首页 > 最新文献

Concurrency and Computation: Practice and Experience最新文献

英文 中文
Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches 通过 LSTM-CNN 混合模型架构进行基于时间的 DDoS 攻击检测:多对一和多对多方法的研究
Pub Date : 2024-02-14 DOI: 10.1002/cpe.7996
Beenish Habib, F. Khursheed
Internet data thefts, intrusions and DDoS attacks are some of the big concerns for the network security today. Detection of these anomalies, is gaining tremendous impetus with the development of machine learning and artificial intelligence. Even now researchers are shifting the base from machine learning to the deep neural architectures with auto‐feature selection capabilities. We in this paper propose multiple deep neural network architectures which can select, co‐learn and teach the gradients of the neural network by itself with no human intervention. This is what we call as meta‐learning. The models are configured in both many to one and many to many design architectures. We combine long short‐term memory (LSTM), bi‐directional long short‐term memory (BiLSTM), convolutional neural network (CNN) layers along with attention mechanism to achieve the higher accuracy values among all the available deep learning model architectures. LSTMs overcomes the vanishing and exploding gradient problem of RNN and attention mechanism mimics the human cognitive attention that screens the network flow to obtain the key features for network traffic classification. In addition, we also add multiple convolutional layers to get the key features for network traffic classification. We get the time series analysis of the traffic done for the possibility of a DDoS attack without using any feature selection techniques and without balancing the dataset. The performance analysis is done based on confusion matrix scores, that is, accuracy, false alarm rate (FAR), sensitivity, specificity, false‐positive rate (FPR), F1 score, area under curve (AUC) analysis and loss functions on well‐known public benchmark KDD Cup'99 data set. The results of our experiments reveal that our models outperform existing techniques, showing their superiority in performance.
互联网数据盗窃、入侵和 DDoS 攻击是当今网络安全的几大隐患。随着机器学习和人工智能的发展,对这些异常情况的检测正获得巨大的推动力。目前,研究人员正在将基础从机器学习转向具有自动特征选择功能的深度神经架构。我们在本文中提出了多种深度神经网络架构,它们可以在没有人工干预的情况下自行选择、共同学习和教授神经网络的梯度。这就是我们所说的元学习。这些模型既有多对一的设计架构,也有多对多的设计架构。我们将长短时记忆(LSTM)、双向长短时记忆(BiLSTM)、卷积神经网络(CNN)层与注意力机制结合起来,从而在所有可用的深度学习模型架构中实现了更高的精度值。LSTM 克服了 RNN 的梯度消失和爆炸问题,而注意力机制则模仿人类的认知注意力,对网络流量进行筛选,从而获得网络流量分类的关键特征。此外,我们还添加了多个卷积层,以获得网络流量分类的关键特征。在不使用任何特征选择技术和不平衡数据集的情况下,我们得到了针对 DDoS 攻击可能性的流量时间序列分析。性能分析是基于混淆矩阵得分,即准确率、误报率 (FAR)、灵敏度、特异性、假阳性率 (FPR)、F1 分数、曲线下面积 (AUC) 分析和损失函数,在著名的公共基准 KDD Cup'99 数据集上进行的。实验结果表明,我们的模型优于现有技术,显示了其性能的优越性。
{"title":"Time‐based DDoS attack detection through hybrid LSTM‐CNN model architectures: An investigation of many‐to‐one and many‐to‐many approaches","authors":"Beenish Habib, F. Khursheed","doi":"10.1002/cpe.7996","DOIUrl":"https://doi.org/10.1002/cpe.7996","url":null,"abstract":"Internet data thefts, intrusions and DDoS attacks are some of the big concerns for the network security today. Detection of these anomalies, is gaining tremendous impetus with the development of machine learning and artificial intelligence. Even now researchers are shifting the base from machine learning to the deep neural architectures with auto‐feature selection capabilities. We in this paper propose multiple deep neural network architectures which can select, co‐learn and teach the gradients of the neural network by itself with no human intervention. This is what we call as meta‐learning. The models are configured in both many to one and many to many design architectures. We combine long short‐term memory (LSTM), bi‐directional long short‐term memory (BiLSTM), convolutional neural network (CNN) layers along with attention mechanism to achieve the higher accuracy values among all the available deep learning model architectures. LSTMs overcomes the vanishing and exploding gradient problem of RNN and attention mechanism mimics the human cognitive attention that screens the network flow to obtain the key features for network traffic classification. In addition, we also add multiple convolutional layers to get the key features for network traffic classification. We get the time series analysis of the traffic done for the possibility of a DDoS attack without using any feature selection techniques and without balancing the dataset. The performance analysis is done based on confusion matrix scores, that is, accuracy, false alarm rate (FAR), sensitivity, specificity, false‐positive rate (FPR), F1 score, area under curve (AUC) analysis and loss functions on well‐known public benchmark KDD Cup'99 data set. The results of our experiments reveal that our models outperform existing techniques, showing their superiority in performance.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139778104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks 针对多通道负载循环无线物联网网络的分布式低延迟广播调度
