首页 > 最新文献

Journal of Computer Science and Cybernetics最新文献

英文 中文
RECURSIVE JOIN PROCESSING IN BIG DATA ENVIRONMENT 大数据环境下的递归连接处理
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15889
Anh-Cang Phan, Thanh-Ngoan Trieu, Thuong-Cang Phan
In the era of information explosion, Big data is receiving increased attention as having important implications for growth, profitability, and survival of modern organizations. However, it also offers many challenges in the way data is processed and queried over time. A join operation is one of the most common operations appearing in many data queries. Specially, a recursive join is a join type used to query hierarchical data but it is more extremely complex and costly. The evaluation of the recursive join in MapReduce includes some iterations of two tasks of a join task and an incremental computation task. Those tasks are significantly expensive and reduce the performance of queries in large datasets because they generate plenty of intermediate data transmitting over the network. In this study, we thus propose a simple but efficient approach for Big recursive joins based on reducing by half the number of the required iterations in the Spark environment. This improvement leads to significantly reducing the number of the required tasks as well as the amount of the intermediate data generated and transferred over the network. Our experimental results show that an improved recursive join is more efficient and faster than a traditional one on large-scale datasets.
在信息爆炸的时代,大数据越来越受到关注,因为它对现代组织的增长、盈利和生存具有重要影响。然而,随着时间的推移,它在处理和查询数据的方式上也带来了许多挑战。连接操作是许多数据查询中最常见的操作之一。特别地,递归连接是一种用于查询分层数据的连接类型,但它更加复杂和昂贵。MapReduce中递归连接的求值包括连接任务和增量计算任务两个任务的一些迭代。这些任务非常昂贵,并且会降低大型数据集中查询的性能,因为它们会生成大量通过网络传输的中间数据。因此,在这项研究中,我们提出了一种简单而有效的方法来处理大型递归连接,该方法将Spark环境中所需的迭代次数减少一半。这种改进可以显著减少所需任务的数量,以及通过网络生成和传输的中间数据的数量。实验结果表明,在大规模数据集上,改进的递归连接比传统的递归连接更高效、更快。
{"title":"RECURSIVE JOIN PROCESSING IN BIG DATA ENVIRONMENT","authors":"Anh-Cang Phan, Thanh-Ngoan Trieu, Thuong-Cang Phan","doi":"10.15625/1813-9663/37/2/15889","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15889","url":null,"abstract":"In the era of information explosion, Big data is receiving increased attention as having important implications for growth, profitability, and survival of modern organizations. However, it also offers many challenges in the way data is processed and queried over time. A join operation is one of the most common operations appearing in many data queries. Specially, a recursive join is a join type used to query hierarchical data but it is more extremely complex and costly. The evaluation of the recursive join in MapReduce includes some iterations of two tasks of a join task and an incremental computation task. Those tasks are significantly expensive and reduce the performance of queries in large datasets because they generate plenty of intermediate data transmitting over the network. In this study, we thus propose a simple but efficient approach for Big recursive joins based on reducing by half the number of the required iterations in the Spark environment. This improvement leads to significantly reducing the number of the required tasks as well as the amount of the intermediate data generated and transferred over the network. Our experimental results show that an improved recursive join is more efficient and faster than a traditional one on large-scale datasets.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85852181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POST-QUANTUM BLIND SIGNATURE PROTOCOL ON NON-COMMUTATIVE ALGEBRAS 非交换代数上的后量子盲签名协议
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/16023
Minh N.H, Moldovyan D.N, et al.
A method for constructing a blind signature scheme based on a hidden discrete logarithm problem defined in finite non-commutative associative algebras is proposed. Blind signature protocols are constructed using four-dimensional and six-dimensional algebras defined over a ground finite field GF(p) and containing a global two-sided unit as an algebraic support. The basic properties of the used algebra, which determine the choice of protocol parameters, are described.
