首页 > 最新文献

International Journal of Computing最新文献

英文 中文
Deep Learning Algorithm for Detecting and Analyzing Criminal Activity 犯罪活动检测与分析的深度学习算法
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3095
Raddam Sami Mehsen
When applied to an entire field, automation and autonomous systems are among the rare creative superpowers capable of catapulting progress at an exponential rate. The arrival of machine intelligence will give such automated machines the intelligence to perform their tasks with power of outcome, drastically reducing the need for human intervention in redundant processes. Large-scale technological progress can be traced back to responsibilities that are simplified and, as a result, more easily distinguished by means of automation. In accordance with these guidelines, we propose creating a product that eliminates or significantly reduces the need for human intervention in primary issue statements that can be automated and processed. The public safety infrastructure of today relies on surveillance cameras, but these devices are merely video recorders; they have no intelligence of their own. Automated video streams are now required for automatic event detection thanks to the massive amount of data produced by surveillance cameras. The project's main objective is to increase public safety through the mechanization of crime measurement and review using actual Closed-Circuit Television footage (CCTV). This is achieved by assigning the task of recognizing criminal behavior to a system that can do so automatically, allowing for more precise tracking. In this study, we present a model with a precision of 0.95 for assault and 0.97 for abuse.
当应用到整个领域时,自动化和自主系统是罕见的创造性超级力量之一,能够以指数级的速度推动进步。机器智能的到来将赋予这些自动化机器以智能来执行其任务并产生结果,从而大大减少了对冗余过程中人为干预的需求。大规模的技术进步可以追溯到简化的责任,因此,通过自动化的手段更容易区分。根据这些指导方针,我们建议创建一种产品,消除或显着减少对主要问题陈述的人工干预需求,可以自动化和处理。今天的公共安全基础设施依赖于监控摄像头,但这些设备仅仅是视频录像机;他们没有自己的智慧。由于监控摄像头产生的大量数据,自动事件检测现在需要自动视频流。该项目的主要目标是通过使用实际闭路电视录像(CCTV)对犯罪进行机械化测量和审查,从而提高公共安全。这是通过将识别犯罪行为的任务分配给一个可以自动完成的系统来实现的,从而允许更精确的跟踪。在这项研究中,我们提出了一个精度为0.95攻击和0.97虐待的模型。
{"title":"Deep Learning Algorithm for Detecting and Analyzing Criminal Activity","authors":"Raddam Sami Mehsen","doi":"10.47839/ijc.22.2.3095","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3095","url":null,"abstract":"When applied to an entire field, automation and autonomous systems are among the rare creative superpowers capable of catapulting progress at an exponential rate. The arrival of machine intelligence will give such automated machines the intelligence to perform their tasks with power of outcome, drastically reducing the need for human intervention in redundant processes. Large-scale technological progress can be traced back to responsibilities that are simplified and, as a result, more easily distinguished by means of automation. In accordance with these guidelines, we propose creating a product that eliminates or significantly reduces the need for human intervention in primary issue statements that can be automated and processed. The public safety infrastructure of today relies on surveillance cameras, but these devices are merely video recorders; they have no intelligence of their own. Automated video streams are now required for automatic event detection thanks to the massive amount of data produced by surveillance cameras. The project's main objective is to increase public safety through the mechanization of crime measurement and review using actual Closed-Circuit Television footage (CCTV). This is achieved by assigning the task of recognizing criminal behavior to a system that can do so automatically, allowing for more precise tracking. In this study, we present a model with a precision of 0.95 for assault and 0.97 for abuse.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90337012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Severity Stage Identification and Pest Detection of Tomato Disease Using Deep Learning 基于深度学习的番茄病害严重阶段识别及病虫害检测
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3088
Prothama Sardar, Romana Rahman Ema, Sk. Shalauddin Kabir, Md. Nasim Adnan, S. Galib
In Bangladesh, most people depend on agriculture for their livelihood. The country's economy and agricultural production are hampered if plants are affected by diseases. Crop pests also disrupt agricultural production. So, this paper proposes leaf disease, disease severity stage, and pest detection strategies with suggestions for prevention strategies using five notable Convolutional Neural Network models (CNN) such as VGG16, Resnet50, AlexNet, EfficientNetB2, and EfficientNetB3. This paper uses a dataset of tomato leaves consisting of 41,763 images which cover 10 classes of tomato disease, and a dataset of pests consisting of 4,271 images which cover 8 classes of pests. Firstly, these models are used for the classification of diseases and pests. Then disease and pest prevention techniques are shown. For disease and pest detection, EfficientNetB3 gives the best accuracy for training (99.85%), (99.80%), and validation (97.85%), (97.45%) respectively. For severity stage identification, AlexNet gives the best accuracy for training (69.02%) and validation (72.49%).
