首页 > 最新文献

Int. J. Secur. Priv. Pervasive Comput.最新文献

英文 中文
Linear Regression on Internet Banking Adoption Dataset Using WEKA 基于WEKA的网上银行采用数据集的线性回归
Pub Date : 2020-10-01 DOI: 10.4018/ijsppc.2020100103
N. Verma, Deepika Pathak
Data mining or knowledge discovery in the database (KDD) is an excellent process to find out valuable information from a large collection of data. Data mining has successfully been used in different fields such as medical, marketing, banking, business, weather forecasting, etc. For the banking industry, data mining, its importance, and its techniques are vital because it helps to extract useful information from a large amount of historical data which enable to make useful decisions. Data mining is very useful for banking sector for better acquiring and targeting new customers and helps to analyze customers and their transaction behaviors. In the recent era, a new technology that has achieved considerable attention, especially among banks, is internet banking. Its large scope of applications, its advantages brings an immoderate change in a common human's life. Linear regression is one of the most commonly used and applied data mining techniques. Linear regression is really a very fast and simple regression algorithm and can give the best performance if the output variable of your data is a linear grouping of your inputs. In this paper, the linear regression is applied on internet banking adoption dataset in order to compute the weights or coefficients of linear expression and provides the predicted class value. The analysis here is done with the help of WEKA tool for data mining.
数据挖掘或数据库中的知识发现(KDD)是从大量数据中发现有价值信息的一个极好的过程。数据挖掘已经成功地应用于不同的领域,如医疗、营销、银行、商业、天气预报等。对于银行业来说,数据挖掘及其重要性和技术至关重要,因为它有助于从大量历史数据中提取有用的信息,从而做出有用的决策。数据挖掘对银行业更好地获取和定位新客户非常有用,有助于分析客户及其交易行为。在最近的时代,一项新技术已经取得了相当大的关注,特别是在银行,是网上银行。它的应用范围大,它的优点给人类的日常生活带来了翻天覆地的变化。线性回归是最常用和应用的数据挖掘技术之一。线性回归实际上是一种非常快速和简单的回归算法,如果数据的输出变量是输入的线性分组,它可以提供最佳性能。本文将线性回归应用于网上银行采用数据集,计算线性表达式的权重或系数,并给出预测的类值。这里的分析是在WEKA数据挖掘工具的帮助下完成的。
{"title":"Linear Regression on Internet Banking Adoption Dataset Using WEKA","authors":"N. Verma, Deepika Pathak","doi":"10.4018/ijsppc.2020100103","DOIUrl":"https://doi.org/10.4018/ijsppc.2020100103","url":null,"abstract":"Data mining or knowledge discovery in the database (KDD) is an excellent process to find out valuable information from a large collection of data. Data mining has successfully been used in different fields such as medical, marketing, banking, business, weather forecasting, etc. For the banking industry, data mining, its importance, and its techniques are vital because it helps to extract useful information from a large amount of historical data which enable to make useful decisions. Data mining is very useful for banking sector for better acquiring and targeting new customers and helps to analyze customers and their transaction behaviors. In the recent era, a new technology that has achieved considerable attention, especially among banks, is internet banking. Its large scope of applications, its advantages brings an immoderate change in a common human's life. Linear regression is one of the most commonly used and applied data mining techniques. Linear regression is really a very fast and simple regression algorithm and can give the best performance if the output variable of your data is a linear grouping of your inputs. In this paper, the linear regression is applied on internet banking adoption dataset in order to compute the weights or coefficients of linear expression and provides the predicted class value. The analysis here is done with the help of WEKA tool for data mining.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122456137","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Survey of Online Identity Management Techniques on Blockchain b区块链网络身份管理技术调查
Pub Date : 2020-10-01 DOI: 10.4018/ijsppc.2020100102
Monica Gahlawat
Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns. Blockchain-based systems provide the possibility for their users to insert their data in this distributed ledger. Users can trust the blockchain as it is leveraging consensus mechanisms to validate and gather the transactions in immutable blocks. The transparent and decentralized nature of the blockchain network enables the development of a non-refutable and unbreakable record of data, which is the fundamental feature of many applications, such as identity management.
