首页 > 最新文献

Journal of King Saud University-Computer and Information Sciences最新文献

英文 中文
Using Twitter as a digital insight into public stance on societal behavioral dynamics 利用推特以数字方式洞察公众对社会行为动态的态度
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102078
Aqil M. Azmi, Abdulrahman I. Al-Ghadir

This study explores X’s (formerly Twitter’s) capacity to serve as a real-time barometer of public sentiment, contextualized within the transformative reforms of Saudi Arabia during 2016–2017. The objective was to decipher the populace’s response to these significant national changes by analyzing approximately 200 million tweets in native Arabic dialects, thereby aiming for an authentic portrayal of local sentiment. Our methodology entailed a dual-phase analysis: initial tweet examination to discern prevalent social behaviors, followed by stance detection to classify tweets according to their support, neutrality, or opposition to the divisive issues at hand. For sentiment extraction, we employed a sophisticated feature vector, integrating the k most frequent words and stems. A comprehensive evaluation of various classifiers was conducted, including Support Vector Machine and several variants of K-nearest neighbors (K-NN), with a particular emphasis on their applicability to our dataset. Notably, the 9-NN classifier, and more specifically, the weighted K-NN approach, demonstrated remarkable performance, achieving an F-score of 72.45%. These insights not only shed light on the public’s reception to the Saudi reforms but also position Twitter as a viable, real-time alternative to traditional survey methods for capturing the nuances of public opinion, thereby offering valuable perspectives for policy formulation.

本研究以 2016-2017 年期间沙特阿拉伯的转型改革为背景,探讨了 X(原 Twitter)作为公众情绪实时晴雨表的能力。研究的目的是通过分析约 2 亿条阿拉伯语推文,解读民众对这些重大国家变革的反应,从而真实反映当地的情绪。我们的方法包括两个阶段的分析:首先检查推文以辨别普遍的社会行为,然后进行立场检测,根据推文对当前分裂问题的支持、中立或反对程度对其进行分类。在情感提取方面,我们采用了一个复杂的特征向量,整合了 k 个最常见的单词和词干。我们对各种分类器进行了综合评估,其中包括支持向量机和 K-近邻(K-NN)的几种变体,并特别强调了它们对我们数据集的适用性。值得注意的是,9-NN 分类器,更具体地说,加权 K-NN 方法表现出色,F 分数高达 72.45%。这些见解不仅揭示了公众对沙特改革的接受程度,还将 Twitter 定位为一种可行的、实时的、可替代传统调查方法的捕捉民意细微差别的方法,从而为政策制定提供有价值的视角。
{"title":"Using Twitter as a digital insight into public stance on societal behavioral dynamics","authors":"Aqil M. Azmi,&nbsp;Abdulrahman I. Al-Ghadir","doi":"10.1016/j.jksuci.2024.102078","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102078","url":null,"abstract":"<div><p>This study explores X’s (formerly Twitter’s) capacity to serve as a real-time barometer of public sentiment, contextualized within the transformative reforms of Saudi Arabia during 2016–2017. The objective was to decipher the populace’s response to these significant national changes by analyzing approximately 200 million tweets in native Arabic dialects, thereby aiming for an authentic portrayal of local sentiment. Our methodology entailed a dual-phase analysis: initial tweet examination to discern prevalent social behaviors, followed by stance detection to classify tweets according to their support, neutrality, or opposition to the divisive issues at hand. For sentiment extraction, we employed a sophisticated feature vector, integrating the <span><math><mi>k</mi></math></span> most frequent words and stems. A comprehensive evaluation of various classifiers was conducted, including Support Vector Machine and several variants of <span><math><mi>K</mi></math></span>-nearest neighbors (<em>K</em>-NN), with a particular emphasis on their applicability to our dataset. Notably, the 9-NN classifier, and more specifically, the weighted <em>K</em>-NN approach, demonstrated remarkable performance, achieving an <span><math><mi>F</mi></math></span>-score of 72.45%. These insights not only shed light on the public’s reception to the Saudi reforms but also position Twitter as a viable, real-time alternative to traditional survey methods for capturing the nuances of public opinion, thereby offering valuable perspectives for policy formulation.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001678/pdfft?md5=3d4625d5e627d37058cbc75afe0e84d8&pid=1-s2.0-S1319157824001678-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141289161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms 使用竞争性群体优化算法特征选择的标签学习方法,以改进多标签分类算法
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102083
Lianhe Cui

One of the crucial pre-processing stages in data mining and machine learning is feature selection, which is used to choose a subset of representative characteristics and decrease dimensions. By eliminating unnecessary and redundant features, feature selection can improve machine learning tasks’ accuracy. This work presents a novel multi-label classification (MLC) model utilizing a combination of stack regression (RR) and original label space transformation (IPLST) called RR-IPLST (original label space transformation-ridge regression). A novel embedded technique is implemented, utilizing competitive crowding optimizer (CSO) for multi-label feature selection. Particles are first created using this procedure, after which they are split into two equal groups and compete in pairs. The winners advance to the next iteration, while the losers pick up tips from the victors. At the conclusion of each iteration, the objective function for every particle is determined. A local search technique inspired by the gradient descent algorithm is used to find the local structure of the data, and half of the initial population is produced by the similarity between features and labels in order to boost the convergence rate. Ultimately, feature selection is carried out depending on the best particle. Six popular and sophisticated multi-label feature selection techniques are evaluated to see how well the suggested approach performs. According to the simulation results, the application of the suggested solution performs better than comparable techniques in terms of stability, accuracy, precision, convergence, error measurement, and other criteria that have been examined on various data sets. In 93.35% of cases, the test results demonstrate superiority over traditional algorithms.

