首页 > 最新文献

Open Computer Science最新文献

英文 中文
Digital Watermarking using Grasshopper Optimization Algorithm 基于Grasshopper优化算法的数字水印
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2019-0023
Satender Sharma, U. Chauhan, Ruqaiya Khanam, Krishnavir Singh
Abstract The advancement in computer science technology has led to some serious concerns about the piracy and copyright of digital content. Digital watermarking technique is widely used for copyright protection and other similar applications. In this paper, a technique for digital watermarking based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Grasshopper Optimization Algorithm (GOA) is proposed. The method computes the DWT of the cover image to obtain the sub-components of the image. The subcomponent is converted to frequency domain using DCT. The challenge is to find the optimal scaling factor to be used for watermarking. The authors have designed a GOA based technique that finds the optimized scaling factor and the coefficient for embedding the watermark. GOA makes the watermark undetectable and is invisible in the cover image. The watermark image is embedded in the cover image using these coefficients. The extraction of watermark from the cover image is done by using inverse DCT and DWT. The proposed method is compared with the other state of the art methods. The effectiveness of the proposed method is computed using Peak Signal to Noise Ratio (PSNR), Normalized Cross Correlation (NCC) and Image Fidelity (IF). The proposed method outperforms the other methods and can be effectively used for practical digital watermarking.
摘要计算机科学技术的进步引起了人们对数字内容盗版和版权的严重关注。数字水印技术被广泛用于版权保护和其他类似的应用。本文提出了一种基于离散余弦变换(DCT)、离散小波变换(DWT)和Grasshopper优化算法(GOA)的数字水印技术。该方法计算封面图像的DWT,得到图像的子分量。使用DCT将子分量转换到频域。挑战在于找到用于水印的最佳比例因子。作者设计了一种基于GOA的技术,该技术可以找到最优的比例因子和嵌入水印的系数。GOA使水印无法检测,并且在封面图像中不可见。使用这些系数将水印图像嵌入到封面图像中。利用逆DCT和DWT对封面图像进行水印提取。将所提出的方法与其他现有技术的方法进行比较。使用峰值信噪比(PSNR)、归一化互相关(NCC)和图像保真度(IF)来计算所提出方法的有效性。所提出的方法优于其他方法,可以有效地用于实际的数字水印。
{"title":"Digital Watermarking using Grasshopper Optimization Algorithm","authors":"Satender Sharma, U. Chauhan, Ruqaiya Khanam, Krishnavir Singh","doi":"10.1515/comp-2019-0023","DOIUrl":"https://doi.org/10.1515/comp-2019-0023","url":null,"abstract":"Abstract The advancement in computer science technology has led to some serious concerns about the piracy and copyright of digital content. Digital watermarking technique is widely used for copyright protection and other similar applications. In this paper, a technique for digital watermarking based on Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), and Grasshopper Optimization Algorithm (GOA) is proposed. The method computes the DWT of the cover image to obtain the sub-components of the image. The subcomponent is converted to frequency domain using DCT. The challenge is to find the optimal scaling factor to be used for watermarking. The authors have designed a GOA based technique that finds the optimized scaling factor and the coefficient for embedding the watermark. GOA makes the watermark undetectable and is invisible in the cover image. The watermark image is embedded in the cover image using these coefficients. The extraction of watermark from the cover image is done by using inverse DCT and DWT. The proposed method is compared with the other state of the art methods. The effectiveness of the proposed method is computed using Peak Signal to Noise Ratio (PSNR), Normalized Cross Correlation (NCC) and Image Fidelity (IF). The proposed method outperforms the other methods and can be effectively used for practical digital watermarking.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"330 - 336"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2019-0023","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46644825","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Classification of plant diseases using machine and deep learning 利用机器和深度学习对植物病害进行分类
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0122
Monika Lamba, Yogita Gigras, A. Dhull
Abstract Detection of plant disease has a crucial role in better understanding the economy of India in terms of agricultural productivity. Early recognition and categorization of diseases in plants are very crucial as it can adversely affect the growth and development of species. Numerous machine learning methods like SVM (support vector machine), random forest, KNN (k-nearest neighbor), Naïve Bayes, decision tree, etc., have been exploited for recognition, discovery, and categorization of plant diseases; however, the advancement of machine learning by DL (deep learning) is supposed to possess tremendous potential in enhancing the accuracy. This paper proposed a model comprising of Auto-Color Correlogram as image filter and DL as classifiers with different activation functions for plant disease. This proposed model is implemented on four different datasets to solve binary and multiclass subcategories of plant diseases. Using the proposed model, results achieved are better, obtaining 99.4% accuracy and 99.9% sensitivity for binary class and 99.2% accuracy for multiclass. It is proven that the proposed model outperforms other approaches, namely LibSVM, SMO (sequential minimal optimization), and DL with activation function softmax and softsign in terms of F-measure, recall, MCC (Matthews correlation coefficient), specificity and sensitivity.
