首页 > 最新文献

Intelligent Automation and Soft Computing最新文献

英文 中文
Bacterial Foraging Based Algorithm Front-end to Solve Global Optimization Problems 基于细菌觅食的前端算法求解全局优化问题
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.023570
Betania Hern醤dez-Oca馻, Adrian Garc韆-L髉ez, Jos�Hern醤dez-Torruco, Oscar Ch醰ez-Bosquez
{"title":"Bacterial Foraging Based Algorithm Front-end to Solve Global Optimization Problems","authors":"Betania Hern醤dez-Oca馻, Adrian Garc韆-L髉ez, Jos�Hern醤dez-Torruco, Oscar Ch醰ez-Bosquez","doi":"10.32604/iasc.2022.023570","DOIUrl":"https://doi.org/10.32604/iasc.2022.023570","url":null,"abstract":"","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"43 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90747791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Energy Aware Algorithm for Edge Task Offloading 一种边缘任务卸载的能量感知算法
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.018881
Ao Xiong, Meng Chen, Shaoyong Guo, Yongjie Li, Yujing Zhao, Q. Ou, Chuang Liu, Siwen Xu, Xiangang Liu
To solve the problem of energy consumption optimization of edge servers in the process of edge task unloading, we propose a task unloading algorithm based on reinforcement learning in this paper. The algorithm observes and analyzes the current environment state, selects the deployment location of edge tasks according to current states, and realizes the edge task unloading oriented to energy consumption optimization. To achieve the above goals, we first construct a network energy consumption model including servers’ energy consumption and link transmission energy consumption, which improves the accuracy of network energy consumption evaluation. Because of the complexity and variability of the edge environment, this paper designs a task unloading algorithm based on Proximal Policy Optimization (PPO), besides we use Dijkstra to determine the connection path between edge servers where adjacent tasks are deployed. Finally, lots of simulation experiments verify the effectiveness of the proposed method in the process of task unloading. Compared with contrast algorithms, the average energy saving of the proposed algorithm can reach 22.69%.
为了解决边缘任务卸载过程中边缘服务器的能耗优化问题,本文提出了一种基于强化学习的任务卸载算法。该算法对当前环境状态进行观察和分析,根据当前环境状态选择边缘任务的部署位置,实现面向能耗优化的边缘任务卸载。为了实现上述目标,我们首先构建了包含服务器能耗和链路传输能耗的网络能耗模型,提高了网络能耗评估的准确性。针对边缘环境的复杂性和可变性,本文设计了一种基于近端策略优化(PPO)的任务卸载算法,并利用Dijkstra确定部署相邻任务的边缘服务器之间的连接路径。最后,通过大量的仿真实验验证了该方法在任务卸载过程中的有效性。与对比算法相比,该算法的平均节能率可达22.69%。
{"title":"An Energy Aware Algorithm for Edge Task Offloading","authors":"Ao Xiong, Meng Chen, Shaoyong Guo, Yongjie Li, Yujing Zhao, Q. Ou, Chuang Liu, Siwen Xu, Xiangang Liu","doi":"10.32604/iasc.2022.018881","DOIUrl":"https://doi.org/10.32604/iasc.2022.018881","url":null,"abstract":"To solve the problem of energy consumption optimization of edge servers in the process of edge task unloading, we propose a task unloading algorithm based on reinforcement learning in this paper. The algorithm observes and analyzes the current environment state, selects the deployment location of edge tasks according to current states, and realizes the edge task unloading oriented to energy consumption optimization. To achieve the above goals, we first construct a network energy consumption model including servers’ energy consumption and link transmission energy consumption, which improves the accuracy of network energy consumption evaluation. Because of the complexity and variability of the edge environment, this paper designs a task unloading algorithm based on Proximal Policy Optimization (PPO), besides we use Dijkstra to determine the connection path between edge servers where adjacent tasks are deployed. Finally, lots of simulation experiments verify the effectiveness of the proposed method in the process of task unloading. Compared with contrast algorithms, the average energy saving of the proposed algorithm can reach 22.69%.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"30 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86732955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Face Recognition System Using Deep Belief Network and Particle Swarm Optimization 基于深度信念网络和粒子群优化的人脸识别系统
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.023756
K. Babu, C. Kumar, C. Kannaiyaraju
