首页 > 最新文献

Internet Technology Letters最新文献

英文 中文
An integrated waveform design method for underwater acoustic detection and communication 用于水下声探测和通信的综合波形设计方法
Pub Date : 2024-04-08 DOI: 10.1002/itl2.522
Xuerong Cui, Yue Cai, Juan Li, Lei Li, Bin Jiang, Liya Liu
In recent years, the integrated system for underwater detection and communication (ISUDC) has become one of the important research directions. At present, the efficiency of the existing shared signals carrying communication information is low, and the synchronization performance needs to be further improved. So, this paper proposes an integrated waveform design scheme for ISUDC based on the carrier with good detection performance and binary phase shift differential keying (DBPSK). In this scheme, the signal with better underwater detection performance (e.g. Linear Frequency Modulation, LFM) is selected as the carrier, and DBPSK is used as the modulation mode to modulate the communication symbols into the carrier. However, the correlation of the detection signal will be destroyed. Thus, the down‐frequency detection signal (e.g. ngLFM) is superimposed into the signal to form a shared signal (LFM‐DBPSK‐ng, LDN). The detection performance, synchronization performance and communication performance of the shared signal are analyzed by ambiguity function, cross‐correlation and BER, respectively. In addition, according to the proposed scheme, the shared signal HFM‐DBPSK‐ng (HDN) is generated by using HFM as carrier. The comparative simulation experiments are carried out with the existing LFM‐BPSK signals. Experiments show that both LDN and HDN have better performance compared to the other shared signals, which proves the effectiveness of the integrated waveform design scheme for ISUDC proposed in this paper.
近年来,水下探测与通信综合系统(ISUDC)已成为重要的研究方向之一。目前,现有的共享信号承载通信信息的效率较低,同步性能有待进一步提高。因此,本文提出了一种基于具有良好检测性能的载波和二进制相移微分键控(DBPSK)的 ISUDC 集成波形设计方案。在该方案中,选择水下探测性能较好的信号(如线性频率调制,LFM)作为载波,采用 DBPSK 作为调制模式,将通信符号调制到载波中。然而,检测信号的相关性将被破坏。因此,将下频检测信号(如 ngLFM)叠加到信号中,形成共享信号(LFM-DBPSK-ng,LDN)。共享信号的检测性能、同步性能和通信性能分别由模糊函数、交叉相关性和误码率来分析。此外,根据所提出的方案,共享信号 HFM-DBPSK-ng (HDN)是以 HFM 为载波产生的。与现有的 LFM-BPSK 信号进行了比较仿真实验。实验表明,与其他共享信号相比,LDN 和 HDN 都具有更好的性能,这证明了本文提出的 ISUDC 集成波形设计方案的有效性。
{"title":"An integrated waveform design method for underwater acoustic detection and communication","authors":"Xuerong Cui, Yue Cai, Juan Li, Lei Li, Bin Jiang, Liya Liu","doi":"10.1002/itl2.522","DOIUrl":"https://doi.org/10.1002/itl2.522","url":null,"abstract":"In recent years, the integrated system for underwater detection and communication (ISUDC) has become one of the important research directions. At present, the efficiency of the existing shared signals carrying communication information is low, and the synchronization performance needs to be further improved. So, this paper proposes an integrated waveform design scheme for ISUDC based on the carrier with good detection performance and binary phase shift differential keying (DBPSK). In this scheme, the signal with better underwater detection performance (e.g. Linear Frequency Modulation, LFM) is selected as the carrier, and DBPSK is used as the modulation mode to modulate the communication symbols into the carrier. However, the correlation of the detection signal will be destroyed. Thus, the down‐frequency detection signal (e.g. ngLFM) is superimposed into the signal to form a shared signal (LFM‐DBPSK‐ng, LDN). The detection performance, synchronization performance and communication performance of the shared signal are analyzed by ambiguity function, cross‐correlation and BER, respectively. In addition, according to the proposed scheme, the shared signal HFM‐DBPSK‐ng (HDN) is generated by using HFM as carrier. The comparative simulation experiments are carried out with the existing LFM‐BPSK signals. Experiments show that both LDN and HDN have better performance compared to the other shared signals, which proves the effectiveness of the integrated waveform design scheme for ISUDC proposed in this paper.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"31 13","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140732474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing unmanned aerial vehicle technology for environmental monitoring: Future trends, methods, and applications 利用无人飞行器技术进行环境监测:未来趋势、方法和应用
Pub Date : 2024-04-02 DOI: 10.1002/itl2.526
Yunting Li, Xing‐Zhou Li
