首页 > 最新文献

Int. J. Softw. Sci. Comput. Intell.最新文献

英文 中文
Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction 基于时间序列预测的选择虚拟机工作流调度多目标自适应蝠鲼觅食优化
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.312559
Sweta Singh, R. Kumar, U. P. Rao
Optimization problems are challenging, but the larger challenge is to deal with the energy issue of the cloud, with continuous dynamic load and fluctuating VM performance. The optimization technique aids in efficient task-resource mapping ensuring optimal resource utilization with minimum active hosts and energy consumption. Existing works focused on time-invariant and bounded VM performance with major concentration on minimizing the execution cost and time. A multi-objective adaptive manta-ray foraging optimization (MAMFO) has been proposed in the paper for efficient scheduling with optimum resource utilization and energy consumption. The paper contributes by considering the time-varying VM performance and performance prediction using a dynamic time-series based ARIMA model, filtering out the VMs with larger fluctuating possibility, and employing only the selected VMs to be scheduled using MAMFO to meet the optimization goal with minimum SLA violations. The experimental analysis improves the work efficiency (e.g., energy consumption attained to be 0.405 kWh, and 5.97% of SLA violations).
优化问题是具有挑战性的,但更大的挑战是处理云的能源问题,持续的动态负载和波动的VM性能。优化技术有助于有效的任务-资源映射,以最小的活动主机和能量消耗确保最佳的资源利用。现有的工作主要集中在定常和有界VM性能上,主要集中在最小化执行成本和时间上。提出了一种多目标自适应蝠鲼觅食优化算法,以实现资源利用和能量消耗最优的高效调度。本文通过考虑时变的虚拟机性能和基于动态时间序列的ARIMA模型的性能预测,过滤掉波动可能性较大的虚拟机,使用MAMFO只使用被选中的要调度的虚拟机,以最小的SLA违规来满足优化目标。实验分析提高了工作效率(如能耗0.405 kWh,违反SLA率5.97%)。
{"title":"Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.312559","DOIUrl":"https://doi.org/10.4018/ijssci.312559","url":null,"abstract":"Optimization problems are challenging, but the larger challenge is to deal with the energy issue of the cloud, with continuous dynamic load and fluctuating VM performance. The optimization technique aids in efficient task-resource mapping ensuring optimal resource utilization with minimum active hosts and energy consumption. Existing works focused on time-invariant and bounded VM performance with major concentration on minimizing the execution cost and time. A multi-objective adaptive manta-ray foraging optimization (MAMFO) has been proposed in the paper for efficient scheduling with optimum resource utilization and energy consumption. The paper contributes by considering the time-varying VM performance and performance prediction using a dynamic time-series based ARIMA model, filtering out the VMs with larger fluctuating possibility, and employing only the selected VMs to be scheduled using MAMFO to meet the optimization goal with minimum SLA violations. The experimental analysis improves the work efficiency (e.g., energy consumption attained to be 0.405 kWh, and 5.97% of SLA violations).","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132233103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
GIS-Based Multi-Criteria Decision-Support System and Machine Learning for Hospital Site Selection: Case Study Oran, Algeria 基于gis的多标准决策支持系统和医院选址的机器学习:案例研究奥兰,阿尔及利亚
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.285592
Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh
The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.
