首页 > 最新文献

Philippine Statistician最新文献

英文 中文
Modeling of Communication Network with Queuing Theory under Fuzzy Environment 模糊环境下通信网络的排队论建模
Q4 Mathematics Pub Date : 2022-03-25 DOI: 10.17762/msea.v71i2.72
Himanshu Mittal, Naresh Sharma
In the present study, quantitative model and methods that analyze dynamic system of communication flow have been developed in the domain of queuing theory under uncertain environment. The study approach supports model-based queue design as opposed to creative engineering. Some critical aspects and results of queue model and fuzzy set theory has been reviewed in brief and the application of bulk queue model to communication network under imprecise data has been discussed. We have assumed that the arrival pattern, service pattern as well covariance between incoming and transmitted packets all are fuzzy in nature. The system characteristics with defuzzification process have been explored on the basis of lower and upper bound at possibility level alpha and signed distance method. The validity of the results has been analyzed through numerical illustration and graphical study.
在本研究中,在不确定环境下,在排队论领域建立了分析通信流动态系统的定量模型和方法。该研究方法支持基于模型的队列设计,而不是创造性工程。简要回顾了队列模型和模糊集理论的一些关键方面和结果,并讨论了批量队列模型在不精确数据下通信网络中的应用。我们假设到达模式、服务模式以及传入和传输分组之间的协方差本质上都是模糊的。在可能性水平α上下界和符号距离法的基础上,探讨了具有解模糊过程的系统特性。通过数值说明和图解研究,对结果的有效性进行了分析。
{"title":"Modeling of Communication Network with Queuing Theory under Fuzzy Environment","authors":"Himanshu Mittal, Naresh Sharma","doi":"10.17762/msea.v71i2.72","DOIUrl":"https://doi.org/10.17762/msea.v71i2.72","url":null,"abstract":"In the present study, quantitative model and methods that analyze dynamic system of communication flow have been developed in the domain of queuing theory under uncertain environment. The study approach supports model-based queue design as opposed to creative engineering. Some critical aspects and results of queue model and fuzzy set theory has been reviewed in brief and the application of bulk queue model to communication network under imprecise data has been discussed. We have assumed that the arrival pattern, service pattern as well covariance between incoming and transmitted packets all are fuzzy in nature. The system characteristics with defuzzification process have been explored on the basis of lower and upper bound at possibility level alpha and signed distance method. The validity of the results has been analyzed through numerical illustration and graphical study.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42479664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Recognizing Fake Headlines Using Clustering Algorithms 利用聚类算法识别虚假标题
Q4 Mathematics Pub Date : 2022-03-24 DOI: 10.17762/msea.v71i2.71
Juthuka Arunadevi, A. Mary Sowjanya
The credibility of the news sources has hit a new low during the COVID-19. Hence, it is necessary to check for facts before trusting the news. Clustering is extremely important for analysing data, making predictions, and overcoming data abnormalities. So, in this work, the two most prominent clustering algorithms, K-Means and K-Medoids, are tested on a dataset, and K-Means outperforms k-Medoid. We now utilized supervised classification methods like Logistic Regression, K-Nearest Neighbours, and Support Vector classifier to train on the same news headlines we used for clustering with the 'Prediction' column, and then chosen the technique with the highest accuracy. The Support Vector Classifier had the maximum accuracy of 94.93 percent, according to the test. We have developed is a hybrid model consisting of an unsupervised K Means clustering algorithm and a supervised Support Vector classification algorithm. The K Means algorithm organizes the news headlines into clusters by capturing the usage of certain words and the support vector algorithm learns from those clusters to predict the categories into which the unseen news headlines belong to.
