首页 > 最新文献

International Journal on Information Technologies and Security最新文献

英文 中文
Mathematical model written by ordinary differential equations for hysteresis games 用常微分方程编写的滞后游戏数学模型
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/zwhg6398
Nguyen Hien, Pavel Rahman
In game theory, the hysteresis effect manifests itself in the fact that small differences in one or more parameters lead two systems to opposite stable equilibrium. The mathematical model (called smooth model) of hysteresis game writing by ordinary differential equations with the great parameter K is studied. Estimations of closeness of output functions for smooth and classical models through the continuity module of continuous input function are received. This error can be controlled by increasing the parameter K to a sufficiently large value. The result was conducted by studying of mathematical model and using programs Mathematica, Matlab or Maple. Experiments were carried out, and the obtained results were summarized and presented through evaluations and graphical interpretation.
在博弈论中,滞后效应表现为一个或多个参数的微小差异会导致两个系统达到相反的稳定平衡。本文研究了由常微分方程书写的滞后博弈数学模型(称为平滑模型),其参数为 K。通过连续输入函数的连续性模块,对平滑模型和经典模型的输出函数的接近性进行了估计。这种误差可以通过将参数 K 增加到足够大的值来控制。结果是通过研究数学模型和使用 Mathematica、Matlab 或 Maple 程序得出的。进行了实验,并通过评估和图形解释对获得的结果进行了总结和展示。
{"title":"Mathematical model written by ordinary differential equations for hysteresis games","authors":"Nguyen Hien, Pavel Rahman","doi":"10.59035/zwhg6398","DOIUrl":"https://doi.org/10.59035/zwhg6398","url":null,"abstract":"In game theory, the hysteresis effect manifests itself in the fact that small differences in one or more parameters lead two systems to opposite stable equilibrium. The mathematical model (called smooth model) of hysteresis game writing by ordinary differential equations with the great parameter K is studied. Estimations of closeness of output functions for smooth and classical models through the continuity module of continuous input function are received. This error can be controlled by increasing the parameter K to a sufficiently large value. The result was conducted by studying of mathematical model and using programs Mathematica, Matlab or Maple. Experiments were carried out, and the obtained results were summarized and presented through evaluations and graphical interpretation.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Classification of SPAM mail utilizing machine learning and deep learning techniques 利用机器学习和深度学习技术对垃圾邮件进行分类
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/fpko7430
Bandar Alshawi, Amr Munshi, Majid Alotaibi, Ryan Alturki, Nasser Allheeib
Abstract: The Internet and social media networks usage has increased nowadays and become a prominent medium of communicating. Email is one of the professional reliable methods of communication. Automatic classifications of spam emails have become an area of interest. In order to detect spam emails, this study utilizes a dataset, including spam and non-spam emails. Various techniques are applied to obtain higher accuracy using machine learning techniques. NLP is also utilized for improvising accuracy using embeddings. For that, this work utilizes the BERT model, to achieve satisfactory detection of spam emails. Further, the results are compared with state-of-the-art methods, including, KNN, LSTM and Bi-LSTM. The results obtained by Bi-LSTM and LSTM were 97.94% and 86.02%, respectively. The presented methodology is promising in detecting spam emails due to the higher accuracy achieved.
