首页 > 最新文献

Concurrency and Computation: Practice and Experience最新文献

英文 中文
Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment 区块链审计,公共云计算环境下最优的多密钥同态加密技术
Pub Date : 2022-08-09 DOI: 10.1002/cpe.7128
Venkata Naga Rani Bandaru, P. Visalakshi
Cloud storage is a significant cloud computing (CC) service which enables the client to save and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity of the CC environment, different kinds of security threats and susceptibilities are raised. Data integrity and privacy are the major problems in CC environment where the data can be saved in distinct geographic regions. So, privacy preservation and data integrity become important factors of the user concern related to the CC environment. Several auditing protocols are majorly dependent upon the conventional public key infrastructure, which led to high computational complexity and it is unsuitable for the setting of multiple users. To resolve these issues, this study develops a new block chain enabled auditing with optimal multi‐key homomorphic encryption (BEA‐OMKHE) technique for public cloud environment. The proposed BEA‐OMKHE technique aims to assure data integrity, security, and auditing in public cloud storage. Besides, an OMKHE technique is derived to accomplish data integrating into the cloud environment by the design of end to end encryption system. A secure generation of keys and encryption processes are carried out by the use of MKHE technique; thereby the data becomes highly secure. In addition, the choice of keys is performed by the improved beetle antenna search optimization (IBAS) algorithm. Therefore, the proposed BEA‐OMKHE technique offers an efficient way of enhancing the data integrity in CC method. The performance validation of the BEA‐OMKHE technique takes place and the results are inspected under various aspects. The comparative result analysis ensured the betterment of the BEA‐OMKHE technique interms of different measures such as communication cost, encryption time, decryption time, computation cost, privacy preserving rate, and authentication accuracy.
云存储是一种重要的云计算(CC)服务,它使客户端能够随时随地保存和检索数据。由于对CC环境的需求和熟悉程度的增加,提出了不同类型的安全威胁和脆弱性。数据完整性和隐私是CC环境中的主要问题,数据可以保存在不同的地理区域。因此,隐私保护和数据完整性成为用户关心的与CC环境相关的重要因素。一些审计协议主要依赖于传统的公钥基础设施,导致计算复杂度高,不适合多用户的设置。为了解决这些问题,本研究开发了一种新的区块链审计技术,该技术具有公共云环境下的最佳多密钥同态加密(BEA - OMKHE)技术。提出的BEA - OMKHE技术旨在确保公共云存储中的数据完整性、安全性和审计。通过端到端加密系统的设计,推导了OMKHE技术,实现了数据与云环境的集成。使用MKHE技术进行密钥和加密过程的安全生成;因此,数据变得高度安全。此外,键的选择采用改进的甲虫天线搜索优化算法()进行。因此,提出的BEA - OMKHE技术为CC方法中提高数据完整性提供了一种有效的方法。对BEA - OMKHE技术进行了性能验证,并从各个方面对结果进行了检查。对比结果分析确保了BEA - OMKHE技术在通信成本、加密时间、解密时间、计算成本、隐私保护率和认证精度等不同指标上的改进。
{"title":"Block chain enabled auditing with optimal multi‐key homomorphic encryption technique for public cloud computing environment","authors":"Venkata Naga Rani Bandaru, P. Visalakshi","doi":"10.1002/cpe.7128","DOIUrl":"https://doi.org/10.1002/cpe.7128","url":null,"abstract":"Cloud storage is a significant cloud computing (CC) service which enables the client to save and retrieve the data at anytime and anywhere. Due to the increased demand and familiarity of the CC environment, different kinds of security threats and susceptibilities are raised. Data integrity and privacy are the major problems in CC environment where the data can be saved in distinct geographic regions. So, privacy preservation and data integrity become important factors of the user concern related to the CC environment. Several auditing protocols are majorly dependent upon the conventional public key infrastructure, which led to high computational complexity and it is unsuitable for the setting of multiple users. To resolve these issues, this study develops a new block chain enabled auditing with optimal multi‐key homomorphic encryption (BEA‐OMKHE) technique for public cloud environment. The proposed BEA‐OMKHE technique aims to assure data integrity, security, and auditing in public cloud storage. Besides, an OMKHE technique is derived to accomplish data integrating into the cloud environment by the design of end to end encryption system. A secure generation of keys and encryption processes are carried out by the use of MKHE technique; thereby the data becomes highly secure. In addition, the choice of keys is performed by the improved beetle antenna search optimization (IBAS) algorithm. Therefore, the proposed BEA‐OMKHE technique offers an efficient way of enhancing the data integrity in CC method. The performance validation of the BEA‐OMKHE technique takes place and the results are inspected under various aspects. The comparative result analysis ensured the betterment of the BEA‐OMKHE technique interms of different measures such as communication cost, encryption time, decryption time, computation cost, privacy preserving rate, and authentication accuracy.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"150 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87272427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
