ICT Express最新文献

筛选
英文 中文
Navigating the future of wireless networks: A multidimensional survey on semantic communications 引领无线网络的未来:语义通信多维调查
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.06.001
{"title":"Navigating the future of wireless networks: A multidimensional survey on semantic communications","authors":"","doi":"10.1016/j.icte.2024.06.001","DOIUrl":"10.1016/j.icte.2024.06.001","url":null,"abstract":"<div><p>This paper offers an in-depth exploration of semantic communications, focusing on its integral role in wireless networks. We dissect its foundational architecture and the key elements that enable seamless AI integration. Our research categorizes semantic communications into various multimedia and task types, evaluating their applicability in both single and multitasking environments. We also investigate resource allocation and goal-oriented strategies, supported by empirical case studies. The paper concludes by spotlighting emerging trends, including AI, IoT, and 5G beyond. It identifies pressing challenges such as standardization, security, and efficiency. Our work provides a holistic understanding of contemporary semantic communications paradigms.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 747-773"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000663/pdfft?md5=d8180959e946c2a5050dbb213ce6b98b&pid=1-s2.0-S2405959524000663-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141414210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey 车载无线网络(VANET)背景下的人工智能、物联网和 6G 方法:调查
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.008
{"title":"Artificial Intelligence, Internet of things and 6G methodologies in the context of Vehicular Ad-hoc Networks (VANETs): Survey","authors":"","doi":"10.1016/j.icte.2024.05.008","DOIUrl":"10.1016/j.icte.2024.05.008","url":null,"abstract":"<div><p>Recent developments in the fields of communications, smart transportation systems and computer systems have significantly expanded the potential for intelligent solutions in the domains of traffic safety, convenience and efficiency. The utilization of Artificial Intelligence (AI) is presently prevalent across diverse sectors of application due to its significant capacity to augment conventional data-driven methodologies. In the domain of Vehicular Ad hoc NETworks (VANETs), data is regularly gathered from several sources. The collected data serves multiple goals, such as facilitating efficient routing, enhancing driver awareness, forecasting mobility patterns to prevent potential risks, and ultimately enhancing passenger comfort, safety and overall road experience. Internet of thing (IoT) can be a good solution fro many issues that of VANETs. In order to make a complete system of VANETs communications are very essential like 5G and 6G. This study provides a detailed examination of AI, IoT and 5G/6G methodologies currently being investigated by multiple research endeavors in the field of VANETs. The merits and demerits of the AI-based methodologies suggested for the VANET domain have been analyzed with the using of IoT and 5G/6G. In conclusion, forthcoming research prospects in the field of VANETs are ascertained.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 959-980"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000584/pdfft?md5=9498981f6a175f79dec6a8259f894c25&pid=1-s2.0-S2405959524000584-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141140184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects 用于数字孪生中网络安全自动化、智能化和可信性的可解释人工智能:方法、分类、挑战和前景
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.007
{"title":"Explainable AI for cybersecurity automation, intelligence and trustworthiness in digital twin: Methods, taxonomy, challenges and prospects","authors":"","doi":"10.1016/j.icte.2024.05.007","DOIUrl":"10.1016/j.icte.2024.05.007","url":null,"abstract":"<div><p>Digital twins (DTs) are an emerging digitalization technology with a huge impact on today’s innovations in both industry and research. DTs can significantly enhance our society and quality of life through the virtualization of a real-world physical system, providing greater insights about their operations and assets, as well as enhancing their resilience through real-time monitoring and proactive maintenance. DTs also pose significant security risks, as intellectual property is encoded and more accessible, as well as their continued synchronization to their physical counterparts. The rapid proliferation and dynamism of cyber threats in today’s digital environments motivate the development of automated and intelligent cyber solutions. Today’s industrial transformation relies heavily on artificial intelligence (AI), including machine learning (ML) and data-driven technologies that allow machines to perform tasks such as self-monitoring, investigation, diagnosis, future prediction, and decision-making intelligently. However, to effectively employ AI-based models in the context of cybersecurity, human-understandable explanations, and their trustworthiness, are significant factors when making decisions in real-world scenarios. This article provides an extensive study of explainable AI (XAI) based cybersecurity modeling through a taxonomy of AI and XAI methods that can assist security analysts and professionals in comprehending system functions, identifying potential threats and anomalies, and ultimately addressing them in DT environments in an intelligent manner. We discuss how these methods can play a key role in solving contemporary cybersecurity issues in various real-world applications. We conclude this paper by identifying crucial challenges and avenues for further research, as well as directions on how professionals and researchers might approach and model future-generation cybersecurity in this emerging field.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 935-958"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000572/pdfft?md5=0ba1659d944758ac3a820436b838f534&pid=1-s2.0-S2405959524000572-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Caching, transcoding, delivery and learning for advanced video streaming services 先进视频流媒体服务的缓存、转码、传输和学习