Pub Date : 2024-02-14 DOI: 10.1002/cpe.8044
Pengpeng Long, Yuhang Wu, Quan Chen, Lianglun Cheng
Data broadcast is a fundamental communication pattern in wireless IoT networks, in which the messages are disseminated from a source node to the entire network. The problem of minimum latency broadcast scheduling (MLBS) which is aimed to generate a quick and conflict‐free broadcast schedule has not been extensively explored in duty‐cycled networks. The existing works either work in a centralized scheme or rely on a fixed tree for broadcasting. Additionally, they all employ a strict premise that each node can only utilize one channel for both transmitting and receiving messages. Thus, to address the issues mentioned above, we examine the first distributed broadcasting algorithm in multi‐channel duty‐cycled wireless IoT networks, without relying on a predetermined tree. First, the MLBS problem in such networks is defined and proved to be NP‐hard. Then, in order to avoid transmission conflicts between different links locally, two efficient data structures are designed to help compute the earliest time and channel of receiving messages without conflicts. Based on the above data structures, we introduce an efficient distributed broadcasting algorithm, which can generate a latency‐sensitive broadcast tree while calculating a collision‐free broadcast schedule, simultaneously. Finally, the theoretical analysis and simulations demonstrate the efficiency of the proposed algorithm.
数据广播是无线物联网网络中的一种基本通信模式,信息从源节点传播到整个网络。最小延迟广播调度(MLBS)旨在生成快速、无冲突的广播调度,但在占空比循环网络中,这一问题尚未得到广泛探讨。现有研究要么采用集中式方案,要么依赖于固定的广播树。此外,它们都采用了严格的前提条件,即每个节点只能利用一个信道来发送和接收信息。因此,为了解决上述问题,我们研究了第一种不依赖于预定树的多信道占空比无线物联网网络中的分布式广播算法。首先,我们定义了此类网络中的 MLBS 问题,并证明该问题具有 NP 硬度。然后,为了避免本地不同链路之间的传输冲突,设计了两种高效的数据结构来帮助计算无冲突接收信息的最早时间和信道。在上述数据结构的基础上,我们引入了一种高效的分布式广播算法,它可以在计算无碰撞广播时间表的同时生成对延迟敏感的广播树。最后,理论分析和仿真证明了所提算法的高效性。
{"title":"Distributed low‐latency broadcast scheduling for multi‐channel duty‐cycled wireless IoT networks","authors":"Pengpeng Long, Yuhang Wu, Quan Chen, Lianglun Cheng","doi":"10.1002/cpe.8044","DOIUrl":"https://doi.org/10.1002/cpe.8044","url":null,"abstract":"Data broadcast is a fundamental communication pattern in wireless IoT networks, in which the messages are disseminated from a source node to the entire network. The problem of minimum latency broadcast scheduling (MLBS) which is aimed to generate a quick and conflict‐free broadcast schedule has not been extensively explored in duty‐cycled networks. The existing works either work in a centralized scheme or rely on a fixed tree for broadcasting. Additionally, they all employ a strict premise that each node can only utilize one channel for both transmitting and receiving messages. Thus, to address the issues mentioned above, we examine the first distributed broadcasting algorithm in multi‐channel duty‐cycled wireless IoT networks, without relying on a predetermined tree. First, the MLBS problem in such networks is defined and proved to be NP‐hard. Then, in order to avoid transmission conflicts between different links locally, two efficient data structures are designed to help compute the earliest time and channel of receiving messages without conflicts. Based on the above data structures, we introduce an efficient distributed broadcasting algorithm, which can generate a latency‐sensitive broadcast tree while calculating a collision‐free broadcast schedule, simultaneously. Finally, the theoretical analysis and simulations demonstrate the efficiency of the proposed algorithm.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"367 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139839374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Open‐domain event schema induction via weighted attentive hypergraph neural network 通过加权殷勤超图神经网络归纳开放域事件模式
Pub Date : 2024-02-13 DOI: 10.1002/cpe.8029
Wei Qin, Haozhe Jasper Wang, Xiangfeng Luo
