首页 > 最新文献

ICST Transactions on Scalable Information Systems最新文献

英文 中文
Blockchain based Quantum Resistant Signature Algorithm for Data Integrity Verification in Cloud and Internet of Everything 基于区块链的量子抗性签名算法,用于云和万物互联中的数据完整性验证
Pub Date : 2024-03-20 DOI: 10.4108/eetsis.5488
P. Shrivastava, Bashir Alam, Mansaf Alam
  INTRODUCTION: The processing and storage capacities of the Internet of Everything (IoE) platform are restricted, but the cloud can readily provide efficient computing resources and scalable storage. The Internet of Everything (IoE) has expanded its capabilities recently by employing cloud resources in multiple ways. Cloud service providers (CSP) offer storage resources where extra data can be stored. These methods can be used to store user data over the CSP while maintaining data integrity and security. The secure storage of data is jeopardized by concerns like malicious system damage, even though the CSP's storage devices are highly centralized. Substantial security advancements have been made recently as a result of using blockchain technology to protect data transported to networks. In addition, the system's inclusive efficacy is enhanced, which lowers costs in comparison to earlier systems. OBJECTIVES: The main objective of the study is to a blockchain-based data integrity verification scheme is presented to provide greater scalability and utilization of cloud resources while preventing data from entering the cloud from being corrupted. METHODS: In this paper, we propose a novel method of implementing blockchain in order to enhance the security of data stores in cloud. RESULTS: The simulations indicate that the proposed approach is more effective in terms of data security and data integrity. Furthermore, the comparative investigation demonstrated that the purported methodology is far more effective and competent than prevailing methodologies. CONCLUSIONS: The model evaluations demonstrated that the proposed approach is quite effective in data security.
简介:万物互联(IoE)平台的处理和存储能力受到限制,但云可以随时提供高效的计算资源和可扩展的存储。最近,万物互联(IoE)通过多种方式利用云资源扩展了自己的能力。云服务提供商(CSP)提供可存储额外数据的存储资源。这些方法可用于在 CSP 上存储用户数据,同时保持数据的完整性和安全性。尽管 CSP 的存储设备高度集中,但恶意系统破坏等问题会危及数据的安全存储。最近,由于使用区块链技术保护传输到网络的数据,在安全性方面取得了实质性进展。此外,该系统的包容性功效也得到了增强,与早期系统相比,成本更低。目标:本研究的主要目的是提出一种基于区块链的数据完整性验证方案,以提供更高的可扩展性和云资源利用率,同时防止进入云的数据被破坏。方法:本文提出了一种新颖的区块链实现方法,以增强云中数据存储的安全性。结果:模拟结果表明,所提出的方法在数据安全性和数据完整性方面更为有效。此外,比较调查表明,所提出的方法远比现有方法更有效、更有能力。结论:模型评估表明,建议的方法在数据安全方面相当有效。
{"title":"Blockchain based Quantum Resistant Signature Algorithm for Data Integrity Verification in Cloud and Internet of Everything","authors":"P. Shrivastava, Bashir Alam, Mansaf Alam","doi":"10.4108/eetsis.5488","DOIUrl":"https://doi.org/10.4108/eetsis.5488","url":null,"abstract":"  \u0000INTRODUCTION: The processing and storage capacities of the Internet of Everything (IoE) platform are restricted, but the cloud can readily provide efficient computing resources and scalable storage. The Internet of Everything (IoE) has expanded its capabilities recently by employing cloud resources in multiple ways. Cloud service providers (CSP) offer storage resources where extra data can be stored. These methods can be used to store user data over the CSP while maintaining data integrity and security. The secure storage of data is jeopardized by concerns like malicious system damage, even though the CSP's storage devices are highly centralized. Substantial security advancements have been made recently as a result of using blockchain technology to protect data transported to networks. In addition, the system's inclusive efficacy is enhanced, which lowers costs in comparison to earlier systems. \u0000OBJECTIVES: The main objective of the study is to a blockchain-based data integrity verification scheme is presented to provide greater scalability and utilization of cloud resources while preventing data from entering the cloud from being corrupted. \u0000METHODS: In this paper, we propose a novel method of implementing blockchain in order to enhance the security of data stores in cloud. \u0000RESULTS: The simulations indicate that the proposed approach is more effective in terms of data security and data integrity. Furthermore, the comparative investigation demonstrated that the purported methodology is far more effective and competent than prevailing methodologies. \u0000CONCLUSIONS: The model evaluations demonstrated that the proposed approach is quite effective in data security.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"3 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140225763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Credit Risk Prediction Method of Blockchain Applied to Supply Chain Finance 区块链信用风险预测方法在供应链金融中的应用研究
Pub Date : 2024-03-19 DOI: 10.4108/eetsis.5300
Yue Liu, Wangke Lin
