首页 > 最新文献

Concurrency and Computation: Practice and Experience最新文献

英文 中文
Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication 改进的混沌- RSA -基于混合密码系统的图像加密和身份验证
Pub Date : 2022-07-16 DOI: 10.1002/cpe.7187
M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa
This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.
本文提出了一种基于混沌- RSA的快速混合密码系统来保护和认证秘密图像。SHA‐512用于生成512位的初始密钥。RSA系统用于对发送方和图像认证的初始密钥和签名生成进行加密。事实上,一个强大的块密码算法开发加密和解密图像具有高水平的安全性。在此阶段,提出了一种基于四混沌系统的强PRNG来生成高质量的密钥。因此,提出了一种改进的体系结构。它以较低的计算复杂度对图像进行混淆和扩散。在最后一步中,将加密的秘密密钥、签名和加密的图像组合在一起,以获得加密的签名图像。块密码算法对几种不同类型、内容和大小的普通和医学图像进行了深入的评估。仿真结果表明,该系统具有较高的安全性。熵达到了7.9998的值,这是随机性最重要的特征。通过与众多加密算法的比较研究,表明该算法具有较好的效果。
{"title":"Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication","authors":"M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa","doi":"10.1002/cpe.7187","DOIUrl":"https://doi.org/10.1002/cpe.7187","url":null,"abstract":"This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89035601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
B‐SCORE – A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment B‐SCORE -一种基于区块链的混合混沌签名,用于物联网环境中的医学图像加密
Pub Date : 2022-07-15 DOI: 10.1002/cpe.7115
N. R, Ponsy R. K. Sathia Bhama
Internet of things (IoT) has evolved exponentially in the recent years and its applications are also being explored in the medical field. Due to this, the volume of medical images transmitted has increased multifold. Usage of IoT networks for medical image transmission has significantly reduced the time needed for clinical diagnosis and thereby increasing treatment efficiency. However at present, IoT networks are open to various security threats, which may affect the sensitive and private information that are present in patient's medical image datasets. Existing studies reveal the need of improvisation for secured medical data transmission over IoT networks. In the context to IoT security issues, this research paper proposes blockchain architecture integrated with chaotic encrypted medical image transmission to ensure the high security in medical image transmission. The proposed system incorporates tri‐layered architecture such as Image Aware Segmentation (IAS), hybrid chaotic encryption scheme and finally blockchain environment. The extensive experimentation has been carried out in which the performance parameters such as entropy, NACI and UACI (Number of Pixel Change Ratio and Unified Average Changed Intensity) were calculated and analyzed. It is found that the proposed architecture has NPCR as 99.65%, UACI as 33.95% and entropy ideally close to 8. Encryption results show that the proposed architecture exhibited more randomness, which can defend the IoT security threats.
物联网(IoT)近年来呈指数级发展,其在医疗领域的应用也在不断探索。因此,传输的医学图像量增加了数倍。使用物联网网络进行医学图像传输,大大减少了临床诊断所需的时间,从而提高了治疗效率。然而,目前,物联网网络面临各种安全威胁,这些威胁可能会影响患者医疗图像数据集中存在的敏感和私人信息。现有的研究表明,需要通过物联网网络进行安全的医疗数据传输。针对物联网安全问题,本文提出区块链架构与混沌加密医学图像传输相结合,保证医学图像传输的高安全性。该系统采用图像感知分割(IAS)、混合混沌加密方案和区块链环境等三层架构。进行了大量的实验,计算和分析了熵、NACI和UACI(像素个数变化比和统一平均变化强度)等性能参数。结果表明,该结构的NPCR值为99.65%,UACI值为33.95%,熵值理想地接近于8。加密结果表明,该架构具有更强的随机性,能够抵御物联网安全威胁。
{"title":"B‐SCORE – A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment","authors":"N. R, Ponsy R. K. Sathia Bhama","doi":"10.1002/cpe.7115","DOIUrl":"https://doi.org/10.1002/cpe.7115","url":null,"abstract":"Internet of things (IoT) has evolved exponentially in the recent years and its applications are also being explored in the medical field. Due to this, the volume of medical images transmitted has increased multifold. Usage of IoT networks for medical image transmission has significantly reduced the time needed for clinical diagnosis and thereby increasing treatment efficiency. However at present, IoT networks are open to various security threats, which may affect the sensitive and private information that are present in patient's medical image datasets. Existing studies reveal the need of improvisation for secured medical data transmission over IoT networks. In the context to IoT security issues, this research paper proposes blockchain architecture integrated with chaotic encrypted medical image transmission to ensure the high security in medical image transmission. The proposed system incorporates tri‐layered architecture such as Image Aware Segmentation (IAS), hybrid chaotic encryption scheme and finally blockchain environment. The extensive experimentation has been carried out in which the performance parameters such as entropy, NACI and UACI (Number of Pixel Change Ratio and Unified Average Changed Intensity) were calculated and analyzed. It is found that the proposed architecture has NPCR as 99.65%, UACI as 33.95% and entropy ideally close to 8. Encryption results show that the proposed architecture exhibited more randomness, which can defend the IoT security threats.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91134093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi‐objective moth swarm based sailfish model for optimal routing in wireless sensor network 基于多目标飞蛾群的无线传感器网络最优路由旗鱼模型
