首页 > 最新文献

Open Computer Science最新文献

英文 中文
Digital forensics analysis based on cybercrime and the study of the rule of law in space governance 基于网络犯罪的数字取证分析与空间治理法治研究
IF 1.5 Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2022-0266
Cheng Chen, Bin Dong
Abstract With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.
摘要随着社会信息化的快速发展,互联网已成为全球信息传播的重要渠道。无线网络空间和现实空间交织在一起,对国际社会的政治、经济和文化方面产生了重大影响。例如,它可以有效地解决城市、地区和国家之间的信息交换问题。无线网络犯罪和无线网络空间安全问题涉及各国信息技术的发展,更重要的是涉及国家安全的方方面面。在科技时代,网络犯罪的现状可以用以下数据来表示:网络犯罪率高。据相关统计,每年有近500万网民因使用互联网而卷入各种案件。本文从无线网络犯罪的数字取证和无线网络安全管理系统入手,讨论了当前无线网络安全系统的组成、特点、存在的问题以及未来的发展方向。通过比较中美两国的无线网络安全法律,使用潜在的狄利克雷分配(LDA)-吉布斯模型和k-means算法对数据进行分析,为未来无线网络空间治理的研究提供指导。将基于网络犯罪的数字取证分析与空间治理相结合,可以提高公共安全工作水平。当前,世界在网络空间方面取得了一些进展,但仍面临严峻挑战。面对新情况新举措,要加强立法,完善相关制度,强化监管能力。同时,有必要建立完善的技术手段和保障措施,以确保实现这一目标。
{"title":"Digital forensics analysis based on cybercrime and the study of the rule of law in space governance","authors":"Cheng Chen, Bin Dong","doi":"10.1515/comp-2022-0266","DOIUrl":"https://doi.org/10.1515/comp-2022-0266","url":null,"abstract":"Abstract With the rapid development of social informatization, the Internet has become an important channel for global information dissemination. The wireless network space and the real space are intertwined and have a significant impact on the political, economic, and cultural aspects of international society. For example, it can effectively solve the problem of information exchange between cities, regions, and countries. Wireless network crime and wireless network space security issues involve the development of information technology in various countries and, more importantly, involve all aspects of national security. In the age of science and technology, the current situation of cybercrime can be expressed by data as follows: the online crime rate is high. According to relevant statistics, nearly 5 million Internet users are involved in various cases every year due to the use of the Internet. This article starts with the digital forensics of wireless network crime and wireless network security management systems and discusses the composition, characteristics, existing problems, and future development directions of the current wireless network security management system. By comparing the wireless network security laws of China and the United States, using the latent Dirichlet allocation (LDA)-Gibbs model and the k-means algorithm to analyze the data, this article provides guidance for future research on wireless network space governance. The combination of digital forensics analysis based on cybercrime and space governance can improve the level of public security work. At present, the world has made some progress in cyberspace, but it still faces severe challenges. In the face of new situations and new measures, it is necessary to strengthen legislation, improve relevant systems, and strengthen supervision capacity. At the same time, it is necessary to establish perfect technical means and safeguards to ensure that this goal can be achieved.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44947025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain localization cloud computing big data application evaluation method 区块链本地化云计算大数据应用评估方法
Q2 Computer Science Pub Date : 2023-01-01 DOI: 10.1515/comp-2023-0281
Lin Xu
Abstract Blockchain technology is a widely used emerging technology. It can integrate cloud computing technology and big data to form a distributed cloud computing system, providing efficient services for local enterprises and governments. In addition, local cloud computing is also widely used, and there are many big data in these applications. Blockchain and local cloud computing technology offers safe and reliable information exchange for data exchange and provides a practical method for analyzing big data. This article aims to study how to analyze and research the application analysis method of big data based on blockchain technology and improve the classical apriori algorithm (CAA). This article compares and analyzes the performance of CAA and improved apriori algorithm (IAA) in big data applications. When the number of key words in the query are 20 and 100, the result search time of the CAA are 1.08 and 9.24 s, respectively, and the IAA are 0.76 and 7.58 s, respectively. The result search cost of the CAA is 12.43 and 91.55 kB, respectively, and the IAA is 5.05 and 63.72 kB, respectively. It is not difficult to see that applying the IAA to the blockchain-based government data-sharing scheme had relatively excellent performance and was worth further promotion and application.
