首页 > 最新文献

Intelligent Automation and Soft Computing最新文献

英文 中文
ISmart: Protecting Smart Contract Against Integer Bugs ISmart:保护智能合约免受整数错误的侵害
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.022801
Xingyu Zeng, Hua Zhang, Chaosong Yan, Liu Zhao, Q. Wen
{"title":"ISmart: Protecting Smart Contract Against Integer Bugs","authors":"Xingyu Zeng, Hua Zhang, Chaosong Yan, Liu Zhao, Q. Wen","doi":"10.32604/iasc.2022.022801","DOIUrl":"https://doi.org/10.32604/iasc.2022.022801","url":null,"abstract":"","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82973333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System 古乌尔都语文本识别系统的多域深度卷积神经网络
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.022805
K. O. Mohammed Aarif, P. Sivakumar
Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In this work, first, we generated a dataset by extracting the recurrent ligatures from an ancient Urdu fatawa book. Secondly, we categorized and augment the ligatures to generate batches of augmented images that improvise the training efficiency and classification accuracy. Finally, we proposed a multi-domain deep Convolutional Neural Network which integrates a spatial domain and a frequency domain CNN to learn the modular relations between features originating from the two different domain networks to train and improvise the classification accuracy. The experimental results show that the proposed network with the augmented dataset achieves an averaged accuracy of 97.8% which outperforms the other CNN models in this class. The experimental results also show that for the recognition of ancient Urdu literature, well-known benchmark datasets are not appropriate which is also verified with our prepared dataset.
深度学习在模式识别领域取得了巨大的成功。近年来,乌尔都语字符识别系统显著受益于深度卷积神经网络的有效性。乌尔都语文本识别的研究大多集中在正式的手写和印刷乌尔都语文本文档上。本文对乌尔都语古代文献文本识别的挑战性问题进行了实验。与正式的乌尔都语文本文档相比,从文献文档中识别乌尔都语文本非常困难,因为它的广度、复杂的构词法(连词)和上下文敏感性以及不充分的基准数据集。在这项工作中,首先,我们通过从一本古老的乌尔都语法塔瓦书中提取循环结扎来生成一个数据集。其次,对图像进行分类和增强,生成增强图像,提高训练效率和分类精度。最后,我们提出了一种融合了空间域和频率域CNN的多域深度卷积神经网络,通过学习来自两个不同域网络的特征之间的模关系来训练和提高分类精度。实验结果表明,基于增强数据集的网络平均准确率达到97.8%,优于同类其他CNN模型。实验结果还表明,对于乌尔都语古代文献的识别,已知的基准数据集是不合适的,用我们准备的数据集也验证了这一点。
{"title":"Multi-Domain Deep Convolutional Neural Network for Ancient Urdu Text Recognition System","authors":"K. O. Mohammed Aarif, P. Sivakumar","doi":"10.32604/iasc.2022.022805","DOIUrl":"https://doi.org/10.32604/iasc.2022.022805","url":null,"abstract":"Deep learning has achieved magnificent success in the field of pattern recognition. In recent years Urdu character recognition system has significantly benefited from the effectiveness of the deep convolutional neural network. Majority of the research on Urdu text recognition are concentrated on formal handwritten and printed Urdu text document. In this paper, we experimented the Challenging issue of text recognition in Urdu ancient literature documents. Due to its cursiveness, complex word formation (ligatures), and context-sensitivity, and inadequate benchmark dataset, recognition of Urdu text from the literature document is very difficult to process compared to the formal Urdu text document. In this work, first, we generated a dataset by extracting the recurrent ligatures from an ancient Urdu fatawa book. Secondly, we categorized and augment the ligatures to generate batches of augmented images that improvise the training efficiency and classification accuracy. Finally, we proposed a multi-domain deep Convolutional Neural Network which integrates a spatial domain and a frequency domain CNN to learn the modular relations between features originating from the two different domain networks to train and improvise the classification accuracy. The experimental results show that the proposed network with the augmented dataset achieves an averaged accuracy of 97.8% which outperforms the other CNN models in this class. The experimental results also show that for the recognition of ancient Urdu literature, well-known benchmark datasets are not appropriate which is also verified with our prepared dataset.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"16 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87874911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Adaptive Quality-of-Service Allocation Scheme for Improving Video Quality over a Wireless Network 提高无线网络视频质量的自适应业务质量分配方案