特征选择是数据挖掘和机器学习中至关重要的预处理阶段之一,用于选择具有代表性的特征子集并减少维度。通过消除不必要的冗余特征,特征选择可以提高机器学习任务的准确性。本研究提出了一种新颖的多标签分类(MLC)模型,利用堆栈回归(RR)和原始标签空间变换(IPLST)的组合,称为 RR-IPLST(原始标签空间变换-脊回归)。该模型采用了一种新颖的嵌入式技术,利用竞争性拥挤优化器(CSO)进行多标签特征选择。首先使用该程序创建粒子,然后将粒子分成两个相等的组,并进行配对竞争。获胜者进入下一次迭代,而失败者则从获胜者那里获得提示。每次迭代结束后,每个粒子的目标函数都会确定。受梯度下降算法启发的局部搜索技术被用来寻找数据的局部结构,初始种群的一半是由特征和标签之间的相似性产生的,以提高收敛速度。最后,根据最佳粒子进行特征选择。我们评估了六种流行和复杂的多标签特征选择技术,以了解所建议方法的性能如何。模拟结果表明,在稳定性、准确性、精确性、收敛性、误差测量和其他在各种数据集上检验过的标准方面,建议解决方案的应用都优于同类技术。在 93.35% 的情况下,测试结果表明优于传统算法。
{"title":"A label learning approach using competitive population optimization algorithm feature selection to improve multi-label classification algorithms","authors":"Lianhe Cui","doi":"10.1016/j.jksuci.2024.102083","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102083","url":null,"abstract":"<div><p>One of the crucial pre-processing stages in data mining and machine learning is feature selection, which is used to choose a subset of representative characteristics and decrease dimensions. By eliminating unnecessary and redundant features, feature selection can improve machine learning tasks’ accuracy. This work presents a novel multi-label classification (MLC) model utilizing a combination of stack regression (RR) and original label space transformation (IPLST) called RR-IPLST (original label space transformation-ridge regression). A novel embedded technique is implemented, utilizing competitive crowding optimizer (CSO) for multi-label feature selection. Particles are first created using this procedure, after which they are split into two equal groups and compete in pairs. The winners advance to the next iteration, while the losers pick up tips from the victors. At the conclusion of each iteration, the objective function for every particle is determined. A local search technique inspired by the gradient descent algorithm is used to find the local structure of the data, and half of the initial population is produced by the similarity between features and labels in order to boost the convergence rate. Ultimately, feature selection is carried out depending on the best particle. Six popular and sophisticated multi-label feature selection techniques are evaluated to see how well the suggested approach performs. According to the simulation results, the application of the suggested solution performs better than comparable techniques in terms of stability, accuracy, precision, convergence, error measurement, and other criteria that have been examined on various data sets. In 93.35% of cases, the test results demonstrate superiority over traditional algorithms.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001721/pdfft?md5=bc950af29ef97e35d24c4f924eb4ca7d&pid=1-s2.0-S1319157824001721-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations 研究由 SDN 技术驱动的工业物联网智能工厂:对分类、架构、问题和未来研究方向的全面调查
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102069
Nteziriza Nkerabahizi Josbert, Min Wei, Ping Wang, Ahsan Rafiq

The Internet of Things (IoT) provides a major contribution to the innovation of smart manufacturing and industrial automation. Due to IoT, network devices and intelligent machines exchange information through different types of Internet connection and processes are predominantly automated. This reduces significantly the need for more human intervention and supports high performance. Nevertheless, the utilization of IoT in industrial automation called Industrial IoT (IIoT) has several issues, including the management of applications and IIoT devices. Moreover, heterogeneous networks and tremendous devices deployed in the IIoT environment require flexible configuration and reconfiguration according to the change for ensuring dynamic performance. We argue that Software-Defined Networking (SDN) is one of the technologies that can be used to solve some of the previously mentioned issues. In this paper, we propose a survey for the implementation of SDN solutions in IIoT and discuss the pros and cons brought about by this synergy named “SDN-IIoT”. We explore the current articles on SDN-IIoT by considering different crucial domains such as flow installation techniques, fault tolerance, traffic routing optimization, resource management, energy efficiency, real-time, and network security. Furthermore, we analyze Artificial Intelligence (AI)/Machine Learning (ML) tasks to improve the performance of SDN-IIoT and the deployment of different technologies like Network Function Virtualization (NFV) and Time-Sensitive Networking (TSN) in SDN-IIoT. After observing the limitations of existing SDN-IIoT architectures, we propose an improved candidate architecture for SDN-IIoT based on a hierarchical distributed control plane. The new SDN-IIoT architecture contains AI, Industrial Backhaul Network (IBN), Dynamic Hash Table (DHT), AdaptFlow protocol, and edge/cloud storages. This paper selects the five most used SDN controllers by the literature review and identifies the features of each SDN controller. In the end, we provide open challenges and future research orientations in SDN-IIoT. We hope that this paper will be helpful for engineers, organizations, and researchers on the innovation of IIoT and SDN technologies.