新冠肺炎疫情期间,新闻来源的可信度降至新低。因此,有必要在相信新闻之前核实事实。聚类对于分析数据、进行预测和克服数据异常非常重要。因此,在这项工作中,两种最突出的聚类算法K-Means和K-Medoids在数据集上进行了测试,K-Means优于k-Medoid。我们现在使用监督分类方法,如逻辑回归、k近邻和支持向量分类器来训练我们用于“预测”列聚类的相同新闻标题,然后选择具有最高准确性的技术。根据测试,支持向量分类器的最高准确率为94.93%。我们开发了一个由无监督K均值聚类算法和监督支持向量分类算法组成的混合模型。K均值算法通过捕获特定单词的使用将新闻标题组织成集群,支持向量算法从这些集群中学习,以预测未见新闻标题所属的类别。
{"title":"Recognizing Fake Headlines Using Clustering Algorithms","authors":"Juthuka Arunadevi, A. Mary Sowjanya","doi":"10.17762/msea.v71i2.71","DOIUrl":"https://doi.org/10.17762/msea.v71i2.71","url":null,"abstract":"The credibility of the news sources has hit a new low during the COVID-19. Hence, it is necessary to check for facts before trusting the news. Clustering is extremely important for analysing data, making predictions, and overcoming data abnormalities. So, in this work, the two most prominent clustering algorithms, K-Means and K-Medoids, are tested on a dataset, and K-Means outperforms k-Medoid. We now utilized supervised classification methods like Logistic Regression, K-Nearest Neighbours, and Support Vector classifier to train on the same news headlines we used for clustering with the 'Prediction' column, and then chosen the technique with the highest accuracy. The Support Vector Classifier had the maximum accuracy of 94.93 percent, according to the test. We have developed is a hybrid model consisting of an unsupervised K Means clustering algorithm and a supervised Support Vector classification algorithm. The K Means algorithm organizes the news headlines into clusters by capturing the usage of certain words and the support vector algorithm learns from those clusters to predict the categories into which the unseen news headlines belong to.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43170321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Novel Technique to Defraud Credit Card by Handling Class Imbalance Problem Using Machine Learning 一种利用机器学习处理类不平衡问题的信用卡诈骗新技术
Q4 Mathematics Pub Date : 2022-03-21 DOI: 10.17762/msea.v71i2.69
Kaneez Zainab, Namrata Dhanda, Syed Qamar Abbas
Typically, classification algorithms work poorly when confronted with unbalanced datasets, and the resulting effects are skewed against the majority class. As a result, an effective model is required to identify unbalanced data, particularly in the context of fraud detection. For these types of issues, the classifier's accuracy is not trusted because the cost of predicting a fraud sample as a non-fraud sample is extremely high. In general, imbalanced learning happens when some types of data distributions significantly outnumber other data distributions in the instance space. There is a need of technique such as under sampling or oversampling in order to learn from unbalanced datasets. A novel over sampling method has been suggested for learning from unbalanced datasets in this paper. The basic impression here is that a weighted distribution for diverse outnumbered class instances has been utilized depending on their degree of complexity to learn, with more pretended evidence leading to the outnumbered ones, being more troublesome to learn. As a result, with regard to data distributions, the suggested approach improves learning first by bringing down the bias familiarized using class difference, and then by pliantly conveying the classification judgement boundary toward challenging instances.
通常,当遇到不平衡的数据集时,分类算法的工作效果很差,并且由此产生的效果与大多数类别不一致。因此,需要一个有效的模型来识别不平衡的数据,特别是在欺诈检测的背景下。对于这些类型的问题,分类器的准确性是不可信的,因为将欺诈样本预测为非欺诈样本的成本极高。通常,当实例空间中某些类型的数据分布显著超过其他数据分布时,就会发生不平衡学习。为了从不平衡的数据集中学习,需要诸如欠采样或过采样之类的技术。本文提出了一种新的过采样方法,用于从不平衡数据集中学习。这里的基本印象是,根据学习的复杂程度,使用了不同数量的类实例的加权分布,更多的假证据导致数量超过的类实例,学习起来更麻烦。因此,关于数据分布,所提出的方法首先通过降低使用类差异熟悉的偏差,然后通过向具有挑战性的实例顺从地传达分类判断边界来改进学习。
{"title":"A Novel Technique to Defraud Credit Card by Handling Class Imbalance Problem Using Machine Learning","authors":"Kaneez Zainab, Namrata Dhanda, Syed Qamar Abbas","doi":"10.17762/msea.v71i2.69","DOIUrl":"https://doi.org/10.17762/msea.v71i2.69","url":null,"abstract":"Typically, classification algorithms work poorly when confronted with unbalanced datasets, and the resulting effects are skewed against the majority class. As a result, an effective model is required to identify unbalanced data, particularly in the context of fraud detection. For these types of issues, the classifier's accuracy is not trusted because the cost of predicting a fraud sample as a non-fraud sample is extremely high. In general, imbalanced learning happens when some types of data distributions significantly outnumber other data distributions in the instance space. There is a need of technique such as under sampling or oversampling in order to learn from unbalanced datasets. A novel over sampling method has been suggested for learning from unbalanced datasets in this paper. The basic impression here is that a weighted distribution for diverse outnumbered class instances has been utilized depending on their degree of complexity to learn, with more pretended evidence leading to the outnumbered ones, being more troublesome to learn. As a result, with regard to data distributions, the suggested approach improves learning first by bringing down the bias familiarized using class difference, and then by pliantly conveying the classification judgement boundary toward challenging instances.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43586117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success of Digital Marketing Model: Analysis for Buying Behaviour Practices of Medical Professionals 数字营销模式的成功:对医务人员购买行为实践的分析