区块链技术是一项应用广泛的新兴技术。它可以将云计算技术与大数据相结合,形成分布式云计算系统,为当地企业和政府提供高效的服务。此外,本地云计算也被广泛使用,在这些应用中有很多大数据。区块链和本地云计算技术为数据交换提供了安全可靠的信息交换,为大数据分析提供了实用的方法。本文旨在研究如何分析和研究基于区块链技术的大数据应用分析方法,改进经典apriori算法(CAA)。本文对比分析了CAA和改进apriori算法(IAA)在大数据应用中的性能。当查询的关键字个数为20和100时,CAA的结果搜索时间分别为1.08和9.24 s, IAA的结果搜索时间分别为0.76和7.58 s。CAA和IAA分别为12.43和91.55 kB和5.05和63.72 kB。不难看出,将IAA应用于基于区块链的政府数据共享方案,具有较为优异的表现,值得进一步推广应用。
{"title":"Blockchain localization cloud computing big data application evaluation method","authors":"Lin Xu","doi":"10.1515/comp-2023-0281","DOIUrl":"https://doi.org/10.1515/comp-2023-0281","url":null,"abstract":"Abstract Blockchain technology is a widely used emerging technology. It can integrate cloud computing technology and big data to form a distributed cloud computing system, providing efficient services for local enterprises and governments. In addition, local cloud computing is also widely used, and there are many big data in these applications. Blockchain and local cloud computing technology offers safe and reliable information exchange for data exchange and provides a practical method for analyzing big data. This article aims to study how to analyze and research the application analysis method of big data based on blockchain technology and improve the classical apriori algorithm (CAA). This article compares and analyzes the performance of CAA and improved apriori algorithm (IAA) in big data applications. When the number of key words in the query are 20 and 100, the result search time of the CAA are 1.08 and 9.24 s, respectively, and the IAA are 0.76 and 7.58 s, respectively. The result search cost of the CAA is 12.43 and 91.55 kB, respectively, and the IAA is 5.05 and 63.72 kB, respectively. It is not difficult to see that applying the IAA to the blockchain-based government data-sharing scheme had relatively excellent performance and was worth further promotion and application.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135952845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model 利用序列对序列模型和自适应SEIR模型预测和监测印度COVID-19的流行趋势
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0221
K. D. Gupta, R. Dwivedi, D. Sharma
Abstract In the year 2019, during the month of December, the first case of SARS-CoV-2 was reported in China. As per reports, the virus started spreading from a wet market in the Wuhan City. The person infected with the virus is diagnosed with cough and fever, and in some rare occasions, the person suffers from breathing inabilities. The highly contagious nature of this corona virus disease (COVID-19) caused the rapid outbreak of the disease around the world. India contracted the disease from China and reported its first case on January 30, 2020, in Kerala. Despite several counter measures taken by Government, India like other countries could not restrict the outbreak of the epidemic. However, it is believed that the strict policies adopted by the Indian Government have slowed the rate of the epidemic to a certain extent. This article proposes an adaptive SEIR disease model and a sequence-to-sequence (Seq2Seq) learning model to predict the future trend of COVID-19 outbreak in India and analyze the performance of these models. Optimization of hyper parameters using RMSProp is done to obtain an efficient model with lower convergence time. This article focuses on evaluating the performance of deep learning networks and epidemiological models in predicting a pandemic outbreak.
