Skip to main content
Log in

RETRACTED ARTICLE: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

This article was retracted on 07 October 2022

A Correction to this article was published on 15 July 2019

This article has been updated

Abstract

Security threats, security requirements, and adopted security policies in the new mobile environment have changed. As a key issue in the development of mobile communication, the mobile communication network security authentication mechanism has attracted the attention of academic circles and industry, and research on its security has become a research hotspot. Firstly, aiming at the security threats and security requirements in the heterogeneous mobile communication network environment, the architecture of the security authentication mechanism in this mobile environment is proposed. The security architecture consists of three layers (transport layer, service layer, application layer) and four domains (user domain, access domain, network domain, and application domain), and defined security features. The security architecture includes functional entities such as public key infrastructure and application servers and defines new security features for security threats in the application domain and user domain, so that the security architecture can meet the heterogeneous mobile communication network environment. Security needs. Secondly, a linear combination kernel function is used to construct a new class of kernel functions with different characteristics in a linear combination and satisfy the Mercer theorem. The combined kernel function has both global kernel function and local kernel. The advantages function and their weight on the combined kernel function can be adjusted by the weight coefficient factor, and a better comprehensive prediction effect is obtained in the support vector machine model. Finally, the experimental results also show that the support vector regression machine model based on combined kernel function can achieve higher learning precision.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

Change history

References

  1. Juang K, Greenstein J (2018) Integrating visual mnemonics and input feedback with passphrases to improve the usability and security of digital authentication. Hum Factors 60(5):658

    Article  Google Scholar 

  2. Rostami M, Koushanfar F, Karri R (2015) A primer on hardware security: models, methods, and metrics. Proc IEEE 102(8):1283–1295

    Article  Google Scholar 

  3. Fan X, Yang L (2015) Room-temperature nickel-catalysed Suzuki–Miyaura reactions of aryl sulfonates/halides with arylboronic acids. Eur J Org Chem 2011(8):1467–1471

    Article  Google Scholar 

  4. Mengreiterer J, Varga E, Nathanail AV et al (2015) Tracing the metabolism of HT-2 toxin and T-2 toxin in barley by isotope-assisted untargeted screening and quantitative LC-HRMS analysis. Anal Bioanal Chem 407(26):8019–8033

    Article  Google Scholar 

  5. Wen W, Liu H, Zhou Y et al (2016) Combining quantitative genetics approaches with regulatory network analysis to dissect the complex metabolism of the maize kernel. Plant Physiol 170(1):136–146

    Article  Google Scholar 

  6. Morin AJS, Meyer JP, Mcinerney DM et al (2015) Profiles of dual commitment to the occupation and organization: relations to well-being and turnover intentions. Asia Pac J Manag 32(3):717–744

    Article  Google Scholar 

  7. Yttri KE, Schnellekreiss J, Maenhaut W et al (2015) An intercomparison study of analytical methods used for quantification of levoglucosan in ambient aerosol filter samples. Atmos Meas Tech Discuss 7(7):125–147

    Article  Google Scholar 

  8. Hastie T, Mazumder R, Zadeh R et al (2015) Matrix completion and low-rank SVD via fast alternating least squares. J Mach Learn Res 16(1):3367–3402

    MathSciNet  MATH  Google Scholar 

  9. Cecile B, David CJ, Matteo M et al (2015) Clustering attributed graphs: models, measures and methods. Netw Sci 3(3):408–444

    Article  Google Scholar 

  10. Tadesse T, Gillies RM (2015) Nurturing cooperative learning pedagogies in higher education classrooms: evidence of instructional reform and potential challenges. Curr Issues Edu 18(2):1–18

    Google Scholar 

  11. Garciareid P, Peterson CH, Reid RJ (2015) Parent and teacher support among latino immigrant youth: effects on school engagement and school trouble avoidance. Educ Urb Soc 47(3):328–343

    Article  Google Scholar 

  12. Raza S, Mokhlis H, Arof H et al (2015) Application of signal processing techniques for islanding detection of distributed generation in distribution network: a review. Energy Convers Manag 96(88):613–624

    Article  Google Scholar 

  13. Beardsley RL, Jang M (2015) Simulating the SOA formation of isoprene from partitioning and aerosol phase reactions in the presence of inorganics. Atmos Chem Phys 15(22):33121–33159

    Google Scholar 

  14. Pantic M, Zwitserloot R, Grootjans RJ (2017) Teaching introductory artificial intelligence using a simple agent framework. IEEE Trans Educ 48(3):382–390

    Article  Google Scholar 

  15. Ferretti M, Santangelo L, Musci M (2019) Optimized cloud-based scheduling for protein secondary structure analysis. J Supercomput. https://doi.org/10.1007/s11227-019-02859-w

    Article  Google Scholar 

  16. Uribe E, Pasten A, Lemus-Mondaca R et al (2015) Comparison of chemical composition, bioactive compounds and antioxidant activity of three olive-waste cakes. J Food Biochem 39(2):189–198

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhongru Wang.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Disclaimer: This work is supported by Major Scientific Research Project of Zhejiang Lab (No. 2019DH0ZX01). Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

The original version of this article was revised: The spelling of Binxing Fang’s given name was incorrect.

This article has been retracted. Please see the retraction notice for more detail:https://doi.org/10.1007/s11227-022-04862-0

Rights and permissions

Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wang, Z., Fang, B. RETRACTED ARTICLE: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J Supercomput 75, 5946–5964 (2019). https://doi.org/10.1007/s11227-019-02896-5

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-019-02896-5

Keywords

Navigation