首页 > 最新文献

Computers最新文献

英文 中文
Smart Contract-Based Access Control Framework for Internet of Things Devices 基于智能合约的物联网设备访问控制框架
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-20 DOI: 10.3390/computers12110240
Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, Mohammed Nasir Uddin, Md. Ashraf Uddin, Ansam Khraisat, Iqbal Gondal, Wahida Ferdose Urmi, Md. Alamin Talukder
The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. This paper proposes a decentralized access control framework based on smart contracts with three parts: initialization, an access control protocol, and an inspection. Smart contracts are used in the proposed framework to store access control policies safely on the blockchain. The framework also penalizes users for attempting unauthorized access to the IoT resources. The smart contract was developed using Remix and deployed on the Ropsten Ethereum testnet. We analyze the performance of the smart contract-based access policies based on the gas consumption of blockchain transactions. Further, we analyze the system’s security, usability, scalability, and interoperability performance.
最近,物联网(IoT)因其多样化的物联网应用而引起了研究人员的极大兴趣。然而,物联网系统会遇到更多的安全和隐私威胁。由于网络拓扑结构复杂,开发高效的物联网系统具有挑战性。要确保物联网中的用户隐私,就必须进行有效的访问控制。传统的访问控制方法不适合物联网系统,因为大多数传统的访问控制方法都是为集中式系统设计的。本文提出了一种基于智能合约的去中心化访问控制框架,包括初始化、访问控制协议和检查三个部分。智能合约用于将访问控制策略安全地存储在区块链上。该框架还对试图未经授权访问物联网资源的用户进行惩罚。智能合约使用 Remix 开发,并部署在 Ropsten Ethereum 测试网上。我们根据区块链交易的耗气量分析了基于智能合约的访问策略的性能。此外,我们还分析了系统的安全性、可用性、可扩展性和互操作性。
{"title":"Smart Contract-Based Access Control Framework for Internet of Things Devices","authors":"Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, Mohammed Nasir Uddin, Md. Ashraf Uddin, Ansam Khraisat, Iqbal Gondal, Wahida Ferdose Urmi, Md. Alamin Talukder","doi":"10.3390/computers12110240","DOIUrl":"https://doi.org/10.3390/computers12110240","url":null,"abstract":"The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. This paper proposes a decentralized access control framework based on smart contracts with three parts: initialization, an access control protocol, and an inspection. Smart contracts are used in the proposed framework to store access control policies safely on the blockchain. The framework also penalizes users for attempting unauthorized access to the IoT resources. The smart contract was developed using Remix and deployed on the Ropsten Ethereum testnet. We analyze the performance of the smart contract-based access policies based on the gas consumption of blockchain transactions. Further, we analyze the system’s security, usability, scalability, and interoperability performance.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pólya’s Methodology for Strengthening Problem-Solving Skills in Differential Equations: A Case Study in Colombia Pólya 加强微分方程解题能力的方法:哥伦比亚案例研究
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-18 DOI: 10.3390/computers12110239
Marcos Chacón-Castro, J. Buele, Ana Dulcelina López-Rueda, Janio Jadán-Guerrero
The formation of students is integral to education. Strengthening critical thinking and reasoning are essential for the professionals that today’s world needs. For this reason, the authors of this article applied Pólya’s methodology, an initiative based on observing students’ difficulties when facing mathematical problems. The present study is part of the qualitative and quantitative research paradigm and the action research methodology. In this study, the inquiry process was inductive, the sample is non-probabilistic, and the data interpretation strategy is descriptive. As a case study, six students were enrolled onto a differential equations course at the Universidad Autónoma de Bucaramanga. A didactic process was designed using information and communication technologies (ICTs) in five sequences that address first-order differential equation applications. As a result of the pedagogical intervention, problem-solving skills were strengthened. All this was based on asking the right questions, repeated reading, identifying and defining variables, mathematization, communication, and decomposing the problem into subproblems. This research study seeks to set a precedent in the Latin American region that will be the basis for future studies.
