首页 > 最新文献

International Journal of Information Technology最新文献

英文 中文
An intelligent and resolute Traffic Management System using GRCNet-StMO model for smart vehicular networks 利用 GRCNet-StMO 模型为智能车载网络打造智能果断的交通管理系统
Pub Date : 2024-08-16 DOI: 10.1007/s41870-024-02106-3
G. Sheeba, Jana Selvaganesan

One of the key components of a smart city is thought to be the traffic control system. Road traffic congestion is prevalent in big cities due to increasing population density and rising transportation in cities. A smart traffic control system using cutting-edge computational intelligence algorithms has been developed to address numerous challenges related to traffic management on road networks and to assist regulators in making sound decisions. The current endeavor seeks to develop a new type of Smart Traffic Management System (SmartTMS) using state-of-the-art deep learning and optimization methods. The hybrid Gated Recurrent Deep Convoluted Network (GRCNet) approach is applied to accurately forecast the traffic congestion from the smart vehicular networks. In order to improve the classifier's decision-making ability and prediction accuracy, the parameters of the deep learning algorithm are tuned using a revolutionary Starling Murmuration Optimizer (StMO) methodology. Moreover, traffic congestion in vehicle networks can be precisely diagnosed and decreased with a low error rate and high accuracy by using the GRCNet-StMO model combination. The proposed SmartTMS's main benefits are its ease of deployment, quick congestion forecast time, and minimal computing complexity. To evaluate the effectiveness of the suggested model, a comprehensive performance and comparison study is carried out in this work, taking into account a number of factors like error rate, accuracy, miss rate, and journey duration.

交通控制系统被认为是智慧城市的关键组成部分之一。由于人口密度的增加和城市交通的不断发展,大城市的道路交通拥堵现象十分普遍。为了应对与道路网络交通管理相关的诸多挑战,并协助监管机构做出合理决策,人们开发了一种采用尖端计算智能算法的智能交通控制系统。当前的努力旨在利用最先进的深度学习和优化方法开发一种新型智能交通管理系统(SmartTMS)。混合型门控循环深度卷积网络(GRCNet)方法被用于准确预测智能车辆网络的交通拥堵情况。为了提高分类器的决策能力和预测准确性,深度学习算法的参数采用了革命性的斯塔林湍流优化器(Starling Murmuration Optimizer,StMO)方法进行调整。此外,通过使用 GRCNet-StMO 模型组合,可以低错误率、高准确度地精确诊断和减少车辆网络中的交通拥堵。所建议的智能交通管理系统的主要优点是易于部署、拥堵预测时间短、计算复杂度低。为了评估所建议模型的有效性,本研究考虑了错误率、准确率、遗漏率和行程持续时间等因素,进行了全面的性能和比较研究。
{"title":"An intelligent and resolute Traffic Management System using GRCNet-StMO model for smart vehicular networks","authors":"G. Sheeba, Jana Selvaganesan","doi":"10.1007/s41870-024-02106-3","DOIUrl":"https://doi.org/10.1007/s41870-024-02106-3","url":null,"abstract":"<p>One of the key components of a smart city is thought to be the traffic control system. Road traffic congestion is prevalent in big cities due to increasing population density and rising transportation in cities. A smart traffic control system using cutting-edge computational intelligence algorithms has been developed to address numerous challenges related to traffic management on road networks and to assist regulators in making sound decisions. The current endeavor seeks to develop a new type of Smart Traffic Management System (SmartTMS) using state-of-the-art deep learning and optimization methods. The hybrid Gated Recurrent Deep Convoluted Network (GRCNet) approach is applied to accurately forecast the traffic congestion from the smart vehicular networks. In order to improve the classifier's decision-making ability and prediction accuracy, the parameters of the deep learning algorithm are tuned using a revolutionary Starling Murmuration Optimizer (StMO) methodology. Moreover, traffic congestion in vehicle networks can be precisely diagnosed and decreased with a low error rate and high accuracy by using the GRCNet-StMO model combination. The proposed SmartTMS's main benefits are its ease of deployment, quick congestion forecast time, and minimal computing complexity. To evaluate the effectiveness of the suggested model, a comprehensive performance and comparison study is carried out in this work, taking into account a number of factors like error rate, accuracy, miss rate, and journey duration.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"9 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Random grid visual cryptography scheme based on block encoding 基于块编码的随机网格视觉加密方案
Pub Date : 2024-08-16 DOI: 10.1007/s41870-024-02098-0
Maged Wafy

The Visual Cryptography Scheme (VCS) allows secret images to be hidden in two or more shares. A solution to the problem of pixel expansion in conventional VCS was created: the Probability Scale Invariant VCS (P-SIVCS). However, a codebook needs to be written for P-SIVCS and VCS. Kafri’s Random Grid VCS (RG-VCS) did not require a codebook, however the revealed secret image was noisy. The random gird algorithms presented in this paper are both aesthetically pleasing and security relevant. This is also the first time that the first share of RG-VCS was chosen as a block instead of a uniform distribution, and it is also the first time that the concept of a multi-pixel was implemented in RG-VCS . In addition, compared to previous thresholding algorithms, the proposed algorithms have better performance in terms of contrast accuracy and visual quality according to theoretical analysis and experimental results.