F‐SWIR: Rumor Fick‐spreading model considering fusion information decay in social networks F - SWIR:考虑融合信息衰减的谣言传播模型
Pub Date : 2022-08-09 DOI: 10.1002/cpe.7166
Weimin Li, Dingmei Wei, Xiaokang Zhou, Shaohua Li, Qun Jin
The spread of rumors has a major negative impact on social stability. Traditional rumor spreading models are mostly based on infectious disease models and do not consider the influence of individual differences and the network structure on rumor spreading. In this paper, we propose a rumor Fick‐spreading model that integrates information decay in social networks. The dissemination of rumors in social networks is random and uncertain and is affected by the dissemination capabilities of individuals and the network environment. The rumor Fick‐transition coefficient and Fick‐transition gradient are defined to determine the influence of the individual transition capacity and the network environment on rumor propagation, respectively. The Fick‐state transition probability is used to describe the probability of change of an individual's state. Moreover, an information decay function is defined to characterize the self‐healing probability of individuals. According to the different roles and reactions of users during rumor dissemination, the user state and the rumor dissemination rules among users are refined, and the influence of the network structure on the rumor dissemination is ascertained. The experimental results demonstrate that the proposed model outperforms other rumor spread models.
谣言的传播对社会稳定有很大的负面影响。传统的谣言传播模型大多基于传染病模型,没有考虑个体差异和网络结构对谣言传播的影响。在本文中,我们提出了一个整合社交网络中信息衰减的谣言传播模型。谣言在社交网络中的传播具有随机性和不确定性,受个人传播能力和网络环境的影响。定义谣言的Fick - transition系数和Fick - transition梯度,分别确定个体转移能力和网络环境对谣言传播的影响。Fick - state转移概率用于描述个体状态变化的概率。此外,定义了一个信息衰减函数来表征个体的自愈概率。根据用户在谣言传播过程中的不同角色和反应,提炼用户状态和用户间的谣言传播规律,确定网络结构对谣言传播的影响。实验结果表明,该模型优于其他谣言传播模型。
{"title":"F‐SWIR: Rumor Fick‐spreading model considering fusion information decay in social networks","authors":"Weimin Li, Dingmei Wei, Xiaokang Zhou, Shaohua Li, Qun Jin","doi":"10.1002/cpe.7166","DOIUrl":"https://doi.org/10.1002/cpe.7166","url":null,"abstract":"The spread of rumors has a major negative impact on social stability. Traditional rumor spreading models are mostly based on infectious disease models and do not consider the influence of individual differences and the network structure on rumor spreading. In this paper, we propose a rumor Fick‐spreading model that integrates information decay in social networks. The dissemination of rumors in social networks is random and uncertain and is affected by the dissemination capabilities of individuals and the network environment. The rumor Fick‐transition coefficient and Fick‐transition gradient are defined to determine the influence of the individual transition capacity and the network environment on rumor propagation, respectively. The Fick‐state transition probability is used to describe the probability of change of an individual's state. Moreover, an information decay function is defined to characterize the self‐healing probability of individuals. According to the different roles and reactions of users during rumor dissemination, the user state and the rumor dissemination rules among users are refined, and the influence of the network structure on the rumor dissemination is ascertained. The experimental results demonstrate that the proposed model outperforms other rumor spread models.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"35 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73126309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A methodology for assessing computation/communication overlap of MPI nonblocking collectives 一种评估MPI非阻塞集体计算/通信重叠的方法
Pub Date : 2022-08-05 DOI: 10.1002/cpe.7168
Alexandre Denis, Julien Jaeger, E. Jeannot, Florian Reynier