Event schema refers to the use of a template to depict similar events, and it is a necessary prerequisite for event causality extractions. The induction of event schemas is a difficult task, especially for texts in the open domain, due to the complex and diverse manifestations of events. Previous models considered participants in event mentions are independent or compositional, ignoring the high‐order correlations among participants, which limit their capability of induce event schema. To remedy this, we propose constructing an Event Structure Hypergraph (ESH) to better utilizes the event structural information for event schema induction. In particular, we first extract event mentions from the open‐domain corpus. and then construct an ESH by representing event mentions as a hyperedges. ESH contains high‐order information between participants in event mention. To, learn event mentions representation based on ESH, we propose a weighted attentive hypergraph neural network (WHGNN) to model event high‐order correlations and then integrate node‐category weight matrix into the training of network by improving event representation. By applying jointly cluster algorithm on the event mentions representation, we can induce reliable event schemas. Experimental results on three datasets demonstrate that our approach can induce salient and high‐quality event schemas on open‐domain corpus.
事件图式是指使用模板来描述相似事件,它是事件因果关系提取的必要前提。由于事件的表现形式复杂多样,归纳事件模式是一项艰巨的任务,尤其是对于开放领域的文本而言。以往的模型认为事件提及中的参与者是独立的或组成的,忽略了参与者之间的高阶相关性,这限制了它们诱导事件图式的能力。为了弥补这一缺陷,我们提出构建事件结构超图(ESH),以更好地利用事件结构信息进行事件图式归纳。具体来说,我们首先从开放域语料库中提取事件提及,然后通过将事件提及表示为超网格来构建 ESH。ESH 包含事件提及中参与者之间的高阶信息。为了在 ESH 的基础上学习事件提及的表示,我们提出了一种加权殷勤超图神经网络(WHGNN)来建立事件高阶相关性模型,然后通过改进事件表示将节点类别权重矩阵集成到网络训练中。通过对事件提及表示应用联合聚类算法,我们可以诱导出可靠的事件图式。在三个数据集上的实验结果表明,我们的方法可以在开放域语料库中诱导出突出和高质量的事件图式。
{"title":"Open‐domain event schema induction via weighted attentive hypergraph neural network","authors":"Wei Qin, Haozhe Jasper Wang, Xiangfeng Luo","doi":"10.1002/cpe.8029","DOIUrl":"https://doi.org/10.1002/cpe.8029","url":null,"abstract":"Event schema refers to the use of a template to depict similar events, and it is a necessary prerequisite for event causality extractions. The induction of event schemas is a difficult task, especially for texts in the open domain, due to the complex and diverse manifestations of events. Previous models considered participants in event mentions are independent or compositional, ignoring the high‐order correlations among participants, which limit their capability of induce event schema. To remedy this, we propose constructing an Event Structure Hypergraph (ESH) to better utilizes the event structural information for event schema induction. In particular, we first extract event mentions from the open‐domain corpus. and then construct an ESH by representing event mentions as a hyperedges. ESH contains high‐order information between participants in event mention. To, learn event mentions representation based on ESH, we propose a weighted attentive hypergraph neural network (WHGNN) to model event high‐order correlations and then integrate node‐category weight matrix into the training of network by improving event representation. By applying jointly cluster algorithm on the event mentions representation, we can induce reliable event schemas. Experimental results on three datasets demonstrate that our approach can induce salient and high‐quality event schemas on open‐domain corpus.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"81 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139781514","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fused GEMMs towards an efficient GPU implementation of the ADER‐DG method in SeisSol 在 SeisSol 中融合 GEMMs 以实现 ADER-DG 方法的高效 GPU 实施
Pub Date : 2024-02-13 DOI: 10.1002/cpe.8037
Ravil Dorozhinskii, G. B. Gadeschi, Michael Bader
This study shows how GPU performance of the ADER discontinuous Galerkin method in SeisSol (an earthquake simulation software) can be further improved while preserving its original design that ensures high CPU performance. We introduce a new code generator (“ChainForge”) that fuses subsequent batched matrix multiplications (“GEMMs”) into a single GPU kernel, holding intermediate results in shared memory as long as necessary. The generator operates as an external module linked against SeisSol's domain specific language YATeTo and, as a result, the original SeisSol source code remains mainly unchanged. In this paper, we discuss several challenges related to automatic fusion of GPU kernels and provide solutions to them. By and large, we gain 60% in performance of SeisSol's wave propagation solver using Fused‐GEMMs compared to the original GPU implementation. We demonstrated this on benchmarks as well as on a real production scenario simulating the Northridge 1994 earthquake.