植物病害的检测在更好地了解印度经济的农业生产力方面具有至关重要的作用。植物病害的早期识别和分类是至关重要的,因为病害会对物种的生长发育产生不利影响。支持向量机(SVM)、随机森林(random forest)、k近邻(KNN)、Naïve贝叶斯(Bayes)、决策树(decision tree)等多种机器学习方法已被用于植物病害的识别、发现和分类;然而,深度学习(deep learning)在机器学习方面的进步被认为在提高准确性方面具有巨大的潜力。本文提出了一种基于自动颜色相关图的植物病害图像滤波模型和基于不同激活函数的深度学习分类器模型。该模型在四种不同的数据集上实现,用于解决植物病害的二分类和多分类子类别问题。使用该模型,取得了较好的结果,二分类的准确率为99.4%,灵敏度为99.9%,多分类的准确率为99.2%。在F-measure、召回率、MCC (Matthews相关系数)、特异性和敏感性方面,该模型优于其他方法,即LibSVM、SMO(顺序最小优化)和带有激活函数softmax和softsign的DL。
{"title":"Classification of plant diseases using machine and deep learning","authors":"Monika Lamba, Yogita Gigras, A. Dhull","doi":"10.1515/comp-2020-0122","DOIUrl":"https://doi.org/10.1515/comp-2020-0122","url":null,"abstract":"Abstract Detection of plant disease has a crucial role in better understanding the economy of India in terms of agricultural productivity. Early recognition and categorization of diseases in plants are very crucial as it can adversely affect the growth and development of species. Numerous machine learning methods like SVM (support vector machine), random forest, KNN (k-nearest neighbor), Naïve Bayes, decision tree, etc., have been exploited for recognition, discovery, and categorization of plant diseases; however, the advancement of machine learning by DL (deep learning) is supposed to possess tremendous potential in enhancing the accuracy. This paper proposed a model comprising of Auto-Color Correlogram as image filter and DL as classifiers with different activation functions for plant disease. This proposed model is implemented on four different datasets to solve binary and multiclass subcategories of plant diseases. Using the proposed model, results achieved are better, obtaining 99.4% accuracy and 99.9% sensitivity for binary class and 99.2% accuracy for multiclass. It is proven that the proposed model outperforms other approaches, namely LibSVM, SMO (sequential minimal optimization), and DL with activation function softmax and softsign in terms of F-measure, recall, MCC (Matthews correlation coefficient), specificity and sensitivity.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"491 - 508"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46667810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Improving Data Delivery in Large Environments and Mobile Areas 改善大环境和移动区域的数据传输
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0211
Nada I. Najim
Abstract Advances in communication technology have significantly altered our knowledge about telephone networks. The remarkable expansion in communication is obvious in numerous aspects of life of life; the transmission of information has never been easier. Wireless communication has also had a remarkable development, and these facilities have become more reliable and easily accessible. This study, through a descriptive approach in accordance with earlier studies, aims to explain how to increase the capacity of wireless data delivery in addition to other important challenges that face the enhancement of these services in remote areas. This study highlights the challenges that accompany the adoption of wireless networks in remote areas: particularly signal strength. This is highly linked to the specific features of rural areas in terms of living habits in separated nodes rather than in high-density population centers areas.
