Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 135.00Impact Factor 2023: 0.9
This journal publishes papers on a number of topics ranging from design to practical experiences with operational high performance/speed networks.
The topics covered will include but not be limited to:
- Communication network architectures
- Evolutionary networking protocols, services and architectures
- Network Security
Authors: Amune, Amruta Chandrakant | Pande, Himangi
Article Type: Research Article
Abstract: Wireless sensor networks (WSNs) have emerged as a one of the most fascinating areas of lookup in the past few years principally due to its massive quantity of workable applications. However limited energy, node deployment strategy, routing techniques has considerable impact on the overall performance of network. This paper proposes sustainable honey bee ratel based hybrid wireless sensor network (SHHWSN) layering framework for improving load balancing and scalability issues in network. In SHHWSN tessellated hexagonal shape clusters are formed to cover entire geographical region without any gaps. Hybrid routing schema constrained with redundant data identification policy used in this, seeks …to optimize energy utilization. The proposed SHHWSN was evaluated and validated by simulation, and the results were compared with earlier schematics where mostly one sided stochastic node deployments were followed. The experimental results show that SHHWSN has superior performance in terms of network alive nodes, delay, energy and throughput. The proposed SHHWSN obtained values of 50 nodes is 3, 0.061, 0.14, 0.89, 100 nodes is 3,0.037, 0.19, 0.551, 150 nodes is 13, 0.081, 0.23, 0.415, and 200 nodes is 23, 1.01, 0.25, 0.356, which is significantly more effective than current techniques. Show more
Keywords: WSN, honey bee ratel optimization, multitier scalable clustering, routing and Djiskstra algorithm
DOI: 10.3233/JHS-230086
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Lu, Qiuyu | Li, Haibo | Zheng, Jianping | Qin, Jianru | Yang, Yinguo | Li, Li | Jiang, Keteng
Article Type: Research Article
Abstract: In order to study the operating characteristics of variable speed constant frequency wind turbine under different working conditions and the monitoring system of wind turbine. In this paper, the simulation model of each component system of wind turbine is established by MATLAB/Simulink module, and the influence law of different wind speed and ground fault types on the output power of wind turbine is studied. The active power of wind turbines under different short-circuit fault types is compared. At the same time, in order to realize real-time monitoring of wind turbine speed and output power, an online monitoring system for wind …turbine operation based on industrial Internet of Things is proposed, and the composition and operation characteristics of this remote monitoring system are given. The practical application shows that the on-line monitoring system can accurately and remotely monitor the running status of the wind turbine and avoid the unstable running of the wind turbine. The research conclusions of this paper can provide reference for the design and construction of wind turbines and the operation of connecting to the power grid. Show more
Keywords: Wind power, variable speed constant frequency wind turbine, remote monitoring system, Internet of Things
DOI: 10.3233/JHS-222009
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-15, 2023
Authors: Shirley, C.P. | Kumar, Jaydip | Pitambar Rane, Kantilal | Kumar, Narendra | Radha Rani, Deevi | Harshitha, Kuntamukkula | Tiwari, Mohit
Article Type: Research Article
Abstract: IoT networks can be defined as groups of physically connected things and devices that can connect to the Internet and exchange data with one another. Since enabling an increasing number of internets of things devices to connect with their networks, organizations have become more vulnerable to safety issues and attacks. A major drawback of previous research is that it can find out prior seen types only, also any new device types are considered anomalous. In this manuscript, IoT device type detection utilizing Training deep quantum neural networks optimized with a Chimp optimization algorithm for enhancing IOT security (IOT-DTI-TDQNN-COA-ES) is proposed. …The proposed method entails three phases namely data collection, feature extraction and detection. For Data collection phase, real network traffic dataset from different IoT device types are collected. For feature mining phase, the internet traffic features are extracted through automated building extraction (ABE) method. IoT device type identification phase, Training deep quantum neural networks (TDQNN) optimized with Chimp optimization algorithm (COA) is utilized to detect the category of IoT devices as known and unknown device. IoT network is implemented in Python. Then the simulation performance of the proposed IOT-DTI-TDQNN-COA-ES method attains higher accuracy as26.82% and 23.48% respectively, when compared with the existing methods. Show more
