Internet Technology Letters最新文献

筛选
英文 中文
Enhancing Cross-Domain Book Classification Through Caching-Enabled Networks and Transformer Technology 通过启用缓存的网络和变压器技术增强跨域图书分类
IF 0.9
Internet Technology Letters Pub Date : 2024-10-10 DOI: 10.1002/itl2.590
Qiang Li, Huaiyuan Zheng, Yulai Bao, Side Liu
{"title":"Enhancing Cross-Domain Book Classification Through Caching-Enabled Networks and Transformer Technology","authors":"Qiang Li,&nbsp;Huaiyuan Zheng,&nbsp;Yulai Bao,&nbsp;Side Liu","doi":"10.1002/itl2.590","DOIUrl":"https://doi.org/10.1002/itl2.590","url":null,"abstract":"<div>\u0000 \u0000 <p>Book classification is a crucial task for libraries and a fundamental aspect of their service offerings. Cross-domain book classification, in particular, presents significant challenges due to the diversity and complexity of content across different genres and subjects. To tackle these challenges, a user-oriented strategy employing Transformer network (TN) is developed to fulfill the need for superior content quality and classification. Our proposed method leverages the self-attention mechanism of TN for precise feature extraction and classification, combining it with principal component analysis to ensure a comprehensive understanding of book content. This integration represents a technical innovation that enhances the model's ability to handle diverse datasets with improved accuracy and robustness. Our approach merges TN with caching-enabled networks (CEN) to enhance accuracy and robustness. Driven by the necessity for improved cross-domain classification, our strategy aims to standardize book classifications, thus improving user satisfaction. The primary actions encompass improved classification management, feedback systems, and evaluation frameworks. This work highlights the innovative fusion of TN and CEN, showcasing how these advanced techniques can significantly elevate the performance of library classification systems. Our work demonstrates that high-quality book classification can significantly improve library services and user experience. Furthermore, it aligns with the broader applications of CEN in emerging networking technologies, showing the potential for cutting-edge techniques to revolutionize library services.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PIoT-oriented multi-target recognition of substation infrared images driven by deep learning 基于深度学习的变电站红外图像面向piot的多目标识别
IF 0.9
Internet Technology Letters Pub Date : 2024-10-03 DOI: 10.1002/itl2.573
Min Li, Tou Li, Xuan Zhang, Wei Zhang
{"title":"PIoT-oriented multi-target recognition of substation infrared images driven by deep learning","authors":"Min Li,&nbsp;Tou Li,&nbsp;Xuan Zhang,&nbsp;Wei Zhang","doi":"10.1002/itl2.573","DOIUrl":"https://doi.org/10.1002/itl2.573","url":null,"abstract":"<p>Substation infrared imaging plays a crucial role in condition monitoring and fault detection of Power Internet of Things (PIoT). However, the accurate and efficient recognition of multiple targets in substation infrared images remains a challenging task. This paper proposes a deep learning-based multi-target recognition framework for substation infrared images in PIoT. This paper presents a method for recognizing various electrical equipment in infrared images of substations using a faster region-based convolutional neural network (Faster RCNN). The optimization of Faster RCNN includes class rectification inspired by non-maximum suppression (NMS), enabling the correction of misclassified equipment parts and enhancing recognition accuracy. The approach combines NMS and class rectification to retain region proposals with optimal recognition performance. Experimental results demonstrate the effectiveness of the proposed method in improving the recognition accuracy of electrical equipment in infrared images.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IQL-OCDA: An intelligent Q-learning-based for optimal clustering and data-aggregation for wireless sensor networks IQL-OCDA:一种基于智能q学习的无线传感器网络最优聚类和数据聚合方法
IF 0.9
Internet Technology Letters Pub Date : 2024-10-03 DOI: 10.1002/itl2.572
Arwa N. Aledaily
