Geraldo A. Sarmento Neto, Thiago A. Ribeiro da Silva, Pedro F. F. de Abreu, Artur F. da S. Veloso, Luís H. de O. Mendes, André C. B. Soares, José V. dos Reis Junior
{"title":"Evaluating a mobility-aware ADR scheme in urban and suburban LoRaWAN environments","authors":"Geraldo A. Sarmento Neto, Thiago A. Ribeiro da Silva, Pedro F. F. de Abreu, Artur F. da S. Veloso, Luís H. de O. Mendes, André C. B. Soares, José V. dos Reis Junior","doi":"10.1007/s12243-025-01077-1","DOIUrl":"10.1007/s12243-025-01077-1","url":null,"abstract":"<div><p>LoRaWAN provides extensive coverage, low energy consumption, and support for numerous connected devices. Aiming to reduce power demand while maximizing network throughput, LoRaWAN employs the ADR mechanism, which adjusts transmission parameters based on the link budget. However, standard ADR struggles in environments with mobile end devices and frequent signal variations, requiring alternative approaches for such scenarios. In this context, this paper proposes and evaluates Percentile-based ADR (P-ADR), a scheme that leverages statistical methods to estimate link conditions more accurately and swiftly adapt to dynamic environments. To assess its performance, P-ADR was compared against ADR+, M-ADR, and standard ADR in various urban and suburban scenarios, considering simulated networks with 1–2 gateways and 200–1000 static and mobile end devices. Results show that P-ADR significantly enhances performance in mobile environments, achieving up to a 22.6% improvement in the average PDR and up to 62.63 bits/J higher average energy efficiency compared to standard ADR. These findings suggest that P-ADR is a promising solution for IoT applications, particularly in scenarios with fluctuating channel conditions.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"745 - 758"},"PeriodicalIF":2.2,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
John Sousa, Eduardo Ribeiro, Romulo Bustincio, Lucas Bastos, Renan Morais, Eduardo Cerqueira, Denis Rosário
{"title":"Enhancing robustness in federated learning using minimal repair and dynamic adaptation in a scenario with client failures","authors":"John Sousa, Eduardo Ribeiro, Romulo Bustincio, Lucas Bastos, Renan Morais, Eduardo Cerqueira, Denis Rosário","doi":"10.1007/s12243-025-01075-3","DOIUrl":"10.1007/s12243-025-01075-3","url":null,"abstract":"<div><p>Federated learning offers a promising solution for enabling collaborative model training across autonomous vehicles while preserving privacy and reducing communication overhead. However, efficiently selecting clients for the training process remains challenging, particularly in environments with statistical heterogeneity and frequent client failures. Client failures, often due to mobility or resource constraints, can significantly degrade the performance of the global model by reducing accuracy, slowing convergence, and introducing bias. This paper proposes a novel approach to enhance the robustness and reliability of FL in autonomous vehicle networks by integrating an entropy-based client selection mechanism with a minimal repair model. The entropy-based selection identifies clients with diverse and informative data, while the proposed tool substitutes failed clients with similar ones using the Hausdorff distance. Our results demonstrate that this combined approach outperforms existing methods regarding training loss, accuracy, and area under the curve, particularly in scenarios with high client dropout rates. These findings highlight the importance of considering data diversity and client substitution strategies to maintain robust FL in dynamic vehicular environments.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 9-10","pages":"885 - 899"},"PeriodicalIF":2.2,"publicationDate":"2025-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145210285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
E. Y. Li, M. J. Zheng, W. Yang, R. Y. Wang, X. J. Wang
{"title":"Performance analysis for security improvement in secondary NOMA networks","authors":"E. Y. Li, M. J. Zheng, W. Yang, R. Y. Wang, X. J. Wang","doi":"10.1007/s12243-025-01065-5","DOIUrl":"10.1007/s12243-025-01065-5","url":null,"abstract":"<div><p>In order to improve the security of cognitive non-orthogonal multiple access (NOMA) systems, we propose a highly secure forwarding strategy for secondary networks, in which the relay uses the data sent by the primary transmitter to improve the security of its forwarding data. Specifically, two relay encoding strategies are designed to improve the security of the cognitive transmitter data, namely, power superposition (PS) encoding strategy and bit-level exclusive OR-PS (XOR-PS) encoding strategy. Considering the imperfect successive interference cancellation (SIC) technology, the exact closed-form expressions of the outage probabilities and intercept probabilities of the PS and XOR-PS schemes in Rayleigh fading scenarios are derived. Then, the corresponding approximate results in high signal-to-noise ratio (SNR) are also given and the correctness of the theoretical results is verified by simulations. Furthermore, two other conventional PS and XOR-PS schemes without using the data of the primary user, represented by NPS and NXOR-PS, respectively, are provided as the benchmark to compare the security and reliability of the proposed protocols. Finally, numerical results show that the security of the proposed PS and XOR-PS schemes is much better than that of the NPS and NXOR-PS schemes in the case of without degrading the outage performance.