在孟加拉国,大多数人依靠农业为生。如果植物受到病害的影响,国家的经济和农业生产就会受到阻碍。农作物害虫也扰乱了农业生产。因此,本文利用VGG16、Resnet50、AlexNet、EfficientNetB2和EfficientNetB3 5个著名的卷积神经网络模型(CNN),提出了叶片病害、病害严重阶段和害虫检测策略,并提出了预防策略建议。本文使用番茄叶片数据集,包含41763张图像,涵盖10类番茄病害;使用害虫数据集,包含4271张图像,涵盖8类害虫。首先,将这些模型用于病虫害的分类。然后介绍病虫害防治技术。对于病虫害检测,EfficientNetB3在训练(99.85%)、(99.80%)和验证(97.85%)、(97.45%)方面的准确率最高。对于严重性阶段识别,AlexNet给出了训练(69.02%)和验证(72.49%)的最佳准确率。
{"title":"Severity Stage Identification and Pest Detection of Tomato Disease Using Deep Learning","authors":"Prothama Sardar, Romana Rahman Ema, Sk. Shalauddin Kabir, Md. Nasim Adnan, S. Galib","doi":"10.47839/ijc.22.2.3088","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3088","url":null,"abstract":"In Bangladesh, most people depend on agriculture for their livelihood. The country's economy and agricultural production are hampered if plants are affected by diseases. Crop pests also disrupt agricultural production. So, this paper proposes leaf disease, disease severity stage, and pest detection strategies with suggestions for prevention strategies using five notable Convolutional Neural Network models (CNN) such as VGG16, Resnet50, AlexNet, EfficientNetB2, and EfficientNetB3. This paper uses a dataset of tomato leaves consisting of 41,763 images which cover 10 classes of tomato disease, and a dataset of pests consisting of 4,271 images which cover 8 classes of pests. Firstly, these models are used for the classification of diseases and pests. Then disease and pest prevention techniques are shown. For disease and pest detection, EfficientNetB3 gives the best accuracy for training (99.85%), (99.80%), and validation (97.85%), (97.45%) respectively. For severity stage identification, AlexNet gives the best accuracy for training (69.02%) and validation (72.49%).","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88735392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Evaluation of Enhanced Slotted AlohaCA Protocol on Planet Mars 火星上增强型开槽AlohaCA协议的性能评价
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3090
Zakaria Chabou, Abdessalam Aitmadi, A. Addaim, Z. Guennoun
The launch and successful operation of the Mars Cube One (MarCO) CubeSat in May 2018 heralded a new era in solar system exploration and the setup of the first Interplanetary CubeSat Network (ICN). The success of this mission could give rise of an Interplanetary DTN–Based CubeSat network, in which the CubeSat Nanosatellite, as DTN custody node, plays the role of Data Mule to collect data from rovers on a planet such as Mars.  In order to maximize the contact volume which is the amount of transmitting data from rovers to the CubeSat during its pass over their service zone, we will need to design an efficient MAC protocol. This research focuses on the simulation and evaluation of the performance of the Slotted AlohaCA MAC Protocol on the planet Mars compared to Earth taking into account the different properties between the two planets, such as radius, mass and speed of rotation of the Nanosatellite in its orbital at the same altitude. We have conducted many simulations using the NS2 simulator that takes into consideration the spatial dynamic behavior of the Nanosatellite, which is dependent on motion of the Nanosatellite in its orbit. Three appropriate performance measures are evaluated: Throughput, stability and power consumption. The   obtained simulation results on the planet Mars show an improvement on performance of the Slotted AlohaCA on the planet Mars compared to Earth.