摘要通信技术的进步极大地改变了我们对电话网络的认识。交流的显著扩展在生活的许多方面都是显而易见的;信息的传递从未如此容易。无线通信也有了显著的发展,这些设施变得更加可靠和方便。本研究通过与早期研究一致的描述性方法,旨在解释如何提高无线数据传输的能力,以及在偏远地区加强这些服务所面临的其他重要挑战。这项研究强调了在偏远地区采用无线网络所带来的挑战:特别是信号强度。这与农村地区在分离节点而非高密度人口中心地区的生活习惯方面的具体特征高度相关。
{"title":"Improving Data Delivery in Large Environments and Mobile Areas","authors":"Nada I. Najim","doi":"10.1515/comp-2020-0211","DOIUrl":"https://doi.org/10.1515/comp-2020-0211","url":null,"abstract":"Abstract Advances in communication technology have significantly altered our knowledge about telephone networks. The remarkable expansion in communication is obvious in numerous aspects of life of life; the transmission of information has never been easier. Wireless communication has also had a remarkable development, and these facilities have become more reliable and easily accessible. This study, through a descriptive approach in accordance with earlier studies, aims to explain how to increase the capacity of wireless data delivery in addition to other important challenges that face the enhancement of these services in remote areas. This study highlights the challenges that accompany the adoption of wireless networks in remote areas: particularly signal strength. This is highly linked to the specific features of rural areas in terms of living habits in separated nodes rather than in high-density population centers areas.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"288 - 293"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0211","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48456937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service 基于云的第三方云服务集成入侵检测系统设计
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0214
Wisam Elmasry, A. Akbulut, A. Zaim
Abstract Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.
摘要尽管云计算被认为是当今应用最广泛的技术,但它仍然面临着许多挑战,尤其是与安全性有关的挑战。由于云环境的开放性和分布式性质,这使得云本身容易受到各种攻击。在本文中,提出了一种新的基于云的集成入侵检测系统(CIDS)的设计,以保护云免受任何可能的攻击。所提出的CIDS由五个主要模块组成,用于执行以下操作:监控网络、捕获流量、提取特征、分析流量、检测入侵、做出反应和记录所有活动。此外,利用三个深度学习模型的增强套袋集成系统来有效预测入侵。此外,还利用第三方基于云的入侵检测系统服务(CIDSS)来控制所提出的CIDS并提供报告服务。最后,已经表明,所提出的方法克服了文献中提出的与对云的攻击相关的所有问题。
{"title":"A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service","authors":"Wisam Elmasry, A. Akbulut, A. Zaim","doi":"10.1515/comp-2020-0214","DOIUrl":"https://doi.org/10.1515/comp-2020-0214","url":null,"abstract":"Abstract Although cloud computing is considered the most widespread technology nowadays, it still suffers from many challenges, especially related to its security. Due to the open and distributed nature of the cloud environment, this makes the cloud itself vulnerable to various attacks. In this paper, the design of a novel integrated Cloud-based Intrusion Detection System (CIDS) is proposed to immunise the cloud against any possible attacks. The proposed CIDS consists of five main modules to do the following actions: monitoring the network, capturing the traffic flows, extracting features, analyzing the flows, detecting intrusions, taking a reaction, and logging all activities. Furthermore an enhanced bagging ensemble system of three deep learning models is utilized to predict intrusions effectively. Moreover, a third-party Cloud-based Intrusion Detection System Service (CIDSS) is also exploited to control the proposed CIDS and provide the reporting service. Finally, it has been shown that the proposed approach overcomes all problems associated with attacks on the cloud raised in the literature.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"365 - 379"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0214","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44829962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
QoS Based Optimal Resource Allocation and Workload Balancing for Fog Enabled IoT 基于QoS的雾赋能物联网优化资源分配和工作负载平衡
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0162
A. Khalid, Q. Ain, Awais Qasim, Zeeshan Aziz
Abstract This paper is aimed at efficiently distributing workload between the Fog Layer and the Cloud Network and then optimizing resource allocation in cloud networks to ensure better utilization and quick response time of the resources available to the end user. We have employed a Dead-line aware scheme to migrate the data between cloud and Fog networks based on data profiling and then used K-Means clustering and Service-request prediction model to allocate the resources efficiently to all requests. To substantiate our model, we have used iFogSim, which is an extension of the CloudSim simulator. The results clearly show that when an optimized network is used the Quality of Service parameters exhibit better efficiency and output.