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"627 - 638"},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145168397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Adaptive rollup execution: dynamic opcode-based sequencing for smart transaction ordering in Layer 2 rollups","authors":"Inas Hasnaoui, Maria Zrikem, Raja Elassali","doi":"10.1007/s12243-025-01068-2","DOIUrl":"10.1007/s12243-025-01068-2","url":null,"abstract":"<div><p>The blockchain trilemma, involving the balance of scalability, security, and decentralization, remains a critical challenge in blockchain networks. Layer 2 (L2) solutions, especially rollups, have emerged as promising approaches to enhancing scalability. They execute transactions on an auxiliary L2 chain and submit batched results to the Layer 1 (L1) blockchain, preserving L1 security and decentralization while significantly increasing throughput and reducing transaction costs. However, current rollup mechanisms primarily focus on batching and compression techniques without dynamically optimizing transaction execution based on resource utilization. This paper extends our previous work on AI-driven opcode smart contract classification, presented at the ISIVC2024 conference [1], by introducing a new layer of optimization through an opcode-based adaptive rollup execution strategy. By analyzing opcode sequences of smart contract transactions, we categorize transactions based on computational complexity and resource requirements. Our adaptive batching algorithm prioritizes transactions using an opcode-based score, forming batches that optimize gas consumption, enhance throughput, and improve processing efficiency within rollup mechanisms. Additionally, we incorporate dynamic scheduling algorithms within the sequencer, utilizing machine learning models to predict optimal execution orders and adjust strategies based on real-time network conditions. Our analysis evaluates the performance of our adaptive batching algorithm against traditional methods and assesses the dynamic scheduling approach as an enhancement to our model. The results indicate improvements in sequencer efficiency and resource utilization during rollup transaction execution. This research contributes to addressing the blockchain scalability trilemma by offering an adaptive approach that responds to evolving blockchain network demands.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"533 - 546"},"PeriodicalIF":2.2,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145167505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advanced speech biomarker integration for robust Alzheimer’s disease diagnosis","authors":"Anass El Hallani, Adil Chakhtouna, Abdellah Adib","doi":"10.1007/s12243-025-01073-5","DOIUrl":"10.1007/s12243-025-01073-5","url":null,"abstract":"<div><p>The healthcare sector has witnessed a transformative shift in recent years, driven by rapid advancements in digital technologies. Among the myriad of applications, the management of Alzheimer’s disease (AD) has garnered significant attention. AD, the most common form of dementia, affects millions globally and presents a significant challenge due to its progressive and currently incurable nature. Early detection is crucial, yet existing diagnostic methods are invasive, expensive, and not readily accessible. This study proposes a hybrid approach combining traditional acoustic features (e.g., MFCC, pitch, jitter, shimmer) with deep learning-based embeddings (YAMNet, VGGish) to enhance the robustness and accuracy of AD detection through speech analysis. The methodology involves comprehensive feature extraction, dimensionality reduction via autoencoders, and classification using advanced machine learning (ML) and deep learning (DL) models. Evaluation on the ADReSS dataset demonstrates the proposed method’s superior performance, achieving an accuracy of 89.9% with a deep neural network classifier. The results highlight the potential of integrating traditional and modern techniques to develop non-invasive, cost-effective, and accessible tools for early AD detection, paving the way for timely intervention and improved patient outcomes. Future work will focus on expanding datasets, incorporating diverse demographics, and refining models for better sensitivity and specificity in clinical applications.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"427 - 444"},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145167313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sara Sekkate, Safa Chebbi, Abdellah Adib, Sofia Ben Jebara
