首页 > 最新文献

Int. J. Model. Simul. Sci. Comput.最新文献

英文 中文
A deep recursively learning LSTM model to improve cyber security botnet attack intrusion detection 一种深度递归学习LSTM模型,改进网络安全僵尸网络攻击入侵检测
Pub Date : 2022-04-24 DOI: 10.1142/s1793962323410180
B. Padmavathi, B. Muthukumar
{"title":"A deep recursively learning LSTM model to improve cyber security botnet attack intrusion detection","authors":"B. Padmavathi, B. Muthukumar","doi":"10.1142/s1793962323410180","DOIUrl":"https://doi.org/10.1142/s1793962323410180","url":null,"abstract":"","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"244 1","pages":"2341018:1-2341018:21"},"PeriodicalIF":0.0,"publicationDate":"2022-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78708950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Inter-frame video forgery detection using UFS-MSRC algorithm and LSTM network 基于UFS-MSRC算法和LSTM网络的帧间视频伪造检测
Pub Date : 2022-04-21 DOI: 10.1142/s1793962323410131
N. Girish, C. Nandini
The forgery involved in region duplication is a common type of video tampering, where the traditional techniques used to detect video tampering are ineffective and inefficient for the forged videos under complex backgrounds. To overcome this issue, a novel video forgery detection model is introduced in this research paper. Initially, the input video sequences are collected from Surrey University Library for Forensic Analysis (SULFA) and Sondos datasets. Further, spatiotemporal averaging method is carried out on the collected video sequences to obtain background information with a pale of moving objects for an effective video forgery detection. Next, feature extraction is performed using the GoogLeNet model for extracting the feature vectors. Then, the Unsupervised Feature Selection with Multi-Subspace Randomization and Collaboration (UFS-MSRC) approach is used to choose the discriminative feature vectors that superiorly reduce the training time and improve the detection accuracy. Finally, long short-term memory (LSTM) network is applied for forgery detection in the different video sequences. The experimental evaluation illustrated that the UFS-MSRC with LSTM model attained 98.13% and 97.38% of accuracy on SULFA and Sondos datasets, where the obtained results are better when compared to the existing models in video forgery detection.
区域复制中的伪造是一种常见的视频篡改类型,传统的视频篡改检测技术对于复杂背景下的伪造视频是无效和低效的。为了解决这一问题,本文提出了一种新的视频伪造检测模型。最初,输入的视频序列是从萨里大学法医分析图书馆(SULFA)和Sondos数据集收集的。在此基础上,对采集到的视频序列进行时空平均处理,得到具有少量运动目标的背景信息,实现有效的视频伪造检测。接下来,使用GoogLeNet模型提取特征向量进行特征提取。然后,采用多子空间随机化和协作的无监督特征选择方法(UFS-MSRC)选择显著减少训练时间和提高检测精度的判别特征向量;最后,将长短期记忆(LSTM)网络应用于不同视频序列的伪造检测。实验评估表明,基于LSTM模型的UFS-MSRC在SULFA和Sondos数据集上的准确率分别达到了98.13%和97.38%,在视频伪造检测方面的效果优于现有模型。
{"title":"Inter-frame video forgery detection using UFS-MSRC algorithm and LSTM network","authors":"N. Girish, C. Nandini","doi":"10.1142/s1793962323410131","DOIUrl":"https://doi.org/10.1142/s1793962323410131","url":null,"abstract":"The forgery involved in region duplication is a common type of video tampering, where the traditional techniques used to detect video tampering are ineffective and inefficient for the forged videos under complex backgrounds. To overcome this issue, a novel video forgery detection model is introduced in this research paper. Initially, the input video sequences are collected from Surrey University Library for Forensic Analysis (SULFA) and Sondos datasets. Further, spatiotemporal averaging method is carried out on the collected video sequences to obtain background information with a pale of moving objects for an effective video forgery detection. Next, feature extraction is performed using the GoogLeNet model for extracting the feature vectors. Then, the Unsupervised Feature Selection with Multi-Subspace Randomization and Collaboration (UFS-MSRC) approach is used to choose the discriminative feature vectors that superiorly reduce the training time and improve the detection accuracy. Finally, long short-term memory (LSTM) network is applied for forgery detection in the different video sequences. The experimental evaluation illustrated that the UFS-MSRC with LSTM model attained 98.13% and 97.38% of accuracy on SULFA and Sondos datasets, where the obtained results are better when compared to the existing models in video forgery detection.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"34 1","pages":"2341013:1-2341013:19"},"PeriodicalIF":0.0,"publicationDate":"2022-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85001332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XDEVS: A hybrid system modeling framework XDEVS:混合系统建模框架
