首页 > 最新文献

Journal of High Speed Networks最新文献

英文 中文
Design and implementation of a fast integration method for multi-source data in high-speed network 高速网络中多源数据快速集成方法的设计与实现
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-24 DOI: 10.3233/jhs-222047
Lei Ma, Yanning Zhang, Vicente García Díaz
The data collected by the distributed high-speed network has multiple sources. Therefore, in order to realize the rapid integration of multi-source data, this paper designs a rapid data integration method based on the characteristics of the distributed high-speed network. First, we use linear regression analysis to build a distributed perceptual data model, so that network nodes can only transmit the parameter information of the regression model, so as to simplify the data collection. Then, a dead band amplitude limiting nonlinear link is added at the high frequency channel side to filter and assimilate the data. Finally, the data feature vectors are extracted as the training samples of the neural network to obtain the mapping relationship between different feature vectors, and then the decision level data integration is achieved by training the neural network. The experimental results show that this method can accurately collect high-speed network data, and the data collection deviation is always less than 5 μrad; This method has good filtering effect on data and can eliminate the interference of burr signal; The convergence speed of this method is fast, and the data assimilation can be completed within 0.4 s, which is conducive to improving the speed of data integration; With the increase of network size, the average traffic load of this method increases less.
分布式高速网络采集的数据有多个来源。因此,为了实现多源数据的快速集成,本文基于分布式高速网络的特点,设计了一种快速数据集成方法。首先,我们利用线性回归分析建立分布式感知数据模型,使网络节点只能传递回归模型的参数信息,从而简化数据采集。然后,在高频信道侧增加死区限幅非线性链路,对数据进行滤波和同化。最后,提取数据特征向量作为神经网络的训练样本,得到不同特征向量之间的映射关系,然后通过训练神经网络实现决策级数据集成。实验结果表明,该方法能准确采集高速网络数据,数据采集偏差始终小于5 μrad;该方法对数据滤波效果好,能消除毛刺信号的干扰;该方法收敛速度快,可在0.4 s内完成数据同化,有利于提高数据集成速度;随着网络规模的增大,该方法的平均流量负载的增幅较小。
{"title":"Design and implementation of a fast integration method for multi-source data in high-speed network","authors":"Lei Ma, Yanning Zhang, Vicente García Díaz","doi":"10.3233/jhs-222047","DOIUrl":"https://doi.org/10.3233/jhs-222047","url":null,"abstract":"The data collected by the distributed high-speed network has multiple sources. Therefore, in order to realize the rapid integration of multi-source data, this paper designs a rapid data integration method based on the characteristics of the distributed high-speed network. First, we use linear regression analysis to build a distributed perceptual data model, so that network nodes can only transmit the parameter information of the regression model, so as to simplify the data collection. Then, a dead band amplitude limiting nonlinear link is added at the high frequency channel side to filter and assimilate the data. Finally, the data feature vectors are extracted as the training samples of the neural network to obtain the mapping relationship between different feature vectors, and then the decision level data integration is achieved by training the neural network. The experimental results show that this method can accurately collect high-speed network data, and the data collection deviation is always less than 5 μrad; This method has good filtering effect on data and can eliminate the interference of burr signal; The convergence speed of this method is fast, and the data assimilation can be completed within 0.4 s, which is conducive to improving the speed of data integration; With the increase of network size, the average traffic load of this method increases less.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"36 1","pages":"251-263"},"PeriodicalIF":0.9,"publicationDate":"2023-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90755605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden target recognition method for high-speed network security threats based on attack graph theory 基于攻击图论的高速网络安全威胁隐藏目标识别方法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-18 DOI: 10.3233/jhs-222048
Limin Song, Seungmin Rho
Instantaneous traffic changes in high-speed networks will interfere with abnormal traffic characteristics, making it difficult to accurately identify hidden targets of security threats. This paper designs a high-speed network security threat hidden target recognition method based on attack graph theory. Using the high-speed network traffic reduction method, under the condition that the network topology remains unchanged, the instantaneous input traffic is reduced according to a certain proportion, and after compressing the flow data scale, the abnormal traffic of the high-speed network is identified through the convolutional recurrent neural network, and the information entropy is used to describe the high-speed network. The abnormal traffic characteristics of the network are used as constraints to design an attack graph of hidden targets of high-speed network security threats, and an attack path discovery method based on multi-heuristic information fusion is designed to extract attack paths of high-speed networks, locate attacking hosts, and identify hidden threat targets. In the experiment, the method can accurately identify the hidden targets of high-speed network security threats, and has better identification ability.
