首页 > 最新文献

Journal of Supercomputing最新文献

英文 中文
Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches. 使用BERT+NBSVM和地理空间方法进行疫苗情绪分析。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-05-07 DOI: 10.1007/s11227-023-05319-8
Areeba Umair, Elio Masciari, Muhammad Habib Ullah
<p><p>Since the spread of the coronavirus flu in 2019 (hereafter referred to as COVID-19), millions of people worldwide have been affected by the pandemic, which has significantly impacted our habits in various ways. In order to eradicate the disease, a great help came from unprecedentedly fast vaccines development along with strict preventive measures adoption like lockdown. Thus, world wide provisioning of vaccines was crucial in order to achieve the maximum immunization of population. However, the fast development of vaccines, driven by the urge of limiting the pandemic caused skeptical reactions by a vast amount of population. More specifically, the people's hesitancy in getting vaccinated was an additional obstacle in fighting COVID-19. To ameliorate this scenario, it is important to understand people's sentiments about vaccines in order to take proper actions to better inform the population. As a matter of fact, people continuously update their feelings and sentiments on social media, thus a proper analysis of those opinions is an important challenge for providing proper information to avoid misinformation. More in detail, sentiment analysis (Wankhade et al. in Artif Intell Rev 55(7):5731-5780, 2022. 10.1007/s10462-022-10144-1) is a powerful technique in natural language processing that enables the identification and classification of people feelings (mainly) in text data. It involves the use of machine learning algorithms and other computational techniques to analyze large volumes of text and determine whether they express positive, negative or neutral sentiment. Sentiment analysis is widely used in industries such as marketing, customer service, and healthcare, among others, to gain actionable insights from customer feedback, social media posts, and other forms of unstructured textual data. In this paper, Sentiment Analysis will be used to elaborate on people reaction to COVID-19 vaccines in order to provide useful insights to improve the correct understanding of their correct usage and possible advantages. In this paper, a framework that leverages artificial intelligence (AI) methods is proposed for classifying tweets based on their polarity values. We analyzed Twitter data related to COVID-19 vaccines after the most appropriate pre-processing on them. More specifically, we identified the word-cloud of negative, positive, and neutral words using an artificial intelligence tool to determine the sentiment of tweets. After this pre-processing step, we performed classification using the BERT + NBSVM model to classify people's sentiments about vaccines. The reason for choosing to combine bidirectional encoder representations from transformers (BERT) and Naive Bayes and support vector machine (NBSVM ) can be understood by considering the limitation of BERT-based approaches, which only leverage encoder layers, resulting in lower performance on short texts like the ones used in our analysis. Such a limitation can be ameliorated by using Naive Ba
自2019年冠状病毒流感(以下简称新冠肺炎)传播以来,全球数百万人受到疫情的影响,这对我们的生活习惯产生了各种重大影响。为了根除这种疾病,空前快速的疫苗开发以及封锁等严格的预防措施给了我们很大的帮助。因此,在全世界范围内提供疫苗对于实现最大限度的人口免疫至关重要。然而,在限制疫情的冲动推动下,疫苗的快速开发引起了大量民众的怀疑反应。更具体地说,人们对接种疫苗的犹豫是抗击新冠肺炎的另一个障碍。为了改善这种情况,重要的是了解人们对疫苗的看法,以便采取适当行动,更好地向民众提供信息。事实上,人们不断在社交媒体上更新自己的感受和情绪,因此,对这些观点进行适当的分析是提供适当信息以避免错误信息的一个重要挑战。更详细地说,情绪分析(Wankhade等人,见Artif Intell Rev 55(7):5731-57802022。10.1007/10462-022-10144-1)是自然语言处理中的一种强大技术,它能够(主要)识别和分类文本数据中的人的感受。它涉及使用机器学习算法和其他计算技术来分析大量文本,并确定它们是否表达了积极、消极或中立的情绪。情绪分析广泛用于营销、客户服务和医疗保健等行业,以从客户反馈、社交媒体帖子和其他形式的非结构化文本数据中获得可操作的见解。在本文中,情绪分析将用于阐述人们对新冠肺炎疫苗的反应,以便提供有用的见解,以提高对其正确使用和可能优势的正确理解。在本文中,提出了一个利用人工智能(AI)方法根据推文的极性值对推文进行分类的框架。在对新冠肺炎疫苗进行最适当的预处理后,我们分析了与之相关的推特数据。更具体地说,我们使用人工智能工具来确定推文的情绪,从而确定了负面、正面和中性词的词云。在这个预处理步骤之后,我们使用BERT+NBSVM模型进行分类,以对人们对疫苗的情绪进行分类。选择将来自Transformer(BERT)和Naive Bayes的双向编码器表示与支持向量机(NBSVM)相结合的原因可以通过考虑基于BERT的方法的局限性来理解,这些方法只利用编码器层,导致在短文本上的性能较低,如我们分析中使用的方法。这种限制可以通过使用朴素贝叶斯和支持向量机方法来改善,这些方法能够在短文本情感分析中实现更高的性能。因此,我们利用BERT特征和NBSVM特征为我们与疫苗情绪识别相关的情绪分析目标定义了一个灵活的框架。此外,我们通过使用地理编码、可视化和空间相关性分析对数据进行空间分析,以根据情绪分析结果向用户建议最合适的疫苗接种中心,从而丰富我们的结果。原则上,我们不需要实现分布式架构来运行我们的实验,因为可用的公共数据并不庞大。然而,我们讨论了一种高性能体系结构,如果收集的数据大幅扩展,将使用该体系结构。我们通过比较最广泛使用的指标,如准确性、精密度、召回率和F-measure,将我们的方法与最先进的方法进行了比较。所提出的BERT+NBSVM在积极情绪分类方面的准确率为73%,准确率为71%,召回率为88%,F-测度为73%,而在消极情绪分类方面分别达到73%,准确度为71%,回收率为74%和F-测度,优于其他模型。这些有希望的结果将在下一节中适当讨论。使用人工智能方法和社交媒体分析可以更好地了解人们对任何热门话题的反应和看法。然而,就新冠肺炎疫苗等与健康相关的话题而言,正确的情绪识别可能对实施公共卫生政策至关重要。更详细地说,用户对疫苗的意见的有用发现可以帮助决策者根据人们的感受设计适当的策略和实施特别的疫苗接种协议,以提供更好的公共服务。为此,我们利用地理空间信息支持疫苗接种中心的有效建议。