This paper provides an overview of the application of Unmanned Aerial Vehicles (UAVs) in environmental monitoring, with a focus on air pollution surveillance. Initially, the paper highlights the significance of UAV technology for real‐time air quality monitoring in developing countries and explores the characteristics of fixed‐wing and multirotor UAVs in monitoring air pollutants. It then delves into methods of measuring air pollutants using UAV platforms, including the three‐dimensional distribution of pollutants around roadsides, green belts, and street‐facing communities. The advantages of UAV measurements, such as lower costs, greater flexibility, and the ability to monitor in three dimensions, are emphasized. Finally, the paper discusses future trends in the field of environmental monitoring using UAVs, including technological advancements, evolving regulatory policies, and integration with other technologies like Artificial Intelligence, big data analytics, and 5G communication. These developments suggest an increasingly significant role for UAVs in environmental monitoring, enhancing efficiency, reducing costs, and contributing to public participation and environmental awareness. However, due to the delays in publication and review processes, the most recent studies may not have been included in the literature review, leading to a scenario where the review might not reflect the latest research trends.
本文概述了无人飞行器(UAV)在环境监测中的应用,重点是空气污染监测。本文首先强调了无人飞行器技术对发展中国家实时空气质量监测的重要意义,并探讨了固定翼和多旋翼无人飞行器在监测空气污染物方面的特点。然后深入探讨了利用无人机平台测量空气污染物的方法,包括污染物在路边、绿化带和临街社区周围的三维分布。文中强调了无人机测量的优势,如成本更低、灵活性更大以及能够进行三维监测。最后,本文讨论了使用无人机进行环境监测领域的未来趋势,包括技术进步、不断演变的监管政策以及与人工智能、大数据分析和 5G 通信等其他技术的整合。这些发展表明,无人机在环境监测、提高效率、降低成本以及促进公众参与和提高环境意识方面将发挥越来越重要的作用。然而,由于出版和审查过程的延迟,最新的研究可能未被纳入文献综述,导致综述可能无法反映最新的研究趋势。
{"title":"Utilizing unmanned aerial vehicle technology for environmental monitoring: Future trends, methods, and applications","authors":"Yunting Li, Xing‐Zhou Li","doi":"10.1002/itl2.526","DOIUrl":"https://doi.org/10.1002/itl2.526","url":null,"abstract":"This paper provides an overview of the application of Unmanned Aerial Vehicles (UAVs) in environmental monitoring, with a focus on air pollution surveillance. Initially, the paper highlights the significance of UAV technology for real‐time air quality monitoring in developing countries and explores the characteristics of fixed‐wing and multirotor UAVs in monitoring air pollutants. It then delves into methods of measuring air pollutants using UAV platforms, including the three‐dimensional distribution of pollutants around roadsides, green belts, and street‐facing communities. The advantages of UAV measurements, such as lower costs, greater flexibility, and the ability to monitor in three dimensions, are emphasized. Finally, the paper discusses future trends in the field of environmental monitoring using UAVs, including technological advancements, evolving regulatory policies, and integration with other technologies like Artificial Intelligence, big data analytics, and 5G communication. These developments suggest an increasingly significant role for UAVs in environmental monitoring, enhancing efficiency, reducing costs, and contributing to public participation and environmental awareness. However, due to the delays in publication and review processes, the most recent studies may not have been included in the literature review, leading to a scenario where the review might not reflect the latest research trends.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"172 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news detection in the Hindi language using multi‐modality via transfer and ensemble learning 通过迁移和集合学习使用多模式检测印地语中的假新闻
Pub Date : 2024-04-01 DOI: 10.1002/itl2.523
Sonal Garg, Dilip Kumar Sharma
Fake news classification emerged as an exciting topic for machine learning and artificial intelligence researchers. Most of the existing literature on fake news detection is based on the English language. Hence, it needs more usability. Fake news detection in low‐resource scare languages is still challenging due to the absence of large annotated datasets and tools. In this work, we propose a large‐scale Indian news dataset for the Hindi language. This dataset is constructed by scraping different reliable fact‐checking websites. The LDA approach is adopted to assign the category to news statements. Various machine‐learning and transfer learning approaches are applied to verify the authenticity of the dataset. Ensemble learning is also applied based on the low false‐positive rate of machine‐learning classifiers. A multi‐modal approach is adopted by combining LSTM with VGG‐16 and VGG‐19 classifiers. LSTM is used for textual features, while VGG‐16 and VGG‐19 are applied for image analysis. Our proposed dataset has achieved satisfactory performance.
