Concurrency and Computation-Practice & Experience最新文献

筛选
英文 中文
Building Scalable and Quantum Attack Resistant Authenticated Message Delivery System for Internet of Vehicles With Blockchain Consensus Mechanism 基于区块链共识机制构建可扩展、抗量子攻击的车联网认证消息传递系统
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-11 DOI: 10.1002/cpe.70071
Rahul Singh, Laxminarayan Das, Dharminder Chaudhary
{"title":"Building Scalable and Quantum Attack Resistant Authenticated Message Delivery System for Internet of Vehicles With Blockchain Consensus Mechanism","authors":"Rahul Singh,&nbsp;Laxminarayan Das,&nbsp;Dharminder Chaudhary","doi":"10.1002/cpe.70071","DOIUrl":"https://doi.org/10.1002/cpe.70071","url":null,"abstract":"<div>\u0000 \u0000 <p>The goal of intelligent transportation systems is becoming more and more realized with the use of the Internet of Vehicles (IoV) and the rapid advancement of processing and communication technologies. Nonetheless, a lot of Internet of Vehicles applications depend on a central processing and storage unit as well as wireless transmission mediators. This may result in exorbitant expenses and delays, as well as the disclosure of real data. We suggest the Vehicle-Based Quantum-Safe Blockchain Consensus (VBQBC) algorithm as a solution to these problems and an enhancement of the effectiveness of data storage, authentic processing, and data sharing in the Internet of Vehicles. The proposed VBQBC algorithm uses a consensus algorithm and blockchain technology to assure authentic communication between cars, overcoming the shortcomings and constraints of current state-of-the-art systems. This algorithm uses ring learning with errors, and short integer solution assumptions in the construction of aggregation signatures to provide authenticity in blockchain technology. This aggregation technique reduces the size of data required for verification and improves scalability. The algorithm also incorporates a quantum-safe authentication procedure as well as a key distribution and request process, which are demonstrated when vehicles move between different zones. This allows blockchain-based systems to maintain their security, scalability, and efficiency even in the face of future cryptographic problems. The aggregation of signatures size for the proposed framework to the number of signatures to be aggregated <i>N</i> varies between <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mn>2</mn>\u0000 <mn>10</mn>\u0000 </msup>\u0000 </mrow>\u0000 <annotation>$$ {2}^{10} $$</annotation>\u0000 </semantics></math> (63.48 kb) and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mn>2</mn>\u0000 <mn>20</mn>\u0000 </msup>\u0000 </mrow>\u0000 <annotation>$$ {2}^{20} $$</annotation>\u0000 </semantics></math> (131.34 kb). For aggregation of <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mn>2</mn>\u0000 <mn>10</mn>\u0000 </msup>\u0000 </mrow>\u0000 <annotation>$$ {2}^{10} $$</annotation>\u0000 </semantics></math> signatures, the proposed framework has signature size 6.3 kb, and the aggregated size of signatures is 64 kb. In simulation findings, our suggested VBQBC algorithm outperformed previous techniques in terms of authentication delay, key processing time, attack detection rate, throughput, and packet loss rate.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unveiling the Invisible: Powering Security Threat Detection in WSN With AI 揭开隐形:用AI驱动WSN的安全威胁检测
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-11 DOI: 10.1002/cpe.70049
K. P. Uvarajan, Kishore Balasubramanian, C. Gowri Shankar
{"title":"Unveiling the Invisible: Powering Security Threat Detection in WSN With AI","authors":"K. P. Uvarajan,&nbsp;Kishore Balasubramanian,&nbsp;C. Gowri Shankar","doi":"10.1002/cpe.70049","DOIUrl":"https://doi.org/10.1002/cpe.70049","url":null,"abstract":"<div>\u0000 \u0000 <p>Security in wireless sensor networks (WSNs) is of paramount importance due to their pervasive deployment in critical infrastructure and sensitive environments. Despite their ubiquitous nature, WSNs are vulnerable to various security threats, ranging from unauthorized access to data manipulation and network disruption. In response to these challenges, this paper proposes a novel approach leveraging the Base Stacked Long Short-Term Memory with Attention Models and AdaBoost Ensemble (BSLAM-AE) architecture to enhance security in WSNs. The proposed model is designed to address the unique characteristics and challenges of WSNs, combining deep learning and ensemble learning techniques to detect and mitigate security threats effectively. The BSLAM-AE model incorporates stacked LSTM networks with attention mechanisms, enabling the analysis of time-series data and the detection of subtle anomalies or security breaches. In addition, an AdaBoost ensemble-learning component iteratively trains a set of models to improve predictive accuracy and robustness. Implemented in the PyCharm integrated development environment, experimental results demonstrate the efficacy of the proposed model, achieving an impressive accuracy of 98% in detecting security threats in WSNs. Overall, the BSLAM-AE model represents a significant advancement in WSN security, offering a comprehensive and efficient solution for detecting and mitigating security threats. By leveraging deep learning and ensemble learning techniques, the proposed model provides enhanced security and reliability, thereby safeguarding WSNs against potential attacks and ensuring the integrity and availability of critical data and infrastructure.