{"title":"Vaccine sentiment analysis using BERT + NBSVM and geo-spatial approaches.","authors":"Areeba Umair,&nbsp;Elio Masciari,&nbsp;Muhammad Habib Ullah","doi":"10.1007/s11227-023-05319-8","DOIUrl":"10.1007/s11227-023-05319-8","url":null,"abstract":"&lt;p&gt;&lt;p&gt;Since the spread of the coronavirus flu in 2019 (hereafter referred to as COVID-19), millions of people worldwide have been affected by the pandemic, which has significantly impacted our habits in various ways. In order to eradicate the disease, a great help came from unprecedentedly fast vaccines development along with strict preventive measures adoption like lockdown. Thus, world wide provisioning of vaccines was crucial in order to achieve the maximum immunization of population. However, the fast development of vaccines, driven by the urge of limiting the pandemic caused skeptical reactions by a vast amount of population. More specifically, the people's hesitancy in getting vaccinated was an additional obstacle in fighting COVID-19. To ameliorate this scenario, it is important to understand people's sentiments about vaccines in order to take proper actions to better inform the population. As a matter of fact, people continuously update their feelings and sentiments on social media, thus a proper analysis of those opinions is an important challenge for providing proper information to avoid misinformation. More in detail, sentiment analysis (Wankhade et al. in Artif Intell Rev 55(7):5731-5780, 2022. 10.1007/s10462-022-10144-1) is a powerful technique in natural language processing that enables the identification and classification of people feelings (mainly) in text data. It involves the use of machine learning algorithms and other computational techniques to analyze large volumes of text and determine whether they express positive, negative or neutral sentiment. Sentiment analysis is widely used in industries such as marketing, customer service, and healthcare, among others, to gain actionable insights from customer feedback, social media posts, and other forms of unstructured textual data. In this paper, Sentiment Analysis will be used to elaborate on people reaction to COVID-19 vaccines in order to provide useful insights to improve the correct understanding of their correct usage and possible advantages. In this paper, a framework that leverages artificial intelligence (AI) methods is proposed for classifying tweets based on their polarity values. We analyzed Twitter data related to COVID-19 vaccines after the most appropriate pre-processing on them. More specifically, we identified the word-cloud of negative, positive, and neutral words using an artificial intelligence tool to determine the sentiment of tweets. After this pre-processing step, we performed classification using the BERT + NBSVM model to classify people's sentiments about vaccines. The reason for choosing to combine bidirectional encoder representations from transformers (BERT) and Naive Bayes and support vector machine (NBSVM ) can be understood by considering the limitation of BERT-based approaches, which only leverage encoder layers, resulting in lower performance on short texts like the ones used in our analysis. Such a limitation can be ameliorated by using Naive Ba","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-31"},"PeriodicalIF":3.3,"publicationDate":"2023-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10164419/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network. 区块链为医疗智能手机网络中的信任管理提供了安全高效的数据共享方案。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-26 DOI: 10.1007/s11227-023-05272-6
Rati Bhan, Rajendra Pamula, Parvez Faruki, Jyoti Gajrani

