Journal of Networking and Network Applications最新文献

筛选
英文 中文
GNN-LS: A Learning Style Prediction in Online Environments using Graph Neural Networks GNN-LS:基于图神经网络的在线学习风格预测
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020405
Bello Ahmad Muhammad, Bo Liu, Hafsa Kabir Ahmad, M. Umar, Kenan Qin
{"title":"GNN-LS: A Learning Style Prediction in Online Environments using Graph Neural Networks","authors":"Bello Ahmad Muhammad, Bo Liu, Hafsa Kabir Ahmad, M. Umar, Kenan Qin","doi":"10.33969/j-nana.2022.020405","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020405","url":null,"abstract":"Prediction of learners’ learning styles in online environments has several advantages, including steering learners on the proper path, motivating and engaging them while learning, and improving their learning results. It also helps instructors in the formation of personalized resource recommendations. As a result, predicting learners learning styles is necessary to aid in the personalization process. Existing approaches use either conventional or automatic approaches for learning style identifications. However, the large volume of data stored in online platforms has become a challenge in analyzing the behavior of learners and predicting their learning styles in the real world. Also, most of the existing approaches rely on a particular learning platform and can not be used in other platforms without technical assistance. In this paper, we propose GNN-LS, a new approach to identify and predict learners learning styles using a graph neural network. First, the graph embedding technique is used to capture the representation of learners and resources as a bipartite graph and encode them into low-dimensional representation. The encoded L-R sequences were given as input to the K-means clustering algorithm to identify and obtain labels as per FSLSM dimensions. Then, Graph neural network is trained to predict the learner’s learning style in the real world. The GNN-LS technique can be applied in a variety of educational systems and adapted to fit a variety of learning style models. Extensive experiments are run using the 2015 KDD Cup public available dataset to demonstrate the capabilities of GNN-LS. 5.31-15.68% improvements are achieved across all four FSLSM dimensions in accuracy.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126628076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained Image Classification using Convolutional Neural Network and Support Vector Machine 基于卷积神经网络和支持向量机的细粒度图像分类
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020204
Yu Shi, Tao Lin, Wei He, Biaolong Chen, Ruixia Wang, Nan Jiang, Yabo Zhang
{"title":"Fine-grained Image Classification using Convolutional Neural Network and Support Vector Machine","authors":"Yu Shi, Tao Lin, Wei He, Biaolong Chen, Ruixia Wang, Nan Jiang, Yabo Zhang","doi":"10.33969/j-nana.2022.020204","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020204","url":null,"abstract":"Although vast neural network models can classify images, sub-classification for each image class requires retraining the exisiting model with new fine-grained data, subject to high training cost and uncertain classification accuracy. To solve the aforementioned problems, a method using Convolution Neural Network and Support Vector Machine is proposed, where the former extracts general features from images for sub-classification while the latter categorizes these features. The method can be rapidly deployed in most Internet of Things systems to identify various targets; its effectiveness in reducing training cost and improving classification accuracy is verified through experiments.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114314036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security-Reliability Tradeoffs for Dual-Hop Satellite Communication Systems with AF Relaying Protocol 采用AF中继协议的双跳卫星通信系统的安全可靠性权衡
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020202
Yeqiu Xiao, Jin Liu, Shuangrui Zhao
{"title":"Security-Reliability Tradeoffs for Dual-Hop Satellite Communication Systems with AF Relaying Protocol","authors":"Yeqiu Xiao, Jin Liu, Shuangrui Zhao","doi":"10.33969/j-nana.2022.020202","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020202","url":null,"abstract":"Satellite communication systems serve as an indispensable component of heterogeneous wireless networks in the next generation era for providing various critical civil and military applications. However, due to the broadcast nature and full accessibility of the wireless medium, such systems exist serious security threats. As an effort to address this issue, this paper, for the first time, investigates secure communication in a dual-hop communication system consisting of a satellite working as an amplified-and-forward relay. We first provide the theoretical modeling to analyze the fundamental system metrics in terms of secrecy outage probability and connection outage probability. By using the modeling, we then study the security-reliability tradeoffs and propose to transmit power schemes depending on the search algorithm. We further analyze asymptotic expressions of outage performance, which was further utilized to simplify the transmit power schemes. Simulation results show the validation of the proposed secure transmission model and design schemes of transmit power. Results also illustrate that transmit power schemes based on asymptotic analysis effectively achieve the optimal performance for the relay satellite communication system.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124294878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Beacon Deployment for Large-scale Positioning 大规模定位的高效信标部署
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010201
W. He, P. Ho, Dong Wang, Li Xiao
