首页 > 最新文献

Open Computer Science最新文献

英文 中文
Post-quantum cryptography-driven security framework for cloud computing 后量子密码学驱动的云计算安全框架
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0235
H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese
Abstract Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails. With encryption being the dominant method of cloud data security, the advent of quantum computing implies an urgent need to proffer a model that will provide adequate data security for both classical and quantum computing. Thus, most cryptosystems will be rendered susceptible and obsolete, though some cryptosystems will stand the test of quantum computing. The article proposes a model that comprises the application of a variant of McEliece cryptosystem, which has been tipped to replace Rivest–Shamir–Adleman (RSA) in the quantum computing era to secure access control data and the application of a variant of N-th degree truncated polynomial ring units (NTRU) cryptosystem to secure cloud user data. The simulation of the proposed McEliece algorithm showed that the algorithm has a better time complexity than the existing McEliece cryptosystem. Furthermore, the novel tweaking of parameters S and P further improves the security of the proposed algorithms. More so, the simulation of the proposed NTRU algorithm revealed that the existing NTRU cryptosystem had a superior time complexity when juxtaposed with the proposed NTRU cryptosystem.
摘要自云计算诞生和采用以来,云中的数据安全一直是一个主要问题。已经提出了各种框架,但数据泄露盛行。加密是云数据安全的主要方法,量子计算的出现意味着迫切需要提供一种模型,为经典计算和量子计算提供足够的数据安全。因此,大多数密码系统将变得易受影响和过时,尽管一些密码系统将经得起量子计算的考验。这篇文章提出了一个模型,其中包括McEliece密码系统的变体的应用,该变体已被认为将取代量子计算时代的Rivest–Shamir–Adleman(RSA)来保护访问控制数据,以及N次截断多项式环单元(NTRU)密码系统的变种来保护云用户数据。对所提出的McEliece算法的仿真表明,该算法比现有的McEliess密码系统具有更好的时间复杂度。此外,对参数S和P的新颖调整进一步提高了所提出算法的安全性。更重要的是,对所提出的NTRU算法的仿真表明,现有的NTRU密码系统与所提出的NT RU密码系统并列时具有优越的时间复杂性。
{"title":"Post-quantum cryptography-driven security framework for cloud computing","authors":"H. C. Ukwuoma, A. J. Gabriel, A. Thompson, B. Alese","doi":"10.1515/comp-2022-0235","DOIUrl":"https://doi.org/10.1515/comp-2022-0235","url":null,"abstract":"Abstract Data security in the cloud has been a major issue since the inception and adoption of cloud computing. Various frameworks have been proposed, and yet data breach prevails. With encryption being the dominant method of cloud data security, the advent of quantum computing implies an urgent need to proffer a model that will provide adequate data security for both classical and quantum computing. Thus, most cryptosystems will be rendered susceptible and obsolete, though some cryptosystems will stand the test of quantum computing. The article proposes a model that comprises the application of a variant of McEliece cryptosystem, which has been tipped to replace Rivest–Shamir–Adleman (RSA) in the quantum computing era to secure access control data and the application of a variant of N-th degree truncated polynomial ring units (NTRU) cryptosystem to secure cloud user data. The simulation of the proposed McEliece algorithm showed that the algorithm has a better time complexity than the existing McEliece cryptosystem. Furthermore, the novel tweaking of parameters S and P further improves the security of the proposed algorithms. More so, the simulation of the proposed NTRU algorithm revealed that the existing NTRU cryptosystem had a superior time complexity when juxtaposed with the proposed NTRU cryptosystem.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49345890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Big data network security defense mode of deep learning algorithm 大数据网络安全防御模式的深度学习算法
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0257
Ying Yu
Abstract With the rapid development and progress of big data technology, people can already use big data to judge the transmission and distribution of network information and make better decisions in time, but it also faces major network threats such as Trojan horses and viruses. Traditional network security functions generally wait until the network power is turned on to a certain extent before starting, and it is difficult to ensure the security of big data networks. To protect the network security of big data and improve its ability to defend against attacks, this article introduces the deep learning algorithm into the research of big data network security defense mode. The test results show that the introduction of deep learning algorithms into the research of network security model can enhance the security defense capability of the network by 5.12%, proactively detect, and kill cyber attacks that can pose threats. At the same time, the security defense mode will evaluate the network security of big data and analyze potential network security risks in detail, which will prevent risks before they occur and effectively protect the network security in the context of big data.
