首页 > 最新文献

Concurrency and Computation: Practice and Experience最新文献

英文 中文
FTPS: Efficient fault‐tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy FTPS:有效的容错动态短语搜索外包加密数据与向前和向后的隐私
Pub Date : 2022-10-07 DOI: 10.1002/cpe.7360
You-sheng Zhou, Kexin Liu, P. Vijayakumar
With the popularity of cloud computing, more and more users store sensitive information in cloud servers. In order to protect the data over the cloud server, symmetric encryption with keyword search has been developed and the phrase search has been proposed subsequently to overcome the inefficiency produced by single/multi‐keyword search. However, most existing phrase search schemes fails to support fault‐tolerant search which is essential to users. Therefore, this paper proposes a fault‐tolerant dynamic phrase search scheme with forward privacy and backward privacy (FTPS). Piecewise Linear Chaotic Map and minhash function are used to blur information, and Bloom filter based index is constructed to realize efficient search and dynamic update simultaneously. Security analysis proves that FTPS can properly preserve the privacy of search user, and experimental results show that FTPS is practical.
随着云计算的普及,越来越多的用户将敏感信息存储在云服务器上。为了保护云服务器上的数据,开发了具有关键字搜索的对称加密,随后提出了短语搜索,以克服单/多关键字搜索产生的低效率。然而,大多数现有的短语搜索方案不支持对用户至关重要的容错搜索。因此,本文提出了一种具有前向隐私和后向隐私(FTPS)的容错动态短语搜索方案。采用分段线性混沌映射和散列函数对信息进行模糊处理,构建基于布隆过滤器的索引,实现高效搜索和动态更新。安全性分析证明了FTPS可以很好地保护搜索用户的隐私,实验结果表明了FTPS的实用性。
{"title":"FTPS: Efficient fault‐tolerant dynamic phrase search over outsourced encrypted data with forward and backward privacy","authors":"You-sheng Zhou, Kexin Liu, P. Vijayakumar","doi":"10.1002/cpe.7360","DOIUrl":"https://doi.org/10.1002/cpe.7360","url":null,"abstract":"With the popularity of cloud computing, more and more users store sensitive information in cloud servers. In order to protect the data over the cloud server, symmetric encryption with keyword search has been developed and the phrase search has been proposed subsequently to overcome the inefficiency produced by single/multi‐keyword search. However, most existing phrase search schemes fails to support fault‐tolerant search which is essential to users. Therefore, this paper proposes a fault‐tolerant dynamic phrase search scheme with forward privacy and backward privacy (FTPS). Piecewise Linear Chaotic Map and minhash function are used to blur information, and Bloom filter based index is constructed to realize efficient search and dynamic update simultaneously. Security analysis proves that FTPS can properly preserve the privacy of search user, and experimental results show that FTPS is practical.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"204 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82710766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Large scale instance segmentation of outdoor environment based on improved YOLACT 基于改进YOLACT的室外环境大规模实例分割
Pub Date : 2022-10-05 DOI: 10.1002/cpe.7370
Zichen Zhao, Xiliang Tong, Ying Sun, D. Bai, Xin Liu, Guojun Zhao, Hanwen Fan, Jun Li, Cejing Zou, Baojia Chen
Instance segmentation is a challenging task that requires both instance‐level and pixel‐level prediction and it has a wide range of applications in autonomous driving, video analysis, scene understandingand so on. The currently dominant instance segmentation methods have excellent accuracy, but they are slow, and the processing speed will be even less satisfactory if the input is a large‐scale image. In order to improve the efficiency and accuracy of instance segmentation of large‐scale images, this article modifies the backbone network based on YOLACT network, adds a multi‐information fusion module and provides an improved BiFPN method to achieve multi‐scale feature fusion, while adding two branches to the first level detector RetinaNet to achieve instance segmentation. The network model is tested on Cityscapes dataset and the results of the experiments show that the improved instance segmentation network in this article improves the accuracy while ensuring the speed of segmentation. The optimized network model size was reduced by 17% compared to YOLACT, and the mAP, mAP50, and mAP75 were improved by 18.3%, 32.1%, and 24.6%, respectively.
