首页 > 最新文献

International Journal of Computers and Applications最新文献

英文 中文
Blockchain-assisted sharing of electronic health records: a feasible privacy-centric constant-size ring signature framework 区块链辅助的电子健康记录共享:一个可行的以隐私为中心的恒定大小的环签名框架
Q2 Computer Science Pub Date : 2023-09-02 DOI: 10.1080/1206212X.2023.2252238
J. Odoom, Xiaofang Huang, Zuhong Zhou, S. Danso, Benedicta Nana Esi Nyarko, Jinan Zheng, Yanjie Xiang
The quest to share Electronic Heath Records (EHR) with blockchain as a core technology has witnessed a myriad of frameworks ingrained with diverse cryptographic primitives as well as non-cryptographic mechanisms. Existing works, however, still suffer from privacy-related challenges chief being privacy breaches based on blockchain digital footprints from health facilities, doctors, and patients alike as well as feasibility challenges. Empirical research from state-of-the-art demonstrates the possibility to deanonymize entities involved in a blockchain transaction via inference analysis using such digital footprints on-chain. In this paper, we address such lacunae by advancing a privacy-conscious feasible blockchain-agnostic EHR sharing framework leveraging anonymous transactions, a smart contract, and decentralized storage technology. We construct a constant-size identity-based ring signature to provide accentuated privacy for transaction initiators and demonstrate how health facilities can anonymously retrieve anonymous data on-chain to facilitate EHR sharing via a novel, robust yet computationally efficient, and privacy-aware algorithm dubbed PatientFinder. We subsequently show proof of concept of our framework. A thorough system evaluation is performed revealing that the solution satisfies the privacy of patients and health facilities (doctors), feasibility, and security-related requirements.
以区块链为核心技术共享电子健康记录(EHR)的探索已经见证了无数具有不同加密原语和非加密机制的框架。然而,现有的工作仍然面临与隐私相关的挑战,主要是基于医疗机构、医生和患者的区块链数字足迹的隐私泄露,以及可行性挑战。来自最先进的实证研究表明,通过使用这种链上数字足迹的推理分析,可以使区块链交易中涉及的实体去匿名化。在本文中,我们通过利用匿名交易、智能合约和分散存储技术,提出一种具有隐私意识的可行的区块链不可知电子病历共享框架,来解决这一空白。我们构建了一个恒定大小的基于身份的环签名,为交易发起者提供强化的隐私保护,并演示了医疗机构如何通过一种名为PatientFinder的新颖、健壮、计算效率高且具有隐私意识的算法,在链上匿名检索匿名数据,以促进电子病历共享。我们随后展示了我们框架的概念证明。执行彻底的系统评估,揭示该解决方案满足患者和医疗机构(医生)的隐私、可行性和安全相关需求。
{"title":"Blockchain-assisted sharing of electronic health records: a feasible privacy-centric constant-size ring signature framework","authors":"J. Odoom, Xiaofang Huang, Zuhong Zhou, S. Danso, Benedicta Nana Esi Nyarko, Jinan Zheng, Yanjie Xiang","doi":"10.1080/1206212X.2023.2252238","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2252238","url":null,"abstract":"The quest to share Electronic Heath Records (EHR) with blockchain as a core technology has witnessed a myriad of frameworks ingrained with diverse cryptographic primitives as well as non-cryptographic mechanisms. Existing works, however, still suffer from privacy-related challenges chief being privacy breaches based on blockchain digital footprints from health facilities, doctors, and patients alike as well as feasibility challenges. Empirical research from state-of-the-art demonstrates the possibility to deanonymize entities involved in a blockchain transaction via inference analysis using such digital footprints on-chain. In this paper, we address such lacunae by advancing a privacy-conscious feasible blockchain-agnostic EHR sharing framework leveraging anonymous transactions, a smart contract, and decentralized storage technology. We construct a constant-size identity-based ring signature to provide accentuated privacy for transaction initiators and demonstrate how health facilities can anonymously retrieve anonymous data on-chain to facilitate EHR sharing via a novel, robust yet computationally efficient, and privacy-aware algorithm dubbed PatientFinder. We subsequently show proof of concept of our framework. A thorough system evaluation is performed revealing that the solution satisfies the privacy of patients and health facilities (doctors), feasibility, and security-related requirements.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"21 1","pages":"564 - 578"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82504363","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PSO-K2PC: Bayesian structure learning using optimized K2 algorithm for parents-children detection PSO-K2PC:基于优化K2算法的贝叶斯结构学习亲子检测
Q2 Computer Science Pub Date : 2023-09-02 DOI: 10.1080/1206212X.2023.2250143
Samar Bouazizi, Emna Benmohamed, Hela Ltifi
Bayesian networks, revered for their adeptness in modeling uncertainty and predicting outcomes, encounter a formidable hurdle during the structure learning phase – an NP-hard problem, posing insurmountable computational challenges for large networks. To surmount this barrier and advance the field, we propose an innovative optimization of the K2PC algorithm for Bayesian network structure learning. Derived from the popular K2 algorithm, our novel optimization ingeniously tackles K2PC's vulnerability to predetermined node order. Leveraging the power of a particle swarm optimization algorithm, we adeptly seek the optimal node ordering, yielding exceptional results. Through rigorous evaluations on benchmark networks, our proposed method surpasses prior approaches in structure difference and accuracy, affirming its potential as a promising avenue for Bayesian network structure learning in large, complex networks. We posit that our novel approach constitutes an important advance in the field of Bayesian network structure learning, with the potential to stimulate additional progress through further scientific investigation.
