首页 > 最新文献

ICT Express最新文献

英文 中文
Muloc: Multi-scale combination mask indoor localization network for WiFi based on channel state information Muloc:基于信道状态信息的WiFi多尺度组合掩模室内定位网络
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.005
Haoyang Qi , Xin Song , Yuqi Zhang , Lanfeng Li , Zhiao Cao
With the popularization of sensor technology, researchers extract Channel State Information (CSI) from WiFi, which reflects the movement of family members by observing changes in signal transmission in residences. However, WiFi signals are still affected by multipath effects in residences. Therefore, we construct a multi-scale CSI combination mask matrix between adjacent scales based on the ternary closure. Next, we propose a competitive localization network based on aggregated affinity propagation algorithm. Experiments have been conducted to demonstrate that the proposed algorithm achieves significant improvement compared to other classical algorithms in the indoor environment.
随着传感器技术的普及,研究人员通过观察住宅中信号传输的变化,从WiFi中提取出反映家庭成员活动的信道状态信息(CSI)。然而,在住宅中,WiFi信号仍然受到多径效应的影响。因此,我们基于三元闭包构造了相邻尺度间的多尺度CSI组合掩模矩阵。接下来,我们提出了一个基于聚合亲和传播算法的竞争定位网络。实验表明,在室内环境下,与其他经典算法相比,该算法取得了显著的改进。
{"title":"Muloc: Multi-scale combination mask indoor localization network for WiFi based on channel state information","authors":"Haoyang Qi ,&nbsp;Xin Song ,&nbsp;Yuqi Zhang ,&nbsp;Lanfeng Li ,&nbsp;Zhiao Cao","doi":"10.1016/j.icte.2025.04.005","DOIUrl":"10.1016/j.icte.2025.04.005","url":null,"abstract":"<div><div>With the popularization of sensor technology, researchers extract Channel State Information (CSI) from WiFi, which reflects the movement of family members by observing changes in signal transmission in residences. However, WiFi signals are still affected by multipath effects in residences. Therefore, we construct a multi-scale CSI combination mask matrix between adjacent scales based on the ternary closure. Next, we propose a competitive localization network based on aggregated affinity propagation algorithm. Experiments have been conducted to demonstrate that the proposed algorithm achieves significant improvement compared to other classical algorithms in the indoor environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 529-535"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive multi-agent deep reinforcement learning framework with adaptive interaction strategies for contention window optimization in IEEE 802.11 Wireless LANs 基于自适应交互策略的IEEE 802.11无线局域网竞争窗口优化综合多智能体深度强化学习框架
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.01.010
Yi-Hao Tu, Yi-Wei Ma
This study introduces the Multi-Agent, Multi-Parameter, Interaction-Driven Contention Window Optimization (M2I-CWO) algorithm, a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework designed to optimize multiple CW parameters in IEEE 802.11 Wireless LANs. Unlike single-parameter or specialized multi-agent methods, M2I-CWO employs a Dueling-DQN architecture and an Adaptive Interaction Reward Function—spanning independent, cooperative, competitive, and mixed modes—and accommodates Hierarchical Multi-Agent System (HMAS) or Federated RL (FRL) for further scalability. First, multiple CW parameters are simultaneously adjusted to enhance collision management. Second, M2I-CWO consistently achieves throughput improvements in both static and dynamic scenarios. Extensive results confirm M2I-CWO's superiority in efficiency and adaptability.
