首页 > 最新文献

International Journal of Computing最新文献

英文 中文
Analysis of COVID-19 and its Impact on Alzheimer’s Patient using Machine Learning Techniques 利用机器学习技术分析COVID-19及其对阿尔茨海默病患者的影响
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2782
R. Sivakani, M. Syed Masood
In this world, there is fast growth in technology, as technology growth is there the human also move fast based on the growth in technology. New diseases also growing fast in the world.  In this paper, a semi-supervised approach has been proposed for the classification of the COVID-19 and a study has been done to analyze the impact of the covid on Alzheimer’s disease patients. Coronavirus disease is a respiratory infection disease and Alzheimer’s disease is a brain disease. From the literature, it has been analyzed that, because of the coronavirus the immunity system will be affected in humans and there is a chance to affect the brain also. Classification and clustering have been done on the coronavirus dataset and validated using a 10-fold validation process. The classifiers applied are Naïve Bayes and Random Forest; the results obtained are 99.88% and 100% accuracy. Also, the clustering has been applied and 2 clusters are generated for grouping the classes. Then a study has been done for predicting the impact of the coronavirus on Alzheimer’s patients.
在这个世界上,技术发展很快,随着技术的发展,人类也在技术发展的基础上快速发展。世界上新的疾病也在快速增长。本文提出了一种半监督方法对covid -19进行分类,并进行了一项研究,分析了covid对阿尔茨海默病患者的影响。冠状病毒病是一种呼吸道感染疾病,阿尔茨海默病是一种脑部疾病。从文献中分析,由于冠状病毒,人类的免疫系统会受到影响,也有可能影响大脑。对冠状病毒数据集进行了分类和聚类,并使用10倍验证过程进行了验证。使用的分类器有Naïve贝叶斯和随机森林;测定结果的准确度为99.88%和100%。此外,还应用了聚类,并生成了2个集群用于对类进行分组。然后进行了一项研究,预测冠状病毒对阿尔茨海默病患者的影响。
{"title":"Analysis of COVID-19 and its Impact on Alzheimer’s Patient using Machine Learning Techniques","authors":"R. Sivakani, M. Syed Masood","doi":"10.47839/ijc.21.4.2782","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2782","url":null,"abstract":"In this world, there is fast growth in technology, as technology growth is there the human also move fast based on the growth in technology. New diseases also growing fast in the world.  In this paper, a semi-supervised approach has been proposed for the classification of the COVID-19 and a study has been done to analyze the impact of the covid on Alzheimer’s disease patients. Coronavirus disease is a respiratory infection disease and Alzheimer’s disease is a brain disease. From the literature, it has been analyzed that, because of the coronavirus the immunity system will be affected in humans and there is a chance to affect the brain also. Classification and clustering have been done on the coronavirus dataset and validated using a 10-fold validation process. The classifiers applied are Naïve Bayes and Random Forest; the results obtained are 99.88% and 100% accuracy. Also, the clustering has been applied and 2 clusters are generated for grouping the classes. Then a study has been done for predicting the impact of the coronavirus on Alzheimer’s patients.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85474904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Many Known Quantum Algorithms Are Optimal: Symmetry-Based Proofs 许多已知的量子算法是最优的:基于对称的证明
Q3 Computer Science Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2776
V. Kreinovich, Oscar Galindo, O. Kosheleva
Many quantum algorithms have been proposed which are drastically more efficient that the best of the non-quantum algorithms for solving the same problems. A natural question is: are these quantum algorithms already optimal – in some reasonable sense – or they can be further improved? In this paper, we review recent results showing that many known quantum algorithms are actually optimal. Several of these results are based on appropriate invariances (symmetries). Specifically, we show that the following algorithms are optimal: Grover’s algorithm for fast search in an unsorted array, teleportation algorithm – which is important for parallel quantum computations, and quantum annealing optimization algorithm. This covers many algorithms related to quantum computing. We also mention that algorithms for quantum communication and Deutsch-Josza algorithm – for fast checking whether a bit affect computation results – are optimal. In all these cases, optimality is shown not just for one specific optimality criterion, but for all possible optimality criteria that satisfy the natural invariance requirement.