医院地点的选择是决策者为抵御大流行而必须做出的最重要的选择之一。这一决定可能在效率、预算等方面对疫情传播产生重大影响。本研究的主要目标是在奥兰阿尔格的维拉亚找到建立医院的理想地点。为此,我们采用地理信息系统与多准则分析法AHP相结合的方法,对生理定位、环境和经济等多种准则进行评价。本研究的另一个目的是评估自动学习的先进技术。随机森林(RF)法在奥兰村的医院选址模式。我们的研究结果可能有助于决策者了解这些站点的适用性,因为它提供了高度的信心,从而加快了控制covid - 19大流行的能力。
{"title":"GIS-Based Multi-Criteria Decision-Support System and Machine Learning for Hospital Site Selection: Case Study Oran, Algeria","authors":"Khadidja Benmoussa, D. Hamdadou, Zine El Abidine Roukh","doi":"10.4018/ijssci.285592","DOIUrl":"https://doi.org/10.4018/ijssci.285592","url":null,"abstract":"The selection of hospital sites is one of the most important choice a decision maker has to take so as to resist the pandemic. The decision may considerably affect the outbreak transmission in terms of efficiency , budget, etc. The main targeted objective of this study is to find the ideal location where to set up a hospital in the willaya of Oran Alg. For this reason, we have used a geographic information system coupled to the multi-criteria analysis method AHP in order to evaluate diverse criteria of physiological positioning , environmental and economical. Another objective of this study is to evaluate the advanced techniques of the automatic learning . the method of the random forest (RF) for the patterning of the hospital site selection in the willaya of Oran. The result of our study may be useful to decision makers to know the suitability of the sites as it provides a high level of confidence and consequently accelerate the power to control the COVID19 pandemic.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"1040 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123140251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Review of Fingerprint Recognition System Development 指纹识别系统发展综述
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.300358
J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai
Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted in this area, yet further research into its betterment is still an emerging trend. This article presents a study of the published empirical research on some fingerprint recognition techniques widely in use. The study is limited to articles that explicitly discuss techniques used in recognizing a person's fingerprint. It employs a systematic mapping design, which proposes a categorical system to classify the research results based on the selected articles' topics. The categories include work distribution by year of publication, datasets used, fingerprint recognition approaches, metrics, and evaluation. This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.
生物识别认证在商业、公司管理和其他环境中与安全相关的问题中越来越受欢迎。在这方面已经进行了大量的研究,但进一步研究其改进仍然是一个新兴的趋势。本文对目前广泛应用的几种指纹识别技术进行了实证研究。这项研究仅限于明确讨论指纹识别技术的文章。它采用了系统的映射设计,根据所选文章的主题提出了一个分类系统来对研究结果进行分类。分类包括按出版年份划分的作品分布、使用的数据集、指纹识别方法、指标和评估。本研究通过将所选取的已发表论文与分类标准进行比较并对分类标准进行评价,来显示当前指纹识别实证研究的方向。
{"title":"A Systematic Review of Fingerprint Recognition System Development","authors":"J. K. Appati, Prince Kofi Nartey, Winfred Yaokumah, J. Abdulai","doi":"10.4018/ijssci.300358","DOIUrl":"https://doi.org/10.4018/ijssci.300358","url":null,"abstract":"Biometric authentication is gaining ground in security-related issues in business, corporate management, and other settings. A considerable amount of research has been conducted in this area, yet further research into its betterment is still an emerging trend. This article presents a study of the published empirical research on some fingerprint recognition techniques widely in use. The study is limited to articles that explicitly discuss techniques used in recognizing a person's fingerprint. It employs a systematic mapping design, which proposes a categorical system to classify the research results based on the selected articles' topics. The categories include work distribution by year of publication, datasets used, fingerprint recognition approaches, metrics, and evaluation. This study shows the direction of currently performed empirical research on fingerprint recognition by comparing the selected published work to the classification criteria and evaluating them.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System 僵尸网络防御系统中基于机器学习的白帽蠕虫启动器
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.291713
Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin
This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.
