首页 > 最新文献

Journal of High Speed Networks最新文献

英文 中文
A survey of provenance in scientific workflow 科学工作流程中的来源调查
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-02-15 DOI: 10.3233/jhs-222017
Songhai Lin, Hong Xiao, Wenjun Jiang, Dafeng Li, Jiaben Liang, Zelin Li
The automation of data analysis in the form of scientific workflows has become a widely adopted practice in many fields of research. Data-intensive experiments using workflows enabled automation and provenance support, which contribute to alleviating the reproducibility crisis. This paper investigates the existing provenance models as well as scientific workflow applications. Furthermore, here we not only summarize the models at different levels, but also compare the applications, particularly the blockchain applied to the provenance in scientific workflows. After that, a new design of secure provenance system is proposed. Provenance that would be enabled by the emerging technology is also discussed at the end.
科学工作流程形式的数据分析自动化已成为许多研究领域广泛采用的实践。使用工作流的数据密集型实验启用了自动化和来源支持,这有助于减轻可再现性危机。本文研究了现有的种源模型以及科学工作流的应用。此外,在这里我们不仅总结了不同层次的模型,还比较了应用程序,特别是区块链应用于科学工作流程中的出处。在此基础上,提出了一种新的安全溯源系统设计方案。最后还讨论了由新兴技术实现的来源。
{"title":"A survey of provenance in scientific workflow","authors":"Songhai Lin, Hong Xiao, Wenjun Jiang, Dafeng Li, Jiaben Liang, Zelin Li","doi":"10.3233/jhs-222017","DOIUrl":"https://doi.org/10.3233/jhs-222017","url":null,"abstract":"The automation of data analysis in the form of scientific workflows has become a widely adopted practice in many fields of research. Data-intensive experiments using workflows enabled automation and provenance support, which contribute to alleviating the reproducibility crisis. This paper investigates the existing provenance models as well as scientific workflow applications. Furthermore, here we not only summarize the models at different levels, but also compare the applications, particularly the blockchain applied to the provenance in scientific workflows. After that, a new design of secure provenance system is proposed. Provenance that would be enabled by the emerging technology is also discussed at the end.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"129-145"},"PeriodicalIF":0.9,"publicationDate":"2023-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83041735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A high presence traditional crafts experience system that combines multicultural architectural styles with Japanese culture 融合多元文化建筑风格与日本文化的高存在感传统工艺体验体系
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-18 DOI: 10.3233/jhs-222074
Tomoyuki Ishida, Yangzhicheng Lu
Traditional crafts such as tategu (door and window fittings), kimono (clothes), and shikki (lacquerware) are regarded as important items for daily life in Japan; however, in recent years, the industry that manufactures and sells these products has experienced various problems and has continued to decline. Conversely, overseas demand for traditional crafts has been gradually increasing with the increase in foreign visitors to Japan in recent years. For these reasons, there is a need in the traditional crafts industry to provide information and promote traditional crafts to overseas customers. Accordingly, in this study, we implement a high presence traditional crafts experience system using virtual reality technology. Our proposed system provides users with a highly realistic virtual space experience using a head-mounted display and a data glove. In addition, multiple users can share the space via the network. Further, we consider the promotion of traditional crafts to overseas customers by combining multicultural architectural styles and Japanese culture.