Keywords: IOT security, device type identification, training deep quantum neural networks, chimp optimization algorithm
DOI: 10.3233/JHS-230028
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Oh, SangYeob | Park, ChulHo
Article Type: Research Article
Abstract: IP mobility support is based on terminal behavior, recognizing mobility and maintaining a continuous communication session. The existing mobile IP location registration sends a message to one or more routers during a handoff within a domain by using a multicast address to process messages continuously. This implementation requires persistent message processing among all routers to determine new multicast address assignments. To solve this problem, we propose a method that enables the mobile user to obtain a QoS guarantee when the mobile device moves to an overlapping area under the mobile IP. Therefore, dynamic mobility management includes location updates under …the mobile IP, and transmission of packets from the expected access points. When a handoff occurs while the mobile device is connected, the mobile host dynamically adapts to the mobility characteristics of the mobile node and transmits missed packets. In addition, by first using a location router, handoff latency reduction and packet loss requirements between domains in the overlapping mobile network environment are resolved. Second, the proposed algorithm has low-control traffic in the mobile network, allowing quick handoffs. Although instantaneous throughput is reduced during handoffs, tunneling is reduced by 10-30%, even after a handoff, by retransmitting packets missed by the mobile host, while location-registration-update times are reduced by 20-80%. Show more
Keywords: Mobile IP, Session Initiation Protocol, multimedia communication, QoS, Home Agent, Call-to-Mobility Ratio, mobility management, Location Registration Management
DOI: 10.3233/JHS-222035
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-11, 2023
Authors: Sonam, | Johari, Rahul | Garg, Sanya | Bawa, Prabhnoor | Aggarwal, Deeksha
Article Type: Research Article
Abstract: The applications of IoT have increased manyfold owing to the declining prices of electronic devices and the growing internet. This study discusses at length the various characteristics, applications, merits, demerits, and problems associated with IoT. The current research work showcases the design and development of application coined as MIAWM : M QTT based I oT A pplication for W eather M onitoring. The application describes how the MQTT protocol can easily be used to perform efficient routing in IoT. The Application describes how to create a simulation for the MQTT Publisher Subscriber model which provides desired weather data to a …remote subscriber anywhere in the world. The dataset used contains information about the temperature, precipitation, and wind speed in Berlin and Germany. This paper puts the various quality of service to experiment by comparing the time taken to service the request. Show more
Keywords: IoT, MQTT, routing, publisher, subscriber, attack, broker
DOI: 10.3233/JHS-230008
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-22, 2024
Authors: Gollagi, Shantappa G. | Maheswari, S.S. | Sapkale, Pallavi V. | Poojitha, Sabbineni
Article Type: Research Article
Abstract: Channel estimation is crucial for massive multiple-input multiple-output (MIMO) systems to scale up multi-user (MU) MIMO, providing great improvement in spectral and energy efficiency. The nature of non-orthogonal cause pilot contamination is experienced only while estimating multi-cell MIMO scheme with the training and it is misplaced while narrowing concentration to multi-cell or one-cell setting, where information of the channel is assumed to be obtainable at no cost. Non-orthogonal multiple access (NOMA) serves numerous users concurrently utilizing channel gain differences. The advancement in massive MIMO-NOMA technology has offered diverse techniques recently for reducing pilot contamination in massive MIMO-NOMA based on pilot …allocation. Here, a new approach called War Strategy Chimp Optimization+Deep Neuro-Fuzzy Network (WSChO+DNFN) is designed for the estimation of channels to reduce pilot contamination in a massive MIMO-NOMA system. It takes place in two phases, the transmitter and the receiver phase. The channel estimation is conducted by DNFN that is tuned by devised WSChO. Furthermore, WSChO is an amalgamation of War Strategy Optimization (WSO) and Chimp Optimization Algorithm (ChOA). Additionally, the WSChO+DNFN attained minimal values of BER and normalized MSE of 0.000103 and 0.000074, respectively. The proposed method has achieved a performance gain of 44.39%, 19.26%, 9.17%, 5.22%, 9.92%, and 6.03% compared to the Orthogonal Frequency Division Multiplexing (OFDM), Group Successive Interference Cancellation assisted Semi-Blind Channel Estimation Scheme (GSIC_SBCE), Sector-Based Pilot Assignment Scheme (PAS), Convolutional Neural Network (CNN), User Segregation based Channel Estimation (USCE), Optimal Channel Estimation using Hybrid Machine Learning (OCE_HML), respectively. Show more
