首页 > 最新文献

Annals of Telecommunications最新文献

英文 中文
Towards programmable IoT with ActiveNDN 利用ActiveNDN实现可编程物联网
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-07-04 DOI: 10.1007/s12243-023-00954-x
Preechai Mekbungwan, Adisorn Lertsinsrubtavee, Sukumal Kitisin, Giovanni Pau, Kanchana Kanchanasut

We propose to perform robust distributed computation, such as analysing and filtering raw data in real time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. To enable this computation, we deploy a named data network (NDN) for IoT applications, which allows data to be referenced by names. The novelty of our work lies in the inclusion of computation functions in each NDN router and allowing functions to be treated as executable Data objects. Function call is expressed as part of the NDN Interest names with proper name prefixes for NDN routing. With the results of the function computation returned as NDN Data packets, a normal NDN is converted to an ActiveNDN node. Distributed function executions can be orchestrated by an ActiveNDN program to perform required computations in the network. In this paper, we describe the design of ActiveNDN with a small prototype network as a proof of concept. We conduct extensive simulation experiments to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. Two programmable IoT air quality monitoring applications on our real-world ActiveNDN testbed are described, demonstrating that programmable IoT devices with on-site execution are capable of handling increasingly complex and time-sensitive IoT scenarios.

我们建议在具有间歇性互联网连接和资源受限的可计算物联网节点的环境中,尽可能靠近传感器执行鲁棒的分布式计算,例如实时分析和过滤原始数据。为了实现这种计算,我们为物联网应用部署了一个命名数据网络(NDN),它允许按名称引用数据。我们工作的新颖之处在于在每个NDN路由器中包含计算函数,并允许将函数视为可执行的数据对象。函数调用表示为NDN兴趣名称的一部分,具有用于NDN路由的专有名称前缀。函数计算的结果以NDN数据包的形式返回,将正常的NDN转换为ActiveNDN节点。分布式函数执行可以由ActiveNDN程序编排,以在网络中执行所需的计算。在本文中,我们用一个小型原型网络描述了ActiveNDN的设计,作为概念验证。我们进行了大量的仿真实验来研究ActiveNDN在大规模无线物联网网络中的性能和有效性。描述了我们在真实世界ActiveNDN测试平台上的两个可编程物联网空气质量监测应用程序,证明具有现场执行的可编程物联网设备能够处理日益复杂和时间敏感的物联网场景。
{"title":"Towards programmable IoT with ActiveNDN","authors":"Preechai Mekbungwan,&nbsp;Adisorn Lertsinsrubtavee,&nbsp;Sukumal Kitisin,&nbsp;Giovanni Pau,&nbsp;Kanchana Kanchanasut","doi":"10.1007/s12243-023-00954-x","DOIUrl":"10.1007/s12243-023-00954-x","url":null,"abstract":"<div><p>We propose to perform robust distributed computation, such as analysing and filtering raw data in real time, as close as possible to sensors in an environment with intermittent Internet connectivity and resource-constrained computable IoT nodes. To enable this computation, we deploy a named data network (NDN) for IoT applications, which allows data to be referenced by names. The novelty of our work lies in the inclusion of computation functions in each NDN router and allowing functions to be treated as executable Data objects. Function call is expressed as part of the NDN Interest names with proper name prefixes for NDN routing. With the results of the function computation returned as NDN Data packets, a normal NDN is converted to an ActiveNDN node. Distributed function executions can be orchestrated by an ActiveNDN program to perform required computations in the network. In this paper, we describe the design of ActiveNDN with a small prototype network as a proof of concept. We conduct extensive simulation experiments to investigate the performance and effectiveness of ActiveNDN in large-scale wireless IoT networks. Two programmable IoT air quality monitoring applications on our real-world ActiveNDN testbed are described, demonstrating that programmable IoT devices with on-site execution are capable of handling increasingly complex and time-sensitive IoT scenarios.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 11-12","pages":"667 - 684"},"PeriodicalIF":1.9,"publicationDate":"2023-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85671563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity 多连通毫米波网络中高效节能资源分配的深度展开
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-07-01 DOI: 10.1007/s12243-023-00970-x
Pan Chongrui, Yu Guanding

In millimeter-wave (mmWave) communications, multi-connectivity can enhance the communication capacity while at the cost of increased power consumption. In this paper, we investigate a deep-unfolding-based approach for joint user association and power allocation to maximize the energy efficiency of mmWave networks with multi-connectivity. The problem is formulated as a mixed integer nonlinear fractional optimization problem. First, we develop a three-stage iterative algorithm to achieve an upper bound of the original problem. Then, we unfold the iterative algorithm with a convolutional neural network (CNN)-based accelerator and trainable parameters. Moreover, we propose a CNN-aided greedy algorithm to obtain a feasible solution. The simulation results show that the proposed algorithm can achieve good performance and strong robustness but with much reduced computational complexity.