2019年12月,中国报告了首例SARS-CoV-2病例。据报道,该病毒是从武汉市的一个菜市场开始传播的。感染病毒的人被诊断为咳嗽和发烧,在某些罕见的情况下,患者会出现呼吸困难。这种冠状病毒病(COVID-19)的高度传染性导致该疾病在世界各地迅速爆发。印度从中国感染了这种疾病,并于2020年1月30日在喀拉拉邦报告了首例病例。尽管印度政府采取了若干反制措施,但与其他国家一样,印度无法限制这一流行病的爆发。然而,人们相信,印度政府采取的严格政策在一定程度上减缓了疫情的蔓延速度。本文提出了自适应SEIR疾病模型和序列到序列(Seq2Seq)学习模型,用于预测印度COVID-19疫情的未来趋势,并分析了这些模型的性能。利用RMSProp对超参数进行了优化,得到了收敛时间较短的高效模型。本文的重点是评估深度学习网络和流行病学模型在预测大流行爆发方面的性能。
{"title":"Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model","authors":"K. D. Gupta, R. Dwivedi, D. Sharma","doi":"10.1515/comp-2020-0221","DOIUrl":"https://doi.org/10.1515/comp-2020-0221","url":null,"abstract":"Abstract In the year 2019, during the month of December, the first case of SARS-CoV-2 was reported in China. As per reports, the virus started spreading from a wet market in the Wuhan City. The person infected with the virus is diagnosed with cough and fever, and in some rare occasions, the person suffers from breathing inabilities. The highly contagious nature of this corona virus disease (COVID-19) caused the rapid outbreak of the disease around the world. India contracted the disease from China and reported its first case on January 30, 2020, in Kerala. Despite several counter measures taken by Government, India like other countries could not restrict the outbreak of the epidemic. However, it is believed that the strict policies adopted by the Indian Government have slowed the rate of the epidemic to a certain extent. This article proposes an adaptive SEIR disease model and a sequence-to-sequence (Seq2Seq) learning model to predict the future trend of COVID-19 outbreak in India and analyze the performance of these models. Optimization of hyper parameters using RMSProp is done to obtain an efficient model with lower convergence time. This article focuses on evaluating the performance of deep learning networks and epidemiological models in predicting a pandemic outbreak.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43410520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework 从软件体系结构到分布式敏捷框架的需求管理(FFRM)灵活框架
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0239
Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun
Abstract GSD is a Global software development environment where data are distributed to more than two sites. These sites may be located on national or continental borders. Every year it expands its development volume, which has become a trend for the software development business. Because of increasing demand, it has become a common type of business. The value of offshore software development has increased immensely. According to the recent predictions, one-quarter of US software-related business shifts offshore, including integration and management-related services. GSD helps explore resources from other countries, increasing knowledge and enhancing operational efficiency. Therefore, globalization has changed the development nature of software. Different organizations face several challenges, such as coordination and requirement ambiguity, during the change management process in GSD. Traceability accommodates these changes in forward and backward direction. However, it gives rise to several challenges like less client involvement because of its distributed nature and challenging to manage the requirement ambiguity due to increased cost. Therefore, the Flexible Framework for Requirement Management (FFRM) must handle the abovementioned issues.
GSD是一个全球性的软件开发环境,其中数据分布到两个以上的站点。这些地点可能位于国家或大陆边界。它每年都在扩大其开发规模,这已成为软件开发业务的趋势。由于需求不断增加,它已成为一种常见的业务类型。离岸软件开发的价值已经大大增加了。根据最近的预测,四分之一的美国软件相关业务转移到海外,包括集成和管理相关服务。政府统计处协助发掘其他国家的资源,增加知识和提高运作效率。因此,全球化改变了软件的开发本质。在GSD的变更管理过程中,不同的组织面临着一些挑战,比如协调和需求模糊。可追溯性适应这些向前和向后方向的变化。然而,它带来了一些挑战,比如由于其分布式特性而导致客户参与度降低,以及由于成本增加而对需求模糊性进行管理带来的挑战。因此,灵活的需求管理框架(FFRM)必须处理上述问题。
{"title":"A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework","authors":"Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun","doi":"10.1515/comp-2022-0239","DOIUrl":"https://doi.org/10.1515/comp-2022-0239","url":null,"abstract":"Abstract GSD is a Global software development environment where data are distributed to more than two sites. These sites may be located on national or continental borders. Every year it expands its development volume, which has become a trend for the software development business. Because of increasing demand, it has become a common type of business. The value of offshore software development has increased immensely. According to the recent predictions, one-quarter of US software-related business shifts offshore, including integration and management-related services. GSD helps explore resources from other countries, increasing knowledge and enhancing operational efficiency. Therefore, globalization has changed the development nature of software. Different organizations face several challenges, such as coordination and requirement ambiguity, during the change management process in GSD. Traceability accommodates these changes in forward and backward direction. However, it gives rise to several challenges like less client involvement because of its distributed nature and challenging to manage the requirement ambiguity due to increased cost. Therefore, the Flexible Framework for Requirement Management (FFRM) must handle the abovementioned issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46897474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two hide-search games with rapid strategies for multiple parallel searches 两个具有快速策略的多重平行搜索的隐藏搜索游戏
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0243
P. Creasey
Abstract Making a rapid unpredictable decision from N N choices of unequal value is a common control task. When the cost of predictability can be modelled as a penalty hidden under a single option by an intelligent adversary, then an optimal strategy can be found efficiently in O ( N log N ) Oleft(Nlog N) steps using an approach described by Sakaguchi for a zero-sum hide-search game. In this work, we extend this to two games with multiple parallel predictions, either coordinated or drawn independently from the optimal distribution, both of which can be solved with the same scaling. An open-source code is provided online at https://github.com/pec27/rams.