安全身份管理是网络安全领域中有争议的话题之一。用户需要依靠第三方提供商来管理他们的个人信息,这是一个很大的安全问题。传统的身份系统通常存在单点故障、缺乏互操作性和隐私问题,例如鼓励大量数据收集和用户跟踪。区块链技术有潜力支持具有内置控制和同意机制的新型数据所有权和治理模型,这可能通过减轻这些担忧而使用户和企业受益。基于区块链的系统为用户提供了在这个分布式账本中插入数据的可能性。用户可以信任区块链,因为它利用共识机制来验证和收集不可变块中的交易。区块链网络的透明和去中心化特性使其能够开发不可辩驳和不可破坏的数据记录,这是许多应用程序的基本特征,例如身份管理。
{"title":"Survey of Online Identity Management Techniques on Blockchain","authors":"Monica Gahlawat","doi":"10.4018/ijsppc.2020100102","DOIUrl":"https://doi.org/10.4018/ijsppc.2020100102","url":null,"abstract":"Secure identity management is one of the controversial topics in the cybersecurity landscape. The user needs to rely on third-party providers for managing their personal information, which is a big security concern. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns. Blockchain-based systems provide the possibility for their users to insert their data in this distributed ledger. Users can trust the blockchain as it is leveraging consensus mechanisms to validate and gather the transactions in immutable blocks. The transparent and decentralized nature of the blockchain network enables the development of a non-refutable and unbreakable record of data, which is the fundamental feature of many applications, such as identity management.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127768957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks 车载Ad-Hoc网络中DDoS攻击的影响评估
Pub Date : 2020-10-01 DOI: 10.4018/ijsppc.2020100101
K. Adhikary, S. Bhushan, Sunil Kumar, Kamlesh Dutta
The presence of either malicious vehicles or inaccessibility of network services makes vehicular ad-hoc networks (VANETs) easy targets for denial of service (DoS) attacks. The sole purpose of DoS attacks is to prevent the intended users from accessing the available resources and services. When the DoS attack is carried out by multiple vehicles distributed throughout the network, it is referred as distributed DoS (DDoS) attack. A lot of works have been done by researchers in securing the vehicular communication against the DDoS attacks. In this paper, efforts have been made to simulate the DDoS attacks in VANETs as well as to study their impact on the performance of networks. The experimental results are presented using six important metrics, which are collision, jitter, delay, packet drop, ratio-in-out, and throughput. The experimental results show that the impact of distributed DoS (DDoS) attack on networks performance is very critical and must be addressed to ensure the smooth functioning of networks.
恶意车辆的存在或网络服务的不可访问性使得车辆自组织网络(vanet)容易成为拒绝服务(DoS)攻击的目标。DoS攻击的唯一目的是阻止目标用户访问可用的资源和服务。当DoS攻击由分布在整个网络中的多辆车实施时,称为分布式DDoS (distributed DoS)攻击。在保护车载通信免受DDoS攻击方面,研究人员做了大量的工作。本文对vanet中的DDoS攻击进行了仿真,并研究了DDoS攻击对网络性能的影响。使用碰撞、抖动、延迟、丢包、入出比和吞吐量六个重要指标给出了实验结果。实验结果表明,分布式DoS (distributed DoS, DDoS)攻击对网络性能的影响非常严重,必须加以解决,以确保网络的正常运行。
{"title":"Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks","authors":"K. Adhikary, S. Bhushan, Sunil Kumar, Kamlesh Dutta","doi":"10.4018/ijsppc.2020100101","DOIUrl":"https://doi.org/10.4018/ijsppc.2020100101","url":null,"abstract":"The presence of either malicious vehicles or inaccessibility of network services makes vehicular ad-hoc networks (VANETs) easy targets for denial of service (DoS) attacks. The sole purpose of DoS attacks is to prevent the intended users from accessing the available resources and services. When the DoS attack is carried out by multiple vehicles distributed throughout the network, it is referred as distributed DoS (DDoS) attack. A lot of works have been done by researchers in securing the vehicular communication against the DDoS attacks. In this paper, efforts have been made to simulate the DDoS attacks in VANETs as well as to study their impact on the performance of networks. The experimental results are presented using six important metrics, which are collision, jitter, delay, packet drop, ratio-in-out, and throughput. The experimental results show that the impact of distributed DoS (DDoS) attack on networks performance is very critical and must be addressed to ensure the smooth functioning of networks.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117289371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Identity and Access Management Server (KeyCloak) 身份与访问管理服务器(KeyCloak)技术综述
Pub Date : 2020-07-01 DOI: 10.4018/ijsppc.2020070104
D. Divyabharathi, Nagaraj G. Cholli
KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.
