首页 > 最新文献

Recent Advances in Computer Science and Communications最新文献

英文 中文
ILAPU-Q: An Improved Lightweight Authentication Protocol for IoTBased on U-Quark Hash Function ILAPU-Q:基于 U 夸克哈希函数的改进型物联网轻量级身份验证协议
Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.2174/0126662558274597231204114801
J. Jebrane, S. Lazaar
In the last decades, the development of Internet activities has beensignificantly accelerated, particularly with the emergence of the Internet of Things (IoT). Heterogeneous devices in the IoT can seamlessly and feasibly inter-connect with each other without human interaction. Due to this revolution, many applications have been adopted in the arena of smart healthcare, e-commerce, environmental and habitat monitoring, etc. In order topromote and facilitate people's standards of living around the world. However, these unbounded applications bring more challenges to the storage capabilities of devices, and their securityand privacy preservation. Moreover, security issues suffer from weak authentication protocols.To address these issues, suitable and secure lightweight mutual authenticationschemes based on Elliptic Curve Cryptography (ECC) are required for the approval of IdentityManagement (IDM) of devices in the IoT. In this paper, we will propose an improved mutualauthentication scheme based on ECC, coupled with a relevant seminal work considered as areference in the field. This scheme is combined with U-Quark, a lightweight hash function, toguarantee the security needed in the IoT environment.We will compare our amended protocol with a seminal scheme as an established reference in terms of computation cost, storage cost, and executing CPU time to demonstrate thatour version can ensure the most favorable performance during the authentication process.Finally, our proposed mutual authentication scheme has demonstrated its effectiveness in enhancing the security of IoT devices when compared to the seminal work in thesame computational environment.
过去几十年来,互联网活动的发展速度明显加快,尤其是随着物联网(IoT)的出现。物联网中的异构设备可以无缝、可行地相互连接,无需人工交互。在这场革命的推动下,智能医疗、电子商务、环境和人居监测等领域出现了许多应用。以促进和便利世界各地人们的生活水平。然而,这些无限制的应用给设备的存储能力及其安全性和隐私保护带来了更多挑战。为了解决这些问题,物联网设备的身份管理(IDM)审批需要基于椭圆曲线加密法(ECC)的合适而安全的轻量级相互验证方案。在本文中,我们将提出一种基于椭圆曲线加密算法的改进型相互验证方案,并结合被视为该领域参考文献的相关开创性工作。我们将在计算成本、存储成本和执行 CPU 时间方面,将我们的改进协议与作为既定参考的开创性方案进行比较,以证明我们的版本能够在验证过程中确保最有利的性能。最后,在相同的计算环境下,与开创性工作相比,我们提出的相互验证方案证明了它在增强物联网设备安全性方面的有效性。
{"title":"ILAPU-Q: An Improved Lightweight Authentication Protocol for IoT\u0000Based on U-Quark Hash Function","authors":"J. Jebrane, S. Lazaar","doi":"10.2174/0126662558274597231204114801","DOIUrl":"https://doi.org/10.2174/0126662558274597231204114801","url":null,"abstract":"\u0000\u0000In the last decades, the development of Internet activities has been\u0000significantly accelerated, particularly with the emergence of the Internet of Things (IoT). Heterogeneous devices in the IoT can seamlessly and feasibly inter-connect with each other without human interaction. Due to this revolution, many applications have been adopted in the arena of smart healthcare, e-commerce, environmental and habitat monitoring, etc. In order to\u0000promote and facilitate people's standards of living around the world. However, these unbounded applications bring more challenges to the storage capabilities of devices, and their security\u0000and privacy preservation. Moreover, security issues suffer from weak authentication protocols.\u0000\u0000\u0000\u0000To address these issues, suitable and secure lightweight mutual authentication\u0000schemes based on Elliptic Curve Cryptography (ECC) are required for the approval of Identity\u0000Management (IDM) of devices in the IoT. In this paper, we will propose an improved mutual\u0000authentication scheme based on ECC, coupled with a relevant seminal work considered as a\u0000reference in the field. This scheme is combined with U-Quark, a lightweight hash function, to\u0000guarantee the security needed in the IoT environment.\u0000\u0000\u0000\u0000We will compare our amended protocol with a seminal scheme as an established reference in terms of computation cost, storage cost, and executing CPU time to demonstrate that\u0000our version can ensure the most favorable performance during the authentication process.\u0000\u0000\u0000\u0000Finally, our proposed mutual authentication scheme has demonstrated its effectiveness in enhancing the security of IoT devices when compared to the seminal work in the\u0000same computational environment.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139009219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security Trends in Internet-of-things for Ambient Assistive Living: A Review 用于环境辅助生活的物联网的安全趋势:综述
Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.2174/0126662558270314231129051456