2018年5月,火星立方体一号(MarCO)立方体卫星的发射和成功运行,标志着太阳系探测的新时代和首个行星际立方体卫星网络(ICN)的建立。该任务的成功可能会产生一个基于DTN的行星际立方体卫星网络,其中立方体卫星纳米卫星作为DTN保管节点,扮演数据骡子的角色,从火星等行星上的漫游者收集数据。为了最大限度地提高接触量,即在漫游车经过服务区域时向立方体卫星传输数据的量,我们需要设计一个有效的MAC协议。考虑到纳米卫星在相同高度的轨道上的半径、质量和自转速度等不同特性,重点对开槽AlohaCA MAC协议在火星和地球上的性能进行了仿真和评估。我们使用NS2模拟器进行了许多模拟,该模拟器考虑了纳米卫星的空间动力学行为,这取决于纳米卫星在其轨道上的运动。评估了三个适当的性能指标:吞吐量、稳定性和功耗。在火星上的仿真结果表明,槽式AlohaCA在火星上的性能比在地球上有所提高。
{"title":"Performance Evaluation of Enhanced Slotted AlohaCA Protocol on Planet Mars","authors":"Zakaria Chabou, Abdessalam Aitmadi, A. Addaim, Z. Guennoun","doi":"10.47839/ijc.22.2.3090","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3090","url":null,"abstract":"The launch and successful operation of the Mars Cube One (MarCO) CubeSat in May 2018 heralded a new era in solar system exploration and the setup of the first Interplanetary CubeSat Network (ICN). The success of this mission could give rise of an Interplanetary DTN–Based CubeSat network, in which the CubeSat Nanosatellite, as DTN custody node, plays the role of Data Mule to collect data from rovers on a planet such as Mars.  In order to maximize the contact volume which is the amount of transmitting data from rovers to the CubeSat during its pass over their service zone, we will need to design an efficient MAC protocol. This research focuses on the simulation and evaluation of the performance of the Slotted AlohaCA MAC Protocol on the planet Mars compared to Earth taking into account the different properties between the two planets, such as radius, mass and speed of rotation of the Nanosatellite in its orbital at the same altitude. We have conducted many simulations using the NS2 simulator that takes into consideration the spatial dynamic behavior of the Nanosatellite, which is dependent on motion of the Nanosatellite in its orbit. Three appropriate performance measures are evaluated: Throughput, stability and power consumption. The   obtained simulation results on the planet Mars show an improvement on performance of the Slotted AlohaCA on the planet Mars compared to Earth.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80792894","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization 基于部分集中化和自组织的分布式离散恶意软件检测系统
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3082
Sergii Lysenko, B. Savenko
Malware detection remains an urgent task today. Various means for the development of information technology and providing users with useful applications are being transformed by attackers into tools for malicious influences and manifestations. A variety of countermeasures and detection tools have been developed to detect malware, but the problem of malware distribution remains relevant. It is especially important for enterprises and organizations. Their corporate networks and resources are becoming objects of interest to intruders. To counteract and prevent the effects of malware, they have various systems in place. In order to improve the counteraction to malicious influences and manifestations, the paper proposes the use of distributed discrete systems, in the architecture of which the principles of self-organization, adaptability and partial centralization are synthesized. Such tools and their functioning will be difficult to understand for attackers and, therefore, will be difficult to circumvent. The architecture of the proposed tools will integrate the implemented methods of malware detection for a holistic counteraction to malware. Such a system will be a single sensor that will detect malicious influences and anomalies. To organize its functioning, descriptions of characteristic indicators are needed. The paper presents the developed mathematical models for determining the values of characteristic indicators. According to obtained values the system architecture was formed. In order to evaluate the sustainability of the developed distributed discrete system a set of experiments were conducted. In addition, to study the accuracy of malware detection, the developed system was tested for the possibility of worm virus detection. Experimental studies have confirmed the effectiveness of the proposed solution, which makes it possible to use the obtained solutions for the development of such systems.
