首页 > 最新文献

Cloud Computing and Data Science最新文献

英文 中文
DeepMetaDroid: Real-Time Android Malware Detection Using Deep Learning and Metadata Features DeepMetaDroid:利用深度学习和元数据特征实时检测安卓恶意软件
Pub Date : 2024-05-20 DOI: 10.37256/ccds.5220244503
Hashida Haidros Rahima Manzil, Manohar Naik S
The increasing prevalence of Android malware poses significant risks to mobile devices and user privacy. The traditional detection methods have limitations in keeping up with the evolving landscape of malware attacks, necessitating the development of more effective solutions. In this paper, we present DeepMetaDroid, a real-time detection approach for Android malware that leverages metadata features. By analyzing crucial metadata, including APK size, download size, permissions, certificates, and DEX files, the proposed method enables effective identification of malware and enhances mobile security. Using deep learning techniques, a lightweight Android real-time monitoring system is equipped with the trained model. These methods include long short-term memory (LSTM), gated recurrent units (GRU), convolutional neural networks (CNN), deep neural networks (DNN), and other ensemble models. Utilizing the rectified linear unit (ReLU) as the activation function, the DNN model is constructed with 32 neurons in the input layer. A one-dimensional convolutional layer with 32 neurons and a filter size of three is used as the input layer in the CNN model. The LSTM model is designed with an input layer consisting of 16 neurons. The GRU model with 32 neurons is employed in the input layer. Additionally, ensemble models that combined several architectures were developed. The proposed method offers a faster and more scalable solution for malware detection by consuming fewer resources like memory and CPU. This work ensures device security by providing real-time monitoring on Android devices to prevent users from installing malicious applications and, thus, enhance user privacy and security.
安卓恶意软件日益猖獗,给移动设备和用户隐私带来了巨大风险。传统的检测方法在跟上恶意软件攻击不断变化的形势方面存在局限性,因此有必要开发更有效的解决方案。在本文中,我们介绍了一种利用元数据特征对安卓恶意软件进行实时检测的方法--DeepMetaDroid。通过分析关键元数据(包括 APK 大小、下载大小、权限、证书和 DEX 文件),所提出的方法能够有效识别恶意软件并增强移动安全性。利用深度学习技术,一个轻量级安卓实时监控系统就配备了训练有素的模型。这些方法包括长短期记忆(LSTM)、门控递归单元(GRU)、卷积神经网络(CNN)、深度神经网络(DNN)和其他集合模型。DNN 模型采用整流线性单元(ReLU)作为激活函数,输入层有 32 个神经元。在 CNN 模型中,输入层采用 32 个神经元的一维卷积层,滤波器大小为 3。LSTM 模型的输入层由 16 个神经元组成。输入层采用了有 32 个神经元的 GRU 模型。此外,还开发了结合多种架构的集合模型。所提出的方法通过消耗更少的内存和 CPU 等资源,为恶意软件检测提供了更快、更可扩展的解决方案。这项工作通过对安卓设备进行实时监控来确保设备安全,防止用户安装恶意应用程序,从而增强用户隐私和安全。
{"title":"DeepMetaDroid: Real-Time Android Malware Detection Using Deep Learning and Metadata Features","authors":"Hashida Haidros Rahima Manzil, Manohar Naik S","doi":"10.37256/ccds.5220244503","DOIUrl":"https://doi.org/10.37256/ccds.5220244503","url":null,"abstract":"The increasing prevalence of Android malware poses significant risks to mobile devices and user privacy. The traditional detection methods have limitations in keeping up with the evolving landscape of malware attacks, necessitating the development of more effective solutions. In this paper, we present DeepMetaDroid, a real-time detection approach for Android malware that leverages metadata features. By analyzing crucial metadata, including APK size, download size, permissions, certificates, and DEX files, the proposed method enables effective identification of malware and enhances mobile security. Using deep learning techniques, a lightweight Android real-time monitoring system is equipped with the trained model. These methods include long short-term memory (LSTM), gated recurrent units (GRU), convolutional neural networks (CNN), deep neural networks (DNN), and other ensemble models. Utilizing the rectified linear unit (ReLU) as the activation function, the DNN model is constructed with 32 neurons in the input layer. A one-dimensional convolutional layer with 32 neurons and a filter size of three is used as the input layer in the CNN model. The LSTM model is designed with an input layer consisting of 16 neurons. The GRU model with 32 neurons is employed in the input layer. Additionally, ensemble models that combined several architectures were developed. The proposed method offers a faster and more scalable solution for malware detection by consuming fewer resources like memory and CPU. This work ensures device security by providing real-time monitoring on Android devices to prevent users from installing malicious applications and, thus, enhance user privacy and security.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"66 26","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141121606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing Stock Market Predictions with Time Series Analysis including LSTM and ARIMA 利用时间序列分析(包括 LSTM 和 ARIMA)推进股市预测
Pub Date : 2024-05-15 DOI: 10.37256/ccds.5220244470
Ishtiaq Ahammad, William Ankan Sarkar, Famme Akter Meem, Jannatul Ferdus, Md. Kawsar Ahmed, Md. R. Rahman, Rabeya Sultana, Md. Shihabul Islam