Ankit D. Patel, R. Jhaveri, Kaushal A. Shah, Ashish D. Patel, Rajkumar Singh Rathore, Manish Paliwal, Kumar Abhishek, Dhavalkumar Thakker
The Internet of Things (IoT) has revolutionized our society and become indispensable to modern existence. The IoT allows users to access their electronic gadgets from any location. The widespread adoption of IoT across sectors, from manufacturing to surveillance to elder care, has contributed to its rising profile. New security risks and challenges arise with thegrowth of the IoT. With the development of IoT, the likelihood of an attack by hackers has increased. The burden of addressing these dangers falls on researchers and security professionals.This article looks into the challenges of IoT security in a real-world Ambient Assisted Living(AAL) environment. This work discusses the numerous security attacks employed by cybercriminals in AAL IoT. In addition, this research investigates the varied responses to the risks.We discussed the state-of-the-art technologies available for protecting AAL IoT networks. Thiswork analyses and compares the majority of the latest technologies available. In conclusion, weoffer a few suggestions for where the field could go from the current scenario
物联网(IoT)已经彻底改变了我们的社会,成为现代生活不可或缺的一部分。物联网允许用户在任何地点访问他们的电子设备。物联网在各行各业的广泛应用,从制造到监控再到老年护理,使其知名度不断提高。物联网的发展带来了新的安全风险和挑战。随着物联网的发展,黑客攻击的可能性也在增加。应对这些危险的重任落在了研究人员和安全专业人员的肩上。本文探讨了现实世界中环境辅助生活(AAL)环境中物联网安全所面临的挑战。这项工作讨论了网络犯罪分子在 AAL 物联网中使用的大量安全攻击。此外,本研究还调查了针对风险的各种应对措施。我们讨论了用于保护 AAL 物联网网络的最新技术。本研究分析并比较了现有的大多数最新技术。最后,我们就该领域在当前情况下的发展方向提出了几点建议
{"title":"Security Trends in Internet-of-things for Ambient Assistive Living: A Review","authors":"Ankit D. Patel, R. Jhaveri, Kaushal A. Shah, Ashish D. Patel, Rajkumar Singh Rathore, Manish Paliwal, Kumar Abhishek, Dhavalkumar Thakker","doi":"10.2174/0126662558270314231129051456","DOIUrl":"https://doi.org/10.2174/0126662558270314231129051456","url":null,"abstract":"\u0000\u0000The Internet of Things (IoT) has revolutionized our society and become indispensable to modern existence. The IoT allows users to access their electronic gadgets from any location. The widespread adoption of IoT across sectors, from manufacturing to surveillance to elder care, has contributed to its rising profile. New security risks and challenges arise with the\u0000growth of the IoT. With the development of IoT, the likelihood of an attack by hackers has increased. The burden of addressing these dangers falls on researchers and security professionals.\u0000This article looks into the challenges of IoT security in a real-world Ambient Assisted Living\u0000(AAL) environment. This work discusses the numerous security attacks employed by cybercriminals in AAL IoT. In addition, this research investigates the varied responses to the risks.\u0000We discussed the state-of-the-art technologies available for protecting AAL IoT networks. This\u0000work analyses and compares the majority of the latest technologies available. In conclusion, we\u0000offer a few suggestions for where the field could go from the current scenario\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139007688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Statistical and Deep Learning Techniques for TemperatureForecasting 气温预测的统计和深度学习技术分析
Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.2174/0126662558264870231122113715
Sriram G.K., Umamaheswari Rajasekaran, A. Malini, Vandana Sharma
In the field of meteorology, temperature forecasting is a significant task as it hasbeen a key factor in industrial, agricultural, renewable energy, and other sectors. High accuracyin temperature forecasting is needed for decision-making in advance. Since temperature variesover time and has been studied to have non-trivial long-range correlation, non-linear behavior,and seasonal variability, it is important to implement an appropriate methodology to forecastaccurately. In this paper, we have reviewed the performance of statistical approaches such asAR and ARIMA with RNN, LSTM, GRU, and LSTM-RNN Deep Learning models. The models were tested for short-term temperature forecasting for a period of 48 hours. Among the statistical models, the AR model showed notable performance with a r2 score of 0.955 for triennial 1 and for the same, the Deep Learning models also performed nearly equal to that of the statistical models and thus hybrid LSTM-RNN model was tested. The hybrid model obtained thehighest r2 score of 0.960. The difference in RMSE, MAE and r2 scores are not significantlydifferent for both Statistical and Vanilla Deep Learning approaches. However, the hybrid model provided a better r2 score, and LIME explanations have been generated for the same in orderto understand the dependencies over a point forecast. Based on the reviewed results, it can beconcluded that for short-term forecasting, both Statistical and Deep Learning models performnearly equally.
