首页 > 最新文献

Research Reports on Computer Science最新文献

英文 中文
TOPSIS-based Optimal Cluster Head Selection for Wireless Sensor Network 基于topsis的无线传感器网络簇头优化选择
Pub Date : 2023-05-29 DOI: 10.37256/rrcs.2320232638
S. Pandey, Buddha Singh
Due to the advancement of electronics engineering technology, many types of sensors have been developed. But sensors are still battery-powered devices. Once the battery is dead, the sensors are of no use. So, energy optimization in wireless sensor networks is still a hot topic among researchers. This paper proposed a novel clustering method that uses the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) algorithm to select the Cluster Heads (CHs). TOPSIS is a Multi-Attribute Decision Making (MADM) based model which uses several conflicting attributes to select the best alternative. We have compared our proposed model with two other comparable models to evaluate the performance of our proposed model. The result shows that our proposed model performs better than other models.
由于电子工程技术的进步,许多类型的传感器被开发出来。但传感器仍然是电池供电的设备。一旦电池没电,传感器就没用了。因此,无线传感器网络中的能量优化问题一直是研究人员关注的热点。本文提出了一种新的聚类方法,利用TOPSIS算法选择簇头。TOPSIS是一种基于多属性决策(MADM)的模型,它使用多个相互冲突的属性来选择最佳方案。我们将我们提出的模型与其他两个可比较的模型进行了比较,以评估我们提出的模型的性能。结果表明,该模型的性能优于其他模型。
{"title":"TOPSIS-based Optimal Cluster Head Selection for Wireless Sensor Network","authors":"S. Pandey, Buddha Singh","doi":"10.37256/rrcs.2320232638","DOIUrl":"https://doi.org/10.37256/rrcs.2320232638","url":null,"abstract":"Due to the advancement of electronics engineering technology, many types of sensors have been developed. But sensors are still battery-powered devices. Once the battery is dead, the sensors are of no use. So, energy optimization in wireless sensor networks is still a hot topic among researchers. This paper proposed a novel clustering method that uses the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) algorithm to select the Cluster Heads (CHs). TOPSIS is a Multi-Attribute Decision Making (MADM) based model which uses several conflicting attributes to select the best alternative. We have compared our proposed model with two other comparable models to evaluate the performance of our proposed model. The result shows that our proposed model performs better than other models.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"350 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134204010","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Review of Problem Variants and Approaches for Electric Vehicle Charging and Location Identification 电动汽车充电与位置识别问题变体与方法综述
Pub Date : 2023-05-22 DOI: 10.37256/rrcs.2320232645
D. Prakash, G. Jeyakumar
The optimization of electric vehicles (EVs) utilizing meta-heuristics has arisen as the way to propel state-of-the-art advancements, making ready for boundless reception, and reforming the flow transportation framework while lessening ozone-depleting substance discharges. The two factors that keep on obstructing the improvement of EVs are reach and cost. This study digs profoundly into the five significant EV enhancement regions: plan advancement, energy the board, ideal control, upgraded charging and releasing, and steering. Methods for single-objective and multi-objective enhancement are examined and talked about. Following a broad survey of the latest works in every space, an investigation of numerical demonstrating, the development of goal capabilities, time management for charging, and limitations are introduced. What’s more, the different scientific, regular, and nature-roused advancement calculations (swarm-optimization, transformative, and recent meta-heuristics) are arranged in view of their fame. Their merits and detriments are then analyzed, similar to the different requirements for taking care of procedures. This survey of the high-level and redesigned variants of these meta-heuristics likewise gives a precise reference to EV streamlining utilizing wise calculations.
