首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
Construction of heterogeneous medical knowledge graph from electronic health records 基于电子病历的异构医学知识图谱构建
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068604
R. Mythili, N. Parthiban, V. Kavitha
Abstract Knowledge graph (KG) is a knowledge organization that enables the users to quickly and accurately query the information required. It is stored in the form of triples. It finds its application in various fields of enterprises, academics, medical etc. In this paper, Medical Knowledge Graph is constructed from Electronic Health Records (EHR) that maps the relationships between the entities of patients, disease and drugs. The heterogeneous graph is constructed using different entities derived from distinct datasets and the information is extracted in the form of queries among the wide between the quantity demand and the wide variety of variables. The steps for construction of Medical Knowledge Graph are data collection, Named entity recognition, entity normalization, entity ranking, and Graph Neural Networks. The hybrid approach of Bi-directional Long Short-Term Memory Multi-Head Attention Conditional Random Field (BILSTM-MULATT-CRF) is used for Named Entity Recognition and the result of Precision 91.4%, Recall 90.15% and F1 score 90.77% is obtained.
摘要知识图(KG)是一种知识组织,使用户能够快速准确地查询所需信息。它以三元组的形式存储。它在企业、学术、医疗等各个领域都有应用。本文从电子健康记录(EHR)中构建了医学知识图,绘制了患者、疾病和药物实体之间的关系。异构图是使用从不同数据集派生的不同实体构建的,并且信息是以查询的形式在数量需求和各种变量之间提取的。构建医学知识图谱的步骤包括数据采集、命名实体识别、实体规范化、实体排序和图神经网络。将双向长短期记忆多头注意条件随机场(BILSTM-MULAT-CRF)的混合方法用于命名实体识别,其识别精度为91.4%,召回率为90.15%,F1得分为90.77%。
{"title":"Construction of heterogeneous medical knowledge graph from electronic health records","authors":"R. Mythili, N. Parthiban, V. Kavitha","doi":"10.1080/09720529.2022.2068604","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068604","url":null,"abstract":"Abstract Knowledge graph (KG) is a knowledge organization that enables the users to quickly and accurately query the information required. It is stored in the form of triples. It finds its application in various fields of enterprises, academics, medical etc. In this paper, Medical Knowledge Graph is constructed from Electronic Health Records (EHR) that maps the relationships between the entities of patients, disease and drugs. The heterogeneous graph is constructed using different entities derived from distinct datasets and the information is extracted in the form of queries among the wide between the quantity demand and the wide variety of variables. The steps for construction of Medical Knowledge Graph are data collection, Named entity recognition, entity normalization, entity ranking, and Graph Neural Networks. The hybrid approach of Bi-directional Long Short-Term Memory Multi-Head Attention Conditional Random Field (BILSTM-MULATT-CRF) is used for Named Entity Recognition and the result of Precision 91.4%, Recall 90.15% and F1 score 90.77% is obtained.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41844829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A pragmatic approach to recover access time of Apriori algorithm by applying intersection on CSS for redefining FIS through matrix implementation in textual data 一种在CSS上应用交集恢复Apriori算法访问时间的实用方法通过文本数据中的矩阵实现重新定义FIS
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068601
N. Verma, Vaishali Singh
Abstract Nowadays data analytics OLAP (online Analytical Processing) is mostly accepted domain of current researchers and the concept of data mining serves better for the same. There are so many data mining methodologies defined for data analytics. Mining Association rule is widely used in data mining methods for data categorization. Apriori Algorithm is popular method for defining n-element. Frequent item set form k number of huge transactional data set online transaction processing (OLTP) using Association Mining rule (AMR). In this paper, researchers executed original Apriori on transactional data set containing 35039 number of transactions, divided into three data sets DS-1 to DS-3 with 20039, 12000, 5000 number of transactions with variable length with minimum support of 30%, 60% and 80% respectively. Researchers carried out experimental work and compared results of Apriori Algorithm with our proposed algorithm (enhanced version of Apriori algorithm) on the same perimeter and state improvement with 11%, 30% and 27% of Rate of Improvements in DS-1 to Ds-3 respectively for 30% minimum support. Our proposed algorithm is working far much better then Apriori algorithm at each parameter which was included to conclude the results.