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Multi-Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization 基于屎壳郎优化的移动机器人路径规划多策略融合
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-11 DOI: 10.1002/cpe.70060
Junhu Peng, Tao Peng, Can Tang, Xingxing Xie
{"title":"A Multi-Strategy Fusion for Mobile Robot Path Planning via Dung Beetle Optimization","authors":"Junhu Peng,&nbsp;Tao Peng,&nbsp;Can Tang,&nbsp;Xingxing Xie","doi":"10.1002/cpe.70060","DOIUrl":"https://doi.org/10.1002/cpe.70060","url":null,"abstract":"&lt;div&gt;\u0000 \u0000 &lt;p&gt;In recent years, robot path planning has become a critical aspect of autonomous navigation, especially in dynamic and complex environments where robots must operate efficiently and safely. One of the primary challenges in this domain is achieving high convergence efficiency while avoiding local optimal solutions, which can hinder the robot's ability to find the best possible path. Additionally, ensuring that the robot follows a path with minimal turns and reduced path length is essential for enhancing operational efficiency and reducing energy consumption. These challenges become even more pronounced in high-dimensional optimization tasks where the search space is vast and difficult to navigate. In this article, a multi-strategy fusion enhanced dung beetle optimization algorithm (MIDBO) is introduced to tackle key challenges in robot path planning, such as slow convergence and the problem of local optima, and so on, in which MIDBO incorporates several key innovations to enhance performance and robustness. First, the Tent chaotic strategy is used to diversify initial solutions during population initialization, thereby mitigating the risk of local optima and improving global search capability. Second, a penalty term is integrated into the fitness function to penalize excessive turning angles, aiming to reduce the frequency and magnitude of turns. This modification results in smoother and more efficient paths with reduced lengths. Third, the inertia weight is adaptively updated by a sine-based mechanism, which dynamically balances exploration and exploitation, accelerates convergence, and enhances algorithm stability. To further improve efficiency for path planning, the MIDBO integrates a Levy flight strategy and a local search mechanism to boost the search capability during the stealing phase, contributing to smoother and more practical paths planned for the robot. A series of thorough and reproducible experiments are performed using benchmark test functions to evaluate the performance of MIDBO in comparison to several leading metaheuristic algorithms. The results demonstrate that MIDBO achieves superior outcomes in path planning tasks with optimal and mean path lengths of 42.1068 and 44.4755, respectively, which significantly outperforms other algorithms including IPSO (47.6244, 55.9375), original DBO (47.6244, 55.9375), and ISSA (47.6244, 55.9375). MIDBO also markedly reduces the number of turns by achieving best and average values of 10 and 13.4, respectively, compared with IPSO (11, 16.1), original DBO (12, 15.3), and ISSA (12, 16.4). Besides, the consistent performance of MIDBO is confirmed via stability analysis based on the mean square error of path lengths and turn counts across 10 independent trials. For the high-dimensional optimization tasks, MIDBO achieves 8 and 7 functions about top rankings on 50- and 100-dimensional functions, and specifically MIDBO outperforms DBO, IPSO, and ISSA on 13, 18, and 11 functio","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Approach to Cloud Resource Scheduling Using Genetic Reinforcement Kernel Optimization and Machine Learning Model 基于遗传强化核优化和机器学习模型的云资源调度新方法
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-11 DOI: 10.1002/cpe.70080
Anupam Yadav, Ashish Sharma
