首页 > 最新文献

Journal of Computer Science最新文献

英文 中文
Discrete Shearlet Transform and Lempel-Ziv Welch Coding for Lossless Fingerprint Image Compression 用于无损指纹图像压缩的离散小剪切变换和 Lempel-Ziv Welch 编码
Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.564.573
N. A. Kadim, S. Guirguis, H. Elsayed
: Image compression is a crucial task in image processing and in the process of sending and receiving files. There is a need for effective techniques for image compression as the raw images require large amounts of disk space to defect during transportation and storage operations. The most important objective of image compression is to decrease the redundancy of the image which helps in increasing the storage capacity and then efficient transmission. This study introduces a system for lossless image compression that is built to work on fingerprint image compression. It uses lossless compression to take care of the first image during processing. However, there is a serious problem which is the low ratio of compression. In order to make the ratio higher, there are five lossless compression techniques used in this study which are Elias Gamma Coding (EGC), Huffman Coding (HC), Arithmetic Coding (AC), Run-Length Encoding (RLE) and Lempel Ziv Welch (LZW). With these techniques, there are three types of transforms are used; they are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Discrete Shearlet Transform (DST). The results conclude that discrete shearlet transform with the Lempel-Ziv Welch coding technique outperforms the other lossless compression techniques and its Compression Ratio (CR) is 3.678023.
:图像压缩是图像处理和文件收发过程中的一项重要任务。由于原始图像在传输和存储过程中需要大量磁盘空间,因此需要有效的图像压缩技术。图像压缩最重要的目的是减少图像的冗余度,这有助于提高存储容量和传输效率。本研究介绍了一种无损图像压缩系统,该系统专门用于指纹图像压缩。该系统在处理过程中使用无损压缩来处理第一张图像。但是,存在一个严重的问题,即压缩率较低。为了提高压缩比,本研究采用了五种无损压缩技术,分别是埃利亚斯伽马编码(EGC)、哈夫曼编码(HC)、算术编码(AC)、运行长度编码(RLE)和伦佩尔-齐夫-韦尔奇(LZW)。这些技术使用了三种变换,即离散余弦变换(DCT)、离散小波变换(DWT)和离散剪切变换(DST)。结果表明,采用 Lempel-Ziv Welch 编码技术的离散小剪切变换优于其他无损压缩技术,其压缩比 (CR) 为 3.678023。
{"title":"Discrete Shearlet Transform and Lempel-Ziv Welch Coding for Lossless Fingerprint Image Compression","authors":"N. A. Kadim, S. Guirguis, H. Elsayed","doi":"10.3844/jcssp.2024.564.573","DOIUrl":"https://doi.org/10.3844/jcssp.2024.564.573","url":null,"abstract":": Image compression is a crucial task in image processing and in the process of sending and receiving files. There is a need for effective techniques for image compression as the raw images require large amounts of disk space to defect during transportation and storage operations. The most important objective of image compression is to decrease the redundancy of the image which helps in increasing the storage capacity and then efficient transmission. This study introduces a system for lossless image compression that is built to work on fingerprint image compression. It uses lossless compression to take care of the first image during processing. However, there is a serious problem which is the low ratio of compression. In order to make the ratio higher, there are five lossless compression techniques used in this study which are Elias Gamma Coding (EGC), Huffman Coding (HC), Arithmetic Coding (AC), Run-Length Encoding (RLE) and Lempel Ziv Welch (LZW). With these techniques, there are three types of transforms are used; they are Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Discrete Shearlet Transform (DST). The results conclude that discrete shearlet transform with the Lempel-Ziv Welch coding technique outperforms the other lossless compression techniques and its Compression Ratio (CR) is 3.678023.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141055551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
COVID-19 in the Era of Artificial Intelligence: Existing Technologies and A Strategic Model for Mitigating Future Pandemics 人工智能时代的 COVID-19:现有技术与缓解未来流行病的战略模式
Pub Date : 2024-05-01 DOI: 10.3844/jcssp.2024.465.486
Bandar M. Alshammari
: Pandemics have existed since the existence of life and will continue as life continues. Throughout many of the previous pandemics, what played a major role in decreasing their severity is how we mitigated and controlled them. The main reason for this is the time it takes for treatments and vaccinations to be developed, which usually takes a long time. Therefore, the techniques used to control a pandemic rapidly change over the course of the pandemic until a cure or vaccine comes to light. At present, advanced technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth generation networks, and big data can without a doubt play major roles in controlling upcoming pandemics including COVID-19. This paper provides a comprehensive survey of current technologies that use AI and big data analytics to take part in the fight against the current pandemic (COVID-19), including their objectives, strengths, weaknesses, and challenges. This paper also studies existing telemedicine technologies and contact tracing tools used in various countries, which governments have adapted to fight against the current COVID-19 pandemic. This work concludes by suggesting a novel strategic model for controlling and mitigating pandemic crises (e.g., COVID-19). This model represents a guided solution for identifying pandemics and for controlling them using advanced digital solutions from the early stages.