物联网(IoT)为智能制造和工业自动化的创新做出了重大贡献。由于物联网的存在,网络设备和智能机器通过不同类型的互联网连接交换信息,流程主要实现自动化。这大大减少了对更多人工干预的需求,并支持高性能。然而,物联网在工业自动化领域的应用被称为工业物联网(IIoT),它存在一些问题,包括应用程序和 IIoT 设备的管理。此外,部署在 IIoT 环境中的异构网络和巨大设备需要根据变化进行灵活配置和重新配置,以确保动态性能。我们认为,软件定义网络(SDN)是可以用来解决前面提到的一些问题的技术之一。在本文中,我们提出了在 IIoT 中实施 SDN 解决方案的调查,并讨论了这种名为 "SDN-IIoT "的协同作用所带来的利弊。我们通过考虑流量安装技术、容错、流量路由优化、资源管理、能效、实时性和网络安全等不同的关键领域,探讨了当前有关 SDN-IIoT 的文章。此外,我们还分析了提高 SDN-IIoT 性能的人工智能(AI)/机器学习(ML)任务,以及在 SDN-IIoT 中部署网络功能虚拟化(NFV)和时间敏感网络(TSN)等不同技术的情况。在观察了现有 SDN-IIoT 架构的局限性后,我们提出了一种基于分层分布式控制平面的 SDN-IIoT 改进候选架构。新的 SDN-IIoT 架构包含人工智能、工业回程网络(IBN)、动态哈希表(DHT)、AdaptFlow 协议和边缘/云存储。本文通过文献综述选出了五种最常用的 SDN 控制器,并指出了每种 SDN 控制器的特点。最后,我们提出了 SDN-IIoT 的开放挑战和未来研究方向。希望本文能对工程师、组织和研究人员在 IIoT 和 SDN 技术创新方面有所帮助。
{"title":"A look into smart factory for Industrial IoT driven by SDN technology: A comprehensive survey of taxonomy, architectures, issues and future research orientations","authors":"Nteziriza Nkerabahizi Josbert,&nbsp;Min Wei,&nbsp;Ping Wang,&nbsp;Ahsan Rafiq","doi":"10.1016/j.jksuci.2024.102069","DOIUrl":"10.1016/j.jksuci.2024.102069","url":null,"abstract":"<div><p>The Internet of Things (IoT) provides a major contribution to the innovation of smart manufacturing and industrial automation. Due to IoT, network devices and intelligent machines exchange information through different types of Internet connection and processes are predominantly automated. This reduces significantly the need for more human intervention and supports high performance. Nevertheless, the utilization of IoT in industrial automation called Industrial IoT (IIoT) has several issues, including the management of applications and IIoT devices. Moreover, heterogeneous networks and tremendous devices deployed in the IIoT environment require flexible configuration and reconfiguration according to the change for ensuring dynamic performance. We argue that Software-Defined Networking (SDN) is one of the technologies that can be used to solve some of the previously mentioned issues. In this paper, we propose a survey for the implementation of SDN solutions in IIoT and discuss the pros and cons brought about by this synergy named “SDN-IIoT”. We explore the current articles on SDN-IIoT by considering different crucial domains such as flow installation techniques, fault tolerance, traffic routing optimization, resource management, energy efficiency, real-time, and network security. Furthermore, we analyze Artificial Intelligence (AI)/Machine Learning (ML) tasks to improve the performance of SDN-IIoT and the deployment of different technologies like Network Function Virtualization (NFV) and Time-Sensitive Networking (TSN) in SDN-IIoT. After observing the limitations of existing SDN-IIoT architectures, we propose an improved candidate architecture for SDN-IIoT based on a hierarchical distributed control plane. The new SDN-IIoT architecture contains AI, Industrial Backhaul Network (IBN), Dynamic Hash Table (DHT), AdaptFlow protocol, and edge/cloud storages. This paper selects the five most used SDN controllers by the literature review and identifies the features of each SDN controller. In the end, we provide open challenges and future research orientations in SDN-IIoT. We hope that this paper will be helpful for engineers, organizations, and researchers on the innovation of IIoT and SDN technologies.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001587/pdfft?md5=6ce1982470bdb9855cf538db6ce55a9d&pid=1-s2.0-S1319157824001587-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141280561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects 无线网络的数字化转型:全面分析移动数据卸载技术、挑战和未来前景
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102071
Noryusra Rosele , Khuzairi Mohd Zaini , Nurakmal Ahmad Mustaffa , Ahmad Abrar , Suzi Iryanti Fadilah , Mohammed Madi

Mobile data offloading is a highly promising approach in mobile networks that tackles network congestion at Base Stations (BSs) and greatly improves both the Quality of Service (QoS) and Quality of Experience (QoE) for users. It presents significant business opportunities for operators, particularly in light of the exponential growth in mobile data traffic and the ongoing digital transformation. To effectively uphold the desired levels of QoS and QoE in the elevation of escalating digitalization and the unprecedented surge in data traffic, this paper presents offloading through a diverse range of technologies such as data offloading through Small Cell Networks (SCNs), Wi-Fi offloading, Device-to-Device (D2D) offloading, and data offloading through Vehicular Ad-Hoc Networks (VANETs). The SCNs and Wi-Fi offloading involve migrating data traffic to the alternative infrastructure i.e. the small BS and the Wi-Fi Access Points (AP), respectively while D2D focuses on transferring data through the device without transversing the BSs. VANETs is the process of offloading data in vehicular scenarios that consist of Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X). Additionally, mobile data offloading from cellular BS is categorized into four main factors: energy consumption or energy awareness, economic considerations, user satisfaction, and network congestion. These factors play a crucial role in the ongoing adoption and implementation of mobile data offloading strategies. Different technologies utilize diverse techniques to tackle the challenge of offloading, aligning with their specific research objectives. This paper delves into the challenges and outlines future research directions in the field of mobile traffic offloading.

