首页 > 最新文献

Cybernetics and Information Technologies最新文献

英文 中文
Checking Temporal Constraints of Events in EBS at Runtime 在运行时检查 EBS 中事件的时间限制
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0005
Thanh-Binh Trinh, H. Nguyen, Dinh-Hai Nguyen, Van-Khanh To, Ninh-Thuan Truong
As a kind of software system, the Event-Based Systems (EBS) respond to events rather than executing a predefined sequence of instructions. Events usually occur in real time, so it is crucial that they are processed in the correct order and within temporal constraints. The objective of this work is to propose an approach to check if events of EBS at runtime preserve the specification of temporal constraints. To form the approach by logic process, we have formalized the EBS model, through which, we have proved that the complexity of the checking algorithms is only polynomial. The approach has been implemented as a tool (VER) to check EBS at runtime automatically. The results of the proposed method are illustrated by checking a real-world Event Driven Architecture (EDA) application, an Intelligent transportation system.
作为一种软件系统,基于事件的系统(EBS)对事件做出响应,而不是执行预定义的指令序列。事件通常是实时发生的,因此必须按照正确的顺序并在时间限制内处理这些事件。这项工作的目的是提出一种方法,用于检查运行时 EBS 的事件是否符合时间约束规范。为了通过逻辑过程形成这种方法,我们对 EBS 模型进行了形式化,通过这种形式化,我们证明了检查算法的复杂性仅为多项式。该方法已作为工具(VER)实现,可在运行时自动检查 EBS。我们通过检查一个真实世界的事件驱动架构(EDA)应用--智能交通系统--来说明所提方法的结果。
{"title":"Checking Temporal Constraints of Events in EBS at Runtime","authors":"Thanh-Binh Trinh, H. Nguyen, Dinh-Hai Nguyen, Van-Khanh To, Ninh-Thuan Truong","doi":"10.2478/cait-2024-0005","DOIUrl":"https://doi.org/10.2478/cait-2024-0005","url":null,"abstract":"\u0000 As a kind of software system, the Event-Based Systems (EBS) respond to events rather than executing a predefined sequence of instructions. Events usually occur in real time, so it is crucial that they are processed in the correct order and within temporal constraints. The objective of this work is to propose an approach to check if events of EBS at runtime preserve the specification of temporal constraints. To form the approach by logic process, we have formalized the EBS model, through which, we have proved that the complexity of the checking algorithms is only polynomial. The approach has been implemented as a tool (VER) to check EBS at runtime automatically. The results of the proposed method are illustrated by checking a real-world Event Driven Architecture (EDA) application, an Intelligent transportation system.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140281015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient DenseNet Model with Fusion of Channel and Spatial Attention for Facial Expression Recognition 融合通道和空间注意力的高效密集网络模型用于面部表情识别
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0010
Dương Thăng Long
Facial Expression Recognition (FER) is a fundamental component of human communication with numerous potential applications. Convolutional neural networks, particularly those employing advanced architectures like Densely connected Networks (DenseNets), have demonstrated remarkable success in FER. Additionally, attention mechanisms have been harnessed to enhance feature extraction by focusing on critical image regions. This can induce more efficient models for image classification. This study introduces an efficient DenseNet model that utilizes a fusion of channel and spatial attention for FER, which capitalizes on the respective strengths to enhance feature extraction while also reducing model complexity in terms of parameters. The model is evaluated across five popular datasets: JAFFE, CK+, OuluCASIA, KDEF, and RAF-DB. The results indicate an accuracy of at least 99.94% for four lab-controlled datasets, which surpasses the accuracy of all other compared methods. Furthermore, the model demonstrates an accuracy of 83.18% with training from scratch on the real-world RAF-DB dataset.