实例分割是一项具有挑战性的任务,需要实例级和像素级的预测,它在自动驾驶、视频分析、场景理解等领域有着广泛的应用。目前主流的实例分割方法具有良好的精度,但速度较慢,如果输入的是大尺度图像,处理速度就更不理想了。为了提高大尺度图像实例分割的效率和精度,本文在YOLACT网络的基础上对骨干网进行了改进,增加了多信息融合模块,提出了一种改进的BiFPN方法来实现多尺度特征融合,同时在一级检测器RetinaNet中增加了两个分支来实现实例分割。在cityscape数据集上对网络模型进行了测试,实验结果表明,本文改进的实例分割网络在保证分割速度的同时,提高了分割精度。与YOLACT相比,优化后的网络模型大小减少了17%,mAP、mAP50和mAP75分别提高了18.3%、32.1%和24.6%。
{"title":"Large scale instance segmentation of outdoor environment based on improved YOLACT","authors":"Zichen Zhao, Xiliang Tong, Ying Sun, D. Bai, Xin Liu, Guojun Zhao, Hanwen Fan, Jun Li, Cejing Zou, Baojia Chen","doi":"10.1002/cpe.7370","DOIUrl":"https://doi.org/10.1002/cpe.7370","url":null,"abstract":"Instance segmentation is a challenging task that requires both instance‐level and pixel‐level prediction and it has a wide range of applications in autonomous driving, video analysis, scene understandingand so on. The currently dominant instance segmentation methods have excellent accuracy, but they are slow, and the processing speed will be even less satisfactory if the input is a large‐scale image. In order to improve the efficiency and accuracy of instance segmentation of large‐scale images, this article modifies the backbone network based on YOLACT network, adds a multi‐information fusion module and provides an improved BiFPN method to achieve multi‐scale feature fusion, while adding two branches to the first level detector RetinaNet to achieve instance segmentation. The network model is tested on Cityscapes dataset and the results of the experiments show that the improved instance segmentation network in this article improves the accuracy while ensuring the speed of segmentation. The optimized network model size was reduced by 17% compared to YOLACT, and the mAP, mAP50, and mAP75 were improved by 18.3%, 32.1%, and 24.6%, respectively.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73998580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Empirical distribution function based dual use of auxiliary information for the improved estimation of finite population mean 基于经验分布函数的双重辅助信息的改进有限总体均值估计
Pub Date : 2022-10-01 DOI: 10.1002/cpe.7346
Abid Hussain, Kalim Ullah, S. A. Cheema, Akbar Ali Khan, Z. Hussain
This research primarily aims at the development of a new estimation scheme exploiting the argument of dual use of auxiliary information. The objectives are obtained by materializing the new family of estimators, where the dual use of Supplementary Information is substantiated with the launch of the empirical distribution function of the auxiliary variable. The comparative performance evaluation of the newly devised formation is enumerated with respect to the most efficient method, to the best of our knowledge till to date, of Haq et al. along with other promising families of Hussain and Haq and Grover and Kaur. The elaborative account of contemporary advents of the newly proposed family are documented throughout the article.