:大流行病从有生命以来就一直存在,并将随着生命的延续而继续存在。在以往的许多大流行病中,降低其严重程度的主要因素是我们如何缓解和控制它们。主要原因是治疗方法和疫苗的研发需要时间,而这通常需要很长时间。因此,在治疗方法或疫苗出现之前,用于控制大流行病的技术会在大流行过程中迅速改变。目前,人工智能(AI)、物联网(IoT)、第五代网络和大数据等先进技术无疑可以在控制包括 COVID-19 在内的即将到来的流行病方面发挥重要作用。本文全面调查了当前利用人工智能和大数据分析参与对抗当前流行病(COVID-19)的技术,包括其目标、优势、劣势和挑战。本文还研究了各国政府为应对当前 COVID-19 大流行病而采用的现有远程医疗技术和联系人追踪工具。最后,本文提出了一种控制和缓解流行病危机(如 COVID-19)的新型战略模式。该模式是一种指导性解决方案,可用于识别大流行病,并在早期阶段利用先进的数字解决方案对其进行控制。
{"title":"COVID-19 in the Era of Artificial Intelligence: Existing Technologies and A Strategic Model for Mitigating Future Pandemics","authors":"Bandar M. Alshammari","doi":"10.3844/jcssp.2024.465.486","DOIUrl":"https://doi.org/10.3844/jcssp.2024.465.486","url":null,"abstract":": Pandemics have existed since the existence of life and will continue as life continues. Throughout many of the previous pandemics, what played a major role in decreasing their severity is how we mitigated and controlled them. The main reason for this is the time it takes for treatments and vaccinations to be developed, which usually takes a long time. Therefore, the techniques used to control a pandemic rapidly change over the course of the pandemic until a cure or vaccine comes to light. At present, advanced technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth generation networks, and big data can without a doubt play major roles in controlling upcoming pandemics including COVID-19. This paper provides a comprehensive survey of current technologies that use AI and big data analytics to take part in the fight against the current pandemic (COVID-19), including their objectives, strengths, weaknesses, and challenges. This paper also studies existing telemedicine technologies and contact tracing tools used in various countries, which governments have adapted to fight against the current COVID-19 pandemic. This work concludes by suggesting a novel strategic model for controlling and mitigating pandemic crises (e.g., COVID-19). This model represents a guided solution for identifying pandemics and for controlling them using advanced digital solutions from the early stages.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141057235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CMMI V2.0 Maturity Level 2 and Scrum Applicability in Jordanian Agile Companies Based on Expert Review 基于专家评审的 CMMI V2.0 成熟度 2 级和 Scrum 在约旦敏捷企业中的适用性
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.400.407
Moath Husni
{"title":"CMMI V2.0 Maturity Level 2 and Scrum Applicability in Jordanian Agile Companies Based on Expert Review","authors":"Moath Husni","doi":"10.3844/jcssp.2024.400.407","DOIUrl":"https://doi.org/10.3844/jcssp.2024.400.407","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advances in Forest Fire Detection, Prediction and Behavior: A Comprehensive Survey 森林火灾探测、预测和行为方面的进展:全面调查
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.408.418
Ahmad A. A. Alkhatib, Khalid Jaber
{"title":"Advances in Forest Fire Detection, Prediction and Behavior: A Comprehensive Survey","authors":"Ahmad A. A. Alkhatib, Khalid Jaber","doi":"10.3844/jcssp.2024.408.418","DOIUrl":"https://doi.org/10.3844/jcssp.2024.408.418","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140356997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring Customers’ Satisfaction Using Sentiment Analysis: Model and Tool 利用情感分析衡量客户满意度:模型与工具