本研究介绍了多智能体、多参数、交互驱动的争用窗口优化(M2I-CWO)算法,这是一种新颖的多智能体深度强化学习(MADRL)框架,旨在优化IEEE 802.11无线局域网中的多个CW参数。与单参数或专门的多智能体方法不同,M2I-CWO采用duduing - dqn架构和自适应交互奖励功能(跨越独立、合作、竞争和混合模式),并适应分层多智能体系统(HMAS)或联邦RL (FRL),以实现进一步的可扩展性。首先,同时调整多个连续波参数,加强碰撞管理。其次,M2I-CWO在静态和动态场景中始终实现吞吐量改进。广泛的研究结果证实了M2I-CWO在效率和适应性方面的优越性。
{"title":"A comprehensive multi-agent deep reinforcement learning framework with adaptive interaction strategies for contention window optimization in IEEE 802.11 Wireless LANs","authors":"Yi-Hao Tu,&nbsp;Yi-Wei Ma","doi":"10.1016/j.icte.2025.01.010","DOIUrl":"10.1016/j.icte.2025.01.010","url":null,"abstract":"<div><div>This study introduces the Multi-Agent, Multi-Parameter, Interaction-Driven Contention Window Optimization (M2I-CWO) algorithm, a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework designed to optimize multiple CW parameters in IEEE 802.11 Wireless LANs. Unlike single-parameter or specialized multi-agent methods, M2I-CWO employs a Dueling-DQN architecture and an Adaptive Interaction Reward Function—spanning independent, cooperative, competitive, and mixed modes—and accommodates Hierarchical Multi-Agent System (HMAS) or Federated RL (FRL) for further scalability. First, multiple CW parameters are simultaneously adjusted to enhance collision management. Second, M2I-CWO consistently achieves throughput improvements in both static and dynamic scenarios. Extensive results confirm M2I-CWO's superiority in efficiency and adaptability.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 473-480"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based channel prediction for TDD MIMO systems with imperfect channel reciprocity 基于深度学习的不完全信道互易TDD MIMO系统信道预测
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.011
Heecheol Yang
In wireless communication systems, accurate channel state information plays a fundamental role in achieving optimal transmission efficiency at the base station (BS). We introduce a deep learning-based channel prediction designed to address the challenges posed by imperfect channel reciprocity in time-division duplex multiple-input multiple-output systems. We propose two models that not only facilitate accurate channel prediction but also perform channel calibration that can alleviate the impact of imperfect channel reciprocity between BS and users. We evaluate the performance through the simulations in line-of-sight and non-line-of-sight scenarios, demonstrating efficacy in enhancing the accuracy of predicted future downlink channels.
在无线通信系统中,准确的信道状态信息对基站实现最佳传输效率起着至关重要的作用。我们引入了一种基于深度学习的信道预测,旨在解决时分双工多输入多输出系统中信道互易性不完美带来的挑战。我们提出了两个模型,不仅有助于准确的信道预测,而且还可以进行信道校准,以减轻BS和用户之间不完善的信道互惠的影响。我们通过在视距和非视距场景下的模拟来评估性能,证明了在提高预测未来下行信道准确性方面的有效性。
{"title":"Deep learning-based channel prediction for TDD MIMO systems with imperfect channel reciprocity","authors":"Heecheol Yang","doi":"10.1016/j.icte.2025.04.011","DOIUrl":"10.1016/j.icte.2025.04.011","url":null,"abstract":"<div><div>In wireless communication systems, accurate channel state information plays a fundamental role in achieving optimal transmission efficiency at the base station (BS). We introduce a deep learning-based channel prediction designed to address the challenges posed by imperfect channel reciprocity in time-division duplex multiple-input multiple-output systems. We propose two models that not only facilitate accurate channel prediction but also perform channel calibration that can alleviate the impact of imperfect channel reciprocity between BS and users. We evaluate the performance through the simulations in line-of-sight and non-line-of-sight scenarios, demonstrating efficacy in enhancing the accuracy of predicted future downlink channels.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 590-596"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To associate or not to associate? A user-based threshold scheme for 5G and beyond networks 联系还是不联系?5G及以上网络的基于用户的阈值方案
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.003
Naor Zohar
Traditionally, User-cell Association (UA) schemes for cellular networks are based solely on the quality and strength of the received signal. This mechanism may not always be adequate for the complex nature of fifth generation and beyond (B5G) networks, and may lead to load biasing. Additional parameters, such as the load on the neighboring cells, the needs of the user equipment (UE), and the UE mobility should be considered as well. The realization that relying solely on the signal strength and quality for UA may violate load balancing has been recognized for a long time. However, the approach taken was to balance the load by a network-dependent mechanism. Yet, the UA mechanism remains based on the best-received signal. The underlying assumption that all the users have the same needs remains. Load-aware UA was considered only upon mobility-driven handover to small cells. This study suggests a UE-based threshold scheme for load-aware UA that is suitable for B5G networks. Since the optimal UA problem is known to be NP-hard, we suggest a heuristic mechanism, that is sufficiently simple and reliable to be implemented in practice, yet sufficiently efficient to significantly outperform the existing UA mechanism. Simulation results demonstrated that the suggested UA scheme can potentially reduce the required network bandwidth resources by up to 25% and significantly reduce the service blocking probability and the average waiting time for service.
