首页 > 最新文献

Int. J. Comput. Sci. Eng.最新文献

英文 中文
MLIM-Cloud: a flexible information monitoring middleware in large-scale cloud environments mlm - cloud:大规模云环境下灵活的信息监控中间件
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029383
Tienan Zhang
In large-scale cloud platforms, information monitoring service is essential for capturing the performance of underlying resources and understanding the behaviours of various applications in different circumstances. In this paper, we present a flexible information monitoring middleware, namely multi-level information monitoring for cloud (MLIM-Cloud), and our motivation is to enable users to perform their monitoring operations in a non-intrusive and transparent manner in any virtualised infrastructure. In the MLIM-Cloud framework, three kinds of monitoring entities are designed for collecting, processing and achieving various kinds of runtime information at different infrastructure levels, including physical machines, VM instances, and up-level applications. In addition, the MLIM-Cloud middleware is both platform-independent and platform-interoperable, which means it can be easily deployed on different kinds of cloud platforms. To investigate the performance of MLIM-Cloud, an extensive set of experiments are conducted in a real-world cloud platform. The experimental results show that comparing with many existing monitoring services, the MLIM-Cloud middleware exhibits better adaptiveness and robustness when the cloud system is in presence of dynamic and unpredictable workloads.
在大型云平台中,信息监控服务对于捕获底层资源的性能和理解不同环境下各种应用程序的行为至关重要。在本文中,我们提出了一种灵活的信息监控中间件,即云的多级信息监控(mlm - cloud),我们的动机是使用户能够在任何虚拟化基础设施中以非侵入性和透明的方式执行他们的监控操作。在mlm - cloud框架中,设计了三种监视实体,用于收集、处理和实现不同基础设施级别(包括物理机、VM实例和上层应用程序)的各种运行时信息。此外,mlm - cloud中间件是平台独立的和平台互操作的,这意味着它可以很容易地部署在不同类型的云平台上。为了研究mlm - cloud的性能,我们在一个真实的云平台上进行了大量的实验。实验结果表明,与现有的许多监控服务相比,该中间件在云系统存在动态和不可预测的工作负载时表现出更好的适应性和鲁棒性。
{"title":"MLIM-Cloud: a flexible information monitoring middleware in large-scale cloud environments","authors":"Tienan Zhang","doi":"10.1504/ijcse.2020.10029383","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029383","url":null,"abstract":"In large-scale cloud platforms, information monitoring service is essential for capturing the performance of underlying resources and understanding the behaviours of various applications in different circumstances. In this paper, we present a flexible information monitoring middleware, namely multi-level information monitoring for cloud (MLIM-Cloud), and our motivation is to enable users to perform their monitoring operations in a non-intrusive and transparent manner in any virtualised infrastructure. In the MLIM-Cloud framework, three kinds of monitoring entities are designed for collecting, processing and achieving various kinds of runtime information at different infrastructure levels, including physical machines, VM instances, and up-level applications. In addition, the MLIM-Cloud middleware is both platform-independent and platform-interoperable, which means it can be easily deployed on different kinds of cloud platforms. To investigate the performance of MLIM-Cloud, an extensive set of experiments are conducted in a real-world cloud platform. The experimental results show that comparing with many existing monitoring services, the MLIM-Cloud middleware exhibits better adaptiveness and robustness when the cloud system is in presence of dynamic and unpredictable workloads.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115439511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face spoof detection using feature map superposition and CNN 基于特征映射叠加和CNN的人脸欺骗检测
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029396
Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang
Face biometrics have been widely applied for user authentication systems in many practical scenarios, but the security of these systems can be jeopardised by presenting photos or replays of the legitimate user. To deal with such threat, many handcraft features extracted from face images or videos were used to detect spoof faces. These methods mainly analysed either illumination differences, colour differences or textures differences, but did not fusion these features together to further improve detection performance. Thus in this paper, we propose a novel face spoof detection method based on various feature maps and convolution neural network for photo and replay attacks. Specifically, both facial contour and specularly reflected features are considered, and proposed network is task oriented designed, e.g., its depth and width, and specific convolutional parameters of each layer are chosen for optimal accuracy and efficiency. A remarkable performance through plenty of experiments on multiple datasets shows that our method can defend not only photo attack, but also replay attack with a very low error probability.