高速网络中的瞬时流量变化会干扰异常的流量特征,使安全威胁的隐藏目标难以准确识别。本文设计了一种基于攻击图理论的高速网络安全威胁隐藏目标识别方法。采用高速网络流量约简方法,在网络拓扑保持不变的情况下,将瞬时输入流量按一定比例减少,压缩流量数据尺度后,通过卷积递归神经网络识别高速网络的异常流量,并利用信息熵对高速网络进行描述。以网络异常流量特征为约束条件,设计高速网络安全威胁隐藏目标攻击图,设计基于多启发式信息融合的攻击路径发现方法,提取高速网络攻击路径,定位攻击主机,识别威胁隐藏目标。在实验中,该方法能够准确识别高速网络安全威胁的隐藏目标,具有较好的识别能力。
{"title":"Hidden target recognition method for high-speed network security threats based on attack graph theory","authors":"Limin Song, Seungmin Rho","doi":"10.3233/jhs-222048","DOIUrl":"https://doi.org/10.3233/jhs-222048","url":null,"abstract":"Instantaneous traffic changes in high-speed networks will interfere with abnormal traffic characteristics, making it difficult to accurately identify hidden targets of security threats. This paper designs a high-speed network security threat hidden target recognition method based on attack graph theory. Using the high-speed network traffic reduction method, under the condition that the network topology remains unchanged, the instantaneous input traffic is reduced according to a certain proportion, and after compressing the flow data scale, the abnormal traffic of the high-speed network is identified through the convolutional recurrent neural network, and the information entropy is used to describe the high-speed network. The abnormal traffic characteristics of the network are used as constraints to design an attack graph of hidden targets of high-speed network security threats, and an attack path discovery method based on multi-heuristic information fusion is designed to extract attack paths of high-speed networks, locate attacking hosts, and identify hidden threat targets. In the experiment, the method can accurately identify the hidden targets of high-speed network security threats, and has better identification ability.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45975304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decision tree-based prediction approach for improving stable energy management in smart grids 基于决策树的智能电网稳定能源管理预测方法
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-05-17 DOI: 10.3233/jhs-230002
Sichao Chen, Liejiang Huang, Yuanjun Pan, Yuanchao Hu, Dilong Shen, Jiangang Dai
Today, the Internet of Things (IoT) has an important role for deploying power and energy management in the smart grids as emerging trend for managing power stability and consumption. In the IoT, smart grids has important role for managing power communication systems with safe data transformation using artificial intelligent approaches such as Machine Learning (ML), evolutionary computation and meta-heuristic algorithms. One of important issues to manage renewable energy consumption is intelligent aggregation of information based on smart metering and detecting the user behaviors for power and electricity consumption in the IoT. To achieve optimal performance for detecting this information, a context-aware prediction system is needed that can apply a resource management effectively for the renewable energy consumption for smart grids in the IoT. Also, prediction results from machine learning methods can be useful to manage optimal solutions for power generation activities, power transformation, smart metering at home and load balancing in smart grid networks. This paper aims to design a new periodical detecting, managing, allocating and analyzing useful information regarding potential renewable power and energy consumptions using a context-aware prediction approach and optimization-based machine learning method to overcome the problem. In the proposed architecture, a decision tree algorithm is provided to predict the grouped information based on important and high-ranked existing features. For evaluating the proposed architecture, some other well-known machine learning methods are compared to the evaluation results. Consequently, after analyzing various components by solving different smart grids datasets, the proposed architecture’s capacity and supremacy are well determined among its traditional approaches.