在日本,诸如门窗配件、和服、漆器等传统工艺品被视为日常生活的重要物品;然而,近年来,制造和销售这些产品的行业经历了各种问题,并持续下降。相反,随着近年来日本外国游客的增加,海外对传统工艺的需求也在逐渐增加。由于这些原因,传统工艺行业需要向海外客户提供信息和推广传统工艺。因此,在本研究中,我们利用虚拟现实技术实现了一个高现实感的传统手工艺体验系统。我们提出的系统使用头戴式显示器和数据手套为用户提供高度逼真的虚拟空间体验。此外,多个用户可以通过网络共享空间。此外,我们考虑将多元文化的建筑风格与日本文化相结合,向海外客户推广传统工艺。
{"title":"A high presence traditional crafts experience system that combines multicultural architectural styles with Japanese culture","authors":"Tomoyuki Ishida, Yangzhicheng Lu","doi":"10.3233/jhs-222074","DOIUrl":"https://doi.org/10.3233/jhs-222074","url":null,"abstract":"Traditional crafts such as tategu (door and window fittings), kimono (clothes), and shikki (lacquerware) are regarded as important items for daily life in Japan; however, in recent years, the industry that manufactures and sells these products has experienced various problems and has continued to decline. Conversely, overseas demand for traditional crafts has been gradually increasing with the increase in foreign visitors to Japan in recent years. For these reasons, there is a need in the traditional crafts industry to provide information and promote traditional crafts to overseas customers. Accordingly, in this study, we implement a high presence traditional crafts experience system using virtual reality technology. Our proposed system provides users with a highly realistic virtual space experience using a head-mounted display and a data glove. In addition, multiple users can share the space via the network. Further, we consider the promotion of traditional crafts to overseas customers by combining multicultural architectural styles and Japanese culture.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"102 1","pages":"183-196"},"PeriodicalIF":0.9,"publicationDate":"2023-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75632602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge enhancement BERT based on domain dictionary mask 基于域字典掩码的知识增强BERT
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-16 DOI: 10.3233/jhs-222013
Xianglin Cao, Hong Xiao, Wenjun Jiang
Semantic matching is one of the critical technologies for intelligent customer service. Since Bidirectional Encoder Representations from Transformers (BERT) is proposed, fine-tuning on a large-scale pre-training language model becomes a general method to implement text semantic matching. However, in practical application, the accuracy of the BERT model is limited by the quantity of pre-training corpus and proper nouns in the target domain. An enhancement method for knowledge based on domain dictionary to mask input is proposed to solve the problem. Firstly, for modul input, we use keyword matching to recognize and mask the word in domain. Secondly, using self-supervised learning to inject knowledge of the target domain into the BERT model. Thirdly, we fine-tune the BERT model with public datasets LCQMC and BQboost. Finally, we test the model’s performance with a financial company’s user data. The experimental results show that after using our method and BQboost, accuracy increases by 12.12% on average in practical applications.
语义匹配是实现智能客户服务的关键技术之一。自BERT (Bidirectional Encoder Representations from Transformers)提出以来,对大规模预训练语言模型进行微调成为实现文本语义匹配的通用方法。然而,在实际应用中,BERT模型的准确性受到预训练语料库数量和目标领域专有名词数量的限制。针对这一问题,提出了一种基于领域词典的知识增强方法来屏蔽输入。首先,对于模块输入,我们使用关键字匹配来识别和屏蔽域内的单词。其次,利用自监督学习将目标领域的知识注入BERT模型。第三,我们使用公共数据集立法会mc和BQboost对BERT模型进行微调。最后,我们用一家金融公司的用户数据来测试模型的性能。实验结果表明,在实际应用中,我们的方法与BQboost结合使用后,精度平均提高了12.12%。
{"title":"Knowledge enhancement BERT based on domain dictionary mask","authors":"Xianglin Cao, Hong Xiao, Wenjun Jiang","doi":"10.3233/jhs-222013","DOIUrl":"https://doi.org/10.3233/jhs-222013","url":null,"abstract":"Semantic matching is one of the critical technologies for intelligent customer service. Since Bidirectional Encoder Representations from Transformers (BERT) is proposed, fine-tuning on a large-scale pre-training language model becomes a general method to implement text semantic matching. However, in practical application, the accuracy of the BERT model is limited by the quantity of pre-training corpus and proper nouns in the target domain. An enhancement method for knowledge based on domain dictionary to mask input is proposed to solve the problem. Firstly, for modul input, we use keyword matching to recognize and mask the word in domain. Secondly, using self-supervised learning to inject knowledge of the target domain into the BERT model. Thirdly, we fine-tune the BERT model with public datasets LCQMC and BQboost. Finally, we test the model’s performance with a financial company’s user data. The experimental results show that after using our method and BQboost, accuracy increases by 12.12% on average in practical applications.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"9 1","pages":"121-128"},"PeriodicalIF":0.9,"publicationDate":"2023-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75216624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault diagnosis model of multi-axis industrial robot based on triplet network 基于三重网络的多轴工业机器人故障诊断模型
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-22 DOI: 10.3233/jhs-222014
Guangsi Xiong, Ping Li, Hanlin Zeng, Hong Xiao, Wenjun Jiang
Fault diagnosis is an important link in intelligent development of industrial robots. Aiming at the problem of weak fault diagnosis performance caused by insufficient training samples, a fault diagnosis model based on triplet network is proposed. Firstly, we combine the multiscale convolutional neural network (MSCNN) with channel attention networks (squeeze-and-excitation network, SENet), and use it to construct a triple sub-network structure MS-SECNN, which can adaptively extract features from the original fault signal. Then, the feature similarity is calculated by triplet loss in the low dimensional space to realize the fault classification task. The experiments are based on the real industrial robot operation data set. In this model, we use Few-shot learning strategy to test the diagnostic performance under small samples, and compare it with WDCNN, FDCNN and MSCNN models. Experimental results show that the proposed model has more effective fault classification ability under small samples. In addition, when the training sample size is 1400, the average accuracy of MS-SECNN reaches 99.21%.