可视加密方案(VCS)允许将秘密图像隐藏在两个或多个份额中。传统 VCS 中像素扩展问题的解决方案是:概率标度不变 VCS(P-SIVCS)。不过,P-SIVCS 和 VCS 都需要编写编码书。卡夫里的随机网格 VCS(RG-VCS)不需要编码本,但揭示的秘密图像有噪声。本文介绍的随机网格算法既美观又安全。这也是首次将 RG-VCS 的第一份选择为块而不是均匀分布,也是首次在 RG-VCS 中实现多像素的概念。此外,根据理论分析和实验结果,与之前的阈值算法相比,所提出的算法在对比度精度和视觉质量方面都有更好的表现。
{"title":"Random grid visual cryptography scheme based on block encoding","authors":"Maged Wafy","doi":"10.1007/s41870-024-02098-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02098-0","url":null,"abstract":"<p>The Visual Cryptography Scheme (VCS) allows secret images to be hidden in two or more shares. A solution to the problem of pixel expansion in conventional VCS was created: the Probability Scale Invariant VCS (P-SIVCS). However, a codebook needs to be written for P-SIVCS and VCS. Kafri’s Random Grid VCS (RG-VCS) did not require a codebook, however the revealed secret image was noisy. The random gird algorithms presented in this paper are both aesthetically pleasing and security relevant. This is also the first time that the first share of RG-VCS was chosen as a block instead of a uniform distribution, and it is also the first time that the concept of a multi-pixel was implemented in RG-VCS . In addition, compared to previous thresholding algorithms, the proposed algorithms have better performance in terms of contrast accuracy and visual quality according to theoretical analysis and experimental results.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"441 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart multimodal framework based on squeeze excitation capsule network (SECNet) model for disease diagnosis using dissimilar medical images 基于挤压激励胶囊网络 (SECNet) 模型的智能多模态框架,用于利用不同医学图像进行疾病诊断
Pub Date : 2024-08-16 DOI: 10.1007/s41870-024-02136-x
G. Maheswari, S. Gopalakrishnan

Computer-aided diagnosis has emerged as one of the main areas of study for radiology diagnosis and medical imaging in recent years. Also, developing a single prediction methodology for handling multiple types of medical images is remains one of the most significant issues in recent times. For handling various kinds of medical images, this research presents Smart Multimodal Disease Detection (SMD2), an innovative and powerful automated method. The proposed framework’s contribution is the ability to use various kinds of medical images to carry out an accurate and efficient disease diagnosis. The Woodpecker Mating Optimization Algorithm (WpMO) approach is used to optimally choose the most important features from the provided inputs, simplifying the classification process. In addition, the innovative Squeeze Excitation Capsule Network (SECNet) model is used to accurately identify and classify the disease class with a reduced computational time and complexity. A range of various medical imaging datasets, including X-ray, CT, and MRI, are considered for study in order to validate the performance outcomes of the proposed model. The results of the investigation indicate that the loss value of the proposed approach has dropped to 1.3, but its average accuracy has grown by 99%.

近年来,计算机辅助诊断已成为放射学诊断和医学成像的主要研究领域之一。同时,开发一种单一的预测方法来处理多种类型的医学影像仍然是近年来最重要的问题之一。为了处理各种类型的医学图像,本研究提出了智能多模态疾病检测(SMD2)这一创新而强大的自动方法。该框架的贡献在于能够利用各种医学图像进行准确、高效的疾病诊断。啄木鸟交配优化算法(WpMO)方法用于从提供的输入中优化选择最重要的特征,从而简化了分类过程。此外,还采用了创新的挤压激发胶囊网络(SECNet)模型来准确识别和分类疾病类别,同时降低了计算时间和复杂性。研究考虑了各种医学成像数据集,包括 X 光、CT 和 MRI,以验证所提模型的性能结果。研究结果表明,所提方法的损失值降至 1.3,但平均准确率却提高了 99%。
{"title":"A smart multimodal framework based on squeeze excitation capsule network (SECNet) model for disease diagnosis using dissimilar medical images","authors":"G. Maheswari, S. Gopalakrishnan","doi":"10.1007/s41870-024-02136-x","DOIUrl":"https://doi.org/10.1007/s41870-024-02136-x","url":null,"abstract":"<p>Computer-aided diagnosis has emerged as one of the main areas of study for radiology diagnosis and medical imaging in recent years. Also, developing a single prediction methodology for handling multiple types of medical images is remains one of the most significant issues in recent times. For handling various kinds of medical images, this research presents Smart Multimodal Disease Detection (SMD<sub>2</sub>), an innovative and powerful automated method. The proposed framework’s contribution is the ability to use various kinds of medical images to carry out an accurate and efficient disease diagnosis. The Woodpecker Mating Optimization Algorithm (WpMO) approach is used to optimally choose the most important features from the provided inputs, simplifying the classification process. In addition, the innovative Squeeze Excitation Capsule Network (SECNet) model is used to accurately identify and classify the disease class with a reduced computational time and complexity. A range of various medical imaging datasets, including X-ray, CT, and MRI, are considered for study in order to validate the performance outcomes of the proposed model. The results of the investigation indicate that the loss value of the proposed approach has dropped to 1.3, but its average accuracy has grown by 99%.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"31 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184670","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Catalyzing EEG signal analysis: unveiling the potential of machine learning-enabled smart K nearest neighbor outlier detection 催化脑电信号分析:挖掘机器学习智能 K 近邻离群点检测的潜力
Pub Date : 2024-08-16 DOI: 10.1007/s41870-024-02123-2
Abid Aymen, Salim El Khediri, Adel Thaljaoui, Moahmed Miladi, Abdennaceur Kachouri