Pub Date : 2022-04-18 DOI: 10.1142/s1793962322430012
Kunyu Xie, Lin Zhang, Y. Laili, Xiaohan Wang
When Discrete Event System Specification (DEVS) is used as a modeling tool, there is a semantic gap between a DEVS model and the mathematical representation, which may result in understanding difficulties. To provide a more intuitive form of modeling, XDEVS expands the concept of states in DEVS. The continuous state is introduced in XDEVS, which enhances the ability to model hybrid systems. Based on the DEVS simulation framework, a simulation engine is developed to drive the XDEVS model safely and efficiently and avoid the wrong location of state events during the simulation of the continuous model. A hybrid model is constructed and simulated using XDEVS. A comparison between the XDEVS model and models described by DEV&DESS and GDEVS shows that XDEVS can clearly express the structure of the model and reduce the burden on modelers.
当使用离散事件系统规范(DEVS)作为建模工具时,DEVS模型和数学表示之间存在语义差距,这可能导致理解困难。为了提供更直观的建模形式,XDEVS扩展了DEVS中状态的概念。在XDEVS中引入连续状态,增强了对混合系统建模的能力。为了安全高效地驱动XDEVS模型,避免连续模型仿真过程中状态事件定位错误,在DEVS仿真框架的基础上开发了仿真引擎。利用XDEVS构建了一个混合模型并进行了仿真。通过将XDEVS模型与DEV&DESS和GDEVS描述的模型进行比较,可以看出XDEVS能够清晰地表达模型的结构,减轻建模人员的负担。
{"title":"XDEVS: A hybrid system modeling framework","authors":"Kunyu Xie, Lin Zhang, Y. Laili, Xiaohan Wang","doi":"10.1142/s1793962322430012","DOIUrl":"https://doi.org/10.1142/s1793962322430012","url":null,"abstract":"When Discrete Event System Specification (DEVS) is used as a modeling tool, there is a semantic gap between a DEVS model and the mathematical representation, which may result in understanding difficulties. To provide a more intuitive form of modeling, XDEVS expands the concept of states in DEVS. The continuous state is introduced in XDEVS, which enhances the ability to model hybrid systems. Based on the DEVS simulation framework, a simulation engine is developed to drive the XDEVS model safely and efficiently and avoid the wrong location of state events during the simulation of the continuous model. A hybrid model is constructed and simulated using XDEVS. A comparison between the XDEVS model and models described by DEV&DESS and GDEVS shows that XDEVS can clearly express the structure of the model and reduce the burden on modelers.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"77 1","pages":"2243001:1-2243001:17"},"PeriodicalIF":0.0,"publicationDate":"2022-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87448813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reconstruction method of equilibrated flux for a posteriori error estimate of elliptic problems 椭圆型问题后验误差估计的平衡通量重建方法
Pub Date : 2022-04-12 DOI: 10.1142/s1793962322500519
F. Han, Yu Liu, Jianguo Wang
In this paper, a method which reconstructs an H(div)-conforming local equilibrated flux is presented for equilibrated flux-based a posteriori error estimate for the finite element method of the second-order elliptic problem. The flux is reconstructed in the lowest-order Raviart–Thomas spaces for finite element approximation. For a simplicial mesh, the reconstruction which performed on every element rather than on the patch of the elements of the mesh or on the dual mesh is achieved by solving a third (or fourth)-order linear equations on every element and a second-order linear equations on every edge or face. So, the amount of computational work is small. Numerical examples demonstratex the effectiveness and improvements of our method.