针对僵尸网络防御系统(BDS),提出了一种基于机器学习(ML)的适用于大规模物联网网络的白帽蠕虫启动器。北斗系统是一种利用白帽蠕虫来消灭恶意僵尸网络的网络安全系统。白帽蠕虫保护物联网系统免受恶意机器人的攻击,BDS决定白帽蠕虫的数量,但没有讨论白帽蠕虫在物联网网络中的部署。因此,作者提出了一种基于机器学习的启动器来有效地启动白帽蠕虫,并采用分而治之的算法将启动器部署到大规模物联网网络中。然后利用面向agent的Petri网对BDS和发射器进行建模,并通过PN2模型的仿真验证了效果。结果表明,提出的启动程序可以将受感染设备的数量减少约30-40%。
{"title":"Machine-Learning-Based White-Hat Worm Launcher in Botnet Defense System","authors":"Xiangnan Pan, S. Yamaguchi, Takumi Kageyama, Mohd Hafizuddin Bin Kamilin","doi":"10.4018/ijssci.291713","DOIUrl":"https://doi.org/10.4018/ijssci.291713","url":null,"abstract":"This article proposes a white-hat worm launcher based on machine learning (ML) adaptable to large-scale IoT network for Botnet Defense System (BDS). BDS is a cyber-security system that uses white-hat worms to exterminate malicious botnets. White-hat worms defend an IoT system against malicious bots, the BDS decides the number of white-hat worms, but there is no discussion on the white-hat worms' deployment in IoT network. Therefore, the authors propose a machine-learning-based launcher to launch the white-hat worms effectively along with a divide and conquer algorithm to deploy the launcher to large-scale IoT networks. Then the authors modeled BDS and the launcher with agent-oriented Petri net and confirmed the effect through the simulation of the PN2 model. The result showed that the proposed launcher can reduce the number of infected devices by about 30-40%.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Model-Based Method for Optimisation of an Adaptive System 基于模型的自适应系统优化方法
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.301269
Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad
In a modern information system adaptation, optimization is a crucial aspect. Systems adaptation problematics have been explored in a large set of research, which have not been able to fix every single issue, leaving therefore so many challenges to be explored. It for this reason this paper presents a method, through a UML profile, to ensure the optimization of the performance of a production system. In the first place, a state of the art is presented to clarify the context of the study. This method consists in setting up a UML profile which will allow the real value of the production to be constantly assessed, the reaction take place when production is not satisfactory. The productivity assessment performs through the application of the simple algorithm, the simplex constraints are integrated through the OCL language. A code generator, based on acceleo, has been developed to propose code generation.
在现代信息系统适应中,优化是一个至关重要的方面。系统适应问题已经在大量的研究中进行了探索,这些研究并不能解决每一个问题,因此留下了许多有待探索的挑战。由于这个原因,本文提出了一种方法,通过UML概要文件,来确保生产系统性能的优化。首先,介绍了目前的研究现状,以澄清研究的背景。这个方法包括建立一个UML概要文件,它将允许产品的真实价值不断地被评估,当产品不令人满意时,反应就会发生。生产率评估通过简单算法的应用来实现,简单约束通过OCL语言集成。一个基于acceleo的代码生成器已经被开发来提出代码生成。
{"title":"Model-Based Method for Optimisation of an Adaptive System","authors":"Magagi Ali Bachir, Ismail Jellouli, E. Said, Souad Amjad","doi":"10.4018/ijssci.301269","DOIUrl":"https://doi.org/10.4018/ijssci.301269","url":null,"abstract":"In a modern information system adaptation, optimization is a crucial aspect. Systems adaptation problematics have been explored in a large set of research, which have not been able to fix every single issue, leaving therefore so many challenges to be explored. It for this reason this paper presents a method, through a UML profile, to ensure the optimization of the performance of a production system. In the first place, a state of the art is presented to clarify the context of the study. This method consists in setting up a UML profile which will allow the real value of the production to be constantly assessed, the reaction take place when production is not satisfactory. The productivity assessment performs through the application of the simple algorithm, the simplex constraints are integrated through the OCL language. A code generator, based on acceleo, has been developed to propose code generation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115001057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Core Industrial Maintenance Ontology Development Process 核心工业维护本体开发流程
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.312555
Leila Zemmouchi-Ghomari, Badreddine Midoune, Nadhir Djamiai
Operational safety is at the center of all companies' concerns because increasing productivity is the top priority. Moreover, the high cost of breakdowns invests in a maintenance strategy, one of the most critical aspects of a manufacturing system. In the digital age, e-maintenance platforms can interoperate technically but fail to achieve semantic interoperability. The results are ambiguities and misunderstandings that can lead to equipment shutdowns or inefficient use of material resources. However, as formal knowledge specifications, ontologies have successfully integrated heterogeneous systems for some time. Therefore, the authors developed a core industrial maintenance ontology that is both generic and capable of extending and refining to meet semantic information repository requirements. Ontologies can unite and merge different datasets without adapting new ontologies. Only the core ontology needs to be modified according to the new semantics. A detailed description of the development process is provided, beginning with the definition of requirements and ending with the evaluation.