INTRODUCTION: From the perspective of blockchain, it establishes a credit risk evaluation index system for supply chain finance applicable to blockchain, constructs an accurate credit risk prediction model, and provides a reliable guarantee for the research of credit risk in supply chain finance.OBJECTIVES: To address the inefficiency of the current credit risk prediction and evaluation model for supply chain finance.METHODS: This paper proposes a combined blockchain supply chain financial credit risk prediction and evaluation method based on kernel principal component analysis and intelligent optimisation algorithm to improve Deep Echo State Network. Firstly, the evaluation system is constructed by describing the supply chain financial credit risk prediction and evaluation problem based on blockchain technology, analysing the evaluation indexes, and constructing the evaluation system; then, the parameters of DeepESN network are optimized by combining the kernel principal component analysis method with the JSO algorithm to construct the credit risk prediction and evaluation model of supply chain finance; finally, the effectiveness, robustness, and real-time performance of the proposed method are verified by simulation experiment analysis.RESULTS: The results show that the proposed method improves the prediction efficiency of the prediction model.CONCLUSION: The problems of insufficient scientific construction of index system and poor efficiency of risk prediction model of B2B E-commerce transaction size prediction method are effectively solved.
引言:从区块链的视角出发,建立适用于区块链的供应链金融信用风险评价指标体系,构建精准的信用风险预测模型,为供应链金融信用风险研究提供可靠保障:针对目前供应链金融信用风险预测与评价模型效率低下的问题.方法:本文提出了一种基于内核主成分分析和智能优化算法的区块链供应链金融信用风险预测与评价相结合的方法,改进了深度回声态网络。首先,通过描述基于区块链技术的供应链金融信用风险预测与评价问题,分析评价指标,构建评价体系;然后,结合核主成分分析方法和JSO算法,对DeepESN网络的参数进行优化,构建供应链金融信用风险预测与评价模型;最后,通过仿真实验分析,验证了所提方法的有效性、鲁棒性和实时性。结果:结果表明,所提方法提高了预测模型的预测效率。结论:有效解决了B2B电子商务交易规模预测方法指标体系构建不够科学、风险预测模型效率不高等问题。
{"title":"Research on Credit Risk Prediction Method of Blockchain Applied to Supply Chain Finance","authors":"Yue Liu, Wangke Lin","doi":"10.4108/eetsis.5300","DOIUrl":"https://doi.org/10.4108/eetsis.5300","url":null,"abstract":"INTRODUCTION: From the perspective of blockchain, it establishes a credit risk evaluation index system for supply chain finance applicable to blockchain, constructs an accurate credit risk prediction model, and provides a reliable guarantee for the research of credit risk in supply chain finance.OBJECTIVES: To address the inefficiency of the current credit risk prediction and evaluation model for supply chain finance.METHODS: This paper proposes a combined blockchain supply chain financial credit risk prediction and evaluation method based on kernel principal component analysis and intelligent optimisation algorithm to improve Deep Echo State Network. Firstly, the evaluation system is constructed by describing the supply chain financial credit risk prediction and evaluation problem based on blockchain technology, analysing the evaluation indexes, and constructing the evaluation system; then, the parameters of DeepESN network are optimized by combining the kernel principal component analysis method with the JSO algorithm to construct the credit risk prediction and evaluation model of supply chain finance; finally, the effectiveness, robustness, and real-time performance of the proposed method are verified by simulation experiment analysis.RESULTS: The results show that the proposed method improves the prediction efficiency of the prediction model.CONCLUSION: The problems of insufficient scientific construction of index system and poor efficiency of risk prediction model of B2B E-commerce transaction size prediction method are effectively solved.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"37 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140229172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating Performance of Conversational Bot Using Seq2Seq Model and Attention Mechanism 利用 Seq2Seq 模型和注意力机制评估对话机器人的性能
Pub Date : 2024-03-18 DOI: 10.4108/eetsis.5457
Karandeep Saluja, Shashwat Agarwal, Sanjeev Kumar, Tanupriya Choudhury
The Chat-Bot utilizes Sequence-to-Sequence Model with the Attention Mechanism, in order to interpret and address user inputs effectively. The whole model consists of Data gathering, Data preprocessing, Seq2seq Model, Training and Tuning. Data preprocessing involves cleaning of any irrelevant data, before converting them into the numerical format. The Seq2Seq Model is comprised of two components: an Encoder and a Decoder. Both Encoder and Decoder along with the Attention Mechanism allow dialogue management, which empowers the Model to answer the user in the most accurate and relevant manner. The output generated by the Bot is in the Natural Language only. Once the building of the Seq2Seq Model is completed, training of the model takes place in which the model is fed with the preprocessed data, during training it tries to minimize the loss function between the predicted output and the ground truth output. Performance is computed using metrics such as perplexity, BLEU score, and ROUGE score on a held-out validation set. In order to meet non-functional requirements, our system needs to maintain a response time of under one second with an accuracy target exceeding 90%.
