首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
Foreword 前言
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2086671
D. Goyal, Adarsh Kumar, Amit Kumar Gupta, Carlos M. Travieso-González
{"title":"Foreword","authors":"D. Goyal, Adarsh Kumar, Amit Kumar Gupta, Carlos M. Travieso-González","doi":"10.1080/09720529.2022.2086671","DOIUrl":"https://doi.org/10.1080/09720529.2022.2086671","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42117748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative analysis of validating parameters in the deep learning models for remotely sensed images 遥感图像深度学习模型验证参数的对比分析
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068602
Ravi Kumar, Deepak Kumar
Abstract The recognition of object in remotely sensed images is a complex task. The immense research is running in the field of remote sensing due to the availability of high resolution satellite images. The detection of object is a challenging task due to the complex background and small object size in remotely sensed images. The object detection in remote sensing images has a vital role in the field of navigation, salvage, and military. The performance of traditional algorithms is very less due to the usage of handcrafted features. With the initiation of Deep Learning algorithms, various Convolutional Neural Networks (CNN) based model have been utilized to detect the objects with high-resolution remotely sensed images. In this research paper various CNN based models has been compared and analyzed. Object detection approaches are broadly categorized in two ways-one based on the region matching and second based on the one-stage target detection. The researchers have compared the result of R-CNN, SPP Net , fast R-CNN, faster R-CNN, R-FCN, Mask R-CNN SSD (Single Shot Multibox Detector), DSSD (Deconvolution Single Shot Multibox Detector), FSSD , YOLO v1,YOLO v2, YOLO v3, Gaussian YOLO v3, RetinaNet which conclude that the minimal average precision for the region based category is best shown by Mask R-CNN with 39.8 mAP in the COCO parameter test and for the one stage detector YOLO v3 shows the best case for the COCO parameter test with 69.1 mAP. In the second phase of the review the researchers found that in comparison to the region based and one stage detector the YOLO v3 model from one stage detector shows the best detection precision percentage with the highest 87% in identifying the object called ship.
遥感图像中目标的识别是一项复杂的任务。由于高分辨率卫星图像的可用性,遥感领域正在进行大量的研究。由于遥感图像背景复杂、目标尺寸小,目标的检测是一项具有挑战性的任务。遥感图像中的目标检测在导航、救助、军事等领域具有重要作用。由于使用手工特征,传统算法的性能非常低。随着深度学习算法的兴起,各种基于卷积神经网络(CNN)的模型被用于高分辨率遥感图像的目标检测。本文对各种基于CNN的模型进行了比较和分析。目标检测方法大致分为两种,一种是基于区域匹配的目标检测方法,另一种是基于单阶段目标检测方法。研究人员比较了R-CNN、SPP Net、快速R-CNN、更快R-CNN、R-FCN、Mask R-CNN SSD(单镜头多盒检测器)、DSSD(反卷积单镜头多盒检测器)、FSSD、YOLO v1、YOLO v2、YOLO v3、高斯YOLO v3、retanet得出结论,基于区域的类别的最小平均精度由Mask R-CNN在COCO参数测试中以39.8 mAP表现最佳,对于一级检测器YOLO v3在COCO参数测试中以69.1 mAP表现最佳。在审查的第二阶段,研究人员发现,与基于区域和一级检测器的YOLO v3模型相比,一级检测器的YOLO v3模型在识别被称为船的物体时显示出最好的检测精度百分比,最高为87%。
{"title":"Comparative analysis of validating parameters in the deep learning models for remotely sensed images","authors":"Ravi Kumar, Deepak Kumar","doi":"10.1080/09720529.2022.2068602","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068602","url":null,"abstract":"Abstract The recognition of object in remotely sensed images is a complex task. The immense research is running in the field of remote sensing due to the availability of high resolution satellite images. The detection of object is a challenging task due to the complex background and small object size in remotely sensed images. The object detection in remote sensing images has a vital role in the field of navigation, salvage, and military. The performance of traditional algorithms is very less due to the usage of handcrafted features. With the initiation of Deep Learning algorithms, various Convolutional Neural Networks (CNN) based model have been utilized to detect the objects with high-resolution remotely sensed images. In this research paper various CNN based models has been compared and analyzed. Object detection approaches are broadly categorized in two ways-one based on the region matching and second based on the one-stage target detection. The researchers have compared the result of R-CNN, SPP Net , fast R-CNN, faster R-CNN, R-FCN, Mask R-CNN SSD (Single Shot Multibox Detector), DSSD (Deconvolution Single Shot Multibox Detector), FSSD , YOLO v1,YOLO v2, YOLO v3, Gaussian YOLO v3, RetinaNet which conclude that the minimal average precision for the region based category is best shown by Mask R-CNN with 39.8 mAP in the COCO parameter test and for the one stage detector YOLO v3 shows the best case for the COCO parameter test with 69.1 mAP. In the second phase of the review the researchers found that in comparison to the region based and one stage detector the YOLO v3 model from one stage detector shows the best detection precision percentage with the highest 87% in identifying the object called ship.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47682989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Novel concept of data security using sliding image and image digest 基于滑动图像和图像摘要的数据安全新概念
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2091021
Neha Singhal, Vibhakar Pathak
Abstract We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.