面部表情识别(FER)是人类交流的一个基本组成部分,具有众多潜在应用。卷积神经网络,尤其是采用密集连接网络(DenseNets)等先进架构的卷积神经网络,在面部表情识别方面取得了显著的成功。此外,人们还利用注意力机制,通过聚焦关键图像区域来增强特征提取。这可以为图像分类提供更高效的模型。本研究介绍了一种高效的 DenseNet 模型,该模型将信道注意力和空间注意力融合用于 FER,利用各自的优势加强特征提取,同时降低模型参数的复杂性。该模型在五个流行的数据集上进行了评估:JAFFE、CK+、OuluCASIA、KDEF 和 RAF-DB。结果表明,四个实验室控制数据集的准确率至少为 99.94%,超过了所有其他比较方法的准确率。此外,该模型在真实世界 RAF-DB 数据集上从头开始训练,准确率达到 83.18%。
{"title":"Efficient DenseNet Model with Fusion of Channel and Spatial Attention for Facial Expression Recognition","authors":"Dương Thăng Long","doi":"10.2478/cait-2024-0010","DOIUrl":"https://doi.org/10.2478/cait-2024-0010","url":null,"abstract":"\u0000 Facial Expression Recognition (FER) is a fundamental component of human communication with numerous potential applications. Convolutional neural networks, particularly those employing advanced architectures like Densely connected Networks (DenseNets), have demonstrated remarkable success in FER. Additionally, attention mechanisms have been harnessed to enhance feature extraction by focusing on critical image regions. This can induce more efficient models for image classification. This study introduces an efficient DenseNet model that utilizes a fusion of channel and spatial attention for FER, which capitalizes on the respective strengths to enhance feature extraction while also reducing model complexity in terms of parameters. The model is evaluated across five popular datasets: JAFFE, CK+, OuluCASIA, KDEF, and RAF-DB. The results indicate an accuracy of at least 99.94% for four lab-controlled datasets, which surpasses the accuracy of all other compared methods. Furthermore, the model demonstrates an accuracy of 83.18% with training from scratch on the real-world RAF-DB dataset.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140273357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Lightweight Cryptographic Algorithms in IoT 物联网中的轻量级加密算法概览
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0002
Suryateja Satya Pericherla, K. Venkata Rao
The Internet of Things (IoT) will soon penetrate every aspect of human life. Several threats and vulnerabilities are present due to the different devices and protocols used in an IoT system. Conventional cryptographic primitives or algorithms cannot run efficiently and are unsuitable for resource-constrained devices in IoT. Hence, a recently developed area of cryptography, known as lightweight cryptography, has been introduced, and over the years, numerous lightweight algorithms have been suggested. This paper gives a comprehensive overview of the lightweight cryptography field and considers various popular lightweight cryptographic algorithms proposed and evaluated over the past years for analysis. Different taxonomies of the algorithms and other associated concepts were also provided, which helps new researchers gain a quick overview of the field. Finally, a set of 11 selected ultra-lightweight algorithms are analyzed based on the software implementations, and their evaluation is carried out using different metrics.
物联网(IoT)将很快渗透到人类生活的方方面面。由于物联网系统中使用的设备和协议各不相同,因此存在多种威胁和漏洞。传统的加密原语或算法无法高效运行,也不适合物联网中资源受限的设备。因此,最近开发的一个密码学领域被称为轻量级密码学,多年来,人们提出了许多轻量级算法。本文全面概述了轻量级密码学领域,并对过去几年中提出和评估的各种流行轻量级密码学算法进行了分析。本文还提供了算法的不同分类法和其他相关概念,有助于新研究人员快速了解该领域的概况。最后,根据软件实现分析了一组 11 种选定的超轻量级算法,并使用不同的指标对其进行了评估。
{"title":"A Survey on Lightweight Cryptographic Algorithms in IoT","authors":"Suryateja Satya Pericherla, K. Venkata Rao","doi":"10.2478/cait-2024-0002","DOIUrl":"https://doi.org/10.2478/cait-2024-0002","url":null,"abstract":"\u0000 The Internet of Things (IoT) will soon penetrate every aspect of human life. Several threats and vulnerabilities are present due to the different devices and protocols used in an IoT system. Conventional cryptographic primitives or algorithms cannot run efficiently and are unsuitable for resource-constrained devices in IoT. Hence, a recently developed area of cryptography, known as lightweight cryptography, has been introduced, and over the years, numerous lightweight algorithms have been suggested. This paper gives a comprehensive overview of the lightweight cryptography field and considers various popular lightweight cryptographic algorithms proposed and evaluated over the past years for analysis. Different taxonomies of the algorithms and other associated concepts were also provided, which helps new researchers gain a quick overview of the field. Finally, a set of 11 selected ultra-lightweight algorithms are analyzed based on the software implementations, and their evaluation is carried out using different metrics.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging Machine Learning for Fraudulent Social Media Profile Detection 利用机器学习检测欺诈性社交媒体资料