利用元启发式优化电动汽车(ev)已经成为推动最先进技术进步的一种方式,为无限接收做好准备,并在减少臭氧消耗物质排放的同时改革流动运输框架。阻碍电动汽车发展的两个因素是可及性和成本。本研究深入探讨了电动汽车的五个显著增强区域:计划推进、能量板、理想控制、升级充放电和转向。探讨了单目标增强和多目标增强的方法。在广泛调查了各个领域的最新研究成果之后,介绍了数值演示、目标能力的发展、充电时间管理和局限性的研究。更重要的是,不同的科学、常规和自然激发的进步计算(群体优化、变革和最近的元启发式)是根据它们的名声来安排的。然后分析它们的优缺点,类似于照顾程序的不同要求。对这些元启发式的高级和重新设计的变体的调查同样给出了利用明智计算的EV流线型的精确参考。
{"title":"A Review of Problem Variants and Approaches for Electric Vehicle Charging and Location Identification","authors":"D. Prakash, G. Jeyakumar","doi":"10.37256/rrcs.2320232645","DOIUrl":"https://doi.org/10.37256/rrcs.2320232645","url":null,"abstract":"The optimization of electric vehicles (EVs) utilizing meta-heuristics has arisen as the way to propel state-of-the-art advancements, making ready for boundless reception, and reforming the flow transportation framework while lessening ozone-depleting substance discharges. The two factors that keep on obstructing the improvement of EVs are reach and cost. This study digs profoundly into the five significant EV enhancement regions: plan advancement, energy the board, ideal control, upgraded charging and releasing, and steering. Methods for single-objective and multi-objective enhancement are examined and talked about. Following a broad survey of the latest works in every space, an investigation of numerical demonstrating, the development of goal capabilities, time management for charging, and limitations are introduced. What’s more, the different scientific, regular, and nature-roused advancement calculations (swarm-optimization, transformative, and recent meta-heuristics) are arranged in view of their fame. Their merits and detriments are then analyzed, similar to the different requirements for taking care of procedures. This survey of the high-level and redesigned variants of these meta-heuristics likewise gives a precise reference to EV streamlining utilizing wise calculations.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124597032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud-based Cost Effective IIoT Model Towards Industry 5.0 面向工业5.0的基于云的成本效益IIoT模型
Pub Date : 2023-05-19 DOI: 10.37256/rrcs.2320232632
Satyajeet R. Shinge, Urmila Shrawankar
Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud computing plays an essential role by connecting people, devices, work processes, and buildings to deliver cloud services in industries. But cloud computing faces a problem with task scheduling, high latency delay, and memory management, affecting the overall cost of industries using cloud services. A major concern in the cloud computing field is task scheduling which is essential for achieving cost-effective execution and improving resource usage. It refers to assigning available resources to user tasks. This problem can be solved effectively by improving task execution and increasing the use of resources. The waiting time between a client’s sent request and a cloud service provider to give a response, known as latency, is another issue in cloud environments. In cloud computing, this delay can be significantly higher. As a result, users of various cloud services may incur increased expenses due to this delay. Finally, among the most significant topics in cloud computing is efficient memory management, which handles integrated data and optimizes memory management algorithms. This paper proposes a cloud model for IIoT, which provides task scheduling, helps reduce latency, and optimizes memory management. This proposed model helps to reduce the cost of using cloud computing in IIoT.