Q4 Mathematics Pub Date : 2022-03-21 DOI: 10.17762/msea.v71i2.70
Monika Pathak, Rahul Hakhu
Purpose – The purpose of this paper is twofold. First, is to evaluate the impact of digital marketing on the Buying behaviour Practices of medical professionals; and second, is to investigate the success factors of Digital Marketing model. Methodology – The study employs a survey analysis for 547 Medical Professionals in Haryana, India, to determine the extent of their Purchasing Behaviour Practices via Digital Marketing through a standard structured questionnaire. The study employs the Step-wise Regression technique to identify the most relevant predictors of the Digital Marketing model. Findings – The Predictors are Buying Behaviour practices, User friendly, Previous Buying Behaviour, Success Factors and Hindrance Factors of Digital Marketing model. Further, these predictors have been summarized each with the demographic forces as Dependent Variables i.e. Gender, Marital Status and Highest Qualifications respectively. The overall results depict that all the Models are having a significance impact on the Buying Behaviour Practices of Medical Professionals and contribute to the Success of Digital Marketing. Originality – The success of digital marketing model for analyzing the buying behaviour practices of medical professionals with five predictors and there demographic factors as dependent variable has provided insights which add new knowledge to the extent of digital marketing techniques adopted  by medical professionals and buying behaviour literature.
目的——本文的目的是双重的。首先,评估数字营销对医疗专业人员购买行为实践的影响;二是研究数字营销模式的成功因素。方法——该研究采用了对印度哈里亚纳邦547名医疗专业人员的调查分析,通过标准结构化问卷确定他们通过数字营销进行购买行为实践的程度。该研究采用逐步回归技术来确定数字营销模型的最相关预测因素。调查结果——预测因素是数字营销模型的购买行为实践、用户友好型、先前购买行为、成功因素和阻碍因素。此外,这些预测因素都被总结为因变量,即性别、婚姻状况和最高学历。总体结果表明,所有模型都对医疗专业人员的购买行为实践产生了显著影响,并有助于数字营销的成功。独创性——数字营销模型在分析医疗专业人员的购买行为实践方面取得了成功,该模型有五个预测因素,其中人口统计因素作为因变量,为医疗专业人员采用的数字营销技术和购买行为文献提供了新的见解。
{"title":"Success of Digital Marketing Model: Analysis for Buying Behaviour Practices of Medical Professionals","authors":"Monika Pathak, Rahul Hakhu","doi":"10.17762/msea.v71i2.70","DOIUrl":"https://doi.org/10.17762/msea.v71i2.70","url":null,"abstract":"Purpose – The purpose of this paper is twofold. First, is to evaluate the impact of digital marketing on the Buying behaviour Practices of medical professionals; and second, is to investigate the success factors of Digital Marketing model. \u0000Methodology – The study employs a survey analysis for 547 Medical Professionals in Haryana, India, to determine the extent of their Purchasing Behaviour Practices via Digital Marketing through a standard structured questionnaire. The study employs the Step-wise Regression technique to identify the most relevant predictors of the Digital Marketing model. \u0000Findings – The Predictors are Buying Behaviour practices, User friendly, Previous Buying Behaviour, Success Factors and Hindrance Factors of Digital Marketing model. Further, these predictors have been summarized each with the demographic forces as Dependent Variables i.e. Gender, Marital Status and Highest Qualifications respectively. The overall results depict that all the Models are having a significance impact on the Buying Behaviour Practices of Medical Professionals and contribute to the Success of Digital Marketing. \u0000Originality – The success of digital marketing model for analyzing the buying behaviour practices of medical professionals with five predictors and there demographic factors as dependent variable has provided insights which add new knowledge to the extent of digital marketing techniques adopted  by medical professionals and buying behaviour literature.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44881124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Missing Value Imputation Algorithm- KLR 混合缺失值插补算法-KLR
Q4 Mathematics Pub Date : 2022-03-11 DOI: 10.17762/msea.v71i2.67
Deepti Sharma, Rajneesh Kumar, Anurag Jain
The data mining process mainly deals with the estimation, prediction, pattern extraction, and classification in big databases. The presence of missing values in the dataset decreases the accuracy of data mining classifiers. Therefore it is necessary to deal with missing values in the dataset to achieve accurate results. To improve the quality of data and prediction accuracy in the classification process, the authors have proposed a new hybrid missing value prediction algorithm, KLR, by combining the KNN and linear regression approach. The proposed KLR algorithm has been used for class validation and missing values imputation. Wisconsin Breast Cancer Diagnostic Dataset of 569 instances with 32 attributes from the machine learning repository of UCI, Irvinewasused to conduct the study. The Pearson Coefficient Correlation method is used for feature selection.Data normalization is performed using Min-max scaling technique. The Scikit-learn library for machine learning in python is used to complete all the experiments as the experimental framework. The mean square error method is used to evaluate the performance of the model. The proposed KLR algorithm with 450 nearest neighbors out of 569 gives the lowest MSE ie 0.00188 and more accurately predicts the missing values as compared to the classic models.