对于机器学习和人工智能研究人员来说,假新闻分类是一个令人兴奋的话题。关于假新闻检测的现有文献大多基于英语语言。因此,它需要更多的可用性。由于缺乏大型注释数据集和工具,低资源恐慌语言中的假新闻检测仍具有挑战性。在这项工作中,我们提出了一个印地语的大规模印度新闻数据集。该数据集是通过搜索不同的可靠事实核查网站构建的。我们采用 LDA 方法为新闻声明分配类别。应用各种机器学习和迁移学习方法来验证数据集的真实性。基于机器学习分类器的低假阳性率,还应用了集合学习。通过将 LSTM 与 VGG-16 和 VGG-19 分类器相结合,采用了一种多模式方法。LSTM 用于文本特征,而 VGG-16 和 VGG-19 则用于图像分析。我们提出的数据集取得了令人满意的效果。
{"title":"Fake news detection in the Hindi language using multi‐modality via transfer and ensemble learning","authors":"Sonal Garg, Dilip Kumar Sharma","doi":"10.1002/itl2.523","DOIUrl":"https://doi.org/10.1002/itl2.523","url":null,"abstract":"Fake news classification emerged as an exciting topic for machine learning and artificial intelligence researchers. Most of the existing literature on fake news detection is based on the English language. Hence, it needs more usability. Fake news detection in low‐resource scare languages is still challenging due to the absence of large annotated datasets and tools. In this work, we propose a large‐scale Indian news dataset for the Hindi language. This dataset is constructed by scraping different reliable fact‐checking websites. The LDA approach is adopted to assign the category to news statements. Various machine‐learning and transfer learning approaches are applied to verify the authenticity of the dataset. Ensemble learning is also applied based on the low false‐positive rate of machine‐learning classifiers. A multi‐modal approach is adopted by combining LSTM with VGG‐16 and VGG‐19 classifiers. LSTM is used for textual features, while VGG‐16 and VGG‐19 are applied for image analysis. Our proposed dataset has achieved satisfactory performance.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"792 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140782220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BDD efficiency: Survey of BDD edge ordering algorithms in network reliability BDD 效率:网络可靠性中的 BDD 边排序算法调查
Pub Date : 2024-04-01 DOI: 10.1002/itl2.525
Aakash Chauhan, Gourav Verma
Network reliability analysis is vital for ensuring efficient and error‐free communication within networking and communication applications. Binary Decision Diagrams (BDDs) have emerged as a powerful tool for analyzing and optimizing complex network infrastructures. The objective of this research paper is to conduct a comparative analysis of edge‐ordering algorithms for network reliability using BDDs the study aims to evaluate and compare existing algorithms, providing valuable insights for selecting suitable edge‐ordering algorithms that enhance network reliability. The paper concludes that snooker is outperforming among selected algorithms.