摘要:如今,互联网和社交媒体网络的使用率越来越高,已成为一种重要的沟通媒介。电子邮件是专业可靠的通信方式之一。对垃圾邮件进行自动分类已成为一个备受关注的领域。为了检测垃圾邮件,本研究使用了一个数据集,其中包括垃圾邮件和非垃圾邮件。为了获得更高的准确率,我们使用了机器学习技术来应用各种技术。为了提高准确率,还使用了嵌入式 NLP。为此,这项工作采用了 BERT 模型,以达到令人满意的垃圾邮件检测效果。此外,还将结果与 KNN、LSTM 和 Bi-LSTM 等最先进的方法进行了比较。Bi-LSTM 和 LSTM 的检测结果分别为 97.94% 和 86.02%。由于所达到的准确率较高,因此所介绍的方法在检测垃圾邮件方面前景广阔。
{"title":"Classification of SPAM mail utilizing machine learning and deep learning techniques","authors":"Bandar Alshawi, Amr Munshi, Majid Alotaibi, Ryan Alturki, Nasser Allheeib","doi":"10.59035/fpko7430","DOIUrl":"https://doi.org/10.59035/fpko7430","url":null,"abstract":"Abstract: The Internet and social media networks usage has increased nowadays and become a prominent medium of communicating. Email is one of the professional reliable methods of communication. Automatic classifications of spam emails have become an area of interest. In order to detect spam emails, this study utilizes a dataset, including spam and non-spam emails. Various techniques are applied to obtain higher accuracy using machine learning techniques. NLP is also utilized for improvising accuracy using embeddings. For that, this work utilizes the BERT model, to achieve satisfactory detection of spam emails. Further, the results are compared with state-of-the-art methods, including, KNN, LSTM and Bi-LSTM. The results obtained by Bi-LSTM and LSTM were 97.94% and 86.02%, respectively. The presented methodology is promising in detecting spam emails due to the higher accuracy achieved.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Kali Linux – a simple and effective way to study the level of cyber security and penetration testing of power electronic devices Kali Linux - 研究网络安全水平和电力电子设备渗透测试的简单有效方法
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/jmfy4876
Ivan Nedyalkov, Georgi Georgiev
The work presents the possibility to use Kali Linux in the process of power electronic devices research, which has not been applied before. Several of the built-in tools of Kali Linux have been used for the purpose of the research. Nmap has been used for vulnerability testing - scanning for open ports and finding out specific, well-known security vulnerabilities by using specific scripts. Wireshark and Burp Suite have been used to find out if the exchanged information is secure or not. hping3 has been used to scan for open ports and generating different TCP DoS attacks, thus studying what is the response of the power electronic device when it is subjected to different TCP DoS attacks – can it be accessed or not, has it experienced any performance violation, etc. Based on the results of this research, it can be argued that Kali Linux is applicable and can be used during the process of power electronic device research.
这项工作提出了在电力电子设备研究过程中使用 Kali Linux 的可能性,而这在以前还没有应用过。Kali Linux 的几个内置工具已用于研究目的。Nmap 用于漏洞测试--使用特定脚本扫描开放端口并找出众所周知的特定安全漏洞。hping3 用于扫描开放端口并生成不同的 TCP DoS 攻击,从而研究电力电子设备在受到不同的 TCP DoS 攻击时的反应--能否被访问、是否出现任何性能故障等。根据这项研究的结果,可以认为 Kali Linux 是适用的,可以在电力电子设备研究过程中使用。
{"title":"Kali Linux – a simple and effective way to study the level of cyber security and penetration testing of power electronic devices","authors":"Ivan Nedyalkov, Georgi Georgiev","doi":"10.59035/jmfy4876","DOIUrl":"https://doi.org/10.59035/jmfy4876","url":null,"abstract":"The work presents the possibility to use Kali Linux in the process of power electronic devices research, which has not been applied before. Several of the built-in tools of Kali Linux have been used for the purpose of the research. Nmap has been used for vulnerability testing - scanning for open ports and finding out specific, well-known security vulnerabilities by using specific scripts. Wireshark and Burp Suite have been used to find out if the exchanged information is secure or not. hping3 has been used to scan for open ports and generating different TCP DoS attacks, thus studying what is the response of the power electronic device when it is subjected to different TCP DoS attacks – can it be accessed or not, has it experienced any performance violation, etc. Based on the results of this research, it can be argued that Kali Linux is applicable and can be used during the process of power electronic device research.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141277588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Real time Zynq 7000 FPGA deployment of optimized YOLOv2 deep leaning model for target detection, based on HDL Coder Methodology 基于 HDL 编码器方法,高效实时部署用于目标检测的优化 YOLOv2 深度倾斜模型的 Zynq 7000 FPGA
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/zbte3810
J. Slimane
Field Programmable Gate Arrays (FPGAs) have garnered significant attention in the development and enhancement of target identification algorithms that employ YOLOv2 models and FPGAs, owing to their adaptability and user-friendliness. The Simulink HDL compiler was utilized to design, simulate, and implement our proposed design. In an effort to rectify this, this paper presents a comprehensive programming and design proposal. The implementation of the YOLOv2 algorithm for real-time vehicle detection on the Xilinx® Zynq-7000 System-on-a-chip is proposed in this work. Real-time testing of the synthesised hardware revealed that it can process Full HD video at a rate of 16 frames per second. On the Xilinx Zynq-7000 SOC, the estimated dynamic power consumption is less than 90 mW. When comparing the results of the proposed work to those of other simulations, it is observed that resource utilization is enhanced by around 204 k (75%) LUT, 305 (12%) DSP, and 224 k (41%) flip-flops at 200 MHz.
