Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (81)

Search Parameters:
Keywords = number of message exchange

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
20 pages, 6437 KiB  
Article
Distributed Multi-Agent Deep Reinforcement Learning-Based Transmit Power Control in Cellular Networks
by Hun Kim and Jaewoo So
Sensors 2025, 25(13), 4017; https://doi.org/10.3390/s25134017 - 27 Jun 2025
Viewed by 407
Abstract
In a multi-cell network, interference management between adjacent cells is a key factor that determines the performance of the entire cellular network. In particular, in order to control inter-cell interference while providing a high data rate to users, it is very important for [...] Read more.
In a multi-cell network, interference management between adjacent cells is a key factor that determines the performance of the entire cellular network. In particular, in order to control inter-cell interference while providing a high data rate to users, it is very important for the base station (BS) of each cell to appropriately control the transmit power in the downlink. However, as the number of cells increases, controlling the downlink transmit power at the BS becomes increasingly difficult. In this paper, we propose a multi-agent deep reinforcement learning (MADRL)-based transmit power control scheme to maximize the sum rate in multi-cell networks. In particular, the proposed scheme incorporates a long short-term memory (LSTM) architecture into the MADRL scheme to retain state information across time slots and to use that information for subsequent action decisions, thereby improving the sum rate performance. In the proposed scheme, the agent of each BS uses only its local channel state information; consequently, it does not need to receive signal messages from adjacent agents. The simulation results show that the proposed scheme outperforms the existing MADRL scheme by reducing the amount of signal messages exchanged between links and improving the sum rate. Full article
(This article belongs to the Special Issue Future Wireless Communication Networks: 3rd Edition)
Show Figures

Figure 1

21 pages, 278 KiB  
Article
Solvability and Nilpotency of Lie Algebras in Cryptography and Steganography
by Amor Hasić, Melisa Azizović, Emruš Azizović and Muzafer Saračević
Mathematics 2025, 13(11), 1824; https://doi.org/10.3390/math13111824 - 30 May 2025
Viewed by 416
Abstract
This paper investigates the role of solvable and nilpotent Lie algebras in the domains of cryptography and steganography, emphasizing their potential in enhancing security protocols and covert communication methods. In the context of cryptography, we explore their application in public-key infrastructure, secure data [...] Read more.
This paper investigates the role of solvable and nilpotent Lie algebras in the domains of cryptography and steganography, emphasizing their potential in enhancing security protocols and covert communication methods. In the context of cryptography, we explore their application in public-key infrastructure, secure data verification, and the resolution of commutator-based problems that underpin data protection strategies. In steganography, we examine how the algebraic properties of solvable Lie algebras can be leveraged to embed confidential messages within multimedia content, such as images and video, thereby reinforcing secure communication in dynamic environments. We introduce a key exchange protocol founded on the structural properties of solvable Lie algebras, offering an alternative to traditional number-theoretic approaches. The proposed Lie Exponential Diffie–Hellman Problem (LEDHP) introduces a novel cryptographic challenge based on Lie group structures, offering enhanced security through the complexity of non-commutative algebraic operations. The protocol utilizes the non-commutative nature of Lie brackets and the computational difficulty of certain algebraic problems to ensure secure key agreement between parties. A detailed security analysis is provided, including resistance to classical attacks and discussion of post-quantum considerations. The algebraic complexity inherent to solvable Lie algebras presents promising potential for developing cryptographic protocols resilient to quantum adversaries, positioning these mathematical structures as candidates for future-proof security systems. Additionally, we propose a method for secure message embedding using the Lie algebra in combination with frame deformation techniques in animated objects, offering a novel approach to steganography in motion-based media. Full article
27 pages, 844 KiB  
Article
A Novel Key Distribution for Mobile Patient Authentication Inspired by the Federated Learning Concept and Based on the Diffie–Hellman Elliptic Curve
by Orieb AbuAlghanam, Hadeel Alazzam, Wesam Almobaideen, Maha Saadeh and Heba Saadeh
Sensors 2025, 25(8), 2357; https://doi.org/10.3390/s25082357 - 8 Apr 2025
Viewed by 522
Abstract
Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical key distribution architecture inspired by federated learning (FL), enabling seamless authentication for patients moving across different healthcare centers. Unlike existing approaches, [...] Read more.
Ensuring secure communication for mobile patients in e-healthcare requires an efficient and robust key distribution mechanism. This study introduces a novel hierarchical key distribution architecture inspired by federated learning (FL), enabling seamless authentication for patients moving across different healthcare centers. Unlike existing approaches, the proposed system allows a central healthcare authority to share global security parameters with subordinate units, which then combine these with their own local parameters to generate and distribute symmetric keys to mobile patients. This FL-inspired method ensures that patients only need to store a single key, significantly reducing storage overhead while maintaining security. The architecture was rigorously evaluated using SPAN-AVISPA for formal security verification and BAN logic for authentication protocol analysis. Performance metrics—including storage, computation, and communication costs—were assessed, demonstrating that the system minimizes the computational load and reduces the number of exchanged messages during authentication compared to traditional methods. By leveraging FL principles, the solution enhances scalability and efficiency, particularly in dynamic healthcare environments where patients frequently switch between facilities. This work bridges a critical gap in e-healthcare security, offering a lightweight, scalable, and secure key distribution framework tailored for mobile patient authentication. Full article
(This article belongs to the Section Communications)
Show Figures