如今,物联网(IoT)在智能电网中部署电力和能源管理方面发挥着重要作用,这是管理电力稳定性和消耗的新兴趋势。在物联网中,智能电网在管理电力通信系统方面发挥着重要作用,使用机器学习(ML)、进化计算和元启发式算法等人工智能方法进行安全的数据转换。管理可再生能源消耗的一个重要问题是基于智能计量的信息智能聚合,并检测物联网中用户的电力和电力消耗行为。为了实现检测这些信息的最佳性能,需要一个上下文感知预测系统,该系统可以有效地将资源管理应用于物联网中智能电网的可再生能源消耗。此外,机器学习方法的预测结果可用于管理发电活动、电力转换、家庭智能计量和智能电网负载平衡的最佳解决方案。本文旨在利用上下文感知预测方法和基于优化的机器学习方法,设计一种新的周期性检测、管理、分配和分析潜在可再生能源和能源消耗的有用信息的方法,以克服这一问题。在所提出的体系结构中,提供了一种决策树算法来基于重要和高排名的现有特征来预测分组信息。为了评估所提出的体系结构,将其他一些众所周知的机器学习方法与评估结果进行了比较。因此,在通过求解不同的智能电网数据集来分析各种组件之后,所提出的架构的容量和优越性在其传统方法中得到了很好的确定。
{"title":"Decision tree-based prediction approach for improving stable energy management in smart grids","authors":"Sichao Chen, Liejiang Huang, Yuanjun Pan, Yuanchao Hu, Dilong Shen, Jiangang Dai","doi":"10.3233/jhs-230002","DOIUrl":"https://doi.org/10.3233/jhs-230002","url":null,"abstract":"Today, the Internet of Things (IoT) has an important role for deploying power and energy management in the smart grids as emerging trend for managing power stability and consumption. In the IoT, smart grids has important role for managing power communication systems with safe data transformation using artificial intelligent approaches such as Machine Learning (ML), evolutionary computation and meta-heuristic algorithms. One of important issues to manage renewable energy consumption is intelligent aggregation of information based on smart metering and detecting the user behaviors for power and electricity consumption in the IoT. To achieve optimal performance for detecting this information, a context-aware prediction system is needed that can apply a resource management effectively for the renewable energy consumption for smart grids in the IoT. Also, prediction results from machine learning methods can be useful to manage optimal solutions for power generation activities, power transformation, smart metering at home and load balancing in smart grid networks. This paper aims to design a new periodical detecting, managing, allocating and analyzing useful information regarding potential renewable power and energy consumptions using a context-aware prediction approach and optimization-based machine learning method to overcome the problem. In the proposed architecture, a decision tree algorithm is provided to predict the grouped information based on important and high-ranked existing features. For evaluating the proposed architecture, some other well-known machine learning methods are compared to the evaluation results. Consequently, after analyzing various components by solving different smart grids datasets, the proposed architecture’s capacity and supremacy are well determined among its traditional approaches.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":" ","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42731898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of delay compensation algorithm in remote auction network for digital art works 数字艺术品远程拍卖网络延迟补偿算法设计
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-21 DOI: 10.3233/jhs-222049
Min Wu, Chun-Wei Lin
Aiming at the problem of delay and packet loss in current remote network, a delay compensation algorithm for high-speed network is studied and applied to the remote auction of digital art works. High-speed network delay mainly includes: transmission processing delay, waiting delay, transmission delay, and reception processing delay. The delay model of high-speed network is designed by using a time division multiple access protocol. Based on the high-speed network delay model, the Kalman filter is used to design the high-speed network delay control algorithm to maintain the high-speed network delay. At the same time, the round-trip delay compensation algorithm based on link delay is used to compensate the high-speed network delay. The experimental results show that the proposed method compensates the delay of more than 235 ms, and the packet loss rate of high-speed network is only 0.59%, and the throughput reaches 241 Mbit/s, which validates the algorithm can effectively compensate the delay of high-speed network and reduce the packet loss rate of high-speed network.