培养学生是教育不可或缺的一部分。加强批判性思维和推理能力对于培养当今世界所需的专业人才至关重要。因此,本文作者采用了 Pólya 的方法,即基于观察学生在面对数学问题时遇到的困难的举措。本研究属于定性和定量研究范式以及行动研究方法的一部分。在本研究中,探究过程是归纳式的,样本是非概率性的,数据解释策略是描述性的。作为案例研究,布卡拉曼加自治大学的微分方程课程招收了六名学生。设计了一个使用信息和通信技术(ICTs)的教学过程,分为五个序列,涉及一阶微分方程的应用。通过教学干预,学生解决问题的能力得到了提高。所有这一切都基于提出正确的问题、反复阅读、确定和定义变量、数学化、交流以及将问题分解为子问题。这项研究力求在拉丁美洲地区开创先例,为今后的研究奠定基础。
{"title":"Pólya’s Methodology for Strengthening Problem-Solving Skills in Differential Equations: A Case Study in Colombia","authors":"Marcos Chacón-Castro, J. Buele, Ana Dulcelina López-Rueda, Janio Jadán-Guerrero","doi":"10.3390/computers12110239","DOIUrl":"https://doi.org/10.3390/computers12110239","url":null,"abstract":"The formation of students is integral to education. Strengthening critical thinking and reasoning are essential for the professionals that today’s world needs. For this reason, the authors of this article applied Pólya’s methodology, an initiative based on observing students’ difficulties when facing mathematical problems. The present study is part of the qualitative and quantitative research paradigm and the action research methodology. In this study, the inquiry process was inductive, the sample is non-probabilistic, and the data interpretation strategy is descriptive. As a case study, six students were enrolled onto a differential equations course at the Universidad Autónoma de Bucaramanga. A didactic process was designed using information and communication technologies (ICTs) in five sequences that address first-order differential equation applications. As a result of the pedagogical intervention, problem-solving skills were strengthened. All this was based on asking the right questions, repeated reading, identifying and defining variables, mathematization, communication, and decomposing the problem into subproblems. This research study seeks to set a precedent in the Latin American region that will be the basis for future studies.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"164 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ontology Development for Detecting Complex Events in Stream Processing: Use Case of Air Quality Monitoring 用于检测流处理中复杂事件的本体论开发:空气质量监测用例
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-16 DOI: 10.3390/computers12110238
Rose Yemson, Sohag Kabir, D. Thakker, Savas Konur
With the increasing amount of data collected by IoT devices, detecting complex events in real-time has become a challenging task. To overcome this challenge, we propose the utilisation of semantic web technologies to create ontologies that structure background knowledge about the complex event-processing (CEP) framework in a way that machines can easily comprehend. Our ontology focuses on Indoor Air Quality (IAQ) data, asthma patients’ activities and symptoms, and how IAQ can be related to asthma symptoms and daily activities. Our goal is to detect complex events within the stream of events and accurately determine pollution levels and symptoms of asthma attacks based on daily activities. We conducted a thorough testing of our enhanced CEP framework with a real dataset, and the results indicate that it outperforms traditional CEP across various evaluation metrics such as accuracy, precision, recall, and F1-score.
随着物联网设备收集的数据量不断增加,实时检测复杂事件已成为一项具有挑战性的任务。为了克服这一挑战,我们建议利用语义网技术创建本体,以机器可以轻松理解的方式构建复杂事件处理(CEP)框架的背景知识。我们的本体侧重于室内空气质量(IAQ)数据、哮喘患者的活动和症状,以及 IAQ 如何与哮喘症状和日常活动相关联。我们的目标是检测事件流中的复杂事件,并根据日常活动准确判断污染水平和哮喘发作症状。我们利用真实数据集对增强型 CEP 框架进行了全面测试,结果表明该框架在准确率、精确度、召回率和 F1 分数等各种评价指标上都优于传统 CEP。
{"title":"Ontology Development for Detecting Complex Events in Stream Processing: Use Case of Air Quality Monitoring","authors":"Rose Yemson, Sohag Kabir, D. Thakker, Savas Konur","doi":"10.3390/computers12110238","DOIUrl":"https://doi.org/10.3390/computers12110238","url":null,"abstract":"With the increasing amount of data collected by IoT devices, detecting complex events in real-time has become a challenging task. To overcome this challenge, we propose the utilisation of semantic web technologies to create ontologies that structure background knowledge about the complex event-processing (CEP) framework in a way that machines can easily comprehend. Our ontology focuses on Indoor Air Quality (IAQ) data, asthma patients’ activities and symptoms, and how IAQ can be related to asthma symptoms and daily activities. Our goal is to detect complex events within the stream of events and accurately determine pollution levels and symptoms of asthma attacks based on daily activities. We conducted a thorough testing of our enhanced CEP framework with a real dataset, and the results indicate that it outperforms traditional CEP across various evaluation metrics such as accuracy, precision, recall, and F1-score.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"8 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139267412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mapping the Evolution of Cybernetics: A Bibliometric Perspective 绘制控制论的演变图:文献计量学视角
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-16 DOI: 10.3390/computers12110237
Bianca Cibu, Camelia Delcea, Adrian Domenteanu, Gabriel Dumitrescu
