skip to main content
research-article

Trust Mechanism of Feedback Trust Weight in Multimedia Network

Published: 12 November 2021 Publication History

Abstract

It is necessary to solve the inaccurate data arising from data reliability ignored by most data fusion algorithms drawing upon collaborative filtering and fuzzy network theory. Therefore, a model is constructed based on the collaborative filtering algorithm and fuzzy network theory to calculate the node trust value as the weight of weighted data fusion. First, a FTWDF (Feedback Trust Weighted for Data Fusion) is proposed. Second, EEFA (Efficiency unequal Fuzzy clustering Algorithm) is introduced into FTWDF considering the defects of the clustering structure caused by ignoring the randomness of node energy consumption and cluster head selection in the practical application of the existing data fusion algorithm. Besides, the fuzzy logic is applied to cluster head selection and node clustering. Finally, an FTWDF-EEFA clustering algorithm is constructed for generating candidate cluster head nodes, which is verified by simulation experiments. The comparative analysis reveals that the accuracy of the FTWDF-EEFA clustering algorithm is 4.1% higher than that of the TMDF (Trust Multiple attributes Decision-making-based data Fusion) algorithm, and 8.3% higher than that of LDTS (Larger Data fusion based on node Trust evaluation in wireless Sensor networks) algorithm. It performs better in accuracy and recommendation results during the processing of ML100M dataset and NF5M dataset. Besides, the new clustering algorithm increases the survival time of nodes when analyzing the number of death nodes to prolong networks’ lifespan. It improves the survival period of nodes, balances the network load, and prolongs networks’ lifespan. Furthermore, the FTWDF-EEFA clustering algorithm can balance nodes’ energy consumption and effectively save nodes’ overall energy through analysis. Therefore, the optimized algorithm can increase the lifespan of network and improve the trust mechanism effectively. The performance of the algorithm has reached the expected effect, providing a reference for the practical application of the trust mechanism in networks.

