首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
Unmanned combat aerial vehicle path planning in complex environment using multi-strategy sparrow search algorithm with double-layer coding 基于双层编码的多策略麻雀搜索算法的复杂环境下无人机路径规划
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/j.jksuci.2024.102255
Liangdong Qu , Jingkun Fan
Unmanned combat aerial vehicles (UCAV) path planning in complex environments demands a substantial number of path points to determine feasible paths. Establishing an effective flight path for UCAVs requires numerous path points to account for fuel constraints, artillery threats, and radar avoidance. This increase in path points raises the dimensionality of the problem, which in turn degrades algorithm performance. To mitigate this issue, a double-layer coding (DLC) model is utilized to remove redundant path points, consequently lowering computational complexity and operational difficulties. Meanwhile, this paper introduces a novel enhanced sparrow search algorithm (MESSA) based on multi-strategy for UCAV path planning. The MESSA incorporates a novel dynamic fitness regulation learning strategy (DFRL), a random differential learning strategy (RDL), an elite example equilibrium learning strategy (EEEL), a dynamic elimination and regeneration strategy based on the elite example (DERE), and quadratic interpolation (QI). Furthermore, MESSA is compared against 11 state-of-the-art algorithms, demonstrating exceptional optimization performance and robustness. Additionally, the combination of MESSA with the DLC model (DLC-MESSA) is applied to solve the UCAV path planning problem. The experimental results from five complex environments indicate that DLC-MESSA outperforms other algorithms in 80% of the cases by achieving the lowest average cost, thereby demonstrating its superior robustness and computational efficiency.
复杂环境下的无人机路径规划需要大量路径点来确定可行路径。为无人驾驶飞机建立有效的飞行路径需要许多路径点来考虑燃料限制、火炮威胁和雷达规避。路径点的增加提高了问题的维度,这反过来又降低了算法的性能。为了解决这一问题,采用双层编码(DLC)模型去除冗余路径点,从而降低了计算复杂度和操作难度。同时,提出了一种新的基于多策略的增强型麻雀搜索算法(MESSA)用于无人机路径规划。MESSA包含了一种新的动态适应度调节学习策略(DFRL)、随机差分学习策略(RDL)、精英样本均衡学习策略(EEEL)、基于精英样本的动态消除和再生策略(DERE)和二次插值(QI)。此外,将MESSA与11种最先进的算法进行了比较,证明了卓越的优化性能和鲁棒性。此外,将MESSA与DLC模型相结合(DLC-MESSA)用于解决无人机的路径规划问题。五个复杂环境的实验结果表明,在80%的情况下,DLC-MESSA算法的平均成本最低,优于其他算法,从而证明了其优越的鲁棒性和计算效率。
{"title":"Unmanned combat aerial vehicle path planning in complex environment using multi-strategy sparrow search algorithm with double-layer coding","authors":"Liangdong Qu ,&nbsp;Jingkun Fan","doi":"10.1016/j.jksuci.2024.102255","DOIUrl":"10.1016/j.jksuci.2024.102255","url":null,"abstract":"<div><div>Unmanned combat aerial vehicles (UCAV) path planning in complex environments demands a substantial number of path points to determine feasible paths. Establishing an effective flight path for UCAVs requires numerous path points to account for fuel constraints, artillery threats, and radar avoidance. This increase in path points raises the dimensionality of the problem, which in turn degrades algorithm performance. To mitigate this issue, a double-layer coding (DLC) model is utilized to remove redundant path points, consequently lowering computational complexity and operational difficulties. Meanwhile, this paper introduces a novel enhanced sparrow search algorithm (MESSA) based on multi-strategy for UCAV path planning. The MESSA incorporates a novel dynamic fitness regulation learning strategy (DFRL), a random differential learning strategy (RDL), an elite example equilibrium learning strategy (EEEL), a dynamic elimination and regeneration strategy based on the elite example (DERE), and quadratic interpolation (QI). Furthermore, MESSA is compared against 11 state-of-the-art algorithms, demonstrating exceptional optimization performance and robustness. Additionally, the combination of MESSA with the DLC model (DLC-MESSA) is applied to solve the UCAV path planning problem. The experimental results from five complex environments indicate that DLC-MESSA outperforms other algorithms in 80% of the cases by achieving the lowest average cost, thereby demonstrating its superior robustness and computational efficiency.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102255"},"PeriodicalIF":5.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
T-SRE: Transformer-based semantic Relation extraction for contextual paraphrased plagiarism detection T-SRE:基于转换的语义关系提取,用于上下文释义抄袭检测
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-12-01 DOI: 10.1016/j.jksuci.2024.102257
Pon Abisheka , C. Deisy , P. Sharmila
Plagiarism has become a pervasive issue in academics and professionals to safeguard academic integrity and intellectual property rights. The escalating sophistication of plagiarized content through semantic manipulation and structural reorganization poses significant challenges to existing detection systems that rely primarily on lexical similarity measures. The proposed T-SRE (Transformer-based Semantic Relation Extraction), a novel framework addresses the limitations of traditional n-gram and string-matching approaches by leveraging deep semantic analysis. The proposed framework combines Dependency Parsing (DP) for syntactic relationship mapping and Named Entity Recognition (NER) for contextual entity identification, augmented by a transformer-based neural network that captures long-range contextual dependencies. This learning methodology incorporates three key components: a position-aware word reordering algorithm, Levenshtein distance metric for structural similarity, and contextual word embeddings for semantic preservation detection. The proposed T-SRE enhances text structure recognition by combining position-aware reordering with semantic preservation through ensemble learning. The system implements a hierarchical classification scheme that quantifies plagiarism severity through a four-tier taxonomy: heavy, low, non-plagiarized and verbatim copy. The Udacity benchmark dataset showcases the model’s superior detection capabilities, achieving 92% precision, 89% recall, and an F1-score of 90.5%, particularly in lightweight textual modifications.The framework achieves a granularity score of 1.28, outperforming existing approaches.