提出了一种基于有限非交换关联代数的隐离散对数问题的盲签名方案的构造方法。采用四维和六维代数构造盲签名协议,这些代数定义在地面有限域GF(p)上,并包含一个全局的双边单位作为代数支持。描述了所使用的代数的基本性质,这些性质决定了协议参数的选择。
{"title":"POST-QUANTUM BLIND SIGNATURE PROTOCOL ON NON-COMMUTATIVE ALGEBRAS","authors":"Minh N.H, Moldovyan D.N, et al.","doi":"10.15625/1813-9663/37/4/16023","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/16023","url":null,"abstract":"A method for constructing a blind signature scheme based on a hidden discrete logarithm problem defined in finite non-commutative associative algebras is proposed. Blind signature protocols are constructed using four-dimensional and six-dimensional algebras defined over a ground finite field GF(p) and containing a global two-sided unit as an algebraic support. The basic properties of the used algebra, which determine the choice of protocol parameters, are described.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78269959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MODELING AMINO ACID SUBSTITUTIONS FOR WHOLE GENOMES 模拟全基因组的氨基酸取代
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/15937
L. Vinh
Modeling amino acid substitution process is a core task in bioinformatics. New advanced sequencing technologies have generated huge datasets including whole genomes from various species. Estimating amino acid substitution models from whole genome datasets provides us unprecedented opportunities to accurately investigate relationships among species. In this paper, we review state-of-the-art computational methods to estimate amino acid substitution models from large datasets. We also describe a comprehensive pipeline to practically estimate amino acid models from whole genome datasets. Finally, we apply amino acid substitution models to build phylogenomic trees from bird and plant genome datasets. We compare our newly reconstructed phylogenomic trees and published ones and discuss new findings.
氨基酸取代过程建模是生物信息学的核心问题。新的先进测序技术产生了庞大的数据集,包括来自不同物种的全基因组。从全基因组数据集估计氨基酸替代模型为我们提供了前所未有的机会来准确地研究物种之间的关系。在本文中,我们回顾了最先进的计算方法,以估计氨基酸取代模型从大数据集。我们还描述了一个全面的管道,以实际估计氨基酸模型从全基因组数据集。最后,我们应用氨基酸替代模型从鸟类和植物基因组数据集构建系统基因组树。我们比较了新重建的系统基因组树和已发表的系统基因组树,并讨论了新的发现。
{"title":"MODELING AMINO ACID SUBSTITUTIONS FOR WHOLE GENOMES","authors":"L. Vinh","doi":"10.15625/1813-9663/37/4/15937","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/15937","url":null,"abstract":"Modeling amino acid substitution process is a core task in bioinformatics. New advanced sequencing technologies have generated huge datasets including whole genomes from various species. Estimating amino acid substitution models from whole genome datasets provides us unprecedented opportunities to accurately investigate relationships among species. In this paper, we review state-of-the-art computational methods to estimate amino acid substitution models from large datasets. We also describe a comprehensive pipeline to practically estimate amino acid models from whole genome datasets. Finally, we apply amino acid substitution models to build phylogenomic trees from bird and plant genome datasets. We compare our newly reconstructed phylogenomic trees and published ones and discuss new findings.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"264 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78406678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
USING COMBINATORIAL MAPS FOR ALGORITHMS ON GRAPHS 在图上使用组合映射的算法
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/3/16253
R. Cori
The aim of this paper is to come back to a data structure representation of graph by permutations. This originated in the years 1960-1970 by contributions due to J. Edmonds [7], A. Jacques [11], W. Tutte [22] in order to consider the embedding of a graph in a surface as a combinatorial object. Some algebraic developments where suggested in [4] and [12]. It was also used for implementation in different situation, like planarity testing by H. de Fraysseix and P. Rosenstiehl [6], computer vision by G. Damiand  and A. Dupas [5] or formal proofs by G. Gonthier [9].