{"title":"Handling data scarcity through data augmentation for detecting offensive speech","authors":"Sara Sekkate, Safa Chebbi, Abdellah Adib, Sofia Ben Jebara","doi":"10.1007/s12243-025-01072-6","DOIUrl":"10.1007/s12243-025-01072-6","url":null,"abstract":"<div><p>Detecting offensive speech poses a challenge due to the absence of a universally accepted definition delineating its boundaries. However, the scarcity of labeled data often poses a significant challenge for training robust offensive speech detection models. In this paper, we propose an approach to handle data scarcity through data augmentation techniques tailored for offensive speech detection tasks. By augmenting the existing labeled data with speech samples generated through noise injection, our method effectively expands the training dataset, enabling more comprehensive model training. We evaluate our approach on Vera Am Mittag (VAM) corpus and demonstrate significant improvements in offensive speech detection performance compared to that without data augmentation. Our findings highlight the efficacy of data augmentation in mitigating data scarcity challenges and enhancing the reliability of offensive speech detection systems in a real-world scenario.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"417 - 426"},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145167358","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CET-attention mechanism impact on the classification of EEG signals","authors":"Mouad Riyad, Abdellah Adib","doi":"10.1007/s12243-025-01071-7","DOIUrl":"10.1007/s12243-025-01071-7","url":null,"abstract":"<div><p>The attention mechanism enables the processing of the data more efficiently by driving the neural networks to focus on the pertinent information. The increase in performance pushed their wide adoption, including for bio-signal. Multiple researchers explored their use of electroencephalography in many scenarios, including motor imagery. Despite the myriad of implementations, their achievement varies from one subject to another since the signals are delicate. In this paper, we extend our previous research (Riyad and Adib 2024) by suggesting a new implementation. The proposal employs the Convolutional Block Attention Module as a backbone with a few modifications adjusted for the nature of the electroencephalography. It uses three levels of attention that are performed on the channel, time, and electrode individually known as Channel Attention Module (CAM), Time Attention Module (TAM), and Electrode Attention Module (EAM). The compartmentalization authorizes the placing of the attention sub-block in diverse configurations, each with a specific order that impacts the extraction of the feature. Also, we suggest studying them with two structures, one with an early spatial filtering that uses the new block once and a late spatial filtering that uses the attention twice. For the experiments, we test on the dataset 2b of the BCI competition IV. The results show that placing the CAM first and feeding its output to the TAM and EAM boost the performance drastically. For optimal results, it is necessary to use the new attention once at the beginning of the network. Also, it permits an even classification of the classes compared with the others.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"547 - 555"},"PeriodicalIF":2.2,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145166579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Qian Li, Tianle Liu, Zhengquan Li, Jun Tong, Gaofeng Nie
{"title":"Performance of cell-free massive MIMO with group SIC detectors and low-resolution ADCs over spatially correlated channels","authors":"Qian Li, Tianle Liu, Zhengquan Li, Jun Tong, Gaofeng Nie","doi":"10.1007/s12243-025-01070-8","DOIUrl":"10.1007/s12243-025-01070-8","url":null,"abstract":"<div><p>This paper considers the performance of an uplink cell-free massive multiple-input multiple-output (mMIMO) system using low-resolution analog-to-digital converters (ADCs) under spatially correlated Rayleigh fading channels. Taking the advantage of the spectral efficiency (SE), we consider zero-forcing (ZF) group successive interference cancellation (GSIC) detectors to a cell-free mMIMO system and treat the system with ZF and ZF-SIC detectors as special cases. Using the additive quantization noise model (AQNM), we analyze the achievable