数据挖掘过程主要处理大数据库中的估计、预测、模式提取和分类。数据集中缺失值的存在降低了数据挖掘分类器的准确性。因此,有必要处理数据集中的缺失值,以获得准确的结果。为了提高分类过程中的数据质量和预测精度,作者将KNN和线性回归方法相结合,提出了一种新的混合缺失值预测算法KLR。所提出的KLR算法已用于类验证和缺失值插补。威斯康星州癌症乳腺癌诊断数据集,包含来自欧文UCI机器学习库的569个实例和32个属性。Pearson系数相关法用于特征选择。使用最小-最大缩放技术执行数据归一化。python中用于机器学习的Scikit学习库作为实验框架用于完成所有实验。使用均方误差法来评估模型的性能。所提出的具有569个最近邻居中的450个最近邻居的KLR算法给出了最低的MSE,即0.00188,并且与经典模型相比更准确地预测缺失值。
{"title":"Hybrid Missing Value Imputation Algorithm- KLR","authors":"Deepti Sharma, Rajneesh Kumar, Anurag Jain","doi":"10.17762/msea.v71i2.67","DOIUrl":"https://doi.org/10.17762/msea.v71i2.67","url":null,"abstract":"The data mining process mainly deals with the estimation, prediction, pattern extraction, and classification in big databases. The presence of missing values in the dataset decreases the accuracy of data mining classifiers. Therefore it is necessary to deal with missing values in the dataset to achieve accurate results. To improve the quality of data and prediction accuracy in the classification process, the authors have proposed a new hybrid missing value prediction algorithm, KLR, by combining the KNN and linear regression approach. The proposed KLR algorithm has been used for class validation and missing values imputation. Wisconsin Breast Cancer Diagnostic Dataset of 569 instances with 32 attributes from the machine learning repository of UCI, Irvinewasused to conduct the study. The Pearson Coefficient Correlation method is used for feature selection.Data normalization is performed using Min-max scaling technique. The Scikit-learn library for machine learning in python is used to complete all the experiments as the experimental framework. The mean square error method is used to evaluate the performance of the model. The proposed KLR algorithm with 450 nearest neighbors out of 569 gives the lowest MSE ie 0.00188 and more accurately predicts the missing values as compared to the classic models.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49367412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security in Internet of Things (IoT): Challenges and Models 物联网安全:挑战与模型
Q4 Mathematics Pub Date : 2022-03-11 DOI: 10.17762/msea.v71i2.68
Navdeep Lata, Dr. Raman Kumar
The Internet of Things (IoT) has grabbed the attention of the scientific community in recent years. IoT is a recently formed technology that will be the future of the web, allowing distinct everyday objects to communicate with each other without any human interaction. It is one of the most hotly debated fields in both academia and industry for current and future study areas. IoT security and privacy issues have proven to be critical objectives. This paper includes IoT models, schemes, and implementation issues related to different IoT technologies and devices. It focuses on security challenges of IoT communications such as privacy, authentication, integrity of data, and service availability, mostly in hardware aspects. Attacks and modern vulnerabilities, as well as countermeasures, are taken into account. Various IoT security models are described along with security challenges.
