Pub Date : 2024-08-09DOI: 10.1007/s41870-024-02117-0
Pooja, Shalu, Shyla, Yogita Sangwan, Basu Dev Shivahare
{"title":"A novel three-phase hybrid cryptographic algorithm for data security","authors":"Pooja, Shalu, Shyla, Yogita Sangwan, Basu Dev Shivahare","doi":"10.1007/s41870-024-02117-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02117-0","url":null,"abstract":"","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"9 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141921702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-08DOI: 10.1007/s41870-024-02105-4
Gh. Mohmad Dar, R. Delhibabu
{"title":"Exploring emotion detection in Kashmiri audio reviews using the fusion model of CNN, LSTM, and RNN: gender-specific speech patterns and performance analysis","authors":"Gh. Mohmad Dar, R. Delhibabu","doi":"10.1007/s41870-024-02105-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02105-4","url":null,"abstract":"","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"59 37","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141929052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-07DOI: 10.1007/s41870-024-02048-w
Suad kamil Ayfan, Dhiah Al-Shammary, Ahmed M. Mahdi, Ayman Ibaida, Khandakar Ahmed
The paper presents new design and implementation for Web messages static clustering based on TF-IDF and Minkowski Distance metric. The target of the proposed Minkowski clustering is to empower Web messages aggregators in order to reduce network traffic by aggregating highly similar messages. Web services (W.S.) technology offers an extensive platform for representing, discovering, and calling services in many environments, including Service Oriented Architectures (SOA). The basis of W.S. technology is built upon several XML-based protocols, such as the Simple Object Access Protocol (SOAP), which effectively guarantees W.S. flexibility, transparency, and harmony. There is an increasing demand to enhance the efficiency of online services. It is mainly limited by the over utilization of XML. SOAP communications lead to high network congestion. Furthermore, they cause higher latency and processing delays when compared to alternative technologies. Previous studies have proposed XML clustering techniques to support compression- aggregation models. Technically, aggregation can decrease the overall size the SOAP messages, hence decreasing the needed bandwidth across clients and servers.
本文介绍了基于 TF-IDF 和 Minkowski Distance 度量的网络信息静态聚类的新设计和实现。所提出的明考斯基聚类的目标是增强网络信息聚合器的能力,以便通过聚合高度相似的信息来减少网络流量。网络服务(W.S.)技术为在包括面向服务架构(SOA)在内的许多环境中表示、发现和调用服务提供了一个广泛的平台。W.S. 技术的基础是基于 XML 的几种协议,如简单对象访问协议(SOAP),它有效地保证了 W.S. 的灵活性、透明度和协调性。提高在线服务效率的需求日益增长。这主要受限于 XML 的过度使用。SOAP 通信会导致严重的网络拥塞。此外,与其他技术相比,它们会造成更高的延迟和处理延误。以往的研究提出了 XML 聚类技术,以支持压缩-聚合模型。从技术上讲,聚合可以减小 SOAP 信息的整体大小,从而减少客户端和服务器之间所需的带宽。
{"title":"Efficient static minkowski clustering for web service aggregation","authors":"Suad kamil Ayfan, Dhiah Al-Shammary, Ahmed M. Mahdi, Ayman Ibaida, Khandakar Ahmed","doi":"10.1007/s41870-024-02048-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02048-w","url":null,"abstract":"<p>The paper presents new design and implementation for Web messages static clustering based on TF-IDF and Minkowski Distance metric. The target of the proposed Minkowski clustering is to empower Web messages aggregators in order to reduce network traffic by aggregating highly similar messages. Web services (W.S.) technology offers an extensive platform for representing, discovering, and calling services in many environments, including Service Oriented Architectures (SOA). The basis of W.S. technology is built upon several XML-based protocols, such as the Simple Object Access Protocol (SOAP), which effectively guarantees W.S. flexibility, transparency, and harmony. There is an increasing demand to enhance the efficiency of online services. It is mainly limited by the over utilization of XML. SOAP communications lead to high network congestion. Furthermore, they cause higher latency and processing delays when compared to alternative technologies. Previous studies have proposed XML clustering techniques to support compression- aggregation models. Technically, aggregation can decrease the overall size the SOAP messages, hence decreasing the needed bandwidth across clients and servers.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"97 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-07DOI: 10.1007/s41870-024-02113-4
Saroj Kumar Panda, Tausif Diwan, Omprakash G. Kakde
We aim to effectively solve and improvise the Meta Meme Challenge for the binary classification of hateful memes detection on a multimodal dataset launched by Meta. This problem has its challenges in terms of individual modality processing and its impact on the final classification of hateful memes. We focus on feature-level fusion methodologies in proposing the solutions for hateful memes detection in comparison with the decision-level fusion as feature-level fusion generates richer features’ representation for further processing. Appropriate model selection in multimodal data processing plays an important role in the downstream tasks. Moreover, inherent negativity associated with the visual modality may not be detected completely through the visual processing models, necessitating the differently processed visual data through some other techniques. Specifically, we propose two feature-level fusion-based methodologies for the aforesaid classification problem, employing VisualBERT for the effective representation of textual and visual modality. Additionally, we employ image captioning generating the textual captions from the visual modality of the multimodal input which is further fused with the actual text associated with the input through the Tensor Fusion Networks. Our proposed model considerably outperforms the state of the arts on accuracy and AuROC performance metrics.
