首页 > 最新文献

International Journal of Information Technology最新文献

英文 中文
Statistical cryptanalysis of seven classical lightweight ciphers 七种经典轻量级密码的统计密码分析
Pub Date : 2024-09-18 DOI: 10.1007/s41870-024-02175-4
Runa Chatterjee, Rajdeep Chakraborty

The smart world currently employs smart devices that are inextricably linked with everyday life. These smart devices are lightweight due to their small size, low memory capacity, low-power batteries, and limited computational capability.Conventional cryptographic algorithms aren’t applicable there. This demand leads to the development of lightweight cryptography (LWC). In various literature surveys, many researchers analysed lightweight ciphers in terms of area, throughput, latency, power consumption, energy dissipation, encryption-decryption time, etc. However, no single paper includes a variety of statistical cryptanalysis of LWCs. Such a type of bit-level data analysis checks the vulnerabilities of algorithms against different kinds of attacks. It ensures the difficulties of cryptanalysis. This paper has included seven classical lightweight ciphers PRESENT, SIMON, TEA, SPECK, CLEFIA, MICKEY2.0, and GRAIN V1, for statistical data analysis. The analysis includes non-homogeneity, avalanche ratio, entropy, floating frequency, frequency distribution, auto-correlation, periodicity, 4-gram pattern analysis.Moreover, four randomness like frequency, serial, run, and poker tests are also added. Finally, a comparative and compact discussion has made on ciphers’ efficiency. This study makes a trade-off, which proves the uniqueness of this work. It opens a new window for the upcoming researchers to search their work area.

目前,智能世界采用的智能设备与日常生活密不可分。这些智能设备体积小、内存容量低、电池功耗低、计算能力有限,因此重量很轻。传统的加密算法在这些设备上并不适用,这种需求催生了轻量级密码学(LWC)的发展。在各种文献调查中,许多研究人员从面积、吞吐量、延迟、功耗、能量消耗、加密-解密时间等方面分析了轻量级密码。但是,没有一篇论文包含对轻量级密码的各种统计密码分析。这种比特级数据分析可以检查算法在不同攻击下的脆弱性。它确保了密码分析的难度。本文对 PRESENT、SIMON、TEA、SPECK、CLEFIA、MICKEY2.0 和 GRAIN V1 七种经典轻量级密码进行了统计数据分析。分析内容包括非均质性、雪崩比、熵、浮动频率、频率分布、自相关性、周期性、4-gram 模式分析,此外还增加了频率、序列、运行和扑克等四种随机性测试。最后,对密码的效率进行了紧凑的比较讨论。这项研究进行了权衡,证明了这项工作的独特性。它为未来的研究人员打开了一扇寻找工作领域的新窗口。
{"title":"Statistical cryptanalysis of seven classical lightweight ciphers","authors":"Runa Chatterjee, Rajdeep Chakraborty","doi":"10.1007/s41870-024-02175-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02175-4","url":null,"abstract":"<p>The smart world currently employs smart devices that are inextricably linked with everyday life. These smart devices are lightweight due to their small size, low memory capacity, low-power batteries, and limited computational capability.Conventional cryptographic algorithms aren’t applicable there. This demand leads to the development of lightweight cryptography (LWC). In various literature surveys, many researchers analysed lightweight ciphers in terms of area, throughput, latency, power consumption, energy dissipation, encryption-decryption time, etc. However, no single paper includes a variety of statistical cryptanalysis of LWCs. Such a type of bit-level data analysis checks the vulnerabilities of algorithms against different kinds of attacks. It ensures the difficulties of cryptanalysis. This paper has included seven classical lightweight ciphers PRESENT, SIMON, TEA, SPECK, CLEFIA, MICKEY2.0, and GRAIN V1, for statistical data analysis. The analysis includes non-homogeneity, avalanche ratio, entropy, floating frequency, frequency distribution, auto-correlation, periodicity, 4-gram pattern analysis.Moreover, four randomness like frequency, serial, run, and poker tests are also added. Finally, a comparative and compact discussion has made on ciphers’ efficiency. This study makes a trade-off, which proves the uniqueness of this work. It opens a new window for the upcoming researchers to search their work area.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer CNN-BO-LSTM:肝癌预后的集合框架
Pub Date : 2024-09-18 DOI: 10.1007/s41870-024-02190-5
Sunil Kumar K N, Pavan P. Kashyap, Darshan A. Bhyratae, Suhas A. Bhyratae, A. Kalaivani

Computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach that employed traditional deep learning techniques. Such techniques are not well versed with CAD instruments in terms of accuracy. Therefore, the given manuscript presents a convolutional neural network normalized architecture embedded with Bayesian optimization and long short-term memory (CNN-BO-LSTM) for the identification of liver cancer. Early pre-processing is done on the input magnetic resonance imaging (MRI) scan images to improve clarity. Next, we used dynamic binary classification to apply the accurate and region of interest (ROI) extracting approach. It is followed by automatic retrieval of CNN-based appearances from the ROI approach. For classification purposes, LSTM is used, which categorizes the images as benign or malignant. The proposed design’s testing outcomes, which combine characteristics with CNN-based ROI extraction and LSTM classification, surpassed the current state-of-the-art techniques.