物联网(IoT)近年来引起了科学界的关注。物联网是最近形成的一项技术,它将成为网络的未来,允许不同的日常物体在没有任何人类互动的情况下相互通信。对于当前和未来的研究领域,它是学术界和工业界争论最激烈的领域之一。物联网安全和隐私问题已被证明是关键目标。本文包括与不同物联网技术和设备相关的物联网模型、方案和实现问题。它主要关注物联网通信的安全挑战,如隐私、身份验证、数据完整性和服务可用性,主要是硬件方面的挑战。考虑到了攻击和现代脆弱性以及应对措施。描述了各种物联网安全模型以及安全挑战。
{"title":"Security in Internet of Things (IoT): Challenges and Models","authors":"Navdeep Lata, Dr. Raman Kumar","doi":"10.17762/msea.v71i2.68","DOIUrl":"https://doi.org/10.17762/msea.v71i2.68","url":null,"abstract":"The Internet of Things (IoT) has grabbed the attention of the scientific community in recent years. IoT is a recently formed technology that will be the future of the web, allowing distinct everyday objects to communicate with each other without any human interaction. It is one of the most hotly debated fields in both academia and industry for current and future study areas. IoT security and privacy issues have proven to be critical objectives. This paper includes IoT models, schemes, and implementation issues related to different IoT technologies and devices. It focuses on security challenges of IoT communications such as privacy, authentication, integrity of data, and service availability, mostly in hardware aspects. Attacks and modern vulnerabilities, as well as countermeasures, are taken into account. Various IoT security models are described along with security challenges.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43989604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey: Detection and Mitigation Techniques of Sybil in the Networks 网络中Sybil的检测与缓解技术综述
Q4 Mathematics Pub Date : 2022-03-10 DOI: 10.17762/msea.v71i2.66
Meena Bharti, Dr Shaveta Rani, Dr Paramjeet Singh
Wireless networks are complicated to put together, and the more people use them over time, the more complicated they become. Wireless networks are made up of many different types of technology, which means they have vulnerabilities. One vulnerability is that they are easily spoofed or impersonated by Sybil attacks. In a Sybil attack, the attacker disguises themselves as someone else and generates various identities to have access to the system. This type of attack is typically accomplished by creating multiple fake user accounts. The attacker then uses these fake accounts to promote their content or ideas, vote for their own content or ideas, and/or harass other users. Since wireless networks are very resource-constrained, it is vital to develop more efficient and lightweight trustworthy security mechanisms to identify & track Sybil attacks as these are a major concern for the stability or security of the network. There are some security schemes for prevention against Sybil attacks, like cryptography, privacy-preserving solutions and lightweight authentication. Cryptography and privacy-preserving techniques require key management and additional infrastructure overhead, which makes them difficult to establish and maintain in a limited resource environment. The lightweight trusted system detects & avoids single node and multi-node attacks under different conditions. In this paper, a survey is conducted on various techniques for the detection of Sybil attacks.
无线网络组合起来很复杂,随着时间的推移,使用它的人越多,它就变得越复杂。无线网络由许多不同类型的技术组成,这意味着它们存在漏洞。一个漏洞是它们很容易被Sybil攻击欺骗或冒充。在Sybil攻击中,攻击者将自己伪装成其他人并生成各种身份以访问系统。这种类型的攻击通常通过创建多个假用户帐户来实现。然后攻击者使用这些假账户来宣传他们的内容或想法,为他们自己的内容或想法投票,和/或骚扰其他用户。由于无线网络的资源非常有限,因此开发更高效、更轻量、更可靠的安全机制来识别和跟踪Sybil攻击至关重要,因为这些攻击是网络稳定性或安全性的主要关注点。有一些安全方案可以防止Sybil攻击,如加密、隐私保护解决方案和轻量级身份验证。加密和隐私保护技术需要密钥管理和额外的基础设施开销,这使得它们难以在资源有限的环境中建立和维护。轻量级可信系统在不同情况下检测和避免单节点和多节点攻击。本文对各种检测Sybil攻击的技术进行了调查。
{"title":"A Survey: Detection and Mitigation Techniques of Sybil in the Networks","authors":"Meena Bharti, Dr Shaveta Rani, Dr Paramjeet Singh","doi":"10.17762/msea.v71i2.66","DOIUrl":"https://doi.org/10.17762/msea.v71i2.66","url":null,"abstract":"Wireless networks are complicated to put together, and the more people use them over time, the more complicated they become. Wireless networks are made up of many different types of technology, which means they have vulnerabilities. One vulnerability is that they are easily spoofed or impersonated by Sybil attacks. In a Sybil attack, the attacker disguises themselves as someone else and generates various identities to have access to the system. This type of attack is typically accomplished by creating multiple fake user accounts. The attacker then uses these fake accounts to promote their content or ideas, vote for their own content or ideas, and/or harass other users. Since wireless networks are very resource-constrained, it is vital to develop more efficient and lightweight trustworthy security mechanisms to identify & track Sybil attacks as these are a major concern for the stability or security of the network. There are some security schemes for prevention against Sybil attacks, like cryptography, privacy-preserving solutions and lightweight authentication. Cryptography and privacy-preserving techniques require key management and additional infrastructure overhead, which makes them difficult to establish and maintain in a limited resource environment. The lightweight trusted system detects & avoids single node and multi-node attacks under different conditions. In this paper, a survey is conducted on various techniques for the detection of Sybil attacks.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47489424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
