{"title":"Multi-sensor based strategy learning with deep reinforcement learning for unmanned ground vehicle","authors":"Mingyu Luo","doi":"10.1016/j.ijin.2023.11.003","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.11.003","url":null,"abstract":"<div><p>As intelligent Unmanned Ground Vehicles (UGVs) find broader applications in areas such as transportation and logistics. The fusion of multiple sensors becomes crucial, since it not only amplifies UGV perception in dynamic scenarios but also underpins their autonomous decision-making capabilities. However, many existing methods only focus on single-sensor data, overlooking the multi-sensor data integration, thereby limiting UGV's scalability and adaptability. In this paper, we introduce the Multi-Sensor Collaborative Decision Network (MSCDN) for autonomous multi-sensor fusion policy learning designed specifically for UGVs. MSCDN is dedicated to integrate the data collected by multi-sensors in simulation environment and can be migrate to real environment. Firstly, a simulation environment mirroring real environment is created, using a framework that transfers UGV decision-making from simulated to real environment with deep reinforcement learning. Secondly, MSCDN uses a multi-sensor attention fusion network to adaptively integrate sensor data, refining UGV responses in dynamic settings. Thirdly, MSCDN's efficacy is tested on both simulated and real UGV lane-keeping tasks, showcasing its superior performance in comparative experiments. Compared to baseline methods, MSCDN reduces training steps and achieves a 35.71 % higher success rate and a 37.5 % quicker task completion time, underlining its proficient multi-sensor data fusion capability.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 325-336"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603023000313/pdfft?md5=9c8a157d9e98af6d41e1960b517981c8&pid=1-s2.0-S2666603023000313-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138549109","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhance cloud security and effectiveness using improved RSA-based RBAC with XACML technique","authors":"A. Kousalya , Nam-kyun Baik","doi":"10.1016/j.ijin.2023.03.003","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.03.003","url":null,"abstract":"<div><p>In the current era, numerous products are accessible online from anywhere and every minute. This work used encryption with access management because authenticities, anonymity, and security over accessibility are mandatory. The proposed design introduced a significantly better encryption strategy to ensure better protection of overall resource admissions. This proposed work uses Improved RSA-based role-based access control (RBAC) with extendable access connectivity markup language (XACML) to encrypt information and maintain privileges. This approach enables storing information within the online computer using cryptographic ideas and information available via a basic admission management mechanism. To ensure the overall protection of sensitive information, the encryption method is employed that merged the conventional homogeneous encryption procedure with unstable information distribution method. This hybrid technique provides user to get advantage from retrieved information in a protected manner. The overall execution of proposed work is considerably quicker than other existing encryption methods.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 62-67"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kwok Tai Chui , Brij B. Gupta , Priyanka Chaurasia , Varsha Arya , Ammar Almomani , Wadee Alhalabi
{"title":"Three-stage data generation algorithm for multiclass network intrusion detection with highly imbalanced dataset","authors":"Kwok Tai Chui , Brij B. Gupta , Priyanka Chaurasia , Varsha Arya , Ammar Almomani , Wadee Alhalabi","doi":"10.1016/j.ijin.2023.08.001","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.08.001","url":null,"abstract":"<div><p>The Internet plays a crucial role in our daily routines. Ensuring cybersecurity to Internet users will provide a safe online environment. Automatic network intrusion detection (NID) using machine learning algorithms has recently received increased attention recently. The NID model is prone to bias towards the classes with more training samples due to highly imbalanced datasets across different types of attacks. The challenge in generating additional training data for minority classes is the generation of insufficient data. The study's purpose is to address this challenge, which extends the data generation ability by proposing a three-stage data generation algorithm using the synthetic minority over-sampling technique, a generative adversarial network (GAN), and a variational autoencoder. A convolutional neural network is employed to extract the representative features from the data, which were fed into a support vector machine with a customised kernel function. An ablation study evaluated the effectiveness of the three-stage data generation, feature extraction, and customised kernel. This was followed by a performance comparison between our study and existing studies. The findings revealed that the proposed NID model achieved an accuracy of 91.9%–96.2% in the four benchmark datasets. In addition, it outperformed existing methods such as GAN-based deep neural networks, conditional Wasserstein GAN-based stacked autoencoder, synthesised minority oversampling technique-based random forest, and variational autoencoder-based deep neural network, by 1.51%–28.4%.