首页 > 最新文献

Research and Development on Information and Communication Technology最新文献

英文 中文
Một thuật toán định tuyến cân bằng năng lượng trong mạng cảm biến không dây dựa trên SDN 在 SDN 的帮助下,你可以创建自己的网站。
Pub Date : 2023-11-28 DOI: 10.32913/mic-ict-research-vn.v2023.n2.1240
Huy Lê Đức, Binh Le Huu, Công Đỗ Thành, Giang Nguyễn Đỗ Hoàng
Trong mạng cảm biến không dây (WSN), việc sử dụng năng lượng sao cho hiệu quả để kéo dài thời gian hoạt động của các nút cảm biến là điều cần thiết. Trong bài báo này, chúng tôi đề xuất một thuật toán định tuyến có xét đến mức tiêu thụ năng lượng giữa các nút cảm biến. Mục tiêu của thuật toán được đề xuất là cân bằng mức tiêu thụ năng lượng, giảm thiểu số nút phải tiêu thụ nhiều năng lượng nhằm tăng thời gian hoạt động của chúng. Phương pháp của chúng tôi là xây dựng một hàm trọng số cho các kết nối không dây có chứa các tham số về năng lượng còn lại tại các nút. Sau đó, sử dụng cơ chế định tuyến tập trung dựa trên kiến trúc mạng điều khiển bằng phần mềm (SDN) để tìm lộ trình có trọng số tốt nhất để truyền dữ liệu. Kết quả mô phỏng trên OMNeT++ cho thấy rằng, thuật toán được đề xuất cho phép tăng thời gian hoạt động của các nút, tăng thông lượng mạng so với các thuật toán định tuyến phổ biến hiện hành.
在使用 WSN(无线局域网)的过程中,您会发现许多问题。在此情况下,您可以选择在您的网站上注册。如果您的電腦被盜用,您的電腦可能會被竊聽,但如果您的電腦被盜用,您的電腦可能會被竊聽。您可以選擇在您的電腦上安裝一個新的應用程式。儘管如此,您仍可以通過鍵盤輸入您的密碼。當您在 OMNeT++ 選擇您的時候,您可以選擇在您的電腦上安裝一個 "驅動程式",它可以在您的電腦上安裝一個 "驅動程式"。
{"title":"Một thuật toán định tuyến cân bằng năng lượng trong mạng cảm biến không dây dựa trên SDN","authors":"Huy Lê Đức, Binh Le Huu, Công Đỗ Thành, Giang Nguyễn Đỗ Hoàng","doi":"10.32913/mic-ict-research-vn.v2023.n2.1240","DOIUrl":"https://doi.org/10.32913/mic-ict-research-vn.v2023.n2.1240","url":null,"abstract":"Trong mạng cảm biến không dây (WSN), việc sử dụng năng lượng sao cho hiệu quả để kéo dài thời gian hoạt động của các nút cảm biến là điều cần thiết. Trong bài báo này, chúng tôi đề xuất một thuật toán định tuyến có xét đến mức tiêu thụ năng lượng giữa các nút cảm biến. Mục tiêu của thuật toán được đề xuất là cân bằng mức tiêu thụ năng lượng, giảm thiểu số nút phải tiêu thụ nhiều năng lượng nhằm tăng thời gian hoạt động của chúng. Phương pháp của chúng tôi là xây dựng một hàm trọng số cho các kết nối không dây có chứa các tham số về năng lượng còn lại tại các nút. Sau đó, sử dụng cơ chế định tuyến tập trung dựa trên kiến trúc mạng điều khiển bằng phần mềm (SDN) để tìm lộ trình có trọng số tốt nhất để truyền dữ liệu. Kết quả mô phỏng trên OMNeT++ cho thấy rằng, thuật toán được đề xuất cho phép tăng thời gian hoạt động của các nút, tăng thông lượng mạng so với các thuật toán định tuyến phổ biến hiện hành.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"49 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139222775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of cyber security risk assessment for web systems during its deployment and operation 检讨网络系统在部署和运作期间的网络安全风险评估
Pub Date : 2023-03-18 DOI: 10.32913/mic-ict-research.v2023.n1.1089
Manh-Tuan Nguyen, Thi-Huong-Giang Vu
This paper presents the state of the arts in security risk assessment of web systems. The process of assessing security risks and the process of developing and operating information systems in general, web systems in particular, are depicted step by step, showing how the risk assessment is performed during the deployment and the operation of web systems. Based on this analysis, different methods related to the manual and automatic risk assessment are reviewed, focusing on the methods using probability theory and Bayesian networks. The techniques developed for quantitative and qualitative assessment are presented and compared in terms of their objectives, scopes, and results to pick out advantages and limits. Finally, the approaches dedicated to assessing the risks of web systems are presented.