传统上,蜂窝网络的用户单元关联(UA)方案仅基于接收信号的质量和强度。这种机制可能并不总是适合于第五代及以上(B5G)网络的复杂性,并可能导致负载偏倚。还应该考虑其他参数,例如相邻单元的负载、用户设备(UE)的需求和UE的移动性。长期以来,人们已经认识到仅仅依靠信号强度和质量来实现UA可能会违反负载均衡。但是,采用的方法是通过依赖于网络的机制来平衡负载。然而,UA机制仍然基于最佳接收信号。所有用户都有相同需求的基本假设仍然存在。负载感知UA仅在移动性驱动的小单元切换时被考虑。本研究提出了一种适用于B5G网络的基于ue的负载感知UA阈值方案。由于已知最优UA问题是np困难的,我们提出了一种启发式机制,该机制足够简单可靠,可以在实践中实现,但又足够高效,显著优于现有的UA机制。仿真结果表明,提出的UA方案可将所需的网络带宽资源减少25%,显著降低业务阻塞概率和平均服务等待时间。
{"title":"To associate or not to associate? A user-based threshold scheme for 5G and beyond networks","authors":"Naor Zohar","doi":"10.1016/j.icte.2025.03.003","DOIUrl":"10.1016/j.icte.2025.03.003","url":null,"abstract":"<div><div>Traditionally, User-cell Association (UA) schemes for cellular networks are based solely on the quality and strength of the received signal. This mechanism may not always be adequate for the complex nature of fifth generation and beyond (B5G) networks, and may lead to load biasing. Additional parameters, such as the load on the neighboring cells, the needs of the user equipment (UE), and the UE mobility should be considered as well. The realization that relying solely on the signal strength and quality for UA may violate load balancing has been recognized for a long time. However, the approach taken was to balance the load by a network-dependent mechanism. Yet, the UA mechanism remains based on the best-received signal. The underlying assumption that all the users have the same needs remains. Load-aware UA was considered only upon mobility-driven handover to small cells. This study suggests a UE-based threshold scheme for load-aware UA that is suitable for B5G networks. Since the optimal UA problem is known to be NP-hard, we suggest a heuristic mechanism, that is sufficiently simple and reliable to be implemented in practice, yet sufficiently efficient to significantly outperform the existing UA mechanism. Simulation results demonstrated that the suggested UA scheme can potentially reduce the required network bandwidth resources by up to 25%<!--> <!-->and significantly reduce the service blocking probability and the average waiting time for service.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 390-401"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled KYC integration for CLV optimization with robust M-Estimation and IRLS method 基于区块链的KYC集成,基于稳健的m估计和IRLS方法进行CLV优化
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.006
Marischa Elveny , Mahyuddin K.M. Nasution , Fanindia Purnamasari , Tengku Siti Meriam Tengku Wook
This research introduces an innovative approach in implementing Know Your Customer (KYC) on blockchain technology as a means of using data, hybrid robust m-estimation, and the iteratively reweighted less squares (IRLS) method to optimize CLV data. This approach aims to improve the accuracy and reliability of CLV predictions by ensuring the security and reliability of customer data. This tool can help companies manage and increase CLV more effectively, meeting data security and compliance standards. The R-squared validation test results are close to 1, so the model can explain data variations well. RMSE and MSE have small values, ​​so the model has good performance in predicting the target value. With these achievements, this approach contributes to the development of better marketing strategies and business decisions in an increasingly complex and rapidly changing digital environment.