Keywords: Massive multiple-input multiple-output, War Strategy Optimization (WSO), non-orthogonal multiple access, Chimp Optimization Algorithm (ChOA), Deep Neuro-fuzzy network (DNFN)
DOI: 10.3233/JHS-230043
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-19, 2024
Authors: Barolli, Leonard
Article Type: Research Article
Abstract: In this paper, we present a hybrid intelligent simulation system for optimization of mesh routers in Wireless Mesh Networks (WMNs) called WMN-PSOHCDGA. We implemented six mesh router replacement methods: CM, RIWM, LDIWM, LDVM, RDVM and FC-RDVM and consider Two Islands distribution of mesh clients. We carry out a comparison study of these router replacement methods for small and middle scale WMNs. We assessed the performance by computer simulations. The simulation results show that six methods have a good performance for connectivity and coverage metrics, for both small and middle scale WMNs. However, they have different behavior for load balancing. For …small scale WMNs, the load balancing of LDIWM, RIWM and FC-RDVM is better than CM, LDVM and RDVM. While, comparing LDIWM, RIWM and FC-RDVM, the LDIWM has better load balancing. We found that the load balancing for small scale WMNs is not good, because there is a concentration of mesh routers in some areas. For middle scale WMNs, the CM, LDIWM, LDVM and RDVM have not a good load balancing. While, the RIWM and FC-RDVM have better performance. Comparing RIWM and FC-RDVM, we found that the load balancing of FC-RDVM is better than RIWM. Show more
Keywords: Wireless mesh networks, mesh router replacement methods, two islands distribution, intelligent algorithms, hybrid intelligent simulation system
DOI: 10.3233/JHS-230093
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-12, 2023
Authors: Granata, Daniele | Mastroianni, Michele | Rak, Massimiliano | Cantiello, Pasquale | Salzillo, Giovanni
Article Type: Research Article
Abstract: Since 2018, the enactment of the General Data Protection Regulation (GDPR) has bestowed distinct privileges upon each person while imposing protocols to safeguard personal information. The GDPR effectively tackles an evident requirement within our interconnected, social media-driven society. However, its compliance poses a considerable challenge, particularly for small and medium-sized businesses. This work aims to identify and select the proper countermeasures in order to comply with GDPR, by using standard security controls. Thus, we designed a tool to handle some phases of the compliance process in an almost semi-automated way. The proposed approach relies on standard security control frameworks (namely …NIST SP-800-53) and can be easily adapted to different frameworks. The proposed technique was validated using our university as a case study, through a simple demonstrator, although the solution can be transparently applied to different contexts. Show more
Keywords: GDPR, privacy, cloud, security policy, security control framework
DOI: 10.3233/JHS-230080
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-28, 2024
Authors: Higashi, Shunya | Ampririt, Phudit | Qafzezi, Ermioni | Ikeda, Makoto | Matsuo, Keita | Barolli, Leonard
Article Type: Research Article
Abstract: In recent years, the human-to-human and human-to-things relationships are becoming complicated and unreliable, which makes harder decisions in a variety of situations. As a result, trust computing is gaining interest in a number of research fields. The Logical Trust (LT) is one of trust computing concepts. In this paper, we design a Fuzzy-based System for Decision of Logical Trust (FSDLT). We implement two models: FSDLTM1 and FSDLTM2. The FSDLTM1 considers three input parameters: Belief (Be), Experience (Ep), Rationality (Ra) and the output parameter is LT. In FSDLTM2, we consider Reliability (Re) as a new parameter. We evaluated the implemented models …by computer simulations. The simulation results show that when Be, Ep, Ra and Re are increasing, the LT is increased. For FSDLTM1, when Ep value is 0.9, all LT values are greater than 0.5. While for FSDLTM2, in case when Be is 0.9, for all values of Ra and Re, when Ep is 0.5 and 0.9, all LT values are higher than 0.5. This shows that the person or device is trustworthy. The FSDLTM2 is more complex than FSALTM1 but it makes a better decision for LT by considering four input parameters. Show more
Keywords: Trust computing, fuzzy logic, intelligent algorithms, decision making systems
DOI: 10.3233/JHS-230189
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Kabra, Preeti | Rani, D. Sudha
Article Type: Research Article
