首页 > 最新文献

International Journal of Computing最新文献

英文 中文
Optimum Reactive Power Dispatch Solution using Hybrid Particle Swarm Optimization and Pathfinder Algorithm 基于粒子群算法和探路者算法的最优无功调度
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2775
S. A. Adegoke, Yanxia Sun
Optimum reactive power dispatch (ORPD) significantly impacts the operation and control of electrical power systems (EPS) due to its undeniable benefit in the economic operation and reliability of the systems. ORPD is a sub-problem of optimal power flow (OPF). The main aim is to reduce/minimize the real power loss. Among the swarm intelligence (SI) metaheuristic algorithms is particle swarm optimization (PSO), which has fast convergence speed and gives the optimum solution to a particular problem by moving the swarm in the intensification (exploitation) search space. Also, the pathfinder algorithm (PFA) mimics the collective movement of the swarms with a leading member. Therefore, combining the fast convergence of PSO with PFA to form a hybrid technique is considered a viable approach in this study to avoid decreasing PFA searchability when the dimension of the problem increases. In this article, a hybrid algorithm based on a particle swarm optimization and pathfinder algorithm (HPSO-PFA) is proposed for the first time to study the combination of the control variables (generator voltage, transformer tap, and sizing of reactive compensation to obtain the objective function (total real power loss). The proposed method is tested on the IEEE 30 and 118 bus systems. The losses were reduced to 16.14262 MW and 107.2913 MW for the IEEE 30 and 118 test systems. Furthermore, the percentage (%) reduction for the IEEE 30 and 118 test systems are 9.8% and 19.25%, respectively. The result demonstrates the performance of HPSO-PFA gives a better solution than the other algorithms.
最优无功调度(ORPD)对电力系统的经济运行和可靠性有着不可否认的好处,对电力系统的运行和控制有着重要的影响。ORPD是最优潮流问题(OPF)的子问题。主要目的是减少/最小化实际功率损失。在群体智能(SI)的元启发式算法中,粒子群优化算法(PSO)收敛速度快,通过在强化(开发)搜索空间中移动群体来给出特定问题的最优解。此外,寻路者算法(PFA)模拟了具有领导成员的群体的集体运动。因此,结合粒子群算法和粒子群算法的快速收敛性,形成一种混合算法,避免了粒子群算法在问题维数增加时可搜索性下降的问题,是本研究的可行方法。本文首次提出了一种基于粒子群优化和寻路算法的混合算法(HPSO-PFA),研究了控制变量(发电机电压、变压器分接和无功补偿大小)的组合,以获得目标函数(总实际损耗)。该方法在ieee30和ieee118总线系统上进行了测试。ieee30和ieee118测试系统的损耗分别减少到16.14262 MW和107.2913 MW。此外,ieee30和ieee118测试系统的降低百分比分别为9.8%和19.25%。结果表明,HPSO-PFA算法的性能优于其他算法。
{"title":"Optimum Reactive Power Dispatch Solution using Hybrid Particle Swarm Optimization and Pathfinder Algorithm","authors":"S. A. Adegoke, Yanxia Sun","doi":"10.47839/ijc.21.4.2775","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2775","url":null,"abstract":"Optimum reactive power dispatch (ORPD) significantly impacts the operation and control of electrical power systems (EPS) due to its undeniable benefit in the economic operation and reliability of the systems. ORPD is a sub-problem of optimal power flow (OPF). The main aim is to reduce/minimize the real power loss. Among the swarm intelligence (SI) metaheuristic algorithms is particle swarm optimization (PSO), which has fast convergence speed and gives the optimum solution to a particular problem by moving the swarm in the intensification (exploitation) search space. Also, the pathfinder algorithm (PFA) mimics the collective movement of the swarms with a leading member. Therefore, combining the fast convergence of PSO with PFA to form a hybrid technique is considered a viable approach in this study to avoid decreasing PFA searchability when the dimension of the problem increases. In this article, a hybrid algorithm based on a particle swarm optimization and pathfinder algorithm (HPSO-PFA) is proposed for the first time to study the combination of the control variables (generator voltage, transformer tap, and sizing of reactive compensation to obtain the objective function (total real power loss). The proposed method is tested on the IEEE 30 and 118 bus systems. The losses were reduced to 16.14262 MW and 107.2913 MW for the IEEE 30 and 118 test systems. Furthermore, the percentage (%) reduction for the IEEE 30 and 118 test systems are 9.8% and 19.25%, respectively. The result demonstrates the performance of HPSO-PFA gives a better solution than the other algorithms.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80216013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Enhanced Online Boosting Ensemble Classification Technique to Deal with Data Drift 一种处理数据漂移的增强在线增强集成分类技术