现场可编程门阵列(FPGA)因其适应性和用户友好性,在开发和改进采用 YOLOv2 模型和 FPGA 的目标识别算法方面备受关注。我们利用 Simulink HDL 编译器来设计、模拟和实现我们提出的设计。为了纠正这种情况,本文提出了一个全面的编程和设计建议。本文提出在 Xilinx® Zynq-7000 片上系统上实现用于实时车辆检测的 YOLOv2 算法。对合成硬件的实时测试表明,它能以每秒 16 帧的速率处理全高清视频。在赛灵思 Zynq-7000 片上,估计动态功耗低于 90 mW。将拟议工作的结果与其他模拟结果进行比较后发现,在 200 MHz 频率下,资源利用率提高了约 204 k(75%)LUT、305(12%)DSP 和 224 k(41%)触发器。
{"title":"Efficient Real time Zynq 7000 FPGA deployment of optimized YOLOv2 deep leaning model for target detection, based on HDL Coder Methodology","authors":"J. Slimane","doi":"10.59035/zbte3810","DOIUrl":"https://doi.org/10.59035/zbte3810","url":null,"abstract":"Field Programmable Gate Arrays (FPGAs) have garnered significant attention in the development and enhancement of target identification algorithms that employ YOLOv2 models and FPGAs, owing to their adaptability and user-friendliness. The Simulink HDL compiler was utilized to design, simulate, and implement our proposed design. In an effort to rectify this, this paper presents a comprehensive programming and design proposal. The implementation of the YOLOv2 algorithm for real-time vehicle detection on the Xilinx® Zynq-7000 System-on-a-chip is proposed in this work. Real-time testing of the synthesised hardware revealed that it can process Full HD video at a rate of 16 frames per second. On the Xilinx Zynq-7000 SOC, the estimated dynamic power consumption is less than 90 mW. When comparing the results of the proposed work to those of other simulations, it is observed that resource utilization is enhanced by around 204 k (75%) LUT, 305 (12%) DSP, and 224 k (41%) flip-flops at 200 MHz.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141281517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Low-Traffic Aware Hybrid MAC (LTH-MAC) Protocol for Wireless Sensor Networks 无线传感器网络的低流量感知混合 MAC (LTH-MAC) 协议
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/shzm1009
Hafedh Zayani
This paper proposes LTH-MAC (Low-Traffic Aware Hybrid MAC), a novel MAC protocol designed to improve energy efficiency and message delivery reliability in Wireless Sensor Networks (WSNs). LTH-MAC achieves this through innovative techniques like flexible timeslots, channel selection, collision-avoiding, parallel transmissions, and efficient backoff schemes. These optimizations lead to reduced idle listening, minimized collisions, and simplified synchronization. Simulations using OPNET environment demonstrate that LTH-MAC significantly reduces energy consumption, especially under light traffic loads. Additionally, LTH-MAC provides lower end-to-end latency and higher message delivery reliability compared to ECoMAC. These advancements position LTH-MAC as a compelling solution for WSN applications demanding efficient and reliable communication.
