ICT Express最新文献

筛选
英文 中文
Muloc: Multi-scale combination mask indoor localization network for WiFi based on channel state information Muloc:基于信道状态信息的WiFi多尺度组合掩模室内定位网络
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.005
Haoyang Qi , Xin Song , Yuqi Zhang , Lanfeng Li , Zhiao Cao
{"title":"Muloc: Multi-scale combination mask indoor localization network for WiFi based on channel state information","authors":"Haoyang Qi ,&nbsp;Xin Song ,&nbsp;Yuqi Zhang ,&nbsp;Lanfeng Li ,&nbsp;Zhiao Cao","doi":"10.1016/j.icte.2025.04.005","DOIUrl":"10.1016/j.icte.2025.04.005","url":null,"abstract":"<div><div>With the popularization of sensor technology, researchers extract Channel State Information (CSI) from WiFi, which reflects the movement of family members by observing changes in signal transmission in residences. However, WiFi signals are still affected by multipath effects in residences. Therefore, we construct a multi-scale CSI combination mask matrix between adjacent scales based on the ternary closure. Next, we propose a competitive localization network based on aggregated affinity propagation algorithm. Experiments have been conducted to demonstrate that the proposed algorithm achieves significant improvement compared to other classical algorithms in the indoor environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 529-535"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comprehensive multi-agent deep reinforcement learning framework with adaptive interaction strategies for contention window optimization in IEEE 802.11 Wireless LANs 基于自适应交互策略的IEEE 802.11无线局域网竞争窗口优化综合多智能体深度强化学习框架
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.01.010
Yi-Hao Tu, Yi-Wei Ma
{"title":"A comprehensive multi-agent deep reinforcement learning framework with adaptive interaction strategies for contention window optimization in IEEE 802.11 Wireless LANs","authors":"Yi-Hao Tu,&nbsp;Yi-Wei Ma","doi":"10.1016/j.icte.2025.01.010","DOIUrl":"10.1016/j.icte.2025.01.010","url":null,"abstract":"<div><div>This study introduces the Multi-Agent, Multi-Parameter, Interaction-Driven Contention Window Optimization (M2I-CWO) algorithm, a novel Multi-Agent Deep Reinforcement Learning (MADRL) framework designed to optimize multiple CW parameters in IEEE 802.11 Wireless LANs. Unlike single-parameter or specialized multi-agent methods, M2I-CWO employs a Dueling-DQN architecture and an Adaptive Interaction Reward Function—spanning independent, cooperative, competitive, and mixed modes—and accommodates Hierarchical Multi-Agent System (HMAS) or Federated RL (FRL) for further scalability. First, multiple CW parameters are simultaneously adjusted to enhance collision management. Second, M2I-CWO consistently achieves throughput improvements in both static and dynamic scenarios. Extensive results confirm M2I-CWO's superiority in efficiency and adaptability.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 473-480"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning-based channel prediction for TDD MIMO systems with imperfect channel reciprocity 基于深度学习的不完全信道互易TDD MIMO系统信道预测
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.011
Heecheol Yang
{"title":"Deep learning-based channel prediction for TDD MIMO systems with imperfect channel reciprocity","authors":"Heecheol Yang","doi":"10.1016/j.icte.2025.04.011","DOIUrl":"10.1016/j.icte.2025.04.011","url":null,"abstract":"<div><div>In wireless communication systems, accurate channel state information plays a fundamental role in achieving optimal transmission efficiency at the base station (BS). We introduce a deep learning-based channel prediction designed to address the challenges posed by imperfect channel reciprocity in time-division duplex multiple-input multiple-output systems. We propose two models that not only facilitate accurate channel prediction but also perform channel calibration that can alleviate the impact of imperfect channel reciprocity between BS and users. We evaluate the performance through the simulations in line-of-sight and non-line-of-sight scenarios, demonstrating efficacy in enhancing the accuracy of predicted future downlink channels.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 590-596"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To associate or not to associate? A user-based threshold scheme for 5G and beyond networks 联系还是不联系?5G及以上网络的基于用户的阈值方案
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.003
Naor Zohar