The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things (IoT) where the Things collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH). Smartphones and IoMTs are expected to maintain secure and trusted confidential patient record exchange while managing the patient remotely. Healthcare organizations deploy Healthcare Smartphone Networks (HSN) for personal patient data collection and sharing among smartphone users and IoMT nodes. However, attackers gain access to confidential patient data via infected IoMT nodes on the HSN. Additionally, attackers can compromise the entire network via malicious nodes. This article proposes a Hyperledger blockchain-based technique to identify compromised IoMT nodes and safeguard sensitive patient records. Furthermore, the paper presents a Clustered Hierarchical Trust Management System (CHTMS) to block malicious nodes. In addition, the proposal employs Elliptic Curve Cryptography (ECC) to protect sensitive health records and is resilient against Denial-Of-Service (DOS) attacks. Finally, the evaluation results show that integrating blockchains into the HSN system improved detection performance compared to the existing state of the art. Therefore, the simulation results indicate better security and reliability when compared to conventional databases.

医疗物联网(IoMT)是物联网的一种扩展类型,物联网协作提供远程患者健康监测,也称为健康互联网(IoH)。智能手机和IoMT有望在远程管理患者的同时,保持安全可靠的机密患者记录交换。医疗保健组织部署医疗保健智能手机网络(HSN),用于智能手机用户和IoMT节点之间的个人患者数据收集和共享。然而,攻击者通过HSN上受感染的IoMT节点访问机密患者数据。此外,攻击者还可以通过恶意节点危害整个网络。本文提出了一种基于Hyperledger区块链的技术来识别受损的IoMT节点并保护敏感的患者记录。此外,本文还提出了一种集群层次信任管理系统(CHTMS)来阻止恶意节点。此外,该提案采用椭圆曲线密码(ECC)来保护敏感的健康记录,并可抵御拒绝服务(DOS)攻击。最后,评估结果表明,与现有技术相比,将区块链集成到HSN系统中提高了检测性能。因此,与传统数据库相比,仿真结果表明具有更好的安全性和可靠性。
{"title":"Blockchain-enabled secure and efficient data sharing scheme for trust management in healthcare smartphone network.","authors":"Rati Bhan,&nbsp;Rajendra Pamula,&nbsp;Parvez Faruki,&nbsp;Jyoti Gajrani","doi":"10.1007/s11227-023-05272-6","DOIUrl":"10.1007/s11227-023-05272-6","url":null,"abstract":"<p><p>The Internet of Medical Things (IoMT) is an extended genre of the Internet of Things (IoT) where the <i>Things</i> collaborate to provide remote patient health monitoring, also known as the Internet of Health (IoH). Smartphones and IoMTs are expected to maintain secure and trusted confidential patient record exchange while managing the patient remotely. Healthcare organizations deploy Healthcare Smartphone Networks (HSN) for personal patient data collection and sharing among smartphone users and IoMT nodes. However, attackers gain access to confidential patient data via infected IoMT nodes on the HSN. Additionally, attackers can compromise the entire network via malicious nodes. This article proposes a Hyperledger blockchain-based technique to identify compromised IoMT nodes and safeguard sensitive patient records. Furthermore, the paper presents a Clustered Hierarchical Trust Management System (CHTMS) to block malicious nodes. In addition, the proposal employs Elliptic Curve Cryptography (ECC) to protect sensitive health records and is resilient against Denial-Of-Service (DOS) attacks. Finally, the evaluation results show that integrating blockchains into the HSN system improved detection performance compared to the existing state of the art. Therefore, the simulation results indicate better security and reliability when compared to conventional databases.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-42"},"PeriodicalIF":3.3,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10131528/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CovSumm: an unsupervised transformer-cum-graph-based hybrid document summarization model for CORD-19. CovSumm:一个用于CORD-19的无监督变换器和基于图的混合文档摘要模型。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-26 DOI: 10.1007/s11227-023-05291-3
Akanksha Karotia, Seba Susan

The number of research articles published on COVID-19 has dramatically increased since the outbreak of the pandemic in November 2019. This absurd rate of productivity in research articles leads to information overload. It has increasingly become urgent for researchers and medical associations to stay up to date on the latest COVID-19 studies. To address information overload in COVID-19 scientific literature, the study presents a novel hybrid model named CovSumm, an unsupervised graph-based hybrid approach for single-document summarization, that is evaluated on the CORD-19 dataset. We have tested the proposed methodology on the scientific papers in the database dated from January 1, 2021 to December 31, 2021, consisting of 840 documents in total. The proposed text summarization is a hybrid of two distinctive extractive approaches (1) GenCompareSum (transformer-based approach) and (2) TextRank (graph-based approach). The sum of scores generated by both methods is used to rank the sentences for generating the summary. On the CORD-19, the recall-oriented understudy for gisting evaluation (ROUGE) score metric is used to compare the performance of the CovSumm model with various state-of-the-art techniques. The proposed method achieved the highest scores of ROUGE-1: 40.14%, ROUGE-2: 13.25%, and ROUGE-L: 36.32%. The proposed hybrid approach shows improved performance on the CORD-19 dataset when compared to existing unsupervised text summarization methods.

自2019年11月疫情爆发以来,发表的关于新冠肺炎的研究文章数量急剧增加。研究文章中这种荒谬的生产率导致了信息过载。研究人员和医学协会越来越迫切需要了解新冠肺炎的最新研究。为了解决新冠肺炎科学文献中的信息过载问题,该研究提出了一种名为CovSumm的新型混合模型,这是一种用于单文档摘要的无监督基于图形的混合方法,在CORD-19数据集上进行评估。我们在2021年1月1日至2021年12月31日的数据库中的科学论文上测试了所提出的方法,该数据库共由840篇文件组成。所提出的文本摘要是两种不同的提取方法的混合:(1)GenCompareSum(基于变换器的方法)和(2)TextRank(基于图的方法)。两种方法生成的分数之和用于对生成摘要的句子进行排名。在CORD-19上,面向召回的注册评估替补(ROUGE)评分指标用于比较CovSumm模型与各种最先进技术的性能。所提出的方法获得了ROUGE-1:40.14%、ROUGE-2:13.25%和ROUGE-L:36.32%的最高分数。与现有的无监督文本摘要方法相比,所提出的混合方法在CORD-19数据集上显示出改进的性能。
{"title":"CovSumm: an unsupervised transformer-cum-graph-based hybrid document summarization model for CORD-19.","authors":"Akanksha Karotia,&nbsp;Seba Susan","doi":"10.1007/s11227-023-05291-3","DOIUrl":"10.1007/s11227-023-05291-3","url":null,"abstract":"<p><p>The number of research articles published on COVID-19 has dramatically increased since the outbreak of the pandemic in November 2019. This absurd rate of productivity in research articles leads to information overload. It has increasingly become urgent for researchers and medical associations to stay up to date on the latest COVID-19 studies. To address information overload in COVID-19 scientific literature, the study presents a novel hybrid model named CovSumm, an unsupervised graph-based hybrid approach for single-document summarization, that is evaluated on the CORD-19 dataset. We have tested the proposed methodology on the scientific papers in the database dated from January 1, 2021 to December 31, 2021, consisting of 840 documents in total. The proposed text summarization is a hybrid of two distinctive extractive approaches (1) GenCompareSum (transformer-based approach) and (2) TextRank (graph-based approach). The sum of scores generated by both methods is used to rank the sentences for generating the summary. On the CORD-19, the recall-oriented understudy for gisting evaluation (ROUGE) score metric is used to compare the performance of the CovSumm model with various state-of-the-art techniques. The proposed method achieved the highest scores of ROUGE-1: 40.14%, ROUGE-2: 13.25%, and ROUGE-L: 36.32%. The proposed hybrid approach shows improved performance on the CORD-19 dataset when compared to existing unsupervised text summarization methods.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-23"},"PeriodicalIF":3.3,"publicationDate":"2023-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10131559/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Embedding channel pruning within the CNN architecture design using a bi-level evolutionary approach. 使用双层进化方法在CNN架构设计中嵌入信道修剪。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-25 DOI: 10.1007/s11227-023-05273-5
Hassen Louati, Ali Louati, Slim Bechikh, Elham Kariri