In this study, we undertake a comprehensive bibliometric analysis of the cybernetics research field. We compile a dataset of 4856 papers from the ISI Web of Science database spanning 1975–2022, employing keywords related to cybernetics. Our findings reveal an annual growth rate of 7.56% in cybernetics research over this period, indicating sustained scholarly interest. By examining the annual progression of scientific production, we have identified three distinct periods characterized by significant disruptions in yearly publication trends. These disruptions have been thoroughly investigated within the paper, utilizing a longitudinal analysis of thematic evolution. We also identify emerging research trends through keyword analysis. Furthermore, we investigate collaborative networks among authors, their institutional affiliations, and global representation to elucidate the dissemination of cybernetics research. Employing n-gram analysis, we uncover diverse applications of cybernetics in fields such as computer science, information science, social sciences, sustainable development, supply chain, knowledge management, system dynamics, and medicine. The study contributes to enhancing the understanding of the evolving cybernetics landscape. Moreover, the conducted analysis underscores the versatile applicability across various academic and practical domains associated with the cybernetics field.
在本研究中,我们对控制论研究领域进行了全面的文献计量分析。我们从 ISI Web of Science 数据库中收集了 1975-2022 年间的 4856 篇论文,并使用了与控制论相关的关键词。我们的研究结果表明,在此期间,控制论研究的年增长率为 7.56%,表明学术界对控制论的兴趣持续不减。通过研究科学成果的年增长率,我们发现有三个不同时期的年出版趋势出现了明显的中断。本文通过对主题演变的纵向分析,对这些中断进行了深入研究。我们还通过关键词分析确定了新出现的研究趋势。此外,我们还调查了作者之间的合作网络、他们的机构隶属关系和全球代表性,以阐明控制论研究的传播情况。通过 n-gram 分析,我们发现了控制论在计算机科学、信息科学、社会科学、可持续发展、供应链、知识管理、系统动力学和医学等领域的各种应用。这项研究有助于加深对不断发展的控制论领域的了解。此外,所进行的分析强调了控制论在与控制论相关的各个学术和实践领域的广泛适用性。
{"title":"Mapping the Evolution of Cybernetics: A Bibliometric Perspective","authors":"Bianca Cibu, Camelia Delcea, Adrian Domenteanu, Gabriel Dumitrescu","doi":"10.3390/computers12110237","DOIUrl":"https://doi.org/10.3390/computers12110237","url":null,"abstract":"In this study, we undertake a comprehensive bibliometric analysis of the cybernetics research field. We compile a dataset of 4856 papers from the ISI Web of Science database spanning 1975–2022, employing keywords related to cybernetics. Our findings reveal an annual growth rate of 7.56% in cybernetics research over this period, indicating sustained scholarly interest. By examining the annual progression of scientific production, we have identified three distinct periods characterized by significant disruptions in yearly publication trends. These disruptions have been thoroughly investigated within the paper, utilizing a longitudinal analysis of thematic evolution. We also identify emerging research trends through keyword analysis. Furthermore, we investigate collaborative networks among authors, their institutional affiliations, and global representation to elucidate the dissemination of cybernetics research. Employing n-gram analysis, we uncover diverse applications of cybernetics in fields such as computer science, information science, social sciences, sustainable development, supply chain, knowledge management, system dynamics, and medicine. The study contributes to enhancing the understanding of the evolving cybernetics landscape. Moreover, the conducted analysis underscores the versatile applicability across various academic and practical domains associated with the cybernetics field.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"6 2","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139269207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design Recommendations for Immersive Virtual Reality Application for English Learning: A Systematic Review 沉浸式虚拟现实英语学习应用的设计建议:系统回顾
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-15 DOI: 10.3390/computers12110236
Jessica Rodrigues Esteves, Jorge C. S. Cardoso, B. Gonçalves
The growing popularity of immersive virtual reality (iVR) technologies has opened up new possibilities for learning English. In the literature, it is possible to find several studies focused on the design, development, and evaluation of immersive virtual reality applications. However, there are no studies that systematize design recommendations for immersive virtual reality applications for English learning. To fill this gap, we present a systematic review that aims to identify design recommendations for immersive virtual reality English learning applications. We searched the ACM Digital Library, ERIC, IEEE Xplore, Scopus, and Web of Science (1 January 2010 to April 2023) and found that 24 out of 847 articles met the inclusion criteria. We identified 18 categories of design considerations related to design and learning and a design process used to create iVR applications. We also identified existing trends related to universities, publications, devices, human senses, and development platforms. Finally, we addressed study limitations and future directions for designing iVR applications for English learning.