IVMCT: Image Visualization based Multiclass Malware Classification using Transfer Learning IVMCT:基于图像可视化的基于迁移学习的多类恶意软件分类
Q4 Mathematics Pub Date : 2022-03-10 DOI: 10.17762/msea.v71i2.65
M. Raman Kumar
Computer systems have made it possible to transfer human life from the real world to virtual reality. This process has been accelerated by the Covid-19 virus. Cybercriminals have also switched from a real-life to a virtual one. Online, committing a crime is far easier than in real life. Cybercriminals often use malicious software (malware), to launch cyber-attacks. Apart from this polymorphic and metamorphic malware are used that use obfuscation techniques to create new malware variants. To effectively battle new malware types, you'll need to employ creative approaches that depart from the conventional. Traditionally signature-based techniques are used with machine learning algorithms to detect malware that is unable to catch its variants.  Deep learning (DL), which differs from typical machine learning methods, might be a potential approach to the challenge of identifying all varieties of malware. In the present study, an IVMCT framework is introduced which classifies malware using transfer learning. For this purpose, the MalImg dataset is used which is based on grayscale images converted from binaries of malware. The comparison of IVMCT is done with existing techniques which shows that our technique is better than existing techniques.
计算机系统使人类生活从现实世界转移到虚拟现实成为可能。Covid-19病毒加速了这一进程。网络犯罪分子也从现实生活转向了虚拟世界。在网上犯罪比在现实生活中容易得多。网络罪犯经常使用恶意软件(malware)来发动网络攻击。除此之外,多态和变形的恶意软件被用来使用混淆技术来创建新的恶意软件变体。为了有效地对抗新的恶意软件类型,您需要采用与传统方法不同的创造性方法。传统上,基于签名的技术与机器学习算法一起用于检测无法捕获其变体的恶意软件。深度学习(DL)不同于典型的机器学习方法,可能是一种潜在的方法来识别各种恶意软件的挑战。在本研究中,引入了一个IVMCT框架,该框架使用迁移学习对恶意软件进行分类。为此,使用MalImg数据集,该数据集基于从恶意软件二进制文件转换的灰度图像。将该方法与现有方法进行了比较,结果表明该方法优于现有方法。
{"title":"IVMCT: Image Visualization based Multiclass Malware Classification using Transfer Learning","authors":"M. Raman Kumar","doi":"10.17762/msea.v71i2.65","DOIUrl":"https://doi.org/10.17762/msea.v71i2.65","url":null,"abstract":"Computer systems have made it possible to transfer human life from the real world to virtual reality. This process has been accelerated by the Covid-19 virus. Cybercriminals have also switched from a real-life to a virtual one. Online, committing a crime is far easier than in real life. Cybercriminals often use malicious software (malware), to launch cyber-attacks. Apart from this polymorphic and metamorphic malware are used that use obfuscation techniques to create new malware variants. To effectively battle new malware types, you'll need to employ creative approaches that depart from the conventional. Traditionally signature-based techniques are used with machine learning algorithms to detect malware that is unable to catch its variants.  Deep learning (DL), which differs from typical machine learning methods, might be a potential approach to the challenge of identifying all varieties of malware. In the present study, an IVMCT framework is introduced which classifies malware using transfer learning. For this purpose, the MalImg dataset is used which is based on grayscale images converted from binaries of malware. The comparison of IVMCT is done with existing techniques which shows that our technique is better than existing techniques.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45616044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploring the Potential of Wearable Electronics for Healthcare Monitoring and Diagnosis 探索可穿戴电子设备在医疗监测和诊断方面的潜力
Q4 Mathematics Pub Date : 2022-03-06 DOI: 10.17762/msea.v71i2.2195
J. Kandpal
Chronic diseases kill many Humans in all over the world. Monitor risk factors including physical exercise to manage these illnesses. Wearables like Fitbit can track and give health data to help users make decisions. Most wearables marketing targets the young, active, and most populous racial groups. Wearable electronics can revolutionize healthcare by continuously monitoring health factors. Sensor technology, data processing, and communication protocols have made wearable gadgets useful for healthcare monitoring and diagnosis. This article discusses sensors, data processing, and communication protocols used in wearable electronics to revolutionize healthcare monitoring and diagnosis. A side-by-side table compares each method's pros and cons. The topic covers wearable electronics processing for healthcare monitoring and diagnosis. A block architecture and graphic explain healthcare monitoring and diagnosis using wearable electronics. Wearable electronics adoption is often hampered by concerns regarding data privacy and security, data reliability, and healthcare system compatibility. Wearable electronics are revolutionizing medicine in numerous ways, from monitoring chronic illnesses to giving emergency treatment. Wearable tech could develop into artificial intelligence, machine learning, augmented reality, virtual reality, cutting-edge sensors, telemedicine, 5G networks, nanotechnology, and blockchain. Finally, wearable electronics research could improve patient outcomes and quality of life, transforming healthcare.
