首页期刊导航|Eurasip Journal on Wireless Communications and Networking
期刊信息/Journal information
Eurasip Journal on Wireless Communications and Networking
Springer
Eurasip Journal on Wireless Communications and Networking

Springer

1687-1472

Eurasip Journal on Wireless Communications and Networking/Journal Eurasip Journal on Wireless Communications and NetworkingEIISTPSCI
正式出版
收录年代

    An image denoising method based on BP neural network optimized by improved whale optimization algorithm

    Wang ChunzhiLi MinWang RuoxiYu Han...
    22页
    查看更多>>摘要:Abstract As an important part of smart city construction, traffic image denoising has been studied widely. Image denoising technique can enhance the performance of segmentation and recognition model and improve the accuracy of segmentation and recognition results. However, due to the different types of noise and the degree of noise pollution, the traditional image denoising methods generally have some problems, such as blurred edges and details, loss of image information. This paper presents an image denoising method based on BP neural network optimized by improved whale optimization algorithm. Firstly, the nonlinear convergence factor and adaptive weight coefficient are introduced into the algorithm to improve the optimization ability and convergence characteristics of the standard whale optimization algorithm. Then, the improved whale optimization algorithm is used to optimize the initial weight and threshold value of BP neural network to overcome the dependence in the construction process, and shorten the training time of the neural network. Finally, the optimized BP neural network is applied to benchmark image denoising and traffic image denoising. The experimental results show that compared with the traditional denoising methods such as Median filtering, Neighborhood average filtering and Wiener filtering, the proposed method has better performance in peak signal-to-noise ratio.

    A four-quadrant mobility model-based routing protocol for post-earthquake emergency communication network

    Wang XiaomingGuo Chang
    29页
    查看更多>>摘要:Abstract Emergency communication network (ECN) is the important infrastructure to acquire the real-time information after disaster, which is essential for rescue task. However, the existed routing protocols seldom consider the uneven distribution of rescue area so that cannot satisfy the ECN’s requirement and the quality of rescue needs improvement. In this paper, we avoided the traditional linear propulsion from rim to core and proposed a novel four-quadrant mobility model (FQMM), which makes rescuers arrive the most intensity core area first, which can improve the rescue quality. Then, a FQMM-based protocol (FQMMBP) for ECN is designed, which aims to improve the performance of ECN in terms of package delivery rate (PDR) and end-to-end delay. Finally, we set up a virtual earthquake scenario to simulate our proposed protocol in NS2. Results show that the proposed protocol outperforms to the three compared routing protocols, i.e., AODV, DSDV and DSR. The average FDR is improved by 16.31%, and the average reduction of delay is 64.45%, which shows our proposed scheme’s advantages in quality of rescue.

    Modeling of co-channel interference in bluetooth low energy based on measurement data

    Kavousi Ghafi HamidSpindelberger ChristianArthaber Holger
    17页
    查看更多>>摘要:Abstract The intense use of the 2.4?GHz ISM band by several wireless technologies has resulted in increased co-channel interference between networks operating in this frequency band. The aim of this paper is to investigate modeling techniques of co-channel interference affecting bluetooth low energy devices. The models are derived from recorded interference. Two types of models are introduced: a time domain model utilizing IQ data as reference and a spectrum-based model in which the reference signal is captured in frequency domain by a real-time spectrum analyzer. The recorded interference is also used as a reference to analyze the accuracy of proposed models. The proposed IQ-based model shows a degradation in performance for the environments with dominant bluetooth interfering signals. The frequency-based model not only addresses this problem, but also results in a huge data decimation in recording the interference.

    Physical layer security transmission scheme based on artificial noise in cooperative SWIPT NOMA system

    Jin YongHu ZhentaoXie DongdongWu Guodong...
    17页
    查看更多>>摘要:Abstract Aiming at high energy consumption and information security problem in the simultaneous wireless information and power transfer (SWIPT) multi-user wiretap network, we propose a user-aided cooperative non-orthogonal multiple access (NOMA) physical layer security transmission scheme to minimize base station (BS) transmitted power in this paper. In this scheme, the user near from BS is adopted as a friendly relay to improve performance of user far from BS. An energy harvesting?(EH) technology-based SWIPT is employed at the near user to collect energy which can be used at cooperative stage. Since eavesdropper in the downlink of NOMA system may use successive interference cancellation?(SIC) technology to obtain the secrecy information of receiver, to tackle this problem, artificial noise?(AN) is used at the BS to enhance security performance of secrecy information. Moreover, semidefinite relaxation?(SDR) method and successive convex approximation?(SCA) technique are combined to solve the above non-convex problem. Simulation results show that in comparison with other methods, our method can effectively reduce the transmitted power of the BS on the constraints of a certain level of the secrecy rates of two users.

