Annals of Telecommunications最新文献

筛选
英文 中文
RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models RIOT-ML:用于空中安全更新和 TinyML 模型性能评估的工具包
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-05-22 DOI: 10.1007/s12243-024-01041-5
Zhaolan Huang, Koen Zandberg, Kaspar Schleiser, Emmanuel Baccelli
{"title":"RIOT-ML: toolkit for over-the-air secure updates and performance evaluation of TinyML models","authors":"Zhaolan Huang,&nbsp;Koen Zandberg,&nbsp;Kaspar Schleiser,&nbsp;Emmanuel Baccelli","doi":"10.1007/s12243-024-01041-5","DOIUrl":"10.1007/s12243-024-01041-5","url":null,"abstract":"<div><p>Practitioners in the field of TinyML lack so far a comprehensive, “batteries-included” toolkit to streamline continuous integration, continuous deployment and performance assessments of executing diverse machine learning models on various low-power IoT hardware. Addressing this gap, our paper introduces RIOT-ML, a versatile toolkit crafted to assist IoT designers and researchers in these tasks. To this end, we designed RIOT-ML based on an integration of an array of functionalities from a low-power embedded OS, a universal model transpiler and compiler, a toolkit for TinyML performance measurement, and a low-power over-the-air secure update framework—all of which usable on an open-access IoT testbed available to the community. Our open-source implementation of RIOT-ML and the initial experiments we report on showcase its utility in experimentally evaluating TinyML model performance across fleets of low-power IoT boards under test in the field, featuring a wide spectrum of heterogeneous microcontroller architectures and fleet network connectivity configurations. The existence of an open-source toolkit such as RIOT-ML is essential to expedite research combining artificial intelligence and IoT and to foster the full realization of edge computing’s potential.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 3-4","pages":"283 - 297"},"PeriodicalIF":1.8,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01041-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141111289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards efficient conflict mitigation in the converged 6G Open RAN control plane 在融合型 6G 开放 RAN 控制平面中实现高效冲突缓解
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-05-16 DOI: 10.1007/s12243-024-01036-2
Marius Corici, Ramona Modroiu, Fabian Eichhorn, Eric Troudt, Thomas Magedanz
{"title":"Towards efficient conflict mitigation in the converged 6G Open RAN control plane","authors":"Marius Corici,&nbsp;Ramona Modroiu,&nbsp;Fabian Eichhorn,&nbsp;Eric Troudt,&nbsp;Thomas Magedanz","doi":"10.1007/s12243-024-01036-2","DOIUrl":"10.1007/s12243-024-01036-2","url":null,"abstract":"<div><p>With the centralization of the RAN control functionality, a very large number of near real-time network optimization use cases have emerged. Until now, each of them has been implemented and validated as isolated network management functions, named xApps in Open RAN terminology. To be able to progress towards realistic, commercially deployable functionality, comprehensive conflict mitigation is needed, because the complete isolation of these xApps would result in conflicting decisions and instability. In this article, we study how the majority of these use cases can be implemented harmoniously, to create an enhanced RAN control plane, underlining the functionality required from the central units of the RAN, the grouping, and the interaction of the network management decision. Analyzing the gap existing in the O-RAN architecture, we identify the functionality needed and propose a management framework. Furthermore, we present an implementation roadmap for the development of such functionality as part of the Fraunhofer FOKUS Open5GCore toolkit, as a reference for how such functionality can be prototyped, validated, and integrated with external algorithms easily, to benefit from the large body of academic research.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"621 - 631"},"PeriodicalIF":1.8,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01036-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140969437","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Implementing the principle of least administrative privilege on operating systems: challenges and perspectives 在操作系统中执行最小管理权限原则:挑战与展望
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-05-16 DOI: 10.1007/s12243-024-01033-5
Eddie Billoir, Romain Laborde, Ahmad Samer Wazan, Yves Rütschlé, Abdelmalek Benzekri