移动数据卸载是移动网络中一种非常有前途的方法,它可以解决基站(BS)的网络拥塞问题,并大大提高服务质量(QoS)和用户体验质量(QoE)。它为运营商带来了巨大的商机,尤其是考虑到移动数据流量的指数级增长和正在进行的数字化转型。为了在数字化不断升级和数据流量空前激增的情况下有效维持所需的 QoS 和 QoE 水平,本文介绍了通过各种技术进行卸载的方法,如通过小蜂窝网络 (SCN) 进行数据卸载、Wi-Fi 卸载、设备到设备 (D2D) 卸载以及通过车载 Ad-Hoc 网络 (VANET) 进行数据卸载。SCNs 和 Wi-Fi 卸载分别涉及将数据流量迁移到替代基础设施,即小型 BS 和 Wi-Fi 接入点(AP),而 D2D 则侧重于通过设备传输数据,无需穿越 BS。VANETs 是在车辆场景中卸载数据的过程,包括车对车 (V2V)、车对基础设施 (V2I) 和车对万物 (V2X)。此外,从蜂窝基站卸载移动数据主要分为四个因素:能源消耗或能源意识、经济考虑、用户满意度和网络拥塞。这些因素对移动数据卸载策略的持续采用和实施起着至关重要的作用。不同的技术根据其特定的研究目标,利用不同的技术来应对卸载挑战。本文深入探讨了移动流量卸载领域所面临的挑战,并概述了未来的研究方向。
{"title":"Digital transformation in wireless networks: A comprehensive analysis of mobile data offloading techniques, challenges, and future prospects","authors":"Noryusra Rosele ,&nbsp;Khuzairi Mohd Zaini ,&nbsp;Nurakmal Ahmad Mustaffa ,&nbsp;Ahmad Abrar ,&nbsp;Suzi Iryanti Fadilah ,&nbsp;Mohammed Madi","doi":"10.1016/j.jksuci.2024.102071","DOIUrl":"10.1016/j.jksuci.2024.102071","url":null,"abstract":"<div><p>Mobile data offloading is a highly promising approach in mobile networks that tackles network congestion at Base Stations (BSs) and greatly improves both the Quality of Service (QoS) and Quality of Experience (QoE) for users. It presents significant business opportunities for operators, particularly in light of the exponential growth in mobile data traffic and the ongoing digital transformation. To effectively uphold the desired levels of QoS and QoE in the elevation of escalating digitalization and the unprecedented surge in data traffic, this paper presents offloading through a diverse range of technologies such as data offloading through Small Cell Networks (SCNs), Wi-Fi offloading, Device-to-Device (D2D) offloading, and data offloading through Vehicular Ad-Hoc Networks (VANETs). The SCNs and Wi-Fi offloading involve migrating data traffic to the alternative infrastructure i.e. the small BS and the Wi-Fi Access Points (AP), respectively while D2D focuses on transferring data through the device without transversing the BSs. VANETs is the process of offloading data in vehicular scenarios that consist of Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), and Vehicle-to-Everything (V2X). Additionally, mobile data offloading from cellular BS is categorized into four main factors: energy consumption or energy awareness, economic considerations, user satisfaction, and network congestion. These factors play a crucial role in the ongoing adoption and implementation of mobile data offloading strategies. Different technologies utilize diverse techniques to tackle the challenge of offloading, aligning with their specific research objectives. This paper delves into the challenges and outlines future research directions in the field of mobile traffic offloading.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001605/pdfft?md5=aaf7f2b0bd072c92e8c8927e1f21fdfa&pid=1-s2.0-S1319157824001605-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141143201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the deep learning software tools for large-scale enterprises using a novel TODIFFA-MCDM framework 使用新型 TODIFFA-MCDM 框架评估大型企业的深度学习软件工具
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102079
Zoran Gligorić , Ömer Faruk Görçün , Miloš Gligorić , Dragan Pamucar , Vladimir Simic , Hande Küçükönder

Deep learning (DL) is one of the most promising technological developments emerging in the fourth industrial revolution era for businesses to improve processes, increase efficiency, and reduce errors. Accordingly, hierarchical learning software selection is one of the most critical decision-making problems in integrating neural network applications into business models. However, selecting appropriate reinforcement learning software for integrating deep learning applications into enterprises’ business models takes much work for decision-makers. There are several reasons for this: first, practitioners’ limited knowledge and experience of DL makes it difficult for decision-makers to adapt this technology into their enterprises’ business model and significantly increases complex uncertainties. Secondly, according to the authors’ knowledge, no study in the literature addresses deep structured learning solutions with the help of MCDM approaches. Consequently, making inferences concerning criteria that should be considered in an evaluation process is impossible by considering the studies in the relevant literature. Considering these gaps, this study presents a novel decision-making approach developed by the authors. It involves the combination of two new decision-making approaches, MAXC (MAXimum of Criterion) and TODIFFA (the total differential of alternative), which were developed to solve current decision-making problems. When the most important advantages of this model are considered, it associates objective and subjective approaches and eliminates some critical limitations of these methodologies. Besides, it has an easily followable algorithm without the need for advanced mathematical knowledge for practitioners and provides highly stable and reliable results in solving complex decision-making problems. Another novelty of the study is that the criteria are determined with a long-term negotiation process that is part of comprehensive fieldwork with specialists. When the conclusions obtained using this model are briefly reviewed, the C2 “Data Availability and Quality” criterion is the most influential in selecting deep learning software. The C7 “Time Constraints” criterion follows the most influential factor. Remarkably, prior research has overlooked the correlation between the performance of Deep Learning (DL) platforms and the quality and accessibility of data. The findings of this study underscore the necessity for DL platform developers to devise solutions to enable DL platforms to operate effectively, notwithstanding the availability of clean, high-quality, and adequate data. Finally, the robustness check carried out to test the validity of the proposed model confirms the accuracy and robustness of the results obtained by implementing the suggested model.