Facial expression for different emotional feelings makes it interesting for researchers to develop recognition techniques. Facial expression is the outcome of emotions they feel, behavioral acts, and the physiological condition of one’s mind. In the world of computer visions and algorithms, precise facial recognition is tough. In predicting the expression of a face, machine learning/artificial intelligence plays a significant role. The deep learning techniques are widely used in more challenging real-world problems which are highly encouraged in facial emotional analysis. In this article, we use three phases for facial expression recognition techniques. The principal component analysis-based dimensionality reduction techniques are used with Eigen face value for edge detection. Then the feature extraction is performed using swarm intelligence-based grey wolf with particle swarm optimization techniques. The neural network is highly used in deep learning techniques for classification. Here we use a deep belief network (DBN) for classifying the recognized image. The proposed method’s results are assessed using the most comprehensive facial expression datasets, including RAF-DB, AffecteNet, and Cohn-Kanade (CK+). This developed approach improves existing methods with the maximum accuracy of 94.82%, 95.34%, 98.82%, and 97.82% on the test RAF-DB, AFfectNet, CK+, and FED-RO datasets respectively.
不同情绪的面部表情使得识别技术的开发成为研究人员关注的焦点。面部表情是他们所感受到的情绪、行为和心理状态的结果。在计算机视觉和算法的世界里,精确的面部识别是困难的。在预测面部表情方面,机器学习/人工智能扮演着重要的角色。深度学习技术被广泛应用于更具挑战性的现实问题,在面部情绪分析中受到高度鼓励。在这篇文章中,我们使用三个阶段的面部表情识别技术。采用基于主成分分析的降维技术,结合特征面值进行边缘检测。然后利用基于群体智能的灰狼粒子群优化技术进行特征提取。神经网络在分类的深度学习技术中被广泛使用。在这里,我们使用深度信念网络(DBN)对识别图像进行分类。使用最全面的面部表情数据集(包括RAF-DB、AffecteNet和Cohn-Kanade (CK+))对所提出方法的结果进行了评估。该方法改进了现有方法,在RAF-DB、AFfectNet、CK+和FED-RO测试数据集上的最高准确率分别为94.82%、95.34%、98.82%和97.82%。
{"title":"Face Recognition System Using Deep Belief Network and Particle Swarm Optimization","authors":"K. Babu, C. Kumar, C. Kannaiyaraju","doi":"10.32604/iasc.2022.023756","DOIUrl":"https://doi.org/10.32604/iasc.2022.023756","url":null,"abstract":"Facial expression for different emotional feelings makes it interesting for researchers to develop recognition techniques. Facial expression is the outcome of emotions they feel, behavioral acts, and the physiological condition of one’s mind. In the world of computer visions and algorithms, precise facial recognition is tough. In predicting the expression of a face, machine learning/artificial intelligence plays a significant role. The deep learning techniques are widely used in more challenging real-world problems which are highly encouraged in facial emotional analysis. In this article, we use three phases for facial expression recognition techniques. The principal component analysis-based dimensionality reduction techniques are used with Eigen face value for edge detection. Then the feature extraction is performed using swarm intelligence-based grey wolf with particle swarm optimization techniques. The neural network is highly used in deep learning techniques for classification. Here we use a deep belief network (DBN) for classifying the recognized image. The proposed method’s results are assessed using the most comprehensive facial expression datasets, including RAF-DB, AffecteNet, and Cohn-Kanade (CK+). This developed approach improves existing methods with the maximum accuracy of 94.82%, 95.34%, 98.82%, and 97.82% on the test RAF-DB, AFfectNet, CK+, and FED-RO datasets respectively.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"14 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86771215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dynamic Feature Subset Selection for Occluded Face Recognition 遮挡人脸识别的动态特征子集选择
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.019538
Najlaa Alsaedi, E. S. Jaha
Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded faces. The proposed DFSS methods are based on resilient algorithms attempting to minimize the negative influence of confusing and low-quality features extracted from occluded areas by either exclusion or weight reduction. Principal Component Analysis and Gabor filtering based approaches are initially used for face feature extraction, then the proposed DFSS methods are dynamically enforced. This is leading to more effective feature representation and an improved recognition performance. To validate their effectiveness, multiple experiments are conducted and the performance of different methods is compared. The experimental work is carried out using AR database and Extended Yale Face Database B. The obtained results of face identification and verification show that both proposed DFSS methods outperform the standard (static) use of the whole number of features and the equal feature weights.