Remarkable advancements have been achieved in machine learning and computer vision through the utilization of deep neural networks. Among the most advantageous of these networks is the convolutional neural network (CNN). It has been used in pattern recognition, medical diagnosis, and signal processing, among other things. Actually, for these networks, the challenge of choosing hyperparameters is of utmost importance. The reason behind this is that as the number of layers rises, the search space grows exponentially. In addition, all known classical and evolutionary pruning algorithms require a trained or built architecture as input. During the design phase, none of them consider the process of pruning. In order to assess the effectiveness and efficiency of any architecture created, pruning of channels must be carried out before transmitting the dataset and computing classification errors. For instance, following pruning, an architecture of medium quality in terms of classification may transform into an architecture that is both highly light and accurate, and vice versa. There exist countless potential scenarios that could occur, which prompted us to develop a bi-level optimization approach for the entire process. The upper level involves generating the architecture while the lower level optimizes channel pruning. Evolutionary algorithms (EAs) have proven effective in bi-level optimization, leading us to adopt the co-evolutionary migration-based algorithm as a search engine for our bi-level architectural optimization problem in this research. Our proposed method, CNN-D-P (bi-level CNN design and pruning), was tested on the widely used image classification benchmark datasets, CIFAR-10, CIFAR-100 and ImageNet. Our suggested technique is validated by means of a set of comparison tests with regard to relevant state-of-the-art architectures.

通过利用深度神经网络,在机器学习和计算机视觉方面取得了显著进展。在这些网络中最有利的是卷积神经网络(CNN)。它已被用于模式识别、医学诊断和信号处理等领域。事实上,对于这些网络来说,选择超参数的挑战是至关重要的。这背后的原因是,随着层数的增加,搜索空间呈指数级增长。此外,所有已知的经典和进化修剪算法都需要经过训练或构建的架构作为输入。在设计阶段,他们都没有考虑修剪的过程。为了评估创建的任何架构的有效性和效率,必须在传输数据集和计算分类错误之前对通道进行修剪。例如,在修剪之后,在分类方面中等质量的架构可以转变为既轻又准确的架构,反之亦然。存在着无数可能发生的潜在场景,这促使我们为整个过程开发了一种双层优化方法。上层涉及生成体系结构,而下层优化信道修剪。进化算法(EA)已被证明在双层优化中是有效的,这使我们在本研究中采用基于协同进化迁移的算法作为双层架构优化问题的搜索引擎。我们提出的方法CNN-D-P(双层CNN设计和修剪)在广泛使用的图像分类基准数据集CIFAR-10、CIFAR-100和ImageNet上进行了测试。我们提出的技术通过一组关于相关最先进架构的比较测试进行了验证。
{"title":"Embedding channel pruning within the CNN architecture design using a bi-level evolutionary approach.","authors":"Hassen Louati,&nbsp;Ali Louati,&nbsp;Slim Bechikh,&nbsp;Elham Kariri","doi":"10.1007/s11227-023-05273-5","DOIUrl":"10.1007/s11227-023-05273-5","url":null,"abstract":"<p><p>Remarkable advancements have been achieved in machine learning and computer vision through the utilization of deep neural networks. Among the most advantageous of these networks is the convolutional neural network (CNN). It has been used in pattern recognition, medical diagnosis, and signal processing, among other things. Actually, for these networks, the challenge of choosing hyperparameters is of utmost importance. The reason behind this is that as the number of layers rises, the search space grows exponentially. In addition, all known classical and evolutionary pruning algorithms require a trained or built architecture as input. During the design phase, none of them consider the process of pruning. In order to assess the effectiveness and efficiency of any architecture created, pruning of channels must be carried out before transmitting the dataset and computing classification errors. For instance, following pruning, an architecture of medium quality in terms of classification may transform into an architecture that is both highly light and accurate, and vice versa. There exist countless potential scenarios that could occur, which prompted us to develop a bi-level optimization approach for the entire process. The upper level involves generating the architecture while the lower level optimizes channel pruning. Evolutionary algorithms (EAs) have proven effective in bi-level optimization, leading us to adopt the co-evolutionary migration-based algorithm as a search engine for our bi-level architectural optimization problem in this research. Our proposed method, CNN-D-P (bi-level CNN design and pruning), was tested on the widely used image classification benchmark datasets, CIFAR-10, CIFAR-100 and ImageNet. Our suggested technique is validated by means of a set of comparison tests with regard to relevant state-of-the-art architectures.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-34"},"PeriodicalIF":3.3,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10127175/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An overview of machine learning methods in enabling IoMT-based epileptic seizure detection. 实现基于IoMT的癫痫发作检测的机器学习方法概述。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-24 DOI: 10.1007/s11227-023-05299-9
Alaa Lateef Noor Al-Hajjar, Ali Kadhum M Al-Qurabat

The healthcare industry is rapidly automating, in large part because of the Internet of Things (IoT). The sector of the IoT devoted to medical research is sometimes called the Internet of Medical Things (IoMT). Data collecting and processing are the fundamental components of all IoMT applications. Machine learning (ML) algorithms must be included into IoMT immediately due to the vast quantity of data involved in healthcare and the value that precise forecasts have. In today's world, together, IoMT, cloud services, and ML techniques have become effective tools for solving many problems in the healthcare sector, such as epileptic seizure monitoring and detection. One of the biggest hazards to people's lives is epilepsy, a lethal neurological condition that has become a global issue. To prevent the deaths of thousands of epileptic patients each year, there is a critical necessity for an effective method for detecting epileptic seizures at their earliest stage. Numerous medical procedures, including epileptic monitoring, diagnosis, and other procedures, may be carried out remotely with the use of IoMT, which will reduce healthcare expenses and improve services. This article seeks to act as both a collection and a review of the different cutting-edge ML applications for epilepsy detection that are presently being combined with IoMT.