计算机辅助诊断(CAD)是全球癌症鉴定的首选,它依赖于计算机化图像处理。以前的计算机辅助诊断工具的创建采用了半自动化方法,使用了传统的深度学习技术。此类技术在准确性方面与 CAD 仪器并不匹配。因此,本手稿提出了一种嵌入贝叶斯优化和长短期记忆(CNN-BO-LSTM)的卷积神经网络归一化架构,用于识别肝癌。首先对输入的磁共振成像(MRI)扫描图像进行预处理,以提高清晰度。接下来,我们使用动态二元分类法来应用准确的兴趣区域(ROI)提取方法。随后,我们从 ROI 方法中自动检索基于 CNN 的外观。为了达到分类目的,我们使用了 LSTM,将图像分为良性和恶性。建议设计的测试结果结合了基于 CNN 的 ROI 提取和 LSTM 分类的特点,超越了当前最先进的技术。
{"title":"CNN-BO-LSTM: an ensemble framework for prognosis of liver cancer","authors":"Sunil Kumar K N, Pavan P. Kashyap, Darshan A. Bhyratae, Suhas A. Bhyratae, A. Kalaivani","doi":"10.1007/s41870-024-02190-5","DOIUrl":"https://doi.org/10.1007/s41870-024-02190-5","url":null,"abstract":"<p>Computer-assisted diagnosis (CAD) is preferred for cancer identification across the globe, which relies on computerized image processing. The creation of previous CAD instruments involved a semi-automated approach that employed traditional deep learning techniques. Such techniques are not well versed with CAD instruments in terms of accuracy. Therefore, the given manuscript presents a convolutional neural network normalized architecture embedded with Bayesian optimization and long short-term memory (CNN-BO-LSTM) for the identification of liver cancer. Early pre-processing is done on the input magnetic resonance imaging (MRI) scan images to improve clarity. Next, we used dynamic binary classification to apply the accurate and region of interest (ROI) extracting approach. It is followed by automatic retrieval of CNN-based appearances from the ROI approach. For classification purposes, LSTM is used, which categorizes the images as benign or malignant. The proposed design’s testing outcomes, which combine characteristics with CNN-based ROI extraction and LSTM classification, surpassed the current state-of-the-art techniques.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RBCA-ETS: enhancing extractive text summarization with contextual embedding and word-level attention RBCA-ETS:利用上下文嵌入和词级关注加强提取式文本摘要
Pub Date : 2024-09-17 DOI: 10.1007/s41870-024-02192-3
Ravindra Gangundi, Rajeswari Sridhar

The existing limitations in extractive text summarization encompass challenges related to preserving contextual features, limited feature extraction capabilities, and handling hierarchical and compositional aspects. To address these issues, the RoBERTa-BiLSTM-CNN-Attention Extractive Text Summarization, i.e., the RBCA-ETS model, is proposed in this work. RoBERTa word embedding is used to generate contextual embeddings. Parallelly connected CNN and BiLSTM layers extract textual features. CNN focuses more on local features, and BiLSTM captures long-range dependencies that extend across sentences. These two feature sets are concatenated and forwarded to the attention layer, highlighting the most relevant features. In the output layer, a fully connected layer receives the attention vector and calculates sentence scores for each sentence. This leads to the generation of the final summary. The RBCA-ETS model has demonstrated superior performance on the CNN-Daily Mail (CNN/DM) dataset compared to many state-of-the-art methods, and it has also outperformed existing state-of-the-art techniques when tested on the out-of-domain DUC 2002 dataset.