在气象学领域,气温预报是一项重要任务,因为它一直是工业、农业、可再生能源和其他部门的关键因素。为了提前做出决策,需要高精度的气温预报。由于气温随时间变化,而且研究表明气温具有非对称的长程相关性、非线性行为和季节变异性,因此采用适当的方法进行准确预报非常重要。在本文中,我们回顾了 RNN、LSTM、GRU 和 LSTM-RNN 深度学习模型等统计方法(如AR 和 ARIMA)的性能。我们对这些模型进行了为期 48 小时的短期气温预测测试。在统计模型中,AR 模型表现突出,三年 1 期的 r2 得分为 0.955,同样,深度学习模型的表现也几乎与统计模型相当,因此对 LSTM-RNN 混合模型进行了测试。混合模型的 r2 得分最高,为 0.960。统计方法和 Vanilla 深度学习方法的 RMSE、MAE 和 r2 分数差异不大。然而,混合模型提供了更好的 r2 分数,并生成了 LIME 解释,以了解点预测的依赖关系。根据所审查的结果,可以得出结论:对于短期预测,统计模型和深度学习模型的表现几乎相同。
{"title":"Analysis of Statistical and Deep Learning Techniques for Temperature\u0000Forecasting","authors":"Sriram G.K., Umamaheswari Rajasekaran, A. Malini, Vandana Sharma","doi":"10.2174/0126662558264870231122113715","DOIUrl":"https://doi.org/10.2174/0126662558264870231122113715","url":null,"abstract":"\u0000\u0000In the field of meteorology, temperature forecasting is a significant task as it has\u0000been a key factor in industrial, agricultural, renewable energy, and other sectors. High accuracy\u0000in temperature forecasting is needed for decision-making in advance. Since temperature varies\u0000over time and has been studied to have non-trivial long-range correlation, non-linear behavior,\u0000and seasonal variability, it is important to implement an appropriate methodology to forecast\u0000accurately. In this paper, we have reviewed the performance of statistical approaches such as\u0000AR and ARIMA with RNN, LSTM, GRU, and LSTM-RNN Deep Learning models. The models were tested for short-term temperature forecasting for a period of 48 hours. Among the statistical models, the AR model showed notable performance with a r2 score of 0.955 for triennial 1 and for the same, the Deep Learning models also performed nearly equal to that of the statistical models and thus hybrid LSTM-RNN model was tested. The hybrid model obtained the\u0000highest r2 score of 0.960. The difference in RMSE, MAE and r2 scores are not significantly\u0000different for both Statistical and Vanilla Deep Learning approaches. However, the hybrid model provided a better r2 score, and LIME explanations have been generated for the same in order\u0000to understand the dependencies over a point forecast. Based on the reviewed results, it can be\u0000concluded that for short-term forecasting, both Statistical and Deep Learning models perform\u0000nearly equally.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139007944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pneumonia Net: Pneumonia Detection and Categorization in Chest X-rayImages 肺炎网络胸部 X 光图像中的肺炎检测和分类
Q3 Computer Science Pub Date : 2023-12-11 DOI: 10.2174/0126662558269484231121112300
Somya Srivastava, Seema Verma, Nripendra Narayan Das, Shraddha Sharma, Gaurav Dubey
Pneumonia is one of the leading causes of death and disability due torespiratory infections. The key to successful treatment of pneumonia is in its early diagnosisand correct classification. PneumoniaNet is a unique deep-learning model based on CNN foridentifying pneumonia on chest X-rays.A deep learning model that combines convolutional, pooling, and fully connectedlayers is presented in this study.In order to learn how to identify cases of pneumonia and healthy controls on chestX-ray pictures, PneumoniaNet was trained on a large labeled library of such images. A robustdata augmentation technique was adopted to enhance the model generalization and training setdiversity. Standard measures like as accuracy, precision, recall, and F1-score were applied toPneumoniaNet's performance evaluation.The suggested model performed effectively in detecting pneumonia cases with an accuracy of 93.88%.The model was evaluated against the current state-of-art methods and showed thatPneumoniaNet outperformed the other models.