KeyCloak是一个开源的身份和访问管理安排,专注于当前的应用程序和管理。它使得用几乎零代码保护应用程序和管理变得简单。身份和访问管理服务器组件为应用程序提供集中的用户管理、身份验证和单点登录身份代理用户联合、社会登录、客户端适配器、管理控制台和帐户管理控制台。通过KeyCloak,用户管理和认证功能可以与外部管理系统(如LDAP或active directory)集成。KeyCloak为身份验证和会话管理提供了单点登录基础设施。在本文中,作者介绍了KeyCloak的概述,给出了KeyCloak的目标和特点,并在服务器之间进行了比较。他们还提出了KeyCloak协议。最后,定义了KeyCloak的优点。
{"title":"A Review on Identity and Access Management Server (KeyCloak)","authors":"D. Divyabharathi, Nagaraj G. Cholli","doi":"10.4018/ijsppc.2020070104","DOIUrl":"https://doi.org/10.4018/ijsppc.2020070104","url":null,"abstract":"KeyCloak is an open source identity and access management arrangement focused on present day applications and administrations. It makes it simple to protect applications and administrations with next to zero code. The identity and access management server component provides centralized user management, authentication, and single sign-on identity brokering user federation, social login, client adapters, an admin console, and an account management console for the applications. With KeyCloak, the user management and authentication functions may be integrated with an externally managed system, such as LDAP or active directory. KeyCloak provides single sign-on infrastructure for authentication and session management. In this paper, the authors present an overview of KeyCloak that gives the objectives and features of KeyCloak and comparisons between the servers. They also present protocols of KeyCloak. Finally, benefits of KeyCloak are defined.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130116713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
UML-Based Data Warehouse Design Using Temporal Dimensional Modelling 使用时间维度建模的基于uml的数据仓库设计
Pub Date : 2020-07-01 DOI: 10.4018/ijsppc.2020070101
G. Reddy, Suneetha Chittineni
The design of a data warehouse system deals with tasks such as data source administration, ETL processing, multidimensional modelling, data mart specification, and end-user tool development. In the last decade, numerous techniques have been presented to cover all the aspects of DW. However, none of these techniques stated the recent necessities of DW like visualization, temporal dimensions, record keeping, and so on. To overcome these issues, this paper proposes a UML based DW with temporal dimensions. This framework designs time-dependent DW that allows end-users to store history of variations for long term. Besides, it authorizes to visualize the business goals of organizations in the form of attribute tree via UML, which is designed after receiving user necessities and later reconciling with temporal variables. The implementation of proposed technique is detailed with university education database for quality improvement. The proposed technique is found to be useful in terms of temporal dimension, long-term record keeping, and easy to make decision goals through attribute trees.
