期刊文献+
共找到13,356篇文章
< 1 2 250 >
每页显示 20 50 100
A Privacy-Preserving Graph Neural Network Framework with Attention Mechanism for Computational Offloading in the Internet of Vehicles
1
作者 Aishwarya Rajasekar Vetriselvi Vetrian 《Computer Modeling in Engineering & Sciences》 2025年第4期225-254,共30页
The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle ap... The integration of technologies like artificial intelligence,6G,and vehicular ad-hoc networks holds great potential to meet the communication demands of the Internet of Vehicles and drive the advancement of vehicle applications.However,these advancements also generate a surge in data processing requirements,necessitating the offloading of vehicular tasks to edge servers due to the limited computational capacity of vehicles.Despite recent advancements,the robustness and scalability of the existing approaches with respect to the number of vehicles and edge servers and their resources,as well as privacy,remain a concern.In this paper,a lightweight offloading strategy that leverages ubiquitous connectivity through the Space Air Ground Integrated Vehicular Network architecture while ensuring privacy preservation is proposed.The Internet of Vehicles(IoV)environment is first modeled as a graph,with vehicles and base stations as nodes,and their communication links as edges.Secondly,vehicular applications are offloaded to suitable servers based on latency using an attention-based heterogeneous graph neural network(HetGNN)algorithm.Subsequently,a differential privacy stochastic gradient descent trainingmechanism is employed for privacypreserving of vehicles and offloading inference.Finally,the simulation results demonstrated that the proposedHetGNN method shows good performance with 0.321 s of inference time,which is 42.68%,63.93%,30.22%,and 76.04% less than baseline methods such as Deep Deterministic Policy Gradient,Deep Q Learning,Deep Neural Network,and Genetic Algorithm,respectively. 展开更多
关键词 internet of vehicles vehicular ad-hoc networks(VANET) multiaccess edge computing task offloading graph neural networks differential privacy
在线阅读 下载PDF
Application Research of Wireless Sensor Networks and the Internet of Things
2
作者 Changjian Lv Rui Wang Man Zhao 《Journal of Electronic Research and Application》 2025年第4期283-289,共7页
In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),dee... In the context of the rapid iteration of information technology,the Internet of Things(IoT)has established itself as a pivotal hub connecting the digital world and the physical world.Wireless Sensor Networks(WSNs),deeply embedded in the perception layer architecture of the IoT,play a crucial role as“tactile nerve endings.”A vast number of micro sensor nodes are widely distributed in monitoring areas according to preset deployment strategies,continuously and accurately perceiving and collecting real-time data on environmental parameters such as temperature,humidity,light intensity,air pressure,and pollutant concentration.These data are transmitted to the IoT cloud platform through stable and reliable communication links,forming a massive and detailed basic data resource pool.By using cutting-edge big data processing algorithms,machine learning models,and artificial intelligence analysis tools,in-depth mining and intelligent analysis of these multi-source heterogeneous data are conducted to generate high-value-added decision-making bases.This precisely empowers multiple fields,including agriculture,medical and health care,smart home,environmental science,and industrial manufacturing,driving intelligent transformation and catalyzing society to move towards a new stage of high-quality development.This paper comprehensively analyzes the technical cores of the IoT and WSNs,systematically sorts out the advanced key technologies of WSNs and the evolution of their strategic significance in the IoT system,deeply explores the innovative application scenarios and practical effects of the two in specific vertical fields,and looks forward to the technological evolution trends.It provides a detailed and highly practical guiding reference for researchers,technical engineers,and industrial decision-makers. 展开更多