我们的目标是有效解决和改进 Meta Meme 挑战赛,在 Meta 推出的多模态数据集上对仇恨备忘录检测进行二元分类。这一问题在单个模态处理及其对仇恨备忘录最终分类的影响方面存在挑战。与决策级融合相比,我们在提出仇恨备忘录检测解决方案时侧重于特征级融合方法,因为特征级融合能生成更丰富的特征表征供进一步处理。多模态数据处理中适当的模型选择在下游任务中发挥着重要作用。此外,与视觉模式相关的固有否定性可能无法通过视觉处理模型完全检测出来,这就需要通过其他技术对视觉数据进行不同的处理。具体来说,我们针对上述分类问题提出了两种基于特征级融合的方法,并利用 VisualBERT 有效地表示文本和视觉模式。此外,我们还采用了图像标题技术,从多模态输入的视觉模态生成文本标题,并通过张量融合网络与输入的实际文本进一步融合。我们提出的模型在准确性和 AuROC 性能指标上大大优于同类技术。
{"title":"Differently processed modality and appropriate model selection lead to richer representation of the multimodal input","authors":"Saroj Kumar Panda, Tausif Diwan, Omprakash G. Kakde","doi":"10.1007/s41870-024-02113-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02113-4","url":null,"abstract":"<p>We aim to effectively solve and improvise the Meta Meme Challenge for the binary classification of hateful memes detection on a multimodal dataset launched by Meta. This problem has its challenges in terms of individual modality processing and its impact on the final classification of hateful memes. We focus on feature-level fusion methodologies in proposing the solutions for hateful memes detection in comparison with the decision-level fusion as feature-level fusion generates richer features’ representation for further processing. Appropriate model selection in multimodal data processing plays an important role in the downstream tasks. Moreover, inherent negativity associated with the visual modality may not be detected completely through the visual processing models, necessitating the differently processed visual data through some other techniques. Specifically, we propose two feature-level fusion-based methodologies for the aforesaid classification problem, employing VisualBERT for the effective representation of textual and visual modality. Additionally, we employ image captioning generating the textual captions from the visual modality of the multimodal input which is further fused with the actual text associated with the input through the Tensor Fusion Networks. Our proposed model considerably outperforms the state of the arts on accuracy and AuROC performance metrics.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-06DOI: 10.1007/s41870-024-02021-7
Ashutosh Singh, K. K. Ramachandran, Somanchi Hari Krishna, Chhaya Nayak, K. Anusha, Purnendu Bikash Acharjee, Satyajee Srivastava
Counterfeit merchandise poses significant challenges for both consumers and retailers. When counterfeit goods infiltrate the market, they damage the trustworthiness and reputation of legitimate companies, leading to negative publicity. Furthermore, these imitations can be harmful, especially in critical sectors like food and pharmaceuticals. To address this issue, it is essential to identify and prevent counterfeit products from reaching consumers. Our proposed solution leverages blockchain technology to authenticate products. Blockchain’s decentralized database securely stores all transaction data, ensuring transparency and traceability. Additionally, we introduce a tool that records ownership and product details. By utilizing a Quick Response (QR) code, consumers can easily verify the authenticity of a product, thus accessing its manufacturing and ownership information. This approach not only safeguards consumer safety but also protects the reputation and financial performance of legitimate business.
