Pub Date : 2023-01-01DOI: 10.32604/csse.2023.029074
B. Murugeshwari, S. Rajalakshmi, K. Sudharson
Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have "predicted" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.
{"title":"Hybrid Approach for Privacy Enhancement in Data Mining Using Arbitrariness and Perturbation","authors":"B. Murugeshwari, S. Rajalakshmi, K. Sudharson","doi":"10.32604/csse.2023.029074","DOIUrl":"https://doi.org/10.32604/csse.2023.029074","url":null,"abstract":"Imagine numerous clients, each with personal data; individual inputs are severely corrupt, and a server only concerns the collective, statistically essential facets of this data. In several data mining methods, privacy has become highly critical. As a result, various privacy-preserving data analysis technologies have emerged. Hence, we use the randomization process to reconstruct composite data attributes accurately. Also, we use privacy measures to estimate how much deception is required to guarantee privacy. There are several viable privacy protections; however, determining which one is the best is still a work in progress. This paper discusses the difficulty of measuring privacy while also offering numerous random sampling procedures and statistical and categorized data results. Furthermore, this paper investigates the use of arbitrary nature with perturbations in privacy preservation. According to the research, arbitrary objects (most notably random matrices) have \"predicted\" frequency patterns. It shows how to recover crucial information from a sample damaged by a random number using an arbitrary lattice spectral selection strategy. This filtration system's conceptual framework posits, and extensive practical findings indicate that sparse data distortions preserve relatively modest privacy protection in various situations. As a result, the research framework is efficient and effective in maintaining data privacy and security.","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"5 1","pages":"2293-2307"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.032316
Alla Abbas Khadir, S. Hosseini-Seno, B. F. Dhahir, R. Budiarto
{"title":"Efficient-Cost Task Offloading Scheme in Fog-Internet of Vehicle Networks","authors":"Alla Abbas Khadir, S. Hosseini-Seno, B. F. Dhahir, R. Budiarto","doi":"10.32604/csse.2023.032316","DOIUrl":"https://doi.org/10.32604/csse.2023.032316","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"65 1","pages":"2223-2234"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84148890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.036106
A. N. Ahmed, Jinhyung Kim, Yun-Seung Nam, M. Abouhawwash
{"title":"Improved Hybrid Swarm Intelligence for Optimizing the Energy in WSN","authors":"A. N. Ahmed, Jinhyung Kim, Yun-Seung Nam, M. Abouhawwash","doi":"10.32604/csse.2023.036106","DOIUrl":"https://doi.org/10.32604/csse.2023.036106","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"418 1","pages":"2527-2542"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78159577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.037706
S. Zahir, R. Khan, M. Ullah, Muhammad Ishaq, Naqqash Dilshad, Amin Ullah, Mi Young Lee
{"title":"Robust Counting in Overcrowded Scenes Using Batch-Free Normalized Deep ConvNet","authors":"S. Zahir, R. Khan, M. Ullah, Muhammad Ishaq, Naqqash Dilshad, Amin Ullah, Mi Young Lee","doi":"10.32604/csse.2023.037706","DOIUrl":"https://doi.org/10.32604/csse.2023.037706","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"24 1","pages":"2741-2754"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74013922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.029040
S. Lavanya, N. Saravanakumar
{"title":"Graph-Based Replication and Two Factor Authentication in Cloud Computing","authors":"S. Lavanya, N. Saravanakumar","doi":"10.32604/csse.2023.029040","DOIUrl":"https://doi.org/10.32604/csse.2023.029040","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"37 1","pages":"2869-2883"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74194615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.034849
Mohammad Yamin, Saleh Bajaba, Sarah B. Basahel, E. Lydia
{"title":"Biometric Verification System Using Hyperparameter Tuned Deep Learning Model","authors":"Mohammad Yamin, Saleh Bajaba, Sarah B. Basahel, E. Lydia","doi":"10.32604/csse.2023.034849","DOIUrl":"https://doi.org/10.32604/csse.2023.034849","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"57 1","pages":"321-336"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74694257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.036916
Y. John, G. Ravi
{"title":"Improved QoS-Secure Routing in MANET Using Real-Time Regional ME Feature Approximation","authors":"Y. John, G. Ravi","doi":"10.32604/csse.2023.036916","DOIUrl":"https://doi.org/10.32604/csse.2023.036916","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"7 1","pages":"3653-3666"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74813967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.037067
Lingyun Xiang, Rong Wang, Yuhang Liu, Yangfan Liu, Lina Tan
{"title":"A General Linguistic Steganalysis Framework Using Multi-Task Learning","authors":"Lingyun Xiang, Rong Wang, Yuhang Liu, Yangfan Liu, Lina Tan","doi":"10.32604/csse.2023.037067","DOIUrl":"https://doi.org/10.32604/csse.2023.037067","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"114 1","pages":"2383-2399"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74912360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.036185
Kainat Ibrar, Abdul Muiz Fayyaz, M. A. Khan, Majed Alhaisoni, U. Tariq, Seob Jeon, Yun-Seong Nam
{"title":"Human Personality Assessment Based on Gait Pattern Recognition Using Smartphone Sensors","authors":"Kainat Ibrar, Abdul Muiz Fayyaz, M. A. Khan, Majed Alhaisoni, U. Tariq, Seob Jeon, Yun-Seong Nam","doi":"10.32604/csse.2023.036185","DOIUrl":"https://doi.org/10.32604/csse.2023.036185","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"11 3 1","pages":"2351-2368"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75216121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.32604/csse.2023.031008
Usman Ahmad, Muhammad Junaid Ali, Faizan Ahmed Khan, Arfat Ahmad Khan, A. ur Rehman, Malik Muhammad Ali Shahid, Mohd anul haq, Ilyas Khan, Zamil S. Alzamil, Ahmed Alhussen
{"title":"Large Scale Fish Images Classification and Localization using Transfer Learning and Localization Aware CNN Architecture","authors":"Usman Ahmad, Muhammad Junaid Ali, Faizan Ahmed Khan, Arfat Ahmad Khan, A. ur Rehman, Malik Muhammad Ali Shahid, Mohd anul haq, Ilyas Khan, Zamil S. Alzamil, Ahmed Alhussen","doi":"10.32604/csse.2023.031008","DOIUrl":"https://doi.org/10.32604/csse.2023.031008","url":null,"abstract":"","PeriodicalId":50634,"journal":{"name":"Computer Systems Science and Engineering","volume":"2 1","pages":"2125-2140"},"PeriodicalIF":2.2,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87872755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}