深度学习(DL)是第四次工业革命时代出现的最有前途的技术发展之一,可帮助企业改善流程、提高效率和减少错误。因此,在将神经网络应用集成到商业模式中时,分层学习软件的选择是最关键的决策问题之一。然而,如何选择合适的强化学习软件,将深度学习应用融入企业的商业模式,却让决策者费尽心思。究其原因有以下几点:首先,从业人员对强化学习的了解和经验有限,导致决策者很难将这一技术应用到企业的商业模式中,并大大增加了复杂的不确定性。其次,据作者所知,文献中没有任何研究涉及借助 MCDM 方法的深度结构化学习解决方案。因此,考虑到相关文献中的研究,不可能对评估过程中应考虑的标准做出推断。考虑到这些差距,本研究提出了作者开发的一种新型决策方法。该方法结合了两种新的决策方法,即 MAXC(标准最大值)和 TODIFFA(备选方案总差值),这两种方法是为了解决当前的决策问题而开发的。该模型最重要的优点是将客观方法和主观方法结合起来,消除了这些方法的一些关键局限性。此外,该模型的算法简单易学,从业人员无需掌握高深的数学知识,在解决复杂的决策问题时可提供高度稳定可靠的结果。这项研究的另一个新颖之处在于,标准是在与专家进行全面的实地考察后,通过长期的协商过程确定的。简要回顾使用该模型得出的结论,C2 "数据可用性和质量 "标准对选择深度学习软件的影响最大。C7 "时间限制 "标准紧随其后,是影响最大的因素。值得注意的是,之前的研究忽略了深度学习(DL)平台的性能与数据质量和可访问性之间的相关性。本研究的结论强调,尽管存在干净、高质量和充足的数据,深度学习平台开发人员仍有必要制定解决方案,使深度学习平台能够有效运行。最后,为测试建议模型的有效性而进行的稳健性检查证实了实施建议模型所获得结果的准确性和稳健性。
{"title":"Evaluating the deep learning software tools for large-scale enterprises using a novel TODIFFA-MCDM framework","authors":"Zoran Gligorić ,&nbsp;Ömer Faruk Görçün ,&nbsp;Miloš Gligorić ,&nbsp;Dragan Pamucar ,&nbsp;Vladimir Simic ,&nbsp;Hande Küçükönder","doi":"10.1016/j.jksuci.2024.102079","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102079","url":null,"abstract":"<div><p>Deep learning (DL) is one of the most promising technological developments emerging in the fourth industrial revolution era for businesses to improve processes, increase efficiency, and reduce errors. Accordingly, hierarchical learning software selection is one of the most critical decision-making problems in integrating neural network applications into business models. However, selecting appropriate reinforcement learning software for integrating deep learning applications into enterprises’ business models takes much work for decision-makers. There are several reasons for this: first, practitioners’ limited knowledge and experience of DL makes it difficult for decision-makers to adapt this technology into their enterprises’ business model and significantly increases complex uncertainties. Secondly, according to the authors’ knowledge, no study in the literature addresses deep structured learning solutions with the help of MCDM approaches. Consequently, making inferences concerning criteria that should be considered in an evaluation process is impossible by considering the studies in the relevant literature. Considering these gaps, this study presents a novel decision-making approach developed by the authors. It involves the combination of two new decision-making approaches, MAXC (MAXimum of Criterion) and TODIFFA (the total differential of alternative), which were developed to solve current decision-making problems. When the most important advantages of this model are considered, it associates objective and subjective approaches and eliminates some critical limitations of these methodologies. Besides, it has an easily followable algorithm without the need for advanced mathematical knowledge for practitioners and provides highly stable and reliable results in solving complex decision-making problems. Another novelty of the study is that the criteria are determined with a long-term negotiation process that is part of comprehensive fieldwork with specialists. When the conclusions obtained using this model are briefly reviewed, the C2 “Data Availability and Quality” criterion is the most influential in selecting deep learning software. The C7 “Time Constraints” criterion follows the most influential factor. Remarkably, prior research has overlooked the correlation between the performance of Deep Learning (DL) platforms and the quality and accessibility of data. The findings of this study underscore the necessity for DL platform developers to devise solutions to enable DL platforms to operate effectively, notwithstanding the availability of clean, high-quality, and adequate data. Finally, the robustness check carried out to test the validity of the proposed model confirms the accuracy and robustness of the results obtained by implementing the suggested model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400168X/pdfft?md5=35294d2abb229ca991ec30d8b2daf9ef&pid=1-s2.0-S131915782400168X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain 区块链下构建物联网的分级分类存储和激励共识方案
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102075
Xiaohua Wu , Jinqian Jiang , Xiaoyu Li , Jun Cheng , Tao Meng

With the advancements of IoT and blockchain, a novel era has emerged in the domain of smart building systems. At the same time, it also brings some problems and challenges. Most traditional solutions typically utilize the fully-replicated storage strategy that results in high storage costs, while recent solutions like coded blockchain may compromise query efficiency. Moreover, traditional reputation-based consensus schemes do not consider dynamic situations, limiting scalability. To handle these problems, we propose a novel hierarchical message aggregation scheme and a classified storage method under Reed–Solomon (RS) coding to minimize storage overhead while ensuring data recoverability and query performance. Additionally, we introduce a dynamic incentive reputation consensus mechanism to tackle scalability challenges such as preventing node monopolies, promoting new node integration, and enhancing fault tolerance. Through theoretical analysis and experimental simulation, the proposed scheme demonstrates a high degree of decentralization and scalability. Our scheme achieves a 20% reduction in the Gini coefficient compared to other approaches. Furthermore, our scheme can save 19 of storage overhead compared to traditional solutions while maintaining high query performance.

随着物联网和区块链的发展,智能建筑系统领域迎来了一个新时代。与此同时,它也带来了一些问题和挑战。大多数传统解决方案通常采用完全复制的存储策略,导致存储成本高昂,而编码区块链等最新解决方案可能会影响查询效率。此外,传统的基于信誉的共识方案不考虑动态情况,限制了可扩展性。为了解决这些问题,我们提出了一种新颖的分层消息聚合方案和里德-所罗门(RS)编码下的分类存储方法,以最大限度地降低存储开销,同时确保数据的可恢复性和查询性能。此外,我们还引入了一种动态激励信誉共识机制,以应对可扩展性挑战,如防止节点垄断、促进新节点整合和增强容错性。通过理论分析和实验仿真,我们提出的方案展示了高度的去中心化和可扩展性。与其他方法相比,我们的方案使基尼系数降低了 20%。此外,与传统方案相比,我们的方案可以节省 19% 的存储开销,同时还能保持较高的查询性能。
{"title":"Hierarchical classified storage and incentive consensus scheme for building IoT under blockchain","authors":"Xiaohua Wu ,&nbsp;Jinqian Jiang ,&nbsp;Xiaoyu Li ,&nbsp;Jun Cheng ,&nbsp;Tao Meng","doi":"10.1016/j.jksuci.2024.102075","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102075","url":null,"abstract":"<div><p>With the advancements of IoT and blockchain, a novel era has emerged in the domain of smart building systems. At the same time, it also brings some problems and challenges. Most traditional solutions typically utilize the fully-replicated storage strategy that results in high storage costs, while recent solutions like coded blockchain may compromise query efficiency. Moreover, traditional reputation-based consensus schemes do not consider dynamic situations, limiting scalability. To handle these problems, we propose a novel hierarchical message aggregation scheme and a classified storage method under Reed–Solomon (RS) coding to minimize storage overhead while ensuring data recoverability and query performance. Additionally, we introduce a dynamic incentive reputation consensus mechanism to tackle scalability challenges such as preventing node monopolies, promoting new node integration, and enhancing fault tolerance. Through theoretical analysis and experimental simulation, the proposed scheme demonstrates a high degree of decentralization and scalability. Our scheme achieves a 20% reduction in the Gini coefficient compared to other approaches. Furthermore, our scheme can save <span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mn>9</mn></mrow></mfrac></math></span> of storage overhead compared to traditional solutions while maintaining high query performance.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001642/pdfft?md5=add4298d76d4f1f8ccfe23321cd101f3&pid=1-s2.0-S1319157824001642-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141290149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks 基于无服务器无线传感器网络的增强型中心点节能聚类路由协议
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102067
Seemab Karim , Kashif Naseer Qureshi , Ashraf Osman Ibrahim , Anas W. Abulfaraj , Kayhan Zrar Ghafoor