抽取式文本摘要的现有局限性包括与保留上下文特征相关的挑战、有限的特征提取能力以及处理层次和组成方面的问题。为解决这些问题,本研究提出了 RoBERTa-BiLSTM-CNN-Attention Extractive Text Summarization(即 RBCA-ETS 模型)。RBCA-ETS 模型使用 RoBERTa 词嵌入生成上下文嵌入。并行连接的 CNN 和 BiLSTM 层提取文本特征。CNN 更注重局部特征,而 BiLSTM 则捕捉跨句子的长距离依赖关系。这两个特征集被串联起来并转发到注意力层,突出最相关的特征。在输出层,一个全连接层接收注意力向量,并计算每个句子的分数。这样就生成了最终摘要。与许多最先进的方法相比,RBCA-ETS 模型在 CNN-Daily Mail(CNN/DM)数据集上表现出了卓越的性能,在域外 DUC 2002 数据集上进行测试时,其性能也优于现有的最先进技术。
{"title":"RBCA-ETS: enhancing extractive text summarization with contextual embedding and word-level attention","authors":"Ravindra Gangundi, Rajeswari Sridhar","doi":"10.1007/s41870-024-02192-3","DOIUrl":"https://doi.org/10.1007/s41870-024-02192-3","url":null,"abstract":"<p>The existing limitations in extractive text summarization encompass challenges related to preserving contextual features, limited feature extraction capabilities, and handling hierarchical and compositional aspects. To address these issues, the RoBERTa-BiLSTM-CNN-Attention Extractive Text Summarization, i.e., the RBCA-ETS model, is proposed in this work. RoBERTa word embedding is used to generate contextual embeddings. Parallelly connected CNN and BiLSTM layers extract textual features. CNN focuses more on local features, and BiLSTM captures long-range dependencies that extend across sentences. These two feature sets are concatenated and forwarded to the attention layer, highlighting the most relevant features. In the output layer, a fully connected layer receives the attention vector and calculates sentence scores for each sentence. This leads to the generation of the final summary. The RBCA-ETS model has demonstrated superior performance on the CNN-Daily Mail (CNN/DM) dataset compared to many state-of-the-art methods, and it has also outperformed existing state-of-the-art techniques when tested on the out-of-domain DUC 2002 dataset.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Architecting lymphoma fusion: PROMETHEE-II guided optimization of combination therapeutic synergy 构建淋巴瘤融合:PROMETHEE-II 指导下的联合疗法协同效应优化
Pub Date : 2024-09-17 DOI: 10.1007/s41870-024-02194-1
Syed Anas Ansar, Swati Arya, Nupur Soni, Mohd Waris Khan, Raees Ahmad Khan

Lymphoma, a malignancy originating from the aberrant proliferation of lymphocytes in the lymphatic system, becomes one of the prime concerns in health care across the world. The traditional, mono-therapeutic interventions using chemotherapeutic agents and radiation showed limitations in relation to disease control, suboptimal response, and development of intractable drug resistance. This study thus opens the reasons for combination therapies in detail by explaining the intrinsic rationale and revealing the intrinsic advantages of lymphoma treatment with an initiative underpinned by scrupulous analysis. Furthermore, the broad analysis had comparisons between combination therapies, were derived from studies, clinical trials, and actual instances. Key performance metrics like as overall response rates, progression-free survival, and overall survival, together with a thorough review of safety profiles, are used to determine the efficacy and long-term tolerability of various combination regimens. Using the PROMETHEE-II technique, this study has attempted to offer a comprehensive knowledge of the complex therapeutic landscape by addressing various issues and factors such as drug-disease interactions, toxicities, cost-effectiveness, and accessibility. This study avails practitioners and researchers with indelible understanding that seeks to enhance the optimum therapeutic trajectory and evidence-based decision-making toward an improved outcome of treatment in lymphoma.

淋巴瘤是淋巴系统中淋巴细胞异常增殖引起的恶性肿瘤,已成为全球医疗保健领域的首要关注点之一。使用化疗药物和放射线的传统单一疗法在疾病控制、次优反应和产生顽固耐药性方面存在局限性。因此,本研究通过严谨的分析,解释了淋巴瘤治疗的内在原理,揭示了淋巴瘤治疗的内在优势,从而详细揭示了联合疗法的原因。此外,广泛的分析还对来自研究、临床试验和实际案例的联合疗法进行了比较。总反应率、无进展生存期和总生存期等关键绩效指标,以及对安全性的全面审查,都被用来确定各种联合疗法的疗效和长期耐受性。本研究采用 PROMETHEE-II 技术,试图通过解决药物与疾病的相互作用、毒性、成本效益和可及性等各种问题和因素,全面了解复杂的治疗情况。这项研究为从业人员和研究人员提供了不可磨灭的认识,旨在加强最佳治疗轨迹和循证决策,从而改善淋巴瘤的治疗效果。
{"title":"Architecting lymphoma fusion: PROMETHEE-II guided optimization of combination therapeutic synergy","authors":"Syed Anas Ansar, Swati Arya, Nupur Soni, Mohd Waris Khan, Raees Ahmad Khan","doi":"10.1007/s41870-024-02194-1","DOIUrl":"https://doi.org/10.1007/s41870-024-02194-1","url":null,"abstract":"<p>Lymphoma, a malignancy originating from the aberrant proliferation of lymphocytes in the lymphatic system, becomes one of the prime concerns in health care across the world. The traditional, mono-therapeutic interventions using chemotherapeutic agents and radiation showed limitations in relation to disease control, suboptimal response, and development of intractable drug resistance. This study thus opens the reasons for combination therapies in detail by explaining the intrinsic rationale and revealing the intrinsic advantages of lymphoma treatment with an initiative underpinned by scrupulous analysis. Furthermore, the broad analysis had comparisons between combination therapies, were derived from studies, clinical trials, and actual instances. Key performance metrics like as overall response rates, progression-free survival, and overall survival, together with a thorough review of safety profiles, are used to determine the efficacy and long-term tolerability of various combination regimens. Using the PROMETHEE-II technique, this study has attempted to offer a comprehensive knowledge of the complex therapeutic landscape by addressing various issues and factors such as drug-disease interactions, toxicities, cost-effectiveness, and accessibility. This study avails practitioners and researchers with indelible understanding that seeks to enhance the optimum therapeutic trajectory and evidence-based decision-making toward an improved outcome of treatment in lymphoma.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"189 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265760","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Adaptive grouped balanced binary tree based multi user secure data transmission on cloud 基于自适应分组平衡二叉树的多用户云安全数据传输
Pub Date : 2024-09-16 DOI: 10.1007/s41870-024-02165-6
P. Pavithra, B. Hariharan