Figure 1

19 pages, 3634 KiB  
Article
Navigation of Autonomous Tug via Evolutionary Algorithms with Radar Plot Fitness Evaluation
by Wojciech Koznowski and Andrzej Łebkowski
Appl. Sci. 2025, 15(4), 2139; https://doi.org/10.3390/app15042139 - 18 Feb 2025
Cited by 1 | Viewed by 479
Abstract
This paper presents an innovative route planning method for autonomous port tugs, using an evolutionary algorithm with radar fitness assessment. The proposed solution takes into account the specifics of tug operation in a complex port environment, characterized by the presence of numerous static [...] Read more.
This paper presents an innovative route planning method for autonomous port tugs, using an evolutionary algorithm with radar fitness assessment. The proposed solution takes into account the specifics of tug operation in a complex port environment, characterized by the presence of numerous static obstacles (port infrastructure, islands) and dynamic obstacles (other vessels). The presented radar fitness assessment method allows for taking into account many optimization criteria, such as route length, number of turn points or safety margin with respect to obstacles. The algorithm was tested in four different navigation scenarios of varying complexity. The results of the research showed that, compared to the classic genetic algorithm, the radar method generates routes with fewer turn points (reduction by 1–2 points) and significantly reduces the total course change (up to 53.6%). Additionally, the routes generated by the radar algorithm consistently maintained a greater safety margin with respect to obstacles. The algorithm is prepared to take advantage of data interchange according to International Maritime Organization’s e-navigation proposal via its VHF Data Exchange System (VDES) messages, which could improve the safety of proposed routes and their efficiency. This gives a basis to use the proposed solution as an autonomous vessels and/or formation control algorithm in future automated transport systems. Full article
(This article belongs to the Section Marine Science and Engineering)
Show Figures