准确识别人的身份是公民社会中各种应用和不同需求的关键任务。有不同的公认的生物识别模式,可用于识别目的,如面部,声音,指纹,虹膜等。近年来,人脸图像被广泛应用于人物识别,因为人脸是最自然、最友好的识别方法。然而,在现实应用中,一些因素可能会降低识别性能,如部分面部遮挡、姿势、照明条件、面部表情等。为了更好地识别被遮挡的人脸,本文提出了两种动态特征子集选择(DFSS)方法。所提出的DFSS方法基于弹性算法,试图通过排除或减重来最小化从遮挡区域提取的混淆和低质量特征的负面影响。首先采用基于主成分分析和Gabor滤波的方法进行人脸特征提取,然后动态执行DFSS方法。这将导致更有效的特征表示和改进的识别性能。为了验证其有效性,进行了多次实验,并比较了不同方法的性能。利用AR数据库和Extended Yale Face database b进行了实验,得到的人脸识别和验证结果表明,所提出的两种DFSS方法都优于使用整数特征和等特征权重的标准(静态)方法。
{"title":"Dynamic Feature Subset Selection for Occluded Face Recognition","authors":"Najlaa Alsaedi, E. S. Jaha","doi":"10.32604/iasc.2022.019538","DOIUrl":"https://doi.org/10.32604/iasc.2022.019538","url":null,"abstract":"Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded faces. The proposed DFSS methods are based on resilient algorithms attempting to minimize the negative influence of confusing and low-quality features extracted from occluded areas by either exclusion or weight reduction. Principal Component Analysis and Gabor filtering based approaches are initially used for face feature extraction, then the proposed DFSS methods are dynamically enforced. This is leading to more effective feature representation and an improved recognition performance. To validate their effectiveness, multiple experiments are conducted and the performance of different methods is compared. The experimental work is carried out using AR database and Extended Yale Face Database B. The obtained results of face identification and verification show that both proposed DFSS methods outperform the standard (static) use of the whole number of features and the equal feature weights.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dynamic Adaptive Firefly Algorithm for Flexible Job Shop Scheduling 柔性作业车间调度的动态自适应萤火虫算法
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/IASC.2022.019330
K. Devi, R. Mishra, A. Madan
An NP-hard problem like Flexible Job Shop Scheduling (FJSP) tends to be more complex and requires more computational effort to optimize the objectives with contradictory measures. This paper aims to address the FJSP problem with combined and contradictory objectives, like minimization of make-span, maximum workload, and total workload. This paper proposes ‘Hybrid Adaptive Firefly Algorithm’ (HAdFA), a new enhanced version of the classic Firefly Algorithm (FA) embedded with adaptive parameters to optimize the multi objectives concurrently. The proposed algorithm has adopted two adaptive strategies, i.e., an adaptive randomization parameter (α) and an effective heterogeneous update rule for fireflies. The adaptations proposed by this paper can help the optimization process to strike a balance between diversification and intensification. Further, an enhanced local search algorithm, Simulated Annealing (SA), is hybridized with Adaptive FA to explore the local solution space more efficiently. This paper has also attempted to solve FJSP by a rarely used integrated approach where assignment and sequencing are done simultaneously. Empirical simulations on benchmark instances demonstrate the efficacy of our proposed algorithms, thus providing a competitive edge over other nature-inspired algorithms to solve FJSP.