聊天机器人利用序列到序列模型和注意力机制来有效地解释和处理用户输入。整个模型包括数据收集、数据预处理、序列到序列模型、训练和调整。数据预处理包括在将数据转换为数字格式之前清理无关数据。Seq2Seq 模型由两个部分组成:编码器和解码器。编码器和解码器以及注意机制都可以进行对话管理,从而使模型能够以最准确、最相关的方式回答用户的问题。机器人生成的输出仅使用自然语言。完成 Seq2Seq 模型的构建后,将对模型进行训练,在训练过程中,模型将接收预处理数据,并尝试最小化预测输出与地面实况输出之间的损失函数。计算性能时使用的指标有:在保留验证集上的复杂度、BLEU 分数和 ROUGE 分数。为了满足非功能性要求,我们的系统需要将响应时间保持在一秒以内,准确率目标超过 90%。
{"title":"Evaluating Performance of Conversational Bot Using Seq2Seq Model and Attention Mechanism","authors":"Karandeep Saluja, Shashwat Agarwal, Sanjeev Kumar, Tanupriya Choudhury","doi":"10.4108/eetsis.5457","DOIUrl":"https://doi.org/10.4108/eetsis.5457","url":null,"abstract":"The Chat-Bot utilizes Sequence-to-Sequence Model with the Attention Mechanism, in order to interpret and address user inputs effectively. The whole model consists of Data gathering, Data preprocessing, Seq2seq Model, Training and Tuning. Data preprocessing involves cleaning of any irrelevant data, before converting them into the numerical format. The Seq2Seq Model is comprised of two components: an Encoder and a Decoder. Both Encoder and Decoder along with the Attention Mechanism allow dialogue management, which empowers the Model to answer the user in the most accurate and relevant manner. The output generated by the Bot is in the Natural Language only. Once the building of the Seq2Seq Model is completed, training of the model takes place in which the model is fed with the preprocessed data, during training it tries to minimize the loss function between the predicted output and the ground truth output. Performance is computed using metrics such as perplexity, BLEU score, and ROUGE score on a held-out validation set. In order to meet non-functional requirements, our system needs to maintain a response time of under one second with an accuracy target exceeding 90%.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"223 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140233465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Study on Evaluation of Execution Capability Based on Artificial Intelligence CIPP Model 基于人工智能 CIPP 模型的执行能力评估研究
Pub Date : 2024-03-15 DOI: 10.4108/eetsis.5234
Hui Dong
INTRODUCTION: The rapid change in artificial intelligence has evaluated ideological and political education ability in colleges and universities as a significant challenge.OBJECTIVES: To assess the level of competence of universities in ideological and political education to determine the effectiveness and efficacy of educational programs and to provide a basis for improving and upgrading academic competence.METHODS: Based on the CIPP model, the author constructed an index system and selected a suitable evaluation model to conduct a study on the evaluation of ideological and political competence of colleges and universities in the context of Artificial Intelligence, which helps to understand the background conditions, resource allocation, teaching activities and quality of teaching of educational programs, as well as the level of ideological and political literacy of the students and their achievements.RESULTS: The evaluation results show that this kind of evaluation research helps to improve and enhance the capacity of ideological and political education in colleges and universities, and at the same time, it can dig into the implementation effect of the educational program, find problems and shortcomings, and promote the continuous improvement of the educational program.CONCLUSION: Through evaluation, the quality and level of ideological and political education in colleges and universities can improve students' ideological and political literacy and sense of social responsibility. In addition, based on this, it makes the development of ideological and political ability in colleges and universities can be better adapted to the era of artificial intelligence.