Pub Date : 2022-07-14 DOI: 10.1002/cpe.7125
M. Gunasekar, Gobalakrishnan Natesan, D. Samiayya
In recent years, the WSN are emerging swiftly since it finds applications in various domains including weather monitoring, attack detection, industrial monitoring, monitoring of submarine organisms, patient monitoring as well as the monitoring of ecological disorders. But WSN is also influenced by various other factors like network lifetime and energy consumption. It is necessary to provide an energy effective protocol to conquer certain troubles that includes packet delivery ratio, network lifetime, residual energy as well as effective routing in WSN. Therefore, this article aims to propose a novel protocol to enhance the energy efficiency of the network thereby providing an optimal routing path. This can be achieved by selecting an optimal cluster head that maintains communication between the base station and the sensor node. In this article, a novel multi‐objective moth swarm based sailfish (MOMS‐SF) technique is employed in selecting an optimal cluster head. The proposed MOMS‐SF technique enhances the network lifetime and minimizes the energy consumption of the network. Finally, the evaluation results are conducted to determine the network performances of the proposed MOMS‐SF approach. Also, a comparative analysis is carried out and the graphical analyzes for various parameters are made for various approaches to determine the effectiveness of the proposed system.
近年来,无线传感器网络在天气监测、攻击检测、工业监测、海底生物监测、患者监测以及生态紊乱监测等各个领域得到了迅速的应用。但无线传感器网络也受到网络寿命和能耗等多种因素的影响。为了解决无线传感器网络中存在的数据包传输率、网络寿命、剩余能量和有效路由等问题,有必要提供一种能量有效的协议。因此,本文旨在提出一种新的协议,以提高网络的能源效率,从而提供最优路由路径。这可以通过选择一个保持基站和传感器节点之间通信的最佳簇头来实现。本文采用一种新的基于飞蛾群的多目标旗鱼(mom - SF)技术来选择最优簇头。所提出的mom - SF技术提高了网络的寿命,并最大限度地降低了网络的能耗。最后,进行了评估结果,以确定所提出的mom - SF方法的网络性能。此外,还对各种方法进行了对比分析,并对各种参数进行了图形化分析,以确定所提出系统的有效性。
{"title":"Multi‐objective moth swarm based sailfish model for optimal routing in wireless sensor network","authors":"M. Gunasekar, Gobalakrishnan Natesan, D. Samiayya","doi":"10.1002/cpe.7125","DOIUrl":"https://doi.org/10.1002/cpe.7125","url":null,"abstract":"In recent years, the WSN are emerging swiftly since it finds applications in various domains including weather monitoring, attack detection, industrial monitoring, monitoring of submarine organisms, patient monitoring as well as the monitoring of ecological disorders. But WSN is also influenced by various other factors like network lifetime and energy consumption. It is necessary to provide an energy effective protocol to conquer certain troubles that includes packet delivery ratio, network lifetime, residual energy as well as effective routing in WSN. Therefore, this article aims to propose a novel protocol to enhance the energy efficiency of the network thereby providing an optimal routing path. This can be achieved by selecting an optimal cluster head that maintains communication between the base station and the sensor node. In this article, a novel multi‐objective moth swarm based sailfish (MOMS‐SF) technique is employed in selecting an optimal cluster head. The proposed MOMS‐SF technique enhances the network lifetime and minimizes the energy consumption of the network. Finally, the evaluation results are conducted to determine the network performances of the proposed MOMS‐SF approach. Also, a comparative analysis is carried out and the graphical analyzes for various parameters are made for various approaches to determine the effectiveness of the proposed system.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88219804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An arbitrable multi‐replica data auditing scheme based on smart contracts 基于智能合约的可仲裁多副本数据审计方案
Pub Date : 2022-07-13 DOI: 10.1002/cpe.7164
