首页 > 最新文献

The International Arab Journal of Information Technology最新文献

英文 中文
A Highly Parallelizable Hash Algorithm Based on Latin Cubes 一种基于拉丁立方体的高度并行哈希算法
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/10
Ming Xu
Latin cubes are the high-dimensional form of Latin squares. Latin cubes have discreteness, uniformity and 3D attribute. There have been some applications of Latin squares in hash algorithms, but few applications of Latin cubes in this field. In this paper, a highly parallelizable hash algorithm based on four Latin cubes of order 4 is proposed. The parallelism is reflected in two aspects: on the one hand, the whole message is divided into several blocks, and all the blocks are processed in parallel; on the other hand, each block is further divided into several channels, and these channels are also processed in parallel. The whole hash procedure is based on four fixed Latin cubes. By the aid of uniformity and 3D attribute of Latin cubes, the algorithm has good statistical performances and strong collision resistance. Furthermore, the parallel structure makes the algorithm have satisfactory computation speed. Therefore the algorithm is quite suitable for the current applications of communication security
拉丁立方体是拉丁方块的高维形式。拉丁立方体具有离散性、均匀性和三维属性。拉丁平方在哈希算法中有一些应用,但拉丁立方在该领域的应用很少。本文提出了一种基于4阶拉丁立方体的高度并行哈希算法。并行性体现在两个方面:一方面,将整个消息分成几个块,所有的块并行处理;另一方面,将每个块进一步划分为几个通道,这些通道也并行处理。整个哈希过程基于四个固定的拉丁立方体。该算法利用拉丁立方体的均匀性和三维属性,具有良好的统计性能和较强的抗碰撞性能。此外,并行结构使算法具有令人满意的计算速度。因此,该算法非常适合当前通信安全领域的应用
{"title":"A Highly Parallelizable Hash Algorithm Based on Latin Cubes","authors":"Ming Xu","doi":"10.34028/iajit/20/6/10","DOIUrl":"https://doi.org/10.34028/iajit/20/6/10","url":null,"abstract":"Latin cubes are the high-dimensional form of Latin squares. Latin cubes have discreteness, uniformity and 3D attribute. There have been some applications of Latin squares in hash algorithms, but few applications of Latin cubes in this field. In this paper, a highly parallelizable hash algorithm based on four Latin cubes of order 4 is proposed. The parallelism is reflected in two aspects: on the one hand, the whole message is divided into several blocks, and all the blocks are processed in parallel; on the other hand, each block is further divided into several channels, and these channels are also processed in parallel. The whole hash procedure is based on four fixed Latin cubes. By the aid of uniformity and 3D attribute of Latin cubes, the algorithm has good statistical performances and strong collision resistance. Furthermore, the parallel structure makes the algorithm have satisfactory computation speed. Therefore the algorithm is quite suitable for the current applications of communication security","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"75 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134884746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations 基于计算智能的视频监控兴趣点检测
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/7
Emre Tercan, Serkan Tapkın, Furkan Küçük, Ali Demirtaş, Ahmet Özbayoğlu, Abdussamet Türker
Latest advancement of the computer vision literature and Convolutional Neural Networks (CNN) reveal many opportunities that are being actively used in various research areas. One of the most important examples for these areas is autonomous vehicles and mapping systems. Point of interest detection is a rising field within autonomous video tracking and autonomous mapping systems. Within the last few years, the number of implementations and research papers started rising due to the advancements in the new deep learning systems. In this paper, our aim is to survey the existing studies implemented on point of interest detection systems that focus on objects on the road (like lanes, road marks), or objects on the roadside (like road signs, restaurants or temporary establishments) so that they can be used for autonomous vehicles and automatic mapping systems. Meanwhile, the roadside point of interest detection problem has been addressed from a transportation industry perspective. At the same time, a deep learning based point of interest detection model based on roadside gas station identification will be introduced as proof of the anticipated concept. Instead of using an internet connection for point of interest retrieval, the proposed model has the capability to work offline for more robustness. A variety of models have been analysed and their detection speed and accuracy performances are compared. Our preliminary results show that it is possible to develop a model achieving a satisfactory real-time performance that can be embedded into autonomous cars such that streaming video analysis and point of interest detection might be achievable in actual utilisation for future implementations.