{"title":"Implementing the principle of least administrative privilege on operating systems: challenges and perspectives","authors":"Eddie Billoir,&nbsp;Romain Laborde,&nbsp;Ahmad Samer Wazan,&nbsp;Yves Rütschlé,&nbsp;Abdelmalek Benzekri","doi":"10.1007/s12243-024-01033-5","DOIUrl":"10.1007/s12243-024-01033-5","url":null,"abstract":"<div><p>With the new personal data protection or export control regulations, the principle of least privilege is mandatory and must be applied even for system administrators. This article explores the different approaches implemented by the main operating systems (namely Linux, Windows, FreeBSD, and Solaris) to control the privileges of system administrators in order to enforce the principle of least privilege. We define a set of requirements to manage these privileges properly, striving to balance adherence to the principle of least privilege and usability. We also present a deep analysis of each administrative privilege system based on these requirements and exhibit their benefits and limitations. This evaluation also covers the efficiency of the currently available solutions to assess the difficulty of performing administrative privileges management tasks. Following the results, the article presents the RootAsRole project, which aims to simplify Linux privilege management. We describe the new features introduced by the project and the difficulties we faced. This concrete experience allows us to highlight research challenges.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"857 - 880"},"PeriodicalIF":1.8,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140968647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed-text keystroke dynamics authentication data set—collection and analysis 固定文字按键动态验证数据集收集与分析
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-05-15 DOI: 10.1007/s12243-024-01039-z
Halvor Nybø Risto, Olaf Hallan Graven
{"title":"Fixed-text keystroke dynamics authentication data set—collection and analysis","authors":"Halvor Nybø Risto,&nbsp;Olaf Hallan Graven","doi":"10.1007/s12243-024-01039-z","DOIUrl":"10.1007/s12243-024-01039-z","url":null,"abstract":"<div><p>Keystroke dynamics authentication is a method of authenticating a user and could be an alternative or addition to one-time codes, with minimal user inconvenience. In this study, a new data set was collected for 6 unique passwords, adding to the limited available data sets for keystroke dynamics available for researchers. Data was collected by emulating legitimate users familiar with the passwords and a wider range of attackers with limited login attempts. The data set is analyzed with the use of various methods, and the effects of password length and complexity are investigated. Two algorithms were employed, one achieving an average equal error rate varying between 10.2 and 18.1% depending on the password, and the other method achieving an average true accept rate of 98% and true reject rate of 90.4% by comparing across multiple individuals in the data set. These results provide a benchmark for further studies on this data set.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"731 - 743"},"PeriodicalIF":1.8,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01039-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140975659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts 实现开放式无线接入网基于意图的管理:检测服务级协议冲突的敏捷框架
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-05-10 DOI: 10.1007/s12243-024-01035-3
Nicollas R. de Oliveira, Dianne S. V. Medeiros, Igor M. Moraes, Martin Andreonni, Diogo M. F. Mattos
{"title":"Towards intent-based management for Open Radio Access Networks: an agile framework for detecting service-level agreement conflicts","authors":"Nicollas R. de Oliveira,&nbsp;Dianne S. V. Medeiros,&nbsp;Igor M. Moraes,&nbsp;Martin Andreonni,&nbsp;Diogo M. F. Mattos","doi":"10.1007/s12243-024-01035-3","DOIUrl":"10.1007/s12243-024-01035-3","url":null,"abstract":"<div><p>Radio Access Networks (RAN) management and orchestration are challenging due to the network’s complexity and dynamics. Management and orchestration rely on enforcing complex policies derived from mapping high-level intents, expressed as Service-Level Agreements (SLAs), into low-level actions to be deployed on the network. Such mapping is human-made and frequently leads to errors. This paper proposes the AGility in Intent-based management of service-level agreement Refinements (AGIR) system for implementing automated intent-based management in Open Radio Access Networks (Open RAN). The proposed system is modular and relies on Natural Language Processing (NLP) to allow operators to specify Service-Level Objectives (SLOs) for the RAN to fulfill without explicitly defining how to achieve these SLOs. It is possible because the AGIR system translates imprecise intents into configurable network instructions, detecting conflicts among the received intents. To develop the conflict detection module, we propose to use two deep neural network models, Long Short-Term Memory (LSTM) and Gated Recurrent Unit (GRU). The deep neural network model determines whether intents and policies are conflicting. Our results reveal that the proposed system reaches more than 80% recall in detecting conflicting intents when deploying an LSTM model with 256 neurons.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"693 - 706"},"PeriodicalIF":1.8,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140925789","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital credentials management system using rejectable soulbound tokens 使用可拒绝灵魂绑定令牌的数字凭证管理系统