Junfeng Tian, Qian Yang
In order to improve the availability and persistence of data, lightweight cloud users want to store multiple‐replicas of the original file on the server with less local computing and storage overhead. Meanwhile, to ensure the integrity of the remote storage data, some schemes have been designed to allow public verification. However, most existing schemes only focus on malicious cloud service providers and ignore the possibility that dishonest users cheat for profit. This article implements an arbitrable data auditing scheme under multi‐replica storage. The scheme adopts a new arbitration mechanism under multi‐replica storage, makes use of the non‐tampering characteristics of smart contracts, carries out reliable verification through miners, and realizes the timely detection and punishment of any fraudulent entity. In addition, the scheme also designs a multi‐replica storage model based on the B* tree, realizes the batch verification of replica blocks, enables the fraud behavior of malicious users to be identified after data update, and improves the space utilization efficiency. The article also gives detailed security proof of the proposed scheme. The evaluation result shows our scheme not only realizes a more practical and fairer audit scheme but also has lower computational overhead than current state‐of‐the‐art multi‐replica arbitrable schemes.
为了提高数据的可用性和持久性,轻量级云用户希望在服务器上存储原始文件的多个副本,以减少本地计算和存储开销。同时,为了保证远程存储数据的完整性,设计了一些允许公众验证的方案。然而,大多数现有方案只关注恶意云服务提供商,而忽略了不诚实用户为利润而作弊的可能性。本文实现了一种多副本存储下的可仲裁数据审计方案。该方案采用多副本存储下的新型仲裁机制,利用智能合约的不可篡改特性,通过矿工进行可靠验证,实现对任何欺诈实体的及时发现和处罚。此外,该方案还设计了基于B*树的多副本存储模型,实现了副本块的批量验证,能够在数据更新后识别恶意用户的欺诈行为,提高了空间利用效率。文章还对所提出的方案进行了详细的安全性证明。评估结果表明,我们的方案不仅实现了一个更实用、更公平的审计方案,而且比当前最先进的多副本可仲裁方案具有更低的计算开销。
{"title":"An arbitrable multi‐replica data auditing scheme based on smart contracts","authors":"Junfeng Tian, Qian Yang","doi":"10.1002/cpe.7164","DOIUrl":"https://doi.org/10.1002/cpe.7164","url":null,"abstract":"In order to improve the availability and persistence of data, lightweight cloud users want to store multiple‐replicas of the original file on the server with less local computing and storage overhead. Meanwhile, to ensure the integrity of the remote storage data, some schemes have been designed to allow public verification. However, most existing schemes only focus on malicious cloud service providers and ignore the possibility that dishonest users cheat for profit. This article implements an arbitrable data auditing scheme under multi‐replica storage. The scheme adopts a new arbitration mechanism under multi‐replica storage, makes use of the non‐tampering characteristics of smart contracts, carries out reliable verification through miners, and realizes the timely detection and punishment of any fraudulent entity. In addition, the scheme also designs a multi‐replica storage model based on the B* tree, realizes the batch verification of replica blocks, enables the fraud behavior of malicious users to be identified after data update, and improves the space utilization efficiency. The article also gives detailed security proof of the proposed scheme. The evaluation result shows our scheme not only realizes a more practical and fairer audit scheme but also has lower computational overhead than current state‐of‐the‐art multi‐replica arbitrable schemes.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88450474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel trust recommendation model in online social networks using soft computing methods 基于软计算方法的在线社交网络信任推荐模型
Pub Date : 2022-07-13 DOI: 10.1002/cpe.7153
N. Sirisala, Anitha Yarava, Y. P. Reddy, Veeresh Poola
Social network (OSN) is an emerging platform through which people can connect with their friends, relatives, and other like‐minded people. On the other hand, users' personal information might be misused because of other users' biased and malicious behavior. Establishing a trusted environment in social networks is one of the current research problems. Some of the research papers proposed to trust computational methods, but still, there is a lack of methods to handle biased recommendations and loss of trust accuracy towards the target user. In this article, to address these open issues, “a novel trust recommendation model in online social networks using soft computing methods (TRMSC)” is proposed for the Twitter social