By allowing computation/communication overlap, MPI nonblocking collectives (NBC) are supposed to improve application scalability and performance. However, it is known that to actually get overlap, the MPI library has to implement progression mechanisms in software or rely on the network hardware. These mechanisms may be present or not, adequate or perfectible, they may have an impact on communication performance or may interfere with computation by stealing CPU cycles. From a user point of view, assessing and understanding the behavior of an MPI library concerning computation/communication overlap is difficult. In this article, we propose a methodology to assess the computation/communication overlap of NBC. We propose new metrics to measure how much communication and computation do overlap, and to evaluate how they interfere with each other. We integrate these metrics into a complete methodology. We compare our methodology with state of the art metrics and benchmarks, and show that ours provides more meaningful informations. We perform experiments on a large panel of MPI implementations and network hardware and show when and why overlap is efficient, nonexistent or even degrades performance.
通过允许计算/通信重叠,MPI非阻塞集合(NBC)有望提高应用程序的可伸缩性和性能。然而,众所周知,要真正实现重叠,MPI库必须在软件中实现进度机制或依赖于网络硬件。这些机制可能存在,也可能不存在,可能是充分的,也可能是完善的,它们可能会影响通信性能,或者可能会通过窃取CPU周期来干扰计算。从用户的角度来看,评估和理解MPI库有关计算/通信重叠的行为是困难的。在本文中,我们提出了一种方法来评估NBC的计算/通信重叠。我们提出了新的指标来衡量有多少通信和计算重叠,并评估它们如何相互干扰。我们将这些指标集成到一个完整的方法中。我们将我们的方法与最先进的指标和基准进行比较,并表明我们的方法提供了更有意义的信息。我们在大量MPI实现和网络硬件上进行了实验,并展示了重叠在什么时候以及为什么是有效的、不存在的,甚至会降低性能。
{"title":"A methodology for assessing computation/communication overlap of MPI nonblocking collectives","authors":"Alexandre Denis, Julien Jaeger, E. Jeannot, Florian Reynier","doi":"10.1002/cpe.7168","DOIUrl":"https://doi.org/10.1002/cpe.7168","url":null,"abstract":"By allowing computation/communication overlap, MPI nonblocking collectives (NBC) are supposed to improve application scalability and performance. However, it is known that to actually get overlap, the MPI library has to implement progression mechanisms in software or rely on the network hardware. These mechanisms may be present or not, adequate or perfectible, they may have an impact on communication performance or may interfere with computation by stealing CPU cycles. From a user point of view, assessing and understanding the behavior of an MPI library concerning computation/communication overlap is difficult. In this article, we propose a methodology to assess the computation/communication overlap of NBC. We propose new metrics to measure how much communication and computation do overlap, and to evaluate how they interfere with each other. We integrate these metrics into a complete methodology. We compare our methodology with state of the art metrics and benchmarks, and show that ours provides more meaningful informations. We perform experiments on a large panel of MPI implementations and network hardware and show when and why overlap is efficient, nonexistent or even degrades performance.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89351200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Niyama: Node scheduling for cloud workloads with resource isolation Niyama:具有资源隔离的云工作负载的节点调度
Pub Date : 2022-08-05 DOI: 10.1002/cpe.7196
Meghana Thiyyakat, Subramaniam Kalambur, D. Sitaram
Cloud providers place tasks from multiple applications on the same resource pool to improve the resource utilization of the infrastructure. The consequent resource contention has an undesirable effect on latency‐sensitive tasks. In this article, we present Niyama—a resource isolation approach that uses a modified version of deadline scheduling to protect latency‐sensitive tasks from CPU bandwidth contention. Conventionally, deadline scheduling has been used to schedule real‐time tasks with well‐defined deadlines. Therefore, it cannot be used directly when the deadlines are unspecified. In Niyama, we estimate deadlines in intervals and secure bandwidth required for the interval, thereby ensuring optimal job response times. We compare our approach with cgroups: Linux's default resource isolation mechanism used in containers today. Our experiments show that Niyama reduces the average delay in tasks by 3 ×$$ times $$ –20 ×$$ times $$ when compared to cgroups. Since Linux's deadline scheduling policy is work‐conserving in nature, there is a small drop in the server‐level CPU utilization when Niyama is used naively. We demonstrate how the use of core reservation and oversubscription in the inter‐node scheduler can be used to offset this drop; our experiments show a 1.3 ×$$ times $$ –2.24 ×$$ times $$ decrease in delay in job response time over cgroups while achieving high CPU utilization.