本文提出的 LTH-MAC(低流量感知混合 MAC)是一种新型 MAC 协议,旨在提高无线传感器网络(WSN)的能效和信息传输可靠性。LTH-MAC 通过灵活时隙、信道选择、避免碰撞、并行传输和高效回退方案等创新技术实现了这一目标。这些优化措施减少了空闲监听、减少了碰撞并简化了同步。使用 OPNET 环境进行的仿真表明,LTH-MAC 能显著降低能耗,尤其是在轻流量负载下。此外,与 ECoMAC 相比,LTH-MAC 可提供更低的端到端延迟和更高的信息传递可靠性。这些进步使 LTH-MAC 成为要求高效可靠通信的 WSN 应用的理想解决方案。
{"title":"Low-Traffic Aware Hybrid MAC (LTH-MAC) Protocol for Wireless Sensor Networks","authors":"Hafedh Zayani","doi":"10.59035/shzm1009","DOIUrl":"https://doi.org/10.59035/shzm1009","url":null,"abstract":"This paper proposes LTH-MAC (Low-Traffic Aware Hybrid MAC), a novel MAC protocol designed to improve energy efficiency and message delivery reliability in Wireless Sensor Networks (WSNs). LTH-MAC achieves this through innovative techniques like flexible timeslots, channel selection, collision-avoiding, parallel transmissions, and efficient backoff schemes. These optimizations lead to reduced idle listening, minimized collisions, and simplified synchronization. Simulations using OPNET environment demonstrate that LTH-MAC significantly reduces energy consumption, especially under light traffic loads. Additionally, LTH-MAC provides lower end-to-end latency and higher message delivery reliability compared to ECoMAC. These advancements position LTH-MAC as a compelling solution for WSN applications demanding efficient and reliable communication.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141274446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart parking system combining IoT and AI to address improper parking 结合物联网和人工智能的智能停车系统,解决乱停车问题
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/zmry7124
Mostapha Laaouafy, Fatima Lakrami, O. Labouidya
The world is entering a new era of intelligent parking, with researchers exploring innovative solutions to enhance the parking experience. These solutions aim to simplify parking challenges for drivers, reducing stress caused by traffic congestion and the search for available spaces. This study presents an intelligent parking system driven by artificial intelligence (AI). It addresses inefficient and improper parking, providing drivers with detailed information about available spaces and improving their management. This approach empowers drivers with insights into parking availability, reducing time and fuel consumption. The system streamlines parking operations, ensures accurate spot availability information, and enhances overall efficiency and user satisfaction. The effectiveness of this proposed system is evidenced by a range of outcomes, including significant reductions in the time spent searching for parking and decreased fuel consumption along comparable travel routes.