Figure 1

12 pages, 2122 KiB  
Article
Association Between Dietary Variety and Masticatory Behaviors Measured Using Wearable Device Among Community-Dwelling Older Adults in Japan: A Multilevel Meal-by-Meal Analysis
by Kana Eguchi, Maki Shirobe, Masanori Iwasaki, Keiko Motokawa, Tatsunosuke Gomi, Lena Kalantar, Misato Hayakawa, Ayako Edahiro, Hiroyuki Sasai, Shuichi Awata and Hirohiko Hirano
Nutrients 2025, 17(4), 695; https://doi.org/10.3390/nu17040695 - 15 Feb 2025
Viewed by 1044
Abstract
Background: Consuming a variety of foods is believed to promote thorough chewing; however, it remains unclear whether individuals who consume various foods actually chew them thoroughly. Therefore, this study aimed to examine the association between dietary variety and masticatory behaviors, measured using wearable [...] Read more.
Background: Consuming a variety of foods is believed to promote thorough chewing; however, it remains unclear whether individuals who consume various foods actually chew them thoroughly. Therefore, this study aimed to examine the association between dietary variety and masticatory behaviors, measured using wearable devices, among community-dwelling older adults. Methods: Participants were from the Itabashi Longitudinal Study of Aging, meeting the eligibility criteria, including the ability to exchange messages via smartphone or computer. Masticatory behaviors (number of chews, chewing duration, and speed) and meal photo data were objectively measured using an ear-worn bite sensor and its application for two or three meals per day for at least three days at home. The “modified Dietary Variety Score (m-DVS)” (range 0–10, with higher values indicating greater dietary variety) was calculated by registered dietitians. Generalized linear mixed models assessed the association between m-DVS as the exposure variable and masticatory behaviors as the outcome variable. Covariates included sociodemographic status, health behavior, health status, oral health, and oral function. Results: Five hundred and eighty-seven mealtime data entries from 63 participants were included in the analysis. The m-DVS was significantly positively associated with the number of chews (cycles, unstandardized regression coefficient = 116.5, 95% confidence interval [CI] = 85.2 to 147.8) and chewing duration (min, unstandardized regression coefficient = 1.7, 95% CI = 1.3 to 2.2). Conclusions: Consuming more varied food groups was associated with more chews and longer chewing duration among community-dwelling older adults, potentially promoting thorough chewing. Full article
Show Figures

Figure 1

15 pages, 745 KiB  
Article
Enhancing Heterogeneous Communication for Foggy Highways Using Vehicular Platoons and SDN
by Hafiza Zunera Abdul Sattar, Huma Ghafoor and Insoo Koo
Sensors 2025, 25(3), 696; https://doi.org/10.3390/s25030696 - 24 Jan 2025
Viewed by 1360
Abstract
Establishing a safe and stable routing path for a source–destination pair is necessary regardless of the weather conditions. The reason for this is that vehicles can improve safety on the road by exchanging messages and updating each other on the current conditions of [...] Read more.
Establishing a safe and stable routing path for a source–destination pair is necessary regardless of the weather conditions. The reason for this is that vehicles can improve safety on the road by exchanging messages and updating each other on the current conditions of both roads and vehicles. This paper intends to solve the problem of when foggy roads make it difficult for drivers to travel, especially when people encounter emergency situations and have no other option but to drive in foggy weather. Although the literature offers few solutions to the problem, no one has considered integrating software-defined networking into vehicular networks for foggy roads to create an optimal routing path. Moreover, it is of significance to mention that vehicles in adverse weather conditions travel following each other and maintaining a constant safety distance, which leads to the formation of a platoon. Considering this, we propose a heterogeneous communication protocol in a software-defined vehicular network to establish an optimal routing path using platoons on foggy highways. Different cases were tested to show how platoons behave in high connectivity and sparsity, achieving a maximum delivery ratio of 99%, a delay of 2 ms, an overhead of 55%, and an acceptable number of hops compared to reference schemes. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