网络可靠性分析对于确保网络和通信应用中高效、无差错的通信至关重要。二元判定图(BDD)已成为分析和优化复杂网络基础设施的有力工具。本研究论文的目的是利用 BDD 对网络可靠性的边缘排序算法进行比较分析,旨在评估和比较现有算法,为选择合适的边缘排序算法以提高网络可靠性提供有价值的见解。本文的结论是,在所选算法中,斯诺克的表现更胜一筹。
{"title":"BDD efficiency: Survey of BDD edge ordering algorithms in network reliability","authors":"Aakash Chauhan, Gourav Verma","doi":"10.1002/itl2.525","DOIUrl":"https://doi.org/10.1002/itl2.525","url":null,"abstract":"Network reliability analysis is vital for ensuring efficient and error‐free communication within networking and communication applications. Binary Decision Diagrams (BDDs) have emerged as a powerful tool for analyzing and optimizing complex network infrastructures. The objective of this research paper is to conduct a comparative analysis of edge‐ordering algorithms for network reliability using BDDs the study aims to evaluate and compare existing algorithms, providing valuable insights for selecting suitable edge‐ordering algorithms that enhance network reliability. The paper concludes that snooker is outperforming among selected algorithms.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"149 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140756351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi‐objective prairie dog optimization algorithm for IoT‐based intrusion detection 基于物联网的入侵检测多目标草原犬优化算法
Pub Date : 2024-03-21 DOI: 10.1002/itl2.516
Shubhkirti Sharma, Vijay Kumar, K. Dutta
Detecting unauthorized access, unusual activities, and data is significant for the security of IoT networks as it helps identify malfunctioning, faults, and intrusions. Intrusion detection methods analyze network information to identify potential misuse or intrusion attacks. This research proposes a multi‐objective prairie dog optimization algorithm (MPDA) to improve its ability to deal with feature selection problems. The proposed algorithm is modified by incorporating the concepts of an archive, grid, and non‐dominance. An archive and a grid are used to save intermediate best results and improve the diversity, respectively. The non‐dominance concept is employed to deal with multiple objectives. On the NSL‐KDD, CIC‐IDS2017, and IoTID20 datasets, MPDA achieves fewer features, higher accuracy, and lower false alarm rates. MPDA outperforms simple classifiers and state‐of‐art multiobjective optimization algorithms in intrusion detection.
检测未经授权的访问、异常活动和数据对物联网网络的安全意义重大,因为它有助于识别故障、故障和入侵。入侵检测方法通过分析网络信息来识别潜在的滥用或入侵攻击。本研究提出了一种多目标草原犬优化算法(MPDA),以提高其处理特征选择问题的能力。该算法结合了档案、网格和非优势的概念。档案和网格分别用于保存中间最佳结果和提高多样性。非优势概念用于处理多个目标。在 NSL-KDD、CIC-IDS2017 和 IoTID20 数据集上,MPDA 实现了更少的特征、更高的准确率和更低的误报率。在入侵检测方面,MPDA 的表现优于简单分类器和最先进的多目标优化算法。
{"title":"Multi‐objective prairie dog optimization algorithm for IoT‐based intrusion detection","authors":"Shubhkirti Sharma, Vijay Kumar, K. Dutta","doi":"10.1002/itl2.516","DOIUrl":"https://doi.org/10.1002/itl2.516","url":null,"abstract":"Detecting unauthorized access, unusual activities, and data is significant for the security of IoT networks as it helps identify malfunctioning, faults, and intrusions. Intrusion detection methods analyze network information to identify potential misuse or intrusion attacks. This research proposes a multi‐objective prairie dog optimization algorithm (MPDA) to improve its ability to deal with feature selection problems. The proposed algorithm is modified by incorporating the concepts of an archive, grid, and non‐dominance. An archive and a grid are used to save intermediate best results and improve the diversity, respectively. The non‐dominance concept is employed to deal with multiple objectives. On the NSL‐KDD, CIC‐IDS2017, and IoTID20 datasets, MPDA achieves fewer features, higher accuracy, and lower false alarm rates. MPDA outperforms simple classifiers and state‐of‐art multiobjective optimization algorithms in intrusion detection.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":" 30","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140221334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PAPR reduction using model‐driven hybrid algorithms in the 6G NOMA waveform 在 6G NOMA 波形中使用模型驱动混合算法降低 PAPR
Pub Date : 2024-03-05 DOI: 10.1002/itl2.515
Arun Kumar, Nishant Gaur, Aziz Nanthaamornphong