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2778
R. Samant, S. Patil
Over the last two decades, big data analytics has become a requirement in the research industry. Stream data mining is essential in many areas because data is generated in the form of streams in a wide variety of online applications. Along with the size and speed of the data stream, concept drift is a difficult issue to handle. This paper proposes an Enhanced Boosting-like Online Learning Ensemble Method based on a heuristic modification to the Boosting-like Online Learning Ensemble (BOLE). This algorithm has been improved by implementing a data instance that retains the previous state policy. During the boosting phase of this modified algorithm, the selection and voting strategy for an instance is advanced. Extensive experimental results on a variety of real-world and synthetic datasets show that the proposed method adequately addresses the drift detection problem. It has outperformed several state-of-the-art boosting-based ensembles dedicated to data stream mining (statistically). The proposed method improved overall accuracy by 1.30 percent to 14.45 percent when compared to other boosting-based ensembles on concept drifted datasets.
在过去的二十年里,大数据分析已经成为研究行业的一种需求。流数据挖掘在许多领域都是必不可少的,因为在各种在线应用程序中,数据都是以流的形式生成的。随着数据流的大小和速度,概念漂移是一个难以处理的问题。本文提出了一种基于启发式改进的类boost在线学习集成方法。通过实现保留先前状态策略的数据实例,改进了该算法。在改进算法的增强阶段,改进了实例的选择和投票策略。在各种真实和合成数据集上的大量实验结果表明,所提出的方法充分解决了漂移检测问题。它的性能优于几个致力于数据流挖掘的最先进的基于增强的集成(统计)。与其他基于增强的概念漂移数据集集成相比,所提出的方法将整体精度提高了1.30%至14.45%。
{"title":"An Enhanced Online Boosting Ensemble Classification Technique to Deal with Data Drift","authors":"R. Samant, S. Patil","doi":"10.47839/ijc.21.4.2778","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2778","url":null,"abstract":"Over the last two decades, big data analytics has become a requirement in the research industry. Stream data mining is essential in many areas because data is generated in the form of streams in a wide variety of online applications. Along with the size and speed of the data stream, concept drift is a difficult issue to handle. This paper proposes an Enhanced Boosting-like Online Learning Ensemble Method based on a heuristic modification to the Boosting-like Online Learning Ensemble (BOLE). This algorithm has been improved by implementing a data instance that retains the previous state policy. During the boosting phase of this modified algorithm, the selection and voting strategy for an instance is advanced. Extensive experimental results on a variety of real-world and synthetic datasets show that the proposed method adequately addresses the drift detection problem. It has outperformed several state-of-the-art boosting-based ensembles dedicated to data stream mining (statistically). The proposed method improved overall accuracy by 1.30 percent to 14.45 percent when compared to other boosting-based ensembles on concept drifted datasets.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82808649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DMUAS-IoT: A Decentralised Multi-Factor User Authentication Scheme for IoT Systems DMUAS-IoT:物联网系统的分散式多因素用户认证方案
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2777
Ikenna Rene Chiadighikaobi, N. Katuk, Baharudin Osman
The Internet of Things (IoT) has become the fundamental infrastructure of many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication information, over a public channel that exposes it to security threats and attacks. Therefore, this study intends to protect authentication data communication through a decentralised multi-factor user authentication scheme for secure IoT applications (DMUAS-IoT). The scheme is secure and enables efficient user registration, login and authentication, and the user profile updating process where legitimate users can access the IoT system resources. DMUAS-IoT adopted PRESENT for face image encryption and elliptic curve cryptography for data exchange. The scheme security was verified using ProVerif and AVISPA, and mutual authentication was checked with BAN-Logic. The results show that the scheme is secure against man-in-the-middle and impersonation attacks, provides mutual authentication and has a low computation cost. Hence, the outcomes of this study could help secure user authentication data from attacks on applications involved with IoT and resource constraint environments.