操作安全是所有公司关注的中心,因为提高生产率是头等大事。此外,故障的高成本投资于维护策略,这是制造系统最关键的方面之一。在数字时代,电子维修平台可以实现技术上的互操作,但无法实现语义上的互操作。其结果是模棱两可和误解,可能导致设备关闭或材料资源的低效使用。然而,作为正式的知识规范,本体已经成功地集成了异构系统一段时间了。因此,作者开发了一个核心工业维护本体,它既通用又能够扩展和精炼,以满足语义信息存储库的需求。本体可以统一和合并不同的数据集,而无需采用新的本体。只有核心本体需要根据新的语义进行修改。提供了开发过程的详细描述,从需求定义开始,以评估结束。
{"title":"A Core Industrial Maintenance Ontology Development Process","authors":"Leila Zemmouchi-Ghomari, Badreddine Midoune, Nadhir Djamiai","doi":"10.4018/ijssci.312555","DOIUrl":"https://doi.org/10.4018/ijssci.312555","url":null,"abstract":"Operational safety is at the center of all companies' concerns because increasing productivity is the top priority. Moreover, the high cost of breakdowns invests in a maintenance strategy, one of the most critical aspects of a manufacturing system. In the digital age, e-maintenance platforms can interoperate technically but fail to achieve semantic interoperability. The results are ambiguities and misunderstandings that can lead to equipment shutdowns or inefficient use of material resources. However, as formal knowledge specifications, ontologies have successfully integrated heterogeneous systems for some time. Therefore, the authors developed a core industrial maintenance ontology that is both generic and capable of extending and refining to meet semantic information repository requirements. Ontologies can unite and merge different datasets without adapting new ontologies. Only the core ontology needs to be modified according to the new semantics. A detailed description of the development process is provided, beginning with the definition of requirements and ending with the evaluation.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"96 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128376511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attacks on Resource-Constrained IoT Devices and Security Solutions 资源受限物联网设备的攻击与安全解决方案
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.310943
Ravi Sharma, Nonita Sharma
An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.
物联网是一个由相互连接的电子设备组成的复杂系统,通过网络交换数据。由于这种新技术范式所涉及的数据的敏感性,必须非常小心地采取安全措施。如果对攻击进行分类,以促进更强大的防御系统的发展,研究人员可以更好地了解物联网的威胁和弱点。本研究讨论了与物联网相关的各种攻击和统计数据。这些攻击分为两类:物理攻击和网络攻击。根据文献综述,作者发现社会工程和DoS是物理和网络类别中最常见的攻击。本研究展示了保护物联网环境所固有的安全解决方案。回顾了密码学、区块链、软件定义网络和机器学习技术。他们还讨论了建立一个安全的物联网环境应该采取的步骤。
{"title":"Attacks on Resource-Constrained IoT Devices and Security Solutions","authors":"Ravi Sharma, Nonita Sharma","doi":"10.4018/ijssci.310943","DOIUrl":"https://doi.org/10.4018/ijssci.310943","url":null,"abstract":"An IoT is a complex system of interconnected electronic devices that exchange data over the network. Due to the sensitive nature of the data involved in this new technological paradigm, security measures must be taken with great care. Researchers can better understand the threats and weaknesses of the IoT if attacks are categorized to facilitate the development of a more robust defense system. This study discusses various attacks and statistical data related to IoT. These attacks are divided into two categories: physical and cyber-attacks. Based on the literature review, the authors found that social engineering and DoS are the most common attacks in the physical and cyber categories. This study demonstrates the security solutions inherent to securing the IoT environment. Cryptography, blockchain, software-defined networks, and machine learning techniques were reviewed. They also discussed steps that should be taken to make a safe IoT environment.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"273 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132905638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey 基于云的医疗物联网(MIoTs)安全性调查
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.285593
Akshat Gaurav, Konstantinos E. Psannis, D. Peraković
In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.
