首页 > 最新文献

Open Computer Science最新文献

英文 中文
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model 利用序列对序列模型和自适应SEIR模型预测和监测印度COVID-19的流行趋势
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0221
K. D. Gupta, R. Dwivedi, D. Sharma
Abstract In the year 2019, during the month of December, the first case of SARS-CoV-2 was reported in China. As per reports, the virus started spreading from a wet market in the Wuhan City. The person infected with the virus is diagnosed with cough and fever, and in some rare occasions, the person suffers from breathing inabilities. The highly contagious nature of this corona virus disease (COVID-19) caused the rapid outbreak of the disease around the world. India contracted the disease from China and reported its first case on January 30, 2020, in Kerala. Despite several counter measures taken by Government, India like other countries could not restrict the outbreak of the epidemic. However, it is believed that the strict policies adopted by the Indian Government have slowed the rate of the epidemic to a certain extent. This article proposes an adaptive SEIR disease model and a sequence-to-sequence (Seq2Seq) learning model to predict the future trend of COVID-19 outbreak in India and analyze the performance of these models. Optimization of hyper parameters using RMSProp is done to obtain an efficient model with lower convergence time. This article focuses on evaluating the performance of deep learning networks and epidemiological models in predicting a pandemic outbreak.
2019年12月,中国报告了首例SARS-CoV-2病例。据报道,该病毒是从武汉市的一个菜市场开始传播的。感染病毒的人被诊断为咳嗽和发烧,在某些罕见的情况下,患者会出现呼吸困难。这种冠状病毒病(COVID-19)的高度传染性导致该疾病在世界各地迅速爆发。印度从中国感染了这种疾病,并于2020年1月30日在喀拉拉邦报告了首例病例。尽管印度政府采取了若干反制措施,但与其他国家一样,印度无法限制这一流行病的爆发。然而,人们相信,印度政府采取的严格政策在一定程度上减缓了疫情的蔓延速度。本文提出了自适应SEIR疾病模型和序列到序列(Seq2Seq)学习模型,用于预测印度COVID-19疫情的未来趋势,并分析了这些模型的性能。利用RMSProp对超参数进行了优化,得到了收敛时间较短的高效模型。本文的重点是评估深度学习网络和流行病学模型在预测大流行爆发方面的性能。
{"title":"Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model","authors":"K. D. Gupta, R. Dwivedi, D. Sharma","doi":"10.1515/comp-2020-0221","DOIUrl":"https://doi.org/10.1515/comp-2020-0221","url":null,"abstract":"Abstract In the year 2019, during the month of December, the first case of SARS-CoV-2 was reported in China. As per reports, the virus started spreading from a wet market in the Wuhan City. The person infected with the virus is diagnosed with cough and fever, and in some rare occasions, the person suffers from breathing inabilities. The highly contagious nature of this corona virus disease (COVID-19) caused the rapid outbreak of the disease around the world. India contracted the disease from China and reported its first case on January 30, 2020, in Kerala. Despite several counter measures taken by Government, India like other countries could not restrict the outbreak of the epidemic. However, it is believed that the strict policies adopted by the Indian Government have slowed the rate of the epidemic to a certain extent. This article proposes an adaptive SEIR disease model and a sequence-to-sequence (Seq2Seq) learning model to predict the future trend of COVID-19 outbreak in India and analyze the performance of these models. Optimization of hyper parameters using RMSProp is done to obtain an efficient model with lower convergence time. This article focuses on evaluating the performance of deep learning networks and epidemiological models in predicting a pandemic outbreak.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"27 - 36"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43410520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework 从软件体系结构到分布式敏捷框架的需求管理(FFRM)灵活框架
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0239
Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun
Abstract GSD is a Global software development environment where data are distributed to more than two sites. These sites may be located on national or continental borders. Every year it expands its development volume, which has become a trend for the software development business. Because of increasing demand, it has become a common type of business. The value of offshore software development has increased immensely. According to the recent predictions, one-quarter of US software-related business shifts offshore, including integration and management-related services. GSD helps explore resources from other countries, increasing knowledge and enhancing operational efficiency. Therefore, globalization has changed the development nature of software. Different organizations face several challenges, such as coordination and requirement ambiguity, during the change management process in GSD. Traceability accommodates these changes in forward and backward direction. However, it gives rise to several challenges like less client involvement because of its distributed nature and challenging to manage the requirement ambiguity due to increased cost. Therefore, the Flexible Framework for Requirement Management (FFRM) must handle the abovementioned issues.