本研究的主要目的是开发一种利用辅助信息双重使用的新估计方案。目标是通过物化新的估计量族来获得的,其中补充信息的双重用途是通过启动辅助变量的经验分布函数来证实的。根据迄今为止我们所知的最有效的方法,对Haq等人以及Hussain、Haq、Grover和Kaur等其他有前途的家族,对新设计的地层进行了比较性能评估。新提出的家庭的当代来临的详细说明,记录在整个文章。
{"title":"Empirical distribution function based dual use of auxiliary information for the improved estimation of finite population mean","authors":"Abid Hussain, Kalim Ullah, S. A. Cheema, Akbar Ali Khan, Z. Hussain","doi":"10.1002/cpe.7346","DOIUrl":"https://doi.org/10.1002/cpe.7346","url":null,"abstract":"This research primarily aims at the development of a new estimation scheme exploiting the argument of dual use of auxiliary information. The objectives are obtained by materializing the new family of estimators, where the dual use of Supplementary Information is substantiated with the launch of the empirical distribution function of the auxiliary variable. The comparative performance evaluation of the newly devised formation is enumerated with respect to the most efficient method, to the best of our knowledge till to date, of Haq et al. along with other promising families of Hussain and Haq and Grover and Kaur. The elaborative account of contemporary advents of the newly proposed family are documented throughout the article.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83262948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
House price prediction using hedonic pricing model and machine learning techniques 利用享乐定价模型和机器学习技术进行房价预测
Pub Date : 2022-09-22 DOI: 10.1002/cpe.7342
John F. W. Zaki, A. Nayyar, Surjeet Dalal, Z. H. Ali
The problem with property valuation is that it is extremely complex. It is difficult to objectively model the pricing process or fairly estimate a property value. Many factors can contribute to this complexity such as spatial and time factors. Evaluators and researchers have been trying to model the process for centuries. Up until recently, when computer‐aided valuation systems provided better solutions in the data evaluation and real estate valuation. Nevertheless, they may suffer from low transparency, inaccuracy, and inefficiency. This work explores the ability of machine learning techniques (MLTs) in enhancing economic activities by increasing the accuracy of house price prediction. In this article, XGBoost algorithm has been integrated with outlier sum‐statistic (OS) approach. In the real estate industry, the price of property plays a crucial role in economic growth. The research attempts to predict the price of a house using MLTs. Here, the price of the property is predicted using Extreme Gradient (XG) boosting algorithm and hedonic regression pricing. Both XGBoost and hedonic pricing models use 13 variables as inputs to predict house prices. The contribution of this research lies in the practicality of using XGboost technique to predict house prices. Finally, the accuracy of the prediction algorithms is reported with XGBoosting showing the highest accuracy of 84.1% while the accuracy of the hedonic regression algorithm is 42%.
房地产估价的问题在于它极其复杂。客观地为定价过程建模或公平地估计财产价值是很困难的。许多因素会导致这种复杂性,例如空间和时间因素。几个世纪以来,评估人员和研究人员一直试图为这一过程建模。直到最近,当计算机辅助估值系统在数据评估和房地产估值提供了更好的解决方案。然而,它们可能存在透明度低、不准确和效率低下的问题。这项工作探讨了机器学习技术(mlt)通过提高房价预测的准确性来增强经济活动的能力。本文将XGBoost算法与离群值和统计(OS)方法相结合。在房地产行业,房地产价格对经济增长起着至关重要的作用。这项研究试图用mlt来预测房价。在这里,使用极端梯度(XG)增强算法和享乐回归定价来预测房产的价格。XGBoost和享乐定价模型都使用13个变量作为预测房价的输入。本研究的贡献在于使用XGboost技术预测房价的实用性。最后,报告了预测算法的准确率,其中XGBoosting算法的准确率最高,为84.1%,而hedonic regression算法的准确率为42%。
{"title":"House price prediction using hedonic pricing model and machine learning techniques","authors":"John F. W. Zaki, A. Nayyar, Surjeet Dalal, Z. H. Ali","doi":"10.1002/cpe.7342","DOIUrl":"https://doi.org/10.1002/cpe.7342","url":null,"abstract":"The problem with property valuation is that it is extremely complex. It is difficult to objectively model the pricing process or fairly estimate a property value. Many factors can contribute to this complexity such as spatial and time factors. Evaluators and researchers have been trying to model the process for centuries. Up until recently, when computer‐aided valuation systems provided better solutions in the data evaluation and real estate valuation. Nevertheless, they may suffer from low transparency, inaccuracy, and inefficiency. This work explores the ability of machine learning techniques (MLTs) in enhancing economic activities by increasing the accuracy of house price prediction. In this article, XGBoost algorithm has been integrated with outlier sum‐statistic (OS) approach. In the real estate industry, the price of property plays a crucial role in economic growth. The research attempts to predict the price of a house using MLTs. Here, the price of the property is predicted using Extreme Gradient (XG) boosting algorithm and hedonic regression pricing. Both XGBoost and hedonic pricing models use 13 variables as inputs to predict house prices. The contribution of this research lies in the practicality of using XGboost technique to predict house prices. Finally, the accuracy of the prediction algorithms is reported with XGBoosting showing the highest accuracy of 84.1% while the accuracy of the hedonic regression algorithm is 42%.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80850659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Weighted ridge and Liu estimators for linear regression model 线性回归模型的加权脊估计和刘估计
