{"title":"Enhancing Cross-Domain Book Classification Through Caching-Enabled Networks and Transformer Technology","authors":"Qiang Li, Huaiyuan Zheng, Yulai Bao, Side Liu","doi":"10.1002/itl2.590","DOIUrl":"https://doi.org/10.1002/itl2.590","url":null,"abstract":"<div>\u0000 \u0000 <p>Book classification is a crucial task for libraries and a fundamental aspect of their service offerings. Cross-domain book classification, in particular, presents significant challenges due to the diversity and complexity of content across different genres and subjects. To tackle these challenges, a user-oriented strategy employing Transformer network (TN) is developed to fulfill the need for superior content quality and classification. Our proposed method leverages the self-attention mechanism of TN for precise feature extraction and classification, combining it with principal component analysis to ensure a comprehensive understanding of book content. This integration represents a technical innovation that enhances the model's ability to handle diverse datasets with improved accuracy and robustness. Our approach merges TN with caching-enabled networks (CEN) to enhance accuracy and robustness. Driven by the necessity for improved cross-domain classification, our strategy aims to standardize book classifications, thus improving user satisfaction. The primary actions encompass improved classification management, feedback systems, and evaluation frameworks. This work highlights the innovative fusion of TN and CEN, showcasing how these advanced techniques can significantly elevate the performance of library classification systems. Our work demonstrates that high-quality book classification can significantly improve library services and user experience. Furthermore, it aligns with the broader applications of CEN in emerging networking technologies, showing the potential for cutting-edge techniques to revolutionize library services.</p>\u0000 </div>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PIoT-oriented multi-target recognition of substation infrared images driven by deep learning","authors":"Min Li, Tou Li, Xuan Zhang, Wei Zhang","doi":"10.1002/itl2.573","DOIUrl":"https://doi.org/10.1002/itl2.573","url":null,"abstract":"<p>Substation infrared imaging plays a crucial role in condition monitoring and fault detection of Power Internet of Things (PIoT). However, the accurate and efficient recognition of multiple targets in substation infrared images remains a challenging task. This paper proposes a deep learning-based multi-target recognition framework for substation infrared images in PIoT. This paper presents a method for recognizing various electrical equipment in infrared images of substations using a faster region-based convolutional neural network (Faster RCNN). The optimization of Faster RCNN includes class rectification inspired by non-maximum suppression (NMS), enabling the correction of misclassified equipment parts and enhancing recognition accuracy. The approach combines NMS and class rectification to retain region proposals with optimal recognition performance. Experimental results demonstrate the effectiveness of the proposed method in improving the recognition accuracy of electrical equipment in infrared images.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IQL-OCDA: An intelligent Q-learning-based for optimal clustering and data-aggregation for wireless sensor networks","authors":"Arwa N. Aledaily","doi":"10.1002/itl2.572","DOIUrl":"https://doi.org/10.1002/itl2.572","url":null,"abstract":"<p>Wireless sensor networks (WSNs) can suffer from low battery life due to the energy consumption of the routing protocol. Small sensor nodes are often difficult to recharge after deployment. In a WSN, data aggregation is generally used to reduce or eliminate data redundancy between nodes in order to save energy. In the proposed algorithm, sensor nodes are deployed in appropriate clusters and cluster heads are elected using Q-learning techniques. Nodes are clustered based on the mean values computed during the clustering phase. Lastly, a performance evaluation and comparison of existing clustering algorithms are performed based on Intelligent Q-learning. The proposed IQL-OCDA model reduces end-to-end delay by 10.11%, increases throughput by 4.15%, and increases network lifetime by 5.1%.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143726782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparative analysis of diversity combining techniques for repetitive transmissions in time spreading SCMA systems","authors":"Oguz Ülgen, Tolga Kagan Tüfekci, Yalcin Sadi, Serhat Erkücük, Alagan Anpalagan, Tuncer Baykas","doi":"10.1002/itl2.585","DOIUrl":"https://doi.org/10.1002/itl2.585","url":null,"abstract":"<p>Sparse Code Multiple Access (SCMA) is a recently introduced wireless communication network technology. There are various techniques in SCMA systems to increase the system's efficiency, and one of these techniques is time spreading. By adding repetitive transmission and time spreading into SCMA, it is shown in previous works that the Bit-Error-Rate (BER) results are improved convincingly. However, in the previous works, other diversity combining techniques have not been considered. This paper introduces a new approach to further improve the performance of repetitive transmission in SCMA systems with time spreading by adding imperialist competitive algorithm in diversity combining. Alongside, four different combining techniques; equal gain combining, maximal ratio combining, selection combining, and genetic algorithm are considered to bring comparative analysis to show the significance of the new technique. Results show that the proposed method offers up to 2.3 dB gain in terms of BER, under certain conditions.