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 202-210"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Marketing data security and privacy protection based on federated gamma in cloud computing environment","authors":"Caixia Zhang , Zijian Pan , Chaofan Hou","doi":"10.1016/j.ijin.2023.09.003","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.09.003","url":null,"abstract":"<div><p>This study aims to address the existing data security and user privacy vulnerabilities in the “cloud” environment, which is essential for ensuring the safety and integrity of data in the era of big data and cloud computing. To achieve this purpose, we propose a novel approach that combines the logit link function with a longitudinal joint learning framework for the gamma regression model. This approach enhances the application of the model and the loss function, providing a robust solution for data security and user privacy in cloud-based systems. While cloud computing technology has greatly improved the convenience of work and life, it has also introduced significant challenges related to data security and user privacy. This study leverages semantic web technology and blockchain technology to establish a distributed and credit-guaranteed product quality and safety traceability application. By designing a concept verification system and ensuring data integrity at each stage of the product supply chain, this approach addresses these challenges effectively. The distributed network architecture employed in our technical design ensures overall system stability, reliability, and sustainability, with no single point of failure.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 261-271"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A systematic review of decentralized finance protocols","authors":"Kaushal Shah , Dhruvil Lathiya , Naimish Lukhi , Keyur Parmar , Harshal Sanghvi","doi":"10.1016/j.ijin.2023.07.002","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.07.002","url":null,"abstract":"<div><p>Decentralized finance (DeFi) has revolutionized the financial industry in recent years. Industries such as banking, insurance, and investment are experiencing a significant shift due to the growth of DeFi. The decentralized finance market is expanding exponentially, emphasizing the potential of digital currencies and decentralized platforms in providing an alternative to the traditional finance paradigm. It eliminates the need for costly intermediaries, reduces transaction fees, and increases accessibility to financial services for everyone, regardless of their geographic location or economic status. With the enormous increase in cryptocurrency investment, individuals and institutions have started to use DeFi. In this context, understanding the architecture and working mechanisms of different DeFi protocols becomes crucial in creating new and innovative products. This review paper explores various DeFi protocols, including derivatives, decentralized exchanges (DEX), lending and borrowing, asset management, and stablecoins. It analyses their internal structure and composability, providing insights into how these protocols can be combined to create new and innovative DeFi products and explore the potential of DeFi in providing an alternative to the traditional finance paradigm.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 171-181"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hierarchical energy efficient secure routing protocol for optimal route selection in wireless body area networks","authors":"A. Roshini, K.V.D. Kiran","doi":"10.1016/j.ijin.2022.11.006","DOIUrl":"https://doi.org/10.1016/j.ijin.2022.11.006","url":null,"abstract":"<div><p>Growth in technology has witnessed the comfort of an individual in domestic and professional life. Although, such existence was not able to meet the medical emergencies during the pandemic COVID-19 and during other health monitoring scenarios. This demand is due to the untouched Quality of Service network parameters like throughput, reliability, security etc. Hence, remote health monitoring systems for the patients who have undergone a medical surgery, bed ridden patients, autism affected subjects etc is in need that considers postural change and then forward to the caretaker in hospitals through wireless body area networks (WBAN). Security in these data are very important as it deals with the life of a subject. In this work, a Hierarchical Energy Efficient Secure Routing protocol (HEESR) is proposed that categorizes the deployed body nodes in to direct node and relay node based on the threshold vale. Unlike other conventional protocols the cluster head selection is based on the energy levels and the traffic priority data like critical and non-critical data, followed by an optimal route to forward the acquired data is identified and the data is compressed using Huffman encoding technique and encrypted using asymmetric cryptographic algorithm for secure data transmission. This protocol mainly appends security and routing efficiency in a hierarchical pattern through data prioritization and out performs the other conventional routing protocols by yielding a better energy consumption of 6%, throughput 92% and security of 93%, which has balanced the packet drop rate considerably and deliver the data within the stipulated time period.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 19-28"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on the impact of artificial intelligence-based e-commerce personalization on traditional accounting methods","authors":"Pan Cao","doi":"10.1016/j.ijin.2023.07.004","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.07.004","url":null,"abstract":"<div><p>With the development of artificial intelligence technology in various fields, the traditional accounting method is no longer applicable to the personalized development of e-commerce industry; Therefore, it is essential to improve the accounting method and construct a personalized recommendation model for e-commerce. Based on this background, this study firstly reconstructs the steps of accounting element recognition in the traditional accounting system and constructs an automated accounting recognition mechanism using BP neural network algorithm, aiming to improve the accuracy and efficiency of accounting element recognition; Secondly, a personalized e-commerce recommendation model based on multiple intelligence is built, which uses intelligent Q-learning algorithm to optimize the recommendation module, aiming to improve the accuracy of personalized recommendation. By comparing the performance of different accounting models under different personalized e-commerce systems, the accounting model proposed in this paper can predict the accounting entries well under the three-layer BP neural network, and the error between the maximum predicted value and the actual value is 0.23%. The recommendation model proposed in the study outperforms the traditional recommendation model and the recommendation model under collaborative filtering algorithm in predicting customers' personal preferences, whose predicted value is closer to the real situation. In summary, both the accounting method and the personalized recommendation model for e-commerce proposed in this study can achieve better application results, thus providing a new idea for the development of the e-commerce industry.