Internet Technology Letters最新文献

筛选
英文 中文
Computer intelligent network security and preventive measures of internet of things devices 计算机智能网络安全与物联网设备的预防措施
IF 0.9
Internet Technology Letters Pub Date : 2024-04-24 DOI: 10.1002/itl2.519
Jianfeng Ye, Li Li, Kaiyan Zheng
{"title":"Computer intelligent network security and preventive measures of internet of things devices","authors":"Jianfeng Ye,&nbsp;Li Li,&nbsp;Kaiyan Zheng","doi":"10.1002/itl2.519","DOIUrl":"10.1002/itl2.519","url":null,"abstract":"<p>The paper focused on researching and analyzing computer intelligence network security and preventive measures in the context of the IoT, aiming to improve the security coefficient of the IoT network and reduce IoT network security accidents through computer intelligence technology. Through experiments, we obtained data that demonstrated the effectiveness of computer intelligence in improving IoT security. In several groups of experiments, the maximum number of information leaks in the IoT network using computer intelligence within a month was 10 times smaller than the maximum number in traditional IoT networks, and the minimum number was 8 times smaller. This shows that computer intelligence can prevent information leakage in the IoT. Similarly, in several groups of experiments, the maximum number of data thefts in a month in the IoT network using computer intelligence was 15 times smaller than the maximum number in traditional IoT networks, and the minimum number was 16 times smaller. This demonstrates that computer intelligence can prevent data theft in the IoT. These findings confirm that computer intelligence can improve the security of the IoT network.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 4","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140662751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lightweight facial expression estimation for mobile computing in portable device 用于便携式设备移动计算的轻量级面部表情估算
IF 0.9
Internet Technology Letters Pub Date : 2024-04-24 DOI: 10.1002/itl2.533
Jinming Liu
{"title":"Lightweight facial expression estimation for mobile computing in portable device","authors":"Jinming Liu","doi":"10.1002/itl2.533","DOIUrl":"10.1002/itl2.533","url":null,"abstract":"<p>Facial expression recognition has been studied for many years, especially with the development of deep learning. However, the existing researches still have the following two issues. Firstly, the intensity of facial expression is neglected. Secondly, the deep learning based approaches cannot be directly deployed in the devices with limited resources. In order to tackle these two issues, this paper proposes a lightweight facial expression estimation method using a shallow ordinal regression algorithm, which is deployed in a portable smart device for mobile computing in IoTs. Compared with classification based facial expression recognition methods, ordinal regression considers the intensity of facial expression to achieve better mean absolute error (MAE), which is validated by experiments on several public facial expression datasets. The simulation in portable device also demonstrates its effectiveness for mobile computing.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140663796","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the application of English short essay reading emotional analysis in online English teaching under IoT scenario 物联网场景下英语短文阅读情感分析在在线英语教学中的应用研究
IF 0.9
Internet Technology Letters Pub Date : 2024-04-24 DOI: 10.1002/itl2.535
Xiaoli Zhan
{"title":"Research on the application of English short essay reading emotional analysis in online English teaching under IoT scenario","authors":"Xiaoli Zhan","doi":"10.1002/itl2.535","DOIUrl":"10.1002/itl2.535","url":null,"abstract":"<p>Speech-emotion analysis plays an important role in English teaching. The existing convolutional neural networks (CNNs) can fully explore the spatial features of speech information, and cannot effectively utilize the temporal dependence of speech signals. In addition, it is difficult to build a more efficient and robust sentiment analysis system by solely utilizing speech information. With the development of the Internet of Things (IoTs), online multimodal information, including speech, video, and text, has become more convenient. To this end, this paper proposes a novel multimodal fusion emotion analysis system. Firstly, by combining convolutional networks with Transformer encoders, the spatiotemporal dependencies of speech information are effectively utilized. To improve multimodal information fusion, we introduce the exchange-based fusion mechanism. The experimental results on the public dataset indicate that the proposed multimodal fusion model achieves the best performance. In online English teaching, teachers can effectively improve the quality of teaching by leveraging the feedback information of students' emotional states through our proposed deep model.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 2","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140661003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid approach for malware detection in SDN-enabled IoT scenarios 在支持 SDN 的物联网场景中检测恶意软件的混合方法
IF 0.9
Internet Technology Letters Pub Date : 2024-04-23 DOI: 10.1002/itl2.534
Cristian H. M. Souza, Carlos H. Arima
{"title":"A hybrid approach for malware detection in SDN-enabled IoT scenarios","authors":"Cristian H. M. Souza,&nbsp;Carlos H. Arima","doi":"10.1002/itl2.534","DOIUrl":"10.1002/itl2.534","url":null,"abstract":"<p>Malware presents a significant threat to computer systems security, especially in ARM and MIPS architectures, driven by the rise of the internet of things (IoT). This paper introduces Heimdall, a hybrid approach that integrates YARA signatures and machine learning in programmable switches for efficient malware detection in SDN-enabled IoT environments. The machine learning classifier achieved an accuracy of 99.33% against the IoT-23 dataset. When evaluated in an emulated environment with real malware samples, Heimdall exhibits a 98.44% detection rate and an average processing time of 0.0217 s.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140669824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Heterogeneous network intrusion detection via domain adaptation in IoT environment 在物联网环境中通过域适应进行异构网络入侵检测