GSD是一个全球性的软件开发环境,其中数据分布到两个以上的站点。这些地点可能位于国家或大陆边界。它每年都在扩大其开发规模,这已成为软件开发业务的趋势。由于需求不断增加,它已成为一种常见的业务类型。离岸软件开发的价值已经大大增加了。根据最近的预测,四分之一的美国软件相关业务转移到海外,包括集成和管理相关服务。政府统计处协助发掘其他国家的资源,增加知识和提高运作效率。因此,全球化改变了软件的开发本质。在GSD的变更管理过程中,不同的组织面临着一些挑战,比如协调和需求模糊。可追溯性适应这些向前和向后方向的变化。然而,它带来了一些挑战,比如由于其分布式特性而导致客户参与度降低,以及由于成本增加而对需求模糊性进行管理带来的挑战。因此,灵活的需求管理框架(FFRM)必须处理上述问题。
{"title":"A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework","authors":"Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun","doi":"10.1515/comp-2022-0239","DOIUrl":"https://doi.org/10.1515/comp-2022-0239","url":null,"abstract":"Abstract GSD is a Global software development environment where data are distributed to more than two sites. These sites may be located on national or continental borders. Every year it expands its development volume, which has become a trend for the software development business. Because of increasing demand, it has become a common type of business. The value of offshore software development has increased immensely. According to the recent predictions, one-quarter of US software-related business shifts offshore, including integration and management-related services. GSD helps explore resources from other countries, increasing knowledge and enhancing operational efficiency. Therefore, globalization has changed the development nature of software. Different organizations face several challenges, such as coordination and requirement ambiguity, during the change management process in GSD. Traceability accommodates these changes in forward and backward direction. However, it gives rise to several challenges like less client involvement because of its distributed nature and challenging to manage the requirement ambiguity due to increased cost. Therefore, the Flexible Framework for Requirement Management (FFRM) must handle the abovementioned issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"364 - 377"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46897474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the structure of smart medical industry based on the background of the internet of things 基于物联网背景下的智慧医疗产业结构研究
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0247
Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou
Abstract In view of the current development trend of the smart medical industry in the context of the internet of things, this study conducts an evolutionary game analysis on information technology providers, medical institutions, digital medical equipment providers, and medical regulatory agencies in the smart medical industry. This study also analyzes the stable state of the future development of the smart medical industry and performs simulation calculations through MATLAB software. The research results show that the overall development trend of the smart medical industry structure in the future is consistent with the development trend of each industry structure. Under the strategic background of the supervision of medical regulatory agencies, information technology providers and digital medical equipment providers, respectively, provide the smart medical industry with the latest information technology and digital medical equipment to ensure the technical support of the smart medical industry. The smart medical industry provides corresponding medical talents and medical equipment to ensure the demand for talents and equipment of the smart medical industry, so that the structure of the smart medical industry can continuously improve the level of smart medical technology in the future development and ultimately promote the overall development of the smart medical industry.
