首页 > 最新文献

JOURNAL OF INTERCONNECTION NETWORKS最新文献

英文 中文
Multi-Scale Segmentation Method of Remote Sensing Big Data Image Using Deep Learning 基于深度学习的遥感大数据图像多尺度分割方法
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-12-31 DOI: 10.1142/s021926592242004x
Huiping Li
Remote sensing image (RSI) segmentation is an effective method to interpret remote sensing information and an important means of remote sensing data information processing. Traditional RSI segmentation methods have some problems such as poor segmentation accuracy and low similarity difference measurement. Therefore, we propose a multi-scale segmentation (MSS) method for remote sensing big data image. First, the segmentation scale of RSI is divided, and the quantitative value of histogram band is used to calculate the similarity index between different objects; Second, the parameters in the same spot are improved based on the maximum area method to determine the shape factor of RSI; Finally, the object closure model is established to clarify the region conversion cost, and the RSI is dynamically segmented based on Multi-scale convolutional neural networks; The MSS algorithm of RSI is designed, and the MSS method of RSI is obtained. The results show that the maximum similarity difference measure of the proposed method is 0.648, and the similarity difference measure always remains the largest. The maximum recall of RSI is 0.954, and the highest recall is 0.988, indicating that the RSI segmentation accuracy of the proposed method is good.
遥感图像分割是遥感信息解译的一种有效方法,是遥感数据信息处理的重要手段。传统的RSI分割方法存在分割精度差、相似性差度量低等问题。为此,我们提出了一种遥感大数据图像的多尺度分割(MSS)方法。首先对RSI分割尺度进行划分,利用直方图频带的定量值计算不同对象之间的相似度指数;其次,基于最大面积法对同一点的参数进行改进,确定RSI形状因子;最后,建立目标闭合模型,明确区域转换代价,并基于多尺度卷积神经网络对RSI进行动态分割;设计了RSI的MSS算法,得到了RSI的MSS方法。结果表明,该方法的最大相似差测度为0.648,相似差测度始终保持最大。RSI的最大召回率为0.954,最高召回率为0.988,表明本文方法的RSI分割准确率较好。
{"title":"Multi-Scale Segmentation Method of Remote Sensing Big Data Image Using Deep Learning","authors":"Huiping Li","doi":"10.1142/s021926592242004x","DOIUrl":"https://doi.org/10.1142/s021926592242004x","url":null,"abstract":"Remote sensing image (RSI) segmentation is an effective method to interpret remote sensing information and an important means of remote sensing data information processing. Traditional RSI segmentation methods have some problems such as poor segmentation accuracy and low similarity difference measurement. Therefore, we propose a multi-scale segmentation (MSS) method for remote sensing big data image. First, the segmentation scale of RSI is divided, and the quantitative value of histogram band is used to calculate the similarity index between different objects; Second, the parameters in the same spot are improved based on the maximum area method to determine the shape factor of RSI; Finally, the object closure model is established to clarify the region conversion cost, and the RSI is dynamically segmented based on Multi-scale convolutional neural networks; The MSS algorithm of RSI is designed, and the MSS method of RSI is obtained. The results show that the maximum similarity difference measure of the proposed method is 0.648, and the similarity difference measure always remains the largest. The maximum recall of RSI is 0.954, and the highest recall is 0.988, indicating that the RSI segmentation accuracy of the proposed method is good.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"18 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network 基于无线传感器网络的入侵者检测节能模型
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-12-19 DOI: 10.1142/s0219265921490025
Ashok Kumar Rai, A. K. Daniel
A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network’s confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters.