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.419.430
Ahmed Alqurafi, Tawfeeq Alsanoosy
{"title":"Measuring Customers’ Satisfaction Using Sentiment Analysis: Model and Tool","authors":"Ahmed Alqurafi, Tawfeeq Alsanoosy","doi":"10.3844/jcssp.2024.419.430","DOIUrl":"https://doi.org/10.3844/jcssp.2024.419.430","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140357519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Medical Image Fusion Based on Synthetic Focusing Degree Criterion and Special Kernel Set for Clinical Diagnosis 基于合成聚焦度标准和特殊核集的鲁棒医学图像融合技术用于临床诊断
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.389.399
D. C. Lepcha, Bhawna Goyal, Ayush Dogra, Ahmed Alkhayyat, Sanjeev Kumar Shah, Vinay Kukreja
{"title":"A Robust Medical Image Fusion Based on Synthetic Focusing Degree Criterion and Special Kernel Set for Clinical Diagnosis","authors":"D. C. Lepcha, Bhawna Goyal, Ayush Dogra, Ahmed Alkhayyat, Sanjeev Kumar Shah, Vinay Kukreja","doi":"10.3844/jcssp.2024.389.399","DOIUrl":"https://doi.org/10.3844/jcssp.2024.389.399","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Classification of Thoracic X-Ray Images of COVID-19 Patients Using the Convolutional Neutral Network (CNN) Method 使用卷积中性网络(CNN)方法对 COVID-19 患者的胸部 X 光图像进行分类
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.357.364
Ramacos Fardela, Dian Milvita, Mawanda Almuhayar, Dedi Mardiansyah, Latifah Aulia Rasyada, L. Hakim
: Recently, radiology modalities have been widely used to detect COVID-19. Thoracic X-rays and CT scans are the primary radiological tools utilized in the diagnosis and treatment of individuals with COVID-19. In addition, chest CT scans are more accurate and sensitive in early COVID-19 identification. A new problem arises in diagnosing the results of CT scan images of COVID-19 by radiologists or radiology specialists where COVID-19 is difficult to distinguish from pneumonia caused by other viruses and bacteria, so misdiagnosis can occur. Many researchers worldwide have developed computer-aided detection or diagnosis schemes based on medical image processing and machine learning to overcome this challenge. This research focuses on the development of previous studies, where the use of the Convolutional Neural Network (CNN) method to classify Thoracic X-ray Images of COVID-19 Patients is compared with the model developed by Roboflow. Image manipulation techniques applied to this study are pseudo color and the program is Python. This study employs the pseudo color image manipulation technique of the program in Python. This study uses data on patients with confirmed COVID-19 at Andalas University Hospital in 2022. Based on the study's results, a very good CNN Specificity score of 93% was obtained and the perfect Sensitivity score value was produced by the detection method using the Roboflow model, which was 100%. However, the Kappa score for both methods is below the expected threshold of 36-38%. Based on the ROC value, the CNN and Roboflow methods are good for calculating chest X-ray images of COVID-19 and normal patients.