全球正在进入智能停车的新时代,研究人员正在探索创新解决方案,以提升停车体验。这些解决方案旨在简化驾驶员面临的停车挑战,减少交通拥堵和寻找空位造成的压力。本研究介绍了一种由人工智能(AI)驱动的智能停车系统。它可以解决停车效率低和停车不当的问题,为驾驶者提供有关可用停车位的详细信息,并改善停车位的管理。这种方法能让驾驶员深入了解停车位的可用性,从而减少时间和燃料消耗。该系统简化了停车操作,确保准确的停车位可用性信息,并提高了整体效率和用户满意度。一系列成果证明了这一拟议系统的有效性,包括显著减少了寻找停车位的时间,降低了可比行驶路线的油耗。
{"title":"A smart parking system combining IoT and AI to address improper parking","authors":"Mostapha Laaouafy, Fatima Lakrami, O. Labouidya","doi":"10.59035/zmry7124","DOIUrl":"https://doi.org/10.59035/zmry7124","url":null,"abstract":"The world is entering a new era of intelligent parking, with researchers exploring innovative solutions to enhance the parking experience. These solutions aim to simplify parking challenges for drivers, reducing stress caused by traffic congestion and the search for available spaces. This study presents an intelligent parking system driven by artificial intelligence (AI). It addresses inefficient and improper parking, providing drivers with detailed information about available spaces and improving their management. This approach empowers drivers with insights into parking availability, reducing time and fuel consumption. The system streamlines parking operations, ensures accurate spot availability information, and enhances overall efficiency and user satisfaction. The effectiveness of this proposed system is evidenced by a range of outcomes, including significant reductions in the time spent searching for parking and decreased fuel consumption along comparable travel routes.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141275585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing autism severity prediction: A fusion of convolutional neural networks and random forest model 加强自闭症严重程度预测:卷积神经网络与随机森林模型的融合
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/vnwf2548
R. Ramya, S. Arokiaraj
A neurological condition affecting both the brain and behaviour is identified as autism spectrum disorder (ASD). Due to the absence of a reliable medical test for detecting autism, diagnoses rely on historical evidence. Essential in assessing the degree of autism are models like Convolutional Neural Networks (CNNs) and Random Forest (RF). In order to reduce the amount of diagnostic tests required for autism diagnosis, this research work presents a new hybrid model that combines the strengths of RF and CNNs, providing healthcare solutions. It is noteworthy that this model properly predicted the severity of autism with an astounding accuracy rate of 99.15% when applied to historical data gathered from the Kaggle Repository.
自闭症谱系障碍(ASD)是一种影响大脑和行为的神经系统疾病。由于缺乏检测自闭症的可靠医学测试,诊断只能依靠历史证据。卷积神经网络(CNN)和随机森林(RF)等模型对评估自闭症的程度至关重要。为了减少自闭症诊断所需的诊断测试数量,这项研究工作提出了一种新的混合模型,该模型结合了 RF 和 CNN 的优势,为医疗保健提供了解决方案。值得注意的是,当该模型应用于从 Kaggle 存储库中收集的历史数据时,能正确预测自闭症的严重程度,准确率高达 99.15%。
{"title":"Enhancing autism severity prediction: A fusion of convolutional neural networks and random forest model","authors":"R. Ramya, S. Arokiaraj","doi":"10.59035/vnwf2548","DOIUrl":"https://doi.org/10.59035/vnwf2548","url":null,"abstract":"A neurological condition affecting both the brain and behaviour is identified as autism spectrum disorder (ASD). Due to the absence of a reliable medical test for detecting autism, diagnoses rely on historical evidence. Essential in assessing the degree of autism are models like Convolutional Neural Networks (CNNs) and Random Forest (RF). In order to reduce the amount of diagnostic tests required for autism diagnosis, this research work presents a new hybrid model that combines the strengths of RF and CNNs, providing healthcare solutions. It is noteworthy that this model properly predicted the severity of autism with an astounding accuracy rate of 99.15% when applied to historical data gathered from the Kaggle Repository.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Development of a neural network model of an intelligent monitoring agent based on a recurrent neural network with a long chain of short-term memory elements 基于具有长链短时记忆元素的递归神经网络,开发智能监控代理的神经网络模型
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/obhp8561
Osamah Raheem, I. Aksenov, Yu. R. Redkin, A. Gorshkov, S. Sorokin, I. Atlasov, O. Kravets
The article continues to review the approach to designing the architecture of a distributed information monitoring system and quality management of communication services provided by the infrastructures of the Internet of Things and the industrial Internet of Things, based on solutions that support machine-to-machine and human-machine interaction. The development of a neural network model of an intelligent monitoring agent based on a recurrent neural network with a long chain of short-term memory elements is proposed. The matrix structure of the LSTM network memory cell is proposed, which takes into account the spatio-temporal correlation of load parameters associated with the time lag of its propagation and is a matrix of connectivity of LSTM network hyperparameters and accumulated values of load parameters of monitoring nodes in the vicinity of a controlled monitoring node, taking into account the characteristics of the time series of propagation of load in stationarity moments.