云提供商将来自多个应用程序的任务放在同一个资源池上,以提高基础设施的资源利用率。随之而来的资源争用对延迟敏感的任务有不良影响。在本文中,我们介绍了niyama -一种资源隔离方法,该方法使用修改版本的截止日期调度来保护延迟敏感任务免受CPU带宽争用。传统上,截止日期调度已被用于调度实时任务与明确的截止日期。因此,在未指定截止日期时不能直接使用它。在Niyama中,我们以间隔估计最后期限和间隔所需的安全带宽,从而确保最佳的作业响应时间。我们将我们的方法与cgroups: Linux目前在容器中使用的默认资源隔离机制进行比较。我们的实验表明,与cgroups相比,Niyama将任务的平均延迟减少了3 × $$ times $$ -20 × $$ times $$。由于Linux的最后期限调度策略本质上是节省工作的,所以当Niyama被天真地使用时,服务器级CPU利用率会有一个小的下降。我们演示了如何在节点间调度程序中使用核心保留和超额订阅来抵消这种下降;我们的实验表明,在实现高CPU利用率的同时,作业响应时间延迟比cgroups减少了1.3 × $$ times $$ -2.24 × $$ times $$。
{"title":"Niyama: Node scheduling for cloud workloads with resource isolation","authors":"Meghana Thiyyakat, Subramaniam Kalambur, D. Sitaram","doi":"10.1002/cpe.7196","DOIUrl":"https://doi.org/10.1002/cpe.7196","url":null,"abstract":"Cloud providers place tasks from multiple applications on the same resource pool to improve the resource utilization of the infrastructure. The consequent resource contention has an undesirable effect on latency‐sensitive tasks. In this article, we present Niyama—a resource isolation approach that uses a modified version of deadline scheduling to protect latency‐sensitive tasks from CPU bandwidth contention. Conventionally, deadline scheduling has been used to schedule real‐time tasks with well‐defined deadlines. Therefore, it cannot be used directly when the deadlines are unspecified. In Niyama, we estimate deadlines in intervals and secure bandwidth required for the interval, thereby ensuring optimal job response times. We compare our approach with cgroups: Linux's default resource isolation mechanism used in containers today. Our experiments show that Niyama reduces the average delay in tasks by 3 ×$$ times $$ –20 ×$$ times $$ when compared to cgroups. Since Linux's deadline scheduling policy is work‐conserving in nature, there is a small drop in the server‐level CPU utilization when Niyama is used naively. We demonstrate how the use of core reservation and oversubscription in the inter‐node scheduler can be used to offset this drop; our experiments show a 1.3 ×$$ times $$ –2.24 ×$$ times $$ decrease in delay in job response time over cgroups while achieving high CPU utilization.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"90 8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87728387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud 一种高效的增强前缀哈希树模型,用于优化云存储和图像重复数据删除
Pub Date : 2022-08-05 DOI: 10.1002/cpe.7199
G. Sujatha, R. Raj
The popularity of the cloud storage space mainly attracted organizations to store their data in them. Therefore, the avoidance of duplicate data contents is unavoidable and several users share the cloud storage space for data storage, and sometimes this makes higher storage space utilization. Because of the extremely high duplicate copy, memory wastage arises in the case of multimedia data. Identifying the final duplicate copies in the cloud takes more time. To overcome this problem, we employ a significant storage optimization model for deduplication. The digital data hash value is stored by requiring an additional memory space. This study proposed an enhanced prefix hash tree (EPHT) method to optimize the image and text deduplication system to reduce the overhead caused by this procedure. The efficiency of the proposed approach is compared with the interpolation search technique using different levels of tree height (2, 4, 2, 8, 16) in terms of space and time complexity. The proposed EPHT technique shows improvements in terms of speed and space complexity when the number of levels in the EPHT increases.