摘要我们生活在科技世界,信息或数据中心日益增长。即使是政府部门也推出了在线门户网站和更快速的计算机化,这使他们能够从世界任何地方在线获取数据以及发送重要数据和报告。随之而来的还有一些安全问题,比如如何保护数据免受未经授权的访问。为此,我们提出了安全模型,在该模型中,我们分两个阶段增强了安全性,一个是使用基于滑块的图像分割概念的身份验证阶段,另一个阶段是使用身份验证密钥的消息共享模块,该模块使用图像和消息生成,MD5也非常强大。图像的SHA-512散列将被存储在数据库中,该数据库将作为图像DIGEST用于接收器端的验证目的。当接收器接收到图像时,SHA-512功能将再次对接收到的图像进行操作,如果两个图像都与存储在数据库中的用户端图像HASH生成的HASH匹配,则该图像在接收器端被认为是有效的。类似地,消息的消息摘要也可以生成为存储在数据库中用于验证目的。生成的身份验证密钥使用以前的方法使用各种在线和离线工具进行测试,结果比以前的要好。
{"title":"Novel concept of data security using sliding image and image digest","authors":"Neha Singhal, Vibhakar Pathak","doi":"10.1080/09720529.2022.2091021","DOIUrl":"https://doi.org/10.1080/09720529.2022.2091021","url":null,"abstract":"Abstract We are living in the tech world and information or data centers are growing day by day. Even the government departments are coming with the online portals and more rapid computerization, which enables them to get the data as well as to send the important data and report, online from anywhere in the world. With the ease, also comes some security issues, like how to keep the data protected from unauthorized access. For this purpose, we have proposed the security model in which we have enhanced the security in two phases, one is the authentication phase where the slider-based image partition concept is used and second phase is the message sharing module in which authentication key is used, which is generated using the Image and Message MD5 is also very strong. The SHA-512 hash of the image will be stored in the database which will act as IMAGE DIGEST for the verification purpose at the receiver end. When the receiver receives the image, the SHA-512 function will again operate over the received image, if both the image matches with HASH which is generated at the user end image HASH stored in database, then the image is considered valid at receiver end. Similarly, the message digest for the message can also be generated as stored in the database for the verification purpose. The generated authentication keys are tested with the previous approach using the various online and offline tools and results are better that the previous.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45189488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editors 客人编辑
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2102212
Dinesh Goyal, Anil Kumar, Amit Kumar Gupta, Carlos M. Travieso-Gonzalez
{"title":"Guest Editors","authors":"Dinesh Goyal, Anil Kumar, Amit Kumar Gupta, Carlos M. Travieso-Gonzalez","doi":"10.1080/09720529.2022.2102212","DOIUrl":"https://doi.org/10.1080/09720529.2022.2102212","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44044136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Detection and tracking of moving cloud services from video using saliency map model 使用显著性图模型检测和跟踪视频中的移动云服务
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072436
S. Kamble, D. K. Saini, Vinay Kumar, A. Gautam, Shikha Verma, Ashish Tiwari, Dinesh Goyal
Abstract In cloud computing, the services are observed in the video stream and clustering their pixels is the initial task in service detection. Tracking is the practice to observe or tracking the moments of a given item in each frame. Numerous false positives are included in the frame. Using the saliency map model and the Extended Kalman Filter, the proposed approach can recognize and track moving objects in video. The item is tracked using an Extended Kalman Filter. In the proposed research the evaluation is based on the delay and accuracy of the evaluation parameter. Finally, the suggested method is compared to existing object tracking methods, with an accuracy of greater than 90% attained.