各行各业的公司越来越依赖云计算来管理其工业物联网(IIoT)技术。在工业物联网中,机器通过网络连接。云计算通过连接人员、设备、工作流程和建筑物,在行业中提供云服务,发挥了重要作用。但是云计算面临着任务调度、高延迟和内存管理等问题,影响了使用云服务的行业的总体成本。云计算领域的一个主要问题是任务调度,这对于实现具有成本效益的执行和改进资源使用至关重要。它指的是将可用资源分配给用户任务。这个问题可以通过改进任务执行和增加资源利用来有效解决。客户机发送请求和云服务提供商给出响应之间的等待时间(称为延迟)是云环境中的另一个问题。在云计算中,这种延迟可能要高得多。因此,各种云服务的用户可能会因这种延迟而增加费用。最后,云计算中最重要的主题之一是有效的内存管理,它处理集成数据并优化内存管理算法。本文提出了一种用于工业物联网的云模型,该模型提供任务调度,有助于减少延迟,并优化内存管理。该模型有助于降低在工业物联网中使用云计算的成本。
{"title":"Cloud-based Cost Effective IIoT Model Towards Industry 5.0","authors":"Satyajeet R. Shinge, Urmila Shrawankar","doi":"10.37256/rrcs.2320232632","DOIUrl":"https://doi.org/10.37256/rrcs.2320232632","url":null,"abstract":"Companies across industries increasingly depend upon cloud computing to manage their Industrial Internet of Things (IIoT) technology. Machines are connected over a network in the IIoT. Cloud computing plays an essential role by connecting people, devices, work processes, and buildings to deliver cloud services in industries. But cloud computing faces a problem with task scheduling, high latency delay, and memory management, affecting the overall cost of industries using cloud services. A major concern in the cloud computing field is task scheduling which is essential for achieving cost-effective execution and improving resource usage. It refers to assigning available resources to user tasks. This problem can be solved effectively by improving task execution and increasing the use of resources. The waiting time between a client’s sent request and a cloud service provider to give a response, known as latency, is another issue in cloud environments. In cloud computing, this delay can be significantly higher. As a result, users of various cloud services may incur increased expenses due to this delay. Finally, among the most significant topics in cloud computing is efficient memory management, which handles integrated data and optimizes memory management algorithms. This paper proposes a cloud model for IIoT, which provides task scheduling, helps reduce latency, and optimizes memory management. This proposed model helps to reduce the cost of using cloud computing in IIoT.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"171 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116059260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Machine Learning and Deep Learning for Phishing Page Detection 网络钓鱼页面检测的机器学习和深度学习
Pub Date : 2023-05-18 DOI: 10.37256/rrcs.2320232629
Swatej Patil, Mayur S. Patil, Kotadi Chinnaiah
The term "phishing" is often used to describe an attempt to obtain confidential data such as passwords or credit card details by impersonating a trustworthy source. In most cases, the term refers to attempts to trick users into providing sensitive information in response to a fraudulent email or web page. However, the term is also used to describe a broader category of online attacks to obtain sensitive information or to disrupt services or systems. Incorporating different machine learning and deep learning algorithms, including Support Vector Machine (SVM), Gradient Boosting Machine (GBM), and random forest, the authors of this research presented a technique for identifying phishing websites. The data sets from PhishTank and the University of New Brunswick were used to train and test the learning models. The XGboost model was able to surpass most existing techniques by achieving a maximum accuracy of 86.8%. This technique can be used in modern web browsers like Google Chrome and Mozilla Firefox to accurately detect phishing websites.
术语“网络钓鱼”通常用于描述通过冒充可信来源获取机密数据(如密码或信用卡详细信息)的尝试。在大多数情况下,该术语指的是试图欺骗用户提供敏感信息,以回应欺诈性电子邮件或网页。然而,该术语也用于描述更广泛的一类在线攻击,以获取敏感信息或破坏服务或系统。结合不同的机器学习和深度学习算法,包括支持向量机(SVM)、梯度增强机(GBM)和随机森林,本研究的作者提出了一种识别网络钓鱼网站的技术。来自PhishTank和新不伦瑞克大学的数据集被用于训练和测试学习模型。XGboost模型能够超越大多数现有技术,达到86.8%的最大准确率。这种技术可以用于现代网络浏览器,如b谷歌Chrome和Mozilla Firefox,以准确检测网络钓鱼网站。
{"title":"Machine Learning and Deep Learning for Phishing Page Detection","authors":"Swatej Patil, Mayur S. Patil, Kotadi Chinnaiah","doi":"10.37256/rrcs.2320232629","DOIUrl":"https://doi.org/10.37256/rrcs.2320232629","url":null,"abstract":"The term \"phishing\" is often used to describe an attempt to obtain confidential data such as passwords or credit card details by impersonating a trustworthy source. In most cases, the term refers to attempts to trick users into providing sensitive information in response to a fraudulent email or web page. However, the term is also used to describe a broader category of online attacks to obtain sensitive information or to disrupt services or systems. Incorporating different machine learning and deep learning algorithms, including Support Vector Machine (SVM), Gradient Boosting Machine (GBM), and random forest, the authors of this research presented a technique for identifying phishing websites. The data sets from PhishTank and the University of New Brunswick were used to train and test the learning models. The XGboost model was able to surpass most existing techniques by achieving a maximum accuracy of 86.8%. This technique can be used in modern web browsers like Google Chrome and Mozilla Firefox to accurately detect phishing websites.