本研究介绍了一种在区块链技术上实现了解客户(KYC)的创新方法,作为使用数据、混合鲁棒m估计和迭代重加权少平方(IRLS)方法来优化CLV数据的手段。这种方法旨在通过确保客户数据的安全性和可靠性来提高CLV预测的准确性和可靠性。该工具可以帮助公司更有效地管理和提高CLV,满足数据安全性和遵从性标准。r平方验证检验结果接近于1,因此该模型可以很好地解释数据的变化。由于RMSE和MSE的值较小,因此该模型在预测目标值方面具有较好的性能。有了这些成就,这种方法有助于在日益复杂和快速变化的数字环境中制定更好的营销策略和商业决策。
{"title":"Blockchain-enabled KYC integration for CLV optimization with robust M-Estimation and IRLS method","authors":"Marischa Elveny ,&nbsp;Mahyuddin K.M. Nasution ,&nbsp;Fanindia Purnamasari ,&nbsp;Tengku Siti Meriam Tengku Wook","doi":"10.1016/j.icte.2025.03.006","DOIUrl":"10.1016/j.icte.2025.03.006","url":null,"abstract":"<div><div>This research introduces an innovative approach in implementing Know Your Customer (KYC) on blockchain technology as a means of using data, hybrid robust m-estimation, and the iteratively reweighted less squares (IRLS) method to optimize CLV data. This approach aims to improve the accuracy and reliability of CLV predictions by ensuring the security and reliability of customer data. This tool can help companies manage and increase CLV more effectively, meeting data security and compliance standards. The R-squared validation test results are close to 1, so the model can explain data variations well. RMSE and MSE have small values, ​​so the model has good performance in predicting the target value. With these achievements, this approach contributes to the development of better marketing strategies and business decisions in an increasingly complex and rapidly changing digital environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 402-410"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer 使用联邦学习和西伯利亚虎优化器进行物联网攻击检测的分布式优化
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.02.012
Brij B. Gupta , Akshat Gaurav , Wadee Alhalabi , Varsha Arya , Eman Alharbi , Kwok Tai Chui
The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attack detection using CNN model utilizing federated learning. After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. Our model achieves accuracy, recall, and precision of 0.89978, 0.94355, and 0.94455, respectively, using the N-BaIoT dataset. These findings show, in spite of latency issues, the efficiency of federated learning in distributed IoT security systems.