Electroencephalogram (EEG) data are susceptible to artifacts, such as lapses in concentration or poor imagination, which can significantly impact the accuracy of disease diagnosis in e-health applications. To mitigate this issue, the use of machine learning (ML) and potentially artificial intelligence (AI) solutions to accurately identify outliers becomes crucial. Unlike many AI methods that incorporate unnecessary or redundant input variables, our study focuses on detecting anomalous values in EEG data through the K nearest neighbor (KNN) process and Euclidean distance metric. Our proposed unsupervised non-parametric algorithm, known as the smart KNN outlier detector (SKOD), eliminates the need for initial parameter configurations such as the number of neighbors (K), while achieving high performance. Evaluation of SKOD using real EEG data from 140 trials demonstrated sensitivity and specificity exceeding 60%, with nearly perfect accuracy in detecting outliers reaching close to 100%.

脑电图(EEG)数据很容易受到注意力不集中或想象力贫乏等假象的影响,这会严重影响电子健康应用中疾病诊断的准确性。为缓解这一问题,使用机器学习(ML)和潜在的人工智能(AI)解决方案来准确识别异常值变得至关重要。与许多包含不必要或冗余输入变量的人工智能方法不同,我们的研究侧重于通过 K 近邻(KNN)过程和欧氏距离度量检测脑电图数据中的异常值。我们提出的无监督非参数算法被称为智能 KNN 离群值检测器(SKOD),它无需初始参数配置,如邻居数(K),同时还能实现高性能。使用来自 140 个试验的真实脑电图数据对 SKOD 进行的评估表明,其灵敏度和特异性均超过了 60%,检测异常值的准确率接近 100%。
{"title":"Catalyzing EEG signal analysis: unveiling the potential of machine learning-enabled smart K nearest neighbor outlier detection","authors":"Abid Aymen, Salim El Khediri, Adel Thaljaoui, Moahmed Miladi, Abdennaceur Kachouri","doi":"10.1007/s41870-024-02123-2","DOIUrl":"https://doi.org/10.1007/s41870-024-02123-2","url":null,"abstract":"<p>Electroencephalogram (EEG) data are susceptible to artifacts, such as lapses in concentration or poor imagination, which can significantly impact the accuracy of disease diagnosis in e-health applications. To mitigate this issue, the use of machine learning (ML) and potentially artificial intelligence (AI) solutions to accurately identify outliers becomes crucial. Unlike many AI methods that incorporate unnecessary or redundant input variables, our study focuses on detecting anomalous values in EEG data through the K nearest neighbor (KNN) process and Euclidean distance metric. Our proposed unsupervised non-parametric algorithm, known as the smart KNN outlier detector (SKOD), eliminates the need for initial parameter configurations such as the number of neighbors (K), while achieving high performance. Evaluation of SKOD using real EEG data from 140 trials demonstrated sensitivity and specificity exceeding 60%, with nearly perfect accuracy in detecting outliers reaching close to 100%.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"3 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Next generation hybrid based flying squirrel search optimization approach for cubic boost converter used in solar photovoltaic system 用于太阳能光伏系统立方升压转换器的基于鼯鼠搜索的下一代混合优化方法
Pub Date : 2024-08-16 DOI: 10.1007/s41870-024-02132-1
Veerabhadra Jadhav, S. Nagaraja Rao

Renewable energy sources (RES) reveal potential for the near future since they are sustainable and generate clean energy. Currently grid-connected solar photovoltaic (SPV) systems are becoming increasingly significant in meeting energy demand and contributing to clean energy production. The power electronic converter (PEC) plays a significant role in conversion, regulating and controlling the flow of power from RES. This research primarily focuses on high-gain cubic boost converter (HG-CBC) and simulated with the help of MATLAB/Simulink. The results are evaluated and contrasted with both traditional and other high-gain boost converters, focusing on the boost factor (B) and the total part count. It is essential to integrate SPV modules with MPPT system to capture the peak power available under varying temperature (T) and solar irradiation (G) levels. This research introduces a new hybrid based flying squirrel search optimization (FSSO) approach combined with Perturb & Observe (P&O) MPPT approach which allows for faster MPP, lesser oscillations at the output and high accuracy with less convergence time in contrast with P&O and FSSO MPPT. The proposed hybrid based HFSSO with P&O MPPT with HG-CBC exhibits low output voltage ripples of 0.039 % and a contrast lower rising time of 0.264 s and settled at 0.6 s.