Serverless computing is a new concept as cloud computing, which dynamically manages the networks and is applied in Serverless Wireless Sensor Networks (SWSN) to help the networks. These networks are becoming famous for monitoring various physical and environmental factors. Serverless computing also facilitates the networks by offering an extensive range of applications. Different applications have been designed for monitoring purposes where the sensor nodes sense the data and transmit it to the base station through single or multi-hop routing. However, existing routing protocols cannot manage the sensor nodes’ energy issues because of the complex routing processes and depleted their power before their time. Because of these limitations, the nodes close to BS continuously rely on the network for data forwarding. As a result, these nodes cause energy consumption and lead to a useless state. This paper proposes a serverless architecture and designs an Enhanced Centroid-based Energy Efficient Clustering (ECEEC) protocol for SWSN networks. The proposed serverless architecture provides automated scalability, cost-effective services, and stateless execution. In addition, the proposed protocol offers the cluster head selection and its rotation to maximize the energy efficiency in the network. Furthermore, gateway nodes are chosen in every cluster to overcome the load on the cluster head. Simulation results indicated the excellent performance of the proposed protocol as compared to the existing routing protocols concerning network lifetime and energy consumption. The proposed protocol shows better reliability with nodes failing at 650 rounds compared to 600 rounds, especially with 5 % and 10 % Cluster Heads. The proposed protocol exhibits superior energy efficiency consumption of SNs under varying CH percentages, indicating the protocol’s consistent performance across different scenarios.

无服务器计算是云计算的一个新概念,它可以动态管理网络,并应用于无服务器无线传感器网络(SWSN)以帮助网络。这些网络因监测各种物理和环境因素而闻名。无服务器计算还通过提供广泛的应用为网络提供便利。为监测目的设计了不同的应用,其中传感器节点感知数据并通过单跳或多跳路由将数据传输到基站。然而,由于路由过程复杂,现有的路由协议无法管理传感器节点的能源问题,而且会提前耗尽其电量。由于这些限制,靠近基站的节点不断依赖网络进行数据转发。因此,这些节点会造成能量消耗,导致无用状态。本文提出了一种无服务器架构,并为 SWSN 网络设计了基于中心点的增强型高能效聚类(ECEEC)协议。所提出的无服务器架构提供了自动可扩展性、经济高效的服务和无状态执行。此外,该协议还提供簇头选择和轮换功能,以最大限度地提高网络能效。此外,还在每个簇中选择网关节点,以减轻簇头的负荷。仿真结果表明,与现有路由协议相比,拟议协议在网络寿命和能耗方面表现出色。与 600 轮相比,提议的协议在 650 轮时节点失效,尤其是在簇头占 5% 和 10% 的情况下,显示出更好的可靠性。在不同的簇头比例下,建议的协议显示出更高的 SN 能量消耗效率,这表明该协议在不同场景下具有一致的性能。
{"title":"Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks","authors":"Seemab Karim ,&nbsp;Kashif Naseer Qureshi ,&nbsp;Ashraf Osman Ibrahim ,&nbsp;Anas W. Abulfaraj ,&nbsp;Kayhan Zrar Ghafoor","doi":"10.1016/j.jksuci.2024.102067","DOIUrl":"10.1016/j.jksuci.2024.102067","url":null,"abstract":"<div><p>Serverless computing is a new concept as cloud computing, which dynamically manages the networks and is applied in Serverless Wireless Sensor Networks (SWSN) to help the networks. These networks are becoming famous for monitoring various physical and environmental factors. Serverless computing also facilitates the networks by offering an extensive range of applications. Different applications have been designed for monitoring purposes where the sensor nodes sense the data and transmit it to the base station through single or multi-hop routing. However, existing routing protocols cannot manage the sensor nodes’ energy issues because of the complex routing processes and depleted their power before their time. Because of these limitations, the nodes close to BS continuously rely on the network for data forwarding. As a result, these nodes cause energy consumption and lead to a useless state. This paper proposes a serverless architecture and designs an Enhanced Centroid-based Energy Efficient Clustering (ECEEC) protocol for SWSN networks. The proposed serverless architecture provides automated scalability, cost-effective services, and stateless execution. In addition, the proposed protocol offers the cluster head selection and its rotation to maximize the energy efficiency in the network. Furthermore, gateway nodes are chosen in every cluster to overcome the load on the cluster head. Simulation results indicated the excellent performance of the proposed protocol as compared to the existing routing protocols concerning network lifetime and energy consumption. The proposed protocol shows better reliability with nodes failing at 650 rounds compared to 600 rounds, especially with 5 % and 10 % Cluster Heads. The proposed protocol exhibits superior energy efficiency consumption of SNs under varying CH percentages, indicating the protocol’s consistent performance across different scenarios.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001563/pdfft?md5=5a3bdb58d0a76ae151a3921341d6cfe8&pid=1-s2.0-S1319157824001563-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141038445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A coding computation scheme for secure aggregation 安全聚合的编码计算方案
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-06-01 DOI: 10.1016/j.jksuci.2024.102073
Ze Yang, Youliang Tian

Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.