针对二阶椭圆型问题的有限元方法,提出了一种基于后验误差估计的H(div)型局部平衡通量重构方法。在最低阶的Raviart-Thomas空间中重构了通量,用于有限元逼近。对于简单网格,通过在每个单元上求解三阶(或四阶)线性方程,在每个边缘或面上求解二阶线性方程来实现在每个单元上而不是在网格的单元块上或双网格上进行的重建。所以,计算量很小。数值算例验证了该方法的有效性和改进。
{"title":"Reconstruction method of equilibrated flux for a posteriori error estimate of elliptic problems","authors":"F. Han, Yu Liu, Jianguo Wang","doi":"10.1142/s1793962322500519","DOIUrl":"https://doi.org/10.1142/s1793962322500519","url":null,"abstract":"In this paper, a method which reconstructs an H(div)-conforming local equilibrated flux is presented for equilibrated flux-based a posteriori error estimate for the finite element method of the second-order elliptic problem. The flux is reconstructed in the lowest-order Raviart–Thomas spaces for finite element approximation. For a simplicial mesh, the reconstruction which performed on every element rather than on the patch of the elements of the mesh or on the dual mesh is achieved by solving a third (or fourth)-order linear equations on every element and a second-order linear equations on every edge or face. So, the amount of computational work is small. Numerical examples demonstratex the effectiveness and improvements of our method.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"31 1","pages":"2250051:1-2250051:18"},"PeriodicalIF":0.0,"publicationDate":"2022-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78080359","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of variation of size of the initial release mass in the dynamics of landslide generated tsunami 初始释放质量大小变化对滑坡海啸动力学的影响
Pub Date : 2022-04-05 DOI: 10.1142/s1793962322500556
J. Kafle, Gr Acharya, Parameshwari Kattel, Puskar R. Pokhrel
When debris flows, landslides, or any gravitational mass flows hit closed or partially open water sources such as seas, oceans, fjords, hydraulic reservoirs, mountain lakes, bays, and landslide dams, it results in tsunami (impulse water waves) by transforming their impact energy to water body, potentially causing damages of infrastructures and human casualties both near field and the distant coastlines. The intensity of hazard depends on the scale, location and process of the landslide, and also on the reservoir volume and topography that surrounds it. Volume or size of the initial release mass that fails and slides along a slope is one of the dominant factors to determine the degree of splash, propagating speed and the amplitudes of the fluid waves, and potential dam breach or water spill over. Here, we numerically integrate the two-phase mass flow model [Pudasaini S. P., J. Geophysi. Res. 117(F03010), 2012] for quasi-three-dimensional, high-resolution simulation results with variation of size of the two-phase initial landslide or debris both longitudinally and laterally. In our numerical experimental results, we observe fundamentally different solid and fluid evolution and wave structures in the reservoir. There are also significant differences in the flow dynamics of solid under water for different volumes of the release mass by extending or contracting the base area along downslope and/or cross-slope directions. The simulation results show that tsunami amplitudes and run out extents are rapidly increased when the volume of the initial release mass in the form of a triangular wedge is increased by increasing the base area through the increment of the length and breadth of the release base. This study can be useful to develop and implement tsunami hazard mitigation strategies to enhance public safety and reduce potential loss due to landslide-generated wave hazards.