{"title":"A novel and secured bitcoin method for identification of counterfeit goods in logistics supply management within online shopping","authors":"Ashutosh Singh, K. K. Ramachandran, Somanchi Hari Krishna, Chhaya Nayak, K. Anusha, Purnendu Bikash Acharjee, Satyajee Srivastava","doi":"10.1007/s41870-024-02021-7","DOIUrl":"https://doi.org/10.1007/s41870-024-02021-7","url":null,"abstract":"<p>Counterfeit merchandise poses significant challenges for both consumers and retailers. When counterfeit goods infiltrate the market, they damage the trustworthiness and reputation of legitimate companies, leading to negative publicity. Furthermore, these imitations can be harmful, especially in critical sectors like food and pharmaceuticals. To address this issue, it is essential to identify and prevent counterfeit products from reaching consumers. Our proposed solution leverages blockchain technology to authenticate products. Blockchain’s decentralized database securely stores all transaction data, ensuring transparency and traceability. Additionally, we introduce a tool that records ownership and product details. By utilizing a Quick Response (QR) code, consumers can easily verify the authenticity of a product, thus accessing its manufacturing and ownership information. This approach not only safeguards consumer safety but also protects the reputation and financial performance of legitimate business.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"86 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-06DOI: 10.1007/s41870-024-02072-w
Pairote Yiarayong
This manuscript tackles brain carcinoma diagnosis through a multi-attribute decision-making lens. Using complex q-rung orthopair trapezoidal fuzzy sets, we develop tailored aggregation operators and explore their significance. We delve into idempotency theory, highlighting instances where monotonicity and boundedness fail. Building on these operators, we propose a novel methodology for fuzzy environment decision-making. Applied to medical diagnosis, we identify the most dangerous brain carcinoma type, showcasing practical utility. Comparative analyses confirm the superiority of our technique, promising advancements in diagnosis methodologies.
{"title":"Innovative approaches to multi-attribute decision-making in brain carcinoma diagnosis: a complex q-rung orthopair trapezoidal fuzzy framework and aggregation operator analysis","authors":"Pairote Yiarayong","doi":"10.1007/s41870-024-02072-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02072-w","url":null,"abstract":"<p>This manuscript tackles brain carcinoma diagnosis through a multi-attribute decision-making lens. Using complex <i>q</i>-rung orthopair trapezoidal fuzzy sets, we develop tailored aggregation operators and explore their significance. We delve into idempotency theory, highlighting instances where monotonicity and boundedness fail. Building on these operators, we propose a novel methodology for fuzzy environment decision-making. Applied to medical diagnosis, we identify the most dangerous brain carcinoma type, showcasing practical utility. Comparative analyses confirm the superiority of our technique, promising advancements in diagnosis methodologies.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"23 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-06DOI: 10.1007/s41870-024-02053-z
Swati Saigaonkar, Vaibhav Narawade
The exploration of clinical notes has garnered attention, primarily owing to the wealth of unstructured information they encompass. Although substantial research has been carried out, notable gaps persist. One such gap pertains to the absence of work on real-time Indian data. The work commenced by initially using Medical Information Mart for Intensive Care (MIMIC III) dataset, concentrating on diseases such as Asthma, Myocardial Infarction (MI), and Chronic Kidney Diseases (CKD), for training the model. A novel model, transformer-based, was built which incorporated knowledge of abbreviations, symptoms, and domain knowledge of the diseases, named as SM-DBERT + + . Subsequently, the model was applied to an Indian dataset using transfer learning, where domain knowledge extracted from Indian sources was utilized to adapt to domain differences. Further, an ensemble of pre-trained models was built, applying transfer learning principles. Through this comprehensive methodology, we aimed to bridge the gap pertaining to the application of deep learning techniques to Indian healthcare datasets. The results obtained were better than fine-tuned Bidirectional Encoder Representations from Transformers (BERT), Distilled BERT (DISTILBERT) and A Lite BERT (ALBERT) models and also other specialized models like Scientific BERT (SCI-BERT), Clinical Biomedical BERT (Clinical Bio-BERT), and Biomedical BERT (BIOBERT) with an accuracy of 0.93 when full notes were used and an accuracy of 0.89 when extracted sections were used. It has demonstrated that model trained on one dataset yields good results on another similar dataset as this model incorporates domain knowledge which could be modified during transfer learning to adapt to the new domain.