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128654129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Approach for Secured Data Transmission Between IoT and Cloud 物联网与云之间安全数据传输的有效方法
Pub Date : 2023-05-15 DOI: 10.37256/rrcs.2320232628
Shatakshi Kokate, Urmila Shrawankar
The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate intelligent services to users as a result. If there is any faulty data while the server analyzes the collected data, distorted results will be created. The data captured from IoT contains lots of heterogeneous as well as suspicious data, so cleaning, filtering, and clustering of it must be done before sending it to the server, otherwise it will unnecessarily create overhead on the server. The proposed system consists of a filtering and clustering mechanism for the data collected from IoT devices so that integrated data is transferred to the cloud server which will reduce its computational load. In the proposed system, the fog computing layer is used as an interface between IoT and cloud computing layer where data filtering and clustering take place to reduce network traffic and latency. The ultimate aim is to provide security for data transmission between IoT and the cloud.
物联网(IoT)网络产生大量数据,云服务器收集这些数据。然后,服务器分析收集到的数据,并根据结果为用户提供适当的智能服务。如果服务器在分析收集的数据时出现错误数据,则会产生失真的结果。从物联网捕获的数据包含大量异构和可疑数据,因此在将其发送到服务器之前必须对其进行清理,过滤和集群化,否则会在服务器上不必要地造成开销。提出的系统包括从物联网设备收集的数据的过滤和聚类机制,以便将集成数据传输到云服务器,从而减少其计算负载。在本系统中,雾计算层作为物联网和云计算层之间的接口,进行数据过滤和聚类,以减少网络流量和延迟。最终目标是为物联网与云之间的数据传输提供安全保障。
{"title":"An Efficient Approach for Secured Data Transmission Between IoT and Cloud","authors":"Shatakshi Kokate, Urmila Shrawankar","doi":"10.37256/rrcs.2320232628","DOIUrl":"https://doi.org/10.37256/rrcs.2320232628","url":null,"abstract":"The Internet of Things (IoT) network generates a lot of data and cloud servers collect that data. The server then analyzes the collected data and based on the findings, provides appropriate intelligent services to users as a result. If there is any faulty data while the server analyzes the collected data, distorted results will be created. The data captured from IoT contains lots of heterogeneous as well as suspicious data, so cleaning, filtering, and clustering of it must be done before sending it to the server, otherwise it will unnecessarily create overhead on the server. The proposed system consists of a filtering and clustering mechanism for the data collected from IoT devices so that integrated data is transferred to the cloud server which will reduce its computational load. In the proposed system, the fog computing layer is used as an interface between IoT and cloud computing layer where data filtering and clustering take place to reduce network traffic and latency. The ultimate aim is to provide security for data transmission between IoT and the cloud.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133432952","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Determining Homogenous Transformation Matrix from DH Parameter Table using Deep Learning Techniques 利用深度学习技术从DH参数表中确定齐次变换矩阵
Pub Date : 2023-05-15 DOI: 10.37256/rrcs.2320232627
V. B. Semwal, Yash Gupta
One of the most popular ways of representing any robotic model mathematically is through Denavit-Hartenberg (DH) parameter table. And the most common way of finding a forward kinematics solution to any robotic model is by finding its homogenous transformation matrix, which is obtained from the DH parameter table by a certain set of steps or algorithms. In this research work, we have tried solving this problem in just a single step by deep learning method and thus finding forward kinematics of almost any kind of manipulator. This research work shows not just this problem but many more such complex problems which require a certain set of steps or algorithms that can be solved by deep learning techniques in a single step. The results obtained are very close to accurate and show the ability of deep learning techniques for solving different kinds of such problems.