肺炎是呼吸道感染导致死亡和残疾的主要原因之一。肺炎的早期诊断和正确分类是成功治疗肺炎的关键。PneumoniaNet 是一种基于 CNN 的独特深度学习模型,用于识别胸部 X 光片上的肺炎。为了学习如何识别胸部 X 光片上的肺炎病例和健康对照组,PneumoniaNet 在一个大型标注的此类图像库上进行了训练。为了学习如何在胸透图片上识别肺炎病例和健康对照组,PneumoniaNet 在此类图片的大型标注库中进行了训练,并采用了鲁棒数据增强技术来提高模型的泛化和训练集的多样性。对 PneumoniaNet 的性能评估采用了准确率、精确度、召回率和 F1 分数等标准衡量指标,结果表明所建议的模型在检测肺炎病例方面表现出色,准确率高达 93.88%。
{"title":"Pneumonia Net: Pneumonia Detection and Categorization in Chest X-ray\u0000Images","authors":"Somya Srivastava, Seema Verma, Nripendra Narayan Das, Shraddha Sharma, Gaurav Dubey","doi":"10.2174/0126662558269484231121112300","DOIUrl":"https://doi.org/10.2174/0126662558269484231121112300","url":null,"abstract":"\u0000\u0000Pneumonia is one of the leading causes of death and disability due to\u0000respiratory infections. The key to successful treatment of pneumonia is in its early diagnosis\u0000and correct classification. PneumoniaNet is a unique deep-learning model based on CNN for\u0000identifying pneumonia on chest X-rays.\u0000\u0000\u0000\u0000A deep learning model that combines convolutional, pooling, and fully connected\u0000layers is presented in this study.\u0000\u0000\u0000\u0000In order to learn how to identify cases of pneumonia and healthy controls on chest\u0000X-ray pictures, PneumoniaNet was trained on a large labeled library of such images. A robust\u0000data augmentation technique was adopted to enhance the model generalization and training set\u0000diversity. Standard measures like as accuracy, precision, recall, and F1-score were applied to\u0000PneumoniaNet's performance evaluation.\u0000\u0000\u0000\u0000The suggested model performed effectively in detecting pneumonia cases with an accuracy of 93.88%.\u0000\u0000\u0000\u0000The model was evaluated against the current state-of-art methods and showed that\u0000PneumoniaNet outperformed the other models.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138980802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review of Deep Learning Algorithms for Urban Remote Sensing UsingUnmanned Aerial Vehicles (UAVs) 利用无人机(UAV)进行城市遥感的深度学习算法综述
Q3 Computer Science Pub Date : 2023-12-08 DOI: 10.2174/0126662558275210231121044758
Souvik Datta, Subbulekshmi D
This study conducts a comprehensive review of Deep Learning-based approachesfor accurate object segmentation and detection in high-resolution imagery captured by Unmanned Aerial Vehicles (UAVs). The methodology employs three different existing algorithms tailored to detect roads, buildings, trees, and water bodies. These algorithms includeRes-UNet for roads and buildings, DeepForest for trees, and WaterDetect for water bodies. Toevaluate the effectiveness of this approach, the performance of each algorithm is comparedwith state-of-the-art (SOTA) models for each class. The results of the study demonstrate thatthe methodology outperforms SOTA models in all three classes, achieving an accuracy of 93%for roads and buildings using Res-U-Net, 95% for trees using DeepForest, and an impressive98% for water bodies using WaterDetect. The paper utilizes a Deep Learning-based approachfor accurate object segmentation and detection in high-resolution UAV imagery, achieving superior performance to SOTA models, with reduced overfitting and faster training by employingthree smaller models for each task
本研究对基于深度学习的方法进行了全面回顾,以便在无人机(UAV)捕获的高分辨率图像中准确地进行物体分割和检测。该方法采用了三种不同的现有算法,专门用于检测道路、建筑物、树木和水体。这些算法包括用于道路和建筑物的 Res-UNet、用于树木的 DeepForest 和用于水体的 WaterDetect。为了评估这种方法的有效性,我们将每种算法的性能与每个类别的最新(SOTA)模型进行了比较。研究结果表明,该方法在所有三个类别中的表现都优于 SOTA 模型,使用 Res-U-Net 对道路和建筑物的准确率达到 93%,使用 DeepForest 对树木的准确率达到 95%,使用 WaterDetect 对水体的准确率达到令人印象深刻的 98%。本文利用基于深度学习的方法在高分辨率无人机图像中实现了精确的物体分割和检测,取得了优于 SOTA 模型的性能,并通过为每个任务采用三个较小的模型减少了过拟合,加快了训练速度。
{"title":"Review of Deep Learning Algorithms for Urban Remote Sensing Using\u0000Unmanned Aerial Vehicles (UAVs)","authors":"Souvik Datta, Subbulekshmi D","doi":"10.2174/0126662558275210231121044758","DOIUrl":"https://doi.org/10.2174/0126662558275210231121044758","url":null,"abstract":"\u0000\u0000This study conducts a comprehensive review of Deep Learning-based approaches\u0000for accurate object segmentation and detection in high-resolution imagery captured by Unmanned Aerial Vehicles (UAVs). The methodology employs three different existing algorithms tailored to detect roads, buildings, trees, and water bodies. These algorithms include\u0000Res-UNet for roads and buildings, DeepForest for trees, and WaterDetect for water bodies. To\u0000evaluate the effectiveness of this approach, the performance of each algorithm is compared\u0000with state-of-the-art (SOTA) models for each class. The results of the study demonstrate that\u0000the methodology outperforms SOTA models in all three classes, achieving an accuracy of 93%\u0000for roads and buildings using Res-U-Net, 95% for trees using DeepForest, and an impressive\u000098% for water bodies using WaterDetect. The paper utilizes a Deep Learning-based approach\u0000for accurate object segmentation and detection in high-resolution UAV imagery, achieving superior performance to SOTA models, with reduced overfitting and faster training by employing\u0000three smaller models for each task\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139010940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging ChatGPT in Law Enforcement 在执法中利用 ChatGPT
