Journal of High Speed Networks最新文献

筛选
英文 中文
Multitier scalable clustering wireless network design approach using honey bee ratel optimization 利用蜜蜂速率优化的多层可扩展集群无线网络设计方法
IF 0.9
Journal of High Speed Networks Pub Date : 2024-01-02 DOI: 10.3233/jhs-230086
Amruta Amune, Himangi Pande
{"title":"Multitier scalable clustering wireless network design approach using honey bee ratel optimization","authors":"Amruta Amune, Himangi Pande","doi":"10.3233/jhs-230086","DOIUrl":"https://doi.org/10.3233/jhs-230086","url":null,"abstract":"Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has considerable impact on the overall performance of network. This paper proposes sustainable honey bee ratel based hybrid wireless sensor network (SHHWSN) layering framework for improving load balancing and scalability issues in network. In SHHWSN tessellated hexagonal shape clusters are formed to cover entire geographical region without any gaps. Hybrid routing schema constrained with redundant data identification policy used in this, seeks to optimize energy utilization. The proposed SHHWSN was evaluated and validated by simulation, and the results were compared with earlier schematics where mostly one sided stochastic node deployments were followed. The experimental results show that SHHWSN has superior performance in terms of network alive nodes, delay, energy and throughput. The proposed SHHWSN obtained values of 50 nodes is 3, 0.061, 0.14, 0.89, 100 nodes is 3,0.037, 0.19, 0.551, 150 nodes is 13, 0.081, 0.23, 0.415, and 200 nodes is 23, 1.01, 0.25, 0.356, which is significantly more effective than current techniques.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"34 7","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139389733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Transmit antenna selection in M-MIMO system using metaheuristic aided model 利用元启发式辅助模型在 M-MIMO 系统中选择发射天线
IF 0.9
Journal of High Speed Networks Pub Date : 2024-01-02 DOI: 10.3233/jhs-230087
Charanjeet Singh, Pawan Kumar Singh
{"title":"Transmit antenna selection in M-MIMO system using metaheuristic aided model","authors":"Charanjeet Singh, Pawan Kumar Singh","doi":"10.3233/jhs-230087","DOIUrl":"https://doi.org/10.3233/jhs-230087","url":null,"abstract":"Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive hardware and computing complexities. In order to decrease the RF chains needed in BS, this work intended to use the optimal transmit antenna selection (TAS) strategy. This strategy is gaining a lot of interest since the optimization algorithm aids in the ability to enhance the system performance considerably the efficiency and secrecy rate. This work proposes a novel Coati Adopted Pelican Optimization (CA-PO) for choosing the optimal TA by considering efficiency as well as secrecy rate. In addition, the CA-PO algorithm makes the decision on which antenna to be elected. At last, the supremacy of CA-PO-based TAS is proven from the analysis regarding secrecy rate and EE analysis. Accordingly, the proposed CA-PO method for MF for set up 2 has attained a higher EE of 0.976; whereas, the DMOA, COA, MRFO, POA and BEA techniques have got a relatively lower EE of 0.968.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"54 26","pages":""},"PeriodicalIF":0.9,"publicationDate":"2024-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139390006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A comparison study of two implemented fuzzy-based models for decision of logical trust 两种基于模糊模型的逻辑信任决策比较研究
IF 0.9
Journal of High Speed Networks Pub Date : 2023-12-22 DOI: 10.3233/jhs-230189
Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli
{"title":"A comparison study of two implemented fuzzy-based models for decision of logical trust","authors":"Shunya Higashi, Phudit Ampririt, Ermioni Qafzezi, Makoto Ikeda, Keita Matsuo, L. Barolli","doi":"10.3233/jhs-230189","DOIUrl":"https://doi.org/10.3233/jhs-230189","url":null,"abstract":"In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"69 9","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139164107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of things 基于物联网的变速恒频风力发电机故障检测与远程监控系统研究
IF 0.9
Journal of High Speed Networks Pub Date : 2023-12-01 DOI: 10.3233/jhs-222009
Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang
{"title":"Research on fault detection and remote monitoring system of variable speed constant frequency wind turbine based on Internet of things","authors":"Qiuyu Lu, Haibo Li, Jianping Zheng, Jianru Qin, Yinguo Yang, Li Li, Ke Jiang","doi":"10.3233/jhs-222009","DOIUrl":"https://doi.org/10.3233/jhs-222009","url":null,"abstract":"In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine is established by MATLAB/Simulink module, and the influence law of different wind speed and ground fault types on the output power of wind turbine is studied. The active power of wind turbines under different short-circuit fault types is compared. At the same time, in order to realize real-time monitoring of wind turbine speed and output power, an online monitoring system for wind turbine operation based on industrial Internet of Things is proposed, and the composition and operation characteristics of this remote monitoring system are given. The practical application shows that the on-line monitoring system can accurately and remotely monitor the running status of the wind turbine and avoid the unstable running of the wind turbine. The research conclusions of this paper can provide reference for the design and construction of wind turbines and the operation of connecting to the power grid.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"101 14","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks 移动 IP 网络中基于 LRS 的高效动态 IP 数据传送移动性管理