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.020482
R. Alsaqour, Ammar Hadi, Maha S. Abdelhaq
The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet delivery of the transmitted video. To achieve better video streaming quality, throughput must be high, with minimal packet delay and loss ratios. A current study, however, found that the adoption of the adaptive multiple TCP connections (AM-TCP), as a transport layer protocol, improves the quality of video streaming by increasing throughput and lowering packet delay and loss on high QoS wireless networks. The main objective of this study is to develop a Quality of Service (QoS) method for enhancing video streaming quality over wireless networks. For that, this paper proposes a bandwidth aggregation adaptive multiple TCP-connection (BAM-TCP) scheme to enhance the video streaming quality. BAM-TCP combines AM-TCP with a bandwidth aggregation (BAG) method to aggregate bandwidth from numerous connections. Simulation experiments demonstrate that the BAM-TCP method enhances throughput while minimizing packet loss ratio and end-to-end delay.
确保通过无线网络传输的视频流质量的需求日益增长。视频流通常用于带宽不足、丢包或延迟等对服务质量(QoS)较差敏感的应用。这些挑战会影响视频流的质量,因为它们会影响传输视频的吞吐量和分组传输。为了获得更好的视频流质量,吞吐量必须高,数据包延迟和丢包率必须最小。然而,目前的一项研究发现,采用自适应多TCP连接(AM-TCP)作为传输层协议,在高QoS无线网络上通过增加吞吐量和降低数据包延迟和丢失来提高视频流的质量。本研究的主要目标是开发一种服务质量(QoS)方法,以提高无线网络上视频流的质量。为此,本文提出了一种带宽聚合自适应多tcp连接(BAM-TCP)方案来提高视频流的质量。BAM-TCP将AM-TCP与带宽聚合(BAG)方法结合起来,从多个连接中聚合带宽。仿真实验表明,该方法在最大限度地降低丢包率和端到端延迟的同时提高了吞吐量。
{"title":"Adaptive Quality-of-Service Allocation Scheme for Improving Video Quality over a Wireless Network","authors":"R. Alsaqour, Ammar Hadi, Maha S. Abdelhaq","doi":"10.32604/iasc.2022.020482","DOIUrl":"https://doi.org/10.32604/iasc.2022.020482","url":null,"abstract":"The need to ensure the quality of video streaming transmitted over wireless networks is growing every day. Video streaming is typically used for applications that are sensitive to poor quality of service (QoS) due to insufficient bandwidth, packet loss, or delay. These challenges hurt video streaming quality since they affect throughput and packet delivery of the transmitted video. To achieve better video streaming quality, throughput must be high, with minimal packet delay and loss ratios. A current study, however, found that the adoption of the adaptive multiple TCP connections (AM-TCP), as a transport layer protocol, improves the quality of video streaming by increasing throughput and lowering packet delay and loss on high QoS wireless networks. The main objective of this study is to develop a Quality of Service (QoS) method for enhancing video streaming quality over wireless networks. For that, this paper proposes a bandwidth aggregation adaptive multiple TCP-connection (BAM-TCP) scheme to enhance the video streaming quality. BAM-TCP combines AM-TCP with a bandwidth aggregation (BAG) method to aggregate bandwidth from numerous connections. Simulation experiments demonstrate that the BAM-TCP method enhances throughput while minimizing packet loss ratio and end-to-end delay.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"8 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89499045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dynamic Feature Subset Selection for Occluded Face Recognition 遮挡人脸识别的动态特征子集选择
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.019538
Najlaa Alsaedi, E. S. Jaha
Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded faces. The proposed DFSS methods are based on resilient algorithms attempting to minimize the negative influence of confusing and low-quality features extracted from occluded areas by either exclusion or weight reduction. Principal Component Analysis and Gabor filtering based approaches are initially used for face feature extraction, then the proposed DFSS methods are dynamically enforced. This is leading to more effective feature representation and an improved recognition performance. To validate their effectiveness, multiple experiments are conducted and the performance of different methods is compared. The experimental work is carried out using AR database and Extended Yale Face Database B. The obtained results of face identification and verification show that both proposed DFSS methods outperform the standard (static) use of the whole number of features and the equal feature weights.