关键词 Wireless Sensor networks internet of Things Key technologies Application fields
在线阅读 下载PDF
SC-GAN:A Spectrum Cartography with Satellite Internet Based on Pix2Pix Generative Adversarial Network
3
作者 Zhen Pan Zhang Bangning +2 位作者 Wang Heng MaWenfeng Guo Daoxing 《China Communications》 2025年第2期47-61,共15页
The increasing demand for radioauthorized applications in the 6G era necessitates enhanced monitoring and management of radio resources,particularly for precise control over the electromagnetic environment.The radio m... The increasing demand for radioauthorized applications in the 6G era necessitates enhanced monitoring and management of radio resources,particularly for precise control over the electromagnetic environment.The radio map serves as a crucial tool for describing signal strength distribution within the current electromagnetic environment.However,most existing algorithms rely on sparse measurements of radio strength,disregarding the impact of building information.In this paper,we propose a spectrum cartography(SC)algorithm that eliminates the need for relying on sparse ground-based radio strength measurements by utilizing a satellite network to collect data on buildings and transmitters.Our algorithm leverages Pix2Pix Generative Adversarial Network(GAN)to construct accurate radio maps using transmitter information within real geographical environments.Finally,simulation results demonstrate that our algorithm exhibits superior accuracy compared to previously proposed methods. 展开更多
关键词 electromagnetic situation Pix2Pix generative adversarial network radio map satellite internet spectrum cartography
在线阅读 下载PDF
Using X Social Networks and web news mining to predict Marburg virus disease outbreaks
4
作者 Mohammad Jokar Kia Jahanbin Vahid Rahmanian 《Asian Pacific Journal of Tropical Medicine》 2025年第2期96-98,共3页
Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 ... Marburg virus disease(MVD)is a highly fatal illness,with a case fatality rate of up to 88%,though this rate can be significantly reduced with prompt and effective patient care.The disease was first identified in 1967 during concurrent outbreaks in Marburg and Frankfurt,Germany,and in Belgrade,Serbia,linked to laboratory use of African green monkeys imported from Uganda.Subsequent outbreaks and isolated cases have been reported in various African countries,including Angola,the Democratic Republic of the Congo,Equatorial Guinea,Ghana,Guinea,Kenya,Rwanda,South Africa(in an individual with recent travel to Zimbabwe),Tanzania,and Uganda.Initial human MVD infections typically occur due to prolonged exposure to mines or caves inhabited by Rousettus aegyptiacus fruit bats,the natural hosts of the virus. 展开更多
关键词 laboratory use marburg virus disease mvd african green monkeys outbreaks social networks marburg virus disease case fatality rate web news mining
暂未订购
试论基于HTML5技术的移动Web前端设计
5
作者 詹丽红 《软件》 2025年第2期168-170,共3页
随着移动互联网的迅猛发展,HTML5技术以其跨平台兼容性、丰富的多媒体功能和强大的API支持,成为移动Web开发的一项重要技术。本文探讨了基于HTML5技术的移动Web前端研发设计及其各层级的设计思路,旨在为移动Web前端设计提供理论支持和... 随着移动互联网的迅猛发展,HTML5技术以其跨平台兼容性、丰富的多媒体功能和强大的API支持,成为移动Web开发的一项重要技术。本文探讨了基于HTML5技术的移动Web前端研发设计及其各层级的设计思路,旨在为移动Web前端设计提供理论支持和实践指导,提高移动Web应用的性能和用户体验。 展开更多
关键词 HTML5 移动互联网 web前端 前端开发
在线阅读 下载PDF
Web 3.0环境下的场外衍生品市场与监管研究
6
作者 柳青 李正强 《中国证券期货》 2025年第1期4-9,15,共7页