摘要针对当前物联网背景下智能医疗行业的发展趋势,本研究对智能医疗行业中的信息技术提供商、医疗机构、数字医疗设备提供商和医疗监管机构进行了演化博弈分析。本研究还分析了智能医疗行业未来发展的稳定状态,并通过MATLAB软件进行了仿真计算。研究结果表明,未来智慧医疗产业结构的整体发展趋势与各产业结构的发展趋势是一致的。在医疗监管机构监管的战略背景下,信息技术提供商和数字医疗设备提供商分别为智慧医疗行业提供最新的信息技术和数字医疗设备,确保智慧医疗行业的技术支撑。智慧医疗行业提供相应的医疗人才和医疗设备,保证智慧医疗行业对人才和设备的需求,使智慧医疗行业的结构在未来的发展中不断提升智慧医疗技术水平,最终推动智慧医疗行业的整体发展。
{"title":"Research on the structure of smart medical industry based on the background of the internet of things","authors":"Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou","doi":"10.1515/comp-2022-0247","DOIUrl":"https://doi.org/10.1515/comp-2022-0247","url":null,"abstract":"Abstract In view of the current development trend of the smart medical industry in the context of the internet of things, this study conducts an evolutionary game analysis on information technology providers, medical institutions, digital medical equipment providers, and medical regulatory agencies in the smart medical industry. This study also analyzes the stable state of the future development of the smart medical industry and performs simulation calculations through MATLAB software. The research results show that the overall development trend of the smart medical industry structure in the future is consistent with the development trend of each industry structure. Under the strategic background of the supervision of medical regulatory agencies, information technology providers and digital medical equipment providers, respectively, provide the smart medical industry with the latest information technology and digital medical equipment to ensure the technical support of the smart medical industry. The smart medical industry provides corresponding medical talents and medical equipment to ensure the demand for talents and equipment of the smart medical industry, so that the structure of the smart medical industry can continuously improve the level of smart medical technology in the future development and ultimately promote the overall development of the smart medical industry.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"289 - 299"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45569149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two hide-search games with rapid strategies for multiple parallel searches 两个具有快速策略的多重平行搜索的隐藏搜索游戏
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0243
P. Creasey
Abstract Making a rapid unpredictable decision from N N choices of unequal value is a common control task. When the cost of predictability can be modelled as a penalty hidden under a single option by an intelligent adversary, then an optimal strategy can be found efficiently in O ( N log N ) Oleft(Nlog N) steps using an approach described by Sakaguchi for a zero-sum hide-search game. In this work, we extend this to two games with multiple parallel predictions, either coordinated or drawn independently from the optimal distribution, both of which can be solved with the same scaling. An open-source code is provided online at https://github.com/pec27/rams.
摘要从N N个不等值的选择中快速做出不可预测的决策是一项常见的控制任务。当可预测性成本可以被智能对手建模为隐藏在单个选项下的惩罚时,则可以使用Sakaguchi描述的零和隐藏搜索游戏的方法,在O(N log N)Oleft(Nlog N)步骤中有效地找到最优策略。在这项工作中,我们将其扩展到具有多个平行预测的两个游戏,无论是协调的还是独立于最优分布绘制的,这两个游戏都可以用相同的比例求解。开源代码在线提供,网址为https://github.com/pec27/rams.
{"title":"Two hide-search games with rapid strategies for multiple parallel searches","authors":"P. Creasey","doi":"10.1515/comp-2022-0243","DOIUrl":"https://doi.org/10.1515/comp-2022-0243","url":null,"abstract":"Abstract Making a rapid unpredictable decision from N N choices of unequal value is a common control task. When the cost of predictability can be modelled as a penalty hidden under a single option by an intelligent adversary, then an optimal strategy can be found efficiently in O ( N log N ) Oleft(Nlog N) steps using an approach described by Sakaguchi for a zero-sum hide-search game. In this work, we extend this to two games with multiple parallel predictions, either coordinated or drawn independently from the optimal distribution, both of which can be solved with the same scaling. An open-source code is provided online at https://github.com/pec27/rams.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"171 - 180"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43648659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIKM – a smart cryptographic key management framework 一个智能加密密钥管理框架
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0167
Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar
Abstract For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
摘要为了保证数据传输的安全性,对称加密技术中数据的加密和解密都使用相同的密钥。创建、分发、存储、部署和最终撤销对称密钥的过程称为密钥管理。设计了许多密钥管理方案,每个方案都适用于特定的应用范围。然而,这些方案有一些共同的缺点,如密钥生成和分发的难度、密钥存储、攻击和流量负载。本文提出了一种抗攻击的密钥管理框架,并对目前常用的密钥管理工作流程进行了改造,提高了安全性,减少了弱点。该框架的主要特点是消除密钥存储、智能抗攻击特性、将多次密钥分发减少到仅一次解释器分发,以及具有短密钥间隔(每分钟、每小时和每天)。而且,密钥撤销过程是自动发生的,不需要撤销调用。
{"title":"SIKM – a smart cryptographic key management framework","authors":"Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar","doi":"10.1515/comp-2020-0167","DOIUrl":"https://doi.org/10.1515/comp-2020-0167","url":null,"abstract":"Abstract For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"17 - 26"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43788922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy protection methods of location services in big data 大数据环境下定位服务的隐私保护方法
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0250
Wenfeng Liu, Juanjuan Wu, Zhong Xi
Abstract The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.