本研究展示了如何进一步提高 SeisSol(一款地震模拟软件)中 ADER 非连续伽勒金方法的 GPU 性能,同时保留其确保 CPU 高性能的原始设计。我们引入了一种新的代码生成器("ChainForge"),可将后续的分批矩阵乘法("GEMM")融合到一个 GPU 内核中,必要时将中间结果保留在共享内存中。生成器作为外部模块与 SeisSol 的特定领域语言 YATeTo 相链接,因此,SeisSol 的原始源代码基本保持不变。在本文中,我们讨论了与 GPU 内核自动融合相关的几个挑战,并提供了解决方案。总的来说,与最初的GPU实现相比,使用Fused-GEMMs的SeisSol波传播求解器的性能提高了60%。我们在基准测试以及模拟 1994 年北岭地震的实际生产场景中证明了这一点。
{"title":"Fused GEMMs towards an efficient GPU implementation of the ADER‐DG method in SeisSol","authors":"Ravil Dorozhinskii, G. B. Gadeschi, Michael Bader","doi":"10.1002/cpe.8037","DOIUrl":"https://doi.org/10.1002/cpe.8037","url":null,"abstract":"This study shows how GPU performance of the ADER discontinuous Galerkin method in SeisSol (an earthquake simulation software) can be further improved while preserving its original design that ensures high CPU performance. We introduce a new code generator (“ChainForge”) that fuses subsequent batched matrix multiplications (“GEMMs”) into a single GPU kernel, holding intermediate results in shared memory as long as necessary. The generator operates as an external module linked against SeisSol's domain specific language YATeTo and, as a result, the original SeisSol source code remains mainly unchanged. In this paper, we discuss several challenges related to automatic fusion of GPU kernels and provide solutions to them. By and large, we gain 60% in performance of SeisSol's wave propagation solver using Fused‐GEMMs compared to the original GPU implementation. We demonstrated this on benchmarks as well as on a real production scenario simulating the Northridge 1994 earthquake.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"39 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139840328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation method for infrared radiation transmission characteristics of typical ship targets based on optical remote sensing 基于光学遥感的典型舰船目标红外辐射传输特性仿真方法
Pub Date : 2022-11-28 DOI: 10.1002/cpe.7515
Zheng Jiang, Ming Xu, Hao Shi, Liang Chen
{"title":"Simulation method for infrared radiation transmission characteristics of typical ship targets based on optical remote sensing","authors":"Zheng Jiang, Ming Xu, Hao Shi, Liang Chen","doi":"10.1002/cpe.7515","DOIUrl":"https://doi.org/10.1002/cpe.7515","url":null,"abstract":"","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73538457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance prediction of parallel applications using artificial neuronal network and graph representation 基于人工神经网络和图表示的并行应用程序性能预测
Pub Date : 2022-11-20 DOI: 10.1002/cpe.7514
Soumia Chokri, Sohaib Baroud, Safa Belhaous, M. Youssfi, M. Mestari
{"title":"Performance prediction of parallel applications using artificial neuronal network and graph representation","authors":"Soumia Chokri, Sohaib Baroud, Safa Belhaous, M. Youssfi, M. Mestari","doi":"10.1002/cpe.7514","DOIUrl":"https://doi.org/10.1002/cpe.7514","url":null,"abstract":"","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"51 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76041648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel approach to QoS‐aware resource allocation in NOMA cellular HetNets using multi‐layer optimization 基于多层优化的NOMA蜂窝HetNets中QoS感知资源分配的新方法
Pub Date : 2022-11-07 DOI: 10.1007/s10586-022-03734-9
A. Mirzaei
{"title":"A novel approach to QoS‐aware resource allocation in NOMA cellular HetNets using multi‐layer optimization","authors":"A. Mirzaei","doi":"10.1007/s10586-022-03734-9","DOIUrl":"https://doi.org/10.1007/s10586-022-03734-9","url":null,"abstract":"","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87302497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Bilateral anisotropic Gabor wavelet transformation based deep stacked auto encoding for lossesless image compression 基于双向各向异性Gabor小波变换的深度堆叠自编码无损图像压缩
Pub Date : 2022-11-06 DOI: 10.1002/cpe.7383
S. Kumar, R. Sarankumar, O. Vignesh, A. Prakash