物联网(IoT)已经成为智能家居等许多智能应用的基础设施。物联网应用程序存储通过公共通道分发各种信息,包括用户身份验证信息,这将使其暴露于安全威胁和攻击之下。因此,本研究旨在通过安全物联网应用(DMUAS-IoT)的分散多因素用户身份验证方案来保护身份验证数据通信。该方案具有安全、高效的用户注册、登录、认证和用户配置文件更新过程,使合法用户能够访问物联网系统资源。DMUAS-IoT采用PRESENT进行人脸图像加密,采用椭圆曲线加密进行数据交换。使用ProVerif和AVISPA验证方案的安全性,并使用BAN-Logic检查相互认证。结果表明,该方案具有抵御中间人攻击和模拟攻击的安全性,提供相互认证,且计算成本低。因此,本研究的结果可以帮助保护用户身份验证数据免受涉及物联网和资源约束环境的应用程序的攻击。
{"title":"DMUAS-IoT: A Decentralised Multi-Factor User Authentication Scheme for IoT Systems","authors":"Ikenna Rene Chiadighikaobi, N. Katuk, Baharudin Osman","doi":"10.47839/ijc.21.4.2777","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2777","url":null,"abstract":"The Internet of Things (IoT) has become the fundamental infrastructure of many intelligent applications, such as smart homes. IoT applications store distributes various information, including user authentication information, over a public channel that exposes it to security threats and attacks. Therefore, this study intends to protect authentication data communication through a decentralised multi-factor user authentication scheme for secure IoT applications (DMUAS-IoT). The scheme is secure and enables efficient user registration, login and authentication, and the user profile updating process where legitimate users can access the IoT system resources. DMUAS-IoT adopted PRESENT for face image encryption and elliptic curve cryptography for data exchange. The scheme security was verified using ProVerif and AVISPA, and mutual authentication was checked with BAN-Logic. The results show that the scheme is secure against man-in-the-middle and impersonation attacks, provides mutual authentication and has a low computation cost. Hence, the outcomes of this study could help secure user authentication data from attacks on applications involved with IoT and resource constraint environments.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89666747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Generalized Method of Decreasing Data Redundancy 一种降低数据冗余的广义方法
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2786
Y. Iliash
In this paper, a method of decreasing the redundancy of information flow by using recurrent properties of Galois code sequences is proposed. For this purpose, the service information is compiled and the priority compression is identified. The method is based on applying one of the adaptive algorithms (prediction first-order, interpolation zero-order, interpolation first-order) by comparing the efficiency of its use when applied to the selected fragments of a signal. It is shown that the developed method is effective for the quick-change signals when the structure and behavior of a signal change drastically. The efficiency of redundancy decreasing at the different sampling rate and the number of the significant samples is evaluated. This makes it possible to establish the limits of the positive effect for redundancy of information flows for the existing and developed methods. Experimental research is carried out for various permissible deviations with obtaining the number of the significant readings. A comparison of the obtained data with results of applying the existing methods in deep pumping installations proved that the proposed method is in 1.3 times more effective than existing ones.