移动通信技术的飞速发展在给我们的生活带来便利和乐趣的同时,也带来了隐私泄露等一系列问题。因此,研究基于位置服务的隐私保护方法来加强位置隐私的安全性是非常必要的。本工作的目的是通过研究位置服务的特点和隐私保护方法,提高位置隐私的安全性,防止用户隐私的泄露。本文首先阐述了重要场所隐私保护法的特点,然后研究了重要场所隐私保护法的结构特点和运作过程。本工作评估了不同方法的优缺点,最后通过实验分析比较了几种隐私保护算法的性能。通过对隐藏空间方法、基于用户网格的两级缓存方法、差分隐私保护方法的研究,并对算法进行实验分析,得到了一种有效的隐私保护算法。它可以更好地保护用户的位置隐私。例如,隐藏空间中的双主动算法具有最佳的隐私保护性能。与其他算法相比,生成隐藏空间的成功率提高了10%以上,生成隐藏空间的时间缩短了约四分之一。该算法对用户隐私保护具有一定的实用价值和意义。
{"title":"Privacy protection methods of location services in big data","authors":"Wenfeng Liu, Juanjuan Wu, Zhong Xi","doi":"10.1515/comp-2022-0250","DOIUrl":"https://doi.org/10.1515/comp-2022-0250","url":null,"abstract":"Abstract The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"389 - 402"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48821902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective integrated machine learning approach for detecting diabetic retinopathy 一种检测糖尿病视网膜病变的有效集成机器学习方法
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0222
Penikalapati Pragathi, Agastyaraju Nagaraja Rao
Abstract Millions of people across the world are suffering from diabetic retinopathy. This disease majorly affects the retina of the eye, and if not identified priorly causes permanent blindness. Hence, detecting diabetic retinopathy at an early stage is very important to safeguard people from blindness. Several machine learning (ML) algorithms are implemented on the dataset of diabetic retinopathy available in the UCI ML repository to detect the symptoms of diabetic retinopathy. But, most of those algorithms are implemented individually. Hence, this article proposes an effective integrated ML approach that uses the support vector machine (SVM), principal component analysis (PCA), and moth-flame optimization techniques. Initially, the ML algorithms decision tree (DT), SVM, random forest (RF), and Naïve Bayes (NB) are applied to the diabetic retinopathy dataset. Among these, the SVM algorithm is outperformed with an average of 76.96% performance. Later, all the aforementioned ML algorithms are implemented by integrating the PCA technique to reduce the dimensions of the dataset. After integrating PCA, it is noticed that the performance of the algorithms NB, RF, and SVM is reduced dramatically; on the contrary, the performance of DT is increased. To improve the performance of ML algorithms, the moth-flame optimization technique is integrated with SVM and PCA. This proposed approach is outperformed with an average of 85.61% performance among all the other considered ML algorithms, and the classification of class labels is achieved correctly.