24 pages, 1492 KiB  
Article
On Adaptation of Resources in New Radio Vehicle-to-Everything Mode 1 Dynamic Resource Allocation
by Saif Sabeeh and Krzysztof Wesołowski
Electronics 2025, 14(1), 77; https://doi.org/10.3390/electronics14010077 - 27 Dec 2024
Viewed by 825
Abstract
Vehicle-to-Everything (V2X) communication is one of the essential technologies in 5G systems and will certainly play an important role in incoming 6G communications. Two modes of 5G New Radio V2X communication (NR-V2X) have been defined to standardize the direct exchange of messages between [...] Read more.
Vehicle-to-Everything (V2X) communication is one of the essential technologies in 5G systems and will certainly play an important role in incoming 6G communications. Two modes of 5G New Radio V2X communication (NR-V2X) have been defined to standardize the direct exchange of messages between vehicles. This paper concentrates on Mode 1, in which message exchange takes place with the support of the cellular infrastructure. In this mode, each vehicle uses a fixed number of subchannels with pre-configured subchannel sizes to transmit packet messages. However, if the packet sizes vary in each transmission, some resource blocks (RBs) assigned to V2X links are wasted. This paper presents the results of investigations on more efficient use of resource blocks, intending to minimize their waste and limit the delay in resource selection. In this paper, two new algorithms for radio resource block assignment are proposed and analyzed. The algorithms are characterized by a lower waste of RBs and a shorter delay in resource assignment compared to current solutions. The first algorithm uses adjacent RBs, whereas the second one can assign non-adjacent RBs, resulting in an even lower waste of radio resources and a shorter delay in their assignment. The simulation results presented confirm the quality of the proposed algorithms. Full article
(This article belongs to the Special Issue 5G Mobile Telecommunication Systems and Recent Advances)
Show Figures

Figure 1

25 pages, 1778 KiB  
Article
Efficient User Pairing and Resource Optimization for NOMA-OMA Switching Enabled Dynamic Urban Vehicular Networks
by Aravindh Balaraman, Shigeo Shioda, Yonggang Kim, Yohan Kim and Taewoon Kim
Electronics 2024, 13(23), 4834; https://doi.org/10.3390/electronics13234834 - 7 Dec 2024
Cited by 1 | Viewed by 1248
Abstract
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is [...] Read more.
Vehicular communication is revolutionizing transportation by enhancing passenger experience and improving safety through seamless message exchanges with nearby vehicles and roadside units (RSUs). To accommodate the growing number of vehicles in dense urban traffic with limited channel availability, non-orthogonal multiple access (NOMA) is a promising solution due to its ability to improve spectral efficiency by sharing channels among multiple users. However, to completely leverage NOMA on mobile vehicular networks, a chain of operations and resources must be optimized, including vehicle user (VU) and RSU association, channel assignment, and optimal power control. In contrast, traditional orthogonal multiple access (OMA) allocates separate channels to users, simplifying management but falling short in high-density environments. Additionally, enabling NOMA-OMA switching can further enhance the system performance while significantly increasing the complexity of the optimization task. In this study, we propose an optimized framework to jointly utilize the power domain NOMA in a vehicular network, where dynamic NOMA-OMA switching is enabled, by integrating the optimization of vehicle-to-RSU association, channel assignment, NOMA-OMA switching, and transmit power allocation into a single solution. To handle the complexity of these operations, we also propose simplified formulations that make the solution practical for real-time applications. The proposed framework reduces total power consumption by up to 27% compared to Util&LB/opt, improves fairness in user association by 18%, and operates efficiently with minimal computational overhead. These findings highlight the potential of the proposed framework to enhance communication performance in dynamic, densely populated urban environments. Full article
(This article belongs to the Special Issue Wireless Sensor Network: Latest Advances and Prospects)
Show Figures