随着大数据技术的快速发展和进步,人们已经可以利用大数据来判断网络信息的传播和分布,及时做出更好的决策,但也面临着特洛伊木马、病毒等重大网络威胁。传统的网络安全功能一般要等到网络电源开启到一定程度后才能启动,难以保证大数据网络的安全性。为了保护大数据的网络安全,提高其防御攻击的能力,本文将深度学习算法引入到大数据网络安全防御模式的研究中。测试结果表明,将深度学习算法引入网络安全模型的研究中,可以使网络的安全防御能力提升5.12%,主动发现并消灭可能构成威胁的网络攻击。同时,安全防御模式将对大数据的网络安全进行评估,详细分析潜在的网络安全风险,防患于未然,有效保护大数据背景下的网络安全。
{"title":"Big data network security defense mode of deep learning algorithm","authors":"Ying Yu","doi":"10.1515/comp-2022-0257","DOIUrl":"https://doi.org/10.1515/comp-2022-0257","url":null,"abstract":"Abstract With the rapid development and progress of big data technology, people can already use big data to judge the transmission and distribution of network information and make better decisions in time, but it also faces major network threats such as Trojan horses and viruses. Traditional network security functions generally wait until the network power is turned on to a certain extent before starting, and it is difficult to ensure the security of big data networks. To protect the network security of big data and improve its ability to defend against attacks, this article introduces the deep learning algorithm into the research of big data network security defense mode. The test results show that the introduction of deep learning algorithms into the research of network security model can enhance the security defense capability of the network by 5.12%, proactively detect, and kill cyber attacks that can pose threats. At the same time, the security defense mode will evaluate the network security of big data and analyze potential network security risks in detail, which will prevent risks before they occur and effectively protect the network security in the context of big data.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48869891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on the virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting 基于多维加权的电子商务物流智能仓储虚拟仿真实验评价模型研究
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0249
Ganglong Fan, Bo Fan, Hongsheng Xu, Chuqiao Wang
Abstract Through the analysis of the current research situation at home and abroad, this article finds that there is a lack of evaluation standards and methods in the virtual simulation experiment of e-commerce logistics smart warehousing. Therefore, it seriously affects the standardization and rationality of the experiment. To solve the problems in the evaluation of the current virtual simulation experiment, this article proposes a virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting. This article firstly sorts out the basic process of e-commerce logistics smart warehousing experiment activities and establishes the evaluation object. Then, based on the duality degree of the output results of the experimental steps, it proposes a method that conforms to the corresponding operation steps. Thus, a three-dimensional evaluation model of the completion degree of the operation steps, the reasonable degree of the operation steps, and the completion time of the operation steps are constructed. An automatic scoring evaluation model is proposed based on the combination of three-dimensional weighted evaluation of experimental steps. Finally, the feasibility and convenience of the evaluation model are verified through the experiment analysis.