故障诊断是工业机器人智能化发展的重要环节。针对训练样本不足导致故障诊断性能较弱的问题,提出了一种基于三元网络的故障诊断模型。首先,我们将多尺度卷积神经网络(MSCNN)与通道关注网络(挤压激励网络,SENet)结合,构建了一个能自适应提取原始故障信号特征的三重子网络结构MS-SECNN。然后,在低维空间中利用三元组损失计算特征相似度,实现故障分类任务。实验是基于真实工业机器人操作数据集进行的。在该模型中,我们使用Few-shot学习策略来测试小样本下的诊断性能,并将其与WDCNN、FDCNN和MSCNN模型进行比较。实验结果表明,该模型在小样本情况下具有更有效的故障分类能力。此外,当训练样本量为1400时,MS-SECNN的平均准确率达到99.21%。
{"title":"Fault diagnosis model of multi-axis industrial robot based on triplet network","authors":"Guangsi Xiong, Ping Li, Hanlin Zeng, Hong Xiao, Wenjun Jiang","doi":"10.3233/jhs-222014","DOIUrl":"https://doi.org/10.3233/jhs-222014","url":null,"abstract":"Fault diagnosis is an important link in intelligent development of industrial robots. Aiming at the problem of weak fault diagnosis performance caused by insufficient training samples, a fault diagnosis model based on triplet network is proposed. Firstly, we combine the multiscale convolutional neural network (MSCNN) with channel attention networks (squeeze-and-excitation network, SENet), and use it to construct a triple sub-network structure MS-SECNN, which can adaptively extract features from the original fault signal. Then, the feature similarity is calculated by triplet loss in the low dimensional space to realize the fault classification task. The experiments are based on the real industrial robot operation data set. In this model, we use Few-shot learning strategy to test the diagnostic performance under small samples, and compare it with WDCNN, FDCNN and MSCNN models. Experimental results show that the proposed model has more effective fault classification ability under small samples. In addition, when the training sample size is 1400, the average accuracy of MS-SECNN reaches 99.21%.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"53 1","pages":"75-83"},"PeriodicalIF":0.9,"publicationDate":"2022-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76050976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anti-consensus strategy based on continuous perturbation updates in opposite directions 一种基于相反方向的连续扰动更新的反共识策略
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-06 DOI: 10.3233/jhs-220001
Yujie Xie, Xintong Liang, Yifan Huang, Jian Hou, Yubo Jia
In modern society, multi-agent consensus is applied in many applications such as distributed machine learning, wireless sensor networks and so on. However, some agents might behave abnormally subject to external attack or internal faults, and thus fault-tolerant consensus problem is studied recently, among which Q-consensus is one of the state-of-the-art and effective methods to identify all the faulty agents and achieve consensus for normal agents in general networks. To fight against Q-consensus algorithm, this paper proposes a novel strategy, called split attack, which is simple but capable of breaking consensus convergence. By aggregating all the states of neighboring nodes with an extra perturbation, the normal nodes are split into sub-groups and converge to two separate values, so that consensus is broken. Two scenarios, including the introduction of additional faulty nodes and compromise of the original nodes, are considered. More specifically, in the former case, two additional faulty nodes are adopted, each of which is responsible to mislead parts of the normal nodes. While in the latter one, two original normal nodes are compromised to mislead the whole system. Moreover, the compromised nodes selection is fundamentally a classification problem, and thus optimized through CNN. Finally, the numerical simulations are provided to verify the proposed schemes and indicate that the proposed method outperforms other attack methods.