当泥石流、滑坡或任何重力质量流撞击海洋、峡湾、水库、山湖、海湾、滑坡坝等封闭或部分开放的水源时,通过将其冲击能量转化为水体而产生海啸(脉冲水波),可能造成近场和远海岸基础设施的破坏和人员伤亡。灾害的强度取决于滑坡的规模、位置和过程,也取决于水库的体积和周围的地形。初始释放体的体积或大小是决定飞溅程度、传播速度和流体波的振幅以及潜在的溃坝或水溢出的主要因素之一。本文对两相质量流模型进行了数值积分[j]。Res. 117(F03010), 2012]的准三维、高分辨率模拟结果,包括纵向和横向两阶段初始滑坡或碎片的大小变化。在我们的数值实验结果中,我们观察到储层中固体和流体的演化以及波浪结构有着根本的不同。通过沿下坡和/或跨坡方向扩展或收缩基底面积,不同体积的释放质量,水下固体流动动力学也有显著差异。模拟结果表明,通过增加释放基地的长度和宽度,增加以三角形楔形形式出现的初始释放质量的体积,从而增加释放基地的面积,从而迅速增加海啸的振幅和耗尽程度。这项研究有助于制定和实施减轻海啸危害的战略,以加强公共安全,减少因滑坡引起的波浪危害而造成的潜在损失。
{"title":"Impact of variation of size of the initial release mass in the dynamics of landslide generated tsunami","authors":"J. Kafle, Gr Acharya, Parameshwari Kattel, Puskar R. Pokhrel","doi":"10.1142/s1793962322500556","DOIUrl":"https://doi.org/10.1142/s1793962322500556","url":null,"abstract":"When debris flows, landslides, or any gravitational mass flows hit closed or partially open water sources such as seas, oceans, fjords, hydraulic reservoirs, mountain lakes, bays, and landslide dams, it results in tsunami (impulse water waves) by transforming their impact energy to water body, potentially causing damages of infrastructures and human casualties both near field and the distant coastlines. The intensity of hazard depends on the scale, location and process of the landslide, and also on the reservoir volume and topography that surrounds it. Volume or size of the initial release mass that fails and slides along a slope is one of the dominant factors to determine the degree of splash, propagating speed and the amplitudes of the fluid waves, and potential dam breach or water spill over. Here, we numerically integrate the two-phase mass flow model [Pudasaini S. P., J. Geophysi. Res. 117(F03010), 2012] for quasi-three-dimensional, high-resolution simulation results with variation of size of the two-phase initial landslide or debris both longitudinally and laterally. In our numerical experimental results, we observe fundamentally different solid and fluid evolution and wave structures in the reservoir. There are also significant differences in the flow dynamics of solid under water for different volumes of the release mass by extending or contracting the base area along downslope and/or cross-slope directions. The simulation results show that tsunami amplitudes and run out extents are rapidly increased when the volume of the initial release mass in the form of a triangular wedge is increased by increasing the base area through the increment of the length and breadth of the release base. This study can be useful to develop and implement tsunami hazard mitigation strategies to enhance public safety and reduce potential loss due to landslide-generated wave hazards.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"263 1","pages":"2250055:1-2250055:27"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76247761","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The dependence modeling of the caterpillar eggs yield of the laboratory population of Lymantria dispar on the duration of diapause 实验种群虫卵产量与滞育时间的关系模型不一致
Pub Date : 2022-04-05 DOI: 10.1142/s1793962322500404
A. Sedelnikov
The hatching model of Lymantria dispar caterpillars is being constructed. The variable parameter of the model is the duration of the diapause. The annual and semi-annual laboratory populations of L. dispar are studied. The statistical analysis of 2000 eggs from 20 clutches was carried out. The main features of the development of laboratory populations of L. dispar are described and compared with the studies of other authors. The results of this work can be used to study the evolution of L. dispar in the framework of laboratory growing conditions.