    Research on enterprise business model and technology innovation based on artificial intelligence

    Qu SunpingShi HongweiZhao HuanhuanYu Lin...
    19页
    查看更多>>摘要:Abstract Small- and medium-sized enterprises (SEMs) are the important part of economic society whose innovation activities are of great significance for building innovative country. In order to investigate how technological innovation (TI) and business model design (BMD) affect the business performance of SMEs, samples of 268 SMEs in the artificial intelligence industry and hierarchical regression models are used in the analysis. The results indicate that TI, BMD, and the matching of them have different effects on the innovation of SMEs of different sizes. These findings are helpful for enriching the theory of the fit between TI and BMD and providing theoretical guidance for the innovation activities in SEMs.

    Miner revenue optimization algorithm based on Pareto artificial bee colony in blockchain network

    Wang ZhangquanChen YourongChen HaoHan Meng...
    28页
    查看更多>>摘要:Abstract In order to improve the revenue of attacking mining pools and miners under block withholding attack, we propose the miner revenue optimization algorithm (MROA) based on Pareto artificial bee colony in blockchain network. MROA establishes the revenue optimization model of each attacking mining pool and revenue optimization model of entire attacking mining pools under block withholding attack with the mathematical formulas such as attacking mining pool selection, effective computing power, mining cost and revenue. Then, MROA solves the model by using the modified artificial bee colony algorithm based on the Pareto method. Namely, the employed bee operations include evaluation value calculation, selection probability calculation, crossover operation, mutation operation and Pareto dominance method, and can update each food source. The onlooker bee operations include confirmation probability calculation, crowding degree calculation, neighborhood crossover operation, neighborhood mutation operation and Pareto dominance method, and can find the optimal food source in multidimensional space with smaller distribution density. The scout bee operations delete the local optimal food source that cannot produce new food sources to ensure the diversity of solutions. The simulation results show that no matter how the number of attacking mining pools and the number of miners change, MROA can find a reasonable miner work plan for each attacking mining pool, which increases minimum revenue, average revenue and the evaluation value of optimal solution, and reduces the spacing value and variance of revenue solution set. MROA outperforms the state of the arts such as ABC, NSGA2 and MOPSO.

    Design and implementation of a smart elderly positioning management system based on wireless communication network

    Yu TiantianWang Ruping
    23页
    查看更多>>摘要:Abstract Wireless communication refers to long-distance transmission communication between multiple nodes without propagation through conductors or cables, and wireless communication can be carried out by radio and electromagnetic waves, etc. Judging from the current situation, the home space positioning design of the medical and elderly care communities is not perfect, which affects the traditional home care. Wireless communication can give wisdom, coordination, and development space in the smart elderly care space positioning design, allowing the elderly to interact, contact, and know their precise location and behavior. This article mainly studies the design and implementation of smart pension space positioning under BIM technology. This paper introduces the frontier of Internet-of-things technology and the theory of sensor network topology control. It uses basic IoT technology to implement the "point, line, and surface" combination of personnel placement algorithms, sensor network communication protocols, topology checks, security models, sensor network wireless communication units, and wireless communication technology. The basic technology and communication technology of personnel deployment based on BIM technology are introduced, the development strategy of wireless communications node is studied, the installation of equipment radio personnel and communication equipment is designed, and the system management platform for the design and development of staff placement in pension institutions is provided. The Web site's information service management, standardized procedures, optimized services, provision of information, intelligent management, and pension services. The experimental results of this paper show that the smart pension space positioning under the BIM technology solves the management loopholes in nursing homes, shortage of nursing staff, inefficiency, lack of services, and family conflicts. It improves the efficiency of the elderly by 25% and the safety index by 23–27%. The development of wireless communication technology promotes the development of intelligent pension space. It will be an important future development direction for the smart community pension.