本文对新一代互联网Web 3.0的主要特点进行了研究,并结合场外衍生品业务生态进行了对比分析,发现Web 3.0为场外衍生品的业务运行提供了良好的技术生态环境,可更好地满足场外衍生品个性化和私密性的业务需求,同时场外衍生品监管也面临新... 本文对新一代互联网Web 3.0的主要特点进行了研究,并结合场外衍生品业务生态进行了对比分析,发现Web 3.0为场外衍生品的业务运行提供了良好的技术生态环境,可更好地满足场外衍生品个性化和私密性的业务需求,同时场外衍生品监管也面临新的技术环境和挑战,在Web 3.0环境下发展嵌入式监管将更好满足风险监管和透明度要求。 展开更多
关键词 web 3.0 场外衍生品 嵌入式监管 网络生态
在线阅读 下载PDF
Strengthening network slicing for Industrial Internet with deep reinforcement learning
7
作者 Yawen Tan Jiadai Wang Jiajia Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第4期863-872,共10页
Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain.Its highly heterogeneous network structu... Industrial Internet combines the industrial system with Internet connectivity to build a new manufacturing and service system covering the entire industry chain and value chain.Its highly heterogeneous network structure and diversified application requirements call for the applying of network slicing technology.Guaranteeing robust network slicing is essential for Industrial Internet,but it faces the challenge of complex slice topologies caused by the intricate interaction relationships among Network Functions(NFs)composing the slice.Existing works have not concerned the strengthening problem of industrial network slicing regarding its complex network properties.Towards this end,we aim to study this issue by intelligently selecting a subset of most valuable NFs with the minimum cost to satisfy the strengthening requirements.State-of-the-art AlphaGo series of algorithms and the advanced graph neural network technology are combined to build the solution.Simulation results demonstrate the superior performance of our scheme compared to the benchmark schemes. 展开更多
关键词 Industrial internet network slicing Deep reinforcement learning Graph neural network
在线阅读 下载PDF
SACNN-IDS: A self-attention convolutional neural network for intrusion detection in industrial internet of things 被引量:1
8
作者 Mimonah Al Qathrady Safi Ullah +5 位作者 Mohammed S.Alshehri Jawad Ahmad Sultan Almakdi Samar M.Alqhtani Muazzam A.Khan Baraq Ghaleb 《CAAI Transactions on Intelligence Technology》 2024年第6期1398-1411,共14页
Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments.Several IIoT nodes operate confidential data(s... Industrial Internet of Things(IIoT)is a pervasive network of interlinked smart devices that provide a variety of intelligent computing services in industrial environments.Several IIoT nodes operate confidential data(such as medical,transportation,military,etc.)which are reachable targets for hostile intruders due to their openness and varied structure.Intrusion Detection Systems(IDS)based on Machine Learning(ML)and Deep Learning(DL)techniques have got significant attention.However,existing ML and DL-based IDS still face a number of obstacles that must be overcome.For instance,the existing DL approaches necessitate a substantial quantity of data for effective performance,which is not feasible to run on low-power and low-memory devices.Imbalanced and fewer data potentially lead to low performance on existing IDS.This paper proposes a self-attention convolutional neural network(SACNN)architecture for the detection of malicious activity in IIoT networks and an appropriate feature extraction method to extract the most significant features.The proposed architecture has a self-attention layer to calculate the input attention and convolutional neural network(CNN)layers to process the assigned attention features for prediction.The performance evaluation of the proposed SACNN architecture has been done with the Edge-IIoTset and X-IIoTID datasets.These datasets encompassed the behaviours of contemporary IIoT communication protocols,the operations of state-of-the-art devices,various attack types,and diverse attack scenarios. 展开更多
