首页 > 最新文献

Digital Communications and Networks最新文献

英文 中文
A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city 智慧城市中具有恒定活板门的无证书、kga安全的可搜索加密方案
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2024-08-08 DOI: 10.1016/j.dcan.2024.08.005
Hongjun Li , Debiao He , P. Vijayakumar , Fayez Alqahtani , Amr Tolba
Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data. While cloud computing brings convenience to smart city services, a serious problem is ensuring that confidential data cannot be leaked to malicious adversaries. Considering the security and privacy of data, data owners transmit sensitive data in its encrypted form to cloud server, which seriously hinders the improvements of potential utilization and efficient sharing. Public key searchable encryption ensures that users can securely retrieve the encrypted data without decryption. However, most existing schemes cannot resist keyword guessing attacks or the size of trapdoors linearly increases with the number of data owners. In this work, by utilizing certificateless encryption and proxy re-encryption, we design an authenticated searchable encryption scheme with constant trapdoors. The designed scheme preserves the privacy of index ciphertexts and keyword trapdoors, and can resist keyword guessing attacks. In addition, data users can generate and upload trapdoors with lower computation and communication overheads. We show that the proposed scheme is suitable for smart city implementations and applications by experimentally evaluating its performance.
智慧城市作为物联网领域的典型应用,可以结合云计算实现对物体的智能控制和海量数据的处理。虽然云计算为智慧城市服务带来了便利,但一个严重的问题是如何确保机密数据不会泄露给恶意对手。考虑到数据的安全性和隐私性,数据所有者将敏感数据以加密形式传输到云服务器,严重阻碍了潜在利用率的提高和高效共享。公钥可搜索加密确保用户无需解密即可安全地检索加密数据。然而,大多数现有的方案不能抵抗关键字猜测攻击或陷阱门的大小随着数据所有者的数量线性增加。本文利用无证书加密和代理再加密,设计了一种具有恒定陷阱门的身份验证可搜索加密方案。该方案既保护了索引密文和关键字陷阱门的私密性,又能抵抗关键字猜测攻击。此外,数据用户可以生成和上传具有较低计算和通信开销的活板门。我们通过实验评估其性能,证明了所提出的方案适合智慧城市的实现和应用。
{"title":"A certificateless and KGA-secure searchable encryption scheme with constant trapdoors in smart city","authors":"Hongjun Li ,&nbsp;Debiao He ,&nbsp;P. Vijayakumar ,&nbsp;Fayez Alqahtani ,&nbsp;Amr Tolba","doi":"10.1016/j.dcan.2024.08.005","DOIUrl":"10.1016/j.dcan.2024.08.005","url":null,"abstract":"<div><div>Smart cities, as a typical application in the field of the Internet of Things, can combine cloud computing to realize the intelligent control of objects and process massive data. While cloud computing brings convenience to smart city services, a serious problem is ensuring that confidential data cannot be leaked to malicious adversaries. Considering the security and privacy of data, data owners transmit sensitive data in its encrypted form to cloud server, which seriously hinders the improvements of potential utilization and efficient sharing. Public key searchable encryption ensures that users can securely retrieve the encrypted data without decryption. However, most existing schemes cannot resist keyword guessing attacks or the size of trapdoors linearly increases with the number of data owners. In this work, by utilizing certificateless encryption and proxy re-encryption, we design an authenticated searchable encryption scheme with constant trapdoors. The designed scheme preserves the privacy of index ciphertexts and keyword trapdoors, and can resist keyword guessing attacks. In addition, data users can generate and upload trapdoors with lower computation and communication overheads. We show that the proposed scheme is suitable for smart city implementations and applications by experimentally evaluating its performance.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 198-209"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146189434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling 利用增强的数据路由和任务调度模型优化信息物理智能交通系统网络
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2025-01-30 DOI: 10.1016/j.dcan.2025.01.004
Srinivasa Gowda G. K , Hayder M.A. Ghanimi , Sudhakar Sengan , Kolla Bhanu Prakash , Meshal Alharbi , Roobaea Alroobaea , Sultan Algarni , Abdullah M. Baqasah
Advanced technologies like Cyber-Physical Systems (CPS) and the Internet of Things (IoT) have supported modernizing and automating the transportation region through the introduction of Intelligent Transportation Systems (ITS). Integrating CPS-ITS and IoT provides real-time Vehicle-to-Infrastructure (V2I) communication, supporting better traffic management, safety, and efficiency. These technological innovations generate complex problems that need to be addressed, uniquely about data routing and Task Scheduling (TS) in ITS. Attempts to solve those problems were primarily based on traditional and experimental methods, and the solutions were not so successful due to the dynamic nature of ITS. This is where the scope of Machine learning (ML) and Swarm Intelligence (SI) has significantly impacted dealing with these challenges; in this line, this research paper presents a novel method for TS and data routing in the CPS-ITS. This paper proposes using a cutting-edge ML algorithm for data transmission from CPS-ITS. This ML has Gated Linear Unit-approximated Reinforcement Learning (GLRL). Greedy Iterative-Particle Swarm Optimization (GI-PSO) has been recommended to develop the Particle Swarm Optimization (PSO) for TS. The primary objective of this study is to enhance the security and effectiveness of ITS systems that utilize CPS-ITS. This study trained and validated the models using a network simulation dataset of 50 nodes from numerous ITS environments. The experiments demonstrate that the proposed GLRL reduces End-to-End Delay (EED) by 12%, enhances data size use from 83.6% to 88.6%, and achieves higher bandwidth allocation, particularly in high-demand scenarios such as multimedia data streams where adherence improved to 98.15%. Furthermore, the GLRL reduced Network Congestion (NC) by 5.5%, demonstrating its efficiency in managing complex traffic conditions across several environments. The model passed simulation tests in three different environments: urban (UE), suburban (SE), and rural (RE). It met the high bandwidth requirements, made task scheduling more efficient, and increased network throughput (NT). This proved that it was robust and flexible enough for scalable ITS applications. These innovations provide robust, scalable solutions for real-time traffic management, ultimately improving safety, reducing NC, and increasing overall NT. This study can affect ITS by developing it to be more responsive, safe, and effective and by creating a perfect method to set up UE, SE, and RE.