医疗保健行业正在迅速实现自动化,这在很大程度上是因为物联网。物联网中专门用于医学研究的部门有时被称为医疗物联网(IoMT)。数据收集和处理是所有IoMT应用程序的基本组成部分。由于医疗保健涉及大量数据以及精确预测的价值,机器学习(ML)算法必须立即纳入IoMT。在当今世界,IoMT、云服务和ML技术已成为解决医疗保健领域许多问题的有效工具,如癫痫发作监测和检测。癫痫是人们生命中最大的危险之一,这是一种致命的神经系统疾病,已成为一个全球性问题。为了防止每年数千名癫痫患者的死亡,迫切需要一种有效的方法来早期检测癫痫发作。许多医疗程序,包括癫痫监测、诊断和其他程序,都可以使用IoMT远程执行,这将减少医疗费用并改善服务。本文旨在收集和回顾目前与IoMT相结合的癫痫检测的不同前沿ML应用。
{"title":"An overview of machine learning methods in enabling IoMT-based epileptic seizure detection.","authors":"Alaa Lateef Noor Al-Hajjar,&nbsp;Ali Kadhum M Al-Qurabat","doi":"10.1007/s11227-023-05299-9","DOIUrl":"10.1007/s11227-023-05299-9","url":null,"abstract":"<p><p>The healthcare industry is rapidly automating, in large part because of the Internet of Things (IoT). The sector of the IoT devoted to medical research is sometimes called the Internet of Medical Things (IoMT). Data collecting and processing are the fundamental components of all IoMT applications. Machine learning (ML) algorithms must be included into IoMT immediately due to the vast quantity of data involved in healthcare and the value that precise forecasts have. In today's world, together, IoMT, cloud services, and ML techniques have become effective tools for solving many problems in the healthcare sector, such as epileptic seizure monitoring and detection. One of the biggest hazards to people's lives is epilepsy, a lethal neurological condition that has become a global issue. To prevent the deaths of thousands of epileptic patients each year, there is a critical necessity for an effective method for detecting epileptic seizures at their earliest stage. Numerous medical procedures, including epileptic monitoring, diagnosis, and other procedures, may be carried out remotely with the use of IoMT, which will reduce healthcare expenses and improve services. This article seeks to act as both a collection and a review of the different cutting-edge ML applications for epilepsy detection that are presently being combined with IoMT.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-48"},"PeriodicalIF":3.3,"publicationDate":"2023-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10123593/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"10091323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Q-learning-based UAV-mounted base station positioning in a disaster scenario for connectivity to the users located at unknown positions. 基于Q学习的无人机安装基站在灾难场景中定位,用于连接位于未知位置的用户。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-20 DOI: 10.1007/s11227-023-05292-2
Dilip Mandloi, Rajeev Arya

Due to its flexibility, cost-effectiveness, and quick deployment abilities, unmanned aerial vehicle-mounted base station (UmBS) deployment is a promising approach for restoring wireless services in areas devastated by natural disasters such as floods, thunderstorms, and tsunami strikes. However, the biggest challenges in the deployment process of UmBS are ground user equipment's (UE's) position information, UmBS transmit power optimization, and UE-UmBS association. In this article, we propose Localization of ground UEs and their Association with the UmBS (LUAU), an approach that ensures localization of ground UEs and energy-efficient deployment of UmBSs. Unlike existing studies that proposed their work based on the known UEs positional information, we first propose a three-dimensional range-based localization approach (3D-RBL) to estimate the position information of the ground UEs. Subsequently, an optimization problem is formulated to maximize the UE's mean data rate by optimizing the UmBS transmit power and deployment locations while taking the interference from the surrounding UmBSs into consideration. To achieve the goal of the optimization problem, we utilize the exploration and exploitation abilities of the Q-learning framework. Simulation results demonstrate that the proposed approach outperforms two benchmark schemes in terms of the UE's mean data rate and outage percentage.