关键词 convolutional neural network deep learning industrial internet of things intrusion detection self-attention
在线阅读 下载PDF
3D Road Network Modeling and Road Structure Recognition in Internet of Vehicles
9
作者 Dun Cao Jia Ru +3 位作者 Jian Qin Amr Tolba Jin Wang Min Zhu 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1365-1384,共20页
Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transp... Internet of Vehicles (IoV) is a new system that enables individual vehicles to connect with nearby vehicles,people, transportation infrastructure, and networks, thereby realizing amore intelligent and efficient transportationsystem. The movement of vehicles and the three-dimensional (3D) nature of the road network cause the topologicalstructure of IoV to have the high space and time complexity.Network modeling and structure recognition for 3Droads can benefit the description of topological changes for IoV. This paper proposes a 3Dgeneral roadmodel basedon discrete points of roads obtained from GIS. First, the constraints imposed by 3D roads on moving vehicles areanalyzed. Then the effects of road curvature radius (Ra), longitudinal slope (Slo), and length (Len) on speed andacceleration are studied. Finally, a general 3D road network model based on road section features is established.This paper also presents intersection and road section recognition methods based on the structural features ofthe 3D road network model and the road features. Real GIS data from a specific region of Beijing is adopted tocreate the simulation scenario, and the simulation results validate the general 3D road network model and therecognitionmethod. Therefore, thiswork makes contributions to the field of intelligent transportation by providinga comprehensive approach tomodeling the 3Droad network and its topological changes in achieving efficient trafficflowand improved road safety. 展开更多
关键词 internet of vehicles road networks 3D road model structure recognition GIS
在线阅读 下载PDF
ConGCNet:Convex geometric constructive neural network for Industrial Internet of Things
10
作者 Jing Nan Wei Dai +1 位作者 Chau Yuen Jinliang Ding 《Journal of Automation and Intelligence》 2024年第3期169-175,共7页
The intersection of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)has garnered ever-increasing attention and research interest.Nevertheless,the dilemma between the strict resource-constrained n... The intersection of the Industrial Internet of Things(IIoT)and artificial intelligence(AI)has garnered ever-increasing attention and research interest.Nevertheless,the dilemma between the strict resource-constrained nature of IIoT devices and the extensive resource demands of AI has not yet been fully addressed with a comprehensive solution.Taking advantage of the lightweight constructive neural network(LightGCNet)in developing fast learner models for IIoT,a convex geometric constructive neural network with a low-complexity control strategy,namely,ConGCNet,is proposed in this article via convex optimization and matrix theory,which enhances the convergence rate and reduces the computational consumption in comparison with LightGCNet.Firstly,a low-complexity control strategy is proposed to reduce the computational consumption during the hidden parameters training process.Secondly,a novel output weights evaluated method based on convex optimization is proposed to guarantee the convergence rate.Finally,the universal approximation property of ConGCNet is proved by the low-complexity control strategy and convex output weights evaluated method.Simulation results,including four benchmark datasets and the real-world ore grinding process,demonstrate that ConGCNet effectively reduces computational consumption in the modelling process and improves the model’s convergence rate. 展开更多