本文的目的是回到用置换表示图的数据结构。这源于1960-1970年J. Edmonds [7], a . Jacques [11], W. Tutte[22]的贡献,目的是将图在曲面中的嵌入视为组合对象。在[4]和[12]中提出了一些代数发展。它也被用于不同情况下的实现,如H. de Fraysseix和P. Rosenstiehl[6]的平面性测试,G. Damiand和A. Dupas[5]的计算机视觉或G. Gonthier[9]的形式化证明。
{"title":"USING COMBINATORIAL MAPS FOR ALGORITHMS ON GRAPHS","authors":"R. Cori","doi":"10.15625/1813-9663/37/3/16253","DOIUrl":"https://doi.org/10.15625/1813-9663/37/3/16253","url":null,"abstract":"The aim of this paper is to come back to a data structure representation of graph by permutations. This originated in the years 1960-1970 by contributions due to J. Edmonds [7], A. Jacques [11], W. Tutte [22] in order to consider the embedding of a graph in a surface as a combinatorial object. Some algebraic developments where suggested in [4] and [12]. It was also used for implementation in different situation, like planarity testing by H. de Fraysseix and P. Rosenstiehl [6], computer vision by G. Damiand  and A. Dupas [5] or formal proofs by G. Gonthier [9].","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81382485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ONE-MINIUM-ONLY BASIC-SET TRELLIS MIN-MAX DECODER ARCHITECTURE FOR NONBINARY LDPC CODE 非二进制LDPC码的单最小-唯一基本集网格最小-最大解码器结构
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15917
T. Dinh, Huyen Pham Thi, Hung Dao Tuan, Nghia Pham Xuan
Nonbinary low-density-parity-check (NB-LDPC) code outperforms their binary counterpart in terms of error-correcting performance and error-floor property when the code length is moderate. However, the drawback of NB-LDPC decoders is high complexity and the complexity increases considerably when increasing the Galois-field order. In this paper, an One-Minimum-Only basic-set trellis min-max (OMO-BS-TMM) algorithm and the corresponding decoder architecture are proposed for NBLDPC codes to greatly reduce the complexity of the check node unit (CNU) as well as the whole decoder. In the proposed OMO-BS-TMM algorithm, only the first minimum values are used for generating the check node messages instead of using both the first and second minimum values, and the number of messages exchanged between the check node and the variable node is reduced in comparison with the previous works. Layered decoder architectures based on the proposed algorithm were implemented for the (837, 726) NB-LDPC code over GF(32) using 90-nm CMOS technology. The implementation results showed that the OMO-BS-TMM algorithm achieves the almost similar error-correcting performance, and a reduction of the complexity by 31.8% and 20.5% for the whole decoder, compared to previous works. Moreover, the proposed decoder achieves a higher throughput at 1.4 Gbps, compared with the other state-of-the-art NBLDPC decoders.
当码长适中时,非二进制低密度奇偶校验(NB-LDPC)码在纠错性能和错层特性方面优于二进制码。但NB-LDPC解码器的缺点是复杂度高,且随着伽罗瓦场阶数的增加,解码器的复杂度会显著增加。本文针对NBLDPC码,提出了一种One-Minimum-Only基本集网格最小-最大(OMO-BS-TMM)算法和相应的解码器架构,大大降低了校验节点单元(CNU)和整个解码器的复杂度。在本文提出的OMO-BS-TMM算法中,仅使用第一个最小值来生成检查节点消息,而不是同时使用第一个和第二个最小值,并且与之前的工作相比,减少了检查节点与可变节点之间交换的消息数量。基于该算法的分层解码器架构采用90纳米CMOS技术实现了GF(32)上的(837,726)NB-LDPC码。实现结果表明,OMO-BS-TMM算法实现了几乎相同的纠错性能,整个解码器的复杂度比之前的工作分别降低了31.8%和20.5%。此外,与其他最先进的NBLDPC解码器相比,所提出的解码器实现了1.4 Gbps的更高吞吐量。
{"title":"ONE-MINIUM-ONLY BASIC-SET TRELLIS MIN-MAX DECODER ARCHITECTURE FOR NONBINARY LDPC CODE","authors":"T. Dinh, Huyen Pham Thi, Hung Dao Tuan, Nghia Pham Xuan","doi":"10.15625/1813-9663/37/2/15917","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15917","url":null,"abstract":"Nonbinary low-density-parity-check (NB-LDPC) code outperforms their binary counterpart in terms of error-correcting performance and error-floor property when the code length is moderate. However, the drawback of NB-LDPC decoders is high complexity and the complexity increases considerably when increasing the Galois-field order. In this paper, an One-Minimum-Only basic-set trellis min-max (OMO-BS-TMM) algorithm and the corresponding