{"title":"A New Approach to Cloud Resource Scheduling Using Genetic Reinforcement Kernel Optimization and Machine Learning Model","authors":"Anupam Yadav,&nbsp;Ashish Sharma","doi":"10.1002/cpe.70080","DOIUrl":"https://doi.org/10.1002/cpe.70080","url":null,"abstract":"<div>\u0000 \u0000 <p>Two of the most essential elements of cloud resource management systems are resource management as well as scheduling. Due to the heterogeneity of resources, their interdependencies, and the unpredictable nature of load in a cloud environment, cloud Resource Scheduling (RS) is the most important issue to handle effectively. One of the most challenging tasks in cloud computing is RS, where resources must be assigned to the necessary tasks or jobs in accordance with the necessary Quality of Service (QoS) of the cloud applications. This study suggests a unique method for scheduling cloud resources based on a virtual data center and machine learning model. The genetic reinforcement kernel swarm optimization methodology and cloud data centers are deployed here. The suggested network analysis aims to balance energy usage and SLA. The suggested framework is assessed by doing experiments on the Google Cluster dataset, Planet Lab, and Bitbrains VM traces, as well as three real-world workload datasets. Execution cost, Execution time, Makespan, Energy consumption, Resource utilization, and Scalability are factors that were examined here. The proposed framework is superior to several performance indicators compared to state-of-the-art techniques. The project's methodology addresses the issues of load imbalance and excessive migration expenses.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Customer-Satisfaction and Risk-Aware Pricing Policy for Profit Maximization in Cloud Computing 面向云计算利润最大化的客户满意度和风险意识定价策略
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-11 DOI: 10.1002/cpe.70075
Siyi Chen, Haiyang Kuang, Jiaxin Zhou, Jin Liu
{"title":"Customer-Satisfaction and Risk-Aware Pricing Policy for Profit Maximization in Cloud Computing","authors":"Siyi Chen,&nbsp;Haiyang Kuang,&nbsp;Jiaxin Zhou,&nbsp;Jin Liu","doi":"10.1002/cpe.70075","DOIUrl":"https://doi.org/10.1002/cpe.70075","url":null,"abstract":"<div>\u0000 \u0000 <p>Cloud computing has been attracting increasing concern due to its remarkable flexibility and substantial economic returns. As a crucial feature of cloud computing, cloud service providers typically offer customers various resources through on-demand services and charge them accordingly. Considering servers as the service carriers in cloud computing, their availability may sometimes be affected by potential uncertainties, which can lead to temporary server breakdowns. It should be noted that such cases related to the availability of servers have rarely been examined in the profit maximization problem. In this paper, an optimal configuration scheme for addressing the issue of profit maximization in the cloud service system is proposed, taking server breakdowns into account. By introducing the concept of generalized service time, the probability density function of waiting time is initially derived. Owing to the complexity of the designed function, a two-stage fitting method is employed to obtain its approximation, thereby significantly reducing the analysis difficulty. On this basis, considering the average waiting time and server breakdowns, a compensation mechanism is adopted to design the pricing strategy for customers. Then, the revenue, cost, and profit models of cloud service providers are constructed. Since the optimal solution of the profit model is difficult to calculate due to its complexity, a heuristic algorithm is introduced to solve its numerical solution. Finally, the proposed scheme is verified through a series of numerical simulations, and the results indicate that the profits of cloud service providers and customer experience can be satisfied simultaneously.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variantrank: Business Process Event Log Sampling Based on Importance of Trace Variants 变量秩:基于跟踪变量重要性的业务流程事件日志采样
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-10 DOI: 10.1002/cpe.70092
Jiawei Chen, Jiayi Zhong, Guosheng Kang, Jianxun Liu, Yiping Wen
{"title":"Variantrank: Business Process Event Log Sampling Based on Importance of Trace Variants","authors":"Jiawei Chen,&nbsp;Jiayi Zhong,&nbsp;Guosheng Kang,&nbsp;Jianxun Liu,&nbsp;Yiping Wen","doi":"10.1002/cpe.70092","DOIUrl":"https://doi.org/10.1002/cpe.70092","url":null,"abstract":"<div>\u0000 \u0000 <p>To address the issues of low sampling quality and efficiency in processing large-scale event logs in existing business process event log sampling methods, a new method, named VariantRank, is proposed, which is based on the importance of trace variants. First, the importance of each trace variant is calculated based on the activity importance and the importance of directly-follow relationships within the trace variants. Then, the trace variants are ranked according to their importance. Finally, based on the given sampling rate and the ranking of trace variants, the final sampling is performed to obtain the sample event logs. The effectiveness of the proposed sampling method is evaluated in terms of both sampling quality and sampling efficiency across 8 public event log datasets. The experimental analysis shows that, compared with the state-of-the-art sampling methods, VariantRank improves the sampling efficiency while ensuring the sampling quality.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism 基于时空序列注意机制的室内视线场景高精度可见光定位方法
