首页 > 最新文献

Cluster Computing最新文献

英文 中文
PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model PULSE:利用 LSTM-RF 模型主动发现 IIoT 中潜在的严重异常事件
Pub Date : 2024-07-04 DOI: 10.1007/s10586-024-04653-7
Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika

In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant hurdles for interpretation and analysis. Additionally, issues about data transmission, scaling, computation, and storage can result in data anomalies that significantly affect IIoT applications. This work presents a novel anomaly detection framework for the IIoT in the context of the challenges posed by vast, heterogeneous, and complex data streams. This paper proposes a two-staged multi-variate approach employing a composition of long short-term memory (LSTM) and a random forest (RF) Classifier. Our approach leverages the LSTM’s superior temporal pattern recognition capabilities in multi-variate time-series data and the exceptional classification accuracy of the RF model. By integrating the strengths of LSTM and RF models, our method provides not only precise predictions but also effectively discriminates between anomalies and normal occurrences, even in imbalanced datasets. We evaluated our model on two real-world datasets comprising periodic and non-periodic, short-term, and long-term temporal dependencies. Comparative studies indicate that our proposed method outperforms well-established alternatives in anomaly detection, highlighting its potential application in the IIoT environment.

在 IIoT 中,数十亿台设备不断提供极其多样、多变和大规模的信息,给解释和分析带来了巨大障碍。此外,数据传输、扩展、计算和存储方面的问题也会导致数据异常,从而严重影响物联网应用。本文针对庞大、异构和复杂的数据流带来的挑战,提出了一种适用于物联网的新型异常检测框架。本文提出了一种两阶段多变量方法,采用了长短期记忆(LSTM)和随机森林(RF)分类器的组合。我们的方法利用了 LSTM 在多变量时间序列数据中卓越的时间模式识别能力和 RF 模型出色的分类准确性。通过整合 LSTM 和 RF 模型的优势,我们的方法不仅能提供精确的预测,还能有效区分异常和正常现象,即使在不平衡的数据集中也是如此。我们在两个真实世界的数据集上评估了我们的模型,其中包括周期性和非周期性、短期和长期的时间依赖性。对比研究表明,我们提出的方法在异常检测方面优于其他成熟的替代方法,突出了其在物联网环境中的潜在应用。
{"title":"PULSE: Proactive uncovering of latent severe anomalous events in IIoT using LSTM-RF model","authors":"Sangeeta Sharma, Priyanka Verma, Nitesh Bharot, Amish Ranpariya, Rakesh Porika","doi":"10.1007/s10586-024-04653-7","DOIUrl":"https://doi.org/10.1007/s10586-024-04653-7","url":null,"abstract":"<p>In the IIoT, billions of devices continually provide information that is extremely diverse, variable, and large-scale and presents significant hurdles for interpretation and analysis. Additionally, issues about data transmission, scaling, computation, and storage can result in data anomalies that significantly affect IIoT applications. This work presents a novel anomaly detection framework for the IIoT in the context of the challenges posed by vast, heterogeneous, and complex data streams. This paper proposes a two-staged multi-variate approach employing a composition of long short-term memory (LSTM) and a random forest (RF) Classifier. Our approach leverages the LSTM’s superior temporal pattern recognition capabilities in multi-variate time-series data and the exceptional classification accuracy of the RF model. By integrating the strengths of LSTM and RF models, our method provides not only precise predictions but also effectively discriminates between anomalies and normal occurrences, even in imbalanced datasets. We evaluated our model on two real-world datasets comprising periodic and non-periodic, short-term, and long-term temporal dependencies. Comparative studies indicate that our proposed method outperforms well-established alternatives in anomaly detection, highlighting its potential application in the IIoT environment.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141549528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication Sm-vsn-3c:基于星灵模型的新型虚拟传感器网络,用于覆盖、连接和数据通信
Pub Date : 2024-07-04 DOI: 10.1007/s10586-024-04554-9
Adda Boualem, Marwane Ayaida, Cyril de Runz, Hisham Kholidy, Hichem Sedjelmaci

The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor network (VSN) is a wireless camera network that appears to overcome the limitations of traditional wireless sensor networks in terms of the ability to store, process, and communicate data in a 3D region of interest. In this paper, we proposed a Starlings Model-based virtual Sensor Network for Coverage, Connectivity, and Data Communication (SM-VSN-3C) to ensure 3D coverage of temporally and spatially continuous 3D phenomena. Starlings are a good example of a VSN in nature. We therefore simulate the 3D movement of the stars in the sky, ensure the associated permanent coverage, and communicate with the Renault model. Use the behavioral model proposed by Reynolds to simulate herd movement. We’ve demonstrated the efficiency of the proposed network (SM-VSN-3C) in terms of communication and continuous coverage in time and space (3D). When simulating large and dense VSNs, there are two challenges in terms of coverage and communication: How to efficiently track a set of VSN-Starlings (VSN-Birds) in terms of coverage? In such a dense environment, how can a single Starling be tracked in terms of communication and data routing?