通过Denavit-Hartenberg (DH)参数表对机器人模型进行数学表示是最流行的方法之一。对于任何机器人模型求正运动学解最常用的方法是求其齐次变换矩阵,该变换矩阵是通过一定的步骤或算法从DH参数表中得到的。在这项研究工作中,我们尝试用深度学习方法一步解决这个问题,从而找到几乎任何类型的机械臂的正运动学。这项研究工作不仅展示了这个问题,还展示了许多复杂的问题,这些问题需要一组特定的步骤或算法,这些步骤或算法可以通过深度学习技术在单个步骤中解决。得到的结果非常接近准确,显示了深度学习技术解决不同类型此类问题的能力。
{"title":"Determining Homogenous Transformation Matrix from DH Parameter Table using Deep Learning Techniques","authors":"V. B. Semwal, Yash Gupta","doi":"10.37256/rrcs.2320232627","DOIUrl":"https://doi.org/10.37256/rrcs.2320232627","url":null,"abstract":"One of the most popular ways of representing any robotic model mathematically is through Denavit-Hartenberg (DH) parameter table. And the most common way of finding a forward kinematics solution to any robotic model is by finding its homogenous transformation matrix, which is obtained from the DH parameter table by a certain set of steps or algorithms. In this research work, we have tried solving this problem in just a single step by deep learning method and thus finding forward kinematics of almost any kind of manipulator. This research work shows not just this problem but many more such complex problems which require a certain set of steps or algorithms that can be solved by deep learning techniques in a single step. The results obtained are very close to accurate and show the ability of deep learning techniques for solving different kinds of such problems.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"1467 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Digital Information Using Cryptography Techniques to Enhance IT Security 利用密码技术保护数码资讯以加强资讯科技保安
Pub Date : 2023-05-10 DOI: 10.37256/rrcs.2320232635
S. Chaudhari, Archana Thakur, A. Rajan
In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.
在信息技术(IT)安全中,纵深防御被认为是最佳实践。保护静态或传输中的数据是纵深防御方法的一部分。机密性、数据完整性、身份验证和不可否认性是保护数据和增强IT安全性需要实现的四个IT安全范式。每一个科学机构都要求i)保持信息的机密性,如新颖的研究思想、成果、专利、自主开发的技术和设计、人力资源个人数据和评论等;ii)管理基于互联网的网络资源的完整性,用户凭据等;iii)管理各种软件系统的不可否认性和完整性保证。RSA (Rivest-Shamir-Adleman)技术用于实现机密数据在不安全通道上的存储和传输过程中的机密性。椭圆曲线加密(ECC)技术用于无线和无线传感器网络等极端受限设备的密钥交换。数据散列用于维护数据完整性;使用数字证书来实现不可否认性。为了提高IT安全性,本文研究了这些加密算法在基于工作流的应用程序、视频会议、域名系统(DNS)、web安全以及射频识别(RFID)系统等数据安全中的应用。本文还介绍了一种利用带时间戳的时间戳哈希函数来保证网站完整性和检测网站攻击的新方案。研究表明,对称密钥和非对称密钥算法提供了机密性和身份验证。数据完整性和身份验证使用数字签名和消息身份验证码来实现。采用非对称密钥算法和数字签名建立了不可否认性。
{"title":"Securing Digital Information Using Cryptography Techniques to Enhance IT Security","authors":"S. Chaudhari, Archana Thakur, A. Rajan","doi":"10.37256/rrcs.2320232635","DOIUrl":"https://doi.org/10.37256/rrcs.2320232635","url":null,"abstract":"In information technology (IT) security, defence in depth is considered the best practice. Protecting data at rest or in transit is a part of the defence in depth approach. Confidentiality, data integrity, authentication, and non-repudiation are four IT security paradigms that need to be achieved to protect data and enhance IT security. Every scientific organisation requires i) to maintain the confidentiality of information like novel research ideas, results, patents, indigenous developed techniques and designs, human resource personal data and remarks, etc. ii) to manage the integrity of Internet-based web resources, users' credentials, etc. and iii) to manage non-repudiation and integrity guarantee enabled implementation of various software systems. The Rivest-Shamir-Adleman (RSA) technique is used to achieve confidentiality of secret data during its storage and transmission over insecure channels. The elliptic curve cryptography (ECC) technique is used for key exchange with extremely constrained devices like wireless and wireless sensor networks. Data hashing is used for maintaining data integrity; digital certificates are employed to achieve non-repudiation. In order to enhance IT security, the application of these cryptographic algorithms has been studied in data security like