准确识别人的身份是公民社会中各种应用和不同需求的关键任务。有不同的公认的生物识别模式,可用于识别目的,如面部,声音,指纹,虹膜等。近年来,人脸图像被广泛应用于人物识别,因为人脸是最自然、最友好的识别方法。然而,在现实应用中,一些因素可能会降低识别性能,如部分面部遮挡、姿势、照明条件、面部表情等。为了更好地识别被遮挡的人脸,本文提出了两种动态特征子集选择(DFSS)方法。所提出的DFSS方法基于弹性算法,试图通过排除或减重来最小化从遮挡区域提取的混淆和低质量特征的负面影响。首先采用基于主成分分析和Gabor滤波的方法进行人脸特征提取,然后动态执行DFSS方法。这将导致更有效的特征表示和改进的识别性能。为了验证其有效性,进行了多次实验,并比较了不同方法的性能。利用AR数据库和Extended Yale Face database b进行了实验,得到的人脸识别和验证结果表明,所提出的两种DFSS方法都优于使用整数特征和等特征权重的标准(静态)方法。
{"title":"Dynamic Feature Subset Selection for Occluded Face Recognition","authors":"Najlaa Alsaedi, E. S. Jaha","doi":"10.32604/iasc.2022.019538","DOIUrl":"https://doi.org/10.32604/iasc.2022.019538","url":null,"abstract":"Accurate recognition of person identity is a critical task in civil society for various application and different needs. There are different well-established biometric modalities that can be used for recognition purposes such as face, voice, fingerprint, iris, etc. Recently, face images have been widely used for person recognition, since the human face is the most natural and user-friendly recognition method. However, in real-life applications, some factors may degrade the recognition performance, such as partial face occlusion, poses, illumination conditions, facial expressions, etc. In this paper, we propose two dynamic feature subset selection (DFSS) methods to achieve better recognition for occluded faces. The proposed DFSS methods are based on resilient algorithms attempting to minimize the negative influence of confusing and low-quality features extracted from occluded areas by either exclusion or weight reduction. Principal Component Analysis and Gabor filtering based approaches are initially used for face feature extraction, then the proposed DFSS methods are dynamically enforced. This is leading to more effective feature representation and an improved recognition performance. To validate their effectiveness, multiple experiments are conducted and the performance of different methods is compared. The experimental work is carried out using AR database and Extended Yale Face Database B. The obtained results of face identification and verification show that both proposed DFSS methods outperform the standard (static) use of the whole number of features and the equal feature weights.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Dynamic Adaptive Firefly Algorithm for Flexible Job Shop Scheduling 柔性作业车间调度的动态自适应萤火虫算法
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/IASC.2022.019330
K. Devi, R. Mishra, A. Madan
An NP-hard problem like Flexible Job Shop Scheduling (FJSP) tends to be more complex and requires more computational effort to optimize the objectives with contradictory measures. This paper aims to address the FJSP problem with combined and contradictory objectives, like minimization of make-span, maximum workload, and total workload. This paper proposes ‘Hybrid Adaptive Firefly Algorithm’ (HAdFA), a new enhanced version of the classic Firefly Algorithm (FA) embedded with adaptive parameters to optimize the multi objectives concurrently. The proposed algorithm has adopted two adaptive strategies, i.e., an adaptive randomization parameter (α) and an effective heterogeneous update rule for fireflies. The adaptations proposed by this paper can help the optimization process to strike a balance between diversification and intensification. Further, an enhanced local search algorithm, Simulated Annealing (SA), is hybridized with Adaptive FA to explore the local solution space more efficiently. This paper has also attempted to solve FJSP by a rarely used integrated approach where assignment and sequencing are done simultaneously. Empirical simulations on benchmark instances demonstrate the efficacy of our proposed algorithms, thus providing a competitive edge over other nature-inspired algorithms to solve FJSP.