Q3 Computer Science Pub Date : 2023-12-08 DOI: 10.2174/0126662558264263231127062519
Shubham Pandey, Archana Patel
The advent of powerful tools like ChatGPT has opened up exciting new possibilitiesfor augmenting law enforcement capabilities, elevating its efficiency and expanding its capacity.The AI-driven capabilities of ChatGPT can be harnessed to usher in novel applications indiverse areas such as language translation, customer service, content generation, and even lawenforcement. In the realm of law enforcement, ChatGPT's potential is boundless, ranging fromthe generation of detailed reports and the transcription and translation of vital documents to theprofiling of criminals and the automation of legal documents. However, the deployment ofsuch technology in law enforcement raises critical issues of privacy, safeguarding fundamentalrights, and the perpetuation of societal biases. Furthermore, the deployment of emerging technologieslike ChatGPT could also open up new avenues for committing cybercrimes. Therefore,it is crucial to address these issues and establish regulatory frameworks that govern theuse of such advanced technologies. In this paper, we provide legal and technical recommendationsto regulate the use of ChatGPT and mitigate the potential risks associated with its usage,including the perpetration of various cybercrimes.
像 ChatGPT 这样功能强大的工具的出现,为增强执法能力、提高执法效率和扩大执法能力开辟了令人兴奋的新可能性。ChatGPT 的人工智能驱动能力可用于语言翻译、客户服务、内容生成甚至执法等多个领域的新应用。在执法领域,ChatGPT 的潜力无穷,从生成详细报告、转录和翻译重要文件,到罪犯建档和法律文件自动化,不一而足。然而,在执法中部署此类技术会引发隐私、基本权利保障和社会偏见延续等关键问题。此外,部署类似 ChatGPT 的新兴技术还可能为网络犯罪开辟新的途径。因此,解决这些问题并建立监管框架以规范此类先进技术的使用至关重要。在本文中,我们将提出法律和技术建议,以规范 ChatGPT 的使用,降低与使用 ChatGPT 相关的潜在风险,包括实施各种网络犯罪。
{"title":"Leveraging ChatGPT in Law Enforcement","authors":"Shubham Pandey, Archana Patel","doi":"10.2174/0126662558264263231127062519","DOIUrl":"https://doi.org/10.2174/0126662558264263231127062519","url":null,"abstract":"\u0000\u0000The advent of powerful tools like ChatGPT has opened up exciting new possibilities\u0000for augmenting law enforcement capabilities, elevating its efficiency and expanding its capacity.\u0000The AI-driven capabilities of ChatGPT can be harnessed to usher in novel applications in\u0000diverse areas such as language translation, customer service, content generation, and even law\u0000enforcement. In the realm of law enforcement, ChatGPT's potential is boundless, ranging from\u0000the generation of detailed reports and the transcription and translation of vital documents to the\u0000profiling of criminals and the automation of legal documents. However, the deployment of\u0000such technology in law enforcement raises critical issues of privacy, safeguarding fundamental\u0000rights, and the perpetuation of societal biases. Furthermore, the deployment of emerging technologies\u0000like ChatGPT could also open up new avenues for committing cybercrimes. Therefore,\u0000it is crucial to address these issues and establish regulatory frameworks that govern the\u0000use of such advanced technologies. In this paper, we provide legal and technical recommendations\u0000to regulate the use of ChatGPT and mitigate the potential risks associated with its usage,\u0000including the perpetration of various cybercrimes.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139011502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Transformative Impact of AI and Machine Learning on HumanPsychology 人工智能和机器学习对人类心理学的变革性影响
Q3 Computer Science Pub Date : 2023-12-05 DOI: 10.2174/0126662558268813231120114051
Amrita Jyoti, Vikash Yadav, Amita Pal, M. Rahul, Sonu Kumar Jha
This journal paper examines the transformative role of Artificial Intelligence (AI)and Machine Learning (ML) in shaping human psychology. It investigates how cognitive processes,emotional states, and social interactions are impacted by AI and ML technology. Theuse of AI and ML in psychology is covered in this study, covering social behaviour analysis,emotion identification, mental health assessment, and personalised therapies. It also exploresthe moral issues and prospective effects of AI and ML in comprehending and influencing humanpsychology. This paper emphasises the enormous influence of AI and ML on the comprehensionand research of human psychology through a thorough analysis of pertinent literatureand empirical evidence. This paper seeks to offer a thorough explanation of the profound effectsthat AI and ML have had on psychology. We will offer insight into the possible advantages,difficulties, and ethical issues that occur when integrating AI and ML into the studyof human psychology by looking at recent developments and implementations of these technologiesin psychological research. We will also look at how other areas of psychology, suchas cognitive psychology, clinical psychology, social psychology, and neurology, have beenimpacted by AI and ML.