workflow-based applications, video conferencing, Domain Name System (DNS), web security, and radio frequency identification (RFID) systems and presented in the paper. A novel scheme to ensure website integrity and to detect website attacks using time-stamped hash functions with timestamping is also demonstrated in the paper. The study revealed that symmetric key and asymmetric key algorithms provide confidentiality and authentication. Data integrity and authentication are achieved using digital signatures and message authentication codes. Non-repudiation is established with asymmetric key algorithms and digital signatures.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126608609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study on Genetic algorithm and Reinforcement Learning to Solve the Traveling Salesman Problem 遗传算法与强化学习求解旅行商问题的比较研究
Pub Date : 2023-05-02 DOI: 10.37256/rrcs.2320232642
Agash Uthayasuriyan, Hema Chandran G, Kavvin Uv, Sabbineni Hema Mahitha, J. G
Machine Learning (ML) and Evolutionary Computing (EC) are the two most popular computational methodologies in computer science to solve learning and optimization problems around us, respectively. It is of research interest in the literature, for exploring these two methodologies and to formulate algorithmic frameworks with 'EA for ML' and 'ML for EA' where EA stands for Evolutionary Algorithm. The objective of this paper is on exploring this dimension of research. The Traveling Salesman Problem (TSP) is one of the NP-hard (nondeterministic polynomial time hard) problems in combinatorial optimization problems. The solution for a TSP is the shortest path covering all the nodes in a given city. This paper compares two algorithms, "Genetic Algorithm (GA)" of the EC domain and "Epsilon-Greedy Q-Learning Algorithm (EQLA)" of the ML domain on solving TSP. The detailed design methodology involved in both these algorithms is discussed in this paper. The experiments are carried out on two different data sets (random and ATT48) to compare the speed and accuracy of the algorithms. The comparative results reveal that the GA could solve the TSP more effectively than EQLA. The obtained inferences along with the limitations are presented in this paper.
机器学习(ML)和进化计算(EC)是计算机科学中最流行的两种计算方法,分别用于解决我们周围的学习和优化问题。在文献中,探索这两种方法并制定“EA for ML”和“ML for EA”的算法框架是研究兴趣,其中EA代表进化算法。本文的目的就是探索这一研究维度。旅行商问题(TSP)是组合优化问题中np困难(不确定多项式时间困难)问题之一。TSP的解是覆盖给定城市中所有节点的最短路径。本文比较了EC领域的“遗传算法(GA)”和ML领域的“Epsilon-Greedy Q-Learning算法(EQLA)”两种求解TSP问题的算法。本文讨论了这两种算法所涉及的详细设计方法。在两个不同的数据集(随机和ATT48)上进行了实验,比较了算法的速度和准确性。对比结果表明,遗传算法比EQLA更能有效地解决TSP问题。本文给出了所得结论和局限性。
{"title":"A Comparative Study on Genetic algorithm and Reinforcement Learning to Solve the Traveling Salesman Problem","authors":"Agash Uthayasuriyan, Hema Chandran G, Kavvin Uv, Sabbineni Hema Mahitha, J. G","doi":"10.37256/rrcs.2320232642","DOIUrl":"https://doi.org/10.37256/rrcs.2320232642","url":null,"abstract":"Machine Learning (ML) and Evolutionary Computing (EC) are the two most popular computational methodologies in computer science to solve learning and optimization problems around us, respectively. It is of research interest in the literature, for exploring these two methodologies and to formulate algorithmic frameworks with 'EA for ML' and 'ML for EA' where EA stands for Evolutionary Algorithm. The objective of this paper is on exploring this dimension of research. The Traveling Salesman Problem (TSP) is one of the NP-hard (nondeterministic polynomial time hard) problems in combinatorial optimization problems. The solution for a TSP is the shortest path covering all the nodes in a given city. This paper compares two algorithms, \"Genetic Algorithm (GA)\" of the EC domain and \"Epsilon-Greedy Q-Learning Algorithm (EQLA)\" of the ML domain on solving TSP. The detailed design methodology involved in both these algorithms is discussed in this paper. The experiments are carried out on two different data sets (random and ATT48) to compare the speed and accuracy of the algorithms. The comparative results reveal that the GA could solve the TSP more effectively than EQLA. The obtained inferences along with the limitations are presented in this paper.