无线传感器网络(WSN)可用于各种目的,包括区域监控、医疗保健、智能城市和国防。在这些应用程序中出现了许多复杂的问题,包括能源效率、覆盖范围和入侵者检测。在各种无线传感器网络应用中,入侵检测一直是一个重要的障碍。它会导致数据融合,危及网络的机密性、寿命和覆盖范围。针对入侵检测提出了各种算法,其中每个节点作为代理,或者部署一些监控节点进行入侵检测。该协议通过从簇头(CH)向所有节点发送一个已知比特来检测入侵者。法律节点必须向CH承认其身份,以使其有效;否则,如果CH从节点收到错误的确认或根本没有收到确认,则它是入侵者。提出的协议有助于保护传感器数据免受未经授权的访问,并通过其他合法节点的身份检测入侵者的位置。仿真结果表明,该协议对不同参数下的入侵者具有较好的识别效果。
{"title":"Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network","authors":"Ashok Kumar Rai, A. K. Daniel","doi":"10.1142/s0219265921490025","DOIUrl":"https://doi.org/10.1142/s0219265921490025","url":null,"abstract":"A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network’s confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"54 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80413299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Information Management Method of Power Supply Chains Using Mobile Cloud Computing 基于移动云计算的电力供应链数据驱动信息管理方法
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-11-21 DOI: 10.1142/s0219265922420026
Ma Jingze, Zhan Guoye, Yang Fan, Chen Xingpei
Based on the spring, spring MVC and MyBatis structures of the cloud platform SSM framework, an information management platform for power grid material supply chain is built. The data layer uses a variety of sensors to collect power grid material supply chain information, and the information is fed back to the data storage layer after being integrated by the logical reorganization function of the persistence layer. The data storage layer uses the multi-sensor supply chain information fusion method based on paste progress to fuse the information and store it in the database. The business logic layer calls the information in the database and uses the improved k-means clustering algorithm to detect the abnormal supply chain data information. After calculation and data control by the control layer, the data management results are displayed through the presentation layer. The experimental results show that the absolute error of data fusion is very low. It can effectively cluster data information and distinguish outlier anomaly information at the same time, and the effect of information management is good.
基于云平台SSM框架的spring、spring MVC和MyBatis结构,构建了电网物资供应链信息管理平台。数据层利用多种传感器采集电网物资供应链信息,通过持久层的逻辑重组功能进行整合后反馈给数据存储层。数据存储层采用基于粘贴进度的多传感器供应链信息融合方法,将信息融合存储在数据库中。业务逻辑层调用数据库中的信息,使用改进的k-means聚类算法检测异常的供应链数据信息。经过控制层的计算和数据控制,数据管理结果通过表示层显示出来。实验结果表明,数据融合的绝对误差很低。该方法既能有效地聚类数据信息,又能区分离群异常信息,信息管理效果好。
{"title":"Data-Driven Information Management Method of Power Supply Chains Using Mobile Cloud Computing","authors":"Ma Jingze, Zhan Guoye, Yang Fan, Chen Xingpei","doi":"10.1142/s0219265922420026","DOIUrl":"https://doi.org/10.1142/s0219265922420026","url":null,"abstract":"Based on the spring, spring MVC and MyBatis structures of the cloud platform SSM framework, an information management platform for power grid material supply chain is built. The data layer uses a variety of sensors to collect power grid material supply chain information, and the information is fed back to the data storage layer after being integrated by the logical reorganization function of the persistence layer. The data storage layer uses the multi-sensor supply chain information fusion method based on paste progress to fuse the information and store it in the database. The business logic layer calls the information in the database and uses the improved k-means clustering algorithm to detect the abnormal supply chain data information. After calculation and data control by the control layer, the data management results are displayed through the presentation layer. The experimental results show that the absolute error of data fusion is very low. It can effectively cluster data information and distinguish outlier anomaly information at the same time, and the effect of information management is good.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"2 11","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72393174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective 基于信任的智能设备互联网识别与认证许可区块链网络:电子商务展望
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-10-13 DOI: 10.1142/s0219265922430010
E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh
The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.