SE under both perfect and imperfect channel state information (CSI) and compare these results with systems employing high-resolution ADCs. Then, we derive closed form expressions of SE for the cell-free mMIMO system. Numerical results verify the tightness of approximation expressions, and the SE of the system with GSIC detectors can be further improved with an increased number of groups. To investigate the potential of low-resolution ADC architectures, we also study the energy efficiency (EE) of the system. Our findings indicate that employing SIC detectors significantly enhances EE relative to systems utilizing linear ZF detectors. Besides, a similar EE of the system employing SIC detectors can be achieved by the system with GSIC detectors.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"687 - 698"},"PeriodicalIF":2.2,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145165241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robust physical layer security using frequency diverse array directional modulation","authors":"Mahdi Tayeb Masoud, Hossein Khaleghi Bizaki","doi":"10.1007/s12243-025-01067-3","DOIUrl":"10.1007/s12243-025-01067-3","url":null,"abstract":"<div><p>The use of directional modulation is one of the prominent and practical solutions for ensuring physical layer security in modern telecommunications systems. In this method, the message signal is modulated by an array of antennas and transmitted in a specific direction toward the legitimate receiver, in such a way that the signal is degraded and not receivable correctly by eavesdroppers in other directions. By employing directional modulation based on a random frequency diverse array, secure communication can be achieved in two-dimensional space, including angle and distance, for the legitimate receiver. The secrecy performance of directional modulation based on a random frequency diverse array is considerably dependent on the information available to the transmitter side about the receiver’s location. In wireless cellular networks where the receiver’s location may change at any moment, there will be inherent errors in estimating the receiver’s location. The occurrence of errors in estimating the angle and distance between the legitimate receiver and the transmitter leads to a significant reduction in the system’s secrecy rate. In this article, a new solution is proposed to increase the robustness against errors in estimating the legitimate receiver’s location by an optimization process based on the minimum mean square error criterion. This solution leads to the improvement of the physical layer security by employing random frequency diverse array directional modulation in the presence of estimation errors. Simulation results indicate an enhancement in the secrecy rate performance of the physical layer in wireless networks.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 7-8","pages":"699 - 710"},"PeriodicalIF":2.2,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145165495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multimodal emotion recognition: integrating speech and text for improved valence, arousal, and dominance prediction","authors":"Messaoudi Awatef, Boughrara Hayet, Lachiri Zied","doi":"10.1007/s12243-025-01069-1","DOIUrl":"10.1007/s12243-025-01069-1","url":null,"abstract":"<div><p>While speech emotion recognition has traditionally focused on classifying emotions into discrete categories like happy or angry, recent research has shifted towards a dimensional approach using the Valence-Arousal-Dominance model. This model captures the continuous emotional state. However, research in speech emotion recognition (SER) consistently shows lower performance in predicting valence compared to arousal and dominance. To improve performance, we propose a system that combines acoustic and linguistic information. This work explores a novel multimodal approach for emotion recognition that combines speech and text data. This fusion strategy aims to outperform the traditional single-modality systems. Both early and late fusion techniques are investigated in this paper. Our findings show that combining modalities in a late fusion approach enhances system performance. In this late fusion architecture, the outputs from the acoustic deep learning network and the linguistic network are fed into two stacked dense neural network (NN) layers to predict valence, arousal, and dominance as continuous values. This approach leads to a significant improvement in overall emotion recognition performance compared to prior methods.</p></div>","PeriodicalId":50761,"journal":{"name":"Annals of Telecommunications","volume":"80 and networking","pages":"401 - 415"},"PeriodicalIF":2.2,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145164872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}