Transactions on Emerging Telecommunications Technologies最新文献

筛选
英文 中文
Signal points allocation for generalized enhanced spatial modulation 广义增强空间调制的信号点分配
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4984
Ling Yin, Guang Zeng, Qingwen Long
{"title":"Signal points allocation for generalized enhanced spatial modulation","authors":"Ling Yin,&nbsp;Guang Zeng,&nbsp;Qingwen Long","doi":"10.1002/ett.4984","DOIUrl":"https://doi.org/10.1002/ett.4984","url":null,"abstract":"<p>In this paper, making full use of the spatial domain of transmit antennas (TAs) and keeping the characteristic of the squared minimum Euclidean distance (MED) between the transmitted spatial vectors (TSVs), generalized enhanced spatial modulation with signal points allocation (GESM-SPA) is proposed to expand the size of signal spaces for enhancing the spectral efficiency and the reliability of communications. In the GESM-SPA, according to the number of active TAs, signal constellation points (CPs) from the QAM or secondary QAM constellations are allocated and then modulated on the corresponding active TAs with the selected antenna index (AI) vector. Through this design, which further exploits the spatial domain with the variability of active TAs, the squared MED between the TSVs is increased in comparison with the existing traditional systems. More specifically, in view of the disadvantage of the classic ESM system, the constellation groups (CGs) with priority given to the QAM CPs are constructed to further maximize the squared MED. Then, the AI vector subsets corresponding to the obtained CGs are designed to be candidate for the specified AI vector set with the AI information. The squared MED and the average bit error probability (BEP) are analyzed. In simulation results using Monte Carlo, the GESM-SPA outperforms the existing classic systems in terms of the bit error rate performance.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141078914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review 自然启发算法在基于物联网的医疗保健服务中的应用:系统性文献综述
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4969
Zahra Amiri, Arash Heidari, Mohammad Zavvar, Nima Jafari Navimipour, Mansour Esmaeilpour
{"title":"The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review","authors":"Zahra Amiri,&nbsp;Arash Heidari,&nbsp;Mohammad Zavvar,&nbsp;Nima Jafari Navimipour,&nbsp;Mansour Esmaeilpour","doi":"10.1002/ett.4969","DOIUrl":"https://doi.org/10.1002/ett.4969","url":null,"abstract":"<p>Nature-inspired algorithms revolve around the intersection of nature-inspired algorithms and the IoT within the healthcare domain. This domain addresses the emerging trends and potential synergies between nature-inspired computational approaches and IoT technologies for advancing healthcare services. Our research aims to fill gaps in addressing algorithmic integration challenges, real-world implementation issues, and the efficacy of nature-inspired algorithms in IoT-based healthcare. We provide insights into the practical aspects and limitations of such applications through a systematic literature review. Specifically, we address the need for a comprehensive understanding of the applications of nature-inspired algorithms in IoT-based healthcare, identifying gaps such as the lack of standardized evaluation metrics and studies on integration challenges and security considerations. By bridging these gaps, our paper offers insights and directions for future research in this domain, exploring the diverse landscape of nature-inspired algorithms in healthcare. Our chosen methodology is a Systematic Literature Review (SLR) to investigate related papers rigorously. Categorizing these algorithms into groups such as genetic algorithms, particle swarm optimization, cuckoo algorithms, ant colony optimization, other approaches, and hybrid methods, we employ meticulous classification based on critical criteria. MATLAB emerges as the predominant programming language, constituting 37.9% of cases, showcasing a prevalent choice among researchers. Our evaluation emphasizes adaptability as the paramount parameter, accounting for 18.4% of considerations. By shedding light on attributes, limitations, and potential directions for future research and development, this review aims to contribute to a comprehensive understanding of nature-inspired algorithms in the dynamic landscape of IoT-based healthcare services.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modeling the dissemination of privacy information in online social networks 在线社交网络中隐私信息传播的建模
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-21 DOI: 10.1002/ett.4989
Nafei Zhu, Wenhui Li, Shijia Pan, Shuting Jin, Jingsha He