{"title":"IQL-OCDA: An intelligent Q-learning-based for optimal clustering and data-aggregation for wireless sensor networks","authors":"Arwa N. Aledaily","doi":"10.1002/itl2.572","DOIUrl":"https://doi.org/10.1002/itl2.572","url":null,"abstract":"<p>Wireless sensor networks (WSNs) can suffer from low battery life due to the energy consumption of the routing protocol. Small sensor nodes are often difficult to recharge after deployment. In a WSN, data aggregation is generally used to reduce or eliminate data redundancy between nodes in order to save energy. In the proposed algorithm, sensor nodes are deployed in appropriate clusters and cluster heads are elected using Q-learning techniques. Nodes are clustered based on the mean values computed during the clustering phase. Lastly, a performance evaluation and comparison of existing clustering algorithms are performed based on Intelligent Q-learning. The proposed IQL-OCDA model reduces end-to-end delay by 10.11%, increases throughput by 4.15%, and increases network lifetime by 5.1%.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143726782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparative analysis of diversity combining techniques for repetitive transmissions in time spreading SCMA systems 时扩SCMA系统中重复传输分集组合技术的比较分析
IF 0.9
Internet Technology Letters Pub Date : 2024-09-23 DOI: 10.1002/itl2.585
Oguz Ülgen, Tolga Kagan Tüfekci, Yalcin Sadi, Serhat Erkücük, Alagan Anpalagan, Tuncer Baykas
{"title":"A comparative analysis of diversity combining techniques for repetitive transmissions in time spreading SCMA systems","authors":"Oguz Ülgen,&nbsp;Tolga Kagan Tüfekci,&nbsp;Yalcin Sadi,&nbsp;Serhat Erkücük,&nbsp;Alagan Anpalagan,&nbsp;Tuncer Baykas","doi":"10.1002/itl2.585","DOIUrl":"https://doi.org/10.1002/itl2.585","url":null,"abstract":"<p>Sparse Code Multiple Access (SCMA) is a recently introduced wireless communication network technology. There are various techniques in SCMA systems to increase the system's efficiency, and one of these techniques is time spreading. By adding repetitive transmission and time spreading into SCMA, it is shown in previous works that the Bit-Error-Rate (BER) results are improved convincingly. However, in the previous works, other diversity combining techniques have not been considered. This paper introduces a new approach to further improve the performance of repetitive transmission in SCMA systems with time spreading by adding imperialist competitive algorithm in diversity combining. Alongside, four different combining techniques; equal gain combining, maximal ratio combining, selection combining, and genetic algorithm are considered to bring comparative analysis to show the significance of the new technique. Results show that the proposed method offers up to 2.3 dB gain in terms of BER, under certain conditions.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LINGPASS: An approach for multilingual passphrase generation by integrating English and Tamil LINGPASS:通过整合英语和泰米尔语生成多语言密码短语的方法
IF 0.9
Internet Technology Letters Pub Date : 2024-09-15 DOI: 10.1002/itl2.580
G. Balayogi, K. S. Kuppusamy
{"title":"LINGPASS: An approach for multilingual passphrase generation by integrating English and Tamil","authors":"G. Balayogi,&nbsp;K. S. Kuppusamy","doi":"10.1002/itl2.580","DOIUrl":"https://doi.org/10.1002/itl2.580","url":null,"abstract":"<p>In today's world of ever-increasing cyber threats, safeguarding digital accounts is paramount. Traditional passwords are often vulnerable to brute force attacks and can be easily guessed, leading to a shift towards passphrases. However, using monolingual passphrases can pose several challenges, such as lack of diversity, predictability, memorability, and accessibility. To address this issue, this paper presents a model called LINGPASS, short for Language INtegrated Graph-based PASSphrase, which generates multilingual passphrases by combining English and Tamil languages. The proposed approach is implemented as a web application for user convenience, and the entropy of the passphrase is evaluated using Shannon entropy. The LINGPASS model generates higher entropy passphrases than existing multilingual passphrase generators, increasing the security of digital accounts. By integrating two languages, LINGPASS increases the entropy of the passphrase by approximately 72%, making it less vulnerable to dictionary attacks. Additionally, the copy/paste functionality reduces typing errors, making it more user-friendly.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Vulnerability mining method of SOAP based on black-box fuzzing 基于黑盒模糊的SOAP漏洞挖掘方法
IF 0.9
Internet Technology Letters Pub Date : 2024-09-11 DOI: 10.1002/itl2.553
Senyang Ding, Xianghua Xu