decoder architecture are proposed for NBLDPC codes to greatly reduce the complexity of the check node unit (CNU) as well as the whole decoder. In the proposed OMO-BS-TMM algorithm, only the first minimum values are used for generating the check node messages instead of using both the first and second minimum values, and the number of messages exchanged between the check node and the variable node is reduced in comparison with the previous works. Layered decoder architectures based on the proposed algorithm were implemented for the (837, 726) NB-LDPC code over GF(32) using 90-nm CMOS technology. The implementation results showed that the OMO-BS-TMM algorithm achieves the almost similar error-correcting performance, and a reduction of the complexity by 31.8% and 20.5% for the whole decoder, compared to previous works. Moreover, the proposed decoder achieves a higher throughput at 1.4 Gbps, compared with the other state-of-the-art NBLDPC decoders.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83692508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FUZZY RELATIONAL DATABASE MODEL AND MANAGEMANT SYSTEM FOR IMPRECISE INFORMATION 模糊关系数据库模型及不精确信息管理系统
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15346
Hoa Nguyen, Nguyen Vu Uyen Nhi, LeThuc Duy
This paper introduces a fuzzy relational database model (FRDB) and the management system for it. FRDB is built by extending the classical relational database model with the fuzzy membership degree of tuples in relations. The management system for FRDB with the querying language like SQL is built by using a classical open-source management system.
本文介绍了一种模糊关系数据库模型(FRDB)及其管理系统。FRDB是利用关系中元组的模糊隶属度对经典关系数据库模型进行扩展而建立的。利用经典的开源管理系统,构建了基于SQL等查询语言的FRDB管理系统。
{"title":"FUZZY RELATIONAL DATABASE MODEL AND MANAGEMANT SYSTEM FOR IMPRECISE INFORMATION","authors":"Hoa Nguyen, Nguyen Vu Uyen Nhi, LeThuc Duy","doi":"10.15625/1813-9663/37/2/15346","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15346","url":null,"abstract":"This paper introduces a fuzzy relational database model (FRDB) and the management system for it. FRDB is built by extending the classical relational database model with the fuzzy membership degree of tuples in relations. The management system for FRDB with the querying language like SQL is built by using a classical open-source management system.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85287653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DUAL TRANSFORMER ENCODERS FOR SESSION-BASED RECOMMENDATION 基于会话推荐的双变压器编码器
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/15844
P. H. Anh, Ngo Xuan Bach, Tu Minh Phuong
When long-term user proles are not available, session-based recommendation methods are used to predict the user's next actions from anonymous sessions-based data. Recent advances in session-based recommendation highlight the necessity of modeling not only user sequential behaviors but also the user's main interest in a session, while avoiding the eect of unintended clicks causing interest drift of the user. In this work, we propose a Dual Transformer Encoder Recommendation model (DTER) as a solution to address this requirement. The idea is to combine the following recipes: (1) a Transformer-based model with dual encoders capable of modeling both sequential patterns and the main interest of the user in a session; (2) a new recommendation model that is designed for learning richer session contexts by conditioning on all permutations of the session prex. This approach provides a unied framework for leveraging the ability of the Transformer's self-attention mechanism in modeling session sequences while taking into account the user's main interest in the session. We empirically evaluate the proposed method on two benchmark datasets. The results show that DTER outperforms state-of-the-art session-based recommendation methods on common evaluation metrics.