在毫米波(mmWave)通信中,多连接可以增强通信容量,同时以增加功耗为代价。在本文中,我们研究了一种基于深度展开的联合用户关联和功率分配方法,以最大限度地提高具有多连通性的毫米波网络的能量效率。该问题被表述为一个混合整数非线性分式优化问题。首先,我们开发了一个三阶段迭代算法来实现原始问题的上界。然后,我们用基于卷积神经网络(CNN)的加速器和可训练参数展开迭代算法。此外,我们还提出了一种CNN辅助的贪婪算法来获得可行的解。仿真结果表明,该算法具有良好的性能和较强的鲁棒性,但计算复杂度大大降低。
{"title":"Deep unfolding for energy-efficient resource allocation in mmWave networks with multi-connectivity","authors":"Pan Chongrui,&nbsp;Yu Guanding","doi":"10.1007/s12243-023-00970-x","DOIUrl":"10.1007/s12243-023-00970-x","url":null,"abstract":"<div><p>In millimeter-wave (mmWave) communications, multi-connectivity can enhance the communication capacity while at the cost of increased power consumption. In this paper, we investigate a deep-unfolding-based approach for joint user association and power allocation to maximize the energy efficiency of mmWave networks with multi-connectivity. The problem is formulated as a mixed integer nonlinear fractional optimization problem. First, we develop a three-stage iterative algorithm to achieve an upper bound of the original problem. Then, we unfold the iterative algorithm with a convolutional neural network (CNN)-based accelerator and trainable parameters. Moreover, we propose a CNN-aided greedy algorithm to obtain a feasible solution. The simulation results show that the proposed algorithm can achieve good performance and strong robustness but with much reduced computational complexity.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"627 - 639"},"PeriodicalIF":1.9,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50432228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy preserving machine unlearning for smart cities 为智慧城市提供保护隐私的机器非学习技术
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-29 DOI: 10.1007/s12243-023-00960-z
Kongyang Chen, Yao Huang, Yiwen Wang, Xiaoxue Zhang, Bing Mi, Yu Wang

Due to emerging concerns about public and private privacy issues in smart cities, many countries and organizations are establishing laws and regulations (e.g., GPDR) to protect the data security. One of the most important items is the so-called The Right to be Forgotten, which means that these data should be forgotten by all inappropriate use. To truly forget these data, they should be deleted from all databases that cover them, and also be removed from all machine learning models that are trained on them. The second one is called machine unlearning. One naive method for machine unlearning is to retrain a new model after data removal. However, in the current big data era, this will take a very long time. In this paper, we borrow the idea of Generative Adversarial Network (GAN), and propose a fast machine unlearning method that unlearns data in an adversarial way. Experimental results show that our method produces significant improvement in terms of the forgotten performance, model accuracy, and time cost.