引言:人工智能的日新月异使高校思想政治教育能力评估面临重大挑战:对高校思想政治教育能力水平进行评价,以确定教育项目的有效性和效果,为改进和提升学科能力提供依据。方法:笔者基于CIPP模型,构建指标体系,选择合适的评价模型,开展人工智能背景下高校思想政治能力评价研究,有助于了解教育项目的背景条件、资源配置、教学活动和教学质量,以及学生的思想政治素养水平和成果。结果:评价结果表明,这种评价研究有助于改善和提高高校思想政治教育的能力,同时可以挖掘教育课程的实施效果,发现问题和不足,促进教育课程的不断完善。结论:通过评价,可以提高高校思想政治教育的质量和水平,提高学生的思想政治素养和社会责任感。此外,在此基础上,使得高校思想政治能力的培养能够更好地适应人工智能时代的发展。
{"title":"Study on Evaluation of Execution Capability Based on Artificial Intelligence CIPP Model","authors":"Hui Dong","doi":"10.4108/eetsis.5234","DOIUrl":"https://doi.org/10.4108/eetsis.5234","url":null,"abstract":"INTRODUCTION: The rapid change in artificial intelligence has evaluated ideological and political education ability in colleges and universities as a significant challenge.OBJECTIVES: To assess the level of competence of universities in ideological and political education to determine the effectiveness and efficacy of educational programs and to provide a basis for improving and upgrading academic competence.METHODS: Based on the CIPP model, the author constructed an index system and selected a suitable evaluation model to conduct a study on the evaluation of ideological and political competence of colleges and universities in the context of Artificial Intelligence, which helps to understand the background conditions, resource allocation, teaching activities and quality of teaching of educational programs, as well as the level of ideological and political literacy of the students and their achievements.RESULTS: The evaluation results show that this kind of evaluation research helps to improve and enhance the capacity of ideological and political education in colleges and universities, and at the same time, it can dig into the implementation effect of the educational program, find problems and shortcomings, and promote the continuous improvement of the educational program.CONCLUSION: Through evaluation, the quality and level of ideological and political education in colleges and universities can improve students' ideological and political literacy and sense of social responsibility. In addition, based on this, it makes the development of ideological and political ability in colleges and universities can be better adapted to the era of artificial intelligence.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"17 35","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140240593","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Solution to Graph Coloring Problem Using Genetic Algorithm 利用遗传算法解决图形着色问题
Pub Date : 2024-03-15 DOI: 10.4108/eetsis.5437
Karan Malhotra, Karan D. Vasa, Neha Chaudhary, Ankit Vishnoi, Varun Sapra
INTRODUCTION: The Graph Coloring Problem (GCP) involves coloring the vertices of a graph in such a way that no two adjacent vertices share the same color while using the minimum number of colors possible. OBJECTIVES: The main objective of the study is While keeping the constraint that no two neighbouring vertices have the same colour, the goal is to reduce the number of colours needed to colour a graph's vertices. It further investigate how various techniques impact the execution time as the number of nodes in the graph increases. METHODS: In this paper, we propose a novel method of implementing a Genetic Algorithm (GA) to address the GCP. RESULTS: When the solution is implemented on a highly specified Google Cloud instance, we likewise see a significant increase in performance. The parallel execution on Google Cloud shows significantly faster execution times than both the serial implementation and the parallel execution on a local workstation. This exemplifies the benefits of cloud computing for computational heavy jobs like GCP. CONCLUSION: This study illustrates that a promising solution to the Graph Coloring Problem is provided by Genetic Algorithms. Although the GA-based approach does not provide an optimal result, it frequently produces excellent approximations in a reasonable length of time for a variety of real-world situations.
