{"title":"Computational Intelligence Methods for Smart Connectivity in IoT","authors":"Alireza Souri, Mu-Yen Chen, N. J. Navimipour","doi":"10.1142/s0219265922020017","DOIUrl":"https://doi.org/10.1142/s0219265922020017","url":null,"abstract":"","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115493601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Power Monitoring Image Encryption Transmission Method Based on Internet of Things","authors":"Pengfei Wang, M. Tang, Haodong Zou","doi":"10.1142/s0219265921450146","DOIUrl":"https://doi.org/10.1142/s0219265921450146","url":null,"abstract":"In order to be able to achieve state maintenance, keep historical data of the operation of each system, improve the precision of computer room management, improve work efficiency, reduce the work intensity of computer room managers, and reduce manual errors and potential accidents, this paper combines the Internet of Things technology to construct an image encryption transmission method that can be used for power monitoring. Moreover, this paper constructs a power system intelligent monitoring system based on the Internet of Things, and encrypts relevant data. In addition, this paper proposes a surveillance video encryption algorithm based on foreground and background separation. This video encryption algorithm is different from ordinary video encryption methods. It fully taps the characteristics of the surveillance video taken by a still camera. According to the experimental research results, it can be seen that the power monitoring image encryption transmission system based on the Internet of Things constructed in this paper has good performance in power monitoring image processing, image encryption, image transmission, etc. The evaluation results of the three functional parameters are all above 80%, which have great advantages compared with traditional algorithms. Therefore, the method proposed in this paper has good practical effects.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131488275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jinding He, Baorui Cai, Wenlin Yan, Bin Zhang, Rongkui Zhang
{"title":"Internet of Things-Based Risk Warning System for Distribution Grid Operation State","authors":"Jinding He, Baorui Cai, Wenlin Yan, Bin Zhang, Rongkui Zhang","doi":"10.1142/s0219265921450079","DOIUrl":"https://doi.org/10.1142/s0219265921450079","url":null,"abstract":"The distribution network is the most terminal part of the power system. The safety and stability of its operation directly affect the power supply reliability of the power system. The operation status of the equipment has always been the focus of researchers. Once a problem occurs in the operation of the distribution network, it will have a significant impact on public safety and social development. Therefore, real-time monitoring of the operation status of the distribution network is very important. In order to meet the needs of real-time intelligent detection of the operation status of the distribution network, this paper introduces a risk warning system based on the Internet of Things for the operation status of the distribution network. This paper firstly analyzes the weight of risk indicators to determine the detection indicators of the risk early warning system, and secondly, through the analysis of the risk early warning indicator system of the distribution network operation status and the establishment of the risk early warning evaluation model, to determine the operation status of the distribution network The following risk early warning detection needs, and finally the Internet of Things technology is used in the design of the risk early warning system of the operating state of the distribution network, and then the system is tested. The test shows that the real-time detection data error of the system is less than 5%.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127614990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Personalized Recommendation Method of Entrepreneurial Service Information Based on Blockchain","authors":"Shuzhe Guo, Xiaolei Zhu, Yang Liu, Jianwei Han","doi":"10.1142/s0219265921450109","DOIUrl":"https://doi.org/10.1142/s0219265921450109","url":null,"abstract":"In order to improve the effect of personalized recommendation of entrepreneurial service information, this paper combines blockchain technology to improve personalized recommendation algorithm. Moreover, for these four types of incentive mechanisms, this paper establishes corresponding income models, and further derives the optimal weights for each type of incentive mechanism. Finally, this paper designs a personalized recommendation system of entrepreneurial service information based on blockchain, and verifies the performance of the personalized recommendation system of entrepreneurial service information based on blockchain, and evaluates its data mining and recommendation effects based on simulation research. Through experimental research, we know that the personalized recommendation system of entrepreneurial service information based on blockchain can provide entrepreneurs with more reliable information services.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127007538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection System Model for IoT Networks Using Ensemble Learning","authors":"Umaira Ahad, Yashwant Singh, Pooja Anand, Zakir Ahmad Sheikh, Pradeep Kumar Singh","doi":"10.1142/s0219265921450080","DOIUrl":"https://doi.org/10.1142/s0219265921450080","url":null,"abstract":"The capacity to identify breaches and malicious activity inside the Internet of Things (IoT) networks is important for network infrastructure resilience as the dependence on IoT devices and services grows. Intrusion detection systems (IDS) are basic components of network security. IDSs monitor and analyze the activity of a system in a network to identify intrusions. Existing intrusion detection systems (IDS) gather and utilize large amounts of data with irrelevant, unnecessary, and unsuitable characteristics, resulting in long detection times and low accuracy. In this paper, we present an IDS model based on a Random Forest (RF) classifier. NSL-KDD dataset is used to test the performance of the model and the satisfying performance is obtained in terms of accuracy, detection rate, and false alarm rate. The proposed model has attained an average accuracy of 99.3% and 98% for binary classification and multiclass classification, respectively. To demonstrate the efficacy of the suggested model, its accuracy was compared with some existing approaches that utilize other models such as AIDS, ELM and PCA, MapReduce-based hybrid architecture, and DRNN.