摘要目前,数据分析OLAP(在线分析处理)已成为当前研究人员普遍接受的领域,而数据挖掘的概念更适合于此。为数据分析定义了许多数据挖掘方法。挖掘关联规则广泛应用于数据挖掘方法中进行数据分类。Apriori算法是定义n元素的常用方法。频繁项目集使用关联挖掘规则(AMR)形成k个庞大的事务数据集在线事务处理(OLTP)。在本文中,研究人员在包含35039个事务数的事务数据集上执行了原始Apriori,分为三个数据集DS-1到DS-3,事务数分别为20039、12000和5000,最小支持率分别为30%、60%和80%。研究人员进行了实验工作,并将Apriori算法的结果与我们提出的算法(Apriori方法的增强版)在相同的周长和状态改进上进行了比较,DS-1到DS-3的改进率分别为11%、30%和27%,最小支持率为30%。我们提出的算法在每个参数上都比Apriori算法好得多,这些参数被包括在内以得出结果。
{"title":"A pragmatic approach to recover access time of Apriori algorithm by applying intersection on CSS for redefining FIS through matrix implementation in textual data","authors":"N. Verma, Vaishali Singh","doi":"10.1080/09720529.2022.2068601","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068601","url":null,"abstract":"Abstract Nowadays data analytics OLAP (online Analytical Processing) is mostly accepted domain of current researchers and the concept of data mining serves better for the same. There are so many data mining methodologies defined for data analytics. Mining Association rule is widely used in data mining methods for data categorization. Apriori Algorithm is popular method for defining n-element. Frequent item set form k number of huge transactional data set online transaction processing (OLTP) using Association Mining rule (AMR). In this paper, researchers executed original Apriori on transactional data set containing 35039 number of transactions, divided into three data sets DS-1 to DS-3 with 20039, 12000, 5000 number of transactions with variable length with minimum support of 30%, 60% and 80% respectively. Researchers carried out experimental work and compared results of Apriori Algorithm with our proposed algorithm (enhanced version of Apriori algorithm) on the same perimeter and state improvement with 11%, 30% and 27% of Rate of Improvements in DS-1 to Ds-3 respectively for 30% minimum support. Our proposed algorithm is working far much better then Apriori algorithm at each parameter which was included to conclude the results.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47604949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices 物联网取证:在丢弃、回收或转售的物联网设备上可以找到什么样的个人数据
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072422
S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud
Abstract With the advancement in science and technology, the demand for electronic Internet of Things (IoT) devices has increased to store and process digital data. With the advancement in IoT technology, we are more reliant on IoT devices to perform our regular tasks. IoT Forensics deals with the investigation of IoT devices such as smartphones, tablets, smart watches, or any device which is connected to the Internet. The data on these devices can still be retrieved via IoT forensics even if they are destroyed, resold, or misplaced. Before discarding any IoT device, we must consider how to secure the data stored on them. We are then going to discuss the several types of personal data that could be retrieved from discarded IoT devices. Finally, we are going to discuss the protection measures for the safe disposal of IoT devices.
摘要随着科学技术的进步,对存储和处理数字数据的电子物联网设备的需求也在增加。随着物联网技术的进步,我们越来越依赖物联网设备来执行日常任务。物联网取证涉及对物联网设备的调查,如智能手机、平板电脑、智能手表或任何连接到互联网的设备。这些设备上的数据仍然可以通过物联网取证进行检索,即使它们被销毁、转售或放错地方。在丢弃任何物联网设备之前,我们必须考虑如何保护存储在其上的数据。然后,我们将讨论可以从丢弃的物联网设备中检索的几种类型的个人数据。最后,我们将讨论物联网设备安全处置的保护措施。
{"title":"IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices","authors":"S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud","doi":"10.1080/09720529.2022.2072422","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072422","url":null,"abstract":"Abstract With the advancement in science and technology, the demand for electronic Internet of Things (IoT) devices has increased to store and process digital data. With the advancement in IoT technology, we are more reliant on IoT devices to perform our regular tasks. IoT Forensics deals with the investigation of IoT devices such as smartphones, tablets, smart watches, or any device which is connected to the Internet. The data on these devices can still be retrieved via IoT forensics even if they are destroyed, resold, or misplaced. Before discarding any IoT device, we must consider how to secure the data stored on them. We are then going to discuss the several types of personal data that could be retrieved from discarded IoT devices. Finally, we are going to discuss the protection measures for the safe disposal of IoT devices.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44549047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Companion bot with voice and facial emotion detection with PID based computer vision 基于PID的计算机视觉语音和面部情绪检测伴侣机器人
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075069
C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar
Abstract We live in a world where technology embraces us and makes our lives easier. With increasing technological advances we feel the need for smart robotic assistants/companions to reduce the manual efforts taken by humans in day-to-day tasks and providing the necessary knowledge. In this paper, we develop a smart self companion robot that runs using human voice commands using some standard way of speech and this voice is converted into standard text form which is, in turn, converted into instructions and is fed to the robot, which further performs the necessary actions. The companion is fully automated with the capability of movement based on object tracking and voice response based on facial expression. The three main modules of this work are facial detection, emotion detection, and voice recognition. The bot is a wireless vehicle that will move along the human, interact with them depending on his/their emotions.