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LINGPASS: An approach for multilingual passphrase generation by integrating English and Tamil","authors":"G. Balayogi, K. S. Kuppusamy","doi":"10.1002/itl2.580","DOIUrl":"https://doi.org/10.1002/itl2.580","url":null,"abstract":"<p>In today's world of ever-increasing cyber threats, safeguarding digital accounts is paramount. Traditional passwords are often vulnerable to brute force attacks and can be easily guessed, leading to a shift towards passphrases. However, using monolingual passphrases can pose several challenges, such as lack of diversity, predictability, memorability, and accessibility. To address this issue, this paper presents a model called LINGPASS, short for Language INtegrated Graph-based PASSphrase, which generates multilingual passphrases by combining English and Tamil languages. The proposed approach is implemented as a web application for user convenience, and the entropy of the passphrase is evaluated using Shannon entropy. The LINGPASS model generates higher entropy passphrases than existing multilingual passphrase generators, increasing the security of digital accounts. By integrating two languages, LINGPASS increases the entropy of the passphrase by approximately 72%, making it less vulnerable to dictionary attacks. Additionally, the copy/paste functionality reduces typing errors, making it more user-friendly.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143187032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability mining method of SOAP based on black-box fuzzing","authors":"Senyang Ding, Xianghua Xu","doi":"10.1002/itl2.553","DOIUrl":"https://doi.org/10.1002/itl2.553","url":null,"abstract":"<p>In the span of over two decades since the dawn of the twenty-first century, global Internet of Things security incidents have continued to break out. Currently, there remains no vulnerability mining method that can be seamlessly adapted to diverse test scenarios. In this paper, we proposed a simple object access protocol (SOAP) analysis and vulnerability detection method based on black-box fuzzing, which is used to extract more information from the limited SOAP traffic and explore the vulnerabilities of some Internet of Things devices that communicate through SOAP or advanced protocols based on SOAP. We transformed SOAP protocol packets into abstract syntax trees (AST), using a more granular approach to extract the production and guide the mutation. Based on this algorithm, we propose an automatic black-box fuzzer, termed SOAPFuzzer. When testing real camera devices from various manufacturers, 0-day vulnerabilities were successfully found on different devices. At present, 0-day vulnerabilities have been reported to the China National Vulnerability Database (CNVD), and vulnerability number CNVD-2023-43 801 and original vulnerability certificates have been obtained. In terms of packet reception rate, SOAPFuzzer is 10.7% and 12.4% higher than the current popular black-box Fuzzer Boofuzz on the two camera devices, respectively.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad
{"title":"Design of a mix network with elliptic curve cryptography and XOR shuffling for secure communication with 5-node","authors":"Fayaz Ahmad Naikoo, Khaleel Ahmad, Khairol Amali Bin Ahmad","doi":"10.1002/itl2.578","DOIUrl":"https://doi.org/10.1002/itl2.578","url":null,"abstract":"<p>This research paper proposes a novel 5-node mix network, an anonymous communication network to boost privacy within the network. Within the proposed framework the crypto-operations like encryption, decryption, and shuffling are held with the help of the Elliptic Curve Cryptography (ECC) and XOR algorithm. This unique combination helps to exchange the message within the communication network with enhanced security and privacy. To analyze the processing time and load factor at each intermediate node of mix network, an exhaustive experimental analysis is carried out for key sizes of 256, 384, and 512 bits respectively. These crypto-operations like encryption, decryption, and XOR shuffling need varying time slots to perform at each intermediate node thereby having a varying load factor associated with them. The objective of this research is to analyze the processing time and load factor at each node within the 5-node mix network thereby helping to analyze the strengths and weaknesses of each intermediate node. Through our analysis, these percentages are computed, shedding light on the allocation of computational load and resource utilization among the nodes.