贝叶斯网络以其对不确定性建模和预测结果的熟练而闻名,但在结构学习阶段遇到了一个巨大的障碍——np困难问题,对大型网络提出了无法克服的计算挑战。为了克服这一障碍并推动该领域的发展,我们提出了一种用于贝叶斯网络结构学习的K2PC算法的创新优化。基于流行的K2算法,我们的优化巧妙地解决了K2PC对预定节点顺序的脆弱性。利用粒子群优化算法的力量,我们熟练地寻求最优的节点排序,产生了卓越的结果。通过对基准网络的严格评估,我们提出的方法在结构差异和准确性方面超过了先前的方法,肯定了它作为大型复杂网络中贝叶斯网络结构学习的有前途的途径的潜力。我们认为,我们的新方法构成了贝叶斯网络结构学习领域的重要进步,有可能通过进一步的科学研究来刺激更多的进展。
{"title":"PSO-K2PC: Bayesian structure learning using optimized K2 algorithm for parents-children detection","authors":"Samar Bouazizi, Emna Benmohamed, Hela Ltifi","doi":"10.1080/1206212X.2023.2250143","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2250143","url":null,"abstract":"Bayesian networks, revered for their adeptness in modeling uncertainty and predicting outcomes, encounter a formidable hurdle during the structure learning phase – an NP-hard problem, posing insurmountable computational challenges for large networks. To surmount this barrier and advance the field, we propose an innovative optimization of the K2PC algorithm for Bayesian network structure learning. Derived from the popular K2 algorithm, our novel optimization ingeniously tackles K2PC's vulnerability to predetermined node order. Leveraging the power of a particle swarm optimization algorithm, we adeptly seek the optimal node ordering, yielding exceptional results. Through rigorous evaluations on benchmark networks, our proposed method surpasses prior approaches in structure difference and accuracy, affirming its potential as a promising avenue for Bayesian network structure learning in large, complex networks. We posit that our novel approach constitutes an important advance in the field of Bayesian network structure learning, with the potential to stimulate additional progress through further scientific investigation.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"1 1","pages":"553 - 563"},"PeriodicalIF":0.0,"publicationDate":"2023-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83425579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure medical data storage in DPOS-hyper ledger fabric block chain using PM-ECC and L2-DWT 使用PM-ECC和L2-DWT在dpos -超级分类账结构区块链中安全存储医疗数据
Q2 Computer Science Pub Date : 2023-08-03 DOI: 10.1080/1206212X.2023.2243676
Shinzeer C. K., Avinash Bhagat, A. Kushwaha
Governments and individuals have taken extraordinary measures to protect the health of the people during the COVID pandemic. Stored medical data remains the main target for hackers, and hence it needs to be stored securely. To achieve this objective, this paper proposes a novel model using Delegated Proof of Stake-Hyper ledger Fabric Block Chain (DPOS-HFBC). Primarily, by employing LL Subbandeigen Value decomposition employed Discrete Wavelet Transform (L2-DWT), the patient’s Lung Computed Tomography (CT) image data are collected and embedded. For embedding, the patient’s name and ID are taken. In embedding, a Pseudorandom number generator using the Mersenne twister algorithm employed in Elliptic Curve Cryptography (PM-ECC) is applied for key encryption. It covered the image that was embedded with the original and then stored in DPOS-HFBC. Likewise, for authorization, every patient’s biometric ID was hashed and stored in DPOS-HFBC. Data requesters request data in the Interplanetary File System (IPFS) of DPOS-HFBC, and the attributes from the request are extracted and sent to the authority for verification. After verifying, the authority shares their biometric ID with the requester and this gets hashed and then verified in DPOS-HFBC. To show the model’s supremacy, the proposed method was evaluated and compared with existing methods.