Predicting stock market prices accurately is a major task for investors and traders seeking to optimize their decision-making processes. This research focuses on the comparative analysis of advanced machine learning (ML) techniques, particularly, the Long Short-Term Memory (LSTM) model and Autoregressive Integrated Moving Average (ARIMA) model for predicting stock market prices. The study enforces thorough data collection and preprocessing to ensure the quality and reliability of the historical stock price data, forming a robust foundation for the predictive models. The core contribution of this paper lies in its systematic and comparative analysis of these two models. A range of performance metrics, including Mean Absolute Error (MAE) and Root Mean Square Error (RMSE), are employed to assess and contrast the predictive accuracy and efficiency of the LSTM and ARIMA models. The research findings indicate that the ARIMA model, contrary to expectations, outperforms the LSTM model in this study, achieving lower RMSE and MAE values. Specifically, the ARIMA model demonstrates a Test RMSE of 4.336 and a Test MAE of 3.45926, indicating its superior predictive accuracy compared to the LSTM model. Furthermore, the study sets its findings against the backdrop of existing literature by comparing the performance of its models with those reported in previous research. This comparison shows better results achieved by our stock market prediction models. By addressing limitations observed in prior studies and demonstrating practical applicability, this research contributes to advancing stock market prediction methodologies, offering valuable insights for investors and traders.
准确预测股市价格是投资者和交易者优化决策过程的一项重要任务。本研究侧重于先进机器学习(ML)技术的比较分析,特别是用于预测股市价格的长短期记忆(LSTM)模型和自回归综合移动平均(ARIMA)模型。本研究通过全面的数据收集和预处理,确保了历史股票价格数据的质量和可靠性,为预测模型奠定了坚实的基础。本文的核心贡献在于对这两个模型进行了系统的比较分析。本文采用了一系列性能指标,包括平均绝对误差 (MAE) 和均方根误差 (RMSE),以评估和对比 LSTM 模型和 ARIMA 模型的预测准确性和效率。研究结果表明,与预期相反,ARIMA 模型在本研究中的表现优于 LSTM 模型,获得了较低的 RMSE 和 MAE 值。具体而言,ARIMA 模型的测试 RMSE 为 4.336,测试 MAE 为 3.45926,表明其预测准确性优于 LSTM 模型。此外,本研究还以现有文献为背景,将其模型的性能与以往研究报告中的模型进行了比较。比较结果表明,我们的股市预测模型取得了更好的结果。通过解决以往研究中发现的局限性并展示实际应用性,本研究有助于推动股市预测方法的发展,为投资者和交易者提供有价值的见解。
{"title":"Advancing Stock Market Predictions with Time Series Analysis including LSTM and ARIMA","authors":"Ishtiaq Ahammad, William Ankan Sarkar, Famme Akter Meem, Jannatul Ferdus, Md. Kawsar Ahmed, Md. R. Rahman, Rabeya Sultana, Md. Shihabul Islam","doi":"10.37256/ccds.5220244470","DOIUrl":"https://doi.org/10.37256/ccds.5220244470","url":null,"abstract":"Predicting stock market prices accurately is a major task for investors and traders seeking to optimize their decision-making processes. This research focuses on the comparative analysis of advanced machine learning (ML) techniques, particularly, the Long Short-Term Memory (LSTM) model and Autoregressive Integrated Moving Average (ARIMA) model for predicting stock market prices. The study enforces thorough data collection and preprocessing to ensure the quality and reliability of the historical stock price data, forming a robust foundation for the predictive models. The core contribution of this paper lies in its systematic and comparative analysis of these two models. A range of performance metrics, including Mean Absolute Error (MAE) and Root Mean Square Error (RMSE), are employed to assess and contrast the predictive accuracy and efficiency of the LSTM and ARIMA models. The research findings indicate that the ARIMA model, contrary to expectations, outperforms the LSTM model in this study, achieving lower RMSE and MAE values. Specifically, the ARIMA model demonstrates a Test RMSE of 4.336 and a Test MAE of 3.45926, indicating its superior predictive accuracy compared to the LSTM model. Furthermore, the study sets its findings against the backdrop of existing literature by comparing the performance of its models with those reported in previous research. This comparison shows better results achieved by our stock market prediction models. By addressing limitations observed in prior studies and demonstrating practical applicability, this research contributes to advancing stock market prediction methodologies, offering valuable insights for investors and traders.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":" 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141128158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geochemical and Geospatial Distribution of Organic Contaminants in the Flood Plain of Ekpetiama, Niger Delta Region of Nigeria 尼日利亚尼日尔三角洲埃克佩蒂马河漫滩有机污染物的地球化学和地理空间分布
Pub Date : 2023-09-06 DOI: 10.37256/ccds.5120233470
D. Egirani, Miebi M. Alaowei