:最近,放射学模式被广泛用于检测 COVID-19。胸部 X 光和 CT 扫描是诊断和治疗 COVID-19 患者的主要放射学工具。此外,胸部 CT 扫描在早期识别 COVID-19 方面更为准确和敏感。放射科医生或放射科专家在诊断 COVID-19 的 CT 扫描图像结果时会遇到一个新问题,即 COVID-19 与其他病毒和细菌引起的肺炎很难区分,因此可能会出现误诊。为了克服这一难题,世界上许多研究人员开发了基于医学图像处理和机器学习的计算机辅助检测或诊断方案。本研究的重点是发展以往的研究,将使用卷积神经网络(CNN)方法对 COVID-19 患者的胸部 X 光图像进行分类与 Roboflow 开发的模型进行比较。本研究采用的图像处理技术为伪彩色,程序为 Python。本研究采用了 Python 程序的伪彩色图像处理技术。本研究使用了 2022 年安达卢西亚大学医院确诊的 COVID-19 患者的数据。根据研究结果,获得了非常好的 CNN 特异性得分(93%),使用 Roboflow 模型的检测方法产生了完美的灵敏度得分值(100%)。然而,这两种方法的 Kappa 分数都低于 36%-38% 的预期阈值。根据 ROC 值,CNN 和 Roboflow 方法在计算 COVID-19 和正常患者的胸部 X 光图像方面效果良好。
{"title":"Classification of Thoracic X-Ray Images of COVID-19 Patients Using the Convolutional Neutral Network (CNN) Method","authors":"Ramacos Fardela, Dian Milvita, Mawanda Almuhayar, Dedi Mardiansyah, Latifah Aulia Rasyada, L. Hakim","doi":"10.3844/jcssp.2024.357.364","DOIUrl":"https://doi.org/10.3844/jcssp.2024.357.364","url":null,"abstract":": Recently, radiology modalities have been widely used to detect COVID-19. Thoracic X-rays and CT scans are the primary radiological tools utilized in the diagnosis and treatment of individuals with COVID-19. In addition, chest CT scans are more accurate and sensitive in early COVID-19 identification. A new problem arises in diagnosing the results of CT scan images of COVID-19 by radiologists or radiology specialists where COVID-19 is difficult to distinguish from pneumonia caused by other viruses and bacteria, so misdiagnosis can occur. Many researchers worldwide have developed computer-aided detection or diagnosis schemes based on medical image processing and machine learning to overcome this challenge. This research focuses on the development of previous studies, where the use of the Convolutional Neural Network (CNN) method to classify Thoracic X-ray Images of COVID-19 Patients is compared with the model developed by Roboflow. Image manipulation techniques applied to this study are pseudo color and the program is Python. This study employs the pseudo color image manipulation technique of the program in Python. This study uses data on patients with confirmed COVID-19 at Andalas University Hospital in 2022. Based on the study's results, a very good CNN Specificity score of 93% was obtained and the perfect Sensitivity score value was produced by the detection method using the Roboflow model, which was 100%. However, the Kappa score for both methods is below the expected threshold of 36-38%. Based on the ROC value, the CNN and Roboflow methods are good for calculating chest X-ray images of COVID-19 and normal patients.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140355375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Human Activity Prediction Studies Using Wearable Sensors and Machine Learning 利用可穿戴传感器和机器学习进行人类活动预测研究
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.431.441
Divya Sharma, U. Chauhan
{"title":"Human Activity Prediction Studies Using Wearable Sensors and Machine Learning","authors":"Divya Sharma, U. Chauhan","doi":"10.3844/jcssp.2024.431.441","DOIUrl":"https://doi.org/10.3844/jcssp.2024.431.441","url":null,"abstract":"","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of Big Data Classifier for Biomedicine Early Diagnosis: An Experimental Approach Using Machine Learning Methods 开发用于生物医学早期诊断的大数据分类器:使用机器学习方法的实验方法
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2024.379.388
Ma Beth Solas Concepcion, Bobby D. Gerardo, Frank Elijorde, Joel Traifalgar De Castro, Nerilou Bermudez Dela Cruz
: In the fast-phase world, data availability is abundant due to a rapid adaptation increase of big data technologies. Large amounts of data have been generated and collected at an unprecedented speed and scale, introducing a revolution in medical research practices for biomedicine informatics. Thus, there is an immense demand for statistically rigorous approaches, especially in the medical diagnosis discipline. Therefore, this study utilized the Bayesian Belief Network (BBN) for feature selection, which identifies relevant features from a larger set of attributes and employs a stratification for the Stochastic Gradient Descent (SGD) classifier in the classifying of breast cancer on the publicly available machine learning repository at the University of California, Irvine (UCI) such, breast cancer Wisconsin and Coimbra breast cancer datasets. The experimental approach of using BBN as feature selection achieved 0.95% coincidence. Thus, a stratified Stochastic Gradient Descent (SGD) was employed to build a classification model to validate the coincidence. Our proposed modeling classifier approach reached novelty 98%, which improved by 7% compared to the previous works. Furthermore, this study presents a web-based application, a prototype type, to employ the proposed classifier model for breast cancer diagnosis. This study expects to provide a source of confidence and satisfaction for medical physicians to use decision-support tools.