关键词 Industrial internet of Things Lightweight geometric constructive neural network Convex optimization RESOURCE-CONSTRAINED Matrix theory
在线阅读 下载PDF
Analysis of Mobile and Internet Network Coverage: Propagation of Electromagnetic Waves and Concept of Digital Divide in Burundi
11
作者 Apollinaire Bigirimana Jérémie Ndikumagenge +2 位作者 Sami Tabbane Romeo Nibitanga Hassan Kibeya 《Open Journal of Antennas and Propagation》 2024年第1期1-18,共18页
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti... Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services. 展开更多
关键词 Coverage of Mobile networks and internet Digital Divide Rural and Isolated Areas Antenna Connectivity and Digital Inclusion
在线阅读 下载PDF
融合Mashup内协作关系的图卷积Web API推荐
12
作者 杨朝晖 武浩 徐森龙 《云南大学学报(自然科学版)》 北大核心 2025年第1期30-40,共11页
为了更好地缓解Web API推荐中的数据稀疏问题,提出了一种基于轻量图卷积网络的Web API推荐模型CoNetLGN.CoNetLGN将同一个Mashup内所调用的Web API视作具有协作关系,将其挖掘出表示为一个API协作图,作为辅助信息增强推荐性能.首先,在CoN... 为了更好地缓解Web API推荐中的数据稀疏问题,提出了一种基于轻量图卷积网络的Web API推荐模型CoNetLGN.CoNetLGN将同一个Mashup内所调用的Web API视作具有协作关系,将其挖掘出表示为一个API协作图,作为辅助信息增强推荐性能.首先,在CoNetLGN中,每个用户和Web API的表示通过轻量图卷积层在用户-API交互图中传播,与此同时,API的表示还会在API协作图中传播;然后,设计了一种图融合操作,用于在传播过程中聚合API在两个图中的表示;最后,再用加权和将每一层学习到的表示结合起来.在Programmable Web数据集上进行的实验结果表明,提出的CoNetLGN模型在对用户做Web API推荐时较其他3种较有代表性的协同过滤方法有更好的表现. 展开更多
关键词 web API推荐 MASHUP 图卷积网络 深度学习
在线阅读 下载PDF
5DGWO-GAN:A Novel Five-Dimensional Gray Wolf Optimizer for Generative Adversarial Network-Enabled Intrusion Detection in IoT Systems
13
作者 Sarvenaz Sadat Khatami Mehrdad Shoeibi +2 位作者 Anita Ershadi Oskouei Diego Martín Maral Keramat Dashliboroun 《Computers, Materials & Continua》 SCIE EI 2025年第1期881-911,共31页
The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by... The Internet of Things(IoT)is integral to modern infrastructure,enabling connectivity among a wide range of devices from home automation to industrial control systems.With the exponential increase in data generated by these interconnected devices,robust anomaly detection mechanisms are essential.Anomaly detection in this dynamic environment necessitates methods that can accurately distinguish between normal and anomalous behavior by learning intricate patterns.This paper presents a novel approach utilizing generative adversarial networks(GANs)for anomaly detection in IoT systems.However,optimizing GANs involves tuning hyper-parameters such as learning rate,batch size,and optimization algorithms,which can be challenging due to the non-convex nature of GAN loss functions.To address this,we propose a five-dimensional Gray wolf optimizer(5DGWO)to optimize GAN hyper-parameters.The 5DGWO introduces two new types of wolves:gamma(γ)for improved exploitation and convergence,and theta(θ)for enhanced exploration and escaping local minima.The proposed system framework comprises four key stages:1)preprocessing,2)generative model training,3)autoencoder(AE)training,and 4)predictive model training.The generative models are utilized to assist the AE training,and the final predictive models(including convolutional neural network(CNN),deep belief network(DBN),recurrent neural network(RNN),random forest(RF),and extreme gradient boosting(XGBoost))are trained using the generated data and AE-encoded features.We evaluated the system on three benchmark datasets:NSL-KDD,UNSW-NB15,and IoT-23.Experiments conducted on diverse IoT datasets show that our method outperforms existing anomaly detection strategies and significantly reduces false positives.The 5DGWO-GAN-CNNAE exhibits superior performance in various metrics,including accuracy,recall,precision,root mean square error(RMSE),and convergence trend.The proposed 5DGWO-GAN-CNNAE achieved the lowest RMSE values across the NSL-KDD,UNSW-NB15,and IoT-23 datasets,with values of 0.24,1.10,and 0.09,respectively.Additionally,it attained the highest accuracy,ranging from 94%to 100%.These results suggest a promising direction for future IoT security frameworks,offering a scalable and efficient solution to safeguard against evolving cyber threats. 展开更多