由于其灵活性、成本效益和快速部署能力,无人机基站部署是在遭受洪水、雷暴和海啸等自然灾害破坏的地区恢复无线服务的一种很有前途的方法。然而,UmBS部署过程中最大的挑战是地面用户设备(UE)的位置信息、UmBS发射功率优化和UE与UmBS的关联。在本文中,我们提出了地面UE的本地化及其与UmBS的关联(LUAU),这是一种确保地面UE本地化和UmBS高效部署的方法。与现有的基于已知UE位置信息提出工作的研究不同,我们首先提出了一种基于三维距离的定位方法(3D-RBL)来估计地面UE的位置信息。随后,制定优化问题,以通过优化UmBS发射功率和部署位置来最大化UE的平均数据速率,同时考虑来自周围UmBS的干扰。为了实现优化问题的目标,我们利用Q学习框架的探索和开发能力。仿真结果表明,该方法在UE的平均数据速率和中断百分比方面优于两种基准方案。
{"title":"Q-learning-based UAV-mounted base station positioning in a disaster scenario for connectivity to the users located at unknown positions.","authors":"Dilip Mandloi,&nbsp;Rajeev Arya","doi":"10.1007/s11227-023-05292-2","DOIUrl":"10.1007/s11227-023-05292-2","url":null,"abstract":"<p><p>Due to its flexibility, cost-effectiveness, and quick deployment abilities, unmanned aerial vehicle-mounted base station (UmBS) deployment is a promising approach for restoring wireless services in areas devastated by natural disasters such as floods, thunderstorms, and tsunami strikes. However, the biggest challenges in the deployment process of UmBS are ground user equipment's (UE's) position information, UmBS transmit power optimization, and UE-UmBS association. In this article, we propose Localization of ground UEs and their Association with the UmBS (LUAU), an approach that ensures localization of ground UEs and energy-efficient deployment of UmBSs. Unlike existing studies that proposed their work based on the known UEs positional information, we first propose a three-dimensional range-based localization approach (3D-RBL) to estimate the position information of the ground UEs. Subsequently, an optimization problem is formulated to maximize the UE's mean data rate by optimizing the UmBS transmit power and deployment locations while taking the interference from the surrounding UmBSs into consideration. To achieve the goal of the optimization problem, we utilize the exploration and exploitation abilities of the Q-learning framework. Simulation results demonstrate that the proposed approach outperforms two benchmark schemes in terms of the UE's mean data rate and outage percentage.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-32"},"PeriodicalIF":3.3,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10116485/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9686584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain-enabled healthcare monitoring system for early Monkeypox detection. 区块链医疗监测系统,用于早期猴痘检测。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-20 DOI: 10.1007/s11227-023-05288-y
Aditya Gupta, Monu Bhagat, Vibha Jain

The recent emergence of monkeypox poses a life-threatening challenge to humans and has become one of the global health concerns after COVID-19. Currently, machine learning-based smart healthcare monitoring systems have demonstrated significant potential in image-based diagnosis including brain tumor identification and lung cancer diagnosis. In a similar fashion, the applications of machine learning can be utilized for the early identification of monkeypox cases. However, sharing critical health information with various actors such as patients, doctors, and other healthcare professionals in a secure manner remains a research challenge. Motivated by this fact, our paper presents a blockchain-enabled conceptual framework for the early detection and classification of monkeypox using transfer learning. The proposed framework is experimentally demonstrated in Python 3.9 using a monkeypox dataset of 1905 images obtained from the GitHub repository. To validate the effectiveness of the proposed model, various performance estimators, namely accuracy, recall, precision, and F1-score, are employed. The performance of different transfer learning models, namely Xception, VGG19, and VGG16, is compared against the presented methodology. Based on the comparison, it is evident that the proposed methodology effectively detects and classifies the monkeypox disease with a classification accuracy of 98.80%. In future, multiple skin diseases such as measles and chickenpox can be diagnosed using the proposed model on the skin lesion datasets.

最近出现的猴痘对人类构成了威胁生命的挑战,并已成为新冠肺炎后全球健康问题之一。目前,基于机器学习的智能医疗监测系统在基于图像的诊断(包括脑肿瘤识别和癌症诊断)中显示出巨大的潜力。以类似的方式,机器学习的应用可以用于猴痘病例的早期识别。然而,以安全的方式与患者、医生和其他医疗保健专业人员等各种参与者共享关键健康信息仍然是一项研究挑战。受此启发,我们的论文提出了一个基于区块链的概念框架,用于使用迁移学习对猴痘进行早期检测和分类。所提出的框架在Python 3.9中使用从GitHub存储库获得的1905幅图像的猴痘数据集进行了实验演示。为了验证所提出的模型的有效性,使用了各种性能估计量,即准确度、召回率、准确度和F1分数。将不同迁移学习模型(即Xception、VGG19和VGG16)的性能与所提出的方法进行比较。基于比较,很明显,所提出的方法有效地检测和分类了猴痘疾病,分类准确率为98.80%。未来,使用所提出的模型,可以在皮肤病变数据集上诊断麻疹和水痘等多种皮肤病。
{"title":"Blockchain-enabled healthcare monitoring system for early Monkeypox detection.","authors":"Aditya Gupta,&nbsp;Monu Bhagat,&nbsp;Vibha Jain","doi":"10.1007/s11227-023-05288-y","DOIUrl":"10.1007/s11227-023-05288-y","url":null,"abstract":"<p><p>The recent emergence of monkeypox poses a life-threatening challenge to humans and has become one of the global health concerns after COVID-19. Currently, machine learning-based smart healthcare monitoring systems have demonstrated significant potential in image-based diagnosis including brain tumor identification and lung cancer diagnosis. In a similar fashion, the applications of machine learning can be utilized for the early identification of monkeypox cases. However, sharing critical health information with various actors such as patients, doctors, and other healthcare professionals in a secure manner remains a research challenge. Motivated by this fact, our paper presents a blockchain-enabled conceptual framework for the early detection and classification of monkeypox using transfer learning. The proposed framework is experimentally demonstrated in Python 3.9 using a monkeypox dataset of 1905 images obtained from the GitHub repository. To validate the effectiveness of the proposed model, various performance estimators, namely accuracy, recall, precision, and F1-score, are employed. The performance of different transfer learning models, namely Xception, VGG19, and VGG16, is compared against the presented methodology. Based on the comparison, it is evident that the proposed methodology effectively detects and classifies the monkeypox disease with a classification accuracy of 98.80%. In future, multiple skin diseases such as measles and chickenpox can be diagnosed using the proposed model on the skin lesion datasets.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-25"},"PeriodicalIF":3.3,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10118230/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
BejaGNN: behavior-based Java malware detection via graph neural network. BejaGNN:通过图神经网络进行基于行为的Java恶意软件检测。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-04-17 DOI: 10.1007/s11227-023-05243-x
Pengbin Feng, Li Yang, Di Lu, Ning Xi, Jianfeng Ma