{"title":"Vulnerability mining method of SOAP based on black-box fuzzing","authors":"Senyang Ding,&nbsp;Xianghua Xu","doi":"10.1002/itl2.553","DOIUrl":"https://doi.org/10.1002/itl2.553","url":null,"abstract":"<p>In the span of over two decades since the dawn of the twenty-first century, global Internet of Things security incidents have continued to break out. Currently, there remains no vulnerability mining method that can be seamlessly adapted to diverse test scenarios. In this paper, we proposed a simple object access protocol (SOAP) analysis and vulnerability detection method based on black-box fuzzing, which is used to extract more information from the limited SOAP traffic and explore the vulnerabilities of some Internet of Things devices that communicate through SOAP or advanced protocols based on SOAP. We transformed SOAP protocol packets into abstract syntax trees (AST), using a more granular approach to extract the production and guide the mutation. Based on this algorithm, we propose an automatic black-box fuzzer, termed SOAPFuzzer. When testing real camera devices from various manufacturers, 0-day vulnerabilities were successfully found on different devices. At present, 0-day vulnerabilities have been reported to the China National Vulnerability Database (CNVD), and vulnerability number CNVD-2023-43 801 and original vulnerability certificates have been obtained. In terms of packet reception rate, SOAPFuzzer is 10.7% and 12.4% higher than the current popular black-box Fuzzer Boofuzz on the two camera devices, respectively.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of a mix network with elliptic curve cryptography and XOR shuffling for secure communication with 5-node 基于椭圆曲线加密和异或变换的5节点安全通信混合网络设计
IF 0.9
Internet Technology Letters Pub Date : 2024-09-08 DOI: 10.1002/itl2.578
Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad
{"title":"Design of a mix network with elliptic curve cryptography and XOR shuffling for secure communication with 5-node","authors":"Fayaz Ahmad Naikoo,&nbsp;Khaleel Ahmad,&nbsp;Khairol Amali Bin Ahmad","doi":"10.1002/itl2.578","DOIUrl":"https://doi.org/10.1002/itl2.578","url":null,"abstract":"<p>This research paper proposes a novel 5-node mix network, an anonymous communication network to boost privacy within the network. Within the proposed framework the crypto-operations like encryption, decryption, and shuffling are held with the help of the Elliptic Curve Cryptography (ECC) and XOR algorithm. This unique combination helps to exchange the message within the communication network with enhanced security and privacy. To analyze the processing time and load factor at each intermediate node of mix network, an exhaustive experimental analysis is carried out for key sizes of 256, 384, and 512 bits respectively. These crypto-operations like encryption, decryption, and XOR shuffling need varying time slots to perform at each intermediate node thereby having a varying load factor associated with them. The objective of this research is to analyze the processing time and load factor at each node within the 5-node mix network thereby helping to analyze the strengths and weaknesses of each intermediate node. Through our analysis, these percentages are computed, shedding light on the allocation of computational load and resource utilization among the nodes.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G-based video summarization: An analysis from a methodological point of view 基于5g的视频摘要:从方法论的角度分析
IF 0.9
Internet Technology Letters Pub Date : 2024-09-02 DOI: 10.1002/itl2.576
Asha Prashant Sathe, P. Jeyanthi
{"title":"5G-based video summarization: An analysis from a methodological point of view","authors":"Asha Prashant Sathe,&nbsp;P. Jeyanthi","doi":"10.1002/itl2.576","DOIUrl":"https://doi.org/10.1002/itl2.576","url":null,"abstract":"<p>Surveillance is one of the fast-growing applications used for monitoring and watching people, objects, or the environment to collect information and provide security. The surveillance data is in video form, and analyzing large video is challenging because it is essential to do efficient video streaming online. Video summarization comprises selecting, extracting, and aggregating keyframes for creating a synopsis, which is challenging. Though several methods have been proposed for video summarization, most are inconsistent, poor in processing and delivering video content, and do not focus on