摘要通过对国内外研究现状的分析,发现电子商务物流智能仓储虚拟仿真实验缺乏评价标准和方法。因此,它严重影响了实验的规范性和合理性。针对目前虚拟仿真实验评价中存在的问题,本文提出了一种基于多维加权的电子商务物流智能仓储虚拟仿真实验评估模型。本文首先梳理了电子商务物流智能仓储实验活动的基本过程,并建立了评价对象。然后,基于实验步骤输出结果的对偶度,提出了一种符合相应操作步骤的方法。因此,构建了操作步骤的完成程度、操作步骤的合理程度和操作步骤的结束时间的三维评估模型。提出了一种基于实验步骤三维加权评价相结合的自动评分评价模型。最后,通过实验分析验证了评价模型的可行性和方便性。
{"title":"Research on the virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting","authors":"Ganglong Fan, Bo Fan, Hongsheng Xu, Chuqiao Wang","doi":"10.1515/comp-2022-0249","DOIUrl":"https://doi.org/10.1515/comp-2022-0249","url":null,"abstract":"Abstract Through the analysis of the current research situation at home and abroad, this article finds that there is a lack of evaluation standards and methods in the virtual simulation experiment of e-commerce logistics smart warehousing. Therefore, it seriously affects the standardization and rationality of the experiment. To solve the problems in the evaluation of the current virtual simulation experiment, this article proposes a virtual simulation experiment evaluation model of e-commerce logistics smart warehousing based on multidimensional weighting. This article firstly sorts out the basic process of e-commerce logistics smart warehousing experiment activities and establishes the evaluation object. Then, based on the duality degree of the output results of the experimental steps, it proposes a method that conforms to the corresponding operation steps. Thus, a three-dimensional evaluation model of the completion degree of the operation steps, the reasonable degree of the operation steps, and the completion time of the operation steps are constructed. An automatic scoring evaluation model is proposed based on the combination of three-dimensional weighted evaluation of experimental steps. Finally, the feasibility and convenience of the evaluation model are verified through the experiment analysis.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43001277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rough set-based entropy measure with weighted density outlier detection method 基于粗糙集的熵测度与加权密度离群点检测方法
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0228
T. Sangeetha, Geetha Mary Amalanathan
Abstract The rough set theory is a powerful numerical model used to handle the impreciseness and ambiguity of data. Many existing multigranulation rough set models were derived from the multigranulation decision-theoretic rough set framework. The multigranulation rough set theory is very desirable in many practical applications such as high-dimensional knowledge discovery, distributional information systems, and multisource data processing. So far research works were carried out only for multigranulation rough sets in extraction, selection of features, reduction of data, decision rules, and pattern extraction. The proposed approach mainly focuses on anomaly detection in qualitative data with multiple granules. The approximations of the dataset will be derived through multiequivalence relation, and then, the rough set-based entropy measure with weighted density method is applied on every object and attribute. For detecting outliers, threshold value fixation is performed based on the estimated weight. The performance of the algorithm is evaluated and compared with existing outlier detection algorithms. Datasets such as breast cancer, chess, and car evaluation have been taken from the UCI repository to prove its efficiency and performance.
粗糙集理论是一种强大的数值模型,用于处理数据的不精确性和模糊性。现有的许多多粒粗糙集模型都是从多粒决策理论粗糙集框架中衍生出来的。多粒度粗糙集理论在高维知识发现、分布式信息系统、多源数据处理等实际应用中有着广泛的应用前景。目前的研究工作主要集中在多粒粗糙集的提取、特征选择、数据约简、决策规则和模式提取等方面。该方法主要关注多颗粒定性数据的异常检测。通过多等价关系得到数据集的近似,然后利用加权密度法对每个对象和属性进行基于粗糙集的熵测度。为了检测异常值,根据估计的权重进行阈值固定。对该算法的性能进行了评价,并与现有的离群点检测算法进行了比较。从UCI存储库中提取了乳腺癌、国际象棋和汽车评估等数据集,以证明其效率和性能。
{"title":"Rough set-based entropy measure with weighted density outlier detection method","authors":"T. Sangeetha, Geetha Mary Amalanathan","doi":"10.1515/comp-2020-0228","DOIUrl":"https://doi.org/10.1515/comp-2020-0228","url":null,"abstract":"Abstract The rough set theory is a powerful numerical model used to handle the impreciseness and ambiguity of data. Many existing multigranulation rough set models were derived from the multigranulation decision-theoretic rough set framework. The multigranulation rough set theory is very desirable in many practical applications such as high-dimensional knowledge discovery, distributional information systems, and multisource data processing. So far research works were carried out only for multigranulation rough sets in extraction, selection of features, reduction of data, decision rules, and pattern extraction. The proposed approach mainly focuses on anomaly detection in qualitative data with multiple granules. The approximations of the dataset will be derived through multiequivalence relation, and then, the rough set-based entropy measure with weighted density method is applied on every object and attribute. For detecting outliers, threshold value fixation is performed based on the estimated weight. The performance of the algorithm is evaluated and compared with existing outlier detection algorithms. Datasets such as breast cancer, chess, and car evaluation have been taken from the UCI repository to prove its efficiency and performance.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48375646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A method for detecting objects in dense scenes 一种在密集场景中检测物体的方法