物联网指的是我们周围数十亿台连接到无线互联网的设备。这些物联网设备是内存受限的设备,可以在没有人工帮助的情况下通过网络收集和传输数据。最近,物联网在零售商业中实现,从识别服务向购后参与服务转变。零售商业中的物联网示例包括智能冰箱、智能扬声器、智能洗衣机、智能汽车以及使用RFID标签的杂货自动再购买。尽管有所上升,但减缓快速适应的一个重大不便是这些设备的“安全性”,容易受到各种攻击。其中一种攻击是针对离线或在线敏感数据的分布式拒绝服务(DDoS)攻击。因此,需要一种轻量级的加密机制来建立物联网设备之间的安全通信。本文提出了使用许可的区块链网络来保护物联网设备之间通信的解决方案。具体来说,在这项工作中,我们提出了一种使用椭圆曲线加密(ECC)协议识别和认证智能设备的机制。这项提议的工作使用许可的区块链基础设施,作为信任的来源,帮助使用ECC密码系统的身份验证过程。此外,轻量级的物理不可克隆功能(PUF)技术也用于安全存储设备的密钥。使用这种技术,私钥不需要存储在任何地方,而是在需要私钥时从可信区域动态生成。
{"title":"Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective","authors":"E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh","doi":"10.1142/s0219265922430010","DOIUrl":"https://doi.org/10.1142/s0219265922430010","url":null,"abstract":"The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"108 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73697485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 22 (2022) 作者索引第22卷(2022)
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-09-28 DOI: 10.1142/s0219265922990018
{"title":"Author Index Volume 22 (2022)","authors":"","doi":"10.1142/s0219265922990018","DOIUrl":"https://doi.org/10.1142/s0219265922990018","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"38 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-09-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79141598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Remote Sensing Image Registration Via Cyclic Parameter Synthesis and Spatial Transformation Network 基于循环参数综合和空间变换网络的遥感图像配准
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-08-30 DOI: 10.1142/s0219265922420014
Chen Ying, Liao Xianjing, Wang Wei, Wang Jiahao, Zhang Wencheng, Shi Yanjiao, Zhang Qi
Aiming at the problems of insufficient feature extraction ability, many mismatching points and low registration accuracy of some remote sensing image registration algorithms, this study proposes a remote sensing image registration algorithm via cyclic parameter synthesis spatial transformation network. (1) We propose a feature extraction network framework combined with the improved spatial transformation network and improved Densely Connected Networks (DenseNet), which can focus on important areas of images for feature extraction.This framework can effectively improve the feature extraction ability of the model, so as to improve the model accuracy. (2) In the matching stage, we design the coarse filter and fine filter double filter architecture. Thus, the false matching points are effectively filtered out, which not only improves the robustness of the model but also improves the registration accuracy. Compared with the two traditional methods and two deep learning methods, the experimental results of this model are better in many indexes.
针对一些遥感图像配准算法存在特征提取能力不足、配准不匹配点多、配准精度低等问题,提出了一种基于循环参数合成空间变换网络的遥感图像配准算法。(1)提出了一种结合改进的空间变换网络和改进的密集连接网络(DenseNet)的特征提取网络框架,该网络可以聚焦图像的重要区域进行特征提取。该框架可以有效地提高模型的特征提取能力,从而提高模型的精度。(2)在匹配阶段,设计了粗滤和精滤双滤结构。从而有效地滤除了错误的匹配点,提高了模型的鲁棒性,提高了配准精度。与两种传统方法和两种深度学习方法相比,该模型在许多指标上的实验结果都更好。
{"title":"Remote Sensing Image Registration Via Cyclic Parameter Synthesis and Spatial Transformation Network","authors":"Chen Ying, Liao Xianjing, Wang Wei, Wang Jiahao, Zhang Wencheng, Shi Yanjiao, Zhang Qi","doi":"10.1142/s0219265922420014","DOIUrl":"https://doi.org/10.1142/s0219265922420014","url":null,"abstract":"Aiming at the problems of insufficient feature extraction ability, many mismatching points and low registration accuracy of some remote sensing image registration algorithms, this study proposes a remote sensing image registration algorithm via cyclic parameter synthesis spatial transformation network. (1) We propose a feature extraction network framework combined with the improved spatial transformation network and improved Densely Connected Networks (DenseNet), which can focus on important areas of images for feature extraction.This framework can effectively improve the feature extraction ability of the model, so as to improve the model accuracy. (2) In the matching stage, we design the coarse filter and fine filter double filter architecture. Thus, the false matching points are effectively filtered out, which not only improves the robustness of the model but also improves the registration accuracy. Compared with the two traditional methods and two deep learning methods, the experimental results of this model are better in many indexes.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"31 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78934535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DTAR: A Dynamic Threshold Adaptive Ranking-Based Energy-Efficient Routing Algorithm for WSNs 基于动态阈值自适应排序的无线传感器网络节能路由算法