networks. Here direct and indirect trust is computed for known and unknown users, respectively. The direct trust of a user is computed using clustering methods based on his social activities (posts, retweets received, mentions received, listed count, and follower count) with other users. In the computation of indirect trust, the impact of biased recommendations is suppressed using the Dempster Shafer theory(DST) method, and loss of trust is minimized using trust transitive matrices. The performance of the proposed method is analyzed theoretically and experimentally. Time and space complexities are measured using asymptotic notations. In experimental results, TRMSC is evaluated for different network sizes and for target users at different distances (2 to 4‐hops), where it could perform better than existing methods.
社交网络(OSN)是一个新兴的平台,人们可以通过它与朋友、亲戚和其他志同道合的人联系。另一方面,用户的个人信息可能会因为其他用户的偏见和恶意行为而被滥用。在社交网络中建立信任环境是当前研究的问题之一。一些研究论文提出了信任计算方法,但仍然缺乏处理有偏见的推荐和对目标用户失去信任准确性的方法。为了解决这些开放性问题,本文针对Twitter社交网络提出了“一种基于软计算方法(TRMSC)的在线社交网络信任推荐模型”。这里分别计算已知用户和未知用户的直接信任和间接信任。用户的直接信任是使用基于他与其他用户的社会活动(帖子、收到的转发、收到的提及、列出的计数和关注者计数)的聚类方法计算的。在间接信任计算中,使用Dempster Shafer理论(DST)方法抑制有偏见推荐的影响,使用信任传递矩阵最小化信任损失。对该方法的性能进行了理论和实验分析。时间和空间的复杂性是用渐近符号来测量的。在实验结果中,TRMSC在不同的网络规模和不同距离(2到4跳)的目标用户中进行了评估,在这些情况下,它可以比现有方法表现得更好。
{"title":"A novel trust recommendation model in online social networks using soft computing methods","authors":"N. Sirisala, Anitha Yarava, Y. P. Reddy, Veeresh Poola","doi":"10.1002/cpe.7153","DOIUrl":"https://doi.org/10.1002/cpe.7153","url":null,"abstract":"Social network (OSN) is an emerging platform through which people can connect with their friends, relatives, and other like‐minded people. On the other hand, users' personal information might be misused because of other users' biased and malicious behavior. Establishing a trusted environment in social networks is one of the current research problems. Some of the research papers proposed to trust computational methods, but still, there is a lack of methods to handle biased recommendations and loss of trust accuracy towards the target user. In this article, to address these open issues, “a novel trust recommendation model in online social networks using soft computing methods (TRMSC)” is proposed for the Twitter social networks. Here direct and indirect trust is computed for known and unknown users, respectively. The direct trust of a user is computed using clustering methods based on his social activities (posts, retweets received, mentions received, listed count, and follower count) with other users. In the computation of indirect trust, the impact of biased recommendations is suppressed using the Dempster Shafer theory(DST) method, and loss of trust is minimized using trust transitive matrices. The performance of the proposed method is analyzed theoretically and experimentally. Time and space complexities are measured using asymptotic notations. In experimental results, TRMSC is evaluated for different network sizes and for target users at different distances (2 to 4‐hops), where it could perform better than existing methods.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76319845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The analysis of cross‐correlation between Istanbul Stock Exchange and major stock markets and indices: An empirical analysis using Random Matrix Theory 伊斯坦布尔证券交易所与主要股票市场和指数的相互关系分析:基于随机矩阵理论的实证分析
Pub Date : 2022-07-13 DOI: 10.1002/cpe.7113
B. Tastan, Hatice Imamoglu
This study attempts to investigate the cross‐correlation between stocks listed under the XU100 index of Borsa Istanbul with several ratios and indices of the stock markets worldwide by using the Random Matrix Theory approach through a correlation matrix. In addition, Eigenvector Analysis, Network Analysis, Dimension Reduction will be carried out to investigate cross‐correlation between markets. It was found that XU100, which is an index that includes 100 stocks highest in volume, has a distinguishing behavior compared to other indices and rates in terms of eigenvalue and related eigenvector structures. Furthermore, mean‐value portfolio analysis showed that the empirical correlation matrix underestimates the portfolio risks than the correlation matrix obtained by filtering the noise. Coronavirus pandemic also affected Borsa Istanbul by breaking periodic behavior of volatility and correlation cycle.