{"title":"Modeling the dissemination of privacy information in online social networks","authors":"Nafei Zhu,&nbsp;Wenhui Li,&nbsp;Shijia Pan,&nbsp;Shuting Jin,&nbsp;Jingsha He","doi":"10.1002/ett.4989","DOIUrl":"https://doi.org/10.1002/ett.4989","url":null,"abstract":"<p>Driven by the rapid development of information technology, online social networks (OSNs) have experienced a fast development in recent years, allowing increasingly more people to share and spread information over OSNs. The rapid rise of OSN platforms such as Facebook and Twitter is sufficient evidence of such development. As one type of information, privacy information can also be created and disseminated over an OSN, posing a severe threat to individual privacy. This article attempts to construct a model for disseminating privacy information in OSNs and to analyze the model by simulating the dissemination process of privacy information in OSNs. First, we establish network models that exhibit the main characteristics of OSNs. Second, by considering the factors related to social relationships, especially intimacy between users and the attention of users to the privacy subject, we derive the parameters for privacy information dissemination models in OSNs. Third, based on the theory of information dissemination dynamics, we construct a model for information dissemination that conforms to the properties of privacy information. We also present some experimental results based on the constructed model and analyze the characteristics of privacy information dissemination. Fourth, we study and verify the various properties of the model through a set of experiments. The proposed model provides the opportunity to better understand the dynamics of privacy information dissemination in OSNs and the effect of user behavior on dissemination.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141073766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application RCVM-AS-CICSKA-PAPT-VDF:用于心电图医疗应用的高速可重构压缩吠陀 PAPT-VDF 滤波器的 VLSI 设计
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-20 DOI: 10.1002/ett.4985
K. V. Suresh Kumar, D. Madhavi
{"title":"RCVM-ASS-CICSKA-PAPT-VDF: VLSI design of high-speed reconfigurable compressed Vedic PAPT-VDF filter for ECG medical application","authors":"K. V. Suresh Kumar,&nbsp;D. Madhavi","doi":"10.1002/ett.4985","DOIUrl":"https://doi.org/10.1002/ett.4985","url":null,"abstract":"<p>During signal acquisition, the signals are impacted by multiple noise sources that must be filtered before any analysis. However, many different filter implementations in VLSI are dispersed among many studies. This study aims to give readers a systematic approach to designing a Pipelined All-Pass Transformation based Variable digital filter (PAPT-VDF) to eliminate the high-frequency noise from ECG data. The modified design emphasizes first- and second-order responses to obtain high-speed filter realization with high operating frequencies. The addition of adder and multiplier designs to the hardware architecture of a filter design improves performance. The fundamental blocks of the filter design are the adder and multiplier. The adder and multiplier are employed with an Adaptable stage size-based concatenation, incremented carry-skip adder (ASS-CICSKA), and Improved reconfigurable compressed Vedic multiplier (IRCVM). Utilizing the adder design diminishes the delay with enhanced performance because receiving the carry from an incrementation block is not mandatory. In the multiplier design, the compressor and the reconfigurable approach are adapted with a data detector block to detect the redundant input and lower the logic gates' switching activity with less area overhead. The proposed filter design is implemented in vertex 7 FPGA family device, and the performance measures are analyzed regarding area utilization, delay, power, and frequency. Also, by using the denoised signal, the mean square error (MSE), and signal-to-noise ratio (SNR) are evaluated in the MATLAB platform.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 6","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141069096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain 基于中国余数定理和区块链的 Vanet 群组密钥协议
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-16 DOI: 10.1002/ett.4987
Haitao Xiao, An He
{"title":"A group key agreement protocol for Vanet based on Chinese remainder theorem and blockchain","authors":"Haitao Xiao,&nbsp;An He","doi":"10.1002/ett.4987","DOIUrl":"https://doi.org/10.1002/ett.4987","url":null,"abstract":"<p>Vehicular ad hoc Network (VANET) is a wireless self-organizing network for obtaining information about road conditions, vehicle speed, vehicle location and traffic congestion. Traditional key negotiation protocols create many problems when dealing with a group of vehicles that need to communicate over a public channel. For example, traditional key negotiation protocols rely too much on the participation of trusted institutions and suffer from a single point of failure. Meanwhile, group session key negotiation is usually inefficient with high computational cost and communication overhead. To solve these problems, this paper proposes a blockchain-based Chinese Remainder Theorem (CRT) VANET group key agreement. In addition, the protocol supports dynamic management of vehicles, including joining and exit. Formal security proofs show that our solution satisfies basic security requirements. Experiments using ProVerif show that the protocol functions properly even under many active and passive attacks, such as eavesdropping attacks. Performance analysis shows that the protocol is more efficient in the face of multi-vehicle communication, in particular by reducing the computational cost by up to 75% and the communication overhead by up to 66%.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140949138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A generalized detection framework for covert timing channels based on perceptual hashing 基于感知散列的隐蔽定时信道通用检测框架