可再生能源(RES)具有可持续发展和生产清洁能源的特点,因此在不久的将来会大有可为。目前,并网太阳能光伏(SPV)系统在满足能源需求和促进清洁能源生产方面的作用越来越大。电力电子转换器(PEC)在转换、调节和控制可再生能源电力流方面发挥着重要作用。本研究主要关注高增益立方升压转换器(HG-CBC),并在 MATLAB/Simulink 的帮助下进行了模拟。对结果进行了评估,并与传统和其他高增益升压转换器进行了对比,重点关注升压因子 (B) 和总零件数。将 SPV 模块与 MPPT 系统集成,以获取不同温度(T)和太阳辐照度(G)水平下的峰值功率,这一点至关重要。与 P&O 和 FSSO MPPT 相比,该方法能更快地达到 MPP 值,减少输出振荡,并以更短的收敛时间达到更高的精度。基于 HFSSO 和 P&O MPPT 与 HG-CBC 的混合方案显示出 0.039 % 的低输出电压纹波和 0.264 秒的较低上升时间,并在 0.6 秒内稳定下来。
{"title":"Next generation hybrid based flying squirrel search optimization approach for cubic boost converter used in solar photovoltaic system","authors":"Veerabhadra Jadhav, S. Nagaraja Rao","doi":"10.1007/s41870-024-02132-1","DOIUrl":"https://doi.org/10.1007/s41870-024-02132-1","url":null,"abstract":"<p>Renewable energy sources (RES) reveal potential for the near future since they are sustainable and generate clean energy. Currently grid-connected solar photovoltaic (SPV) systems are becoming increasingly significant in meeting energy demand and contributing to clean energy production. The power electronic converter (PEC) plays a significant role in conversion, regulating and controlling the flow of power from RES. This research primarily focuses on high-gain cubic boost converter (HG-CBC) and simulated with the help of MATLAB/Simulink. The results are evaluated and contrasted with both traditional and other high-gain boost converters, focusing on the boost factor (B) and the total part count. It is essential to integrate SPV modules with MPPT system to capture the peak power available under varying temperature (T) and solar irradiation (G) levels. This research introduces a new hybrid based flying squirrel search optimization (FSSO) approach combined with Perturb &amp; Observe (P&amp;O) MPPT approach which allows for faster MPP, lesser oscillations at the output and high accuracy with less convergence time in contrast with P&amp;O and FSSO MPPT. The proposed hybrid based HFSSO with P&amp;O MPPT with HG-CBC exhibits low output voltage ripples of 0.039 % and a contrast lower rising time of 0.264 s and settled at 0.6 s.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel graph convolutional networks model for an intelligent network traffic analysis and classification 用于智能网络流量分析和分类的新型图卷积网络模型
Pub Date : 2024-08-14 DOI: 10.1007/s41870-024-02032-4
Olusola Olabanjo, Ashiribo Wusu, Edwin Aigbokhan, Olufemi Olabanjo, Oseni Afisi, Boluwaji Akinnuwesi

Network security in the midst of evolving and complex cyber-attacks is a growing concern. As the complexity of network architectures grows, so does the need for advanced methods in network traffic analysis and classification. This study explores the application of a novel Graph Convolutional Networks (GCNs) to address the challenges associated with intelligent network traffic analysis. The network interactions are modeled as a graph, where nodes represent devices or IP addresses, and edges capture the communication channels between them. In this work, dataset which contains packet information of some network devices was obtained from an online repository. The data was preprocessed, normalized and label-encoded. Seven baseline models, including Feed Forward Network (FFN) were developed as reference to the proposed GCN. The parameters were tuned to optimize the performance and the dataset was split into average train-test to avoid overfitting. Two convolutional fully-connected layers were used also as more could cause oversmoothing. Performance of the novel GCN was compared with the reference models. The improved GCN model gave classification accuracy of 94.3% compared to classical GCN with 92.5% and FFN with 88%. Results also showed that the enhanced GCN proposed in this study outperformed the classical GCN and FFN in precision, recall, F1 score and area under curve metrics. Through the utilization of a GCN architecture and proposed enhancements, the proposed model demonstrates notable effectiveness in accurately classifying diverse types of network traffic. This research showed the efficacy of GCNs in intelligent network traffic analysis, offering a promising approach to augmenting cybersecurity efforts in an evolving digital landscape.