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132464456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Effective Integration of ZigBee Communication Technology and Internet of Things Technology","authors":"Lili Zhang","doi":"10.1142/s0219265921450110","DOIUrl":"https://doi.org/10.1142/s0219265921450110","url":null,"abstract":"ZigBee technology is a representative standard of wireless communication technology with very low complexity, short distance, low rate, low power consumption and low cost. Internet of things technology is the development trend. In order to achieve the effective integration of ZigBee communication technology and Internet of things technology, improve the real-time transmission efficiency and form an exclusive communication system. This paper carries out wireless voice communication through the integration of ZigBee technology and Internet of things technology, and puts forward the research topic of wireless voice communication. The ZigBee technology and the Internet of things are organically integrated through the clustering algorithm, the shortcomings of the Internet of things technology are solved by using the advantages of ZigBee, the relevant model is constructed, the designed relevant algorithms are grouped, and the efficiency of the fused algorithm is compared with the algorithm before the fusion. The experimental results show that in the packet delivery rate experiment, the delivery rate of the algorithm is very high, and the speed can reach 97% at 20m/s.At the same time, the experimental results also show that the control overhead of the AODV protocol is significantly greater than that of the AODVjr protocol, and the AODV protocol can save at least 16% of the cost compared with the AODVjr protocol. And when the speed increases to a certain extent, the difference in control overhead between the two will become larger and larger.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"169 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116901770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reliability of Divide-and-Swap Cube Based on r-Component Connectivity and Diagnosability","authors":"Qianru Zhou, Shuming Zhou, Xiaoqing Liu, Zhengqi Yu","doi":"10.1142/s0219265921420214","DOIUrl":"https://doi.org/10.1142/s0219265921420214","url":null,"abstract":"When performing big data processing and high-performance computing, large-scale multiprocessor systems have always been committed to ensuring high reliability and fault tolerance. Connectivity and diagnosability are two important metrics to evaluate the fault tolerance and reliability of interconnection networks. In this paper, we determine [Formula: see text]-component connectivity and diagnosability of divide-and-swap cube [Formula: see text]. In detail, we show that, for [Formula: see text] and [Formula: see text], [Formula: see text], [Formula: see text] under the PMC and MM[Formula: see text] models.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125405949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xing Chen, Dongyang Xie, Yongsheng Jiang, Na-qi Fan
{"title":"The Arc-Connectivity of 3-Regular Digraphs with Two Orbits","authors":"Xing Chen, Dongyang Xie, Yongsheng Jiang, Na-qi Fan","doi":"10.1142/s0219265921420238","DOIUrl":"https://doi.org/10.1142/s0219265921420238","url":null,"abstract":"Let [Formula: see text] be a simple strongly connected digraph and let Aut[Formula: see text] be an automorphism of [Formula: see text]. For [Formula: see text], the set [Formula: see text] is called an orbit of Aut[Formula: see text]. In this paper, first, we show that if [Formula: see text] is a 2-regular strongly connected digraph with two orbits then [Formula: see text], if [Formula: see text] is a [Formula: see text]-regular strongly connected digraph with two orbits and [Formula: see text] [Formula: see text], then [Formula: see text]. Second, we prove that if [Formula: see text], then [Formula: see text]. Last, we characterize the arc atoms of 3-regular strongly connected digraphs with two orbits and [Formula: see text].","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114068563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimum Stretch Spanning Tree Problem in Operations on Trees","authors":"Toru Araki, Eito Hasegawa, Shion Kato","doi":"10.1142/s0219265921500286","DOIUrl":"https://doi.org/10.1142/s0219265921500286","url":null,"abstract":"The minimum stretch spanning tree problem for a connected graph [Formula: see text] is to find a spanning tree [Formula: see text] of [Formula: see text] such that the maximum distance in [Formula: see text] between two adjacent vertices of [Formula: see text] is minimized, where the minimum value is called the tree-stretch of [Formula: see text]. This paper presents the tree-stretch of a graph constructed by the Cartesian product of two trees. This result is a generalization of the result for the grid graphs obtained by Lin and Lin (L. Lin, Y. Lin, The minimum stretch spanning tree problem for typical graphs, Acta Mathematicae Applicatae Sinica, English Series, 37(3) (2021) 510–522). Then, we give the tree-stretch of the [Formula: see text]-th power of a tree.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"360 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114765985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Upper and Forcing Connected Outer Connected Geodetic Numbers of a Graph","authors":"K. Ganesamoorthy, D. Jayanthi","doi":"10.1142/s0219265921420226","DOIUrl":"https://doi.org/10.1142/s0219265921420226","url":null,"abstract":"For a connected graph [Formula: see text] of order at least two, a connected outer connected geodetic set [Formula: see text] of [Formula: see text] is called a minimal connected outer connected geodetic set if no proper subset of [Formula: see text] is a connected outer connected geodetic set of [Formula: see text]. The upper connected outer connected geodetic number [Formula: see text] of [Formula: see text] is the maximum cardinality of a minimal connected outer connected geodetic set of [Formula: see text]. We determine bounds for it and certain general properties satisfied by this parameter are studied. It is shown that, for any two integers [Formula: see text], [Formula: see text] with [Formula: see text], there exists a connected graph [Formula: see text] with [Formula: see text] and [Formula: see text], where [Formula: see text] is the connected outer connected geodetic number of a graph. Also, another parameter forcing connected outer connected geodetic number [Formula: see text] of a graph [Formula: see text] is introduced and several interesting results on this parameter are studied.","PeriodicalId":153590,"journal":{"name":"J. Interconnect. Networks","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131190744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}