References

[1]
Xiaohuan Liu. 2021. A path planning method based on the particle swarm optimization trained fuzzy neural network algorithm [J]. Cluster Computing 24, 1 (2021), 1–15. DOI:
[2]
Bojanova. 2016. IEEE transactions on cloud computing: Entering its fourth year with confidence [J]. IEEE Computer Architecture Letters 4, 01 (2016), 1–2. DOI:https://doi.org/10.1109/TCC.2016.2521459
[3]
J. X. Wang and Hong-rui Fan. 2020. New method of traffic flow forecasting based on quantum particle swarm optimization strategy for intelligent transportation system[J]. International Journal of Communication Systems 33, 10 (2020), 1–13. DOI:
[4]
D. Zhang, Y. Zhu, C. Zhao, et al. 2012. A new constructing approach for a weighted topology of wireless sensor networks based on local-world theory for the Internet of Things (IoT) [J]. Computers & Mathematics with Applications 64, 5 (2012), 1044–1055. DOI:0.1016/j.camwa.2012.03.023
[5]
S. Liu, D. Zhang, X. Liu, et al. 2020. Adaptive repair algorithm for TORA routing protocol based on flood control strategy [J]. Computer Communications 151, 1 (2020), 437–448. DOI:
[6]
D. Zhang, S. Liu, T. Zhang, et al. 2017. Novel unequal clustering routing protocol considering energy balancing based on network partition & distance for mobile education[J]. Journal of Network and Computer Applications 88, 15 (2017), 1–9. DOI:https://doi.org/10.1016/j.jnca.2017.03.025
[7]
D. Zhang, T. Zhang, and X. Liu. 2019. Novel self-adaptive routing service algorithm for application in VANET [J]. Applied Intelligence 49, 5 (2019), 1866–1879. DOI:https://doi.org/10.1007/s10489-018-1368-y
[8]
Xiaohuan Liu. 2021. Novel best path selection approach based on hybrid improved A* algorithm and reinforcement learning [J]. Applied Intelligence 51, 9 (2021), 1–15. DOI:
[9]
J. Yang, M. Ding, G. Mao, et al. 2019. Optimal base station antenna downtilt in downlink cellular networks [J]. IEEE Transactions on Wireless Communications 18, 3 (2019), 1779–1791. DOI:https://doi.org/10.1109/TWC.2019.2897296
[10]
S. Pouyanfar, Y. Yang, S. C. Chen, et al. 2018. Multimedia big data analytics: A survey [J]. ACM Computing Surveys (CSUR) 51, 1 (2018), 1–34. DOI:https://doi.org/10.1145/3150226
[11]
P. Y. Zhang, Y. Kong, and M. C. Zhou. 2018. A domain partition-based trust model for unreliable clouds [J]. IEEE Transactions on Information Forensics and Security 13, 9 (2018), 2167–2178. DOI:
[12]
J. Hepworth, D. P. Baxter, A. Hussein, et al. 2020. Human-swarm-teaming transparency and trust architecture [J]. IEEE/CAA Journal of Automatica Sinica (2020), 1–15. DOI:
[13]
M. Navia, J. Campelo, A. Bonastre, et al. 2018. GTSO: Global trace synchronization and ordering mechanism for wireless sensor network monitoring platforms [J]. Sensors 18, 1 (2018) 28. DOI:
[14]
Y. Cui, D. Zhang, T. Zhang, et al. 2020. Novel method of mobile edge computation offloading based on evolutionary game strategy for IoT devices [J]. AEU-International Journal of Electronics and Communications 118, 5 (2020), 1–13. DOI:
[15]
D. Zhang, T. Zhang, Y. Dong, et al. 2018. Novel optimized link state routing protocol based on quantum genetic strategy for mobile learning [J]. Journal of Network and Computer Applications 2018, 122: 37–49. DOI:
[16]
J. Chen, G. Mao, C. Li, et al. 2019. A topological approach to secure message dissemination in vehicular networks [J]. IEEE Transactions on Intelligent Transportation Systems 21, 1 (2019), 135–148. DOI:
[17]
Z. Ding, X. Chen, Y. Dong, et al. 2019. Consensus reaching in social network DeGroot model: The roles of the Self-confidence and node degree [J]. Information Sciences 486, (2019), 62–72. DOI:
[18]
S. Zhou. 2018. A low duty cycle efficient MAC protocol based on self-adaption and predictive strategy [J]. Mobile Networks & Applications 23, 4 (2018), 828–839. DOI:
[19]
D. G. Zhang, L. Chen, J. Zhang, et al. 2020. A multi-path routing protocol based on link lifetime and energy consumption prediction for mobile edge computing [J]. IEEE Access 8, 1 (2020), 69058–69071. DOI:
[20]
S. Liu, D. G. Zhang, X. Liu, et al. 2019. Dynamic analysis for the average shortest path length of mobile ad hoc networks under random failure scenarios [J]. IEEE Access 7, (2019) 21343–21358. DOI:
[21]
T. Zhang, D. Zhang, J. Qiu, et al. 2019. A kind of novel method of power allocation with limited cross-tier interference for CRN [J]. IEEE Access 7, 1 (2019), 82571–82583. DOI:
[22]
S. Abrazeh, A. Parvaresh, S. R. Mohseni, et al. 2021. Nonsingular terminal sliding mode control with ultra-local model and single input interval type-2 fuzzy logic control for pitch control of wind turbines [J]. IEEE/CAA Journal of Automatica Sinica 8, 3 (2021), 690–700. DOI:
[23]
D. Zhang, H. Wu, P. Zhao, et al. 2020. New approach of multi-path reliable transmission for marginal wireless sensor network [J]. Wireless Networks 26, 2 (2020), 1503–1517. DOI:
[24]
D. Zhang, M. Piao, T. Zhang, et al. 2020. New algorithm of multi-strategy channel allocation for edge computing [J]. AEU-International Journal of Electronics and Communications 126, 11 (2020), 1–15. DOI:
[25]
S. Talbi, M. Koudil, A. Bouabdallah, et al. 2017. Adaptive and dual data-communication trust scheme for clustered wireless sensor networks [J]. Telecommunication Systems 65, 4 (2017), 605–619. DOI:https://doi.org/10.1007/s11235-016-0254-3
[26]
H. L. NIU. 2017. Novel PEECR-based clustering routing approach [J]. Soft Computing 21, 24 (2017), 7313–7323. DOI:https://doi.org/10.1007/s00500-016-2270-3
[27]
V. B. Reddy, S. Venkataraman, and A. Negi. 2017. Communication and data trust for wireless sensor networks using D–S theory [J]. IEEE Sensors Journal 17, 12 (2017), 3921–3929. DOI:
[28]
T. Zhang, D. Zhang, H. Yan, et al. 2021. A new method of data missing estimation with FNN-based tensor heterogeneous ensemble learning for internet of vehicle [J]. Neurocomputing 420, 1 (2021), 98–110. DOI:.
[29]
Paul, B. W. Chen, K. Bharanitharan, and J. F. Wang. 2013. Video search and indexing with reinforcement agent for interactive multimedia services. ACM Transactions on Embedded Computing Systems (TECS). 12, 2 (2013), 1–6. DOI:https://doi.org/10.1145/2423636.2423643
[30]
T. Zhang and J. Zhang. 2018. A kind of effective data aggregating method based on compressive sensing for wireless sensor network [J]. EURASIP Journal on Wireless Communications and Networking 2018 (159):1–15. DOI:
[31]
C. Chen and Y. Y. Cui. 2018. New method of energy efficient subcarrier allocation based on evolutionary game theory [J]. Mobile Networks and Applications 2018, 9:1–15. DOI:
[32]
D. G. Zhang. 2012. A new approach and system for attentive mobile learning based on seamless migration [J]. Applied Intelligence 36, 1 (2012), 75–89.
[33]
D. Zhang, K. Zheng, T. Zhang, et al. 2015. A novel multicast routing method with minimum transmission for WSN of cloud computing service [J]. Soft Computing 19, 7 (2015), 1817–1827.
[34]
X. H. Liu, D. G. Zhang, H. R. Yan, et al. 2019. A new algorithm of the best path selection based on machine learning [J]. IEEE Access 7, 1 (2019), 126913–126928. DOI:
[35]
P. Zhang, M. C. Zhou, and Y. Kong. 2019. A double-blind anonymous evaluation-based trust model in cloud computing environments [J]. IEEE Transactions on Systems, Man, and Cybernetics: Systems 51, 3 (2019), 1805–1816. DOI:
[36]
S. Liu, X. Hu, S. H. Wang, et al. 2020. Mixing patterns in social trust networks: A social identity theory perspective [J]. IEEE Transactions on Computational Social Systems 2020, 1–13. DOI:https://doi.org/10.1109/TCSS.2020.3021179
[37]
P. Zhang and M. Zhou. 2020. Security and trust in blockchains: Architecture, key technologies, and open issues [J]. IEEE Transactions on Computational Social Systems 7, 3 (2020), 790–801. DOI:
[38]
D. G. Zhang, P. Z. Zhao, Y. Cui, et al. 2019. A new method of mobile ad hoc network routing based on greed forwarding improvement strategy [J]. IEEE Access 7, 1 (2019), 158514–158524. DOI:

Appendix

A RECENT RELATED WORK

A.1 The Development Trend of Trust Mechanism

Trust mechanism was originally used in social science, psychology, management, and other disciplines. In the current multimedia network era, the trust mechanism has attracted many scholars’ attention since it enters computer science and network. The successful application of eBay's trust model [1] in eBay system (TMBS) makes scholars strongly interested in applying a trust mechanism in the network. Therefore, there have been many studies on the computer network's security and trust mechanism.
Graves et al. [2016] proposed a machine learning model called the DNC (differentiable neural computer). When trained with supervised learning, they demonstrated that the DNC could successfully answer synthetic questions designed to emulate reasoning and inference problems in natural language [2]. Lakshmi et al. [2017] proposed an HTTP GET Flooding Detection and Confidence-Based filtering method for DDoS Attack Defense in Web application to solve the Distributed Denial of Service (DDoS) attack in Web-based and Client-Server applications. They also applied dynamic resource allocation to automatically coordinate the available resources (CPU, memory, I/O, and bandwidth) of the server to mitigate DDoS attacks on individual clients [3]. Yuan et al. [2018] proposed a reliable and lightweight trust mechanism for IoT edge devices based on multi-source feedback information fusion to increase IoT edge computing applications’ adoption rate. Finally, they found that the mechanism overcame traditional trust schemes’ limitations in the artificial or subjective weighting of trust factors [4]. Zhang et al. [2019] proposed using reputation value to represent the trust degree of nodes to collect valuable information. They put forward a reputation management system composed of reputation information collection and reputation value calculation, advocated a new trust collection mechanism to optimize trust information collection efficiency, and designed a subjective trust calculation model based on trust degree. Finally, they verified the effectiveness of the model by simulation [5].
Besides, the rising social media research is just unfolding and has paid little attention to the topic of how to win users’ trust and establish social media authority so far. Magoi et al. [2020] focused on implementing the trust mechanism of social media in the library. The results showed that social media authority was established based on user trust. Based on this observation, it was found that the successful implementation of social media in libraries was related to librarians’ proficiency in using social media and how they constructed their social media content through trust-building activities [6]. As the trust mechanism is widely applied, the traditional trust model fails to adapt to the increasingly complex application environment. Abundant trust mechanisms based on P2P networks have a single evaluation basis, which cannot meet the needs of emerging applications such as e-commerce and social networks. Therefore, it is necessary to consider application scenarios and context. In this way, a context-based trust mechanism has become a research hotspot, and an FTWDF is proposed. The algorithm evaluates nodes’ status by a feedback mechanism of data trust and communication trust within clusters and evaluates cluster heads’ status by a feedback mechanism of communication trust between clusters. This algorithm ensures the data reliability of the node and improves the accuracy of data fusion.