构建了异曲毒蛾幼虫的孵化模型。模型的可变参数是滞育的持续时间。研究了一年生和半年生的室内种群。对20窝2000枚卵进行了统计分析。本文描述了实验室种群发育的主要特征,并与其他作者的研究结果进行了比较。本工作的结果可用于在实验室生长条件框架下研究L. dispar的进化。
{"title":"The dependence modeling of the caterpillar eggs yield of the laboratory population of Lymantria dispar on the duration of diapause","authors":"A. Sedelnikov","doi":"10.1142/s1793962322500404","DOIUrl":"https://doi.org/10.1142/s1793962322500404","url":null,"abstract":"The hatching model of Lymantria dispar caterpillars is being constructed. The variable parameter of the model is the duration of the diapause. The annual and semi-annual laboratory populations of L. dispar are studied. The statistical analysis of 2000 eggs from 20 clutches was carried out. The main features of the development of laboratory populations of L. dispar are described and compared with the studies of other authors. The results of this work can be used to study the evolution of L. dispar in the framework of laboratory growing conditions.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"14 1","pages":"2250040:1-2250040:10"},"PeriodicalIF":0.0,"publicationDate":"2022-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80305131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PFCMVO: Political fractional competitive multi-verse optimization enabled deep neuro fuzzy network for student performance estimation in spark environment PFCMVO:基于政治分数竞争多元优化的深度神经模糊网络在火花环境下的学生成绩评估
Pub Date : 2022-03-28 DOI: 10.1142/s1793962322500507
A. Baruah, S. Baruah
Student performance calculation is an essential process in online learning scheme, which intends to afford students along with admittance to active learning. Student performance forecast is most concerning problem in education and training field, particularly in educational data mining (EDM). The prediction process provisions the students to choose courses and intend suitable training strategies for themselves. Furthermore, student performance calculation permits lecturers and educational supervisors to designate which students should be observed and maintained to finish their plans with finest outcomes. These provisions can decrease the official notices and exclusions from universities because of students’ poor performance. In this paper, Political Fractional Competitive Multi-verse Optimization enabled Deep Neuro fuzzy network (PFCMVO enabled DNFN) uses spark framework for student performance calculation. Moreover, Yeo–Johnson transformation is applied for transforming the input data for effectual student performance prediction. In addition, Damerau–Levenshtein (DL) distance is applied to select appropriate features. The DNFN classifier is utilized to execute student performance prediction where the classifier is trained by PFCMVO algorithm. The developed student performance prediction model outperforms than the other existing techniques with respect to Precision, Recall, [Formula: see text]-measure, and Prediction accuracy of 0.9259, 0.9321, 0.9290, and 0.9372 for dataset-1 and 0.9126, 0.9271, 0.9198, and 0.9248 for dataset-2, respectively.
学生成绩计算是在线学习方案的一个重要环节,在线学习方案旨在为学生提供主动学习的机会。学生成绩预测是目前教育培训领域,特别是教育数据挖掘领域最为关注的问题。预测过程为学生选择课程和制定适合自己的训练策略提供了依据。此外,学生表现计算允许讲师和教育主管指定哪些学生应该被观察和维护,以最好的结果完成他们的计划。这些规定可以减少由于学生表现不佳而被正式通知和被大学开除的情况。在本文中,支持政治分数竞争多元优化的深度神经模糊网络(PFCMVO支持DNFN)使用spark框架进行学生成绩计算。此外,采用杨-约翰逊变换对输入数据进行转换,从而有效地预测学生的成绩。此外,采用Damerau-Levenshtein (DL)距离选择合适的特征。DNFN分类器用于执行学生成绩预测,其中分类器通过PFCMVO算法进行训练。所开发的学生成绩预测模型在Precision、Recall、[公式:见文本]-measure和预测精度方面优于其他现有技术,数据集1的预测精度分别为0.9259、0.9321、0.9290和0.9372,数据集2的预测精度分别为0.9126、0.9271、0.9198和0.9248。