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-04-23 DOI: 10.1007/s12243-024-01032-6
Rosa Pericàs-Gornals, Macià Mut-Puigserver, M. Magdalena Payeras-Capellá, Miquel Á. Cabot-Nadal, Jaume Ramis-Bibiloni
{"title":"Digital credentials management system using rejectable soulbound tokens","authors":"Rosa Pericàs-Gornals,&nbsp;Macià Mut-Puigserver,&nbsp;M. Magdalena Payeras-Capellá,&nbsp;Miquel Á. Cabot-Nadal,&nbsp;Jaume Ramis-Bibiloni","doi":"10.1007/s12243-024-01032-6","DOIUrl":"10.1007/s12243-024-01032-6","url":null,"abstract":"<div><p>Digital credentials are being issued by authorized entities to facilitate the digital identification of their users. Blockchain offers some inherent features that are highly advantageous for the management of credentials. Non-fungible tokens, or NFTs, might seem to be a perfect fit for the implementation of digital credentials. However, some crucial requirements for credentials are the non-transferability of the credential and that the authorized entity should receive explicit acceptance from the user who will own the new credential, which are features lacking in the current NFTs. This paper introduces a management system focused on issuing digital access credentials, enhancing traditional features by enabling the association of terms and conditions (T &amp;C) during issuance and providing users with non-repudiation of reception evidence upon acceptance. Leveraging an enhanced version of the soulbound tokens (SBTs), called RejSBTs, introduced in our previous work, the new system guarantees non-repudiation of reception and origin proofs. Furthermore, we provide a detailed implementation of the system, including solidity smart contracts, accompanied by a comprehensive cost and security analysis.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"843 - 855"},"PeriodicalIF":1.8,"publicationDate":"2024-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s12243-024-01032-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140667267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface 基于变容二极管的可重构智能表面在 6GHz 以下频率实现反射波束成形和干扰消除的实验演示
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01037-1
Philippe Ratajczak, Ramiz Bennadji, Eric Séguenot, Dinh-Thuy Phan-Huy
{"title":"Experimental demonstration of reflected beamforming and interference nulling at sub6GHz thanks to varactor-based reconfigurable intelligent surface","authors":"Philippe Ratajczak,&nbsp;Ramiz Bennadji,&nbsp;Eric Séguenot,&nbsp;Dinh-Thuy Phan-Huy","doi":"10.1007/s12243-024-01037-1","DOIUrl":"10.1007/s12243-024-01037-1","url":null,"abstract":"<div><p>Reconfigurable intelligent surface (RIS) is a promising solution to boost coverage sustainably by reflecting waves from a transmitter to a receiver and acting as a low-power and passive relay. In this paper, for the first time, we demonstrate experimentally that a reconfigurable intelligent surface designed for sub6GHz, and using varactor technology, can perform three-dimensional reflective beamforming and interference nulling. This result is achieved with a RIS prototype of 984 unit-cells, thanks to a compact control circuit individually addressing and configuring the voltage of each unit-cell, with a distinct voltage. To our knowledge, this prototype configures 17 to 70 times more distinct voltages than in the state-of-the-art. The experimental results in an indoor environment show a 10-dB gain. They also show, for the first time, that producing such a new prototype is feasible with minimal energy footprint and environmental impact, thanks to refurbishing. Indeed, a reflectarray antenna originally designed for three-dimensional beamforming has been turned into a RIS.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 9-10","pages":"633 - 648"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140610878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing 个人数据过滤:比较网络应用程序中 XSS 攻击与 Cookie 窃取有效性的系统性文献综述
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01022-8
Germán Rodríguez-Galán, Jenny Torres
{"title":"Personal data filtering: a systematic literature review comparing the effectiveness of XSS attacks in web applications vs cookie stealing","authors":"Germán Rodríguez-Galán,&nbsp;Jenny Torres","doi":"10.1007/s12243-024-01022-8","DOIUrl":"10.1007/s12243-024-01022-8","url":null,"abstract":"<div><p>Cross-site scripting (XSS) attacks pose a significant threat to the security of web applications, as they compromise personal information by stealing cookies. This study investigates the relationship between XSS attacks targeting websites versus XSS attacks aimed at stealing cookies to leak personal information. A systematic literature review has been conducted, analyzing 96 scientific articles from 2018 to 2023. Three complementary research questions have been proposed to address trends in methods and tools to detect vulnerabilities or mitigate XSS attacks, techniques to steal cookies, and leakage of personal data through cookie theft. Rayyan Intelligent Systematic