像柔性作业车间调度(FJSP)这样的np困难问题往往更复杂,并且需要更多的计算量来优化具有矛盾度量的目标。本文旨在解决具有组合和矛盾目标的FJSP问题,如最小化制作时间、最大工作量和总工作量。本文提出了“混合自适应萤火虫算法”(Hybrid Adaptive Firefly Algorithm, HAdFA),这是经典萤火虫算法(FA)的一种新增强版本,嵌入了自适应参数,可以同时优化多目标。该算法采用了两种自适应策略,即自适应随机化参数α和有效的萤火虫异构更新规则。本文提出的适应性可以帮助优化过程在多样化和集约化之间取得平衡。在此基础上,提出了一种改进的局部搜索算法——模拟退火算法(SA),并将其与自适应遗传算法相结合,以更有效地探索局部解空间。本文还尝试通过一种很少使用的集成方法来解决FJSP,其中分配和排序同时完成。在基准实例上的经验模拟证明了我们提出的算法的有效性,从而提供了比其他自然启发的算法解决FJSP的竞争优势。
{"title":"A Dynamic Adaptive Firefly Algorithm for Flexible Job Shop Scheduling","authors":"K. Devi, R. Mishra, A. Madan","doi":"10.32604/IASC.2022.019330","DOIUrl":"https://doi.org/10.32604/IASC.2022.019330","url":null,"abstract":"An NP-hard problem like Flexible Job Shop Scheduling (FJSP) tends to be more complex and requires more computational effort to optimize the objectives with contradictory measures. This paper aims to address the FJSP problem with combined and contradictory objectives, like minimization of make-span, maximum workload, and total workload. This paper proposes ‘Hybrid Adaptive Firefly Algorithm’ (HAdFA), a new enhanced version of the classic Firefly Algorithm (FA) embedded with adaptive parameters to optimize the multi objectives concurrently. The proposed algorithm has adopted two adaptive strategies, i.e., an adaptive randomization parameter (α) and an effective heterogeneous update rule for fireflies. The adaptations proposed by this paper can help the optimization process to strike a balance between diversification and intensification. Further, an enhanced local search algorithm, Simulated Annealing (SA), is hybridized with Adaptive FA to explore the local solution space more efficiently. This paper has also attempted to solve FJSP by a rarely used integrated approach where assignment and sequencing are done simultaneously. Empirical simulations on benchmark instances demonstrate the efficacy of our proposed algorithms, thus providing a competitive edge over other nature-inspired algorithms to solve FJSP.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"429-448"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans 基于阿拉伯语文本的人类CAPTCHA难度参数化研究
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/IASC.2022.019913
Suliman A. Alsuhibany, Hessah Abdulaziz Alhodathi
The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed scheme, we ran four filter attacks, which led to a success rate of less than 5%. Thus, we developed a defensive method against adaptive attacks which is a standard for evaluating defenses to adversarial examples. This method is ensemble adversarial training, and it gave an accuracy result of 41.51%. For the usability aspect, we conducted an experimental study, and the results showed that it can be solved by humans in a few seconds with a success rate of 93.10%.
完全自动化公共图灵测试来区分计算机和人类(CAPTCHA)技术已经成为一个有趣的话题好几年了。阿拉伯语验证码最近被提议为阿拉伯用户提供服务。由于很少有科学研究支持对用户进行系统设计或调优,因此本文旨在通过实验研究,在参数层面对基于阿拉伯语文本的CAPTCHA进行分析。基于本研究的结果,我们提出了一种基于阿拉伯语文本的快速梯度签名方法(FGSM)对抗图像的验证码方案。为了评估所提出方案的安全性,我们运行了四次过滤器攻击,成功率小于5%。因此,我们开发了一种针对自适应攻击的防御方法,这是评估对抗性示例防御的标准。该方法为集合对抗训练,准确率达到41.51%。在可用性方面,我们进行了实验研究,结果表明,人类可以在几秒钟内解决,成功率为93.10%。
{"title":"A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans","authors":"Suliman A. Alsuhibany, Hessah Abdulaziz Alhodathi","doi":"10.32604/IASC.2022.019913","DOIUrl":"https://doi.org/10.32604/IASC.2022.019913","url":null,"abstract":"The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed scheme, we ran four filter attacks, which led to a success rate of less than 5%. Thus, we developed a defensive method against adaptive attacks which is a standard for evaluating defenses to adversarial examples. This method is ensemble adversarial training, and it gave an accuracy result of 41.51%. For the usability aspect, we conducted an experimental study, and the results showed that it can be solved by humans in a few seconds with a success rate of 93.10%.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"523-537"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69779067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Medical Image Transmission Using Novel Crypto-Compression Scheme 基于新型加密压缩方案的医学图像传输
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.021636
Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali
The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.
