Skip to main content
Log in

Compensation Method of Electronic Commerce Data Transmission Delay Based on Fuzzy Encryption Algorithm

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

In this study, a delay compensation algorithm based on fuzzy encryption algorithm is proposed. Discussion on Fuzzy encryption algorithm and composition of data encryption system, the data encryption transmission model of electronic commerce information management system is constructed, the channel equilibrium allocation is carried out during electronic commerce data encryption transmission combined with vector quantification encoding method, and the data encryption transmission and vector quantification encoding control model of electronic commerce information management system is established. The output bit sequence recombination method is used to configure the transmission delay during electronic commerce data encryption transmission, and the adaptive spread spectrum adjustment of electronic commerce data transmission is carried out by combining symbol adjustment technology. The delay compensation of electronic commerce data transmission is realized based on fuzzy encryption algorithm. The proposed method has excellent adaptability and strong output stability, which improves the fidelity of e-commerce data transmission and reduces the output delay and error code.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

References

  1. Guo H, Liu H, Wu C et al (2016) Logistic discrimination based on G-mean and F-measure for imbalanced problem. J Intelligent Fuzzy Syst 31(3):1155–1166

    Article  Google Scholar 

  2. Xu Y, Tong S, Li Y (2014) Prescribed performance fuzzy adaptive fault-tolerant control of non-linear systems with actuator faults. IET Control Theory Appl 8(6):420–431

    Article  MathSciNet  Google Scholar 

  3. Huang X, Wang Z, Li Y et al (2015) Design of fuzzy state feedback controller for robust stabilization of uncertain fractional-order chaotic systems. J Franklin Inst 351(12):5480–5493

    Article  MathSciNet  Google Scholar 

  4. Xiong H, Guo YQ, Zhu HH et al (2018) Robust nonnegative matrix factorization on manifold via projected gradient method. Inf Control 47(2):166–175

    Google Scholar 

  5. Dai YY, Li CF, Xu H et al (2016) Density spatial clustering algorithm with initial point optimization and parameter self-adaption. Comput Eng 42(1):203–209

    Google Scholar 

  6. Rodriguez A, Laio A (2014) Clustering by fast search and find of density peaks. Science 344(6191):1492

    Article  Google Scholar 

  7. Ma CL, Shan H, Ma T (2016) Improved density peaks based clustering algorithm with strategy choosing cluster center automatically. Computer Science 43(7):255–258

    Google Scholar 

  8. Zhou SB, Xu WX (2018) A novel clustering algorithm based on relative density and decision graph. Control and Decision 33(11):1921–1930

    MATH  Google Scholar 

  9. He H, Tan Y (2017) Automatic pattern recognition of ECG signals using entropy-based adaptive dimensionality reduction and clustering. Appl Soft Comput 55:238–252

    Article  Google Scholar 

  10. Zhu YL, Zhu XX, Wang JM (2019) Time series motif discovery algorithm based on subsequence full join and maximum clique. Journal of Computer Applications 39(2):414–420

    Google Scholar 

  11. Badrinarayanan V, Kendall A, Cipolla R (2017) SegNet: A deep convolutional encoder-decoder architecture for image segmentation. IEEE Trans Pattern Anal Mach Intell 39(12):2481–2495

    Article  Google Scholar 

  12. Gao W, Wang W (2017) New isolated toughness condition for fractional (g, f, n) - critical graph. Colloq Math 147(1):55–65

    Article  MathSciNet  Google Scholar 

  13. Wei XS, Luo JH, Wu J (2017) Selective convolutional descriptor aggregation for fine-grained image retrieval. IEEE Trans Image Process 26(6):2868–2881

    Article  MathSciNet  Google Scholar 

  14. Ju B, Qian YT, Ye MC (2015) Collaborative filtering algorithm based on structured projective nonnegative matrix factorization. Journal of Zhejiang University: Engineering Science 49(7):1319–1325

    Google Scholar 

  15. Li BF, Tang YD, Han Z (2017) A geometric structure preserving nonnegative matrix factorization for data representation. Inform Control 46(1): 53–59, 64

  16. Wu Y, Shen B, Ling H (2014) Visual tracking via online nonnegative matrix factorization. IEEE Trans Circuits Syst Video Technol 24(3):374–383

    Article  Google Scholar 

  17. Zhang H, Zhu XX, Shi JC et al (2019) Study on PWM rectifier without network voltage sensor based on virtual flux delay compensation algorithm. IEEE Trans Power Electron 34(1):849–862

    Article  Google Scholar 

  18. Fu W, Jiang DF (2018) Radar wideband digital beamforming based on time delay and phase compensation. Int J Electron 105(7):1144–1158

    Article  Google Scholar 

  19. Lv Z, Qiao L (2020) Analysis of healthcare big data. Futur Gener Comput Syst 109:103–110

    Article  Google Scholar 

  20. Song J, Zhong Q, Wang W et al (2020) FPDP: Flexible privacy-preserving data publishing scheme for smart agriculture. IEEE SensJ 1

  21. Yang S, Deng B, Wang J et al (2020) Scalable digital neuromorphic architecture for large-scale biophysically meaningful neural network with multi-compartment neurons. IEEE Transact Neural Networks Learn Syst 31(1):148–162

    Article  Google Scholar 

  22. Kovalnogov VN, Simos TE, Tsitouras C (2020) Ninth-Order, explicit, two-step methods for second-order inhomogeneous linear IVPs. Mathematical Methods Appl Sci 43:4918–4926

    MathSciNet  MATH  Google Scholar 

  23. Simos TE, Tsitouras C (2020) Explicit, ninth order, two step methods for solving inhomogeneous linear problems x ''(t) = lambda x(t) plus f(t). Appl Numerical Math.