简介:图形着色问题(GCP)涉及对图形顶点着色,使相邻两个顶点不共享相同颜色,同时尽可能使用最少的颜色。目标:研究的主要目标是在保持相邻两个顶点不具有相同颜色这一约束条件的同时,减少为图形顶点着色所需的颜色数量。研究还进一步探讨了随着图中节点数量的增加,各种技术对执行时间的影响。方法:在本文中,我们提出了一种实施遗传算法 (GA) 的新方法来解决 GCP 问题。结果:在高度指定的谷歌云实例上实施该解决方案时,我们同样看到了性能的显著提升。谷歌云上的并行执行比串行执行和本地工作站上的并行执行都快得多。这充分体现了云计算对 GCP 等计算量大的工作的优势。结论:本研究表明,遗传算法为图形着色问题提供了一种有前途的解决方案。虽然基于遗传算法的方法不能提供最优结果,但它经常能在合理的时间内为各种实际情况提供出色的近似结果。
{"title":"A Solution to Graph Coloring Problem Using Genetic Algorithm","authors":"Karan Malhotra, Karan D. Vasa, Neha Chaudhary, Ankit Vishnoi, Varun Sapra","doi":"10.4108/eetsis.5437","DOIUrl":"https://doi.org/10.4108/eetsis.5437","url":null,"abstract":"INTRODUCTION: The Graph Coloring Problem (GCP) involves coloring the vertices of a graph in such a way that no two adjacent vertices share the same color while using the minimum number of colors possible. \u0000OBJECTIVES: The main objective of the study is While keeping the constraint that no two neighbouring vertices have the same colour, the goal is to reduce the number of colours needed to colour a graph's vertices. It further investigate how various techniques impact the execution time as the number of nodes in the graph increases. \u0000METHODS: In this paper, we propose a novel method of implementing a Genetic Algorithm (GA) to address the GCP. \u0000RESULTS: When the solution is implemented on a highly specified Google Cloud instance, we likewise see a significant increase in performance. The parallel execution on Google Cloud shows significantly faster execution times than both the serial implementation and the parallel execution on a local workstation. This exemplifies the benefits of cloud computing for computational heavy jobs like GCP. \u0000CONCLUSION: This study illustrates that a promising solution to the Graph Coloring Problem is provided by Genetic Algorithms. Although the GA-based approach does not provide an optimal result, it frequently produces excellent approximations in a reasonable length of time for a variety of real-world situations.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"2 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140241321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Visual Design Reengineering and Application Based on K-means Clustering Algorithm 基于 K-means 聚类算法的数字视觉设计再造与应用
Pub Date : 2024-03-14 DOI: 10.4108/eetsis.5233
Lijie Ren, Hyunsuk Kim
INTRODUCTION: The article discusses the key steps in digital visual design reengineering, with a special emphasis on the importance of information decoding and feature extraction for flat cultural heritage. These processes not only minimize damage to the aesthetic heritage itself but also feature high quality, efficiency, and recyclability.OBJECTIVES: The aim of the article is to explore the issues of gene extraction methods in digital visual design reengineering, proposing a visual gene extraction method through an improved K-means clustering algorithm.METHODS: A visual gene extraction method based on an improved K-means clustering algorithm is proposed. Initially analyzing the digital visual design reengineering process, combined with a color extraction method using the improved JSO algorithm-based K-means clustering algorithm, a gene extraction and clustering method for digital visual design reengineering is proposed and validated through experiments.RESULT: The results show that the proposed method improves the accuracy, robustness, and real-time performance of clustering. Through comparative analysis with Dunhuang murals, the effectiveness of the color extraction method based on the K-means-JSO algorithm in the application of digital visual design reengineering is verified. The method based on the K-means-GWO algorithm performs best in terms of average clustering time and standard deviation. The optimization curve of color extraction based on the K-means-JSO algorithm converges faster and with better accuracy compared to the K-means-ABC, K-means-GWO, K-means-DE, K-means-CMAES, and K-means-WWCD algorithms.CONCLUSION: The color extraction method of the K-means clustering algorithm improved by the JSO algorithm proposed in this paper solves the problems of insufficient standardization in feature selection, lack of generalization ability, and inefficiency in visual gene extraction methods.