Figure 1

23 pages, 500 KiB  
Article
Threading Statistical Disclosure Attack with EM: An Algorithm for Revealing Identity in Anonymous Communication Networks
by Alejandra Guadalupe Silva-Trujillo, Luis Yozil Zamarrón Briceño, Juan Carlos Cuevas-Tello, Pedro David Arjona-Villicaña and Luis Javier García Villalba
Appl. Sci. 2024, 14(23), 11237; https://doi.org/10.3390/app142311237 - 2 Dec 2024
Viewed by 1049
Abstract
Messages sent across multiple platforms can be correlated to infer users’ attitudes, behaviors, preferences, lifestyles, and more. Therefore, research on anonymous communication systems has intensified in the last few years. This research introduces a new algorithm, Threading Statistical Disclosure Attack with EM (TSDA-EM), [...] Read more.
Messages sent across multiple platforms can be correlated to infer users’ attitudes, behaviors, preferences, lifestyles, and more. Therefore, research on anonymous communication systems has intensified in the last few years. This research introduces a new algorithm, Threading Statistical Disclosure Attack with EM (TSDA-EM), that employs real-world data to reveal communication’s behavior in an anonymous social network. In this study, we utilize a network constructed from email exchanges to represent interactions between individuals within an institution. The proposed algorithm is capable of identifying communication patterns within a mixed network, even under the observation of a global passive attacker. By employing multi-threading, this implementation reduced the average execution time by a factor of five when using a dataset with a large number of participants. Additionally, it has markedly improved classification accuracy, detecting more than 79% of users’ communications in large networks and more than 95% in small ones. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

22 pages, 6644 KiB  
Article
BSSN-SDNs: A Blockchain-Based Security Service Negotiation for the SDN Interdomain
by Yingying Ma, Chaowen Chang, Ping Wu, Jingxu Xiao and Lu Yuan
Electronics 2024, 13(16), 3120; https://doi.org/10.3390/electronics13163120 - 7 Aug 2024
Viewed by 1254
Abstract
The security requirements for SDN (Software-Defined Network) cross-domain communication are diverse and dynamically changing; thus, a security service negotiation function is required for the SDN interdomain. However, the SDN interdomain distributed communication environment leads to a lack of trustworthiness and security. Therefore, this [...] Read more.
The security requirements for SDN (Software-Defined Network) cross-domain communication are diverse and dynamically changing; thus, a security service negotiation function is required for the SDN interdomain. However, the SDN interdomain distributed communication environment leads to a lack of trustworthiness and security. Therefore, this paper proposes a blockchain-based SDN interdomain security service negotiation mechanism, BSSN-SDNs, to provide automatic, secure, and trustworthy SDN interdomain security service negotiation. BSSN-SDNs proposes a three-layer reference architecture that enables joint on-chain and off-chain work by extending the security service negotiation module and blockchain client on the controller and deploying security service negotiation smart contracts on the blockchain. It especially adopts non-interactive key exchange and the message authentication code to ensure the confidentiality of the secure service negotiated on-chain. Finally, the timeliness as well as security and trustworthiness of BSSN-SDNs are analyzed, and the FISCO BCOS-based experiment results show that the delay of BSSN-SDNs is acceptable and is positively correlated with the number of policies and the number of SDN domains involved in negotiation. Full article
Show Figures