摘要在云计算中,在视频流中观察服务,对其像素进行聚类是服务检测的初始任务。跟踪是观察或跟踪每帧中给定项目的时刻的练习。帧中包含许多误报。利用显著性图模型和扩展卡尔曼滤波器,该方法可以识别和跟踪视频中的运动对象。使用扩展卡尔曼滤波器跟踪项目。在所提出的研究中,评估是基于评估参数的延迟和准确性。最后,将所提出的方法与现有的目标跟踪方法进行了比较,精度达到90%以上。
{"title":"Detection and tracking of moving cloud services from video using saliency map model","authors":"S. Kamble, D. K. Saini, Vinay Kumar, A. Gautam, Shikha Verma, Ashish Tiwari, Dinesh Goyal","doi":"10.1080/09720529.2022.2072436","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072436","url":null,"abstract":"Abstract In cloud computing, the services are observed in the video stream and clustering their pixels is the initial task in service detection. Tracking is the practice to observe or tracking the moments of a given item in each frame. Numerous false positives are included in the frame. Using the saliency map model and the Extended Kalman Filter, the proposed approach can recognize and track moving objects in video. The item is tracked using an Extended Kalman Filter. In the proposed research the evaluation is based on the delay and accuracy of the evaluation parameter. Finally, the suggested method is compared to existing object tracking methods, with an accuracy of greater than 90% attained.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49257431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
A comparative approach for classifying retinal OCT images based on deep learning framework 基于深度学习框架的视网膜OCT图像分类比较方法
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068595
Aman Dureja, P. Pahwa
Abstract Convolutional Networks are category of deep optimizing networks used to interpret images in Deep Learning concepts. Image recognition and medical image analysis are two areas where they are useful. The increasing scale of clinical feature spaces is raising a significant obstacle, creating issues with extensive database management, and afterward compiling those repositories for retrieval and storage, that could only be addressed using content based medical image retrieval systems. The objective of this paper is to demonstrate a deep CNN architecture for retrieving research and clinical images quickly and efficiently for identifying multi-class retinal disease objects. To train the network, the datasets used are inter-modal and divided into 4 groups. The transfer learning method is used for the multi-classification of retinal images. Another augmentation technique is used for comparing the accuracy, precision, and evaluation metrics with the transfer learning method. The accuracy of 97.1%, with a recall of 97.2%, and a precision of 97.0% was achieved in research that is higher when compared with the previous methods that were deployed. With the augmentation technique, it achieved an accuracy of 94.0% with a 94.6% precision and a recall of 95.1% for the testing data which suggests that decreasing the size of data did not impact the accuracy of the model. The proposed model helps diagnose various categories of medical images for the development of a comprehensive system that can work better than the human experts and help to detect and diagnose various diseases in the medical and clinical fields.