简介:文章讨论了数字视觉设计再造的关键步骤,特别强调了信息解码和特征提取对于平面文化遗产的重要性。这些过程不仅能最大限度地减少对美学遗产本身的损害,还具有高质量、高效率和可回收性的特点:方法:本文提出了一种基于改进的 K-means 聚类算法的视觉基因提取方法。初步分析了数字视觉设计再造过程,结合基于改进JSO算法的K-means聚类算法的颜色提取方法,提出了一种数字视觉设计再造的基因提取和聚类方法,并通过实验进行了验证。结果:结果表明,提出的方法提高了聚类的准确性、鲁棒性和实时性。通过与敦煌壁画的对比分析,验证了基于 K-means-JSO 算法的色彩提取方法在数字视觉设计再工程应用中的有效性。基于 K-means-GWO 算法的方法在平均聚类时间和标准偏差方面表现最佳。与 K-means-ABC、K-means-GWO、K-means-DE、K-means-CMAES 和 K-means-WWCD 算法相比,基于 K-means-JSO 算法的颜色提取优化曲线收敛速度更快,精度更高。
{"title":"Digital Visual Design Reengineering and Application Based on K-means Clustering Algorithm","authors":"Lijie Ren, Hyunsuk Kim","doi":"10.4108/eetsis.5233","DOIUrl":"https://doi.org/10.4108/eetsis.5233","url":null,"abstract":"INTRODUCTION: The article discusses the key steps in digital visual design reengineering, with a special emphasis on the importance of information decoding and feature extraction for flat cultural heritage. These processes not only minimize damage to the aesthetic heritage itself but also feature high quality, efficiency, and recyclability.OBJECTIVES: The aim of the article is to explore the issues of gene extraction methods in digital visual design reengineering, proposing a visual gene extraction method through an improved K-means clustering algorithm.METHODS: A visual gene extraction method based on an improved K-means clustering algorithm is proposed. Initially analyzing the digital visual design reengineering process, combined with a color extraction method using the improved JSO algorithm-based K-means clustering algorithm, a gene extraction and clustering method for digital visual design reengineering is proposed and validated through experiments.RESULT: The results show that the proposed method improves the accuracy, robustness, and real-time performance of clustering. Through comparative analysis with Dunhuang murals, the effectiveness of the color extraction method based on the K-means-JSO algorithm in the application of digital visual design reengineering is verified. The method based on the K-means-GWO algorithm performs best in terms of average clustering time and standard deviation. The optimization curve of color extraction based on the K-means-JSO algorithm converges faster and with better accuracy compared to the K-means-ABC, K-means-GWO, K-means-DE, K-means-CMAES, and K-means-WWCD algorithms.CONCLUSION: The color extraction method of the K-means clustering algorithm improved by the JSO algorithm proposed in this paper solves the problems of insufficient standardization in feature selection, lack of generalization ability, and inefficiency in visual gene extraction methods.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"13 10","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140241639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
OEE-WCRD: Optimizing Energy Efficiency in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics OEE-WCRD:利用剩余能量和距离指标选择簇头,优化无线传感器网络的能效
Pub Date : 2024-03-06 DOI: 10.4108/eetsis.4268
Lalit Kumar Tyagi, Anoop Kumar
Wireless Sensor Networks (WSNs) play a pivotal role in various applications, including environmental monitoring, industrial automation, and healthcare. However, the limited energy resources of sensor nodes pose a significant challenge to the longevity and performance of WSNs. To address this challenge, this paper presents an Optimized Energy Efficient Protocol in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics (OEE-WCRD). This research paper presents a novel approach to cluster head selection in WSNs by harnessing a combination of residual energy and distance metrics. The proposed method aims to significantly enhance the energy efficiency of WSNs by prioritizing nodes with ample residual energy and proximity to their neighbors as cluster heads. Through extensive simulations and evaluations, we demonstrate the effectiveness of this approach in prolonging network lifetime, optimizing data aggregation, and ultimately advancing the energy efficiency of WSNs, making it a valuable contribution to the field of WSNs protocols.
无线传感器网络(WSN)在环境监测、工业自动化和医疗保健等各种应用中发挥着举足轻重的作用。然而,传感器节点有限的能源资源对 WSN 的寿命和性能构成了巨大挑战。为应对这一挑战,本文提出了一种通过使用剩余能量和距离指标选择簇头的无线传感器网络优化节能协议(OEE-WCRD)。本研究论文提出了一种利用残余能量和距离指标组合在 WSN 中选择簇头的新方法。所提出的方法旨在通过优先选择剩余能量充足且与邻居距离较近的节点作为簇头,从而大大提高 WSN 的能量效率。通过大量的模拟和评估,我们证明了这种方法在延长网络寿命、优化数据聚合以及最终提高 WSN 能源效率方面的有效性,使其成为 WSN 协议领域的一项宝贵贡献。