摘要我们生活在一个科技拥抱我们、让我们的生活更轻松的世界里。随着技术的不断进步,我们觉得需要智能机器人助手/同伴来减少人类在日常任务中的手动工作量,并提供必要的知识。在本文中,我们开发了一种智能自伴机器人,它使用一些标准的语音方式使用人类的语音命令运行,这种语音被转换成标准的文本形式,然后被转换成指令,并被提供给机器人,机器人进一步执行必要的动作。伴侣是完全自动化的,具有基于对象跟踪的移动和基于面部表情的语音响应能力。这项工作的三个主要模块是面部检测、情绪检测和语音识别。机器人是一种无线交通工具,它将沿着人类移动,根据人类的情绪与人类互动。
{"title":"Companion bot with voice and facial emotion detection with PID based computer vision","authors":"C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar","doi":"10.1080/09720529.2022.2075069","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075069","url":null,"abstract":"Abstract We live in a world where technology embraces us and makes our lives easier. With increasing technological advances we feel the need for smart robotic assistants/companions to reduce the manual efforts taken by humans in day-to-day tasks and providing the necessary knowledge. In this paper, we develop a smart self companion robot that runs using human voice commands using some standard way of speech and this voice is converted into standard text form which is, in turn, converted into instructions and is fed to the robot, which further performs the necessary actions. The companion is fully automated with the capability of movement based on object tracking and voice response based on facial expression. The three main modules of this work are facial detection, emotion detection, and voice recognition. The bot is a wireless vehicle that will move along the human, interact with them depending on his/their emotions.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43003283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies 一种使用图像处理和区块链技术的高效隐私保护用户身份验证方案
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075089
Anees Ara, Avinash Sharma, D. Yadav
Abstract User authentication is a measurement challenge for handheld devices and online accounts such as bank accounts, social media accounts etc. because illegal access results in money loss and user privacy. Individual devices, online financial services, and intelligent spaces are three significant areas of concern for customer authentication procedures. Three ways have been identified for authentication factors: i) knowledge-factor, ii) Inherence factor, and iii) possession-factor. This study investigates two-way user authentication through image processing. CNN, RCNN, and Deepface are deep learning algorithms used for image recognition. We used imagechain for image storage and Blockchain for personal information storage (mobile number) to secure the database. The database is stored on an Ethereum-based blockchain. After determining whether the image is fake or real, match the webcam image with the imagechain; if both images match, the one-time password is given to the user’s cellphone number for login access. For image processing, Opencv is employed, and the Python library is used to execute machine and deep learning algorithms for user authentication. Test the proposed model on the 10 to 100 users for authentication. Accuracy of this experiment is 75.35, 76.33, 98.18 and cosine similarities of images are much better between images, but in case of fake image identification it achieved 97.35 % accuracy.