像柔性作业车间调度(FJSP)这样的np困难问题往往更复杂,并且需要更多的计算量来优化具有矛盾度量的目标。本文旨在解决具有组合和矛盾目标的FJSP问题,如最小化制作时间、最大工作量和总工作量。本文提出了“混合自适应萤火虫算法”(Hybrid Adaptive Firefly Algorithm, HAdFA),这是经典萤火虫算法(FA)的一种新增强版本,嵌入了自适应参数,可以同时优化多目标。该算法采用了两种自适应策略,即自适应随机化参数α和有效的萤火虫异构更新规则。本文提出的适应性可以帮助优化过程在多样化和集约化之间取得平衡。在此基础上,提出了一种改进的局部搜索算法——模拟退火算法(SA),并将其与自适应遗传算法相结合,以更有效地探索局部解空间。本文还尝试通过一种很少使用的集成方法来解决FJSP,其中分配和排序同时完成。在基准实例上的经验模拟证明了我们提出的算法的有效性,从而提供了比其他自然启发的算法解决FJSP的竞争优势。
{"title":"A Dynamic Adaptive Firefly Algorithm for Flexible Job Shop Scheduling","authors":"K. Devi, R. Mishra, A. Madan","doi":"10.32604/IASC.2022.019330","DOIUrl":"https://doi.org/10.32604/IASC.2022.019330","url":null,"abstract":"An NP-hard problem like Flexible Job Shop Scheduling (FJSP) tends to be more complex and requires more computational effort to optimize the objectives with contradictory measures. This paper aims to address the FJSP problem with combined and contradictory objectives, like minimization of make-span, maximum workload, and total workload. This paper proposes ‘Hybrid Adaptive Firefly Algorithm’ (HAdFA), a new enhanced version of the classic Firefly Algorithm (FA) embedded with adaptive parameters to optimize the multi objectives concurrently. The proposed algorithm has adopted two adaptive strategies, i.e., an adaptive randomization parameter (α) and an effective heterogeneous update rule for fireflies. The adaptations proposed by this paper can help the optimization process to strike a balance between diversification and intensification. Further, an enhanced local search algorithm, Simulated Annealing (SA), is hybridized with Adaptive FA to explore the local solution space more efficiently. This paper has also attempted to solve FJSP by a rarely used integrated approach where assignment and sequencing are done simultaneously. Empirical simulations on benchmark instances demonstrate the efficacy of our proposed algorithms, thus providing a competitive edge over other nature-inspired algorithms to solve FJSP.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"429-448"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69778513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans 基于阿拉伯语文本的人类CAPTCHA难度参数化研究
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/IASC.2022.019913
Suliman A. Alsuhibany, Hessah Abdulaziz Alhodathi
The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed scheme, we ran four filter attacks, which led to a success rate of less than 5%. Thus, we developed a defensive method against adaptive attacks which is a standard for evaluating defenses to adversarial examples. This method is ensemble adversarial training, and it gave an accuracy result of 41.51%. For the usability aspect, we conducted an experimental study, and the results showed that it can be solved by humans in a few seconds with a success rate of 93.10%.