恶意软件检测今天仍然是一项紧迫的任务。发展信息技术和向用户提供有用应用程序的各种手段正在被攻击者转变为恶意影响和表现的工具。已经开发了各种对策和检测工具来检测恶意软件,但恶意软件分发的问题仍然相关。这对企业和组织来说尤为重要。他们的公司网络和资源正成为入侵者感兴趣的目标。为了抵消和防止恶意软件的影响,他们有各种各样的系统。为了提高对恶意影响和表现的反作用,本文提出了分布式离散系统的使用,在该体系结构中综合了自组织、自适应性和部分集中化原则。这些工具及其功能对于攻击者来说很难理解,因此也很难规避。所提出的工具的体系结构将集成恶意软件检测的实现方法,以实现对恶意软件的整体对抗。这样的系统将是一个单一的传感器,将检测恶意影响和异常。为了组织其运作,需要对特征指标进行描述。本文提出了确定特征指标值的数学模型。根据得到的数值,形成了系统的体系结构。为了评估所开发的分布式离散系统的可持续性,进行了一系列实验。此外,为了研究恶意软件检测的准确性,对所开发的系统进行了蠕虫病毒检测的可能性测试。实验研究证实了所提出的解决方案的有效性,这使得将所获得的解决方案用于此类系统的开发成为可能。
{"title":"Distributed Discrete Malware Detection Systems Based on Partial Centralization and Self-Organization","authors":"Sergii Lysenko, B. Savenko","doi":"10.47839/ijc.22.2.3082","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3082","url":null,"abstract":"Malware detection remains an urgent task today. Various means for the development of information technology and providing users with useful applications are being transformed by attackers into tools for malicious influences and manifestations. A variety of countermeasures and detection tools have been developed to detect malware, but the problem of malware distribution remains relevant. It is especially important for enterprises and organizations. Their corporate networks and resources are becoming objects of interest to intruders. To counteract and prevent the effects of malware, they have various systems in place. In order to improve the counteraction to malicious influences and manifestations, the paper proposes the use of distributed discrete systems, in the architecture of which the principles of self-organization, adaptability and partial centralization are synthesized. Such tools and their functioning will be difficult to understand for attackers and, therefore, will be difficult to circumvent. The architecture of the proposed tools will integrate the implemented methods of malware detection for a holistic counteraction to malware. Such a system will be a single sensor that will detect malicious influences and anomalies. To organize its functioning, descriptions of characteristic indicators are needed. The paper presents the developed mathematical models for determining the values of characteristic indicators. According to obtained values the system architecture was formed. In order to evaluate the sustainability of the developed distributed discrete system a set of experiments were conducted. In addition, to study the accuracy of malware detection, the developed system was tested for the possibility of worm virus detection. Experimental studies have confirmed the effectiveness of the proposed solution, which makes it possible to use the obtained solutions for the development of such systems.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72935517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real Time Statistical Process Control for Autocorrelated Serial Data: A Simulation Approach 自相关序列数据的实时统计过程控制:仿真方法
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3081
Artur M. F. Graxinha, J. M. D. Dias Pereira
Computer measurement systems play an important role on process automation and Industry 4.0 implementation strategies. They can be easily integrated on modern production systems, enabling real time test and control of multiple product and process characteristics that need to be monitored. If for one side the big data provided by these systems is an important asset for production analytics and optimization, on the other hand, the high frequency data sampling, commonly used in these systems, can lead to autocorrelated data violating, this way, statistical independence requirements for statistical process control implementation. In this paper we present a simulation model, using digital recursive filters, to properly handle and deal with these issues. The model demonstrates how to eliminate the autocorrelation from data time series, creating and ensuring the conditions for statistical process control application through the application of real time control charts. A performance comparison between Shewhart of Residuals and Exponentially Weighted Moving Average (EWMA) of Individual Observations control charts is made for autocorrelated data time series with the presence of different mean shift amplitude perturbations.
计算机测量系统在过程自动化和工业4.0实施战略中发挥着重要作用。它们可以很容易地集成到现代生产系统中,实现对需要监控的多种产品和过程特性的实时测试和控制。一方面,这些系统提供的大数据是生产分析和优化的重要资产,另一方面,这些系统中常用的高频数据采样可能导致自相关数据违反,这样,统计过程控制实施的统计独立性要求。在本文中,我们提出了一个使用数字递归滤波器的仿真模型,以适当地处理和处理这些问题。该模型演示了如何通过实时控制图的应用,消除数据时间序列的自相关,为统计过程控制的应用创造和保证条件。对存在不同均值移幅扰动的自相关数据时间序列,比较了个体观测值控制图的Shewhart残差和指数加权移动平均(EWMA)的性能。
{"title":"Real Time Statistical Process Control for Autocorrelated Serial Data: A Simulation Approach","authors":"Artur M. F. Graxinha, J. M. D. Dias Pereira","doi":"10.47839/ijc.22.2.3081","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3081","url":null,"abstract":"Computer measurement systems play an important role on process automation and Industry 4.0 implementation strategies. They can be easily integrated on modern production systems, enabling real time test and control of multiple product and process characteristics that need to be monitored. If for one side the big data provided by these systems is an important asset for production analytics and optimization, on the other hand, the high frequency data sampling, commonly used in these systems, can lead to autocorrelated data violating, this way, statistical independence requirements for statistical process control implementation. In this paper we present a simulation model, using digital recursive filters, to properly handle and deal with these issues. The model demonstrates how to eliminate the autocorrelation from data time series, creating and ensuring the conditions for statistical process control application through the application of real time control charts. A performance comparison between Shewhart of Residuals and Exponentially Weighted Moving Average (EWMA) of Individual Observations control charts is made for autocorrelated data time series with the presence of different mean shift amplitude perturbations.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81799334","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hidden Real Modulus RSA Cryptosystem 隐藏实模RSA密码系统