Pub Date : 2022-09-22 DOI: 10.1002/cpe.7343
I. Babar, S. Chand
In linear regression model, ridge regression and two‐parameter Liu estimator (LE) are the most widely used methods in recent decade to overcome the problem of multicollinearity especially for ill conditioned cases. In this article, we propose new weighted ridge and Liu estimators which remain positive for each level of multicollinearity and also give smaller mean squared error (MSE) than the existing ridge regression and existing Liu estimators. In addition, a new adaptive LE for k which accounts for the error variance is also proposed to assess the ill condition cases. Furthermore, new weighted ridge estimator of Kibria arithmetic mean method and two parameter Liu estimator with Liu method are also proposed. Extensive Monte‐Carlo simulations are used to evaluate the performance of proposed estimators. Based on MSE criterion, the proposed estimators perform better than the existing estimators in many situations including severe multicollinearity and small signal‐to‐ noise ratio. Two real life applications are also provided to illustrate the usefulness of new estimators.
在线性回归模型中,脊回归和双参数刘氏估计(LE)是近十年来应用最广泛的方法来克服多重共线性问题,特别是在病态情况下。在本文中,我们提出了新的加权ridge和Liu估计,它们对每一级多重共线性都保持正,并且比现有的ridge回归和Liu估计给出更小的均方误差(MSE)。此外,还提出了一种新的考虑误差方差的k自适应LE来评估病态情况。此外,还提出了Kibria算术平均法的加权脊估计和Liu法的两参数Liu估计。广泛的蒙特卡罗模拟用于评估所提出的估计器的性能。在严重多重共线性和小信噪比等情况下,基于MSE准则的估计器比现有估计器表现更好。还提供了两个实际应用来说明新估计器的有用性。
{"title":"Weighted ridge and Liu estimators for linear regression model","authors":"I. Babar, S. Chand","doi":"10.1002/cpe.7343","DOIUrl":"https://doi.org/10.1002/cpe.7343","url":null,"abstract":"In linear regression model, ridge regression and two‐parameter Liu estimator (LE) are the most widely used methods in recent decade to overcome the problem of multicollinearity especially for ill conditioned cases. In this article, we propose new weighted ridge and Liu estimators which remain positive for each level of multicollinearity and also give smaller mean squared error (MSE) than the existing ridge regression and existing Liu estimators. In addition, a new adaptive LE for k which accounts for the error variance is also proposed to assess the ill condition cases. Furthermore, new weighted ridge estimator of Kibria arithmetic mean method and two parameter Liu estimator with Liu method are also proposed. Extensive Monte‐Carlo simulations are used to evaluate the performance of proposed estimators. Based on MSE criterion, the proposed estimators perform better than the existing estimators in many situations including severe multicollinearity and small signal‐to‐ noise ratio. Two real life applications are also provided to illustrate the usefulness of new estimators.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89514882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intrusion detection framework using auto‐metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT network 物联网网络中基于混合啄木鸟交配和卷尾猴搜索优化算法的自动度量图神经网络入侵检测框架
Pub Date : 2022-09-21 DOI: 10.1002/cpe.7197
Shanthi Govindaraju, Wilson Vimala Rani Vinisha, Francis H. Shajin, D. A. Sivasakthi
Intrusion detection systems (IDSs) are the major component of safe network. Due to the high volume of network data, the false alarm report of intrusion to the network and intrusion detection accuracy is the problem of these security systems. The reliability of Internet of Things (IoT) connected devices based on security model is employed to protect user data and preventing devices from engaging in malicious activity. In this article, intrusion detection framework using auto‐metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT Network (IDF‐AGNN‐HYB‐WMA‐CSOA‐ IoT) is proposed. Initially the attacks affected in the IoT data is taken from the dataset such as CSIC 2010 dataset, ISCXIDS2012 dataset, then these data are preprocessed and the features are extracted to remove the redundant information using improved random forest with local least squares. Then the malicious attacks and the normal attacks are classified using the auto‐metric graph neural network. At last hybrid woodpecker mating and capuchin search optimization algorithm (Hyb‐WMA‐CSOA) is utilized to optimize the weight parameters of AGNN. The performance of ISCXIDS2012 dataset of the proposed method shows higher accuracy 25.37%, 29.57%, and 18.67%, compared with existing methods, such as IDF‐ANN‐IoT, IDF‐BMM‐IoT and IDF‐DNN‐IoT respectively.