计算机视觉文献和卷积神经网络(CNN)的最新进展揭示了许多正在积极应用于各个研究领域的机会。这些领域最重要的例子之一是自动驾驶汽车和地图系统。兴趣点检测是自主视频跟踪和自主测绘系统中的一个新兴领域。在过去的几年里,由于新的深度学习系统的进步,实现和研究论文的数量开始上升。在本文中,我们的目标是调查现有的兴趣点检测系统的研究,这些系统主要关注道路上的物体(如车道、道路标志)或路边的物体(如道路标志、餐馆或临时场所),以便它们可以用于自动驾驶汽车和自动测绘系统。同时,从交通行业的角度解决了路边兴趣点检测问题。同时,将引入基于路边加油站识别的基于深度学习的兴趣点检测模型,作为预期概念的证明。与使用互联网连接进行兴趣点检索不同,所提出的模型具有离线工作的能力,具有更强的鲁棒性。对各种模型进行了分析,并对其检测速度和精度性能进行了比较。我们的初步结果表明,有可能开发出一种模型,实现令人满意的实时性能,可以嵌入到自动驾驶汽车中,这样流媒体视频分析和兴趣点检测就可以在未来的实际应用中实现。
{"title":"Computational Intelligence Based Point of Interest Detection by Video Surveillance Implementations","authors":"Emre Tercan, Serkan Tapkın, Furkan Küçük, Ali Demirtaş, Ahmet Özbayoğlu, Abdussamet Türker","doi":"10.34028/iajit/20/6/7","DOIUrl":"https://doi.org/10.34028/iajit/20/6/7","url":null,"abstract":"Latest advancement of the computer vision literature and Convolutional Neural Networks (CNN) reveal many opportunities that are being actively used in various research areas. One of the most important examples for these areas is autonomous vehicles and mapping systems. Point of interest detection is a rising field within autonomous video tracking and autonomous mapping systems. Within the last few years, the number of implementations and research papers started rising due to the advancements in the new deep learning systems. In this paper, our aim is to survey the existing studies implemented on point of interest detection systems that focus on objects on the road (like lanes, road marks), or objects on the roadside (like road signs, restaurants or temporary establishments) so that they can be used for autonomous vehicles and automatic mapping systems. Meanwhile, the roadside point of interest detection problem has been addressed from a transportation industry perspective. At the same time, a deep learning based point of interest detection model based on roadside gas station identification will be introduced as proof of the anticipated concept. Instead of using an internet connection for point of interest retrieval, the proposed model has the capability to work offline for more robustness. A variety of models have been analysed and their detection speed and accuracy performances are compared. Our preliminary results show that it is possible to develop a model achieving a satisfactory real-time performance that can be embedded into autonomous cars such that streaming video analysis and point of interest detection might be achievable in actual utilisation for future implementations.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136374727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Management Model for Data Caching in MANET Environment MANET环境下数据缓存的有效管理模型
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/1
Amer Abu Salem
A mobile ad-hoc (MANET) network has the main challenge to provide the needed data for the desired mobile nodes. An efficient on request routing protocol for MANET is Ad-hoc on-demand Distance Vector (AODV), which is based on two main methods: route discovery and route maintenance. Route discovery is the process used to detect a route to the destination from the packet source, while route maintenance is the process used to detect a link failure and repair it. Cooperative caching tends improving data availability in mobile ad-hoc networks, the coordination of cache discovery and cache management strategies is very significant in the cooperative caching of MANETs because requests for data and answers to requested data can be reduced simply due to interference, network congestion, or when a forwarding node is out of reach and the route breaks down. Cooperative cache management is much more complicated in cooperative caching because it also depends on neighbouring nodes to decide what to cache. In this paper, three algorithms were proposed: (1) a combination algorithm for cache admission control based on cache data and location of data to save space and reduce data redundancy, (2) a value-based policy for cache placement and replacement instead of the more common least recently used strategy, depending on metrics that describe cached items to increase the local cache hit ratio, and (3) a combined algorithm for cache consistency that includes time-to-live, pull, and push policies to enhance data availability and system scalability. The proposed algorithm implemented by the NS3 simulation program; which used to create a network using the AODV protocol in several parameters and achieve better system performance.