A highly challenging aspect of the data compression technique is maintaining the quality of data that reconstructs in high compression rates. To overcome these limitations, a bilateral anisotropic Gabor wavelet transformation with deep stacked auto encoding (BAGWT‐DSAE) technique based lossesless image compression is proposed in this article to save the storage space and processing time during transferring the images. The proposed method contains three main processes namely preprocessing, compression and decompression. Initially input aerial image and digital image are taken and these images are given bilateral filter based preprocessing for eliminates the different types of noises and also multiple artifacts. Then the preprocessed images are given to anisotropic Gabor wavelet transformation based deep stacked auto encoding to compress and decompress the wavelet transform's sensitive sub‐bands effectually. In DSAE, the decoder of the auto encoder achieves a better quality decompressed image. The proposed method is implemented in MATLAB simulations run in PC through Intel Core, 8 GB of RAM, 2.50 GHz CPU and Windows 8. Then, the simulation performance of proposed BAGWT‐DSAE‐LIC method provides 20.23%, 24.85%, and 38.56% low compression ratio and 26.48%, 21.23%, and 12.53% lower computational time, 4.56%, 7.68%, and 8.34% high space saving than the existing methods.
数据压缩技术的一个极具挑战性的方面是保持以高压缩率重建的数据的质量。为了克服这些限制,本文提出了一种基于双向各向异性Gabor小波变换和深度堆叠自编码(BAGWT‐DSAE)技术的无损图像压缩方法,以节省图像传输过程中的存储空间和处理时间。该方法包括预处理、压缩和解压缩三个主要过程。首先对输入的航拍图像和数字图像进行双边滤波预处理,以消除不同类型的噪声和多重伪影。然后对预处理后的图像进行基于各向异性Gabor小波变换的深度堆叠自编码,对小波变换的敏感子带进行有效的压缩解压缩。在DSAE中,自动编码器的解码器可以获得质量更好的解压缩图像。采用Intel酷睿、8gb内存、2.50 GHz CPU和Windows 8操作系统,在PC机上进行了MATLAB仿真。结果表明,所提出的BAGWT - DSAE - LIC方法的压缩比分别降低20.23%、24.85%和38.56%,计算时间分别降低26.48%、21.23%和12.53%,空间节省率分别提高4.56%、7.68%和8.34%。
{"title":"Bilateral anisotropic Gabor wavelet transformation based deep stacked auto encoding for lossesless image compression","authors":"S. Kumar, R. Sarankumar, O. Vignesh, A. Prakash","doi":"10.1002/cpe.7383","DOIUrl":"https://doi.org/10.1002/cpe.7383","url":null,"abstract":"A highly challenging aspect of the data compression technique is maintaining the quality of data that reconstructs in high compression rates. To overcome these limitations, a bilateral anisotropic Gabor wavelet transformation with deep stacked auto encoding (BAGWT‐DSAE) technique based lossesless image compression is proposed in this article to save the storage space and processing time during transferring the images. The proposed method contains three main processes namely preprocessing, compression and decompression. Initially input aerial image and digital image are taken and these images are given bilateral filter based preprocessing for eliminates the different types of noises and also multiple artifacts. Then the preprocessed images are given to anisotropic Gabor wavelet transformation based deep stacked auto encoding to compress and decompress the wavelet transform's sensitive sub‐bands effectually. In DSAE, the decoder of the auto encoder achieves a better quality decompressed image. The proposed method is implemented in MATLAB simulations run in PC through Intel Core, 8 GB of RAM, 2.50 GHz CPU and Windows 8. Then, the simulation performance of proposed BAGWT‐DSAE‐LIC method provides 20.23%, 24.85%, and 38.56% low compression ratio and 26.48%, 21.23%, and 12.53% lower computational time, 4.56%, 7.68%, and 8.34% high space saving than the existing methods.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87793529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The usage of cybernetic in complex software systems and its application to the deterministic multithreading 控制论在复杂软件系统中的应用及其在确定性多线程中的应用
Pub Date : 2022-10-31 DOI: 10.1002/cpe.7375
E. M. Bozkurt
In this paper, a new cybernetic control technology that can be used in complex software systems will be introduced. In this approach, the software systems are governed by cybernetic control objects and the class libraries defining the types of these cybernetic control objects are produced by special meta‐programming platforms. In this approach, the requirements of the software to be developed are received from the programmer by meta‐programming systems before coding. Actually, the cybernetic control objects have standard design and properties and the programmers only determine the quantities and the locations of these properties before library production process. Then, the meta‐programming platforms build project‐specific class libraries based on previously determined code templates. By this way, the cybernetic control objects are constructed with optimal memory and they can receive feedback about ongoing operations on the process. With the help of the feedback coming from the process, the control objects steer the process in the line of the programmer directives. By this way, the control of the programmer on the software increases significantly. In addition, in this paper, a typical application of this approach to the multithread programming will be introduced.