人脸生物识别技术在许多实际场景中被广泛应用于用户身份验证系统,但这些系统的安全性可能会因呈现合法用户的照片或重播而受到威胁。为了应对这种威胁,从人脸图像或视频中提取许多手工特征来检测恶搞人脸。这些方法主要分析光照差异、颜色差异或纹理差异,但没有将这些特征融合在一起以进一步提高检测性能。因此,在本文中,我们提出了一种基于各种特征映射和卷积神经网络的人脸欺骗检测方法,用于照片和重播攻击。具体而言,考虑了面部轮廓和镜面反射特征,并设计了面向任务的网络,如深度和宽度,以及每层特定的卷积参数的选择,以获得最佳的精度和效率。在多个数据集上的大量实验表明,我们的方法不仅可以防御照片攻击,而且可以以极低的错误概率防御重播攻击。
{"title":"Face spoof detection using feature map superposition and CNN","authors":"Fei Gu, Zhihua Xia, Jianwei Fei, Chengsheng Yuan, Qiang Zhang","doi":"10.1504/ijcse.2020.10029396","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029396","url":null,"abstract":"Face biometrics have been widely applied for user authentication systems in many practical scenarios, but the security of these systems can be jeopardised by presenting photos or replays of the legitimate user. To deal with such threat, many handcraft features extracted from face images or videos were used to detect spoof faces. These methods mainly analysed either illumination differences, colour differences or textures differences, but did not fusion these features together to further improve detection performance. Thus in this paper, we propose a novel face spoof detection method based on various feature maps and convolution neural network for photo and replay attacks. Specifically, both facial contour and specularly reflected features are considered, and proposed network is task oriented designed, e.g., its depth and width, and specific convolutional parameters of each layer are chosen for optimal accuracy and efficiency. A remarkable performance through plenty of experiments on multiple datasets shows that our method can defend not only photo attack, but also replay attack with a very low error probability.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122500461","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A coverless information hiding algorithm based on gradient matrix 一种基于梯度矩阵的无覆盖信息隐藏算法
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10024818
Jianbin Wu, Chuwei Luo, Ziyang Kang, Shuangkui Ge, Ye Xin
A coverless information hiding algorithm based on gradient matrix is introduced in this paper. Firstly, we grid the sharpened gradient matrix of an image. Then we encode the spectral radius of the gridded matrix to construct the mapping relationship between the matrix eigenvalues and random numbers. In order to improve the efficiency and security of transmission, we process the information segment by BCH (31, 21) encoder, in which redundancy check bits are added to detect and recover the errors caused by the interference in communication, thus breaking the limit that the image library has to be shared between the sender and receiver. In the meantime, splicing strategy is adopted to reduce the difficulty of building image library with the length of information sequence increasing. As the experimental results show, this proposed algorithm has a strong robustness towards glitch attack, JPEG compression attack, etc. and has a great application value in high-level secret key communication.
介绍了一种基于梯度矩阵的无覆盖信息隐藏算法。首先对图像的锐化梯度矩阵进行网格化处理。然后对网格矩阵的谱半径进行编码,构造矩阵特征值与随机数之间的映射关系。为了提高传输的效率和安全性,我们采用BCH(31,21)编码器对信息段进行处理,在编码器中加入冗余校验位来检测和恢复由于通信干扰造成的错误,从而打破了图像库必须在发送端和接收端共享的限制。同时,采用拼接策略,随着信息序列长度的增加,降低了构建图像库的难度。实验结果表明,该算法对故障攻击、JPEG压缩攻击等具有较强的鲁棒性,在高级密钥通信中具有较大的应用价值。
{"title":"A coverless information hiding algorithm based on gradient matrix","authors":"Jianbin Wu, Chuwei Luo, Ziyang Kang, Shuangkui Ge, Ye Xin","doi":"10.1504/ijcse.2020.10024818","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10024818","url":null,"abstract":"A coverless information hiding algorithm based on gradient matrix is introduced in this paper. Firstly, we grid the sharpened gradient matrix of an image. Then we encode the spectral radius of the gridded matrix to construct the mapping relationship between the matrix eigenvalues and random numbers. In order to improve the efficiency and security of transmission, we process the information segment by BCH (31, 21) encoder, in which redundancy check bits are added to detect and recover the errors caused by the interference in communication, thus breaking the limit that the image library has to be shared between the sender and receiver. In the meantime, splicing strategy is adopted to reduce the difficulty of building image library with the length of information sequence increasing. As the experimental results show, this proposed algorithm has a strong robustness towards glitch attack, JPEG compression attack, etc. and has a great application value in high-level secret key communication.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption 在线性Diffie-Hellman知识假设下的标准模型下的感知明文加密
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029387
Dongwei Gao, Hefeng Chen, Chinchen Chang
In this paper, we consider the problem of constructing new plaintext aware encryption in the standard model. A new hybrid asymmetric encryption scheme is presented using a new key encapsulation method and a data encapsulation method. To prove the presented asymmetric encryption scheme is simulatable, we put forward some new sufficient conditions for judging a group to be simulatable. By introducing a new assumption called linear Diffie-Hellman knowledge assumption, we prove the proposed hybrid asymmetric encryption scheme is PA2.