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0231
Chuanyun Xu, Yueping Zheng, Yang Zhang, Gang Li, Ying Wang
Abstract Recent object detectors have achieved excellent performance in accuracy and speed. Even with such impressive results, the most advanced detectors are challenging in dense scenes. In this article, we analyze and find the reasons for the decrease in detection accuracy in dense scenes. We started our work in terms of region proposal and location loss. We found that low-quality proposal regions during the training process are the main factors affecting detection accuracy. To prove our research, we established and trained a dense detection model based on Cascade R-CNN. The model achieves an accuracy of mAP 0.413 on the SKU-110K sub-dataset. Our results show that improving the quality of recommended regions can effectively improve the detection accuracy in dense scenes.
摘要近年来,物体探测器在精度和速度方面都取得了优异的性能。即使有如此令人印象深刻的结果,最先进的探测器在密集的场景中也是具有挑战性的。在这篇文章中,我们分析并找出了在密集场景中检测精度下降的原因。我们从区域建议和位置损失开始了我们的工作。我们发现,训练过程中的低质量建议区域是影响检测准确性的主要因素。为了证明我们的研究,我们建立并训练了一个基于级联R-CNN的密集检测模型。该模型在SKU-110K子数据集上实现了mAP 0.413的精度。我们的结果表明,提高推荐区域的质量可以有效地提高密集场景中的检测精度。
{"title":"A method for detecting objects in dense scenes","authors":"Chuanyun Xu, Yueping Zheng, Yang Zhang, Gang Li, Ying Wang","doi":"10.1515/comp-2022-0231","DOIUrl":"https://doi.org/10.1515/comp-2022-0231","url":null,"abstract":"Abstract Recent object detectors have achieved excellent performance in accuracy and speed. Even with such impressive results, the most advanced detectors are challenging in dense scenes. In this article, we analyze and find the reasons for the decrease in detection accuracy in dense scenes. We started our work in terms of region proposal and location loss. We found that low-quality proposal regions during the training process are the main factors affecting detection accuracy. To prove our research, we established and trained a dense detection model based on Cascade R-CNN. The model achieves an accuracy of mAP 0.413 on the SKU-110K sub-dataset. Our results show that improving the quality of recommended regions can effectively improve the detection accuracy in dense scenes.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44086066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Mass data processing and multidimensional database management based on deep learning 基于深度学习的海量数据处理和多维数据库管理
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0251
Haijie Shen, Y. Li, Xinzhi Tian, Xiaofan Chen, Caihong Li, Qian Bian, Zhenduo Wang, Weihua Wang
Abstract With the rapid development of the Internet of Things, the requirements for massive data processing technology are getting higher and higher. Traditional computer data processing capabilities can no longer deliver fast, simple, and efficient data analysis and processing for today’s massive data processing due to the real-time, massive, polymorphic, and heterogeneous characteristics of Internet of Things data. Mass heterogeneous data of different types of subsystems in the Internet of Things need to be processed and stored uniformly, so the mass data processing method is required to be able to integrate multiple different networks, multiple data sources, and heterogeneous mass data and be able to perform processing on these data. Therefore, this article proposes massive data processing and multidimensional database management based on deep learning to meet the needs of contemporary society for massive data processing. This article has deeply studied the basic technical methods of massive data processing, including MapReduce technology, parallel data technology, database technology based on distributed memory databases, and distributed real-time database technology based on cloud computing technology, and constructed a massive data fusion algorithm based on deep learning. The model and the multidimensional online analytical processing model of the multidimensional database based on deep learning analyze the performance, scalability, load balancing, data query, and other aspects of the multidimensional database based on deep learning. It is concluded that the accuracy of multidimensional database query data is as high as 100%, and the accuracy of the average data query time is only 0.0053 s, which is much lower than the general database query time.