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-05-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129065017","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Design for Silent Link User Equilibrium 基于静默链路用户均衡的网络设计
Pub Date : 2023-03-16 DOI: 10.37256/rrcs.2120232295
Xu Chen, Zeguan Wu, Xuan Di
Connected vehicles (CVs) are anticipated to improve road safety and travel efficiency in a transportation system. However, the deployment of CV technologies in transportation networks can lead to privacy issues, as the communication among CVs can expose vehicles' location information. To address this issue, we introduce a privacy protection method named "silent link" to transportation networks and propose a silent link user equilibrium (SLUE) framework to study the impact of privacy protection countermeasures on network flow. A theoretical analysis regarding existence and uniqueness conditions of SLUE is provided. The proposed SLUE facilitates privacy-oriented network design to achieve optimal levels of privacy for CVs. Accordingly, a bi-level network optimization problem is formulated for the design of silent links in transportation networks. Numerical examples are demonstrated using the Braess and Sioux Falls networks.
互联汽车(cv)有望改善交通系统中的道路安全和出行效率。然而,在交通网络中部署CV技术可能会导致隐私问题,因为CV之间的通信可能会暴露车辆的位置信息。为了解决这一问题,我们将一种名为“静默链路”的隐私保护方法引入到交通网络中,并提出了一个静默链路用户平衡(SLUE)框架来研究隐私保护对策对网络流量的影响。本文从理论上分析了系统的存在唯一性条件。所提出的sue促进了面向隐私的网络设计,以实现个人简历的最佳隐私水平。据此,提出了交通网络中静默环节设计的双层网络优化问题。用Braess和Sioux Falls网络给出了数值例子。
{"title":"Network Design for Silent Link User Equilibrium","authors":"Xu Chen, Zeguan Wu, Xuan Di","doi":"10.37256/rrcs.2120232295","DOIUrl":"https://doi.org/10.37256/rrcs.2120232295","url":null,"abstract":"Connected vehicles (CVs) are anticipated to improve road safety and travel efficiency in a transportation system. However, the deployment of CV technologies in transportation networks can lead to privacy issues, as the communication among CVs can expose vehicles' location information. To address this issue, we introduce a privacy protection method named \"silent link\" to transportation networks and propose a silent link user equilibrium (SLUE) framework to study the impact of privacy protection countermeasures on network flow. A theoretical analysis regarding existence and uniqueness conditions of SLUE is provided. The proposed SLUE facilitates privacy-oriented network design to achieve optimal levels of privacy for CVs. Accordingly, a bi-level network optimization problem is formulated for the design of silent links in transportation networks. Numerical examples are demonstrated using the Braess and Sioux Falls networks.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"351 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122339226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blended Teaching for Signal and System Course Based on Internet-Engineering Education 基于网络工程教育的信号与系统课程混合式教学
Pub Date : 2023-02-22 DOI: 10.37256/rrcs.2120232076
Z. Dou, Yajing Wang, Zhenmei Li, Xianming Sun, Qinqin Wei, Wengang Chen