对临床笔记的研究之所以备受关注,主要是因为这些笔记包含大量非结构化信息。虽然已经开展了大量研究,但仍存在明显差距。其中一个差距就是缺乏对印度实时数据的研究。这项工作首先使用了重症监护医疗信息市场(MIMIC III)数据集,主要针对哮喘、心肌梗塞(MI)和慢性肾病(CKD)等疾病进行模型训练。我们建立了一个基于变压器的新模型,该模型结合了疾病的缩写、症状和领域知识,命名为 SM-DBERT + +。随后,利用迁移学习将该模型应用于印度数据集,利用从印度来源提取的领域知识来适应领域差异。此外,我们还利用迁移学习原理建立了一个预训练模型集合。通过这种综合方法,我们旨在弥补将深度学习技术应用于印度医疗数据集方面的差距。获得的结果优于经过微调的变压器双向编码器表示(BERT)、蒸馏 BERT(DISTILBERT)和 A Lite BERT(ALBERT)模型,以及其他专业模型,如科学 BERT(SCI-BERT)、临床生物医学 BERT(Clinical Bio-BERT)和生物医学 BERT(BIOBERT),使用完整笔记时的准确率为 0.93,使用提取部分时的准确率为 0.89。这表明,在一个数据集上训练的模型在另一个类似的数据集上也能产生良好的结果,因为该模型包含了领域知识,这些知识可以在迁移学习过程中进行修改,以适应新的领域。
{"title":"Domain adaptation of transformer-based neural network model for clinical note classification in Indian healthcare","authors":"Swati Saigaonkar, Vaibhav Narawade","doi":"10.1007/s41870-024-02053-z","DOIUrl":"https://doi.org/10.1007/s41870-024-02053-z","url":null,"abstract":"<p>The exploration of clinical notes has garnered attention, primarily owing to the wealth of unstructured information they encompass. Although substantial research has been carried out, notable gaps persist. One such gap pertains to the absence of work on real-time Indian data. The work commenced by initially using Medical Information Mart for Intensive Care (MIMIC III) dataset, concentrating on diseases such as Asthma, Myocardial Infarction (MI), and Chronic Kidney Diseases (CKD), for training the model. A novel model, transformer-based, was built which incorporated knowledge of abbreviations, symptoms, and domain knowledge of the diseases, named as SM-DBERT + + . Subsequently, the model was applied to an Indian dataset using transfer learning, where domain knowledge extracted from Indian sources was utilized to adapt to domain differences. Further, an ensemble of pre-trained models was built, applying transfer learning principles. Through this comprehensive methodology, we aimed to bridge the gap pertaining to the application of deep learning techniques to Indian healthcare datasets. The results obtained were better than fine-tuned Bidirectional Encoder Representations from Transformers (BERT), Distilled BERT (DISTILBERT) and A Lite BERT (ALBERT) models and also other specialized models like Scientific BERT (SCI-BERT), Clinical Biomedical BERT (Clinical Bio-BERT), and Biomedical BERT (BIOBERT) with an accuracy of 0.93 when full notes were used and an accuracy of 0.89 when extracted sections were used. It has demonstrated that model trained on one dataset yields good results on another similar dataset as this model incorporates domain knowledge which could be modified during transfer learning to adapt to the new domain.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"107 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-05DOI: 10.1007/s41870-024-02057-9
Nidamanuri Srinu, K. Sivaraman, M. Sriram
Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA) with sarcasm detection enhances the understanding of text meaning. Deep learning (DL), utilizing neural networks to grasp lexical and contextual features, offers a method for sarcasm detection. However, current DL-based sarcasm detection methods often overlook sentiment semantics, a crucial aspect for improving detection outcomes. Therefore, this study develops a new sarcasm detection using grasshopper optimization algorithm with DL (SD-GOADL) technique. The SD-GOADL technique aims to explore the patterns that exist in social media data and detect sarcasm. To obtain this, the SD-GOADL technique undergoes data pre-processing and Glove based word embedding technique. Next, the classification of sarcasm takes place using deep belief network (DBN) system. For enhancing the detection results of the DBN approach, the SD-GOADL technique uses GOA for hyperparameter selection process. The stimulation outcome of the SD-GOADL technique is tested on a sarcasm dataset and the results highlight the significant performance of the SD-GOADL technique compared to recent models.