Secure multi-keyword search for outsourced cloud data has gained popularity, especially for scenarios involving multiple data owners. This work proposes a method for secure multi-keyword searches across encrypted cloud data from various owners, utilizing an administrator or trustworthy third party for key management. The approach employs the TF-IDF model and Vector Space Model (VSM) to generate index and query vectors, and uses an advanced Attribute-Based Encryption (ABE) algorithm for data privacy. The Improved Dingo Optimization Algorithm (IDOA) optimally selects the key value. Encrypted emails are sent to a cloud server, and a Grouped Balanced Binary (GBB) tree structure is used for index construction. The Greedy Depth-First Search (GDFS) method efficiently searches the index, grouping relevant documents to exclude unnecessary ones. Performance is evaluated based on memory usage, execution time, encryption and decryption times, and search times, implemented in Java and tested on a cloud simulator.

对外包云数据进行安全多关键字搜索已越来越受欢迎,尤其是在涉及多个数据所有者的场景中。本研究提出了一种方法,利用管理员或可信第三方进行密钥管理,对来自不同所有者的加密云数据进行安全的多关键字搜索。该方法采用 TF-IDF 模型和矢量空间模型(VSM)生成索引和查询向量,并使用先进的基于属性的加密(ABE)算法来保护数据隐私。改进的 Dingo 优化算法(IDOA)可优化选择密钥值。加密邮件被发送到云服务器,并使用分组平衡二进制(GBB)树结构构建索引。贪婪深度优先搜索(GDFS)方法可高效搜索索引,将相关文档分组,排除不必要的文档。性能评估基于内存使用量、执行时间、加密和解密时间以及搜索时间,采用 Java 实现,并在云模拟器上进行了测试。
{"title":"Adaptive grouped balanced binary tree based multi user secure data transmission on cloud","authors":"P. Pavithra, B. Hariharan","doi":"10.1007/s41870-024-02165-6","DOIUrl":"https://doi.org/10.1007/s41870-024-02165-6","url":null,"abstract":"<p>Secure multi-keyword search for outsourced cloud data has gained popularity, especially for scenarios involving multiple data owners. This work proposes a method for secure multi-keyword searches across encrypted cloud data from various owners, utilizing an administrator or trustworthy third party for key management. The approach employs the TF-IDF model and Vector Space Model (VSM) to generate index and query vectors, and uses an advanced Attribute-Based Encryption (ABE) algorithm for data privacy. The Improved Dingo Optimization Algorithm (IDOA) optimally selects the key value. Encrypted emails are sent to a cloud server, and a Grouped Balanced Binary (GBB) tree structure is used for index construction. The Greedy Depth-First Search (GDFS) method efficiently searches the index, grouping relevant documents to exclude unnecessary ones. Performance is evaluated based on memory usage, execution time, encryption and decryption times, and search times, implemented in Java and tested on a cloud simulator.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"19 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RAMD and transient analysis of a juice clarification unit in sugar plants 制糖厂果汁澄清装置的 RAMD 和瞬态分析
Pub Date : 2024-09-16 DOI: 10.1007/s41870-024-02147-8
Kanak Saini, Monika Saini, Ashish Kumar, Dinesh Kumar Saini