文章继续回顾了物联网和工业物联网基础设施提供的分布式信息监控系统和通信服务质量管理的架构设计方法,其基础是支持机器到机器和人机交互的解决方案。本文提出了基于具有长链短时记忆元素的递归神经网络的智能监控代理神经网络模型的开发方法。提出了 LSTM 网络存储单元的矩阵结构,该结构考虑了负载参数与其传播时滞相关的时空相关性,是 LSTM 网络超参数与受控监测节点附近监测节点负载参数累积值的连接矩阵,同时考虑了负载在静止时刻传播的时间序列特征。
{"title":"Development of a neural network model of an intelligent monitoring agent based on a recurrent neural network with a long chain of short-term memory elements","authors":"Osamah Raheem, I. Aksenov, Yu. R. Redkin, A. Gorshkov, S. Sorokin, I. Atlasov, O. Kravets","doi":"10.59035/obhp8561","DOIUrl":"https://doi.org/10.59035/obhp8561","url":null,"abstract":"The article continues to review the approach to designing the architecture of a distributed information monitoring system and quality management of communication services provided by the infrastructures of the Internet of Things and the industrial Internet of Things, based on solutions that support machine-to-machine and human-machine interaction. The development of a neural network model of an intelligent monitoring agent based on a recurrent neural network with a long chain of short-term memory elements is proposed. The matrix structure of the LSTM network memory cell is proposed, which takes into account the spatio-temporal correlation of load parameters associated with the time lag of its propagation and is a matrix of connectivity of LSTM network hyperparameters and accumulated values of load parameters of monitoring nodes in the vicinity of a controlled monitoring node, taking into account the characteristics of the time series of propagation of load in stationarity moments.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141274963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The security analysis on the rabbit stream cipher 兔子流密码的安全性分析
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/swyf4934
Kai Chain
In recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both security and performance has become a crucial concern in the field of cryptography. In 2004, the European Union initiated the eSTREAM project to emulate the Advanced Encryption Standard used in the United States. The project consisted of 48 participating stream cipher candidates. Through open selection, review, and runoff voting, the results were announced in May 2008. This research investigated one of the finalists of the eSTREAM competition: The Rabbit stream cipher. Additionally, stream cipher attack methods have been extensively studied in recent years, especially those for distinguishing attacks. Thus, contributions of this article is explored the design concepts of the core algorithms in the new-generation stream cipher systems for determining the corresponding mathematical principles and practical approaches to contribute to the study of stream cipher systems.
近年来,传统上使用线性反馈移位寄存器设计的流密码系统几乎完全被代数攻击方法所破坏。因此,找出一种方法来建立新一代密码的概念,防止现有的安全问题,并设计出兼顾安全性和性能的新型流密码系统,已成为密码学领域的一个重要问题。2004 年,欧盟启动了 eSTREAM 项目,以模仿美国使用的高级加密标准。该项目由 48 个参与的候选流密码组成。通过公开遴选、审查和决选投票,结果于 2008 年 5 月公布。本研究调查了 eSTREAM 竞赛的入围者之一:Rabbit 流密码。此外,近年来对流密码攻击方法进行了广泛的研究,特别是那些用于区分攻击的方法。因此,本文的贡献在于探讨了新一代流密码系统核心算法的设计理念,以确定相应的数学原理和实用方法,为流密码系统的研究做出贡献。
{"title":"The security analysis on the rabbit stream cipher","authors":"Kai Chain","doi":"10.59035/swyf4934","DOIUrl":"https://doi.org/10.59035/swyf4934","url":null,"abstract":"In recent years, stream cipher systems that have been traditionally designed using linear feedback shift register have been almost entirely compromised by algebraic attack methods. Thus, identifying a method to establish concepts for new-generation ciphers, prevent existing security problems, and design new stream cipher systems that consider both security and performance has become a crucial concern in the field of cryptography. In 2004, the European Union initiated the eSTREAM project to emulate the Advanced Encryption Standard used in the United States. The