针对当前远程网络中存在的时延和丢包问题,研究了一种高速网络时延补偿算法,并将其应用于数字艺术品的远程拍卖。高速网络时延主要包括:传输处理时延、等待时延、传输时延和接收处理时延。采用时分多址协议设计了高速网络的时延模型。在高速网络时延模型的基础上,利用卡尔曼滤波设计高速网络时延控制算法,保持高速网络时延。同时,采用基于链路时延的往返时延补偿算法对高速网络时延进行补偿。实验结果表明,该方法补偿了235 ms以上的时延,高速网络的丢包率仅为0.59%,吞吐量达到241 Mbit/s,验证了该算法能够有效补偿高速网络的时延,降低高速网络的丢包率。
{"title":"Design of delay compensation algorithm in remote auction network for digital art works","authors":"Min Wu, Chun-Wei Lin","doi":"10.3233/jhs-222049","DOIUrl":"https://doi.org/10.3233/jhs-222049","url":null,"abstract":"Aiming at the problem of delay and packet loss in current remote network, a delay compensation algorithm for high-speed network is studied and applied to the remote auction of digital art works. High-speed network delay mainly includes: transmission processing delay, waiting delay, transmission delay, and reception processing delay. The delay model of high-speed network is designed by using a time division multiple access protocol. Based on the high-speed network delay model, the Kalman filter is used to design the high-speed network delay control algorithm to maintain the high-speed network delay. At the same time, the round-trip delay compensation algorithm based on link delay is used to compensate the high-speed network delay. The experimental results show that the proposed method compensates the delay of more than 235 ms, and the packet loss rate of high-speed network is only 0.59%, and the throughput reaches 241 Mbit/s, which validates the algorithm can effectively compensate the delay of high-speed network and reduce the packet loss rate of high-speed network.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"80 1","pages":"159-168"},"PeriodicalIF":0.9,"publicationDate":"2023-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73358828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new algebraic attack on DASTA 对DASTA的一种新的代数攻击
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-06 DOI: 10.3233/jhs-222024
Haixia Zhao, Keque Li, Yongzhuang Wei
As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small. Currently, the security of the DASTA stream cipher has received extensive attention. Note that the best-known attack (i.e., algebraic attack) on DASTA still has a very high data complexity. It appears to be an important task to reduce the data complexity of the attack on DASTA. In this article, a new algebraic attack on DASTA is proposed. More specifically, the key feed-forward operation, the properties of the nonlinear layer and the invariance from the linear layer are successfully utilized in the attack. In particular, the nonlinear relation of internal states in DASTA is linearized effectively. In this case, more secret key bit equations with low algebraic degrees are collected by fixing the bit. It is illustrated that four ( r − 1 )-round instances of the DASTA cipher family are theoretically broken by the attack, where r is the iterative number of round operations. Compared with the results of previous algebraic attacks, our approach achieves more favorable data complexity.
DASTA是一种完全同态加密友好的对称密钥原语,由Hebborn在Fast Software encryption 2020上发明。在DASTA流密码中引入了一种新的固定线性层设计概念,使得DASTA流密码的AND深度和每加密位的AND数都很小。目前,DASTA流密码的安全性受到了广泛的关注。请注意,对DASTA最著名的攻击(即代数攻击)仍然具有非常高的数据复杂性。降低DASTA攻击的数据复杂性似乎是一项重要的任务。本文提出了一种新的DASTA代数攻击方法。更具体地说,在攻击中成功地利用了关键前馈操作、非线性层的特性和线性层的不变性。特别是,DASTA内部状态的非线性关系得到了有效的线性化。在这种情况下,通过固定位来收集更多的低代数度的秘密密钥位方程。说明了DASTA密码族的四个(r−1)轮实例在理论上被攻击所破坏,其中r是轮操作的迭代次数。与以往的代数攻击结果相比,我们的方法获得了更有利的数据复杂度。
{"title":"A new algebraic attack on DASTA","authors":"Haixia Zhao, Keque Li, Yongzhuang Wei","doi":"10.3233/jhs-222024","DOIUrl":"https://doi.org/10.3233/jhs-222024","url":null,"abstract":"As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small. Currently, the security of the DASTA stream cipher has received extensive attention. Note that the best-known attack (i.e., algebraic attack) on DASTA still has a very high data complexity. It appears to be an important task to reduce the data complexity of the attack on DASTA. In this article, a new algebraic attack on DASTA is proposed. More specifically, the key feed-forward operation, the properties of the nonlinear layer and the invariance from the linear layer are successfully utilized in the attack. In particular, the nonlinear relation of internal states in DASTA is linearized effectively. In this case, more secret key bit equations with low algebraic degrees are collected by fixing the bit. It is illustrated that four ( r − 1 )-round instances of the DASTA cipher family are theoretically broken by the attack, where r is the iterative number of round operations. Compared with the results of previous algebraic attacks, our approach achieves more favorable data complexity.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"2 1","pages":"147-157"},"PeriodicalIF":0.9,"publicationDate":"2023-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85583253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The state of art and review on video streaming 视频流媒体技术现状与评述
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-31 DOI: 10.3233/jhs-222087
A. Laghari, Sana Shahid, Rahul Yadav, Shahid Karim, Awais Khan, Hang Li, Yin Shoulin
Nowadays, video streaming is very popular around the world, users use video streaming to watch online movies, education, and do office work. Video streaming is referred to as the transmission of video content, live or recorded from server/cloud to end-users. Video and music files are prearranged and transmitted in sequential packets of data so they can be streamed instantaneously, only the User required a high-speed network for access, and a subscription to streaming via an application. In this paper, we survey and analyze the previous development in video streaming such as 2D, and 3D video streaming, compression technologies, protocols for streaming, cloud video processing, 4K/8K, and challenges, and limitations and offer aspects of future development, which will help to provide quality of service of video streaming and increase the revenue for service providers.