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 193-201"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dechuan Chen , Jin Li , Jianwei Hu , Xingang Zhang , Shuai Zhang
{"title":"Secure short-packet communications using a full-duplex receiver","authors":"Dechuan Chen , Jin Li , Jianwei Hu , Xingang Zhang , Shuai Zhang","doi":"10.1016/j.ijin.2023.11.004","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.11.004","url":null,"abstract":"<div><p>In this work, we consider the physical layer security in short-packet communications, where a full-duplex (FD) receiver receives information signals from a source while generating artificial noise (AN) to confuse an eavesdropper. Taking into account the finite blocklength coding and the self-interference (SI) in FD mode, we derive new approximation closed-form expression for the secrecy throughput. Moreover, we analyze the asymptotic secrecy throughput in two distinct scenarios, i.e., high signal-to-noise ratio (SNR) regime and infinite blocklength coding, to gain more insights. Our examination illustrates the correctness of our expressions and shows how the critical system variables affect the secrecy throughput.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 349-354"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666603023000325/pdfft?md5=32f343bd6b882324238bf3c98be45c75&pid=1-s2.0-S2666603023000325-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138564396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quadratic ensemble weighted emphasis boosting based energy and bandwidth efficient routing in Underwater Sensor Network","authors":"O. Vidhya, S. Ranjitha Kumari","doi":"10.1016/j.ijin.2023.05.001","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.05.001","url":null,"abstract":"<div><p>Underwater Sensor Network (UWSN) is a network that comprises a large number of independent underwater sensor nodes to perform monitoring tasks over a given area. UWSN minimized propagation delay, bandwidth, and packet loss. However, the implementation of efficient communication is a significant problem at UWSN. Therefore, Energy and Bandwidth-aware Quadratic Ensemble Weighted Emphasis Boosting Classification (EB-QEWEBC) method for performing energy-efficient routing in UWSN is proposed. Initially, different numbers of underwater sensor nodes are considered as input. Next, the bandwidth and energy consumption of every underwater sensor node is measured. After that, classification between underwater sensor nodes is made by considering energy and bandwidth as factors using Regularized Quadratic Classifier (i.e., weak classifier) for performing routing with minimum delay. Followed by, Weighted Emphasis Boosting is utilized to ensemble weak learners to form strong learners for improving data routing performance results with the biconvex combination. Finally, after classifying the node, data packets are sent to higher energy and bandwidth-efficient underwater sensor nodes. The classification process is carried out at every underwater sensor node for transmitting data packets to the sink node with minimum delay. This method determines the energy-efficient data communication through classification and boosting to reduce the misclassification rate. Experimental results EB-QEWEBC shows a minimization of 14%, 21%, 26%, and 54% in terms of bandwidth, energy consumption, end-to-end delay, and misclassification rate as compared to state-of-art-methods respectively.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 130-139"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PARouting: Prediction-supported adaptive routing protocol for FANETs with deep reinforcement learning","authors":"Cunzhuang Liu , Yixuan Wang , Qi Wang","doi":"10.1016/j.ijin.2023.05.002","DOIUrl":"https://doi.org/10.1016/j.ijin.2023.05.002","url":null,"abstract":"<div><p>Flying Ad-hoc Networks (FANETs) are becoming increasingly popular for various applications. Effective routing protocols for FANETs are essential yet challenging due to the high dynamic nature of Unmanned Aerial Vehicles (UAVs). Most existing routing protocols require the periodic broadcast of Hello packets to maintain neighbor tables that store the locations of neighbors, mobility patterns, etc. However, the frequent exchange of Hello packets leads to a large routing overhead in FANETs. This paper proposes PARouting, a prediction-supported adaptive routing protocol with Deep Reinforcement Learning, which introduces a novel UAV mobility prediction algorithm using Deep Learning (DL-UMP) to estimate the locations of UAVs. Based on DL-UMP, we design an adaptive Hello packet mechanism to realize on-demand broadcasting of Hello packets, which reduces routing overhead. The routing process is formulated as a Partially Observable Markov Decision Process, and a new Q-network structure is proposed to select the optimal next hop. Simulation results confirm the accuracy of the DL-UMP and show that PARouting outperforms benchmark routing protocols in terms of packet delivery rate, end-to-end delay, and routing overhead.</p></div>","PeriodicalId":100702,"journal":{"name":"International Journal of Intelligent Networks","volume":"4 ","pages":"Pages 113-121"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50194627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}