通过引入智能交通系统(ITS),网络物理系统(CPS)和物联网(IoT)等先进技术支持了交通运输领域的现代化和自动化。CPS-ITS与物联网的融合提供了实时的车对基础设施(V2I)通信,支持更好的交通管理、安全和效率。这些技术创新产生了复杂的问题,需要解决,特别是关于ITS中的数据路由和任务调度(TS)。解决这些问题的尝试主要基于传统和实验方法,由于ITS的动态性,解决方案并不那么成功。这就是机器学习(ML)和群体智能(SI)的范围对应对这些挑战产生重大影响的地方;在此基础上,本文提出了一种新的CPS-ITS中的TS和数据路由方法。本文提出了一种先进的机器学习算法,用于CPS-ITS的数据传输。这个机器学习具有门控线性单元近似强化学习(GLRL)。本文提出了一种基于贪心迭代-粒子群优化(GI-PSO)的智能交通系统粒子群优化方法,旨在提高智能交通系统的安全性和有效性。本研究使用来自多个ITS环境的50个节点的网络模拟数据集来训练和验证模型。实验表明,提出的GLRL将端到端延迟(EED)降低了12%,将数据大小利用率从83.6%提高到88.6%,并实现了更高的带宽分配,特别是在高需求场景中,如多媒体数据流,依从性提高到98.15%。此外,GLRL将网络拥塞(NC)降低了5.5%,证明了其在管理多个环境中的复杂交通条件方面的效率。该模型通过了三种不同环境的仿真测试:城市(UE)、郊区(SE)和农村(RE)。它满足了高带宽需求,使任务调度更高效,并提高了网络吞吐量(NT)。这证明了它对于可扩展ITS应用具有足够的鲁棒性和灵活性。这些创新为实时交通管理提供了强大的、可扩展的解决方案,最终提高了安全性,减少了NC,并增加了整体NT。本研究可以通过开发ITS,使其响应更快、更安全、更有效,并通过创建一种完美的方法来设置UE、SE和RE,从而影响ITS。
{"title":"Optimizing the cyber-physical intelligent transportation system network using enhanced models for data routing and task scheduling","authors":"Srinivasa Gowda G. K ,&nbsp;Hayder M.A. Ghanimi ,&nbsp;Sudhakar Sengan ,&nbsp;Kolla Bhanu Prakash ,&nbsp;Meshal Alharbi ,&nbsp;Roobaea Alroobaea ,&nbsp;Sultan Algarni ,&nbsp;Abdullah M. Baqasah","doi":"10.1016/j.dcan.2025.01.004","DOIUrl":"10.1016/j.dcan.2025.01.004","url":null,"abstract":"<div><div>Advanced technologies like Cyber-Physical Systems (CPS) and the Internet of Things (IoT) have supported modernizing and automating the transportation region through the introduction of Intelligent Transportation Systems (ITS). Integrating CPS-ITS and IoT provides real-time Vehicle-to-Infrastructure (V2I) communication, supporting better traffic management, safety, and efficiency. These technological innovations generate complex problems that need to be addressed, uniquely about data routing and Task Scheduling (TS) in ITS. Attempts to solve those problems were primarily based on traditional and experimental methods, and the solutions were not so successful due to the dynamic nature of ITS. This is where the scope of Machine learning (ML) and Swarm Intelligence (SI) has significantly impacted dealing with these challenges; in this line, this research paper presents a novel method for TS and data routing in the CPS-ITS. This paper proposes using a cutting-edge ML algorithm for data transmission from CPS-ITS. This ML has Gated Linear Unit-approximated Reinforcement Learning (GLRL). Greedy Iterative-Particle Swarm Optimization (GI-PSO) has been recommended to develop the Particle Swarm Optimization (PSO) for TS. The primary objective of this study is to enhance the security and effectiveness of ITS systems that utilize CPS-ITS. This study trained and validated the models using a network simulation dataset of 50 nodes from numerous ITS environments. The experiments demonstrate that the proposed GLRL reduces End-to-End Delay (EED) by 12%, enhances data size use from 83.6% to 88.6%, and achieves higher bandwidth allocation, particularly in high-demand scenarios such as multimedia data streams where adherence improved to 98.15%. Furthermore, the GLRL reduced Network Congestion (NC) by 5.5%, demonstrating its efficiency in managing complex traffic conditions across several environments. The model passed simulation tests in three different environments: urban (UE), suburban (SE), and rural (RE). It met the high bandwidth requirements, made task scheduling more efficient, and increased network throughput (NT). This proved that it was robust and flexible enough for scalable ITS applications. These innovations provide robust, scalable solutions for real-time traffic management, ultimately improving safety, reducing NC, and increasing overall NT. This study can affect ITS by developing it to be more responsive, safe, and effective and by creating a perfect method to set up UE, SE, and RE.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 210-222"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146189435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed unsupervised meta-learning algorithm over multi-agent systems 多智能体系统的分布式无监督元学习算法
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2024-08-08 DOI: 10.1016/j.dcan.2024.08.006
Zhenzhen Wang , Bing He , Zixin Jiang , Xianyang Zhang , Haidi Dong , Di Ye
Multi-Agent Systems (MAS), which consist of multiple interacting agents, are crucial in Cyber-Physical Systems (CPS), because they improve system adaptability, efficiency, and robustness through parallel processing and collaboration. However, most existing unsupervised meta-learning methods are centralized and not suitable for multi-agent systems where data are distributed stored and inaccessible to all agents. Meta-GMVAE, based on Variational Autoencoder (VAE) and set-level variational inference, represents a sophisticated unsupervised meta-learning model that improves generative performance by efficiently learning data representations across various tasks, increasing adaptability and reducing sample requirements. Inspired by these advancements, we propose a novel Distributed Unsupervised Meta-Learning (DUML) framework based on Meta-GMVAE and a fusion strategy. Furthermore, we present a DUML algorithm based on Gaussian Mixture Model (DUMLGMM), where the parameters of the Gaussian-mixture are solved by an Expectation-Maximization algorithm. Simulations on Omniglot and MiniImageNet datasets show that DUMLGMM can achieve the performance of the corresponding centralized algorithm and outperform non-cooperative algorithm.