本文将介绍一种可用于复杂软件系统的新型控制论控制技术。在这种方法中,软件系统由控制论控制对象控制,定义这些控制论控制对象类型的类库由特殊的元编程平台生成。在这种方法中,要开发的软件的需求在编码之前由元编程系统从程序员那里接收。实际上,控制论控制对象具有标准的设计和属性,程序员只是在库生成过程之前确定这些属性的数量和位置。然后,元编程平台基于先前确定的代码模板构建特定于项目的类库。通过这种方式,控制论控制对象被构建为具有最优内存的对象,并且它们可以接收到过程中正在进行的操作的反馈。在来自过程的反馈的帮助下,控制对象按照程序员指令的方向引导过程。通过这种方式,程序员对软件的控制显著增加。此外,本文还介绍了该方法在多线程编程中的典型应用。
{"title":"The usage of cybernetic in complex software systems and its application to the deterministic multithreading","authors":"E. M. Bozkurt","doi":"10.1002/cpe.7375","DOIUrl":"https://doi.org/10.1002/cpe.7375","url":null,"abstract":"In this paper, a new cybernetic control technology that can be used in complex software systems will be introduced. In this approach, the software systems are governed by cybernetic control objects and the class libraries defining the types of these cybernetic control objects are produced by special meta‐programming platforms. In this approach, the requirements of the software to be developed are received from the programmer by meta‐programming systems before coding. Actually, the cybernetic control objects have standard design and properties and the programmers only determine the quantities and the locations of these properties before library production process. Then, the meta‐programming platforms build project‐specific class libraries based on previously determined code templates. By this way, the cybernetic control objects are constructed with optimal memory and they can receive feedback about ongoing operations on the process. With the help of the feedback coming from the process, the control objects steer the process in the line of the programmer directives. By this way, the control of the programmer on the software increases significantly. In addition, in this paper, a typical application of this approach to the multithread programming will be introduced.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80212365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
BAC: A block alliance consensus mechanism for the mine consortium blockchain BAC:矿商联盟区块链的区块联盟共识机制
Pub Date : 2022-10-31 DOI: 10.1002/cpe.7344
Ying-shun Wang, Yulan Ma, Yan Qiang, Juanjuan Zhao, Yi Li, Keqin Li
Safety is an important issue in the mining industry and the Internet of Things (IoT) plays an important role to enhance the safety of the underground working environment. The IoT is used to transfer data generated by underground sensors to cloud storage for further processing. However, third‐party platforms are often a target for cyber attacks. Serious mining accidents might occur if the data were tampered with. In the overground scenario, the security of trading data is also an important issue. The Mine Consortium Blockchain (MCB) is proposed to solve the above problems. The MCB avoids the risk of centralized storage and enables data security, provenance and transparency by taking advantage of blockchain technology. The MCB platform ensures that only designated participants can process mineral data. Any violation is immutably recorded in the MCB and is easily traced back by other participants. Classical consensus mechanisms as the core technology of the blockchain cannot be directly and appropriately applied to the mining industry. A Block Alliance Consensus (BAC) mechanism, which is suitable for all consortium blockchain scenarios, is proposed to improve the performance of the MCB. In addition, the block structure of the underground sensor data is optimized: the blocks only contain a hash of the sensor data and the data being stored in the cloud. The efficiency of the BAC is demonstrated by simulation experiments where the performance of the BAC consensus mechanism is compared with with the performance of classical consensus mechanisms. The MCB and the BAC consensus mechanism were also implemented on Hyperledger Fabric. Finally the Hyperledger Caliper evaluation tool was used to evaluate the performance of the system.