在现代社会中,多智能体共识被应用于分布式机器学习、无线传感器网络等许多应用中。然而,由于某些智能体可能会受到外部攻击或内部故障的影响而表现异常,因此容错共识问题是近年来研究的热点问题之一,其中Q-consensus是在一般网络中识别所有故障智能体并对正常智能体达成共识的最先进、最有效的方法之一。为了对抗q -共识算法,本文提出了一种新的策略,即分裂攻击,该策略简单但能够破坏共识收敛。通过将相邻节点的所有状态加一个额外的扰动,将正常节点分成子群并收敛到两个独立的值,从而打破共识。考虑了两种情况,包括引入额外的故障节点和破坏原有节点。更具体地说,在前一种情况下,采用了两个额外的故障节点,每个故障节点都负责误导部分正常节点。而在后者中,两个原始正常节点被破坏,从而误导整个系统。此外,折衷节点的选择本质上是一个分类问题,因此通过CNN进行了优化。最后,通过数值仿真验证了所提方案的有效性,表明所提方法优于其他攻击方法。
{"title":"An anti-consensus strategy based on continuous perturbation updates in opposite directions","authors":"Yujie Xie, Xintong Liang, Yifan Huang, Jian Hou, Yubo Jia","doi":"10.3233/jhs-220001","DOIUrl":"https://doi.org/10.3233/jhs-220001","url":null,"abstract":"In modern society, multi-agent consensus is applied in many applications such as distributed machine learning, wireless sensor networks and so on. However, some agents might behave abnormally subject to external attack or internal faults, and thus fault-tolerant consensus problem is studied recently, among which Q-consensus is one of the state-of-the-art and effective methods to identify all the faulty agents and achieve consensus for normal agents in general networks. To fight against Q-consensus algorithm, this paper proposes a novel strategy, called split attack, which is simple but capable of breaking consensus convergence. By aggregating all the states of neighboring nodes with an extra perturbation, the normal nodes are split into sub-groups and converge to two separate values, so that consensus is broken. Two scenarios, including the introduction of additional faulty nodes and compromise of the original nodes, are considered. More specifically, in the former case, two additional faulty nodes are adopted, each of which is responsible to mislead parts of the normal nodes. While in the latter one, two original normal nodes are compromised to mislead the whole system. Moreover, the compromised nodes selection is fundamentally a classification problem, and thus optimized through CNN. Finally, the numerical simulations are provided to verify the proposed schemes and indicate that the proposed method outperforms other attack methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"37 4 1","pages":"15-25"},"PeriodicalIF":0.9,"publicationDate":"2022-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75372886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-aware resource management in Internet of vehicles using machine learning algorithms 基于机器学习算法的车联网能源感知资源管理
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-15 DOI: 10.3233/jhs-222004
Sichao Chen, Yuanchao Hu, Liejiang Huang, Dilong Shen, Yuanjun Pan, Ligang Pan
Internet of Vehicles (IoV) presents a new generation of vehicular communications with limited computation offloading, energy and memory resources with 5G/6G technologies that have grown enormously and are being used in wide variety of Intelligent Transportation Systems (ITS). Due to the limited battery power in smart vehicles, the concept of energy consumption is one of the main and critical challenges of the IoV environments. Optimizing resource management strategies for improving the energy consumption using AI-based methods is one of important solutions in the IoV environments. There are various machine learning algorithms for selecting optimal solutions for energy-efficient resource management strategies. This paper presents the existing energy-aware resource management strategies for the IoV case studies, and performs a comparative analysis among their applied AI-based methods and machine learning algorithms. This analysis presents a technical and deeper understanding of the technical aspects of existing machine learning and AI-based algorithms that will be helpful in design of new hybrid AI approaches for optimizing resource management strategies with reducing their energy consumption.