人们提出了许多量子算法,它们比最好的非量子算法更有效地解决同样的问题。一个自然的问题是:这些量子算法已经是最优的了吗——在某种合理的意义上——或者它们还可以进一步改进?在本文中,我们回顾了最近的结果,表明许多已知的量子算法实际上是最优的。其中一些结果是基于适当的不变性(对称性)。具体来说,我们证明了以下算法是最优的:用于无序数组快速搜索的Grover算法、用于并行量子计算的隐形传态算法和量子退火优化算法。这涵盖了许多与量子计算相关的算法。我们还提到量子通信算法和Deutsch-Josza算法(用于快速检查比特是否影响计算结果)是最佳的。在所有这些情况下,最优性不只是针对一个特定的最优性标准,而是针对满足自然不变性要求的所有可能的最优性标准。
{"title":"Many Known Quantum Algorithms Are Optimal: Symmetry-Based Proofs","authors":"V. Kreinovich, Oscar Galindo, O. Kosheleva","doi":"10.47839/ijc.21.4.2776","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2776","url":null,"abstract":"Many quantum algorithms have been proposed which are drastically more efficient that the best of the non-quantum algorithms for solving the same problems. A natural question is: are these quantum algorithms already optimal – in some reasonable sense – or they can be further improved? In this paper, we review recent results showing that many known quantum algorithms are actually optimal. Several of these results are based on appropriate invariances (symmetries). Specifically, we show that the following algorithms are optimal: Grover’s algorithm for fast search in an unsorted array, teleportation algorithm – which is important for parallel quantum computations, and quantum annealing optimization algorithm. This covers many algorithms related to quantum computing. We also mention that algorithms for quantum communication and Deutsch-Josza algorithm – for fast checking whether a bit affect computation results – are optimal. In all these cases, optimality is shown not just for one specific optimality criterion, but for all possible optimality criteria that satisfy the natural invariance requirement.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72403686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic 基于强化学习和模糊逻辑的软件定义网络流量感知路由
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2687
Shohreh Jaafari, M. Nassiri, Reza Mohammadi
In recent years, the idea of software-defined networks (SDNs) has been proposed for better network management. This architecture has succeeded in optimizing network management functions and increased the ability to synchronize network equipment. Currently, one of the major issues in this architecture is the routing of packets flowing in the network. The main aim in the routing of packets is to increase the quality of services. Enhancement of the quality and productivity of these networks will increase user satisfaction. To this end, the present study proposes a mechanism for selecting the best route from among several existing routes to direct a flow on such a network. The proposed method examines the network parameters including bandwidth, delay, and packet loss on each link of the route by using artificial intelligence algorithms and changes the parameters reducing network productivity by means of fuzzy logic. Our evaluations show that the proposed method can select routes with high productivity and increase the quality of services on the network. Receiving feedback and modifying the fuzzy membership functions related to each mentioned criterion can maintain the effect of these parameters on an acceptable level after which all transmissions tend towards the optimum. Given the use of reinforcement learning methods which underpin some of the routing methods in SDNs, the proposed idea may gradually contribute to the provision of optimized services on the network.