{"title":"Enhancing sarcasm detection through grasshopper optimization with deep learning based sentiment analysis on social media","authors":"Nidamanuri Srinu, K. Sivaraman, M. Sriram","doi":"10.1007/s41870-024-02057-9","DOIUrl":"https://doi.org/10.1007/s41870-024-02057-9","url":null,"abstract":"<p>Detecting sarcasm in social media presents challenges in natural language processing (NLP) due to the informal language, contextual complexities, and nuanced expression of sentiment. Integrating sentiment analysis (SA) with sarcasm detection enhances the understanding of text meaning. Deep learning (DL), utilizing neural networks to grasp lexical and contextual features, offers a method for sarcasm detection. However, current DL-based sarcasm detection methods often overlook sentiment semantics, a crucial aspect for improving detection outcomes. Therefore, this study develops a new sarcasm detection using grasshopper optimization algorithm with DL (SD-GOADL) technique. The SD-GOADL technique aims to explore the patterns that exist in social media data and detect sarcasm. To obtain this, the SD-GOADL technique undergoes data pre-processing and Glove based word embedding technique. Next, the classification of sarcasm takes place using deep belief network (DBN) system. For enhancing the detection results of the DBN approach, the SD-GOADL technique uses GOA for hyperparameter selection process. The stimulation outcome of the SD-GOADL technique is tested on a sarcasm dataset and the results highlight the significant performance of the SD-GOADL technique compared to recent models.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The research paper introduces an algorithm called SAFARM which performs association rule mining with the help of simulated annealing. It’s a multi-objective problem with vast search space. The suggested approach is independent of the database as it does not require minimum support or minimum confidence specification. In the algorithm, a fitness function is designed to fulfill the required objective and the presentation of rules is proposed with a compact structure. The correctness and efficiency of the algorithm is verified by testing it on synthetic and real databases.
{"title":"SAFARM: simulated annealing based framework for association rule mining","authors":"Preeti Kaur, Sujal Goel, Aryan Tyagi, Sharil Malik, Utkarsh Shrivastava","doi":"10.1007/s41870-024-02079-3","DOIUrl":"https://doi.org/10.1007/s41870-024-02079-3","url":null,"abstract":"<p>The research paper introduces an algorithm called SAFARM which performs association rule mining with the help of simulated annealing. It’s a multi-objective problem with vast search space. The suggested approach is independent of the database as it does not require minimum support or minimum confidence specification. In the algorithm, a fitness function is designed to fulfill the required objective and the presentation of rules is proposed with a compact structure. The correctness and efficiency of the algorithm is verified by testing it on synthetic and real databases.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"2012 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141942770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-02DOI: 10.1007/s41870-024-02064-w
Florance G., R J Anandhi
The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.
网络流量的快速发展给检测分布式拒绝服务(DDOS)攻击带来了各种问题。软件定义网络(SDN)的表现形式具有一定的个性化,SDN 控制器使用一种技术来检查从流量表(FT)中获取的数据。随着流量的增加,控制器的处理能力会下降,导致 FT 和流量缓冲区的可用空间不足。了解到控制器和流量表中存在的问题,本研究提供了一种独特的程序,可提高性能、减少控制器负载、管理流量表空间和由虚拟控制器(VC)激活的流量缓冲区。它动态完成路由器/交换机接收到的数据包捆绑,使用攻击级别检测(ALD)方法分析 FT,评估特定用户的带宽利用率,并映射到入口端口。ALD 算法可检测到来自伪造 IP 地址和网络地址的不匹配数据包和拥塞数据包。这项工作与常规场景和攻击级别场景相关,使用带有两个控制器(POX 控制器和 Open Daylight 控制器)的 mininet 模拟器来模拟主要的性能变化。这项研究有效降低了 VC 和 FT 的过载,从而防止了使用 VC 的 DDoS 攻击。
{"title":"Enhancing SDN resilience against DDoS attacks through dynamic virtual controller deployment and attack level detection algorithm","authors":"Florance G., R J Anandhi","doi":"10.1007/s41870-024-02064-w","DOIUrl":"https://doi.org/10.1007/s41870-024-02064-w","url":null,"abstract":"<p>The rapid evolution of network traffic created various problems in detecting Distributed Denial of Service (DDOS) attacks. The manifestation of Software Defined Networking (SDN) provides some individuality in that the SDN Controller uses a technique to examine the acquired data from the Flow Table (FT). As traffic increases, the controller's processing capability decreases, resulting in insufficient space availability for the FT and flow buffer. Understanding the struggles that exist in the controller and FT, this study provided a distinctive procedure that will increase performance, reduce controller load, manage FT space, and flow buffers that are activated by the Virtual Controller (VC). It dynamically completes the bundle of packets received at the router/switch, analyze the FT using the Attack Level Detection (ALD) method, assesses the bandwidth utilization of a particular user, and maps to the ingress port. The ALD algorithm detects mismatched packets and congested packets originating from faked IP and network addresses. This effort is related with the regular scenario and the attack level scenario, which use a mininet simulator with two controllers, the POX controller and the Open Daylight controller, to simulate major performance variations. This study efficiently lowers the overload of the VC and FT, hence preventing the DDoS assault employing VC.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"43 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}