车联网(IoV)提供了新一代车载通信,具有有限的计算卸载,能源和内存资源,5G/6G技术已经得到了极大的发展,并被广泛用于各种智能交通系统(ITS)。由于智能汽车的电池电量有限,能源消耗的概念是车联网环境的主要和关键挑战之一。利用基于人工智能的方法优化资源管理策略以提高能源消耗是物联网环境下的重要解决方案之一。有各种各样的机器学习算法来选择节能资源管理策略的最佳解决方案。本文介绍了车联网案例研究中现有的能源感知资源管理策略,并对其应用的基于人工智能的方法和机器学习算法进行了比较分析。该分析对现有机器学习和基于人工智能的算法的技术方面进行了技术和更深入的理解,这将有助于设计新的混合人工智能方法,以优化资源管理策略并降低其能耗。
{"title":"Energy-aware resource management in Internet of vehicles using machine learning algorithms","authors":"Sichao Chen, Yuanchao Hu, Liejiang Huang, Dilong Shen, Yuanjun Pan, Ligang Pan","doi":"10.3233/jhs-222004","DOIUrl":"https://doi.org/10.3233/jhs-222004","url":null,"abstract":"Internet of Vehicles (IoV) presents a new generation of vehicular communications with limited computation offloading, energy and memory resources with 5G/6G technologies that have grown enormously and are being used in wide variety of Intelligent Transportation Systems (ITS). Due to the limited battery power in smart vehicles, the concept of energy consumption is one of the main and critical challenges of the IoV environments. Optimizing resource management strategies for improving the energy consumption using AI-based methods is one of important solutions in the IoV environments. There are various machine learning algorithms for selecting optimal solutions for energy-efficient resource management strategies. This paper presents the existing energy-aware resource management strategies for the IoV case studies, and performs a comparative analysis among their applied AI-based methods and machine learning algorithms. This analysis presents a technical and deeper understanding of the technical aspects of existing machine learning and AI-based algorithms that will be helpful in design of new hybrid AI approaches for optimizing resource management strategies with reducing their energy consumption.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"44 1","pages":"27-39"},"PeriodicalIF":0.9,"publicationDate":"2022-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73681372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT 基于CKKS同态加密的医疗物联网安全数据拟合方案
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-08 DOI: 10.3233/jhs-222016
Yunxuan Su, Xu An Wang, Weidong Du, Yunlong Ge, Kaiyang Zhao, M. Lv
With the development of big data technology, medical data has become increasingly important. It not only contains personal privacy information, but also involves medical security issues. This paper proposes a secure data fitting scheme based on CKKS (Cheon-Kim-Kim-Song) homomorphic encryption algorithm for medical IoT. The scheme encrypts the KGGLE-HDP (Heart Disease Prediction) dataset through CKKS homomorphic encryption, calculates the data’s weight and deviation. By using the gradient descent method, it calculates the weight and bias of the data. The experimental results show that under the KAGGLE-HDP dataset,we select the threshold value is 0.7 and the parameter setting is (Poly_modulus_degree, Coeff_mod_bit_sizes, Scale) = (16384; 43, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 43; 23), the number of iteration is 3 and the recognition accuracy of this scheme can achieve 96.7%. The scheme shows that it has a high recognition accuracy and better privacy protection than other data fitting schemes.
随着大数据技术的发展,医疗数据变得越来越重要。它不仅包含个人隐私信息,还涉及医疗安全问题。提出了一种基于CKKS (Cheon-Kim-Kim-Song)同态加密算法的医疗物联网安全数据拟合方案。该方案通过CKKS同态加密对KGGLE-HDP (Heart Disease Prediction)数据集进行加密,计算数据的权值和偏差。采用梯度下降法计算数据的权重和偏置。实验结果表明,在KAGGLE-HDP数据集下,我们选择阈值为0.7,参数设置为(Poly_modulus_degree, Coeff_mod_bit_sizes, Scale) = (16384;43、23、23、23、23、23、23、23、23、23、23、23、23、43;23),迭代次数为3次,该方案的识别准确率可达到96.7%。结果表明,该方案具有较高的识别精度和较好的隐私保护。
{"title":"A secure data fitting scheme based on CKKS homomorphic encryption for medical IoT","authors":"Yunxuan Su, Xu An Wang, Weidong Du, Yunlong Ge, Kaiyang Zhao, M. Lv","doi":"10.3233/jhs-222016","DOIUrl":"https://doi.org/10.3233/jhs-222016","url":null,"abstract":"With the development of big data technology, medical data has become increasingly important. It not only contains personal privacy information, but also involves medical security issues. This paper proposes a secure data fitting scheme based on CKKS (Cheon-Kim-Kim-Song) homomorphic encryption algorithm for medical IoT. The scheme encrypts the KGGLE-HDP (Heart Disease Prediction) dataset through CKKS homomorphic encryption, calculates the data’s weight and deviation. By using the gradient descent method, it calculates the weight and bias of the data. The experimental results show that under the KAGGLE-HDP dataset,we select the threshold value is 0.7 and the parameter setting is (Poly_modulus_degree, Coeff_mod_bit_sizes, Scale) = (16384; 43, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 23, 43; 23), the number of iteration is 3 and the recognition accuracy of this scheme can achieve 96.7%. The scheme shows that it has a high recognition accuracy and better privacy protection than other data fitting schemes.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"7 1","pages":"41-56"},"PeriodicalIF":0.9,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79331393","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks 数据转发:一种新的基于VoteRank和选型性的方法来改善社交网络中的传播时间
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-08 DOI: 10.3233/jhs-220695
Kasra Majbouri Yazdi, Jingyu Hou, Saeid Khodayi, Adel Majbouri Yazdi, Saeed Saedi, Wanlei Zhou