数据聚合涉及整合跨平台和跨设备生成的相关数据,充分利用感知数据的潜在价值。然而,除了安全和效率这些涉及隐私数据的数据聚合的基本要求外,如何在实际计算网络中实现聚合的容错和干扰迫在眉睫,这也是本文的主要贡献。本文基于编码理论,提出了一种涉及多个服务器的安全聚合框架,它不仅对客户端退出具有鲁棒性,对服务器部分退出具有容忍性,而且还能抵御服务器的恶意计算和对手的伪造攻击。具体而言,所提出的协议采用中国残差定理(CRT)对隐私数据进行编码,并构建拉格朗日插值多项式来执行聚合,从而在实现稳健、可验证和安全的聚合目标的同时,实现了轻量级隐私保护。
{"title":"A coding computation scheme for secure aggregation","authors":"Ze Yang,&nbsp;Youliang Tian","doi":"10.1016/j.jksuci.2024.102073","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102073","url":null,"abstract":"<div><p>Data aggregation involves the integration of relevant data generated across platforms and devices, leveraging the potential value of sensory data. However, in addition to security and efficiency, which are the basic requirements for data aggregation involving private data, how to achieve fault tolerance and interference of aggregation in real computing networks is imminent and is the main contribution of this paper. In this paper, we propose a secure aggregation framework involving multiple servers based on coding theory, which is not only robust to clients dropping out and tolerant to partial server withdrawal but also resistant to malicious computation by servers and forgery attacks by adversaries. In particular, the proposed protocol employs the Chinese Residual Theorem (CRT) to encode private data and constructs Lagrange interpolation polynomials to perform aggregation, which achieves lightweight privacy preservation while achieving robust, verifiable and secure aggregation goals.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001629/pdfft?md5=fc659df9e1f4526f6a296b14e211b013&pid=1-s2.0-S1319157824001629-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141241978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New simultaneous Diophantine attacks on generalized RSA key equations 对广义 RSA 密钥方程的新同步 Diophantine 攻击
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-05-23 DOI: 10.1016/j.jksuci.2024.102074
Wan Nur Aqlili Ruzai , Muhammad Rezal Kamel Ariffin , Muhammad Asyraf Asbullah , Amir Hamzah Abd Ghafar

RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computationally infeasible or highly intricate, especially when dealing with sufficiently large security parameters. Effective exploits of the integer factorization problem in RSA can allow an adversary to assume the identity of the key holder and decrypt such confidential messages. The keys employed in secure hardware are particularly significant due to the typically greater value of the information they safeguard, such as in the context of securing payment transactions. In general, RSA faces various attacks exploiting weaknesses in its key equations. This paper introduces a new vulnerability that enables the concurrent factorization of multiple RSA moduli. By working with pairs (Ni,ei) and a fixed value y satisfying the Diophantine equation eixi2y2ϕ(Ni)=zi, we successfully factorized these moduli simultaneously using the lattice basis reduction technique. Notably, our research expands the scope of RSA decryption exponents considered as insecure.

RSA 是非对称密码学中被广泛采用的一种方法,通常用于数字签名验证和信息加密。RSA 的安全性依赖于整数因式分解的挑战,这个问题要么在计算上不可行,要么非常复杂,尤其是在处理足够大的安全参数时。有效利用 RSA 中的整数因式分解问题,可以让对手假定密钥持有者的身份,并解密此类机密信息。安全硬件中使用的密钥尤其重要,因为它们所保护的信息通常价值更高,例如在确保支付交易安全的情况下。一般来说,RSA 面临着各种利用其密钥方程弱点的攻击。本文介绍了一种新的漏洞,它可以对多个 RSA 模同时进行因式分解。通过处理成对(Ni,ei)和满足 Diophantine 方程 eixi2-y2ϕ(Ni)=zi 的固定值 y,我们利用晶格基还原技术成功地同时对这些模进行了因式分解。值得注意的是,我们的研究扩大了被认为不安全的 RSA 解密指数的范围。
{"title":"New simultaneous Diophantine attacks on generalized RSA key equations","authors":"Wan Nur Aqlili Ruzai ,&nbsp;Muhammad Rezal Kamel Ariffin ,&nbsp;Muhammad Asyraf Asbullah ,&nbsp;Amir Hamzah Abd Ghafar","doi":"10.1016/j.jksuci.2024.102074","DOIUrl":"10.1016/j.jksuci.2024.102074","url":null,"abstract":"<div><p>RSA stands as a widely adopted method within asymmetric cryptography, commonly applied for digital signature validation and message encryption. The security of RSA relies on the challenge of integer factorization, a problem considered either computationally infeasible or highly intricate, especially when dealing with sufficiently large security parameters. Effective exploits of the integer factorization problem in RSA can allow an adversary to assume the identity of the key holder and decrypt such confidential messages. The keys employed in secure hardware are particularly significant due to the typically greater value of the information they safeguard, such as in the context of securing payment transactions. In general, RSA faces various attacks exploiting weaknesses in its key equations. This paper introduces a new vulnerability that enables the concurrent factorization of multiple RSA moduli. By working with pairs <span><math><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>,</mo><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow></math></span> and a fixed value <span><math><mi>y</mi></math></span> satisfying the Diophantine equation <span><math><mrow><msub><mrow><mi>e</mi></mrow><mrow><mi>i</mi></mrow></msub><msubsup><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>−</mo><msup><mrow><mi>y</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>ϕ</mi><mrow><mo>(</mo><msub><mrow><mi>N</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>)</mo></mrow><mo>=</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></math></span>, we successfully factorized these moduli simultaneously using the lattice basis reduction technique. Notably, our research expands the scope of RSA decryption exponents considered as insecure.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001630/pdfft?md5=44eab7f8011fba6e4c09c111ca655fc8&pid=1-s2.0-S1319157824001630-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141132279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new version of the greedy perimeter stateless routing scheme in flying ad hoc networks 飞行临时网络中的新版贪婪周边无状态路由方案
IF 6.9 2区 计算机科学 Q1 Computer Science Pub Date : 2024-05-23 DOI: 10.1016/j.jksuci.2024.102066
Mehdi Hosseinzadeh , Mohammad Sadegh Yousefpoor , Efat Yousefpoor , Jan Lansky , Hong Min