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-09 DOI: 10.1002/ett.4978
Xiaolong Zhuang, Yonghong Chen, Hui Tian
{"title":"A generalized detection framework for covert timing channels based on perceptual hashing","authors":"Xiaolong Zhuang,&nbsp;Yonghong Chen,&nbsp;Hui Tian","doi":"10.1002/ett.4978","DOIUrl":"https://doi.org/10.1002/ett.4978","url":null,"abstract":"<p>Network covert channels use network resources to transmit data covertly, and their existence will seriously threaten network security. Therefore, an effective method is needed to prevent and detect them. Current network covert timing channel detection methods often incorporate machine learning methods in order to achieve generalized detection, but they consume a large amount of computational resources. In this paper, we propose a generalized detection framework for covert channels based on perceptual hashing without relying on machine learning methods. And we propose a one-dimensional data feature descriptor for feature extraction of perceptual hash for the data characteristics of covert timing channels. We first generate the hash sequence of the corresponding channel to get the average hash, which is used for comparison in the test phase. The experimental results show that the feature descriptor can capture the feature differences of one-dimensional data well. When compared to machine learning methods, this perceptual hashing algorithms enable faster traffic detection. Meanwhile, our method is able to detect the effectiveness with the smallest coverage window compared with the latest solutions. Moreover, it exhibits robustness in jitter network environment.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140895247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing 基于虚拟化网络功能的物联网移动边缘计算中撤销未经授权访问的基于强化学习的区块链模型
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-07 DOI: 10.1002/ett.4981
C. T. Kalaivani, R. Renugadevi, Jeffin Gracewell, A. Arul Edwin Raj
{"title":"Reinforcement learning based blockchain model for revoking unauthorized access in Virtualized Network Functions-based Internet of Things Mobile Edge Computing","authors":"C. T. Kalaivani,&nbsp;R. Renugadevi,&nbsp;Jeffin Gracewell,&nbsp;A. Arul Edwin Raj","doi":"10.1002/ett.4981","DOIUrl":"https://doi.org/10.1002/ett.4981","url":null,"abstract":"<p>VNFs boost data processing efficiency in Mobile Edge Computing (MEC)-driven Internet of Things (IoT) for healthcare, smart cities, and industrial automation. VNF-based IoT MEC systems encounter a significant security threat due to unauthorized access, posing risks to data privacy and system integrity. Existing approaches struggle to adapt to dynamic environments and lack tamper-proof enforcement mechanisms. In this work, we propose a novel system combining Reinforcement Learning (RL) and blockchain technology to revoke unauthorized access in VNF-based IoT MEC. We introduce the Integrated Action-selection DRL Algorithm for Unauthorized Access Revocation (IASDRL-UAR), a novel RL approach that excels in dynamic environments by handling both continuous and discrete actions, enabling real-time optimization of security risk, execution time, and energy consumption. A behavior control contract (BCC) is proposed and integrated into the RL system, automating behavior checks and enforcement, streamlining security management, and reducing manual intervention. RL feedback plays a pivotal role in steering dynamic security adjustments, gaining valuable perspectives from user behavior via trust scores in the behavior contract. The security features of the proposed method are analyzed. Performance comparisons reveal a substantial improvement, with the proposed system outperforming existing methods by 30% in terms of throughput, 21.7% in system stability, and 26% in access revocation latency. Additionally, the system demonstrates a higher security index, energy efficiency, and scalability.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced authentication and device integrity protection for GDOI using blockchain 利用区块链为 GDOI 提供增强型身份验证和设备完整性保护
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-05-06 DOI: 10.1002/ett.4986
Munkenyi Mukhandi, Eduardo Andrade, Jorge Granjal, João P. Vilela