沉浸式虚拟现实(iVR)技术的日益普及为英语学习开辟了新的可能性。在文献中,可以找到一些关于沉浸式虚拟现实应用的设计、开发和评估的研究。然而,目前还没有任何研究对英语学习中沉浸式虚拟现实应用的设计建议进行系统化。为了填补这一空白,我们提交了一份系统性综述,旨在确定沉浸式虚拟现实英语学习应用的设计建议。我们检索了 ACM 数字图书馆、ERIC、IEEE Xplore、Scopus 和 Web of Science(2010 年 1 月 1 日至 2023 年 4 月),发现 847 篇文章中有 24 篇符合纳入标准。我们确定了与设计和学习相关的 18 类设计考虑因素,以及用于创建 iVR 应用程序的设计流程。我们还确定了与大学、出版物、设备、人类感官和开发平台相关的现有趋势。最后,我们讨论了研究的局限性以及为英语学习设计 iVR 应用程序的未来方向。
{"title":"Design Recommendations for Immersive Virtual Reality Application for English Learning: A Systematic Review","authors":"Jessica Rodrigues Esteves, Jorge C. S. Cardoso, B. Gonçalves","doi":"10.3390/computers12110236","DOIUrl":"https://doi.org/10.3390/computers12110236","url":null,"abstract":"The growing popularity of immersive virtual reality (iVR) technologies has opened up new possibilities for learning English. In the literature, it is possible to find several studies focused on the design, development, and evaluation of immersive virtual reality applications. However, there are no studies that systematize design recommendations for immersive virtual reality applications for English learning. To fill this gap, we present a systematic review that aims to identify design recommendations for immersive virtual reality English learning applications. We searched the ACM Digital Library, ERIC, IEEE Xplore, Scopus, and Web of Science (1 January 2010 to April 2023) and found that 24 out of 847 articles met the inclusion criteria. We identified 18 categories of design considerations related to design and learning and a design process used to create iVR applications. We also identified existing trends related to universities, publications, devices, human senses, and development platforms. Finally, we addressed study limitations and future directions for designing iVR applications for English learning.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"63 12","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners 利用多种漏洞扫描仪进行自动渗透测试,提高网络应用程序的安全性
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-15 DOI: 10.3390/computers12110235
Khaled Abdulghaffar, N. Elmrabit, Mehdi Yousefi
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives. This paper presents a novel framework designed to automate the operation of multiple Web Application Vulnerability Scanners (WAVS) within a single platform. The framework generates a combined vulnerabilities report using two algorithms: an automation algorithm and a novel combination algorithm that produces comprehensive lists of detected vulnerabilities. The framework leverages the capabilities of two web vulnerability scanners, Arachni and OWASP ZAP. The study begins with an extensive review of the existing scientific literature, focusing on open-source WAVS and exploring the OWASP 2021 guidelines. Following this, the framework development phase addresses the challenge of varying results obtained from different WAVS. This framework’s core objective is to combine the results of multiple WAVS into a consolidated vulnerability report, ultimately improving detection rates and overall security. The study demonstrates that the combined outcomes produced by the proposed framework exhibit greater accuracy compared to individual scanning results obtained from Arachni and OWASP ZAP. In summary, the study reveals that the Union List outperforms individual scanners, particularly regarding recall and F-measure. Consequently, adopting multiple vulnerability scanners is recommended as an effective strategy to bolster vulnerability detection in web applications.