由于人们开始关注智慧城市中的公共和私人隐私问题,许多国家和组织都在制定法律法规(如 GPDR)以保护数据安全。其中最重要的一条就是所谓的 "被遗忘权",即所有不恰当使用的数据都应被遗忘。要想真正遗忘这些数据,应将其从涵盖这些数据的所有数据库中删除,同时也应将其从对其进行训练的所有机器学习模型中删除。第二种方法被称为机器解除学习(machine un-learning)。机器解除学习的一种简单方法是在删除数据后重新训练一个新模型。然而,在当前的大数据时代,这需要花费很长的时间。在本文中,我们借鉴了生成对抗网络(GAN)的思想,提出了一种以对抗方式解除数据学习的快速机器解除学习方法。实验结果表明,我们的方法在被遗忘性能、模型准确性和时间成本方面都有显著改善。
{"title":"Privacy preserving machine unlearning for smart cities","authors":"Kongyang Chen,&nbsp;Yao Huang,&nbsp;Yiwen Wang,&nbsp;Xiaoxue Zhang,&nbsp;Bing Mi,&nbsp;Yu Wang","doi":"10.1007/s12243-023-00960-z","DOIUrl":"10.1007/s12243-023-00960-z","url":null,"abstract":"<div><p>Due to emerging concerns about public and private privacy issues in smart cities, many countries and organizations are establishing laws and regulations (e.g., GPDR) to protect the data security. One of the most important items is the so-called <i>The Right to be Forgotten</i>, which means that these data should be forgotten by all inappropriate use. To truly forget these data, they should be deleted from all databases that cover them, and also be removed from all machine learning models that are trained on them. The second one is called <i>machine unlearning</i>. One naive method for machine unlearning is to retrain a new model after data removal. However, in the current big data era, this will take a very long time. In this paper, we borrow the idea of Generative Adversarial Network (GAN), and propose a fast machine unlearning method that unlearns data in an adversarial way. Experimental results show that our method produces significant improvement in terms of the forgotten performance, model accuracy, and time cost.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 1-2","pages":"61 - 72"},"PeriodicalIF":1.8,"publicationDate":"2023-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76305969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living 环境辅助生活中老年人依赖性进化的早期预测隐马尔可夫模型
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-23 DOI: 10.1007/s12243-023-00964-9
Rim Jouini, Chiraz Houaidia, Leila Azouz Saidane

The integration of information and communication technologies (ICT) can be of great utility in monitoring and evaluating the elderly’s health condition and its behavior in performing Activities of Daily Living (ADL) in the perspective to avoid, as long as possible, the delays of recourse to health care institutions (e.g., nursing homes and hospitals). In this research, we propose a predictive model for detecting behavioral and health-related changes in a patient who is monitored continuously in an assisted living environment. We focus on keeping track of the dependency level evolution and detecting the loss of autonomy for an elderly person using a Hidden Markov Model based approach. In this predictive process, we were interested in including the correlation between cardiovascular history and hypertension as it is considered the primary risk factor for cardiovascular diseases, stroke, kidney failure and many other diseases. Our simulation was applied to an empirical dataset that concerned 3046 elderly persons monitored over 9 years. The results show that our model accurately evaluates person’s dependency, follows his autonomy evolution over time and thus predicts moments of important changes.

信息和通信技术(ICT)的集成在监测和评估老年人的健康状况及其在日常生活活动中的行为方面非常有用,可以尽可能避免延迟求助于医疗机构(如疗养院和医院)。在这项研究中,我们提出了一个预测模型,用于检测在辅助生活环境中持续监测的患者的行为和健康相关变化。我们专注于跟踪依赖水平的演变,并使用基于隐马尔可夫模型的方法检测老年人的自主性损失。在这个预测过程中,我们感兴趣的是包括心血管病史和高血压之间的相关性,因为高血压被认为是心血管疾病、中风、肾衰竭和许多其他疾病的主要风险因素。我们的模拟应用于一个经验数据集,该数据集涉及9年来监测的3046名老年人。结果表明,我们的模型准确地评估了一个人的依赖性,跟踪了他的自主性随时间的演变,从而预测了重要变化的时刻。
{"title":"Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living","authors":"Rim Jouini,&nbsp;Chiraz Houaidia,&nbsp;Leila Azouz Saidane","doi":"10.1007/s12243-023-00964-9","DOIUrl":"10.1007/s12243-023-00964-9","url":null,"abstract":"<div><p>The integration of information and communication technologies (ICT) can be of great utility in monitoring and evaluating the elderly’s health condition and its behavior in performing Activities of Daily Living (ADL) in the perspective to avoid, as long as possible, the delays of recourse to health care institutions (e.g., nursing homes and hospitals). In this research, we propose a predictive model for detecting behavioral and health-related changes in a patient who is monitored continuously in an assisted living environment. We focus on keeping track of the dependency level evolution and detecting the loss of autonomy for an elderly person using a Hidden Markov Model based approach. In this predictive process, we were interested in including the correlation between cardiovascular history and hypertension as it is considered the primary risk factor for cardiovascular diseases, stroke, kidney failure and many other diseases. Our simulation was applied to an empirical dataset that concerned 3046 elderly persons monitored over 9 years. The results show that our model accurately evaluates person’s dependency, follows his autonomy evolution over time and thus predicts moments of important changes.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"599 - 615"},"PeriodicalIF":1.9,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50507439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework 增强型DASS-CARE 2.0:基于区块链的去中心化FL框架
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-19 DOI: 10.1007/s12243-023-00965-8
Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi

The emergence of the Cognitive Internet of Medical Things (CIoMT) during the COVID-19 pandemic has been transformational. The CIoMT is a rapidly evolving technology that uses artificial intelligence, big data, and the Internet of Things (IoT) to provide personalized patient care. The CIoMT can be used to monitor and track vital signs, such as temperature, blood pressure, and heart rate, thus giving healthcare providers real-time information about a patient’s health. However, in such systems, the problem of privacy during data processing or sharing remains. Therefore, federated learning (FL) plays an important role in the Cognitive Internet of Medical Things (CIoMT) by allowing multiple medical devices to securely collaborate in a distributed and privacy-preserving manner. On the other hand, classical centralized FL models have several limitations, such as single points of failure and malicious servers. This paper presents an enhancement of the existing DASS-CARE 2.0 framework by using a blockchain-based federated learning framework. The proposed solution provides a secure and reliable distributed learning platform for medical data sharing and analytics in a multi-organizational environment. The blockchain-based federated learning framework offrs an innovative solution to overcome the challenges encountered in traditional FL. Furthermore, we provide a comprehensive discussion of the advantages of the proposed framework through a comparative study between our DASS-CARE 2.0 and the traditional centralized FL model while taking the aforementioned security challenges into consideration. Overall, the performance of the proposed framework shows significant advantages compared to traditional methods.

在2019冠状病毒病大流行期间,认知医疗物联网(CIoMT)的出现具有变革性。CIoMT是一项快速发展的技术,它利用人工智能、大数据和物联网(IoT)来提供个性化的患者护理。CIoMT可用于监测和跟踪生命体征,如体温、血压和心率,从而为医疗保健提供者提供有关患者健康状况的实时信息。然而,在这样的系统中,数据处理或共享过程中的隐私问题仍然存在。因此,联邦学习(FL)通过允许多个医疗设备以分布式和隐私保护的方式安全地协作,在认知医疗物联网(CIoMT)中发挥着重要作用。另一方面,经典的集中式FL模型有一些局限性,例如单点故障和恶意服务器。本文通过使用基于区块链的联邦学习框架,对现有的das - care 2.0框架进行了增强。该解决方案为多组织环境下的医疗数据共享和分析提供了一个安全可靠的分布式学习平台。基于区块链的联邦学习框架为克服传统FL中遇到的挑战提供了一种创新的解决方案。此外,我们在考虑上述安全挑战的同时,通过对我们的DASS-CARE 2.0和传统集中式FL模型的比较研究,全面讨论了所提出框架的优势。总体而言,与传统方法相比,所提出的框架的性能显示出显着的优势。
{"title":"Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework","authors":"Meryeme Ayache,&nbsp;Ikram El Asri,&nbsp;Jamal N. Al-Karaki,&nbsp;Mohamed Bellouch,&nbsp;Amjad Gawanmeh,&nbsp;Karim Tazzi","doi":"10.1007/s12243-023-00965-8","DOIUrl":"10.1007/s12243-023-00965-8","url":null,"abstract":"<div><p>The emergence of the Cognitive Internet of Medical Things (CIoMT) during the COVID-19 pandemic has been transformational. The CIoMT is a rapidly evolving technology that uses artificial intelligence, big data, and the Internet of Things (IoT) to provide personalized patient care. The CIoMT can be used to monitor and track vital signs, such as temperature, blood pressure, and heart rate, thus giving healthcare providers real-time information about a patient’s health. However, in such systems, the problem of privacy during data processing or sharing remains. Therefore, federated learning (FL) plays an important role in the Cognitive Internet of Medical Things (CIoMT) by allowing multiple medical devices to securely collaborate in a distributed and privacy-preserving manner. On the other hand, classical centralized FL models have several limitations, such as single points of failure and malicious servers. This paper presents an enhancement of the existing DASS-CARE 2.0 framework by using a blockchain-based federated learning framework. The proposed solution provides a secure and reliable distributed learning platform for medical data sharing and analytics in a multi-organizational environment. The blockchain-based federated learning framework offrs an innovative solution to overcome the challenges encountered in traditional FL. Furthermore, we provide a comprehensive discussion of the advantages of the proposed framework through a comparative study between our DASS-CARE 2.0 and the traditional centralized FL model while taking the aforementioned security challenges into consideration. Overall, the performance of the proposed framework shows significant advantages compared to traditional methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 11-12","pages":"703 - 715"},"PeriodicalIF":1.9,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86594149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards greener digital infrastructures for ICT and vertical markets 为信息通信技术和垂直市场打造更环保的数字基础设施
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-13 DOI: 10.1007/s12243-023-00961-y
Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel

One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO2 reduction since energy consumption and emission of CO2 are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO2. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.

本世纪最重要的挑战之一将是尽可能减少全球数字基础设施的能源消耗,以对我们的二氧化碳减排做出重大贡献,因为能源消耗和二氧化碳排放是直接相关的。因此,在引言(第1部分)之后,在本文的第2部分,我们将描述全球电力生产的现状,信息和通信技术在电力消耗方面的贡献,以及确定可能对环境产生重大影响的关键网络部分。在第3部分中,我们将重点关注数据中心和核心服务,它们代表了造成最大二氧化碳排放的重要网络部分。在第4部分中,我们将讨论访问和聚合部分,它代表了要优化的第二个重要网段。第5部分将侧重于家庭网络和企业。在估计采用所提出的创新所节省的能源之前,第6部分将讨论垂直市场的影响。最后,结论(第7部分)将总结结果,并提出完成分析的观点。
{"title":"Towards greener digital infrastructures for ICT and vertical markets","authors":"Dominique Chiaroni,&nbsp;Raffaele Luca Amalfi,&nbsp;Jos George,&nbsp;Maximilian Riegel","doi":"10.1007/s12243-023-00961-y","DOIUrl":"10.1007/s12243-023-00961-y","url":null,"abstract":"<div><p>One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO<sub>2</sub> reduction since energy consumption and emission of CO<sub>2</sub> are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO<sub>2</sub>. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"255 - 275"},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50477759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust adaptive beamforming algorithm for coherent signals based on virtual array 基于虚拟阵列的相干信号鲁棒自适应波束形成算法
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00966-7
Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba

Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.

针对相干信号模型下波束形成性能下降的问题,提出了一种基于虚拟阵列的自适应波束形成算法。与以往的工作相比,本文创造性地构建了虚拟阵列,使该算法能够在不降低相干能力的情况下,确保较强的相干信号处理和优越的输出性能。该算法首先构造与物理阵列对称的虚拟阵列,形成虚拟天线阵列模型;其次,通过矩阵重构得到全秩协方差矩阵;然后,估计信号的方向矢量和功率;最后,利用估计的参数重构干扰加噪声协方差矩阵(INCM)并计算权重向量。仿真分析验证了算法的优越性和理论分析的有效性。
{"title":"Robust adaptive beamforming algorithm for coherent signals based on virtual array","authors":"Yuxi Du,&nbsp;Weijia Cui,&nbsp;Fengtong Mei,&nbsp;Chunxiao Jian,&nbsp;Bin Ba","doi":"10.1007/s12243-023-00966-7","DOIUrl":"10.1007/s12243-023-00966-7","url":null,"abstract":"<div><p>Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"641 - 651"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50475666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact 特刊简介:5+G网络能耗、能效与环境影响
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-06-12 DOI: 10.1007/s12243-023-00967-6
Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki
{"title":"Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact","authors":"Cédric Ware,&nbsp;Marceau Coupechoux,&nbsp;Ekram Hossain,&nbsp;Carmen Mas-Machuca,&nbsp;Vinod Sharma,&nbsp;Anna Tzanakaki","doi":"10.1007/s12243-023-00967-6","DOIUrl":"10.1007/s12243-023-00967-6","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 5-6","pages":"249 - 251"},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Telephony speech system performance based on the codec effect 基于编解码器效应的电话语音系统性能
IF 1.9 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00968-5
Mohamed Hamidi, Ouissam Zealouk, Hassan Satori

Abstract

This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.