:在快速发展的世界中,由于大数据技术的快速发展,数据的可用性变得非常丰富。大量数据以前所未有的速度和规模产生和收集,为生物医学信息学的医学研究实践带来了一场革命。因此,对严谨的统计方法有着巨大的需求,尤其是在医学诊断领域。因此,本研究利用贝叶斯信念网络(BBN)进行特征选择,从更大的属性集合中识别出相关特征,并对随机梯度下降(SGD)分类器进行分层,在加利福尼亚大学欧文分校(UCI)的公开机器学习库中对乳腺癌进行分类,如威斯康星州乳腺癌和科英布拉乳腺癌数据集。使用 BBN 作为特征选择的实验方法达到了 0.95% 的吻合率。因此,我们采用了分层随机梯度下降法(SGD)来建立分类模型,以验证重合度。我们提出的建模分类器方法的新颖性达到了 98%,与之前的研究相比提高了 7%。此外,本研究还提出了一个基于网络的应用程序(原型类型),将提出的分类器模型用于乳腺癌诊断。本研究有望为医生使用决策支持工具提供信心和满意度来源。
{"title":"Development of Big Data Classifier for Biomedicine Early Diagnosis: An Experimental Approach Using Machine Learning Methods","authors":"Ma Beth Solas Concepcion, Bobby D. Gerardo, Frank Elijorde, Joel Traifalgar De Castro, Nerilou Bermudez Dela Cruz","doi":"10.3844/jcssp.2024.379.388","DOIUrl":"https://doi.org/10.3844/jcssp.2024.379.388","url":null,"abstract":": In the fast-phase world, data availability is abundant due to a rapid adaptation increase of big data technologies. Large amounts of data have been generated and collected at an unprecedented speed and scale, introducing a revolution in medical research practices for biomedicine informatics. Thus, there is an immense demand for statistically rigorous approaches, especially in the medical diagnosis discipline. Therefore, this study utilized the Bayesian Belief Network (BBN) for feature selection, which identifies relevant features from a larger set of attributes and employs a stratification for the Stochastic Gradient Descent (SGD) classifier in the classifying of breast cancer on the publicly available machine learning repository at the University of California, Irvine (UCI) such, breast cancer Wisconsin and Coimbra breast cancer datasets. The experimental approach of using BBN as feature selection achieved 0.95% coincidence. Thus, a stratified Stochastic Gradient Descent (SGD) was employed to build a classification model to validate the coincidence. Our proposed modeling classifier approach reached novelty 98%, which improved by 7% compared to the previous works. Furthermore, this study presents a web-based application, a prototype type, to employ the proposed classifier model for breast cancer diagnosis. This study expects to provide a source of confidence and satisfaction for medical physicians to use decision-support tools.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140353893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer 使用 Cooja 模拟器(Contiki-OS)生成物联网特定异常数据集,并对与 Aquila 优化器结合的深度学习模型进行性能评估
Pub Date : 2024-04-01 DOI: 10.3844/jcssp.2020.365.378
Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury
: In recent times, the massive expansion of the Internet of Things (IoT) has transformed various facets of everyday life and industries. The compelling cause behind the widespread adoption of IoT is the increasing availability of affordable, compact, and energy-efficient computing devices. While these devices offer significant benefits, they also raise substantial security and privacy challenges. Consequently, safeguarding IoT networks and devices is imperative. To raise a robust security system for IoT networks, it is crucial to have an efficient anomaly-based intrusion detection system. In this study, we introduce a meticulous methodology to create IoT-specific datasets. Utilizing the Contiki-OS Cooja simulator, we generate datasets representative of real-world IoT security threats, including sinkholes, version numbers, and flooding attacks. We then evaluate the performance of a Convolutional Neural Network paired with an Aquila Optimizer (CNN-AO) using these self-generated datasets, by employing metrics such as accuracy, precision, recall, F1-score, sensitivity, specificity, and false alarm rate. Additionally, we compare the effectiveness of CNN and LSTM models in distinguishing between benign and malicious traffic. Our findings demonstrate that the CNN-AO model surpasses other models in accurately classifying normal and malicious traffic with an accuracy of 99.22, 99.77, and 99.55% for our self-generated malicious datasets based on sinkhole attack, version number attack, and flooding attack respectively. This novel approach not only establishes a solid foundation for future investigations in this domain but also provides valuable insights into enhancing IoT system security. In this study, we contribute to the field by introducing a robust methodology for IoT-specific dataset generation and evaluating a cutting-edge CNN-AO model for intrusion detection. Furthermore, it is crucial to note that this research was conducted with utmost ethical consideration. Ethical guidelines and data privacy concerns were meticulously addressed during the generation of IoT datasets and the simulation of real-world attack scenarios, ensuring the responsible conduct of our study.