{"title":"OEE-WCRD: Optimizing Energy Efficiency in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics","authors":"Lalit Kumar Tyagi, Anoop Kumar","doi":"10.4108/eetsis.4268","DOIUrl":"https://doi.org/10.4108/eetsis.4268","url":null,"abstract":"Wireless Sensor Networks (WSNs) play a pivotal role in various applications, including environmental monitoring, industrial automation, and healthcare. However, the limited energy resources of sensor nodes pose a significant challenge to the longevity and performance of WSNs. To address this challenge, this paper presents an Optimized Energy Efficient Protocol in Wireless Sensor Networks through Cluster Head Selection Using Residual Energy and Distance Metrics (OEE-WCRD). This research paper presents a novel approach to cluster head selection in WSNs by harnessing a combination of residual energy and distance metrics. The proposed method aims to significantly enhance the energy efficiency of WSNs by prioritizing nodes with ample residual energy and proximity to their neighbors as cluster heads. Through extensive simulations and evaluations, we demonstrate the effectiveness of this approach in prolonging network lifetime, optimizing data aggregation, and ultimately advancing the energy efficiency of WSNs, making it a valuable contribution to the field of WSNs protocols.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"25 8","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140262953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visualization Process of International Trade and its impact on GDP through Multi-criteria Decision Model: A Case Study of India’s Merchandise Trade 通过多标准决策模型实现国际贸易及其对国内生产总值影响的可视化过程:印度商品贸易案例研究
Pub Date : 2024-03-04 DOI: 10.4108/eetsis.5296
P. S. Metkewar, Shrivats Sharma, Lubna Hamid Shah, A. Prasanth
When it comes to international trade, India is one of the most important nations. This paper intends to analyze the effect of International Trade on a nation’s GDP growth through the process of visualizing the current trends. For this research, some statistical (economical) data is considered and its effect on the GDP is analyzed for the previous accounting years ranging from 2015 to 2021. The data considered for this include – the monetary value of exports from India (in US$ Millions), the monetary value of imports from India (in US$ Millions), India’s share of exports to the nation out of all the nations, India’s share of imports to the nation out of all the nations in, export growth rate, import growth rate, currency exchange rate, Inflation rate. This paper examines and explains how these economic factors influence a country’s (India’s) GDP growth through the process of visualization.
在国际贸易方面,印度是最重要的国家之一。本文旨在通过对当前趋势的可视化过程,分析国际贸易对国家 GDP 增长的影响。本研究考虑了一些统计(经济)数据,并分析了从 2015 年到 2021 年的前几个会计年度的数据对国内生产总值的影响。考虑的数据包括--印度出口的货币价值(单位:百万美元)、从印度进口的货币价值(单位:百万美元)、印度在所有国家中的出口份额、印度在所有国家中的进口份额、出口增长率、进口增长率、货币汇率、通货膨胀率。本文通过可视化过程研究并解释了这些经济因素如何影响一个国家(印度)的国内生产总值增长。
{"title":"Visualization Process of International Trade and its impact on GDP through Multi-criteria Decision Model: A Case Study of India’s Merchandise Trade","authors":"P. S. Metkewar, Shrivats Sharma, Lubna Hamid Shah, A. Prasanth","doi":"10.4108/eetsis.5296","DOIUrl":"https://doi.org/10.4108/eetsis.5296","url":null,"abstract":"When it comes to international trade, India is one of the most important nations. This paper intends to analyze the effect of International Trade on a nation’s GDP growth through the process of visualizing the current trends. For this research, some statistical (economical) data is considered and its effect on the GDP is analyzed for the previous accounting years ranging from 2015 to 2021. The data considered for this include – the monetary value of exports from India (in US$ Millions), the monetary value of imports from India (in US$ Millions), India’s share of exports to the nation out of all the nations, India’s share of imports to the nation out of all the nations in, export growth rate, import growth rate, currency exchange rate, Inflation rate. This paper examines and explains how these economic factors influence a country’s (India’s) GDP growth through the process of visualization.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"13 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140266303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of User Attrition in Telecommunication Using Neural Network 利用神经网络预测电信用户流失率
Pub Date : 2024-02-29 DOI: 10.4108/eetsis.5242
Mageshkumar N, Vijayaraj A, S. Chavva, Gururama Senthilvel
INTRODUCTION: The telecommunications industry faces significant challenges due to customer attrition, which directly impacts revenue. To better understand and address this issue, Companies are looking into techniques to determine the internal issues that affect customer churn. OBJECTIVES: This article offers an overview of customer attrition within the telecommunications sector. METHODS: It introduces an advanced churn prediction model harnessing state-of-the-art technologies, including neural networks, machine learning, and other cutting-edge innovations, to achieve remarkably high accuracy rates. By analyzing diverse parameters and datasets collected from multiple telecom companies, valuable insights can be gained. RESULTS: The model's performance on test data can be evaluated using metrics such as Accuracy Score, Area under Curve (AUC), Sensitivity, Specificity, and other performance indicators. CONCLUSION: In order to effectively manage extensive datasets, organizations can leverage Big Data technology. This empowers them to forecast the probability of customer churn and put in place proactive strategies to retain their customer base.