多智能体系统(MAS)由多个相互作用的智能体组成,通过并行处理和协作提高系统的适应性、效率和鲁棒性,在网络物理系统(CPS)中起着至关重要的作用。然而,大多数现有的无监督元学习方法是集中式的,不适合多智能体系统,其中数据是分布式存储的,并且所有智能体都无法访问。元gmvae基于变分自编码器(VAE)和集合级变分推理,代表了一种复杂的无监督元学习模型,通过有效地学习各种任务中的数据表示,提高适应性和减少样本需求,提高了生成性能。受这些进展的启发,我们提出了一种基于Meta-GMVAE和融合策略的分布式无监督元学习(DUML)框架。在此基础上,提出了一种基于高斯混合模型(DUMLGMM)的DUML算法,其中高斯混合模型的参数由期望最大化算法求解。在Omniglot和MiniImageNet数据集上的仿真表明,DUMLGMM可以达到相应集中式算法的性能,并且优于非协作算法。
{"title":"Distributed unsupervised meta-learning algorithm over multi-agent systems","authors":"Zhenzhen Wang ,&nbsp;Bing He ,&nbsp;Zixin Jiang ,&nbsp;Xianyang Zhang ,&nbsp;Haidi Dong ,&nbsp;Di Ye","doi":"10.1016/j.dcan.2024.08.006","DOIUrl":"10.1016/j.dcan.2024.08.006","url":null,"abstract":"<div><div>Multi-Agent Systems (MAS), which consist of multiple interacting agents, are crucial in Cyber-Physical Systems (CPS), because they improve system adaptability, efficiency, and robustness through parallel processing and collaboration. However, most existing unsupervised meta-learning methods are centralized and not suitable for multi-agent systems where data are distributed stored and inaccessible to all agents. Meta-GMVAE, based on Variational Autoencoder (VAE) and set-level variational inference, represents a sophisticated unsupervised meta-learning model that improves generative performance by efficiently learning data representations across various tasks, increasing adaptability and reducing sample requirements. Inspired by these advancements, we propose a novel Distributed Unsupervised Meta-Learning (DUML) framework based on Meta-GMVAE and a fusion strategy. Furthermore, we present a DUML algorithm based on Gaussian Mixture Model (DUMLGMM), where the parameters of the Gaussian-mixture are solved by an Expectation-Maximization algorithm. Simulations on Omniglot and MiniImageNet datasets show that DUMLGMM can achieve the performance of the corresponding centralized algorithm and outperform non-cooperative algorithm.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 134-142"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double-side delay alignment modulation for multi-user millimeter wave and terahertz communications 用于多用户毫米波和太赫兹通信的双面延迟对准调制
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2025-04-18 DOI: 10.1016/j.dcan.2025.04.002
Xingwei Wang , Haiquan Lu , Jieni Zhang , Yong Zeng
Delay Alignment Modulation (DAM) is an innovative broadband modulation technique well-suited for millimeter Wave (mmWave) and Terahertz (THz) massive Multiple-Input Multiple-Output (MIMO) communication systems. Leveraging the high spatial resolution and sparsity of multi-path channels, DAM effectively mitigates Inter-Symbol Interference (ISI) by aligning all multi-path components through a combination of delay pre-compensation (or post-compensation) and path-based beamforming. As such, ISI is eliminated while preserving multi-path power gains. In this paper, we investigate multi-user double-side DAM, which incorporates both delay pre-compensation at the transmitter and post-compensation at the receiver, in contrast to prior works that primarily focus on single-side DAM with only delay pre-compensation. Firstly, we derive the constraint on the number of introduced delays and formulate the corresponding delay pre/post-compensation vectors tailored for multi-user double-side DAM, given a specific number of delay compensations. Furthermore, we demonstrate that when the number of Base Stations (BSs)/User Equipment (UE) antennas is sufficiently large, single-side DAM—where delay compensation is performed only at the BS/UE—is preferable to double-side DAM, since the former results in less ISI to be spatially eliminated. Next, we propose two low-complexity path-based beamforming strategies based on the eigen-beamforming transmission and ISI-Zero Forcing (ZF), respectively. On this basis, we further analyze the achievable sum rates. Simulation results verify that with a sufficiently large number of BS/UE antennas, single-side DAM is adequate for ISI elimination. Moreover, compared to the benchmarking scheme of Orthogonal Frequency Division Multiplexing (OFDM), multi-user BS-side DAM achieves higher spectral efficiency and lower Peak-to-Average Power Ratio (PAPR).