云存储空间的流行主要吸引了组织将其数据存储在其中。因此,避免重复的数据内容是不可避免的,多个用户共享云存储空间进行数据存储,有时会提高存储空间的利用率。在多媒体数据的情况下,由于极高的重复副本,会产生内存浪费。识别云中的最终副本需要更多的时间。为了克服这个问题,我们为重复数据删除采用了一个重要的存储优化模型。数字数据散列值通过需要额外的内存空间来存储。本文提出了一种增强的前缀哈希树(EPHT)方法来优化图像和文本重复数据删除系统,以减少该过程带来的开销。在空间复杂度和时间复杂度方面,将该方法与使用不同树高(2,4,2,8,16)的插值搜索技术进行了比较。所提出的EPHT技术在速度和空间复杂性方面显示出当EPHT中的层数增加时的改进。
{"title":"An efficient enhanced prefix hash tree model for optimizing the storage and image deduplication in cloud","authors":"G. Sujatha, R. Raj","doi":"10.1002/cpe.7199","DOIUrl":"https://doi.org/10.1002/cpe.7199","url":null,"abstract":"The popularity of the cloud storage space mainly attracted organizations to store their data in them. Therefore, the avoidance of duplicate data contents is unavoidable and several users share the cloud storage space for data storage, and sometimes this makes higher storage space utilization. Because of the extremely high duplicate copy, memory wastage arises in the case of multimedia data. Identifying the final duplicate copies in the cloud takes more time. To overcome this problem, we employ a significant storage optimization model for deduplication. The digital data hash value is stored by requiring an additional memory space. This study proposed an enhanced prefix hash tree (EPHT) method to optimize the image and text deduplication system to reduce the overhead caused by this procedure. The efficiency of the proposed approach is compared with the interpolation search technique using different levels of tree height (2, 4, 2, 8, 16) in terms of space and time complexity. The proposed EPHT technique shows improvements in terms of speed and space complexity when the number of levels in the EPHT increases.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91104143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the application of artificial intelligence in computer network technology in the era of big data 大数据时代人工智能在计算机网络技术中的应用研究
Pub Date : 2022-08-04 DOI: 10.1002/cpe.7262
Zhenyu Xu
At present, artificial intelligence technology has been widely used. Artificial intelligence technology can not only enrich people's lives, effectively improve work efficiency, achieve technical development, but also improve the efficiency of enterprises, and bring rich profits for the development of enterprises. Therefore, the author systematically analyzes the advantages and disadvantages of AI technology, and expounds the application of AI technology in computer network technology from the aspects of network security technology, enterprise management technology, network system and evaluation technology.