近年来,为了更好地管理网络,提出了软件定义网络(sdn)的概念。该体系结构成功地优化了网络管理功能,提高了网络设备的同步能力。目前,该体系结构中的一个主要问题是网络中信息流的路由。数据包路由的主要目的是提高服务质量。提高这些网络的质量和生产力将提高用户满意度。为此,本研究提出了一种从若干现有路线中选择最佳路线的机制,以引导这种网络上的流量。该方法利用人工智能算法检测路由各链路上的带宽、时延和丢包等网络参数,并利用模糊逻辑改变这些参数,从而降低网络生产率。评估结果表明,该方法可以选择生产率较高的路由,提高网络服务质量。接收反馈并修改与上述各准则相关的模糊隶属度函数可以使这些参数的效果保持在可接受的水平上,之后所有传输都趋向于最优。考虑到使用强化学习方法来支持sdn中的一些路由方法,所提出的想法可能逐渐有助于在网络上提供优化的服务。
{"title":"Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic","authors":"Shohreh Jaafari, M. Nassiri, Reza Mohammadi","doi":"10.47839/ijc.21.3.2687","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2687","url":null,"abstract":"In recent years, the idea of software-defined networks (SDNs) has been proposed for better network management. This architecture has succeeded in optimizing network management functions and increased the ability to synchronize network equipment. Currently, one of the major issues in this architecture is the routing of packets flowing in the network. The main aim in the routing of packets is to increase the quality of services. Enhancement of the quality and productivity of these networks will increase user satisfaction. To this end, the present study proposes a mechanism for selecting the best route from among several existing routes to direct a flow on such a network. The proposed method examines the network parameters including bandwidth, delay, and packet loss on each link of the route by using artificial intelligence algorithms and changes the parameters reducing network productivity by means of fuzzy logic. Our evaluations show that the proposed method can select routes with high productivity and increase the quality of services on the network. Receiving feedback and modifying the fuzzy membership functions related to each mentioned criterion can maintain the effect of these parameters on an acceptable level after which all transmissions tend towards the optimum. Given the use of reinforcement learning methods which underpin some of the routing methods in SDNs, the proposed idea may gradually contribute to the provision of optimized services on the network.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81883431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network 无人机作为无线网络信息安全威胁的来源
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2695
Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko
This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.
这项工作涉及在考虑来自无人机的攻击者时对无线网络的威胁识别。对基于4g技术的异构网络作为无人机攻击对象进行了分析。确定了无线系统保护的主要问题是对无线电通信信道的保护不足以及基站和用户站设备的脆弱性。建立了无人机在无线网络信息安全中的入侵模型。根据攻击目标和武器、使用方法以及违反信息和电信系统保护标准的能力,对各类无人机进行了分类。建立了一个威胁模型,评估不同类型无人机在不同类型攻击中的风险和损失水平。在建立组织某企业网络的威胁模型、制定方式和安全手段、估算和控制4g网络对无人机的防护时,将接收到的模型作为基础模型是方便的。
{"title":"Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network","authors":"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko","doi":"10.47839/ijc.21.3.2695","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2695","url":null,"abstract":"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76694142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification 基于涂抹、小波和块位图修正的混合数字图像水印技术
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2685
Hayder G. A. Altameemi, Ahmed A. Alani, A. Asmael, M. Al‐Obaidi
Over many years, in order to provide powerful techniques for protecting digital copyrights, digital watermarking techniques have been developed. This research focuses on proposing an efficient blind hybrid digital image watermarking technique based on the transformation of Daubechies wavelet (DW) and Block Bitmap modification (BBM). DW represents an effective multi-determination frequency domain for including the watermarks. The BBM is used to afford an enhanced capability of embedding and minimize distortion. Two layers of security have been added to the proposed technique for protecting digital images from theft by using the logistic chaotic mapping to select the position of the blocks for the embedding process and Lorenz chaotic mapping for scrambling the watermark image. In the experiments, high values of peak signal to noise ratio (PSNR) and structural similarity index (SSIM) are obtained, and all the obtained results illustrate that the presented technique is highly imperceptible, secure, and robust.