为了维护学术诚信和知识产权,剽窃已成为学术界和专业人士普遍存在的问题。通过语义操纵和结构重组不断升级的剽窃内容复杂性对主要依赖词汇相似性度量的现有检测系统提出了重大挑战。本文提出的基于变换的语义关系提取(T-SRE)框架利用深度语义分析解决了传统n图和字符串匹配方法的局限性。该框架结合了用于句法关系映射的依赖解析(DP)和用于上下文实体识别的命名实体识别(NER),并通过基于转换器的神经网络进行增强,以捕获远程上下文依赖关系。该学习方法包含三个关键组件:位置感知词重排算法,用于结构相似性的Levenshtein距离度量,以及用于语义保存检测的上下文词嵌入。本文提出的T-SRE通过集成学习将位置感知重排序和语义保存相结合来增强文本结构识别。该系统实现了一种分层分类方案,通过四层分类来量化抄袭的严重程度:重抄袭、低抄袭、非抄袭和逐字抄袭。Udacity基准数据集展示了该模型卓越的检测能力,达到了92%的准确率、89%的召回率和90.5%的f1分数,特别是在轻量级文本修改方面。该框架的粒度得分为1.28,优于现有的方法。
{"title":"T-SRE: Transformer-based semantic Relation extraction for contextual paraphrased plagiarism detection","authors":"Pon Abisheka ,&nbsp;C. Deisy ,&nbsp;P. Sharmila","doi":"10.1016/j.jksuci.2024.102257","DOIUrl":"10.1016/j.jksuci.2024.102257","url":null,"abstract":"<div><div>Plagiarism has become a pervasive issue in academics and professionals to safeguard academic integrity and intellectual property rights. The escalating sophistication of plagiarized content through semantic manipulation and structural reorganization poses significant challenges to existing detection systems that rely primarily on lexical similarity measures. The proposed T-SRE (Transformer-based Semantic Relation Extraction), a novel framework addresses the limitations of traditional n-gram and string-matching approaches by leveraging deep semantic analysis. The proposed framework combines Dependency Parsing (DP) for syntactic relationship mapping and Named Entity Recognition (NER) for contextual entity identification, augmented by a transformer-based neural network that captures long-range contextual dependencies. This learning methodology incorporates three key components: a position-aware word reordering algorithm, Levenshtein distance metric for structural similarity, and contextual word embeddings for semantic preservation detection. The proposed T-SRE enhances text structure recognition by combining position-aware reordering with semantic preservation through ensemble learning. The system implements a hierarchical classification scheme that quantifies plagiarism severity through a four-tier taxonomy: heavy, low, non-plagiarized and verbatim copy. The Udacity benchmark dataset showcases the model’s superior detection capabilities, achieving 92% precision, 89% recall, and an F1-score of 90.5%, particularly in lightweight textual modifications.The framework achieves a granularity score of 1.28, outperforming existing approaches.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102257"},"PeriodicalIF":5.2,"publicationDate":"2024-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142744903","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image stitching algorithm based on two-stage optimal seam line search 基于两阶段最佳缝合线搜索的图像缝合算法
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-23 DOI: 10.1016/j.jksuci.2024.102256
Guijin Han , Yuanzheng Zhang , Mengchun Zhou
Traditional feature matching algorithms often struggle with poor performance in scenarios involving local detail deformations under varying perspectives. Additionally, traditional optimal seamline search-based image stitching algorithms tend to overlook structural and texture information, resulting in ghosting and visible seams. To address these issues, this paper proposes an image stitching algorithm based on a two-stage optimal seamline search. The algorithm leverages a Homography Network as the foundation, incorporating a homography detail-aware network (HDAN) for feature point matching. By introducing a cost volume in the feature matching layer, the algorithm enhances the description of local detail deformation relationships, thereby improving feature matching performance under different perspectives. The two-stage optimal seamline search algorithm designed for image fusion introduces gradient and structural similarity features on top of traditional color-based optimal seamline search algorithms. The algorithm steps include: (1) Searching for structurally similar regions, i.e., high-frequency regions in high-gradient images, and using a color-based graph cut algorithm to search for seamlines within all high-frequency regions, excluding horizontal seamlines; (2) Using a dynamic programming algorithm to complete each vertical seamline, where the pixel energy is comprehensively calculated based on its differences in color and gradient with the surrounding area. The complete seamline energies are then calculated using color, gradient, and structural similarity differences within the seamline neighborhood, and the seamline with the minimum energy is selected as the optimal seamline. A simulation experiment was conducted using 30 image pairs from the UDIS-D dataset (Unsupervised Deep Image Stitching Dataset). The results demonstrate significant improvements in PSNR and SSIM metrics compared to other image stitching algorithms, with PSNR improvements ranging from 5.63% to 11.25% and SSIM improvements ranging from 11.09% to 24.54%, confirming the superiority of this algorithm in image stitching tasks. The proposed image stitching algorithm based on two-stage optimal seamline search, whether evaluated through subjective visual perception or objective data comparison, outperforms other algorithms by enhancing the natural transition of seamlines in terms of structure and texture, reducing ghosting and visible seams in stitched images.