在COVID大流行期间,各国政府和个人采取了非常措施来保护人民的健康。存储的医疗数据仍然是黑客的主要目标,因此需要安全存储。为了实现这一目标,本文提出了一种使用委托权益证明-超级分类账结构区块链(DPOS-HFBC)的新模型。首先,通过采用离散小波变换(L2-DWT)的LL亚条带值分解,采集并嵌入患者的肺部CT图像数据。在植入过程中,会获取患者的姓名和ID。在嵌入中,采用椭圆曲线密码(PM-ECC)中使用的Mersenne捻线算法生成伪随机数进行密钥加密。它覆盖了嵌入原始图像然后存储在DPOS-HFBC中的图像。同样,对于授权,每个患者的生物识别ID被散列并存储在DPOS-HFBC中。数据请求者在DPOS-HFBC的IPFS (Interplanetary File System)中请求数据,并从请求中提取属性并发送给权威机构进行验证。验证后,授权机构与请求者共享其生物识别ID,并对其进行散列,然后在DPOS-HFBC中进行验证。为了证明模型的优越性,对所提方法进行了评价,并与现有方法进行了比较。
{"title":"Secure medical data storage in DPOS-hyper ledger fabric block chain using PM-ECC and L2-DWT","authors":"Shinzeer C. K., Avinash Bhagat, A. Kushwaha","doi":"10.1080/1206212X.2023.2243676","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2243676","url":null,"abstract":"Governments and individuals have taken extraordinary measures to protect the health of the people during the COVID pandemic. Stored medical data remains the main target for hackers, and hence it needs to be stored securely. To achieve this objective, this paper proposes a novel model using Delegated Proof of Stake-Hyper ledger Fabric Block Chain (DPOS-HFBC). Primarily, by employing LL Subbandeigen Value decomposition employed Discrete Wavelet Transform (L2-DWT), the patient’s Lung Computed Tomography (CT) image data are collected and embedded. For embedding, the patient’s name and ID are taken. In embedding, a Pseudorandom number generator using the Mersenne twister algorithm employed in Elliptic Curve Cryptography (PM-ECC) is applied for key encryption. It covered the image that was embedded with the original and then stored in DPOS-HFBC. Likewise, for authorization, every patient’s biometric ID was hashed and stored in DPOS-HFBC. Data requesters request data in the Interplanetary File System (IPFS) of DPOS-HFBC, and the attributes from the request are extracted and sent to the authority for verification. After verifying, the authority shares their biometric ID with the requester and this gets hashed and then verified in DPOS-HFBC. To show the model’s supremacy, the proposed method was evaluated and compared with existing methods.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"103 1","pages":"516 - 522"},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79456098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Studying the effectiveness of deep active learning in software defect prediction 研究了深度主动学习在软件缺陷预测中的有效性
Q2 Computer Science Pub Date : 2023-08-03 DOI: 10.1080/1206212X.2023.2252117
Farid Feyzi, Arman Daneshdoost
Accurate prediction of defective software modules is of great importance for prioritizing quality assurance efforts, reasonably allocating testing resources, reducing costs and improving software quality. Several studies have used machine learning to predict software defects. However, complex structures and imbalanced class distributions in software defect data make learning an effective defect prediction model challenging. In this article, two deep learning-based defect prediction models using static code metrics are proposed. In order to enhance the learning process and improve the performance of the proposed models, pool-based active learning is employed. In this regard, the possibility of using active learning to mitigate the need for a large amount of labeled data in the process of building deep learning models is investigated. To deal with imbalanced distribution of software modules between defective and non-defective classes, Near-Miss under-sampling and KNN, with different number of neighbors, are used. The reason for choosing them is their good performance in binary classification problems. Experiments are performed on two well-known, publicly available datasets, GitHub Bug Dataset and public Unified Bug Dataset for java projects. The evaluation results reveal the effectiveness of our proposed models in comparison to the traditional machine learning algorithms. In the conducted investigations on the Unified Bug Dataset, at the file level, the value of F-measure and AUC criteria have improved by 13 and 11 percent, respectively and at the class level, the values have improved by 14 and 11 percent, respectively.