In the evolving landscape of sixth‐generation (6G) network technologies, Non‐Orthogonal Multiple Access (NOMA) systems are pivotal for achieving enhanced spectral efficiency and network capacity. However, a significant challenge in NOMA systems is the high Peak‐to‐Average Power Ratio (PAPR), which undermines system efficiency by necessitating high‐power amplifiers (HPAs) to operate in their less efficient, non‐linear range. Addressing this, we introduce a novel hybrid approach, the Selective Mapping‐Circular Transformation Method (SLM‐CTM), which ingeniously amalgamates the strengths of Selective Mapping (SLM) and the Circular Transformation Method (CTM) to mitigate PAPR issues. SLM is renowned for its peak power reduction capabilities without adding to system complexity, whereas CTM is valued for its simplicity and controlled signal distortion. The proposed SLM‐CTM strategy employs a blend of linear and nonlinear techniques to effectively lower PAPR in non‐orthogonal NOMA configurations, thereby reducing high‐power peaks while simultaneously enhancing signal quality. This paper delineates the application of the SLM‐CTM algorithm to evaluate critical NOMA parameters such as Power Spectral Density (PSD), Bit Error Rate (BER), and PAPR. Simulation results highlight the efficacy of SLM‐CTM over conventional SLM, demonstrating a significant throughput improvement of 3.2 dB and a PAPR reduction of 4.6 dB, underscoring the potential of SLM‐CTM in elevating the performance of NOMA systems within 6G network.
在不断发展的第六代(6G)网络技术中,非正交多址(NOMA)系统对于实现更高的频谱效率和网络容量至关重要。然而,NOMA 系统面临的一个重大挑战是峰均功率比(PAPR)过高,这使得高功率放大器(HPA)必须在效率较低的非线性范围内工作,从而影响了系统效率。为解决这一问题,我们引入了一种新颖的混合方法,即选择性映射-环形变换法(SLM-CTM),它巧妙地融合了选择性映射(SLM)和环形变换法(CTM)的优势,以缓解 PAPR 问题。SLM 以其在不增加系统复杂性的情况下降低峰值功率的能力而闻名,而 CTM 则以其简单性和可控信号失真而备受推崇。所提出的 SLM-CTM 策略融合了线性和非线性技术,可有效降低非正交 NOMA 配置中的 PAPR,从而在提高信号质量的同时降低高功率峰值。本文阐述了 SLM-CTM 算法在评估功率谱密度 (PSD)、误码率 (BER) 和 PAPR 等关键 NOMA 参数中的应用。仿真结果凸显了 SLM-CTM 相对于传统 SLM 的功效,显示吞吐量显著提高了 3.2 dB,PAPR 降低了 4.6 dB,突出了 SLM-CTM 在提升 6G 网络中 NOMA 系统性能方面的潜力。
{"title":"PAPR reduction using model‐driven hybrid algorithms in the 6G NOMA waveform","authors":"Arun Kumar, Nishant Gaur, Aziz Nanthaamornphong","doi":"10.1002/itl2.515","DOIUrl":"https://doi.org/10.1002/itl2.515","url":null,"abstract":"In the evolving landscape of sixth‐generation (6G) network technologies, Non‐Orthogonal Multiple Access (NOMA) systems are pivotal for achieving enhanced spectral efficiency and network capacity. However, a significant challenge in NOMA systems is the high Peak‐to‐Average Power Ratio (PAPR), which undermines system efficiency by necessitating high‐power amplifiers (HPAs) to operate in their less efficient, non‐linear range. Addressing this, we introduce a novel hybrid approach, the Selective Mapping‐Circular Transformation Method (SLM‐CTM), which ingeniously amalgamates the strengths of Selective Mapping (SLM) and the Circular Transformation Method (CTM) to mitigate PAPR issues. SLM is renowned for its peak power reduction capabilities without adding to system complexity, whereas CTM is valued for its simplicity and controlled signal distortion. The proposed SLM‐CTM strategy employs a blend of linear and nonlinear techniques to effectively lower PAPR in non‐orthogonal NOMA configurations, thereby reducing high‐power peaks while simultaneously enhancing signal quality. This paper delineates the application of the SLM‐CTM algorithm to evaluate critical NOMA parameters such as Power Spectral Density (PSD), Bit Error Rate (BER), and PAPR. Simulation results highlight the efficacy of SLM‐CTM over conventional SLM, demonstrating a significant throughput improvement of 3.2 dB and a PAPR reduction of 4.6 dB, underscoring the potential of SLM‐CTM in elevating the performance of NOMA systems within 6G network.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"34 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140263278","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the physical layer security performance of full‐duplex cooperative NOMA system with multiple eavesdroppers, imperfect SIC and hardware imperfections 关于具有多个窃听器、不完善 SIC 和硬件缺陷的全双工合作 NOMA 系统的物理层安全性能
Pub Date : 2024-03-04 DOI: 10.1002/itl2.513
T. Nimi, A. V. Babu
In this letter, we propose a control jammer‐assisted framework for improving the physical layer security (PLS) of full‐duplex (FD) ‐ cooperative non‐orthogonal multiple access (FD‐CNOMA) network. We derive analytical expressions for the secrecy outage probabilities (SOPs) of the users for the jammer‐assisted and the no‐jammer scenarios, considering multiple non‐colluding eavesdroppers, residual hardware impairments and imperfect successive interference cancellation conditions. It is demonstrated that the proposed jammer‐assisted framework provides significant reduction of the SOPs experienced by the downlink users in FD‐CNOMA network.