传统的特征匹配算法在涉及不同视角下局部细节变形的情况下往往表现不佳。此外,传统的基于最佳接缝线搜索的图像拼接算法往往会忽略结构和纹理信息,从而导致重影和可见接缝。为了解决这些问题,本文提出了一种基于两阶段最优接缝线搜索的图像拼接算法。该算法以同构网络为基础,结合了用于特征点匹配的同构细节感知网络(HDAN)。通过在特征匹配层引入代价量,该算法增强了对局部细节变形关系的描述,从而提高了不同视角下的特征匹配性能。为图像融合设计的两阶段最优缝合线搜索算法在传统的基于颜色的最优缝合线搜索算法基础上引入了梯度和结构相似性特征。算法步骤包括(1) 搜索结构相似区域,即高梯度图像中的高频区域,使用基于颜色的图切割算法搜索所有高频区域内的接缝线,不包括水平接缝线;(2) 使用动态编程算法完成每条垂直接缝线,根据像素与周围区域的颜色和梯度差异综合计算像素能量。然后利用接缝线邻域内的颜色、梯度和结构相似性差异计算完整的接缝线能量,并选择能量最小的接缝线作为最优接缝线。我们使用 UDIS-D 数据集(无监督深度图像拼接数据集)中的 30 对图像进行了模拟实验。结果表明,与其他图像拼接算法相比,该算法在 PSNR 和 SSIM 指标上有明显改善,PSNR 提高了 5.63% 至 11.25%,SSIM 提高了 11.09% 至 24.54%,这证实了该算法在图像拼接任务中的优越性。所提出的基于两阶段最佳缝合线搜索的图像拼接算法,无论是通过主观视觉感知还是客观数据对比进行评估,都优于其他算法,因为它增强了缝合线在结构和纹理方面的自然过渡,减少了拼接图像中的重影和可见缝。
{"title":"Image stitching algorithm based on two-stage optimal seam line search","authors":"Guijin Han ,&nbsp;Yuanzheng Zhang ,&nbsp;Mengchun Zhou","doi":"10.1016/j.jksuci.2024.102256","DOIUrl":"10.1016/j.jksuci.2024.102256","url":null,"abstract":"<div><div>Traditional feature matching algorithms often struggle with poor performance in scenarios involving local detail deformations under varying perspectives. Additionally, traditional optimal seamline search-based image stitching algorithms tend to overlook structural and texture information, resulting in ghosting and visible seams. To address these issues, this paper proposes an image stitching algorithm based on a two-stage optimal seamline search. The algorithm leverages a Homography Network as the foundation, incorporating a homography detail-aware network (HDAN) for feature point matching. By introducing a cost volume in the feature matching layer, the algorithm enhances the description of local detail deformation relationships, thereby improving feature matching performance under different perspectives. The two-stage optimal seamline search algorithm designed for image fusion introduces gradient and structural similarity features on top of traditional color-based optimal seamline search algorithms. The algorithm steps include: (1) Searching for structurally similar regions, i.e., high-frequency regions in high-gradient images, and using a color-based graph cut algorithm to search for seamlines within all high-frequency regions, excluding horizontal seamlines; (2) Using a dynamic programming algorithm to complete each vertical seamline, where the pixel energy is comprehensively calculated based on its differences in color and gradient with the surrounding area. The complete seamline energies are then calculated using color, gradient, and structural similarity differences within the seamline neighborhood, and the seamline with the minimum energy is selected as the optimal seamline. A simulation experiment was conducted using 30 image pairs from the UDIS-D dataset (Unsupervised Deep Image Stitching Dataset). The results demonstrate significant improvements in PSNR and SSIM metrics compared to other image stitching algorithms, with PSNR improvements ranging from 5.63% to 11.25% and SSIM improvements ranging from 11.09% to 24.54%, confirming the superiority of this algorithm in image stitching tasks. The proposed image stitching algorithm based on two-stage optimal seamline search, whether evaluated through subjective visual perception or objective data comparison, outperforms other algorithms by enhancing the natural transition of seamlines in terms of structure and texture, reducing ghosting and visible seams in stitched images.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102256"},"PeriodicalIF":5.2,"publicationDate":"2024-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142723733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CRNet: Cascaded Refinement Network for polyp segmentation CRNet:用于息肉分割的级联细化网络
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-22 DOI: 10.1016/j.jksuci.2024.102250
Xiaolan Wen , Anwen Zhang , Chuan Lin , Xintao Pang
Technology for automatic segmentation plays a crucial role in the early diagnosis and treatment of ColoRectal Cancer (CRC). Existing polyp segmentation methods often focus on advanced feature extraction while neglecting detailed low-level features, This somewhat limits the enhancement of segmentation performance. This paper proposes a new technique called the Cascaded Refinement Network (CRNet), designed to improve polyp segmentation performance by combining low-level and high-level features through a cascaded contextual network structure. To accurately capture the morphological variations of polyps and enhance the clarity of segmentation boundaries, we have designed the Multi-Scale Feature Optimization (MFO) module and the Contextual Edge Guidance (CEG) module. Additionally, to further enhance feature fusion and utilization, we introduced the Cascaded Local Feature Fusion (CLFF) module, which effectively integrates cross-layer correlations, allowing the network to understand complex polyp structures better. By conducting a large number of experiments, our model achieved a 0.3% and 3.1% higher mDice score than the latest MMFIL-Net in the two main datasets of Kvasir-SEG and CVC-ClinicDB, respectively. Ablation studies show that MFO improves the baseline score by 4%, and the network without CLFF and CEG results in a reduction of 2.4% and 1.7% in mDice scores, respectively. This further validates the contribution of each module to the polyp segmentation performance. CRNet enhances model performance through the introduction of multiple modules but also increases model complexity. Future work will explore how to reduce computational complexity and improve inference speed while maintaining high performance. The source code for this paper can be found at https://github.com/l1986036/CRNet.