摘要本文旨在有效地在雾层和云网络之间分配工作负载,然后优化云网络中的资源分配,以确保最终用户更好地利用可用资源并快速响应。我们采用了一种基于数据分析的死线感知方案来在云和雾网络之间迁移数据,然后使用K-Means聚类和服务请求预测模型来有效地将资源分配给所有请求。为了证实我们的模型,我们使用了iFogSim,它是CloudSim模拟器的扩展。结果清楚地表明,当使用优化网络时,服务质量参数表现出更好的效率和输出。
{"title":"QoS Based Optimal Resource Allocation and Workload Balancing for Fog Enabled IoT","authors":"A. Khalid, Q. Ain, Awais Qasim, Zeeshan Aziz","doi":"10.1515/comp-2020-0162","DOIUrl":"https://doi.org/10.1515/comp-2020-0162","url":null,"abstract":"Abstract This paper is aimed at efficiently distributing workload between the Fog Layer and the Cloud Network and then optimizing resource allocation in cloud networks to ensure better utilization and quick response time of the resources available to the end user. We have employed a Dead-line aware scheme to migrate the data between cloud and Fog networks based on data profiling and then used K-Means clustering and Service-request prediction model to allocate the resources efficiently to all requests. To substantiate our model, we have used iFogSim, which is an extension of the CloudSim simulator. The results clearly show that when an optimized network is used the Quality of Service parameters exhibit better efficiency and output.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"262 - 274"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0162","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45257421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
On the 100 Gbps DWDM with Optical Carrier Suppression Modulation 具有光载波抑制调制的100Gbps DWDM
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0104
Tomás Huszaník, J. Turán, Ľ. Ovseník
Abstract This paper investigates the transmission performance of 16-channel DWDM (Dense Wavelength Division Multiplexing) system with two complex Optical Differential Quadrature Phase Shift Keying modulator configurations using 2 LiNb MZM (Mach-Zehnder Modulator) and 3 LiNb MZM. The link performance is evaluated for 100 Gbps data rate per channel in a total 750 km single mode fiber link. The perfomance is analyzed in terms of forward power, reflected power and bit-error rate of the received signal. From the simulation results we prove, that the link performance can be improved by adopting the high efficiency optical modulation.
摘要本文研究了采用2个LiNb-MZM(Mach-Zehnder调制器)和3个LiNb-MZM的两种复光学差分正交相移键控调制器配置的16信道DWDM(密集波分复用)系统的传输性能。在总共750公里的单模光纤链路中,针对每个信道100 Gbps的数据速率来评估链路性能。从接收信号的前向功率、反射功率和误码率等方面分析了性能。仿真结果表明,采用高效光调制可以提高链路性能。
{"title":"On the 100 Gbps DWDM with Optical Carrier Suppression Modulation","authors":"Tomás Huszaník, J. Turán, Ľ. Ovseník","doi":"10.1515/comp-2020-0104","DOIUrl":"https://doi.org/10.1515/comp-2020-0104","url":null,"abstract":"Abstract This paper investigates the transmission performance of 16-channel DWDM (Dense Wavelength Division Multiplexing) system with two complex Optical Differential Quadrature Phase Shift Keying modulator configurations using 2 LiNb MZM (Mach-Zehnder Modulator) and 3 LiNb MZM. The link performance is evaluated for 100 Gbps data rate per channel in a total 750 km single mode fiber link. The perfomance is analyzed in terms of forward power, reflected power and bit-error rate of the received signal. From the simulation results we prove, that the link performance can be improved by adopting the high efficiency optical modulation.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"218 - 223"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0104","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42232211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhanced shuffled frog leaping algorithm with improved local exploration and energy-biased load reduction phase for load balancing of gateways in WSNs 用于无线传感器网络中网关负载平衡的改进的混洗蛙跳算法,具有改进的局部探索和能量偏置负载降低阶段
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0218
A. Adamuthe, A. Pathan
Abstract Wireless sensor networks (WSNs) have grown widely due to their application in various domains, such as surveillance, healthcare, telecommunication, etc. In WSNs, there is a necessity to design energy-efficient algorithms for different purposes. Load balancing of gateways in cluster-based WSNs is necessary to maximize the lifetime of a network. Shuffled frog leaping algorithm (SFLA) is a popular heuristic algorithm that incorporates a deterministic approach. Performance of any heuristic algorithm depends on its exploration and exploitation capability. The main contribution of this article is an enhanced SFLA with improved local search capability. Three strategies are tested to enhance the local search capability of SFLA to improve the load balancing of gateways in WSNs. The first proposed approach is deterministic in which the participation of the global best solution in information exchange is increased. The next two variations reduces the deterministic approach in the local search component of SFLA by introducing probability-based selection of frogs for information exchange. All three strategies improved the success of local search. Second contribution of article is increased lifetime of gateways in WSNs with a novel energy-biased load reduction phase introduced after the information exchange step. The proposed algorithm is tested with 15 datasets of varying areas of deployment, number of sensors and number of gateways. Proposed ESFLA-RW variation shows significant improvement over other variations in terms of successful local explorations, best fitness values, average fitness values and convergence rate for all datasets. Obtained results of proposed ESFLA-RW are significantly better in terms of network energy consumption, load balancing, first gateway die and network life. The proposed variations are tested to check the effect of various algorithm-specific parameters namely frog population size, probability of information exchange and probability of energy-biased load reduction phase. Higher population size and probabilities give better solutions and convergence rate.