在不断发展和复杂的网络攻击中,网络安全问题日益受到关注。随着网络架构复杂性的增加,对网络流量分析和分类先进方法的需求也在增加。本研究探索了新型图卷积网络(GCN)的应用,以应对与智能网络流量分析相关的挑战。网络交互被建模为一个图,其中节点代表设备或 IP 地址,边代表它们之间的通信通道。在这项工作中,我们从一个在线存储库中获取了包含一些网络设备数据包信息的数据集。数据经过预处理、归一化和标签编码。开发了七个基线模型,包括前馈网络(FFN),作为建议的 GCN 的参考。对参数进行了调整,以优化性能,并将数据集分为平均训练-测试,以避免过度拟合。此外,还使用了两个卷积全连接层,因为更多的卷积全连接层会导致过度平滑。新型 GCN 的性能与参考模型进行了比较。改进后的 GCN 模型的分类准确率为 94.3%,而经典 GCN 为 92.5%,FFN 为 88%。结果还显示,本研究提出的增强型 GCN 在精确度、召回率、F1 分数和曲线下面积指标上都优于经典 GCN 和 FFN。通过利用 GCN 架构和所提出的增强功能,所提出的模型在准确分类各种类型的网络流量方面表现出了显著的效果。这项研究显示了 GCN 在智能网络流量分析中的功效,为在不断发展的数字环境中增强网络安全工作提供了一种前景广阔的方法。
{"title":"A novel graph convolutional networks model for an intelligent network traffic analysis and classification","authors":"Olusola Olabanjo, Ashiribo Wusu, Edwin Aigbokhan, Olufemi Olabanjo, Oseni Afisi, Boluwaji Akinnuwesi","doi":"10.1007/s41870-024-02032-4","DOIUrl":"https://doi.org/10.1007/s41870-024-02032-4","url":null,"abstract":"<p>Network security in the midst of evolving and complex cyber-attacks is a growing concern. As the complexity of network architectures grows, so does the need for advanced methods in network traffic analysis and classification. This study explores the application of a novel Graph Convolutional Networks (GCNs) to address the challenges associated with intelligent network traffic analysis. The network interactions are modeled as a graph, where nodes represent devices or IP addresses, and edges capture the communication channels between them. In this work, dataset which contains packet information of some network devices was obtained from an online repository. The data was preprocessed, normalized and label-encoded. Seven baseline models, including Feed Forward Network (FFN) were developed as reference to the proposed GCN. The parameters were tuned to optimize the performance and the dataset was split into average train-test to avoid overfitting. Two convolutional fully-connected layers were used also as more could cause oversmoothing. Performance of the novel GCN was compared with the reference models. The improved GCN model gave classification accuracy of 94.3% compared to classical GCN with 92.5% and FFN with 88%. Results also showed that the enhanced GCN proposed in this study outperformed the classical GCN and FFN in precision, recall, F1 score and area under curve metrics. Through the utilization of a GCN architecture and proposed enhancements, the proposed model demonstrates notable effectiveness in accurately classifying diverse types of network traffic. This research showed the efficacy of GCNs in intelligent network traffic analysis, offering a promising approach to augmenting cybersecurity efforts in an evolving digital landscape.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184675","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offline handwritten signature authentication using Graph Neural Network methods 使用图神经网络方法进行离线手写签名认证
Pub Date : 2024-08-14 DOI: 10.1007/s41870-024-02149-6
Ali Badie, Hedieh Sajedi

Due to their uniqueness and simplicity, handwritten signatures are used as a behavioral biometric feature to identify and authenticate individuals. Due to the increase in the criminal activity of forgers in forging signatures, organizations are forced to use computer systems to verify the authenticity of signatures. For this reason, offline signature verification system is widely used in most organizations. Despite the abundance of research conducted on signature verification, it is difficult to distinguish real and forged signature samples due to the lack of information in the signing process. On the other hand, the small number of training samples is a challenge for offline signature recognition systems. In recent years, to improve these problems, systems based on machine learning and deep learning methods have been presented. In this paper, we have proposed a graph neural network-based architecture for offline signature verification. In this work, the features in the signature images, which are the pixels that make up the signature, are extracted by the SIFT algorithm and sent to the graph-based neural network as a graph structure. After training the network, the data of the test samples are classified into one of two classes, genuine or forged. The proposed model was evaluated on two datasets, MCYT-75 and UTSig, and Accuracy (Acc), Average Error Rate (AER), False Acceptance Rate (FAR) and False Positive Rate (FPR) were considered as performance measures. In this model, the values of Acc, AER, FAR and FPR for the MCYT-75 data set are equal to 1,0, 0, and 0, respectively, and for the UTSig database, these values are equal to 0.092, 0.007, 0.014 and 0.