{"title":"To associate or not to associate? A user-based threshold scheme for 5G and beyond networks","authors":"Naor Zohar","doi":"10.1016/j.icte.2025.03.003","DOIUrl":"10.1016/j.icte.2025.03.003","url":null,"abstract":"<div><div>Traditionally, User-cell Association (UA) schemes for cellular networks are based solely on the quality and strength of the received signal. This mechanism may not always be adequate for the complex nature of fifth generation and beyond (B5G) networks, and may lead to load biasing. Additional parameters, such as the load on the neighboring cells, the needs of the user equipment (UE), and the UE mobility should be considered as well. The realization that relying solely on the signal strength and quality for UA may violate load balancing has been recognized for a long time. However, the approach taken was to balance the load by a network-dependent mechanism. Yet, the UA mechanism remains based on the best-received signal. The underlying assumption that all the users have the same needs remains. Load-aware UA was considered only upon mobility-driven handover to small cells. This study suggests a UE-based threshold scheme for load-aware UA that is suitable for B5G networks. Since the optimal UA problem is known to be NP-hard, we suggest a heuristic mechanism, that is sufficiently simple and reliable to be implemented in practice, yet sufficiently efficient to significantly outperform the existing UA mechanism. Simulation results demonstrated that the suggested UA scheme can potentially reduce the required network bandwidth resources by up to 25%<!--> <!-->and significantly reduce the service blocking probability and the average waiting time for service.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 390-401"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled KYC integration for CLV optimization with robust M-Estimation and IRLS method 基于区块链的KYC集成,基于稳健的m估计和IRLS方法进行CLV优化
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.006
Marischa Elveny , Mahyuddin K.M. Nasution , Fanindia Purnamasari , Tengku Siti Meriam Tengku Wook
{"title":"Blockchain-enabled KYC integration for CLV optimization with robust M-Estimation and IRLS method","authors":"Marischa Elveny ,&nbsp;Mahyuddin K.M. Nasution ,&nbsp;Fanindia Purnamasari ,&nbsp;Tengku Siti Meriam Tengku Wook","doi":"10.1016/j.icte.2025.03.006","DOIUrl":"10.1016/j.icte.2025.03.006","url":null,"abstract":"<div><div>This research introduces an innovative approach in implementing Know Your Customer (KYC) on blockchain technology as a means of using data, hybrid robust m-estimation, and the iteratively reweighted less squares (IRLS) method to optimize CLV data. This approach aims to improve the accuracy and reliability of CLV predictions by ensuring the security and reliability of customer data. This tool can help companies manage and increase CLV more effectively, meeting data security and compliance standards. The R-squared validation test results are close to 1, so the model can explain data variations well. RMSE and MSE have small values, ​​so the model has good performance in predicting the target value. With these achievements, this approach contributes to the development of better marketing strategies and business decisions in an increasingly complex and rapidly changing digital environment.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 402-410"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer 使用联邦学习和西伯利亚虎优化器进行物联网攻击检测的分布式优化
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.02.012
Brij B. Gupta , Akshat Gaurav , Wadee Alhalabi , Varsha Arya , Eman Alharbi , Kwok Tai Chui
{"title":"Distributed optimization for IoT attack detection using federated learning and Siberian Tiger optimizer","authors":"Brij B. Gupta ,&nbsp;Akshat Gaurav ,&nbsp;Wadee Alhalabi ,&nbsp;Varsha Arya ,&nbsp;Eman Alharbi ,&nbsp;Kwok Tai Chui","doi":"10.1016/j.icte.2025.02.012","DOIUrl":"10.1016/j.icte.2025.02.012","url":null,"abstract":"<div><div>The rapid growth of IoT devices has heightened the risk of botnet attacks, calling for scalable and distributed detection solutions. In this context, this study proposes a distributed optimization system for IoT attack detection using CNN model utilizing federated learning. After optimizing the hyperparameters of the model at the server, the Siberian Tiger Optimization (STO) method distributes these values to clients for dispersed training. Our model achieves accuracy, recall, and precision of 0.89978, 0.94355, and 0.94455, respectively, using the N-BaIoT dataset. These findings show, in spite of latency issues, the efficiency of federated learning in distributed IoT security systems.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 542-546"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144296816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adversarial defense for battery state-of-health prediction models 电池健康状态预测模型的对抗性防御
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.011
Masoumeh Mohammadi, Insoo Sohn
{"title":"Adversarial defense for battery state-of-health prediction models","authors":"Masoumeh Mohammadi,&nbsp;Insoo Sohn","doi":"10.1016/j.icte.2025.03.011","DOIUrl":"10.1016/j.icte.2025.03.011","url":null,"abstract":"<div><div>This study addresses the challenge of state of health (SOH) estimation for lithium-ion batteries using a generative graphical approach under adversarial conditions. We analyze the impact of adversarial data poisoning attacks on SOH prediction models, specifically employing the fast gradient sign method (FGSM) and iterative fast gradient sign method (IFGSM). To enhance model robustness, we propose a two-defense strategy against such attacks. The effectiveness of these defenses is evaluated using error metrics such as root-mean-square error (RMSE), mean absolute error (MAE), and mean-square error (MSE). Results indicate that the proposed strategy significantly improves the model’s ability to accurately predict SOH, even in the presence of malicious data.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 436-441"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards fault-tolerant distributed quantum computation (FT-DQC): Taxonomy, recent progress, and challenges 迈向容错分布式量子计算(FT-DQC):分类、最新进展和挑战