Figure 1

16 pages, 366 KiB  
Article
Smartphone Use and Social Media Involvement in Young Adults: Association with Nomophobia, Depression Anxiety Stress Scales (DASS) and Self-Esteem
by Elissavet Vagka, Charalambos Gnardellis, Areti Lagiou and Venetia Notara
Int. J. Environ. Res. Public Health 2024, 21(7), 920; https://doi.org/10.3390/ijerph21070920 - 15 Jul 2024
Cited by 6 | Viewed by 9282
Abstract
Excessive smartphone use and dependence on social media give rise to multiple issues that negatively affect the overall well-being of individuals. Nomophobia is characterized as a “digital disease” due to the unlimited use of smartphone devices. The aim of this study is to [...] Read more.
Excessive smartphone use and dependence on social media give rise to multiple issues that negatively affect the overall well-being of individuals. Nomophobia is characterized as a “digital disease” due to the unlimited use of smartphone devices. The aim of this study is to examine smartphone use and social media involvement in association with nomophobia and psychological traits (i.e., depression, anxiety, stress, and self-esteem) of young adults. A cross-sectional investigation was conducted on 1408 Greek undergraduate students aged 18 to 25 years, using an anonymous self-reported questionnaire. Study data were collected through the Nomophobia Questionnaire (NMP-Q), Depression Anxiety Stress Scale (DASS-21), and Rosenberg Self-Esteem Scale (RSES). Participants’ social media engagement was summarized through four variables: use of social media applications, number of friends, number of followers, and number of messages exchanged daily on social media. High levels of nomophobia were associated with high engagement in social media and, thereby, with a high number of friends. The same applies to participants with high/normal self-esteem compared to those with low. Regarding stress, anxiety and depression were not associated with digital network use, while elevated stress and anxiety seemed to play a negative role in the number of online followers. In addition, high levels of anxiety were correlated to an increased number of messages exchanged through social media applications. Full article
24 pages, 16679 KiB  
Article
Achieving Accountability and Data Integrity in Message Queuing Telemetry Transport Using Blockchain and Interplanetary File System
by Sara Lazzaro and Francesco Buccafurri
Future Internet 2024, 16(7), 246; https://doi.org/10.3390/fi16070246 - 13 Jul 2024
Cited by 2 | Viewed by 1167
Abstract
Ensuring accountability and integrity in MQTT communications is important for enabling several IoT applications. This paper presents a novel approach that combines blockchain technology and the interplanetary file system (IPFS) to achieve non-repudiation and data integrity in the MQTT protocol. Our solution operates [...] Read more.
Ensuring accountability and integrity in MQTT communications is important for enabling several IoT applications. This paper presents a novel approach that combines blockchain technology and the interplanetary file system (IPFS) to achieve non-repudiation and data integrity in the MQTT protocol. Our solution operates in discrete temporal rounds, during which the broker constructs a Merkle hash tree (MHT) from the messages received. Then the broker publishes the root on the blockchain and the MHT itself on IPFS. This mechanism guarantees that both publishers and subscribers can verify the integrity of the message exchanged. Furthermore, the interactions with the blockchain made by the publishers and the broker ensure they cannot deny having sent the exchanged messages. We provide a detailed security analysis, showing that under standard assumptions, the proposed solution achieves both data integrity and accountability. Additionally, we provided an experimental campaign to study the scalability and the throughput of the system. Our results show that our solution scales well with the number of clients. Furthermore, from our results, it emerges that the throughput reduction depends on the integrity check operations. However, since the frequency of these checks can be freely chosen, we can set it so that the throughput reduction is negligible. Finally, we provided a detailed analysis of the costs of our solution showing that, overall, the execution costs are relatively low, especially given the critical security and accountability benefits it guarantees. Furthermore, our analysis shows that the higher the number of subscribers in the system, the lower the costs per client in our solution. Again, this confirms that our solution does not present any scalability issues. Full article
Show Figures

Figure 1

29 pages, 7345 KiB  
Article
Practical Steps towards Establishing an Underwater Acoustic Network in the Context of the Marine Internet of Things
by Konstantin Kebkal, Aleksey Kabanov, Oleg Kramar, Maksim Dimin, Timur Abkerimov, Vadim Kramar and Veronika Kebkal-Akbari
Appl. Sci. 2024, 14(8), 3527; https://doi.org/10.3390/app14083527 - 22 Apr 2024
Viewed by 1433
Abstract
When several hydroacoustic modems operate simultaneously in an area of mutual coverage, collisions of data packets received from several sources may occur, which lead to information loss. With an increase in the number of simultaneously operating hydroacoustic modems, physical layer algorithms do not [...] Read more.
When several hydroacoustic modems operate simultaneously in an area of mutual coverage, collisions of data packets received from several sources may occur, which lead to information loss. With an increase in the number of simultaneously operating hydroacoustic modems, physical layer algorithms do not provide stable data transmission and the likelihood of collisions increases, which makes the operation of modems ineffective. To ensure effective operation in a hydroacoustic signal propagation environment and to reduce collisions when exchanging data between two modems that do not have the ability to operate synchronously and to reduce the access time to the signal propagation environment, methods of the medium access control layer using link layer protocols are required. Typically, this problem is solved using code separation of hydroacoustic channels. If you need to transfer over a network, this option will not work, since network transfer involves working on the basis of “broadcast” messages, particularly between data source and data sink that remain too far from each other, outside of their mutual audibility. In practical use, it is convenient to place these protocols into a software environment for developing specific user applications for solving network communication problems. This software framework allows for custom modification of existing network algorithms, as well as the inclusion of new network hydroacoustic communication algorithms. To build a predictive model, the DACAP, T-Lohi, Flooding, and ICRP protocols were used in this work. The implementation is performed in Erlang. The paper presents algorithms for implementing these protocols. A comparative analysis of network operation with and without protocols is provided. Efficiency of operation, i.e., data rates and probabilities of data delivery, was assessed. Full article
(This article belongs to the Special Issue Autonomous Underwater Vehicles (AUVs): Applications and Technologies)
Show Figures