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0007
Soorya Ramdas, Neenu N. T. Agnes
Fake social media profiles are responsible for various cyber-attacks, spreading fake news, identity theft, business and payment fraud, abuse, and more. This paper aims to explore the potential of Machine Learning in detecting fake social media profiles by employing various Machine Learning algorithms, including the Dummy Classifier, Support Vector Classifier (SVC), Support Vector Classifier (SVC) kernels, Random Forest classifier, Random Forest Regressor, Decision Tree Classifier, Decision Tree Regressor, MultiLayer Perceptron classifier (MLP), MultiLayer Perceptron (MLP) Regressor, Naïve Bayes classifier, and Logistic Regression. For a comprehensive evaluation of the performance and accuracy of different models in detecting fake social media profiles, it is essential to consider confusion matrices, sampling techniques, and various metric calculations. Additionally, incorporating extended computations such as root mean squared error, mean absolute error, mean squared error and cross-validation accuracy can further enhance the overall performance of the models.
虚假社交媒体资料是各种网络攻击、传播假新闻、身份盗用、商业和支付欺诈、滥用等行为的罪魁祸首。本文旨在通过采用各种机器学习算法,探索机器学习在检测虚假社交媒体资料方面的潜力,这些算法包括假分类器、支持向量分类器(SVC)、支持向量分类器(SVC)内核、随机森林分类器、随机森林回归器、决策树分类器、决策树回归器、多层感知器分类器(MLP)、多层感知器(MLP)回归器、奈夫贝叶斯分类器和逻辑回归。为了全面评估不同模型在检测虚假社交媒体资料方面的性能和准确性,必须考虑混淆矩阵、采样技术和各种度量计算。此外,结合均方根误差、平均绝对误差、均方误差和交叉验证准确性等扩展计算,可以进一步提高模型的整体性能。
{"title":"Leveraging Machine Learning for Fraudulent Social Media Profile Detection","authors":"Soorya Ramdas, Neenu N. T. Agnes","doi":"10.2478/cait-2024-0007","DOIUrl":"https://doi.org/10.2478/cait-2024-0007","url":null,"abstract":"\u0000 Fake social media profiles are responsible for various cyber-attacks, spreading fake news, identity theft, business and payment fraud, abuse, and more. This paper aims to explore the potential of Machine Learning in detecting fake social media profiles by employing various Machine Learning algorithms, including the Dummy Classifier, Support Vector Classifier (SVC), Support Vector Classifier (SVC) kernels, Random Forest classifier, Random Forest Regressor, Decision Tree Classifier, Decision Tree Regressor, MultiLayer Perceptron classifier (MLP), MultiLayer Perceptron (MLP) Regressor, Naïve Bayes classifier, and Logistic Regression. For a comprehensive evaluation of the performance and accuracy of different models in detecting fake social media profiles, it is essential to consider confusion matrices, sampling techniques, and various metric calculations. Additionally, incorporating extended computations such as root mean squared error, mean absolute error, mean squared error and cross-validation accuracy can further enhance the overall performance of the models.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140279658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management 电子健康记录管理区块链方案现状综述
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0003
Jayapriya Jayabalan, N. Jeyanthi
In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a patient has to visit another hospital there is no secure way for hospitals to communicate and share medical records. Hence, people are always asked to redo tests that have been done earlier in different hospitals. This leads to monetary, time, and resource loss. Even if the organizations are ready to share data, there are no secure methods for sharing without disturbing data privacy, integrity, and confidentiality. When health data are stored or transferred via unsecured means there are always possibilities for adversaries to initiate an attack and modify them. To overcome these hurdles and secure the storage and sharing of health records, blockchain, a very disruptive technology can be integrated with the healthcare system for EHR management. This paper surveys recent works on the distributed, decentralized systems for EHR storage in healthcare organizations.