延迟对准调制(DAM)是一种创新的宽带调制技术,非常适合于毫米波(mmWave)和太赫兹(THz)大规模多输入多输出(MIMO)通信系统。利用多径信道的高空间分辨率和稀疏性,DAM通过结合延迟预补偿(或后补偿)和基于路径的波束形成来对齐所有多径分量,有效地减轻了符号间干扰(ISI)。因此,在保留多路径功率增益的同时消除了ISI。在本文中,我们研究了多用户双面DAM,它同时包含了发送端的延迟预补偿和接收端的后补偿,而不是之前的工作主要集中在只有延迟预补偿的单边DAM。首先,我们推导了引入延迟数量的约束,并在给定特定延迟补偿数量的情况下,为多用户双侧DAM制定了相应的延迟补偿前/补偿后向量。此外,我们证明,当基站(BSs)/用户设备(UE)天线的数量足够大时,单边DAM -仅在BS/UE上进行延迟补偿-比双面DAM更可取,因为前者导致较少的ISI在空间上消除。接下来,我们分别提出了基于本征波束形成传输和基于isi零强迫(ZF)的两种低复杂度路径波束形成策略。在此基础上,进一步分析了可实现的求和速率。仿真结果表明,在BS/UE天线数量足够大的情况下,单面DAM足以消除ISI。此外,与正交频分复用(OFDM)的基准测试方案相比,多用户宽带侧DAM具有更高的频谱效率和更低的峰均功率比(PAPR)。
{"title":"Double-side delay alignment modulation for multi-user millimeter wave and terahertz communications","authors":"Xingwei Wang ,&nbsp;Haiquan Lu ,&nbsp;Jieni Zhang ,&nbsp;Yong Zeng","doi":"10.1016/j.dcan.2025.04.002","DOIUrl":"10.1016/j.dcan.2025.04.002","url":null,"abstract":"<div><div>Delay Alignment Modulation (DAM) is an innovative broadband modulation technique well-suited for millimeter Wave (mmWave) and Terahertz (THz) massive Multiple-Input Multiple-Output (MIMO) communication systems. Leveraging the high spatial resolution and sparsity of multi-path channels, DAM effectively mitigates Inter-Symbol Interference (ISI) by aligning all multi-path components through a combination of delay pre-compensation (or post-compensation) and path-based beamforming. As such, ISI is eliminated while preserving multi-path power gains. In this paper, we investigate multi-user double-side DAM, which incorporates both delay pre-compensation at the transmitter and post-compensation at the receiver, in contrast to prior works that primarily focus on single-side DAM with only delay pre-compensation. Firstly, we derive the constraint on the number of introduced delays and formulate the corresponding delay pre/post-compensation vectors tailored for multi-user double-side DAM, given a specific number of delay compensations. Furthermore, we demonstrate that when the number of Base Stations (BSs)/User Equipment (UE) antennas is sufficiently large, single-side DAM—where delay compensation is performed only at the BS/UE—is preferable to double-side DAM, since the former results in less ISI to be spatially eliminated. Next, we propose two low-complexity path-based beamforming strategies based on the eigen-beamforming transmission and ISI-Zero Forcing (ZF), respectively. On this basis, we further analyze the achievable sum rates. Simulation results verify that with a sufficiently large number of BS/UE antennas, single-side DAM is adequate for ISI elimination. Moreover, compared to the benchmarking scheme of Orthogonal Frequency Division Multiplexing (OFDM), multi-user BS-side DAM achieves higher spectral efficiency and lower Peak-to-Average Power Ratio (PAPR).</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 11-24"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development 面向可持续智慧城市发展的安全雾-雾协同卸载框架
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2024-12-31 DOI: 10.1016/j.dcan.2024.12.008
Subhranshu Sekhar Tripathy , Sujit Bebortta , Mazin Abed Mohammed , Muhammet Deveci , Haydar Abdulameer Marhoon , Radek Martinek
Practical applications of smart cities and the Internet of Things (IoT) have multiplied, posing many difficulties in network performance, dependability, and security. Concerns of accessibility, reliability, sustainability, and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems. Fog computing offers a foundation for various applications, including cognitive support, health and social services, intelligent transportation systems, and pervasive computing and communications. Fog computing can help enhance these apps' productivity and lower the end-to-end delay experienced by such time-sensitive applications. In this research, we propose a reliable and secure service delivery strategy at the network edge for smart cities. To improve the availability and dependability, along with the security of smart city applications, the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system. Simulation findings suggest a reduction of 40.3% in the delay incurred by each service request for highly dense areas and 60.6% for moderately dense environments. Furthermore, the system has low false-negative rates and high detection and accuracy rates, decreasing service requests 2%.