{"title":"Efficient Beacon Deployment for Large-scale Positioning","authors":"W. He, P. Ho, Dong Wang, Li Xiao","doi":"10.33969/j-nana.2021.010201","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010201","url":null,"abstract":"Instant and precise localization of indoor mobile users is fundamental for supporting various sophisticated location-aware services. Using Bluetooth low-power beacons for mobile user positioning has been reported as an effective approach, where the beacon deployment positioning (BDP) problem has been defined. The paper introduces a novel approach for solving large-scale BDP problems, aiming to significantly reduce beacon consumption from existing solutions with much less computation complexity. Extensive simulations are conducted to verify the proposed algorithm, whose beacon consumption is about 1.14 to 1.67 times and 0.2 to 0.48 times compared to those of the Mixed Integer Linear Program (ILP) and a naive iBeacon solution respectively. We have also observed that the running time scales well with the growth of the number of Test Positions and attenuation factors.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124716292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Embedded Contact Tracing using Mobile Devices, Cloud, and iBeacons 嵌入式接触跟踪使用移动设备,云,和iBeacons
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010304
Mian Hamza, Jin-Xin Hu
{"title":"Embedded Contact Tracing using Mobile Devices, Cloud, and iBeacons","authors":"Mian Hamza, Jin-Xin Hu","doi":"10.33969/j-nana.2021.010304","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010304","url":null,"abstract":"Covid-19 is a modern pandemic that has ripped through the fabric of our daily lives. We are required to limit our exposure to other people to help safeguard each other’s health. Contact-tracing/early detection serves as an effective solution for the management of Covid-19 and other similar pandemic diseases. The current popular IoT contact tracing implementations rely on a mobile-centric approach where cellular phones broadcast as beacons and nearby embedded devices log beacon interaction data locally. The proposed approach is a hybrid method that utilizes decentralized iBeacons to track individuals and a centralized cloud infrastructure to communicate/store user exposure data with BLE and Cloud access. The solution addresses potential privacy concerns and offers a simple low-cost contact tracing infrastructure set-up for offices, s chools, a nd o ther s imilar p ublic spaces.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124606803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Frequency Offset and Channel Estimation for NB-IoT Systems NB-IoT系统的联合频偏和信道估计
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020201
Pinchang Zhang, Ji He, Jiankuo Dong, Letian Sha
{"title":"Joint Frequency Offset and Channel Estimation for NB-IoT Systems","authors":"Pinchang Zhang, Ji He, Jiankuo Dong, Letian Sha","doi":"10.33969/j-nana.2022.020201","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020201","url":null,"abstract":"The nonlinear distortions resulting from the radio frequency (RF) impairments such as frequency offset, I/Q-imbalance, phase noise, and quantization errors. The hardware impairments severely degrade signal reception performance in NB-IoT systems and hence estimation for hardware impairments is necessary and mitigated by compensation algorithms. To this end, this paper focuses on the problem of estimating channel gains and frequency offsets in an NB-IoT system. Specifically, we first separate channel gains and frequency offsets and derive the analytical expressions of interest, based on the maximum likelihood estimation; We derive the expectation-maximization algorithm and apply it to the NB-IoT system for solving joint estimation of frequency offsets and channel gains; We carry out extensive simulations to illustrate that how systems parameters (e.g., channel phase difference, frequency offset difference, SNR, the number of sampling) can affect estimation performance.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128425663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things 基于云的工业物联网可审计、可限时安全数据访问控制
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010306
Teng Li, Jiawei Zhang, Yanbo Yang, Wei Qiao, Yangxu Lin
{"title":"Auditable and Times limitable Secure Data Access Control for Cloud-based Industrial Internet of Things","authors":"Teng Li, Jiawei Zhang, Yanbo Yang, Wei Qiao, Yangxu Lin","doi":"10.33969/j-nana.2021.010306","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010306","url":null,"abstract":"Recently, the rapid development of Internet of things (IoT) and cloud computing technologies have greatly facilitated various industrial applications and Industrial IoT (IIoT). The widely deployed IIoT devices and large capacity of cloud significantly benefit for and bring convenience to various industrial sectors. However, there exist a large number of concerns about data security in IIoT, especially when a majority of sensitive IIoT data is shared in cloud. Although as one of the most promising technique, Ciphertext-Policy Attribute-Based Encryption (CP-ABE) can provide fine-grained access control for IIoT data shared in cloud, there are still many drawbacks which impede the direct adoption of conventional CP-ABE. On the one hand, unlimited IIoT data access times may disable data access service of cloud and bring serious consequences. On the other hand, the access policies of ciphertexts usually consist of much sensitive information and cause privacy exposure. Moreover, the high computation overhead also extremely hinders resource-limited users in IIoT applications. To solve these problems, we propose TAHP-CP-ABE, a k-times and auditable hidden-policy CP-ABE scheme which is suitable for resource-limited users and privacy-aware access policies with data access times limitation in IIoT applications. Specifically, TAHP-CP-ABE preserves the privacy of access policies by hiding only attribute values and realizes limited access times as well as efficient IIoT ciphertexts decryption with decryption test and outsourced decryption. The security analysis and experimental results indicate that TAHP-CP-ABE is secure, efficient and practical.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134188485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Cooperative Two-Step Vertical Handoff Scheme with Mobility Prediction 一种具有迁移率预测的两步协同垂直切换方案