:近来,物联网(IoT)的大规模扩展已经改变了日常生活和各行各业的方方面面。物联网得到广泛应用的根本原因是价格低廉、结构紧凑、高能效的计算设备越来越多。这些设备在带来巨大好处的同时,也带来了巨大的安全和隐私挑战。因此,保护物联网网络和设备的安全势在必行。要为物联网网络建立一个强大的安全系统,关键是要有一个高效的基于异常的入侵检测系统。在本研究中,我们介绍了一种创建物联网专用数据集的细致方法。利用 Contiki-OS Cooja 模拟器,我们生成了能代表现实世界物联网安全威胁的数据集,包括漏洞、版本号和洪水攻击。然后,我们利用这些自生成的数据集,采用准确度、精确度、召回率、F1 分数、灵敏度、特异性和误报率等指标,评估了卷积神经网络与 Aquila 优化器(CNN-AO)的性能。此外,我们还比较了 CNN 和 LSTM 模型在区分良性和恶意流量方面的有效性。我们的研究结果表明,CNN-AO 模型在对正常流量和恶意流量进行准确分类方面超越了其他模型,对于我们基于天坑攻击、版本号攻击和洪水攻击自生成的恶意数据集,其准确率分别为 99.22%、99.77% 和 99.55%。这种新颖的方法不仅为该领域未来的研究奠定了坚实的基础,还为增强物联网系统的安全性提供了宝贵的见解。在本研究中,我们为物联网特定数据集的生成引入了一种稳健的方法,并评估了用于入侵检测的尖端 CNN-AO 模型,从而为该领域做出了贡献。此外,必须指出的是,本研究是在考虑到最高道德标准的情况下进行的。在生成物联网数据集和模拟真实世界攻击场景的过程中,道德准则和数据隐私问题都得到了细致的处理,确保了我们的研究以负责任的方式进行。
{"title":"Generating IoT Specific Anomaly Datasets Using Cooja Simulator (Contiki-OS) and Performance Evaluation of Deep Learning Model Coupled with Aquila Optimizer","authors":"Vandana Choudhary, Sarvesh Tanwar, Tanupriya Choudhury","doi":"10.3844/jcssp.2020.365.378","DOIUrl":"https://doi.org/10.3844/jcssp.2020.365.378","url":null,"abstract":": In recent times, the massive expansion of the Internet of Things (IoT) has transformed various facets of everyday life and industries. The compelling cause behind the widespread adoption of IoT is the increasing availability of affordable, compact, and energy-efficient computing devices. While these devices offer significant benefits, they also raise substantial security and privacy challenges. Consequently, safeguarding IoT networks and devices is imperative. To raise a robust security system for IoT networks, it is crucial to have an efficient anomaly-based intrusion detection system. In this study, we introduce a meticulous methodology to create IoT-specific datasets. Utilizing the Contiki-OS Cooja simulator, we generate datasets representative of real-world IoT security threats, including sinkholes, version numbers, and flooding attacks. We then evaluate the performance of a Convolutional Neural Network paired with an Aquila Optimizer (CNN-AO) using these self-generated datasets, by employing metrics such as accuracy, precision, recall, F1-score, sensitivity, specificity, and false alarm rate. Additionally, we compare the effectiveness of CNN and LSTM models in distinguishing between benign and malicious traffic. Our findings demonstrate that the CNN-AO model surpasses other models in accurately classifying normal and malicious traffic with an accuracy of 99.22, 99.77, and 99.55% for our self-generated malicious datasets based on sinkhole attack, version number attack, and flooding attack respectively. This novel approach not only establishes a solid foundation for future investigations in this domain but also provides valuable insights into enhancing IoT system security. In this study, we contribute to the field by introducing a robust methodology for IoT-specific dataset generation and evaluating a cutting-edge CNN-AO model for intrusion detection. Furthermore, it is crucial to note that this research was conducted with utmost ethical consideration. Ethical guidelines and data privacy concerns were meticulously addressed during the generation of IoT datasets and the simulation of real-world attack scenarios, ensuring the responsible conduct of our study.","PeriodicalId":40005,"journal":{"name":"Journal of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140354343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1