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3094
Getaneh Awulachew’ Zimbele, Samuel Asferaw Demilew
Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and considered as secured. Since, RSA uses the common modulus in both encryption and decryption, this modulus is openly available for the public which makes it exposed for attack. Its security is based on the assumption of large integer factorization problem, but this could leave it open to different cryptanalysis attacks: low private exponent attack, Shor’s polynomial-time quantum algorithm, quantum inverse Fourier transform and phase estimation.  To address these shortcomings, this paper proposes a public-key security algorithm called Hidden Real Modulus RSA (HRM-RSA) which hides real modulus by masking it. The public mask modulus which is a pseudo random masking number is derived from real modulus. Then, this derived public mask modulus is introduced in a public key component; as a result, a real modulus is kept hidden from the public unlike the case in RSA. Encryption is done using this public mask modulus and the decryption process is done using a private hidden real modulus. For performance analysis Net bean IDE 8.2 is used, and the proposed algorithm is compared with state-of-the-art algorithms: RSA, ESRKGS, and MRSA based on security strength, time complexity, key generation time, encryption speed, and decryption speed. The performance analysis shows that HRM-RSA is less complex but highly secured than existing algorithms. It improves key generation time of ESRKGS, and MRSA by 311%, 42%; encryption time of RSA, ESRKGS, MRSA by 0.7%, 139%, 735%; decryption time of RSA, ESRKGS, MRSA by 3%, 138%, 799%, respectively.
网络安全中的密码技术可分为对称密码和非对称密码。在非对称加密技术中,RSA算法比较流行,被认为是安全的。由于RSA在加密和解密中都使用公共模量,因此该模量对公众是公开可用的,这使得它暴露在攻击之下。它的安全性是基于大整数分解问题的假设,但这可能使它容易受到不同的密码分析攻击:低私有指数攻击、肖尔多项式时间量子算法、量子傅立叶反变换和相位估计。为了解决这些缺点,本文提出了一种通过屏蔽实模来隐藏实模的公钥安全算法——隐藏实模RSA (HRM-RSA)。公掩码模是由实模导出的伪随机掩码数。然后,将导出的公共掩码模引入到公钥组件中;因此,实模对公众是隐藏的,这与RSA中的情况不同。加密使用这个公共掩码模完成,解密过程使用一个私有的隐藏实模完成。为了进行性能分析,使用了Net bean IDE 8.2,并根据安全强度、时间复杂度、密钥生成时间、加密速度和解密速度,将所提出的算法与最先进的算法:RSA、ESRKGS和MRSA进行了比较。性能分析表明,与现有算法相比,HRM-RSA算法复杂度低,安全性高。将ESRKGS、MRSA的关键生成时间分别提高了31.1%、42%;RSA、ESRKGS、MRSA的加密时间分别提高0.7%、139%、735%;RSA、ESRKGS、MRSA的解密时间分别缩短了3%、138%、799%。
{"title":"Hidden Real Modulus RSA Cryptosystem","authors":"Getaneh Awulachew’ Zimbele, Samuel Asferaw Demilew","doi":"10.47839/ijc.22.2.3094","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3094","url":null,"abstract":"Cryptographic techniques in cyber security can be categorized into symmetric and asymmetric. Among asymmetric cryptographic techniques, the RSA algorithm is more popular and considered as secured. Since, RSA uses the common modulus in both encryption and decryption, this modulus is openly available for the public which makes it exposed for attack. Its security is based on the assumption of large integer factorization problem, but this could leave it open to different cryptanalysis attacks: low private exponent attack, Shor’s polynomial-time quantum algorithm, quantum inverse Fourier transform and phase estimation.  To address these shortcomings, this paper proposes a public-key security algorithm called Hidden Real Modulus RSA (HRM-RSA) which hides real modulus by masking it. The public mask modulus which is a pseudo random masking number is derived from real modulus. Then, this derived public mask modulus is introduced in a public key component; as a result, a real modulus is kept hidden from the public unlike the case in RSA. Encryption is done using this public mask modulus and the decryption process is done using a private hidden real modulus. For performance analysis Net bean IDE 8.2 is used, and the proposed algorithm is compared with state-of-the-art algorithms: RSA, ESRKGS, and MRSA based on security strength, time complexity, key generation time, encryption speed, and decryption speed. The performance analysis shows that HRM-RSA is less complex but highly secured than existing algorithms. It improves key generation time of ESRKGS, and MRSA by 311%, 42%; encryption time of RSA, ESRKGS, MRSA by 0.7%, 139%, 735%; decryption time of RSA, ESRKGS, MRSA by 3%, 138%, 799%, respectively.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83575885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Drip Irrigation Cyber-physical System with Remote Control 远程控制滴灌网络物理系统
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3096
Y. Klushyn
In today's reality, the pace of people's lives is much higher than it was 30 years ago and it is still growing. At the same time, the amount of information is also growing. This information should be processed constantly, daily, as soon as it is received. Production volumes are not also standing still. Such a lively pace of life requires process consistency and continuity and these processes must be provided by a man. This article describes the system of watering which should automate the process of growing plants. Also, the analysis of a new branch, that is cyber-physical systems, is carried out. The analysis of modern systems of autonomous irrigation, principles of their construction and organization of their work is conducted. A method of implementing a system that provides the possibility of constant monitoring of the growing environment and provides an opportunity to influence it is suggested. The choice of components for system construction is made. The algorithm of the system operation is described. An analysis of the relationship between system components and the user's relationship with the system is performed.