A.2 Wireless Sensor in the Trust Mechanism

In a multimedia network, wireless sensor nodes can collect and process data information through wireless technology to provide helpful information to users. However, in practical applications, WSN often receives interference from the external environment, which makes sensor nodes untrusted. Therefore, it is essential to build a trust mechanism in networks to prevent it from attack from unknown networks.
Prabhu et al. [2017] discussed the available scenarios of using sensor nodes in military applications and analyzed the nodes of trust mechanism based on the basic standards that must be considered in applying and deploying wireless sensors. Finally, according to the distance between the sensor node and the target, they located the intruder from latitude and vertical coordinates [7]. Jiang et al. [2017] studied the trust mechanism of UWSNs (underwater wireless sensor networks), proposed a trust cloud model suitable for trust management of UWSNs, and verified its effectiveness [8]. Yi et al. [2018] studied the coverage vulnerability in WSNs. Additionally, to offset the negative impact of coverage vulnerability, they studied the credible information coverage (CIC) vulnerability detection, namely CICHD, based on the CIC model. Finally, they found that the constructed algorithm could effectively detect the location and number of coverage holes [9]. Guo et al. [2019] used the perception transfer theory and the viewpoint of privacy calculus to explore the internal mechanism of users’ behavior response to help seeking activities. Experiments showed that privacy protection and intimacy affected the recipients’ privacy concerns and social rewards, affecting their participation behavior [10]. Mohiuddin et al. [2020] proposed a fuzzy-based trust management mechanism (FTM-IoMT) to provide trust management for electronic health systems users using IoMT infrastructure. Finally, it is found that the mechanism is helpful for IoMT nodes to collect authentic information from neighboring nodes while ignoring Sybil nodes, showing superior results [11].
The analysis of the above findings suggests that in WSNs, the data collected between neighbor nodes will produce redundant data. Therefore, data fusion technology is used to reduce redundant data to improve the accuracy of data fusion results and reduce the energy consumption in WSNs. However, these functions of data fusion technology are achieved based on increasing the performance consumption. First, it increases the average delay of the network. In the process of data transmission, priority will be given to the routing path with data fusion, or data fusion will be carried out directly in the network or after all nodes have transmitted data in a certain period. Second, it reduces the robustness of the network. Data fusion technology reduces the total amount of data transmission and loses a lot of data information, which increases the invalid data and data loss of network nodes. In environmental monitoring, due to the complexity of the deployment environment and the lack of secure communication mode, there are untrusted nodes in sensor networks; that is, the nodes are not reliable. The wrong behavior of unreliable nodes may reduce the accuracy and reliability of the data collected by the nodes, which directly affects the user's demand analysis and decision-making. Therefore, it is vital to identify the reliability of member nodes in the network.