Abstract: This manuscript proposes a hybrid technique for determining the optimal positioning of phasor measurement units (PMUs) in power systems. The PMUs play a crucial role in power system control, wide-area monitoring, and protection. The proposed hybrid method is the joint execution of the Lichtenberg algorithm (LA) and the heap-based optimization (HBO) technique. Hence, it is named the LA-HBO technique. The objective of the proposed method is to place the PMUs in the power system for observability. The goal is to enhance the efficiency and accuracy of PMU placement, ensuring optimal positioning for improved grid monitoring capabilities. The Lichtenberg Algorithm (LA) …enhances PMU placement by addressing system observability challenges and ensuring that selected locations provide comprehensive coverage of the power grid. The heap-based approach optimizes PMU placement by efficiently managing the selection process, considering factors like computational efficiency and scalability. The proposed hybrid technique is implemented in IEEE-30 and -14 bus systems. The MATLAB-based simulation results are compared with the various existing methods, such as Sea Lion Optimization (SLO), Particle Swarm Optimization (PSO), and Ant Bee Colony Optimization (ABC). By then, the outcome reveals the efficacy of the proposed method for defining the optimum PMU locations. The proposed method shows a low computational time of 0.02348 sec for the IEEE-14 bus, and 0.03565 sec for the IEEE-30 bus compared with other existing methods. Show more
Keywords: Wide area monitoring system (WAMS), phasor measurement unit, ideal location, synchrophasor technology, bus, test systems
DOI: 10.3233/JHS-230170
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-17, 2024
Authors: Ding, Hangchao | Tang, Huayun | Jia, Chen | Wang, Yanzhao
Article Type: Research Article
Abstract: Bi-deniable Encryption scheme means that when the sender and the receiver are coerced, the coercer can obtain fake plaintext, random numbers, and secret keys. It’s a solution strategy in the case of information leakage. Compared with traditional encryption, deniable encryption can provide secret communications in situations of coercion in the Post-Quantum era. Compared with sender-deniable encryption and receiver-deniable encryption, bi-deniable encryption can achieve secret communications in the situation that both sender and receiver are coerced by the coercer. So, we propose to design a bi-deniable encryption scheme under the multi-distribution model. In our bi-deniable encryption scheme, we construct a …bi-deniable encryption scheme based on the assumption of Decision-Learning With Errors (DLWE) under the multi-distribution model. Firstly, the principle of Inner Product Predicate Encryption (IPPE) is applied in our scheme. Secondly, we apply the framework of Bi-Translucent Set (BTS), combined with inner product predicate encryption. Thirdly, we construct a series of probabilistic polynomial time algorithms, which apply linear transformation between different lattice structures, and Regev dual encryption. Fourthly, the statistical indistinguishability between the sampling algorithm with discrete Gaussian sampling algorithm, and the computational indistinguishability between LWE’s ciphertext samples with uniform samples, the property of indistinguishability is applied in theorem proving, which obtain Indistinguishability under Chosen Plaintext Attacks (IND-CPA) security and the property of bi-deniability. Given the value range of the Gaussian parameter and security parameter in our scheme, the correctness of the bi-deniable encryption scheme is guaranteed. We also give the security proof of IND-CPA and bi-deniability’s property by a series of games. The ‘Inner-Product Bi-Translucent Set’ Bi-Deniable Encryption scheme under the multi-distribution model is based on Decision-LWE assumption, and can avoid quantum-resistant attacks. The bi-deniable encryption scheme is firstly constructed by the inner product with the Decision-LWE assumption, which can provide better properties of security and deniability. Show more
Keywords: Multi-distribution model, bi-deniable encryption, Decision-LWE, inner product, Bi-Translucent Set, post-quantum cryptography
DOI: 10.3233/JHS-230181
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
Authors: Singh, Charanjeet | Singh, Pawan Kumar
Article Type: Research Article
Abstract: Massive MIMO (M-MIMO) devices are the key tool to meet the performance stards established for 5G-wireless communication. However, more Radio Frequency (RF) chains needed in base station (BS) with a huge count of transmitting antennas, involve expensive hardware and computing complexities. In order to decrease the RF chains needed in BS, this work intended to use the optimal transmit antenna selection (TAS) strategy. This strategy is gaining a lot of interest since the optimization algorithm aids in the ability to enhance the system performance considerably the efficiency and secrecy rate. This work proposes a novel Coati Adopted Pelican Optimization (CA-PO) …for choosing the optimal TA by considering efficiency as well as secrecy rate. In addition, the CA-PO algorithm makes the decision on which antenna to be elected. At last, the supremacy of CA-PO-based TAS is proven from the analysis regarding secrecy rate and EE analysis. Accordingly, the proposed CA-PO method for MF for set up 2 has attained a higher EE of 0.976; whereas, the DMOA, COA, MRFO, POA and BEA techniques have got a relatively lower EE of 0.968. Show more