关键词 internet of things intrusion detection generative adversarial networks five-dimensional binary gray wolf optimizer deep learning
在线阅读 下载PDF
面向Web安全扫描器的网络入侵检测研究
14
作者 刘梓乐 吴晓鸰 +1 位作者 冯永晋 Hoon Heo 《广东工业大学学报》 2025年第6期52-61,共10页
在网络攻击中,使用Web安全扫描器的扫描探测是Web攻击前期侦察的主要手段。现有的Web入侵检测方法侧重于对已知攻击数据和正常数据进行分类,存在容易被绕过、无法检测未知攻击等问题。为了弥补现有的缺陷,本文提出从Web安全扫描器探测... 在网络攻击中,使用Web安全扫描器的扫描探测是Web攻击前期侦察的主要手段。现有的Web入侵检测方法侧重于对已知攻击数据和正常数据进行分类,存在容易被绕过、无法检测未知攻击等问题。为了弥补现有的缺陷,本文提出从Web安全扫描器探测扫描的角度检测Web攻击。首先,通过实验采集了多种Web安全扫描器的扫描数据,并分析、验证了扫描数据间存在的相似性。然后,提出了一种基于扫描数据的Web入侵检测方案(Char Embedding-CGRU(M×N)),其中包括特征提取方法及卷积门控循环网络模型。最后,在收集的扫描数据集上进行对比实验,结果表明,本文提出的Web入侵检测方案具有更好的攻击检测效果,对已知Web安全扫描器的检测精确率是99.87%、F1值为98.99%,对未知Web安全扫描器的检测精确率为92.98%、F1值为95.71%。 展开更多
关键词 网络入侵检测 web安全扫描器 卷积神经网络 门控循环单元
在线阅读 下载PDF
融合Web开发的计算机网络应用层实验教学案例 被引量:1
15
作者 王华秋 张金荣 +1 位作者 刘智 邢欣来 《计算机时代》 2025年第1期68-71,76,共5页
设计了计算机网络应用层协议与Web开发部署综合性实验项目,通过搭建DNS域名与Web开发部署相互融合的实验教学案例,覆盖计算机网络和Web应用开发两门课程,体现这两门课程的融合统一。教学实践效果表明,该案例的综合性强,设计理念契合“... 设计了计算机网络应用层协议与Web开发部署综合性实验项目,通过搭建DNS域名与Web开发部署相互融合的实验教学案例,覆盖计算机网络和Web应用开发两门课程,体现这两门课程的融合统一。教学实践效果表明,该案例的综合性强,设计理念契合“工程教育认证”新时代下新工科软件工程专业的教学目标,能够加深学生对于Web开发流程的理解,提高学生对于Web开发的兴趣和积极性。 展开更多
关键词 工程教育认证 计算机网络 web开发 综合性实验
在线阅读 下载PDF
人工智能技术背景下Web前端开发技术研究 被引量:2
16
作者 孙莉莉 《无线互联科技》 2025年第7期77-80,共4页
在人工智能技术背景下,Web前端开发正经历着变革,这不仅显著提高了开发效率,还极大地优化了用户体验。然而,现行技术在Web前端开发中的应用效果并不好,所开发的Web前端不仅响应性能比较差,而且代码错误率较高,严重影响了用户体验。为此... 在人工智能技术背景下,Web前端开发正经历着变革,这不仅显著提高了开发效率,还极大地优化了用户体验。然而,现行技术在Web前端开发中的应用效果并不好,所开发的Web前端不仅响应性能比较差,而且代码错误率较高,严重影响了用户体验。为此,文章提出了人工智能技术背景下Web前端开发技术的研究。该技术以模型视图控制器分层架构与模块化设计为基础,通过数据层、视图层以及逻辑层搭建Web前端框架。根据Web前端框架的运行需求,文章采用人工智能技术中的人工神经网络模型生成与Web前端框架相匹配的代码,从而实现基于人工智能技术的Web前端开发。实验结果表明,采用所设计技术开发的Web前端响应时间不超过1 s,代码错误率不超过1%,可以实现Web前端的流畅运行。 展开更多
关键词 人工智能技术 web前端 MVC 前端框架 模块化 人工神经网络模型
在线阅读 下载PDF
Intelligent Management of Resources for Smart Edge Computing in 5G Heterogeneous Networks Using Blockchain and Deep Learning
17
作者 Mohammad Tabrez Quasim Khair Ul Nisa +3 位作者 Mohammad Shahid Husain Abakar Ibraheem Abdalla Aadam Mohammed Waseequ Sheraz Mohammad Zunnun Khan 《Computers, Materials & Continua》 2025年第7期1169-1187,共19页
Smart edge computing(SEC)is a novel paradigm for computing that could transfer cloud-based applications to the edge network,supporting computation-intensive services like face detection and natural language processing... Smart edge computing(SEC)is a novel paradigm for computing that could transfer cloud-based applications to the edge network,supporting computation-intensive services like face detection and natural language processing.A core feature of mobile edge computing,SEC improves user experience and device performance by offloading local activities to edge processors.In this framework,blockchain technology is utilized to ensure secure and trustworthy communication between edge devices and servers,protecting against potential security threats.Additionally,Deep Learning algorithms are employed to analyze resource availability and optimize computation offloading decisions dynamically.IoT applications that require significant resources can benefit from SEC,which has better coverage.Although access is constantly changing and network devices have heterogeneous resources,it is not easy to create consistent,dependable,and instantaneous communication between edge devices and their processors,specifically in 5G Heterogeneous Network(HN)situations.Thus,an Intelligent Management of