Figure 1

24 pages, 6283 KiB  
Article
E-MQTT: End-to-End Synchronous and Asynchronous Communication Mechanisms in MQTT Protocol
by Yerin Im and Mingyu Lim
Appl. Sci. 2023, 13(22), 12419; https://doi.org/10.3390/app132212419 - 16 Nov 2023
Cited by 4 | Viewed by 3216
Abstract
Message Queuing Telemetry Transport (MQTT) enables asynchronous confirmation of message reception by brokers but lacks a way for publishers to know when subscribers receive their messages without adding additional communication overhead. This paper addresses this problem by improving MQTT to establish end-to-end communication [...] Read more.
Message Queuing Telemetry Transport (MQTT) enables asynchronous confirmation of message reception by brokers but lacks a way for publishers to know when subscribers receive their messages without adding additional communication overhead. This paper addresses this problem by improving MQTT to establish end-to-end communication between a publisher and subscribers, reducing message exchanges, using what is called End-to-End MQTT (E-MQTT). In E-MQTT, a publisher sets the number of responses that it will wait for when it sends a message. After the broker collects the response messages from subscribers, it sends one aggregated response back to the publisher. The publisher also can receive the response message synchronously or asynchronously. Experimental results consistently show that E-MQTT outperforms traditional MQTT in terms of delay, especially when the publisher needs to monitor when its query message is received by subscribers. Although E-MQTT packets are slightly larger due to additional fields, the difference in packet size compared to MQTT is not significant. Full article
(This article belongs to the Special Issue IoT in Smart Cities and Homes)
Show Figures

Figure 1

10 pages, 264 KiB  
Article
A Note on the LogRank Conjecture in Communication Complexity
by Vince Grolmusz
Mathematics 2023, 11(22), 4651; https://doi.org/10.3390/math11224651 - 15 Nov 2023
Viewed by 1255
Abstract
The LogRank conjecture of Lovász and Saks (1988) is the most famous open problem in communication complexity theory. The statement is as follows: suppose that two players intend to compute a Boolean function f(x,y) when x is known [...] Read more.
The LogRank conjecture of Lovász and Saks (1988) is the most famous open problem in communication complexity theory. The statement is as follows: suppose that two players intend to compute a Boolean function f(x,y) when x is known for the first and y for the second player, and they may send and receive messages encoded with bits, then they can compute f(x,y) with exchanging (log rank(Mf))c bits, where Mf is a Boolean matrix, determined by function f. The problem is widely open and very popular, and it has resisted numerous attacks in the last 35 years. The best upper bound is still exponential in the bound of the conjecture. Unfortunately, we cannot prove the conjecture, but we present a communication protocol with (log rank(Mf))c bits, which computes a (somewhat) related quantity to f(x,y). The relation is characterized by the representation of low-degree, multi-linear polynomials modulo composite numbers. Our result may help to settle this long-open conjecture. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Back to TopTop