要研究时间和空间上的连续自然或工业现象,就需要出现新的无线传感器网络。虚拟传感器网络(VSN)是一种无线摄像网络,它似乎克服了传统无线传感器网络在三维感兴趣区域存储、处理和通信数据能力方面的局限性。在本文中,我们提出了一种基于星灵模型的覆盖、连接和数据通信虚拟传感器网络(SM-VSN-3C),以确保对时间和空间上连续的三维现象进行三维覆盖。椋鸟是自然界中虚拟传感器网络的典范。因此,我们模拟天空中星星的三维运动,确保相关的永久覆盖,并与雷诺模型进行通信。使用雷诺提出的行为模型模拟鸟群运动。我们已经证明了所提议的网络(SM-VSN-3C)在时间和空间(三维)上的通信和持续覆盖效率。在模拟大型密集 VSN 时,在覆盖和通信方面存在两个挑战:在覆盖范围方面,如何有效地跟踪一组 VSN-Starlings(VSN-Birds)?在如此密集的环境中,如何在通信和数据路由方面跟踪单个椋鸟?
{"title":"Sm-vsn-3c: a new Starlings model-based virtual sensor networks for coverage, connectivity, and data ccommunication","authors":"Adda Boualem, Marwane Ayaida, Cyril de Runz, Hisham Kholidy, Hichem Sedjelmaci","doi":"10.1007/s10586-024-04554-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04554-9","url":null,"abstract":"<p>The study of continuous natural or industrial phenomena in time and space requires the emergence of new wireless sensor networks. A virtual sensor network (VSN) is a wireless camera network that appears to overcome the limitations of traditional wireless sensor networks in terms of the ability to store, process, and communicate data in a 3D region of interest. In this paper, we proposed a Starlings Model-based virtual Sensor Network for Coverage, Connectivity, and Data Communication (SM-VSN-3C) to ensure 3D coverage of temporally and spatially continuous 3D phenomena. Starlings are a good example of a VSN in nature. We therefore simulate the 3D movement of the stars in the sky, ensure the associated permanent coverage, and communicate with the Renault model. Use the behavioral model proposed by Reynolds to simulate herd movement. We’ve demonstrated the efficiency of the proposed network (SM-VSN-3C) in terms of communication and continuous coverage in time and space (3D). When simulating large and dense VSNs, there are two challenges in terms of coverage and communication: How to efficiently track a set of VSN-Starlings (VSN-Birds) in terms of coverage? In such a dense environment, how can a single Starling be tracked in terms of communication and data routing?\u0000</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141549599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features 探索网络钓鱼 URL 中 n-grams 的低级统计特征:与高级特征的比较分析
Pub Date : 2024-07-03 DOI: 10.1007/s10586-024-04655-5
Yahya Tashtoush, Moayyad Alajlouni, Firas Albalas, Omar Darwish

Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to obtain sensitive information such as passwords and bank statements. One common technique in these attacks is using malicious URLs. These malicious URLs mimic legitimate URLs, misleading users into interacting with malicious websites. This practice, URL phishing, presents a big threat to internet security, emphasizing the need for advanced detection methods. So we aim to enhance phishing URL detection by using machine learning and deep learning models, leveraging a set of low-level URL features derived from n-gram analysis. In this paper, we present a method for detecting malicious URLs using statistical features extracted from n-grams. These n-grams are extracted from the hexadecimal representation of URLs. We employed 4 experiments in our paper. The first 3 experiments used machine learning with the statistical features extracted from these n-grams, and the fourth experiment used these grams directly with deep learning models to evaluate their effectiveness. Also, we used Explainable AI (XAI) to explore the extracted features and evaluate their importance and role in phishing detection. A key advantage of our method is its ability to reduce the number of features required and reduce the training time by using fewer features after applying XAI techniques. This stands in contrast to the previous study, which relies on high-level URL features and needs pre-processing and a high number of features (87 high-level URL-based features). So our technique only uses statistical features extracted from n-grams and the n-gram itself, without the need for any high-level features. Our method is evaluated across different n-gram lengths (2, 4, 6, and 8), aiming to optimize detection accuracy. We conducted four experiments in our study. In the first experiment, we focused on extracting and using 12 common statistical features like mean, median, etc. In the first experiment, the XGBoost model achieved the highest accuracy using 8-gram features with 82.41%. In the second experiment, we expanded the feature set and extracted an additional 13 features, so our feature count became 25. XGBoost in the second experiment achieved the highest accuracy with 86.40%. Accuracy improvement continued in the third experiment, we extracted an additional 16 features (character count features), and these features increased XGBoost accuracy to 88.15% in the third experiment. In the fourth experiment, we directly fed n-gram representations into deep learning models. The Convolutional Neural Network (CNN) model achieved the highest accuracy of 94.09% in experiment four. Also, we applied XAI techniques, SHapley Additive exPlanations (SHAP), and Local Interpretable Model-agnostic Explanations (LIME). Through the explanation provided by XAI methods, we were able to determine the most important features in our feature set, enabling a reductio