自动分割技术在结直肠癌(CRC)的早期诊断和治疗中发挥着至关重要的作用。现有的息肉分割方法往往侧重于高级特征提取,而忽略了详细的低级特征,这在一定程度上限制了分割性能的提高。本文提出了一种名为级联细化网络(CRNet)的新技术,旨在通过级联上下文网络结构结合低级和高级特征来提高息肉分割性能。为了准确捕捉息肉的形态变化并提高分割边界的清晰度,我们设计了多尺度特征优化(MFO)模块和上下文边缘引导(CEG)模块。此外,为了进一步提高特征融合和利用率,我们还引入了级联局部特征融合(CLFF)模块,有效整合了跨层相关性,使网络能够更好地理解复杂的息肉结构。通过大量实验,我们的模型在 Kvasir-SEG 和 CVC-ClinicDB 两个主要数据集中的 mDice 得分分别比最新的 MMFIL-Net 高出 0.3% 和 3.1%。消融研究表明,MFO 可将基线分数提高 4%,而不含 CLFF 和 CEG 的网络可将 mDice 分数分别降低 2.4% 和 1.7%。这进一步验证了每个模块对息肉分割性能的贡献。CRNet 通过引入多个模块提高了模型性能,但也增加了模型的复杂性。未来的工作将探索如何在保持高性能的同时降低计算复杂度和提高推理速度。本文的源代码见 https://github.com/l1986036/CRNet。
{"title":"CRNet: Cascaded Refinement Network for polyp segmentation","authors":"Xiaolan Wen ,&nbsp;Anwen Zhang ,&nbsp;Chuan Lin ,&nbsp;Xintao Pang","doi":"10.1016/j.jksuci.2024.102250","DOIUrl":"10.1016/j.jksuci.2024.102250","url":null,"abstract":"<div><div>Technology for automatic segmentation plays a crucial role in the early diagnosis and treatment of ColoRectal Cancer (CRC). Existing polyp segmentation methods often focus on advanced feature extraction while neglecting detailed low-level features, This somewhat limits the enhancement of segmentation performance. This paper proposes a new technique called the Cascaded Refinement Network (CRNet), designed to improve polyp segmentation performance by combining low-level and high-level features through a cascaded contextual network structure. To accurately capture the morphological variations of polyps and enhance the clarity of segmentation boundaries, we have designed the Multi-Scale Feature Optimization (MFO) module and the Contextual Edge Guidance (CEG) module. Additionally, to further enhance feature fusion and utilization, we introduced the Cascaded Local Feature Fusion (CLFF) module, which effectively integrates cross-layer correlations, allowing the network to understand complex polyp structures better. By conducting a large number of experiments, our model achieved a 0.3% and 3.1% higher mDice score than the latest MMFIL-Net in the two main datasets of Kvasir-SEG and CVC-ClinicDB, respectively. Ablation studies show that MFO improves the baseline score by 4%, and the network without CLFF and CEG results in a reduction of 2.4% and 1.7% in mDice scores, respectively. This further validates the contribution of each module to the polyp segmentation performance. CRNet enhances model performance through the introduction of multiple modules but also increases model complexity. Future work will explore how to reduce computational complexity and improve inference speed while maintaining high performance. The source code for this paper can be found at <span><span>https://github.com/l1986036/CRNet</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102250"},"PeriodicalIF":5.2,"publicationDate":"2024-11-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142723734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing foreign exchange reserve security for central banks using Blockchain, FHE, and AWS 利用区块链、FHE 和 AWS 加强中央银行的外汇储备安全
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-20 DOI: 10.1016/j.jksuci.2024.102251
Khandakar Md Shafin , Saha Reno
In order to maintain the value of the national currency and control foreign debt, central banks are vital to the management of a nation’s foreign exchange reserves. These reserves, however, are vulnerable to a variety of hazards, including as money laundering, fraud, theft, and cyberattacks. These are issues that traditional financial systems frequently face because of their vulnerabilities and inefficiency. Using modern innovations in a blockchain-based solution can help tackle these serious issues. To protect data privacy, the Microsoft SEAL library is utilized for homomorphic encryption (FHE). For the development of smart contracts, Solidity is employed within the Ethereum blockchain ecosystem. Additionally, Amazon Web Services (AWS) is leveraged to provide a scalable and powerful infrastructure to support our solution. To guarantee safe and effective transaction validation, our method incorporates a hybrid consensus process that combines Proof of Authority (PoA) with Byzantine Fault Tolerance (BFT). The administration of foreign exchange reserves by central banks is made more secure, transparent, and operationally efficient by this all-inclusive approach.