物联网设备的快速增长增加了僵尸网络攻击的风险,需要可扩展和分布式检测解决方案。在此背景下,本研究提出了一种利用联合学习的CNN模型进行物联网攻击检测的分布式优化系统。西伯利亚虎优化(STO)方法在服务器端优化模型的超参数后,将这些值分发到客户端进行分散训练。我们的模型使用N-BaIoT数据集,准确率、召回率和精密度分别为0.89978、0.94355和0.94455。这些发现表明,尽管存在延迟问题,但分布式物联网安全系统中的联合学习效率很高。
{"title":"Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer","authors":"Brij B. Gupta ,&nbsp;Akshat Gaurav ,&nbsp;Wadee Alhalabi ,&nbsp;Varsha Arya ,&nbsp;Eman Alharbi ,&nbsp;Kwok Tai Chui","doi":"10.1016/j.icte.2025.02.012","DOIUrl":"10.1016/j.icte.2025.02.012","url":null,"abstract":"<div><div>The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attack detection using CNN model utilizing federated learning. After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. Our model achieves accuracy, recall, and precision of 0.89978, 0.94355, and 0.94455, respectively, using the N-BaIoT dataset. These findings show, in spite of latency issues, the efficiency of federated learning in distributed IoT security systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 542-546"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial defense for battery state-of-health prediction models 电池健康状态预测模型的对抗性防御
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.011
Masoumeh Mohammadi, Insoo Sohn
This study addresses the challenge of state of health (SOH) estimation for lithium-ion batteries using a generative graphical approach under adversarial conditions. We analyze the impact of adversarial data poisoning attacks on SOH prediction models, specifically employing the fast gradient sign method (FGSM) and iterative fast gradient sign method (IFGSM). To enhance model robustness, we propose a two-defense strategy against such attacks. The effectiveness of these defenses is evaluated using error metrics such as root-mean-square error (RMSE), mean absolute error (MAE), and mean-square error (MSE). Results indicate that the proposed strategy significantly improves the model’s ability to accurately predict SOH, even in the presence of malicious data.
本研究使用生成图形方法解决了对抗条件下锂离子电池健康状态(SOH)估计的挑战。我们分析了对抗性数据中毒攻击对SOH预测模型的影响,具体采用快速梯度符号法(FGSM)和迭代快速梯度符号法(IFGSM)。为了增强模型的鲁棒性,我们提出了一种针对此类攻击的双重防御策略。这些防御的有效性是使用误差度量来评估的,比如均方根误差(RMSE)、平均绝对误差(MAE)和均方误差(MSE)。结果表明,即使存在恶意数据,所提出的策略也显著提高了模型准确预测SOH的能力。
{"title":"Adversarial defense for battery state-of-health prediction models","authors":"Masoumeh Mohammadi,&nbsp;Insoo Sohn","doi":"10.1016/j.icte.2025.03.011","DOIUrl":"10.1016/j.icte.2025.03.011","url":null,"abstract":"<div><div>This study addresses the challenge of state of health (SOH) estimation for lithium-ion batteries using a generative graphical approach under adversarial conditions. We analyze the impact of adversarial data poisoning attacks on SOH prediction models, specifically employing the fast gradient sign method (FGSM) and iterative fast gradient sign method (IFGSM). To enhance model robustness, we propose a two-defense strategy against such attacks. The effectiveness of these defenses is evaluated using error metrics such as root-mean-square error (RMSE), mean absolute error (MAE), and mean-square error (MSE). Results indicate that the proposed strategy significantly improves the model’s ability to accurately predict SOH, even in the presence of malicious data.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 436-441"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards fault-tolerant distributed quantum computation (FT-DQC): Taxonomy, recent progress, and challenges 迈向容错分布式量子计算(FT-DQC):分类、最新进展和挑战
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.007
Harashta Tatimma Larasati , Byung-Soo Choi
As the works on quantum computing have seen substantial development in recent years, we are on the verge of seeing the fruitful result of the preliminary, early version of quantum computers. Nevertheless, in order to achieve full-fledged, large-scale quantum computers, two aspects still lacking in the existing quantum computers, i.e., scalability and reliability, will need to be more carefully considered and investigated. In this survey, we present a review of existing literature that aims to alleviate the scalability and reliability issues in quantum computers. In particular, we discuss how existing research leads to two main solutions: for advancing scalability, a distributed quantum computing (DQC) paradigm will be the primary direction instead of the general centralized quantum computing (CQC), whereas for attaining reliability, a fault-tolerant quantum computation (FTQC) approach would need to be leveraged instead of the existing noisy intermediate-scale quantum computers (NISQ). Combining both solutions, we highlight the essentiality of fault-tolerant distributed quantum computation (FT-DQC) and present related progress in the field. Furthermore, from the papers that we have gathered, we provide the taxonomy of the works to give a clearer landscape of the field and discuss the key issues in realizing FT-DQC.