  24. Atangana A, Alkahtani BST (2018) New model for process of phase separation in iron alloys. Iranian J Sci Technol Transact A-Sci 42(A3):1351–1356

    Article  Google Scholar 

  25. Ni T, Yao Y, Chang H et al (2020) LCHR-TSV: Novel low cost and highly repairable honeycomb-based TSV redundancy architecture for clustered faults. IEEE T Comput Aid D 39(10):2938–2951

    Article  Google Scholar 

  26. . Ren J, Zhang C, Hao QA (2020) Theoretical method to evaluate honeynet potency. Future Gen Comp Syst

  27. Stefani Cativelli A, Pinto AL, Lascurain Sanchez ML (2020) Patent value index: Measuring Brazilian green patents based on family size, grant, and backward citation. Iberoamerican J Sci Measurement Commun 1(1):004

    Article  Google Scholar 

  28. Xiong Z, Wu Y, Ye C et al (2019) Color image chaos encryption algorithm combining CRC and nine palace map. Multimedia Tools App 22(78):31035–31055

    Article  Google Scholar 

  29. Chen J, Zhu QM, Li J et al (2018) Biased compensation recursive least squares-based threshold algorithm for time-delay rational models via redundant rule. Nonlinear Dyn 91(2):797–807

    Article  Google Scholar 

  30. Virk AUR, Abbas T, Khalid W (2019) Multiplicative topological descriptors of Silicon carbide. Appl Math Nonlinear Sci 4(1):181–190

    Article  MathSciNet  Google Scholar 

  31. Selvi MSM, Rajendran L (2019) Application of modified wavelet and homotopy perturbation methods to nonlinear oscillation problems. Appl Math Nonlinear Sci 4(2):351–364

    Article  MathSciNet  Google Scholar 

  32. Lv Z, Song H (2020) Mobile internet of things under data physical fusion technology. IEEE Internet Things J 7(5):4616–4624

    Article  Google Scholar 

  33. Gomez-Aguilar JF, Atangana A (2019) Power and exponentials laws: Theory and application. J Comput Appl Math 354:52–65

    Article  MathSciNet  Google Scholar 

  34. Shi KB, Wang J, Zhong SM et al (2019) Non-fragile memory filtering of T-S fuzzy delayed neural networks based on switched fuzzy sampled-data control. Fuzzy Sets Syst 394:40–64

    Article  MathSciNet  Google Scholar 

  35. . Zuo C, Li JJ, Sun JS et al (2020) Transport of intensity equation: A tutorial. Opt Lasers Engineer 106187.

  36. . Zhu J, Wang X, Chen M et al (2019) Integration of BIM and GIS: IFC geometry transformation to shapefile using enhanced open-source approach. Autom Construct 106: 102859

  37. Zhu J, Wang X, Wang P et al (2019) Integration of BIM and GIS: Geometry from IFC to shapefile using open-source technology. Autom Constr 102:105–119

    Article  Google Scholar 

  38. Ni T, Xu Q, Huang Z et al (2020) A cost-effective TSV repair architecture for clustered faults in 3D IC. IEEE T Comput Aid D 1–5

  39. Zhu J, Wu P, Chen M et al (2020) Automatically processing IFC clipping representation for BIM and GIS integration at the process level. Appl Sci 10(6):2009

    Article  Google Scholar 

Download references

Acknowledgements

The study was supported by “Production and Education Cooperation Project of Education Ministry, China (Grant No. [2018]18)”, “Guangdong Enterprise Cooperative Education Project (Grant No. PROJ999832208187461632)”, “Research and Practice Project of Higher Vocational Education Teaching Reform of Guangdong Province, China (Grant No.GDJG2019085)”, “Guangdong Innovation and Entrepreneurship Education Curriculum Construction Project (Grant No. [2017]85)”, “2019 Guangdong Teaching Reform Research Applied Project (Grant No. JGYB201812)”, “National Natural Science Foundation of China (Grant No. 61872096)”, “Guangdong Innovation Team Project of Education Department (Grant No. 2017KCXTD021).”

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yinyin Xiao.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xiao, Y. Compensation Method of Electronic Commerce Data Transmission Delay Based on Fuzzy Encryption Algorithm. Mobile Netw Appl 27, 1339–1348 (2022). https://doi.org/10.1007/s11036-022-01924-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-022-01924-8

Keywords

Navigation