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.007
Harashta Tatimma Larasati , Byung-Soo Choi
{"title":"Towards fault-tolerant distributed quantum computation (FT-DQC): Taxonomy, recent progress, and challenges","authors":"Harashta Tatimma Larasati ,&nbsp;Byung-Soo Choi","doi":"10.1016/j.icte.2025.03.007","DOIUrl":"10.1016/j.icte.2025.03.007","url":null,"abstract":"<div><div>As the works on quantum computing have seen substantial development in recent years, we are on the verge of seeing the fruitful result of the preliminary, early version of quantum computers. Nevertheless, in order to achieve full-fledged, large-scale quantum computers, two aspects still lacking in the existing quantum computers, i.e., scalability and reliability, will need to be more carefully considered and investigated. In this survey, we present a review of existing literature that aims to alleviate the scalability and reliability issues in quantum computers. In particular, we discuss how existing research leads to two main solutions: for advancing scalability, a distributed quantum computing (DQC) paradigm will be the primary direction instead of the general centralized quantum computing (CQC), whereas for attaining reliability, a fault-tolerant quantum computation (FTQC) approach would need to be leveraged instead of the existing noisy intermediate-scale quantum computers (NISQ). Combining both solutions, we highlight the essentiality of fault-tolerant distributed quantum computation (FT-DQC) and present related progress in the field. Furthermore, from the papers that we have gathered, we provide the taxonomy of the works to give a clearer landscape of the field and discuss the key issues in realizing FT-DQC.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 417-435"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robust and secure communications using dynamic rotations reconfigurable intelligent surface 使用动态旋转可重构智能表面的稳健和安全通信
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.03.010
Kunyu Li, Guoping Zhang, Hongbo Xu, Ruijie Li, Yun Chen, Xingxing Huang
{"title":"Robust and secure communications using dynamic rotations reconfigurable intelligent surface","authors":"Kunyu Li,&nbsp;Guoping Zhang,&nbsp;Hongbo Xu,&nbsp;Ruijie Li,&nbsp;Yun Chen,&nbsp;Xingxing Huang","doi":"10.1016/j.icte.2025.03.010","DOIUrl":"10.1016/j.icte.2025.03.010","url":null,"abstract":"<div><div>This paper investigates the secure transmission problem using a dynamically reconfigurable intelligent surface (RIS). Considering an eavesdropping scenario where a multi-antenna eavesdropper has inadequate channel state information, a resilient beamforming strategy is proposed to simultaneously optimize the active beamforming at the base station and rotational angles of the RIS in order to improve the system's secrecy rate. A continuous-time propagation model is used to explain the dynamically rotating RIS to maximize the cascaded channel gain. Simulation findings validate the security benefits of the resilient beamforming approach, and the dynamic rotation technique increases the secrecy rate while reducing delay spread.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 523-528"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new method for 3D face reconstruction using transformers based on action unit features 一种基于动作单元特征的三维人脸重构方法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2025-06-01 DOI: 10.1016/j.icte.2025.04.004
Hyeonjin Kim, Hyukjoon Lee
{"title":"A new method for 3D face reconstruction using transformers based on action unit features","authors":"Hyeonjin Kim,&nbsp;Hyukjoon Lee","doi":"10.1016/j.icte.2025.04.004","DOIUrl":"10.1016/j.icte.2025.04.004","url":null,"abstract":"<div><div>Abstract</div><div>We present a novel 3D face reconstruction framework called Facial action unit (AU) feature-based 3D FAce Reconstruction using Transformer (AUFART) that can generate a 3D face model that is responsive to AU activation given a single monocular 2D image to capture expressions. We propose a novel 3D face reconstruction framework, called AUFART (Facial Action Unit Feature-based 3D Face Reconstruction using Transformer), which generates 3D face models responsive to AU activations from a single monocular 2D image, effectively capturing facial expressions. AUFART leverages AU-specific features as well as facial global features to achieve accurate 3D reconstruction of facial expressions using transformers. We also introduce a loss function designed to guide the learning process so that the discrepancy in AU activations between the input and rendered reconstruction is minimized. The proposed framework achieves an average F1 score of 0.39, outperforming state-of-the-art methods.</div></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"11 3","pages":"Pages 454-459"},"PeriodicalIF":4.1,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144297526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信