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-10 DOI: 10.1002/cpe.70058
Yonghao Yu, Dawei Zhao, Yongwei Tang, WengTak Kuok, Wei Ding
{"title":"High-Precision Indoor Visible Light Positioning Method for Line-Of-Sight Scenes Based on a Spatiotemporal Sequence Attention Mechanism","authors":"Yonghao Yu,&nbsp;Dawei Zhao,&nbsp;Yongwei Tang,&nbsp;WengTak Kuok,&nbsp;Wei Ding","doi":"10.1002/cpe.70058","DOIUrl":"https://doi.org/10.1002/cpe.70058","url":null,"abstract":"<div>\u0000 \u0000 <p>Using deep learning to improve the accuracy of indoor visible light positioning (VLP) systems has gradually become a widely used research strategy in the field. However, current deep learning-based indoor visible light localization algorithms have not been able to effectively mine the deep temporal and spatial sequence features in signals, resulting in complex network construction and low localization accuracy. To address this issue, the text proposes a deep learning framework that utilizes an attention mechanism to train a small number of randomly continuously sampled spatial received signals to predict the coordinates of the received signals and encode the spatiotemporal sequence attributes of the received signals as a feature into the data, constructed a highly reliable spatiotemporal sequence attention mechanism for indoor visible light localization method. Combined with Convolutional Neural Networks (CNN), the localization accuracy is further improved. Through simulation experiments, it has been verified that the neural network structure designed in this paper has better positioning accuracy compared to advanced algorithms, and can still achieve centimeter-level (9.886cm) average positioning error under low signal-to-noise ratio (SNR) conditions. It is proved that the method proposed in this paper is reliable in the indoor VLP system.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143818738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HealthEdgeAI: GAI and XAI Based Healthcare System for Sustainable Edge AI and Cloud Computing Environments HealthEdgeAI:基于GAI和XAI的医疗保健系统,用于可持续的边缘AI和云计算环境
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-10 DOI: 10.1002/cpe.70057
Han Wang, Balaji Muthurathinam Panneer Chelvan, Muhammed Golec, Sukhpal Singh Gill, Steve Uhlig
{"title":"HealthEdgeAI: GAI and XAI Based Healthcare System for Sustainable Edge AI and Cloud Computing Environments","authors":"Han Wang,&nbsp;Balaji Muthurathinam Panneer Chelvan,&nbsp;Muhammed Golec,&nbsp;Sukhpal Singh Gill,&nbsp;Steve Uhlig","doi":"10.1002/cpe.70057","DOIUrl":"https://doi.org/10.1002/cpe.70057","url":null,"abstract":"<div>\u0000 \u0000 <p>Coronary heart disease is a leading cause of mortality worldwide. Although no cure exists for this condition, appropriate treatment and timely intervention can effectively manage its symptoms and reduce the risk of complications such as heart attacks. Prior studies have mostly relied on a limited dataset from the UC Irvine Machine Learning Repository, predominantly focusing on Machine Learning (ML) models without incorporating Explainable Artificial Intelligence (XAI) or Generative Artificial Intelligence (GAI) techniques for dataset enhancement. While some research has explored cloud-based deployments, the implementation of edge AI in this domain remains largely under-explored. Therefore, this paper proposes <i>HealthEdgeAI</i>, a sustainable approach to heart disease prediction that enhances XAI through GAI-driven data augmentation. In our research, we assessed multiple AI models by evaluating accuracy, precision, recall, F1-score, and area under the curve (AUC). We also developed a web application using Streamlit to demonstrate our XAI methods and employed FastAPI to serve the optimal model as an API. Additionally, we examined the performance of these models in cloud computing and edge AI settings by comparing key Quality of Service (QoS) parameters, such as average response rate and throughput. To highlight the potential of sustainable edge AI and cloud computing, we tested edge devices with both low- and high-end configurations to illustrate differences in QoS. Ultimately, this study identifies current limitations and outlines prospective directions for future research in AI-based cloud and edge computing environments.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimization of Anti-Tampering Method for Financial Data in Edge Intelligent Systems Based on Support Vector Machine 基于支持向量机的边缘智能系统金融数据防篡改方法优化