移动自组织(MANET)网络面临的主要挑战是为所需的移动节点提供所需的数据。基于路由发现和路由维护两种主要方法的自组织按需距离矢量(AODV)路由协议是一种高效的基于请求的MANET路由协议。路由发现是指从报文源探测到目的路由的过程,而路由维护是指探测到链路故障并进行修复的过程。在移动自组织网络中,协作缓存倾向于提高数据可用性,缓存发现和缓存管理策略的协调在manet的协作缓存中非常重要,因为对数据的请求和对请求数据的响应可能会因为干扰、网络拥塞或转发节点无法到达或路由中断而减少。协作缓存管理在协作缓存中要复杂得多,因为它还依赖于邻近节点来决定缓存什么。本文提出了三种算法:(1)基于缓存数据和数据位置的缓存接纳控制的组合算法,以节省空间和减少数据冗余;(2)基于值的缓存放置和替换策略,而不是更常见的最近最少使用的策略,取决于描述缓存项的指标,以增加本地缓存命中率;(3)缓存一致性的组合算法,包括生存时间、拉和推策略,以增强数据可用性和系统可扩展性。提出的算法通过NS3仿真程序实现;其中使用AODV协议在多个参数下创建网络,实现了较好的系统性能。
{"title":"An Effective Management Model for Data Caching in MANET Environment","authors":"Amer Abu Salem","doi":"10.34028/iajit/20/6/1","DOIUrl":"https://doi.org/10.34028/iajit/20/6/1","url":null,"abstract":"A mobile ad-hoc (MANET) network has the main challenge to provide the needed data for the desired mobile nodes. An efficient on request routing protocol for MANET is Ad-hoc on-demand Distance Vector (AODV), which is based on two main methods: route discovery and route maintenance. Route discovery is the process used to detect a route to the destination from the packet source, while route maintenance is the process used to detect a link failure and repair it. Cooperative caching tends improving data availability in mobile ad-hoc networks, the coordination of cache discovery and cache management strategies is very significant in the cooperative caching of MANETs because requests for data and answers to requested data can be reduced simply due to interference, network congestion, or when a forwarding node is out of reach and the route breaks down. Cooperative cache management is much more complicated in cooperative caching because it also depends on neighbouring nodes to decide what to cache. In this paper, three algorithms were proposed: (1) a combination algorithm for cache admission control based on cache data and location of data to save space and reduce data redundancy, (2) a value-based policy for cache placement and replacement instead of the more common least recently used strategy, depending on metrics that describe cached items to increase the local cache hit ratio, and (3) a combined algorithm for cache consistency that includes time-to-live, pull, and push policies to enhance data availability and system scalability. The proposed algorithm implemented by the NS3 simulation program; which used to create a network using the AODV protocol in several parameters and achieve better system performance.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136372897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning Inpainting Model on Digital and Medical Images-A Review 数字医学图像的深度学习绘画模型综述
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/9
Jennyfer Susan, Parthasarathy Subashini
Image inpainting is a method to restore the missing pixels on damaged images. Initially, the traditional inpainting method uses the statistics of the surrounding pixels to find the missing pixels. It sometimes fails to read the hidden information to attain plausible imagery. The deep learning inpainting methods are introduced to overcome these challenges. A deep neural network learns the semantic priors and hidden representation pixels in an end-to-end fashion in the digital and medical. This paper discusses the following: 1) The difference between the supervised and the unsupervised deep learning inpainting algorithm used in medical and digital images. 2) Discusses the merits and demerits of each deep learning inpainting model. 3) Discusses the challenges and solution for the deep learning inpainting model. 4) Discusses each model's quantitative and qualitative analysis in the digital and other medical images
图像修复是在受损图像上恢复缺失像素的一种方法。传统的补图方法最初是利用周围像素的统计信息来寻找缺失的像素。它有时无法读取隐藏的信息以获得可信的图像。为了克服这些挑战,引入了绘画中的深度学习方法。在数字和医疗领域,深度神经网络以端到端的方式学习语义先验和隐藏表示像素。本文讨论了以下内容:1)医学图像和数字图像中有监督深度学习与无监督深度学习的区别。2)讨论了各种深度学习绘画模型的优缺点。3)讨论了深度学习在绘画模型中的挑战和解决方案。4)讨论了各个模型在数字图像和其他医学图像中的定量和定性分析