入侵检测系统(ids)是安全网络的重要组成部分。由于网络数据量大,入侵对网络的误报和入侵检测的准确性是这些安全系统面临的问题。利用基于安全模型的物联网连接设备的可靠性来保护用户数据,防止设备参与恶意活动。在物联网网络(IDF - AGNN - HYB - WMA - CSOA - IoT)中,提出了基于混合啄木鸟交配和卷尾猴搜索优化算法的自动度量图神经网络入侵检测框架。首先从CSIC 2010数据集、ISCXIDS2012数据集等数据集中提取物联网数据中受影响的攻击,然后对这些数据进行预处理,利用改进的局部最小二乘随机森林提取特征,去除冗余信息。然后利用自度量图神经网络对恶意攻击和正常攻击进行分类。最后利用混合啄木鸟交配和卷尾猴搜索优化算法(Hyb - WMA - CSOA)对AGNN的权重参数进行优化。在ISCXIDS2012数据集上,与现有方法(IDF‐ANN‐IoT、IDF‐BMM‐IoT和IDF‐DNN‐IoT)相比,本文方法的准确率分别为25.37%、29.57%和18.67%。
{"title":"Intrusion detection framework using auto‐metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT network","authors":"Shanthi Govindaraju, Wilson Vimala Rani Vinisha, Francis H. Shajin, D. A. Sivasakthi","doi":"10.1002/cpe.7197","DOIUrl":"https://doi.org/10.1002/cpe.7197","url":null,"abstract":"Intrusion detection systems (IDSs) are the major component of safe network. Due to the high volume of network data, the false alarm report of intrusion to the network and intrusion detection accuracy is the problem of these security systems. The reliability of Internet of Things (IoT) connected devices based on security model is employed to protect user data and preventing devices from engaging in malicious activity. In this article, intrusion detection framework using auto‐metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT Network (IDF‐AGNN‐HYB‐WMA‐CSOA‐ IoT) is proposed. Initially the attacks affected in the IoT data is taken from the dataset such as CSIC 2010 dataset, ISCXIDS2012 dataset, then these data are preprocessed and the features are extracted to remove the redundant information using improved random forest with local least squares. Then the malicious attacks and the normal attacks are classified using the auto‐metric graph neural network. At last hybrid woodpecker mating and capuchin search optimization algorithm (Hyb‐WMA‐CSOA) is utilized to optimize the weight parameters of AGNN. The performance of ISCXIDS2012 dataset of the proposed method shows higher accuracy 25.37%, 29.57%, and 18.67%, compared with existing methods, such as IDF‐ANN‐IoT, IDF‐BMM‐IoT and IDF‐DNN‐IoT respectively.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"154 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73456625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A hybrid soft computing technique for intrusion detection in web and cloud environment 一种用于网络和云环境下入侵检测的混合软计算技术
Pub Date : 2022-08-29 DOI: 10.1002/cpe.7046
K. Maheswari, C. Siva, G. Nalinipriya
Cloud computing environment contains important, essential, or confidential information; therefore, a security solution is needed to prevent this environment from potential attacks. In short, cloud computing has become one of the most sought after technologies in the field of information technology, and among the most dangerous threats. In this article, we propose a hybrid soft computing technique for intrusion detection in web and cloud environment (ST‐IDS). In ST‐IDS, we illustrate whale integrated slap swarm optimization algorithm for pre‐processing which remove the unwanted/repeated data's in dataset. We introduce new clustering technique based on modified tug‐of‐war optimization algorithm which groups the data in different segments. Then, we develop hybrid machine learning technique that is, capsule learning based neural network which categorize the attack in cloud environment. Finally, the proposed ST‐IDS technique can evaluate through standard open source datasets are KDD cup'99 and NSL‐KDD. The performance comparison of the proposed ST‐IDS technique using existing innovative technologies in terms of accuracy, precession, recall, specificity, F measure, false positive rate, and false negative rate.