A.3 Recommendation Algorithm in Trust Mechanism

The application of recommendation algorithm is as critical as the study of the trust mechanism in multimedia networks. At present, the recommendation algorithm in the multimedia network can be divided into two steps. Step 1: Learning. Establish a heuristic model based on the historical behavior data of users. Step 2: Applying. Recommend according to the heuristic model to predict the user's behavior preferences.
Chiregi et al. [2017] discussed the trust evaluation mechanism in cloud computing and divided it into two categories, including centralized and distributed. Meanwhile, they defined the integrity, security, availability, reliability, security, dynamic, confidentiality, and scalability of trust, and discussed the trust application and recommendation algorithm, including monitoring and tracking [12]. Wang et al. [2018] proposed a credible aware model (ACOSR) based ant colony optimization algorithm for secure routing in WSNs to resist malicious nodes’ internal attacks. Simulation results indicated that the algorithm's performance was significantly improved in packet loss rate, end-to-end delay, throughput, and energy consumption [13]. Liu et al. [2019] applied a trust mechanism to the “Internet+” production and research innovation, recommended an algorithm for recommending network education mode, and analyzed its potential security problems. They found that there were still many challenges in privacy protection [14].
There are many malicious and counterfeit web pages in the multimedia network; hence, it is necessary to retrieve trusted web pages. Personalization of web page recommendations is necessary to evaluate users’ interest in recommending web pages according to their own choices. Deepak et al. [2020] proposed a hybrid strategy-based personalized Web recommendation framework. According to the user's query results, web pages were recommended by analyzing the user's Web usage data. A series of strategies were intelligently integrated to achieve an efficient web page recommendation system [15]. With scholars’ vigorous research in related fields, the collaborative filtering algorithm has become one of the most accurate and practical methods in all recommendation technologies. Many scholars are studying this technology and applying it in industrial application systems. The recommendation algorithm assumes that users will still like the items they liked before to make a personalized recommendation for them through historical information such as past purchases. Usually, this method first analyzes the interaction between users and items that have been collected and then uses these interactions to generate items recommendation for users. The recommendation model based on normalized matrix factorization is improved in the accuracy and scalability of recommendation. However, for the massive amount of data in reality, the model's characteristics based on serial training seriously affect the parallelization of iteration and further affect the real-time performance of recommendation. Therefore, it is necessary and significant to realize the parallelization of recommendation algorithm models, especially with the continuous improvement of computer hardware performance, the widespread popularity of computer clusters, and the increasingly perfect parallelization platform and technology.

A.4 Fuzzy Logic Theory in Trust Mechanism

Fuzzy logic usually refers to the fact that things can express fuzzy uncertain states except absolute “true” and “false” in logic language, such as “unknown state” or “fuzzy uncertainty.” Many researchers have studied and applied fuzzy logic in the development of the trust mechanism of multimedia networks.
Asha et al. [2017] proposed a routing algorithm based on fuzzy clustering to solve the security and energy consumption problems in WSNs. They finally found that the model could quickly detect and obtain node trust, to improve the security of data routing [16]. The message security transmission strategy in the opportunity network (OppNets) is a complex and unique problem, entirely different from the traditional network using TCP/IP protocol [17]. Chhabra et al. [2018] proposed a security protocol FuzzyPT (potential thread), for blackhole attacks in OppNets, and applied the evolutionary game theory model to analyze the relay's decision-making ability to choose different strategies when forwarding messages. Finally, they found that the proposed protocol was superior to the existing security protocols based on cognitive and evolutionary game theory [18]. The social network based on a multi-agent model can store its environment's information and share it with other system agents. It is of great significance to implement a secure communication setting and select the appropriate receiver according to the information requested. Combining social relations, Hussain et al. [2019] proposed a trust-based fuzzy reasoning model in the multi-agent system. They analyzed the influence, credibility, and risk of cognitive agents. The model was implemented by Dempster-Shafer theory (DST), and the results were compared [19]. Sumalatha et al. [2020] proposed a cross-layer security-based fuzzy trust computing mechanism (CLS-FTCM). Compared with previous technologies, CLS-FTCM was an efficient wireless sensor environment security technology with high detection accuracy [20].
The above scholars’ research reveals that, although there are many studies on trust mechanism in related fields, there is no unified advantage in applying various algorithms. Most of them use one algorithm and have no prominent advantage. Therefore, recommendation algorithms, fuzzy logic theory, and wireless sensor nodes are collaboratively used in the trust mechanism of multimedia networks to solve security loopholes, malicious nodes, and energy consumption in multimedia networks. Based on the FTWDF algorithm, the fuzzy logic method is used to explore the “hot zone” problem and energy balance problem, combined with a new non-uniform clustering algorithm EEFA. In this algorithm, fuzzy logic is applied to cluster head selection and node clustering. First, node degree and residual energy are considered to generate candidate cluster head nodes. Then, considering the residual energy, node degree, and the distance from the node to the base station, the fuzzy logic algorithm is used to estimate the probability of each candidate cluster head being selected as the cluster head and the maximum node capability of the cluster head node. The node with the more significant probability value is regarded as the final cluster head and then cluster according to the maximum node capability of the cluster head. In the node clustering stage, ordinary nodes join the nearest cluster head until all nodes are clustered. In conclusion, the FTWDF-EEFA clustering algorithm provides a reference for improving the security of the multimedia network.