网络钓鱼攻击是数字世界中最大的网络安全威胁。攻击者通过冒充真实、可靠的网站来获取用户的敏感信息,如密码和银行对账单。这些攻击中的一种常见技术是使用恶意 URL。这些恶意 URL 模仿合法 URL,误导用户与恶意网站交互。这种做法,即 URL 网络钓鱼,对互联网安全构成了巨大威胁,强调了对先进检测方法的需求。因此,我们希望通过使用机器学习和深度学习模型,利用从 n-gram 分析中获得的一系列低级 URL 特征,来增强对网络钓鱼 URL 的检测。在本文中,我们提出了一种利用从 n-grams 中提取的统计特征检测恶意 URL 的方法。这些 n 符是从 URL 的十六进制表示中提取的。我们在论文中采用了 4 项实验。前 3 个实验使用了从这些 n-grams 中提取的统计特征进行机器学习,第 4 个实验直接使用这些 n-grams 和深度学习模型来评估其有效性。此外,我们还使用了可解释人工智能(XAI)来探索提取的特征,并评估它们在网络钓鱼检测中的重要性和作用。我们的方法的一个主要优势是能够减少所需的特征数量,并在应用 XAI 技术后通过使用更少的特征来缩短训练时间。这与之前的研究形成了鲜明对比,前者依赖于高级 URL 特征,需要预处理和大量特征(87 个基于 URL 的高级特征)。因此,我们的技术只使用从 n-gram 和 n-gram 本身提取的统计特征,而不需要任何高级特征。我们对不同 n-gram 长度(2、4、6 和 8)的方法进行了评估,旨在优化检测准确率。我们在研究中进行了四次实验。在第一个实验中,我们重点提取并使用了 12 个常见的统计特征,如平均值、中位数等。在第一个实验中,XGBoost 模型使用 8 个语法特征取得了 82.41% 的最高准确率。在第二次实验中,我们扩展了特征集,额外提取了 13 个特征,因此特征数量变为 25 个。XGBoost 在第二次实验中取得了 86.40% 的最高准确率。在第三次实验中,我们又提取了 16 个特征(字符数特征),这些特征将 XGBoost 的准确率提高到了 88.15%。在第四次实验中,我们直接将 n-gram 表示法输入深度学习模型。卷积神经网络(CNN)模型在第四次实验中取得了 94.09% 的最高准确率。此外,我们还应用了 XAI 技术、SHAPLE Additive exPlanations(SHAP)和 Local Interpretable Model-agnostic Explanations(LIME)。通过 XAI 方法提供的解释,我们能够确定特征集中最重要的特征,从而减少特征数量。使用较少的特征(4、7、10、13、15),与实验三中使用的 41 个特征相比,我们获得了良好的准确性,并减少了模型的训练时间和复杂性。这项研究旨在通过使用机器学习和深度学习模型,利用从 n-gram 分析中获得的一组低级 URL 特征,提高钓鱼网址的检测能力。我们的研究结果表明了使用最小统计特征识别恶意 URL 的重要性。值得注意的是,CNN 的使用取得了巨大进步,使用 n-grams 的 URL 准确率达到 94.09%,超过了传统的机器学习模型。这一成果不仅验证了深度学习模型在复杂模式识别任务中的有效性,还凸显了我们的特征选择方法的高效性,与现有的基于高级特征的研究相比,这种方法依赖的特征数量更少,复杂性更低。这些研究成果为开发更稳健、高效和可扩展的网络钓鱼检测系统指明了一条大有可为的道路。
{"title":"Exploring low-level statistical features of n-grams in phishing URLs: a comparative analysis with high-level features","authors":"Yahya Tashtoush, Moayyad Alajlouni, Firas Albalas, Omar Darwish","doi":"10.1007/s10586-024-04655-5","DOIUrl":"https://doi.org/10.1007/s10586-024-04655-5","url":null,"abstract":"<p>Phishing attacks are the biggest cybersecurity threats in the digital world. Attackers exploit users by impersonating real, authentic websites to obtain sensitive information such as passwords and bank statements. One common technique in these attacks is using malicious URLs. These malicious URLs mimic legitimate URLs, misleading users into interacting with malicious websites. This practice, URL phishing, presents a big threat to internet security, emphasizing the need for advanced detection methods. So we aim to enhance phishing URL detection by using machine learning and deep learning models, leveraging a set of low-level URL features derived from n-gram analysis. In this paper, we present a method for detecting malicious URLs using statistical features extracted from n-grams. These n-grams are extracted from the hexadecimal representation of URLs. We employed 4 experiments in our paper. The first 3 experiments used machine learning with the statistical features extracted from these n-grams, and the fourth experiment used these grams directly with deep learning models to evaluate their effectiveness. Also, we used Explainable AI (XAI) to explore the extracted features and evaluate their importance and role in phishing detection. A key advantage of our method is its ability to reduce the number of features required and reduce the training time by using fewer features after applying XAI techniques. This stands in contrast to the previous study, which relies on high-level URL features and needs pre-processing and a high number of features (87 high-level URL-based features). So our technique only uses statistical features extracted from n-grams and the n-gram itself, without the need for any high-level features. Our method is evaluated across different n-gram lengths (2, 4, 6, and 8), aiming to optimize detection accuracy. We conducted four experiments in our study. In the first experiment, we focused on extracting and using 12 common statistical features like mean, median, etc. In the first experiment, the XGBoost model achieved the highest accuracy using 8-gram features with 82.41%. In the second experiment, we expanded the feature set and extracted an additional 13 features, so our feature count became 25. XGBoost in the second experiment achieved the highest accuracy with 86.40%. Accuracy improvement continued in the third experiment, we extracted an additional 16 features (character count features), and these features increased XGBoost accuracy to 88.15% in the third experiment. In the fourth experiment, we directly fed n-gram representations into deep learning models. The Convolutional Neural Network (CNN) model achieved the highest accuracy of 94.09% in experiment four. Also, we applied XAI techniques, SHapley Additive exPlanations (SHAP), and Local Interpretable Model-agnostic Explanations (LIME). Through the explanation provided by XAI methods, we were able to determine the most important features in our feature set, enabling a reductio","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141549530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering e-learning approach by the use of federated edge computing 利用联合边缘计算增强电子学习方法的能力
Pub Date : 2024-07-03 DOI: 10.1007/s10586-024-04567-4
Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally, Ridha Ejbali

Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires getting the whole data what causes a threat to the privacy of the sensitive data. FL was proposed to overcome the cited limits. The principal of FL revolves around training machine learning models locally on individual devices instead of gathering all the data in a central server, and only the updated models are shared and aggregated. Concerning e-learning, it is about using electronic/digital technology to deliver educational content in order to facilitate the learning. It becomes popular with the advancement of the internet and digital devices mainly after the COVID-19. In this work, we propose an e-learning recommendation system based on FL architecture where we can propose suitable courses to the learner. Because of the important number of connected learners looking for online courses, the FL encounters a problem: bottleneck communication. This situation can cause the increase of the computational load, the longer time of the aggregation, the saturation of the resources, etc. As solution, we propose using the edge computing potentials so that the aggregation will be performed first in the edge layer then in the central server, reducing hence, the need for continuous data transmission to the server and enabling a faster inference while keeping the security and privacy of the data. The experiments carried out prove the effectiveness of our approach in solving the problem addressed in this work.

联合学习(FL)是一种分散的机器学习模型训练方法。在传统架构中,训练需要获取全部数据,这会对敏感数据的隐私造成威胁。FL 的提出就是为了克服上述限制。FL 的原理是在单个设备上本地训练机器学习模型,而不是在中央服务器上收集所有数据,只有更新后的模型才会被共享和汇总。关于电子学习,它是指利用电子/数字技术提供教育内容,以促进学习。它主要是在 COVID-19 之后,随着互联网和数字设备的发展而流行起来的。在这项工作中,我们提出了一种基于 FL 架构的电子学习推荐系统,可以向学习者推荐合适的课程。由于寻找在线课程的联网学习者数量巨大,FL 遇到了一个问题:通信瓶颈。这种情况会导致计算负荷增加、聚合时间延长、资源饱和等。作为解决方案,我们建议利用边缘计算的潜力,使聚合首先在边缘层进行,然后在中央服务器进行,从而减少向服务器持续传输数据的需要,并在保证数据安全和隐私的前提下加快推理速度。所进行的实验证明了我们的方法在解决本作品所涉及的问题方面的有效性。
{"title":"Empowering e-learning approach by the use of federated edge computing","authors":"Nouha Arfaoui, Amel Ksibi, Nouf Abdullah Almujally, Ridha Ejbali","doi":"10.1007/s10586-024-04567-4","DOIUrl":"https://doi.org/10.1007/s10586-024-04567-4","url":null,"abstract":"<p>Federated learning (FL) is a decentralized approach to training machine learning model. In the traditional architecture, the training requires getting the whole data what causes a threat to the privacy of the sensitive data. FL was proposed to overcome the cited limits. The principal of FL revolves around training machine learning models locally on individual devices instead of gathering all the data in a central server, and only the updated models are shared and aggregated. Concerning e-learning, it is about using electronic/digital technology to deliver educational content in order to facilitate the learning. It becomes popular with the advancement of the internet and digital devices mainly after the COVID-19. In this work, we propose an e-learning recommendation system based on FL architecture where we can propose suitable courses to the learner. Because of the important number of connected learners looking for online courses, the FL encounters a problem: bottleneck communication. This situation can cause the increase of the computational load, the longer time of the aggregation, the saturation of the resources, etc. As solution, we propose using the edge computing potentials so that the aggregation will be performed first in the edge layer then in the central server, reducing hence, the need for continuous data transmission to the server and enabling a faster inference while keeping the security and privacy of the data. The experiments carried out prove the effectiveness of our approach in solving the problem addressed in this work.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141549596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing 利用区块链辅助环基同态加密进行匿名身份验证,提高云计算安全性
Pub Date : 2024-07-02 DOI: 10.1007/s10586-024-04617-x
Pranav Shrivastava, Bashir Alam, Mansaf Alam

Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.