为了保持本国货币的价值和控制外债,中央银行对国家外汇储备的管理至关重要。然而,这些储备容易受到各种危害的影响,包括洗钱、欺诈、盗窃和网络攻击。这些都是传统金融系统因其脆弱性和低效率而经常面临的问题。在基于区块链的解决方案中使用现代创新技术有助于解决这些严重问题。为了保护数据隐私,微软 SEAL 库被用于同态加密(FHE)。为了开发智能合约,在以太坊区块链生态系统中使用了 Solidity。此外,亚马逊网络服务(AWS)为支持我们的解决方案提供了可扩展的强大基础设施。为了保证安全有效的交易验证,我们的方法采用了混合共识流程,将权威证明(PoA)与拜占庭容错(BFT)相结合。通过这种包罗万象的方法,中央银行对外汇储备的管理变得更加安全、透明和高效。
{"title":"Enhancing foreign exchange reserve security for central banks using Blockchain, FHE, and AWS","authors":"Khandakar Md Shafin ,&nbsp;Saha Reno","doi":"10.1016/j.jksuci.2024.102251","DOIUrl":"10.1016/j.jksuci.2024.102251","url":null,"abstract":"<div><div>In order to maintain the value of the national currency and control foreign debt, central banks are vital to the management of a nation’s foreign exchange reserves. These reserves, however, are vulnerable to a variety of hazards, including as money laundering, fraud, theft, and cyberattacks. These are issues that traditional financial systems frequently face because of their vulnerabilities and inefficiency. Using modern innovations in a blockchain-based solution can help tackle these serious issues. To protect data privacy, the Microsoft SEAL library is utilized for homomorphic encryption (FHE). For the development of smart contracts, Solidity is employed within the Ethereum blockchain ecosystem. Additionally, Amazon Web Services (AWS) is leveraged to provide a scalable and powerful infrastructure to support our solution. To guarantee safe and effective transaction validation, our method incorporates a hybrid consensus process that combines Proof of Authority (PoA) with Byzantine Fault Tolerance (BFT). The administration of foreign exchange reserves by central banks is made more secure, transparent, and operationally efficient by this all-inclusive approach.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102251"},"PeriodicalIF":5.2,"publicationDate":"2024-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving cache-enabled D2D communications using actor–critic networks over licensed and unlicensed spectrum 在许可和非许可频谱上利用行为批评网络改进支持缓存的 D2D 通信
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1016/j.jksuci.2024.102249
Muhammad Sheraz , Teong Chee Chuah , Kashif Sultan , Manzoor Ahmed , It Ee Lee , Saw Chin Tan
Cache-enabled Device-to-Device (D2D) communications is an effective way to improve data sharing. User Equipment (UE)-level caching holds the potential to reduce the data traffic burden on the core network. Licensed spectrum is utilized for D2D communications, but due to spectrum scarcity, exploring unlicensed spectrum is essential to enhance network capacity. In this paper, we propose caching at the UE-level and exploit both licensed and unlicensed spectrum for optimizing throughput. First, we propose a reinforcement learning-based data caching scheme leveraging an actor–critic network to improve cache-enabled D2D communications. Besides, licensed and unlicensed spectrum are devised for D2D communications considering interference from existing cellular and Wi-Fi users. A duty cycle-based unlicensed spectrum access algorithm is employed, guaranteeing the Signal-to-Interference and Noise Ratio (SINR) required by the users. The unlicensed spectrum is prone to data packets collisions. Therefore, Request-to-Send/Clear-to-Send (RTS/CTS) mechanism is utilized in conjunction with Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to alleviate both the interference and packets collision problems of the unlicensed spectrum. Extensive simulations are performed to analyze the performance gain of our proposed scheme compared to the benchmarks under different network scenarios. The obtained results demonstrate that our proposed scheme possesses the potential to optimize network performance.
支持缓存的设备到设备(D2D)通信是改善数据共享的有效方法。用户设备(UE)级缓存有可能减轻核心网络的数据流量负担。许可频谱可用于 D2D 通信,但由于频谱稀缺,探索非许可频谱对提高网络容量至关重要。在本文中,我们提出了 UE 级缓存,并利用许可和非许可频谱优化吞吐量。首先,我们提出了一种基于强化学习的数据缓存方案,利用行为批判网络改善缓存支持的 D2D 通信。此外,考虑到现有蜂窝和 Wi-Fi 用户的干扰,我们还为 D2D 通信设计了许可和非许可频谱。采用了基于占空比的非授权频谱接入算法,保证了用户所需的信噪比(SINR)。未授权频谱容易发生数据包碰撞。因此,请求发送/清除发送(RTS/CTS)机制与带碰撞避免功能的载波侦测多路访问(CSMA/CA)相结合,可减轻非授权频谱的干扰和数据包碰撞问题。我们进行了广泛的仿真,分析了在不同网络场景下,我们提出的方案与基准方案相比的性能增益。结果表明,我们提出的方案具有优化网络性能的潜力。
{"title":"Improving cache-enabled D2D communications using actor–critic networks over licensed and unlicensed spectrum","authors":"Muhammad Sheraz ,&nbsp;Teong Chee Chuah ,&nbsp;Kashif Sultan ,&nbsp;Manzoor Ahmed ,&nbsp;It Ee Lee ,&nbsp;Saw Chin Tan","doi":"10.1016/j.jksuci.2024.102249","DOIUrl":"10.1016/j.jksuci.2024.102249","url":null,"abstract":"<div><div>Cache-enabled Device-to-Device (D2D) communications is an effective way to improve data sharing. User Equipment (UE)-level caching holds the potential to reduce the data traffic burden on the core network. Licensed spectrum is utilized for D2D communications, but due to spectrum scarcity, exploring unlicensed spectrum is essential to enhance network capacity. In this paper, we propose caching at the UE-level and exploit both licensed and unlicensed spectrum for optimizing throughput. First, we propose a reinforcement learning-based data caching scheme leveraging an actor–critic network to improve cache-enabled D2D communications. Besides, licensed and unlicensed spectrum are devised for D2D communications considering interference from existing cellular and Wi-Fi users. A duty cycle-based unlicensed spectrum access algorithm is employed, guaranteeing the Signal-to-Interference and Noise Ratio (SINR) required by the users. The unlicensed spectrum is prone to data packets collisions. Therefore, Request-to-Send/Clear-to-Send (RTS/CTS) mechanism is utilized in conjunction with Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) to alleviate both the interference and packets collision problems of the unlicensed spectrum. Extensive simulations are performed to analyze the performance gain of our proposed scheme compared to the benchmarks under different network scenarios. The obtained results demonstrate that our proposed scheme possesses the potential to optimize network performance.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102249"},"PeriodicalIF":5.2,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