在这封信中,我们提出了一种控制干扰器辅助框架,用于改善全双工(FD)- 合作非正交多址(FD-CNOMA)网络的物理层安全性(PLS)。考虑到多个非共谋窃听者、残余硬件损伤和不完美的连续干扰消除条件,我们推导出了有干扰器辅助和无干扰器情况下用户保密性中断概率 (SOP) 的分析表达式。结果表明,在 FD-CNOMA 网络中,所提出的干扰器辅助框架可显著降低下行链路用户的 SOP。
{"title":"On the physical layer security performance of full‐duplex cooperative NOMA system with multiple eavesdroppers, imperfect SIC and hardware imperfections","authors":"T. Nimi, A. V. Babu","doi":"10.1002/itl2.513","DOIUrl":"https://doi.org/10.1002/itl2.513","url":null,"abstract":"In this letter, we propose a control jammer‐assisted framework for improving the physical layer security (PLS) of full‐duplex (FD) ‐ cooperative non‐orthogonal multiple access (FD‐CNOMA) network. We derive analytical expressions for the secrecy outage probabilities (SOPs) of the users for the jammer‐assisted and the no‐jammer scenarios, considering multiple non‐colluding eavesdroppers, residual hardware impairments and imperfect successive interference cancellation conditions. It is demonstrated that the proposed jammer‐assisted framework provides significant reduction of the SOPs experienced by the downlink users in FD‐CNOMA network.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140266736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Channel estimation for underwater acoustic OFDM based on super‐resolution network 基于超分辨率网络的水下声波 OFDM 信道估计
Pub Date : 2024-01-14 DOI: 10.1002/itl2.496
Xuerong Cui, Bin Yuan, Juan Li, Binbin Jiang, Shibao Li, Jianhang Liu
In this letter, we propose a method for underwater acoustic channel estimation that combines image super‐resolution (SR) and is named FCDnNet. FCDnNet consists of two parts: Fast Super Resolution Convolutional Neural Network (FSRCNN) and Complex Denoising Convolutional Neural Network (C‐DnCNN). FSRCNN extracts effective features of pilot channels, uses deconvolution to achieve SR reconstruction, and generates a pre‐estimation channel matrix. C‐DnCNN preserves the relative positions of the real and imaginary parts of the channel, fully utilizing amplitude and phase information, and can more effectively recover the channel matrix from the pre‐estimation matrix. Experimental results show that the normalized mean square error (NMSE) of FCDnNet is at least 13.1–65.2 lower than other channel estimation methods based on deep learning.