完全自动化公共图灵测试来区分计算机和人类(CAPTCHA)技术已经成为一个有趣的话题好几年了。阿拉伯语验证码最近被提议为阿拉伯用户提供服务。由于很少有科学研究支持对用户进行系统设计或调优,因此本文旨在通过实验研究,在参数层面对基于阿拉伯语文本的CAPTCHA进行分析。基于本研究的结果,我们提出了一种基于阿拉伯语文本的快速梯度签名方法(FGSM)对抗图像的验证码方案。为了评估所提出方案的安全性,我们运行了四次过滤器攻击,成功率小于5%。因此,我们开发了一种针对自适应攻击的防御方法,这是评估对抗性示例防御的标准。该方法为集合对抗训练,准确率达到41.51%。在可用性方面,我们进行了实验研究,结果表明,人类可以在几秒钟内解决,成功率为93.10%。
{"title":"A Parametric Study of Arabic Text-Based CAPTCHA Difficulty for Humans","authors":"Suliman A. Alsuhibany, Hessah Abdulaziz Alhodathi","doi":"10.32604/IASC.2022.019913","DOIUrl":"https://doi.org/10.32604/IASC.2022.019913","url":null,"abstract":"The Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) technique has been an interesting topic for several years. An Arabic CAPTCHA has recently been proposed to serve Arab users. Since there have been few scientific studies supporting a systematic design or tuning for users, this paper aims to analyze the Arabic text-based CAPTCHA at the parameter level by conducting an experimental study. Based on the results of this study, we propose an Arabic text-based CAPTCHA scheme with Fast Gradient Sign Method (FGSM) adversarial images. To evaluate the security of the proposed scheme, we ran four filter attacks, which led to a success rate of less than 5%. Thus, we developed a defensive method against adaptive attacks which is a standard for evaluating defenses to adversarial examples. This method is ensemble adversarial training, and it gave an accuracy result of 41.51%. For the usability aspect, we conducted an experimental study, and the results showed that it can be solved by humans in a few seconds with a success rate of 93.10%.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"31 1","pages":"523-537"},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69779067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Medical Image Transmission Using Novel Crypto-Compression Scheme 基于新型加密压缩方案的医学图像传输
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.021636
Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali
The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.
医疗记录在不连贯和开放的网络上传输,由于这些链接缺乏安全性,导致涉及窃取患者信息的欺诈行为增加。个人的医疗文件是机密信息,需要严格的协议和安全,主要是为了保护个人的身份。医学图像保护是一种旨在通过公共网络安全地传输数字数据和医学图像的技术。本文介绍了医疗信息安全中用于提供身份验证和保护的不同方法的背景。本工作开发了一种安全的基于密码学的医学图像复原算法,该算法基于多种技术:离散余弦变换、隐写和水印。该算法以图像的形式获取患者信息,利用人工智能和水印相结合的离散余弦变换方法计算图像的峰值信噪比值。该框架使用底层算法对图像进行加密和解密,同时保持峰值信噪比值。该值使用置乱算法隐藏;因此,访问真实图像需要一个唯一的患者密码。所提出的技术被证明是鲁棒的,因此能够防止数据被窃取。给出了仿真实验的结果,并与各种已验证的算法进行了比较,证明了新方法的准确性。
{"title":"Medical Image Transmission Using Novel Crypto-Compression Scheme","authors":"Arwa A. Mashat, Surbhi Bhatia, Ankit Kumar, P. Dadheech, A. Alabdali","doi":"10.32604/iasc.2022.021636","DOIUrl":"https://doi.org/10.32604/iasc.2022.021636","url":null,"abstract":"The transmission of medical records over indiscrete and open networks has caused an increase in fraud involving stealing patients’ information, owing to a lack of security over these links. An individual’s medical documents represent confidential information that demands strict protocols and security, chiefly to protect the individual’s identity. Medical image protection is a technology intended to transmit digital data and medical images securely over public networks. This paper presents some background on the different methods used to provide authentication and protection in medical information security. This work develops a secure cryptography-based medical image reclamation algorithm based on a combination of techniques: discrete cosine transform, steganography, and watermarking. The novel algorithm takes patients’ information in the form of images and uses a discrete cosine transform method with artificial intelligence and watermarking to calculate peak signal-to-noise ratio values for the images. The proposed framework uses the underlying algorithms to perform encryption and decryption of images while retaining a high peak signal-to-noise ratio value. This value is hidden using a scrambling algorithm; therefore, a unique patient password is required to access the real image. The proposed technique is demonstrated to be robust and thus able to prevent stealing of data. The results of simulation experiments are presented, and the accuracy of the new method is demonstrated by comparisons with various previously validated algorithms.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"17 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74772887","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Fully Authentication Services Scheme for NFC Mobile Payment Systems NFC移动支付系统的完全认证服务方案
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.022065
Munefah Alshammari, S. Nashwan