慢性病在全世界夺去了许多人的生命。监测包括体育锻炼在内的风险因素,以控制这些疾病。像Fitbit这样的可穿戴设备可以跟踪并提供健康数据,帮助用户做出决策。大多数可穿戴设备的营销对象是年轻、活跃和人口最多的种族群体。可穿戴电子产品可以通过持续监测健康因素来彻底改变医疗保健。传感器技术、数据处理和通信协议使可穿戴设备对医疗保健监测和诊断非常有用。本文讨论了可穿戴电子设备中使用的传感器、数据处理和通信协议,以彻底改变医疗保健监测和诊断。并排的表格比较了每种方法的优缺点。本主题涵盖用于医疗保健监测和诊断的可穿戴电子处理。块结构和图形解释了使用可穿戴电子设备的医疗保健监测和诊断。可穿戴电子产品的采用往往受到数据隐私和安全、数据可靠性以及医疗系统兼容性方面的担忧的阻碍。从监测慢性病到提供紧急治疗,可穿戴电子设备正在以多种方式彻底改变医学。可穿戴技术可以发展为人工智能、机器学习、增强现实、虚拟现实、尖端传感器、远程医疗、5G网络、纳米技术和区块链。最后,可穿戴电子研究可以改善患者的预后和生活质量,改变医疗保健。
{"title":"Exploring the Potential of Wearable Electronics for Healthcare Monitoring and Diagnosis","authors":"J. Kandpal","doi":"10.17762/msea.v71i2.2195","DOIUrl":"https://doi.org/10.17762/msea.v71i2.2195","url":null,"abstract":"Chronic diseases kill many Humans in all over the world. Monitor risk factors including physical exercise to manage these illnesses. Wearables like Fitbit can track and give health data to help users make decisions. Most wearables marketing targets the young, active, and most populous racial groups. Wearable electronics can revolutionize healthcare by continuously monitoring health factors. Sensor technology, data processing, and communication protocols have made wearable gadgets useful for healthcare monitoring and diagnosis. This article discusses sensors, data processing, and communication protocols used in wearable electronics to revolutionize healthcare monitoring and diagnosis. A side-by-side table compares each method's pros and cons. The topic covers wearable electronics processing for healthcare monitoring and diagnosis. A block architecture and graphic explain healthcare monitoring and diagnosis using wearable electronics. Wearable electronics adoption is often hampered by concerns regarding data privacy and security, data reliability, and healthcare system compatibility. Wearable electronics are revolutionizing medicine in numerous ways, from monitoring chronic illnesses to giving emergency treatment. Wearable tech could develop into artificial intelligence, machine learning, augmented reality, virtual reality, cutting-edge sensors, telemedicine, 5G networks, nanotechnology, and blockchain. Finally, wearable electronics research could improve patient outcomes and quality of life, transforming healthcare.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43869966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Innovative Condition Assessment Method for Wastewater Treatment Facilities to Promote Long-Term Sustainability in Management and Operations 一种创新的污水处理设施状态评估方法,以促进管理和运营的长期可持续性
Q4 Mathematics Pub Date : 2022-03-06 DOI: 10.17762/msea.v71i2.2139
Ritiksha Danu
Conventionally, the success of a wastewater treatment plant is evaluated by the quantity of chemical oxygen demand (COD), dissolved organic matter (BOD), total suspended solids (TSS), and other consequences of wastewater treatment that are removed during the treatment process and thereafter. Environmental engineers consider a number of parameters at the plant's discharge, including pH, NH4-N, NTotal, fecal coliform, and others. The traditional approach to performance assessment fails because it does not directly compare the effluent's distribution of these characteristics throughout the output stage of the process to the standards or specification limits issued by the Central Pollution Control Board (CPCB). To fill this knowledge gap, we propose and implement the probability-based Process Capability Indices (PCIs) and Multi - variate Process Flow Indices (MPCIs) in this research. These indices measure the effectiveness of a wastewater treatment process by contrasting the observed results with the predicted ones. PCIs have been widely used as a