This study investigated the geochemical and geospatial distribution of organic contaminants in the floodplain water and sediments of Ekpetiama in the Niger Delta Region of Nigeria. This study is necessary because there are limited data on the level of organic contamination in this section of the Niger Delta Region of Nigeria. The extinction of planktons in Ekpetiama became a source of concern to the residents. This concern is because this section of the coastal plain provides fisher folks with livelihood. So, there was a need to track the source of contamination in this part of the Niger Delta region. Previous studies have suggested a high level of Total Petroleum Hydrocarbon and Total Hydrocarbon Content as possible sources of reduced dissolved oxygen in similar deltaic terrain. A total of 10 water and 10 sediment samples were collected and analyzed in triplicate at an interval of 100 m in the flood plain. A particle size analyzer was used to perform particle size analyses of air-dried sediments. The American Public Health Association method (APHA) was used to do the chemical analysis of the water samples. Here, a liquid-liquid extraction procedure was performed on sediment samples using 30 mL of Dichloromethane (DCM) as the extracting agent. The results were subjected to statistical validation. The mean grain size ranged from 2.37-4.83, kurtosis (1.94-0.49), and skewness (-0.8-0.71). The contaminant indicators (pH, biochemical oxygen demand, chemical oxygen demand, dissolved oxygen and Total Organic Carbon) point to the presence of organic contamination of the flood plain. The results indicated a total petroleum hydrocarbon range of 0.47-0.87 ppm in water and 0.69-0.96 ppm in sediments and a total hydrocarbon content range of 1.10-2.80 ppm in water and 2.56-3.90 ppm in sediment# samples. The results were above the permitted limits of the World Health Organisation. The source of ecological damage is the abnormal concentrations of organic contaminants in the flood plain. These results significantly caused ecosystem damage and human health effects in the food chain. This study provides information to the National Oil Spill Detection and Response Agency for a cleanup process.
本文研究了尼日利亚尼日尔三角洲地区Ekpetiama漫滩水和沉积物中有机污染物的地球化学和地理空间分布。这项研究是必要的,因为关于尼日利亚尼日尔三角洲地区这一地区有机污染水平的数据有限。埃克佩蒂玛岛浮游生物的灭绝成了居民们担心的问题。这是因为这片沿海平原为渔民提供了生计。因此,有必要追踪尼日尔三角洲地区的污染源。以前的研究表明,在类似的三角洲地形中,高水平的石油总烃和总烃含量可能是还原性溶解氧的来源。在河漫滩上,每隔100 m采集水样10份,沉积物样10份,分三份进行分析。采用粒度分析仪对风干沉积物进行粒度分析。使用美国公共卫生协会方法(APHA)对水样进行化学分析。本研究采用液-液萃取法,以30ml二氯甲烷(DCM)为萃取剂对沉积物样品进行萃取。结果经过统计验证。平均晶粒尺寸为2.37 ~ 4.83,峰度为1.94 ~ 0.49,偏度为-0.8 ~ 0.71。污染物指标(pH值、生化需氧量、化学需氧量、溶解氧和总有机碳)表明冲积平原存在有机污染。结果表明:水体中总烃含量为0.47 ~ 0.87 ppm,沉积物中总烃含量为0.69 ~ 0.96 ppm;水体中总烃含量为1.10 ~ 2.80 ppm,沉积物中总烃含量为2.56 ~ 3.90 ppm。结果超过了世界卫生组织允许的限度。洪泛平原有机污染物浓度异常是生态破坏的根源。这些结果在食物链中严重造成生态系统破坏和人类健康影响。这项研究为国家溢油检测和响应机构的清理过程提供了信息。
{"title":"Geochemical and Geospatial Distribution of Organic Contaminants in the Flood Plain of Ekpetiama, Niger Delta Region of Nigeria","authors":"D. Egirani, Miebi M. Alaowei","doi":"10.37256/ccds.5120233470","DOIUrl":"https://doi.org/10.37256/ccds.5120233470","url":null,"abstract":"This study investigated the geochemical and geospatial distribution of organic contaminants in the floodplain water and sediments of Ekpetiama in the Niger Delta Region of Nigeria. This study is necessary because there are limited data on the level of organic contamination in this section of the Niger Delta Region of Nigeria. The extinction of planktons in Ekpetiama became a source of concern to the residents. This concern is because this section of the coastal plain provides fisher folks with livelihood. So, there was a need to track the source of contamination in this part of the Niger Delta region. Previous studies have suggested a high level of Total Petroleum Hydrocarbon and Total Hydrocarbon Content as possible sources of reduced dissolved oxygen in similar deltaic terrain. A total of 10 water and 10 sediment samples were collected and analyzed in triplicate at an interval of 100 m in the flood plain. A particle size analyzer was used to perform particle size analyses of air-dried sediments. The American Public Health Association method (APHA) was used to do the chemical analysis of the water samples. Here, a liquid-liquid extraction procedure was performed on sediment samples using 30 mL of Dichloromethane (DCM) as the extracting agent. The results were subjected to statistical validation. The mean grain size ranged from 2.37-4.83, kurtosis (1.94-0.49), and skewness (-0.8-0.71). The contaminant indicators (pH, biochemical oxygen demand, chemical oxygen demand, dissolved oxygen and Total Organic Carbon) point to the presence of organic contamination of the flood plain. The results indicated a total petroleum hydrocarbon range of 0.47-0.87 ppm in water and 0.69-0.96 ppm in sediments and a total hydrocarbon content range of 1.10-2.80 ppm in water and 2.56-3.90 ppm in sediment# samples. The results were above the permitted limits of the World Health Organisation. The source of ecological damage is the abnormal concentrations of organic contaminants in the flood plain. These results significantly caused ecosystem damage and human health effects in the food chain. This study provides information to the National Oil Spill Detection and Response Agency for a cleanup process.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125580173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smart Contracts Security Application and Challenges: A Review 智能合约安全应用与挑战综述
Pub Date : 2023-09-01 DOI: 10.37256/ccds.5120233271
Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa, Owamoyo Najeem