Keywords: M-MIMO, Optimal TAS, efficiency, secrecy rate, CA-PO Algorithm
DOI: 10.3233/JHS-230087
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Neelakantan, Puligundla | Gangappa, Malige | Rajasekar, Mummalaneni | Sunil Kumar, Talluri | Suresh Reddy, Gali
Article Type: Research Article
Abstract: This study presents a novel approach to optimize resource allocation, aiming to boost the efficiency of content distribution in Internet of Things (IoT) edge cloud computing environments. The proposed method termed the Caching-based Deep Q-Network (CbDQN) framework, dynamically allocates computational and storage resources across edge devices and cloud servers. Despite its need for increased storage capacity, the high cost of edge computing, and the inherent limitations of wireless networks connecting edge devices, the CbDQN strategy addresses these challenges. By considering constraints such as limited bandwidth and potential latency issues, it ensures efficient data transfer without compromising performance. The method focuses …on mitigating inefficient resource usage, particularly crucial in cloud-based edge computing environments where resource costs are usage-based. To overcome these issues, the CbDQN method efficiently distributes limited resources, optimizing efficiency, minimizing costs, and enhancing overall performance. The approach improves content delivery, reduces latency, and minimizes network congestion. The simulation results substantiate the efficacy of the suggested method in optimizing resource utilization and enhancing system performance, showcasing its potential to address challenges associated with content spreading in IoT edge cloud calculating situations. Our proposed approach evaluated metrics achieves high values of Accuracy is 99.85%, Precision at 99.85%, specificity is 99.82%, sensitivity is 99.82%, F-score is 99.82% and AUC is 99.82%. Show more
Keywords: Cloud computing, resource allocation, Internet of things, deep Q network, reinforcement Learning
DOI: 10.3233/JHS-230165
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-18, 2024
Authors: Muthukumar, S. | Ashfauk Ahamed, A.K.
Article Type: Research Article
Abstract: The “Distributed Denial of Service (DDoS)” threats have become a tool for the hackers, cyber swindlers, and cyber terrorists. Despite the high amount of conventional mitigation mechanisms that are present nowadays, the DDoS threats continue to enhance in severity, volume, and frequency. The DDoS attack has highly affected the availability of the networks for the previous years and still, there is no efficient defense technique against it. Moreover, the new and complex DDoS attacks are increasing on a daily basis but the traditional DDoS attack detection techniques cannot react to these threats. On the other hand, the hackers are employing …very innovative strategies to initiate the threats. But, the traditional methods can become effective and reliable when combined with the deep learning-aided approaches. To solve these certain issues, a framework detection mechanism for DDoS attacks utilizes an attention-aided deep learning methodology. The primary thing is the acquisition of data from standard data online sources. Further, from the garnered data, the significant features are drawn out from the “Deep Weighted Restricted Boltzmann Machine (RBM)” using a “Deep Belief Network (DBN)”, in which the parameters are tuned by employing the recommended Enhanced Gannet Optimization Algorithm (EGOA). This feature extraction operation increases the network performance rate and also diminishes the dimensionality issues. Lastly, the acquired features are transferred to the model of “Attention and Cascaded Recurrent Neural Network (RNN) with Residual Long Short Term Memory (LSTM) (ACRNN-RLSTM)” blocks for the DDoS threat detection purpose. This designed network precisely identifies the complex and new attacks, thus it increases the trustworthiness of the network. In the end, the performance of the approach is contrasted with other traditional algorithms. Hence, the simulation outcomes are obtained that prove the system’s efficiency. Also, the outcomes displayed that the designed system overcame the conventional threat detection techniques. Show more
Keywords: DDoS Attack Detection, deep learning, features extraction, restricted Boltzmann machine, hyper-parameters optimization, enhanced gannet optimization algorithm, attention and cascaded recurrent neural network with residual long short term memory
DOI: 10.3233/JHS-230142
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-27, 2024
Authors: Sawant, Surabhi Sushant | Helonde, Jagdish B. | Burade, Prakash G.