Appendixreferences

[1]
J. Granatyr, H. M. Gomes, J. M. Dias, A. M. Paiva, M. A. S. N. Nunes, E. E. Scalabrin, and F. Spak. 2019. Inferring trust using personality aspects extracted from texts. In 2019 IEEE International Conference on Systems, Man and Cybernetics (SMC) 3840–3846. IEEE.
[2]
A. Graves, G. Wayne, M. Reynolds, et al. 2016. Hybrid computing using a neural network with dynamic external memory[J]. Nature 2016, 538 (7626), 471. DOI:
[3]
V. N. Lakshmi and S. Begum. 2017. DDos Defense: Enhanced flooding detection and confidence-based filtering method[J]. Advances in Computational Sciences and Technology 10, 8 (2017), 2257–2272.
[4]
J. Yuan and X. Li. 2018. A reliable and lightweight trust computing mechanism for IoT edge devices based on multi-source feedback information fusion[J]. IEEE Access 2018, 6. 23626–23638. DOI:
[5]
S. S. Zhang, S. W. Wang, H. Xia, and X. G. Cheng. 2019. An attack-resistant reputation management system for mobile ad hoc networks[J]. Procedia Computer Science 2019, 147. 473–479. DOI:
[6]
J. S. Magoi, A. Abrizah, and M. K. Y. I. Aspura. 2020. Shaping library's social media authority through trust-creating activities: A case of selected academic libraries in Nigeria[J]. Malaysian Journal of Library & Information Science 25, 1 (2020), 83. DOI:
[7]
B. Prabhu, M. Pradeep, and E. Gajendran. 2017. Monitoring climatic conditions using wireless sensor networks[J]. Monitoring Climatic Conditions Using Wireless Sensor Networks (January 25, 2017). A Multidisciplinary Journal of Scientific Research & Education 3, 1 (2017) 27.
[8]
J. Jiang, G. Han, C. Zhu, et al. 2017. A trust cloud model for underwater wireless sensor networks[J]. IEEE Communications Magazine 55, 3 (2017), 110–116. DOI:
[9]
L. Yi, X. Deng, Z. Zou, et al. 2018. Confident information coverage hole detection in sensor networks for uranium tailing monitoring[J]. Journal of Parallel and Distributed Computing 2018, 118: 57–66. DOI:
[10]
J. Guo, N. Li, Y. Wu et al. 2020. Examining help requests on social networking sites: Integrating privacy perception and privacy calculus perspectives[J]. Electronic Commerce Research and Applications 2020, 39, 100828.DOI:
[11]
I. Mohiuddin, A. Almogren, I. U. Din, et al. 2020. FTM-IoMT: Fuzzy-based trust management for preventing Sybil attacks in Internet of Medical Things[J]. IEEE Internet of Things Journal 2020, 4485–4497. DOI:
[12]
M. Chiregi and N. J. Navimipour. 2017. A comprehensive study of the trust evaluation mechanisms in the cloud computing[J]. Journal of Service Science Research 9, 1 (2017), 1–30. DOI:
[13]
Y. Wang, M. Zhang, and W. Shu. 2018. An emerging intelligent optimization algorithm based on trust sensing model for wireless sensor networks[J]. EURASIP Journal on Wireless Communications and Networking (2018) 1, 1–10. DOI:
[14]
Q. Liu and X. Zou. 2019. Research on trust mechanism of cooperation innovation with big data processing based on blockchain[J]. EURASIP Journal on Wireless Communications and Networking (2019) 1, 1–11. DOI:
[15]
G. Deepak, B. N. Shwetha, C. N. Pushpa, et al. 2020. A hybridized semantic trust-based framework for personalized web page recommendation[J]. International Journal of Computers and Applications 42, 8 (2020), 729–739. DOI:
[16]
A. Asha and C. Arun. 2017. Active trust and fuzzy logic-based energy aware routing algorithm for wireless sensor networks[J]. Journal of Computational and Theoretical Nanoscience 14, 11 (2017), 5427–5434. DOI:
[17]
O. Lamrabet, N. El Fezazi, F. El Haoussi, and E. H. Tissir. 2017. Using input delay approach for synthesizing an anti-windup compensator to AQM in TCP/IP networks. In 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP) (1–6). IEEE.
[18]
A. Chhabra, V. Vashishth, and D. K. Sharma. 2018. A fuzzy logic and game theory based adaptive approach for securing opportunistic networks against black hole attacks[J]. International Journal of Communication Systems 31, 4 (2018), e3487. DOI:
[19]
S. Hussain, S. Abbas, T. Sohail, et al. 2019. Estimating virtual trust of cognitive agents using multi layered socio-fuzzy inference system[J]. Journal of Intelligent & Fuzzy Systems 37, 2 (2019) 2769–2784. DOI:
[20]
M. S. Sumalatha and V. Nandalal. 2020. An intelligent cross layer security based fuzzy trust calculation mechanism (CLS-FTCM) for securing wireless sensor network (WSN)[J]. Journal of Ambient Intelligence and Humanized Computing (2020), 1–15. DOI:

Cited By

View all
  • (2024)Metaverse VR technologies in contemporary Chinese music educationInteractive Learning Environments10.1080/10494820.2024.236137733:1(821-836)Online publication date: 11-Jun-2024
  • (2024)A Comprehensive Analysis of Big Data-driven Strategies for Enhancing Economic Sustainability in the Era of Green DevelopmentE3S Web of Conferences10.1051/e3sconf/202453702022537(02022)Online publication date: 13-Jun-2024
  • (2024)A multi-source information fusion layer counting method for penetration fuze based on TCN-LSTMDefence Technology10.1016/j.dt.2023.09.00833(463-474)Online publication date: Mar-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 17, Issue 4
November 2021
529 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/3492437
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 November 2021
Accepted: 01 July 2021
Revised: 01 July 2021
Online AM: 07 May 2020
Received: 01 June 2019
Published in TOMM Volume 17, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Network fuzzy theory
  2. trust mechanism
  3. collaborative filtering algorithm
  4. FTWDF
  5. simulation
  6. FTWDF-EEFA

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Natural Science Foundation of China

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)99
  • Downloads (Last 6 weeks)2
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Metaverse VR technologies in contemporary Chinese music educationInteractive Learning Environments10.1080/10494820.2024.236137733:1(821-836)Online publication date: 11-Jun-2024
  • (2024)A Comprehensive Analysis of Big Data-driven Strategies for Enhancing Economic Sustainability in the Era of Green DevelopmentE3S Web of Conferences10.1051/e3sconf/202453702022537(02022)Online publication date: 13-Jun-2024
  • (2024)A multi-source information fusion layer counting method for penetration fuze based on TCN-LSTMDefence Technology10.1016/j.dt.2023.09.00833(463-474)Online publication date: Mar-2024
  • (2024)A trustworthy data collection scheme based on active spot-checking in UAV-Assisted WSNsAd Hoc Networks10.1016/j.adhoc.2024.103477158:COnline publication date: 1-May-2024
  • (2023)Exploration on the Operation Status and Optimization Strategy of Networked Teaching of Physical Education Curriculum Based on AI AlgorithmInternational Journal of Information Technologies and Systems Approach10.4018/IJITSA.31689216:3(1-15)Online publication date: 27-Jan-2023
  • (2023)Perceptual Hashing of Deep Convolutional Neural Networks for Model Copy DetectionACM Transactions on Multimedia Computing, Communications, and Applications10.1145/357277719:3(1-20)Online publication date: 2-Mar-2023
  • (2023)(Retracted) Software development and design of network security system based on log dataJournal of Electronic Imaging10.1117/1.JEI.32.1.01120732:01Online publication date: 1-Jan-2023
  • (2023)Intelligent design of network multimedia using big data and virtual Artificial Intelligence technologyIET Networks10.1049/ntw2.12109Online publication date: 4-Dec-2023
  • (2023)An electromagnetic signal classification method inspired by the visual characteristics of biological dual-channelWireless Networks10.1007/s11276-023-03518-y30:2(909-921)Online publication date: 19-Oct-2023
  • (2022)Distributed sensors and neural network driven building earthquake resistance mechanismAIMS Geosciences10.3934/geosci.20220408:4(718-730)Online publication date: 2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Full Text

View this article in Full Text.

Full Text

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media