摘要无线传感器网络由于其在监控、医疗保健、电信等各个领域的应用而得到了广泛的发展。在无线传感器网络中,有必要为不同的目的设计节能算法。在基于集群的无线传感器网络中,网关的负载平衡对于最大限度地延长网络的使用寿命是必要的。Shuffled蛙跳算法(SFLA)是一种流行的启发式算法,它结合了确定性方法。任何启发式算法的性能都取决于其探索和利用能力。本文的主要贡献是增强了SFLA,提高了本地搜索能力。测试了三种策略来增强SFLA的本地搜索能力,以提高WSN中网关的负载平衡。第一种提出的方法是确定性的,其中增加了全球最佳解决方案在信息交换中的参与。接下来的两种变体通过引入基于概率的蛙类选择来进行信息交换,从而减少了SFLA的局部搜索组件中的确定性方法。这三种策略都提高了本地搜索的成功率。文章的第二个贡献是在信息交换步骤之后引入了一个新的能量偏置负载降低阶段,增加了WSN中网关的寿命。所提出的算法在不同部署区域、传感器数量和网关数量的15个数据集上进行了测试。在所有数据集的成功局部探索、最佳适应度值、平均适应度值和收敛速度方面,所提出的ESFLA-RW变异比其他变异有显著改进。所提出的ESFLA-RW在网络能耗、负载平衡、第一网关芯片和网络寿命方面都有显著的改进。对所提出的变化进行了测试,以检查各种算法特定参数的影响,即青蛙种群大小、信息交换概率和能量偏置负载降低阶段的概率。更高的总体规模和概率给出更好的解和收敛速度。
{"title":"Enhanced shuffled frog leaping algorithm with improved local exploration and energy-biased load reduction phase for load balancing of gateways in WSNs","authors":"A. Adamuthe, A. Pathan","doi":"10.1515/comp-2020-0218","DOIUrl":"https://doi.org/10.1515/comp-2020-0218","url":null,"abstract":"Abstract Wireless sensor networks (WSNs) have grown widely due to their application in various domains, such as surveillance, healthcare, telecommunication, etc. In WSNs, there is a necessity to design energy-efficient algorithms for different purposes. Load balancing of gateways in cluster-based WSNs is necessary to maximize the lifetime of a network. Shuffled frog leaping algorithm (SFLA) is a popular heuristic algorithm that incorporates a deterministic approach. Performance of any heuristic algorithm depends on its exploration and exploitation capability. The main contribution of this article is an enhanced SFLA with improved local search capability. Three strategies are tested to enhance the local search capability of SFLA to improve the load balancing of gateways in WSNs. The first proposed approach is deterministic in which the participation of the global best solution in information exchange is increased. The next two variations reduces the deterministic approach in the local search component of SFLA by introducing probability-based selection of frogs for information exchange. All three strategies improved the success of local search. Second contribution of article is increased lifetime of gateways in WSNs with a novel energy-biased load reduction phase introduced after the information exchange step. The proposed algorithm is tested with 15 datasets of varying areas of deployment, number of sensors and number of gateways. Proposed ESFLA-RW variation shows significant improvement over other variations in terms of successful local explorations, best fitness values, average fitness values and convergence rate for all datasets. Obtained results of proposed ESFLA-RW are significantly better in terms of network energy consumption, load balancing, first gateway die and network life. The proposed variations are tested to check the effect of various algorithm-specific parameters namely frog population size, probability of information exchange and probability of energy-biased load reduction phase. Higher population size and probabilities give better solutions and convergence rate.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"437 - 460"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43796864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Angular 3D Path Selection Protocol in Wireless Sensor Networks 无线传感器网络中的角度三维路径选择协议
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0203
N. Gupta, R. S. Yadav, R. Nagaria, D. Gupta
Abstract Geographical routing is an area of interest for wireless sensor networks because of its scalability and local decision making capability. Usually, geographical routing protocols rely on greedy approach and suffer from the void node problem (VNP). This paper presents an angular three-dimensional routing protocol (A3DR) for wireless sensor networks. In A3DR, the next hop is selected from nodes available in solid angle decided dynamically based on network density, i.e., larger solid angle for sparse networks while a smaller angle for dense one. The delay based contention mechanism has been proposed to select a suitable forwarding node among nodes lying in a particular solid angle. A3DR has a provision to adaptively tune the solid angle to resolve the void node problem. Further, the proposed protocol A3DR will take care of traffic congestion problem suffered by beaconless routing protocol. The A3DR tackle the concave void problem by allowing conditional backtracking to find another suitable path and prevent looping. Additionally, A3DR address overhear problem by utilizing the concept of request-to-forward and clear-to-forward for the nodes lying outside the solid angle 60°. The performance of proposed A3DR is compared with existing protocols by implementing it on the INET framework under OMNET++ simulator. The simulation results indicate that A3DR achieves a high packet reception rate while maximizing the residual energy and minimizing traffic overhead.