智慧城市和物联网的实际应用成倍增长,在网络性能、可靠性、安全性等方面面临诸多难题。由于智慧城市和物联网系统的分散性,对可访问性、可靠性、可持续性和安全性的担忧也相应出现。雾计算为各种应用提供了基础,包括认知支持、健康和社会服务、智能交通系统以及普适计算和通信。雾计算可以帮助提高这些应用程序的生产力,并降低这些对时间敏感的应用程序所经历的端到端延迟。在这项研究中,我们提出了一种可靠和安全的智能城市网络边缘服务交付策略。为了提高可用性和可靠性,以及智慧城市应用的安全性,该方法采用了一种组合方法,在入侵检测系统的帮助下,将分布式雾服务器和雾服务器结合在一起。模拟结果表明,对于高密度区域,每个服务请求的延迟减少了40.3%,对于中等密度环境,延迟减少了60.6%。此外,系统具有低假阴性率和高检测准确率,减少了2%的服务请求。
{"title":"A secure mist-fog-assisted cooperative offloading framework for sustainable smart city development","authors":"Subhranshu Sekhar Tripathy ,&nbsp;Sujit Bebortta ,&nbsp;Mazin Abed Mohammed ,&nbsp;Muhammet Deveci ,&nbsp;Haydar Abdulameer Marhoon ,&nbsp;Radek Martinek","doi":"10.1016/j.dcan.2024.12.008","DOIUrl":"10.1016/j.dcan.2024.12.008","url":null,"abstract":"<div><div>Practical applications of smart cities and the Internet of Things (IoT) have multiplied, posing many difficulties in network performance, dependability, and security. Concerns of accessibility, reliability, sustainability, and security too have arisen correspondingly because of the decentralized character of the smart city and IoT systems. Fog computing offers a foundation for various applications, including cognitive support, health and social services, intelligent transportation systems, and pervasive computing and communications. Fog computing can help enhance these apps' productivity and lower the end-to-end delay experienced by such time-sensitive applications. In this research, we propose a reliable and secure service delivery strategy at the network edge for smart cities. To improve the availability and dependability, along with the security of smart city applications, the approach employs a combined method uniting distributed fog servers in addition to mist servers with the help of an intrusion detection system. Simulation findings suggest a reduction of 40.3% in the delay incurred by each service request for highly dense areas and 60.6% for moderately dense environments. Furthermore, the system has low false-negative rates and high detection and accuracy rates, decreasing service requests 2%.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 165-179"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146189433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous resource allocation with latency guarantee for computing power network 基于时延保证的计算能力网络异构资源分配
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2025-03-31 DOI: 10.1016/j.dcan.2025.03.011
Ailing Zhong , Dapeng Wu , Boran Yang , Ruyan Wang
Computing Power Network (CPN) is a new paradigm that integrates communication, computing, and storage resources to provide services for tasks. However, tasks composed of non-independent subtasks have a preference for the resources required at each stage, which increases the difficulty of heterogeneous resource allocation and reduces the latency performance of CPN services. Motivated by this, this paper jointly optimizes the full-service cycle of tasks, including transmission, task partitioning, and offloading. First, the transmission bandwidth is dynamically configured based on delay sensitivity of tasks. Second, with the real-time information from edge resource clusters and state resource clusters in the network, the optimal partitioning for a computation task is derived. Third, personalized resource allocation schemes are customized for computation and storage tasks respectively. Finally, the impact of resource parameter configuration on the latency violation probability of CPN is revealed. Moreover, compared with the benchmark schemes, our proposed scheme reduces the network latency violation probability by up to 1.17 × in the same network setting.
CPN (Computing Power Network)是一种集成通信、计算和存储资源,为任务提供服务的新范式。然而,由非独立子任务组成的任务对每个阶段所需的资源具有优先性,这增加了异构资源分配的难度,降低了CPN服务的延迟性能。基于此,本文对任务的全服务周期进行了优化,包括传输、任务分区和卸载。首先,根据任务的延迟敏感性动态配置传输带宽。其次,利用网络中边缘资源集群和状态资源集群的实时信息,推导出计算任务的最优划分;第三,分别针对计算任务和存储任务定制个性化的资源分配方案。最后,揭示了资源参数配置对CPN延迟违反概率的影响。此外,与基准方案相比,在相同的网络设置下,我们提出的方案将网络延迟违反概率降低了1.17倍。
{"title":"Heterogeneous resource allocation with latency guarantee for computing power network","authors":"Ailing Zhong ,&nbsp;Dapeng Wu ,&nbsp;Boran Yang ,&nbsp;Ruyan Wang","doi":"10.1016/j.dcan.2025.03.011","DOIUrl":"10.1016/j.dcan.2025.03.011","url":null,"abstract":"<div><div>Computing Power Network (CPN) is a new paradigm that integrates communication, computing, and storage resources to provide services for tasks. However, tasks composed of non-independent subtasks have a preference for the resources required at each stage, which increases the difficulty of heterogeneous resource allocation and reduces the latency performance of CPN services. Motivated by this, this paper jointly optimizes the full-service cycle of tasks, including transmission, task partitioning, and offloading. First, the transmission bandwidth is dynamically configured based on delay sensitivity of tasks. Second, with the real-time information from edge resource clusters and state resource clusters in the network, the optimal partitioning for a computation task is derived. Third, personalized resource allocation schemes are customized for computation and storage tasks respectively. Finally, the impact of resource parameter configuration on the latency violation probability of CPN is revealed. Moreover, compared with the benchmark schemes, our proposed scheme reduces the network latency violation probability by up to 1.17 × in the same network setting.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 25-37"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
V-track: Blockchain-enabled IoT system for reliable vehicle location verification V-track:支持区块链的物联网系统,用于可靠的车辆位置验证
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2024-08-08 DOI: 10.1016/j.dcan.2024.08.004
Mritunjay Shall Peelam, Kunjan Shah, Vinay Chamola
Location-Based Services (LBS) have greatly improved efficiency and functionality in various domains, but privacy and security concerns remain due to the centralized nature of many existing systems. To address these issues, this paper introduces the V-Track system, a decentralized architecture using blockchain technology for reliable vehicle location verification. By integrating GPS devices (SparkFun GPS NEO-M9), IoT-enabled sensors, and a Cosmos blockchain-based ledger (network of interconnected blockchains), V-Track aims to solve centralized LBS problems. Through rigorous simulation experiments, this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy. This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems, enhancing reliability and trustworthiness through blockchain integration, improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy, and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology. These advancements hold promise for applications across multiple sectors, including logistics, supply chain management, urban planning, and emerging fields such as autonomous vehicles and augmented reality.