导言:由于客户流失直接影响收入,电信行业面临着巨大挑战。为了更好地了解和解决这一问题,公司正在研究确定影响客户流失的内部问题的技术。目标:本文概述了电信行业的客户流失情况。方法:文章介绍了一种先进的客户流失预测模型,该模型利用了最先进的技术,包括神经网络、机器学习和其他尖端创新技术,以达到极高的准确率。通过分析从多家电信公司收集的各种参数和数据集,可以获得有价值的见解。结果:模型在测试数据上的性能可通过准确度得分、曲线下面积(AUC)、灵敏度、特异性和其他性能指标进行评估。结论:为了有效管理大量数据集,企业可以利用大数据技术。这使他们能够预测客户流失的概率,并制定积极主动的策略来留住客户群。
{"title":"Prediction of User Attrition in Telecommunication Using Neural Network","authors":"Mageshkumar N, Vijayaraj A, S. Chavva, Gururama Senthilvel","doi":"10.4108/eetsis.5242","DOIUrl":"https://doi.org/10.4108/eetsis.5242","url":null,"abstract":"INTRODUCTION: The telecommunications industry faces significant challenges due to customer attrition, which directly impacts revenue. To better understand and address this issue, Companies are looking into techniques to determine the internal issues that affect customer churn. \u0000OBJECTIVES: This article offers an overview of customer attrition within the telecommunications sector. \u0000METHODS: It introduces an advanced churn prediction model harnessing state-of-the-art technologies, including neural networks, machine learning, and other cutting-edge innovations, to achieve remarkably high accuracy rates. By analyzing diverse parameters and datasets collected from multiple telecom companies, valuable insights can be gained. \u0000RESULTS: The model's performance on test data can be evaluated using metrics such as Accuracy Score, Area under Curve (AUC), Sensitivity, Specificity, and other performance indicators. \u0000CONCLUSION: In order to effectively manage extensive datasets, organizations can leverage Big Data technology. This empowers them to forecast the probability of customer churn and put in place proactive strategies to retain their customer base.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"24 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140408906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Realizable Data Encryption Strategy 可实现的数据加密战略
Pub Date : 2024-02-28 DOI: 10.4108/eetsis.5230
Pranjali, Srividya Ramisetty, Vani B Telagade, S. D. Adiga
As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.
随着技术的不断进步,数据已成为信息技术领域日益重要的元素。然而,设备产生的海量数据给实时处理带来了巨大挑战。在网络传输过程中,数据加密是确保数据安全和隐私的重要组成部分。遗憾的是,许多应用程序为了实现更高的性能而忽略了数据加密。这项工作通过引入数据加密过程,即可实现的数据加密策略(RDES)和脱氧核糖核酸(DNA)计算,提出了解决这一问题的方法,脱氧核糖核酸(DNA)计算是一种革命性的加密方法,通过防止授权访问敏感数据来提高信息安全性。DNA 对称加密技术提高了信息安全性。研究结果表明,明文加密是一种非常安全的程序。RDES 方法的设计目的是在实时处理的限制条件下加强隐私保护。通过实施 RDES 方法,可以在不影响性能的情况下显著提高数据隐私和安全性。
{"title":"A Realizable Data Encryption Strategy","authors":"Pranjali, Srividya Ramisetty, Vani B Telagade, S. D. Adiga","doi":"10.4108/eetsis.5230","DOIUrl":"https://doi.org/10.4108/eetsis.5230","url":null,"abstract":"As technology continues to advance, data has become an increasingly important element in the sphere of Information Technology. However, enormous data generated by devices presents a major challenge in handling it in real time. Data encryption is a crucial component in ensuring data security and privacy during its transmission in network. Unfortunately, many applications disregard data encryption in order to achieve higher performance. The work proposes a solution to this problem by introducing a data encryption process that is, the Realizable Data Encryption Strategy (RDES) and Deoxyribonucleic Acid (DNA) computing, a revolutionary cryptographic method that improves information security by preventing authorized access to sensitive data, being used. Information security is improved by DNA symmetric cryptography being suggested. The outcomes show that plain-text encryption is a very secure procedure. The RDES approach is designed to improve privacy protection within the constraints of real-time processing. By implementing the RDES approach, data privacy and security can be significantly enhanced without compromising performance.","PeriodicalId":155438,"journal":{"name":"ICST Transactions on Scalable Information Systems","volume":"15 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140423191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ICST Transactions on Scalable Information Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1