当长期用户不可用时,使用基于会话的推荐方法从基于匿名会话的数据中预测用户的下一步操作。基于会话的推荐的最新进展强调了不仅要对用户的顺序行为建模,还要对用户在会话中的主要兴趣建模,同时避免意外点击导致用户兴趣漂移的影响。在这项工作中,我们提出了一个双变压器编码器推荐模型(DTER)作为解决这一需求的解决方案。其思想是结合以下方法:(1)基于transformer的模型,该模型具有双编码器,能够对顺序模式和会话中用户的主要兴趣进行建模;(2)一种新的推荐模型,该模型通过对会话前缀的所有排列进行条件反射来学习更丰富的会话上下文。这种方法提供了一个统一的框架,在考虑用户对会话的主要兴趣的同时,利用Transformer在会话序列建模中的自关注机制的能力。我们在两个基准数据集上对所提出的方法进行了实证评估。结果表明,DTER在常用评价指标上优于最先进的基于会话的推荐方法。
{"title":"DUAL TRANSFORMER ENCODERS FOR SESSION-BASED RECOMMENDATION","authors":"P. H. Anh, Ngo Xuan Bach, Tu Minh Phuong","doi":"10.15625/1813-9663/37/4/15844","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/15844","url":null,"abstract":"When long-term user proles are not available, session-based recommendation methods are used to predict the user's next actions from anonymous sessions-based data. Recent advances in session-based recommendation highlight the necessity of modeling not only user sequential behaviors but also the user's main interest in a session, while avoiding the eect of unintended clicks causing interest drift of the user. In this work, we propose a Dual Transformer Encoder Recommendation model (DTER) as a solution to address this requirement. The idea is to combine the following recipes: (1) a Transformer-based model with dual encoders capable of modeling both sequential patterns and the main interest of the user in a session; (2) a new recommendation model that is designed for learning richer session contexts by conditioning on all permutations of the session prex. This approach provides a unied framework for leveraging the ability of the Transformer's self-attention mechanism in modeling session sequences while taking into account the user's main interest in the session. We empirically evaluate the proposed method on two benchmark datasets. The results show that DTER outperforms state-of-the-art session-based recommendation methods on common evaluation metrics.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75387011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE 开发物联网生态系统开发生命周期的方法-辅助物联网视角
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/3/16245
M. Paprzycki, M. Ganzha, K. Wasielewska, Piotr Lewandowski
Current software projects require continuous integration during their whole lifetime. In this context, different approaches regarding introduction of DevOps and DevSecOps strategies have been proposed in the literature. While DevOps proposes an agile methodology for the development and instantiation of software platforms with minimal impact in any kind of operations environment, this contribution proposes the introduction of DevOps methodology for Next Generation IoT deployments. Moreover, novelty of the proposed approach lies in leveraging DevSecOps in different stages and layers of the architecture. In particular, the present work describes the different DevSecOps methodology tasks, and how the security is included on pre-design activities such as planning, creation or adaptation, the design and implementation, as well as on post-implementation activities such as detection, response. Without proper consideration of security and privacy best practices identified in this article, the continuous delivery of services using DevOps methodologies may create risks and introduce different vulnerabilities for Next Generation IoT deployments.
当前的软件项目在其整个生命周期中都需要持续集成。在这种背景下,文献中提出了引入DevOps和DevSecOps策略的不同方法。DevOps为软件平台的开发和实例化提出了一种敏捷的方法,在任何类型的操作环境中都能将影响降到最低,而这一贡献则提出了为下一代物联网部署引入DevOps方法。此外,所建议的方法的新颖之处在于在架构的不同阶段和层中利用DevSecOps。特别是,目前的工作描述了不同的DevSecOps方法任务,以及如何将安全性包含在设计前活动(如规划、创建或调整、设计和实现)以及实施后活动(如检测、响应)中。如果没有适当考虑本文中确定的安全和隐私最佳实践,使用DevOps方法持续交付服务可能会产生风险,并为下一代物联网部署引入不同的漏洞。
{"title":"DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE","authors":"M. Paprzycki, M. Ganzha, K. Wasielewska, Piotr Lewandowski","doi":"10.15625/1813-9663/37/3/16245","DOIUrl":"https://doi.org/10.15625/1813-9663/37/3/16245","url":null,"abstract":"Current software projects require continuous integration during their whole lifetime. In this context, different approaches regarding introduction of DevOps and DevSecOps strategies have been proposed in the literature. While DevOps proposes an agile methodology for the development and instantiation of software platforms with minimal impact in any kind of operations environment, this