With the rapid development of social networks, studying and analyzing their structures and behaviors has become one of the most important requirements of businesses. Social network analysis can be used for many different purposes such as product ads, market orientation detection, influential members detection, predicting user behaviors, recommender systems improvements, etc. One of the newest research topics in social network analysis is the enhancement of the information propagation performance in different aspects based on application. In this paper, a new method is proposed to improve few metrics such as distribution time and precision on social networks. In this method, the local attributes of nodes and also the structural information of the network is used to forward data across the network and reduce the propagation time. First of all, the centrality and Assortativity are calculated for all nodes separately to select two sets of nodes with the highest values for both criteria. Then, the initial active nodes of the network are selected by calculating the intersection of the two sets. Next, the distribution paths are detected based on the initial active nodes to calculate the propagation time. The performance analysis results show that the proposed method has better outcomes in comparison to other state-of-the-art methods in terms of distribution time, precision, recall, and AUPR criteria.
随着社交网络的快速发展,研究和分析其结构和行为已成为企业最重要的需求之一。社交网络分析可以用于许多不同的目的,如产品广告,市场定位检测,有影响力的成员检测,预测用户行为,推荐系统的改进等。基于应用增强信息在不同方面的传播性能是社会网络分析的最新研究课题之一。本文提出了一种改进社交网络上分发时间和分发精度等指标的新方法。该方法利用节点的局部属性和网络的结构信息在网络中进行数据转发,减少了传播时间。首先,分别计算所有节点的中心性和选型性,以选择两个标准中值最高的两组节点。然后,通过计算两个集合的交集来选择网络的初始活动节点。接下来,根据初始活动节点检测分布路径,计算传播时间。性能分析结果表明,该方法在分布时间、精度、召回率和AUPR标准等方面均优于现有方法。
{"title":"Data forwarding: A new VoteRank and Assortativity based approach to improve propagation time in social networks","authors":"Kasra Majbouri Yazdi, Jingyu Hou, Saeid Khodayi, Adel Majbouri Yazdi, Saeed Saedi, Wanlei Zhou","doi":"10.3233/jhs-220695","DOIUrl":"https://doi.org/10.3233/jhs-220695","url":null,"abstract":"With the rapid development of social networks, studying and analyzing their structures and behaviors has become one of the most important requirements of businesses. Social network analysis can be used for many different purposes such as product ads, market orientation detection, influential members detection, predicting user behaviors, recommender systems improvements, etc. One of the newest research topics in social network analysis is the enhancement of the information propagation performance in different aspects based on application. In this paper, a new method is proposed to improve few metrics such as distribution time and precision on social networks. In this method, the local attributes of nodes and also the structural information of the network is used to forward data across the network and reduce the propagation time. First of all, the centrality and Assortativity are calculated for all nodes separately to select two sets of nodes with the highest values for both criteria. Then, the initial active nodes of the network are selected by calculating the intersection of the two sets. Next, the distribution paths are detected based on the initial active nodes to calculate the propagation time. The performance analysis results show that the proposed method has better outcomes in comparison to other state-of-the-art methods in terms of distribution time, precision, recall, and AUPR criteria.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"207 ","pages":"275-285"},"PeriodicalIF":0.9,"publicationDate":"2022-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72435481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Double Q-learning based routing protocol for opportunistic networks 基于双q学习的机会网络路由协议
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-03 DOI: 10.3233/jhs-222018
Jagdeep Singh, S. K. Dhurandher, I. Woungang, L. Barolli
Opportunistic Delay Tolerant Networks also referred to as Opportunistic Networks (OppNets) are a subset of wireless networks having mobile nodes with discontinuous opportunistic connections. As such, developing a performant routing protocol in such an environment remains a challenge. Most research in the literature have shown that reinforcement learning-based routing algorithms can achieve a good routing performance, but these algorithms suffer from under-estimations and/or over-estimations. Toward addressing these shortcomings, in this paper, a Double Q-learning based routing protocol for Opportunistic Networks framework named Off-Policy Reinforcement-based Adaptive Learning (ORAL) is proposed, which selects the most suitable next-hop node to transmit the message toward its destination without any bias by using a weighted double Q-estimator. In the next-hop selection process, a probability-based reward mechanism is involved, which considers the node’s delivery probability and the frequency of encounters among the nodes to boost the protocol’s efficiency. Simulation results convey that the proposed ORAL protocol improves the message delivery ratio by maintaining a trade-off between underestimation and overestimation. Simulations are conducted using the HAGGLE INFOCOM 2006 real mobility data trace and synthetic model, showing that when time-to-live is varied, (1) the proposed ORAL scheme outperforms DQLR by 14.05%, 9.4%, 5.81% respectively in terms of delivery probability, overhead ratio and average delay; (2) it also outperforms RLPRoPHET by 16.17%, 9.2%, 6.85%, respectively in terms of delivery ratio, overhead ratio and average delay.
