{"id":"https://openalex.org/W4410116174","doi":"https://doi.org/10.1177/14727978251338986","title":"Analysis of information transmission coding algorithm in railway communication system security scheme","display_name":"Analysis of information transmission coding algorithm in railway communication system security scheme","publication_year":2025,"publication_date":"2025-05-06","ids":{"openalex":"https://openalex.org/W4410116174","doi":"https://doi.org/10.1177/14727978251338986"},"language":"en","primary_location":{"id":"doi:10.1177/14727978251338986","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978251338986","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100403185","display_name":"Lin Wang","orcid":"https://orcid.org/0009-0002-9835-2719"},"institutions":[{"id":"https://openalex.org/I4210162404","display_name":"China Railway Construction Machinery Research & Design Institute","ror":"https://ror.org/05qw55b97","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210162404"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lin Wang","raw_affiliation_strings":["School of Railway Communication Signal and Electrification, Wuhan Railway Vocational College of Technology, Wuhan, China"],"affiliations":[{"raw_affiliation_string":"School of Railway Communication Signal and Electrification, Wuhan Railway Vocational College of Technology, Wuhan, China","institution_ids":["https://openalex.org/I4210162404"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5100403185"],"corresponding_institution_ids":["https://openalex.org/I4210162404"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.11160655,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"25","issue":"5","first_page":"4633","last_page":"4649"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.9797000288963318,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9605000019073486,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8406189680099487},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6190609335899353},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5546165108680725},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.45362865924835205},{"id":"https://openalex.org/keywords/data-transmission","display_name":"Data transmission","score":0.4374357759952545},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3442886471748352}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8406189680099487},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6190609335899353},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5546165108680725},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.45362865924835205},{"id":"https://openalex.org/C557945733","wikidata":"https://www.wikidata.org/wiki/Q389772","display_name":"Data transmission","level":2,"score":0.4374357759952545},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3442886471748352}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1177/14727978251338986","is_oa":false,"landing_page_url":"https://doi.org/10.1177/14727978251338986","pdf_url":null,"source":{"id":"https://openalex.org/S2765058733","display_name":"Journal of Computational Methods in Sciences and Engineering","issn_l":"1472-7978","issn":["1472-7978","1875-8983"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computational Methods in Sciences and Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W3048897679","https://openalex.org/W3120063549","https://openalex.org/W3125719226","https://openalex.org/W4220771107","https://openalex.org/W4286377459","https://openalex.org/W4288065991","https://openalex.org/W4307761680","https://openalex.org/W4312971459","https://openalex.org/W4318049976","https://openalex.org/W4321787625","https://openalex.org/W4366290225","https://openalex.org/W4381884270","https://openalex.org/W4386065637","https://openalex.org/W4386231841","https://openalex.org/W4386280840","https://openalex.org/W4386952106","https://openalex.org/W4387048284","https://openalex.org/W4387063713","https://openalex.org/W4388267874","https://openalex.org/W4390024647","https://openalex.org/W4405721029","https://openalex.org/W4406119308"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2134080857","https://openalex.org/W1989237518","https://openalex.org/W2002093701","https://openalex.org/W4399463150","https://openalex.org/W107495730"],"abstract_inverted_index":{"The":[0,53,152,207],"rapid":[1],"advancement":[2],"of":[3,24,120],"railway":[4,33,83,224],"communication":[5,34,84,225],"systems":[6],"necessitates":[7],"robust":[8,64,133],"security":[9,36,67,167,200],"mechanisms":[10],"to":[11,90,144,222],"ensure":[12,147],"reliable":[13,220],"and":[14,22,50,74,92,125,146,150,172,188,201,214,219],"secure":[15,129,218],"data":[16,71,99,130,189],"transmission.":[17,139],"It":[18,116],"explores":[19],"the":[20,57,97,104,109,118,196,204],"design":[21],"analysis":[23],"an":[25],"information":[26],"transmission":[27],"coding":[28],"algorithm":[29,113],"(ITCA)":[30],"tailored":[31],"for":[32,81,122,127],"system":[35,175],"schemes.":[37],"Specifically,":[38],"it":[39],"focuses":[40],"on":[41],"three":[42],"key":[43,123],"areas:":[44],"error":[45,164],"correction":[46],"coding,":[47],"encryption":[48],"mechanisms,":[49],"authentication":[51,141],"protocols.":[52],"proposed":[54,197],"scheme":[55],"integrates":[56],"techniques":[58],"in":[59,163,203],"a":[60,160,217],"layered":[61],"manner,":[62],"ensuring":[63,95],"protection":[65,134],"against":[66,135],"threats":[68],"such":[69,180],"as":[70,101,103,181],"interception,":[72],"tampering,":[73],"unauthorized":[75,136],"access,":[76],"while":[77],"also":[78],"optimizing":[79],"performance":[80,178],"real-time":[82],"requirements.":[85],"Hamming":[86],"code":[87],"is":[88,100,114,142],"used":[89],"detect":[91],"correct":[93],"errors,":[94],"that":[96,195],"received":[98],"accurate":[102],"original":[105],"message.":[106],"For":[107],"encryption,":[108,131],"Hybrid":[110],"RSA-Blowfish":[111],"(HRB)":[112],"utilized.":[115],"combines":[117],"strength":[119],"RSA":[121],"exchange":[124],"Blowfish":[126],"fast,":[128],"providing":[132],"access":[137],"during":[138],"Password-based":[140],"implemented":[143],"verify":[145],"message":[148],"integrity":[149,190],"non-repudiation.":[151],"methodology":[153,208],"demonstrates":[154,209],"its":[155,210],"effectiveness":[156,211],"through":[157,212],"simulation,":[158],"showing":[159],"significant":[161],"reduction":[162],"rates,":[165],"enhanced":[166],"with":[168],"minimal":[169],"computational":[170],"overhead,":[171],"improved":[173,193],"overall":[174],"performance.":[176],"Key":[177],"metrics,":[179],"throughput":[182],"(50":[183],"Mbps),":[184],"latency":[185],"(7":[186],"ms),":[187],"(96.3%),":[191],"were":[192],"demonstrating":[194],"approach":[198,221],"balances":[199],"efficiency":[202],"Python":[205],"platform.":[206],"simulation":[213],"evaluation,":[215],"showcasing":[216],"safeguarding":[223],"systems.":[226]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