{"title":"Research on the application of artificial intelligence in computer network technology in the era of big data","authors":"Zhenyu Xu","doi":"10.1002/cpe.7262","DOIUrl":"https://doi.org/10.1002/cpe.7262","url":null,"abstract":"At present, artificial intelligence technology has been widely used. Artificial intelligence technology can not only enrich people's lives, effectively improve work efficiency, achieve technical development, but also improve the efficiency of enterprises, and bring rich profits for the development of enterprises. Therefore, the author systematically analyzes the advantages and disadvantages of AI technology, and expounds the application of AI technology in computer network technology from the aspects of network security technology, enterprise management technology, network system and evaluation technology.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86162570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
FogiRecruiter: A fog‐enabled selection mechanism of crowdsourcing for disaster management FogiRecruiter:灾难管理众包的雾启用选择机制
Pub Date : 2022-08-03 DOI: 10.1002/cpe.7207
Riya Samanta, S. Ghosh
In the Internet of Things framework, crowdsourcing (CS) has played a significant role. A sufficient number of participants carrying sensors or IoT devices are necessary to obtain maximum coverage within a given budget for CS a task. Cloud computing is used for centralized processing, storage, and large‐scale data analysis. The delay associated with transferring data to cloud servers creates a time‐consuming decision‐making process. Fog computing is responsible for this capability. As a result, FogiRecruiter, a novel framework, is offered to efficiently choose participants for data collection from the vital environment while staying within a budget. We also utilize fuzzy logic to pick the best fog nodes for relaying data to them and then to faraway cloud servers. Realizing emergency communication, despite the fact that a direct connection to the cloud is inconvenient. Simulations and prototype testing are used to show the efficacy of the proposed approach.
在物联网框架中,众包(CS)发挥了重要作用。携带传感器或物联网设备的足够数量的参与者是必要的,以便在给定的CS任务预算内获得最大的覆盖范围。云计算用于集中处理、存储和大规模数据分析。与将数据传输到云服务器相关的延迟创建了一个耗时的决策过程。雾计算负责此功能。因此,FogiRecruiter提供了一个新颖的框架,可以在预算范围内有效地选择参与者从重要环境中收集数据。我们还利用模糊逻辑来选择最好的雾节点,将数据转发给它们,然后再转发给遥远的云服务器。实现紧急通信,尽管直接连接到云是不方便的。仿真和原型测试表明了该方法的有效性。
{"title":"FogiRecruiter: A fog‐enabled selection mechanism of crowdsourcing for disaster management","authors":"Riya Samanta, S. Ghosh","doi":"10.1002/cpe.7207","DOIUrl":"https://doi.org/10.1002/cpe.7207","url":null,"abstract":"In the Internet of Things framework, crowdsourcing (CS) has played a significant role. A sufficient number of participants carrying sensors or IoT devices are necessary to obtain maximum coverage within a given budget for CS a task. Cloud computing is used for centralized processing, storage, and large‐scale data analysis. The delay associated with transferring data to cloud servers creates a time‐consuming decision‐making process. Fog computing is responsible for this capability. As a result, FogiRecruiter, a novel framework, is offered to efficiently choose participants for data collection from the vital environment while staying within a budget. We also utilize fuzzy logic to pick the best fog nodes for relaying data to them and then to faraway cloud servers. Realizing emergency communication, despite the fact that a direct connection to the cloud is inconvenient. Simulations and prototype testing are used to show the efficacy of the proposed approach.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"21 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82124786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Detection and localization of image tampering in digital images with fused features 融合特征数字图像篡改检测与定位
Pub Date : 2022-08-03 DOI: 10.1002/cpe.7191
Mohassin Ahmad, F. Khursheed
In digital forensics, image tamper detection and localization have attracted increased attention in recent days, where the standard methods have limited description ability and high computational costs. As a result, this research introduces a novel picture tamper detection and localization model. Feature extraction, tamper detection, as well as tamper localization are the three major phases of the proposed model. From the input digital images, a group of features like “Scale‐based Adaptive Speeded Up Robust Features (SA‐SURF), Discrete Wavelet Transform (DWT) based Patched Local Vector Pattern (LVP) features, HoG feature with harmonic mean based PCA and MBFDF” are extracted. Then, with this extracted feature strain the “optimized Convolutional Neural Network (CNN)” will be trained in the tamper detection phase. Since it is the key decision‐maker about the presence/absence of tamper, its weighting parameters are fine‐tuned via a novel improved Sea‐lion Customized Firefly algorithm (ISCFF) model. This ensures the enhancement of detection accuracy. Once an image is recognized to have tampers, then it is essential to identify the tamper localization. In the tamper localization phase, the copy‐move tampers are localized using the SIFT features, splicing tampers are localized using the DBN and the noise inconsistency is localized with a newly introduced threshold‐based tamper localization technique. The simulation outcomes illustrate that the adopted model attains better tamper detection as well as localization performance over the existing methods.