The main objective of present work is to analyse the reliability measures of a juice clarification unit in sugar plants under the concepts of various redundancy polices. The juice clarification unit (JCU) is a complex system having eight subsystems configured according to various redundancies internally. It is assumed that all the associated random variables follow exponential distribution. The Markov birth–death process and basic reliability arguments are used to derive Reliability, Availability, Maintainability, and Dependability (RAMD) measures as well as Runge–Kutta forth order is used to derive transient solution. The numerical results for reliability, availability, maintainability, Mean Time Between Failure (MTBF), Mean Time to Repair (MTTR), and dependability are derived to identify the most sensitive component. The system attains transient availability 0.995881 at 5-time units. To highlight the importance of the study numerical results of transient availability are derived by making 10% and 50% variation in failure and repair rates. The derived numerical results of the proposed model draw significant insights that can be directly used in the design and maintenance process of juice clarification unit. It will improve the plant efficiency. It will give designers a solid plan to use resources intelligently and make strategies that make juice clarification unit live to work better.

本研究的主要目的是分析制糖厂果汁澄清装置在各种冗余政策概念下的可靠性措施。果汁澄清装置(JCU)是一个复杂的系统,内部有八个子系统,根据不同的冗余度进行配置。假设所有相关的随机变量都服从指数分布。马尔可夫生死过程和基本可靠性论证用于推导可靠性、可用性、可维护性和可依赖性(RAMD)度量,Runge-Kutta 四阶用于推导瞬态解决方案。可靠性、可用性、可维护性、平均故障间隔时间 (MTBF)、平均修复时间 (MTTR) 和可靠性的数值结果可用于确定最敏感的组件。系统在 5 个时间单位时的瞬态可用性为 0.995881。为了突出研究的重要性,通过对故障率和维修率分别进行 10% 和 50% 的调整,得出了瞬态可用性的数值结果。所提模型的数值结果具有重要的启示意义,可直接用于果汁澄清装置的设计和维护过程。它将提高设备效率。它将为设计人员提供一个可靠的计划,以明智地使用资源,并制定战略,使果汁澄清装置更好地工作。
{"title":"RAMD and transient analysis of a juice clarification unit in sugar plants","authors":"Kanak Saini, Monika Saini, Ashish Kumar, Dinesh Kumar Saini","doi":"10.1007/s41870-024-02147-8","DOIUrl":"https://doi.org/10.1007/s41870-024-02147-8","url":null,"abstract":"<p>The main objective of present work is to analyse the reliability measures of a juice clarification unit in sugar plants under the concepts of various redundancy polices. The juice clarification unit (JCU) is a complex system having eight subsystems configured according to various redundancies internally. It is assumed that all the associated random variables follow exponential distribution. The Markov birth–death process and basic reliability arguments are used to derive Reliability, Availability, Maintainability, and Dependability (RAMD) measures as well as Runge–Kutta forth order is used to derive transient solution. The numerical results for reliability, availability, maintainability, Mean Time Between Failure (MTBF), Mean Time to Repair (MTTR), and dependability are derived to identify the most sensitive component. The system attains transient availability 0.995881 at 5-time units. To highlight the importance of the study numerical results of transient availability are derived by making 10% and 50% variation in failure and repair rates. The derived numerical results of the proposed model draw significant insights that can be directly used in the design and maintenance process of juice clarification unit. It will improve the plant efficiency. It will give designers a solid plan to use resources intelligently and make strategies that make juice clarification unit live to work better.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"8 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing data transmission channels between smart devices and the cloud using homomorphic encryption for blood pressure monitoring sensors 为血压监测传感器使用同态加密技术确保智能设备与云之间数据传输通道的安全
Pub Date : 2024-09-16 DOI: 10.1007/s41870-024-02195-0
Mohammad Ubaidullah Bokhari, Abeer Masroor, Basil Hanafi

Ensuring the secure transmission of data between smart devices and the cloud is paramount in the context of Blood Pressure Monitoring Sensors. In the realm of “Securing Data Transmission Channel between Smart Devices and Cloud using Homomorphic Encryption for Blood Pressure” “Monitoring sensors play a crucial role in various applications.” The incorporation of homomorphic encryption is considered essential to guarantee the privacy and security of health data. In smart cities, where mobile healthcare networks play a vital role, concerns arise over the transmission of sensitive health information to untrusted cloud servers. Our focus lies in the development of a specialized architecture explicitly designed for the unique requirements of Blood Pressure Monitoring Sensors. Within this paper, a concise yet comprehensive framework, for mobile healthcare networks is outlined, emphasizing three secure medical calculations encompassing tasks such as computing average heart rate detecting long QT syndrome, and performing Chi-square tests are integral aspects of healthcare. Through this methodology, a distinctive and innovative solution is provided, tailored specifically to the challenges of securing data transmission channels for Blood Pressure Monitoring Sensors.