    Research on the influence of accounting computerization and networking on E-commerce

    Shi Wenquan
    12页
    查看更多>>摘要:Abstract E-commerce has broken through the pattern and boundary of traditional commodity exchange, so that there is no need for face-to-face transactions between merchants and consumers. This has impacted the traditional accounting industry, which broke the environmental setting of traditional accounting industry. This requires the extension and expansion of the economic environment of the new accounting industry, which has led to the computerization of accounting and the network of further upgrades. Accounting computerization and networking have greatly improved the speed and accuracy of accounting information processing, and at the same time made the classification of accounting duties more clear. However, accounting computerization and higher-level networking have in turn affected the development of e-commerce. Due to the rapid development of e-commerce, the corresponding internal auditing schemes of traditional enterprises have been unable to meet accounting and computerization. The impact of this will constrain the further development of e-commerce. Accounting computerization and networking the internal audit of e-commerce is mainly reflected in clues, internal control, and content and environment issues. This paper analyses the impact of accounting computerization and networking on the internal auditing of e-commerce, and finally analyse the auditing setup and experience based on a company H in the accounting information system, and explore the accounting calculation. In the context of globalization and networking, the strategy of how to deal with the trial and control part of e-commerce.

    A novel two-phase cycle algorithm for effective cyber intrusion detection in edge computing

    Liu YunpingYin ChuanyangGong Yiguang
    22页
    查看更多>>摘要:Abstract Edge computing extends traditional cloud services to the edge of the network, closer to users, and is suitable for network services with low latency requirements. With the rise of edge computing, its security issues have also received increasing attention. In this paper, a novel two-phase cycle algorithm is proposed for effective cyber intrusion detection in edge computing based on a multi-objective genetic algorithm (MOGA) and modified back-propagation neural network (MBPNN), namely TPC-MOGA-MBPNN. In the first phase, the MOGA is employed to build a multi-objective optimization model that tries to find the Pareto optimal parameter set for MBPNN. The Pareto optimal parameter set is applied for simultaneous minimization of the average false positive rate (Avg FPR), mean squared error (MSE) and negative average true positive rate (Avg TPR) in the dataset. In the second phase, some MBPNNs are created based on the parameter set obtained by MOGA and are trained to search for a more optimal parameter set locally. The parameter set obtained in the second phase is used as the input of the first phase, and the training process is repeated until the termination criteria are reached. A benchmark dataset, KDD cup 1999, is used to demonstrate and validate the performance of the proposed approach for intrusion detection. The proposed approach can discover a pool of MBPNN-based solutions. Combining these MBPNN solutions can significantly improve detection performance, and a GA is used to find the optimal MBPNN combination. The results show that the proposed approach achieves an accuracy of 98.81% and a detection rate of 98.23% and outperform most systems of previous works found in the literature. In addition, the proposed approach is a generalized classification approach that is applicable to the problem of any field having multiple conflicting objectives.

    An efficient authentication and key agreement protocol for IoT-enabled devices in distributed cloud computing architecture

    Huang HuihuiLu SiqiWu ZehuiWei Qiang...
    21页
    查看更多>>摘要:Abstract With the widespread use of Internet of Things and cloud computing in smart cities, various security and privacy challenges may be encountered.The most basic problem is authentication between each application, such as participating users, IoT devices, distributed servers, authentication centers, etc. In 2020, Kang et al. improved an authentication protocol for IoT-Enabled devices in a distributed cloud computing environment and its main purpose was in order to prevent counterfeiting attacks in Amin et al.’ protocol, which was published in 2018. However, We found that the Kang et al.’s protocol still has a fatal vulnerability, that is, it is attacked by offline password guessing, and malicious users can easily obtain the master key of the control server. In this article, we extend their work to design a lightweight pseudonym identity based authentication and key agreement protocol using smart card. For illustrating the security of our protocol, we used the security protocol analysis tools of AVISPA and Scyther to prove that the protocol can defend against various existing attacks. We will further analyze the interaction between participants authentication path to ensure security protection from simulated attacks detailedly. In addition, based on the comparison of security functions and computing performance, our protocol is superior to the other two related protocols. As a result, the enhanced protocol will be efficient and secure in distributed cloud computing architecture for smart city.