本文介绍了web系统安全风险评估的研究现状。本书一步一步地描述了评估安全风险的过程,以及开发和操作一般信息系统(特别是web系统)的过程,展示了在web系统的部署和操作过程中如何进行风险评估。在此基础上,综述了人工风险评估和自动风险评估的不同方法,重点介绍了基于概率论和贝叶斯网络的风险评估方法。为定量和定性评估而开发的技术在其目标、范围和结果方面进行了介绍和比较,以挑选出优点和局限性。最后,介绍了用于评估web系统风险的方法。
{"title":"A review of cyber security risk assessment for web systems during its deployment and operation","authors":"Manh-Tuan Nguyen, Thi-Huong-Giang Vu","doi":"10.32913/mic-ict-research.v2023.n1.1089","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2023.n1.1089","url":null,"abstract":"This paper presents the state of the arts in security risk assessment of web systems. The process of assessing security risks and the process of developing and operating information systems in general, web systems in particular, are depicted step by step, showing how the risk assessment is performed during the deployment and the operation of web systems. Based on this analysis, different methods related to the manual and automatic risk assessment are reviewed, focusing on the methods using probability theory and Bayesian networks. The techniques developed for quantitative and qualitative assessment are presented and compared in terms of their objectives, scopes, and results to pick out advantages and limits. Finally, the approaches dedicated to assessing the risks of web systems are presented.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122318775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Learning of Image Representations with Convolutional Neural Networks Autoencoder for Image Retrieval with Relevance Feedback 基于卷积神经网络的深度学习图像表征与相关反馈图像检索
Pub Date : 2023-03-18 DOI: 10.32913/mic-ict-research.v2023.n1.1063
Quynh Dao Thi Thuy
mage retrieval with traditional relevance feedback encounters problems: (1) ability to represent handcrafted features which is limited, and (2) inefficient withhigh-dimensional data such as image data. In this paper,we propose a framework based on very deep convolutionalneural network autoencoder for image retrieval, called AIR(Autoencoders for Image Retrieval). Our proposed frameworkallows to learn feature vectors directly from the raw imageand in an unsupervised manner. In addition, our frameworkutilizes a hybrid approach of unsupervised and supervisedto improve retrieval performance. The experimental resultsshow that our method gives better results than some existingmethods on the CIFAR-100 image set, which consists of 60,000images.