IF 0.9
Journal of High Speed Networks Pub Date : 2023-11-29 DOI: 10.3233/jhs-222035
SangYeob Oh, ChulHo Park
{"title":"Efficient dynamic IP datacasting mobility management based on LRS in mobile IP networks","authors":"SangYeob Oh, ChulHo Park","doi":"10.3233/jhs-222035","DOIUrl":"https://doi.org/10.3233/jhs-222035","url":null,"abstract":"IP mobility support is based on terminal behavior, recognizing mobility and maintaining a continuous communication session. The existing mobile IP location registration sends a message to one or more routers during a handoff within a domain by using a multicast address to process messages continuously. This implementation requires persistent message processing among all routers to determine new multicast address assignments. To solve this problem, we propose a method that enables the mobile user to obtain a QoS guarantee when the mobile device moves to an overlapping area under the mobile IP. Therefore, dynamic mobility management includes location updates under the mobile IP, and transmission of packets from the expected access points. When a handoff occurs while the mobile device is connected, the mobile host dynamically adapts to the mobility characteristics of the mobile node and transmits missed packets. In addition, by first using a location router, handoff latency reduction and packet loss requirements between domains in the overlapping mobile network environment are resolved. Second, the proposed algorithm has low-control traffic in the mobile network, allowing quick handoffs. Although instantaneous throughput is reduced during handoffs, tunneling is reduced by 10-30%, even after a handoff, by retransmitting packets missed by the mobile host, while location-registration-update times are reduced by 20-80%.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"76 1","pages":""},"PeriodicalIF":0.9,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139212700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fine-grained load balancing with proactive prediction and adaptive rerouting in data center 数据中心中具有主动预测和自适应重路由的细粒度负载平衡
Journal of High Speed Networks Pub Date : 2023-11-10 DOI: 10.3233/jhs-230003
Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao
{"title":"Fine-grained load balancing with proactive prediction and adaptive rerouting in data center","authors":"Weimin Gao, Jiaming Zhong, Caihong Peng, Xinlong Li, Xiangbai Liao","doi":"10.3233/jhs-230003","DOIUrl":"https://doi.org/10.3233/jhs-230003","url":null,"abstract":"Though the existing load balancing designs successfully make full use of available parallel paths and attain high bisection network bandwidth, they reroute flows regardless of their dissimilar performance requirements. But traffic in modern data center networks exhibits short bursts characteristic, which can easily lead to network congestion. The short flows suffer from the problems of large queuing delay and packet reordering, while the long flows fail to obtain high throughput due to low link utilization and packet reordering. In order to solve these inefficiency, we designed a fine-grained load balancing method (FLB), which uses an active monitoring mechanism to split traffic, and flexibly transfers flowlet to non-congested path, effectively reducing the negative impact of burst flow on network performance. Besides, to avoid packet reordering, FLB leverages the probe packets to estimate the end-to-end delay, thus excluding paths that potentially cause packet reordering. The test results of NS2 simulation show that FLB significantly reduces the average and tail flow completion time of flows by up to 59% and 56% compared to the state-of-the-art multi-path transmission scheme with less computational overhead, as well as increases the throughput of long flow.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"120 49","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135136360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security 使用黑猩猩优化算法优化的训练深度量子神经网络进行物联网设备类型识别,以增强物联网安全性
Journal of High Speed Networks Pub Date : 2023-11-03 DOI: 10.3233/jhs-230028
C.P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari
{"title":"IoT device type identification using training deep quantum neural networks optimized with a chimp optimization algorithm for enhancing IoT security","authors":"C.P. Shirley, Jaydip Kumar, Kantilal Pitambar Rane, Narendra Kumar, Deevi Radha Rani, Kuntamukkula Harshitha, Mohit Tiwari","doi":"10.3233/jhs-230028","DOIUrl":"https://doi.org/10.3233/jhs-230028","url":null,"abstract":"IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, organizations have become more vulnerable to safety issues and attacks. A major drawback of previous research is that it can find out prior seen types only, also any new device types are considered anomalous. In this manuscript, IoT device type detection utilizing Training deep quantum neural networks optimized with a Chimp optimization algorithm for enhancing IOT security (IOT-DTI-TDQNN-COA-ES) is proposed. The proposed method entails three phases namely data collection, feature extraction and detection. For Data collection phase, real network traffic dataset from different IoT device types are collected. For feature mining phase, the internet traffic features are extracted through automated building extraction (ABE) method. IoT device type identification phase, Training deep quantum neural networks (TDQNN) optimized with Chimp optimization algorithm (COA) is utilized to detect the category of IoT devices as known and unknown device. IoT network is implemented in Python. Then the simulation performance of the proposed IOT-DTI-TDQNN-COA-ES method attains higher accuracy as26.82% and 23.48% respectively, when compared with the existing methods.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"3 21","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135819195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy efficiency of cache collaboration in core content distribution networks 核心内容分发网络中缓存协作的能源效率