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-31 DOI: 10.1142/s0219265921490013
R. Amutha, G. Sivasankari, K. Venugopal, Thompson Stephan
Owing to uncertainties associated with energy and maintenance of large Wireless Sensor Networks (WSN) during transmission, energy-efficient routing strategies are gaining popularity. A Dynamic Threshold Adaptive Routing Algorithm (DTAR) is proposed for determining the most appropriate node to become a Cluster Head (CH) using adaptive participation criteria. For determining the next Forwarder Node (FN), an adaptive ranking scheme depends on distance ([Formula: see text]) and Residual Energy ([Formula: see text]). However, additional parameters such as Delivery Ratio (DR), End-to-End delay ([Formula: see text] delay), and Message Success Rate (MSR) should be considered to achieve the most optimal approach to achieve energy efficiency. The proposed DTAR algorithm is validated on variable clustered networks in order to investigate the effect of opportunistic routing with increasing network size and energy resources. The proposed algorithm shows a substantial decrease in energy consumption during transmission. Energy Consumption (EC), Packet Delivery Ratio (PDR), End-to-End delay ([Formula: see text] delay), and Message Success Rate (MSR) are used to illustrate the effectiveness of the proposed algorithm for energy efficiency.
由于大型无线传感器网络(WSN)在传输过程中与能量和维护相关的不确定性,节能路由策略越来越受欢迎。提出了一种动态阈值自适应路由算法(DTAR),利用自适应参与准则确定最合适的节点成为簇头(CH)。为了确定下一个转发器节点(FN),自适应排序方案取决于距离([公式:见文本])和剩余能量([公式:见文本])。但是,需要考虑其他参数,如传输比(DR)、端到端延迟([公式:见文本]延迟)和消息成功率(MSR),以实现最优的节能方法。在可变聚类网络中对该算法进行了验证,以研究机会路由随网络规模和能量的增加所产生的影响。该算法在传输过程中显著降低了能量消耗。用能耗(EC)、包投递率(PDR)、端到端延迟([公式:见文本]延迟)和消息成功率(MSR)来说明所提算法在能源效率方面的有效性。
{"title":"DTAR: A Dynamic Threshold Adaptive Ranking-Based Energy-Efficient Routing Algorithm for WSNs","authors":"R. Amutha, G. Sivasankari, K. Venugopal, Thompson Stephan","doi":"10.1142/s0219265921490013","DOIUrl":"https://doi.org/10.1142/s0219265921490013","url":null,"abstract":"Owing to uncertainties associated with energy and maintenance of large Wireless Sensor Networks (WSN) during transmission, energy-efficient routing strategies are gaining popularity. A Dynamic Threshold Adaptive Routing Algorithm (DTAR) is proposed for determining the most appropriate node to become a Cluster Head (CH) using adaptive participation criteria. For determining the next Forwarder Node (FN), an adaptive ranking scheme depends on distance ([Formula: see text]) and Residual Energy ([Formula: see text]). However, additional parameters such as Delivery Ratio (DR), End-to-End delay ([Formula: see text] delay), and Message Success Rate (MSR) should be considered to achieve the most optimal approach to achieve energy efficiency. The proposed DTAR algorithm is validated on variable clustered networks in order to investigate the effect of opportunistic routing with increasing network size and energy resources. The proposed algorithm shows a substantial decrease in energy consumption during transmission. Energy Consumption (EC), Packet Delivery Ratio (PDR), End-to-End delay ([Formula: see text] delay), and Message Success Rate (MSR) are used to illustrate the effectiveness of the proposed algorithm for energy efficiency.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"71 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85894656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Health Ratio Optimization of Group Detection-Based Data Network Using Genetic Algorithm 基于遗传算法的群检测数据网络健康率优化
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-05-12 DOI: 10.1142/s0219265922410018
A. R. Suhas, M. Manoj Priyatham