近年来,在数字取证领域,图像篡改检测和定位受到越来越多的关注,标准方法的描述能力有限,计算成本高。因此,本研究引入了一种新的图像篡改检测与定位模型。特征提取、篡改检测和篡改定位是该模型的三个主要阶段。从输入的数字图像中提取出“基于尺度的自适应加速鲁棒特征(SA‐SURF)”、基于离散小波变换(DWT)的patch Local Vector Pattern (LVP)特征、基于谐波均值PCA和MBFDF的HoG特征等特征。然后,利用提取的特征应变,在篡改检测阶段训练“优化卷积神经网络(CNN)”。由于它是关于是否存在篡改的关键决策者,因此其权重参数通过一种新的改进的海狮定制萤火虫算法(ISCFF)模型进行微调。这保证了检测精度的提高。一旦识别出图像存在篡改,就必须确定篡改的位置。在篡改定位阶段,使用SIFT特征对复制-移动篡改进行定位,使用DBN对拼接篡改进行定位,使用新引入的基于阈值的篡改定位技术对噪声不一致性进行定位。仿真结果表明,所采用的模型比现有方法具有更好的篡改检测和定位性能。
{"title":"Detection and localization of image tampering in digital images with fused features","authors":"Mohassin Ahmad, F. Khursheed","doi":"10.1002/cpe.7191","DOIUrl":"https://doi.org/10.1002/cpe.7191","url":null,"abstract":"In digital forensics, image tamper detection and localization have attracted increased attention in recent days, where the standard methods have limited description ability and high computational costs. As a result, this research introduces a novel picture tamper detection and localization model. Feature extraction, tamper detection, as well as tamper localization are the three major phases of the proposed model. From the input digital images, a group of features like “Scale‐based Adaptive Speeded Up Robust Features (SA‐SURF), Discrete Wavelet Transform (DWT) based Patched Local Vector Pattern (LVP) features, HoG feature with harmonic mean based PCA and MBFDF” are extracted. Then, with this extracted feature strain the “optimized Convolutional Neural Network (CNN)” will be trained in the tamper detection phase. Since it is the key decision‐maker about the presence/absence of tamper, its weighting parameters are fine‐tuned via a novel improved Sea‐lion Customized Firefly algorithm (ISCFF) model. This ensures the enhancement of detection accuracy. Once an image is recognized to have tampers, then it is essential to identify the tamper localization. In the tamper localization phase, the copy‐move tampers are localized using the SIFT features, splicing tampers are localized using the DBN and the noise inconsistency is localized with a newly introduced threshold‐based tamper localization technique. The simulation outcomes illustrate that the adopted model attains better tamper detection as well as localization performance over the existing methods.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84515170","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier 基于多层DenseNet - ResNet结构和改进随机森林分类器的急性颅内出血亚型检测和分类
Pub Date : 2022-08-02 DOI: 10.1002/cpe.7167
B. M. Jenefer, K. Senathipathi, Aarthi, Annapandi
In this article, the detection and categorization of acute intracranial hemorrhage (ICH) subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier (IRF) is proposed to detect the subtypes of intracerebral hemorrhage with high accuracy and less computational time. Here, the brain CT images are taken from the physionet repository publicly dataset. Then the images are preprocessed to eliminate the unwanted noises. After that, the image features are extracted by using multilayer densely connected convolutional network (DenseNet) combined with residual network (ResNet) architecture with multiple convolutional layers. The subtypes are epidural hemorrhage (EDH), subarachnoid hemorrhage (SAH), intraparenchymal hemorrhage (IPH), subdural hemorrhage (SDH), intraventricular hemorrhage (IVH) are classified by using an IRF classifier with high accuracy. The simulation process is carried out in MATLAB site. The proposed multilayer‐DenseNet‐ResNet‐IRF attains higher accuracy 23.44%, 31.93%, 42.83%, 41.9% is compared with the existing methods, such as deep learning algorithm for automatic detection and classification of acute intracranial hemorrhages in head CT scans (ICH‐DC‐2D‐CNN), fusion‐based deep learning along nature‐inspired algorithm for the diagnosis of intracerebral hemorrhage (ICH‐DC‐FSVM), and detection of intracranial hemorrhage on CT scan images using convolutional neural network (ICH‐DC‐CNN) and double fully convolutional networks (FCNs), respectively.