project consisted of 48 participating stream cipher candidates. Through open selection, review, and runoff voting, the results were announced in May 2008. This research investigated one of the finalists of the eSTREAM competition: The Rabbit stream cipher. Additionally, stream cipher attack methods have been extensively studied in recent years, especially those for distinguishing attacks. Thus, contributions of this article is explored the design concepts of the core algorithms in the new-generation stream cipher systems for determining the corresponding mathematical principles and practical approaches to contribute to the study of stream cipher systems.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141279471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing real-time instance segmentation for plant disease detection with improved YOLOv8-Seg algorithm 利用改进的 YOLOv8-Seg 算法提高植物病害检测的实时实例分割能力
IF 0.9 Pub Date : 2024-06-01 DOI: 10.59035/bcnl3199
Mohamed Ammar
With widespread uses in areas as diverse as traffic analysis and medical imaging, picture segmentation is a basic problem in computer vision. Instance segmentation, which combines object recognition with segmentation, is a powerful tool for item identification and exact delineation. Using the Tomato Leaf disease dataset as an example, this research delves into the topic of segmentation training by capitalizing on the simplicity of enhanced YOLOv8-Seg models. Tomato leaf disease are the focus of this instance-segmentation dataset, which seeks to resolve the pressing problem of agricultural difficulties. One instance segmentation networks, YOLOv8n-Seg is presented and compared in this article for the purpose of Tomato leaf disease identification. The models are tested in difficult situations to see how well they can detect and separate garbage occurrences. Results show that enhanced YOLOv8-Seg is useful for agriculture by accurately segmenting instances of tomato leaf disease detection.
图片分割广泛应用于交通分析和医学成像等不同领域,是计算机视觉领域的一个基本问题。将物体识别与分割相结合的实例分割是物品识别和精确划分的有力工具。本研究以番茄叶疾病数据集为例,利用增强型 YOLOv8-Seg 模型的简易性,深入探讨了分割训练的主题。番茄叶病是该实例分割数据集的重点,旨在解决农业难题这一紧迫问题。本文介绍了一个实例分割网络 YOLOv8n-Seg,并对其进行了比较,以识别番茄叶病。这些模型在困难的情况下进行了测试,以了解其检测和分离垃圾发生的能力。结果表明,增强型 YOLOv8-Seg 能准确分割番茄叶病检测实例,对农业很有帮助。
{"title":"Enhancing real-time instance segmentation for plant disease detection with improved YOLOv8-Seg algorithm","authors":"Mohamed Ammar","doi":"10.59035/bcnl3199","DOIUrl":"https://doi.org/10.59035/bcnl3199","url":null,"abstract":"With widespread uses in areas as diverse as traffic analysis and medical imaging, picture segmentation is a basic problem in computer vision. Instance segmentation, which combines object recognition with segmentation, is a powerful tool for item identification and exact delineation. Using the Tomato Leaf disease dataset as an example, this research delves into the topic of segmentation training by capitalizing on the simplicity of enhanced YOLOv8-Seg models. Tomato leaf disease are the focus of this instance-segmentation dataset, which seeks to resolve the pressing problem of agricultural difficulties. One instance segmentation networks, YOLOv8n-Seg is presented and compared in this article for the purpose of Tomato leaf disease identification. The models are tested in difficult situations to see how well they can detect and separate garbage occurrences. Results show that enhanced YOLOv8-Seg is useful for agriculture by accurately segmenting instances of tomato leaf disease detection.","PeriodicalId":42317,"journal":{"name":"International Journal on Information Technologies and Security","volume":null,"pages":null},"PeriodicalIF":0.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141281149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal on Information Technologies and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1