使用传统的相关反馈进行图像检索会遇到以下问题:(1)表示手工特征的能力有限;(2)处理高维数据(如图像数据)的效率低下。在本文中,我们提出了一个基于深度卷积神经网络的图像检索自编码器框架,称为AIR(Autoencoders for image retrieval)。我们提出的框架允许以无监督的方式直接从原始图像中学习特征向量。此外,我们的框架利用无监督和有监督的混合方法来提高检索性能。实验结果表明,在包含6万张图像的CIFAR-100图像集上,我们的方法比现有的一些方法得到了更好的结果。
{"title":"Deep Learning of Image Representations with Convolutional Neural Networks Autoencoder for Image Retrieval with Relevance Feedback","authors":"Quynh Dao Thi Thuy","doi":"10.32913/mic-ict-research.v2023.n1.1063","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2023.n1.1063","url":null,"abstract":"mage retrieval with traditional relevance feedback encounters problems: (1) ability to represent handcrafted features which is limited, and (2) inefficient withhigh-dimensional data such as image data. In this paper,we propose a framework based on very deep convolutionalneural network autoencoder for image retrieval, called AIR(Autoencoders for Image Retrieval). Our proposed frameworkallows to learn feature vectors directly from the raw imageand in an unsupervised manner. In addition, our frameworkutilizes a hybrid approach of unsupervised and supervisedto improve retrieval performance. The experimental resultsshow that our method gives better results than some existingmethods on the CIFAR-100 image set, which consists of 60,000images.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128431110","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Location Fusion and Data Augmentation for Thoracic Abnormalites Detection in Chest X-Ray Images 胸部x线图像异常检测的位置融合与数据增强
Pub Date : 2023-03-18 DOI: 10.32913/mic-ict-research.v2023.n1.1172
Nguyen Thi Van Anh, Nguyen Duc Dung, Nguyen Thi Phuong Thuy
The application of deep learning in medical image diagnosis has been widely studied recently. Unlike general objects, thoracic abnormalities in chest X-ray radiographs are much harder to label consistently by domain experts. Theproblem’s difficulty and inconsistency in data labeling lead to the downgraded performance of the robust deep learning models. This paper presents two methods to improve the accuracy of thoracic abnormalities detection in chest X-ray images. The first method is to fuse the locations of the same abnormality marked differently by radiologists. The second method is applying mosaic data augmentation in the training process to enrich the training data. Experiments on the VinDr-CXR chest X-ray data show that combining the two methods helps improve the predictive performance by up to 8% for F1-score and 9% for the mean average precision (MAP) score.
近年来,深度学习在医学图像诊断中的应用得到了广泛的研究。与一般对象不同,胸部x光片上的胸部异常很难被领域专家一致标记。该问题在数据标记上的困难和不一致导致鲁棒深度学习模型性能下降。本文提出了两种提高胸部x线图像中胸部异常检测准确率的方法。第一种方法是融合放射科医生标记的不同位置的同一异常。第二种方法是在训练过程中应用马赛克数据增强来丰富训练数据。在vdr - cxr胸片数据上的实验表明,结合这两种方法可以使f1评分的预测性能提高8%,平均平均精度(MAP)评分的预测性能提高9%。
{"title":"Location Fusion and Data Augmentation for Thoracic Abnormalites Detection in Chest X-Ray Images","authors":"Nguyen Thi Van Anh, Nguyen Duc Dung, Nguyen Thi Phuong Thuy","doi":"10.32913/mic-ict-research.v2023.n1.1172","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2023.n1.1172","url":null,"abstract":"The application of deep learning in medical image diagnosis has been widely studied recently. Unlike general objects, thoracic abnormalities in chest X-ray radiographs are much harder to label consistently by domain experts. Theproblem’s difficulty and inconsistency in data labeling lead to the downgraded performance of the robust deep learning models. This paper presents two methods to improve the accuracy of thoracic abnormalities detection in chest X-ray images. The first method is to fuse the locations of the same abnormality marked differently by radiologists. The second method is applying mosaic data augmentation in the training process to enrich the training data. Experiments on the VinDr-CXR chest X-ray data show that combining the two methods helps improve the predictive performance by up to 8% for F1-score and 9% for the mean average precision (MAP) score.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114677007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Surveying Some Metaheuristic Algorithms For Solving Maximum Clique Graph Problem 求解最大团图问题的几种元启发式算法综述
Pub Date : 2023-03-18 DOI: 10.32913/mic-ict-research.v2023.n1.1197
PhanTan Quoc
Maximum clique graph problem is a combinatorial optimization problem that has many applications in science and engineering such as social networks, telecommunication networks, bioinformatics, etc. Maximum clique is a problem of class NP-hard. There are many approaches to solving the maximum clique graph problem such as algorithms to find exact solutions, heuristic algorithms, metaheuristic algorithms, etc. In this paper, we survey the approach to solving the maximum clique graph problem in the direction of metaheuristic algorithms. We evaluate the quality of these research based on the experimental data system DIMACS. Our survey can be useful information for further research on maximum clique graph problems.