如今,由于信息传输呈指数级增长,对云计算的需求与日俱增。即使采取了安全措施来保护存储在云中的数据,网络犯罪分子仍在锲而不舍地破坏云环境。为应对这一挑战,需要一种增强型身份验证方法来提高安全性。为了保护云环境中的用户隐私和匿名性,本研究提出了一种名为基于超椭圆曲线的匿名环签名(HCARS)的新技术。此外,区块链技术被用来安全地记录时间戳和加密密钥。区块链系统中的散列函数采用了 SHA 256 和 SHA 512 算法。此外,利用带误差环学习(RLWE)问题,基于 Nth 度截断多项式环单元(NTRU)的全同态加密(NTRU-FHE)方案可加密敏感数据并确保其完整性。通过利用 Java 进行实验验证,对所提出的方法和现有方法进行了比较研究。结果表明,所提出的方法优于现有技术,在输入大小为 75 的情况下,加密时间为 6.75 秒,在输入大小相同的情况下,解密时间为 5.128 秒。同样,100 条接收信息的签名生成时间为 125 毫秒,450 个数据块的数据块生成时间为 10.8 秒,16,384 条记录的吞吐量为 98 MB/秒,20 条信息的总计算时间为 403 毫秒。结果表明,HCARS 方法性能优越,大大缩短了加密、解密和签名生成时间,提高了吞吐量和计算效率。在 HCARS 方法的帮助下,面对不断变化的网络威胁,云系统的安全和隐私保护变得更加容易。
{"title":"An anonymous authentication with blockchain assisted ring-based homomorphic encryption for enhancing security in cloud computing","authors":"Pranav Shrivastava, Bashir Alam, Mansaf Alam","doi":"10.1007/s10586-024-04617-x","DOIUrl":"https://doi.org/10.1007/s10586-024-04617-x","url":null,"abstract":"<p>Nowadays, the need for cloud computing has increased due to the exponential growth in information transmission. Cybercriminals are persistent in their efforts to breach cloud environments, even with security measures in place to protect data stored in the cloud. To address this challenge, an enhanced authentication approach is needed for enhanced security. In order to protect user privacy and anonymity in cloud environments, the study presents a novel technique called Hyperelliptic Curve-based Anonymous Ring Signature (HCARS). Moreover, Blockchain technology is utilized to securely record timestamps and cryptographic keys. The hashing functions in the Blockchain system employ SHA 256 and SHA 512 algorithms. Furthermore, utilizing Ring Learning with Error (RLWE) problems, an Nth degree Truncated Polynomial Ring Units (NTRU)-Based Fully Homomorphic Encryption (NTRU-FHE) Scheme encrypts sensitive data and ensures its integrity. A comparative study between the proposed method and current approaches is done through experimental verification utilizing Java. The results demonstrate that the proposed approach outperforms existing techniques, achieving an encryption time of 6.75 s for an input size of 75 and a decryption time of 5.128 s for the same input size. Similarly, the signature generation time is 125 ms for 100 received messages, block generation time of 10.8 s for 450 blocks, throughput of 98 MB/sec for a record size of 16,384, and total computational time of 403 ms for 20 messages. The results demonstrate the superior performance of the HCARS approach, with significantly reduced encryption, decryption, and signature generation times, as well as improved throughput and computational efficiency. Securing the security and privacy of cloud-based systems in the face of changing cyber threats has been made much easier with the help of the HCARS approach.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Service selection based on blockchain smart contracts in cloud-edge environment 云边缘环境中基于区块链智能合约的服务选择
Pub Date : 2024-07-02 DOI: 10.1007/s10586-024-04647-5
Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu

The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology. Within this context, the selection of high-quality and reliable services is crucial to meet the needs of users. However, ensuring the reliability of service information is a challenge due to its vulnerability to tampering. This research paper proposes a method for service selection in the cloud-edge environment based on blockchain smart contracts. By leveraging blockchain technology, this method achieves decentralized and trustworthy service selection. Through smart contracts, user interactions are securely recorded, significantly reducing the risk of information tampering and enhancing information reliability. Additionally, the Arithmetic Optimization Algorithm is improved for service selection on the blockchain by introducing mutation and crossover operations. Experimental results demonstrate that this method effectively prevents tampering with service information and improves the utility value of selected services compared to traditional methods and metaheuristic algorithms mentioned.

云计算与边缘计算的快速融合使云-边缘环境成为信息技术领域的焦点。在此背景下,选择优质可靠的服务对于满足用户需求至关重要。然而,由于服务信息容易被篡改,确保服务信息的可靠性是一项挑战。本研究论文提出了一种基于区块链智能合约的云边缘环境服务选择方法。通过利用区块链技术,该方法实现了去中心化和可信的服务选择。通过智能合约,用户的交互行为被安全地记录下来,大大降低了信息被篡改的风险,提高了信息的可靠性。此外,通过引入突变和交叉操作,改进了用于区块链服务选择的算术优化算法。实验结果表明,与上述传统方法和元启发式算法相比,该方法能有效防止服务信息被篡改,并提高所选服务的实用价值。
{"title":"Service selection based on blockchain smart contracts in cloud-edge environment","authors":"Yingying Ning, Jing Li, Ming Zhu, Chuanxi Liu","doi":"10.1007/s10586-024-04647-5","DOIUrl":"https://doi.org/10.1007/s10586-024-04647-5","url":null,"abstract":"<p>The rapid integration of cloud computing and edge computing has brought the cloud-edge environment into the spotlight in information technology. Within this context, the selection of high-quality and reliable services is crucial to meet the needs of users. However, ensuring the reliability of service information is a challenge due to its vulnerability to tampering. This research paper proposes a method for service selection in the cloud-edge environment based on blockchain smart contracts. By leveraging blockchain technology, this method achieves decentralized and trustworthy service selection. Through smart contracts, user interactions are securely recorded, significantly reducing the risk of information tampering and enhancing information reliability. Additionally, the Arithmetic Optimization Algorithm is improved for service selection on the blockchain by introducing mutation and crossover operations. Experimental results demonstrate that this method effectively prevents tampering with service information and improves the utility value of selected services compared to traditional methods and metaheuristic algorithms mentioned.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522083","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges 元哲算法及其在无线传感器网络中的应用:综述、开放性问题和挑战
Pub Date : 2024-07-02 DOI: 10.1007/s10586-024-04619-9
Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban

Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and optimizing many issues in different domains. However, WSNs suffer from several issues, such as deployment, localization, sink node placement, energy efficiency, and clustering. Unfortunately, these issues negatively affect the already limited energy of the WSNs; therefore, the need to employ metaheuristic algorithms is inevitable to alleviate the harm imposed by these issues on the lifespan and performance of the network. Some associated issues regarding WSNs are modelled as single and multi-objective optimization issues. Single-objective issues have one optimal solution, and the other has multiple desirable solutions that compete, the so-called non-dominated solutions. Several optimization strategies based on metaheuristic algorithms are available to address various types of optimization concerns relating to WSN deployment, localization, sink node placement, energy efficiency, and clustering. This review reports and discusses the literature research on single and multi-objective metaheuristics and their evaluation criteria, WSN architectures and definitions, and applications of metaheuristics in WSN deployment, localization, sink node placement, energy efficiency, and clustering. It also proposes definitions for these terms and reports on some ongoing difficulties linked to these topics. Furthermore, this review outlines the open issues, challenge paths, and future trends that can be applied to metaheuristic algorithms (single and multi-objective) and WSN difficulties, as well as the significant efforts that are necessary to improve WSN efficiency.