在当今世界,电子病历(EHR)被高度隔离,只能在患者所属的机构内部使用。如果病人要去另一家医院就诊,医院没有安全的方式来沟通和共享医疗记录。因此,人们总是被要求重新做之前在不同医院做过的检查。这将导致金钱、时间和资源的损失。即使各机构已准备好共享数据,也没有安全的方法在不影响数据隐私、完整性和保密性的情况下共享数据。当健康数据通过不安全的方式存储或传输时,对手总是有可能发起攻击并修改这些数据。为了克服这些障碍,确保健康记录的存储和共享安全,可以将区块链这一极具颠覆性的技术与医疗保健系统相结合,用于电子健康记录管理。本文对医疗机构中用于电子健康记录存储的分布式、去中心化系统的最新研究成果进行了调查。
{"title":"A Review on State-of-Art Blockchain Schemes for Electronic Health Records Management","authors":"Jayapriya Jayabalan, N. Jeyanthi","doi":"10.2478/cait-2024-0003","DOIUrl":"https://doi.org/10.2478/cait-2024-0003","url":null,"abstract":"\u0000 In today’s world, Electronic Health Records (EHR) are highly segregated and available only within the organization with which the patient is associated. If a patient has to visit another hospital there is no secure way for hospitals to communicate and share medical records. Hence, people are always asked to redo tests that have been done earlier in different hospitals. This leads to monetary, time, and resource loss. Even if the organizations are ready to share data, there are no secure methods for sharing without disturbing data privacy, integrity, and confidentiality. When health data are stored or transferred via unsecured means there are always possibilities for adversaries to initiate an attack and modify them. To overcome these hurdles and secure the storage and sharing of health records, blockchain, a very disruptive technology can be integrated with the healthcare system for EHR management. This paper surveys recent works on the distributed, decentralized systems for EHR storage in healthcare organizations.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140270818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integration Approaches for Heterogeneous Big Data: A Survey 异构大数据的集成方法:调查
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0001
W. Alma’aitah, Addy Quraan, Fatima N. AL-Aswadi, Rami Suleiman Alkhawaldeh, M. Alazab, A. Awajan
Modern organizations are currently wrestling with strenuous challenges relating to the management of heterogeneous big data, which combines data from various sources and varies in type, format, and content. The heterogeneity of the data makes it difficult to analyze and integrate. This paper presents big data warehousing and federation as viable approaches for handling big data complexity. It discusses their respective advantages and disadvantages as strategies for integrating, managing, and analyzing heterogeneous big data. Data integration is crucial for organizations to manipulate organizational data. Organizations have to weigh the benefits and drawbacks of both data integration approaches to identify the one that responds to their organizational needs and objectives. This paper aw well presents an adequate analysis of these two data integration approaches and identifies challenges associated with the selection of either approach. Thorough understanding and awareness of the merits and demits of these two approaches are crucial for practitioners, researchers, and decision-makers to select the approach that enables them to handle complex data, boost their decision-making process, and best align with their needs and expectations.