基于位置的服务(LBS)在各个领域极大地提高了效率和功能,但是由于许多现有系统的集中化特性,隐私和安全问题仍然存在。为了解决这些问题,本文引入了V-Track系统,这是一种使用区块链技术进行可靠车辆位置验证的分散架构。通过集成GPS设备(SparkFun GPS NEO-M9)、支持物联网的传感器和基于Cosmos区块链的分类账(相互连接的区块链网络),V-Track旨在解决集中式LBS问题。通过严格的仿真实验,本文评估了V-Track系统的性能和安全性,并展示了其在保护用户隐私的同时提供可靠位置验证的潜力。本文提出了V-Track作为集中式LBS隐私和安全问题的分散解决方案,通过区块链集成提高可靠性和可信度,改进GPS设备和物联网传感器的跟踪机制以提高准确性,并通过其分散设计和使用区块链技术提供集中式LBS的隐私保护替代方案。这些进步有望应用于多个领域,包括物流、供应链管理、城市规划以及自动驾驶汽车和增强现实等新兴领域。
{"title":"V-track: Blockchain-enabled IoT system for reliable vehicle location verification","authors":"Mritunjay Shall Peelam,&nbsp;Kunjan Shah,&nbsp;Vinay Chamola","doi":"10.1016/j.dcan.2024.08.004","DOIUrl":"10.1016/j.dcan.2024.08.004","url":null,"abstract":"<div><div>Location-Based Services (LBS) have greatly improved efficiency and functionality in various domains, but privacy and security concerns remain due to the centralized nature of many existing systems. To address these issues, this paper introduces the V-Track system, a decentralized architecture using blockchain technology for reliable vehicle location verification. By integrating GPS devices (SparkFun GPS NEO-M9), IoT-enabled sensors, and a Cosmos blockchain-based ledger (network of interconnected blockchains), V-Track aims to solve centralized LBS problems. Through rigorous simulation experiments, this paper evaluates the performance and security of the V-Track system and demonstrates its potential to provide reliable location verification while preserving user privacy. This paper makes significant contributions by presenting V-Track as a decentralized solution to centralized LBS privacy and security problems, enhancing reliability and trustworthiness through blockchain integration, improving tracking mechanisms with GPS devices and IoT sensors for improved accuracy, and providing a privacy-preserving alternative to centralized LBS through its decentralized design and use of blockchain technology. These advancements hold promise for applications across multiple sectors, including logistics, supply chain management, urban planning, and emerging fields such as autonomous vehicles and augmented reality.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 119-133"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secformer: Privacy-preserving atomic-level componentized transformer-like model with MPC Secformer:具有MPC的保护隐私的原子级组件化变压器模型
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2025-04-29 DOI: 10.1016/j.dcan.2025.04.009
Chi Zhang , Tao Shen , Fenhua Bai , Kai Zeng , Xiaohui Zhang , Bin Cao
The global surge in Artificial Intelligence (AI) has been triggered by the impressive performance of deep-learning models based on the Transformer architecture. However, the efficacy of such models is increasingly dependent on the volume and quality of data. Data are often distributed across institutions and companies, making cross-organizational data transfer vulnerable to privacy breaches and subject to privacy laws and trade secret regulations. These privacy and security concerns continue to pose major challenges to collaborative training and inference in multi-source data environments. These challenges are particularly significant for Transformer models, where the complex internal encryption computations drastically reduce computational efficiency, ultimately threatening the model's practical applicability. We hence introduce Secformer, an innovative architecture specifically designed to protect the privacy of Transformer-like models. Secformer separates the encoder and decoder modules, enabling the decomposition of computation flows in Transformer-like models and their efficient mapping to Multi-Party Computation (MPC) protocols. This design effectively addresses privacy leakage issues during the collaborative computation process of Transformer models. To prevent performance degradation caused by encrypted attention modules, we propose a modular design strategy that optimizes high-level components by reconstructing low-level operators. We further analyze the security of Secformer's core components, presenting security definitions and formal proofs. We construct a library of fundamental operators and core modules using atomic-level component designs as the basic building blocks for encoders and decoders. Moreover, these components can serve as foundational operators for other Transformer-like models. Extensive experimental evaluations demonstrate Secformer's excellent performance while preserving privacy and offering universal adaptability for Transformer-like models.