Flying ad hoc networks (FANETs) belong to the family of mobile ad hoc networks (MANETs). They have gained high popularity due to their extensive applications in various industries such as emergency management, military missions, and supervision. However, these networks face important challenges in guaranteeing reliable data transmission because of their dynamic nature and lack of infrastructure. In this paper, a new version of the greedy perimeter stateless routing scheme called GPSR+AODV is proposed in FANET. It combines two routing schemes, namely GPSR and AODV, and is a family member of geographic routing methods. In GPSR+AODV, each UAV consists of a certain hello broadcast period that is adjusted based on the prediction of its spatial coordinates in the future. Additionally, GPSR+AODV modifies the greedy forwarding process and restricts the search space for finding the next-hop node by obtaining a refined candidate set, calculated in the cylindrical coordinate system. Then, each UAV in the refined candidate set is evaluated under a fitness function, and the most suitable next-hop node with the maximum fitness is determined. This function is a combination of four criteria, namely relative velocity, energy level, buffer capacity, and distance to destination. When failing in the greedy forwarding process, GPSR+AODV changes the forwarding technique and uses an AODV-based perimeter forwarding technique to select the best next-hop node. Lastly, GPSR+AODV is implemented by the NS2 simulator, and the simulation results show a successful performance in terms of packet delivery rate, throughput, and delay compared to AGGR, AeroRP, and GPSR. However, the routing overhead in the proposed scheme is higher than that in AGGR.

飞行特设网络(FANET)属于移动特设网络(MANET)家族。由于其在应急管理、军事任务和监督等各行各业的广泛应用,它们获得了很高的人气。然而,由于其动态性和缺乏基础设施,这些网络在保证可靠数据传输方面面临着重大挑战。本文在 FANET 中提出了一种名为 GPSR+AODV 的新版贪婪周边无状态路由方案。它结合了两种路由方案,即 GPSR 和 AODV,是地理路由方法家族中的一员。在 GPSR+AODV 中,每个无人飞行器都有一定的你好广播周期,该周期根据对其未来空间坐标的预测进行调整。此外,GPSR+AODV 还修改了贪婪转发过程,并通过获得以圆柱坐标系计算的精炼候选集来限制寻找下一跳节点的搜索空间。然后,根据适配度函数对细化候选集中的每个无人机进行评估,并确定适配度最大的最合适的下一跳节点。该函数由四个标准组合而成,即相对速度、能量水平、缓冲区容量和到目的地的距离。当贪婪转发失败时,GPSR+AODV 会改变转发技术,使用基于 AODV 的周边转发技术来选择最佳的下一跳节点。最后,利用 NS2 仿真器实现了 GPSR+AODV,仿真结果表明,与 AGGR、AeroRP 和 GPSR 相比,GPSR+AODV 在数据包传输速率、吞吐量和延迟方面都表现良好。然而,拟议方案的路由开销高于 AGGR。
{"title":"A new version of the greedy perimeter stateless routing scheme in flying ad hoc networks","authors":"Mehdi Hosseinzadeh ,&nbsp;Mohammad Sadegh Yousefpoor ,&nbsp;Efat Yousefpoor ,&nbsp;Jan Lansky ,&nbsp;Hong Min","doi":"10.1016/j.jksuci.2024.102066","DOIUrl":"10.1016/j.jksuci.2024.102066","url":null,"abstract":"<div><p>Flying ad hoc networks (FANETs) belong to the family of mobile ad hoc networks (MANETs). They have gained high popularity due to their extensive applications in various industries such as emergency management, military missions, and supervision. However, these networks face important challenges in guaranteeing reliable data transmission because of their dynamic nature and lack of infrastructure. In this paper, a new version of the greedy perimeter stateless routing scheme called GPSR+AODV is proposed in FANET. It combines two routing schemes, namely GPSR and AODV, and is a family member of geographic routing methods. In GPSR+AODV, each UAV consists of a certain hello broadcast period that is adjusted based on the prediction of its spatial coordinates in the future. Additionally, GPSR+AODV modifies the greedy forwarding process and restricts the search space for finding the next-hop node by obtaining a refined candidate set, calculated in the cylindrical coordinate system. Then, each UAV in the refined candidate set is evaluated under a fitness function, and the most suitable next-hop node with the maximum fitness is determined. This function is a combination of four criteria, namely relative velocity, energy level, buffer capacity, and distance to destination. When failing in the greedy forwarding process, GPSR+AODV changes the forwarding technique and uses an AODV-based perimeter forwarding technique to select the best next-hop node. Lastly, GPSR+AODV is implemented by the NS2 simulator, and the simulation results show a successful performance in terms of packet delivery rate, throughput, and delay compared to AGGR, AeroRP, and GPSR. However, the routing overhead in the proposed scheme is higher than that in AGGR.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":null,"pages":null},"PeriodicalIF":6.9,"publicationDate":"2024-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001551/pdfft?md5=090b62843e6787b9d53b245142377160&pid=1-s2.0-S1319157824001551-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141144555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of King Saud University-Computer and Information Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1