摘要地理路由由于其可扩展性和局部决策能力而成为无线传感器网络关注的一个领域。通常情况下,地理路由协议依赖于贪婪方法,并存在无效节点问题(VNP)。本文提出了一种适用于无线传感器网络的角度三维路由协议(A3DR)。在A3DR中,下一跳是从基于网络密度动态决定的立体角中可用的节点中选择的,即,稀疏网络的立体角较大,而密集网络的立体角度较小。已经提出了基于延迟的争用机制来在位于特定立体角的节点中选择合适的转发节点。A3DR具有自适应地调整立体角以解决空隙节点问题的规定。此外,所提出的协议A3DR将解决无信标路由协议所带来的流量拥塞问题。A3DR通过允许条件回溯找到另一条合适的路径并防止循环来解决凹空问题。此外,A3DR通过利用请求转发和清除转发的概念来解决立体角60°以外的节点的过热问题。通过在OMNET++模拟器下的INET框架上实现,将所提出的A3DR的性能与现有协议进行了比较。仿真结果表明,A3DR在最大化剩余能量和最小化业务开销的同时实现了高分组接收率。
{"title":"An Angular 3D Path Selection Protocol in Wireless Sensor Networks","authors":"N. Gupta, R. S. Yadav, R. Nagaria, D. Gupta","doi":"10.1515/comp-2020-0203","DOIUrl":"https://doi.org/10.1515/comp-2020-0203","url":null,"abstract":"Abstract Geographical routing is an area of interest for wireless sensor networks because of its scalability and local decision making capability. Usually, geographical routing protocols rely on greedy approach and suffer from the void node problem (VNP). This paper presents an angular three-dimensional routing protocol (A3DR) for wireless sensor networks. In A3DR, the next hop is selected from nodes available in solid angle decided dynamically based on network density, i.e., larger solid angle for sparse networks while a smaller angle for dense one. The delay based contention mechanism has been proposed to select a suitable forwarding node among nodes lying in a particular solid angle. A3DR has a provision to adaptively tune the solid angle to resolve the void node problem. Further, the proposed protocol A3DR will take care of traffic congestion problem suffered by beaconless routing protocol. The A3DR tackle the concave void problem by allowing conditional backtracking to find another suitable path and prevent looping. Additionally, A3DR address overhear problem by utilizing the concept of request-to-forward and clear-to-forward for the nodes lying outside the solid angle 60°. The performance of proposed A3DR is compared with existing protocols by implementing it on the INET framework under OMNET++ simulator. The simulation results indicate that A3DR achieves a high packet reception rate while maximizing the residual energy and minimizing traffic overhead.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"190 - 207"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0203","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49379876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Theoretical Estimate of the Total Shelf Length in a Gas Fields Model 气田模型中大陆架总长度的理论估计
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0224
A. Skiba, N. Skiba
Abstract The authors consider a continuous dynamic approximating model of a gas fields group and, on its basis, set maximum and minimum issues. The tasks proposed for research are optimal control problems with mixed constraints with free-final-time and moving right end. We analytically solve the rapid-action problem. The central mathematical apparatus is Pontryagin maximum principle in Arrow form, using Lagrange multipliers. The theoretically obtained results of the analysis are of particular interest.