Aiming at the teaching difficulties of signal and system course, adapting to the new situation of the information age and the engineering education of outcome-based education (OBE), adhering to the traditional classroom teaching and making full use of the network teaching platform and internet technology, a blended teaching mode of internet-engineering education (BTM-IEE) is proposed. In this mode, we adhered to the educational concept of OBE, formulated teaching objectives, optimized teaching content, and built matching teaching resources. In three teaching stages: before class, in class and after class, online-offline blended teaching was effectively organized and implemented by using internet technology, network teaching platform, independently developed a comprehensive experimental system, remote virtual experiment platform, QQ group, etc. In order to ensure a good cycle of teaching quality, a multi-dimensional evaluation system is constructed. A variety of application examples and questionnaire data showed that BTM-IEE can achieve a deep integration of in class-out of class and online-offline, improve students’ engineering application ability, autonomous learning ability, cooperation, communication ability, and cultivate innovative thinking. The horizontal and vertical comparison between the traditional and the improved teaching mode shows that the BTM-IEE can improve the teaching effect, the excellent rate is significantly increased, and the failure rate is significantly reduced. This mode provides a reference for the improvement of the teaching quality of professional courses and has important practical significance.
针对信号与系统课程的教学难点,适应信息时代和成果教育(OBE)工程教育的新形势,坚持传统的课堂教学,充分利用网络教学平台和互联网技术,提出了一种互联网工程教育混合式教学模式(BTM-IEE)。在这种模式下,我们坚持OBE的教育理念,制定教学目标,优化教学内容,构建配套的教学资源。利用互联网技术、网络教学平台、自主开发的综合实验系统、远程虚拟实验平台、QQ群等,在课前、课中、课后三个教学阶段,有效组织实施了线上线下混合教学。为了保证教学质量的良好循环,构建了多维度的评价体系。多种应用实例和问卷数据表明,BTM-IEE可以实现课内课外和线上线下的深度融合,提高学生的工程应用能力、自主学习能力、合作沟通能力,培养创新思维。通过对传统教学模式和改进后的教学模式进行横向和纵向对比,发现BTM-IEE能够提高教学效果,优良率显著提高,不良率显著降低。该模式为提高专业课教学质量提供了参考,具有重要的现实意义。
{"title":"Blended Teaching for Signal and System Course Based on Internet-Engineering Education","authors":"Z. Dou, Yajing Wang, Zhenmei Li, Xianming Sun, Qinqin Wei, Wengang Chen","doi":"10.37256/rrcs.2120232076","DOIUrl":"https://doi.org/10.37256/rrcs.2120232076","url":null,"abstract":"Aiming at the teaching difficulties of signal and system course, adapting to the new situation of the information age and the engineering education of outcome-based education (OBE), adhering to the traditional classroom teaching and making full use of the network teaching platform and internet technology, a blended teaching mode of internet-engineering education (BTM-IEE) is proposed. In this mode, we adhered to the educational concept of OBE, formulated teaching objectives, optimized teaching content, and built matching teaching resources. In three teaching stages: before class, in class and after class, online-offline blended teaching was effectively organized and implemented by using internet technology, network teaching platform, independently developed a comprehensive experimental system, remote virtual experiment platform, QQ group, etc. In order to ensure a good cycle of teaching quality, a multi-dimensional evaluation system is constructed. A variety of application examples and questionnaire data showed that BTM-IEE can achieve a deep integration of in class-out of class and online-offline, improve students’ engineering application ability, autonomous learning ability, cooperation, communication ability, and cultivate innovative thinking. The horizontal and vertical comparison between the traditional and the improved teaching mode shows that the BTM-IEE can improve the teaching effect, the excellent rate is significantly increased, and the failure rate is significantly reduced. This mode provides a reference for the improvement of the teaching quality of professional courses and has important practical significance.","PeriodicalId":377142,"journal":{"name":"Research Reports on Computer Science","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133671867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Research Reports on Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1