摘要卷积网络是一类深度优化网络,用于解释深度学习概念中的图像。图像识别和医学图像分析是两个有用的领域。临床特征空间的规模不断扩大,这带来了一个重大障碍,造成了广泛的数据库管理以及随后编译这些存储库以进行检索和存储的问题,而这些问题只能使用基于内容的医学图像检索系统来解决。本文的目的是展示一种深度CNN架构,用于快速有效地检索研究和临床图像,以识别多类视网膜疾病对象。为了训练网络,使用的数据集是模态间的,并分为4组。将迁移学习方法用于视网膜图像的多分类。另一种增强技术用于将准确性、精度和评估指标与迁移学习方法进行比较。研究的准确率为97.1%,召回率为97.2%,精密度为97.0%,与以前使用的方法相比更高。通过增强技术,它实现了94.0%的准确率,94.6%的准确率和95.1%的测试数据召回率,这表明减少数据大小不会影响模型的准确性。所提出的模型有助于诊断各类医学图像,以开发一个综合系统,该系统可以比人类专家更好地工作,并有助于检测和诊断医学和临床领域的各种疾病。
{"title":"A comparative approach for classifying retinal OCT images based on deep learning framework","authors":"Aman Dureja, P. Pahwa","doi":"10.1080/09720529.2022.2068595","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068595","url":null,"abstract":"Abstract Convolutional Networks are category of deep optimizing networks used to interpret images in Deep Learning concepts. Image recognition and medical image analysis are two areas where they are useful. The increasing scale of clinical feature spaces is raising a significant obstacle, creating issues with extensive database management, and afterward compiling those repositories for retrieval and storage, that could only be addressed using content based medical image retrieval systems. The objective of this paper is to demonstrate a deep CNN architecture for retrieving research and clinical images quickly and efficiently for identifying multi-class retinal disease objects. To train the network, the datasets used are inter-modal and divided into 4 groups. The transfer learning method is used for the multi-classification of retinal images. Another augmentation technique is used for comparing the accuracy, precision, and evaluation metrics with the transfer learning method. The accuracy of 97.1%, with a recall of 97.2%, and a precision of 97.0% was achieved in research that is higher when compared with the previous methods that were deployed. With the augmentation technique, it achieved an accuracy of 94.0% with a 94.6% precision and a recall of 95.1% for the testing data which suggests that decreasing the size of data did not impact the accuracy of the model. The proposed model helps diagnose various categories of medical images for the development of a comprehensive system that can work better than the human experts and help to detect and diagnose various diseases in the medical and clinical fields.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46389366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in healthcare : Moving towards a methodological framework for protecting Biomedical Databases 区块链在医疗保健:迈向保护生物医学数据库的方法框架
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068598
G. Ramesh, Avinash Sharma, D. V. Lalitha Parameswari, Ch. Mallikarjuna Rao, J. Somasekar
Abstract Biomedical databases or repositories have scientific information that is evidence based and protecting such documents from tampering or non-repudiation is very significant. The traditional techniques for the same have limitations in the distributed environments. Scientific contributions are to be safeguarded and it is one of the challenging problems. Blockchain is the promising technology that can support distributed ledger of transactions and thus it is found suitable for protecting biomedical repositories. As blockchain is a proven technology associated with crypto-currency known as Bitcoin in finance domain, it has plenty of opportunities in other domains. In this paper, a framework that is based on blockchain technology (BCT) for protection of biomedical databases with integrity and non-repudiation is presented. The framework will have underlying mechanisms to exploit blockchain to have a protection service and smart contracts to be more flexible and dynamic to adapt new requirements from time to time. The framework is domain specific but can pave way for motivation for adapting it to new domains as well.
生物医学数据库或存储库中有基于证据的科学信息,保护这些文件不被篡改或不可否认是非常重要的。传统的技术在分布式环境中具有局限性。科学贡献要得到保障,这是一个具有挑战性的问题。区块链是一种很有前途的技术,可以支持分布式交易账本,因此适合保护生物医学存储库。区块链是一种与金融领域的加密货币比特币相关的成熟技术,在其他领域也有很多机会。提出了一种基于区块链技术(BCT)的生物医学数据库完整性和不可抵赖性保护框架。该框架将具有底层机制,以利用区块链提供保护服务,并使智能合约更加灵活和动态,以适应不时出现的新需求。该框架是特定于领域的,但也可以为将其适应新领域铺平道路。
{"title":"Blockchain in healthcare : Moving towards a methodological framework for protecting Biomedical Databases","authors":"G. Ramesh, Avinash Sharma, D. V. Lalitha Parameswari, Ch. Mallikarjuna Rao, J. Somasekar","doi":"10.1080/09720529.2022.2068598","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068598","url":null,"abstract":"Abstract Biomedical databases or repositories have scientific information that is evidence based and protecting such documents from tampering or non-repudiation is very significant. The traditional techniques for the same have limitations in the distributed environments. Scientific contributions are to be safeguarded and it is one of the challenging problems. Blockchain is the promising technology that can support distributed ledger of transactions and thus it is found suitable for protecting biomedical repositories. As blockchain is a proven technology associated with crypto-currency known as Bitcoin in finance domain, it has plenty of opportunities in other domains. In this paper, a framework that is based on blockchain technology (BCT) for protection of biomedical databases with integrity and non-repudiation is presented. The framework will have underlying mechanisms to exploit blockchain to have a protection service and smart contracts to be more flexible and dynamic to adapt new requirements from time to time. The framework is domain specific but can pave way for motivation for adapting it to new domains as well.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41971286","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Stress Ocare : An advance IoMT based physiological data analysis for anxiety status prediction using cloud computing 压力Ocare:一种基于IoMT的先进生理数据分析,用于云计算的焦虑状态预测