本文提出了一种利用伽罗瓦码序列的循环特性来降低信息流冗余度的方法。为此,将编译服务信息并确定优先级压缩。该方法是基于应用自适应算法(预测一阶,插值零阶,插值一阶)中的一种,通过比较其在应用于选定信号片段时的使用效率。结果表明,当信号的结构和行为发生剧烈变化时,该方法对快速变化信号是有效的。在不同的采样率和显著样本数下,对冗余降低的效率进行了评价。这使得有可能确定现有和开发的方法对信息流冗余的积极影响的限制。对各种允许偏差进行了实验研究,获得了有效读数的数量。将所得数据与现有方法在深泵装置上的应用结果进行了比较,证明了所提方法的有效性是现有方法的1.3倍以上。
{"title":"A Generalized Method of Decreasing Data Redundancy","authors":"Y. Iliash","doi":"10.47839/ijc.21.4.2786","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2786","url":null,"abstract":"In this paper, a method of decreasing the redundancy of information flow by using recurrent properties of Galois code sequences is proposed. For this purpose, the service information is compiled and the priority compression is identified. The method is based on applying one of the adaptive algorithms (prediction first-order, interpolation zero-order, interpolation first-order) by comparing the efficiency of its use when applied to the selected fragments of a signal. It is shown that the developed method is effective for the quick-change signals when the structure and behavior of a signal change drastically. The efficiency of redundancy decreasing at the different sampling rate and the number of the significant samples is evaluated. This makes it possible to establish the limits of the positive effect for redundancy of information flows for the existing and developed methods. Experimental research is carried out for various permissible deviations with obtaining the number of the significant readings. A comparison of the obtained data with results of applying the existing methods in deep pumping installations proved that the proposed method is in 1.3 times more effective than existing ones.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86915795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Consumption Monitoring with Evaluation of Hidden Energy Losses 基于隐性能量损失评估的能耗监测
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2784
B. Pleskach
This article presents a computational method for monitoring the energy consumption of technological systems with the assessment of their hidden energy losses caused by erroneous actions of personnel or equipment failures. Herewith, energy losses are calculated as the difference between the actual energy consumed and the minimum energy required to conduct the process in all operating modes. The minimum required energy is determined by the machine learning method based on stationary consumption precedents. Two approaches to the implementation of energy consumption monitoring with the assessment of hidden energy losses are considered – hardware and software. The hardware approach is based on the preliminary definition of normative, or minimum specific energy consumption in each technological mode. The software approach is based on the modeling of stationary areas of energy consumption in the form of precedents and their further analysis in the space of influential technological parameters. The paper notes the advantages and disadvantages of the proposed monitoring method, it is emphasized that the method is able to work with both linear and non-linear functions of energy dependence on the parameters of the technological process. It is noted in the paper that the advantage of the proposed method is the automated construction of the minimum energy function.
本文提出了一种监测技术系统能耗的计算方法,并评估了由于人员错误行为或设备故障造成的隐性能量损失。在此,能量损失计算为实际消耗的能量与在所有运行模式下进行该过程所需的最小能量之差。最小所需能量由基于固定消耗先例的机器学习方法确定。考虑了两种方法来实现能源消耗监测与评估隐藏的能源损失-硬件和软件。硬件方法基于对每种技术模式的规范或最小比能耗的初步定义。软件方法是基于以先例的形式对能源消耗的固定区域进行建模,并在有影响的技术参数空间中对其进行进一步分析。本文指出了所提出的监测方法的优点和缺点,强调该方法能够处理与工艺过程参数有关的能量依赖的线性和非线性函数。文中指出,该方法的优点在于能自动构造最小能量函数。
{"title":"Energy Consumption Monitoring with Evaluation of Hidden Energy Losses","authors":"B. Pleskach","doi":"10.47839/ijc.21.4.2784","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2784","url":null,"abstract":"This article presents a computational method for monitoring the energy consumption of technological systems with the assessment of their hidden energy losses caused by erroneous actions of personnel or equipment failures. Herewith, energy losses are calculated as the difference between the actual energy consumed and the minimum energy required to conduct the process in all operating modes. The minimum required energy is determined by the machine learning method based on stationary consumption precedents. Two approaches to the implementation of energy consumption monitoring with the assessment of hidden energy losses are considered – hardware and software. The hardware approach is based on the preliminary definition of normative, or minimum specific energy consumption in each technological mode. The software approach is based on the modeling of stationary areas of energy consumption in the form of precedents and their further analysis in the space of influential technological parameters. The paper notes the advantages and disadvantages of the proposed monitoring method, it is emphasized that the method is able to work with both linear and non-linear functions of energy dependence on the parameters of the technological process. It is noted in the paper that the advantage of the proposed method is the automated construction of the minimum energy function.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80531803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Hybrid Deep-GAN Model for Intrusion Detection in IoT Through Enhanced Whale Optimization 基于增强鲸鱼优化的物联网入侵检测混合深度gan模型