在本文中,我们考虑了在标准模型中构造新的感知明文加密的问题。采用一种新的密钥封装方法和数据封装方法,提出了一种新的混合非对称加密方案。为了证明所提出的非对称加密方案是可仿真的,我们提出了一些新的判定群是可仿真的充分条件。通过引入线性Diffie-Hellman知识假设,证明了所提出的混合非对称加密方案是PA2。
{"title":"Plaintext aware encryption in the standard model under the linear Diffie-Hellman knowledge assumption","authors":"Dongwei Gao, Hefeng Chen, Chinchen Chang","doi":"10.1504/ijcse.2020.10029387","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029387","url":null,"abstract":"In this paper, we consider the problem of constructing new plaintext aware encryption in the standard model. A new hybrid asymmetric encryption scheme is presented using a new key encapsulation method and a data encapsulation method. To prove the presented asymmetric encryption scheme is simulatable, we put forward some new sufficient conditions for judging a group to be simulatable. By introducing a new assumption called linear Diffie-Hellman knowledge assumption, we prove the proposed hybrid asymmetric encryption scheme is PA2.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130490812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Numerical solution and Taguchi experimental method for variable viscosity and non-Newtonian fluids effects on heat and mass transfer by natural convection in porous media 变粘度和非牛顿流体对多孔介质自然对流传热传质影响的数值解和Taguchi实验方法
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029385
K. Tu, K. Yih, Fu-I Chou, J. Chou
In this article, both numerical solution and Taguchi method are presented to study the variable viscosity and non-Newtonian fluids effects on coupled heat and mass transfer by free convection over a vertical permeable plate in porous media. The surface temperature, concentration of the plate, and blowing/suction velocity are uniform. The viscosity of the fluid varies inversely as a linear function of the temperature. The partial differential equations are transformed into non-similar equations and solved by Keller box method. Numerical results of the local Nusselt number and local Sherwood number are expressed in the five parameters: 1) blowing/suction parameter ξ; 2) the power-law index of non-Newtonian fluid n; 3) buoyancy ratio N; 4) Lewis number Le; 5) viscosity-variation parameter θr. The best value for confirming the maximum of the local Nusselt (Sherwood) number by the Taguchi method is 6.6328 (10.3056).
本文采用数值解法和田口法研究了变粘度和非牛顿流体对多孔介质中垂直渗透板自由对流传热传质耦合的影响。表面温度,板的浓度,吹/吸速度均匀。流体的粘度与温度成反比的线性函数。将偏微分方程转化为非相似方程,用凯勒盒法求解。局部努塞尔数和局部舍伍德数的数值结果用5个参数表示:1)吹/吸参数ξ;2)非牛顿流体n的幂律指数;3)浮力比N;4)路易斯数Le;5)粘度变化参数θr。田口法确定局部努塞尔(舍伍德)数最大值的最佳值为6.6328(10.3056)。
{"title":"Numerical solution and Taguchi experimental method for variable viscosity and non-Newtonian fluids effects on heat and mass transfer by natural convection in porous media","authors":"K. Tu, K. Yih, Fu-I Chou, J. Chou","doi":"10.1504/ijcse.2020.10029385","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029385","url":null,"abstract":"In this article, both numerical solution and Taguchi method are presented to study the variable viscosity and non-Newtonian fluids effects on coupled heat and mass transfer by free convection over a vertical permeable plate in porous media. The surface temperature, concentration of the plate, and blowing/suction velocity are uniform. The viscosity of the fluid varies inversely as a linear function of the temperature. The partial differential equations are transformed into non-similar equations and solved by Keller box method. Numerical results of the local Nusselt number and local Sherwood number are expressed in the five parameters: 1) blowing/suction parameter ξ; 2) the power-law index of non-Newtonian fluid n; 3) buoyancy ratio N; 4) Lewis number Le; 5) viscosity-variation parameter θr. The best value for confirming the maximum of the local Nusselt (Sherwood) number by the Taguchi method is 6.6328 (10.3056).","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132616064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on image of enterprise after-sales service based on text sentiment analysis 基于文本情感分析的企业售后服务形象研究
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10027465
Jin Xian, Yingyi Wu, Yonghui Dai, Bo Xu, Ying Wang
In recent years, the popularity of the internet has not only brought convenience to consumers, but also brought opportunities and challenges to enterprises. Among them, online reviews have a great impact on the enterprises, especially consumer reviews of the enterprises' after-sales service will affect the enterprises' image. In this paper, text sentiment analysis method is used for the analysis of after-sale online comments. According to the analysis results, enterprises can find the shortcomings of after-sales service and improve it. This paper provides the steps of the text sentiment analysis method, and uses the empirical data of the website to carry out the experiment. The results show that the method can effectively analyse the customer's sentiment and help the after-sales staff of the company to answer questions well, thereby improving the level of after-sales service and enterprise image.