机会容忍延迟网络也称为机会网络(OppNets),是无线网络的一个子集,具有不连续的机会连接的移动节点。因此,在这样的环境中开发高性能路由协议仍然是一个挑战。大多数文献研究表明,基于强化学习的路由算法可以获得良好的路由性能,但这些算法存在低估和/或高估的问题。针对这些不足,本文提出了一种基于双q学习的机会网络框架路由协议,即基于离线策略强化的自适应学习(ORAL),该协议使用加权双q估计器选择最合适的下一跳节点将消息无偏差地发送到目的地。在下一跳选择过程中,采用基于概率的奖励机制,考虑节点的投递概率和节点之间的相遇频率,提高协议的效率。仿真结果表明,所提出的ORAL协议通过保持低估和高估之间的平衡来提高消息传递率。利用HAGGLE INFOCOM 2006真实移动数据跟踪和综合模型进行了仿真,结果表明:当生存时间发生变化时,ORAL方案在交付概率、开销比和平均延迟方面分别优于DQLR方案14.05%、9.4%和5.81%;(2)在交付率、开销率和平均延迟方面,RLPRoPHET分别优于RLPRoPHET 16.17%、9.2%、6.85%。
{"title":"Double Q-learning based routing protocol for opportunistic networks","authors":"Jagdeep Singh, S. K. Dhurandher, I. Woungang, L. Barolli","doi":"10.3233/jhs-222018","DOIUrl":"https://doi.org/10.3233/jhs-222018","url":null,"abstract":"Opportunistic Delay Tolerant Networks also referred to as Opportunistic Networks (OppNets) are a subset of wireless networks having mobile nodes with discontinuous opportunistic connections. As such, developing a performant routing protocol in such an environment remains a challenge. Most research in the literature have shown that reinforcement learning-based routing algorithms can achieve a good routing performance, but these algorithms suffer from under-estimations and/or over-estimations. Toward addressing these shortcomings, in this paper, a Double Q-learning based routing protocol for Opportunistic Networks framework named Off-Policy Reinforcement-based Adaptive Learning (ORAL) is proposed, which selects the most suitable next-hop node to transmit the message toward its destination without any bias by using a weighted double Q-estimator. In the next-hop selection process, a probability-based reward mechanism is involved, which considers the node’s delivery probability and the frequency of encounters among the nodes to boost the protocol’s efficiency. Simulation results convey that the proposed ORAL protocol improves the message delivery ratio by maintaining a trade-off between underestimation and overestimation. Simulations are conducted using the HAGGLE INFOCOM 2006 real mobility data trace and synthetic model, showing that when time-to-live is varied, (1) the proposed ORAL scheme outperforms DQLR by 14.05%, 9.4%, 5.81% respectively in terms of delivery probability, overhead ratio and average delay; (2) it also outperforms RLPRoPHET by 16.17%, 9.2%, 6.85%, respectively in terms of delivery ratio, overhead ratio and average delay.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"15 1","pages":"1-14"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87399989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Performance evaluation of contact-time based and adaptive-timer based message suppression methods for inter-vehicle communication in vehicular DTN 车载DTN中基于接触时间和自适应定时器的信息抑制方法性能评价
IF 0.9 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-11-03 DOI: 10.3233/jhs-222071
Makoto Ikeda
In the next generation wireless networks, the number of connected terminals to the network, communication protocols, and the channels available will be increased, thus network slicing will become more important. Also, vehicles, buses, trains and motorcycles are considered communication terminals. These communication terminals should have independent network management considering their movement such as joining and leaving the networks. Therefore, Delay-Disruption-Disconnection Tolerant Networking (DTN) has been attracting attention for their potential support of inter-vehicle communication. In this paper are presented the Contact-Time (CT) based and Adaptive-Timer (AT) based Message Suppression (MS) methods for Vehicular DTN. For the CT-based MS method are used