多年来,为了提供强有力的数字版权保护技术,数字水印技术得到了发展。提出了一种基于小波变换和块位图修正的高效盲混合数字图像水印技术。DW代表了一种有效的包含水印的多确定频域。BBM用于提供增强的嵌入能力和最小化失真。该方法采用logistic混沌映射选择嵌入块的位置,采用Lorenz混沌映射对水印图像进行置乱,为保护数字图像免遭盗窃增加了两层安全性。实验结果表明,该方法具有较高的峰值信噪比(PSNR)和结构相似性指数(SSIM),具有较强的不可感、安全性和鲁棒性。
{"title":"A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification","authors":"Hayder G. A. Altameemi, Ahmed A. Alani, A. Asmael, M. Al‐Obaidi","doi":"10.47839/ijc.21.3.2685","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2685","url":null,"abstract":"Over many years, in order to provide powerful techniques for protecting digital copyrights, digital watermarking techniques have been developed. This research focuses on proposing an efficient blind hybrid digital image watermarking technique based on the transformation of Daubechies wavelet (DW) and Block Bitmap modification (BBM). DW represents an effective multi-determination frequency domain for including the watermarks. The BBM is used to afford an enhanced capability of embedding and minimize distortion. Two layers of security have been added to the proposed technique for protecting digital images from theft by using the logistic chaotic mapping to select the position of the blocks for the embedding process and Lorenz chaotic mapping for scrambling the watermark image. In the experiments, high values of peak signal to noise ratio (PSNR) and structural similarity index (SSIM) are obtained, and all the obtained results illustrate that the presented technique is highly imperceptible, secure, and robust.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89331285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining 基于数据挖掘的连续过程控制系统报警模式识别
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2689
Chetana Belavadi, V. Sardar, S. Chaudhari
An alarm management system with the Human Machine Interface in a process control system is used to alert an operator of any abnormal situation, so that corrective action can be taken to ensure safety and productivity of the plant and quality of the product. An alarm system reporting many alarms even during the normal state of the plant is due to chattering alarms, duplicated alarms, intermittent equipment problems and certain alarms configured in the system which may not have any importance. In such a situation the operator may miss certain critical alarms leading to undesirable outcomes. So, to have an optimum alarm system, the unwanted alarms have to be identified and eliminated. In this paper, we propose an offline method to identify repetitive, frequent sequences or patterns using PrefixSpan and Bi-Directional Extension algorithms. With the identified sequences or patterns, plant operation experts can improve the effectiveness of the alarm system through alarm rationalization so that this will help the operator in making the plant more safe, reliable and productive. The main objectives of this work are the following: (i) to use a definitive method to represent alarm data in an alarm log which is Temporal data as Itemsets without a need for complex mathematical, statistical or visual methods; (ii) to use data mining algorithms for identifying Frequent sequences which can be implemented on a normal computing resource such as Personal computer; (iii) to apply the method to the complete alarm data available no matter how big they are; (iv) to study and establish that the chosen method is possible to be applied to larger sized datasets.
过程控制系统中具有人机界面的报警管理系统,用于向操作员发出异常情况的警报,以便采取纠正措施,以确保工厂的安全和生产力以及产品的质量。即使在工厂正常状态下,警报系统也会报告许多警报,这是由于抖动警报、重复警报、间歇性设备问题和系统中配置的某些可能不重要的警报所致。在这种情况下,操作员可能会错过某些关键警报,从而导致不期望的结果。因此,要有一个最佳的警报系统,必须识别和消除不必要的警报。在本文中,我们提出了一种离线方法来识别重复,频繁的序列或模式使用PrefixSpan和双向扩展算法。有了确定的序列或模式,工厂操作专家可以通过报警合理化来提高报警系统的有效性,从而帮助操作员使工厂更加安全、可靠和高效。这项工作的主要目标如下:(i)使用一种明确的方法来表示作为itemset的时态数据的报警日志中的报警数据,而不需要复杂的数学、统计或可视化方法;(ii)使用数据挖掘算法识别可在一般计算资源(例如个人电脑)上执行的频繁序列;(iii)将该方法应用于可用的完整报警数据,无论数据大小;(iv)研究和确定所选择的方法可以应用于更大规模的数据集。
{"title":"Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining","authors":"Chetana Belavadi, V. Sardar, S. Chaudhari","doi":"10.47839/ijc.21.3.2689","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2689","url":null,"abstract":"An alarm management system with the Human Machine Interface in a process control system is used to alert an operator of any abnormal situation, so that corrective action can be taken to ensure safety and productivity of the plant and quality of the product. An alarm system reporting many alarms even during the normal state of the plant is due to chattering alarms, duplicated alarms, intermittent equipment problems and certain alarms configured in the system which may not have any importance. In such a situation the operator may miss certain critical alarms leading to undesirable outcomes. So, to have an optimum alarm system, the unwanted alarms have to be identified and eliminated. In this paper, we