{"title":"PFCMVO: Political fractional competitive multi-verse optimization enabled deep neuro fuzzy network for student performance estimation in spark environment","authors":"A. Baruah, S. Baruah","doi":"10.1142/s1793962322500507","DOIUrl":"https://doi.org/10.1142/s1793962322500507","url":null,"abstract":"Student performance calculation is an essential process in online learning scheme, which intends to afford students along with admittance to active learning. Student performance forecast is most concerning problem in education and training field, particularly in educational data mining (EDM). The prediction process provisions the students to choose courses and intend suitable training strategies for themselves. Furthermore, student performance calculation permits lecturers and educational supervisors to designate which students should be observed and maintained to finish their plans with finest outcomes. These provisions can decrease the official notices and exclusions from universities because of students’ poor performance. In this paper, Political Fractional Competitive Multi-verse Optimization enabled Deep Neuro fuzzy network (PFCMVO enabled DNFN) uses spark framework for student performance calculation. Moreover, Yeo–Johnson transformation is applied for transforming the input data for effectual student performance prediction. In addition, Damerau–Levenshtein (DL) distance is applied to select appropriate features. The DNFN classifier is utilized to execute student performance prediction where the classifier is trained by PFCMVO algorithm. The developed student performance prediction model outperforms than the other existing techniques with respect to Precision, Recall, [Formula: see text]-measure, and Prediction accuracy of 0.9259, 0.9321, 0.9290, and 0.9372 for dataset-1 and 0.9126, 0.9271, 0.9198, and 0.9248 for dataset-2, respectively.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"30 1","pages":"2250050:1-2250050:25"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80772049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network security analysis for cloud computing environment 云计算环境下的网络安全分析
Pub Date : 2022-03-28 DOI: 10.1142/s1793962322500544
Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
Information technology services for businesses and consumers can be delivered via the Internet using cloud computing (CC) because it is agile, cost-effective, and time-tested. For many real-world applications, the data are kept in the cloud by a third-party service and accessible through the Internet as needed through CC approaches. Risks associated with CC involve the data security and network security account for real-time systems. This paper discusses different security threats in CC and suggests a solution by designing a network security analysis scheme with machine learning (NSA-ML). The ML classifier predicts the network vulnerabilities and prevents insecure communication in a CC environment. The proposed NSA-ML presents a data authentication scheme with a novel encryption methodology to ensure data security. The experimental results show that the proposed NSA-ML outperforms the existing cloud security approaches by gaining an efficiency of 95.4%.
面向企业和消费者的信息技术服务可以通过使用云计算(CC)的互联网交付,因为它是敏捷的、具有成本效益的,并且经过了时间的考验。对于许多现实世界的应用程序,数据由第三方服务保存在云中,并根据需要通过Internet通过CC方法进行访问。与CC相关的风险涉及实时系统的数据安全和网络安全帐户。本文讨论了CC中的各种安全威胁,并通过设计一种基于机器学习的网络安全分析方案(NSA-ML)提出了解决方案。ML分类器预测网络漏洞,防止CC环境中的不安全通信。提出的NSA-ML提出了一种具有新颖加密方法的数据认证方案,以确保数据安全。实验结果表明,本文提出的NSA-ML方法的效率达到95.4%,优于现有的云安全方法。
{"title":"Network security analysis for cloud computing environment","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.1142/s1793962322500544","DOIUrl":"https://doi.org/10.1142/s1793962322500544","url":null,"abstract":"Information technology services for businesses and consumers can be delivered via the Internet using cloud computing (CC) because it is agile, cost-effective, and time-tested. For many real-world applications, the data are kept in the cloud by a third-party service and accessible through the Internet as needed through CC approaches. Risks associated with CC involve the data security and network security account for real-time systems. This paper discusses different security threats in CC and suggests a solution by designing a network security analysis scheme with machine learning (NSA-ML). The ML classifier predicts the network vulnerabilities and prevents insecure communication in a CC environment. The proposed NSA-ML presents a data authentication scheme with a novel encryption methodology to ensure data security. The experimental results show that the proposed NSA-ML outperforms the existing cloud security approaches by gaining an efficiency of 95.4%.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"64 1","pages":"2250054:1-2250054:20"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82356627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Online shopping behavior analysis for smart business using big data analytics and blockchain security 使用大数据分析和区块链安全的智能商业在线购物行为分析