There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated using non-standard software life cycles, which means that, for example, distributed applications are rarely updated, or bugs are fully addressed by releasing a newer version, leading to security flaws and challenges for users to adopt the technology. Smart contracts have gained significant attention due to their potential to automate and secure various transactions in diverse domains. However, the increasing adoption of smart contracts has also raised concerns about security vulnerabilities and potential risks. In this paper, an overview of smart contracts was discussed in detail. It further distinguished and compared smart contracts security with conventional security regarding security, privacy, communication channel, etc. Different platforms for smart contracts, such as Bitcoin, Ethereum, Counterparty, Stellar, Monax, and Lisk, are also discussed in this paper. Some proposed techniques are used in different areas for handling security threats in smart contracts. In addition, a taxonomy of the smart contracts security application was proposed, which attempts to solve some of the flaws and inadequacies in smart contracts. The study also provides a comprehensive smart contracts security scenario with different techniques. Lastly, the possible attacks posed by threats and vulnerabilities of the smart contracts are provided. The security threats and vulnerabilities addressed in this study are unique to smart contracts.
对基于区块链的智能合约开发平台和语言实现的需求有所增加。另一方面,智能合约和区块链应用程序是使用非标准软件生命周期生成的,这意味着,例如,分布式应用程序很少更新,或者通过发布新版本来完全解决错误,从而导致安全漏洞和用户采用该技术的挑战。智能合约因其在不同领域自动化和保护各种交易的潜力而获得了极大的关注。然而,智能合约的日益普及也引发了人们对安全漏洞和潜在风险的担忧。在本文中,详细讨论了智能合约的概述。在安全性、隐私性、通信渠道等方面,对智能合约安全与传统安全进行了进一步的区分和比较。本文还讨论了不同的智能合约平台,如比特币、以太坊、对手方、恒星、Monax和Lisk。一些建议的技术被用于不同的领域来处理智能合约中的安全威胁。此外,提出了一种智能合约安全应用的分类方法,试图解决智能合约的一些缺陷和不足。该研究还提供了一个使用不同技术的全面智能合约安全场景。最后,给出了智能合约的威胁和漏洞可能造成的攻击。本研究中解决的安全威胁和漏洞是智能合约所独有的。
{"title":"Smart Contracts Security Application and Challenges: A Review","authors":"Fadele Ayotunde Alaba, Hakeem Adewale Sulaimon, Madu Ifeyinwa, Owamoyo Najeem","doi":"10.37256/ccds.5120233271","DOIUrl":"https://doi.org/10.37256/ccds.5120233271","url":null,"abstract":"There has been a rise in the demand for blockchain-based smart contract development platforms and language implementations. On the other hand, smart contracts and blockchain applications are generated using non-standard software life cycles, which means that, for example, distributed applications are rarely updated, or bugs are fully addressed by releasing a newer version, leading to security flaws and challenges for users to adopt the technology. Smart contracts have gained significant attention due to their potential to automate and secure various transactions in diverse domains. However, the increasing adoption of smart contracts has also raised concerns about security vulnerabilities and potential risks. In this paper, an overview of smart contracts was discussed in detail. It further distinguished and compared smart contracts security with conventional security regarding security, privacy, communication channel, etc. Different platforms for smart contracts, such as Bitcoin, Ethereum, Counterparty, Stellar, Monax, and Lisk, are also discussed in this paper. Some proposed techniques are used in different areas for handling security threats in smart contracts. In addition, a taxonomy of the smart contracts security application was proposed, which attempts to solve some of the flaws and inadequacies in smart contracts. The study also provides a comprehensive smart contracts security scenario with different techniques. Lastly, the possible attacks posed by threats and vulnerabilities of the smart contracts are provided. The security threats and vulnerabilities addressed in this study are unique to smart contracts.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126215756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Insights on Cloud Security Management 云安全管理见解
Pub Date : 2023-07-25 DOI: 10.37256/ccds.4220233292
R. Robinson
The technology known as cloud computing makes it possible to provide computing services over the Internet. Because it allows users to access and manage information and applications through a network of remote servers, this service model has been quickly adopted due to its numerous benefits, including cost savings, scalability, and accessibility. The global market for cloud computing is expected to reach $732 billion by 2023, according to a report from International Data Corporation (IDC). A first-hand survey of approximately sixty (60) cloud companies will be used to provide an overview of cloud computing technology, its architecture, and security, privacy, and trust (SPT) concerns. Privacy concerns for users, data theft, unauthenticated access, and hacker attacks are just a few of the cloud computing problems. These perplexing security issues of validation protection, information assurance and information check are the primary impediment to cloud transformation for future turns of events, which is getting addressed to recognize the sufficiency and adequacy of cloud security through subjective review relaxed near techniques.