近年来,互联网的普及不仅给消费者带来了便利,也给企业带来了机遇和挑战。其中,网上评论对企业的影响很大,尤其是消费者对企业售后服务的评论会影响企业的形象。本文采用文本情感分析法对网上售后评论进行分析。根据分析结果,企业可以发现售后服务存在的不足,并进行改进。本文给出了文本情感分析方法的步骤,并利用网站的经验数据进行了实验。结果表明,该方法可以有效地分析客户的情绪,帮助公司的售后人员很好地回答问题,从而提高售后服务水平和企业形象。
{"title":"Research on image of enterprise after-sales service based on text sentiment analysis","authors":"Jin Xian, Yingyi Wu, Yonghui Dai, Bo Xu, Ying Wang","doi":"10.1504/ijcse.2020.10027465","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10027465","url":null,"abstract":"In recent years, the popularity of the internet has not only brought convenience to consumers, but also brought opportunities and challenges to enterprises. Among them, online reviews have a great impact on the enterprises, especially consumer reviews of the enterprises' after-sales service will affect the enterprises' image. In this paper, text sentiment analysis method is used for the analysis of after-sale online comments. According to the analysis results, enterprises can find the shortcomings of after-sales service and improve it. This paper provides the steps of the text sentiment analysis method, and uses the empirical data of the website to carry out the experiment. The results show that the method can effectively analyse the customer's sentiment and help the after-sales staff of the company to answer questions well, thereby improving the level of after-sales service and enterprise image.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130027722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Two-level parallel CPU/GPU-based genetic algorithm for association rule mining 基于两级并行CPU/ gpu的关联规则挖掘遗传算法
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029405
Leila Hamdad, Zakaria Ournani, K. Benatchba, A. Bendjoudi
Genetic algorithms (GA) are widely used in the literature to extract interesting association rules. However, they are time consuming mainly due to the growing size of databases. To speed up this process, we propose two parallel GAs (ARMGPU and ARM-CPU/GPU). In ARM-GPU, parallelism is used to compute the fitness which is the most time consuming task; while, ARM-CPU/GPU proposes a two-level-based parallel GA. In the first level, the different cores of the CPU execute a GAARM on a sub-population. The second level of parallelism is used to compute the fitness, in parallel, on GPU. To validate the proposed two parallel GAs, several tests were conducted to solve well-known large ARM instances. Obtained results show that our parallel algorithms outperform state-of-the-art exact algorithms (APRIORI and FP-GROWTH) and approximate algorithms (SEGPU and ME-GPU) in terms of execution time.