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.012
Minseok Choi, Tiange Xiang, Hyelee Lim, Yunoh Kim, Minkyun Ahn, Sunghun Oh, Hyeonsu Kim
{"title":"Caching, transcoding, delivery and learning for advanced video streaming services","authors":"Minseok Choi,&nbsp;Tiange Xiang,&nbsp;Hyelee Lim,&nbsp;Yunoh Kim,&nbsp;Minkyun Ahn,&nbsp;Sunghun Oh,&nbsp;Hyeonsu Kim","doi":"10.1016/j.icte.2024.05.012","DOIUrl":"10.1016/j.icte.2024.05.012","url":null,"abstract":"<div><p>Online video services are responsible for a large amount of global data traffic, which is why wireless video caching has become a major focus in order to deal with the increasing amount of data. While conventional caching methods have been successful in reducing file transmission latency and data traffic on the core network, there is still a lot of potential to improve wireless caching for streaming users’ satisfaction, especially as video streaming technology continues to improve. To improve caching, it is important to consider the distinct characteristics of a video file, video encoding, dynamic video streaming, and even 3D video services such as virtual reality (VR) and augmented reality (AR). This paper investigates the distinct video features that can be used to design video caching policies. Additionally, recent studies on wireless video caching and delivery are surveyed, with a focus on four key characteristics: (1) partitioning a video file, (2) encoding a video file into multiple quality versions, (3) recognizing that video file popularity is dynamic and heterogeneous, and (4) understanding that video recommendation affects a series of user requests.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 774-785"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000626/pdfft?md5=aa79da443d8dcc961380ae6917912748&pid=1-s2.0-S2405959524000626-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142020435","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments 为 5G NR-U 和 Wi-Fi 共存环境实现基于分布式 DQN 的全网能效最大化
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.010
Junseung Lee , Seung-Chan Lim , Hyungsub Kim , JeeHyeon Na , Howon Lee
{"title":"Distributed DQN-based network-wide energy efficiency maximization for 5G NR-U and Wi-Fi coexistence environments","authors":"Junseung Lee ,&nbsp;Seung-Chan Lim ,&nbsp;Hyungsub Kim ,&nbsp;JeeHyeon Na ,&nbsp;Howon Lee","doi":"10.1016/j.icte.2024.05.010","DOIUrl":"10.1016/j.icte.2024.05.010","url":null,"abstract":"<div><p>To effectively manage the escalating traffic, attention is drawn to the coexistence mechanism of cellular and Wi-Fi networks which offload the cellular traffic from the licensed band to the unlicensed band. For the coexistence of 5G new radio-unlicensed and Wi-Fi, we tackle the energy efficiency maximization problem by sequentially determining the duty cycle and transmit power through the use of distributed deep Q-network (DQN) techniques. When utilizing the existing unlicensed band, the proposed method minimizes the impact on Wi-Fi networks while achieving optimal energy efficiency. Simulations validate the superior energy efficiency of the proposed coexistence mechanism over various benchmark methods.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 845-850"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000602/pdfft?md5=e3791833fc223e43684bde66963942f4&pid=1-s2.0-S2405959524000602-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DRL-empowered joint batch size and weighted aggregation adjustment mechanism for federated learning on non-IID data DRL 驱动的联合批量大小和加权聚合调整机制,用于非 IID 数据的联合学习
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.011
Juneseok Bang , Sungpil Woo , Joohyung Lee
{"title":"DRL-empowered joint batch size and weighted aggregation adjustment mechanism for federated learning on non-IID data","authors":"Juneseok Bang ,&nbsp;Sungpil Woo ,&nbsp;Joohyung Lee","doi":"10.1016/j.icte.2024.04.011","DOIUrl":"10.1016/j.icte.2024.04.011","url":null,"abstract":"<div><p>To address the accuracy degradation as well as prolonged convergence time due to the inherent data heterogeneity among end-devices in federated learning (FL), we introduce the joint batch size and weighted aggregation adjustment problem, which is non-convex problem. To adjust optimal hyperparameters, we develop deep reinforcement learning (DRL) to empower a mechanism known as Batch size and Weighted aggregation Adjustment (BWA). Experimental evaluation demonstrates that BWA not only outperforms methods optimized solely from either a local training or server perspective but also achieves higher accuracy, with an increase of up to 5.53% compared to FedAvg, and additionally accelerates convergence speeds.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 863-870"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000481/pdfft?md5=cbc73fea8316b49de9d580f917417c6c&pid=1-s2.0-S2405959524000481-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New private information retrieval codes for imperfect privacy 针对不完全隐私的新私人信息检索代码
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.05.003