准确预测有缺陷的软件模块对于确定质量保证工作的优先级、合理分配测试资源、降低成本和提高软件质量具有重要意义。一些研究已经使用机器学习来预测软件缺陷。然而,软件缺陷数据中复杂的结构和不平衡的类分布给学习有效的缺陷预测模型带来了挑战。本文提出了两个基于深度学习的基于静态代码度量的缺陷预测模型。为了提高模型的学习过程和性能,采用了基于池的主动学习方法。在这方面,研究了在构建深度学习模型的过程中使用主动学习来减少对大量标记数据的需求的可能性。为了解决软件模块在缺陷类和非缺陷类之间分布不平衡的问题,采用了邻数不同的欠采样和KNN。选择它们的原因是它们在二值分类问题中的良好性能。实验是在两个众所周知的、公开可用的数据集上进行的,GitHub Bug Dataset和java项目的公共统一Bug Dataset。评估结果表明,与传统的机器学习算法相比,我们提出的模型是有效的。在对统一Bug数据集进行的调查中,在文件级别,F-measure和AUC标准的值分别提高了13%和11%,在类级别,值分别提高了14%和11%。
{"title":"Studying the effectiveness of deep active learning in software defect prediction","authors":"Farid Feyzi, Arman Daneshdoost","doi":"10.1080/1206212X.2023.2252117","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2252117","url":null,"abstract":"Accurate prediction of defective software modules is of great importance for prioritizing quality assurance efforts, reasonably allocating testing resources, reducing costs and improving software quality. Several studies have used machine learning to predict software defects. However, complex structures and imbalanced class distributions in software defect data make learning an effective defect prediction model challenging. In this article, two deep learning-based defect prediction models using static code metrics are proposed. In order to enhance the learning process and improve the performance of the proposed models, pool-based active learning is employed. In this regard, the possibility of using active learning to mitigate the need for a large amount of labeled data in the process of building deep learning models is investigated. To deal with imbalanced distribution of software modules between defective and non-defective classes, Near-Miss under-sampling and KNN, with different number of neighbors, are used. The reason for choosing them is their good performance in binary classification problems. Experiments are performed on two well-known, publicly available datasets, GitHub Bug Dataset and public Unified Bug Dataset for java projects. The evaluation results reveal the effectiveness of our proposed models in comparison to the traditional machine learning algorithms. In the conducted investigations on the Unified Bug Dataset, at the file level, the value of F-measure and AUC criteria have improved by 13 and 11 percent, respectively and at the class level, the values have improved by 14 and 11 percent, respectively.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"16 1","pages":"534 - 552"},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81283313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A cloud based enhanced CPABE framework for efficient user and attribute-level revocation 基于云的增强cabe框架,用于有效的用户和属性级撤销
Q2 Computer Science Pub Date : 2023-08-03 DOI: 10.1080/1206212X.2023.2250149
Shobha Chawla, N. Gupta
Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.