One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent various types of attacks. However, the proposed schemes remain inadequate to secure payment transactions in such systems. In this paper, we propose a fully authentication services scheme for NFC mobile payment systems in order to support a high security level. The proposed scheme has security services, such as a full authentication process, perfect forward secrecy, and simultaneous anonymity of the smartphone and POS. These security services have been validated using the BAN logic model and an automatic cryptographic protocol verifier (ProVerif) tool. A security analysis has clarified that the proposed scheme can prevent various types attacks. A comparison with recent authentication schemes demonstrates that the proposed scheme has an appropriate cost in different sides such as computation, communication and storage space. Therefore, the proposed scheme not only has appealing security features, but can also clearly be utilized in mobile payment systems.
一种常用的无线通信技术是近场通信(NFC)。支持这种技术的智能手机被用于非接触式支付系统,作为模仿信用卡的识别设备。这种技术基本上集中在通信服务的质量上,而在某种程度上忽略了安全服务。由于现有的弱点,智能手机、销售点(POS)和服务提供商之间的通信消息容易受到攻击,包括攻击者可以访问、阻止和修改传输的消息以达到非法目的。因此,为了防止各种类型的攻击,关于NFC通信的认证方案已经有了很多研究建议。然而,拟议的计划仍然不足以确保这些系统中的支付交易。在本文中,我们提出了一个完整的NFC移动支付系统认证服务方案,以支持高安全级别。该方案具有完整的身份验证过程、完美的前向保密以及智能手机和POS机的同时匿名等安全服务,这些安全服务已使用BAN逻辑模型和自动加密协议验证器(ProVerif)工具进行了验证。安全分析表明,该方案能够有效防止各种类型的攻击。与现有认证方案的比较表明,该方案在计算、通信和存储空间等方面都具有合理的成本。因此,所提出的方案不仅具有吸引人的安全特性,而且可以明显地用于移动支付系统。
{"title":"Fully Authentication Services Scheme for NFC Mobile Payment Systems","authors":"Munefah Alshammari, S. Nashwan","doi":"10.32604/iasc.2022.022065","DOIUrl":"https://doi.org/10.32604/iasc.2022.022065","url":null,"abstract":"One commonly used wireless communication technology is Near-Field Communication (NFC). Smartphones that support this technology are used in contactless payment systems as identification devices to emulate credit cards. This technology has essentially focused on the quality of communication services and has somewhat disregarded security services. Communication messages between smartphones, the point of sale (POS), and service providers are susceptible to attack due to existing weaknesses, including that an adversary can access, block and modify the transmitted messages to achieve illegal goals. Therefore, there have been many research proposals in regards to authentication schemes for NFC communications in order to prevent various types of attacks. However, the proposed schemes remain inadequate to secure payment transactions in such systems. In this paper, we propose a fully authentication services scheme for NFC mobile payment systems in order to support a high security level. The proposed scheme has security services, such as a full authentication process, perfect forward secrecy, and simultaneous anonymity of the smartphone and POS. These security services have been validated using the BAN logic model and an automatic cryptographic protocol verifier (ProVerif) tool. A security analysis has clarified that the proposed scheme can prevent various types attacks. A comparison with recent authentication schemes demonstrates that the proposed scheme has an appropriate cost in different sides such as computation, communication and storage space. Therefore, the proposed scheme not only has appealing security features, but can also clearly be utilized in mobile payment systems.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"69 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76130647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Sine Power Lindley Distribution with Applications 正弦功率林德利分布与应用
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.018043
Abdullah M. Almarashi
Sine power Lindley distribution (SPLi), a new distribution with two parameters that extends the Lindley model, is introduced and studied in this paper. The SPLi distribution is more flexible than the power Lindley distribution, and we show that in the application part. The statistical properties of the proposed distribution are calculated, including the quantile function, moments, moment generating function, upper incomplete moment, and lower incomplete moment. Meanwhile, some numerical values of the mean, variance, skewness, and kurtosis of the SPLi distribution are obtained. Besides, the SPLi distribution is evaluated by different measures of entropy such as Rényi entropy, Havrda and Charvat entropy, Arimoto entropy, Arimoto entropy, and Tsallis entropy. Moreover, the maximum likelihood method is exploited to estimate the parameters of the SPLi distribution. The applications of the SPLi distribution to two real data sets illustrate the flexibility of the SPLi distribution, and the superiority of the SPLi distribution over some well-known distributions, including the alpha power transformed Lindley, power Lindley, extended Lindley, Lindley, and inverse Lindley distributions.