在血压监测传感器领域,确保智能设备与云之间的数据传输安全至关重要。在 "利用血压同态加密确保智能设备与云之间的数据传输通道安全 "这一领域,"监测传感器在各种应用中发挥着至关重要的作用"。同态加密被认为是保证健康数据隐私和安全的关键。在智能城市中,移动医疗保健网络发挥着至关重要的作用,人们担心敏感的健康信息会被传输到不受信任的云服务器上。我们的重点在于开发一种专门针对血压监测传感器的独特要求而设计的专门架构。本文概述了一个简洁而全面的移动医疗保健网络框架,强调了三种安全医疗计算任务,如计算平均心率、检测长 QT 综合征和执行 Chi-square 检验,这些都是医疗保健不可或缺的方面。通过这种方法,提供了一种独特的创新解决方案,专门针对血压监测传感器数据传输通道安全所面临的挑战。
{"title":"Securing data transmission channels between smart devices and the cloud using homomorphic encryption for blood pressure monitoring sensors","authors":"Mohammad Ubaidullah Bokhari, Abeer Masroor, Basil Hanafi","doi":"10.1007/s41870-024-02195-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02195-0","url":null,"abstract":"<p>Ensuring the secure transmission of data between smart devices and the cloud is paramount in the context of Blood Pressure Monitoring Sensors. In the realm of “Securing Data Transmission Channel between Smart Devices and Cloud using Homomorphic Encryption for Blood Pressure” “Monitoring sensors play a crucial role in various applications.” The incorporation of homomorphic encryption is considered essential to guarantee the privacy and security of health data. In smart cities, where mobile healthcare networks play a vital role, concerns arise over the transmission of sensitive health information to untrusted cloud servers. Our focus lies in the development of a specialized architecture explicitly designed for the unique requirements of Blood Pressure Monitoring Sensors. Within this paper, a concise yet comprehensive framework, for mobile healthcare networks is outlined, emphasizing three secure medical calculations encompassing tasks such as computing average heart rate detecting long QT syndrome, and performing Chi-square tests are integral aspects of healthcare. Through this methodology, a distinctive and innovative solution is provided, tailored specifically to the challenges of securing data transmission channels for Blood Pressure Monitoring Sensors.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"33 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of ultra-wideband Sziklai pair based LNAs for wireless communication applications 为无线通信应用设计基于 Sziklai 对的超宽带低噪声放大器
Pub Date : 2024-09-15 DOI: 10.1007/s41870-024-02188-z
Syed Shamroz Arshad, Geetika Srivastava, SachchidaNand Shukla

Noise figure (NF) and linearity at higher frequencies are challenging tasks in Low Noise Amplifiers (LNAs) design. The existing LNAs impose limits on these parameters resulting in enhanced NF. In this paper, two ultra-wide band (UWB) small signal Sziklai pair based LNAs are proposed with improved linearity and minimum NF for high frequency wireless communication. Theses LNAs use NMOS Sziklai and PMOS Sziklai pairs as amplifying components with bandwidth boosting arrangement in common source mode. The simulation results indicate that NMOS LNA exhibits bandwidth of 580.554 GHz with noise figure of 1.66 dB at 63.09 GHz, whereas PMOS LNA shows bandwidth of 299.956 GHz, with noise figure of 11.71 dB at 283.09 GHz, at 180 nm CMOS technology. Furthermore, NMOS and PMOS LNAs show high linearity with input 1 dB compression point (P1dB) of 0.883 dBm and 0.822 dBm while input third order intercept point (IIP3) are 10.22 dBm and 6.72 dBm respectively. Compared to CMOS LNA, bulk CMOS LNA, GaAs pHEMT LNA, and SiGe BiCMOS LNA, the proposed LNAs significantly improve power gain, bandwidth, noise figure, linearity, and area. To further expand the bandwidth, three stage broadband distributed amplifiers (DAs) are also configured using the designed LNAs which measures the bandwidth of 0–7.5 GHz and 10,000–800,000 THz. The performance of these LNAs is verified through designing D-band microwave tuneable second order band reject filter (BRF) which exhibits ultra-wide band (UWB) of 110.362 GHz, notch depth of 10.3 GHz while consuming DC power of 68.32 pW at a supply voltage of ± 3 V.