随着物联网的快速发展,对海量数据处理技术的要求越来越高。由于物联网数据的实时性、海量性、多态性、异构性等特点,传统的计算机数据处理能力已经无法为海量数据处理的今天提供快速、简单、高效的数据分析和处理。物联网中不同类型子系统的海量异构数据需要统一处理和存储,因此海量数据处理方法要求能够集成多个不同的网络、多个数据源、异构海量数据,并能够对这些数据进行处理。因此,本文提出基于深度学习的海量数据处理和多维数据库管理,以满足当代社会对海量数据处理的需求。本文深入研究了海量数据处理的基本技术方法,包括MapReduce技术、并行数据技术、基于分布式内存数据库的数据库技术、基于云计算技术的分布式实时数据库技术,构建了基于深度学习的海量数据融合算法。该模型和基于深度学习的多维数据库多维在线分析处理模型对基于深度学习的多维数据库的性能、可扩展性、负载均衡、数据查询等方面进行了分析。结果表明,多维数据库查询数据的准确率高达100%,平均数据查询时间的准确率仅为0.0053 s,远低于一般数据库查询时间。
{"title":"Mass data processing and multidimensional database management based on deep learning","authors":"Haijie Shen, Y. Li, Xinzhi Tian, Xiaofan Chen, Caihong Li, Qian Bian, Zhenduo Wang, Weihua Wang","doi":"10.1515/comp-2022-0251","DOIUrl":"https://doi.org/10.1515/comp-2022-0251","url":null,"abstract":"Abstract With the rapid development of the Internet of Things, the requirements for massive data processing technology are getting higher and higher. Traditional computer data processing capabilities can no longer deliver fast, simple, and efficient data analysis and processing for today’s massive data processing due to the real-time, massive, polymorphic, and heterogeneous characteristics of Internet of Things data. Mass heterogeneous data of different types of subsystems in the Internet of Things need to be processed and stored uniformly, so the mass data processing method is required to be able to integrate multiple different networks, multiple data sources, and heterogeneous mass data and be able to perform processing on these data. Therefore, this article proposes massive data processing and multidimensional database management based on deep learning to meet the needs of contemporary society for massive data processing. This article has deeply studied the basic technical methods of massive data processing, including MapReduce technology, parallel data technology, database technology based on distributed memory databases, and distributed real-time database technology based on cloud computing technology, and constructed a massive data fusion algorithm based on deep learning. The model and the multidimensional online analytical processing model of the multidimensional database based on deep learning analyze the performance, scalability, load balancing, data query, and other aspects of the multidimensional database based on deep learning. It is concluded that the accuracy of multidimensional database query data is as high as 100%, and the accuracy of the average data query time is only 0.0053 s, which is much lower than the general database query time.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42526067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An ROI-based robust video steganography technique using SVD in wavelet domain 基于ROI的小波域SVD鲁棒视频隐写技术
IF 1.5 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0229
Urmila Pilania, Rohit Tanwar, Prinima Gupta
Abstract Steganography is a technique that embeds secret information in a suitable cover file such as text, image, audio, and video in such a manner that secret information remains invisible to the outside world. The study of the literature relevant to video steganography reveals that a tradeoff exists in attaining the acceptable values of various evaluation parameters such as a higher capacity usually results in lesser robustness or imperceptibility. In this article, we propose a technique that achieves high capacity along with required robustness. The embedding capacity is increased using singular value decomposition compression. To achieve the desired robustness, we constrain the embedding of the secret message in the region of interest in the cover video file. In this manner, we also succeed in maintaining the required imperceptibility. We prefer Haar-based lifting scheme in the wavelet domain for embedding the information because of its intrinsic benefits. We have implemented our suggested technique using MATLAB. The analysis of results on the prespecified parameters of the steganography justifies the effectiveness of the proposed technique.