随着近年来量子计算工作的长足发展,我们即将看到量子计算机的初步、早期版本的丰硕成果。然而,为了实现成熟的大规模量子计算机,现有量子计算机仍然缺乏两个方面,即可扩展性和可靠性,需要更加仔细地考虑和研究。在本调查中,我们对现有文献进行了回顾,旨在缓解量子计算机的可扩展性和可靠性问题。特别是,我们讨论了现有研究如何导致两种主要解决方案:为了提高可扩展性,分布式量子计算(DQC)范式将成为主要方向,而不是一般的集中式量子计算(CQC),而为了获得可靠性,需要利用容错量子计算(FTQC)方法,而不是现有的噪声中等规模量子计算机(NISQ)。结合这两种解决方案,我们强调了容错分布式量子计算(FT-DQC)的重要性,并介绍了该领域的相关进展。此外,从我们收集的论文中,我们提供了作品的分类,以提供该领域更清晰的景观,并讨论实现FT-DQC的关键问题。
{"title":"Towards fault-tolerant distributed quantum computation (FT-DQC): Taxonomy, recent progress, and challenges","authors":"Harashta Tatimma Larasati ,&nbsp;Byung-Soo Choi","doi":"10.1016/j.icte.2025.03.007","DOIUrl":"10.1016/j.icte.2025.03.007","url":null,"abstract":"<div><div>As the works on quantum computing have seen substantial development in recent years, we are on the verge of seeing the fruitful result of the preliminary, early version of quantum computers. Nevertheless, in order to achieve full-fledged, large-scale quantum computers, two aspects still lacking in the existing quantum computers, i.e., scalability and reliability, will need to be more carefully considered and investigated. In this survey, we present a review of existing literature that aims to alleviate the scalability and reliability issues in quantum computers. In particular, we discuss how existing research leads to two main solutions: for advancing scalability, a distributed quantum computing (DQC) paradigm will be the primary direction instead of the general centralized quantum computing (CQC), whereas for attaining reliability, a fault-tolerant quantum computation (FTQC) approach would need to be leveraged instead of the existing noisy intermediate-scale quantum computers (NISQ). Combining both solutions, we highlight the essentiality of fault-tolerant distributed quantum computation (FT-DQC) and present related progress in the field. Furthermore, from the papers that we have gathered, we provide the taxonomy of the works to give a clearer landscape of the field and discuss the key issues in realizing FT-DQC.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 417-435"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and secure communications using dynamic rotations reconfigurable intelligent surface 使用动态旋转可重构智能表面的稳健和安全通信
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.010
Kunyu Li, Guoping Zhang, Hongbo Xu, Ruijie Li, Yun Chen, Xingxing Huang
This paper investigates the secure transmission problem using a dynamically reconfigurable intelligent surface (RIS). Considering an eavesdropping scenario where a multi-antenna eavesdropper has inadequate channel state information, a resilient beamforming strategy is proposed to simultaneously optimize the active beamforming at the base station and rotational angles of the RIS in order to improve the system's secrecy rate. A continuous-time propagation model is used to explain the dynamically rotating RIS to maximize the cascaded channel gain. Simulation findings validate the security benefits of the resilient beamforming approach, and the dynamic rotation technique increases the secrecy rate while reducing delay spread.