在这封信中,我们提出了一种结合图像超分辨率(SR)的水下声道估计方法,并将其命名为 FCDnNet。FCDnNet 由两部分组成:快速超分辨率卷积神经网络(FSRCNN)和复杂去噪卷积神经网络(C-DnCNN)。FSRCNN 提取先导信道的有效特征,使用解卷积实现 SR 重构,并生成预估计信道矩阵。C-DnCNN 保留了信道实部和虚部的相对位置,充分利用了振幅和相位信息,能更有效地从预估计矩阵中恢复信道矩阵。实验结果表明,FCDnNet 的归一化均方误差(NMSE)比其他基于深度学习的信道估计方法至少低 13.1-65.2。
{"title":"Channel estimation for underwater acoustic OFDM based on super‐resolution network","authors":"Xuerong Cui, Bin Yuan, Juan Li, Binbin Jiang, Shibao Li, Jianhang Liu","doi":"10.1002/itl2.496","DOIUrl":"https://doi.org/10.1002/itl2.496","url":null,"abstract":"In this letter, we propose a method for underwater acoustic channel estimation that combines image super‐resolution (SR) and is named FCDnNet. FCDnNet consists of two parts: Fast Super Resolution Convolutional Neural Network (FSRCNN) and Complex Denoising Convolutional Neural Network (C‐DnCNN). FSRCNN extracts effective features of pilot channels, uses deconvolution to achieve SR reconstruction, and generates a pre‐estimation channel matrix. C‐DnCNN preserves the relative positions of the real and imaginary parts of the channel, fully utilizing amplitude and phase information, and can more effectively recover the channel matrix from the pre‐estimation matrix. Experimental results show that the normalized mean square error (NMSE) of FCDnNet is at least 13.1–65.2 lower than other channel estimation methods based on deep learning.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139530592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Protecting health monitoring privacy in fitness training: A federated learning framework based on personalized differential privacy 在健身训练中保护健康监测隐私:基于个性化差异隐私的联合学习框架
Pub Date : 2024-01-07 DOI: 10.1002/itl2.499
Lifang Shao
The rapid advancement of health monitoring technologies has led to increased adoption of fitness training applications that collect and analyze personal health data. This paper presents a personalized differential privacy‐based federated learning (PDP‐FL) algorithm with two stages. Classifying the user's privacy according to their preferences is the first stage in achieving personalized privacy protection with the addition of noise. The privacy preference and the related privacy level are sent to the central aggregation server simultaneously. In the second stage, noise is added that conforms to the global differential privacy threshold based on the privacy level that users uploaded; this allows the global privacy protection level to be quantified while still adhering to the local and central protection strategies simultaneously adopted to realize the complete protection of global data. The results demonstrate the excellent classification accuracy of the proposed PDP‐FL algorithm. The proposed PDP‐FL algorithm addresses the critical issue of health monitoring privacy in fitness training applications. It ensures that sensitive data is handled responsibly and provides users the necessary tools to control their privacy settings. By achieving high classification accuracy while preserving privacy, the framework balances data utility and protection, thus positively impacting health monitoring ecosystem and medical systems.
随着健康监测技术的快速发展,收集和分析个人健康数据的健身训练应用越来越多。本文提出了一种基于差异隐私的个性化联合学习(PDP-FL)算法,分为两个阶段。根据用户的偏好对其隐私进行分类是在增加噪声的情况下实现个性化隐私保护的第一阶段。隐私偏好和相关隐私级别会同时发送到中央聚合服务器。在第二阶段,根据用户上传的隐私级别,添加符合全局差异隐私阈值的噪声;这样既能量化全局隐私保护级别,又能坚持同时采用本地和中央保护策略,实现对全局数据的全面保护。结果表明,所提出的 PDP-FL 算法具有出色的分类准确性。所提出的 PDP-FL 算法解决了健身训练应用中健康监测隐私的关键问题。它确保了敏感数据得到负责任的处理,并为用户提供了控制隐私设置的必要工具。通过在保护隐私的同时实现高分类准确性,该框架在数据实用性和保护之间取得了平衡,从而对健康监测生态系统和医疗系统产生了积极影响。
{"title":"Protecting health monitoring privacy in fitness training: A federated learning framework based on personalized differential privacy","authors":"Lifang Shao","doi":"10.1002/itl2.499","DOIUrl":"https://doi.org/10.1002/itl2.499","url":null,"abstract":"The rapid advancement of health monitoring technologies has led to increased adoption of fitness training applications that collect and analyze personal health data. This paper presents a personalized differential privacy‐based federated learning (PDP‐FL) algorithm with two stages. Classifying the user's privacy according to their preferences is the first stage in achieving personalized privacy protection with the addition of noise. The privacy preference and the related privacy level are sent to the central aggregation server simultaneously. In the second stage, noise is added that conforms to the global differential privacy threshold based on the privacy level that users uploaded; this allows the global privacy protection level to be