contribution proposes the introduction of DevOps methodology for Next Generation IoT deployments. Moreover, novelty of the proposed approach lies in leveraging DevSecOps in different stages and layers of the architecture. In particular, the present work describes the different DevSecOps methodology tasks, and how the security is included on pre-design activities such as planning, creation or adaptation, the design and implementation, as well as on post-implementation activities such as detection, response. Without proper consideration of security and privacy best practices identified in this article, the continuous delivery of services using DevOps methodologies may create risks and introduce different vulnerabilities for Next Generation IoT deployments.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72645002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES 高级加密协议中的隐私:原型示例
Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/16104
Phan Dương Hiệu, M. Yung
Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven strategies for making profits rather than for serving the user. Privacy, therefore, becomes more and more important, and new techniques should be developed to protect personal information and to reduce trust requirements on the authorities or the Big Tech providers. In a general sense, privacy is ``the right to be left alone'' and privacy protection allows individuals to have control over how their personal information is collected and used. In this survey, we discuss the privacy protection methods of various cryptographic protocols, in particular we review: - Privacy in electronic voting systems. This may be, perhaps, the most important real-world application where privacy plays a fundamental role. %classical authentication with group, ring signatures, anonymous credentials. - Private computation. This may be the widest domain in the new era of modern technologies with cloud computing and big data, where users delegate the storage of their data and the computation to the cloud. In such a situation, ``how can we preserve privacy?'' is one of the most important questions in cryptography nowadays. - Privacy in contact tracing. This is a typical example of a concrete study on a contemporary scenario where one should deal with the unexpected social problem but needs not pay the cost of weakening the privacy of users. Finally, we will discuss some notions which aim at reinforcing privacy by masking the type of protocol that we execute, we call it the covert cryptographic primitives and protocols.
密码学是实现数据机密性、完整性和真实性的网络安全的基本基石。然而,当为云服务或大数据等新兴应用部署加密协议时,对安全性的需求就超出了这些基本要求。如今,数据被广泛地存储在云中,用户还需要信任运行强大应用程序的云服务器/权威机构。收集用户数据,再加上强大的机器学习工具,可能会带来大规模监控或不良数据驱动策略的巨大风险,这些策略是为了盈利,而不是为用户服务。因此,隐私变得越来越重要,应该开发新技术来保护个人信息,并减少对当局或大型科技提供商的信任要求。一般来说,隐私是“不受打扰的权利”,隐私保护允许个人控制其个人信息的收集和使用方式。在本调查中,我们讨论了各种加密协议的隐私保护方法,特别是我们回顾了:-电子投票系统中的隐私。这可能是,也许,最重要的现实世界的应用程序,其中隐私扮演着基本的角色。具有组、环签名、匿名凭证的经典身份验证。—私有计算。这可能是云计算和大数据现代技术新时代最广泛的领域,用户将数据存储和计算委托给云。在这种情况下,我们如何保护隐私?是当今密码学中最重要的问题之一。-接触者追踪中的隐私。这是一个典型的针对当代场景的具体研究,既要处理意外的社会问题,又不需要付出削弱用户隐私的代价。最后,我们将讨论一些旨在通过掩盖我们执行的协议类型来加强隐私的概念,我们称之为隐蔽的加密原语和协议。
{"title":"PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES","authors":"Phan Dương Hiệu, M. Yung","doi":"10.15625/1813-9663/37/4/16104","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/16104","url":null,"abstract":"Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven strategies for making profits rather than for serving the user. Privacy, therefore, becomes more and more important, and new techniques should be developed to protect personal information and to reduce trust requirements on the authorities or the Big Tech providers. In a general sense, privacy is ``the right to be left alone'' and privacy protection allows individuals to have control over how their personal information is collected and used. In this survey, we discuss the privacy protection methods of various cryptographic protocols, in particular we review: - Privacy in electronic voting systems. This may be, perhaps, the most important real-world application where privacy plays a fundamental role. %classical authentication with group, ring signatures, anonymous credentials. - Private computation. This may be the widest domain in the new era of modern technologies with cloud computing and big data, where users delegate the storage of their data and the computation to the cloud. In such a situation, ``how can we preserve privacy?'' is one of the most important questions in cryptography nowadays. - Privacy in contact tracing. This is a typical example of a concrete study on a contemporary scenario where one should deal with the unexpected social problem but needs not pay the cost of weakening the privacy of users. Finally, we will discuss some notions which aim at reinforcing privacy by masking the type of protocol that we execute, we call it the covert cryptographic primitives and protocols.