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2781
S. Balaji, S. Sankara Narayanan
IoT networks emerging as a significant growth in modern communication technological applications.  The network formed with sensor nodes with resource restrictions in complexity, open wireless transmission features lead them prone to security threats. An efficient Intrusion Detection System aids in detecting attacks and performs crucial counter act to promise secure and reliable function. However, for the reason of the widespread nature of IoT, the intrusion detection system is supposed to carry out in discrete form with fewer fascination on common manager. In order to conquer these issues, Distributed – Generative Adversarial Network (D-GAN) with Enhanced Whale Optimization – Distributed deep learning based on Artificial Neural Network (EWO-HDL+ANN) is proposed. Here the GAN can detect internal attacks and the D-GAN is capable of detecting both internal and external attacks effectively. Transfer By Subspace Similarity is engaged to carry out. After that the preprocessed data is fed into feature extraction stage. Modified Principal Component Analysis (MPCA) is applied to feature extraction, which is used to extract new features that are enlightened. Then, feature selection is executed by Enhanced Whale Optimization Algorithm, which is used to choose significant and superfluous features from the dataset. It gets better the classification accuracy through the greatest fitness value. Then the intrusion detection is evaluated by applying HDL+ANN algorithm used to detect the attacks powerfully. The experimental conclusion proves that the introduced EWO-DDL+ANN method provides enhanced intrusion detection system in the view of greater accuracy, precision, recall, f-measure and low False Positive Rate.
物联网网络作为现代通信技术应用的显著增长。由传感器节点组成的网络具有复杂性、开放性、无线传输等特点,容易受到安全威胁。有效的入侵检测系统有助于检测攻击并执行关键的反击动作,保证系统功能的安全可靠。然而,由于物联网的广泛性,入侵检测系统应该以离散形式进行,对共同管理者的关注较少。为了克服这些问题,提出了基于人工神经网络的增强鲸鱼优化分布式深度学习的分布式生成对抗网络(D-GAN)。其中GAN可以检测内部攻击,而D-GAN可以有效检测内部攻击和外部攻击。采用子空间相似度传递方法。然后将预处理后的数据输入到特征提取阶段。将修正主成分分析(MPCA)应用到特征提取中,用于提取新特征。然后,通过增强鲸鱼优化算法进行特征选择,该算法用于从数据集中选择重要和多余的特征。通过最大的适应度值来获得更好的分类精度。然后采用HDL+ANN算法对入侵检测进行评估,该算法对攻击进行了有效检测。实验结果表明,引入的EWO-DDL+ANN方法在准确率、精密度、召回率、f-measure和低误报率等方面对入侵检测系统具有增强作用。
{"title":"Hybrid Deep-GAN Model for Intrusion Detection in IoT Through Enhanced Whale Optimization","authors":"S. Balaji, S. Sankara Narayanan","doi":"10.47839/ijc.21.4.2781","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2781","url":null,"abstract":"IoT networks emerging as a significant growth in modern communication technological applications.  The network formed with sensor nodes with resource restrictions in complexity, open wireless transmission features lead them prone to security threats. An efficient Intrusion Detection System aids in detecting attacks and performs crucial counter act to promise secure and reliable function. However, for the reason of the widespread nature of IoT, the intrusion detection system is supposed to carry out in discrete form with fewer fascination on common manager. In order to conquer these issues, Distributed – Generative Adversarial Network (D-GAN) with Enhanced Whale Optimization – Distributed deep learning based on Artificial Neural Network (EWO-HDL+ANN) is proposed. Here the GAN can detect internal attacks and the D-GAN is capable of detecting both internal and external attacks effectively. Transfer By Subspace Similarity is engaged to carry out. After that the preprocessed data is fed into feature extraction stage. Modified Principal Component Analysis (MPCA) is applied to feature extraction, which is used to extract new features that are enlightened. Then, feature selection is executed by Enhanced Whale Optimization Algorithm, which is used to choose significant and superfluous features from the dataset. It gets better the classification accuracy through the greatest fitness value. Then the intrusion detection is evaluated by applying HDL+ANN algorithm used to detect the attacks powerfully. The experimental conclusion proves that the introduced EWO-DDL+ANN method provides enhanced intrusion detection system in the view of greater accuracy, precision, recall, f-measure and low False Positive Rate.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89226732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Entropy Based Segmentation Model for Kidney Stone and Cyst on Ultrasound Image 基于熵的超声图像肾结石和囊肿分割模型