现代企业目前正面临着与异构大数据管理有关的严峻挑战,这些数据来自不同来源,在类型、格式和内容上各不相同。数据的异构性使其难以分析和整合。本文将大数据仓库和联盟作为处理大数据复杂性的可行方法。本文讨论了它们作为整合、管理和分析异构大数据的策略各自的优缺点。数据整合对企业处理组织数据至关重要。组织必须权衡两种数据整合方法的利弊,以确定哪一种能满足组织的需求和目标。本文充分分析了这两种数据整合方法,并指出了选择其中一种方法所面临的挑战。充分理解和认识这两种方法的优缺点对于从业人员、研究人员和决策者来说至关重要,有助于他们选择能够处理复杂数据、促进决策过程并最符合其需求和期望的方法。
{"title":"Integration Approaches for Heterogeneous Big Data: A Survey","authors":"W. Alma’aitah, Addy Quraan, Fatima N. AL-Aswadi, Rami Suleiman Alkhawaldeh, M. Alazab, A. Awajan","doi":"10.2478/cait-2024-0001","DOIUrl":"https://doi.org/10.2478/cait-2024-0001","url":null,"abstract":"\u0000 Modern organizations are currently wrestling with strenuous challenges relating to the management of heterogeneous big data, which combines data from various sources and varies in type, format, and content. The heterogeneity of the data makes it difficult to analyze and integrate. This paper presents big data warehousing and federation as viable approaches for handling big data complexity. It discusses their respective advantages and disadvantages as strategies for integrating, managing, and analyzing heterogeneous big data. Data integration is crucial for organizations to manipulate organizational data. Organizations have to weigh the benefits and drawbacks of both data integration approaches to identify the one that responds to their organizational needs and objectives. This paper aw well presents an adequate analysis of these two data integration approaches and identifies challenges associated with the selection of either approach. Thorough understanding and awareness of the merits and demits of these two approaches are crucial for practitioners, researchers, and decision-makers to select the approach that enables them to handle complex data, boost their decision-making process, and best align with their needs and expectations.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140273302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Degradation Recoloring Deutan CVD Image from Block SVD Watermark 利用块 SVD 水印对 Deutan CVD 图像进行降解再溶解
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0008
Z. Milivojevic, B. Prlincevic, Milan Cekić, Dijana Kostić
People with Color Vision Deficiency (CVD), which arises as a deformation of the M cones in the eye, cannot detect the color green in the image (deutan anomaly). In the first part of the paper, deutan anomalous is described. After that, the image recoloring algorithm, which enables Deutan CVD people to see a wider spectrum in images, is described. Then, the effect of the Recoloring algorithm on images with inserted watermark is analyzed. An experiment has been carried out, in which the effect of the Recoloring algorithm on the quality of extracted watermark and Recoloring image is studied. In addition, the robustness of the inserted watermark in relation to spatial transformations (rotation, scaling) and compression algorithms has been tested. By applying objective measures and visual inspection of the quality of extracted watermark and recoloring image, the optimal insertion factor α is determined. All results are presented in the form of pictures, tables and graphics.
色觉缺陷(CVD)是由眼睛中的 M 锥体变形引起的,色觉缺陷患者无法检测到图像中的绿色(deutan 异常)。本文的第一部分介绍了 "deutan 异常"。然后,介绍了图像再着色算法,该算法可使德坦 CVD 患者在图像中看到更宽的光谱。然后,分析了重调色算法对插入水印的图像的影响。还进行了一项实验,研究重新加色算法对提取的水印和重新加色图像质量的影响。此外,还测试了插入水印对空间变换(旋转、缩放)和压缩算法的稳健性。通过对提取的水印和重新调色图像的质量进行客观测量和目测,确定了最佳插入因子 α。所有结果均以图片、表格和图形的形式呈现。
{"title":"Degradation Recoloring Deutan CVD Image from Block SVD Watermark","authors":"Z. Milivojevic, B. Prlincevic, Milan Cekić, Dijana Kostić","doi":"10.2478/cait-2024-0008","DOIUrl":"https://doi.org/10.2478/cait-2024-0008","url":null,"abstract":"\u0000 People with Color Vision Deficiency (CVD), which arises as a deformation of the M cones in the eye, cannot detect the color green in the image (deutan anomaly). In the first part of the paper, deutan anomalous is described. After that, the image recoloring algorithm, which enables Deutan CVD people to see a wider spectrum in images, is described. Then, the effect of the Recoloring algorithm on images with inserted watermark is analyzed. An experiment has been carried out, in which the effect of the Recoloring algorithm on the quality of extracted watermark and Recoloring image is studied. In addition, the robustness of the inserted watermark in relation to spatial transformations (rotation, scaling) and compression algorithms has been tested. By applying objective measures and visual inspection of the quality of extracted watermark and recoloring image, the optimal insertion factor α is determined. All results are presented in the form of pictures, tables and graphics.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140271669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hybrid Edge Detection Methods in Image Steganography for High Embedding Capacity 高嵌入能力图像隐写术中的混合边缘检测方法
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0009
Marwah Habiban, Fatima R. Hamade, Nadia A. Mohsin
In this research, we propose two new image steganography techniques focusing on increasing image-embedding capacity. The methods will encrypt and hide secret information in the edge area. We utilized two hybrid methods for the edge detection of the images. The first method combines the Laplacian of Gaussian (LoG) with the wavelet transform algorithm and the second method mixes the LOG and Canny. The Combining was performed using addWeighted. The text message will be encrypted using the GIFT cipher method for further security and low computation. For the effectiveness evaluation of the proposed method, various evaluation metrics were used such as embedding capacity, PSNR, MSE, and SSIM. The obtained results indicate that the proposed method has a greater embedding capacity in comparison with other methods, while still maintaining high levels of imperceptibility in the cover image.