全世界有数百万人患有糖尿病视网膜病变。这种疾病主要影响眼睛的视网膜,如果没有事先发现,会导致永久性失明。因此,早期发现糖尿病视网膜病变对于保护人们免于失明是非常重要的。在UCI机器学习存储库中的糖尿病视网膜病变数据集上实现了几种机器学习(ML)算法,以检测糖尿病视网膜病变的症状。但是,大多数算法都是单独实现的。因此,本文提出了一种有效的集成ML方法,该方法使用支持向量机(SVM)、主成分分析(PCA)和蛾焰优化技术。首先,将ML算法决策树(DT)、支持向量机(SVM)、随机森林(RF)和Naïve贝叶斯(NB)应用于糖尿病视网膜病变数据集。其中,SVM算法以76.96%的平均性能优于SVM算法。然后,通过集成PCA技术来实现上述所有ML算法,以降低数据集的维数。在对PCA进行整合后,发现NB、RF和SVM算法的性能显著降低;相反,DT的性能有所提高。为了提高机器学习算法的性能,将蛾焰优化技术与支持向量机和主成分分析相结合。在所有考虑的ML算法中,该方法的平均性能为85.61%,并且正确地实现了类标签的分类。
{"title":"An effective integrated machine learning approach for detecting diabetic retinopathy","authors":"Penikalapati Pragathi, Agastyaraju Nagaraja Rao","doi":"10.1515/comp-2020-0222","DOIUrl":"https://doi.org/10.1515/comp-2020-0222","url":null,"abstract":"Abstract Millions of people across the world are suffering from diabetic retinopathy. This disease majorly affects the retina of the eye, and if not identified priorly causes permanent blindness. Hence, detecting diabetic retinopathy at an early stage is very important to safeguard people from blindness. Several machine learning (ML) algorithms are implemented on the dataset of diabetic retinopathy available in the UCI ML repository to detect the symptoms of diabetic retinopathy. But, most of those algorithms are implemented individually. Hence, this article proposes an effective integrated ML approach that uses the support vector machine (SVM), principal component analysis (PCA), and moth-flame optimization techniques. Initially, the ML algorithms decision tree (DT), SVM, random forest (RF), and Naïve Bayes (NB) are applied to the diabetic retinopathy dataset. Among these, the SVM algorithm is outperformed with an average of 76.96% performance. Later, all the aforementioned ML algorithms are implemented by integrating the PCA technique to reduce the dimensions of the dataset. After integrating PCA, it is noticed that the performance of the algorithms NB, RF, and SVM is reduced dramatically; on the contrary, the performance of DT is increased. To improve the performance of ML algorithms, the moth-flame optimization technique is integrated with SVM and PCA. This proposed approach is outperformed with an average of 85.61% performance among all the other considered ML algorithms, and the classification of class labels is achieved correctly.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"83 - 91"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43846044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new watermarking scheme for digital videos using DCT 一种新的基于DCT的数字视频水印方案
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0238
A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa
Abstract With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.
摘要随着高速宽带互联网接入的出现,强烈建议有必要保护数字视频。本研究的主要目的是提出一种基于离散余弦变换(DCT)的频域水印数字视频自适应算法。水印签名图像被嵌入到视频的整个帧中。RGB帧的绿色通道被选择用于使用DCT算法的嵌入过程,因为它显示了带水印帧的推荐质量。实验结果表明,通过测试不同视频的不同强度值∆,该算法显示了水印视频的鲁棒性和高质量。它可以抵抗不同类型的攻击。
{"title":"A new watermarking scheme for digital videos using DCT","authors":"A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa","doi":"10.1515/comp-2022-0238","DOIUrl":"https://doi.org/10.1515/comp-2022-0238","url":null,"abstract":"Abstract With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"248 - 259"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48068680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on the random walk classification algorithm of polyant colony 多蚁群随机行走分类算法研究
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0248
Wenhai Qiu
Abstract With the sustained and healthy development of economy, saving energy and reducing consumption and improving energy utilization rate is a major task that enterprises need to solve. With the complex and large-scale chemical process, the heat exchange network has become complex and diverse. For more and more complex and large-scale industrial heat exchange networks, there are many different kinds of heat exchangers, the flow is complex, so the heat exchange network presents a high degree of complexity, a node status change; its disturbance transfer will influence the stability of other nodes associated with it, because of the system coupling, thus affecting the controllability and reliability of the whole heat exchanger network. Process optimization design of heat exchange network is one of the main methods of energy saving in the industrial field. As a typical simulated evolutionary algorithm in swarm intelligence algorithm, ant colony algorithm combined with random walk classification algorithm, this article proposes an optimized heat transfer network based on multi-ant colony random walk classification algorithm. The heat exchanger was abstracted as a node, and the heat exchanger pipeline was abstracted as a side. According to the maximum geometric multiplicity of the eigenvalue of the adjacency matrix and the linear correlation row vector of the matrix, and combining the importance of the edge of the heat exchange network with the controllable range of the driving edge, the optimal control driving edge of the heat exchange network is identified. The results show that compared with the traditional heat exchanger, the size of the enhanced heat transfer equipment and the influence of pressure drop change. Compared with the results of the size of the heat exchanger strengthening heat transfer equipment and the stepwise optimization of the heat exchange network in this study, the cost of public engineering is reduced by 5.98% and the total cost is reduced by 8.83%.