这篇期刊论文探讨了人工智能(AI)和机器学习(ML)在塑造人类心理方面的变革作用。它研究了人工智能和机器学习技术如何影响认知过程、情绪状态和社会互动。本研究涵盖了人工智能和机器学习在心理学中的应用,涵盖了社会行为分析、情感识别、心理健康评估和个性化治疗。它还探讨了人工智能和机器学习在理解和影响人类心理方面的道德问题和预期效果。本文通过对相关文献和经验证据的深入分析,强调了人工智能和机器学习对人类心理学的理解和研究的巨大影响。本文试图全面解释人工智能和机器学习对心理学的深刻影响。我们将通过观察这些技术在心理学研究中的最新发展和实现,深入了解将AI和ML整合到人类心理学研究中可能出现的优势、困难和伦理问题。我们还将研究心理学的其他领域,如认知心理学、临床心理学、社会心理学和神经学,如何受到人工智能和机器学习的影响。
{"title":"The Transformative Impact of AI and Machine Learning on Human\u0000Psychology","authors":"Amrita Jyoti, Vikash Yadav, Amita Pal, M. Rahul, Sonu Kumar Jha","doi":"10.2174/0126662558268813231120114051","DOIUrl":"https://doi.org/10.2174/0126662558268813231120114051","url":null,"abstract":"\u0000\u0000This journal paper examines the transformative role of Artificial Intelligence (AI)\u0000and Machine Learning (ML) in shaping human psychology. It investigates how cognitive processes,\u0000emotional states, and social interactions are impacted by AI and ML technology. The\u0000use of AI and ML in psychology is covered in this study, covering social behaviour analysis,\u0000emotion identification, mental health assessment, and personalised therapies. It also explores\u0000the moral issues and prospective effects of AI and ML in comprehending and influencing human\u0000psychology. This paper emphasises the enormous influence of AI and ML on the comprehension\u0000and research of human psychology through a thorough analysis of pertinent literature\u0000and empirical evidence. This paper seeks to offer a thorough explanation of the profound effects\u0000that AI and ML have had on psychology. We will offer insight into the possible advantages,\u0000difficulties, and ethical issues that occur when integrating AI and ML into the study\u0000of human psychology by looking at recent developments and implementations of these technologies\u0000in psychological research. We will also look at how other areas of psychology, such\u0000as cognitive psychology, clinical psychology, social psychology, and neurology, have been\u0000impacted by AI and ML.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138599738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Distorted Light Field Image Correction Method Based on ImprovedHough Transform 基于改进霍夫变换的扭曲光场图像校正方法
Q3 Computer Science Pub Date : 2023-12-04 DOI: 10.2174/0126662558270259231122040821
Ruihua Zhang, Shubo Bi
In using a camera to take photos, due to environmental limitations,uneven lighting can cause uneven distribution of the image light field, resulting in distortion ofthe image background and target, blurring of details, and distorted light field images.In view of this, research is conducted on the correction of distorted light field imagesbased on the Hough transform. First, the improved Hough transform is utilized to locate thefour coordinates, the matrix information of the normal image is applied to calculate the corresponding parameter amount, and then the low-frequency part of the image spectrum is removed. Finally, it uses the Gaussian function for difference, inputs the original data, and getsthe correction result of the distorted light field image.The research results indicate that in the practical application of the distorted light fieldimage correction algorithm based on the Hough transform, the improved Hough transform algorithm is superior to the traditional one.In comparative experiments, the research algorithm outperforms the other threealgorithms, with an average color restoration of 93.76% and an average signal-to-noise ratio of54.22dB. The superiority of the research algorithm has been verified, indicating that the research method can perfectly correct distorted light field images and achieve good correctionresults.