Pub Date : 2022-03-28 DOI: 10.1142/s1793962322500532
Weiwei Wei, C. Sivaparthipan, P. Kumar
Technological advancement in a modern environment is approaching universality. The realm and uses of information technology (IT) and Blockchain Security have been extensively broadened. Any business wishing to boost its market prospects would certainly keep records of the perspectives and behaviors of its consumers. The firms employ advanced technological concepts, skills, and methods to comprehend their applicants. Additional information and facts are analyzed to improve judgment. Business analytics and Blockchain Security professionals have a positive opinion. Online shopping behavior analysis (OSBA) is proposed in this research. It addresses a smooth transition from a prediction method to a gradual information strategy that learns the clients’ needs and achieves their electronic trading revenues. Any commercial enterprise must have limitless entry to information. That contains population revenues, industrial patterns, competition and customer information, productivity measurements, computations, and much more. Corporate information has a significant role in this undertaking. Experimental information is collected periodically to evaluate the evidence and provide fresh discoveries and operations that provide fresh perspectives. The major consideration principal element assessment approach is utilized with big data analytics, Blockchain Security, and fuzzy interference system to assess the essential purchasing variables for customers. It achieves an accuracy of 89% and an [Formula: see text] score of 87%. Models like support vector machine, convolutional neural network, deep neural network, random forest, fuzzy logic, and decision tree (DT) are compared with the OSBA model’s simulation results (DT). Fuzzy interference, big data, and Blockchain Security analytics improve the OSBA model’s performance.
在现代环境中,技术进步正趋于普遍化。信息技术和区块链安全的领域和用途得到广泛拓展。任何希望提升市场前景的企业,都肯定会记录下消费者的观点和行为。这些公司采用先进的技术概念、技能和方法来了解他们的申请人。分析额外的信息和事实以提高判断。商业分析和区块链安全专业人士对此持积极态度。本研究提出了网上购物行为分析(OSBA)。它解决了从预测方法到渐进信息策略的平稳过渡,从而了解客户的需求并实现他们的电子交易收入。任何商业企业都必须不受限制地获取信息。它包含人口收入、工业模式、竞争和客户信息、生产力测量、计算等等。公司信息在这项工作中起着重要的作用。定期收集实验信息,以评估证据,并提供新的发现和操作,提供新的视角。主要考虑要素评估方法与大数据分析、区块链安全和模糊干扰系统一起用于评估客户的基本购买变量。它的准确率达到89%,得分达到87%。将支持向量机、卷积神经网络、深度神经网络、随机森林、模糊逻辑和决策树(DT)等模型与OSBA模型的仿真结果(DT)进行比较。模糊干扰、大数据和区块链安全分析提高了OSBA模型的性能。
{"title":"Online shopping behavior analysis for smart business using big data analytics and blockchain security","authors":"Weiwei Wei, C. Sivaparthipan, P. Kumar","doi":"10.1142/s1793962322500532","DOIUrl":"https://doi.org/10.1142/s1793962322500532","url":null,"abstract":"Technological advancement in a modern environment is approaching universality. The realm and uses of information technology (IT) and Blockchain Security have been extensively broadened. Any business wishing to boost its market prospects would certainly keep records of the perspectives and behaviors of its consumers. The firms employ advanced technological concepts, skills, and methods to comprehend their applicants. Additional information and facts are analyzed to improve judgment. Business analytics and Blockchain Security professionals have a positive opinion. Online shopping behavior analysis (OSBA) is proposed in this research. It addresses a smooth transition from a prediction method to a gradual information strategy that learns the clients’ needs and achieves their electronic trading revenues. Any commercial enterprise must have limitless entry to information. That contains population revenues, industrial patterns, competition and customer information, productivity measurements, computations, and much more. Corporate information has a significant role in this undertaking. Experimental information is collected periodically to evaluate the evidence