Article Type: Research Article
Abstract: Localization of WSN sensor nodes gains significance in order to grasp the idea for dead node replacement and re-establishing the network from data loss. In this research, the node localization and the position estimation of the dead nodes during routing are more effectively identified by the Felis bee localization protocol. The node localization is significant for effective communication and data transfer throughout the network with high signal strength. The developed approach assists in identifying the dead nodes and replaces them with less localization error thus, the signal strength of the receiver side is maximum. By utilizing the information on the …exact position of the anchor nodes, the unknown location of the dead nodes is estimated by the Felis bee localization protocol. The Felis bee localization protocol enhances the potential of node localization concerning the energy, localization error, and multi-objective function, and attains the minimum RMSE as 0.566 at the 25th round, maximum RSSI as −47.925 dBm as well as the Energy at round 25 as 0.6517 J and the Throughput as 0.2952bps over the simulation area of 10 × 100. Further the established localization reaches the minimum RMSE as 0.673, the maximum Energy as 0.5141 J, maximum throughput as 0.5682,and the maximum RSSI as −53.911 dBm, at the 50th round over simulation area 200 × 200 and surpasses other conventional localization techniques. Show more
Keywords: Wireless Sensor Networks, node localization, Felis bee optimization, signal strength, position estimation
DOI: 10.3233/JHS-230131
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-34, 2024
Authors: Elmahi, M.Y. | Osman, N.I.M.
Article Type: Research Article
Abstract: Routing protocols for Internet of Things (IoT) play a major role in the performance of the network. The standard Routing Protocol for Low-Power and Lossy Networks (RPL) suffers from a number of limitations including congestion of higher-level nodes and unbalanced topology. This paper proposes a novel Objective Function called Load Balanced Minimum Rank with Hysteresis Objective Function (LB_MRHOF), which assigns child nodes to the most suitable parent in the topology. The Objective Function utilizes a weight of the Expected Transmission Count (ETX) and number of children to calculate the Composite ETX and Number of Children (CENOC) which estimates the load …on each node. The attained CENOC is used to select the optimum parent for each node in the topology, where nodes with high CENOC are avoided in the parent selection process. The proposed Objective Function has been evaluated under random and hierarchical network topologies. In addition, the evaluation has investigated the influence of the number of nodes by testing for small, medium and large-scale networks. Results have shown that the proposed Objective Function outperforms MRHOF, OF_FUZZY and OF-EC in terms of Packet Delivery Ratio (PDR) and reduces nodal hop-count under all tested scenarios, with no compromise in energy consumption. They have also revealed that the best performance achieved by LB_MRHOF is attained under large-scale networks. The resulting network topology which is formed by the proposed Objective Function has shown improved balance and more depth. Show more
Keywords: Internet of Things, RPL, Objective Function, Load Balance, ETX
DOI: 10.3233/JHS-230026
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-23, 2024
Authors: Wang, Junchi | Xiao, Hong | Jiang, Wenchao | Li, Ping | Li, Zelin | Wang, Tao
Article Type: Research Article
Abstract: In the actual industrial application of robots, the characteristics of robot malfunctions change accordingly as the working environment becomes increasingly diverse and complex. Utilizing the original fault diagnosis models in new working environments correspondingly leads to a decline in the performance and the generalization capability of the model. Moreover, the monitoring data collected in new working processes often has limited or no labels, making the diagnosis models trained with this data unable to identify faults accurately. In this paper, we propose a Domain adaptive Cross-process Fault Diagnosis method (DCFD) to leverage knowledge from existing working processes for diagnosing faults in …new working processes. DCFD uses Multi-Kernel Maximum Mean Discrepancy (MK-MMD) to measure the difference between the current working processes and the previous working processes, enhancing the fault diagnosis capability of the robotic system in cross-process scenarios. DCFD achieves an average fault classification accuracy of 98% on 12 types of migration tasks, which demonstrates the effectiveness of DCFD on cross-process fault diagnosis classification tasks in real-time industrial application scenarios. Show more
Keywords: Industrial robots, fault diagnosis, transfer learning, domain adaptation
DOI: 10.3233/JHS-230235
Citation: Journal of High Speed Networks, vol. Pre-press, no. Pre-press, pp. 1-15, 2024
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]