摘要隐写术是一种将秘密信息嵌入适当的封面文件(如文本、图像、音频和视频)中的技术,其方式是使秘密信息对外界不可见。对与视频隐写术相关的文献的研究表明,在获得各种评估参数的可接受值(如更高的容量)时存在折衷,通常会导致较差的鲁棒性或不可察觉性。在本文中,我们提出了一种实现高容量和所需鲁棒性的技术。使用奇异值分解压缩来增加嵌入容量。为了实现所需的鲁棒性,我们将秘密消息的嵌入限制在封面视频文件的感兴趣区域中。通过这种方式,我们也成功地保持了必要的不可察觉性。我们更喜欢小波域中基于Haar的提升方案来嵌入信息,因为它具有固有的优点。我们已经使用MATLAB实现了我们建议的技术。对隐写术预定参数的结果分析证明了所提出技术的有效性。
{"title":"An ROI-based robust video steganography technique using SVD in wavelet domain","authors":"Urmila Pilania, Rohit Tanwar, Prinima Gupta","doi":"10.1515/comp-2020-0229","DOIUrl":"https://doi.org/10.1515/comp-2020-0229","url":null,"abstract":"Abstract Steganography is a technique that embeds secret information in a suitable cover file such as text, image, audio, and video in such a manner that secret information remains invisible to the outside world. The study of the literature relevant to video steganography reveals that a tradeoff exists in attaining the acceptable values of various evaluation parameters such as a higher capacity usually results in lesser robustness or imperceptibility. In this article, we propose a technique that achieves high capacity along with required robustness. The embedding capacity is increased using singular value decomposition compression. To achieve the desired robustness, we constrain the embedding of the secret message in the region of interest in the cover video file. In this manner, we also succeed in maintaining the required imperceptibility. We prefer Haar-based lifting scheme in the wavelet domain for embedding the information because of its intrinsic benefits. We have implemented our suggested technique using MATLAB. The analysis of results on the prespecified parameters of the steganography justifies the effectiveness of the proposed technique.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43224766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Modelling the interdependent relationships among epidemic antecedents using fuzzy multiple attribute decision making (F-MADM) approaches 使用模糊多属性决策方法(F-MADM)建模流行病前因之间的相互依赖关系
IF 1.5 Q2 Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0213
Dharyll Prince M. Abellana
Abstract With the high incidence of the dengue epidemic in developing countries, it is crucial to understand its dynamics from a holistic perspective. This paper analyzes different types of antecedents from a cybernetics perspective using a structural modelling approach. The novelty of this paper is twofold. First, it analyzes antecedents that may be social, institutional, environmental, or economic in nature. Since this type of study has not been done in the context of the dengue epidemic modelling, this paper offers a fresh perspective on this topic. Second, the paper pioneers the use of fuzzy multiple attribute decision making (F-MADM) approaches for the modelling of epidemic antecedents. As such, the paper has provided an avenue for the cross-fertilization of knowledge between scholars working in soft computing and epidemiological modelling domains.