基于Transformer架构的深度学习模型令人印象深刻的表现引发了人工智能(AI)的全球激增。然而,这些模型的有效性越来越依赖于数据的数量和质量。数据通常分布在机构和公司之间,这使得跨组织的数据传输容易受到隐私泄露的影响,并受到隐私法和商业秘密法规的约束。这些隐私和安全问题继续给多源数据环境中的协作训练和推理带来重大挑战。这些挑战对于Transformer模型来说尤其重要,其中复杂的内部加密计算大大降低了计算效率,最终威胁到模型的实际适用性。因此,我们介绍Secformer,一种创新的架构,专门用于保护类似变形金刚的模型的隐私。Secformer将编码器和解码器模块分开,使计算流在类似transformer的模型中分解,并有效地映射到多方计算(MPC)协议。该设计有效地解决了Transformer模型协同计算过程中的隐私泄露问题。为了防止加密注意力模块导致的性能下降,我们提出了一种模块化设计策略,通过重构低级操作符来优化高级组件。我们进一步分析了Secformer核心组件的安全性,给出了安全定义和形式化证明。我们构建了一个基本运算符和核心模块库,使用原子级组件设计作为编码器和解码器的基本构建块。此外,这些组件可以作为其他类似transformer的模型的基础操作符。广泛的实验评估证明了Secformer的卓越性能,同时保护了隐私,并为类似transformer的模型提供了普遍的适应性。
{"title":"Secformer: Privacy-preserving atomic-level componentized transformer-like model with MPC","authors":"Chi Zhang ,&nbsp;Tao Shen ,&nbsp;Fenhua Bai ,&nbsp;Kai Zeng ,&nbsp;Xiaohui Zhang ,&nbsp;Bin Cao","doi":"10.1016/j.dcan.2025.04.009","DOIUrl":"10.1016/j.dcan.2025.04.009","url":null,"abstract":"<div><div>The global surge in Artificial Intelligence (AI) has been triggered by the impressive performance of deep-learning models based on the Transformer architecture. However, the efficacy of such models is increasingly dependent on the volume and quality of data. Data are often distributed across institutions and companies, making cross-organizational data transfer vulnerable to privacy breaches and subject to privacy laws and trade secret regulations. These privacy and security concerns continue to pose major challenges to collaborative training and inference in multi-source data environments. These challenges are particularly significant for Transformer models, where the complex internal encryption computations drastically reduce computational efficiency, ultimately threatening the model's practical applicability. We hence introduce Secformer, an innovative architecture specifically designed to protect the privacy of Transformer-like models. Secformer separates the encoder and decoder modules, enabling the decomposition of computation flows in Transformer-like models and their efficient mapping to Multi-Party Computation (MPC) protocols. This design effectively addresses privacy leakage issues during the collaborative computation process of Transformer models. To prevent performance degradation caused by encrypted attention modules, we propose a modular design strategy that optimizes high-level components by reconstructing low-level operators. We further analyze the security of Secformer's core components, presenting security definitions and formal proofs. We construct a library of fundamental operators and core modules using atomic-level component designs as the basic building blocks for encoders and decoders. Moreover, these components can serve as foundational operators for other Transformer-like models. Extensive experimental evaluations demonstrate Secformer's excellent performance while preserving privacy and offering universal adaptability for Transformer-like models.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 86-100"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Transportation Systems: A Critical Review of Integration of Cyber-Physical Systems (CPS) and Industry 4.0 智能交通系统:对信息物理系统(CPS)和工业4.0集成的批判性回顾
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2025-07-02 DOI: 10.1016/j.dcan.2025.06.014
Muhammad Muzamil Aslam , Wasswa Shafik , Ahmad Fathan Hidayatullah , Kassim Kalinaki , Haji Gul , Rufai Yusuf Zakari , Ali Tufail
The concept of Cyber-Physical Systems (CPS) enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure, facilitating seamless data acquisition and transfer. This review examines the convergence of CPS and Industry 4.0 in the smart transportation sector, highlighting their transformative impact on Intelligent Transportation Systems (ITS) operations. It explores the integration of Industry 4.0 and CPS technologies in intelligent transportation, highlighting their roles in enhancing efficiency, safety, and sustainability. A systematic framework is proposed for developing, implementing, and managing these technologies in the transportation industry. Moreover, the review discusses frequent obstacles during technology integration in transportation and presents future research trends and innovations in intelligent transportation operations post-Industry 4.0 and CPS integration. Lastly, it emphasizes the critical need for standardized protocols and encryption methodologies to enhance the security of communication and data exchange among CPS components in transportation infrastructure.