A physical region can have multiple parts, each part is monitored with the help of a Special DDN (SDDN). In the existing methods, namely, LEACH, the Fuzzy method has a larger path between the initiator DDN to destination DDN. Non-healthy DDNs can occur in the Group-based Detection Data Network (GDDN) when the battery level of the DDN reaches below the threshold. The possibility of more Non-healthy DDNs can be of multiple reasons (i) when the link path is of larger length (ii) Same DDN is used multiple times as an SDDN and (iii) repeated communication between base station to DDNs causes the DDN to lose more battery. If a mechanism is created to recover the DDNs or recharge them, then the number of Non-healthy DDNs can be reduced and DDN performance can be improved a lot. The Proposed Genetic (PGENETIC) method will find the SDDN in a battery-aware manner and also at path will be of minimum length along with regular interval trigger to identify DDNs which are non-healthy and replace or recharge them. PGENETIC is compared with LEACH, Fuzzy method, and Proposed CHEF (PCHEF) and proved that PGENETIC exhibits better performance.
一个物理区域可以包含多个部分,每个部分通过SDDN (Special DDN)进行监控。在现有的方法中,即LEACH,模糊方法在发起者DDN到目的DDN之间的路径更大。当GDDN (Group-based Detection Data Network)的电池电量低于阈值时,可能会出现非健康DDNs。出现更多非健康DDN的可能性有多种原因:(i)链路路径长度较大;(ii)同一DDN作为SDDN多次使用;(iii)基站与DDN之间的重复通信导致DDN消耗更多电池。如果建立恢复DDN或为其充值的机制,则可以减少非健康DDN的数量,并大大提高DDN的性能。提出的遗传(PGENETIC)方法将以电池感知的方式找到SDDN,并且在路径长度最小的情况下,以及定期间隔触发来识别非健康ddn并替换或充电。将PGENETIC算法与LEACH、Fuzzy、Proposed CHEF (PCHEF)算法进行了比较,证明了PGENETIC算法具有更好的性能。
{"title":"Health Ratio Optimization of Group Detection-Based Data Network Using Genetic Algorithm","authors":"A. R. Suhas, M. Manoj Priyatham","doi":"10.1142/s0219265922410018","DOIUrl":"https://doi.org/10.1142/s0219265922410018","url":null,"abstract":"A physical region can have multiple parts, each part is monitored with the help of a Special DDN (SDDN). In the existing methods, namely, LEACH, the Fuzzy method has a larger path between the initiator DDN to destination DDN. Non-healthy DDNs can occur in the Group-based Detection Data Network (GDDN) when the battery level of the DDN reaches below the threshold. The possibility of more Non-healthy DDNs can be of multiple reasons (i) when the link path is of larger length (ii) Same DDN is used multiple times as an SDDN and (iii) repeated communication between base station to DDNs causes the DDN to lose more battery. If a mechanism is created to recover the DDNs or recharge them, then the number of Non-healthy DDNs can be reduced and DDN performance can be improved a lot. The Proposed Genetic (PGENETIC) method will find the SDDN in a battery-aware manner and also at path will be of minimum length along with regular interval trigger to identify DDNs which are non-healthy and replace or recharge them. PGENETIC is compared with LEACH, Fuzzy method, and Proposed CHEF (PCHEF) and proved that PGENETIC exhibits better performance.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"1 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79283778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Multi-Level Semi-Supervised Learning Approach for Network Intrusion Detection System Based on the ‘GOA’ 一种基于GOA的网络入侵检测系统多级半监督学习新方法
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-31 DOI: 10.1142/s0219265921430477
A. Madhuri, V. E. Jyothi, S. Praveen, S. Sindhura, V. S. Srinivas, D. L. S. Kumar
One of the important technologies in present days is Intrusion detection technology. By using the machine learning techniques, researchers were developed different intrusion systems. But, the designed models toughness is affected by the two parameters, in that first one is, high network traffic imbalance in several categories, and another is, non-identical distribution is present in between the test set and training set in feature space. An artificial neural network (ANN) multi-level intrusion detection model with semi-supervised hierarchical [Formula: see text]-means method (HSK-means) is presented in this paper. Error rate of intrusion detection is reduced by the ANN’s accurate learning so it uses the Grasshopper Optimization Algorithm (GOA) which is analysed in this paper. Based on selection of important and useful parameters as bias and weight, error rate of intrusion detection system is reduced in the GOA algorithm and this is the main objective of the proposed system. Cluster based method is used in the pattern discovery module in order to find the unknown patterns. Here the test sample is treated as unlabelled unknown pattern or the known pattern. Proposed approach performance is evaluated by using the dataset as KDDCUP99. It is evident from the experimental findings that the projected model of GOA based semi supervised learning approach is better in terms of sensitivity, specificity and overall accuracy than the intrusion systems which are existed previously.