baseline against which manufacturing processes may be evaluated and tweaked to increase efficiency. The focus of this effort is on PCIs and MPCIs from the standpoint of environmental engineers, with the hope that their use would grow. Using capacity indicators accurately measures the effectiveness of the process of wastewater treatment, which is essential for reducing pollution and permitting the reuse of treated water. This study provides an analysis of the treating wastewater process's capacity by applying appropriate capability indices, using additional information acquired from case studies via literature research. Findings suggest that appropriate capacity indices may allow for more precise assessments of sewage treatment system performance than are presently possible.
通常,废水处理厂的成功是通过化学需氧量(COD)、溶解有机物(BOD)、总悬浮固体(TSS)以及在处理过程中和之后去除的废水处理的其他结果来评估的。环境工程师考虑了工厂排放的许多参数,包括pH、NH4-N、NTotal、粪便大肠菌群等。传统的性能评估方法失败了,因为它没有直接将污水在整个过程输出阶段的这些特性分布与中央污染控制委员会(CPCB)发布的标准或规范限值进行比较。为了填补这一知识空白,我们在本研究中提出并实现了基于概率的过程能力指数(PCI)和多变量过程流指数(MPCI)。这些指标通过将观测结果与预测结果进行对比来衡量废水处理过程的有效性。PCI已被广泛用作基线,可以根据该基线评估和调整制造过程以提高效率。从环境工程师的角度来看,这项工作的重点是PCI和MPCI,希望它们的使用会增加。使用容量指标可以准确地衡量废水处理过程的有效性,这对于减少污染和允许处理水的再利用至关重要。本研究通过应用适当的能力指数,利用通过文献研究从案例研究中获得的额外信息,对废水处理过程的能力进行了分析。研究结果表明,适当的容量指数可以比目前更准确地评估污水处理系统的性能。
{"title":"An Innovative Condition Assessment Method for Wastewater Treatment Facilities to Promote Long-Term Sustainability in Management and Operations","authors":"Ritiksha Danu","doi":"10.17762/msea.v71i2.2139","DOIUrl":"https://doi.org/10.17762/msea.v71i2.2139","url":null,"abstract":"Conventionally, the success of a wastewater treatment plant is evaluated by the quantity of chemical oxygen demand (COD), dissolved organic matter (BOD), total suspended solids (TSS), and other consequences of wastewater treatment that are removed during the treatment process and thereafter. Environmental engineers consider a number of parameters at the plant's discharge, including pH, NH4-N, NTotal, fecal coliform, and others. The traditional approach to performance assessment fails because it does not directly compare the effluent's distribution of these characteristics throughout the output stage of the process to the standards or specification limits issued by the Central Pollution Control Board (CPCB). To fill this knowledge gap, we propose and implement the probability-based Process Capability Indices (PCIs) and Multi - variate Process Flow Indices (MPCIs) in this research. These indices measure the effectiveness of a wastewater treatment process by contrasting the observed results with the predicted ones. PCIs have been widely used as a baseline against which manufacturing processes may be evaluated and tweaked to increase efficiency. The focus of this effort is on PCIs and MPCIs from the standpoint of environmental engineers, with the hope that their use would grow. Using capacity indicators accurately measures the effectiveness of the process of wastewater treatment, which is essential for reducing pollution and permitting the reuse of treated water. This study provides an analysis of the treating wastewater process's capacity by applying appropriate capability indices, using additional information acquired from case studies via literature research. Findings suggest that appropriate capacity indices may allow for more precise assessments of sewage treatment system performance than are presently possible.","PeriodicalId":37943,"journal":{"name":"Philippine Statistician","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49087327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Philippine Statistician
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1