数据仓库系统的设计处理诸如数据源管理、ETL处理、多维建模、数据集市规范和最终用户工具开发等任务。在过去的十年中,已经出现了许多技术来涵盖数据仓库的所有方面。然而,这些技术都没有说明数据仓库最近的需求,比如可视化、时间维度、记录保存等等。为了克服这些问题,本文提出了一种基于UML的时间维数据仓库。该框架设计了与时间相关的数据仓库,允许最终用户长期存储变化的历史。此外,它授权通过UML将组织的业务目标以属性树的形式可视化,属性树是在接受用户需求后设计的,稍后与时间变量进行协调。以高校教育数据库为例,详细介绍了该技术的实施情况。结果表明,该方法具有时间维、长期记录保存、便于通过属性树制定决策目标等优点。
{"title":"UML-Based Data Warehouse Design Using Temporal Dimensional Modelling","authors":"G. Reddy, Suneetha Chittineni","doi":"10.4018/ijsppc.2020070101","DOIUrl":"https://doi.org/10.4018/ijsppc.2020070101","url":null,"abstract":"The design of a data warehouse system deals with tasks such as data source administration, ETL processing, multidimensional modelling, data mart specification, and end-user tool development. In the last decade, numerous techniques have been presented to cover all the aspects of DW. However, none of these techniques stated the recent necessities of DW like visualization, temporal dimensions, record keeping, and so on. To overcome these issues, this paper proposes a UML based DW with temporal dimensions. This framework designs time-dependent DW that allows end-users to store history of variations for long term. Besides, it authorizes to visualize the business goals of organizations in the form of attribute tree via UML, which is designed after receiving user necessities and later reconciling with temporal variables. The implementation of proposed technique is detailed with university education database for quality improvement. The proposed technique is found to be useful in terms of temporal dimension, long-term record keeping, and easy to make decision goals through attribute trees.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127830127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of the Dynamic Pricing Model in Cloud 云环境下动态定价模型的评价
Pub Date : 2020-07-01 DOI: 10.4018/ijsppc.2020070102
Meetu Kandpal, Kalyani Patel
Many of the companies started moving towards cloud computing because of its characteristics like pay as you go, easy to use, scalable, multi-tenant, secure, etc. There are many cloud providers providing cloud services over the internet. There are number of pricing policies for the user. These pricing policies can be categorised as static and dynamic pricing. This paper represents the enhancement and evaluation of the proposed dynamic resource pricing model for cloud resources based on the consumer behaviour. For model evaluation, one tail two sample t-test has been used. The results show the model will be helpful to the cloud provider for profit maximisation.
许多公司开始转向云计算,因为它的特点,如随用随付、易于使用、可扩展、多租户、安全等。有许多云提供商通过互联网提供云服务。有许多针对用户的定价策略。这些定价策略可分为静态定价和动态定价。本文对基于消费者行为的云资源动态定价模型进行了改进和评价。模型评价采用单尾两样本t检验。结果表明,该模型有助于云提供商实现利润最大化。
{"title":"Evaluation of the Dynamic Pricing Model in Cloud","authors":"Meetu Kandpal, Kalyani Patel","doi":"10.4018/ijsppc.2020070102","DOIUrl":"https://doi.org/10.4018/ijsppc.2020070102","url":null,"abstract":"Many of the companies started moving towards cloud computing because of its characteristics like pay as you go, easy to use, scalable, multi-tenant, secure, etc. There are many cloud providers providing cloud services over the internet. There are number of pricing policies for the user. These pricing policies can be categorised as static and dynamic pricing. This paper represents the enhancement and evaluation of the proposed dynamic resource pricing model for cloud resources based on the consumer behaviour. For model evaluation, one tail two sample t-test has been used. The results show the model will be helpful to the cloud provider for profit maximisation.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133934456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Root Locus Correction Algorithm in Automatic Control System 自动控制系统中根轨迹校正算法的研究
Pub Date : 2020-07-01 DOI: 10.4018/ijsppc.2020070103
Weifang Zhai, Juan Feng
Aiming at the stability control of the automatic control system, this paper proposes a root locus correction scheme. By establishing the mathematical model of the control object and using the root locus correction method in the classical control theory, the design of the control system is completed. The simulation experiment of the control system is carried out in the MATLAB environment, and the key points of the scheme are summarized. The simulation results show that the scheme not only successfully achieves the stability control of the system, but also meets the expected performance index, which fully proves its correctness and effectiveness.