IF 0.9
Internet Technology Letters Pub Date : 2024-04-16 DOI: 10.1002/itl2.531
Jun Zhang, Yao Li, Litian Zhang
{"title":"Heterogeneous network intrusion detection via domain adaptation in IoT environment","authors":"Jun Zhang,&nbsp;Yao Li,&nbsp;Litian Zhang","doi":"10.1002/itl2.531","DOIUrl":"10.1002/itl2.531","url":null,"abstract":"<p>Network intrusion detection refers to detect the threaten behaviors in the network to guarantee the network security. Compared with computer network, Internet of Things (IoT) consists of various devices, including computer, smart phone, smart watch, various sensors etc. The data in IoT may be captured from heterogeneous scenes using various devices. The data may follow from different distributions. Most previous works may fail when they are used in heterogeneous scenes of IoT. In order to overcome this issue, this paper designs a heterogeneous network intrusion detection scheme using attention sharing mechanism to implement domain adaptation for the intrusion detection of the data with heterogeneous distributions. The data from heterogeneous IoT devices is projected into the same sharing space via attention sharing to alleviate the bias between the distributions of data from these devices. Thus, the intrusion detection model learnt from the data from a scene can be migrated to another scene. The experiments and simulation demonstrate that the proposed intrusion detection scheme can adapt the changes of IoT scene.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140698077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization techniques for IDS-Generated traffic congestion control in VANET 用于 VANET 中 IDS 生成的流量拥塞控制的优化技术
IF 0.9
Internet Technology Letters Pub Date : 2024-04-12 DOI: 10.1002/itl2.518
Yogendra Kumar, Vijay Kumar, Basant Subba
{"title":"Optimization techniques for IDS-Generated traffic congestion control in VANET","authors":"Yogendra Kumar,&nbsp;Vijay Kumar,&nbsp;Basant Subba","doi":"10.1002/itl2.518","DOIUrl":"10.1002/itl2.518","url":null,"abstract":"<p>Vehicular Ad-hoc Network (VANET) is an emerging field of wireless networks that enables a variety of vehicle safety and convenience applications. It employs Intrusion Detection System (IDS) frameworks in its different tiers to ensure reliable and secure communication among nodes. However, IDS requires a significant amount of data to process for monitoring intrusive activities in the network. As a result, the volume of traffic increases, resulting in the network congestion. Motivated by this fact, this study provides an overview of the optimization techniques for VANET traffic congestion control. It discusses a state-of-the-art analysis along with the requirements for IDS-generated traffic congestion control. It highlights the congestion control approaches for the traffic generated by an IDS and identifies the challenges in this domain. This study also proposes a novel IDS framework for reducing IDS-generated network traffic by combining the Local Outlier Factor and Random Forest classifier. The proposed study achieved a high precision while yielding low false positive and false negative rates. The study outperformed the existing studies with an increase in accuracy of 1.16% and a reduction in attack detection time of 1.1869 seconds. Additionally, it discusses the possible future research directions that can be applied to address the issues of IDS-generated traffic congestion. Overall, this study serves as a comprehensive guide to the current status of IDS-generated traffic congestion control and diverse approaches to lessen it that can be employed by academicians and researchers.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140711558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An integrated waveform design method for underwater acoustic detection and communication 用于水下声探测和通信的综合波形设计方法
IF 0.9
Internet Technology Letters Pub Date : 2024-04-08 DOI: 10.1002/itl2.522
Xuerong Cui, Yue Cai, Juan Li, Lei Li, Bin Jiang, Liya Liu
{"title":"An integrated waveform design method for underwater acoustic detection and communication","authors":"Xuerong Cui,&nbsp;Yue Cai,&nbsp;Juan Li,&nbsp;Lei Li,&nbsp;Bin Jiang,&nbsp;Liya Liu","doi":"10.1002/itl2.522","DOIUrl":"10.1002/itl2.522","url":null,"abstract":"<p>In recent years, the integrated system for underwater detection and communication (ISUDC) has become one of the important research directions. At present, the efficiency of the existing shared signals carrying communication information is low, and the synchronization performance needs to be further improved. So, this paper proposes an integrated waveform design scheme for ISUDC based on the carrier with good detection performance and binary phase shift differential keying (DBPSK). In this scheme, the signal with better underwater detection performance (e.g. Linear Frequency Modulation, LFM) is selected as the carrier, and DBPSK is used as the modulation mode to modulate the communication symbols into the carrier. However, the correlation of the detection signal will be destroyed. Thus, the down-frequency detection signal (e.g. ngLFM) is superimposed into the signal to form a shared signal (LFM-DBPSK-ng, LDN). The detection performance, synchronization performance and communication performance of the shared signal are analyzed by ambiguity function, cross-correlation and BER, respectively. In addition, according to the proposed scheme, the shared signal HFM-DBPSK-ng (HDN) is generated by using HFM as carrier. The comparative simulation experiments are carried out with the existing LFM-BPSK signals. Experiments show that both LDN and HDN have better performance compared to the other shared signals, which proves the effectiveness of the integrated waveform design scheme for ISUDC proposed in this paper.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 6","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140732474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing unmanned aerial vehicle technology for environmental monitoring: Future trends, methods, and applications 利用无人飞行器技术进行环境监测:未来趋势、方法和应用