渗透测试人员越来越多地采用多种渗透测试扫描仪来确保网络应用程序的稳健性。然而,许多扫描技术的一个显著局限是容易产生误报。本文介绍了一个新颖的框架,该框架设计用于在单一平台内自动运行多个网络应用程序漏洞扫描仪(WAVS)。该框架使用两种算法生成综合漏洞报告:一种是自动化算法,另一种是可生成综合检测到的漏洞列表的新型组合算法。该框架利用了 Arachni 和 OWASP ZAP 这两种网络漏洞扫描仪的功能。本研究首先对现有科学文献进行了广泛的回顾,重点关注开源 WAVS,并探讨了 OWASP 2021 指南。随后,框架开发阶段将解决不同 WAVS 得出的不同结果所带来的挑战。该框架的核心目标是将多个 WAVS 的结果合并为一份综合漏洞报告,最终提高检测率和整体安全性。研究表明,与 Arachni 和 OWASP ZAP 的单个扫描结果相比,拟议框架产生的综合结果具有更高的准确性。总之,研究表明,联合列表的性能优于单个扫描仪,特别是在召回率和 F 测量方面。因此,建议采用多种漏洞扫描程序作为加强网络应用程序漏洞检测的有效策略。
{"title":"Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners","authors":"Khaled Abdulghaffar, N. Elmrabit, Mehdi Yousefi","doi":"10.3390/computers12110235","DOIUrl":"https://doi.org/10.3390/computers12110235","url":null,"abstract":"Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives. This paper presents a novel framework designed to automate the operation of multiple Web Application Vulnerability Scanners (WAVS) within a single platform. The framework generates a combined vulnerabilities report using two algorithms: an automation algorithm and a novel combination algorithm that produces comprehensive lists of detected vulnerabilities. The framework leverages the capabilities of two web vulnerability scanners, Arachni and OWASP ZAP. The study begins with an extensive review of the existing scientific literature, focusing on open-source WAVS and exploring the OWASP 2021 guidelines. Following this, the framework development phase addresses the challenge of varying results obtained from different WAVS. This framework’s core objective is to combine the results of multiple WAVS into a consolidated vulnerability report, ultimately improving detection rates and overall security. The study demonstrates that the combined outcomes produced by the proposed framework exhibit greater accuracy compared to individual scanning results obtained from Arachni and OWASP ZAP. In summary, the study reveals that the Union List outperforms individual scanners, particularly regarding recall and F-measure. Consequently, adopting multiple vulnerability scanners is recommended as an effective strategy to bolster vulnerability detection in web applications.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"IA-19 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139270976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-Time Network Video Data Streaming in Digital Medicine 数字医学中的实时网络视频数据流
IF 2.8 Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-14 DOI: 10.3390/computers12110234
Miklós Vincze, B. Molnár, Miklós Kozlovszky
Today, the use of digital medicine is becoming more and more common in medicine. With the use of digital medicine, health data can be shared, processed, and visualized using computer algorithms. One of the problems currently facing digital medicine is the rapid transmission of large amounts of data and their appropriate visualization, even in 3D. Advances in technology offer the possibility to use new image processing, networking, and visualization solutions for the evaluation of medical samples. Because of the resolution of the samples, it is not uncommon that it takes a long time for them to be analyzed, processed, and shared. This is no different for 3D visualization. In order to be able to display digitalized medical samples in 3D at high resolution, a computer with computing power that is not necessarily available to doctors and researchers is needed. COVID-19 has shown that everyday work must continue even when there is a physical distance between the participants. Real-time network streaming can provide a solution to this, by creating a 3D environment that can be shared between doctors/researchers in which the sample being examined can be visualized. In order for this 3D environment to be available to everyone, it must also be usable on devices that do not have high computing capacity. Our goal was to design a general-purpose solution that would allow users to visualize large amounts of medical imaging data in 3D, regardless of the computational capacity of the device they are using. With the solution presented in this paper, our goal was to create a 3D environment for physicians and researchers to collaboratively evaluate 3D medical samples in an interdisciplinary way.