Journal of High Speed Networks Pub Date : 2023-10-26 DOI: 10.3233/jhs-230018
Niemah Izzeldin Osman
{"title":"Energy efficiency of cache collaboration in core content distribution networks","authors":"Niemah Izzeldin Osman","doi":"10.3233/jhs-230018","DOIUrl":"https://doi.org/10.3233/jhs-230018","url":null,"abstract":"With escalating demands for high-definition video, cache collaboration allows neighbor nodes to share locally stored content in order to reduce download traffic. High energy consumption associated with content delivery remains a concern for Content Distribution Networks (CDNs). Therefore, this paper proposes cluster-based collaborative caching in a core network employing IP over WDM. The aim is to allow sets of core caches to fully share content while minimizing power. A Mixed Integer Linear Programming (MILP) model is used to form energy-efficient cache clusters. The energy consumption of the network is evaluated under different cluster sizes to find the optimum size that minimizes energy. To evaluate the influence of content popularity distribution, a heavy-tailed Zipf distribution and an Equal popularity distribution are evaluated. In addition, the work investigates the influence of downlink traffic behavior and power consumption parameters on optimum cluster sizes. Attained results reveal that maximum savings in energy consumption introduced by cluster-based collaborative caching are up to 34.3% and 21.8% under the Zipf and Equal distribution, respectively. Cache collaboration is not recommended when all core nodes contain fully replicated content servers. Results also show that power consumption parameters do not influence cluster formation. It is recommended keeping cache collaboration in the core network simple, so as to reduce intra-cluster communication.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"63 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134905983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients 无线网状网络中六种网状路由器替换方法的性能评价:考虑网状客户端两岛分布的中小型网络的比较研究
Journal of High Speed Networks Pub Date : 2023-10-24 DOI: 10.3233/jhs-230093
Leonard Barolli
{"title":"Performance evaluation of six mesh router replacement methods for wireless mesh networks: A comparison study for small and middle scale networks considering two islands distribution of mesh clients","authors":"Leonard Barolli","doi":"10.3233/jhs-230093","DOIUrl":"https://doi.org/10.3233/jhs-230093","url":null,"abstract":"In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router replacement methods for small and middle scale WMNs. We assessed the performance by computer simulations. The simulation results show that six methods have a good performance for connectivity and coverage metrics, for both small and middle scale WMNs. However, they have different behavior for load balancing. For small scale WMNs, the load balancing of LDIWM, RIWM and FC-RDVM is better than CM, LDVM and RDVM. While, comparing LDIWM, RIWM and FC-RDVM, the LDIWM has better load balancing. We found that the load balancing for small scale WMNs is not good, because there is a concentration of mesh routers in some areas. For middle scale WMNs, the CM, LDIWM, LDVM and RDVM have not a good load balancing. While, the RIWM and FC-RDVM have better performance. Comparing RIWM and FC-RDVM, we found that the load balancing of FC-RDVM is better than RIWM.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135315423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep learning trends and future perspectives of web security and vulnerabilities 深度学习趋势和网络安全和漏洞的未来前景
Journal of High Speed Networks Pub Date : 2023-10-20 DOI: 10.3233/jhs-230037
Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan
{"title":"Deep learning trends and future perspectives of web security and vulnerabilities","authors":"Muhammad Saad Chughtai, Irfana Bibi, Shahid Karim, Syed Wajid Ali Shah, Asif Ali Laghari, Abdullah Ayub Khan","doi":"10.3233/jhs-230037","DOIUrl":"https://doi.org/10.3233/jhs-230037","url":null,"abstract":"Web applications play a vital role in modern digital world. Their pervasiveness is mainly underpinned by numerous technological advances that can often lead to misconfigurations, thereby opening a way for a variety of attack vectors. The rapid development of E-commerce, big data, cloud computing and other technologies, further enterprise services are entering to the internet world and have increasingly become the key targets of network attacks. Therefore, the appropriate remedies are essential to maintain the very fabric of security in digital world. This paper aims to identify such vulnerabilities that need to be addressed for ensuring the web security. We identify and compare the static, dynamic, and hybrid tools that can counter the prevalent attacks perpetrated through the identified vulnerabilities. Additionally, we also review the applications of AI in intrusion detection and pinpoint the research gaps. Finally, we cross-compare the various security models and highlight the relevant future research directions.","PeriodicalId":54809,"journal":{"name":"Journal of High Speed Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135569757","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信