摘要随着经济的持续健康发展,节能降耗、提高能源利用率是企业需要解决的一项重大任务。随着复杂大规模的化学过程,换热网络变得复杂多样。对于越来越复杂、规模越来越大的工业换热网络,换热器种类繁多,流动复杂,因此换热网络呈现出高度复杂、节点状态变化的特点;由于系统的耦合,其扰动传递会影响与其相关的其他节点的稳定性,从而影响整个换热器网络的可控性和可靠性。换热网络的工艺优化设计是工业领域节能的主要方法之一。作为群体智能算法中一种典型的模拟进化算法——蚁群算法与随机游动分类算法相结合,本文提出了一种基于多蚁群随机游动分类法的优化传热网络。将换热器抽象为一个节点,将换热管道抽象为一条边。根据邻接矩阵特征值的最大几何多重性和矩阵的线性相关行向量,结合换热网络边缘的重要性和驱动边缘的可控范围,识别换热网络的最优控制驱动边缘。结果表明,与传统换热器相比,强化传热设备的尺寸和压降的影响都发生了变化。与本研究换热器强化传热设备的尺寸和换热网络的逐步优化结果相比,公共工程成本降低了5.98%,总成本降低了8.83%。
{"title":"Study on the random walk classification algorithm of polyant colony","authors":"Wenhai Qiu","doi":"10.1515/comp-2022-0248","DOIUrl":"https://doi.org/10.1515/comp-2022-0248","url":null,"abstract":"Abstract With the sustained and healthy development of economy, saving energy and reducing consumption and improving energy utilization rate is a major task that enterprises need to solve. With the complex and large-scale chemical process, the heat exchange network has become complex and diverse. For more and more complex and large-scale industrial heat exchange networks, there are many different kinds of heat exchangers, the flow is complex, so the heat exchange network presents a high degree of complexity, a node status change; its disturbance transfer will influence the stability of other nodes associated with it, because of the system coupling, thus affecting the controllability and reliability of the whole heat exchanger network. Process optimization design of heat exchange network is one of the main methods of energy saving in the industrial field. As a typical simulated evolutionary algorithm in swarm intelligence algorithm, ant colony algorithm combined with random walk classification algorithm, this article proposes an optimized heat transfer network based on multi-ant colony random walk classification algorithm. The heat exchanger was abstracted as a node, and the heat exchanger pipeline was abstracted as a side. According to the maximum geometric multiplicity of the eigenvalue of the adjacency matrix and the linear correlation row vector of the matrix, and combining the importance of the edge of the heat exchange network with the controllable range of the driving edge, the optimal control driving edge of the heat exchange network is identified. The results show that compared with the traditional heat exchanger, the size of the enhanced heat transfer equipment and the influence of pressure drop change. Compared with the results of the size of the heat exchanger strengthening heat transfer equipment and the stepwise optimization of the heat exchange network in this study, the cost of public engineering is reduced by 5.98% and the total cost is reduced by 8.83%.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"378 - 388"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42849563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign language identification and recognition: A comparative study 手语识别与识别的比较研究
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0240
Ahmed A. Sultan, Walied Makram, Mohammed Kayed, Abdelmaged Amin Ali