最大团图问题是一个组合优化问题,在社会网络、电信网络、生物信息学等科学和工程领域有着广泛的应用。最大集团是一类np困难问题。求解最大团图问题的方法有很多,如精确解算法、启发式算法、元启发式算法等。本文从元启发式算法的角度研究了求解最大团图问题的方法。我们基于实验数据系统DIMACS来评估这些研究的质量。我们的研究为进一步研究最大团图问题提供了有用的信息。
{"title":"Surveying Some Metaheuristic Algorithms For Solving Maximum Clique Graph Problem","authors":"PhanTan Quoc","doi":"10.32913/mic-ict-research.v2023.n1.1197","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2023.n1.1197","url":null,"abstract":"Maximum clique graph problem is a combinatorial optimization problem that has many applications in science and engineering such as social networks, telecommunication networks, bioinformatics, etc. Maximum clique is a problem of class NP-hard. There are many approaches to solving the maximum clique graph problem such as algorithms to find exact solutions, heuristic algorithms, metaheuristic algorithms, etc. In this paper, we survey the approach to solving the maximum clique graph problem in the direction of metaheuristic algorithms. We evaluate the quality of these research based on the experimental data system DIMACS. Our survey can be useful information for further research on maximum clique graph problems.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127048899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimation for the number of MDS Matrices, Recursive MDS Matrices and Symmetric Recursive MDS Matrices from the Reed-Solomon Codes Reed-Solomon码中MDS矩阵、递归MDS矩阵和对称递归MDS矩阵数目的估计
Pub Date : 2023-03-18 DOI: 10.32913/mic-ict-research.v2023.n1.1105
T. Luong
The diffusion layer of the SPN block ciphers is usually built on the basis of the MDS (Maximum Distance Separable) matrices which is the matrix of the maximum distance separable code (MDS code). MDS codes have long been studied in error correcting code theory and have applications not only in coding theory but also in the design of block ciphers and hash functions. Thanks to that important role, there have been many studies on methods of building MDS matrices. In particular, the recursive MDS matrices and the symmetric recursive MDS matrices have particularly important applications because they are very efficient for execution. In this paper, we will give an estimate of the number of MDS matrices, recursive MDS matrices and symmetric recursive MDS matrices built from Reed-Solomon codes. This result is meaningful in determining the efficiency from this method of building matrices based on the Reed-Solomon codes. From there, this method can be applied to find out many MDS matrices, secure and efficient symmetric recursive MDS matrices for execution to apply in current block ciphers. Furthermore, recursive MDS matrices can be efficiently implemented using Linear Feedback Shift Registers (LFSR), making them well suited for lightweight cryptographic algorithms, so suitable for limited resources application.
SPN分组密码的扩散层通常建立在最大距离可分离码矩阵(MDS)的基础上,MDS是最大距离可分离码的矩阵。MDS码在纠错码理论中得到了长期的研究,不仅在编码理论中有应用,而且在分组密码和哈希函数的设计中也有应用。由于这一重要作用,人们对MDS矩阵的构建方法进行了许多研究。特别是,递归MDS矩阵和对称递归MDS矩阵具有特别重要的应用,因为它们的执行效率非常高。在本文中,我们将给出由Reed-Solomon码构建的MDS矩阵、递归MDS矩阵和对称递归MDS矩阵的数量估计。该结果对于确定基于Reed-Solomon规范的矩阵构建方法的效率具有重要意义。在此基础上,应用该方法可以找出许多MDS矩阵,安全高效的对称递归MDS矩阵用于当前分组密码的执行。此外,递归MDS矩阵可以使用线性反馈移位寄存器(LFSR)有效地实现,使其非常适合轻量级加密算法,因此适合有限资源的应用。
{"title":"Estimation for the number of MDS Matrices, Recursive MDS Matrices and Symmetric Recursive MDS Matrices from the Reed-Solomon Codes","authors":"T. Luong","doi":"10.32913/mic-ict-research.v2023.n1.1105","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2023.n1.1105","url":null,"abstract":"The diffusion layer of the SPN block ciphers is usually built on the basis of the MDS (Maximum Distance Separable) matrices which is the matrix of the maximum distance separable code (MDS code). MDS codes have long been studied in error correcting code theory and have applications not only in coding theory but also in the design of block ciphers and hash functions. Thanks to that important role, there have been many studies on methods