如今,数字医学在医学领域的应用越来越普遍。利用数字医学,可以通过计算机算法共享、处理和可视化健康数据。数字医学目前面临的问题之一是大量数据的快速传输和适当的可视化,甚至是三维可视化。技术的进步为使用新的图像处理、网络和可视化解决方案评估医疗样本提供了可能。由于样本分辨率的原因,样本的分析、处理和共享往往需要很长时间。三维可视化也不例外。为了能够以高分辨率显示数字化的三维医学样本,需要一台计算能力强大的计算机,而医生和研究人员并不一定具备这种能力。COVID-19 表明,即使参与者之间存在物理距离,日常工作也必须继续进行。实时网络流可以提供一个解决方案,即创建一个可在医生/研究人员之间共享的三维环境,在该环境中可以直观地看到正在检查的样本。为了让每个人都能使用这种三维环境,它还必须能在计算能力不高的设备上使用。我们的目标是设计一种通用解决方案,让用户能够以三维方式可视化大量医学成像数据,而无需考虑所使用设备的计算能力。通过本文介绍的解决方案,我们的目标是为医生和研究人员创建一个三维环境,以跨学科的方式合作评估三维医学样本。
{"title":"Real-Time Network Video Data Streaming in Digital Medicine","authors":"Miklós Vincze, B. Molnár, Miklós Kozlovszky","doi":"10.3390/computers12110234","DOIUrl":"https://doi.org/10.3390/computers12110234","url":null,"abstract":"Today, the use of digital medicine is becoming more and more common in medicine. With the use of digital medicine, health data can be shared, processed, and visualized using computer algorithms. One of the problems currently facing digital medicine is the rapid transmission of large amounts of data and their appropriate visualization, even in 3D. Advances in technology offer the possibility to use new image processing, networking, and visualization solutions for the evaluation of medical samples. Because of the resolution of the samples, it is not uncommon that it takes a long time for them to be analyzed, processed, and shared. This is no different for 3D visualization. In order to be able to display digitalized medical samples in 3D at high resolution, a computer with computing power that is not necessarily available to doctors and researchers is needed. COVID-19 has shown that everyday work must continue even when there is a physical distance between the participants. Real-time network streaming can provide a solution to this, by creating a 3D environment that can be shared between doctors/researchers in which the sample being examined can be visualized. In order for this 3D environment to be available to everyone, it must also be usable on devices that do not have high computing capacity. Our goal was to design a general-purpose solution that would allow users to visualize large amounts of medical imaging data in 3D, regardless of the computational capacity of the device they are using. With the solution presented in this paper, our goal was to create a 3D environment for physicians and researchers to collaboratively evaluate 3D medical samples in an interdisciplinary way.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"6 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication PUFGuard:安全多跳移动通信的车对一切认证协议
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-14 DOI: 10.3390/computers12110233
Fayez Gebali, Mohamed K. Elhadad
Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. The multifaceted protocols proposed herein encompass comprehensive security considerations, ranging from authentication and anonymity to the imperative aspects of the proof of presence, freshness, and ephemeral session key exchanges. This paper provides a systematic and comprehensive framework for enhancing security in VANs, which is of paramount importance in the context of modern smart transportation systems. The contributions of this work are multifarious and can be summarized as follows: (1) Presenting an innovative and robust approach to secure key generation based on PUFs, ensuring the dynamic nature of the authentication. (2) Defining trust metrics reliant on PUFs to ascertain the authenticity and integrity of proximate vehicles. (3) Using the proposed framework to enable seamless transitions between different communication protocols, such as the migration from 5G/6G to Wi-Fi, by introducing the concept of multimodal authentication, which accommodates a wide spectrum of vehicle capabilities. Furthermore, upholding privacy through the encryption and concealment of PUF responses safeguards the identity of vehicles during communication.