{"title":"Enhanced authentication and device integrity protection for GDOI using blockchain","authors":"Munkenyi Mukhandi,&nbsp;Eduardo Andrade,&nbsp;Jorge Granjal,&nbsp;João P. Vilela","doi":"10.1002/ett.4986","DOIUrl":"https://doi.org/10.1002/ett.4986","url":null,"abstract":"<p>Recent device-level cyber-attacks have targeted IoT critical applications in power distribution systems integrated with the Internet communications infrastructure. These systems utilize group domain of interpretation (GDOI) as designated by International Electrotechnical Commission (IEC) power utility standards IEC 61850 and IEC 62351. However, GDOI cannot protect against novel threats, such as IoT device-level attacks that can modify device firmware and configuration files to create command and control malicious communication. As a consequence, the attacks can compromise substations with potentially catastrophic consequences. With this in mind, this article proposes a permissioned/private blockchain-based authentication framework that provides a solution to current security threats such as the IoT device-level attacks. Our work improves the GDOI protocol applied in critical IoT applications by achieving decentralized and distributed device authentication. The security of our proposal is demonstrated against known attacks as well as through formal mechanisms via the joint use of the AVISPA and SPAN tools. The proposed approach adds negligible authentication latency, thus ensuring appropriate scalability as the number of nodes increases.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.4986","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140844955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sensitive data identification for multi-category and multi-scenario data 多类别和多场景数据的敏感数据识别
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-04-25 DOI: 10.1002/ett.4983
Yuning Cui, Yonghui Huang, Yongbing Bai, Yuchen Wang, Chao Wang
{"title":"Sensitive data identification for multi-category and multi-scenario data","authors":"Yuning Cui,&nbsp;Yonghui Huang,&nbsp;Yongbing Bai,&nbsp;Yuchen Wang,&nbsp;Chao Wang","doi":"10.1002/ett.4983","DOIUrl":"https://doi.org/10.1002/ett.4983","url":null,"abstract":"<p>Sensitive data identification is the prerequisite for protecting critical user and business data. Traditional methods usually only target a certain type of application scenario or a certain type of data, thus making it difficult to meet the needs of enterprise-level data protection. This paper proposes an introduction to the end-to-end sensitive data identification system of Beike Inc. The system consists of the data identification &amp; annotation platform, dataset management platform, and sensitive data identification model, which propose different governance methods for batch data and streaming data respectively. Specifically, we propose a sliding window-based identification method for long text to improve the identification of streaming data. Evaluation results show that this method can improve the effect of identifying long text sensitive data without losing the ability on short text, for the open source test dataset, the value can be up to 94.15, so it is applicable in diverse scenarios.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140648161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm 利用斑马优化算法优化的 ResNet 卷积神经网络提高网络服务可靠性和可扩展性的方法
IF 3.6 4区 计算机科学
Transactions on Emerging Telecommunications Technologies Pub Date : 2024-04-24 DOI: 10.1002/ett.4968
D. Gokulakrishan, R. Ramakrishnan, G. Saritha, B. Sreedevi
{"title":"An advancing method for web service reliability and scalability using ResNet convolution neural network optimized with Zebra Optimization Algorithm","authors":"D. Gokulakrishan,&nbsp;R. Ramakrishnan,&nbsp;G. Saritha,&nbsp;B. Sreedevi","doi":"10.1002/ett.4968","DOIUrl":"https://doi.org/10.1002/ett.4968","url":null,"abstract":"<p>Web service reliability and scalability is an important mission that keeps web services running normally. Within web service, the web services invoked by users not only depend on the service itself, but also on web load condition. Due to the features of web dynamics, traditional reliability and scalability methods have become inappropriate; at the same time, the web condition parameter sparsity problem will cause inaccurate reliability prediction. To address these challenges, Web Service Reliability and Scalability Determination Using ResNet Convolutional Neural Network optimized with Zero Optimization Algorithm (WRS-ResNetCNN-ZOA) is proposed in this manuscript. Initially, the input data is collected from WSRec dataset. The ResNet convolutional neural network (ResNetCNN) with Business Process Execution Language (BPEL) specification is introduced to forecast the reliability and scalability of web service. The results are categorized as right and wrong based on ResNetCNN. The weight parameters of the ResNetCNN is optimized by Zebra Optimization Algorithm to improve accuracy of the prediction. The performance of the proposed method is examined under some performance metrics, like <i>F</i>-measure, reliability, scalability, accuracy, sensitivity, specificity, and precision. The proposed technique attains 15.36%, 35.39%, 23.87%, 20.67% better reliability, 42.39%, 11.39%, 34.16%, 25.78% better accuracy when analyzed to the existing methods, like Web Reliability based on K-clustering, (WRS-KClustering), Web Reliability prediction based on AdaBoostM1 and J48 (WRS-AdaM1-J48), Web Reliability prediction based on Online service Reliability (WRS-OPUN), and Web Reliability prediction based on Dynamic Bayesian Network (WRS-DBNS), respectively.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"35 5","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140641765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信