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2780
Mino George, Anita Hadadi Bhimasena
Segmentation of abnormal masses in kidney images is a tough task. One of the main challenges is the presence of speckle noise, which will restrain the valuable information for the medical practitioners. Hence, the detection and segmentation of the affected regions vary in accuracies. The proposed model includes pre-processing and segmentation of the diseased region. The pre-processing consists of Gaussian filtering and Contrast Limited Adaptive Histogram Equalization (CLHE) to improve the clarity of the images. Further, segmentation has been done based on the entropy of the image and gamma correction has been done to improve the overall brightness of the images. An optimal global threshold value is selected to extract the region of interest and measures the area. The model is analyzed with statistical parameters like Jaccard index and Dice coefficient and compared with the ground truth images. To check the accuracy of the segmentation, relative error is calculated. This framework can be used by radiologists in diagnosing kidney patients
肾脏图像中异常肿块的分割是一项艰巨的任务。其中一个主要的挑战是斑点噪声的存在,这将限制对医疗从业者有价值的信息。因此,受影响区域的检测和分割精度各不相同。该模型包括病变区域的预处理和分割。预处理包括高斯滤波和对比度有限自适应直方图均衡化(CLHE),以提高图像的清晰度。进一步,根据图像的熵值进行分割,并进行伽玛校正,提高图像的整体亮度。选择一个最优的全局阈值提取感兴趣的区域并测量该区域。利用Jaccard指数和Dice系数等统计参数对模型进行分析,并与地面真实图像进行比较。为了检验分割的准确性,计算了相对误差。这个框架可以被放射科医生用于诊断肾病患者
{"title":"Entropy Based Segmentation Model for Kidney Stone and Cyst on Ultrasound Image","authors":"Mino George, Anita Hadadi Bhimasena","doi":"10.47839/ijc.21.4.2780","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2780","url":null,"abstract":"Segmentation of abnormal masses in kidney images is a tough task. One of the main challenges is the presence of speckle noise, which will restrain the valuable information for the medical practitioners. Hence, the detection and segmentation of the affected regions vary in accuracies. The proposed model includes pre-processing and segmentation of the diseased region. The pre-processing consists of Gaussian filtering and Contrast Limited Adaptive Histogram Equalization (CLHE) to improve the clarity of the images. Further, segmentation has been done based on the entropy of the image and gamma correction has been done to improve the overall brightness of the images. An optimal global threshold value is selected to extract the region of interest and measures the area. The model is analyzed with statistical parameters like Jaccard index and Dice coefficient and compared with the ground truth images. To check the accuracy of the segmentation, relative error is calculated. This framework can be used by radiologists in diagnosing kidney patients","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85388489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimates of the Complexity of Detecting Types of DDOS Attacks 估计DDOS攻击检测类型的复杂性
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2779
N. Ignatev, E. Navruzov
The problem of substantiating decisions made in the field of information security through estimates of the complexity of detecting types of DDOS attacks is considered. Estimates are a quantitative measure of a particular type of attack relative to normal network operation traffic data in its own feature space. Own space is represented by a set of informative features. To assess the complexity of detecting types of DDOS attacks, a measure of compactness by latent features on the numerical axis was used. The values of this measure were calculated as the product of intraclass similarity and interclass difference. It is shown that compactness in terms of latent features in its own space is higher than in the entire space. The values of latent features were calculated using the method of generalized estimates. According to this method, objects of normal traffic and a specific type of attack are considered as opposition to each other. An informative feature set is the result of an algorithm that uses the rules of hierarchical agglomerative grouping. At the first step, the feature with the maximum weight value is included in the set. The grouping rules apply the feature invariance property to the scales of their measurements. An analysis of the complexity of detection for 12 types of DDOS attacks is given. The power of sets of informative features ranged from 3 to 16.