of building MDS matrices. In particular, the recursive MDS matrices and the symmetric recursive MDS matrices have particularly important applications because they are very efficient for execution. In this paper, we will give an estimate of the number of MDS matrices, recursive MDS matrices and symmetric recursive MDS matrices built from Reed-Solomon codes. This result is meaningful in determining the efficiency from this method of building matrices based on the Reed-Solomon codes. From there, this method can be applied to find out many MDS matrices, secure and efficient symmetric recursive MDS matrices for execution to apply in current block ciphers. Furthermore, recursive MDS matrices can be efficiently implemented using Linear Feedback Shift Registers (LFSR), making them well suited for lightweight cryptographic algorithms, so suitable for limited resources application.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128929429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lambda Functions and Approximate Generalized Positive Boolean Dependencies Lambda函数与近似广义正布尔依赖关系
Pub Date : 2022-10-11 DOI: 10.32913/mic-ict-research.v2022.n2.1099
T. V. Nguyen, Huy Nguyen Xuan
The main purpose of the paper is to proposea lambda function and its apply to the concept of measurein comparing tuples of relations. Extend the generalizedpositive Boolean dependency to obtain a new type ofdependency called approximate generalized positive Booleandependency.The results can be applied in constructing more complicateddatabases, especially allowing extended search capabilitiesfor the real-world data.
本文的主要目的是提出lambda函数及其在度量和比较关系元概念中的应用。扩展广义正布尔依赖,得到一种新的依赖类型,称为近似广义正布尔依赖。结果可以应用于构建更复杂的数据库,特别是允许对真实世界数据的扩展搜索功能。
{"title":"Lambda Functions and Approximate Generalized Positive Boolean Dependencies","authors":"T. V. Nguyen, Huy Nguyen Xuan","doi":"10.32913/mic-ict-research.v2022.n2.1099","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2022.n2.1099","url":null,"abstract":"The main purpose of the paper is to proposea lambda function and its apply to the concept of measurein comparing tuples of relations. Extend the generalizedpositive Boolean dependency to obtain a new type ofdependency called approximate generalized positive Booleandependency.The results can be applied in constructing more complicateddatabases, especially allowing extended search capabilitiesfor the real-world data.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126604637","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Experimental Study of Fast Greedy Algorithms for Fair Allocation Problems 公平分配问题快速贪婪算法的实验研究
Pub Date : 2022-09-30 DOI: 10.32913/mic-ict-research.v2022.n2.1032
T. Nguyen, Le Dang Nguyen
This paper is concerned with two salient allocationproblems in fair division of indivisible goods, aiming atmaximizing egalitarian and Nash product social welfare.These problems are computationally NP-hard, meaning thatachieving polynomial time algorithms is impossible, unlessP = NP. Approximation algorithms, which return near-optimalsolution with a theoretical guarantee, have been widely usedfor tackling the problems. However, most of them are often ofhigh computational complexity or not easy to implement. It istherefore of great interest to explore fast greedy methods thatcan quickly produce a good solution. This paper presents anempirical study of the performance of several such methods.Interestingly, the obtained results show that fair allocationproblems can be practically approximated by greedy algorithms.Keywords: Fair allocation, exact algorithm, greedy algorithm,mixed-integer linear program, NP-hard.I. INTRODUCTIONIn this paper, we study the fair allocation problem, whichhas shown its growing interest during last decades, with awide range of real-world applications [1]. In short, this is acombinatorial optimization problem which asks to allocate???? discrete items amongst a set of ???? agents (or players)so as to meet a certain