云计算技术使得通过互联网提供计算服务成为可能。由于它允许用户通过远程服务器网络访问和管理信息和应用程序,因此该服务模型由于其众多优点(包括节省成本、可伸缩性和可访问性)而迅速被采用。根据国际数据公司(IDC)的一份报告,到2023年,全球云计算市场预计将达到7320亿美元。对大约60家云计算公司的第一手调查将用于提供云计算技术、其架构以及安全、隐私和信任(SPT)问题的概述。用户的隐私问题、数据盗窃、未经身份验证的访问和黑客攻击只是云计算问题的一小部分。验证保护、信息保证和信息检查这些令人困惑的安全问题是未来事态发展的云转型的主要障碍,通过放松的主观审查技术来认识云安全的充分性和充分性正在得到解决。
{"title":"Insights on Cloud Security Management","authors":"R. Robinson","doi":"10.37256/ccds.4220233292","DOIUrl":"https://doi.org/10.37256/ccds.4220233292","url":null,"abstract":"The technology known as cloud computing makes it possible to provide computing services over the Internet. Because it allows users to access and manage information and applications through a network of remote servers, this service model has been quickly adopted due to its numerous benefits, including cost savings, scalability, and accessibility. The global market for cloud computing is expected to reach $732 billion by 2023, according to a report from International Data Corporation (IDC). A first-hand survey of approximately sixty (60) cloud companies will be used to provide an overview of cloud computing technology, its architecture, and security, privacy, and trust (SPT) concerns. Privacy concerns for users, data theft, unauthenticated access, and hacker attacks are just a few of the cloud computing problems. These perplexing security issues of validation protection, information assurance and information check are the primary impediment to cloud transformation for future turns of events, which is getting addressed to recognize the sufficiency and adequacy of cloud security through subjective review relaxed near techniques.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127713423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Current Trends and Applications of Social Media Research in Sri Lanka 斯里兰卡社会媒体研究现状及应用综述
Pub Date : 2023-07-25 DOI: 10.37256/ccds.4220233257
Isuru Udayangani Hewapathirana
Standard research on social media and its applications has been widely disseminated in developed nations. But in Sri Lanka, research in this area has been released far less frequently. However, social media usage in the country is evolving regardless of age, sex, education level, or other limitations. This study aims to fill the gap by conducting a comprehensive review of social media-based research conducted in Sri Lanka between 2012 and 2022. A systematic search of reputable databases, including IEEE Xplore, ScienceDirect, Emerald Insight, Google Scholar, and Springer Link, identified 57 relevant papers for analysis. The review highlights the diversity of application areas where social media research has been employed in Sri Lanka, including disaster management, public health, marketing, education, and more. Additionally, the analysis highlights the methodological approaches employed in social media analytics and the specific social media platforms utilized by researchers in Sri Lanka. The results of the current study serve as a timely resource, enabling policymakers and decision-makers to identify the potential avenues of social media research in Sri Lanka. By understanding the existing trends and implications, stakeholders can harness the power of social media data to make informed policy decisions, develop effective marketing strategies, enhance public health initiatives, and revolutionize educational practices.