研究了基于动态可重构智能面(RIS)的安全传输问题。针对多天线窃听者信道状态信息不足的窃听场景,提出了一种弹性波束形成策略,同时优化基站有源波束形成和RIS旋转角度,以提高系统的保密率。为了使级联信道增益最大化,采用连续时间传播模型来解释动态旋转的RIS。仿真结果验证了弹性波束形成方法的安全性,动态旋转技术在降低延迟扩散的同时提高了保密率。
{"title":"Robust and secure communications using dynamic rotations reconfigurable intelligent surface","authors":"Kunyu Li,&nbsp;Guoping Zhang,&nbsp;Hongbo Xu,&nbsp;Ruijie Li,&nbsp;Yun Chen,&nbsp;Xingxing Huang","doi":"10.1016/j.icte.2025.03.010","DOIUrl":"10.1016/j.icte.2025.03.010","url":null,"abstract":"<div><div>This paper investigates the secure transmission problem using a dynamically reconfigurable intelligent surface (RIS). Considering an eavesdropping scenario where a multi-antenna eavesdropper has inadequate channel state information, a resilient beamforming strategy is proposed to simultaneously optimize the active beamforming at the base station and rotational angles of the RIS in order to improve the system's secrecy rate. A continuous-time propagation model is used to explain the dynamically rotating RIS to maximize the cascaded channel gain. Simulation findings validate the security benefits of the resilient beamforming approach, and the dynamic rotation technique increases the secrecy rate while reducing delay spread.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 523-528"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method for 3D face reconstruction using transformers based on action unit features 一种基于动作单元特征的三维人脸重构方法
IF 4.1 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.004
Hyeonjin Kim, Hyukjoon Lee
Abstract
We present a novel 3D face reconstruction framework called Facial action unit (AU) feature-based 3D FAce Reconstruction using Transformer (AUFART) that can generate a 3D face model that is responsive to AU activation given a single monocular 2D image to capture expressions. We propose a novel 3D face reconstruction framework, called AUFART (Facial Action Unit Feature-based 3D Face Reconstruction using Transformer), which generates 3D face models responsive to AU activations from a single monocular 2D image, effectively capturing facial expressions. AUFART leverages AU-specific features as well as facial global features to achieve accurate 3D reconstruction of facial expressions using transformers. We also introduce a loss function designed to guide the learning process so that the discrepancy in AU activations between the input and rendered reconstruction is minimized. The proposed framework achieves an average F1 score of 0.39, outperforming state-of-the-art methods.
摘要我们提出了一种新的3D人脸重建框架,称为基于面部动作单元(AU)特征的3D人脸重建,该框架使用Transformer (AUFART),可以生成响应AU激活的3D人脸模型,给定单个单眼2D图像来捕捉表情。我们提出了一种新的3D人脸重建框架,称为AUFART(基于面部动作单元特征的3D人脸重建使用变压器),它可以从单个单眼2D图像中生成响应AU激活的3D人脸模型,有效地捕捉面部表情。AUFART利用au特定的特征以及面部全局特征,使用变压器实现面部表情的精确3D重建。我们还引入了一个损失函数,用于指导学习过程,以便将输入和呈现重建之间AU激活的差异最小化。该框架的F1平均得分为0.39,优于最先进的方法。
{"title":"A new method for 3D face reconstruction using transformers based on action unit features","authors":"Hyeonjin Kim,&nbsp;Hyukjoon Lee","doi":"10.1016/j.icte.2025.04.004","DOIUrl":"10.1016/j.icte.2025.04.004","url":null,"abstract":"<div><div>Abstract</div><div>We present a novel 3D face reconstruction framework called Facial action unit (AU) feature-based 3D FAce Reconstruction using Transformer (AUFART) that can generate a 3D face model that is responsive to AU activation given a single monocular 2D image to capture expressions. We propose a novel 3D face reconstruction framework, called AUFART (Facial Action Unit Feature-based 3D Face Reconstruction using Transformer), which generates 3D face models responsive to AU activations from a single monocular 2D image, effectively capturing facial expressions. AUFART leverages AU-specific features as well as facial global features to achieve accurate 3D reconstruction of facial expressions using transformers. We also introduce a loss function designed to guide the learning process so that the discrepancy in AU activations between the input and rendered reconstruction is minimized. The proposed framework achieves an average F1 score of 0.39, outperforming state-of-the-art methods.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 454-459"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICT Express
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1