本研究试图利用随机矩阵理论的方法,通过相关矩阵来考察伊斯坦布尔证券交易所(Borsa) XU100指数成份股与多个比率与全球股市指数之间的相互关系。此外,本研究将采用特征向量分析、网络分析、降维等方法来研究市场间的相互关系。研究发现,包含100只成交量最高股票的指数XU100在特征值和相关特征向量结构方面与其他指数和比率具有显著性。此外,均值组合分析表明,经验相关矩阵比过滤噪声后得到的相关矩阵更低估了投资组合的风险。冠状病毒大流行也通过打破波动性和相关周期的周期性行为影响了伊斯坦布尔证券交易所。
{"title":"The analysis of cross‐correlation between Istanbul Stock Exchange and major stock markets and indices: An empirical analysis using Random Matrix Theory","authors":"B. Tastan, Hatice Imamoglu","doi":"10.1002/cpe.7113","DOIUrl":"https://doi.org/10.1002/cpe.7113","url":null,"abstract":"This study attempts to investigate the cross‐correlation between stocks listed under the XU100 index of Borsa Istanbul with several ratios and indices of the stock markets worldwide by using the Random Matrix Theory approach through a correlation matrix. In addition, Eigenvector Analysis, Network Analysis, Dimension Reduction will be carried out to investigate cross‐correlation between markets. It was found that XU100, which is an index that includes 100 stocks highest in volume, has a distinguishing behavior compared to other indices and rates in terms of eigenvalue and related eigenvector structures. Furthermore, mean‐value portfolio analysis showed that the empirical correlation matrix underestimates the portfolio risks than the correlation matrix obtained by filtering the noise. Coronavirus pandemic also affected Borsa Istanbul by breaking periodic behavior of volatility and correlation cycle.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73728155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of the types of disease for tomato plants using a modified gray wolf optimization optimized MobileNetV2 convolutional neural network architecture driven computer vision framework 利用改进的灰狼优化的MobileNetV2卷积神经网络架构驱动的计算机视觉框架对番茄植株病害类型进行识别
Pub Date : 2022-07-13 DOI: 10.1002/cpe.7161
G. Mukherjee, Arpitam Chatterjee, B. Tudu
Tomato is a widely consumed fruit across the world due to its high nutritional values. Leaf diseases in tomato are very common which incurs huge damages but early detection of leaf diseases can help in avoiding that. The existing practices for detecting different diseases by the human experts are costly, time consuming and subjective in nature. Computer vision plays important role toward early detection of tomato leaf detection. However, implementation of computationally less expensive model and improvement of detection performance is still open. This article reports a computer vision based system to classify seven different categories of diseases, namely, bacterial spot, early blight, late blight, leaf mold, septoria leaf spot, spider mites, and target spots using optimized MobileNetV2 architecture. A modified gray wolf optimization approach has been adopted for optimization of MobileNetV2 hyperparameters for improved performance. The model has been validated using standard internal and external validation methods and found to provide the classification accuracy in the tune of 98%. The results reflect the promising potential of the presented framework for early detection of tomato leaf diseases which can help to avoid substantial agricultural loss.