用户认证是手持设备和在线账户(如银行账户、社交媒体账户等)的测量挑战,因为非法访问会导致金钱损失和用户隐私。个人设备、在线金融服务和智能空间是客户身份验证过程关注的三个重要领域。鉴定因素有三种途径:1)知识因素;2)内在因素;3)占有因素。本研究探讨透过影像处理的双向使用者认证方法。CNN、RCNN和Deepface是用于图像识别的深度学习算法。我们使用imagechain存储图像,使用区块链存储个人信息(手机号码)来保证数据库的安全。数据库存储在基于以太坊的区块链上。在确定图像是真是假之后,将摄像头图像与图像链进行匹配;如果两张图片匹配,用户的手机号码将获得一次性密码,以便登录。对于图像处理,使用Opencv,并使用Python库执行机器和深度学习算法进行用户身份验证。在10到100个用户上测试建议的模型以进行身份验证。本实验的准确率分别为75.35、76.33、98.18,图像之间的余弦相似度要好得多,但在假图像识别中准确率达到了97.35%。
{"title":"An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies","authors":"Anees Ara, Avinash Sharma, D. Yadav","doi":"10.1080/09720529.2022.2075089","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075089","url":null,"abstract":"Abstract User authentication is a measurement challenge for handheld devices and online accounts such as bank accounts, social media accounts etc. because illegal access results in money loss and user privacy. Individual devices, online financial services, and intelligent spaces are three significant areas of concern for customer authentication procedures. Three ways have been identified for authentication factors: i) knowledge-factor, ii) Inherence factor, and iii) possession-factor. This study investigates two-way user authentication through image processing. CNN, RCNN, and Deepface are deep learning algorithms used for image recognition. We used imagechain for image storage and Blockchain for personal information storage (mobile number) to secure the database. The database is stored on an Ethereum-based blockchain. After determining whether the image is fake or real, match the webcam image with the imagechain; if both images match, the one-time password is given to the user’s cellphone number for login access. For image processing, Opencv is employed, and the Python library is used to execute machine and deep learning algorithms for user authentication. Test the proposed model on the 10 to 100 users for authentication. Accuracy of this experiment is 75.35, 76.33, 98.18 and cosine similarities of images are much better between images, but in case of fake image identification it achieved 97.35 % accuracy.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47696173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
IoT-Galvanized pandemic special E-Toilet for generation of sanitized environment 物联网镀锌流行病专用电子钱包,用于产生消毒环境
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068607
Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González
Abstract The entire world is enmeshing the pandemic COVID-19, which affected the public health and it is spread all over the world. Every country’s authority is making more and more efforts towards maintaining the public health as well as mental health and are developing the vaccination to control the COVID-19. As COVID-19 is an infected disease for which a sanitized environment must be chosen at top most priority to prevent infection. Most of the countries are facing the problem of incrementing the infection rate of COVID due to griminess problems. Most healthcare industries are also working to create a sanitized environment with incorporation of the Internet of Things (IoT) which is resulting in the smart health care appliances for generating the sanitized environment. In this paper the researchers have developed an IoT- Galvanized Pandemic Special E-Toilet for generation of sanitized environment which resolves the issues of griminess problem. The proposed architecture has been comprising with three levels of working methodology as Occupancy Check, Auto Flush and Auto control of Appliances using Mobile Application. It is implemented using a raspberry pi board, Arduino Uno as a core unit of the system with interfacing the peripherals: IR sensor, Ultrasonic sensor and HC05 Bluetooth module, servo motor, Relay module, CFL lamp and LED. The proposed architecture has been simulated individually using single piece of sensor, then later assembled all the peripheral together and simulated. The proposed architecture can be used in field of education, industries, corporate offices, multiplexes, hospitals etc.
摘要新冠肺炎疫情在全球范围内蔓延,影响了公众健康。每个国家的当局都在为维护公共健康和心理健康做出越来越多的努力,并正在开发疫苗以控制新冠肺炎。由于新冠肺炎是一种感染性疾病,因此必须优先选择消毒环境以防止感染。由于肮脏的问题,大多数国家都面临着新冠肺炎感染率上升的问题。大多数医疗保健行业也在努力创造一个经过消毒的环境,将物联网(IoT)纳入其中,从而产生了用于产生经过消毒环境的智能医疗保健设备。在这篇论文中,研究人员开发了一种物联网镀锌流行病专用电子变压器,用于产生消毒环境,解决了肮脏问题。所提出的体系结构包括三个层次的工作方法,即占用检查、自动冲洗和使用移动应用程序自动控制电器。它使用树莓皮板实现,Arduino Uno作为系统的核心单元,与外围设备接口:IR传感器、超声波传感器和HC05蓝牙模块、伺服电机、继电器模块、CFL灯和LED。所提出的架构已经使用单个传感器单独进行了模拟,然后将所有外围设备组装在一起并进行了模拟。所提出的架构可用于教育、工业、公司办公室、多路复用器、医院等领域。