L2-MA-CPABE: A ciphertext access control scheme integrating blockchain and off-chain computation with zero knowledge proof L2-MA-CPABE:一种集成了区块链和链外计算、具有零知识证明的密文访问控制方案
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-19 DOI: 10.1016/j.jksuci.2024.102247
Zhixin Ren, Yimin Yu, Enhua Yan, Taowei Chen
To enhance the security of ciphertext-policy attribute-based encryption (CP-ABE) and achieve fully distributed key generation (DKG), this paper proposes a ciphertext access control scheme integrating blockchain and off-chain computation with zero knowledge proof based on Layer-2 and multi-authority CP-ABE. Firstly, we enhance the system into two layers and construct a Layer-2 distributed key management service framework. This framework improves system efficiency and scalability while reducing costs. Secondly, we design the proof of trust contribution (PoTC) consensus algorithm to elect high-trust nodes responsible for DKG and implement an incentive mechanism for key computation through smart contract design. Finally, we design a non-interactive zero-knowledge proof protocol to achieve correctness verification of off-chain key computation. Security analysis and simulation experiments demonstrate that our scheme achieves high security while significantly improving system performance. The time consumption for data users to obtain attribute private keys is controlled at tens of milliseconds.
为了增强基于密文策略属性的加密(CP-ABE)的安全性,实现全分布式密钥生成(DKG),本文提出了一种基于Layer-2和多授权CP-ABE的集区块链和链外计算与零知识证明于一体的密文访问控制方案。首先,我们将系统增强为两层,并构建了第二层分布式密钥管理服务框架。该框架提高了系统效率和可扩展性,同时降低了成本。其次,我们设计了信任贡献证明(PoTC)共识算法,选出负责 DKG 的高信任节点,并通过智能合约设计实现了密钥计算的激励机制。最后,我们设计了一种非交互式零知识证明协议,以实现链外密钥计算的正确性验证。安全分析和仿真实验证明,我们的方案在显著提高系统性能的同时实现了高安全性。数据用户获取属性私钥的时间消耗控制在几十毫秒。
{"title":"L2-MA-CPABE: A ciphertext access control scheme integrating blockchain and off-chain computation with zero knowledge proof","authors":"Zhixin Ren,&nbsp;Yimin Yu,&nbsp;Enhua Yan,&nbsp;Taowei Chen","doi":"10.1016/j.jksuci.2024.102247","DOIUrl":"10.1016/j.jksuci.2024.102247","url":null,"abstract":"<div><div>To enhance the security of ciphertext-policy attribute-based encryption (CP-ABE) and achieve fully distributed key generation (DKG), this paper proposes a ciphertext access control scheme integrating blockchain and off-chain computation with zero knowledge proof based on Layer-2 and multi-authority CP-ABE. Firstly, we enhance the system into two layers and construct a Layer-2 distributed key management service framework. This framework improves system efficiency and scalability while reducing costs. Secondly, we design the proof of trust contribution (PoTC) consensus algorithm to elect high-trust nodes responsible for DKG and implement an incentive mechanism for key computation through smart contract design. Finally, we design a non-interactive zero-knowledge proof protocol to achieve correctness verification of off-chain key computation. Security analysis and simulation experiments demonstrate that our scheme achieves high security while significantly improving system performance. The time consumption for data users to obtain attribute private keys is controlled at tens of milliseconds.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102247"},"PeriodicalIF":5.2,"publicationDate":"2024-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705877","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
LMGA: Lightweight multi-graph augmentation networks for safe medication recommendation LMGA:用于安全用药推荐的轻量级多图增强网络
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-17 DOI: 10.1016/j.jksuci.2024.102245
Xingxu Fan , Xiaomei Yu , Xue Li , Fengru Ge , Yanjie Zhao
The rapid accumulation of large-scale electronic health records (EHRs) has witnessed the prosperity of intelligent medicine, such as medication recommendation (MR). However, most studies either fail to fully capture the structural correlation and temporal dependence among various medical records, or disregard the computational efficiency of the MR models. To fill this gap, we put forward a Lightweight Medication recommendation method which integrates bidirectional gate recurrent units (BiGRUs) with light graph convolutional networks (LGCNs) based on the multiple Graph Augmentation networks (LMGA). Specifically, BiGRUs are deployed to encode longitudinal visit histories and generate patient representations from a holistic perspective. Additionally, a memory network is constructed to extract local personalized features in the patients’ historical EHRs, and LGCNs are deployed to learn both drug co-occurrence and antagonistic relationships for integral drug representations with reduced computational resource requirements. Moreover, a drug molecular graph is leveraged to capture structural information and control potential DDIs in predicted medication combinations. Incorporating the representations of patients and medications, a lightweight and safe medication recommendation is available to promote prediction performance with reduced computational resource consumption. Finally, we conduct a series of experiments to evaluate the proposed LMGA on two publicly available datasets, and the experimental results demonstrate the superior performance of LMGA in MR tasks compared with the state-of-the-art baseline models.