Literature, Atlas.ti, and Research Rabbit tool supported our analysis, using sources such as IEEE Digital Xplore, ACM Digital Library, Springer Link, Web of Science, and Mendeley. The snowballing technique was applied using the Research Rabbit tool to find related articles, avoid inconsistent parameters and publications, and reduce the risk of bias. The ratio between XSS attacks on websites and cookie theft through XSS attacks is 5:1. It is crucial to persist in studying and introducing novel methods or tools to address this problem and provide better protection against cookie hijacking through XSS attacks. The research gap lies in understanding how our personal information is filtered by the theft of cookies through XSS attacks. More research is needed to fill this gap and to develop novel techniques or tools that teach the end user how their personal information is leaked by stealing cookies using XSS attacks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"79 11-12","pages":"763 - 802"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks FATE:无线医疗传感器网络中使用智能合约的基于属性的灵活可追踪加密数据共享方案
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01038-0
Aparna Singh, Geetanjali Rathee
{"title":"FATE: flexible attribute-based traceable encrypted data sharing scheme using smart contracts in wireless medical sensor networks","authors":"Aparna Singh,&nbsp;Geetanjali Rathee","doi":"10.1007/s12243-024-01038-0","DOIUrl":"10.1007/s12243-024-01038-0","url":null,"abstract":"<div><p>Given the adaptability and effectiveness of the smart health sector, it has gained much momentum in the last few years, particularly during the COVID-19 pandemic. However, the security and privacy of data sent through a public communication channel are gravely threatened by adopting cloud services for data sharing. The security and privacy of the data are also in jeopardy, as the owners lose full ownership of the material once it is uploaded to the cloud. In recent years, ciphertext policy attribute-based encryption (CP-ABE) has shown great potential as a privacy-preserving encryption mechanism. In this paper, a decentralized method of large-scale data storage has been introduced using the interplanetary file system (IPFS), thereby eliminating the issue of centralized storage and frequent data unavailability. A reliable third-party hospital node in a secure environment is adopted in the proposed model to guarantee data integrity and to reduce the load on the resource-constrained devices of the user. Simulation using the Charm-Crypto framework and Pairing-Based Cryptography library using the SS512 curve proves its performance and efficiency. The proposed scheme’s encryption time is constant at 46.96 ms regardless of the size of the attribute set, the key generation time is reduced by 79.09%, and the storage overhead is reduced by 71.3% as compared to the existing schemes.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 3-4","pages":"323 - 339"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks 双跳无线网络中基于多代理深度 Q 学习的联合中继和干扰器选择
IF 1.8 4区 计算机科学
Annals of Telecommunications Pub Date : 2024-04-18 DOI: 10.1007/s12243-024-01034-4
Anil Kumar Kamboj, Poonam Jindal, Pankaj Verma
{"title":"A multi-agent deep Q-learning-based joint relay and jammer selection in dual-hop wireless networks","authors":"Anil Kumar Kamboj,&nbsp;Poonam Jindal,&nbsp;Pankaj Verma","doi":"10.1007/s12243-024-01034-4","DOIUrl":"10.1007/s12243-024-01034-4","url":null,"abstract":"<div><p>Physical layer security (PLS) has cropped up as a promising solution to secure the wireless network. Cooperative communication is capable of improving the PLS, in addition to increasing the coverage area and reliability. It applies to diverse wireless systems, including long-term evolution (LTE) cellular systems, mobile ad hoc networks, and wireless sensor networks. The selection of relay and jammer nodes from the cluster of intermediate nodes can easily counter the strong eavesdroppers. Existing techniques of joint relay and jammer selection (JRJS) solve the optimization problem to find near-optimal secrecy. However, due to their computational complexity, most of these algorithms are not scalable for large networks. In this manuscript, we introduced the multi-agent deep Q-learning (MADQL) algorithm for secure joint relay and jammer selection in dual-hop wireless cooperative networks. The JRJS is transformed into a prediction-based problem and solved using deep Q-learning algorithms. The proposed reinforcement learning technique is model-free and best suited for situations where the exact global channel state information (CSI) for all the links is unavailable. The secrecy performance of the introduced algorithm is compared with the existing techniques. Simulation results confirmed that the MADQL-JRJS algorithm outperformed the existing algorithms.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 3-4","pages":"251 - 263"},"PeriodicalIF":1.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140611023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信