将大量数据外包给云服务提供商(CSP)引发了数据机密性和访问控制方面的各种安全问题。基于密文策略属性的加密(cabe)方案允许数据所有者对其驻留在云中的敏感数据施加访问控制。本文研究了现有的基于双线性配对密码的cabe方案撤销用户的方法。现有的研究建议通过更新未被撤销用户的密钥或更新密文来解决撤销问题。这种方法增加了资源受限设备的计算开销。此外,一些研究讨论了CSP变得不诚实并与被撤销用户勾结的可能性。CSP与被撤销用户之间发生串通攻击的可能性也需要引起广泛关注。所提出的基于代理的框架的开发旨在扩展现有的cpab方案,并通过可扩展性、动态性、抗合谋性和前向/后向保密性简化用户和属性级别的访问权限撤销。该框架采用双线性配对加密和LSSS作为访问结构。此外,提出的框架的安全性和性能分析表明,它比现有的工作更好、更安全、可实现。
{"title":"A cloud based enhanced CPABE framework for efficient user and attribute-level revocation","authors":"Shobha Chawla, N. Gupta","doi":"10.1080/1206212X.2023.2250149","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2250149","url":null,"abstract":"Outsourcing massive amounts of data to the cloud service provider (CSP) has raised various security concerns for data confidentiality and access control. The ciphertext policy attribute based encryption (CPABE) scheme allows data owners to impose access control on their cloud-resident sensitive data. This paper has studied the approaches adopted to revoke users by the existing bilinear pairing cryptography based CPABE schemes. The existing studies have suggested solutions to revocation either by updating the non-revoked users’ keys or updating the ciphertext. Such approaches increase computational overhead for resource-constrained devices. In addition, a few studies have discussed the possibility of the CSP becoming dishonest and colluding with the revoked users. The likelihood of a collusion attack caused by the CSP and the revoked users also needs extensive attention. The development of the proposed proxy-based framework aims to extend the existing CPABE scheme and simplify the revocation of access rights at the user and attribute level with scalability, dynamicity, collusion resistance, and forward/backward secrecy. The proposed framework uses bilinear pairing cryptography and LSSS as an access structure. Furthermore, the security and performance analysis of the proposed framework reflects that it is implementable, better, and more secure than the existing work.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"42 1","pages":"523 - 533"},"PeriodicalIF":0.0,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91333103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic predictive-based flow splitting rerouting scheme for link failures in software-defined networks 基于流量预测的软件定义网络链路故障分流重路由方案
Q2 Computer Science Pub Date : 2023-07-31 DOI: 10.1080/1206212X.2023.2241185
Vianney Kengne Tchendji, Joelle Kabdjou, Yannick Florian Yankam
This paper presents a traffic rerouting approach to keep a satisfactory QoS (Quality of Service) in virtualized network infrastructures (VPN, Cloud, etc.), supervised by an SDN (Software-Defined Networking) controller dealing with high traffic fluctuations. Traffic fluctuations are usually caused by link failures or link congestion and result in high packet loss, long delay times, and high jitter. These metrics are critical in computer network's QoS assessing. In our strategy, we combine traffic prediction in the SDN controller with flow splitting in the data plane. Simulations reveal that this strategy provides more satisfying values of the QoS assessment metrics compared to the literature.
本文提出了一种在虚拟网络基础设施(VPN, Cloud等)中保持令人满意的QoS(服务质量)的流量重路由方法,该方法由SDN(软件定义网络)控制器监督,处理高流量波动。流量波动通常是由链路故障或链路拥塞引起的,导致丢包率高、时延长、抖动大。这些指标对计算机网络的QoS评价至关重要。在我们的策略中,我们将SDN控制器中的流量预测与数据平面中的流量拆分相结合。仿真结果表明,与文献相比,该策略提供了更令人满意的QoS评估指标值。
{"title":"Traffic predictive-based flow splitting rerouting scheme for link failures in software-defined networks","authors":"Vianney Kengne Tchendji, Joelle Kabdjou, Yannick Florian Yankam","doi":"10.1080/1206212X.2023.2241185","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2241185","url":null,"abstract":"This paper presents a traffic rerouting approach to keep a satisfactory QoS (Quality of Service) in virtualized network infrastructures (VPN, Cloud, etc.), supervised by an SDN (Software-Defined Networking) controller dealing with high traffic fluctuations. Traffic fluctuations are usually caused by link failures or link congestion and result in high packet loss, long delay times, and high jitter. These metrics are critical in computer network's QoS assessing. In our strategy, we combine traffic prediction in the SDN controller with flow splitting in the data plane. Simulations reveal that this strategy provides more satisfying values of the QoS assessment metrics compared to the literature.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"81 1","pages":"508 - 515"},"PeriodicalIF":0.0,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90037903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CGSA optimized LSTM auto encoder for outlier detection CGSA优化LSTM自动编码器进行离群点检测
Q2 Computer Science Pub Date : 2023-07-28 DOI: 10.1080/1206212X.2023.2239551
Chigurupati Ravi Swaroop, K. Raja
In recent years, outlier detection has attained great attention with machine learning techniques due to its wide range of applications. By considering the input data’s distributive nature and large dimensionality, outlier detection becomes a challenging issue. Robust outlier detection systems are crucial for data pattern prediction without labeled data. This research develops a novel approach based on stacking auto encoders over Long-Short Term Memory (LSTM) for outlier prediction. The detection accuracy of outlier detection is improved with the hyperparameters optimized with the Chaotic Gravitational Search Algorithm (CGSA). CGSA minimizes the training loss with enhanced detection accuracy in the proposed outlier detection process. The auto encoder in outlier detection transforms the input into a latent space representation to generate the original input sequence. The involvement of learning parameters computes and minimizes the errors between input and generated sequences. The proposed work is experimented and compared with state-of-the-art approaches of recent research. Using the proposed approach, the performance of outlier prediction is improved with an accuracy of98.6%, sensitivity of 96.1%, specificity of 97.8%, G-mean of 96%, Area Under Curve (AUC) of 0.935, Hit rate of 92.3%. Also, the outlier detection errors are minimized, showing the proposed approach’s efficiency.