如今,视频流媒体在世界范围内非常流行,用户使用视频流媒体观看在线电影,教育和办公。视频流指的是从服务器/云向最终用户传输视频内容,无论是现场直播还是录制视频。视频和音乐文件是预先安排的,并在连续的数据包中传输,因此它们可以立即流媒体,只有用户需要高速网络访问,并通过应用程序订阅流媒体。本文从二维视频流、三维视频流、压缩技术、视频流协议、云视频处理、4K/8K等视频流技术的发展现状、面临的挑战、存在的局限以及未来发展方向等方面进行了综述和分析,以期为视频流服务提供商提供更高质量的视频流服务,提高服务提供商的收入。
{"title":"The state of art and review on video streaming","authors":"A. Laghari, Sana Shahid, Rahul Yadav, Shahid Karim, Awais Khan, Hang Li, Yin Shoulin","doi":"10.3233/jhs-222087","DOIUrl":"https://doi.org/10.3233/jhs-222087","url":null,"abstract":"Nowadays, video streaming is very popular around the world, users use video streaming to watch online movies, education, and do office work. Video streaming is referred to as the transmission of video content, live or recorded from server/cloud to end-users. Video and music files are prearranged and transmitted in sequential packets of data so they can be streamed instantaneously, only the User required a high-speed network for access, and a subscription to streaming via an application. In this paper, we survey and analyze the previous development in video streaming such as 2D, and 3D video streaming, compression technologies, protocols for streaming, cloud video processing, 4K/8K, and challenges, and limitations and offer aspects of future development, which will help to provide quality of service of video streaming and increase the revenue for service providers.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"10 1","pages":"211-236"},"PeriodicalIF":0.9,"publicationDate":"2023-03-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74142446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards swarm optimization techniques for power communication systems and smart grid environments 面向电力通信系统和智能电网环境的群优化技术研究
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.3233/jhs-222080
T. Zhang, Yongchao Liu, Wenfang Li, Ting-ting Cheng, Yaping Zhang
Today, continuous technical and emerging advances between power communication systems and smart grids and applying swarm intelligence have increased for data sharing and analytics in our life. On the other side, Internet of things (IoT) has important key role to establish constructive interactions between smart devices and smart grid and power communication applications. For enhancing data transformation and improvements of multi-objective Quality of Service (QoS) factors, Swarm Optimization Techniques (SOT) are applied simultaneously in a cooperative smart environment to solve NP-hard problems. This paper provides a comprehensive analysis to address a new technical taxonomy and categorization of existing SOT-based smart grid applications in power communication systems in the IoT. Also, existing service and resource management case studies on smart grids and power communication systems are briefly analyzed and discussed. Existing evaluation factors on smart grid applications using SOT are represented. Possible advantages and weaknesses of each category are discussed with respect to new challenges and open research directions.