医疗记录在不连贯和开放的网络上传输,由于这些链接缺乏安全性,导致涉及窃取患者信息的欺诈行为增加。个人的医疗文件是机密信息,需要严格的协议和安全,主要是为了保护个人的身份。医学图像保护是一种旨在通过公共网络安全地传输数字数据和医学图像的技术。本文介绍了医疗信息安全中用于提供身份验证和保护的不同方法的背景。本工作开发了一种安全的基于密码学的医学图像复原算法,该算法基于多种技术:离散余弦变换、隐写和水印。该算法以图像的形式获取患者信息,利用人工智能和水印相结合的离散余弦变换方法计算图像的峰值信噪比值。该框架使用底层算法对图像进行加密和解密,同时保持峰值信噪比值。该值使用置乱算法隐藏;因此,访问真实图像需要一个唯一的患者密码。所提出的技术被证明是鲁棒的,因此能够防止数据被窃取。给出了仿真实验的结果,并与各种已验证的算法进行了比较,证明了新方法的准确性。
{"title":"Medical Image Transmission Using Novel Crypto-Compression Scheme","authors":"Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali","doi":"10.32604/iasc.2022.021636","DOIUrl":"https://doi.org/10.32604/iasc.2022.021636","url":null,"abstract":"The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"17 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74772887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Authentication Services Scheme for NFC Mobile Payment Systems NFC移动支付系统的完全认证服务方案
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.022065
Munefah Alshammari, S. Nashwan
One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent various types of attacks. However, the proposed schemes remain inadequate to secure payment transactions in such systems. In this paper, we propose a fully authentication services scheme for NFC mobile payment systems in order to support a high security level. The proposed scheme has security services, such as a full authentication process, perfect forward secrecy, and simultaneous anonymity of the smartphone and POS. These security services have been validated using the BAN logic model and an automatic cryptographic protocol verifier (ProVerif) tool. A security analysis has clarified that the proposed scheme can prevent various types attacks. A comparison with recent authentication schemes demonstrates that the proposed scheme has an appropriate cost in different sides such as computation, communication and storage space. Therefore, the proposed scheme not only has appealing security features, but can also clearly be utilized in mobile payment systems.
一种常用的无线通信技术是近场通信(NFC)。支持这种技术的智能手机被用于非接触式支付系统,作为模仿信用卡的识别设备。这种技术基本上集中在通信服务的质量上,而在某种程度上忽略了安全服务。由于现有的弱点,智能手机、销售点(POS)和服务提供商之间的通信消息容易受到攻击,包括攻击者可以访问、阻止和修改传输的消息以达到非法目的。因此,为了防止各种类型的攻击,关于NFC通信的认证方案已经有了很多研究建议。然而,拟议的计划仍然不足以确保这些系统中的支付交易。在本文中,我们提出了一个完整的NFC移动支付系统认证服务方案,以支持高安全级别。该方案具有完整的身份验证过程、完美的前向保密以及智能手机和POS机的同时匿名等安全服务,这些安全服务已使用BAN逻辑模型和自动加密协议验证器(ProVerif)工具进行了验证。安全分析表明,该方案能够有效防止各种类型的攻击。与现有认证方案的比较表明,该方案在计算、通信和存储空间等方面都具有合理的成本。因此,所提出的方案不仅具有吸引人的安全特性,而且可以明显地用于移动支付系统。
{"title":"Fully Authentication Services Scheme for NFC Mobile Payment Systems","authors":"Munefah Alshammari, S. Nashwan","doi":"10.32604/iasc.2022.022065","DOIUrl":"https://doi.org/10.32604/iasc.2022.022065","url":null,"abstract":"One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent various types of attacks. However, the proposed schemes remain inadequate to secure payment transactions in such systems. In this paper, we propose a fully authentication services scheme for NFC mobile payment systems in order to support a high security level. The proposed scheme has security services, such as a full authentication process, perfect forward secrecy, and simultaneous anonymity of the smartphone and POS. These security services have been validated using the BAN logic model and an automatic cryptographic protocol verifier (ProVerif) tool. A security analysis has clarified that the proposed scheme can prevent various types attacks. A comparison with recent authentication schemes demonstrates that the proposed scheme has an appropriate cost in different sides such as computation, communication and storage space. Therefore, the proposed scheme not only has appealing security features, but can also clearly be utilized in mobile payment systems.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"69 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76130647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sine Power Lindley Distribution with Applications 正弦功率林德利分布与应用