云计算环境包含重要、必要或机密信息;因此,需要一个安全解决方案来防止该环境受到潜在的攻击。简而言之,云计算已经成为信息技术领域中最受追捧的技术之一,也是最危险的威胁之一。在本文中,我们提出了一种混合软计算技术用于网络和云环境下的入侵检测(ST‐IDS)。在ST‐IDS中,我们展示了用于预处理的鲸鱼集成拍打群优化算法,该算法可以去除数据集中不需要的/重复的数据。本文介绍了一种基于改进的拔河优化算法的聚类技术,该算法将数据分组在不同的片段中。然后,我们开发了混合机器学习技术,即基于胶囊学习的神经网络,对云环境下的攻击进行分类。最后,本文提出的ST‐IDS技术可以通过KDD cup'99和NSL‐KDD等标准开源数据集进行评估。在准确性、进动率、召回率、特异性、F测量值、假阳性率和假阴性率方面,对现有创新技术的ST‐IDS技术进行性能比较。
{"title":"A hybrid soft computing technique for intrusion detection in web and cloud environment","authors":"K. Maheswari, C. Siva, G. Nalinipriya","doi":"10.1002/cpe.7046","DOIUrl":"https://doi.org/10.1002/cpe.7046","url":null,"abstract":"Cloud computing environment contains important, essential, or confidential information; therefore, a security solution is needed to prevent this environment from potential attacks. In short, cloud computing has become one of the most sought after technologies in the field of information technology, and among the most dangerous threats. In this article, we propose a hybrid soft computing technique for intrusion detection in web and cloud environment (ST‐IDS). In ST‐IDS, we illustrate whale integrated slap swarm optimization algorithm for pre‐processing which remove the unwanted/repeated data's in dataset. We introduce new clustering technique based on modified tug‐of‐war optimization algorithm which groups the data in different segments. Then, we develop hybrid machine learning technique that is, capsule learning based neural network which categorize the attack in cloud environment. Finally, the proposed ST‐IDS technique can evaluate through standard open source datasets are KDD cup'99 and NSL‐KDD. The performance comparison of the proposed ST‐IDS technique using existing innovative technologies in terms of accuracy, precession, recall, specificity, F measure, false positive rate, and false negative rate.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"88 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84569995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PreF: Predicting job failure on supercomputers with job path and user behavior PreF:用作业路径和用户行为预测超级计算机上的作业失败
Pub Date : 2022-08-21 DOI: 10.1002/cpe.7202
Gang Xian, Xiaorong Zhang, Jie Yu, Guijuan Wang, Wenxiang Yang, Longfang Zhou, Yadong Wu, Xuejun Li, Xin He
Large numbers of jobs are executed on supercomputers almost every day. Unfortunately, many jobs would fail for various reasons, resulting in the waste of resources and the prolonged waiting time for queuing jobs. Job failure prediction can guide adjustment measures in advance, which is vital to the system's overall execution efficiency and reliability. Aiming at the problem that the existing job failure prediction methods are single, the collection of job features is complex and challenging to apply. This article strives to study whether these failed jobs can be predicted with known and synthetic features. We perform a comprehensive analysis of large amounts of historical data and various features and find that two novel features (running path and retry count) can predict job failure well. The running path indicates the application type a job belongs to, and the retry count reflects the user's behavior when the job fails. We propose a job failure prediction framework called PreF on supercomputers using machine learning based on the novel features. The experimental results show that PreF can correctly identify over 89% of jobs, outperforming the latest related methods on the comprehensive evaluation indicator (S_score) by around 4%.