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2021.010301
Shih Yu Chang, P. Ho
{"title":"A Cooperative Two-Step Vertical Handoff Scheme with Mobility Prediction","authors":"Shih Yu Chang, P. Ho","doi":"10.33969/j-nana.2021.010301","DOIUrl":"https://doi.org/10.33969/j-nana.2021.010301","url":null,"abstract":"As mobile communication evolves into 3G beyond, the interworking of multiple heterogeneous networks serves as the major effort for taking the best advantage of different technologies available in supporting various emerging services, such as VoIP, Video on Demand (VoD), and IP Television (IPTV), etc. Vertical handoff is one of the key mechanisms in achieving Always Best Connected (ABC) for the mobile users by leveraging the benefits of deploying different types of networks for provisioning seamless handoff/roaming services in presence of user mobility. This paper aims to introduce a novel cooperative two-step vertical handoff scheme for the integration of 3G Wireless Wide-Area Networks (WWAN) and the IEEE 802.11 Wireless Local-Area Networks (WLANs). The proposed scheme is based on the cooperation based access point (AP) and mobile station (MS), where the AP manipulates the sensed signal strength to determine whether a pre-handoff action should be initiated. To improve the accuracy of user mobility prediction, a Markov model that incorporates with a novel parameter training process is developed at the AP for acquiring the hotspot geographic arrangement, such as the location of aisles, walls, and entrances/exits, etc., which is considered as the major factor of determining the user mobility patterns in an indoor hotspot. We will justify feasibility and discuss the operation complexity of the proposed cooperative vertical handoff. Moreover, error propagation due to inaccurate signal strength measurement is studied through Maximum Likelihood estimation. Finally, we will clearly demonstrate the merits gained by using the proposed two-step vertical handoff mechanism through extensive simulation, where the derived analytical models are verified.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131633471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image Classification of Covid-19 Pneumonia Based on Mask-EfficientNet 基于mask - effentnet的Covid-19肺炎图像分类
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2022.020403
Xiao Xu, Wuhua Wang, Quanfeng Xu
{"title":"Image Classification of Covid-19 Pneumonia Based on Mask-EfficientNet","authors":"Xiao Xu, Wuhua Wang, Quanfeng Xu","doi":"10.33969/j-nana.2022.020403","DOIUrl":"https://doi.org/10.33969/j-nana.2022.020403","url":null,"abstract":"Novel coronavirus is a serious disease-causing virus which spreads through the air, such a highly contagious virus will cause great harm to the body after disease. After the Novel coronavirus infects someone, viruses hidden in the body will spread rapidly and widely in the population as the carrier moves, that cause catastrophic consequences. Therefore, how to quickly detect the infection of novel coronary pneumonia has become an urgent issue. Analysing the lung image of Computed Tomography (CT) is an important method to accurately detect whether people is infected by novel coronavirus in medical practice. In this paper, firstly, we use the binarized features of the novel coronary pneumonia image, and then use the features of histogram and mask as additional features, finally we design an improved network based on Efficient-Net. Through comparative experiments with other mainstream Convolutional Neural Network(CNN) networks, it is found that the model proposed in this paper reduces the parameters of the model and improves the detection accuracy.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131681921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Physical Layer Authentication in the Internet of Vehicles based on Signal Propagation Attribute Prediction 基于信号传播属性预测的车联网物理层认证
Journal of Networking and Network Applications Pub Date : 1900-01-01 DOI: 10.33969/j-nana.2023.030101
M. Umar, Jiandong Wang, Lei Liu, Zewei Guo, Shuguang Wang
{"title":"Physical Layer Authentication in the Internet of Vehicles based on Signal Propagation Attribute Prediction","authors":"M. Umar, Jiandong Wang, Lei Liu, Zewei Guo, Shuguang Wang","doi":"10.33969/j-nana.2023.030101","DOIUrl":"https://doi.org/10.33969/j-nana.2023.030101","url":null,"abstract":"Physical layer authentication (PLA) has emerged as a promising alternative to complex cryptographic-based authentication schemes, especially for the Internet of Vehicles (IoV) scenarios with resource-limited onboard units (OBUs). However, the existing PLA schemes securing the IoV against GPS location spoofing/falsification attacks consider only insider attackers. Moreover, they cannot be used by mobile vehicles to validate GPS locations. To address these issues, this paper proposes a PLA scheme based on the Gaussian process (GP) path loss prediction, where channel state information (CSI) is used to track the variation of the channel characteristics and predict the next legitimate path loss (PL) of the signal from a transmitter for authentication. The key ideas in the proposed scheme are to first establish a mapping between the historical CSI attributes and PL features of the transmitter’s signal and use this mapping to predict the next PL, which is then used to cross-verify the transmitter’s reported location information. Extensive simulation experiments are conducted using generated radio channel characteristics from the quasideterministic radio channel generator (QuaDRiGa) to demonstrate the effectiveness of the proposed approach. The results of the experiments show that our system efficiently addressed the limitations of the existing works and improves the authentication performance in IoV environments.","PeriodicalId":384373,"journal":{"name":"Journal of Networking and Network Applications","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124156593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信