{"title":"Deep Learning Inpainting Model on Digital and Medical Images-A Review","authors":"Jennyfer Susan, Parthasarathy Subashini","doi":"10.34028/iajit/20/6/9","DOIUrl":"https://doi.org/10.34028/iajit/20/6/9","url":null,"abstract":"Image inpainting is a method to restore the missing pixels on damaged images. Initially, the traditional inpainting method uses the statistics of the surrounding pixels to find the missing pixels. It sometimes fails to read the hidden information to attain plausible imagery. The deep learning inpainting methods are introduced to overcome these challenges. A deep neural network learns the semantic priors and hidden representation pixels in an end-to-end fashion in the digital and medical. This paper discusses the following: 1) The difference between the supervised and the unsupervised deep learning inpainting algorithm used in medical and digital images. 2) Discusses the merits and demerits of each deep learning inpainting model. 3) Discusses the challenges and solution for the deep learning inpainting model. 4) Discusses each model's quantitative and qualitative analysis in the digital and other medical images","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134884404","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
RoboGuard: Enhancing Robotic System Security with Ensemble Learning RoboGuard:集成学习增强机器人系统安全性
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/13
Ali Al Maqousi, Mohammad Alauthman
Robots are becoming increasingly common in critical healthcare, transportation, and manufacturing applications. However, these systems are vulnerable to malware attacks, compromising reliability and security. Previous research has investigated the use of Machine Learning (ML) to detect malware in robots. However, existing approaches have faced several challenges, including class imbalance, high dimensionality, data heterogeneity, and balancing detection accuracy with false positives. This study introduces a novel approach to malware detection in robots that uses ensemble learning combined with the Synthetic Minority Over-sampling Technique (SMOTE). The proposed approach stacks three (ML models Random Forest (RF), Artificial Neural Networks (ANN), and Support Vector Machines (SVM) to improve accuracy and system robustness. SMOTE addresses the class imbalance in the dataset. Evaluation of the proposed approach on a publicly available dataset of robotic systems yielded promising results. The approach outperformed individual models and existing approaches regarding detection accuracy and false positive rates. This study represents a significant advancement in malware detection for robots. It could enhance the reliability and security of these systems in various critical applications
机器人在关键的医疗保健、运输和制造应用中变得越来越普遍。然而,这些系统容易受到恶意软件的攻击,从而影响可靠性和安全性。之前的研究已经研究了使用机器学习(ML)来检测机器人中的恶意软件。然而,现有的方法面临着一些挑战,包括类不平衡、高维数、数据异质性和平衡检测精度与误报。本研究介绍了一种新的机器人恶意软件检测方法,该方法使用集成学习和合成少数派过采样技术(SMOTE)相结合。该方法将三种机器学习模型(随机森林(RF)、人工神经网络(ANN)和支持向量机(SVM)叠加在一起,以提高准确性和系统鲁棒性。SMOTE解决了数据集中的类不平衡问题。在公开可用的机器人系统数据集上对所提出的方法进行评估,产生了有希望的结果。该方法在检测精度和假阳性率方面优于单个模型和现有方法。这项研究代表了机器人恶意软件检测的重大进步。它可以提高这些系统在各种关键应用中的可靠性和安全性
{"title":"RoboGuard: Enhancing Robotic System Security with Ensemble Learning","authors":"Ali Al Maqousi, Mohammad Alauthman","doi":"10.34028/iajit/20/6/13","DOIUrl":"https://doi.org/10.34028/iajit/20/6/13","url":null,"abstract":"Robots are becoming increasingly common in critical healthcare, transportation, and manufacturing applications. However, these systems are vulnerable to malware attacks, compromising reliability and security. Previous research has investigated the use of Machine Learning (ML) to detect malware in robots. However, existing approaches have faced several challenges, including class imbalance, high dimensionality, data heterogeneity, and balancing detection accuracy with false positives. This study introduces a novel approach to malware detection in robots that uses ensemble learning combined with the Synthetic Minority Over-sampling Technique (SMOTE). The proposed approach stacks three (ML models Random Forest (RF), Artificial Neural Networks (ANN), and Support Vector Machines (SVM) to improve accuracy and system robustness. SMOTE addresses the class imbalance in the dataset. Evaluation of the proposed approach on a publicly available dataset of robotic systems yielded promising results. The approach outperformed individual models and existing approaches regarding detection accuracy and false positive rates. This study represents a significant advancement in malware detection for robots. It could enhance the reliability and security of these systems in various critical applications","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134884764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Joint Extraction of Organizations and Relations for Emergency Response Plans With Rich Semantic Information Based On Multi-Head Attention Mechanism 基于多头关注机制的富语义应急预案组织关系联合抽取