元启发式算法在解决和优化不同领域的许多问题方面具有卓越的能力,因此具有广泛的适用性,尤其是在无线传感器网络(WSN)中。然而,WSN 存在几个问题,如部署、定位、汇节点放置、能效和聚类。不幸的是,这些问题对 WSN 本已有限的能量产生了负面影响;因此,为了减轻这些问题对网络寿命和性能造成的危害,采用元启发式算法是不可避免的。与 WSN 相关的一些问题被模拟为单目标和多目标优化问题。单目标问题有一个最优解,而另一个问题则有多个理想解相互竞争,即所谓的非主导解。目前有几种基于元启发式算法的优化策略可用于解决与 WSN 部署、定位、汇节点放置、能效和聚类有关的各类优化问题。本综述报告和讨论了有关单目标和多目标元启发式算法及其评估标准、WSN 架构和定义以及元启发式算法在 WSN 部署、定位、汇节点放置、能效和聚类中的应用的文献研究。本综述还提出了这些术语的定义,并报告了与这些主题相关的一些当前难题。此外,本综述还概述了可应用于元搜索算法(单目标和多目标)和 WSN 难题的开放性问题、挑战路径和未来趋势,以及提高 WSN 效率所需的重大努力。
{"title":"Metaheuristic algorithms and their applications in wireless sensor networks: review, open issues, and challenges","authors":"Essam H. Houssein, Mohammed R. Saad, Youcef Djenouri, Gang Hu, Abdelmgeid A. Ali, Hassan Shaban","doi":"10.1007/s10586-024-04619-9","DOIUrl":"https://doi.org/10.1007/s10586-024-04619-9","url":null,"abstract":"<p>Metaheuristic algorithms have wide applicability, particularly in wireless sensor networks (WSNs), due to their superior skill in solving and optimizing many issues in different domains. However, WSNs suffer from several issues, such as deployment, localization, sink node placement, energy efficiency, and clustering. Unfortunately, these issues negatively affect the already limited energy of the WSNs; therefore, the need to employ metaheuristic algorithms is inevitable to alleviate the harm imposed by these issues on the lifespan and performance of the network. Some associated issues regarding WSNs are modelled as single and multi-objective optimization issues. Single-objective issues have one optimal solution, and the other has multiple desirable solutions that compete, the so-called non-dominated solutions. Several optimization strategies based on metaheuristic algorithms are available to address various types of optimization concerns relating to WSN deployment, localization, sink node placement, energy efficiency, and clustering. This review reports and discusses the literature research on single and multi-objective metaheuristics and their evaluation criteria, WSN architectures and definitions, and applications of metaheuristics in WSN deployment, localization, sink node placement, energy efficiency, and clustering. It also proposes definitions for these terms and reports on some ongoing difficulties linked to these topics. Furthermore, this review outlines the open issues, challenge paths, and future trends that can be applied to metaheuristic algorithms (single and multi-objective) and WSN difficulties, as well as the significant efforts that are necessary to improve WSN efficiency.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach 区块链支持的具有可追溯性的安全药品供应链框架:一种高效的可搜索药链方法
Pub Date : 2024-07-02 DOI: 10.1007/s10586-024-04626-w
Rahul Mishra, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal

The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is, there needs to be more transparency in the traditional pharma supply chain. Also, the global nature of this industry makes it vulnerable to problems caused by a lack of transparency, distrust among involved entities, and reluctance to share data. Such lack of transparency mainly causes concerns regarding pharmaceutical product supply record forgery and counterfeiting of drugs. Supply chain traceability, which means following a product’s journey from its manufacturing facility to its final consumers, is critically important, as it necessitates traceability, authenticity, and efficiency at a high level. This study proposes a blockchain-based secure and efficient traceable supply chain infrastructure for pharmaceutical products. Smart contracts are at the heart of the proposed solution, which tracks how all entities supply and record relevant events. Thus, all the involved entities can stay up-to-date on the latest state and guarantee a secure supply against any supply record forgery and counterfeit pharmaceutical products. In addition, we replicate the records in many chunks and use parallel search to achieve efficient traceability, which searches the stored records efficiently on the blockchain network. The comprehensive security analysis with standard theoretical proofs ensures the computational infeasibility of the proposed model. Further, the detailed performance analysis with test simulations shows the practicability of the proposed model.

