wijayasekara ,&nbsp;P. Sasithong ,&nbsp;H.-Y. Hsieh ,&nbsp;P. Saengudomlert ,&nbsp;C.-B Chae ,&nbsp;L. Wuttisittikulkij","doi":"10.1016/j.icte.2023.12.002","DOIUrl":"10.1016/j.icte.2023.12.002","url":null,"abstract":"<div><p>This work investigates the problem of efficient packet scheduling and transmission for IEEE 802.15.4e TSCH based on the Traffic-Aware Scheduling Algorithm (TASA). Three Integer Linear Programming (ILP) formulations are proposed, namely ILP1, ILP2, and ILP3, to comprehensively address key aspects of how packets are optimally delivered from child nodes to the root node, including node parent selection, packet scheduling, and frequency assignment. ILP1 is proposed to model the fundamental operations of TASA including packet scheduling and frequency assignment, while ILP2 further takes node parent selection into consideration for jointly optimizing node parent selection, packet scheduling, and frequency assignment. Despite its superior performance, ILP2 is only applicable to relatively small network problems due to high computational complexity. Therefore, we finally propose ILP3 for fast and efficient node parent selection. ILP3 can be combined with ILP1 and, most importantly, TASA for achieving effective node parent selection atop packet scheduling and frequency assignment for practical TSCH networks. ILP3 combined with ILP 1 led to computational complexity while ILP3 combined with TASA yielded good performance where it required less than one second of execution time and less packet delivery time.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 442-450"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001601/pdfft?md5=2f5adadfd16bccc191bfbbd20ab8866e&pid=1-s2.0-S2405959523001601-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139019105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research category classification of scientific articles on human health risks of electromagnetic fields using pre-trained BERT 使用预训练 BERT 对有关电磁场对人体健康危害的科学文章进行研究类别分类
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.08.006
Sang-Woo Lee , Jung-Hyok Kwon , Dongwan Kim , Eui-Jik Kim

This paper presents bidirectional encoder representations from transformers (BERT)-based deep learning model for the classification of scientific articles. This model aims to increase the efficiency and reliability of human health risk assessments related to electromagnetic fields (EMF). The proposed model takes the title and abstract of EMF-related articles and classifies them into four categories: animal exposure experiment, cell exposure experiment, human exposure experiment, and epidemiological study. We conducted a performance evaluation to verify the superiority of the proposed model. The results demonstrated that the proposed model outperforms other deep learning models that use pre-trained embeddings, with an average accuracy of 98.33%.

本文提出了基于变压器双向编码器表示(BERT)的深度学习模型,用于科学文章的分类。该模型旨在提高与电磁场(EMF)相关的人类健康风险评估的效率和可靠性。该模型根据电磁场相关文章的标题和摘要将其分为四类:动物暴露实验、细胞暴露实验、人类暴露实验和流行病学研究。我们进行了性能评估,以验证所提模型的优越性。结果表明,所提出的模型优于其他使用预训练嵌入的深度学习模型,平均准确率为 98.33%。
{"title":"Research category classification of scientific articles on human health risks of electromagnetic fields using pre-trained BERT","authors":"Sang-Woo Lee ,&nbsp;Jung-Hyok Kwon ,&nbsp;Dongwan Kim ,&nbsp;Eui-Jik Kim","doi":"10.1016/j.icte.2023.08.006","DOIUrl":"10.1016/j.icte.2023.08.006","url":null,"abstract":"<div><p>This paper presents bidirectional encoder representations from transformers (BERT)-based deep learning model for the classification of scientific articles. This model aims to increase the efficiency and reliability of human health risk assessments related to electromagnetic fields (EMF). The proposed model takes the title and abstract of EMF-related articles and classifies them into four categories: animal exposure experiment, cell exposure experiment, human exposure experiment, and epidemiological study. We conducted a performance evaluation to verify the superiority of the proposed model. The results demonstrated that the proposed model outperforms other deep learning models that use pre-trained embeddings, with an average accuracy of 98.33%.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 336-341"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S240595952300108X/pdfft?md5=15f9324a2d9c0d5df63909e1b4a2ea6f&pid=1-s2.0-S240595952300108X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72479890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overview and empirical analysis of wealth decentralization in blockchain networks 区块链网络财富去中心化概述与实证分析
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2024.02.002
Mindaugas Juodis, Ernestas Filatovas, Remigijus Paulavičius