由于其高营养价值,西红柿是世界上广泛食用的水果。番茄叶片病害十分普遍,危害巨大,及早发现叶片病害可有效防治。现有的由人类专家检测不同疾病的做法是昂贵、耗时和主观的。计算机视觉在番茄叶片的早期检测中起着重要的作用。然而,实现计算成本更低的模型和提高检测性能仍然是开放的。本文报道了一种基于计算机视觉的系统,利用优化后的MobileNetV2架构,对细菌性斑病、早疫病、晚疫病、叶霉病、间隔叶斑病、蜘蛛螨和目标斑等7类病害进行分类。采用改进的灰狼优化方法对MobileNetV2超参数进行优化,以提高性能。使用标准的内部和外部验证方法对模型进行了验证,发现该模型提供了98%的分类准确率。这些结果反映了所提出的框架在番茄叶病早期检测方面的巨大潜力,可以帮助避免重大的农业损失。
{"title":"Identification of the types of disease for tomato plants using a modified gray wolf optimization optimized MobileNetV2 convolutional neural network architecture driven computer vision framework","authors":"G. Mukherjee, Arpitam Chatterjee, B. Tudu","doi":"10.1002/cpe.7161","DOIUrl":"https://doi.org/10.1002/cpe.7161","url":null,"abstract":"Tomato is a widely consumed fruit across the world due to its high nutritional values. Leaf diseases in tomato are very common which incurs huge damages but early detection of leaf diseases can help in avoiding that. The existing practices for detecting different diseases by the human experts are costly, time consuming and subjective in nature. Computer vision plays important role toward early detection of tomato leaf detection. However, implementation of computationally less expensive model and improvement of detection performance is still open. This article reports a computer vision based system to classify seven different categories of diseases, namely, bacterial spot, early blight, late blight, leaf mold, septoria leaf spot, spider mites, and target spots using optimized MobileNetV2 architecture. A modified gray wolf optimization approach has been adopted for optimization of MobileNetV2 hyperparameters for improved performance. The model has been validated using standard internal and external validation methods and found to provide the classification accuracy in the tune of 98%. The results reflect the promising potential of the presented framework for early detection of tomato leaf diseases which can help to avoid substantial agricultural loss.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72914402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PECCO: A profit and cost‐oriented computation offloading scheme in edge‐cloud environment with improved Moth‐flame optimization PECCO:一种基于改进蛾焰优化的边缘云环境下以利润和成本为导向的计算卸载方案
Pub Date : 2022-07-12 DOI: 10.1002/cpe.7163
Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu
With the fast growing quantity of data generated by smart devices and the exponential surge of processing demand in the Internet of Things (IoT) era, the resource‐rich cloud centers have been utilized to tackle these challenges. To relieve the burden on cloud centers, edge‐cloud computation offloading becomes a promising solution since shortening the proximity between the data source and the computation by offloading computation tasks from the cloud to edge devices can improve performance and quality of service. Several optimization models of edge‐cloud computation offloading have been proposed that take computation costs and heterogeneous communication costs into account. However, several important factors are not jointly considered, such as heterogeneities of tasks, load balancing among nodes and the profit yielded by computation tasks, which lead to the profit and cost‐oriented computation offloading optimization model PECCO proposed in this article. Considering that the model is hard in nature and the optimization objective is not differentiable, we propose an improved Moth‐flame optimizer PECCO‐MFI which addresses some deficiencies of the original Moth‐flame optimizer and integrate it under the edge‐cloud environment. Comprehensive experiments are conducted to verify the superior performance of the proposed method when optimizing the proposed task offloading model under the edge‐cloud environment.