{"title":"New private information retrieval codes for imperfect privacy","authors":"","doi":"10.1016/j.icte.2024.05.003","DOIUrl":"10.1016/j.icte.2024.05.003","url":null,"abstract":"<div><p>In this paper, we introduce new codes for the private information retrieval (PIR). The conventional Tian-Sun-Chen (TSC) scheme achieves PIR capacity under the perfect privacy conditions with the minimum message length. Based on the TSC scheme, weakly PIR (WPIR) schemes have been developed to benefit download costs by relaxing privacy. We show that the proposed scheme has lower download cost than the TSC scheme in the weak privacy setting. While our scheme is not capacity-achieving under perfect privacy, it has smaller message sizes compared with the TSC scheme.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 891-894"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000535/pdfft?md5=0e9729459e20853996a14bd00c099286&pid=1-s2.0-S2405959524000535-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141057335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-link interference in the 5G cell search procedure: Observation and field experiments for mitigation 5G 小区搜索过程中的交叉链路干扰:观察和现场实验以减轻干扰
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.06.002
{"title":"Cross-link interference in the 5G cell search procedure: Observation and field experiments for mitigation","authors":"","doi":"10.1016/j.icte.2024.06.002","DOIUrl":"10.1016/j.icte.2024.06.002","url":null,"abstract":"<div><p>This paper presents field experiment results that illustrate the impact of cross-link interference on the cell search procedure in a 5G time division duplex system. We initially show how cross-link interference affects to the cell search procedure from an analytic aspect. An example of an experimental result provided in this paper shows how the user equipment wrongly estimates the symbol timing offset due to cross-link interference. Furthermore, we propose a modified cell search algorithm which is robust against the strong influence of cross-link interference. The proposed modification efficiently suppresses the effects of cross-link interference by applying selective energy normalization to the correlation process. The experimental results show that the modified algorithm can accurately estimate the symbol timing offset with a negligible increment in computation time.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 810-816"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000675/pdfft?md5=781bb14e0a8863a44606f0b4af10514f&pid=1-s2.0-S2405959524000675-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open-set learning context recognizing in mobile learning: Problem and methodology 移动学习中的开放式学习情境识别:问题与方法
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.006
{"title":"Open-set learning context recognizing in mobile learning: Problem and methodology","authors":"","doi":"10.1016/j.icte.2024.04.006","DOIUrl":"10.1016/j.icte.2024.04.006","url":null,"abstract":"<div><p>Mobile learning allows for an interactive way of learning through devices like smartphones. However, current methods usually rely on pre-set situations and struggle to recognize new contexts when they come up during testing. To solve this, we suggest the Open-set Learning Context Recognition Model (OLCRM). This model uses data extracted from smartphone sensors to identify whether a learning context is known or unknown. It also uses a Dual Discriminator Generative Adversarial Network (DDGAN) to create high-quality fake examples, which helps improve the accuracy of recognizing contexts. Experimental results demonstrate the effectiveness of OLCRM in open-set learning context recognition problems.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 909-915"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000432/pdfft?md5=eeb8e163c28d0144789f643d5b84cbd8&pid=1-s2.0-S2405959524000432-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140770935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and efficient communications with fine-grained access control in underwater wireless sensor networks 水下无线传感器网络中带有细粒度访问控制的安全高效通信
IF 4.1 3区 计算机科学
ICT Express Pub Date : 2024-08-01 DOI: 10.1016/j.icte.2024.04.009
Donghyun Yu , Sinwoong Yun , Jemin Lee
{"title":"Secure and efficient communications with fine-grained access control in underwater wireless sensor networks","authors":"Donghyun Yu ,&nbsp;Sinwoong Yun ,&nbsp;Jemin Lee","doi":"10.1016/j.icte.2024.04.009","DOIUrl":"10.1016/j.icte.2024.04.009","url":null,"abstract":"<div><p>As UWSN have received attention, a need for an efficient and secure communication protocol has arisen to overcome the low device performance, node failure, and high propagation latency. However, existing works are either specialized for one-to-one communication or cannot satisfy low latency constraints. Therefore, this work proposes a secure communication protocol with fine-grained access control for UWSN that support secure and efficient one-to-many communication and considers potential internal attackers for high security level. Specifically, we adopt lightweight ABE to achieve fine-grained access control at low cost, and introduce outsourced decryption to further alleviate the computational load of underwater sensors.</p></div>","PeriodicalId":48526,"journal":{"name":"ICT Express","volume":"10 4","pages":"Pages 851-856"},"PeriodicalIF":4.1,"publicationDate":"2024-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2405959524000468/pdfft?md5=c8e9226fb46ab40851b0785438cbd4a0&pid=1-s2.0-S2405959524000468-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142021021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信