notion of fairness. It is assumedthat every item is “indivisible” and “non-sharable”, thatis, i) it cannot be broken in pieces before allocating toagents, and ii) it cannot be shared by two or more agents.For example, laptops and cell-phones are indivisible itemswhich agents might not want to share with others. Anallocation of items to agents is simply a partition of thewhole set of items into ???? disjoint subsets. There are up to???????? such partitions, making the solution space large enoughso that an exhaustive search for an optimal solution isimpossible.It now remains to define what a fair allocation is, aconcept that is of independent interest in the field ofEconomic and Social Choice Theory [2, 3]. In general, thereare many different ways of defining fairness, depending onparticular applications. The most common way is to eitheruse a so-called Collective Utility Function (CUF), which isa function for aggregating individual agents’ utilities in afair manner, or to follow an orthogonal method relying ondetermining the fair share of agents. Since we are focusingon the first method in this paper, we refer the reader tothe paper [4] and the references therein for more details ofthe second method. Suppose that every agent evaluates thevalue of items through a utility function, which maps eachsubset of items to a numerical value representing the utilityof the agent for the subset. Then, one can define a maxmin fair allocation to be the one that maximizes the
本文研究了不可分割物品公平分配中的两个突出问题,其目标是最大化平均主义和纳什产品的社会福利。这些问题在计算上是NP困难的,这意味着实现多项式时间算法是不可能的,除非p = NP。近似算法是一种具有理论保证的近似最优解算法,已被广泛用于解决这些问题。然而,它们中的大多数通常具有很高的计算复杂度或不容易实现。因此,探索能够快速产生良好解的快速贪婪方法是非常有趣的。本文对几种方法的性能进行了实证研究。有趣的是,所得结果表明,公平分配问题可以用贪婪算法实际逼近。关键词:公平分配,精确算法,贪婪算法,混合整数线性规划,np -hard。在本文中,我们研究了公平分配问题,这个问题在过去的几十年里越来越受到关注,在现实世界中有着广泛的应用[1]。简而言之,这是一个要求分配????的组合优化问题在一组????中离散的项目代理人(或玩家),以满足一定的公平概念。假设每个项目都是“不可分割的”和“不可共享的”,即:i)在分配给agent之前,它不能被分解,ii)它不能被两个或多个agent共享。例如,笔记本电脑和手机是不可分割的物品,代理人可能不想与其他人共享。项目到代理的分析只是将整个项目集划分为????不相交的子集。有多达????????这样的分区,使得解空间足够大,以至于不可能穷尽搜索最优解。现在仍然需要定义什么是公平分配,这是经济和社会选择理论领域中独立感兴趣的概念[2,3]。一般来说,根据特定的应用程序,有许多不同的定义公平的方法。最常见的方法是使用所谓的集体效用函数(CUF),这是一个以公平的方式汇总各个代理的效用的函数,或者遵循依赖于确定代理的公平份额的正交方法。由于本文的重点是第一种方法,关于第二种方法的更多细节,我们请读者参阅论文[4]及其参考文献。假设每个代理都通过效用函数来评估物品的价值,该效用函数将物品的每个子集映射为表示代理对该子集的效用的数值。然后,可以定义最大公平分配,使
{"title":"An Experimental Study of Fast Greedy Algorithms for Fair Allocation Problems","authors":"T. Nguyen, Le Dang Nguyen","doi":"10.32913/mic-ict-research.v2022.n2.1032","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2022.n2.1032","url":null,"abstract":"This paper is concerned with two salient allocationproblems in fair division of indivisible goods, aiming atmaximizing egalitarian and Nash product social welfare.These problems are computationally NP-hard, meaning thatachieving polynomial time algorithms is impossible, unlessP = NP. Approximation algorithms, which return near-optimalsolution with a theoretical guarantee, have been widely usedfor tackling the problems. However, most of them are often ofhigh computational complexity or not easy to implement. It istherefore of great interest to explore fast greedy methods thatcan quickly produce a good solution. This paper presents anempirical study of the performance of several such methods.Interestingly, the obtained results show that fair allocationproblems can be practically approximated by greedy algorithms.Keywords: Fair allocation, exact algorithm, greedy algorithm,mixed-integer linear program, NP-hard.I. INTRODUCTIONIn this paper, we study the fair allocation problem, whichhas shown its growing interest during last decades, with awide range of real-world applications [1]. In short, this is acombinatorial optimization problem which asks to allocate???? discrete items amongst a set of ???? agents (or players)so as to meet a certain notion of fairness. It is assumedthat every item is “indivisible” and “non-sharable”, thatis, i) it cannot be broken in pieces before allocating toagents, and