摘要从N N个不等值的选择中快速做出不可预测的决策是一项常见的控制任务。当可预测性成本可以被智能对手建模为隐藏在单个选项下的惩罚时,则可以使用Sakaguchi描述的零和隐藏搜索游戏的方法,在O(N log N)Oleft(Nlog N)步骤中有效地找到最优策略。在这项工作中,我们将其扩展到具有多个平行预测的两个游戏,无论是协调的还是独立于最优分布绘制的,这两个游戏都可以用相同的比例求解。开源代码在线提供,网址为https://github.com/pec27/rams.
{"title":"Two hide-search games with rapid strategies for multiple parallel searches","authors":"P. Creasey","doi":"10.1515/comp-2022-0243","DOIUrl":"https://doi.org/10.1515/comp-2022-0243","url":null,"abstract":"Abstract Making a rapid unpredictable decision from N N choices of unequal value is a common control task. When the cost of predictability can be modelled as a penalty hidden under a single option by an intelligent adversary, then an optimal strategy can be found efficiently in O ( N log N ) Oleft(Nlog N) steps using an approach described by Sakaguchi for a zero-sum hide-search game. In this work, we extend this to two games with multiple parallel predictions, either coordinated or drawn independently from the optimal distribution, both of which can be solved with the same scaling. An open-source code is provided online at https://github.com/pec27/rams.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43648659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the structure of smart medical industry based on the background of the internet of things 基于物联网背景下的智慧医疗产业结构研究
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0247
Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou
Abstract In view of the current development trend of the smart medical industry in the context of the internet of things, this study conducts an evolutionary game analysis on information technology providers, medical institutions, digital medical equipment providers, and medical regulatory agencies in the smart medical industry. This study also analyzes the stable state of the future development of the smart medical industry and performs simulation calculations through MATLAB software. The research results show that the overall development trend of the smart medical industry structure in the future is consistent with the development trend of each industry structure. Under the strategic background of the supervision of medical regulatory agencies, information technology providers and digital medical equipment providers, respectively, provide the smart medical industry with the latest information technology and digital medical equipment to ensure the technical support of the smart medical industry. The smart medical industry provides corresponding medical talents and medical equipment to ensure the demand for talents and equipment of the smart medical industry, so that the structure of the smart medical industry can continuously improve the level of smart medical technology in the future development and ultimately promote the overall development of the smart medical industry.
摘要针对当前物联网背景下智能医疗行业的发展趋势,本研究对智能医疗行业中的信息技术提供商、医疗机构、数字医疗设备提供商和医疗监管机构进行了演化博弈分析。本研究还分析了智能医疗行业未来发展的稳定状态,并通过MATLAB软件进行了仿真计算。研究结果表明,未来智慧医疗产业结构的整体发展趋势与各产业结构的发展趋势是一致的。在医疗监管机构监管的战略背景下,信息技术提供商和数字医疗设备提供商分别为智慧医疗行业提供最新的信息技术和数字医疗设备,确保智慧医疗行业的技术支撑。智慧医疗行业提供相应的医疗人才和医疗设备,保证智慧医疗行业对人才和设备的需求,使智慧医疗行业的结构在未来的发展中不断提升智慧医疗技术水平,最终推动智慧医疗行业的整体发展。
{"title":"Research on the structure of smart medical industry based on the background of the internet of things","authors":"Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou","doi":"10.1515/comp-2022-0247","DOIUrl":"https://doi.org/10.1515/comp-2022-0247","url":null,"abstract":"Abstract In view of the current development trend of the smart medical industry in the context of the internet of things, this study conducts an evolutionary game analysis on information technology providers, medical institutions, digital medical equipment providers, and medical regulatory agencies in the smart medical industry. This study also analyzes the stable state of the future development of the smart medical industry and performs simulation calculations through MATLAB software. The research results show that the overall development trend of the smart medical industry structure in the future is consistent with the development trend of each industry structure. Under the strategic background of the supervision of medical regulatory agencies, information technology providers and digital medical equipment providers, respectively, provide the smart medical industry with the latest information technology and digital medical equipment to ensure the technical support of the smart medical industry. The smart medical industry provides corresponding medical talents and medical equipment to ensure the demand for talents and equipment of the smart medical industry, so that the structure of the smart medical industry can continuously improve the level of smart medical technology in the future development and ultimately promote the overall development of the smart medical industry.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45569149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy protection methods of location services in big data 大数据环境下定位服务的隐私保护方法
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0250
Wenfeng Liu, Juanjuan Wu, Zhong Xi
Abstract The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.