车辆区域网络(VANs)包含一系列通信模式,包括点对点可见光通信、5G/6G蜂窝无线通信和Wi-Fi自组织多跳通信。本文的主要重点是物理不可克隆函数(puf)作为安全密钥生成、认证过程和相邻车辆信任度量定义的关键元素的介绍和应用。本文提出的多方面协议包含了全面的安全考虑,从身份验证和匿名到存在证明、新鲜度和短暂会话密钥交换的必要方面。本文提供了一个系统和全面的框架,以提高安全在现代智能交通系统的背景下是至关重要的。这项工作的贡献是多方面的,可以总结如下:(1)提出了一种基于puf的创新和健壮的安全密钥生成方法,确保了身份验证的动态特性。(2)定义依赖puf的信任指标,以确定邻近车辆的真实性和完整性。(3)通过引入多模式认证的概念,利用所提出的框架实现不同通信协议之间的无缝转换,例如从5G/6G向Wi-Fi的迁移,该概念可适应广泛的车辆功能。此外,通过加密和隐藏PUF响应来保护隐私,在通信过程中保护了车辆的身份。
{"title":"PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication","authors":"Fayez Gebali, Mohamed K. Elhadad","doi":"10.3390/computers12110233","DOIUrl":"https://doi.org/10.3390/computers12110233","url":null,"abstract":"Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. The multifaceted protocols proposed herein encompass comprehensive security considerations, ranging from authentication and anonymity to the imperative aspects of the proof of presence, freshness, and ephemeral session key exchanges. This paper provides a systematic and comprehensive framework for enhancing security in VANs, which is of paramount importance in the context of modern smart transportation systems. The contributions of this work are multifarious and can be summarized as follows: (1) Presenting an innovative and robust approach to secure key generation based on PUFs, ensuring the dynamic nature of the authentication. (2) Defining trust metrics reliant on PUFs to ascertain the authenticity and integrity of proximate vehicles. (3) Using the proposed framework to enable seamless transitions between different communication protocols, such as the migration from 5G/6G to Wi-Fi, by introducing the concept of multimodal authentication, which accommodates a wide spectrum of vehicle capabilities. Furthermore, upholding privacy through the encryption and concealment of PUF responses safeguards the identity of vehicles during communication.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"28 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134900669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Utilizing an Attention-Based LSTM Model for Detecting Sarcasm and Irony in Social Media 利用基于注意力的LSTM模型检测社交媒体中的讽刺和反语
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-14 DOI: 10.3390/computers12110231
Deborah Olaniyan, Roseline Oluwaseun Ogundokun, Olorunfemi Paul Bernard, Julius Olaniyan, Rytis Maskeliūnas, Hakeem Babalola Akande
Sarcasm and irony represent intricate linguistic forms in social media communication, demanding nuanced comprehension of context and tone. In this study, we propose an advanced natural language processing methodology utilizing long short-term memory with an attention mechanism (LSTM-AM) to achieve an impressive accuracy of 99.86% in detecting and interpreting sarcasm and irony within social media text. Our approach involves innovating novel deep learning models adept at capturing subtle cues, contextual dependencies, and sentiment shifts inherent in sarcastic or ironic statements. Furthermore, we explore the potential of transfer learning from extensive language models and integrating multimodal information, such as emojis and images, to heighten the precision of sarcasm and irony detection. Rigorous evaluation against benchmark datasets and real-world social media content showcases the efficacy of our proposed models. The outcomes of this research hold paramount significance, offering a substantial advancement in comprehending intricate language nuances in digital communication. These findings carry profound implications for sentiment analysis, opinion mining, and an enhanced understanding of social media dynamics.