手写签名具有独特性和简易性,因此被用作识别和验证个人身份的行为生物特征。由于伪造签名的犯罪活动日益猖獗,各组织不得不使用计算机系统来验证签名的真实性。因此,离线签名验证系统在大多数组织中得到了广泛应用。尽管对签名验证进行了大量研究,但由于签名过程中缺乏信息,很难区分真实签名样本和伪造签名样本。另一方面,训练样本数量少也是离线签名识别系统面临的挑战。近年来,为了改善这些问题,人们提出了基于机器学习和深度学习方法的系统。在本文中,我们提出了一种基于图神经网络的离线签名验证架构。在这项工作中,签名图像中的特征(即组成签名的像素)由 SIFT 算法提取,并以图结构的形式发送给基于图的神经网络。在对网络进行训练后,测试样本的数据会被分为真伪两类。我们在 MCYT-75 和 UTSig 两个数据集上对所提出的模型进行了评估,并将准确率(Acc)、平均错误率(AER)、错误接受率(FAR)和错误阳性率(FPR)作为性能指标。在该模型中,MCYT-75 数据集的 Acc、AER、FAR 和 FPR 值分别等于 1、0、0 和 0,UTSig 数据库的 Acc、AER、FAR 和 FPR 值分别等于 0.092、0.007、0.014 和 0。
{"title":"Offline handwritten signature authentication using Graph Neural Network methods","authors":"Ali Badie, Hedieh Sajedi","doi":"10.1007/s41870-024-02149-6","DOIUrl":"https://doi.org/10.1007/s41870-024-02149-6","url":null,"abstract":"<p>Due to their uniqueness and simplicity, handwritten signatures are used as a behavioral biometric feature to identify and authenticate individuals. Due to the increase in the criminal activity of forgers in forging signatures, organizations are forced to use computer systems to verify the authenticity of signatures. For this reason, offline signature verification system is widely used in most organizations. Despite the abundance of research conducted on signature verification, it is difficult to distinguish real and forged signature samples due to the lack of information in the signing process. On the other hand, the small number of training samples is a challenge for offline signature recognition systems. In recent years, to improve these problems, systems based on machine learning and deep learning methods have been presented. In this paper, we have proposed a graph neural network-based architecture for offline signature verification. In this work, the features in the signature images, which are the pixels that make up the signature, are extracted by the SIFT algorithm and sent to the graph-based neural network as a graph structure. After training the network, the data of the test samples are classified into one of two classes, genuine or forged. The proposed model was evaluated on two datasets, MCYT-75 and UTSig, and Accuracy (Acc), Average Error Rate (AER), False Acceptance Rate (FAR) and False Positive Rate (FPR) were considered as performance measures. In this model, the values of Acc, AER, FAR and FPR for the MCYT-75 data set are equal to 1,0, 0, and 0, respectively, and for the UTSig database, these values are equal to 0.092, 0.007, 0.014 and 0.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums 基于 LSTM 和 BERT 变换器模型的网络威胁情报,用于识别从暗网论坛利用社交媒体平台的意图
Pub Date : 2024-08-14 DOI: 10.1007/s41870-024-02077-5
Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey

Cybercriminals, terrorists, political activists, whistleblowers, and others are drawn to the darknet market and its use for illicit purposes. Various methods are employed to identify the people who are behind these identities and websites. Since DNMs are more recent than other platforms, there are more unexplored research possibilities in this field. Research has been done to identify the buying and selling of products connected to hacking from Darknet Marketplaces, the promotion of cyber threats in hacker’s forums and DNMs, and the supply chain elements of content related to cyber threats. The proposed research covers one of the most promising research areas: darknet markets and social media platforms exploitation tools and strategies. The research uses 6 DNMs publicly available data and then identified the most popular social media platform and intent of discussion based on the interaction available in form of the user remarks and comments. The research caters the social media platform and cybercrimes or threats associated to them, by help of the machine learning algorithms Logistic Regression, RandomForestClassifier, GradientBoostingClassifier, KNeighborsClassifier, XGBClassifier, Voting Classifier and Deep Learning based model LSTM and Transformer based Model used. In existing research, natural language processing techniques were employed to identify the kinds of commodities exchanged in these markets, while machine learning approaches were utilized to classify product descriptions.In proposed research work advanced and lighter version of BERT and LSTM model used yielding accuracy of 90.12% and 91.35% respectively. LSTM performed best to extract multiclass classification of actual intension of social media usage by intelligent analysis on hackers’ discussions. Strategies on social media platforms such as Facebook, twitter, Instagram, Snapchat to exploit them using darknet platforms also explored. This paper contributes on cyber threat intelligence that leverages social media applications to work proactively to save their assets based on the threats identified in the Darknet.