在这个数字时代,人们对医疗质量的期望越来越高。随着患者数量的不断增加,传统的保健方法不得不处理新的并发症。根据这些观察结果,研究人员建议将传统医疗保健方法与物联网技术相结合,发展物联网。IoMT的目标是确保患者能够更有效地响应他们的治疗。但在收集和处理高度敏感的个人健康数据时,保护用户隐私是一个关键问题。然而,iomt的处理能力有限;因此,他们只能实现最低限度的安全技术。因此,在通过物联网传输健康数据的整个过程中,患者的数据存在数据泄露的风险。作者的这份手稿强调需要实施适当的安全措施,以增加IoMT对网络攻击的恢复能力。此外,本文还讨论了与IoMT相关的主要安全和隐私问题,并概述了现有技术。
{"title":"Security of Cloud-Based Medical Internet of Things (MIoTs): A Survey","authors":"Akshat Gaurav, Konstantinos E. Psannis, D. Peraković","doi":"10.4018/ijssci.285593","DOIUrl":"https://doi.org/10.4018/ijssci.285593","url":null,"abstract":"In this digital era expectations for medical quality have increased. As the number of patients continues to increase, conventional health care methods are having to deal with new complications. In light of these observations, researchers suggested a hybrid combination of conventional health care methods with IoT technology and develop MIoT. The goal of IoMT is to ensure that patients can respond more effectively and efficiently to their treatment. But preserving user privacy is a critical issue when it comes to collecting and handling highly sensitive personal health data. However, IoMTs have limited processing power; hence, they can only implement minimal security techniques. Consequently, throughout the health data transfer through MIoT, patient’s data is at risk of data leakage. This manuscript per the authors emphasizes the need of implementing suitable security measures to increase the IoMT's resilience to cyberattacks. Additionally, this manuscript per the authors discusses the main security and privacy issues associated with IoMT and provide an overview of existing techniques.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130084558","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 31
Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception 基于深度强化学习的智能感知行人与自主车辆安全防御
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.291712
P. Vijayakumar, L. Deborah, S. Rajkumar
The Light Detection and Ranging (LiDAR) sensor is utilized to track each sensed obstructions at their respective locations with their relative distance, speed, and direction; such sensitive information forwards to the cloud server to predict the vehicle-hit, traffic congestion and road damages. Learn the behaviour of the state to produce an appropriate reward as the recommendation to avoid tragedy. Deep Reinforcement Learning and Q-network predict the complexity and uncertainty of the environment to generate optimal reward to states. Consequently, it activates automatic emergency braking and safe parking assistance to the vehicles. In addition, the proposed work provides safer transport for pedestrians and independent vehicles. Compared to the newer methods, the proposed system experimental results achieved 92.15% higher prediction rate accuracy. Finally, the proposed system saves many humans, animal lives from the vehicle hit, suggests drivers for rerouting to avoid unpredictable traffic, saves fuel consumption, and avoids carbon emission.