通过估计检测DDOS攻击类型的复杂性,考虑了在信息安全领域中证实决策的问题。估计是一种特定类型的攻击相对于其自身特征空间中的正常网络操作流量数据的定量度量。自己的空间由一组信息特征表示。为了评估检测DDOS攻击类型的复杂性,使用了数字轴上的潜在特征来衡量紧凑性。该度量的值计算为类内相似性和类间差异的乘积。结果表明,隐特征在其自身空间中的紧致性高于整个空间中的紧致性。使用广义估计方法计算潜在特征的值。根据这种方法,正常流量的对象和特定类型的攻击对象被认为是相互对立的。信息特征集是使用分层聚合分组规则的算法的结果。第一步,将权重值最大的特征纳入集合。分组规则将特征不变性应用于其测量的尺度。对12种DDOS攻击的检测复杂度进行了分析。信息特征集的能力范围从3到16。
{"title":"Estimates of the Complexity of Detecting Types of DDOS Attacks","authors":"N. Ignatev, E. Navruzov","doi":"10.47839/ijc.21.4.2779","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2779","url":null,"abstract":"The problem of substantiating decisions made in the field of information security through estimates of the complexity of detecting types of DDOS attacks is considered. Estimates are a quantitative measure of a particular type of attack relative to normal network operation traffic data in its own feature space. Own space is represented by a set of informative features. To assess the complexity of detecting types of DDOS attacks, a measure of compactness by latent features on the numerical axis was used. The values of this measure were calculated as the product of intraclass similarity and interclass difference. It is shown that compactness in terms of latent features in its own space is higher than in the entire space. The values of latent features were calculated using the method of generalized estimates. According to this method, objects of normal traffic and a specific type of attack are considered as opposition to each other. An informative feature set is the result of an algorithm that uses the rules of hierarchical agglomerative grouping. At the first step, the feature with the maximum weight value is included in the set. The grouping rules apply the feature invariance property to the scales of their measurements. An analysis of the complexity of detection for 12 types of DDOS attacks is given. The power of sets of informative features ranged from 3 to 16.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86156677","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Diabetes Prediction Using Binary Grey Wolf Optimization and Decision Tree 二叉灰狼优化与决策树预测糖尿病
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2785
Layla AL.hak
Type 2 diabetes is a well-known lifelong condition disease that reduces the human body’s ability to produce insulin. This causes high blood sugar levels, which leads to different complications, including stroke, eye, cardiovascular, kidney, and nerve damage. Although diabetes has attained the attention of huge research, the classification performance of such medical problems utilizing techniques of machine learning is quite low, primarily due to the class imbalance and the presence of missing values in data. In this work, we proposed a model using binary Grey wolf optimization (GWO) and a Decision tree. The proposed model is composed of preprocessing, feature selection, and classification. In preprocessing, that is responsible for minority class oversampling and handling missing values. In the second step, binary GWO are used to select the most significant features. In the third step, the proposed model is trained using the Decision tree algorithm. The model achieved an accuracy of 83.11% when it was applied on the Pima Indian`s dataset.