{"title":"IoT-Galvanized pandemic special E-Toilet for generation of sanitized environment","authors":"Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González","doi":"10.1080/09720529.2022.2068607","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068607","url":null,"abstract":"Abstract The entire world is enmeshing the pandemic COVID-19, which affected the public health and it is spread all over the world. Every country’s authority is making more and more efforts towards maintaining the public health as well as mental health and are developing the vaccination to control the COVID-19. As COVID-19 is an infected disease for which a sanitized environment must be chosen at top most priority to prevent infection. Most of the countries are facing the problem of incrementing the infection rate of COVID due to griminess problems. Most healthcare industries are also working to create a sanitized environment with incorporation of the Internet of Things (IoT) which is resulting in the smart health care appliances for generating the sanitized environment. In this paper the researchers have developed an IoT- Galvanized Pandemic Special E-Toilet for generation of sanitized environment which resolves the issues of griminess problem. The proposed architecture has been comprising with three levels of working methodology as Occupancy Check, Auto Flush and Auto control of Appliances using Mobile Application. It is implemented using a raspberry pi board, Arduino Uno as a core unit of the system with interfacing the peripherals: IR sensor, Ultrasonic sensor and HC05 Bluetooth module, servo motor, Relay module, CFL lamp and LED. The proposed architecture has been simulated individually using single piece of sensor, then later assembled all the peripheral together and simulated. The proposed architecture can be used in field of education, industries, corporate offices, multiplexes, hospitals etc.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49267008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An analysis of SPARQL usage for information retrieval in heterogeneous domains through various tools 通过各种工具分析SPARQL在异构域中用于信息检索的用法
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072428
Rupal Gupta, S. K. Malik
Abstract SPARQL is a Query Language and a protocol popularly used in web semantics for the information retrieval. It is standard language declared by World Wide Web Consortium for resource description framework. Due to the exponential popularity of semantic web, bigdata, cloud computing, graph databases and linked open data, SPARQL Queries are playing a vital role in the stated domain for managing data with different aspects. This paper summarizes SPARQL usage in various domains touching the latest emerging technologies in computer science and various other fields. A brief analysis has been done of various tools on which SPARQL protocol can be executed for different purposes and it has been analyzed that using such protocols will generate tremendous results in different application areas towards integration of semantic web with different technologies like cloud computing, Linked Open Data (LOD) , Graph Databases and others.
SPARQL是一种查询语言,是网络语义中常用的信息检索协议。它是万维网联盟为资源描述框架声明的标准语言。由于语义网、大数据、云计算、图数据库和链接开放数据的指数级流行,SPARQL查询在管理不同方面的数据方面发挥着至关重要的作用。本文总结了SPARQL在各个领域的使用情况,涉及计算机科学和其他各个领域的最新新兴技术。我们对各种工具进行了简要的分析,在这些工具上,SPARQL协议可以用于不同的目的,并分析了使用这些协议将在不同的应用领域产生巨大的结果,从而将语义web与不同的技术(如云计算、链接开放数据(LOD)、图数据库等)集成在一起。
{"title":"An analysis of SPARQL usage for information retrieval in heterogeneous domains through various tools","authors":"Rupal Gupta, S. K. Malik","doi":"10.1080/09720529.2022.2072428","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072428","url":null,"abstract":"Abstract SPARQL is a Query Language and a protocol popularly used in web semantics for the information retrieval. It is standard language declared by World Wide Web Consortium for resource description framework. Due to the exponential popularity of semantic web, bigdata, cloud computing, graph databases and linked open data, SPARQL Queries are playing a vital role in the stated domain for managing data with different aspects. This paper summarizes SPARQL usage in various domains touching the latest emerging technologies in computer science and various other fields. A brief analysis has been done of various tools on which SPARQL protocol can be executed for different purposes and it has been analyzed that using such protocols will generate tremendous results in different application areas towards integration of semantic web with different technologies like cloud computing, Linked Open Data (LOD) , Graph Databases and others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42211854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
High level browser security in cloud computing services from cross site scripting attacks 云计算服务中的高级浏览器安全性免受跨站点脚本攻击
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072434
M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal
Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.