在今天的现实中,人们的生活节奏比30年前要快得多,而且还在不断加快。与此同时,信息量也在不断增长。这些信息一经收到,就应每天不断地加以处理。产量也没有停滞不前。如此活泼的生活节奏要求过程的一致性和连续性,而这些过程必须由一个人来提供。这篇文章描述了应该使植物生长过程自动化的浇水系统。同时,对网络物理系统这一新的分支进行了分析。对现代自主灌溉系统进行了分析,分析了其建设原则和工作组织。提出了一种实施系统的方法,该方法提供了对生长环境进行持续监测的可能性,并提供了影响生长环境的机会。对系统结构的部件进行了选择。介绍了系统运行的算法。分析了系统组件之间的关系以及用户与系统之间的关系。
{"title":"Drip Irrigation Cyber-physical System with Remote Control","authors":"Y. Klushyn","doi":"10.47839/ijc.22.2.3096","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3096","url":null,"abstract":"In today's reality, the pace of people's lives is much higher than it was 30 years ago and it is still growing. At the same time, the amount of information is also growing. This information should be processed constantly, daily, as soon as it is received. Production volumes are not also standing still. Such a lively pace of life requires process consistency and continuity and these processes must be provided by a man. \u0000This article describes the system of watering which should automate the process of growing plants. Also, the analysis of a new branch, that is cyber-physical systems, is carried out. The analysis of modern systems of autonomous irrigation, principles of their construction and organization of their work is conducted. A method of implementing a system that provides the possibility of constant monitoring of the growing environment and provides an opportunity to influence it is suggested. The choice of components for system construction is made. The algorithm of the system operation is described. An analysis of the relationship between system components and the user's relationship with the system is performed.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79605921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of Sprain and Non-sprain Motion using Deep Learning Neural Networks for Ankle Sprain Prevention 使用深度学习神经网络进行踝关节扭伤预防的扭伤和非扭伤运动分类
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3085
Natrisha Francis, Suhaimi Suhaimi, E. Abas
A smart wearable ankle sprain prevention device would require an intelligent monitoring system that can classify data from the sensors as sprain or non-sprain motion. This paper aims to explore Deep Neural Network method, specifically the Long Short Term Memory Fully Convolutional Network (LSTM-FCN) for classifying sprain and non-sprain motion. A study is conducted on 11 participants to record sprain and non-sprain motions, which are used to train and test the LSTM-FCN model and previously used Support Vector Machine (SVM) model. It has been demonstrated that the LSTM-FCN model is more accurate at classifying sprain and non-sprain motion. The LSTM-FCN also proved to be more useful as its architecture allows for the Class Activation Mapping (CAM) method to be employed. The CAM method allows for the identification of temporal regions of the time series that contribute most or least to the classification decision of the LSTMFCN. Visualizing the regions of high or low contribution makes it easy to see patterns in the data correlation with sprain motion and better understand why certain non-sprain data can be misclassified as sprain motion. Overall, LSTM-FCN is found to be a viable method for the classification of sprain and non-sprain motion.