ii) it cannot be shared by two or more agents.For example, laptops and cell-phones are indivisible itemswhich agents might not want to share with others. Anallocation of items to agents is simply a partition of thewhole set of items into ???? disjoint subsets. There are up to???????? such partitions, making the solution space large enoughso that an exhaustive search for an optimal solution isimpossible.It now remains to define what a fair allocation is, aconcept that is of independent interest in the field ofEconomic and Social Choice Theory [2, 3]. In general, thereare many different ways of defining fairness, depending onparticular applications. The most common way is to eitheruse a so-called Collective Utility Function (CUF), which isa function for aggregating individual agents’ utilities in afair manner, or to follow an orthogonal method relying ondetermining the fair share of agents. Since we are focusingon the first method in this paper, we refer the reader tothe paper [4] and the references therein for more details ofthe second method. Suppose that every agent evaluates thevalue of items through a utility function, which maps eachsubset of items to a numerical value representing the utilityof the agent for the subset. Then, one can define a maxmin fair allocation to be the one that maximizes the \u0000 \u0000 \u0000","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122148898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Long Non-coding RNA-disease Associations using Multiple Features and Deep Learning 利用多特征和深度学习预测长链非编码rna与疾病的关联
Pub Date : 2022-09-30 DOI: 10.32913/mic-ict-research.v2022.n2.1069
Various long non-coding RNAs have been shownto play crucial roles in different biological processes includingcell cycle control, transcription, translation, epigenetic regulation, splicing, differentiation, immune response and so forthin the human body. Discovering lncRNA-disease associationspromotes the awareness of human complex disease at molecular level and support the diagnosis, treatment and prevention of complex diseases. It is costly, laboratory and timeconsuming to discover and verify lncRNA-disease associationsby biological experiments. Therefore, it is crucial to develop acomputational method to predict lncRNA-disease associationsto save time and resources. In this paper, we proposed a newmethod to predict lncRNA-disease associations using multiplefeatures and deep learning. Our method uses a weighted????-nearest known neighbors algorithm as a pre-processingstep to eliminate the impact of sparsity data problem. Andit combines the linear and non-linear features extracted bysingular value decomposition and deep learning techniques,respectively, to obtain better prediction performance. Ourproposed method achieves a decisive performance with thebest AUC and AUPR values of 0.9702 and 0.8814, respectively,under LOOCV experiments. It is superior to other stateof-the-art SDLDA and NCPLDA methods in both AUC andAUPR evaluation metrics. It could be considered as a powerfultool to predict lncRNA-disease associations.
多种长链非编码rna在人体细胞周期控制、转录、翻译、表观遗传调控、剪接、分化、免疫应答等生物学过程中发挥着重要作用。lncrna与疾病关联的发现促进了人类在分子水平上对复杂疾病的认识,为复杂疾病的诊断、治疗和预防提供了支持。通过生物学实验来发现和验证lncrna与疾病的关联是昂贵的、实验室的和耗时的。因此,开发一种预测lncrna -疾病关联的计算方法以节省时间和资源至关重要。在本文中,我们提出了一种利用多特征和深度学习来预测lncrna -疾病关联的新方法。我们的方法使用一个加权的????-采用最近邻算法作为预处理步骤,消除数据稀疏性问题的影响。并将奇异值分解提取的线性和非线性特征与深度学习技术相结合,以获得更好的预测性能。在LOOCV实验下,该方法的最佳AUC和AUPR值分别为0.9702和0.8814,具有决定性的性能。该方法在AUC和aupr评价指标上都优于其他最先进的SDLDA和NCPLDA方法。它可以被认为是预测lncrna与疾病关联的有力工具。