随着智能设备产生的数据量的快速增长和物联网(IoT)时代处理需求的指数级增长,资源丰富的云中心已被用来应对这些挑战。为了减轻云中心的负担,边缘云计算卸载成为一种很有前途的解决方案,因为通过将计算任务从云端卸载到边缘设备可以缩短数据源和计算之间的距离,从而提高性能和服务质量。已经提出了几种考虑计算成本和异构通信成本的边缘云计算卸载优化模型。然而,没有综合考虑任务的异构性、节点间的负载均衡以及计算任务产生的利润等重要因素,导致本文提出的以利润和成本为导向的计算卸载优化模型PECCO。考虑到模型的硬性和优化目标不可微性,提出了改进的蛾焰优化器PECCO - MFI,解决了原有蛾焰优化器的一些不足,并将其集成在边缘云环境下。在边缘云环境下,通过综合实验验证了该方法在优化任务卸载模型时的优越性能。
{"title":"PECCO: A profit and cost‐oriented computation offloading scheme in edge‐cloud environment with improved Moth‐flame optimization","authors":"Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu","doi":"10.1002/cpe.7163","DOIUrl":"https://doi.org/10.1002/cpe.7163","url":null,"abstract":"With the fast growing quantity of data generated by smart devices and the exponential surge of processing demand in the Internet of Things (IoT) era, the resource‐rich cloud centers have been utilized to tackle these challenges. To relieve the burden on cloud centers, edge‐cloud computation offloading becomes a promising solution since shortening the proximity between the data source and the computation by offloading computation tasks from the cloud to edge devices can improve performance and quality of service. Several optimization models of edge‐cloud computation offloading have been proposed that take computation costs and heterogeneous communication costs into account. However, several important factors are not jointly considered, such as heterogeneities of tasks, load balancing among nodes and the profit yielded by computation tasks, which lead to the profit and cost‐oriented computation offloading optimization model PECCO proposed in this article. Considering that the model is hard in nature and the optimization objective is not differentiable, we propose an improved Moth‐flame optimizer PECCO‐MFI which addresses some deficiencies of the original Moth‐flame optimizer and integrate it under the edge‐cloud environment. Comprehensive experiments are conducted to verify the superior performance of the proposed method when optimizing the proposed task offloading model under the edge‐cloud environment.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74528232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient framework for the similarity prediction with query recommendation in E‐learning system 基于查询推荐的E - learning相似度预测框架
Pub Date : 2022-07-10 DOI: 10.1002/cpe.7145
Vedavathi Nagendra Prasad, Anil Kumar Kureekatil Muthappa
A novel model of data similarity estimation and clustering method is proposed in this article to retrieve the relevant data with the best matching in big data processing. An advanced model of graph distance pattern (GDP) method with lexical subgroup (LS) system is used to estimate the similarity between the query data and the entire database. With the help of neural network, the relevancy of feature attributes in the database are predicted and matching index is sorted to provide the recommended data for given query data. This was achieved by using the correlated sim‐neural network (CSNN). This is an enhanced model of neural network technology to find the relevancy based on the correlation factor of feature set. The training process of CSNN classifier is carried by estimating the correlation factor of the attributes of dataset. These are forms as the clusters and paged with proper indexing based on the LS parameter of similarity metric. The results obtained by the proposed system for recall, precision, accuracy, error rate, F‐measure, kappa coefficient, specificity, and MCC are 0.98, 0.98, 0.97, 0.03, 0.99, 0.991, 0.986, and 0.984, respectively.
本文提出了一种新的数据相似度估计和聚类方法模型,以便在大数据处理中检索到最匹配的相关数据。提出了一种基于词法子群(LS)系统的图形距离模式(GDP)方法的高级模型,用于估计查询数据与整个数据库之间的相似度。利用神经网络预测数据库中特征属性的相关性,排序匹配索引,为给定的查询数据提供推荐数据。这是通过使用相关sim -神经网络(CSNN)实现的。这是一种基于特征集的相关因子来寻找相关性的神经网络技术的增强模型。CSNN分类器的训练过程是通过估计数据集属性的相关因子来进行的。这些形式作为聚类,并根据相似度度量的LS参数进行适当的索引分页。该系统的召回率、精密度、准确度、错误率、F - measure、kappa系数、特异性和MCC分别为0.98、0.98、0.97、0.03、0.99、0.991、0.986和0.984。