网络犯罪分子、恐怖分子、政治活动家、举报人和其他人都被吸引到暗网市场,并将其用于非法目的。人们采用各种方法来识别这些身份和网站背后的人。由于 DNM 比其他平台更新颖,因此该领域还有更多未开发的研究可能性。已经开展了一些研究,以确定从暗网市场买卖与黑客有关的产品、在黑客论坛和 DNM 上宣传网络威胁,以及与网络威胁有关的内容的供应链要素。拟议的研究涉及最有前途的研究领域之一:暗网市场和社交媒体平台的利用工具和策略。研究使用了 6 个 DNM 的公开数据,然后根据用户言论和评论的互动形式,确定了最受欢迎的社交媒体平台和讨论意图。在机器学习算法 Logistic Regression、RandomForestClassifier、GradientBoostingClassifier、KNeighborsClassifier、XGBClassifier、Voting Classifier 以及基于深度学习的 LSTM 模型和 Transformer 模型的帮助下,该研究对社交媒体平台和与之相关的网络犯罪或威胁进行了分析。在现有研究中,自然语言处理技术被用来识别这些市场中交易的商品种类,而机器学习方法则被用来对产品描述进行分类。在拟议的研究工作中,使用了高级和轻量级版本的 BERT 和 LSTM 模型,准确率分别为 90.12% 和 91.35%。通过对黑客讨论的智能分析,LSTM 在提取社交媒体实际使用意图的多类分类方面表现最佳。此外,还探讨了 Facebook、twitter、Instagram、Snapchat 等社交媒体平台利用暗网平台的策略。本文有助于利用社交媒体应用程序的网络威胁情报,根据在暗网中发现的威胁,积极主动地挽救资产。
{"title":"LSTM and BERT based transformers models for cyber threat intelligence for intent identification of social media platforms exploitation from darknet forums","authors":"Kanti Singh Sangher, Archana Singh, Hari Mohan Pandey","doi":"10.1007/s41870-024-02077-5","DOIUrl":"https://doi.org/10.1007/s41870-024-02077-5","url":null,"abstract":"<p>Cybercriminals, terrorists, political activists, whistleblowers, and others are drawn to the darknet market and its use for illicit purposes. Various methods are employed to identify the people who are behind these identities and websites. Since DNMs are more recent than other platforms, there are more unexplored research possibilities in this field. Research has been done to identify the buying and selling of products connected to hacking from Darknet Marketplaces, the promotion of cyber threats in hacker’s forums and DNMs, and the supply chain elements of content related to cyber threats. The proposed research covers one of the most promising research areas: darknet markets and social media platforms exploitation tools and strategies. The research uses 6 DNMs publicly available data and then identified the most popular social media platform and intent of discussion based on the interaction available in form of the user remarks and comments. The research caters the social media platform and cybercrimes or threats associated to them, by help of the machine learning algorithms Logistic Regression, RandomForestClassifier, GradientBoostingClassifier, KNeighborsClassifier, XGBClassifier, Voting Classifier and Deep Learning based model LSTM and Transformer based Model used. In existing research, natural language processing techniques were employed to identify the kinds of commodities exchanged in these markets, while machine learning approaches were utilized to classify product descriptions.In proposed research work advanced and lighter version of BERT and LSTM model used yielding accuracy of 90.12% and 91.35% respectively. LSTM performed best to extract multiclass classification of actual intension of social media usage by intelligent analysis on hackers’ discussions. Strategies on social media platforms such as Facebook, twitter, Instagram, Snapchat to exploit them using darknet platforms also explored. This paper contributes on cyber threat intelligence that leverages social media applications to work proactively to save their assets based on the threats identified in the Darknet.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Knowledge distillation-based approach for object detection in thermal images during adverse weather conditions 基于知识提炼的方法,用于在恶劣天气条件下检测热图像中的物体
Pub Date : 2024-08-13 DOI: 10.1007/s41870-024-02107-2
Ritika Pahwa, Shruti Yadav, Saumya, Ravinder Megavath

In today’s technology landscape, systems must adapt to diverse conditions to be practically useful. Thermal imaging’s intersection with adverse weather presents a challenge for existing heavy networks designed for RGB images. This research addresses this gap by using knowledge distillation to optimise networks for thermal imaging in challenging weather. Current networks struggle with interpreting thermal images effectively in adverse conditions like fog or rain. Through knowledge distillation, our work aims to enhance these networks, ensuring compatibility and efficiency with thermal imaging. This effort holds promise for enhancing object detection in thermal images during adverse weather, benefiting surveillance systems, improving safety in self-driving vehicles under harsh conditions, and aiding search and rescue operations with limited visibility. This research doesn’t just refine networks; it empowers technology to excel in adverse conditions, promising practical applications that enhance safety, efficiency, and reliability across various technological domains.

