{"title":"Hidden Markov Model for early prediction of the elderly’s dependency evolution in ambient assisted living","authors":"Rim Jouini, Chiraz Houaidia, Leila Azouz Saidane","doi":"10.1007/s12243-023-00964-9","DOIUrl":"10.1007/s12243-023-00964-9","url":null,"abstract":"<div><p>The integration of information and communication technologies (ICT) can be of great utility in monitoring and evaluating the elderly’s health condition and its behavior in performing Activities of Daily Living (ADL) in the perspective to avoid, as long as possible, the delays of recourse to health care institutions (e.g., nursing homes and hospitals). In this research, we propose a predictive model for detecting behavioral and health-related changes in a patient who is monitored continuously in an assisted living environment. We focus on keeping track of the dependency level evolution and detecting the loss of autonomy for an elderly person using a Hidden Markov Model based approach. In this predictive process, we were interested in including the correlation between cardiovascular history and hypertension as it is considered the primary risk factor for cardiovascular diseases, stroke, kidney failure and many other diseases. Our simulation was applied to an empirical dataset that concerned 3046 elderly persons monitored over 9 years. The results show that our model accurately evaluates person’s dependency, follows his autonomy evolution over time and thus predicts moments of important changes.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50507439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi
{"title":"Enhanced DASS-CARE 2.0: a blockchain-based and decentralized FL framework","authors":"Meryeme Ayache, Ikram El Asri, Jamal N. Al-Karaki, Mohamed Bellouch, Amjad Gawanmeh, Karim Tazzi","doi":"10.1007/s12243-023-00965-8","DOIUrl":"10.1007/s12243-023-00965-8","url":null,"abstract":"<div><p>The emergence of the Cognitive Internet of Medical Things (CIoMT) during the COVID-19 pandemic has been transformational. The CIoMT is a rapidly evolving technology that uses artificial intelligence, big data, and the Internet of Things (IoT) to provide personalized patient care. The CIoMT can be used to monitor and track vital signs, such as temperature, blood pressure, and heart rate, thus giving healthcare providers real-time information about a patient’s health. However, in such systems, the problem of privacy during data processing or sharing remains. Therefore, federated learning (FL) plays an important role in the Cognitive Internet of Medical Things (CIoMT) by allowing multiple medical devices to securely collaborate in a distributed and privacy-preserving manner. On the other hand, classical centralized FL models have several limitations, such as single points of failure and malicious servers. This paper presents an enhancement of the existing DASS-CARE 2.0 framework by using a blockchain-based federated learning framework. The proposed solution provides a secure and reliable distributed learning platform for medical data sharing and analytics in a multi-organizational environment. The blockchain-based federated learning framework offrs an innovative solution to overcome the challenges encountered in traditional FL. Furthermore, we provide a comprehensive discussion of the advantages of the proposed framework through a comparative study between our DASS-CARE 2.0 and the traditional centralized FL model while taking the aforementioned security challenges into consideration. Overall, the performance of the proposed framework shows significant advantages compared to traditional methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86594149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel
{"title":"Towards greener digital infrastructures for ICT and vertical markets","authors":"Dominique Chiaroni, Raffaele Luca Amalfi, Jos George, Maximilian Riegel","doi":"10.1007/s12243-023-00961-y","DOIUrl":"10.1007/s12243-023-00961-y","url":null,"abstract":"<div><p>One of the most important challenges of this century will be to minimise as much as possible the energy consumption of the worldwide digital infrastructure to have a significant contribution on our emissions of CO<sub>2</sub> reduction since energy consumption and emission of CO<sub>2</sub> are directly linked. Therefore, after an introduction (part 1), in part 2 of this paper, we will describe the status of the worldwide production of electricity, the contribution of information and communications technology (ICT) in terms of electricity consumption, and the identification of the critical network segments that can have a significant environmental impact. In part 3, we will focus on the data centres and core services that represent important network segments responsible for the largest emission of CO<sub>2</sub>. In part 4, we will address the access and aggregation part, which represents the second important network segment to optimise. Part 5 will focus on the home networking and enterprise. And before an estimation of the energy savings obtained when adopting the innovations proposed, the impact of the vertical market will be discussed in part 6. Finally, the conclusion (part 7) will summarise the results and perspectives will be proposed to complete the analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-06-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50477759","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba
{"title":"Robust adaptive beamforming algorithm for coherent signals based on virtual array","authors":"Yuxi Du, Weijia Cui, Fengtong Mei, Chunxiao Jian, Bin Ba","doi":"10.1007/s12243-023-00966-7","DOIUrl":"10.1007/s12243-023-00966-7","url":null,"abstract":"<div><p>Aiming at the problem of beamforming performance degradation under the coherent signals model, this paper proposes an adaptive beamforming algorithm based on the virtual array. Compared with previous work, the creative construction of virtual arrays in this paper allows the algorithm to ensure strong coherent signal processing and superior output performance with no degradation in coherence capability. The proposed algorithm firstly constructs a virtual array symmetric to the physical array to form a virtual antenna array model; secondly, a full-rank covariance matrix is obtained by matrix reconstruction; then, the direction vector and power of the signals are estimated; finally, the estimated parameters are used to reconstruct the interference plus noise covariance matrix (INCM) and calculate the weight vector. Simulation analysis verifies the superiority of the algorithm and the validity of theoretical analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50475666","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki
{"title":"Introduction to the special issue: 5+G network energy consumption, energy efficiency and environmental impact","authors":"Cédric Ware, Marceau Coupechoux, Ekram Hossain, Carmen Mas-Machuca, Vinod Sharma, Anna Tzanakaki","doi":"10.1007/s12243-023-00967-6","DOIUrl":"10.1007/s12243-023-00967-6","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50474537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Telephony speech system performance based on the codec effect","authors":"Mohamed Hamidi, Ouissam Zealouk, Hassan Satori","doi":"10.1007/s12243-023-00968-5","DOIUrl":"10.1007/s12243-023-00968-5","url":null,"abstract":"<div><h2>Abstract\u0000</h2><div><p>This paper is a part of our contribution to research on the enhancement of network automatic speech recognition system performance. We built a highly configurable platform by using hidden Markov models, Gaussian mixture models, and Mel frequency spectral coefficients, in addition to VoIP G.711-u and GSM codecs. To determine the optimal values for maximum performance, different acoustic models are prepared by varying the hidden Markov models (from 3 to 5) and Gaussian mixture models (8–16-32) with 13 feature extraction coefficients. Additionally, our generated acoustic models are tested by unencoded and encoded speech data based on G.711 and GSM codecs. The best parameterization performance is obtained for 3 HMM, 8–16 GMMs, and G.711 codecs.</p></div></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50529706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SHAKE-ESDRL-based energy efficient intrusion detection and hashing system","authors":"Geo Francis E, S. Sheeja","doi":"10.1007/s12243-023-00963-w","DOIUrl":"https://doi.org/10.1007/s12243-023-00963-w","url":null,"abstract":"","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72509855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attribute-based encryption of LSSS access structure with expressive dynamic attributes based on consortium blockchain","authors":"Shengzhou Hu, Tingting Zhong, Hua He, Wenhao Li","doi":"10.1007/s12243-023-00949-8","DOIUrl":"10.1007/s12243-023-00949-8","url":null,"abstract":"<div><p>Attribute-based encryption (ABE) allows users to encrypt and decrypt data based on attributes. It realizes fine-grained access control and can effectively solve the one-to-many encryption and decryption problem in open cloud application. Linear secret sharing scheme (LSSS) is the common access structure with a matrix on the attributes in ABE schemes, which may depict AND, OR, threshold operations, etc. However, LSSS access structure does not depict the complex and dynamic access policy of attributes, such as the complicated relationship of different attributes and the generation of dynamic attributes. It severely restricts the expansion of the practical application of ABE. Besides, there exists another problem; attribute authority (AA) in traditional ABE has a concentration of power and easily suffers from single-point failure or privacy leakage for being attacked or corrupted. Blockchain is a decentralized, tamper-free, traceable, and multi-party distributed database technology. Consortium blockchain (CB) is a partially centralized blockchain, whose openness is between the public blockchain and the private blockchain. In this paper, an ABE scheme on LSSS access structure with expressive dynamic attributes (EDA) based on CB (LSSS-EDA-ABE-CB) was proposed to resolve the above issues. EDA can construct the comprehensive attribute calculation expressions by conducting various operations, such as arithmetic operations, relational operations, and string operations. In virtue of the application of EDA, the proposed scheme can reconstruct new composite attributes to realize the dynamic adjustment of attributes. A partitioning method of EDA avoids one attribute appearing in two different EDA expressions. The CB technology enhanced the authority and trustworthiness of AA by openly recording AA’s attribute key distributions in CB transactions. The scheme in the paper was proven CPA-secure under the decision q-PBDHE assumption in standard model in the CB application environment. The scheme provides a more general data access policy and maintains the fine-grained character of ABE simultaneously. Finally, the security and performance analysis shows that the proposed scheme is secure and highly efficient.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50494392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks
{"title":"Backscatter communication system efficiency with diffusing surfaces","authors":"Jean-Marc Kelif, Dinh-Thuy Phan-Huy, Philippe Ratajczak, Orange Innovation/Networks","doi":"10.1007/s12243-023-00955-w","DOIUrl":"10.1007/s12243-023-00955-w","url":null,"abstract":"<div><p>In an ambient backscatter communication system, the waves generated by a source are reflected by a tag, in a variable manner in time. Therefore, the tag can transmit a message to a reader, without generating any radio wave and without battery. As a consequence, such a communication system is a promising technology for ultra-low energy wireless communications. In the simplest implementation of such a system, the tag sends a binary message by oscillating between two states and the reader detects the bits by comparing the two distinct received powers. In this paper, for the first time, we propose to analyze the impact of the shape of diffusing flat panel surfaces that diffuse in all directions, on an ambient backscatter communication system. We establish the analytical closed form expression of the power contrast in the presence of flat panels, by considering a rectangular surface and a disk-shaped surface, and we show that diffusing surfaces improve the power contrast. Moreover, our approach allows us to express the contrast to noise ratio, and therefore to establish the BER performance. Furthermore, we show that it makes it possible to improve the energetic performance, thanks to diffusing surfaces. For any configuration characterized by a fixed source, tag and reader, we moreover determine the precise locations of diffusing surfaces, which induce a maximum efficiency of the surfaces, whatever the wavelength. Furthermore, we show that it becomes possible to easily determine an optimal frequency which maximizes the contrast power, thanks to the expression of the contrast power.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":null,"pages":null},"PeriodicalIF":1.9,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50472317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}