摘要获得公共云对于协会来说确实很难。因此,IT部门正在寻找一个通过安全计划的云,以提供令人满意的最终客户安全。攻击者可以通过JavaScript、script、Flash或任何其他类型的代码向web浏览器发送恶意脚本。当此类代码在浏览器中执行时,cookie会将其重定向到攻击者位置。这些类型的攻击被称为XSS(跨站点脚本)攻击。云安全是组织健康的一个学科,专注于获得适当的处理结构。这整合了私有和跨基于在线的机构、应用程序和阶段的数据安全。具有加密cookie的客户端的进一步请求被发送到web代理,web代理在其中解密这些请求并转发到web服务器。浏览器信息库存储编码处理,在利用跨站点预先安排攻击的情况下,该处理对攻击者没有价值。
{"title":"High level browser security in cloud computing services from cross site scripting attacks","authors":"M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal","doi":"10.1080/09720529.2022.2072434","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072434","url":null,"abstract":"Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49448424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images 提高灰度图像尺寸确定性视觉密码方案的视觉质量
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075087
Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma
Abstract To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured in a lesser quantity. In this paper a secret message multi-share method is used. In the proposed work input picture is divided into eight portions. The eight portions shares are encrypted before embedding the image in the patchwork image, photo sharing and the image retrieved is the same as the hidden starting image. Results show that the proposed method has optimized the optimal time by 8%, improved PSNR by 11% and lower overhead communication.
摘要为了提高网络信息传输的安全性,人们开发了各种方法,如密码学、隐写术和数字水印。视觉密码学是在过去十年中发展起来的一个实体,它将信息拆分为两部分以完成集成。该系统的安全性也较低。本文采用了一种秘密消息多共享的方法。在所提出的工作中,输入画面被划分为八个部分。在将图像嵌入拼接图像之前,对八部分共享进行加密,照片共享,并且检索到的图像与隐藏的起始图像相同。结果表明,该方法优化了8%的最优时间,提高了11%的信噪比,降低了通信开销。
{"title":"Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images","authors":"Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma","doi":"10.1080/09720529.2022.2075087","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075087","url":null,"abstract":"Abstract To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured in a lesser quantity. In this paper a secret message multi-share method is used. In the proposed work input picture is divided into eight portions. The eight portions shares are encrypted before embedding the image in the patchwork image, photo sharing and the image retrieved is the same as the hidden starting image. Results show that the proposed method has optimized the optimal time by 8%, improved PSNR by 11% and lower overhead communication.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42765127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease prediction model for secure patient data over cloud using machine learning 使用机器学习的云上安全患者数据的疾病预测模型
IF 1.4 Q1 Mathematics Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072438
Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma
Abstract Patient data at hospitals is non-sharable in current systems and cost of repeated medication is curse to the patients. Also medical treatment perspective changes at every hospital or doctor or diagnostic center. To resolve the issue of availability of medicinal past history of the patients & reduction in cost of treatment with decisive & secure availability of patient records, like prescriptions and lab reports, we implemented an ERP system over cloud in five hospitals. Based on data retrieved from the hospitals of registration (only to ensure privacy of patients) we implement data analytics using machine learning for the prediction of the disease of patients by tracking the record of medical history and also analyzed hospital and doctors information and performance. Our aim is to provide solution for less cost treatment and for regulation and monitoring of health care to Indian Medical Industry.
摘要在当前的系统中,医院的患者数据是不可共享的,重复用药的成本对患者来说是个诅咒。此外,每个医院、医生或诊断中心的医疗观点都会发生变化。为了解决患者既往病史的可用性问题,以及通过决定性和安全的患者记录(如处方和实验室报告)来降低治疗成本,我们在五家医院实施了云ERP系统。基于从注册医院检索的数据(仅为了确保患者的隐私),我们使用机器学习实现数据分析,通过跟踪病史记录来预测患者的疾病,并分析医院和医生的信息和表现。我们的目标是为印度医疗行业提供低成本治疗以及医疗保健监管和监测的解决方案。
{"title":"Disease prediction model for secure patient data over cloud using machine learning","authors":"Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma","doi":"10.1080/09720529.2022.2072438","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072438","url":null,"abstract":"Abstract Patient data at hospitals is non-sharable in current systems and cost of repeated medication is curse to the patients. Also medical treatment perspective changes at every hospital or doctor or diagnostic center. To resolve the issue of availability of medicinal past history of the patients & reduction in cost of treatment with decisive & secure availability of patient records, like prescriptions and lab reports, we implemented an ERP system over cloud in five hospitals. Based on data retrieved from the hospitals of registration (only to ensure privacy of patients) we implement data analytics using machine learning for the prediction of the disease of patients by tracking the record of medical history and also analyzed hospital and doctors information and performance. Our aim is to provide solution for less cost treatment and for regulation and monitoring of health care to Indian Medical Industry.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1