今天,电力通信系统和智能电网之间的不断技术和新兴进步以及应用群体智能已经增加了我们生活中的数据共享和分析。另一方面,物联网(IoT)在智能设备与智能电网和电力通信应用之间建立建设性交互方面具有重要的关键作用。为了加强数据转换和提高多目标服务质量(QoS)因素,在协同智能环境中同时应用群优化技术(SOT)来解决NP-hard问题。本文提供了一个全面的分析,以解决现有的基于sot的智能电网在物联网电力通信系统中的新技术分类和分类。同时,对现有的智能电网和电力通信系统的服务和资源管理案例进行了简要分析和讨论。对现有的SOT智能电网应用评价因素进行了分析。讨论了每个类别可能存在的优势和劣势,以及面临的新挑战和开放的研究方向。
{"title":"Towards swarm optimization techniques for power communication systems and smart grid environments","authors":"T. Zhang, Yongchao Liu, Wenfang Li, Ting-ting Cheng, Yaping Zhang","doi":"10.3233/jhs-222080","DOIUrl":"https://doi.org/10.3233/jhs-222080","url":null,"abstract":"Today, continuous technical and emerging advances between power communication systems and smart grids and applying swarm intelligence have increased for data sharing and analytics in our life. On the other side, Internet of things (IoT) has important key role to establish constructive interactions between smart devices and smart grid and power communication applications. For enhancing data transformation and improvements of multi-objective Quality of Service (QoS) factors, Swarm Optimization Techniques (SOT) are applied simultaneously in a cooperative smart environment to solve NP-hard problems. This paper provides a comprehensive analysis to address a new technical taxonomy and categorization of existing SOT-based smart grid applications in power communication systems in the IoT. Also, existing service and resource management case studies on smart grids and power communication systems are briefly analyzed and discussed. Existing evaluation factors on smart grid applications using SOT are represented. Possible advantages and weaknesses of each category are discussed with respect to new challenges and open research directions.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"27 1","pages":"237-249"},"PeriodicalIF":0.9,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91223688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A study on community detection in multilayer networks 多层网络中社区检测的研究
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.3233/jhs-222052
Venkatakrishna Rao Katakamsetty, D. Rajani, P. Srikanth
Studying complex networks is essential for a better understanding of network science. Many studies have been done on single-layer networks in complex networks. After the advancement and widespread usage of the internet and social media networks, performing community detection in multilayer networks becomes essential to reach more people and work with different personalities on different platforms. Motivated by this observation, this paper has studied types of networks, metrics, measures, and community detection using deep learning-based models in multilayer networks. This survey can play a significant role in analyzing and understanding multilayer networks.
研究复杂网络对于更好地理解网络科学至关重要。对复杂网络中的单层网络进行了大量的研究。在互联网和社交媒体网络的进步和广泛使用之后,在多层网络中进行社区检测对于接触更多的人以及在不同平台上与不同个性的人合作变得至关重要。基于这一观察结果,本文在多层网络中使用基于深度学习的模型研究了网络类型、度量、度量和社区检测。这项研究对分析和理解多层网络具有重要意义。
{"title":"A study on community detection in multilayer networks","authors":"Venkatakrishna Rao Katakamsetty, D. Rajani, P. Srikanth","doi":"10.3233/jhs-222052","DOIUrl":"https://doi.org/10.3233/jhs-222052","url":null,"abstract":"Studying complex networks is essential for a better understanding of network science. Many studies have been done on single-layer networks in complex networks. After the advancement and widespread usage of the internet and social media networks, performing community detection in multilayer networks becomes essential to reach more people and work with different personalities on different platforms. Motivated by this observation, this paper has studied types of networks, metrics, measures, and community detection using deep learning-based models in multilayer networks. This survey can play a significant role in analyzing and understanding multilayer networks.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"7 1","pages":"197-209"},"PeriodicalIF":0.9,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87825744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic multi-hop multipath RMSA and traffic grooming in OFDM-based sliceable elastic optical networks 基于ofdm的可切片弹性光网络中动态多跳多径RMSA与业务量梳理
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.3233/jhs-222007
Hwa-Chun Lin, Wei-Te Tseng
In elastic optical networks (EON), routing, modulation selection, and spectrum assignment (RMSA) is crucial in provisioning connection requests. Multipath RMSA offers a number of benefits including provisioning of ultra-high bandwidth demands and better utilization of fragmented spectrum resource. By Combining with traffic grooming, multipath RMSA and traffic grooming is able to provide better utilization of network resource in provisioning connection requests. Adding multi-hop routing mechanism to multipath RMSA and traffic grooming increases the flexibility for selecting paths resulting in higher probability of successfully finding routing paths for connection requests. Dynamic multipath RMSA problem in EON has been investigated extensively in the literature. Dynamic multi-hop multipath RMSA and traffic grooming problem in EON is far from been well studied. This paper proposes an algorithm for the dynamic multi-hop multipath RMSA and traffic grooming problem in OFDM-based elastic optical networks with sliceable bandwidth-variable transponders. Performance of the proposed algorithm is studied via simulation. Our simulation results show that the proposed algorithm yields lower bandwidth blocking ratio than an existing algorithm.