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.018043
Abdullah M. Almarashi
Sine power Lindley distribution (SPLi), a new distribution with two parameters that extends the Lindley model, is introduced and studied in this paper. The SPLi distribution is more flexible than the power Lindley distribution, and we show that in the application part. The statistical properties of the proposed distribution are calculated, including the quantile function, moments, moment generating function, upper incomplete moment, and lower incomplete moment. Meanwhile, some numerical values of the mean, variance, skewness, and kurtosis of the SPLi distribution are obtained. Besides, the SPLi distribution is evaluated by different measures of entropy such as Rényi entropy, Havrda and Charvat entropy, Arimoto entropy, Arimoto entropy, and Tsallis entropy. Moreover, the maximum likelihood method is exploited to estimate the parameters of the SPLi distribution. The applications of the SPLi distribution to two real data sets illustrate the flexibility of the SPLi distribution, and the superiority of the SPLi distribution over some well-known distributions, including the alpha power transformed Lindley, power Lindley, extended Lindley, Lindley, and inverse Lindley distributions.
本文介绍并研究了正弦功率林德利分布(SPLi),它是对林德利模型进行扩展的一种新的双参数分布。SPLi分布比功率林德利分布更灵活,我们在应用部分展示了这一点。计算了该分布的统计性质,包括分位数函数、矩、矩生成函数、上不完全矩和下不完全矩。同时,得到了SPLi分布的均值、方差、偏度和峰度的一些数值。此外,还采用r尼伊熵、Havrda和Charvat熵、Arimoto熵、Arimoto熵和Tsallis熵等熵测度评价了SPLi的分布。此外,利用极大似然法估计SPLi分布的参数。SPLi分布在两个真实数据集上的应用说明了SPLi分布的灵活性,以及SPLi分布比一些已知分布(包括alpha幂变换Lindley、幂林德利、扩展林德利、林德利和逆林德利分布)的优越性。
{"title":"Sine Power Lindley Distribution with Applications","authors":"Abdullah M. Almarashi","doi":"10.32604/iasc.2022.018043","DOIUrl":"https://doi.org/10.32604/iasc.2022.018043","url":null,"abstract":"Sine power Lindley distribution (SPLi), a new distribution with two parameters that extends the Lindley model, is introduced and studied in this paper. The SPLi distribution is more flexible than the power Lindley distribution, and we show that in the application part. The statistical properties of the proposed distribution are calculated, including the quantile function, moments, moment generating function, upper incomplete moment, and lower incomplete moment. Meanwhile, some numerical values of the mean, variance, skewness, and kurtosis of the SPLi distribution are obtained. Besides, the SPLi distribution is evaluated by different measures of entropy such as Rényi entropy, Havrda and Charvat entropy, Arimoto entropy, Arimoto entropy, and Tsallis entropy. Moreover, the maximum likelihood method is exploited to estimate the parameters of the SPLi distribution. The applications of the SPLi distribution to two real data sets illustrate the flexibility of the SPLi distribution, and the superiority of the SPLi distribution over some well-known distributions, including the alpha power transformed Lindley, power Lindley, extended Lindley, Lindley, and inverse Lindley distributions.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"11 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78409573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network 基于非合作学习的6G-IoT认知无线网络路由
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.021128
Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz
{"title":"Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network","authors":"Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz","doi":"10.32604/iasc.2022.021128","DOIUrl":"https://doi.org/10.32604/iasc.2022.021128","url":null,"abstract":"","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"6 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74296138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Intelligent Automation and Soft Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1