propose an offline method to identify repetitive, frequent sequences or patterns using PrefixSpan and Bi-Directional Extension algorithms. With the identified sequences or patterns, plant operation experts can improve the effectiveness of the alarm system through alarm rationalization so that this will help the operator in making the plant more safe, reliable and productive. The main objectives of this work are the following: (i) to use a definitive method to represent alarm data in an alarm log which is Temporal data as Itemsets without a need for complex mathematical, statistical or visual methods; (ii) to use data mining algorithms for identifying Frequent sequences which can be implemented on a normal computing resource such as Personal computer; (iii) to apply the method to the complete alarm data available no matter how big they are; (iv) to study and establish that the chosen method is possible to be applied to larger sized datasets.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks 一种新的增强的大规模容错移动自组网路由协议
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2688
H. Al-Asadi, Huda A. Ahmed, Abdul-Hadi Al-Hassani, N. A. Ahmad Hambali
Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routing. Moreover, we propose an Enhanced Self-organizing Cooperation and Trust based (ESCT) Protocol, where the mobile nodes share self-reliance and interpret information from a cognitive point of view. Each node develops its information dynamically to eradicate malicious entities. The most attractive attribute of the proposed ESCT protocol, even if domestic attackers know how it operates, is to prevent infringements. In this paper, the efficiency of the proposed ESCT protocol is assessed for different routing disturbances and varying number of attackers. The results of a simulation show that, the proposed ESCT protocol supports diverse network platforms and provides an efficient routing method for MANET routers. The proposed ESCT protocol displays increased throughput, reduction in end-to-end delay and increase in packet delivery ratio when compared to the peers that were taken for comparison.
由于缺乏固定的基础设施,开放媒体的存在和多样化的网络拓扑结构,互联网络和移动自组网(MANET), MANET协议的设计是复杂的。在本文中,我们提出了一种模仿认知过程的进化信任机制,利用敏感信息来避免路由。此外,我们提出了一种增强的基于自组织合作与信任(ESCT)的协议,其中移动节点共享自依赖并从认知的角度解释信息。每个节点动态地发展其信息以根除恶意实体。即使国内攻击者知道ESCT协议的运作方式,其最吸引人的特性是防止侵权。本文在不同路由干扰和攻击者数量变化的情况下,对所提出的ESCT协议的效率进行了评估。仿真结果表明,所提出的ESCT协议支持多种网络平台,为MANET路由器提供了一种高效的路由方法。所提出的ESCT协议显示出了更高的吞吐量、更少的端到端延迟和更高的数据包传送率。
{"title":"A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks","authors":"H. Al-Asadi, Huda A. Ahmed, Abdul-Hadi Al-Hassani, N. A. Ahmad Hambali","doi":"10.47839/ijc.21.3.2688","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2688","url":null,"abstract":"Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routing. Moreover, we propose an Enhanced Self-organizing Cooperation and Trust based (ESCT) Protocol, where the mobile nodes share self-reliance and interpret information from a cognitive point of view. Each node develops its information dynamically to eradicate malicious entities. The most attractive attribute of the proposed ESCT protocol, even if domestic attackers know how it operates, is to prevent infringements. In this paper, the efficiency of the proposed ESCT protocol is assessed for different routing disturbances and varying number of attackers. The results of a simulation show that, the proposed ESCT protocol supports diverse network platforms and provides an efficient routing method for MANET routers. The proposed ESCT protocol displays increased throughput, reduction in end-to-end delay and increase in packet delivery ratio when compared to the peers that were taken for comparison.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86073648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Speed Approximate Carry Speculative Adder in Error Tolerance Applications 高速近似进位推测加法器在容错中的应用
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2696
Ajay Kumar Gottem, Arunmetha Sundaramoorthy, Aravindhan Alagarsamy
Approximate adders were proposed as feasible solution in error-tolerant applications to provide a proper trade-off with accuracy over other circuit-based metrics like energy, area, and delay. State of art of approximate adders are shown in this work to improve the operational features significantly. To acquire a most benefits of approximation, in this paper approximation at lower echelons is presented. Two speculative adders are proposed, one with approximate adder cell and other with Parallel prefix Adder cell. Gate level implementation of proposed model are designed and implemented. The cost functions are compared against various FPGA standard architectures. Results of proposed approach indicate an average of 46% improvement in Area Delay Product (ADP) and compared with existing approximate adders.