本文介绍并研究了正弦功率林德利分布(SPLi),它是对林德利模型进行扩展的一种新的双参数分布。SPLi分布比功率林德利分布更灵活,我们在应用部分展示了这一点。计算了该分布的统计性质,包括分位数函数、矩、矩生成函数、上不完全矩和下不完全矩。同时,得到了SPLi分布的均值、方差、偏度和峰度的一些数值。此外,还采用r尼伊熵、Havrda和Charvat熵、Arimoto熵、Arimoto熵和Tsallis熵等熵测度评价了SPLi的分布。此外,利用极大似然法估计SPLi分布的参数。SPLi分布在两个真实数据集上的应用说明了SPLi分布的灵活性,以及SPLi分布比一些已知分布(包括alpha幂变换Lindley、幂林德利、扩展林德利、林德利和逆林德利分布)的优越性。
{"title":"Sine Power Lindley Distribution with Applications","authors":"Abdullah M. Almarashi","doi":"10.32604/iasc.2022.018043","DOIUrl":"https://doi.org/10.32604/iasc.2022.018043","url":null,"abstract":"Sine power Lindley distribution (SPLi), a new distribution with two parameters that extends the Lindley model, is introduced and studied in this paper. The SPLi distribution is more flexible than the power Lindley distribution, and we show that in the application part. The statistical properties of the proposed distribution are calculated, including the quantile function, moments, moment generating function, upper incomplete moment, and lower incomplete moment. Meanwhile, some numerical values of the mean, variance, skewness, and kurtosis of the SPLi distribution are obtained. Besides, the SPLi distribution is evaluated by different measures of entropy such as Rényi entropy, Havrda and Charvat entropy, Arimoto entropy, Arimoto entropy, and Tsallis entropy. Moreover, the maximum likelihood method is exploited to estimate the parameters of the SPLi distribution. The applications of the SPLi distribution to two real data sets illustrate the flexibility of the SPLi distribution, and the superiority of the SPLi distribution over some well-known distributions, including the alpha power transformed Lindley, power Lindley, extended Lindley, Lindley, and inverse Lindley distributions.","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"11 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78409573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network 基于非合作学习的6G-IoT认知无线网络路由
IF 2 4区 计算机科学 Q2 Computer Science Pub Date : 2022-01-01 DOI: 10.32604/iasc.2022.021128
Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz
{"title":"Non-Cooperative Learning Based Routing for 6G-IoT Cognitive Radio Network","authors":"Tauqeer Safdar Malik, Kaleem Razzaq Malik, M. Sanaullah, Mohd Hilmi Hasan, Norshakirah Aziz","doi":"10.32604/iasc.2022.021128","DOIUrl":"https://doi.org/10.32604/iasc.2022.021128","url":null,"abstract":"","PeriodicalId":50357,"journal":{"name":"Intelligent Automation and Soft Computing","volume":"6 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74296138","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Intelligent Automation and Soft Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1