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688769","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"5G-based video summarization: An analysis from a methodological point of view","authors":"Asha Prashant Sathe, P. Jeyanthi","doi":"10.1002/itl2.576","DOIUrl":"https://doi.org/10.1002/itl2.576","url":null,"abstract":"<p>Surveillance is one of the fast-growing applications used for monitoring and watching people, objects, or the environment to collect information and provide security. The surveillance data is in video form, and analyzing large video is challenging because it is essential to do efficient video streaming online. Video summarization comprises selecting, extracting, and aggregating keyframes for creating a synopsis, which is challenging. Though several methods have been proposed for video summarization, most are inconsistent, poor in processing and delivering video content, and do not focus on solving the root problems interlinked with efficient streaming. Thus, video streaming applications require an efficient video summarization model that can overcome existing issues and challenges and improve the overall quality of service integrated with the advanced technology of 5G. This paper has aimed to discuss various methods, approaches, and technologies used for video summarization to design a better model. It also presents various learning models and a taxonomy of available methods and provides a detailed review. The summary of the model used evaluates its outcome and the existing methods for potential future research works. The proposed approach is compared with existing ones to prove the model's efficiency. The result shows that the proposed model achieved a 62.3 and 52.3 F1 score summarizing the TVSum and SumMe datasets, respectively.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143688804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Linear budget management in internet of things and 6G network environments: Linear regression and time series analysis","authors":"Jing Long","doi":"10.1002/itl2.579","DOIUrl":"https://doi.org/10.1002/itl2.579","url":null,"abstract":"<p>Budget, as an important component of management accounting, is an effective means for companies to achieve functions such as planning, coordination, and control. It is a bridge and link connecting different units and departments within the company and economic operations. However, current budget management pays less attention to temporal characteristics, leading to budget ambiguity. Taking Company A as an example, the long short-term memory (LSTM) algorithm was used to collect and process historical data and predict its future budget and revenue situation. It was found that the budget management of Company A was relatively chaotic, with insufficient investor information, and the predicted results were close to the actual situation, proving the effectiveness of the model proposed in this paper.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143831383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. C. Sriharipriya, J. Christopher Clement, Gerardine Immaculate Mary, Chandrasekharan Natraj, R. Tharun Kumar, R. Gokul
{"title":"Enhanced synthetic generation of channel state information for millimeter-wave networks in 5G communication systems","authors":"K. C. Sriharipriya, J. Christopher Clement, Gerardine Immaculate Mary, Chandrasekharan Natraj, R. Tharun Kumar, R. Gokul","doi":"10.1002/itl2.577","DOIUrl":"https://doi.org/10.1002/itl2.577","url":null,"abstract":"<p>In 5G communication systems, millimeter-wave networks are pivotal, relying heavily on Channel State Information (CSI) for effective user-to-base station (BS) transmission. However, the acquisition of genuine CSI data remains a hurdle, often due to the expenses associated with simulations or physical experiments. This paper introduces an innovative method for generating artificial CSI data from real datasets, aiming to closely replicate authentic CSI samples. The procedure begins with an initial clustering analysis, followed using Principal Component Analysis and Uniform Manifold Approximation and Projection to reduce dimensionality. Then, the data distributions are transformed into multivariate normal distributions using Probability Integral Transformations (PIT). For data synthesis, Multilayer Perceptron based regression models are utilized, followed by inverse PIT transformations to return the data to its original space. Our method is compared against KDE-based algorithms, demonstrating superior fidelity in reproducing real CSI samples. Additionally, we stress the importance of capturing CSI correlations among different BSs to refine data synthesis. This research propels forward data synthesis techniques, offering potential solutions for mitigating interference challenges in dense MMW networks and advancing 5G communication systems.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 3","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143690235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}