在弹性光网络(EON)中,路由、调制选择和频谱分配(RMSA)是提供连接请求的关键。多路径RMSA提供了许多好处,包括提供超高带宽需求和更好地利用碎片频谱资源。通过与流量疏导相结合,多路径RMSA和流量疏导能够在提供连接请求时更好地利用网络资源。向多路径RMSA和流量修饰添加多跳路由机制增加了选择路径的灵活性,从而提高了成功为连接请求找到路由路径的概率。EON中的动态多路径RMSA问题在文献中得到了广泛的研究。EON中的动态多跳多径RMSA和流量疏导问题还没有得到很好的研究。针对基于ofdm的可变带宽切片弹性光网络中动态多跳多径RMSA和业务量梳理问题,提出了一种算法。通过仿真研究了该算法的性能。仿真结果表明,该算法比现有算法的带宽阻塞率更低。
{"title":"Dynamic multi-hop multipath RMSA and traffic grooming in OFDM-based sliceable elastic optical networks","authors":"Hwa-Chun Lin, Wei-Te Tseng","doi":"10.3233/jhs-222007","DOIUrl":"https://doi.org/10.3233/jhs-222007","url":null,"abstract":"In elastic optical networks (EON), routing, modulation selection, and spectrum assignment (RMSA) is crucial in provisioning connection requests. Multipath RMSA offers a number of benefits including provisioning of ultra-high bandwidth demands and better utilization of fragmented spectrum resource. By Combining with traffic grooming, multipath RMSA and traffic grooming is able to provide better utilization of network resource in provisioning connection requests. Adding multi-hop routing mechanism to multipath RMSA and traffic grooming increases the flexibility for selecting paths resulting in higher probability of successfully finding routing paths for connection requests. Dynamic multipath RMSA problem in EON has been investigated extensively in the literature. Dynamic multi-hop multipath RMSA and traffic grooming problem in EON is far from been well studied. This paper proposes an algorithm for the dynamic multi-hop multipath RMSA and traffic grooming problem in OFDM-based elastic optical networks with sliceable bandwidth-variable transponders. Performance of the proposed algorithm is studied via simulation. Our simulation results show that the proposed algorithm yields lower bandwidth blocking ratio than an existing algorithm.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"13 1","pages":"85-103"},"PeriodicalIF":0.9,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75809843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber security threats in IoT: A review 物联网中的网络安全威胁:综述
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-30 DOI: 10.3233/jhs-222042
Pragati Rana, B. Patil
The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.
物联网(IoT)是最安全的平台,让人类的生活更轻松、更舒适。物联网为各种软件程序做出了巨大贡献。智能设备的迅速普及,以及它们对数据传输和Wi-Fi机制的信任,增加了它们面对网络攻击的脆弱性。因此,网络犯罪的成本每天都在上升。因此,调查物联网安全威胁和可能的对策可以帮助研究人员创建可接受的方法来应对网络犯罪研究中的各种压力场景。物联网框架,以及物联网架构、协议和技术,都涵盖在本评估研究中。还详细介绍了每一层的各种保护问题以及校正策略。此外,本文还讨论了物联网取证在各种领域的网络犯罪调查中的应用,包括网络犯罪研究、人工智能、系统学习、云计算、雾计算和区块链技术都在此讨论中发挥了作用。最后,详细介绍了物联网中一些具有挑战性的开放性研究,以加强网络犯罪调查,为未来的研究提供前沿课程。
{"title":"Cyber security threats in IoT: A review","authors":"Pragati Rana, B. Patil","doi":"10.3233/jhs-222042","DOIUrl":"https://doi.org/10.3233/jhs-222042","url":null,"abstract":"The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"26 1-3","pages":"105-120"},"PeriodicalIF":0.9,"publicationDate":"2023-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72486947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Journal of High Speed Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1