信息物理系统(CPS)的概念能够创建一个复杂的网络,其中包括集成到车辆和基础设施中的传感器,促进无缝数据采集和传输。本综述探讨了CPS和工业4.0在智能交通领域的融合,强调了它们对智能交通系统(ITS)运营的变革性影响。它探讨了工业4.0和CPS技术在智能交通中的整合,强调了它们在提高效率、安全性和可持续性方面的作用。提出了一个系统的框架来开发、实施和管理运输行业的这些技术。此外,本文还讨论了交通运输技术集成过程中常见的障碍,并提出了后工业4.0和CPS集成时代智能交通运营的未来研究趋势和创新。最后,它强调了标准化协议和加密方法的迫切需要,以增强交通基础设施中CPS组件之间通信和数据交换的安全性。
{"title":"Intelligent Transportation Systems: A Critical Review of Integration of Cyber-Physical Systems (CPS) and Industry 4.0","authors":"Muhammad Muzamil Aslam ,&nbsp;Wasswa Shafik ,&nbsp;Ahmad Fathan Hidayatullah ,&nbsp;Kassim Kalinaki ,&nbsp;Haji Gul ,&nbsp;Rufai Yusuf Zakari ,&nbsp;Ali Tufail","doi":"10.1016/j.dcan.2025.06.014","DOIUrl":"10.1016/j.dcan.2025.06.014","url":null,"abstract":"<div><div>The concept of Cyber-Physical Systems (CPS) enables the creation of a complex network that includes sensors integrated into vehicles and infrastructure, facilitating seamless data acquisition and transfer. This review examines the convergence of CPS and Industry 4.0 in the smart transportation sector, highlighting their transformative impact on Intelligent Transportation Systems (ITS) operations. It explores the integration of Industry 4.0 and CPS technologies in intelligent transportation, highlighting their roles in enhancing efficiency, safety, and sustainability. A systematic framework is proposed for developing, implementing, and managing these technologies in the transportation industry. Moreover, the review discusses frequent obstacles during technology integration in transportation and presents future research trends and innovations in intelligent transportation operations post-Industry 4.0 and CPS integration. Lastly, it emphasizes the critical need for standardized protocols and encryption methodologies to enhance the security of communication and data exchange among CPS components in transportation infrastructure.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 143-164"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146079576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks 通过比较时空路径网络测量预定智能交通系统的新型偏差
IF 7.5 2区 计算机科学 Q1 TELECOMMUNICATIONS Pub Date : 2026-01-01 Epub Date: 2024-04-15 DOI: 10.1016/j.dcan.2024.04.002
Daozhong Feng , Jiajian Lai , Wenxuan Wei , Bin Hao
Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status. However, the presentation of the data lacks structural information. Existing single-network description technologies are ineffective in representing the temporal and spatial characteristics simultaneously. Therefore, there is a need for complementary methods to address these deficiencies. To address these limitations, this paper proposes an approach that combines Network Snapshots and Temporal Paths for the scheduled system. A dual information network is constructed to assess the degree of operational deviation considering the planning tasks. To validate the effectiveness, discussions are conducted through a modified cosine similarity calculation on theoretical analysis, delay level description, and the ability to identify abnormal dates. Compared to some state-of-the-art methods, the proposed method achieves an average Spearman delay correlation of 0.847 and a relative distance of 3.477. Furthermore, case analyses are invested in regions of China's Mainland, Europe, and the United States, investigating both the overall and sub-regional network fluctuations. To represent the impact of network fluctuations in sub-regions, a response loss value was developed. The times that are prone to fluctuations are also discussed through the classification of time series data. The research can offer a novel approach to system monitoring, providing a research direction that utilizes individual data combined to represent macroscopic states. Our code will be released at https://github.com/daozhong/STPN.git.
交通管理人员可以使用智能交通系统技术访问大量数据来监控网络状态。然而,数据的表示缺乏结构信息。现有的单网络描述技术无法同时表示时空特征。因此,需要补充方法来解决这些不足。为了解决这些限制,本文提出了一种将网络快照和时序路径相结合的方法。在考虑规划任务的情况下,构建了双信息网络来评估操作偏差程度。为了验证其有效性,通过改进余弦相似度计算对理论分析、延迟级别描述和异常日期识别能力进行了讨论。与现有方法相比,本文方法的平均Spearman延迟相关系数为0.847,相对距离为3.477。此外,在中国大陆、欧洲和美国地区进行了案例分析,调查了整体和次区域网络波动。为了表示分区域网络波动的影响,制定了响应损失值。通过对时间序列数据的分类,讨论了易发生波动的时间。该研究为系统监测提供了一种新的方法,提供了利用个体数据组合来表示宏观状态的研究方向。我们的代码将在https://github.com/daozhong/STPN.git上发布。
{"title":"A novel deviation measurement for scheduled intelligent transportation system via comparative spatial-temporal path networks","authors":"Daozhong Feng ,&nbsp;Jiajian Lai ,&nbsp;Wenxuan Wei ,&nbsp;Bin Hao","doi":"10.1016/j.dcan.2024.04.002","DOIUrl":"10.1016/j.dcan.2024.04.002","url":null,"abstract":"<div><div>Transit managers can use Intelligent Transportation System technologies to access large amounts of data to monitor network status. However, the presentation of the data lacks structural information. Existing single-network description technologies are ineffective in representing the temporal and spatial characteristics simultaneously. Therefore, there is a need for complementary methods to address these deficiencies. To address these limitations, this paper proposes an approach that combines Network Snapshots and Temporal Paths for the scheduled system. A dual information network is constructed to assess the degree of operational deviation considering the planning tasks. To validate the effectiveness, discussions are conducted through a modified cosine similarity calculation on theoretical analysis, delay level description, and the ability to identify abnormal dates. Compared to some state-of-the-art methods, the proposed method achieves an average Spearman delay correlation of 0.847 and a relative distance of 3.477. Furthermore, case analyses are invested in regions of China's Mainland, Europe, and the United States, investigating both the overall and sub-regional network fluctuations. To represent the impact of network fluctuations in sub-regions, a response loss value was developed. The times that are prone to fluctuations are also discussed through the classification of time series data. The research can offer a novel approach to system monitoring, providing a research direction that utilizes individual data combined to represent macroscopic states. Our code will be released at <span><span>https://github.com/daozhong/STPN.git</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48631,"journal":{"name":"Digital Communications and Networks","volume":"12 1","pages":"Pages 101-118"},"PeriodicalIF":7.5,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140757321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Digital Communications and Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1