几乎每天都有大量的任务在超级计算机上执行。不幸的是,许多作业会由于各种原因而失败,从而导致资源浪费和排队作业的等待时间延长。作业失效预测可以提前指导调整措施,对系统的整体执行效率和可靠性至关重要。针对现有作业失效预测方法单一、作业特征集合复杂、应用难度大的问题。本文试图研究这些失败的工作是否可以用已知的和综合的特征来预测。我们对大量的历史数据和各种特征进行了综合分析,发现两个新的特征(运行路径和重试计数)可以很好地预测作业失败。运行路径反映了作业所属的应用类型,重试次数反映了作业失败时用户的行为。我们提出了一个基于新特征的机器学习的超级计算机作业失败预测框架PreF。实验结果表明,PreF可以正确识别89%以上的工作,在综合评价指标(S_score)上比最新的相关方法高出约4%。
{"title":"PreF: Predicting job failure on supercomputers with job path and user behavior","authors":"Gang Xian, Xiaorong Zhang, Jie Yu, Guijuan Wang, Wenxiang Yang, Longfang Zhou, Yadong Wu, Xuejun Li, Xin He","doi":"10.1002/cpe.7202","DOIUrl":"https://doi.org/10.1002/cpe.7202","url":null,"abstract":"Large numbers of jobs are executed on supercomputers almost every day. Unfortunately, many jobs would fail for various reasons, resulting in the waste of resources and the prolonged waiting time for queuing jobs. Job failure prediction can guide adjustment measures in advance, which is vital to the system's overall execution efficiency and reliability. Aiming at the problem that the existing job failure prediction methods are single, the collection of job features is complex and challenging to apply. This article strives to study whether these failed jobs can be predicted with known and synthetic features. We perform a comprehensive analysis of large amounts of historical data and various features and find that two novel features (running path and retry count) can predict job failure well. The running path indicates the application type a job belongs to, and the retry count reflects the user's behavior when the job fails. We propose a job failure prediction framework called PreF on supercomputers using machine learning based on the novel features. The experimental results show that PreF can correctly identify over 89% of jobs, outperforming the latest related methods on the comprehensive evaluation indicator (S_score) by around 4%.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81069682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reform mode of sports training and competition organization based on data mining 基于数据挖掘的体育训练与比赛组织模式改革
Pub Date : 2022-08-19 DOI: 10.1002/cpe.7291
Li Wan
{"title":"Reform mode of sports training and competition organization based on data mining","authors":"Li Wan","doi":"10.1002/cpe.7291","DOIUrl":"https://doi.org/10.1002/cpe.7291","url":null,"abstract":"","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90292062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering‐based routing protocol using gray wolf optimization and technique for order of preference by similarity to ideal solution algorithms in the vehicular ad hoc networks 基于聚类的路由协议,使用灰狼优化技术,通过与车辆自组织网络中理想解决方案算法的相似性来确定优先顺序
Pub Date : 2022-08-15 DOI: 10.1002/cpe.7209
Behbod Kheradmand, A. Ghaffari, F. S. Gharehchopogh, Mohammad Masdari
In a vehicular ad‐hoc network (VANET), each vehicle is equipped with an on‐board unit to communicate vehicle to vehicle or vehicle to fixed infrastructure. VANET technology is offered to provide many facilities to passengers and drivers, including safety, entertainment, mobile commerce, driver assistance, and emergency alarms. VANET has unique features such as high‐speed node mobility and network topology dynamics. These special features cause many problems such as increased transmission delays and packet loss. On the other hand, providing a good routing plan for VANET is a critical issue. Therefore, this article proposes a cluster‐based routing using in‐vehicle meta‐heuristic algorithms (CRMHA‐VANET) which has two phases. In the first stage, the vehicles are clustered and the most suitable cluster head (CH) is selected using the gray wolf optimization algorithm (GWO). In the next step, the next suitable CH is selected for data transmission in direct paths using the technique for order of preference by similarity to ideal solution (TOPSIS). The performance of the proposed method is analyzed through several criteria such as package delivery rate, end‐to‐end delay and throughput. CRMHA‐VANET results in a 10% to 25% improvement over all performance metrics, that is, packet delivery rate, latency, and throughput, over CRBP (clustering routing based on PSO [particle swarm optimization]), WCV (weight based clustering for VANET), and AODV‐CD methods.