quantified while still adhering to the local and central protection strategies simultaneously adopted to realize the complete protection of global data. The results demonstrate the excellent classification accuracy of the proposed PDP‐FL algorithm. The proposed PDP‐FL algorithm addresses the critical issue of health monitoring privacy in fitness training applications. It ensures that sensitive data is handled responsibly and provides users the necessary tools to control their privacy settings. By achieving high classification accuracy while preserving privacy, the framework balances data utility and protection, thus positively impacting health monitoring ecosystem and medical systems.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"69 18","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139448941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A fog‐computing architecture for network public opinion monitoring based on intelligent semantic recognition 基于智能语义识别的网络舆情监测雾计算架构
Pub Date : 2023-11-27 DOI: 10.1002/itl2.492
Jing-Zhe Xu
Currently, the online data contains rich user emotional information and public opinion information. These data can provide massive support for network public opinion monitoring and analysis. However, there are two problems in the network public opinion analysis of the online data. On the one hand, a vast amount of online data with discursiveness and concealment are processed in the cloud platforms, which consumes a long time. On the other hand, the massive online public opinion data is disperse and hidden, resulting in the dependence on manual screening for the analysis of public opinion. Therefore, it is still an important challenge to study the efficient and low‐latency extraction of valuable information from network public opinion. In this paper, we proposed a fog computing based framework using the technologies of intelligent semantic recognition and data mining for the analysis of network public opinion. Firstly, we build a fog computing architecture to collect the text data of network public opinion. Then, an efficient network public opinion model is constructed by intelligence semantic recognition. Finally, we achieve the function of public opinion analysis and early warning. The experimental results show that the method proposed in this paper achieves better performance against some existing methods.
目前,网络数据包含丰富的用户情感信息和舆情信息。这些数据可以为网络舆情监测和分析提供大量支持。然而,网络数据的网络舆情分析存在两个问题。一方面,大量具有辨识度和隐蔽性的网络数据需要在云平台上进行处理,耗时较长。另一方面,海量的网络舆情数据具有分散性和隐蔽性,导致舆情分析需要依赖人工筛选。因此,研究如何高效、低延迟地从网络舆情中提取有价值的信息仍是一项重要挑战。本文利用智能语义识别和数据挖掘技术,提出了一种基于雾计算的网络舆情分析框架。首先,我们构建了一个雾计算架构来收集网络舆情文本数据。然后,通过智能语义识别构建高效的网络舆情模型。最后,实现舆情分析与预警功能。实验结果表明,与现有的一些方法相比,本文提出的方法取得了更好的性能。
{"title":"A fog‐computing architecture for network public opinion monitoring based on intelligent semantic recognition","authors":"Jing-Zhe Xu","doi":"10.1002/itl2.492","DOIUrl":"https://doi.org/10.1002/itl2.492","url":null,"abstract":"Currently, the online data contains rich user emotional information and public opinion information. These data can provide massive support for network public opinion monitoring and analysis. However, there are two problems in the network public opinion analysis of the online data. On the one hand, a vast amount of online data with discursiveness and concealment are processed in the cloud platforms, which consumes a long time. On the other hand, the massive online public opinion data is disperse and hidden, resulting in the dependence on manual screening for the analysis of public opinion. Therefore, it is still an important challenge to study the efficient and low‐latency extraction of valuable information from network public opinion. In this paper, we proposed a fog computing based framework using the technologies of intelligent semantic recognition and data mining for the analysis of network public opinion. Firstly, we build a fog computing architecture to collect the text data of network public opinion. Then, an efficient network public opinion model is constructed by intelligence semantic recognition. Finally, we achieve the function of public opinion analysis and early warning. The experimental results show that the method proposed in this paper achieves better performance against some existing methods.","PeriodicalId":509592,"journal":{"name":"Internet Technology Letters","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139229242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Internet Technology Letters
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1