The decentralization paradigm has made blockchain one of the most disruptive technologies today. When evaluating the level of decentralization, the key metric for most public blockchain networks is the degree of decentralization of the resources responsible for determining who generates the blocks. In turn, it facilitates a greater understanding of both security and scalability on a blockchain. This work provides an overview of the current state-of-the-art on wealth decentralization, which has not yet received the attention it deserves. We collect data, calculate various wealth decentralization metrics, and compare our results with research on the same methodology. As the amount of data for various blockchains increases rapidly, it is helpful to have techniques to aggregate data for statistical analysis. We introduce and provide conservative estimates of decentralized group metrics based on the reduced data and compare them with full-data measurements. Our research considers both the Layer 1 blockchains of Bitcoin and Ethereum, along with Layer 2 blockchains such as Arbitrum, Optimism, and Polygon.

去中心化模式使区块链成为当今最具颠覆性的技术之一。在评估去中心化程度时,大多数公共区块链网络的关键指标是负责决定由谁生成区块的资源的去中心化程度。反过来,这也有助于更好地理解区块链的安全性和可扩展性。这项工作概述了当前财富去中心化的最新进展,财富去中心化尚未得到应有的重视。我们收集数据,计算各种财富去中心化指标,并将我们的结果与相同方法的研究结果进行比较。随着各种区块链的数据量迅速增加,掌握汇总数据的技术对统计分析很有帮助。我们介绍并提供了基于缩减数据的去中心化群体指标的保守估计,并将其与全数据测量进行了比较。我们的研究考虑了比特币和以太坊的第 1 层区块链,以及 Arbitrum、Optimism 和 Polygon 等第 2 层区块链。
{"title":"Overview and empirical analysis of wealth decentralization in blockchain networks","authors":"Mindaugas Juodis,&nbsp;Ernestas Filatovas,&nbsp;Remigijus Paulavičius","doi":"10.1016/j.icte.2024.02.002","DOIUrl":"10.1016/j.icte.2024.02.002","url":null,"abstract":"<div><p>The decentralization paradigm has made blockchain one of the most disruptive technologies today. When evaluating the level of decentralization, the key metric for most public blockchain networks is the degree of decentralization of the resources responsible for determining who generates the blocks. In turn, it facilitates a greater understanding of both security and scalability on a blockchain. This work provides an overview of the current state-of-the-art on wealth decentralization, which has not yet received the attention it deserves. We collect data, calculate various wealth decentralization metrics, and compare our results with research on the same methodology. As the amount of data for various blockchains increases rapidly, it is helpful to have techniques to aggregate data for statistical analysis. We introduce and provide conservative estimates of decentralized group metrics based on the reduced data and compare them with full-data measurements. Our research considers both the Layer 1 blockchains of Bitcoin and Ethereum, along with Layer 2 blockchains such as Arbitrum, Optimism, and Polygon.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 380-386"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000079/pdfft?md5=cdd1ef5281579e570dc9185b4b505df5&pid=1-s2.0-S2405959524000079-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139890409","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain consensus mechanisms comparison in fog computing: A systematic review 雾计算中的区块链共识机制比较:系统性综述
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2024.02.008
Yehia Ibrahim Alzoubi , Alok Mishra

Numerous consensus mechanisms have been suggested to cater to the specific characteristics of fog computing. To comprehensively understand their unique features, performance, and applications in fog computing, it is crucial to conduct a systematic analysis of these mechanisms. For this study, 79 relevant articles were carefully selected based on predefined criteria. Among these articles, 35 employed work-proof-based consensus mechanisms, 24 utilized voting-based mechanisms, and 22 adopted capability-based mechanisms. Among the 26 identified consensus mechanisms, proof of work remains the most prevalent one. It is important to note that the scope of this paper is limited to the research available in the predominant databases at the time of writing. Future research may expand to include additional databases and more recent literature in this domain.