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/5
Tong Liu, Haoyu Liu, Weijian Ni, Mengxiao Si
At present, deep learning-based joint entity-relation extraction models are gradually able to accomplish complex tasks, but the research progress in specific fields is relatively slow. Compared with other fields, emergency plan text has the characteristics of high entity density, long text, and many professional terms, which make some general models unable to handle the semantic information of emergency plan text well. Therefore, this paper addresses the problem of complex semantics of emergency plan text, and proposes a joint extraction model of emergency plan organization and relationship based on multi-Head Attention Mechanism (MA-JE) to enrich semantic information, starting from multiple perspectives and different levels to obtain contextual information, aiming to deeply mine and use sentence semantic information through deep feature extraction of emergency plan text. The proposed model and the baseline model are experimented separately on the Chinese emergency response plan dataset, and the results show that the proposed approach outperforms existing baseline models for joint extraction of entity and their relations. In addition, ablation experiments were performed to verify the validity of each module in the model.
目前,基于深度学习的联合实体关系提取模型逐渐能够完成复杂的任务,但在特定领域的研究进展相对缓慢。与其他领域相比,应急预案文本具有实体密度高、文本长、专业术语多的特点,这使得一些通用模型无法很好地处理应急预案文本的语义信息。为此,本文针对应急预案文本语义复杂的问题,提出了一种基于多头注意机制(multi-Head Attention Mechanism, MA-JE)的应急预案组织与关系联合提取模型,丰富语义信息,从多角度、不同层次入手获取语境信息,旨在通过对应急预案文本的深度特征提取,对句子语义信息进行深度挖掘和利用。在中国应急预案数据集上分别对所提模型和基线模型进行了实验,结果表明,所提方法在实体及其关系联合抽取方面优于现有的基线模型。并通过烧蚀实验验证了模型中各模块的有效性。
{"title":"Joint Extraction of Organizations and Relations for Emergency Response Plans With Rich Semantic Information Based On Multi-Head Attention Mechanism","authors":"Tong Liu, Haoyu Liu, Weijian Ni, Mengxiao Si","doi":"10.34028/iajit/20/6/5","DOIUrl":"https://doi.org/10.34028/iajit/20/6/5","url":null,"abstract":"At present, deep learning-based joint entity-relation extraction models are gradually able to accomplish complex tasks, but the research progress in specific fields is relatively slow. Compared with other fields, emergency plan text has the characteristics of high entity density, long text, and many professional terms, which make some general models unable to handle the semantic information of emergency plan text well. Therefore, this paper addresses the problem of complex semantics of emergency plan text, and proposes a joint extraction model of emergency plan organization and relationship based on multi-Head Attention Mechanism (MA-JE) to enrich semantic information, starting from multiple perspectives and different levels to obtain contextual information, aiming to deeply mine and use sentence semantic information through deep feature extraction of emergency plan text. The proposed model and the baseline model are experimented separately on the Chinese emergency response plan dataset, and the results show that the proposed approach outperforms existing baseline models for joint extraction of entity and their relations. In addition, ablation experiments were performed to verify the validity of each module in the model.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136374432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development 软件开发分布式版本控制系统中可用共存项的归纳
Pub Date : 2023-01-01 DOI: 10.34028/iajit/20/6/4
Sibel Özyer
Software development in Open-Source Software systems (OSS) allow developers to share their code and modify other developers' code. That leads to collaboration in the development. They can either discuss on the items to be developed, including the errors and technical problems that were faced. One popular OSS platform is github which already has a large number of developers and projects. The data residing in the issues part of github is sufficiently large, complex and unstructured. It could be processed to find novel discoveries. This work concentrates on one selected project to be analyzed systematically. Routine Extract, Transform and Load (ETL) steps have been identified to clean the data before applying natural language processing for prioritizing and taking actions for the requirements. In a collaborative environment. Our work uses terms and guides developers for tracking the co-occurrence of the terms used together to help them focus on the important issues.