在当今的技术领域,系统必须适应各种条件才能发挥实际作用。热成像技术与恶劣天气的交集给现有的 RGB 图像重型网络带来了挑战。这项研究利用知识提炼来优化网络,以应对恶劣天气下的热成像技术,从而弥补这一不足。目前的网络难以在雾或雨等恶劣条件下有效解读热图像。通过知识提炼,我们的工作旨在增强这些网络,确保与热成像的兼容性和效率。这项工作有望在恶劣天气下增强热图像中的物体检测,使监控系统受益,提高自动驾驶车辆在恶劣条件下的安全性,并在能见度有限的情况下协助搜救行动。这项研究不仅完善了网络,还增强了技术在恶劣条件下的能力,有望在各个技术领域实现实际应用,提高安全性、效率和可靠性。
{"title":"Knowledge distillation-based approach for object detection in thermal images during adverse weather conditions","authors":"Ritika Pahwa, Shruti Yadav, Saumya, Ravinder Megavath","doi":"10.1007/s41870-024-02107-2","DOIUrl":"https://doi.org/10.1007/s41870-024-02107-2","url":null,"abstract":"<p>In today’s technology landscape, systems must adapt to diverse conditions to be practically useful. Thermal imaging’s intersection with adverse weather presents a challenge for existing heavy networks designed for RGB images. This research addresses this gap by using knowledge distillation to optimise networks for thermal imaging in challenging weather. Current networks struggle with interpreting thermal images effectively in adverse conditions like fog or rain. Through knowledge distillation, our work aims to enhance these networks, ensuring compatibility and efficiency with thermal imaging. This effort holds promise for enhancing object detection in thermal images during adverse weather, benefiting surveillance systems, improving safety in self-driving vehicles under harsh conditions, and aiding search and rescue operations with limited visibility. This research doesn’t just refine networks; it empowers technology to excel in adverse conditions, promising practical applications that enhance safety, efficiency, and reliability across various technological domains.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"157 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cluster-head selection in WSNs using modified MADM approach by considering conflicting parameters for IoT applications 考虑物联网应用中的冲突参数,使用改进的 MADM 方法在 WSN 中选择簇头
Pub Date : 2024-08-13 DOI: 10.1007/s41870-024-02133-0
Lekhraj, Raushan Kumar Singh, Sachin Upadhyay, Vatsya Tiwari, Sanjiv Kumar Singh

Internet of Things (IoT) devices with limited energy and storage resources can access sensing services from wireless sensor networks (WSNs), which are collections of specialized transducers. Power consumption becomes one of the most important design considerations in WSN because battery replacement or recharge in sensor nodes is almost impossible. For the energy-constrained network, clustering algorithms are crucial for power conservation. By carefully balancing the network’s demand, a cluster head (CH) can lower energy usage and extend lifespan. The primary topic of this study is an effective CH election mechanism that alternates the CH position among nodes with higher energy levels than the others. In order to accomplish balanced load clustering in WSN, the method in this study takes into account a total of seven such factors and coordinates to select the optimal CHs from among them. To choose the set of CHs that can most effectively meet the coordination criterion from the available possibilities, modified MADM techniques are used. The improved version performs better, according to simulation analysis.

能源和存储资源有限的物联网(IoT)设备可以从无线传感器网络(WSN)获取传感服务,而无线传感器网络是专用传感器的集合。由于传感器节点的电池更换或充电几乎不可能,因此功耗成为 WSN 最重要的设计考虑因素之一。对于能量受限的网络来说,聚类算法对节能至关重要。通过仔细平衡网络需求,簇头(CH)可以降低能量消耗并延长使用寿命。本研究的主要课题是一种有效的 CH 选举机制,它能在能量水平高于其他节点的节点之间交替选择 CH 位置。为了在 WSN 中实现均衡负载聚类,本研究的方法共考虑了七个因素,并从中协调选择最佳 CH。为了从可用的可能性中选择一组最有效地满足协调标准的 CH,使用了改进的 MADM 技术。根据模拟分析,改进后的版本性能更好。
{"title":"Cluster-head selection in WSNs using modified MADM approach by considering conflicting parameters for IoT applications","authors":"Lekhraj, Raushan Kumar Singh, Sachin Upadhyay, Vatsya Tiwari, Sanjiv Kumar Singh","doi":"10.1007/s41870-024-02133-0","DOIUrl":"https://doi.org/10.1007/s41870-024-02133-0","url":null,"abstract":"<p>Internet of Things (IoT) devices with limited energy and storage resources can access sensing services from wireless sensor networks (WSNs), which are collections of specialized transducers. Power consumption becomes one of the most important design considerations in WSN because battery replacement or recharge in sensor nodes is almost impossible. For the energy-constrained network, clustering algorithms are crucial for power conservation. By carefully balancing the network’s demand, a cluster head (CH) can lower energy usage and extend lifespan. The primary topic of this study is an effective CH election mechanism that alternates the CH position among nodes with higher energy levels than the others. In order to accomplish balanced load clustering in WSN, the method in this study takes into account a total of seven such factors and coordinates to select the optimal CHs from among them. To choose the set of CHs that can most effectively meet the coordination criterion from the available possibilities, modified MADM techniques are used. The improved version performs better, according to simulation analysis.</p>","PeriodicalId":14138,"journal":{"name":"International Journal of Information Technology","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142184633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1