针对雾计算的具体特点,人们提出了许多共识机制。为了全面了解这些机制的独特之处、性能以及在雾计算中的应用,对这些机制进行系统分析至关重要。在本研究中,我们根据预先设定的标准精心挑选了 79 篇相关文章。在这些文章中,35 篇采用了基于工作证明的共识机制,24 篇采用了基于投票的机制,22 篇采用了基于能力的机制。在已确定的 26 种共识机制中,工作证明仍然是最普遍的一种。需要注意的是,本文的研究范围仅限于撰写本文时的主要数据库。未来的研究可能会扩展到该领域的其他数据库和更多最新文献。
{"title":"Blockchain consensus mechanisms comparison in fog computing: A systematic review","authors":"Yehia Ibrahim Alzoubi ,&nbsp;Alok Mishra","doi":"10.1016/j.icte.2024.02.008","DOIUrl":"10.1016/j.icte.2024.02.008","url":null,"abstract":"<div><p>Numerous consensus mechanisms have been suggested to cater to the specific characteristics of fog computing. To comprehensively understand their unique features, performance, and applications in fog computing, it is crucial to conduct a systematic analysis of these mechanisms. For this study, 79 relevant articles were carefully selected based on predefined criteria. Among these articles, 35 employed work-proof-based consensus mechanisms, 24 utilized voting-based mechanisms, and 22 adopted capability-based mechanisms. Among the 26 identified consensus mechanisms, proof of work remains the most prevalent one. It is important to note that the scope of this paper is limited to the research available in the predominant databases at the time of writing. Future research may expand to include additional databases and more recent literature in this domain.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 342-373"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000213/pdfft?md5=9f3fb4eed0214fddae565660753ed984&pid=1-s2.0-S2405959524000213-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139965479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of thermal array sensor-based activity detection in smart spaces using AI 基于热阵列传感器的智能空间人工智能活动检测综述
IF 5.4 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-04-01 DOI: 10.1016/j.icte.2023.11.007
Cosmas Ifeanyi Nwakanma, Goodness Oluchi Anyanwu, Love Allen Chijioke Ahakonye, Jae-Min Lee, Dong-Seong Kim

Nowadays, research works into the dynamic and static human activities on Smart spaces abounds. Artificial Intelligence (AI) and low cost non-privacy invasive ambient sensors have made this ubiquitous. This review presents a state-of-the-art analysis, performance evaluation, and future research direction. One of the aims of activity recognition (especially that of humans) systems using thermal sensors and AI is the safety of persons in Smart spaces. In a Smart home, human activity detection systems are put in place to ensure the safety of persons in such an environment. This system should have the ability to monitor issues like fall detection, a common home-related accident. In this work, a review of trends in thermal sensor deployment, an appraisal of the popular datasets, AI algorithms, testbeds, and critical challenges of the recent works was provided to direct the research focus. In addition, a summary of AI models and their performance under various sensor resolutions was presented.

如今,有关智能空间中人类动态和静态活动的研究工作比比皆是。人工智能(AI)和低成本、不侵犯隐私的环境传感器使得智能空间无处不在。本综述介绍了最先进的分析、性能评估和未来研究方向。使用热传感器和人工智能的活动识别(尤其是人类活动识别)系统的目的之一是确保智能空间中人员的安全。在智能家居中,人类活动检测系统的建立是为了确保人们在这种环境中的安全。该系统应具备监测问题的能力,如跌倒检测,这是一种常见的家庭相关事故。在这项工作中,我们回顾了热传感器部署的趋势,评估了流行的数据集、人工智能算法、测试平台和近期工作中的关键挑战,以指导研究重点。此外,还总结了各种传感器分辨率下的人工智能模型及其性能。
{"title":"A review of thermal array sensor-based activity detection in smart spaces using AI","authors":"Cosmas Ifeanyi Nwakanma,&nbsp;Goodness Oluchi Anyanwu,&nbsp;Love Allen Chijioke Ahakonye,&nbsp;Jae-Min Lee,&nbsp;Dong-Seong Kim","doi":"10.1016/j.icte.2023.11.007","DOIUrl":"10.1016/j.icte.2023.11.007","url":null,"abstract":"<div><p>Nowadays, research works into the dynamic and static human activities on Smart spaces abounds. Artificial Intelligence (AI) and low cost non-privacy invasive ambient sensors have made this ubiquitous. This review presents a state-of-the-art analysis, performance evaluation, and future research direction. One of the aims of activity recognition (especially that of humans) systems using thermal sensors and AI is the safety of persons in Smart spaces. In a Smart home, human activity detection systems are put in place to ensure the safety of persons in such an environment. This system should have the ability to monitor issues like fall detection, a common home-related accident. In this work, a review of trends in thermal sensor deployment, an appraisal of the popular datasets, AI algorithms, testbeds, and critical challenges of the recent works was provided to direct the research focus. In addition, a summary of AI models and their performance under various sensor resolutions was presented.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 2","pages":"Pages 256-269"},"PeriodicalIF":5.4,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959523001509/pdfft?md5=37960ef6490d2cd38759d29a65f86891&pid=1-s2.0-S2405959523001509-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139301149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1