在使用相机拍摄照片时,由于环境的限制,不均匀的光照会造成图像光场分布不均匀,造成图像背景和目标的畸变,细节模糊,光场图像失真。鉴于此,本文对基于霍夫变换的畸变光场图像的校正进行了研究。首先利用改进的霍夫变换对四个坐标进行定位,利用正法图像的矩阵信息计算相应的参数量,然后去除图像频谱中的低频部分。最后利用高斯函数进行差分,输入原始数据,得到畸变光场图像的校正结果。研究结果表明,在基于霍夫变换的畸变光场图像校正算法的实际应用中,改进的霍夫变换算法优于传统的霍夫变换算法。在对比实验中,研究算法优于其他三种算法,平均色彩还原率为93.76%,平均信噪比为54.22 db。研究算法的优越性得到了验证,表明研究方法可以很好地校正畸变光场图像,并取得了良好的校正效果。
{"title":"A Distorted Light Field Image Correction Method Based on Improved\u0000Hough Transform","authors":"Ruihua Zhang, Shubo Bi","doi":"10.2174/0126662558270259231122040821","DOIUrl":"https://doi.org/10.2174/0126662558270259231122040821","url":null,"abstract":"\u0000\u0000In using a camera to take photos, due to environmental limitations,\u0000uneven lighting can cause uneven distribution of the image light field, resulting in distortion of\u0000the image background and target, blurring of details, and distorted light field images.\u0000\u0000\u0000\u0000In view of this, research is conducted on the correction of distorted light field images\u0000based on the Hough transform. First, the improved Hough transform is utilized to locate the\u0000four coordinates, the matrix information of the normal image is applied to calculate the corresponding parameter amount, and then the low-frequency part of the image spectrum is removed. Finally, it uses the Gaussian function for difference, inputs the original data, and gets\u0000the correction result of the distorted light field image.\u0000\u0000\u0000\u0000The research results indicate that in the practical application of the distorted light field\u0000image correction algorithm based on the Hough transform, the improved Hough transform algorithm is superior to the traditional one.\u0000\u0000\u0000\u0000In comparative experiments, the research algorithm outperforms the other three\u0000algorithms, with an average color restoration of 93.76% and an average signal-to-noise ratio of\u000054.22dB. The superiority of the research algorithm has been verified, indicating that the research method can perfectly correct distorted light field images and achieve good correction\u0000results.\u0000","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138602154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Professional Ethics, Challenges and Opportunities for Blockchain Technology in Healthcare Sector: A Systematic Review 区块链技术在医疗保健领域的职业道德、挑战和机遇:系统回顾
Q3 Computer Science Pub Date : 2023-11-28 DOI: 10.2174/0126662558263462231020111428
Keerti Singh, Charu Krishna, Divya Kumar
The healthcare sector faces numerous issues, such as insurance fraud, electronic medical record management, interoperability, insecure dissemination of information, etc. The novel Blockchain technology holds tremendous potential to transform the healthcare sector by addressing these rising challenges in the industry. It provides a secure platform for storing, disseminating, and retrieving sensitive patient data and health records while preserving the ethical principles of the healthcare sector. In this study, we systematically reviewed the literature on blockchain technology in healthcare using PRISMA and highlighted how blockchain technology might promote innovation and deliver major improvements in the healthcare sector. Our goal is to examine the present status of this discipline, focusing on limits and potential advances. Queries were used to gather Scopus, PubMed, SpringerLink, IEEE Xplore, and Web of Science publications that met the criteria for the selection of papers. This article, thus, analyses the potential for blockchain in the healthcare industry and outlines blockchain-based products in healthcare. Our study enhances and complements prior healthcare blockchain research.
医疗保健行业面临着保险欺诈、电子病历管理、互操作性、信息传播不安全等诸多问题。新颖的区块链技术具有巨大的潜力,可以解决医疗行业面临的这些日益严峻的挑战,从而改变医疗行业。它为存储、传播和检索敏感的患者数据和健康记录提供了一个安全的平台,同时维护了医疗保健行业的道德原则。 在本研究中,我们利用 PRISMA 系统地回顾了有关医疗保健领域区块链技术的文献,并重点介绍了区块链技术如何促进医疗保健领域的创新并带来重大改进。 我们的目标是研究该学科的现状,重点关注其局限性和潜在进展。通过查询,我们收集了符合论文筛选标准的 Scopus、PubMed、SpringerLink、IEEE Xplore 和 Web of Science 出版物。 因此,本文分析了区块链在医疗保健行业的潜力,并概述了医疗保健领域基于区块链的产品。我们的研究加强并补充了之前的医疗保健区块链研究。
{"title":"Professional Ethics, Challenges and Opportunities for Blockchain Technology in Healthcare Sector: A Systematic Review","authors":"Keerti Singh, Charu Krishna, Divya Kumar","doi":"10.2174/0126662558263462231020111428","DOIUrl":"https://doi.org/10.2174/0126662558263462231020111428","url":null,"abstract":"The healthcare sector faces numerous issues, such as insurance fraud, electronic medical record management, interoperability, insecure dissemination of information, etc. The novel Blockchain technology holds tremendous potential to transform the healthcare sector by addressing these rising challenges in the industry. It provides a secure platform for storing, disseminating, and retrieving sensitive patient data and health records while preserving the ethical principles of the healthcare sector. In this study, we systematically reviewed the literature on blockchain technology in healthcare using PRISMA and highlighted how blockchain