由制造商、供应商、零售商和客户组成的复杂网络横跨全球,构成了当今的医药供应链。因此,传统的医药供应链需要更高的透明度。此外,该行业的全球性质使其容易受到缺乏透明度、相关实体之间互不信任以及不愿共享数据等问题的影响。缺乏透明度的主要原因是人们对药品供应记录造假和假药的担忧。供应链可追溯性是指跟踪产品从生产工厂到最终消费者的整个过程,这一点至关重要,因为它需要高水平的可追溯性、真实性和效率。本研究提出了一种基于区块链的安全高效的医药产品可追溯供应链基础设施。智能合约是拟议解决方案的核心,它可以跟踪所有实体的供应情况并记录相关事件。因此,所有参与实体都能随时了解最新状态,并保证安全供应,防止任何供应记录伪造和假冒药品。此外,我们将记录复制成许多块,并使用并行搜索来实现高效溯源,从而在区块链网络上高效搜索存储的记录。利用标准理论证明进行的全面安全分析确保了所提模型在计算上的不可行性。此外,通过测试模拟进行的详细性能分析表明了所提模型的实用性。
{"title":"Blockchain enabled secure pharmaceutical supply chain framework with traceability: an efficient searchable pharmachain approach","authors":"Rahul Mishra, Dharavath Ramesh, Nazeeruddin Mohammad, Bhaskar Mondal","doi":"10.1007/s10586-024-04626-w","DOIUrl":"https://doi.org/10.1007/s10586-024-04626-w","url":null,"abstract":"<p>The complex networks of manufacturers, suppliers, retailers, and customers that make up today’s pharmaceutical supply chain span worldwide. As it is, there needs to be more transparency in the traditional pharma supply chain. Also, the global nature of this industry makes it vulnerable to problems caused by a lack of transparency, distrust among involved entities, and reluctance to share data. Such lack of transparency mainly causes concerns regarding pharmaceutical product supply record forgery and counterfeiting of drugs. Supply chain traceability, which means following a product’s journey from its manufacturing facility to its final consumers, is critically important, as it necessitates traceability, authenticity, and efficiency at a high level. This study proposes a blockchain-based secure and efficient traceable supply chain infrastructure for pharmaceutical products. Smart contracts are at the heart of the proposed solution, which tracks how all entities supply and record relevant events. Thus, all the involved entities can stay up-to-date on the latest state and guarantee a secure supply against any supply record forgery and counterfeit pharmaceutical products. In addition, we replicate the records in many chunks and use parallel search to achieve efficient traceability, which searches the stored records efficiently on the blockchain network. The comprehensive security analysis with standard theoretical proofs ensures the computational infeasibility of the proposed model. Further, the detailed performance analysis with test simulations shows the practicability of the proposed model.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saver: a proactive microservice resource scheduling strategy based on STGCN Saver:基于 STGCN 的主动式微服务资源调度策略
Pub Date : 2024-07-01 DOI: 10.1007/s10586-024-04615-z
Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu

As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale complicates resource scheduling. Traditional methods, based on fixed thresholds, are simple but lead to resource waste and poor adaptability to traffic spikes. To address this problem, we design a new resource scheduling strategy Saver based on the container cloud platform, which combines a microservice request prediction model with a microservice performance evaluation model that predicts SLO (Service Level Objective) violations and a heuristic algorithm to solve the optimal resource scheduling for the cluster. We deploy the microservices open-source project sock-shop in a Kubernetes cluster to evaluate Saver. Experimental results show that Saver saves 7.9% of CPU resources, 13% of the instances, and reduces the SLO violation rate by 31.2% compared to K8s autoscaler.

随着容器技术和微服务的成熟,应用程序越来越多地转向微服务和云部署。微服务规模的不断扩大使资源调度变得更加复杂。基于固定阈值的传统方法虽然简单,但会造成资源浪费,对流量峰值的适应性也很差。为解决这一问题,我们设计了一种基于容器云平台的新型资源调度策略Saver,它将微服务请求预测模型与预测SLO(服务级别目标)违规情况的微服务性能评估模型和启发式算法相结合,以解决集群的最优资源调度问题。我们在 Kubernetes 集群中部署了微服务开源项目 sock-shop,以评估 Saver。实验结果表明,与 K8s autoscaler 相比,Saver 节省了 7.9% 的 CPU 资源和 13% 的实例,并将 SLO 违规率降低了 31.2%。
{"title":"Saver: a proactive microservice resource scheduling strategy based on STGCN","authors":"Yi Jiang, Jin Xue, Kun Hu, Tianxiang Chen, Tong Wu","doi":"10.1007/s10586-024-04615-z","DOIUrl":"https://doi.org/10.1007/s10586-024-04615-z","url":null,"abstract":"<p>As container technology and microservices mature, applications increasingly shift to microservices and cloud deployment. Growing microservices scale complicates resource scheduling. Traditional methods, based on fixed thresholds, are simple but lead to resource waste and poor adaptability to traffic spikes. To address this problem, we design a new resource scheduling strategy Saver based on the container cloud platform, which combines a microservice request prediction model with a microservice performance evaluation model that predicts SLO (Service Level Objective) violations and a heuristic algorithm to solve the optimal resource scheduling for the cluster. We deploy the microservices open-source project sock-shop in a Kubernetes cluster to evaluate Saver. Experimental results show that Saver saves 7.9% of CPU resources, 13% of the instances, and reduces the SLO violation rate by 31.2% compared to K8s autoscaler.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX) 利用深度学习对象检测对脑电图波形图像中的睡眠棘波进行视觉识别(YOLOv4 与 YOLOX)
Pub Date : 2024-07-01 DOI: 10.1007/s10586-024-04630-0
Mohammad Fraiwan, Natheer Khasawneh