Resources for Smart Edge Computing(IMRSEC)framework,which combines blockchain,edge computing,and Artificial Intelligence(AI)into 5G HNs,has been proposed in this paper.As a result,a unique dual schedule deep reinforcement learning(DS-DRL)technique has been developed,consisting of a rapid schedule learning process and a slow schedule learning process.The primary objective is to minimize overall unloading latency and system resource usage by optimizing computation offloading,resource allocation,and application caching.Simulation results demonstrate that the DS-DRL approach reduces task execution time by 32%,validating the method’s effectiveness within the IMRSEC framework. 展开更多
关键词 Smart edge computing heterogeneous networks blockchain 5G network internet of things artificial intelligence
在线阅读 下载PDF
MBID:A Scalable Multi-Tier Blockchain Architecture with Physics-Informed Neural Networks for Intrusion Detection in Large-Scale IoT Networks
18
作者 Saeed Ullah Junsheng Wu +3 位作者 Mian Muhammad Kamal Heba G.Mohamed Muhammad Sheraz Teong Chee Chuah 《Computer Modeling in Engineering & Sciences》 2025年第8期2647-2681,共35页
The Internet of Things(IoT)ecosystem faces growing security challenges because it is projected to have 76.88 billion devices by 2025 and $1.4 trillion market value by 2027,operating in distributed networks with resour... The Internet of Things(IoT)ecosystem faces growing security challenges because it is projected to have 76.88 billion devices by 2025 and $1.4 trillion market value by 2027,operating in distributed networks with resource limitations and diverse system architectures.The current conventional intrusion detection systems(IDS)face scalability problems and trust-related issues,but blockchain-based solutions face limitations because of their low transaction throughput(Bitcoin:7 TPS(Transactions Per Second),Ethereum:15-30 TPS)and high latency.The research introduces MBID(Multi-Tier Blockchain Intrusion Detection)as a groundbreaking Multi-Tier Blockchain Intrusion Detection System with AI-Enhanced Detection,which solves the problems in huge IoT networks.The MBID system uses a four-tier architecture that includes device,edge,fog,and cloud layers with blockchain implementations and Physics-Informed Neural Networks(PINNs)for edge-based anomaly detection and a dual consensus mechanism that uses Honesty-based Distributed Proof-of-Authority(HDPoA)and Delegated Proof of Stake(DPoS).The system achieves scalability and efficiency through the combination of dynamic sharding and Interplanetary File System(IPFS)integration.Experimental evaluations demonstrate exceptional performance,achieving a detection accuracy of 99.84%,an ultra-low false positive rate of 0.01% with a False Negative Rate of 0.15%,and a near-instantaneous edge detection latency of 0.40 ms.The system demonstrated an aggregate throughput of 214.57 TPS in a 3-shard configuration,providing a clear,evidence-based path for horizontally scaling to support overmillions of devices with exceeding throughput.The proposed architecture represents a significant advancement in blockchain-based security for IoT networks,effectively balancing the trade-offs between scalability,security,and decentralization. 展开更多
关键词 internet of things blockchain intrusion detection physics-informed neural networks scalability security
在线阅读 下载PDF
ANNDRA-IoT:A Deep Learning Approach for Optimal Resource Allocation in Internet of Things Environments
19
作者 Abdullah M.Alqahtani Kamran Ahmad Awan +1 位作者 Abdulaziz Almaleh Osama Aletri 《Computer Modeling in Engineering & Sciences》 2025年第3期3155-3179,共25页
Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-ba... Efficient resource management within Internet of Things(IoT)environments remains a pressing challenge due to the increasing number of devices and their diverse functionalities.This study introduces a neural network-based model that uses Long-Short-Term Memory(LSTM)to optimize resource allocation under dynam-ically changing conditions.Designed to monitor the workload on individual IoT nodes,the model incorporates long-term data dependencies,enabling adaptive resource distribution in real time.The training process utilizes Min-Max normalization and grid search for hyperparameter tuning,ensuring high resource utilization and consistent performance.The simulation results demonstrate the effectiveness of the proposed method,outperforming the state-of-the-art approaches,including Dynamic and Efficient Enhanced Load-Balancing(DEELB),Optimized Scheduling and Collaborative Active Resource-management(OSCAR),Convolutional Neural Network with Monarch Butterfly Optimization(CNN-MBO),and Autonomic Workload Prediction and Resource Allocation for Fog(AWPR-FOG).For example,in scenarios with low system utilization,the model achieved a resource utilization efficiency of 95%while maintaining a latency of just 15 ms,significantly exceeding the performance of comparative methods. 展开更多
关键词 internet of things resource optimization deep learning optimal resource allocation neural network EFFICIENCY
在线阅读 下载PDF
Adjustable random linear network coding(ARLNC): A solution for data transmission in dynamic IoT computational environments
20
作者 Raffi Dilanchian Ali Bohlooli Kamal Jamshidi 《Digital Communications and Networks》 2025年第2期574-586,共13页
In mobile computing environments, most IoT devices connected to networks experience variable error rates and possess limited bandwidth. The conventional method of retransmitting lost information during transmission, c... In mobile computing environments, most IoT devices connected to networks experience variable error rates and possess limited bandwidth. The conventional method of retransmitting lost information during transmission, commonly used in data transmission protocols, increases transmission delay and consumes excessive bandwidth. To overcome this issue, forward error correction techniques, e.g., Random Linear Network Coding(RLNC) can be used in data transmission. The primary challenge in RLNC-based methodologies is sustaining a consistent coding ratio during data transmission, leading to notable bandwidth usage and transmission delay in dynamic network conditions. Therefore, this study proposes a new block-based RLNC strategy known as Adjustable RLNC(ARLNC), which dynamically adjusts the coding ratio and transmission window during runtime based on the estimated network error rate calculated via receiver feedback. The calculations in this approach are performed using a Galois field with the order of 256. Furthermore, we assessed ARLNC's performance by subjecting it to various error models such as Gilbert Elliott, exponential, and constant rates and compared it with the standard RLNC. The results show that dynamically adjusting the coding ratio and transmission window size based on network conditions significantly enhances network throughput and reduces total transmission delay in most scenarios. In contrast to the conventional RLNC method employing a fixed coding ratio, the presented approach has demonstrated significant enhancements, resulting in a 73% decrease in transmission delay and a 4 times augmentation in throughput. However, in dynamic computational environments, ARLNC generally incurs higher computational costs than the standard RLNC but excels in high-performance networks. 展开更多
关键词 Random linear network coding Adjust redundancy Galois field internet of Things Data transfer
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部