讽刺和反讽是社交媒体交流中复杂的语言形式,需要对语境和语气有细致的理解。在这项研究中,我们提出了一种先进的自然语言处理方法,利用长短期记忆和注意机制(LSTM-AM)来检测和解释社交媒体文本中的讽刺和反语,达到了99.86%的令人印象深刻的准确率。我们的方法包括创新新颖的深度学习模型,这些模型善于捕捉微妙的线索、上下文依赖关系以及讽刺或讽刺语句中固有的情绪变化。此外,我们探索了从广泛的语言模型中迁移学习和整合多模态信息(如表情符号和图像)的潜力,以提高讽刺和反语检测的精度。对基准数据集和现实世界社交媒体内容的严格评估显示了我们提出的模型的有效性。这项研究的结果具有重要的意义,为理解数字通信中复杂的语言细微差别提供了实质性的进步。这些发现对情感分析、意见挖掘和增强对社交媒体动态的理解具有深远的意义。
{"title":"Utilizing an Attention-Based LSTM Model for Detecting Sarcasm and Irony in Social Media","authors":"Deborah Olaniyan, Roseline Oluwaseun Ogundokun, Olorunfemi Paul Bernard, Julius Olaniyan, Rytis Maskeliūnas, Hakeem Babalola Akande","doi":"10.3390/computers12110231","DOIUrl":"https://doi.org/10.3390/computers12110231","url":null,"abstract":"Sarcasm and irony represent intricate linguistic forms in social media communication, demanding nuanced comprehension of context and tone. In this study, we propose an advanced natural language processing methodology utilizing long short-term memory with an attention mechanism (LSTM-AM) to achieve an impressive accuracy of 99.86% in detecting and interpreting sarcasm and irony within social media text. Our approach involves innovating novel deep learning models adept at capturing subtle cues, contextual dependencies, and sentiment shifts inherent in sarcastic or ironic statements. Furthermore, we explore the potential of transfer learning from extensive language models and integrating multimodal information, such as emojis and images, to heighten the precision of sarcasm and irony detection. Rigorous evaluation against benchmark datasets and real-world social media content showcases the efficacy of our proposed models. The outcomes of this research hold paramount significance, offering a substantial advancement in comprehending intricate language nuances in digital communication. These findings carry profound implications for sentiment analysis, opinion mining, and an enhanced understanding of social media dynamics.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"5 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134953873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analyzing the Spread of Misinformation on Social Networks: A Process and Software Architecture for Detection and Analysis 分析社交网络上错误信息的传播:一种检测和分析的过程和软件架构
Q2 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2023-11-14 DOI: 10.3390/computers12110232
Zafer Duzen, Mirela Riveni, Mehmet S. Aktas
The rapid dissemination of misinformation on social networks, particularly during public health crises like the COVID-19 pandemic, has become a significant concern. This study investigates the spread of misinformation on social network data using social network analysis (SNA) metrics, and more generally by using well known network science metrics. Moreover, we propose a process design that utilizes social network data from Twitter, to analyze the involvement of non-trusted accounts in spreading misinformation supported by a proof-of-concept prototype. The proposed prototype includes modules for data collection, data preprocessing, network creation, centrality calculation, community detection, and misinformation spreading analysis. We conducted an experimental study on a COVID-19-related Twitter dataset using the modules. The results demonstrate the effectiveness of our approach and process steps, and provides valuable insight into the application of network science metrics on social network data for analysing various influence-parameters in misinformation spreading.
社交网络上错误信息的迅速传播,特别是在COVID-19大流行等公共卫生危机期间,已成为一个重大问题。本研究使用社会网络分析(SNA)指标,更普遍地使用众所周知的网络科学指标,调查社交网络数据中错误信息的传播。此外,我们提出了一种利用Twitter社交网络数据的流程设计,通过概念验证原型来分析不受信任帐户在传播错误信息中的参与程度。提出的原型包括数据收集、数据预处理、网络创建、中心性计算、社区检测和错误信息传播分析等模块。我们使用这些模块对与covid -19相关的Twitter数据集进行了实验研究。结果证明了我们的方法和流程步骤的有效性,并为网络科学指标在社交网络数据上的应用提供了有价值的见解,以分析错误信息传播中的各种影响参数。
{"title":"Analyzing the Spread of Misinformation on Social Networks: A Process and Software Architecture for Detection and Analysis","authors":"Zafer Duzen, Mirela Riveni, Mehmet S. Aktas","doi":"10.3390/computers12110232","DOIUrl":"https://doi.org/10.3390/computers12110232","url":null,"abstract":"The rapid dissemination of misinformation on social networks, particularly during public health crises like the COVID-19 pandemic, has become a significant concern. This study investigates the spread of misinformation on social network data using social network analysis (SNA) metrics, and more generally by using well known network science metrics. Moreover, we propose a process design that utilizes social network data from Twitter, to analyze the involvement of non-trusted accounts in spreading misinformation supported by a proof-of-concept prototype. The proposed prototype includes modules for data collection, data preprocessing, network creation, centrality calculation, community detection, and misinformation spreading analysis. We conducted an experimental study on a COVID-19-related Twitter dataset using the modules. The results demonstrate the effectiveness of our approach and process steps, and provides valuable insight into the application of network science metrics on social network data for analysing various influence-parameters in misinformation spreading.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134900674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Computers
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1