遗传算法(GA)在文献中被广泛用于提取有趣的关联规则。然而,它们非常耗时,主要是因为数据库的规模越来越大。为了加快这个过程,我们提出了两个并行GAs (ARMGPU和ARM-CPU/GPU)。在ARM-GPU中,使用并行性计算适应度是最耗时的任务;而ARM-CPU/GPU则提出了一种基于两级的并行遗传算法。在第一级,CPU的不同核心在子种群上执行GAARM。第二级并行性用于在GPU上并行计算适应度。为了验证所提出的两个并行GAs,进行了几个测试,以解决众所周知的大型ARM实例。得到的结果表明,我们的并行算法在执行时间方面优于最先进的精确算法(APRIORI和FP-GROWTH)和近似算法(SEGPU和ME-GPU)。
{"title":"Two-level parallel CPU/GPU-based genetic algorithm for association rule mining","authors":"Leila Hamdad, Zakaria Ournani, K. Benatchba, A. Bendjoudi","doi":"10.1504/ijcse.2020.10029405","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029405","url":null,"abstract":"Genetic algorithms (GA) are widely used in the literature to extract interesting association rules. However, they are time consuming mainly due to the growing size of databases. To speed up this process, we propose two parallel GAs (ARMGPU and ARM-CPU/GPU). In ARM-GPU, parallelism is used to compute the fitness which is the most time consuming task; while, ARM-CPU/GPU proposes a two-level-based parallel GA. In the first level, the different cores of the CPU execute a GAARM on a sub-population. The second level of parallelism is used to compute the fitness, in parallel, on GPU. To validate the proposed two parallel GAs, several tests were conducted to solve well-known large ARM instances. Obtained results show that our parallel algorithms outperform state-of-the-art exact algorithms (APRIORI and FP-GROWTH) and approximate algorithms (SEGPU and ME-GPU) in terms of execution time.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127954630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Collaborative humanless model for automatic pothole detection and driver notification 自动坑坑检测与驾驶员通知的协同无人模型
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029388
T. Lopes, L. P. S. Dias, C. Costa, Igor Fontana De Nardin, R. Righi
The bad conditions of roads characterised by potholes increase the occurrence of accidents, which sometimes also result in the loss of human lives. In this context, this article presents the collaborative model for detection and alert of potholes (CoMDAP), which provides a distributed framework that automatically collects, analyses and shares pothole and traffic data among users and drivers without any human interaction. Our differential idea consists of using particular hardware in the vehicles to automatically detect the potholes in the roads with better accuracy. The evaluation methodology first considers a prototype executed in simulated (a toy and in-home lanes) and real (a car in a particular road) scenarios in order to observe the accuracy of detecting the potholes. Furthermore, we implement an Android application that notifies the drivers as they approach a pothole. The results were encouraging, highlighting the benefits of using CoMDAP as a counterpart to enable smart cities.
坑坑洼洼的道路条件恶劣,增加了事故的发生,有时还造成人命损失。在这种背景下,本文提出了凹坑检测和警报的协作模型(CoMDAP),该模型提供了一个分布式框架,可以在用户和驾驶员之间自动收集、分析和共享凹坑和交通数据,而无需任何人工交互。我们的差异化想法包括在车辆中使用特定的硬件,以更高的精度自动检测道路上的坑洼。评估方法首先考虑在模拟(玩具和家庭车道)和真实(特定道路上的汽车)场景中执行的原型,以观察检测凹坑的准确性。此外,我们实现了一个Android应用程序,当司机接近坑洞时通知他们。结果令人鼓舞,突出了使用CoMDAP作为对等物来实现智慧城市的好处。
{"title":"Collaborative humanless model for automatic pothole detection and driver notification","authors":"T. Lopes, L. P. S. Dias, C. Costa, Igor Fontana De Nardin, R. Righi","doi":"10.1504/ijcse.2020.10029388","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029388","url":null,"abstract":"The bad conditions of roads characterised by potholes increase the occurrence of accidents, which sometimes also result in the loss of human lives. In this context, this article presents the collaborative model for detection and alert of potholes (CoMDAP), which provides a distributed framework that automatically collects, analyses and shares pothole and traffic data among users and drivers without any human interaction. Our differential idea consists of using particular hardware in the vehicles to automatically detect the potholes in the roads with better accuracy. The evaluation methodology first considers a prototype executed in simulated (a toy and in-home lanes) and real (a car in a particular road) scenarios in order to observe the accuracy of detecting the potholes. Furthermore, we implement an Android application that notifies the drivers as they approach a pothole. The results were encouraging, highlighting the benefits of using CoMDAP as a counterpart to enable smart cities.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"132 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127590685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-group e-commerce signature scheme based on quantum teleportation 基于量子隐形传态的多组电子商务签名方案
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029384
Jinqiao Dai, Shibin Zhang, Jinyue Xia
In this paper, we propose a multi-group e-commerce signature scheme based on quantum teleportation and Bell states. Compared with the recent quantum group signature scheme, what our scheme has optimised is the traditional signature model with only one group manager and the utilisation of quantum resources. By setting up different group managers in different groups, the scheme promotes the traditional signature model into a more practical situation and can be easily used in e-payment system. In addition, the quantum teleportation and Pauli operations based on the Bell states are used in the transaction process, and these techniques can also be easily implemented under practical situations. Finally, the security analysis shows that the scheme can defend against different attacks from internal and external sources, including intercepting resend attacks and entanglement attacks. It also proves that the scheme is reliable, safe and effective facing with denial and forgery.