大规模电子健康记录(EHR)的快速积累见证了智能医疗的繁荣,例如药物推荐(MR)。然而,大多数研究要么未能充分捕捉各种医疗记录之间的结构相关性和时间依赖性,要么忽视了 MR 模型的计算效率。为了填补这一空白,我们提出了一种轻量级用药推荐方法,该方法将双向门递归单元(BiGRUs)与基于多重图增强网络(LMGA)的轻图卷积网络(LGCNs)整合在一起。具体来说,BiGRU 用于编码纵向就诊历史,并从整体角度生成患者表征。此外,还构建了一个记忆网络来提取患者历史 EHR 中的局部个性化特征,并部署 LGCNs 来学习药物共现和拮抗关系,从而在减少计算资源需求的情况下获得完整的药物表征。此外,还利用药物分子图来捕捉结构信息,并控制预测药物组合中潜在的 DDI。结合患者和药物的表征,可以提供轻量级的安全药物推荐,从而在降低计算资源消耗的同时提高预测性能。最后,我们在两个公开数据集上进行了一系列实验来评估所提出的 LMGA,实验结果表明,与最先进的基线模型相比,LMGA 在 MR 任务中的性能更优越。
{"title":"LMGA: Lightweight multi-graph augmentation networks for safe medication recommendation","authors":"Xingxu Fan ,&nbsp;Xiaomei Yu ,&nbsp;Xue Li ,&nbsp;Fengru Ge ,&nbsp;Yanjie Zhao","doi":"10.1016/j.jksuci.2024.102245","DOIUrl":"10.1016/j.jksuci.2024.102245","url":null,"abstract":"<div><div>The rapid accumulation of large-scale electronic health records (EHRs) has witnessed the prosperity of intelligent medicine, such as medication recommendation (MR). However, most studies either fail to fully capture the structural correlation and temporal dependence among various medical records, or disregard the computational efficiency of the MR models. To fill this gap, we put forward a <strong>L</strong>ightweight <strong>M</strong>edication recommendation method which integrates bidirectional gate recurrent units (BiGRUs) with light graph convolutional networks (LGCNs) based on the multiple <strong>G</strong>raph <strong>A</strong>ugmentation networks (LMGA). Specifically, BiGRUs are deployed to encode longitudinal visit histories and generate patient representations from a holistic perspective. Additionally, a memory network is constructed to extract local personalized features in the patients’ historical EHRs, and LGCNs are deployed to learn both drug co-occurrence and antagonistic relationships for integral drug representations with reduced computational resource requirements. Moreover, a drug molecular graph is leveraged to capture structural information and control potential DDIs in predicted medication combinations. Incorporating the representations of patients and medications, a lightweight and safe medication recommendation is available to promote prediction performance with reduced computational resource consumption. Finally, we conduct a series of experiments to evaluate the proposed LMGA on two publicly available datasets, and the experimental results demonstrate the superior performance of LMGA in MR tasks compared with the state-of-the-art baseline models.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102245"},"PeriodicalIF":5.2,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ACTF: An efficient lossless compression algorithm for time series floating point data ACTF:针对时间序列浮点数据的高效无损压缩算法
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-16 DOI: 10.1016/j.jksuci.2024.102246
Weijie Wang , Wenhui Chen , Qinhon Lei , Zhe Li , Huihuang Zhao
The volume of time series data across various fields is steadily increasing. However, this unprocessed massive data challenges transmission efficiency, computational arithmetic, and storage capacity. Therefore, the compression of time series data is essential for improving transmission, computation, and storage. Currently, improving time series floating-point coding rules is the primary method for enhancing compression algorithms efficiency and ratio. This paper presents an efficient lossless compression algorithm for time series floating point data, designed based on existing compression algorithms. We employ three optimization strategies data preprocessing, coding category expansion, and feature refinement representation to enhance the compression ratio and efficiency of compressing time-series floating-point numbers. Through experimental comparisons and validations, we demonstrate that our algorithm outperforms Chimp, Chimp128, Gorilla, and other compression algorithms across multiple datasets. The experimental results on 30 datasets show that our algorithm improves the compression ratio of time series algorithms by an average of 12.25% and compression and decompression efficiencies by an average of 27.21%. Notably, it achieves a 24.06% compression ratio improvement on the IOT1 dataset and a 42.96% compression and decompression efficiency improvement on the IOT4 dataset.