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-09 DOI: 10.1002/cpe.70070
Shugui Lin, Wei Zhang, Ruchun Jia, Haitao Deng, Linyuan Li, Jianjun Zhou, Ze Li
{"title":"Optimization of Anti-Tampering Method for Financial Data in Edge Intelligent Systems Based on Support Vector Machine","authors":"Shugui Lin,&nbsp;Wei Zhang,&nbsp;Ruchun Jia,&nbsp;Haitao Deng,&nbsp;Linyuan Li,&nbsp;Jianjun Zhou,&nbsp;Ze Li","doi":"10.1002/cpe.70070","DOIUrl":"https://doi.org/10.1002/cpe.70070","url":null,"abstract":"<div>\u0000 \u0000 <p>The proliferation of edge intelligent systems has introduced new challenges in securing financial data across distributed networks. This paper proposes an optimized anti-tampering method for financial data based on SVM, specifically designed for implementation in edge computing environments. Our approach leverages the strengths of SVM in handling non-linear, high-dimensional data, while addressing the unique security and privacy concerns of edge-based financial systems. We introduce a novel feature weighting mechanism that enhances the SVM's ability to detect subtle data tampering attempts in distributed financial datasets, and improve the application of SVM to better handle non-stationary, asymmetric, and non-linear time series financial data in edge computing settings. A comprehensive evaluation using real-world financial data in simulated edge computing scenarios demonstrates significant improvements in yield indicators, maximum drawdown rate, and volatility compared to traditional approaches. Our method not only effectively detects data tampering but also improves the accuracy of financial data prediction in decentralized environments. This research contributes to the development of more secure, efficient, and privacy-preserving financial systems in the increasingly decentralized global economy, paving the way for robust security solutions in edge-based financial infrastructures.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143801650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCGG: Smart City Network Topology Graph Generator SCGG:智慧城市网络拓扑图生成器
IF 1.5 4区 计算机科学
Concurrency and Computation-Practice & Experience Pub Date : 2025-04-09 DOI: 10.1002/cpe.70088
Nouf A. S. Alsowaygh, Mohammed J. F. Alenazi, Maazen Alsabaan
{"title":"SCGG: Smart City Network Topology Graph Generator","authors":"Nouf A. S. Alsowaygh,&nbsp;Mohammed J. F. Alenazi,&nbsp;Maazen Alsabaan","doi":"10.1002/cpe.70088","DOIUrl":"https://doi.org/10.1002/cpe.70088","url":null,"abstract":"<div>\u0000 \u0000 <p>Smart cities use information and communication technology to promote citizen welfare and economic growth within a sustainable environment. To guarantee that different urban actors, including people, devices, companies, and governments, can communicate efficiently, securely, and reliably, a robust, adaptable network infrastructure is required. However, the increasing complexity of the systems involved poses a challenge to smart city network modeling. Network topology generators produce synthetic networks that can reflect the underlying properties of real-world networks, providing a practical approach to designing, testing, and implementing complex systems such as smart cities, yet the limited number of network topology generators for smart city applications has long prevented the proper development, investigation, and evaluation of various network configurations. In this article, a novel Smart City Network Topology Graph Generator (SCGG) is proposed to create a pseudorandom topology that mimics real smart city networks. The main goal of SCGG is to generate a network topology for smart cities that captures the interconnectivity of several communication technologies, such as wireless sensor networks (WSN), Internet of Things (IoT), and cellular networks. The SCGG system is characterized by the number of clusters, the average number of nodes, the number of layers, and the node density. The general network architecture and path-related variables of the generated topologies are evaluated based on different graph theory measures, focusing on both global graph-level characteristics and local node-level features. The experimental results, demonstrating high natural connectivity and a low spectral radius value, offer a reliable tool for optimizing and strengthening the behavior and performance of smart city networks under different conditions to improve their robustness, minimize the probability of disruptions or failures, and enhance overall efficiency to ensure a resilient network.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"37 9-11","pages":""},"PeriodicalIF":1.5,"publicationDate":"2025-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143809390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信