As a popular platform-independent language, Java is widely used in enterprise applications. In the past few years, language vulnerabilities exploited by Java malware have become increasingly prevalent, which cause threats for multi-platform. Security researchers continuously propose various approaches for fighting against Java malware programs. The low code path coverage and poor execution efficiency of dynamic analysis limit the large-scale application of dynamic Java malware detection methods. Therefore, researchers turn to extracting abundant static features to implement efficient malware detection. In this paper, we explore the direction of capturing malware semantic information by using graph learning algorithms and present BejaGNN (Behavior-based Java malware detection via Graph Neural Network), a novel behavior-based Java malware detection method using static analysis, word embedding technique, and graph neural network. Specifically, BejaGNN leverages static analysis techniques to extract ICFGs (Inter-procedural Control Flow Graph) from Java program files and then prunes these ICFGs to remove noisy instructions. Then, word embedding techniques are adopted to learn semantic representations for Java bytecode instructions. Finally, BejaGNN builds a graph neural network classifier to determine the maliciousness of Java programs. Experimental results on a public Java bytecode benchmark demonstrate that BejaGNN achieves high F1 98.8% and is superior to existing Java malware detection approaches, which verifies the promise of graph neural network in Java malware detection.

Java作为一种流行的独立于平台的语言,在企业应用程序中得到了广泛的应用。在过去的几年里,Java恶意软件利用的语言漏洞越来越普遍,这对多平台造成了威胁。安全研究人员不断提出各种方法来对抗Java恶意软件程序。动态分析的低代码路径覆盖率和较差的执行效率限制了动态Java恶意软件检测方法的大规模应用。因此,研究人员转向提取丰富的静态特征来实现高效的恶意软件检测。在本文中,我们探索了利用图学习算法捕获恶意软件语义信息的方向,并提出了BejaGNN(通过图神经网络进行基于行为的Java恶意软件检测),这是一种利用静态分析、单词嵌入技术和图神经网络的新的基于行为的Java恶意软件检测方法。具体来说,BejaGNN利用静态分析技术从Java程序文件中提取ICFG(过程间控制流图),然后修剪这些ICFG以去除有噪声的指令。然后,采用单词嵌入技术来学习Java字节码指令的语义表示。最后,BejaGNN构建了一个图神经网络分类器来确定Java程序的恶意性。在公共Java字节码基准测试上的实验结果表明,BejaGNN实现了98.8%的F1,并且优于现有的Java恶意软件检测方法,这验证了图神经网络在Java恶意软件的检测中的前景。
{"title":"BejaGNN: behavior-based Java malware detection via graph neural network.","authors":"Pengbin Feng,&nbsp;Li Yang,&nbsp;Di Lu,&nbsp;Ning Xi,&nbsp;Jianfeng Ma","doi":"10.1007/s11227-023-05243-x","DOIUrl":"10.1007/s11227-023-05243-x","url":null,"abstract":"<p><p>As a popular platform-independent language, Java is widely used in enterprise applications. In the past few years, language vulnerabilities exploited by Java malware have become increasingly prevalent, which cause threats for multi-platform. Security researchers continuously propose various approaches for fighting against Java malware programs. The low code path coverage and poor execution efficiency of dynamic analysis limit the large-scale application of dynamic Java malware detection methods. Therefore, researchers turn to extracting abundant static features to implement efficient malware detection. In this paper, we explore the direction of capturing malware semantic information by using graph learning algorithms and present BejaGNN (Behavior-based Java malware detection via Graph Neural Network), a novel behavior-based Java malware detection method using static analysis, word embedding technique, and graph neural network. Specifically, BejaGNN leverages static analysis techniques to extract ICFGs (Inter-procedural Control Flow Graph) from Java program files and then prunes these ICFGs to remove noisy instructions. Then, word embedding techniques are adopted to learn semantic representations for Java bytecode instructions. Finally, BejaGNN builds a graph neural network classifier to determine the maliciousness of Java programs. Experimental results on a public Java bytecode benchmark demonstrate that BejaGNN achieves high <i>F</i>1 98.8% and is superior to existing Java malware detection approaches, which verifies the promise of graph neural network in Java malware detection.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-25"},"PeriodicalIF":3.3,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10109236/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flexible multi-client functional encryption for set intersection. 用于集合交集的灵活多客户端功能加密。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-29 DOI: 10.1007/s11227-023-05129-y
Mojtaba Rafiee

A multi-client functional encryption (MCFE) scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of MCFE schemes, and introduce flexible multi-client functional encryption (FMCFE) schemes. We extend the aIND security of MCFE schemes to aIND security of FMCFE schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an FMCFE construction for achieving aIND security. Our construction computes set intersection for n clients that each holds a set with m elements, in time O(nm). We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.