{"title":"Predicting Long Non-coding RNA-disease Associations using Multiple Features and Deep Learning","authors":"","doi":"10.32913/mic-ict-research.v2022.n2.1069","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2022.n2.1069","url":null,"abstract":"Various long non-coding RNAs have been shownto play crucial roles in different biological processes includingcell cycle control, transcription, translation, epigenetic regulation, splicing, differentiation, immune response and so forthin the human body. Discovering lncRNA-disease associationspromotes the awareness of human complex disease at molecular level and support the diagnosis, treatment and prevention of complex diseases. It is costly, laboratory and timeconsuming to discover and verify lncRNA-disease associationsby biological experiments. Therefore, it is crucial to develop acomputational method to predict lncRNA-disease associationsto save time and resources. In this paper, we proposed a newmethod to predict lncRNA-disease associations using multiplefeatures and deep learning. Our method uses a weighted????-nearest known neighbors algorithm as a pre-processingstep to eliminate the impact of sparsity data problem. Andit combines the linear and non-linear features extracted bysingular value decomposition and deep learning techniques,respectively, to obtain better prediction performance. Ourproposed method achieves a decisive performance with thebest AUC and AUPR values of 0.9702 and 0.8814, respectively,under LOOCV experiments. It is superior to other stateof-the-art SDLDA and NCPLDA methods in both AUC andAUPR evaluation metrics. It could be considered as a powerfultool to predict lncRNA-disease associations.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127644846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Revesible Data Hiding based on Improved Pixel Value Ordering Method 一种基于改进像素值排序的可逆数据隐藏方法
Pub Date : 2022-09-30 DOI: 10.32913/mic-ict-research.v2022.n2.1064
T. Cao, Dinh Phong Pham, Hoang Hiep Pham
Reversible data hiding based on the preservationof sorted pixel value ordering (PVO) technique has beenresearched and expanded recently due to its high embeddingcapacity and good image quality. secret data is always embedded in the largest or smallest pixel of the sub-block. Thus,each sub-block will embed two bits. The more blocks an imagehas, the higher the embedding potential. In this paper, to havemore sub-blocks, the paper divides the image into sub-blockswith 3 pixels and embeds 2 bits in the maximum value and1 bit in the minimum value. Therefore, each sub-block of theproposed embedding scheme is able to hide three bits insteadof the two bits as in the original scheme. The experimentalresults also show that the proposed scheme has a significantlyhigher embedding capacity.
基于保留有序像素值排序(PVO)的可逆数据隐藏技术由于其高嵌入容量和良好的图像质量,近年来得到了广泛的研究和推广。秘密数据总是嵌入在子块的最大或最小像素中。因此,每个子块将嵌入两个比特。图像的块越多,嵌入的潜力就越高。为了获得更多的子块,本文将图像分成3个像素的子块,并在最大值中嵌入2位,在最小值中嵌入1位。因此,所提出的嵌入方案的每个子块能够隐藏3位,而不是像原始方案那样隐藏2位。实验结果还表明,该方案具有显著提高的嵌入容量。
{"title":"A Novel Revesible Data Hiding based on Improved Pixel Value Ordering Method","authors":"T. Cao, Dinh Phong Pham, Hoang Hiep Pham","doi":"10.32913/mic-ict-research.v2022.n2.1064","DOIUrl":"https://doi.org/10.32913/mic-ict-research.v2022.n2.1064","url":null,"abstract":"Reversible data hiding based on the preservationof sorted pixel value ordering (PVO) technique has beenresearched and expanded recently due to its high embeddingcapacity and good image quality. secret data is always embedded in the largest or smallest pixel of the sub-block. Thus,each sub-block will embed two bits. The more blocks an imagehas, the higher the embedding potential. In this paper, to havemore sub-blocks, the paper divides the image into sub-blockswith 3 pixels and embeds 2 bits in the maximum value and1 bit in the minimum value. Therefore, each sub-block of theproposed embedding scheme is able to hide three bits insteadof the two bits as in the original scheme. The experimentalresults also show that the proposed scheme has a significantlyhigher embedding capacity.","PeriodicalId":432355,"journal":{"name":"Research and Development on Information and Communication Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120956790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Research and Development on Information and Communication Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1