在这项研究中,我们提出了两种新的图像隐写技术,重点是提高图像嵌入能力。这些方法将在边缘区域加密和隐藏秘密信息。我们采用了两种混合方法来进行图像边缘检测。第一种方法将高斯拉普拉斯(LoG)与小波变换算法相结合,第二种方法将 LOG 与 Canny 算法相结合。组合使用 addWeighted 进行。文本信息将使用 GIFT 密码方法进行加密,以提高安全性和降低计算量。为了评估所提方法的有效性,使用了各种评估指标,如嵌入容量、PSNR、MSE 和 SSIM。结果表明,与其他方法相比,所提出的方法具有更大的嵌入容量,同时还能在覆盖图像中保持高水平的不可感知性。
{"title":"Hybrid Edge Detection Methods in Image Steganography for High Embedding Capacity","authors":"Marwah Habiban, Fatima R. Hamade, Nadia A. Mohsin","doi":"10.2478/cait-2024-0009","DOIUrl":"https://doi.org/10.2478/cait-2024-0009","url":null,"abstract":"\u0000 In this research, we propose two new image steganography techniques focusing on increasing image-embedding capacity. The methods will encrypt and hide secret information in the edge area. We utilized two hybrid methods for the edge detection of the images. The first method combines the Laplacian of Gaussian (LoG) with the wavelet transform algorithm and the second method mixes the LOG and Canny. The Combining was performed using addWeighted. The text message will be encrypted using the GIFT cipher method for further security and low computation. For the effectiveness evaluation of the proposed method, various evaluation metrics were used such as embedding capacity, PSNR, MSE, and SSIM. The obtained results indicate that the proposed method has a greater embedding capacity in comparison with other methods, while still maintaining high levels of imperceptibility in the cover image.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140273808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Memorized Rapidly Exploring Random Tree Optimization (MRRTO): An Enhanced Algorithm for Robot Path Planning 记忆快速探索随机树优化(MRRTO):机器人路径规划的增强算法
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0011
Dena Kadhim Muhsen, Ahmed T. Sadiq, Firas Abdulrazzaq Raheem
With the advancement of the robotics world, many path-planning algorithms have been proposed. One of the important algorithms is the Rapidly Exploring Random Tree (RRT) but with the drawback of not guaranteeing the optimal path. This paper solves this problem by proposing a Memorized RRT Optimization Algorithm (MRRTO Algorithm) using memory as an optimization step. The algorithm obtains a single path from the start point, and another from the target point to store only the last visited new node. The method for computing the nearest node depends on the position, when a new node is added, the RRT function checks if there is another node closer to the new node rather than that is closer to the goal point. Simulation results with different environments show that the MRRTO outperforms the original RRT Algorithm, graph algorithms, and metaheuristic algorithms in terms of reducing time consumption, path length, and number of nodes used.