移动通信技术的飞速发展在给我们的生活带来便利和乐趣的同时,也带来了隐私泄露等一系列问题。因此,研究基于位置服务的隐私保护方法来加强位置隐私的安全性是非常必要的。本工作的目的是通过研究位置服务的特点和隐私保护方法,提高位置隐私的安全性,防止用户隐私的泄露。本文首先阐述了重要场所隐私保护法的特点,然后研究了重要场所隐私保护法的结构特点和运作过程。本工作评估了不同方法的优缺点,最后通过实验分析比较了几种隐私保护算法的性能。通过对隐藏空间方法、基于用户网格的两级缓存方法、差分隐私保护方法的研究,并对算法进行实验分析,得到了一种有效的隐私保护算法。它可以更好地保护用户的位置隐私。例如,隐藏空间中的双主动算法具有最佳的隐私保护性能。与其他算法相比,生成隐藏空间的成功率提高了10%以上,生成隐藏空间的时间缩短了约四分之一。该算法对用户隐私保护具有一定的实用价值和意义。
{"title":"Privacy protection methods of location services in big data","authors":"Wenfeng Liu, Juanjuan Wu, Zhong Xi","doi":"10.1515/comp-2022-0250","DOIUrl":"https://doi.org/10.1515/comp-2022-0250","url":null,"abstract":"Abstract The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48821902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIKM – a smart cryptographic key management framework 一个智能加密密钥管理框架
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0167
Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar
Abstract For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.
摘要为了保证数据传输的安全性,对称加密技术中数据的加密和解密都使用相同的密钥。创建、分发、存储、部署和最终撤销对称密钥的过程称为密钥管理。设计了许多密钥管理方案,每个方案都适用于特定的应用范围。然而,这些方案有一些共同的缺点,如密钥生成和分发的难度、密钥存储、攻击和流量负载。本文提出了一种抗攻击的密钥管理框架,并对目前常用的密钥管理工作流程进行了改造,提高了安全性,减少了弱点。该框架的主要特点是消除密钥存储、智能抗攻击特性、将多次密钥分发减少到仅一次解释器分发,以及具有短密钥间隔(每分钟、每小时和每天)。而且,密钥撤销过程是自动发生的,不需要撤销调用。
{"title":"SIKM – a smart cryptographic key management framework","authors":"Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar","doi":"10.1515/comp-2020-0167","DOIUrl":"https://doi.org/10.1515/comp-2020-0167","url":null,"abstract":"Abstract For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43788922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new watermarking scheme for digital videos using DCT 一种新的基于DCT的数字视频水印方案
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0238
A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa
Abstract With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.