{"title":"An efficient framework for the similarity prediction with query recommendation in E‐learning system","authors":"Vedavathi Nagendra Prasad, Anil Kumar Kureekatil Muthappa","doi":"10.1002/cpe.7145","DOIUrl":"https://doi.org/10.1002/cpe.7145","url":null,"abstract":"A novel model of data similarity estimation and clustering method is proposed in this article to retrieve the relevant data with the best matching in big data processing. An advanced model of graph distance pattern (GDP) method with lexical subgroup (LS) system is used to estimate the similarity between the query data and the entire database. With the help of neural network, the relevancy of feature attributes in the database are predicted and matching index is sorted to provide the recommended data for given query data. This was achieved by using the correlated sim‐neural network (CSNN). This is an enhanced model of neural network technology to find the relevancy based on the correlation factor of feature set. The training process of CSNN classifier is carried by estimating the correlation factor of the attributes of dataset. These are forms as the clusters and paged with proper indexing based on the LS parameter of similarity metric. The results obtained by the proposed system for recall, precision, accuracy, error rate, F‐measure, kappa coefficient, specificity, and MCC are 0.98, 0.98, 0.97, 0.03, 0.99, 0.991, 0.986, and 0.984, respectively.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89036034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection method based on image analysis and generative adversarial networks 基于图像分析和生成对抗网络的恶意软件检测方法
Pub Date : 2022-07-08 DOI: 10.1002/cpe.7170
Yanhua Liu, Jiaqi Li, Baoxu Liu, Xiaoling Gao, Ximeng Liu
Malware detection is indispensable to cybersecurity. However, with the advent of new malware variants and scenarios with few and imbalanced samples, malware detection for various complex scenarios has been a very challenging problem. In this article, we propose a malware detection method based on image analysis and generative adversarial networks, named MadInG, which can improve the accuracy of malware detection for insufficient samples, sample imbalance, and new variants scenarios. Specifically, we first generate fixed‐size grayscale images of malware to reduce the workload of feature engineering or the involvement of domain expert knowledge on malware detection. Then we introduce auxiliary classifier generative adversarial networks into malware detection to enhance the generalization ability of the detector. Finally, we construct a variety of malware scenarios and compare our proposed method with existing popular detection methods. Extensive experimental results demonstrate that our method achieves high accuracy and well balance in malware detection for different scenarios, especially, the detection rate of malware variants reaches 99.5%.
恶意软件检测是网络安全不可或缺的一部分。然而,随着新的恶意软件变体和样本较少且不平衡的场景的出现,各种复杂场景的恶意软件检测已经成为一个非常具有挑战性的问题。在本文中,我们提出了一种基于图像分析和生成对抗网络的恶意软件检测方法MadInG,该方法可以提高样本不足、样本失衡和新变体场景下恶意软件检测的准确性。具体来说,我们首先生成固定大小的恶意软件灰度图像,以减少特征工程的工作量或领域专家知识对恶意软件检测的参与。然后,我们将辅助分类器生成对抗网络引入恶意软件检测中,以提高检测器的泛化能力。最后,我们构建了各种恶意软件场景,并将我们提出的方法与现有流行的检测方法进行了比较。大量的实验结果表明,该方法在不同场景的恶意软件检测中具有较高的准确率和较好的平衡性,特别是对恶意软件变体的检测率达到99.5%。
{"title":"Malware detection method based on image analysis and generative adversarial networks","authors":"Yanhua Liu, Jiaqi Li, Baoxu Liu, Xiaoling Gao, Ximeng Liu","doi":"10.1002/cpe.7170","DOIUrl":"https://doi.org/10.1002/cpe.7170","url":null,"abstract":"Malware detection is indispensable to cybersecurity. However, with the advent of new malware variants and scenarios with few and imbalanced samples, malware detection for various complex scenarios has been a very challenging problem. In this article, we propose a malware detection method based on image analysis and generative adversarial networks, named MadInG, which can improve the accuracy of malware detection for insufficient samples, sample imbalance, and new variants scenarios. Specifically, we first generate fixed‐size grayscale images of malware to reduce the workload of feature engineering or the involvement of domain expert knowledge on malware detection. Then we introduce auxiliary classifier generative adversarial networks into malware detection to enhance the generalization ability of the detector. Finally, we construct a variety of malware scenarios and compare our proposed method with existing popular detection methods. Extensive experimental results demonstrate that our method achieves high accuracy and well balance in malware detection for different scenarios, especially, the detection rate of malware variants reaches 99.5%.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77254322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation: Practice and Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1