关于社交媒体及其应用的标准研究已经在发达国家广泛传播。但在斯里兰卡,这方面的研究发布的频率要低得多。然而,无论年龄、性别、教育水平或其他限制,该国的社交媒体使用都在不断发展。本研究旨在通过对2012年至2022年在斯里兰卡进行的基于社交媒体的研究进行全面审查来填补这一空白。通过对知名数据库(包括IEEE Xplore、ScienceDirect、Emerald Insight、Google Scholar和Springer Link)的系统搜索,确定了57篇相关论文进行分析。报告强调了斯里兰卡社会媒体研究应用领域的多样性,包括灾害管理、公共卫生、市场营销、教育等。此外,该分析强调了社交媒体分析中采用的方法方法以及斯里兰卡研究人员使用的特定社交媒体平台。当前研究的结果可作为及时的资源,使政策制定者和决策者能够确定斯里兰卡社会媒体研究的潜在途径。通过了解现有的趋势和影响,利益相关者可以利用社交媒体数据的力量做出明智的政策决定,制定有效的营销战略,加强公共卫生倡议,并彻底改变教育实践。
{"title":"A Review on Current Trends and Applications of Social Media Research in Sri Lanka","authors":"Isuru Udayangani Hewapathirana","doi":"10.37256/ccds.4220233257","DOIUrl":"https://doi.org/10.37256/ccds.4220233257","url":null,"abstract":"Standard research on social media and its applications has been widely disseminated in developed nations. But in Sri Lanka, research in this area has been released far less frequently. However, social media usage in the country is evolving regardless of age, sex, education level, or other limitations. This study aims to fill the gap by conducting a comprehensive review of social media-based research conducted in Sri Lanka between 2012 and 2022. A systematic search of reputable databases, including IEEE Xplore, ScienceDirect, Emerald Insight, Google Scholar, and Springer Link, identified 57 relevant papers for analysis. The review highlights the diversity of application areas where social media research has been employed in Sri Lanka, including disaster management, public health, marketing, education, and more. Additionally, the analysis highlights the methodological approaches employed in social media analytics and the specific social media platforms utilized by researchers in Sri Lanka. The results of the current study serve as a timely resource, enabling policymakers and decision-makers to identify the potential avenues of social media research in Sri Lanka. By understanding the existing trends and implications, stakeholders can harness the power of social media data to make informed policy decisions, develop effective marketing strategies, enhance public health initiatives, and revolutionize educational practices.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114330715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Embedding Iris Biometric Watermarking for User Authentication 嵌入虹膜生物特征水印的用户认证研究
Pub Date : 2023-07-17 DOI: 10.37256/ccds.4220233051
Taskeen Taj, Manash Sarkar
This paper proposes an innovative approach called "Embedding Iris Biometric Watermarking" for user authentication. By utilizing the unique characteristics of the iris, a secure watermark is generated and embedded into the biometric data. This technique enhances the security and robustness of authentication systems, offering advantages such as high security, resistance to attacks, and non-intrusiveness. The proposed method has potential applications in access control, secure transactions, and digital rights management, providing a reliable solution for ensuring the integrity and confidentiality of digital systems and services.
本文提出了一种新颖的“嵌入虹膜生物特征水印”的用户认证方法。利用虹膜的独特特征,生成安全水印并嵌入到生物特征数据中。这种技术增强了身份验证系统的安全性和健壮性,提供了高安全性、抗攻击和非侵入性等优点。该方法在访问控制、安全交易和数字权限管理等方面具有潜在的应用前景,为确保数字系统和服务的完整性和保密性提供了可靠的解决方案。
{"title":"A Survey on Embedding Iris Biometric Watermarking for User Authentication","authors":"Taskeen Taj, Manash Sarkar","doi":"10.37256/ccds.4220233051","DOIUrl":"https://doi.org/10.37256/ccds.4220233051","url":null,"abstract":"This paper proposes an innovative approach called \"Embedding Iris Biometric Watermarking\" for user authentication. By utilizing the unique characteristics of the iris, a secure watermark is generated and embedded into the biometric data. This technique enhances the security and robustness of authentication systems, offering advantages such as high security, resistance to attacks, and non-intrusiveness. The proposed method has potential applications in access control, secure transactions, and digital rights management, providing a reliable solution for ensuring the integrity and confidentiality of digital systems and services.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130408388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
3D Point Cloud for Objects and Scenes Classification, Recognition, Segmentation, and Reconstruction: A Review 三维点云用于物体和场景的分类、识别、分割和重建:综述
Pub Date : 2023-06-09 DOI: 10.37256/ccds.4220232722
O. Elharrouss, Kawther Hassine, Ayman A. Zayyan, Zakariyae Chatri, Noor Almaadeed, S. Al-Máadeed, K. Abualsaud
Three-dimensional (3D) point cloud analysis has become one of the attractive subjects in realistic imaging and machine visions due to its simplicity, flexibility and powerful capacity of visualization. Actually, the representation of scenes and buildings using 3D shapes and formats leveraged many applications among which automatic driving, scenes and objects reconstruction, etc. Nevertheless, working with this emerging type of data has been a challenging task for objects representation, scenes recognition, segmentation, and reconstruction. In this regard, a significant effort has recently been devoted to developing novel strategies, using different techniques such as deep learning models. To that end, we present in this paper a comprehensive review of existing tasks on 3D point cloud: a well-defined taxonomy of existing techniques is performed based on the nature of the adopted algorithms, application scenarios, and main objectives. Various tasks performed on 3D point could data are investigated, including objects and scenes detection, recognition, segmentation, and reconstruction. In addition, we introduce a list of used datasets, discuss respective evaluation metrics, and compare the performance of existing solutions to better inform the state-of-the-art and identify their limitations and strengths. Lastly, we elaborate on current challenges facing the subject of technology and future trends attracting considerable interest, which could be a starting point for upcoming research studies.