Abstract Sign Language (SL) is the main language for handicapped and disabled people. Each country has its own SL that is different from other countries. Each sign in a language is represented with variant hand gestures, body movements, and facial expressions. Researchers in this field aim to remove any obstacles that prevent the communication with deaf people by replacing all device-based techniques with vision-based techniques using Artificial Intelligence (AI) and Deep Learning. This article highlights two main SL processing tasks: Sign Language Recognition (SLR) and Sign Language Identification (SLID). The latter task is targeted to identify the signer language, while the former is aimed to translate the signer conversation into tokens (signs). The article addresses the most common datasets used in the literature for the two tasks (static and dynamic datasets that are collected from different corpora) with different contents including numerical, alphabets, words, and sentences from different SLs. It also discusses the devices required to build these datasets, as well as the different preprocessing steps applied before training and testing. The article compares the different approaches and techniques applied on these datasets. It discusses both the vision-based and the data-gloves-based approaches, aiming to analyze and focus on main methods used in vision-based approaches such as hybrid methods and deep learning algorithms. Furthermore, the article presents a graphical depiction and a tabular representation of various SLR approaches.
摘要手语是残疾人的主要语言。每个国家都有自己不同于其他国家的SL。语言中的每个符号都用不同的手势、肢体动作和面部表情来表示。该领域的研究人员旨在通过使用人工智能(AI)和深度学习,用基于视觉的技术取代所有基于设备的技术,消除阻碍与聋人交流的任何障碍。本文重点介绍了两个主要的SL处理任务:手语识别(SLR)和手语识别(SLID)。后一项任务旨在识别签名者的语言,而前一项任务则旨在将签名者的对话转换为令牌(符号)。这篇文章介绍了文献中用于这两项任务的最常见的数据集(从不同语料库中收集的静态和动态数据集),其内容不同,包括来自不同SL的数字、字母、单词和句子。它还讨论了构建这些数据集所需的设备,以及在训练和测试之前应用的不同预处理步骤。本文比较了应用于这些数据集的不同方法和技术。它讨论了基于视觉和基于数据手套的方法,旨在分析和关注基于视觉的方法中使用的主要方法,如混合方法和深度学习算法。此外,本文还提供了各种SLR方法的图形描述和表格表示。
{"title":"Sign language identification and recognition: A comparative study","authors":"Ahmed A. Sultan, Walied Makram, Mohammed Kayed, Abdelmaged Amin Ali","doi":"10.1515/comp-2022-0240","DOIUrl":"https://doi.org/10.1515/comp-2022-0240","url":null,"abstract":"Abstract Sign Language (SL) is the main language for handicapped and disabled people. Each country has its own SL that is different from other countries. Each sign in a language is represented with variant hand gestures, body movements, and facial expressions. Researchers in this field aim to remove any obstacles that prevent the communication with deaf people by replacing all device-based techniques with vision-based techniques using Artificial Intelligence (AI) and Deep Learning. This article highlights two main SL processing tasks: Sign Language Recognition (SLR) and Sign Language Identification (SLID). The latter task is targeted to identify the signer language, while the former is aimed to translate the signer conversation into tokens (signs). The article addresses the most common datasets used in the literature for the two tasks (static and dynamic datasets that are collected from different corpora) with different contents including numerical, alphabets, words, and sentences from different SLs. It also discusses the devices required to build these datasets, as well as the different preprocessing steps applied before training and testing. The article compares the different approaches and techniques applied on these datasets. It discusses both the vision-based and the data-gloves-based approaches, aiming to analyze and focus on main methods used in vision-based approaches such as hybrid methods and deep learning algorithms. Furthermore, the article presents a graphical depiction and a tabular representation of various SLR approaches.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"191 - 210"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44728764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1