开源软件系统(OSS)中的软件开发允许开发人员共享他们的代码并修改其他开发人员的代码。这导致了开发中的合作。他们可以讨论待开发的项目,包括所面临的错误和技术问题。一个流行的OSS平台是github,它已经有大量的开发人员和项目。驻留在github的问题部分的数据足够大、复杂和非结构化。它可以被处理以发现新的发现。这项工作集中在一个选定的项目进行系统分析。已经确定了常规提取、转换和加载(ETL)步骤,以便在应用自然语言处理以确定优先级并针对需求采取行动之前清理数据。在协作的环境中。我们的工作使用术语,并指导开发人员跟踪一起使用的术语的共存情况,以帮助他们关注重要的问题。
{"title":"Induction of Co-existing Items Available in Distributed Version Control Systems for Software Development","authors":"Sibel Özyer","doi":"10.34028/iajit/20/6/4","DOIUrl":"https://doi.org/10.34028/iajit/20/6/4","url":null,"abstract":"Software development in Open-Source Software systems (OSS) allow developers to share their code and modify other developers' code. That leads to collaboration in the development. They can either discuss on the items to be developed, including the errors and technical problems that were faced. One popular OSS platform is github which already has a large number of developers and projects. The data residing in the issues part of github is sufficiently large, complex and unstructured. It could be processed to find novel discoveries. This work concentrates on one selected project to be analyzed systematically. Routine Extract, Transform and Load (ETL) steps have been identified to clean the data before applying natural language processing for prioritizing and taking actions for the requirements. In a collaborative environment. Our work uses terms and guides developers for tracking the co-occurrence of the terms used together to help them focus on the important issues.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136373175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Effective Management Model for Data Caching in MANET Environment MANET环境下数据缓存的有效管理模型
Pub Date : 2023-01-01 DOI: 10.34028//iajit/20/6/1
Amer Abu Salem
A mobile ad-hoc (MANET) network has the main challenge to provide the needed data for the desired mobile nodes. An efficient on request routing protocol for MANET is Ad-hoc on-demand Distance Vector (AODV), which is based on two main methods: route discovery and route maintenance. Route discovery is the process used to detect a route to the destination from the packet source, while route maintenance is the process used to detect a link failure and repair it. Cooperative caching tends improving data availability in mobile ad-hoc networks, the coordination of cache discovery and cache management strategies is very significant in the cooperative caching of MANETs because requests for data and answers to requested data can be reduced simply due to interference, network congestion, or when a forwarding node is out of reach and the route breaks down. Cooperative cache management is much more complicated in cooperative caching because it also depends on neighbouring nodes to decide what to cache. In this paper, three algorithms were proposed: (1) a combination algorithm for cache admission control based on cache data and location of data to save space and reduce data redundancy, (2) a value-based policy for cache placement and replacement instead of the more common least recently used strategy, depending on metrics that describe cached items to increase the local cache hit ratio, and (3) a combined algorithm for cache consistency that includes time-to-live, pull, and push policies to enhance data availability and system scalability. The proposed algorithm implemented by the NS3 simulation program; which used to create a network using the AODV protocol in several parameters and achieve better system performance.