IF 0.9
Internet Technology Letters Pub Date : 2024-04-02 DOI: 10.1002/itl2.526
Yunting Li, Xing-Zhou Li
{"title":"Utilizing unmanned aerial vehicle technology for environmental monitoring: Future trends, methods, and applications","authors":"Yunting Li,&nbsp;Xing-Zhou Li","doi":"10.1002/itl2.526","DOIUrl":"10.1002/itl2.526","url":null,"abstract":"<p>This paper provides an overview of the application of Unmanned Aerial Vehicles (UAVs) in environmental monitoring, with a focus on air pollution surveillance. Initially, the paper highlights the significance of UAV technology for real-time air quality monitoring in developing countries and explores the characteristics of fixed-wing and multirotor UAVs in monitoring air pollutants. It then delves into methods of measuring air pollutants using UAV platforms, including the three-dimensional distribution of pollutants around roadsides, green belts, and street-facing communities. The advantages of UAV measurements, such as lower costs, greater flexibility, and the ability to monitor in three dimensions, are emphasized. Finally, the paper discusses future trends in the field of environmental monitoring using UAVs, including technological advancements, evolving regulatory policies, and integration with other technologies like Artificial Intelligence, big data analytics, and 5G communication. These developments suggest an increasingly significant role for UAVs in environmental monitoring, enhancing efficiency, reducing costs, and contributing to public participation and environmental awareness. However, due to the delays in publication and review processes, the most recent studies may not have been included in the literature review, leading to a scenario where the review might not reflect the latest research trends.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140752842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fault monitoring method for misalignment replacement operation error of electricity acquisition system based on internet of things engineering evaluation 基于物联网工程评估的电力采集系统错位更换操作错误的故障监测方法
IF 0.9
Internet Technology Letters Pub Date : 2024-04-02 DOI: 10.1002/itl2.521
Yinghui Lu, Jiyang Zhu
{"title":"Fault monitoring method for misalignment replacement operation error of electricity acquisition system based on internet of things engineering evaluation","authors":"Yinghui Lu,&nbsp;Jiyang Zhu","doi":"10.1002/itl2.521","DOIUrl":"10.1002/itl2.521","url":null,"abstract":"<p>With the rapid development of Internet of Things (IoT) technology, electricity collection systems have been widely used in various fields. It can connect various items to the internet and achieve remote monitoring and maintenance of devices. During the operation of the electricity collection system, there may be issues such as misalignment due to various reasons, which can lead to errors in data collection and affect the accuracy and stability of the system. How to timely monitor the operational errors of the system and replace and repair them has become an urgent problem to be solved. The fault location algorithm can accurately diagnose the cause of the fault and provide corresponding repair suggestions, thereby reducing maintenance costs and optimizing the efficiency of the electricity collection system. This article would analyze the monitoring method for the misalignment replacement operation error of the power acquisition system based on IoT engineering analysis, and used fault location algorithms to locate its misalignment. The research results indicated that, under the same other conditions, the total satisfaction score of the X system was 253 points, and the total satisfaction score of the Y system was 141 points. The score of the X system was much higher than that of the Y system. The results indicated that IoT engineering analysis could optimize the monitoring method for operational errors caused by inaccurate replacement of electricity acquisition systems, and there was a positive relationship between the two.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"7 4","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140755401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fake news detection in the Hindi language using multi-modality via transfer and ensemble learning 通过迁移和集合学习使用多模式检测印地语中的假新闻
IF 0.9
Internet Technology Letters Pub Date : 2024-04-01 DOI: 10.1002/itl2.523
Sonal Garg, Dilip Kumar Sharma
{"title":"Fake news detection in the Hindi language using multi-modality via transfer and ensemble learning","authors":"Sonal Garg,&nbsp;Dilip Kumar Sharma","doi":"10.1002/itl2.523","DOIUrl":"10.1002/itl2.523","url":null,"abstract":"<p>Fake news classification emerged as an exciting topic for machine learning and artificial intelligence researchers. Most of the existing literature on fake news detection is based on the English language. Hence, it needs more usability. Fake news detection in low-resource scare languages is still challenging due to the absence of large annotated datasets and tools. In this work, we propose a large-scale Indian news dataset for the Hindi language. This dataset is constructed by scraping different reliable fact-checking websites. The LDA approach is adopted to assign the category to news statements. Various machine-learning and transfer learning approaches are applied to verify the authenticity of the dataset. Ensemble learning is also applied based on the low false-positive rate of machine-learning classifiers. A multi-modal approach is adopted by combining LSTM with VGG-16 and VGG-19 classifiers. LSTM is used for textual features, while VGG-16 and VGG-19 are applied for image analysis. Our proposed dataset has achieved satisfactory performance.</p>","PeriodicalId":100725,"journal":{"name":"Internet Technology Letters","volume":"8 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140782220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信