各领域的时间序列数据量正在稳步增长。然而,这些未经处理的海量数据对传输效率、计算运算和存储容量提出了挑战。因此,时间序列数据的压缩对于提高传输、计算和存储能力至关重要。目前,改进时间序列浮点编码规则是提高压缩算法效率和压缩比的主要方法。本文在现有压缩算法的基础上,提出了一种高效的时间序列浮点数据无损压缩算法。我们采用了数据预处理、编码类别扩展和特征细化表示三种优化策略,以提高时间序列浮点数的压缩比和压缩效率。通过实验对比和验证,我们证明了我们的算法在多个数据集上优于 Chimp、Chimp128、Gorilla 和其他压缩算法。在 30 个数据集上的实验结果表明,我们的算法将时间序列算法的压缩率平均提高了 12.25%,压缩和解压缩效率平均提高了 27.21%。值得注意的是,它在 IOT1 数据集上提高了 24.06% 的压缩率,在 IOT4 数据集上提高了 42.96% 的压缩和解压缩效率。
{"title":"ACTF: An efficient lossless compression algorithm for time series floating point data","authors":"Weijie Wang ,&nbsp;Wenhui Chen ,&nbsp;Qinhon Lei ,&nbsp;Zhe Li ,&nbsp;Huihuang Zhao","doi":"10.1016/j.jksuci.2024.102246","DOIUrl":"10.1016/j.jksuci.2024.102246","url":null,"abstract":"<div><div>The volume of time series data across various fields is steadily increasing. However, this unprocessed massive data challenges transmission efficiency, computational arithmetic, and storage capacity. Therefore, the compression of time series data is essential for improving transmission, computation, and storage. Currently, improving time series floating-point coding rules is the primary method for enhancing compression algorithms efficiency and ratio. This paper presents an efficient lossless compression algorithm for time series floating point data, designed based on existing compression algorithms. We employ three optimization strategies data preprocessing, coding category expansion, and feature refinement representation to enhance the compression ratio and efficiency of compressing time-series floating-point numbers. Through experimental comparisons and validations, we demonstrate that our algorithm outperforms Chimp, Chimp<sub>128</sub>, Gorilla, and other compression algorithms across multiple datasets. The experimental results on 30 datasets show that our algorithm improves the compression ratio of time series algorithms by an average of 12.25% and compression and decompression efficiencies by an average of 27.21%. Notably, it achieves a 24.06% compression ratio improvement on the IOT1 dataset and a 42.96% compression and decompression efficiency improvement on the IOT4 dataset.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102246"},"PeriodicalIF":5.2,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The multi-objective task assignment scheme for software crowdsourcing platforms involving new workers 新员工参与的软件众包平台的多目标任务分配方案
IF 5.2 2区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-11-16 DOI: 10.1016/j.jksuci.2024.102237
Minglan Fu, Zhijie Zhang, ZouXi Wang, Debao Chen
Software crowdsourcing has become a cornerstone of the Internet economy because of its unique capacity for selecting optimal workers to complete specific tasks. However, new workers face limited task opportunities compared to experienced workers, which negatively impacts their motivation and decreases overall activity on crowdsourcing platforms. This reduced activity can harm platform reputation. To encourage the active participation of new workers, this study introduces a novel method to identify and match worker–task preferences. Our approach categorizes preferred tasks based on golden tasks, historical data, and worker interests. We then present the Multi-Objective Worker–Task Recommendation (MOWTR) algorithm, built upon the Non-Dominated Sorting Genetic Algorithm II (NSGA-II). The MOWTR algorithm allocates tasks by considering worker preferences, salaries, and capabilities, aiming to optimize collective team performance while minimizing team costs, especially for new workers. New crossover and two-stage mutation operators are incorporated to increase algorithm efficiency. Experimental evaluations on four real and synthetic datasets demonstrate that MOWTR outperforms four advanced baseline methods, confirming its effectiveness.
软件众包因其选择最佳工人完成特定任务的独特能力而成为互联网经济的基石。然而,与经验丰富的员工相比,新员工面临的任务机会有限,这对他们的积极性产生了负面影响,并降低了众包平台的整体活跃度。活跃度降低会损害平台声誉。为了鼓励新员工积极参与,本研究引入了一种新方法来识别和匹配员工的任务偏好。我们的方法根据黄金任务、历史数据和工人兴趣对首选任务进行分类。然后,我们在非支配排序遗传算法 II(NSGA-II)的基础上提出了多目标工人任务推荐(MOWTR)算法。MOWTR 算法通过考虑工人的偏好、工资和能力来分配任务,旨在优化团队集体绩效,同时最大限度地降低团队成本,尤其是新工人的成本。新的交叉和两阶段突变算子的加入提高了算法的效率。在四个真实和合成数据集上进行的实验评估表明,MOWTR 优于四种先进的基线方法,证实了它的有效性。
{"title":"The multi-objective task assignment scheme for software crowdsourcing platforms involving new workers","authors":"Minglan Fu,&nbsp;Zhijie Zhang,&nbsp;ZouXi Wang,&nbsp;Debao Chen","doi":"10.1016/j.jksuci.2024.102237","DOIUrl":"10.1016/j.jksuci.2024.102237","url":null,"abstract":"<div><div>Software crowdsourcing has become a cornerstone of the Internet economy because of its unique capacity for selecting optimal workers to complete specific tasks. However, new workers face limited task opportunities compared to experienced workers, which negatively impacts their motivation and decreases overall activity on crowdsourcing platforms. This reduced activity can harm platform reputation. To encourage the active participation of new workers, this study introduces a novel method to identify and match worker–task preferences. Our approach categorizes preferred tasks based on golden tasks, historical data, and worker interests. We then present the Multi-Objective Worker–Task Recommendation (MOWTR) algorithm, built upon the Non-Dominated Sorting Genetic Algorithm II (NSGA-II). The MOWTR algorithm allocates tasks by considering worker preferences, salaries, and capabilities, aiming to optimize collective team performance while minimizing team costs, especially for new workers. New crossover and two-stage mutation operators are incorporated to increase algorithm efficiency. Experimental evaluations on four real and synthetic datasets demonstrate that MOWTR outperforms four advanced baseline methods, confirming its effectiveness.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102237"},"PeriodicalIF":5.2,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1