三维点云分析以其简单、灵活和强大的可视化能力,已成为现实成像和机器视觉领域的热门课题之一。实际上,使用3D形状和格式的场景和建筑物的表示涉及到许多应用,其中包括自动驾驶,场景和物体重建等。然而,处理这种新兴类型的数据对于对象表示、场景识别、分割和重建来说是一项具有挑战性的任务。在这方面,最近已经投入了大量的努力来开发新的策略,使用不同的技术,如深度学习模型。为此,我们在本文中对现有的3D点云任务进行了全面的回顾:根据采用的算法、应用场景和主要目标的性质,对现有技术进行了明确的分类。研究了在三维点数据上执行的各种任务,包括物体和场景的检测、识别、分割和重建。此外,我们还介绍了使用的数据集列表,讨论了各自的评估指标,并比较了现有解决方案的性能,以更好地了解最新技术,并确定其局限性和优势。最后,我们详细阐述了当前技术主题面临的挑战和未来趋势,吸引了相当大的兴趣,这可能是未来研究的起点。
{"title":"3D Point Cloud for Objects and Scenes Classification, Recognition, Segmentation, and Reconstruction: A Review","authors":"O. Elharrouss, Kawther Hassine, Ayman A. Zayyan, Zakariyae Chatri, Noor Almaadeed, S. Al-Máadeed, K. Abualsaud","doi":"10.37256/ccds.4220232722","DOIUrl":"https://doi.org/10.37256/ccds.4220232722","url":null,"abstract":"Three-dimensional (3D) point cloud analysis has become one of the attractive subjects in realistic imaging and machine visions due to its simplicity, flexibility and powerful capacity of visualization. Actually, the representation of scenes and buildings using 3D shapes and formats leveraged many applications among which automatic driving, scenes and objects reconstruction, etc. Nevertheless, working with this emerging type of data has been a challenging task for objects representation, scenes recognition, segmentation, and reconstruction. In this regard, a significant effort has recently been devoted to developing novel strategies, using different techniques such as deep learning models. To that end, we present in this paper a comprehensive review of existing tasks on 3D point cloud: a well-defined taxonomy of existing techniques is performed based on the nature of the adopted algorithms, application scenarios, and main objectives. Various tasks performed on 3D point could data are investigated, including objects and scenes detection, recognition, segmentation, and reconstruction. In addition, we introduce a list of used datasets, discuss respective evaluation metrics, and compare the performance of existing solutions to better inform the state-of-the-art and identify their limitations and strengths. Lastly, we elaborate on current challenges facing the subject of technology and future trends attracting considerable interest, which could be a starting point for upcoming research studies.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130012685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Magnetic Resonance Imaging (MRI) Brain Tumor Image Classification Based on Five Machine Learning Algorithms 基于五种机器学习算法的磁共振成像(MRI)脑肿瘤图像分类
Pub Date : 2023-05-11 DOI: 10.37256/ccds.4220232740
Song Jiang, Yuan Gu, Ela Kumar
With the emergence of new technologies, vast amounts of data have become pervasive in various aspects of social life, including public transportation, community services, and scientific research. As the population ages, healthcare has become increasingly crucial, and reducing the public burdens, especially in hospitals, has become an urgent issue. For instance, manually managing vast electronic medical files, such as MRI images, based on their types is practically impossible. However, accurate classification is fundamental and critical for subsequent tasks, such as diagnosis. In this article, we utilized machine learning techniques to classify MRI brain tumor images. We employed a range of machine learning models, including k-Nearest Neighbors (k-NN), decision tree, Support Vector Machine (SVM), logistic regression, and Stochastic Gradient Descent (SGD). The performance of each model type was measured by True Skill Statistics (TSS), based on the results obtained from the confusion matrix. The results showed that k-NN works most efficiently among all those classification models. However, due to the constraints of limited running time and computational power, further investigation of the models and parameter optimization are necessary for future work.