technology might promote innovation and deliver major improvements in the healthcare sector. Our goal is to examine the present status of this discipline, focusing on limits and potential advances. Queries were used to gather Scopus, PubMed, SpringerLink, IEEE Xplore, and Web of Science publications that met the criteria for the selection of papers. This article, thus, analyses the potential for blockchain in the healthcare industry and outlines blockchain-based products in healthcare. Our study enhances and complements prior healthcare blockchain research.","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139227605","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on Privacy Protection Techniques in Smart Grid Applications 智能电网应用中的隐私保护技术综述
Q3 Computer Science Pub Date : 2023-11-01 DOI: 10.2174/0126662558254700231024015340
Rakhi Gupta, Parminder Singh, Avinash Kaur, Mustapha Hedabou
Abstract: The extensive use of electricity and the increasing number of consumers challenge matching power consumption with the power generated. Having a traditional way of power generation and distribution, power is also widely fetched through renewable energy sources. So, to have improved efficiency and reliable means of the power source, to be able to integrate multiple sources of power generation like PV Cells, Solar Power, and Wind Power into the existing standards of the power source, precise calculations of the power consumption in the multisource environment, provision to scale up the smart and electric vehicle and most importantly, to reduce the carbon emissions, several attempts have been made to convert the traditional grids into smart grids. A tiny step in the smart grid's development is the smart metering infrastructure, in which smart meters are deployed through the consumer end. Through smart meters, it is possible to establish the link, either through wireless media or wired connections, between the consumer and the grid. Once the smart meters are deployed through the Advanced Metering Infrastructure (AMI), the meters remain active round the clock, giving a window to hackers. Through this window, utility bill manipulations, payment transaction information, and other significant data can be accessed by unethical approaches and threaten the consumer's privacy. This review-research paper discusses various methods presented by distinct authors to address the issues related to customer privacy protection in the smart grid.
摘要:电力的广泛使用和消费者数量的不断增加对电力消耗与发电量的匹配提出了挑战。由于有传统的发电和配电方式,电力也广泛通过可再生能源获取。因此,为了提高效率和可靠的电源手段,为了能够将光伏电池、太阳能和风能等多种发电方式整合到现有的电源标准中,为了精确计算多源环境下的功耗,为了扩大智能和电动汽车的规模,最重要的是,为了减少碳排放,人们已经进行了几次尝试,将传统电网转变为智能电网。智能电网发展的一小步是智能计量基础设施,其中智能电表通过消费者端部署。通过智能电表,可以通过无线媒体或有线连接在消费者和电网之间建立联系。一旦智能电表通过高级计量基础设施(AMI)部署,电表就会24小时处于活动状态,给黑客提供了机会。通过这个窗口,公用事业账单操纵、支付交易信息和其他重要数据可以被不道德的方法访问,并威胁到消费者的隐私。这篇综述研究论文讨论了不同作者提出的各种方法,以解决与智能电网中客户隐私保护相关的问题。
{"title":"A Review on Privacy Protection Techniques in Smart Grid Applications","authors":"Rakhi Gupta, Parminder Singh, Avinash Kaur, Mustapha Hedabou","doi":"10.2174/0126662558254700231024015340","DOIUrl":"https://doi.org/10.2174/0126662558254700231024015340","url":null,"abstract":"Abstract: The extensive use of electricity and the increasing number of consumers challenge matching power consumption with the power generated. Having a traditional way of power generation and distribution, power is also widely fetched through renewable energy sources. So, to have improved efficiency and reliable means of the power source, to be able to integrate multiple sources of power generation like PV Cells, Solar Power, and Wind Power into the existing standards of the power source, precise calculations of the power consumption in the multisource environment, provision to scale up the smart and electric vehicle and most importantly, to reduce the carbon emissions, several attempts have been made to convert the traditional grids into smart grids. A tiny step in the smart grid's development is the smart metering infrastructure, in which smart meters are deployed through the consumer end. Through smart meters, it is possible to establish the link, either through wireless media or wired connections, between the consumer and the grid. Once the smart meters are deployed through the Advanced Metering Infrastructure (AMI), the meters remain active round the clock, giving a window to hackers. Through this window, utility bill manipulations, payment transaction information, and other significant data can be accessed by unethical approaches and threaten the consumer's privacy. This review-research paper discusses various methods presented by distinct authors to address the issues related to customer privacy protection in the smart grid.","PeriodicalId":36514,"journal":{"name":"Recent Advances in Computer Science and Communications","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135372776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Recent Advances in Computer Science and Communications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1