光探测和测距(LiDAR)传感器利用其相对距离、速度和方向跟踪每个感测障碍物的相应位置;这些敏感信息被转发到云服务器,用于预测车辆碰撞、交通拥堵和道路损坏情况。学习国家的行为,产生适当的奖励作为避免悲剧的建议。深度强化学习和q -网络预测环境的复杂性和不确定性,以产生对状态的最佳奖励。因此,它启动自动紧急制动和安全停车辅助车辆。此外,建议的工作为行人和独立车辆提供更安全的交通。实验结果表明,与较新的预测方法相比,该方法的预测准确率提高了92.15%。最后,该系统从车辆撞击中拯救了许多人类和动物的生命,建议司机改变路线以避免不可预测的交通,节省了燃料消耗,并避免了碳排放。
{"title":"Deep Reinforcement Learning-Based Pedestrian and Independent Vehicle Safety Fortification Using Intelligent Perception","authors":"P. Vijayakumar, L. Deborah, S. Rajkumar","doi":"10.4018/ijssci.291712","DOIUrl":"https://doi.org/10.4018/ijssci.291712","url":null,"abstract":"The Light Detection and Ranging (LiDAR) sensor is utilized to track each sensed obstructions at their respective locations with their relative distance, speed, and direction; such sensitive information forwards to the cloud server to predict the vehicle-hit, traffic congestion and road damages. Learn the behaviour of the state to produce an appropriate reward as the recommendation to avoid tragedy. Deep Reinforcement Learning and Q-network predict the complexity and uncertainty of the environment to generate optimal reward to states. Consequently, it activates automatic emergency braking and safe parking assistance to the vehicles. In addition, the proposed work provides safer transport for pedestrians and independent vehicles. Compared to the newer methods, the proposed system experimental results achieved 92.15% higher prediction rate accuracy. Finally, the proposed system saves many humans, animal lives from the vehicle hit, suggests drivers for rerouting to avoid unpredictable traffic, saves fuel consumption, and avoids carbon emission.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133660936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization 基于动态双阈值增强搜索和救援优化的多目标节能虚拟机整合
Pub Date : 2022-01-01 DOI: 10.4018/ijssci.315006
Sweta Singh, R. Kumar, U. P. Rao
The popularization of the cloud and its need to solve complex engineering application have alarmed energy and environmental concerns among the researchers. Achieving energy efficiency has become one of the most essential aims of the data center, offering more services with minimal energy consumption (EC). VM consolidation aims at adjusting the VMs to fewer PMs by live migration of VMs and then switching off the inactive servers, achieving energy efficiency. However, uncontrolled consolidation could violate the SLA. The paper contributes by considering the optimization problem targeting the EC and the number of VM migrations. Dynamic double threshold with enhanced search and rescue (DDT-ESAR) optimization has been introduced utilizing two thresholds; the first value defines the upper and lower bound for host classification, whereas the other is used to make migration decision. For migration, ESAR has been adopted for the most appropriate PM- VM mapping. The experimental analysis proves the efficiency where EC is computed to be 0.384kWh, SLA violations to be 6.33% and 64 number of migrations.
云的普及及其解决复杂工程应用的需要引起了研究人员对能源和环境的关注。实现能源效率已经成为数据中心最基本的目标之一,以最小的能源消耗(EC)提供更多的服务。虚拟机整合的目的是通过动态迁移虚拟机,将虚拟机调整为更少的服务器,然后关闭不活跃的服务器,从而达到节能的目的。然而,不受控制的合并可能违反SLA。本文考虑了以EC为目标的优化问题和虚拟机迁移的数量。动态双阈值与增强搜索和救援(DDT-ESAR)优化引入了利用两个阈值;第一个值定义了主机分类的上界和下界,另一个值用于迁移决策。对于迁移,ESAR已被用于最合适的PM- VM映射。实验分析表明,计算得到的EC为0.384kWh, SLA违例率为6.33%,迁移次数为64次的效率。
{"title":"Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization","authors":"Sweta Singh, R. Kumar, U. P. Rao","doi":"10.4018/ijssci.315006","DOIUrl":"https://doi.org/10.4018/ijssci.315006","url":null,"abstract":"The popularization of the cloud and its need to solve complex engineering application have alarmed energy and environmental concerns among the researchers. Achieving energy efficiency has become one of the most essential aims of the data center, offering more services with minimal energy consumption (EC). VM consolidation aims at adjusting the VMs to fewer PMs by live migration of VMs and then switching off the inactive servers, achieving energy efficiency. However, uncontrolled consolidation could violate the SLA. The paper contributes by considering the optimization problem targeting the EC and the number of VM migrations. Dynamic double threshold with enhanced search and rescue (DDT-ESAR) optimization has been introduced utilizing two thresholds; the first value defines the upper and lower bound for host classification, whereas the other is used to make migration decision. For migration, ESAR has been adopted for the most appropriate PM- VM mapping. The experimental analysis proves the efficiency where EC is computed to be 0.384kWh, SLA violations to be 6.33% and 64 number of migrations.","PeriodicalId":432255,"journal":{"name":"Int. J. Softw. Sci. Comput. Intell.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727297","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Int. J. Softw. Sci. Comput. Intell.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1