近似加法器作为容错应用的可行解决方案,提供了与其他基于电路的指标(如能量,面积和延迟)的精度之间的适当权衡。本文介绍了近似加法器的发展现状,以显著改善其运算特性。为了获得最有利的近似,本文提出了低阶近似。提出了两种推测加法器,一种是近似加法器单元,另一种是并行前缀加法器单元。设计并实现了所提出模型的门级实现。将成本函数与各种FPGA标准架构进行了比较。结果表明,与现有的近似加法器相比,该方法的区域延迟积(ADP)平均提高了46%。
{"title":"High Speed Approximate Carry Speculative Adder in Error Tolerance Applications","authors":"Ajay Kumar Gottem, Arunmetha Sundaramoorthy, Aravindhan Alagarsamy","doi":"10.47839/ijc.21.3.2696","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2696","url":null,"abstract":"Approximate adders were proposed as feasible solution in error-tolerant applications to provide a proper trade-off with accuracy over other circuit-based metrics like energy, area, and delay. State of art of approximate adders are shown in this work to improve the operational features significantly. To acquire a most benefits of approximation, in this paper approximation at lower echelons is presented. Two speculative adders are proposed, one with approximate adder cell and other with Parallel prefix Adder cell. Gate level implementation of proposed model are designed and implemented. The cost functions are compared against various FPGA standard architectures. Results of proposed approach indicate an average of 46% improvement in Area Delay Product (ADP) and compared with existing approximate adders.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88685650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities 温室设施温湿度状态的智能场景协同控制
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2686
Dmytro Polishchyk, V. Lysenko, Serhii Osadchiy, N. Zaiets
The article substantiates the management of the humidity and temperature regime of greenhouse complexes on the basis of a scenario-synergetic approach. The scenarios for controlling the temperature and humidity conditions in the greenhouse using the approach of fuzzy neural networks are formed. The structure of an automated control system for technological processes is developed, which provides automated collection and processing of information for the implementation of control actions in order to improve the efficiency of the greenhouse complex on the basis of a scenario-synergetic approach. The corresponding fuzzy neural networks are synthesized for a synergistic assessment of the interaction of technological parameters. Estimation of the root-mean-square error in the synthesis of fuzzy neural networks confirms the possibility of their use for the synergistic formation of scenarios for controlling the temperature and humidity regime in greenhouses to reveal the presence of a synergistic effect. Production rules for scenario management of temperature and humidity conditions are formed. It is shown that the use of fuzzy neural networks for the formation of scenarios for controlling the humidity and temperature regime provides the possibility of obtaining the appropriate scenarios for making managerial decisions and their prompt correction.