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072426
Bhupendra Ramani, Warish D. Patel, K. Solanki
Abstract In modern times individuals are facing an important social challenge in the form of stress. Combining sensor devices that capture physiological, and brain waves data, this study develops a machine learning technique using cloud computing to recognize stress in people in social contexts. In this paper, we are comparing several classifiers, including Random Forest, Support Vector Machine, k-nearest neighbor and AdaBoost, and also inventing a method that uses sensor data in day-to-day life. It detects stress levels with high accuracy. Our results show that by combining data from all the sensors, we are able to accurately differentiate between the stressful and normal situations of humans. In addition, this paper also evaluates the individual capabilities of each sensor modality and its applicability for stress detection in real-time situations. Methods: We have provided unique technology to incorporate sensor signals using cloud computing. It monitors the user’s sweat level, temperature, heart rate variation, and EEG under various motion estimations and also chooses the best model to detect the anxiety level based on the user’s motion conditions. Results: Evaluation of algorithms using sample data reveals an overall concern detection accuracy of 94% along with a significant reduction in false positives compared to the ultramodern techniques.
摘要在现代,个人正以压力的形式面临着一个重要的社会挑战。这项研究结合了捕捉生理和脑电波数据的传感器设备,开发了一种机器学习技术,使用云计算来识别人们在社交环境中的压力。在本文中,我们比较了几种分类器,包括随机森林、支持向量机、k近邻和AdaBoost,并发明了一种在日常生活中使用传感器数据的方法。它可以高精度地检测压力水平。我们的研究结果表明,通过结合所有传感器的数据,我们能够准确区分人类的压力和正常情况。此外,本文还评估了每种传感器模态的个体能力及其在实时情况下的应力检测适用性。方法:我们提供了独特的技术,使用云计算整合传感器信号。它监测用户在各种运动估计下的汗液水平、温度、心率变化和脑电图,并根据用户的运动状况选择最佳模型来检测焦虑水平。结果:使用样本数据对算法进行评估显示,与超现代技术相比,总体问题检测准确率为94%,假阳性率显著降低。
{"title":"Stress Ocare : An advance IoMT based physiological data analysis for anxiety status prediction using cloud computing","authors":"Bhupendra Ramani, Warish D. Patel, K. Solanki","doi":"10.1080/09720529.2022.2072426","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072426","url":null,"abstract":"Abstract In modern times individuals are facing an important social challenge in the form of stress. Combining sensor devices that capture physiological, and brain waves data, this study develops a machine learning technique using cloud computing to recognize stress in people in social contexts. In this paper, we are comparing several classifiers, including Random Forest, Support Vector Machine, k-nearest neighbor and AdaBoost, and also inventing a method that uses sensor data in day-to-day life. It detects stress levels with high accuracy. Our results show that by combining data from all the sensors, we are able to accurately differentiate between the stressful and normal situations of humans. In addition, this paper also evaluates the individual capabilities of each sensor modality and its applicability for stress detection in real-time situations. Methods: We have provided unique technology to incorporate sensor signals using cloud computing. It monitors the user’s sweat level, temperature, heart rate variation, and EEG under various motion estimations and also chooses the best model to detect the anxiety level based on the user’s motion conditions. Results: Evaluation of algorithms using sample data reveals an overall concern detection accuracy of 94% along with a significant reduction in false positives compared to the ultramodern techniques.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46878977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Construction of Petersen graph via graph product and correlation of topological descriptors of Petersen graph in terms of cyclic graph C 5 用图积构造Petersen图及循环图C5上Petersen图拓扑描述符的相关性
IF 1.4 Q1 Mathematics Pub Date : 2022-05-15 DOI: 10.1080/09720529.2022.2060921
Muhammad Waheed, Umair Saleem, M. Cancan, Ziyattin Taş, M. Alaeiyan, M. Farahani
Abstract Graph product yields a new structure from two initial given structures. The computation of topological indices for these sophisticated structures using the graph product is a critical endeavor. Petersen graph is a structure which consists of ten vertices and fifteen edges. It is commonly used as a counter example to graph theory conjectures. In this paper, we generate simple Petersen graph by using graph product and then explicit expressions of the first and second Zagreb indices, forgotten topological index, first hyper and first reformulated Zagreb index, reduced second Zagreb index and Y-index of the Peterson graph in terms of cyclic graph C5 are computed.