本文是我们对提高网络自动语音识别系统性能的研究所做贡献的一部分。我们通过使用隐马尔可夫模型、高斯混合模型和梅尔频谱系数,以及VoIP G.711-u和GSM编解码器,构建了一个高度可配置的平台。为了确定最大性能的最佳值,通过改变具有13个特征提取系数的隐马尔可夫模型(从3到5)和高斯混合模型(8-16-32)来制备不同的声学模型。此外,我们生成的声学模型通过基于G.711和GSM编解码器的未编码和编码语音数据进行了测试。对于3个HMM、8-16个GMM和G.711编解码器,获得了最佳的参数化性能。
{"title":"Telephony speech system performance based on the codec effect","authors":"Mohamed Hamidi,&nbsp;Ouissam Zealouk,&nbsp;Hassan Satori","doi":"10.1007/s12243-023-00968-5","DOIUrl":"10.1007/s12243-023-00968-5","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"78 9-10","pages":"617 - 625"},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50529706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SHAKE-ESDRL-based energy efficient intrusion detection and hashing system 基于 SHAKE-ESDRL 的高能效入侵检测和散列系统
IF 1.8 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2023-05-31 DOI: 10.1007/s12243-023-00963-w
Geo Francis E, S. Sheeja

Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.

随着无线传感器网络(WSN)及其应用的激增,主动入侵及其安全威胁取得了显著进展,这些威胁干扰了无线传感器网络(WSN)的正常运行。在 WSN 中,这就要求入侵检测系统(IDS)能以更高的检测精度检测出此类攻击。使用基于 SDK-LSHB 的 SHAKE-ESDRL 算法为 IDS 设计一个有效的模型,以提高准确率并减少训练时间和响应时间,是这项工作的目标。首先,对数据集进行重复删除、缺失数据删除和数据传输等处理。从处理过的数据中,通过将提取的属性作为基于熵的广义判别分析(E-GDA)方法的输入,减少了属性的数量。之后,基于 LogSwish 的深度强化学习算法(LS-DRLA)方法利用减少的属性进行入侵检测(ID)。在此过程中,通过使用 SHAKE 256 算法,对属于被攻击类别标签的属性进行哈希处理并存储在哈希表中。接下来,为了用训练有素的 IDS 测试实时数据,需要对 WSN 节点进行初始化。为此,利用超和距离(SD-K-Means)算法,以基于线性缩放的蜜獾优化算法(LS-HBOA)方法选出的簇头(CH)为中心,对传感器节点(SN)进行聚类。最后,利用基于真实世界的数据集对所提出的算法进行评估,并使用统计指标对结果进行比较。
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E,&nbsp;S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":"10.1007/s12243-023-00963-w","url":null,"abstract":"<div><p>Outstanding progress in unsolicited intrusions along with security threats, which interrupt the normal operations of wireless sensor networks (WSNs), have been attracted by the proliferation of WSNs and their applications. In WSNs, this demands an intrusion detection system (IDS), which can detect such attacks with higher detection accuracy. Designing an effective model for IDS using the SDK-LSHB-based SHAKE-ESDRL algorithm to improve accuracy and lessen training time and response time is the goal of this work. At first, duplicate removal, missing data removal, and data transfer are the steps through which the dataset was processed. From the processed data, by providing the extracted attributes as input to the entropy-based generalized discriminant analysis (E-GDA) method, the number of attributes is reduced. After that, the LogSwish-based deep reinforcement learning algorithm (LS-DRLA) method wielded the reduced attributes for intrusion detection (ID). By utilizing the SHAKE 256 algorithm, the attributes that fall into the attacked class label are hashed and stored in the hash table during this process. Next, to test the real-time data with the trained IDS, the WSN nodes are initialized. For this, by utilizing the supremum distance (SD-K-Means) algorithm, the sensor nodes (SNs) are clustered centered on the cluster heads (CHs) selected by the linear scaling-based honey badger optimization algorithm (LS-HBOA) method. At last, utilizing real-world-based datasets, the proposed algorithms are evaluated and the results are compared using statistical metrics.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 5-6","pages":"381 - 396"},"PeriodicalIF":1.8,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72509855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Annals of Telecommunications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1