The electroencephalogram (EEG) is a tool utilized to capture the intricate electrical dynamics within the brain, offering invaluable insights into neural activity. This method is pivotal in identifying potential disruptions in brain cell communication, aiding in the diagnosis of various neurological conditions such as epilepsy and sleep disorders. The examination of EEG waveform morphology and associated characteristics serves as a cornerstone in this diagnostic process. Of particular significance within EEG analysis are sleep spindles, intricate patterns of brain waves implicated in crucial cognitive functions including brain plasticity, learning, memory consolidation, and motor skills. Traditionally, the task of analyzing EEG data has rested upon neurologists, neurosurgeons, or trained medical technicians, a laborious and error-prone endeavor. This study endeavors to revolutionize EEG analysis by leveraging artificial intelligence (AI) methodologies, specifically deep learning object detection techniques, to visually identify and locate sleep spindles within EEG waveform images. The You Only Look Once (YOLOv4) methodology is employed for this purpose. A diverse array of convolutional neural network architectures is meticulously customized, trained, and evaluated to facilitate feature extraction for the YOLOv4 detector. Furthermore, novel YOLOX detection models are introduced and extensively compared against YOLOv4-based counterparts. The results reveal outstanding performance across various metrics, with both YOLOX and YOLOv4 demonstrating exceptional average precision (AP) scores ranging between 98% to 100% at a 50% bounding box overlap threshold. Notably, when scrutinized under higher threshold values, YOLOX emerges as the superior model, exhibiting heightened accuracy in bounding box predictions with an 84% AP score at an 80% overlap threshold, compared to 72.48% AP for YOLOv4. This remarkable performance, particularly at the standard 50% overlap threshold, signifies a significant stride towards meeting the stringent clinical requisites for integrating AI-based solutions into clinical EEG analysis workflows.

脑电图(EEG)是一种用于捕捉大脑内部复杂电动态的工具,可提供有关神经活动的宝贵信息。这种方法在识别脑细胞通信的潜在干扰方面起着关键作用,有助于诊断癫痫和睡眠障碍等各种神经系统疾病。对脑电图波形形态和相关特征的检查是这一诊断过程的基石。在脑电图分析中尤为重要的是睡眠棘波,这种复杂的脑电波模式与大脑可塑性、学习、记忆巩固和运动技能等关键认知功能有关。传统上,分析脑电图数据的任务主要由神经科医生、神经外科医生或训练有素的医疗技术人员承担,这是一项费力且容易出错的工作。本研究试图利用人工智能(AI)方法,特别是深度学习对象检测技术,在脑电图波形图像中直观地识别和定位睡眠棘波,从而彻底改变脑电图分析方法。为此,我们采用了 "只看一次"(YOLOv4)方法。我们对各种卷积神经网络架构进行了精心定制、训练和评估,以促进 YOLOv4 检测器的特征提取。此外,还引入了新型 YOLOX 检测模型,并与基于 YOLOv4 的对应模型进行了广泛比较。结果显示,YOLOX 和 YOLOv4 在各种指标上都有出色的表现,在 50% 边框重叠阈值下,平均精度 (AP) 分数介于 98% 到 100% 之间。值得注意的是,在更高的阈值下,YOLOX 显示出更高的模型优势,在 80% 的重叠阈值下,YOLOX 的边框预测准确率达到 84%,而 YOLOv4 的平均准确率为 72.48%。尤其是在标准的 50% 重叠阈值下,这一出色的表现标志着在满足将基于人工智能的解决方案集成到临床脑电图分析工作流中的严格临床要求方面取得了重大进展。
{"title":"Visual identification of sleep spindles in EEG waveform images using deep learning object detection (YOLOv4 vs YOLOX)","authors":"Mohammad Fraiwan, Natheer Khasawneh","doi":"10.1007/s10586-024-04630-0","DOIUrl":"https://doi.org/10.1007/s10586-024-04630-0","url":null,"abstract":"<p>The electroencephalogram (EEG) is a tool utilized to capture the intricate electrical dynamics within the brain, offering invaluable insights into neural activity. This method is pivotal in identifying potential disruptions in brain cell communication, aiding in the diagnosis of various neurological conditions such as epilepsy and sleep disorders. The examination of EEG waveform morphology and associated characteristics serves as a cornerstone in this diagnostic process. Of particular significance within EEG analysis are sleep spindles, intricate patterns of brain waves implicated in crucial cognitive functions including brain plasticity, learning, memory consolidation, and motor skills. Traditionally, the task of analyzing EEG data has rested upon neurologists, neurosurgeons, or trained medical technicians, a laborious and error-prone endeavor. This study endeavors to revolutionize EEG analysis by leveraging artificial intelligence (AI) methodologies, specifically deep learning object detection techniques, to visually identify and locate sleep spindles within EEG waveform images. The You Only Look Once (YOLOv4) methodology is employed for this purpose. A diverse array of convolutional neural network architectures is meticulously customized, trained, and evaluated to facilitate feature extraction for the YOLOv4 detector. Furthermore, novel YOLOX detection models are introduced and extensively compared against YOLOv4-based counterparts. The results reveal outstanding performance across various metrics, with both YOLOX and YOLOv4 demonstrating exceptional average precision (AP) scores ranging between 98% to 100% at a 50% bounding box overlap threshold. Notably, when scrutinized under higher threshold values, YOLOX emerges as the superior model, exhibiting heightened accuracy in bounding box predictions with an 84% AP score at an 80% overlap threshold, compared to 72.48% AP for YOLOv4. This remarkable performance, particularly at the standard 50% overlap threshold, signifies a significant stride towards meeting the stringent clinical requisites for integrating AI-based solutions into clinical EEG analysis workflows.</p>","PeriodicalId":501576,"journal":{"name":"Cluster Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141522059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cluster Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1