Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2024: 0.7
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Lin, Hwa-Chun | Tseng, Wei-Te
Article Type: Research Article
Abstract: In elastic optical networks (EON), routing, modulation selection, and spectrum assignment (RMSA) is crucial in provisioning connection requests. Multipath RMSA offers a number of benefits including provisioning of ultra-high bandwidth demands and better utilization of fragmented spectrum resource. By Combining with traffic grooming, multipath RMSA and traffic grooming is able to provide better utilization of network resource in provisioning connection requests. Adding multi-hop routing mechanism to multipath RMSA and traffic grooming increases the flexibility for selecting paths resulting in higher probability of successfully finding routing paths for connection requests. Dynamic multipath RMSA problem in EON has been investigated extensively in …the literature. Dynamic multi-hop multipath RMSA and traffic grooming problem in EON is far from been well studied. This paper proposes an algorithm for the dynamic multi-hop multipath RMSA and traffic grooming problem in OFDM-based elastic optical networks with sliceable bandwidth-variable transponders. Performance of the proposed algorithm is studied via simulation. Our simulation results show that the proposed algorithm yields lower bandwidth blocking ratio than an existing algorithm. Show more
Keywords: Dynamic multi-hop multipath RMSA, traffic grooming, elastic optical networks
DOI: 10.3233/JHS-222007
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 85-103, 2023
Authors: Rana, Pragati | Patil, B.P.
Article Type: Review Article
Abstract: The Internet of Things (IoT) is the most secure platform for making human existence easier and more comfortable. IoT has made a big contribution to a variety of software programs. The rapid proliferation of smart devices, as well as their trust in data transfer and the use of Wi-Fi mechanics, has increased their vulnerability to cyber-attacks. As a result, the cost of cybercrime is rising every day. As a result, investigating IoT security threats and possible countermeasures can assist researchers in creating acceptable ways to deal with a variety of stressful scenarios in cybercrime research. The IoT framework, as well …as IoT architecture, protocols, and technology, are all covered in this assessment research. Various protection issues at each tier, as well as correction strategies, are also detailed. In addition, this article discusses the use of IoT forensics in cybercrime investigations in a variety of areas, including cybercrime research, Artificial intelligence, system learning, cloud computing, fog computing, and blockchain technology all play a role in this discussion. Finally, some open research on challenging situations in IoT is detailed to enhance cybercrime investigations, providing a cutting-edge course for future research. Show more
Keywords: Internet of Things, cyber-attacks, artificial intelligence, cybercrime research, cyber security
DOI: 10.3233/JHS-222042
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 105-120, 2023
Authors: Cao, Xianglin | Xiao, Hong | Jiang, Wenchao
Article Type: Research Article
Abstract: Semantic matching is one of the critical technologies for intelligent customer service. Since Bidirectional Encoder Representations from Transformers (BERT) is proposed, fine-tuning on a large-scale pre-training language model becomes a general method to implement text semantic matching. However, in practical application, the accuracy of the BERT model is limited by the quantity of pre-training corpus and proper nouns in the target domain. An enhancement method for knowledge based on domain dictionary to mask input is proposed to solve the problem. Firstly, for modul input, we use keyword matching to recognize and mask the word in domain. Secondly, using self-supervised learning …to inject knowledge of the target domain into the BERT model. Thirdly, we fine-tune the BERT model with public datasets LCQMC and BQboost. Finally, we test the model’s performance with a financial company’s user data. The experimental results show that after using our method and BQboost, accuracy increases by 12.12% on average in practical applications. Show more
Keywords: Intelligent customer service, dictionary mask, BERT, data preprocessing
DOI: 10.3233/JHS-222013
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 121-128, 2023
Authors: Lin, Songhai | Xiao, Hong | Jiang, Wenchao | Li, Dafeng | Liang, Jiaben | Li, Zelin
Article Type: Research Article
Abstract: The automation of data analysis in the form of scientific workflows has become a widely adopted practice in many fields of research. Data-intensive experiments using workflows enabled automation and provenance support, which contribute to alleviating the reproducibility crisis. This paper investigates the existing provenance models as well as scientific workflow applications. Furthermore, here we not only summarize the models at different levels, but also compare the applications, particularly the blockchain applied to the provenance in scientific workflows. After that, a new design of secure provenance system is proposed. Provenance that would be enabled by the emerging technology is also discussed …at the end. Show more
Keywords: Provenance, scientific workflows, provenance model, blockchain
DOI: 10.3233/JHS-222017
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 129-145, 2023
Authors: Zhao, Haixia | Li, Keque | Wei, Yongzhuang
Article Type: Research Article
Abstract: As a fully homomorphic encryption friendly symmetric-key primitive, DASTA was invented by Hebborn at Fast Software Encryption 2020. A new fixed linear layer design concept is introduced in the DASTA stream cipher so that its AND depth and the number of ANDs per encrypted bit are quite small. Currently, the security of the DASTA stream cipher has received extensive attention. Note that the best-known attack (i.e., algebraic attack) on DASTA still has a very high data complexity. It appears to be an important task to reduce the data complexity of the attack on DASTA. In this article, a new algebraic …attack on DASTA is proposed. More specifically, the key feed-forward operation, the properties of the nonlinear layer and the invariance from the linear layer are successfully utilized in the attack. In particular, the nonlinear relation of internal states in DASTA is linearized effectively. In this case, more secret key bit equations with low algebraic degrees are collected by fixing the bit. It is illustrated that four ( r − 1 ) -round instances of the DASTA cipher family are theoretically broken by the attack, where r is the iterative number of round operations. Compared with the results of previous algebraic attacks, our approach achieves more favorable data complexity. Show more
Keywords: DASTA, algebraic attack, linearize, χ operation
DOI: 10.3233/JHS-222024
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 147-157, 2023
Authors: Wu, Min | Chun-Wei Lin, Jerry
Article Type: Research Article
Abstract: Aiming at the problem of delay and packet loss in current remote network, a delay compensation algorithm for high-speed network is studied and applied to the remote auction of digital art works. High-speed network delay mainly includes: transmission processing delay, waiting delay, transmission delay, and reception processing delay. The delay model of high-speed network is designed by using a time division multiple access protocol. Based on the high-speed network delay model, the Kalman filter is used to design the high-speed network delay control algorithm to maintain the high-speed network delay. At the same time, the round-trip delay compensation algorithm based …on link delay is used to compensate the high-speed network delay. The experimental results show that the proposed method compensates the delay of more than 235 ms, and the packet loss rate of high-speed network is only 0.59%, and the throughput reaches 241 Mbit/s, which validates the algorithm can effectively compensate the delay of high-speed network and reduce the packet loss rate of high-speed network. Show more
Keywords: Digital art works, Remote auction, High speed network delay, Compensation algorithm, Link delay, Kalman filtering
DOI: 10.3233/JHS-222049
Citation: Journal of High Speed Networks, vol. 29, no. 2, pp. 159-168, 2023
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]