本文提出了一种基于量子隐形传态和贝尔态的多组电子商务签名方案。与目前的量子群签名方案相比,本方案优化了只有一个组管理器的传统签名模型,并且利用了量子资源。该方案通过在不同的组中设置不同的组管理员,使传统的签名模型更加实用,可以方便地应用于电子支付系统中。此外,在交易过程中使用了基于贝尔态的量子隐形传态和泡利操作,这些技术在实际情况下也很容易实现。最后,安全性分析表明,该方案可以防御来自内部和外部的不同攻击,包括拦截重发攻击和纠缠攻击。验证了该方案在面对拒绝和伪造时的可靠性、安全性和有效性。
{"title":"A multi-group e-commerce signature scheme based on quantum teleportation","authors":"Jinqiao Dai, Shibin Zhang, Jinyue Xia","doi":"10.1504/ijcse.2020.10029384","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029384","url":null,"abstract":"In this paper, we propose a multi-group e-commerce signature scheme based on quantum teleportation and Bell states. Compared with the recent quantum group signature scheme, what our scheme has optimised is the traditional signature model with only one group manager and the utilisation of quantum resources. By setting up different group managers in different groups, the scheme promotes the traditional signature model into a more practical situation and can be easily used in e-payment system. In addition, the quantum teleportation and Pauli operations based on the Bell states are used in the transaction process, and these techniques can also be easily implemented under practical situations. Finally, the security analysis shows that the scheme can defend against different attacks from internal and external sources, including intercepting resend attacks and entanglement attacks. It also proves that the scheme is reliable, safe and effective facing with denial and forgery.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"361 14","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113956199","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unambiguous discrimination of binary coherent states 二元相干态的无二义辨别
Pub Date : 2020-05-08 DOI: 10.1504/ijcse.2020.10029391
Wenbin Yu, Zijia Xiong, Shanshan Rong, Yang Liu, Siyao Wang, Yinsong Xu, A. Liu
Considering quantum detection, there are two different ways to make a measurement on signals set. One is minimum error discrimination and another is unambiguous states discrimination. In this work, we study the unambiguous state discrimination of coherent states. The quantum measurement model investigated is based on binary signals. All necessary positive-operator valued measurements are established to implement the quantum measurements in non-ambiguity way. The conclusive probability and inconclusive probability for the unambiguous discrimination of both on-off keying and binary-phase-shifting keying modulations are derived rigorously to show the measurement performance of proposed detection method theoretically.
考虑到量子探测,有两种不同的方法对信号集进行测量。一种是最小误差判别法,另一种是无二义状态判别法。在这项工作中,我们研究了相干态的无二义状态判别。所研究的量子测量模型基于二进制信号。建立了所有必要的正算符值测量值,以无歧义的方式实现量子测量。严格推导了开关键控调制和二相移键控调制的明确判别的确定概率和不确定概率,从理论上说明了所提检测方法的测量性能。
{"title":"Unambiguous discrimination of binary coherent states","authors":"Wenbin Yu, Zijia Xiong, Shanshan Rong, Yang Liu, Siyao Wang, Yinsong Xu, A. Liu","doi":"10.1504/ijcse.2020.10029391","DOIUrl":"https://doi.org/10.1504/ijcse.2020.10029391","url":null,"abstract":"Considering quantum detection, there are two different ways to make a measurement on signals set. One is minimum error discrimination and another is unambiguous states discrimination. In this work, we study the unambiguous state discrimination of coherent states. The quantum measurement model investigated is based on binary signals. All necessary positive-operator valued measurements are established to implement the quantum measurements in non-ambiguity way. The conclusive probability and inconclusive probability for the unambiguous discrimination of both on-off keying and binary-phase-shifting keying modulations are derived rigorously to show the measurement performance of proposed detection method theoretically.","PeriodicalId":340410,"journal":{"name":"Int. J. Comput. Sci. Eng.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130999939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Int. J. Comput. Sci. Eng.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1