近年来,异常点检测因其广泛的应用受到了机器学习技术的广泛关注。考虑到输入数据的分布特性和大维度,异常值检测成为一个具有挑战性的问题。鲁棒的异常值检测系统对于无标记数据的数据模式预测至关重要。本研究提出了一种基于长短期记忆(LSTM)叠加自编码器的离群值预测方法。利用混沌引力搜索算法(CGSA)对超参数进行优化,提高了异常点检测的检测精度。在提出的离群值检测过程中,CGSA最大限度地减少了训练损失,提高了检测精度。离群值检测中的自编码器将输入转换为潜在空间表示,生成原始输入序列。学习参数的参与计算和最小化输入和生成序列之间的误差。提出的工作进行了实验,并与最近研究的最先进的方法进行了比较。采用该方法进行异常值预测,准确率为98.6%,灵敏度为96.1%,特异性为97.8%,g均值为96%,曲线下面积(AUC)为0.935,准确率为92.3%。此外,异常点检测误差最小,表明了该方法的有效性。
{"title":"CGSA optimized LSTM auto encoder for outlier detection","authors":"Chigurupati Ravi Swaroop, K. Raja","doi":"10.1080/1206212X.2023.2239551","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2239551","url":null,"abstract":"In recent years, outlier detection has attained great attention with machine learning techniques due to its wide range of applications. By considering the input data’s distributive nature and large dimensionality, outlier detection becomes a challenging issue. Robust outlier detection systems are crucial for data pattern prediction without labeled data. This research develops a novel approach based on stacking auto encoders over Long-Short Term Memory (LSTM) for outlier prediction. The detection accuracy of outlier detection is improved with the hyperparameters optimized with the Chaotic Gravitational Search Algorithm (CGSA). CGSA minimizes the training loss with enhanced detection accuracy in the proposed outlier detection process. The auto encoder in outlier detection transforms the input into a latent space representation to generate the original input sequence. The involvement of learning parameters computes and minimizes the errors between input and generated sequences. The proposed work is experimented and compared with state-of-the-art approaches of recent research. Using the proposed approach, the performance of outlier prediction is improved with an accuracy of98.6%, sensitivity of 96.1%, specificity of 97.8%, G-mean of 96%, Area Under Curve (AUC) of 0.935, Hit rate of 92.3%. Also, the outlier detection errors are minimized, showing the proposed approach’s efficiency.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"223 1","pages":"497 - 507"},"PeriodicalIF":0.0,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75553353","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Addressing cold start in recommender systems with neural networks: a literature survey 用神经网络解决推荐系统中的冷启动问题:文献综述
Q2 Computer Science Pub Date : 2023-07-25 DOI: 10.1080/1206212X.2023.2237766
Fjolla Berisha, E. Bytyçi
Filtering information on the Internet and recommending the right choices is more than important for Internet users and various businesses that offer products and services. Although recommender systems do this work efficiently, problems such as Cold Start often appear when new users or items enter the system. The traditional methods of recommender systems, collaborative filtering and content–based techniques, do not offer an optimized solution to this problem. The integration of neural networks in recommender systems offers a new approach to solving cold start. Whether using the feature of extracting hidden data, or using deep learning algorithms with more layers, the accuracy of recommendations and predictions has increased significantly. We have analyzed 40 papers that approached solving the cold start problem using neural networks. We have researched how neural networks are integrated into recommender systems, what they are used for, which neural network algorithms have shown to be more efficient in solving the cold start problem, and which algorithms have increased the accuracy of the recommendation. We aim to answer these questions with other subquestions related to types of cold start such as item or user cold start and warm, partial, or strict cold start.