智能可穿戴脚踝扭伤预防设备需要一个智能监控系统,该系统可以将来自传感器的数据分类为扭伤或非扭伤运动。本文旨在探索深度神经网络方法,特别是长短期记忆全卷积网络(LSTM-FCN)对扭伤和非扭伤运动的分类。研究对11名参与者进行扭伤和非扭伤运动记录,用于训练和测试LSTM-FCN模型和之前使用的支持向量机(SVM)模型。结果表明,LSTM-FCN模型对扭伤和非扭伤运动的分类更为准确。LSTM-FCN也被证明更有用,因为它的体系结构允许使用类激活映射(CAM)方法。CAM方法允许识别时间序列中对LSTMFCN分类决策贡献最大或最小的时间区域。可视化高或低贡献区域可以很容易地看到与扭伤运动相关的数据模式,并更好地理解为什么某些非扭伤数据可能被错误地归类为扭伤运动。综上所述,LSTM-FCN是一种可行的扭伤和非扭伤运动分类方法。
{"title":"Classification of Sprain and Non-sprain Motion using Deep Learning Neural Networks for Ankle Sprain Prevention","authors":"Natrisha Francis, Suhaimi Suhaimi, E. Abas","doi":"10.47839/ijc.22.2.3085","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3085","url":null,"abstract":"A smart wearable ankle sprain prevention device would require an intelligent monitoring system that can classify data from the sensors as sprain or non-sprain motion. This paper aims to explore Deep Neural Network method, specifically the Long Short Term Memory Fully Convolutional Network (LSTM-FCN) for classifying sprain and non-sprain motion. A study is conducted on 11 participants to record sprain and non-sprain motions, which are used to train and test the LSTM-FCN model and previously used Support Vector Machine (SVM) model. It has been demonstrated that the LSTM-FCN model is more accurate at classifying sprain and non-sprain motion. The LSTM-FCN also proved to be more useful as its architecture allows for the Class Activation Mapping (CAM) method to be employed. The CAM method allows for the identification of temporal regions of the time series that contribute most or least to the classification decision of the LSTMFCN. Visualizing the regions of high or low contribution makes it easy to see patterns in the data correlation with sprain motion and better understand why certain non-sprain data can be misclassified as sprain motion. Overall, LSTM-FCN is found to be a viable method for the classification of sprain and non-sprain motion.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83916330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Feature Weighting for Parkinson's Identification using Single Hidden Layer Neural Network 基于单隐层神经网络的帕金森病特征加权识别
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3092
S. Abdulateef, A. N. Ismael, Mohanad Dawood Salman
The diagnosis of Parkinson has become easier with the existence of machine learning. It includes using existing features from the biometric dataset generated by the person to identify whether he has Parkinson or not. The features differ in their discrimination capability and they suffer from redundancy. Hence, researchers have recommended using feature selection for Parkinson's identification. The feature selection aims at finding the most important and relevant features to produce an efficient and effective model. In this article, we present entropy-based Parkinson classification. The goal is to select only 50% of the most relevant features for Parkinson prediction. Two variants of neural networks are used for evaluation, the first one is a feed-forward Extreme Learning Machine ELM and the second one is Fast Learning Machine FLN. Also, the K-Nearest Neighbor KNN algorithm is used for evaluation. The results show the superiority of ELM and FLN when the model of feature selection is used with an accuracy of 80% compared with only 78% when the model is not used.
随着机器学习的出现,帕金森的诊断变得更加容易。它包括使用个人生成的生物特征数据集中的现有特征来识别他是否患有帕金森症。这些特征在识别能力上存在差异,并且存在冗余。因此,研究人员建议使用特征选择来识别帕金森病。特征选择的目的是找到最重要和最相关的特征,以产生一个高效的模型。在本文中,我们提出了基于熵的帕金森分类。目标是只选择50%最相关的特征来预测帕金森病。神经网络的两种变体用于评估,第一种是前馈极限学习机ELM,第二种是快速学习机FLN。此外,还使用k近邻KNN算法进行评估。结果表明,当使用特征选择模型时,ELM和FLN的准确率达到80%,而不使用模型时,准确率仅为78%。
{"title":"Feature Weighting for Parkinson's Identification using Single Hidden Layer Neural Network","authors":"S. Abdulateef, A. N. Ismael, Mohanad Dawood Salman","doi":"10.47839/ijc.22.2.3092","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3092","url":null,"abstract":"The diagnosis of Parkinson has become easier with the existence of machine learning. It includes using existing features from the biometric dataset generated by the person to identify whether he has Parkinson or not. The features differ in their discrimination capability and they suffer from redundancy. Hence, researchers have recommended using feature selection for Parkinson's identification. The feature selection aims at finding the most important and relevant features to produce an efficient and effective model. In this article, we present entropy-based Parkinson classification. The goal is to select only 50% of the most relevant features for Parkinson prediction. Two variants of neural networks are used for evaluation, the first one is a feed-forward Extreme Learning Machine ELM and the second one is Fast Learning Machine FLN. Also, the K-Nearest Neighbor KNN algorithm is used for evaluation. The results show the superiority of ELM and FLN when the model of feature selection is used with an accuracy of 80% compared with only 78% when the model is not used.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82214193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Adaptive and Multiplicative Models for Analysis and Forecasting of Time Series 自适应与乘法模型在时间序列分析与预测中的应用