安全是矿山行业的一个重要问题,物联网(IoT)对提高井下工作环境的安全性起着重要作用。物联网用于将地下传感器产生的数据传输到云存储以进行进一步处理。然而,第三方平台经常成为网络攻击的目标。如果数据被篡改,可能会发生严重的采矿事故。在地上场景中,交易数据的安全性也是一个重要的问题。为了解决上述问题,提出了矿山联盟区块链(MCB)。MCB通过利用区块链技术,避免了集中存储的风险,实现了数据的安全性、溯源性和透明性。MCB平台确保只有指定的参与者才能处理矿物数据。任何违规行为都不可更改地记录在MCB中,并且很容易被其他参与者追溯。经典共识机制作为区块链的核心技术,并不能直接恰当地应用于采矿业。提出了一种适用于所有联盟区块链场景的区块联盟共识(Block Alliance Consensus, BAC)机制,以提高MCB的性能。此外,对地下传感器数据的块结构进行了优化:块中只包含传感器数据的哈希值和存储在云中的数据。通过仿真实验,将BAC共识机制的性能与经典共识机制的性能进行了比较,验证了BAC的有效性。MCB和BAC共识机制也在Hyperledger Fabric上实现。最后利用Hyperledger Caliper评价工具对系统的性能进行了评价。
{"title":"BAC: A block alliance consensus mechanism for the mine consortium blockchain","authors":"Ying-shun Wang, Yulan Ma, Yan Qiang, Juanjuan Zhao, Yi Li, Keqin Li","doi":"10.1002/cpe.7344","DOIUrl":"https://doi.org/10.1002/cpe.7344","url":null,"abstract":"Safety is an important issue in the mining industry and the Internet of Things (IoT) plays an important role to enhance the safety of the underground working environment. The IoT is used to transfer data generated by underground sensors to cloud storage for further processing. However, third‐party platforms are often a target for cyber attacks. Serious mining accidents might occur if the data were tampered with. In the overground scenario, the security of trading data is also an important issue. The Mine Consortium Blockchain (MCB) is proposed to solve the above problems. The MCB avoids the risk of centralized storage and enables data security, provenance and transparency by taking advantage of blockchain technology. The MCB platform ensures that only designated participants can process mineral data. Any violation is immutably recorded in the MCB and is easily traced back by other participants. Classical consensus mechanisms as the core technology of the blockchain cannot be directly and appropriately applied to the mining industry. A Block Alliance Consensus (BAC) mechanism, which is suitable for all consortium blockchain scenarios, is proposed to improve the performance of the MCB. In addition, the block structure of the underground sensor data is optimized: the blocks only contain a hash of the sensor data and the data being stored in the cloud. The efficiency of the BAC is demonstrated by simulation experiments where the performance of the BAC consensus mechanism is compared with with the performance of classical consensus mechanisms. The MCB and the BAC consensus mechanism were also implemented on Hyperledger Fabric. Finally the Hyperledger Caliper evaluation tool was used to evaluate the performance of the system.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"34 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85859043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Concurrency and Computation: Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1