过滤互联网上的信息并推荐正确的选择对于互联网用户和提供产品和服务的各种企业来说都是非常重要的。虽然推荐系统可以有效地完成这项工作,但当新用户或新项目进入系统时,经常会出现冷启动等问题。传统的推荐系统方法,协同过滤和基于内容的技术,并没有为这个问题提供一个优化的解决方案。神经网络在推荐系统中的集成为解决冷启动问题提供了一种新的途径。无论是使用提取隐藏数据的功能,还是使用更多层的深度学习算法,推荐和预测的准确性都有了显著提高。我们分析了40篇用神经网络解决冷启动问题的论文。我们研究了如何将神经网络集成到推荐系统中,它们被用于什么,哪种神经网络算法在解决冷启动问题时更有效,以及哪种算法提高了推荐的准确性。我们的目标是用与冷启动类型相关的其他子问题来回答这些问题,例如项目或用户冷启动以及热启动、部分启动或严格冷启动。
{"title":"Addressing cold start in recommender systems with neural networks: a literature survey","authors":"Fjolla Berisha, E. Bytyçi","doi":"10.1080/1206212X.2023.2237766","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2237766","url":null,"abstract":"Filtering information on the Internet and recommending the right choices is more than important for Internet users and various businesses that offer products and services. Although recommender systems do this work efficiently, problems such as Cold Start often appear when new users or items enter the system. The traditional methods of recommender systems, collaborative filtering and content–based techniques, do not offer an optimized solution to this problem. The integration of neural networks in recommender systems offers a new approach to solving cold start. Whether using the feature of extracting hidden data, or using deep learning algorithms with more layers, the accuracy of recommendations and predictions has increased significantly. We have analyzed 40 papers that approached solving the cold start problem using neural networks. We have researched how neural networks are integrated into recommender systems, what they are used for, which neural network algorithms have shown to be more efficient in solving the cold start problem, and which algorithms have increased the accuracy of the recommendation. We aim to answer these questions with other subquestions related to types of cold start such as item or user cold start and warm, partial, or strict cold start.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"95 1","pages":"485 - 496"},"PeriodicalIF":0.0,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81853183","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-scale residual aggregation feature network based on multi-time division for motion behavior recognition 基于多时间分割的多尺度残差聚集特征网络运动行为识别
Q2 Computer Science Pub Date : 2023-06-03 DOI: 10.1080/1206212X.2023.2232169
Fang Duan
The existing behavior recognition models based on the deep convolutional neural network have some problems, such as feature extraction with a single scale and insufficient feature utilization in the middle level. In this paper, we propose a multi-scale residual aggregation feature network based on multi-time division for behavior recognition. Through the sampling form of multi-time division, the diversity of behavior depth features is enriched. Firstly, a hybrid extended convolution residual block (HERB) is designed using extended convolution and residual join with different extension coefficients to extract feature information at multiple scales effectively. Secondly, a feature aggregation mechanism (AM) is introduced to solve the problem of insufficient feature utilization in the middle layer of the network. We construct a deep aggregation model that can learn the distribution of complex behavior features to solve the problem of human behavior classification over a long time span. Experiments on behavioral datasets UCF101 and HMDB51 verify the effectiveness of the new algorithm.