针对自动控制系统的稳定性控制问题,提出了一种根轨迹校正方案。通过建立控制对象的数学模型,利用经典控制理论中的根轨迹修正法,完成了控制系统的设计。在MATLAB环境下对控制系统进行了仿真实验,总结了该方案的要点。仿真结果表明,该方案不仅成功地实现了系统的稳定控制,而且达到了预期的性能指标,充分证明了其正确性和有效性。
{"title":"Research on Root Locus Correction Algorithm in Automatic Control System","authors":"Weifang Zhai, Juan Feng","doi":"10.4018/ijsppc.2020070103","DOIUrl":"https://doi.org/10.4018/ijsppc.2020070103","url":null,"abstract":"Aiming at the stability control of the automatic control system, this paper proposes a root locus correction scheme. By establishing the mathematical model of the control object and using the root locus correction method in the classical control theory, the design of the control system is completed. The simulation experiment of the control system is carried out in the MATLAB environment, and the key points of the scheme are summarized. The simulation results show that the scheme not only successfully achieves the stability control of the system, but also meets the expected performance index, which fully proves its correctness and effectiveness.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116708618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm 基于聚类算法的视频隐写新混合方案
Pub Date : 2020-04-01 DOI: 10.4018/ijsppc.2020040103
A. Fatnassi, H. Gharsellaoui, Sadok Bouamama
Through the advent of digital information, information security has taken on a vital role. Use of the internet freely for contact has increased the attacks on users. Data protection is the present problem relating to privacy and security during storage and communication. This paper deals with a multilayered protected channel's proposal to transfer confidential data/video through a channel. The hidden video is initially encrypted using the algorithm NOLSB. The created cipher video is hidden in a larger sized video file. In addition, this video file is encrypted using the (m, k) firm technique to optimize resource efficiency and bandwidth optimization. Video shares are then sent through all the network's channels to ensure security. This approach ensures that video files could be retrieved at the end receiver even though any shares were lost over the network, without the sender needing to resend the video file.
随着数字信息时代的到来,信息安全起着至关重要的作用。自由使用互联网进行联系增加了对用户的攻击。数据保护是当前的问题,涉及存储和通信过程中的隐私和安全。本文讨论了一种多层保护信道通过信道传输机密数据/视频的方案。隐藏视频最初使用NOLSB算法加密。创建的密码视频隐藏在一个更大的视频文件中。此外,该视频文件使用(m, k) firm技术进行加密,以优化资源效率和带宽优化。然后视频共享通过所有网络通道发送,以确保安全。这种方法确保即使在网络上丢失了任何共享,也可以在终端接收方检索视频文件,而不需要发送方重新发送视频文件。
{"title":"New Hybrid Proposed Solution for Video Steganography Based on Clustering Algorithm","authors":"A. Fatnassi, H. Gharsellaoui, Sadok Bouamama","doi":"10.4018/ijsppc.2020040103","DOIUrl":"https://doi.org/10.4018/ijsppc.2020040103","url":null,"abstract":"Through the advent of digital information, information security has taken on a vital role. Use of the internet freely for contact has increased the attacks on users. Data protection is the present problem relating to privacy and security during storage and communication. This paper deals with a multilayered protected channel's proposal to transfer confidential data/video through a channel. The hidden video is initially encrypted using the algorithm NOLSB. The created cipher video is hidden in a larger sized video file. In addition, this video file is encrypted using the (m, k) firm technique to optimize resource efficiency and bandwidth optimization. Video shares are then sent through all the network's channels to ensure security. This approach ensures that video files could be retrieved at the end receiver even though any shares were lost over the network, without the sender needing to resend the video file.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115824603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Ant Colony Optimization With Tabu Search Ability 具有禁忌搜索能力的蚁群优化算法研究
Pub Date : 2020-04-01 DOI: 10.4018/ijsppc.2020040101
Li Xu
TSP (traveling salesman problem) is a classical problem in combinatorial optimization. It's not totally solved; the route number and the number of cities has increased exponentially, so we couldn't find the best solution easily. This paper does a lot research of tabu search (TS) besides AA and proposes a new algorithm. Making use of TS's advantages, the new proposed algorithm's performance is meliorated. Firstly, aiming at solving AA's slow convergence, the authors increase the pheromone of the best route, decrease the pheromone of the worst route, to increase the conductive ability of the pheromone to the algorithm. Secondly, aiming at solving AA's being premature, this paper introduces TS into AS's every iteration. The TS can help the algorithm find a better solution. So, the new algorithm's convergence speed is quickened, and its performance is improved. At last, this paper applied the algorithm to the traveling salesman problem to test its performances. The simulation results show that the new algorithm could find optimum solutions more effectively in time and quantity.