and provide fresh discoveries and operations that provide fresh perspectives. The major consideration principal element assessment approach is utilized with big data analytics, Blockchain Security, and fuzzy interference system to assess the essential purchasing variables for customers. It achieves an accuracy of 89% and an [Formula: see text] score of 87%. Models like support vector machine, convolutional neural network, deep neural network, random forest, fuzzy logic, and decision tree (DT) are compared with the OSBA model’s simulation results (DT). Fuzzy interference, big data, and Blockchain Security analytics improve the OSBA model’s performance.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"41 1","pages":"2250053:1-2250053:22"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76480459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Acceptance sampling to aid in the verification of computational simulations 辅助验证计算模拟的验收抽样
Pub Date : 2022-03-28 DOI: 10.1142/s1793962322500441
Andrew J. Collins, Erika F. Frydenlund, Christopher J. Lynch, R. M. Robinson
Advances in computing allow for the construction of increasingly large and complex models and simulations. Exhaustive error checking of these intricate, large computational simulation models is daunting and potentially impractical. This paper explores an approach to error-checking simulation model components using an Acceptance Sampling methodology from the field of industrial manufacturing. We propose a systematic process in which a simulation inspector examines only a fraction of the computational model elements to measure the errors present. Our proposed process could support established verification processes by sampling the simulation components to identify whether the model is acceptably error free and which components require correcting. The proposed methodology relies on several statistical constraints but serves the interests of simulation professionals as part of the overall verification process. We illustrate the application and usefulness of our methodology through a real-world case study of a citywide microscopic transportation model.
计算机技术的进步使构建越来越大、越来越复杂的模型和模拟成为可能。对这些复杂的大型计算模拟模型进行详尽的错误检查是令人生畏的,而且可能不切实际。本文探讨了一种使用工业制造领域的验收抽样方法对仿真模型组件进行错误检查的方法。我们提出了一个系统的过程,在这个过程中,模拟检查员只检查一小部分计算模型元素来测量存在的误差。我们建议的流程可以通过采样模拟组件来支持已建立的验证流程,以确定模型是否可以接受无错误,以及哪些组件需要纠正。提出的方法依赖于几个统计约束,但服务于仿真专业人员的利益,作为整个验证过程的一部分。我们通过一个城市微观交通模型的真实案例研究来说明我们方法的应用和有用性。
{"title":"Acceptance sampling to aid in the verification of computational simulations","authors":"Andrew J. Collins, Erika F. Frydenlund, Christopher J. Lynch, R. M. Robinson","doi":"10.1142/s1793962322500441","DOIUrl":"https://doi.org/10.1142/s1793962322500441","url":null,"abstract":"Advances in computing allow for the construction of increasingly large and complex models and simulations. Exhaustive error checking of these intricate, large computational simulation models is daunting and potentially impractical. This paper explores an approach to error-checking simulation model components using an Acceptance Sampling methodology from the field of industrial manufacturing. We propose a systematic process in which a simulation inspector examines only a fraction of the computational model elements to measure the errors present. Our proposed process could support established verification processes by sampling the simulation components to identify whether the model is acceptably error free and which components require correcting. The proposed methodology relies on several statistical constraints but serves the interests of simulation professionals as part of the overall verification process. We illustrate the application and usefulness of our methodology through a real-world case study of a citywide microscopic transportation model.","PeriodicalId":13657,"journal":{"name":"Int. J. Model. Simul. Sci. Comput.","volume":"79 1","pages":"2250044:1-2250044:28"},"PeriodicalIF":0.0,"publicationDate":"2022-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81892483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Model. Simul. Sci. Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1