用于集合交集的多客户端函数加密(MCFE)方案[Goldwasser-Gordon-Goyal 2014]是一种密码原语,它使评估者能够从预定数量的客户端的所有集合中学习交集,而无需学习每个单独客户端的明文集。使用这些方案,不可能从客户端的任意子集计算集合交集,因此,这种约束限制了其应用范围。为了提供这种可能性,我们重新定义了MCFE方案的语法和安全概念,并引入了灵活的多客户端功能加密(FMCFE)方案。我们以一种简单的方式将MCFE方案的aIND安全性扩展到FMCFE方案的aEND安全性。对于安全参数为多项式大小的通用集,我们提出了一种实现aIND安全的FMCFE构造。我们的构造计算n个客户端的集合交集,每个客户端都持有一个具有m个元素的集合,时间为O(nm)。我们还证明了我们在DDH1下构造的安全性,即它是对称外部Diffie-Hellman(SXDH)假设的变体。
{"title":"Flexible multi-client functional encryption for set intersection.","authors":"Mojtaba Rafiee","doi":"10.1007/s11227-023-05129-y","DOIUrl":"10.1007/s11227-023-05129-y","url":null,"abstract":"<p><p>A multi-client functional encryption (<math><mi>MCFE</mi></math>) scheme [Goldwasser-Gordon-Goyal 2014] for set intersection is a cryptographic primitive that enables an evaluator to learn the intersection from all sets of a predetermined number of clients, without need to learn the plaintext set of each individual client. Using these schemes, it is impossible to compute the set intersections from arbitrary subsets of clients, and thus, this constraint limits the range of its applications. To provide such a possibility, we redefine the syntax and security notions of <math><mi>MCFE</mi></math> schemes, and introduce flexible multi-client functional encryption (<math><mi>FMCFE</mi></math>) schemes. We extend the <math><mi>aIND</mi></math> security of <math><mi>MCFE</mi></math> schemes to <math><mi>aIND</mi></math> security of <math><mi>FMCFE</mi></math> schemes in a straightforward way. For a universal set with polynomial size in security parameter, we propose an <math><mi>FMCFE</mi></math> construction for achieving <math><mi>aIND</mi></math> security. Our construction computes set intersection for <i>n</i> clients that each holds a set with <i>m</i> elements, in time <math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>m</mi><mo>)</mo></mrow></math>. We also prove the security of our construction under DDH1 that it is a variant of the symmetric external Diffie-Hellman (SXDH) assumption.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-22"},"PeriodicalIF":3.3,"publicationDate":"2023-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10049912/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9713885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An evaluation of relational and NoSQL distributed databases on a low-power cluster. 对低功耗集群上的关系数据库和NoSQL分布式数据库的评估。
IF 3.3 3区 计算机科学 Q2 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-23 DOI: 10.1007/s11227-023-05166-7
Lucas Ferreira da Silva, João V F Lima

The constant growth of social media, unconventional web technologies, mobile applications, and Internet of Things (IoT) devices create challenges for cloud data systems in order to support huge datasets and very high request rates. NoSQL databases, such as Cassandra and HBase, and relational SQL databases with replication, such as Citus/PostgreSQL, have been used to increase horizontal scalability and high availability of data store systems. In this paper, we evaluated three distributed databases on a low-power low-cost cluster of commodity Single-Board Computers (SBC): relational Citus/PostgreSQL and NoSQL databases Cassandra and HBase. The cluster has 15 Raspberry Pi 3 nodes with Docker Swarm orchestration tool for service deployment and ingress load balancing over SBCs. We believe that a low-cost SBC cluster can support cloud serving goals such as scale-out, elasticity, and high availability. Experimental results clearly demonstrated that there is a trade-off between performance and replication, which provides availability and partition tolerance. Besides, both properties are essential in the context of distributed systems with low-power boards. Cassandra attained better results with its consistency levels specified by the client. Both Citus and HBase enable consistency but it penalizes performance as the number of replicas increases.

社交媒体、非传统网络技术、移动应用程序和物联网(IoT)设备的不断增长给云数据系统带来了挑战,以支持庞大的数据集和极高的请求率。NoSQL数据库,如Cassandra和HBase,以及具有复制功能的关系型SQL数据库,例如Citus/PostgreSQL,已被用于提高数据存储系统的水平可扩展性和高可用性。在本文中,我们评估了低功耗、低成本的商品单板计算机(SBC)集群上的三个分布式数据库:关系型Citus/PostgreSQL和NoSQL数据库Cassandra和HBase。该集群有15个Raspberry Pi 3节点,带有Docker Swarm编排工具,用于通过SBC进行服务部署和入口负载平衡。我们相信,低成本的SBC集群可以支持云服务目标,如扩展、弹性和高可用性。实验结果清楚地表明,在性能和复制之间存在权衡,这提供了可用性和分区容忍度。此外,在具有低功耗板的分布式系统中,这两种特性都是必不可少的。Cassandra通过客户端指定的一致性级别获得了更好的结果。Citus和HBase都可以实现一致性,但随着复制副本数量的增加,这会降低性能。
{"title":"An evaluation of relational and NoSQL distributed databases on a low-power cluster.","authors":"Lucas Ferreira da Silva,&nbsp;João V F Lima","doi":"10.1007/s11227-023-05166-7","DOIUrl":"10.1007/s11227-023-05166-7","url":null,"abstract":"<p><p>The constant growth of social media, unconventional web technologies, mobile applications, and Internet of Things (IoT) devices create challenges for cloud data systems in order to support huge datasets and very high request rates. NoSQL databases, such as Cassandra and HBase, and relational SQL databases with replication, such as Citus/PostgreSQL, have been used to increase horizontal scalability and high availability of data store systems. In this paper, we evaluated three distributed databases on a low-power low-cost cluster of commodity Single-Board Computers (SBC): relational Citus/PostgreSQL and NoSQL databases Cassandra and HBase. The cluster has 15 Raspberry Pi 3 nodes with Docker Swarm orchestration tool for service deployment and ingress load balancing over SBCs. We believe that a low-cost SBC cluster can support cloud serving goals such as scale-out, elasticity, and high availability. Experimental results clearly demonstrated that there is a trade-off between performance and replication, which provides availability and partition tolerance. Besides, both properties are essential in the context of distributed systems with low-power boards. Cassandra attained better results with its consistency levels specified by the client. Both Citus and HBase enable consistency but it penalizes performance as the number of replicas increases.</p>","PeriodicalId":50034,"journal":{"name":"Journal of Supercomputing","volume":" ","pages":"1-19"},"PeriodicalIF":3.3,"publicationDate":"2023-03-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10035467/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9686585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Journal of Supercomputing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1