solving the root problems interlinked with efficient streaming. Thus, video streaming applications require an efficient video summarization model that can overcome existing issues and challenges and improve the overall quality of service integrated with the advanced technology of 5G. This paper has aimed to discuss various methods, approaches, and technologies used for video summarization to design a better model. It also presents various learning models and a taxonomy of available methods and provides a detailed review. The summary of the model used evaluates its outcome and the existing methods for potential future research works. The proposed approach is compared with existing ones to prove the model's efficiency. The result shows that the proposed model achieved a 62.3 and 52.3 F1 score summarizing the TVSum and SumMe datasets, respectively.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear budget management in internet of things and 6G network environments: Linear regression and time series analysis 物联网和6G网络环境下的线性预算管理:线性回归和时间序列分析
IF 0.9
Internet Technology Letters Pub Date : 2024-08-30 DOI: 10.1002/itl2.579
Jing Long
{"title":"Linear budget management in internet of things and 6G network environments: Linear regression and time series analysis","authors":"Jing Long","doi":"10.1002/itl2.579","DOIUrl":"https://doi.org/10.1002/itl2.579","url":null,"abstract":"<p>Budget, as an important component of management accounting, is an effective means for companies to achieve functions such as planning, coordination, and control. It is a bridge and link connecting different units and departments within the company and economic operations. However, current budget management pays less attention to temporal characteristics, leading to budget ambiguity. Taking Company A as an example, the long short-term memory (LSTM) algorithm was used to collect and process historical data and predict its future budget and revenue situation. It was found that the budget management of Company A was relatively chaotic, with insufficient investor information, and the predicted results were close to the actual situation, proving the effectiveness of the model proposed in this paper.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced synthetic generation of channel state information for millimeter-wave networks in 5G communication systems 5G通信系统中毫米波网络信道状态信息的增强合成生成
IF 0.9
Internet Technology Letters Pub Date : 2024-08-30 DOI: 10.1002/itl2.577
K. C. Sriharipriya, J. Christopher Clement, Gerardine Immaculate Mary, Chandrasekharan Natraj, R. Tharun Kumar, R. Gokul
{"title":"Enhanced synthetic generation of channel state information for millimeter-wave networks in 5G communication systems","authors":"K. C. Sriharipriya,&nbsp;J. Christopher Clement,&nbsp;Gerardine Immaculate Mary,&nbsp;Chandrasekharan Natraj,&nbsp;R. Tharun Kumar,&nbsp;R. Gokul","doi":"10.1002/itl2.577","DOIUrl":"https://doi.org/10.1002/itl2.577","url":null,"abstract":"<p>In 5G communication systems, millimeter-wave networks are pivotal, relying heavily on Channel State Information (CSI) for effective user-to-base station (BS) transmission. However, the acquisition of genuine CSI data remains a hurdle, often due to the expenses associated with simulations or physical experiments. This paper introduces an innovative method for generating artificial CSI data from real datasets, aiming to closely replicate authentic CSI samples. The procedure begins with an initial clustering analysis, followed using Principal Component Analysis and Uniform Manifold Approximation and Projection to reduce dimensionality. Then, the data distributions are transformed into multivariate normal distributions using Probability Integral Transformations (PIT). For data synthesis, Multilayer Perceptron based regression models are utilized, followed by inverse PIT transformations to return the data to its original space. Our method is compared against KDE-based algorithms, demonstrating superior fidelity in reproducing real CSI samples. Additionally, we stress the importance of capturing CSI correlations among different BSs to refine data synthesis. This research propels forward data synthesis techniques, offering potential solutions for mitigating interference challenges in dense MMW networks and advancing 5G communication systems.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143690235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信