three DTN protocols for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. For AT-based MS are used conventional Epidemic and two proposed Epidemic-based methods for V2V communication. We compare MS method, Message Suppression Controller (MSC) and MSC with Adaptive Threshold (MSC-ATh). The simulation results show that MSC-ATh performs better than other approaches. The storage consumption is improved when the number of vehicles increases and there is no reduction in PDR even if the message suppression is enabled. For Epidemic, when the number of Road-Side Units (RSUs) is 16, the results of PDR are the best compared with other DTN protocols. The MSC-ATh method is about 22% better than Epidemic for storage consumption. Also, the delay performance of MSC-ATh is improved by increasing the Suppression Coefficients (SCs) and number of vehicles.
在下一代无线网络中,连接到网络的终端数量、通信协议和可用信道将会增加,因此网络切片将变得更加重要。此外,汽车、公共汽车、火车和摩托车也被视为通信终端。考虑到这些通信终端的入网、退网等活动,应该有独立的网络管理。因此,容忍延迟中断断开网络(Delay-Disruption-Disconnection tolerance Networking, DTN)因其对车辆间通信的潜在支持而备受关注。提出了基于接触时间(CT)和基于自适应定时器(AT)的车载DTN信息抑制方法。对于基于ct的MS方法,采用三种DTN协议进行车对车(V2V)和车对基础设施(V2I)通信。对于基于at的MS,分别采用了传统的Epidemic和两种基于Epidemic的V2V通信方法。我们比较了MS方法、消息抑制控制器(MSC)和带有自适应阈值的MSC (MSC- ath)。仿真结果表明,MSC-ATh算法的性能优于其他算法。当车辆数量增加时,存储消耗会得到改善,即使启用了消息抑制,PDR也不会减少。对于Epidemic,当Road-Side Units (rsu)的数量为16时,PDR与其他DTN协议相比效果最好。MSC-ATh法在存储消耗方面比Epidemic法高22%左右。同时,通过增加抑制系数(sc)和车辆数量,提高了MSC-ATh的延迟性能。
{"title":"Performance evaluation of contact-time based and adaptive-timer based message suppression methods for inter-vehicle communication in vehicular DTN","authors":"Makoto Ikeda","doi":"10.3233/jhs-222071","DOIUrl":"https://doi.org/10.3233/jhs-222071","url":null,"abstract":"In the next generation wireless networks, the number of connected terminals to the network, communication protocols, and the channels available will be increased, thus network slicing will become more important. Also, vehicles, buses, trains and motorcycles are considered communication terminals. These communication terminals should have independent network management considering their movement such as joining and leaving the networks. Therefore, Delay-Disruption-Disconnection Tolerant Networking (DTN) has been attracting attention for their potential support of inter-vehicle communication. In this paper are presented the Contact-Time (CT) based and Adaptive-Timer (AT) based Message Suppression (MS) methods for Vehicular DTN. For the CT-based MS method are used three DTN protocols for Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication. For AT-based MS are used conventional Epidemic and two proposed Epidemic-based methods for V2V communication. We compare MS method, Message Suppression Controller (MSC) and MSC with Adaptive Threshold (MSC-ATh). The simulation results show that MSC-ATh performs better than other approaches. The storage consumption is improved when the number of vehicles increases and there is no reduction in PDR even if the message suppression is enabled. For Epidemic, when the number of Road-Side Units (RSUs) is 16, the results of PDR are the best compared with other DTN protocols. The MSC-ATh method is about 22% better than Epidemic for storage consumption. Also, the delay performance of MSC-ATh is improved by increasing the Suppression Coefficients (SCs) and number of vehicles.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"57-73"},"PeriodicalIF":0.9,"publicationDate":"2022-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81083158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of High Speed Networks
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1