摘要考虑了一个气田群的连续动态逼近模型,并在此基础上设置了最大值和最小值问题。提出的研究任务是具有自由最终时间和移动右端的混合约束的最优控制问题。我们通过分析来解决快速行动问题。中心数学装置是箭头形式的庞特里亚金最大原理,使用拉格朗日乘子。理论上得到的分析结果特别令人感兴趣。
{"title":"Theoretical Estimate of the Total Shelf Length in a Gas Fields Model","authors":"A. Skiba, N. Skiba","doi":"10.1515/comp-2020-0224","DOIUrl":"https://doi.org/10.1515/comp-2020-0224","url":null,"abstract":"Abstract The authors consider a continuous dynamic approximating model of a gas fields group and, on its basis, set maximum and minimum issues. The tasks proposed for research are optimal control problems with mixed constraints with free-final-time and moving right end. We analytically solve the rapid-action problem. The central mathematical apparatus is Pontryagin maximum principle in Arrow form, using Lagrange multipliers. The theoretically obtained results of the analysis are of particular interest.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"15 23","pages":"355 - 364"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0224","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41273247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Framework-based security measures for Internet of Thing: A literature review 基于框架的物联网安全措施:文献综述
IF 1.5 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2021-01-01 DOI: 10.1515/comp-2020-0220
J. Rueda-Rueda, J. Portocarrero
Abstract This paper presents a review of state-of-the-art security frameworks for IoT applications. It aims to find out what alternatives have been proposed to guide IoT application developers in the implementation of security measures through all development phases. In this literature review, we identified 21 security frameworks, and we analyzed them from IoT application domains addressed and IoT elements protected. We find four application domains: generic, smart cities, smart car/VANET, and smart infrastructures. Concerning elements protected, we analyzed the frameworks through protected application resources and we also consider security properties in this paper. Our two principal findings are: (i) Even though there are a wide variety of security frameworks, we did not find a proposal that addresses all the layers of an IoT application (device, network, service and application) and all development phases (analysis, design, implementation, testing, deployment, and maintenance), (ii) Addressing security from the design phase allows IoT developers to have a broader perspective of the system, avoiding massive changes to be made in later stages, saving costs and time. This gap and concerns enable various research on security by design and secure development to be carried out, and proposed frameworks to address the identified problems.
本文介绍了物联网应用的最新安全框架。它的目的是找出已经提出的替代方案,指导物联网应用程序开发人员在所有开发阶段实施安全措施。在这篇文献综述中,我们确定了21个安全框架,并从物联网应用领域和物联网元素保护的角度对它们进行了分析。我们发现了四个应用领域:通用、智能城市、智能汽车/VANET和智能基础设施。对于受保护的元素,我们通过受保护的应用资源对框架进行了分析,并考虑了安全属性。我们的两个主要发现是:(i)尽管有各种各样的安全框架,但我们没有找到一个解决物联网应用程序(设备,网络,服务和应用程序)和所有开发阶段(分析,设计,实施,测试,部署和维护)的所有层的建议。(ii)从设计阶段解决安全问题可以使物联网开发人员对系统有更广泛的看法,避免在后期进行大规模更改,节省成本和时间。这种差距和关注使得通过设计和安全开发进行各种安全研究,并提出框架来解决已确定的问题。
{"title":"Framework-based security measures for Internet of Thing: A literature review","authors":"J. Rueda-Rueda, J. Portocarrero","doi":"10.1515/comp-2020-0220","DOIUrl":"https://doi.org/10.1515/comp-2020-0220","url":null,"abstract":"Abstract This paper presents a review of state-of-the-art security frameworks for IoT applications. It aims to find out what alternatives have been proposed to guide IoT application developers in the implementation of security measures through all development phases. In this literature review, we identified 21 security frameworks, and we analyzed them from IoT application domains addressed and IoT elements protected. We find four application domains: generic, smart cities, smart car/VANET, and smart infrastructures. Concerning elements protected, we analyzed the frameworks through protected application resources and we also consider security properties in this paper. Our two principal findings are: (i) Even though there are a wide variety of security frameworks, we did not find a proposal that addresses all the layers of an IoT application (device, network, service and application) and all development phases (analysis, design, implementation, testing, deployment, and maintenance), (ii) Addressing security from the design phase allows IoT developers to have a broader perspective of the system, avoiding massive changes to be made in later stages, saving costs and time. This gap and concerns enable various research on security by design and secure development to be carried out, and proposed frameworks to address the identified problems.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"11 1","pages":"346 - 354"},"PeriodicalIF":1.5,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1515/comp-2020-0220","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41902608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Open Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1