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78574252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOME NEW RESULTS ON AUTOMATIC IDENTIFICATION OF VIETNAMESE FOLK SONGS CHEO AND QUANHO 越南民歌cheo和quanho自动识别的一些新结果
Pub Date : 2020-12-14 DOI: 10.15625/1813-9663/36/4/14424
Chu Ba Thanh, Trinh Van Loan, N. Quang
Vietnamese folk songs are very rich in genre and content. Identifying Vietnamese folk tunes will contribute to the storage and search for information about these tunes automatically. The paper will present an overview of the classification of music genres that have been performed in Vietnam and abroad. For two types of very popular folk songs of Vietnam such as Cheo and Quanho, the paper describes the dataset and Gaussian Mixture Model (GMM) to perform the experiments on identifying some of these folk songs. The GMM used for experiment with 4 sets of parameters containing Mel Frequency Cepstral Coefficients (MFCC), energy, the first and the second derivatives of MFCC and energy, tempo, intensity, and fundamental frequency. The results showed that the parameters added to the MFCCs contributed significantly to the improvement of the identification accuracy with the appropriate values of Gaussian component number M. Our experiments also showed that, on average, the length of the excerpts was only 29.63% of the whole song for Cheo and 38.1% of the whole song for Quanho, the identification rate was only 3.1% and 2.33% less than the whole song for Cheo and Quanho, respectively. The identification of Cheo and Quanho was also tested with i-vectors.
越南民歌体裁丰富,内容丰富。识别越南民间曲调有助于这些曲调信息的自动存储和搜索。本文将概述在越南和国外演出的音乐流派的分类。针对越南两种非常流行的民歌,如Cheo和Quanho,本文描述了数据集和高斯混合模型(GMM),对其中的一些民歌进行了识别实验。实验使用的GMM有4组参数,包括Mel频率倒谱系数(MFCC)、能量、MFCC的一阶导数和二阶导数以及能量、节奏、强度和基频。结果表明,在选取合适的高斯分量数m值时,加入mfcc的参数对识别精度的提高有显著的促进作用。我们的实验还表明,平均而言,Cheo的节选长度仅为整首歌曲的29.63%,全浩的节选长度仅为整首歌曲的38.1%,Cheo和全浩的识别率分别仅比整首歌曲低3.1%和2.33%。用i-vectors对Cheo和Quanho进行鉴定。
{"title":"SOME NEW RESULTS ON AUTOMATIC IDENTIFICATION OF VIETNAMESE FOLK SONGS CHEO AND QUANHO","authors":"Chu Ba Thanh, Trinh Van Loan, N. Quang","doi":"10.15625/1813-9663/36/4/14424","DOIUrl":"https://doi.org/10.15625/1813-9663/36/4/14424","url":null,"abstract":"Vietnamese folk songs are very rich in genre and content. Identifying Vietnamese folk tunes will contribute to the storage and search for information about these tunes automatically. The paper will present an overview of the classification of music genres that have been performed in Vietnam and abroad. For two types of very popular folk songs of Vietnam such as Cheo and Quanho, the paper describes the dataset and Gaussian Mixture Model (GMM) to perform the experiments on identifying some of these folk songs. The GMM used for experiment with 4 sets of parameters containing Mel Frequency Cepstral Coefficients (MFCC), energy, the first and the second derivatives of MFCC and energy, tempo, intensity, and fundamental frequency. The results showed that the parameters added to the MFCCs contributed significantly to the improvement of the identification accuracy with the appropriate values of Gaussian component number M. Our experiments also showed that, on average, the length of the excerpts was only 29.63% of the whole song for Cheo and 38.1% of the whole song for Quanho, the identification rate was only 3.1% and 2.33% less than the whole song for Cheo and Quanho, respectively. The identification of Cheo and Quanho was also tested with i-vectors.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"23 1","pages":"325-345"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Computer Science and Cybernetics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1