现有的基于深度卷积神经网络的行为识别模型存在特征提取尺度单一、中间层次特征利用率不足等问题。本文提出了一种基于多时间分割的多尺度残差聚集特征网络用于行为识别。通过多时段分割的采样形式,丰富了行为深度特征的多样性。首先,利用不同可拓系数的扩展卷积和残差连接,设计了一种混合扩展卷积残差块(HERB),有效提取多尺度的特征信息;其次,引入特征聚合机制(AM)来解决网络中间层特征利用率不足的问题;我们构建了一个可以学习复杂行为特征分布的深度聚合模型,以解决长时间跨度的人类行为分类问题。在行为数据集UCF101和HMDB51上的实验验证了新算法的有效性。
{"title":"Multi-scale residual aggregation feature network based on multi-time division for motion behavior recognition","authors":"Fang Duan","doi":"10.1080/1206212X.2023.2232169","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2232169","url":null,"abstract":"The existing behavior recognition models based on the deep convolutional neural network have some problems, such as feature extraction with a single scale and insufficient feature utilization in the middle level. In this paper, we propose a multi-scale residual aggregation feature network based on multi-time division for behavior recognition. Through the sampling form of multi-time division, the diversity of behavior depth features is enriched. Firstly, a hybrid extended convolution residual block (HERB) is designed using extended convolution and residual join with different extension coefficients to extract feature information at multiple scales effectively. Secondly, a feature aggregation mechanism (AM) is introduced to solve the problem of insufficient feature utilization in the middle layer of the network. We construct a deep aggregation model that can learn the distribution of complex behavior features to solve the problem of human behavior classification over a long time span. Experiments on behavioral datasets UCF101 and HMDB51 verify the effectiveness of the new algorithm.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"20 1","pages":"452 - 459"},"PeriodicalIF":0.0,"publicationDate":"2023-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84673500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User satisfaction-based genetic algorithm for load shifting in smart grid 基于用户满意度的智能电网负荷转移遗传算法
Q2 Computer Science Pub Date : 2023-06-03 DOI: 10.1080/1206212X.2023.2232167
A. Touzene, Manar Al Moqbali
This paper presents a new load shifting strategy for smart grid systems based on both power consumers’ day-ahead power forecast and their Service Level Agreement (SLA) in order to reduce their electricity bills, guaranties user satisfaction, and for smart grid system to reduce as well the overall power consumption at the peak hours. We provide an analytical model that formulated the load shifting process as a cost minimization problem. A Genetic Algorithm (GA) approach based on a two dimensional chromosome representation is used to solve the optimization problem by collecting a day-ahead forecast and SLAs as an input from the power consumers. The output of the GA consists of giving the best power task plan for the day-ahead which satisfy all consumers in terms of minimizing their consumption bill and reduces the peak demand. Experimental results using simulation show that the proposed load shifting strategy not only guaranty SLA requirements but it reduces the total cost by more than 16%, and in general it achieves a substantial cost savings of 38% compared to the recent algorithms from the literature.
本文提出了一种基于用户日前电量预测和用户服务水平协议(SLA)的智能电网系统负荷转移策略,以降低用户电费,保证用户满意度,同时降低用电高峰时段的总体用电量。我们提供了一个分析模型,将负荷转移过程表述为成本最小化问题。采用基于二维染色体表示的遗传算法(GA)方法,通过从电力用户处收集一天前的预测和sla作为输入来解决优化问题。遗传算法的输出包括给出最优的电力任务计划,以满足所有用户在最小化其消费账单和减少峰值需求方面的需求。仿真实验结果表明,所提出的负载转移策略不仅保证了SLA要求,而且使总成本降低了16%以上,总体上与文献中最近的算法相比,节省了38%的成本。
{"title":"User satisfaction-based genetic algorithm for load shifting in smart grid","authors":"A. Touzene, Manar Al Moqbali","doi":"10.1080/1206212X.2023.2232167","DOIUrl":"https://doi.org/10.1080/1206212X.2023.2232167","url":null,"abstract":"This paper presents a new load shifting strategy for smart grid systems based on both power consumers’ day-ahead power forecast and their Service Level Agreement (SLA) in order to reduce their electricity bills, guaranties user satisfaction, and for smart grid system to reduce as well the overall power consumption at the peak hours. We provide an analytical model that formulated the load shifting process as a cost minimization problem. A Genetic Algorithm (GA) approach based on a two dimensional chromosome representation is used to solve the optimization problem by collecting a day-ahead forecast and SLAs as an input from the power consumers. The output of the GA consists of giving the best power task plan for the day-ahead which satisfy all consumers in terms of minimizing their consumption bill and reduces the peak demand. Experimental results using simulation show that the proposed load shifting strategy not only guaranty SLA requirements but it reduces the total cost by more than 16%, and in general it achieves a substantial cost savings of 38% compared to the recent algorithms from the literature.","PeriodicalId":39673,"journal":{"name":"International Journal of Computers and Applications","volume":"1 1","pages":"444 - 451"},"PeriodicalIF":0.0,"publicationDate":"2023-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84159562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Computers and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1