在车辆自组织网络(VANET)中,每辆车都配备了车载单元,用于车辆之间或车辆与固定基础设施之间的通信。VANET技术为乘客和司机提供了许多设施,包括安全、娱乐、移动商务、驾驶辅助和紧急警报。VANET具有高速节点移动性和网络拓扑动态等独特特性。这些特殊的特性导致了许多问题,如增加的传输延迟和数据包丢失。另一方面,为VANET提供一个好的路由方案是一个关键问题。因此,本文提出了一种使用车载元启发式算法(CRMHA - VANET)的基于集群的路由方法,该方法分为两个阶段。第一阶段,采用灰狼优化算法对车辆进行聚类,选择最合适的簇头CH;在下一步中,使用与理想解相似度排序(TOPSIS)技术选择下一个合适的CH进行直接路径上的数据传输。通过包裹投递率、端到端延迟和吞吐量等指标分析了该方法的性能。与CRBP(基于PSO[粒子群优化]的聚类路由)、WCV(基于VANET的权重聚类)和AODV - CD方法相比,CRMHA - VANET的所有性能指标(即数据包投递率、延迟和吞吐量)提高了10%至25%。
{"title":"Clustering‐based routing protocol using gray wolf optimization and technique for order of preference by similarity to ideal solution algorithms in the vehicular ad hoc networks","authors":"Behbod Kheradmand, A. Ghaffari, F. S. Gharehchopogh, Mohammad Masdari","doi":"10.1002/cpe.7209","DOIUrl":"https://doi.org/10.1002/cpe.7209","url":null,"abstract":"In a vehicular ad‐hoc network (VANET), each vehicle is equipped with an on‐board unit to communicate vehicle to vehicle or vehicle to fixed infrastructure. VANET technology is offered to provide many facilities to passengers and drivers, including safety, entertainment, mobile commerce, driver assistance, and emergency alarms. VANET has unique features such as high‐speed node mobility and network topology dynamics. These special features cause many problems such as increased transmission delays and packet loss. On the other hand, providing a good routing plan for VANET is a critical issue. Therefore, this article proposes a cluster‐based routing using in‐vehicle meta‐heuristic algorithms (CRMHA‐VANET) which has two phases. In the first stage, the vehicles are clustered and the most suitable cluster head (CH) is selected using the gray wolf optimization algorithm (GWO). In the next step, the next suitable CH is selected for data transmission in direct paths using the technique for order of preference by similarity to ideal solution (TOPSIS). The performance of the proposed method is analyzed through several criteria such as package delivery rate, end‐to‐end delay and throughput. CRMHA‐VANET results in a 10% to 25% improvement over all performance metrics, that is, packet delivery rate, latency, and throughput, over CRBP (clustering routing based on PSO [particle swarm optimization]), WCV (weight based clustering for VANET), and AODV‐CD methods.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85334372","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Concurrency and Computation: Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1