摘要鉴于登革热疫情在发展中国家高发,从整体角度了解其动态至关重要。本文采用结构建模方法,从控制论的角度分析了不同类型的前因。这篇论文的新颖性是双重的。首先,它分析了可能是社会、制度、环境或经济性质的前因。由于这类研究尚未在登革热疫情建模的背景下进行,本文为这一主题提供了一个新的视角。其次,本文率先使用模糊多属性决策(F-MADM)方法对流行病前因进行建模。因此,该论文为软计算和流行病学建模领域的学者之间的知识交叉交流提供了一条途径。
{"title":"Modelling the interdependent relationships among epidemic antecedents using fuzzy multiple attribute decision making (F-MADM) approaches","authors":"Dharyll Prince M. Abellana","doi":"10.1515/comp-2020-0213","DOIUrl":"https://doi.org/10.1515/comp-2020-0213","url":null,"abstract":"Abstract With the high incidence of the dengue epidemic in developing countries, it is crucial to understand its dynamics from a holistic perspective. This paper analyzes different types of antecedents from a cybernetics perspective using a structural modelling approach. The novelty of this paper is twofold. First, it analyzes antecedents that may be social, institutional, environmental, or economic in nature. Since this type of study has not been done in the context of the dengue epidemic modelling, this paper offers a fresh perspective on this topic. Second, the paper pioneers the use of fuzzy multiple attribute decision making (F-MADM) approaches for the modelling of epidemic antecedents. As such, the paper has provided an avenue for the cross-fertilization of knowledge between scholars working in soft computing and epidemiological modelling domains.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0213","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49526661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Evaluation of the Benefits of Implementing a Smart Pedestrian Network System 实施智能行人网络系统的效益评估
IF 1.5 Q2 Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0127
George Papageorgiou, A. Ioannou, Athanasios Maimaris, Alexander N. Ness
Abstract Information and Communication Technology (ICT), and recent advancements in Computer Science can serve as a catalyst for promoting sustainable means of transport. Through ICT applications, active mobility can be promoted and established as a viable transport mode. This can be achieved by providing relevant information for fostering social capital and promoting physical activity, thus contributing to a higher quality of life. Further, active mobility can greatly contribute to reducing air pollution and improving health status. For this purpose, the implementation of a Smart Pedestrian Network (SPN) information system is proposed. Such an implementation requires the collaboration of various stakeholders including the public, local authorities and local businesses. To convince stake-holders of the viability of implementing SPN, the benefits of active mobility should be clear. This paper proposes a framework to quantify active mobility benefits so that stake-holders can assess the investment that can be realized from implementing SPN. The proposed framework makes use of quantifying benefits in various market conditions. The benefits are shown to be significant and very much in favor of investing in technology and implementing the envisioned SPN system.
信息和通信技术(ICT)以及计算机科学的最新进展可以作为促进可持续交通方式的催化剂。通过信息通信技术的应用,可以促进主动出行,并将其确立为一种可行的交通方式。这可以通过提供有关信息来促进社会资本和促进身体活动,从而有助于提高生活质量来实现。此外,积极的流动性可以大大有助于减少空气污染和改善健康状况。为此,提出了智能行人网络(Smart Pedestrian Network, SPN)信息系统的实现方案。这种实施需要包括公众、地方当局和地方企业在内的各利益攸关方的合作。为了让利益相关者相信实施SPN的可行性,主动移动性的好处应该是明确的。本文提出了一个量化主动移动效益的框架,以便利益相关者可以评估实施SPN可以实现的投资。提出的框架利用了在不同市场条件下量化收益的方法。这些好处是显著的,非常有利于投资技术和实现设想的SPN系统。
{"title":"Evaluation of the Benefits of Implementing a Smart Pedestrian Network System","authors":"George Papageorgiou, A. Ioannou, Athanasios Maimaris, Alexander N. Ness","doi":"10.1515/comp-2020-0127","DOIUrl":"https://doi.org/10.1515/comp-2020-0127","url":null,"abstract":"Abstract Information and Communication Technology (ICT), and recent advancements in Computer Science can serve as a catalyst for promoting sustainable means of transport. Through ICT applications, active mobility can be promoted and established as a viable transport mode. This can be achieved by providing relevant information for fostering social capital and promoting physical activity, thus contributing to a higher quality of life. Further, active mobility can greatly contribute to reducing air pollution and improving health status. For this purpose, the implementation of a Smart Pedestrian Network (SPN) information system is proposed. Such an implementation requires the collaboration of various stakeholders including the public, local authorities and local businesses. To convince stake-holders of the viability of implementing SPN, the benefits of active mobility should be clear. This paper proposes a framework to quantify active mobility benefits so that stake-holders can assess the investment that can be realized from implementing SPN. The proposed framework makes use of quantifying benefits in various market conditions. The benefits are shown to be significant and very much in favor of investing in technology and implementing the envisioned SPN system.