移动自组织(MANET)网络面临的主要挑战是为所需的移动节点提供所需的数据。基于路由发现和路由维护两种主要方法的自组织按需距离矢量(AODV)路由协议是一种高效的基于请求的MANET路由协议。路由发现是指从报文源探测到目的路由的过程,而路由维护是指探测到链路故障并进行修复的过程。在移动自组织网络中,协作缓存倾向于提高数据可用性,缓存发现和缓存管理策略的协调在manet的协作缓存中非常重要,因为对数据的请求和对请求数据的响应可能会因为干扰、网络拥塞或转发节点无法到达或路由中断而减少。协作缓存管理在协作缓存中要复杂得多,因为它还依赖于邻近节点来决定缓存什么。本文提出了三种算法:(1)基于缓存数据和数据位置的缓存接纳控制的组合算法,以节省空间和减少数据冗余;(2)基于值的缓存放置和替换策略,而不是更常见的最近最少使用的策略,取决于描述缓存项的指标,以增加本地缓存命中率;(3)缓存一致性的组合算法,包括生存时间、拉和推策略,以增强数据可用性和系统可扩展性。提出的算法通过NS3仿真程序实现;其中使用AODV协议在多个参数下创建网络,实现了较好的系统性能。
{"title":"An Effective Management Model for Data Caching in MANET Environment","authors":"Amer Abu Salem","doi":"10.34028//iajit/20/6/1","DOIUrl":"https://doi.org/10.34028//iajit/20/6/1","url":null,"abstract":"A mobile ad-hoc (MANET) network has the main challenge to provide the needed data for the desired mobile nodes. An efficient on request routing protocol for MANET is Ad-hoc on-demand Distance Vector (AODV), which is based on two main methods: route discovery and route maintenance. Route discovery is the process used to detect a route to the destination from the packet source, while route maintenance is the process used to detect a link failure and repair it. Cooperative caching tends improving data availability in mobile ad-hoc networks, the coordination of cache discovery and cache management strategies is very significant in the cooperative caching of MANETs because requests for data and answers to requested data can be reduced simply due to interference, network congestion, or when a forwarding node is out of reach and the route breaks down. Cooperative cache management is much more complicated in cooperative caching because it also depends on neighbouring nodes to decide what to cache. In this paper, three algorithms were proposed: (1) a combination algorithm for cache admission control based on cache data and location of data to save space and reduce data redundancy, (2) a value-based policy for cache placement and replacement instead of the more common least recently used strategy, depending on metrics that describe cached items to increase the local cache hit ratio, and (3) a combined algorithm for cache consistency that includes time-to-live, pull, and push policies to enhance data availability and system scalability. The proposed algorithm implemented by the NS3 simulation program; which used to create a network using the AODV protocol in several parameters and achieve better system performance.","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135007925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Image Encryption Scheme Using Dual Chaotic Map Synchronization 一种基于双混沌映射同步的图像加密新方案
Pub Date : 2020-12-31 DOI: 10.34028/iajit/18/1/11
Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet
混沌系统的行为吸引了众多图像加密领域的研究者。使用混沌作为开发密码系统的基础的主要优点是由于它对初始条件和参数调整的敏感性,以及类似于一个好的密码的主要成分的随机行为,即混乱和扩散特性。本文提出了一种基于双混沌系统即Lorenz和Chen混沌系统同步的新方案,并证明了在适当的条件和特定的参数下,这些混沌映射可以与其他混沌映射完全同步,从而为混沌加密系统增加了新的内容。这个补充提供了一个主从配置,用于构造所提出的基于双同步混沌的密码方案。进行了通用安全性分析,验证了所提方案的有效性。实验和分析表明,该方案安全、高效、鲁棒、可靠,可直接成功应用于Internet等不安全网络通道中的许多实际安全应用
{"title":"A New Image Encryption Scheme Using Dual Chaotic Map Synchronization","authors":"","doi":"10.34028/iajit/18/1/11","DOIUrl":"https://doi.org/10.34028/iajit/18/1/11","url":null,"abstract":"Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115679010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm 基于包装器的特征选择,基于综合教学的优化算法
Pub Date : 2020-11-01 DOI: 10.34028/IAJIT/17/6/7
Mohan Allam, Nandhini Malaiyappan
{"title":"Wrapper based Feature Selection using Integrative Teaching Learning Based Optimization Algorithm","authors":"Mohan Allam, Nandhini Malaiyappan","doi":"10.34028/IAJIT/17/6/7","DOIUrl":"https://doi.org/10.34028/IAJIT/17/6/7","url":null,"abstract":"","PeriodicalId":161392,"journal":{"name":"The International Arab Journal of Information Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121159072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
The International Arab Journal of Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1