入侵检测技术是当今网络安全的重要技术之一。利用机器学习技术,研究人员开发了不同的入侵系统。但是,所设计的模型的韧性受到两个参数的影响,一是多个类别的网络流量高度不均衡,二是测试集和训练集在特征空间上的分布不相同。提出了一种基于半监督层次均值法(HSK-means)的人工神经网络(ANN)多级入侵检测模型。为了降低入侵检测的错误率,人工神经网络采用了蝗虫优化算法(Grasshopper Optimization Algorithm, GOA)。GOA算法通过选择重要有用的参数作为偏差和权重,降低入侵检测系统的错误率,这是该系统的主要目标。模式发现模块采用基于聚类的方法来发现未知的模式。在这里,测试样品被视为未标记的未知图案或已知图案。使用KDDCUP99作为数据集对所提方法的性能进行了评估。实验结果表明,基于GOA的半监督学习方法的预测模型在敏感性、特异性和总体准确性方面都优于已有的入侵系统。
{"title":"A New Multi-Level Semi-Supervised Learning Approach for Network Intrusion Detection System Based on the ‘GOA’","authors":"A. Madhuri, V. E. Jyothi, S. Praveen, S. Sindhura, V. S. Srinivas, D. L. S. Kumar","doi":"10.1142/s0219265921430477","DOIUrl":"https://doi.org/10.1142/s0219265921430477","url":null,"abstract":"One of the important technologies in present days is Intrusion detection technology. By using the machine learning techniques, researchers were developed different intrusion systems. But, the designed models toughness is affected by the two parameters, in that first one is, high network traffic imbalance in several categories, and another is, non-identical distribution is present in between the test set and training set in feature space. An artificial neural network (ANN) multi-level intrusion detection model with semi-supervised hierarchical [Formula: see text]-means method (HSK-means) is presented in this paper. Error rate of intrusion detection is reduced by the ANN’s accurate learning so it uses the Grasshopper Optimization Algorithm (GOA) which is analysed in this paper. Based on selection of important and useful parameters as bias and weight, error rate of intrusion detection system is reduced in the GOA algorithm and this is the main objective of the proposed system. Cluster based method is used in the pattern discovery module in order to find the unknown patterns. Here the test sample is treated as unlabelled unknown pattern or the known pattern. Proposed approach performance is evaluated by using the dataset as KDDCUP99. It is evident from the experimental findings that the projected model of GOA based semi supervised learning approach is better in terms of sensitivity, specificity and overall accuracy than the intrusion systems which are existed previously.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"29 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2022-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76894161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Author Index Volume 21 (2021) 作者索引第21卷(2021)
IF 0.7 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-12-01 DOI: 10.1142/s0219265921990012
{"title":"Author Index Volume 21 (2021)","authors":"","doi":"10.1142/s0219265921990012","DOIUrl":"https://doi.org/10.1142/s0219265921990012","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":"18 1","pages":""},"PeriodicalIF":0.7,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87644479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF INTERCONNECTION NETWORKS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1