随着新技术的出现,大量的数据在社会生活的各个方面无处不在,包括公共交通、社区服务和科学研究。随着人口老龄化,医疗保健变得越来越重要,减轻公共负担,特别是医院负担,已成为一个紧迫的问题。例如,基于类型手动管理大量电子医疗文件(如核磁共振成像图像)实际上是不可能的。然而,准确的分类是后续任务的基础和关键,例如诊断。在本文中,我们利用机器学习技术对MRI脑肿瘤图像进行分类。我们采用了一系列机器学习模型,包括k-最近邻(k-NN)、决策树、支持向量机(SVM)、逻辑回归和随机梯度下降(SGD)。基于从混淆矩阵中获得的结果,通过真实技能统计(TSS)来衡量每种模型类型的性能。结果表明,在所有分类模型中,k-NN的工作效率最高。然而,由于运行时间和计算能力的限制,需要对模型和参数优化进行进一步的研究。
{"title":"Magnetic Resonance Imaging (MRI) Brain Tumor Image Classification Based on Five Machine Learning Algorithms","authors":"Song Jiang, Yuan Gu, Ela Kumar","doi":"10.37256/ccds.4220232740","DOIUrl":"https://doi.org/10.37256/ccds.4220232740","url":null,"abstract":"With the emergence of new technologies, vast amounts of data have become pervasive in various aspects of social life, including public transportation, community services, and scientific research. As the population ages, healthcare has become increasingly crucial, and reducing the public burdens, especially in hospitals, has become an urgent issue. For instance, manually managing vast electronic medical files, such as MRI images, based on their types is practically impossible. However, accurate classification is fundamental and critical for subsequent tasks, such as diagnosis. In this article, we utilized machine learning techniques to classify MRI brain tumor images. We employed a range of machine learning models, including k-Nearest Neighbors (k-NN), decision tree, Support Vector Machine (SVM), logistic regression, and Stochastic Gradient Descent (SGD). The performance of each model type was measured by True Skill Statistics (TSS), based on the results obtained from the confusion matrix. The results showed that k-NN works most efficiently among all those classification models. However, due to the constraints of limited running time and computational power, further investigation of the models and parameter optimization are necessary for future work.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123688306","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Design of a Smart Cabin Lighting System Based on Internet of Things 基于物联网的智能客舱照明系统设计
Pub Date : 2023-04-14 DOI: 10.37256/ccds.4220232697
Yuan-Ko Huang
With the rapid advancements in mobile devices and wireless network technologies, the Internet of Things (IoT) has become more powerful and popular than ever. The aim of IoT is to efficiently control various types of objects through wireless communications. This paper aims to design an IoT-based smart lighting system that reduces development costs and saves power consumption. Unlike public open spaces, the focus of this paper is on ship cabin spaces. As ship cabins have unique properties, such as requiring gas-based power generation and preferring a wireless environment, designing a smart cabin lighting system is crucial and has significant commercial value. The smart cabin lighting system is designed with four features. Firstly, it can automatically control the lighting devices around people using position-sensitive devices. Secondly, it enables setting on/off and adjusting the luminance for lighting devices through Touch Keypads. Thirdly, the system can be controlled using an app to turn on/off and adjust the luminance of lighting devices. Lastly, the lighting devices equipped with sensors collect specific data on cloud servers for analysis. The underlying communication protocol used to interconnect the smart lighting devices, sensors, and Touch Keypads is Zigbee. The smart cabin lighting system can be applied to marine lighting, thus improving the commercial value of enterprises related to marine lighting.
随着移动设备和无线网络技术的快速发展,物联网(IoT)变得比以往任何时候都更加强大和流行。物联网的目标是通过无线通信有效地控制各种类型的物体。本文旨在设计一种基于物联网的智能照明系统,降低开发成本,节省功耗。与公共开放空间不同,本文的重点是船舶舱室空间。由于船舶客舱具有独特的特性,例如需要天然气发电,更喜欢无线环境,因此设计智能客舱照明系统至关重要,具有重要的商业价值。智能客舱照明系统设计有四个特点。首先,它可以使用位置敏感装置自动控制人周围的照明设备。其次,它可以通过触摸键盘设置照明设备的开关和亮度。第三,可以通过应用程序控制系统的开关和调节照明设备的亮度。最后,配备传感器的照明设备在云服务器上收集特定数据进行分析。用于连接智能照明设备、传感器和触摸键盘的底层通信协议是Zigbee。智能客舱照明系统可应用于船舶照明,从而提升船舶照明相关企业的商业价值。
{"title":"Design of a Smart Cabin Lighting System Based on Internet of Things","authors":"Yuan-Ko Huang","doi":"10.37256/ccds.4220232697","DOIUrl":"https://doi.org/10.37256/ccds.4220232697","url":null,"abstract":"With the rapid advancements in mobile devices and wireless network technologies, the Internet of Things (IoT) has become more powerful and popular than ever. The aim of IoT is to efficiently control various types of objects through wireless communications. This paper aims to design an IoT-based smart lighting system that reduces development costs and saves power consumption. Unlike public open spaces, the focus of this paper is on ship cabin spaces. As ship cabins have unique properties, such as requiring gas-based power generation and preferring a wireless environment, designing a smart cabin lighting system is crucial and has significant commercial value. The smart cabin lighting system is designed with four features. Firstly, it can automatically control the lighting devices around people using position-sensitive devices. Secondly, it enables setting on/off and adjusting the luminance for lighting devices through Touch Keypads. Thirdly, the system can be controlled using an app to turn on/off and adjust the luminance of lighting devices. Lastly, the lighting devices equipped with sensors collect specific data on cloud servers for analysis. The underlying communication protocol used to interconnect the smart lighting devices, sensors, and Touch Keypads is Zigbee. The smart cabin lighting system can be applied to marine lighting, thus improving the commercial value of enterprises related to marine lighting.","PeriodicalId":158315,"journal":{"name":"Cloud Computing and Data Science","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127468958","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
Cloud Computing and Data Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1