本文提出了基于场景协同方法的温室综合体湿度和温度管理。提出了利用模糊神经网络控制温室温湿度的方案。开发了技术过程自动化控制系统的结构,为控制行动的实施提供信息的自动收集和处理,以便在场景协同方法的基础上提高温室综合体的效率。综合相应的模糊神经网络,对工艺参数的相互作用进行协同评价。对模糊神经网络综合中均方根误差的估计证实了它们用于温室温度和湿度控制情景的协同形成的可能性,以揭示协同效应的存在。形成温湿度条件场景管理的生产规则。结果表明,利用模糊神经网络形成控制湿度和温度的情景,可以获得适当的情景,以便进行管理决策和及时修正。
{"title":"Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities","authors":"Dmytro Polishchyk, V. Lysenko, Serhii Osadchiy, N. Zaiets","doi":"10.47839/ijc.21.3.2686","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2686","url":null,"abstract":"The article substantiates the management of the humidity and temperature regime of greenhouse complexes on the basis of a scenario-synergetic approach. The scenarios for controlling the temperature and humidity conditions in the greenhouse using the approach of fuzzy neural networks are formed. The structure of an automated control system for technological processes is developed, which provides automated collection and processing of information for the implementation of control actions in order to improve the efficiency of the greenhouse complex on the basis of a scenario-synergetic approach. The corresponding fuzzy neural networks are synthesized for a synergistic assessment of the interaction of technological parameters. Estimation of the root-mean-square error in the synthesis of fuzzy neural networks confirms the possibility of their use for the synergistic formation of scenarios for controlling the temperature and humidity regime in greenhouses to reveal the presence of a synergistic effect. Production rules for scenario management of temperature and humidity conditions are formed. It is shown that the use of fuzzy neural networks for the formation of scenarios for controlling the humidity and temperature regime provides the possibility of obtaining the appropriate scenarios for making managerial decisions and their prompt correction.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72728543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions 使用云功能集成Google大查询和Elasticsearch的云Pub/Sub架构
Q3 Computer Science Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2694
Sergio Laureano Gutiérrez, Yasiel Pérez Vera
In recent years, the need for analytics on large volumes of data has become increasingly important. It turns out to be extremely useful in making strategic decisions about different applications. In this way, appropriate mechanisms must be designed to carry out data processing and integration with different platforms to take advantage of their best features. In this work, an architecture that works on cloud services is shown to migrate data stored in Big Query to an analytics engine such as Elasticsearch and take advantage of its potential in query, insert and display operations. This is accomplished through the use of Cloud Functions and Pub / Sub. The integration of these platforms through the proposed architecture showed 100% effectiveness when transferring data to another, maintaining an insertion rate of 4,138.30 documents per second, demonstrating its robustness, efficiency, and versatility when performing a data migration. This pretends to establish an architecture solution when it comes about handling a large amount of data as in the real world.
近年来,对大量数据进行分析的需求变得越来越重要。事实证明,它在制定不同应用程序的战略决策时非常有用。因此,必须设计适当的机制来执行数据处理和与不同平台的集成,以利用它们的最佳特性。在这项工作中,我们展示了一个在云服务上工作的架构,可以将存储在Big Query中的数据迁移到Elasticsearch等分析引擎中,并利用其在查询、插入和显示操作方面的潜力。这是通过使用云功能和Pub / Sub来实现的。通过所提出的架构,这些平台的集成在向另一个平台传输数据时显示了100%的有效性,保持了每秒4,138.30个文档的插入率,在执行数据迁移时展示了其健壮性、效率和多功能性。当涉及到在现实世界中处理大量数据时,它假装建立了一个体系结构解决方案。
{"title":"A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions","authors":"Sergio Laureano Gutiérrez, Yasiel Pérez Vera","doi":"10.47839/ijc.21.3.2694","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2694","url":null,"abstract":"In recent years, the need for analytics on large volumes of data has become increasingly important. It turns out to be extremely useful in making strategic decisions about different applications. In this way, appropriate mechanisms must be designed to carry out data processing and integration with different platforms to take advantage of their best features. In this work, an architecture that works on cloud services is shown to migrate data stored in Big Query to an analytics engine such as Elasticsearch and take advantage of its potential in query, insert and display operations. This is accomplished through the use of Cloud Functions and Pub / Sub. The integration of these platforms through the proposed architecture showed 100% effectiveness when transferring data to another, maintaining an insertion rate of 4,138.30 documents per second, demonstrating its robustness, efficiency, and versatility when performing a data migration. This pretends to establish an architecture solution when it comes about handling a large amount of data as in the real world.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81636795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1