摘要图积由两个给定的初始结构得到一个新的结构。利用图积计算这些复杂结构的拓扑指标是一项关键的工作。彼得森图是由10个顶点和15条边组成的结构。它通常被用作图论猜想的反例。本文利用图积生成了简单的Petersen图,然后计算了循环图C5的第一和第二Zagreb指数、遗忘拓扑指数、第一超和第一重表述的Zagreb指数、简化的第二Zagreb指数和y指数的显式表达式。
{"title":"Construction of Petersen graph via graph product and correlation of topological descriptors of Petersen graph in terms of cyclic graph C 5","authors":"Muhammad Waheed, Umair Saleem, M. Cancan, Ziyattin Taş, M. Alaeiyan, M. Farahani","doi":"10.1080/09720529.2022.2060921","DOIUrl":"https://doi.org/10.1080/09720529.2022.2060921","url":null,"abstract":"Abstract Graph product yields a new structure from two initial given structures. The computation of topological indices for these sophisticated structures using the graph product is a critical endeavor. Petersen graph is a structure which consists of ten vertices and fifteen edges. It is commonly used as a counter example to graph theory conjectures. In this paper, we generate simple Petersen graph by using graph product and then explicit expressions of the first and second Zagreb indices, forgotten topological index, first hyper and first reformulated Zagreb index, reduced second Zagreb index and Y-index of the Peterson graph in terms of cyclic graph C5 are computed.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41827985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A review of fog computing and its simulators 雾计算及其模拟器的研究进展
IF 1.4 Q1 Mathematics Pub Date : 2022-04-03 DOI: 10.1080/09720529.2021.2016222
Sonam Kaler, Ajay Sharma, Arshad Ahmad Yatoo
Abstract Fog computing is defined as the distribution of computing resources between the data devices and the cloud or any other data centre in a distributed computing infrastructure or process. This paper briefly reviews the various definitions, applications, architecture and fog simulators proposed by researchers over the years. In this paper, a comparison table is presented which highlights the key features of simulators available like FogtorchII, iFogSim, Fogbus, MyiFogSim etc.
雾计算被定义为分布式计算基础设施或过程中数据设备与云或任何其他数据中心之间的计算资源分布。本文简要回顾了近年来研究人员提出的各种定义、应用、结构和雾模拟器。在本文中,给出了一个比较表,突出了像FogtorchII, iFogSim, Fogbus, MyiFogSim等模拟器的主要特性。
{"title":"A review of fog computing and its simulators","authors":"Sonam Kaler, Ajay Sharma, Arshad Ahmad Yatoo","doi":"10.1080/09720529.2021.2016222","DOIUrl":"https://doi.org/10.1080/09720529.2021.2016222","url":null,"abstract":"Abstract Fog computing is defined as the distribution of computing resources between the data devices and the cloud or any other data centre in a distributed computing infrastructure or process. This paper briefly reviews the various definitions, applications, architecture and fog simulators proposed by researchers over the years. In this paper, a comparison table is presented which highlights the key features of simulators available like FogtorchII, iFogSim, Fogbus, MyiFogSim etc.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47599783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1