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0127","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42404027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fuzzy Rank Based Parallel Online Feature Selection Method using Multiple Sliding Windows 基于模糊秩的多滑动窗口并行在线特征选择方法
IF 1.5 Q2 Computer Science Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0169
B. Venkatesh, J. Anuradha
Abstract Nowadays, in real-world applications, the dimensions of data are generated dynamically, and the traditional batch feature selection methods are not suitable for streaming data. So, online streaming feature selection methods gained more attention but the existing methods had demerits like low classification accuracy, fails to avoid redundant and irrelevant features, and a higher number of features selected. In this paper, we propose a parallel online feature selection method using multiple sliding-windows and fuzzy fast-mRMR feature selection analysis, which is used for selecting minimum redundant and maximum relevant features, and also overcomes the drawbacks of existing online streaming feature selection methods. To increase the performance speed of the proposed method parallel processing is used. To evaluate the performance of the proposed online feature selection method k-NN, SVM, and Decision Tree Classifiers are used and compared against the state-of-the-art online feature selection methods. Evaluation metrics like Accuracy, Precision, Recall, F1-Score are used on benchmark datasets for performance analysis. From the experimental analysis, it is proved that the proposed method has achieved more than 95% accuracy for most of the datasets and performs well over other existing online streaming feature selection methods and also, overcomes the drawbacks of the existing methods.
摘要如今,在现实应用中,数据的维度是动态生成的,传统的批量特征选择方法不适合流式数据。因此,在线流特征选择方法受到了更多的关注,但现有方法存在分类精度低、无法避免冗余和不相关特征以及选择的特征数量较多等缺点。在本文中,我们提出了一种使用多个滑动窗口和模糊快速mRMR特征选择分析的并行在线特征选择方法,该方法用于选择最小冗余和最大相关特征,并克服了现有在线流特征选择方法的缺点。为了提高所提出的方法的性能速度,使用了并行处理。为了评估所提出的在线特征选择方法的性能,使用了k-NN、SVM和决策树分类器,并与最先进的在线特征选取方法进行了比较。在性能分析的基准数据集上使用准确性、精密度、召回率、F1分数等评估指标。实验分析表明,该方法对大多数数据集的准确率都达到了95%以上,与现有的其他在线流特征选择方法相比表现良好,克服了现有方法的不足。
{"title":"Fuzzy Rank Based Parallel Online Feature Selection Method using Multiple Sliding Windows","authors":"B. Venkatesh, J. Anuradha","doi":"10.1515/comp-2020-0169","DOIUrl":"https://doi.org/10.1515/comp-2020-0169","url":null,"abstract":"Abstract Nowadays, in real-world applications, the dimensions of data are generated dynamically, and the traditional batch feature selection methods are not suitable for streaming data. So, online streaming feature selection methods gained more attention but the existing methods had demerits like low classification accuracy, fails to avoid redundant and irrelevant features, and a higher number of features selected. In this paper, we propose a parallel online feature selection method using multiple sliding-windows and fuzzy fast-mRMR feature selection analysis, which is used for selecting minimum redundant and maximum relevant features, and also overcomes the drawbacks of existing online streaming feature selection methods. To increase the performance speed of the proposed method parallel processing is used. To evaluate the performance of the proposed online feature selection method k-NN, SVM, and Decision Tree Classifiers are used and compared against the state-of-the-art online feature selection methods. Evaluation metrics like Accuracy, Precision, Recall, F1-Score are used on benchmark datasets for performance analysis. From the experimental analysis, it is proved that the proposed method has achieved more than 95% accuracy for most of the datasets and performs well over other existing online streaming feature selection methods and also, overcomes the drawbacks of the existing methods.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":null,"pages":null},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46106542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1