较高频率下的噪声系数(NF)和线性度是低噪声放大器(LNA)设计中极具挑战性的任务。现有的 LNA 对这些参数施加了限制,导致 NF 增强。本文提出了两种基于 Sziklai 对的超宽带 (UWB) 小信号 LNA,它们具有更好的线性度和最小的 NF,适用于高频无线通信。这些低噪声放大器使用 NMOS Sziklai 和 PMOS Sziklai 对作为放大元件,并在共源模式下进行带宽提升。仿真结果表明,在 180 nm CMOS 技术下,NMOS LNA 的带宽为 580.554 GHz,63.09 GHz 时的噪声系数为 1.66 dB;而 PMOS LNA 的带宽为 299.956 GHz,283.09 GHz 时的噪声系数为 11.71 dB。此外,NMOS 和 PMOS LNA 显示出较高的线性度,输入 1 dB 压缩点(P1dB)分别为 0.883 dBm 和 0.822 dBm,输入三阶截取点(IIP3)分别为 10.22 dBm 和 6.72 dBm。与 CMOS LNA、bulk CMOS LNA、GaAs pHEMT LNA 和 SiGe BiCMOS LNA 相比,所提出的 LNA 显著提高了功率增益、带宽、噪声系数、线性度和面积。为了进一步扩展带宽,还使用所设计的 LNA 配置了三级宽带分布式放大器 (DA),测量带宽为 0-7.5 GHz 和 10,000-800,000 THz。通过设计 D 波段微波可调二阶带阻滤波器 (BRF) 验证了这些 LNA 的性能,该滤波器的超宽带 (UWB) 为 110.362 GHz,陷波深度为 10.3 GHz,而在 ± 3 V 电源电压下的直流功耗为 68.32 pW。
{"title":"Design of ultra-wideband Sziklai pair based LNAs for wireless communication applications","authors":"Syed Shamroz Arshad, Geetika Srivastava, SachchidaNand Shukla","doi":"10.1007/s41870-024-02188-z","DOIUrl":"https://doi.org/10.1007/s41870-024-02188-z","url":null,"abstract":"<p>Noise figure (NF) and linearity at higher frequencies are challenging tasks in Low Noise Amplifiers (LNAs) design. The existing LNAs impose limits on these parameters resulting in enhanced NF. In this paper, two ultra-wide band (UWB) small signal Sziklai pair based LNAs are proposed with improved linearity and minimum NF for high frequency wireless communication. Theses LNAs use NMOS Sziklai and PMOS Sziklai pairs as amplifying components with bandwidth boosting arrangement in common source mode. The simulation results indicate that NMOS LNA exhibits bandwidth of 580.554 GHz with noise figure of 1.66 dB at 63.09 GHz, whereas PMOS LNA shows bandwidth of 299.956 GHz, with noise figure of 11.71 dB at 283.09 GHz, at 180 nm CMOS technology. Furthermore, NMOS and PMOS LNAs show high linearity with input 1 dB compression point (P1dB) of 0.883 dBm and 0.822 dBm while input third order intercept point (IIP3) are 10.22 dBm and 6.72 dBm respectively. Compared to CMOS LNA, bulk CMOS LNA, GaAs pHEMT LNA, and SiGe BiCMOS LNA, the proposed LNAs significantly improve power gain, bandwidth, noise figure, linearity, and area. To further expand the bandwidth, three stage broadband distributed amplifiers (DAs) are also configured using the designed LNAs which measures the bandwidth of 0–7.5 GHz and 10,000–800,000 THz. The performance of these LNAs is verified through designing D-band microwave tuneable second order band reject filter (BRF) which exhibits ultra-wide band (UWB) of 110.362 GHz, notch depth of 10.3 GHz while consuming DC power of 68.32 pW at a supply voltage of ± 3 V.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"74 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid framework for heterogeneous object detection amidst diverse and adverse weather conditions employing Enhanced-DARTS 利用增强型 DARTS 在各种恶劣天气条件下进行异构物体检测的混合框架
Pub Date : 2024-09-15 DOI: 10.1007/s41870-024-02164-7
Anuj Kumar, Sarita Gautam

Autonomous vehicles face significant challenges in accurately identifying vehicles, objects, and traffic signals under adverse weather conditions and poor lighting. To address these issues, we introduce a novel detection system utilizing automatic white balance techniques, specifically the Adaptive Retinex algorithm, to restore visibility and enhance color. This system is integrated with a Faster R-CNN framework enhanced by non-maximum suppression to improve the accuracy of object detection. Employing a combination of three datasets—Dawn, MCWRD, and Indian Roads Dataset (IRD)—our method includes over 6000 augmented images representing diverse environmental conditions. We also implement an optimized version of Differentiable ARchiTecture Search (DARTS) to dynamically fine-tune the architectural parameters of our detection model. This approach has successfully achieved a detection accuracy of 97.43% with a minimal loss rate, demonstrating significant potential for enhancing navigation safety in autonomous vehicles across various challenging environments.