Q3 Computer Science Pub Date : 2023-07-01 DOI: 10.47839/ijc.22.2.3089
N. Boyko
The paper considers two forms of models: seasonal and non-seasonal analogues of oscillations.  Additive models belong to the first form, which reflects a relatively constant seasonal wave, as well as a wave that dynamically changes depending on the trend. The second ones are multiplicative models. The paper analyzes the basic adaptive models: Brown, Holt and autoregression models. The parameters of adaptation and layout are considered by the method of numerical estimation of parameters. The mechanism of reflection of oscillatory (seasonal or cyclic) development of the studied process through reproduction of the scheme of moving average and the scheme of autoregression is analyzed. The paper determines the optimal value of the smoothing coefficient through adaptive polynomial models of the first and second order. Prediction using the Winters model (exponential smoothing with multiplicative seasonality and linear growth) is proposed. The application of the Winters model allows us to determine the calculated values and forecast using the model of exponential smoothing with multiplicative seasonality and linear growth. The results are calculated according to the model of exponential smoothing and with the multiplicative seasonality of Winters. The best model is determined, which allows improving the forecast results through the correct selection of the optimal value of α. The paper also forecasts the production volume according to the Tayle-Vage model, i.e., the analysis of exponential smoothing with additive seasonality and linear growth is given to determine the calculated values α. The paper proves that the additive model makes it possible to build a model with multiplicative seasonality and exponential tendency. The paper proves statements that allow one to choose the right method for better modeling and forecasting of data.
本文考虑了两种模式:季节性和非季节性振荡类似物。加性模式属于第一种形式,它反映了一个相对恒定的季节性波动,以及一个根据趋势动态变化的波动。第二种是乘法模型。本文分析了基本的自适应模型:Brown、Holt和自回归模型。采用参数数值估计的方法考虑了自适应参数和布局参数。通过对移动平均方案和自回归方案的再现,分析了所研究过程振荡(季节或周期)发展的反映机制。本文通过一阶和二阶自适应多项式模型确定了平滑系数的最优值。提出了使用温特斯模型(指数平滑与乘法季节性和线性增长)的预测。温特斯模型的应用使我们能够确定计算值,并使用具有乘法季节性和线性增长的指数平滑模型进行预测。结果是根据指数平滑模型计算的,并考虑了冬季的乘法季节性。确定了最佳模型,通过正确选择α的最优值来改善预测结果。本文还采用Tayle-Vage模型对产量进行预测,即采用加性季节性和线性增长的指数平滑分析来确定计算值α。本文证明了加性模型可以建立具有乘法季节性和指数趋势的模型。本文证明了允许人们选择正确的方法来更好地建模和预测数据的陈述。
{"title":"Application of Adaptive and Multiplicative Models for Analysis and Forecasting of Time Series","authors":"N. Boyko","doi":"10.47839/ijc.22.2.3089","DOIUrl":"https://doi.org/10.47839/ijc.22.2.3089","url":null,"abstract":"The paper considers two forms of models: seasonal and non-seasonal analogues of oscillations.  Additive models belong to the first form, which reflects a relatively constant seasonal wave, as well as a wave that dynamically changes depending on the trend. The second ones are multiplicative models. The paper analyzes the basic adaptive models: Brown, Holt and autoregression models. The parameters of adaptation and layout are considered by the method of numerical estimation of parameters. The mechanism of reflection of oscillatory (seasonal or cyclic) development of the studied process through reproduction of the scheme of moving average and the scheme of autoregression is analyzed. The paper determines the optimal value of the smoothing coefficient through adaptive polynomial models of the first and second order. Prediction using the Winters model (exponential smoothing with multiplicative seasonality and linear growth) is proposed. The application of the Winters model allows us to determine the calculated values and forecast using the model of exponential smoothing with multiplicative seasonality and linear growth. The results are calculated according to the model of exponential smoothing and with the multiplicative seasonality of Winters. The best model is determined, which allows improving the forecast results through the correct selection of the optimal value of α. The paper also forecasts the production volume according to the Tayle-Vage model, i.e., the analysis of exponential smoothing with additive seasonality and linear growth is given to determine the calculated values α. The paper proves that the additive model makes it possible to build a model with multiplicative seasonality and exponential tendency. The paper proves statements that allow one to choose the right method for better modeling and forecasting of data.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90392249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1