本文提出了一种基于多层DenseNet - ResNet结构和改进的随机森林分类器(IRF)的急性颅内出血(ICH)亚型检测与分类方法,以高精度和更少的计算时间检测颅内出血亚型。这里,大脑CT图像取自physionet知识库公开数据集。然后对图像进行预处理,去除不需要的噪声。然后,采用多层密集连接卷积网络(DenseNet)结合多卷积层残差网络(ResNet)架构提取图像特征。其中,硬膜外出血(EDH)、蛛网膜下腔出血(SAH)、脑实质内出血(IPH)、硬膜下出血(SDH)、脑室内出血(IVH)是采用IRF分类器进行分类,准确率较高。仿真过程在MATLAB现场进行。与现有的深度学习算法(ICH - DC - 2D - CNN)、基于融合的深度学习算法(ICH - DC - FSVM)和基于自然启发的脑出血诊断算法(ICH - DC - FSVM)相比,本文提出的多层- DenseNet - ResNet - IRF的准确率分别为23.44%、31.93%、42.83%和41.9%。分别利用卷积神经网络(ICH - DC - CNN)和双全卷积网络(fcnn)对CT扫描图像进行颅内出血检测。
{"title":"Detection and categorization of acute intracranial hemorrhage subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier","authors":"B. M. Jenefer, K. Senathipathi, Aarthi, Annapandi","doi":"10.1002/cpe.7167","DOIUrl":"https://doi.org/10.1002/cpe.7167","url":null,"abstract":"In this article, the detection and categorization of acute intracranial hemorrhage (ICH) subtypes using a multilayer DenseNet‐ResNet architecture with improved random forest classifier (IRF) is proposed to detect the subtypes of intracerebral hemorrhage with high accuracy and less computational time. Here, the brain CT images are taken from the physionet repository publicly dataset. Then the images are preprocessed to eliminate the unwanted noises. After that, the image features are extracted by using multilayer densely connected convolutional network (DenseNet) combined with residual network (ResNet) architecture with multiple convolutional layers. The subtypes are epidural hemorrhage (EDH), subarachnoid hemorrhage (SAH), intraparenchymal hemorrhage (IPH), subdural hemorrhage (SDH), intraventricular hemorrhage (IVH) are classified by using an IRF classifier with high accuracy. The simulation process is carried out in MATLAB site. The proposed multilayer‐DenseNet‐ResNet‐IRF attains higher accuracy 23.44%, 31.93%, 42.83%, 41.9% is compared with the existing methods, such as deep learning algorithm for automatic detection and classification of acute intracranial hemorrhages in head CT scans (ICH‐DC‐2D‐CNN), fusion‐based deep learning along nature‐inspired algorithm for the diagnosis of intracerebral hemorrhage (ICH‐DC‐FSVM), and detection of intracranial hemorrhage on CT scan images using convolutional neural network (ICH‐DC‐CNN) and double fully convolutional networks (FCNs), respectively.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82397746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient privacy protection authentication protocol for vehicle network in 5G 5G车载网络高效隐私保护认证协议
Pub Date : 2022-08-02 DOI: 10.1002/cpe.7247
Guixian Zhang, Xiaoyu Zhao, Menglu Chen, Shuyi Ma
{"title":"Efficient privacy protection authentication protocol for vehicle network in\u0000 5G","authors":"Guixian Zhang, Xiaoyu Zhao, Menglu Chen, Shuyi Ma","doi":"10.1002/cpe.7247","DOIUrl":"https://doi.org/10.1002/cpe.7247","url":null,"abstract":"","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85329074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Concurrency and Computation: Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1