随着机器人技术的发展,人们提出了许多路径规划算法。其中一种重要的算法是快速探索随机树(RRT),但其缺点是不能保证最优路径。为了解决这个问题,本文提出了一种记忆化 RRT 优化算法(MRRTO 算法),将记忆作为优化步骤。该算法从起点获取一条路径,从目标点获取另一条路径,只存储最后访问的新节点。计算最近节点的方法取决于位置,当添加一个新节点时,RRT 函数会检查是否有另一个节点离新节点更近,而不是离目标点更近。不同环境下的仿真结果表明,MRRTO 在减少时间消耗、路径长度和使用节点数量方面优于原始 RRT 算法、图算法和元启发式算法。
{"title":"Memorized Rapidly Exploring Random Tree Optimization (MRRTO): An Enhanced Algorithm for Robot Path Planning","authors":"Dena Kadhim Muhsen, Ahmed T. Sadiq, Firas Abdulrazzaq Raheem","doi":"10.2478/cait-2024-0011","DOIUrl":"https://doi.org/10.2478/cait-2024-0011","url":null,"abstract":"\u0000 With the advancement of the robotics world, many path-planning algorithms have been proposed. One of the important algorithms is the Rapidly Exploring Random Tree (RRT) but with the drawback of not guaranteeing the optimal path. This paper solves this problem by proposing a Memorized RRT Optimization Algorithm (MRRTO Algorithm) using memory as an optimization step. The algorithm obtains a single path from the start point, and another from the target point to store only the last visited new node. The method for computing the nearest node depends on the position, when a new node is added, the RRT function checks if there is another node closer to the new node rather than that is closer to the goal point. Simulation results with different environments show that the MRRTO outperforms the original RRT Algorithm, graph algorithms, and metaheuristic algorithms in terms of reducing time consumption, path length, and number of nodes used.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140279160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Success Factors for Conducting Software-Process Improvement in Web-Based Software Projects 在基于网络的软件项目中进行软件流程改进的成功因素
IF 1.2 Q2 Computer Science Pub Date : 2024-03-01 DOI: 10.2478/cait-2024-0004
Thamer Al-Rousan
Continuous Software Process Improvement (SPI) is essential for achieving and maintaining high-quality software products. Web-based software enterprises, comprising a substantial proportion of global businesses and forming a cornerstone of the world’s industrial economy, are actively pursuing SPI initiatives. While these companies recognize the critical role of process enhancement in achieving success, they face challenges in implementing SPI due to the distinctive characteristics of Web-based software projects. This study aims to identify, validate, and prioritize the sustainability success factors that positively influence SPI implementation efforts in Web-based software projects. Data have been meticulously gathered through a systematic literature review and quantitatively through a survey questionnaire. The findings of this research empower Web-based software enterprises to refine their management strategies for evaluating and bolstering SPI practices within the Web-based software projects domain.
持续的软件过程改进(SPI)对于实现和保持高质量的软件产品至关重要。基于网络的软件企业在全球企业中占有相当大的比例,是世界工业经济的基石,它们正在积极推行 SPI 计划。虽然这些企业认识到流程改进对取得成功的关键作用,但由于网络软件项目的独特性,它们在实施 SPI 时面临着挑战。本研究旨在识别、验证和优先考虑对网络软件项目实施 SPI 有积极影响的可持续发展成功因素。本研究通过系统的文献综述和定量的调查问卷精心收集数据。研究结果将帮助网络软件企业完善其管理策略,以评估和加强网络软件项目领域的 SPI 实践。
{"title":"Success Factors for Conducting Software-Process Improvement in Web-Based Software Projects","authors":"Thamer Al-Rousan","doi":"10.2478/cait-2024-0004","DOIUrl":"https://doi.org/10.2478/cait-2024-0004","url":null,"abstract":"\u0000 Continuous Software Process Improvement (SPI) is essential for achieving and maintaining high-quality software products. Web-based software enterprises, comprising a substantial proportion of global businesses and forming a cornerstone of the world’s industrial economy, are actively pursuing SPI initiatives. While these companies recognize the critical role of process enhancement in achieving success, they face challenges in implementing SPI due to the distinctive characteristics of Web-based software projects. This study aims to identify, validate, and prioritize the sustainability success factors that positively influence SPI implementation efforts in Web-based software projects. Data have been meticulously gathered through a systematic literature review and quantitatively through a survey questionnaire. The findings of this research empower Web-based software enterprises to refine their management strategies for evaluating and bolstering SPI practices within the Web-based software projects domain.","PeriodicalId":45562,"journal":{"name":"Cybernetics and Information Technologies","volume":null,"pages":null},"PeriodicalIF":1.2,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140280552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cybernetics and Information Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1