旅行商问题(TSP)是组合优化中的一个经典问题。这还没有完全解决;线路数量和城市数量呈指数级增长,因此我们不容易找到最佳解决方案。本文在对禁忌搜索进行深入研究的基础上,提出了一种新的禁忌搜索算法。利用TS的优点,改进了算法的性能。首先,针对AA算法收敛缓慢的问题,增加最佳路径的信息素,降低最差路径的信息素,增加信息素对算法的传导能力。其次,针对AA的不成熟,在AS的每次迭代中引入TS。TS可以帮助算法找到更好的解。从而加快了算法的收敛速度,提高了算法的性能。最后,将该算法应用于旅行商问题,验证了算法的性能。仿真结果表明,新算法能在时间和数量上更有效地找到最优解。
{"title":"Research on Ant Colony Optimization With Tabu Search Ability","authors":"Li Xu","doi":"10.4018/ijsppc.2020040101","DOIUrl":"https://doi.org/10.4018/ijsppc.2020040101","url":null,"abstract":"TSP (traveling salesman problem) is a classical problem in combinatorial optimization. It's not totally solved; the route number and the number of cities has increased exponentially, so we couldn't find the best solution easily. This paper does a lot research of tabu search (TS) besides AA and proposes a new algorithm. Making use of TS's advantages, the new proposed algorithm's performance is meliorated. Firstly, aiming at solving AA's slow convergence, the authors increase the pheromone of the best route, decrease the pheromone of the worst route, to increase the conductive ability of the pheromone to the algorithm. Secondly, aiming at solving AA's being premature, this paper introduces TS into AS's every iteration. The TS can help the algorithm find a better solution. So, the new algorithm's convergence speed is quickened, and its performance is improved. At last, this paper applied the algorithm to the traveling salesman problem to test its performances. The simulation results show that the new algorithm could find optimum solutions more effectively in time and quantity.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129889110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design for Software Risk Management Using Soft Computing and Simulated Biological Approach 基于软计算和模拟生物学方法的软件风险管理设计
Pub Date : 2020-04-01 DOI: 10.4018/ijsppc.2020040104
Alankrita Aggarwal, Dr. Kanwalvir Singh Dhindsa, P. K. Suri
The process of software evaluation is one of the key tasks that are addressed by the quality assurance teams so that the risks in the software suite can be identified and can be removed with prior notifications. Different types of metrics can be used in defect prediction models, and widely used metrics are source code and process metrics. A simulated environment for the entire process shall be generated for multiple scenarios and parameters so that the results and conclusion can be depicted in an effective way. The focus of research is to develop a narrative architecture and design for software risk management using soft computing and nature-inspired approach. The proposed approach titled simulated biological reaction (SBR) is expected to have the effectual results on multiple parameters with the flavor of soft computing-based optimization. The proposed approach shall be integrating the simulation of microbiological process in different substances and elements to produce a new substance.
软件评估过程是质量保证团队处理的关键任务之一,这样软件套件中的风险就可以被识别出来,并且可以通过事先通知来消除。在缺陷预测模型中可以使用不同类型的度量,广泛使用的度量是源代码和过程度量。需要针对多个场景和参数生成整个过程的模拟环境,以便有效地描述结果和结论。研究的重点是利用软计算和自然启发的方法为软件风险管理开发一个叙事架构和设计。所提出的模拟生物反应(SBR)方法有望在多参数下获得有效的结果,并具有基于软计算的优化风格。建议的方法应该是综合模拟不同物质和元素中的微生物过程,以产生一种新的物质。
{"title":"Design for Software Risk Management Using Soft Computing and Simulated Biological Approach","authors":"Alankrita Aggarwal, Dr. Kanwalvir Singh Dhindsa, P. K. Suri","doi":"10.4018/ijsppc.2020040104","DOIUrl":"https://doi.org/10.4018/ijsppc.2020040104","url":null,"abstract":"The process of software evaluation is one of the key tasks that are addressed by the quality assurance teams so that the risks in the software suite can be identified and can be removed with prior notifications. Different types of metrics can be used in defect prediction models, and widely used metrics are source code and process metrics. A simulated environment for the entire process shall be generated for multiple scenarios and parameters so that the results and conclusion can be depicted in an effective way. The focus of research is to develop a narrative architecture and design for software risk management using soft computing and nature-inspired approach. The proposed approach titled simulated biological reaction (SBR) is expected to have the effectual results on multiple parameters with the flavor of soft computing-based optimization. The proposed approach shall be integrating the simulation of microbiological process in different substances and elements to produce a new substance.","PeriodicalId":344690,"journal":{"name":"Int. J. Secur. Priv. Pervasive Comput.","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123262819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Int. J. Secur. Priv. Pervasive Comput.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1