摘要随着高速宽带互联网接入的出现,强烈建议有必要保护数字视频。本研究的主要目的是提出一种基于离散余弦变换(DCT)的频域水印数字视频自适应算法。水印签名图像被嵌入到视频的整个帧中。RGB帧的绿色通道被选择用于使用DCT算法的嵌入过程,因为它显示了带水印帧的推荐质量。实验结果表明,通过测试不同视频的不同强度值∆,该算法显示了水印视频的鲁棒性和高质量。它可以抵抗不同类型的攻击。
{"title":"A new watermarking scheme for digital videos using DCT","authors":"A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa","doi":"10.1515/comp-2022-0238","DOIUrl":"https://doi.org/10.1515/comp-2022-0238","url":null,"abstract":"Abstract With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48068680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An effective integrated machine learning approach for detecting diabetic retinopathy 一种检测糖尿病视网膜病变的有效集成机器学习方法
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0222
Penikalapati Pragathi, Agastyaraju Nagaraja Rao
Abstract Millions of people across the world are suffering from diabetic retinopathy. This disease majorly affects the retina of the eye, and if not identified priorly causes permanent blindness. Hence, detecting diabetic retinopathy at an early stage is very important to safeguard people from blindness. Several machine learning (ML) algorithms are implemented on the dataset of diabetic retinopathy available in the UCI ML repository to detect the symptoms of diabetic retinopathy. But, most of those algorithms are implemented individually. Hence, this article proposes an effective integrated ML approach that uses the support vector machine (SVM), principal component analysis (PCA), and moth-flame optimization techniques. Initially, the ML algorithms decision tree (DT), SVM, random forest (RF), and Naïve Bayes (NB) are applied to the diabetic retinopathy dataset. Among these, the SVM algorithm is outperformed with an average of 76.96% performance. Later, all the aforementioned ML algorithms are implemented by integrating the PCA technique to reduce the dimensions of the dataset. After integrating PCA, it is noticed that the performance of the algorithms NB, RF, and SVM is reduced dramatically; on the contrary, the performance of DT is increased. To improve the performance of ML algorithms, the moth-flame optimization technique is integrated with SVM and PCA. This proposed approach is outperformed with an average of 85.61% performance among all the other considered ML algorithms, and the classification of class labels is achieved correctly.
全世界有数百万人患有糖尿病视网膜病变。这种疾病主要影响眼睛的视网膜,如果没有事先发现,会导致永久性失明。因此,早期发现糖尿病视网膜病变对于保护人们免于失明是非常重要的。在UCI机器学习存储库中的糖尿病视网膜病变数据集上实现了几种机器学习(ML)算法,以检测糖尿病视网膜病变的症状。但是,大多数算法都是单独实现的。因此,本文提出了一种有效的集成ML方法,该方法使用支持向量机(SVM)、主成分分析(PCA)和蛾焰优化技术。首先,将ML算法决策树(DT)、支持向量机(SVM)、随机森林(RF)和Naïve贝叶斯(NB)应用于糖尿病视网膜病变数据集。其中,SVM算法以76.96%的平均性能优于SVM算法。然后,通过集成PCA技术来实现上述所有ML算法,以降低数据集的维数。在对PCA进行整合后,发现NB、RF和SVM算法的性能显著降低;相反,DT的性能有所提高。为了提高机器学习算法的性能,将蛾焰优化技术与支持向量机和主成分分析相结合。在所有考虑的ML算法中,该方法的平均性能为85.61%,并且正确地实现了类标签的分类。
{"title":"An effective integrated machine learning approach for detecting diabetic retinopathy","authors":"Penikalapati Pragathi, Agastyaraju Nagaraja Rao","doi":"10.1515/comp-2020-0222","DOIUrl":"https://doi.org/10.1515/comp-2020-0222","url":null,"abstract":"Abstract Millions of people across the world are suffering from diabetic retinopathy. This disease majorly affects the retina of the eye, and if not identified priorly causes permanent blindness. Hence, detecting diabetic retinopathy at an early stage is very important to safeguard people from blindness. Several machine learning (ML) algorithms are implemented on the dataset of diabetic retinopathy available in the UCI ML repository to detect the symptoms of diabetic retinopathy. But, most of those algorithms are implemented individually. Hence, this article proposes an effective integrated ML approach that uses the support vector machine (SVM), principal component analysis (PCA), and moth-flame optimization techniques. Initially, the ML algorithms decision tree (DT), SVM, random forest (RF), and Naïve Bayes (NB) are applied to the diabetic retinopathy dataset. Among these, the SVM algorithm is outperformed with an average of 76.96% performance. Later, all the aforementioned ML algorithms are implemented by integrating the PCA technique to reduce the dimensions of the dataset. After integrating PCA, it is noticed that the performance of the algorithms NB, RF, and SVM is reduced dramatically; on the contrary, the performance of DT is increased. To improve the performance of ML algorithms, the moth-flame optimization technique is integrated with SVM and PCA. This proposed approach is outperformed with an average of 85.61% performance among all the other considered ML algorithms, and the classification of class labels is achieved correctly.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43846044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1