2型糖尿病是一种众所周知的终身疾病,它会降低人体产生胰岛素的能力。这会导致高血糖,从而导致各种并发症,包括中风、眼睛、心血管、肾脏和神经损伤。虽然糖尿病已经得到了大量研究的关注,但利用机器学习技术对这类医疗问题的分类性能很低,主要是由于类别不平衡和数据中存在缺失值。在这项工作中,我们提出了一个使用二元灰狼优化(GWO)和决策树的模型。该模型由预处理、特征选择和分类三部分组成。在预处理中,它负责少数类过采样和处理缺失值。在第二步中,使用二进制GWO选择最重要的特征。第三步,使用决策树算法对模型进行训练。该模型应用于皮马印第安人的数据集时,准确率达到83.11%。
{"title":"Diabetes Prediction Using Binary Grey Wolf Optimization and Decision Tree","authors":"Layla AL.hak","doi":"10.47839/ijc.21.4.2785","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2785","url":null,"abstract":"Type 2 diabetes is a well-known lifelong condition disease that reduces the human body’s ability to produce insulin. This causes high blood sugar levels, which leads to different complications, including stroke, eye, cardiovascular, kidney, and nerve damage. Although diabetes has attained the attention of huge research, the classification performance of such medical problems utilizing techniques of machine learning is quite low, primarily due to the class imbalance and the presence of missing values in data. In this work, we proposed a model using binary Grey wolf optimization (GWO) and a Decision tree. The proposed model is composed of preprocessing, feature selection, and classification. In preprocessing, that is responsible for minority class oversampling and handling missing values. In the second step, binary GWO are used to select the most significant features. In the third step, the proposed model is trained using the Decision tree algorithm. The model achieved an accuracy of 83.11% when it was applied on the Pima Indian`s dataset.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83071912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Microservice-based Software Architecture for Improving the Availability of Dental Health Records 一种基于微服务的提高牙齿健康记录可用性的软件架构
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2783
Juan Arcila-Diaz, Carlos Valdivia
In order to keep accessible, the patient care information recorded by a dental provider, a software architecture must be designed to allow availability among the different providers. In this research, a software architecture based on the Microservices approach is designed to enable the availability of dental medical records. The quality attributes and functional requirements were identified to design the architecture, determining that it should be composed of 4 Microservices, Patient, Dental Medical Record, Odontogram and Dental Service Provider; each microservice implements its database, the secure communication between the microservices and the clients is done through an API Gateway of HTTP resources and an authentication token. To evaluate the software architecture, a prototype was developed in which each component was deployed in containers using the Microsoft Azure App Service. On this prototype load tests were performed to evaluate Availability and Performance determining that up to 21 dental records per second can be available with 100% availability, and if the demand of requests increases the architecture scales automatically.
为了保持牙科医生记录的病人护理信息的可访问性,必须设计一个软件架构,以允许不同医生之间的可用性。在本研究中,设计了一个基于微服务方法的软件架构,以实现牙科医疗记录的可用性。确定了质量属性和功能需求来设计体系结构,确定其应由4个微服务组成:患者、牙科医疗记录、牙床摄影和牙科服务提供者;每个微服务实现自己的数据库,微服务和客户端之间的安全通信是通过HTTP资源的API网关和身份验证令牌完成的。为了评估软件架构,开发了一个原型,其中每个组件都使用Microsoft Azure应用程序服务部署在容器中。在此原型上执行负载测试以评估可用性和性能,确定每秒最多可以提供21个牙科记录,并且可用性为100%,并且如果请求需求增加,则架构会自动扩展。
{"title":"A Microservice-based Software Architecture for Improving the Availability of Dental Health Records","authors":"Juan Arcila-Diaz, Carlos Valdivia","doi":"10.47839/ijc.21.4.2783","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2783","url":null,"abstract":"In order to keep accessible, the patient care information recorded by a dental provider, a software architecture must be designed to allow availability among the different providers. \u0000In this research, a software architecture based on the Microservices approach is designed to enable the availability of dental medical records. The quality attributes and functional requirements were identified to design the architecture, determining that it should be composed of 4 Microservices, Patient, Dental Medical Record, Odontogram and Dental Service Provider; each microservice implements its database, the secure communication between the microservices and the clients is done through an API Gateway of HTTP resources and an authentication token. \u0000To evaluate the software architecture, a prototype was developed in which each component was deployed in containers using the Microsoft Azure App Service. On this prototype load tests were performed to evaluate Availability and Performance determining that up to 21 dental records per second can be available with 100% availability, and if the demand of requests increases the architecture scales automatically.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81680050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1