自动驾驶汽车在恶劣天气条件和光线不足的情况下准确识别车辆、物体和交通信号面临着巨大挑战。为了解决这些问题,我们推出了一种新型检测系统,利用自动白平衡技术,特别是自适应 Retinex 算法,来恢复能见度和增强色彩。该系统与通过非最大抑制增强的快速 R-CNN 框架相结合,提高了物体检测的准确性。我们的方法结合使用了三个数据集--黎明、MCWRD 和印度道路数据集 (IRD),其中包括 6000 多张代表不同环境条件的增强图像。我们还采用了优化版可微分结构搜索(DARTS)来动态微调检测模型的结构参数。这种方法成功地实现了 97.43% 的检测准确率,且损失率极低,在提高自动驾驶汽车在各种挑战性环境中的导航安全性方面展现出巨大潜力。
{"title":"A hybrid framework for heterogeneous object detection amidst diverse and adverse weather conditions employing Enhanced-DARTS","authors":"Anuj Kumar, Sarita Gautam","doi":"10.1007/s41870-024-02164-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02164-7","url":null,"abstract":"<p>Autonomous vehicles face significant challenges in accurately identifying vehicles, objects, and traffic signals under adverse weather conditions and poor lighting. To address these issues, we introduce a novel detection system utilizing automatic white balance techniques, specifically the Adaptive Retinex algorithm, to restore visibility and enhance color. This system is integrated with a Faster R-CNN framework enhanced by non-maximum suppression to improve the accuracy of object detection. Employing a combination of three datasets—Dawn, MCWRD, and Indian Roads Dataset (IRD)—our method includes over 6000 augmented images representing diverse environmental conditions. We also implement an optimized version of Differentiable ARchiTecture Search (DARTS) to dynamically fine-tune the architectural parameters of our detection model. This approach has successfully achieved a detection accuracy of 97.43% with a minimal loss rate, demonstrating significant potential for enhancing navigation safety in autonomous vehicles across various challenging environments.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142265766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detecting the undetectable: GAN-based strategies for network intrusion detection 检测无法检测的东西:基于 GAN 的网络入侵检测策略
Pub Date : 2024-09-13 DOI: 10.1007/s41870-024-02172-7
Ruchi Bhatt, Gaurav Indra

This study addresses the challenge of enhancing network security by proposing a novel intrusion detection system using Generative Adversarial Networks. Traditional intrusion detection system often fail to keep up with rapidly evolving cyber threats. Our approach integrates Generative Adversarial Networks to dynamically learn and adapt to both genuine and adversarial network traffic patterns. Using the KDD Cup 1999 dataset for validation, we design a sophisticated Generative Adversarial Network architecture with a generator and discriminator to improve the resilience of intrusion detection system. Our experimental results demonstrate the model’s effectiveness, evaluated through metrics such as F1 score, accuracy, precision, and recall. This research advances the state-of-the-art in cybersecurity by showcasing the potential of Generative Adversarial Networks to fortify intrusion detection system against evolving threats, underscoring the necessity for adaptive defense mechanisms in modern network security.

本研究利用生成对抗网络(Generative Adversarial Networks)提出了一种新型入侵检测系统,以应对加强网络安全的挑战。传统的入侵检测系统往往跟不上快速发展的网络威胁。我们的方法整合了生成式对抗网络(Generative Adversarial Networks),可动态学习和适应真正的和对抗性的网络流量模式。利用 KDD Cup 1999 数据集进行验证,我们设计了一种带有生成器和判别器的复杂生成对抗网络架构,以提高入侵检测系统的适应能力。我们的实验结果证明了该模型的有效性,并通过 F1 分数、准确度、精确度和召回率等指标进行了评估。这项研究通过展示生成式对抗网络在加强入侵检测系统以应对不断变化的威胁方面的潜力,强调了自适应防御机制在现代网络安全中的必要性,从而推进了网络安全领域的最新发展。
{"title":"Detecting the undetectable: GAN-based strategies for network intrusion detection","authors":"Ruchi Bhatt, Gaurav Indra","doi":"10.1007/s41870-024-02172-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02172-7","url":null,"abstract":"<p>This study addresses the challenge of enhancing network security by proposing a novel intrusion detection system using Generative Adversarial Networks. Traditional intrusion detection system often fail to keep up with rapidly evolving cyber threats. Our approach integrates Generative Adversarial Networks to dynamically learn and adapt to both genuine and adversarial network traffic patterns. Using the KDD Cup 1999 dataset for validation, we design a sophisticated Generative Adversarial Network architecture with a generator and discriminator to improve the resilience of intrusion detection system. Our experimental results demonstrate the model’s effectiveness, evaluated through metrics such as F1 score, accuracy, precision, and recall. This research advances the state-of-the-art in cybersecurity by showcasing the potential of Generative Adversarial Networks to fortify intrusion detection system against evolving threats, underscoring the necessity for adaptive defense mechanisms in modern network security.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"113 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1