首页 > 最新文献

Computer Journal最新文献

英文 中文
Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths 循环与路径的笛卡儿积的超哈密顿可缺性
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-22 DOI: 10.1093/comjnl/bxac196
Yuxing Yang
Abstract Let $H$ be a cartesian product graph of even cycles and paths, where the first multiplier is an even cycle of length at least $4$ and the second multiplier is a path with at least two nodes or an even cycle. Then $H$ is an equitable bipartite graph, which takes the torus, the column-torus and the even $k$-ary $n$-cube as its special cases. For any node $w$ of $H$ and any two different nodes $u$ and $v$ in the partite set of $H$ not containing $w$, an algorithm was introduced to construct a hamiltonian path connecting $u$ and $v$ in $H-w$.
设$H$是一个偶循环与路径的笛卡尔积图,其中第一个乘子是长度至少$4$的偶循环,第二个乘子是至少有两个节点的路径或偶循环。则$H$是一个以环面、列环面和偶k$-任意$n$-立方体为其特例的公平二部图。针对$H$中的任意节点$w$和$H$中不包含$w$的任意两个不同的节点$u$和$v$,提出了在$H-w$中构造连接$u$和$v$的哈密顿路径的算法。
{"title":"Hyper-Hamiltonian Laceability of Cartesian Products of Cycles and Paths","authors":"Yuxing Yang","doi":"10.1093/comjnl/bxac196","DOIUrl":"https://doi.org/10.1093/comjnl/bxac196","url":null,"abstract":"Abstract Let $H$ be a cartesian product graph of even cycles and paths, where the first multiplier is an even cycle of length at least $4$ and the second multiplier is a path with at least two nodes or an even cycle. Then $H$ is an equitable bipartite graph, which takes the torus, the column-torus and the even $k$-ary $n$-cube as its special cases. For any node $w$ of $H$ and any two different nodes $u$ and $v$ in the partite set of $H$ not containing $w$, an algorithm was introduced to construct a hamiltonian path connecting $u$ and $v$ in $H-w$.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135047365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost 利用TF-IDF和XGBoost在字节码级别检测Android恶意软件
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-22 DOI: 10.1093/comjnl/bxac198
Gokhan Ozogur, Mehmet Ali Erturk, Zeynep Gurkas Aydin, Muhammed Ali Aydin
Abstract Android is the dominant operating system in the smartphone market and there exists millions of applications in various application stores. The increase in the number of applications has necessitated the detection of malicious applications in a short time. As opposed to dynamic analysis, it is possible to obtain results in a shorter time in static analysis as there is no need to run the applications. However, obtaining various information from application packages using reverse engineering techniques still requires a substantial amount of processing power. Although some attempts have been made to solve this problem by analyzing binary files without decoding the source code, there is still more work to be done in this area. In this study, we analyzed the applications in bytecode level without decoding the binary source files. We proposed a model using Term Frequency - Inverse Document Frequency (TF-IDF) word representation for feature extraction and Extreme Gradient Boosting (XGBoost) method for classification. The experimental results show that our model classifies a given application package as a malware or benign in 2.75 s with 99.05% F1-score on a balanced dataset, and in 3.30 s with 99.35% F1-score on an imbalanced dataset containing obfuscated malwares.
Android是智能手机市场的主导操作系统,在各种应用商店中存在着数以百万计的应用。随着应用程序数量的增加,需要在短时间内检测出恶意应用程序。与动态分析相反,静态分析可以在更短的时间内获得结果,因为不需要运行应用程序。然而,使用逆向工程技术从应用程序包中获取各种信息仍然需要大量的处理能力。虽然已经有一些尝试通过分析二进制文件而不解码源代码来解决这个问题,但是在这个领域还有更多的工作要做。在本研究中,我们在不解码二进制源文件的情况下,分析了字节码级别的应用程序。我们提出了一个使用词频-逆文档频率(TF-IDF)词表示进行特征提取和使用极限梯度增强(XGBoost)方法进行分类的模型。实验结果表明,我们的模型在2.75秒内以99.05%的f1得分将给定的应用程序包分类为恶意软件或良性,在3.30秒内以99.35%的f1得分对包含混淆恶意软件的不平衡数据集进行分类。
{"title":"Android Malware Detection in Bytecode Level Using TF-IDF and XGBoost","authors":"Gokhan Ozogur, Mehmet Ali Erturk, Zeynep Gurkas Aydin, Muhammed Ali Aydin","doi":"10.1093/comjnl/bxac198","DOIUrl":"https://doi.org/10.1093/comjnl/bxac198","url":null,"abstract":"Abstract Android is the dominant operating system in the smartphone market and there exists millions of applications in various application stores. The increase in the number of applications has necessitated the detection of malicious applications in a short time. As opposed to dynamic analysis, it is possible to obtain results in a shorter time in static analysis as there is no need to run the applications. However, obtaining various information from application packages using reverse engineering techniques still requires a substantial amount of processing power. Although some attempts have been made to solve this problem by analyzing binary files without decoding the source code, there is still more work to be done in this area. In this study, we analyzed the applications in bytecode level without decoding the binary source files. We proposed a model using Term Frequency - Inverse Document Frequency (TF-IDF) word representation for feature extraction and Extreme Gradient Boosting (XGBoost) method for classification. The experimental results show that our model classifies a given application package as a malware or benign in 2.75 s with 99.05% F1-score on a balanced dataset, and in 3.30 s with 99.35% F1-score on an imbalanced dataset containing obfuscated malwares.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135047366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing 基于雾计算学习自动机的能量感知任务调度算法深度学习模型
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-10 DOI: 10.1093/comjnl/bxac192
Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani
Abstract This paper presents an artificial intelligence deep learning model for an energy-aware task scheduling algorithm based on learning automata (LA) in the Fog Computing (FC) Applications. FC is a distributed computing model that serves as an intermediate layer between the cloud and Internet of Things (IoT) to improve the quality of service. The IoT is the closest model to the wireless sensor network (WSN). One of its important applications is to create a global approach to health care system infrastructure development that reflects recent advances in WSN. The most influential factor in energy consumption is task scheduling. In this paper, the issue of reducing energy consumption is investigated as an important challenge in the fog environment. Also, an algorithm is presented to solve the task scheduling problem based on LA and measure the makespan (MK) and cost parameters. Then, a new artificial neural network deep model is proposed, based on the presented LA task scheduling fog computing algorithm. The proposed neural model can predict the relation among MK, energy and cost parameters versus VM length for the first time. The proposed model results show that all of the desired parameters can be predicted with high precision.
摘要针对雾计算应用中基于学习自动机(LA)的能量感知任务调度算法,提出了一种人工智能深度学习模型。FC是一种分布式计算模型,作为云和物联网(IoT)之间的中间层,以提高服务质量。物联网是最接近无线传感器网络(WSN)的模型。其重要的应用之一是创建一个全球性的方法,以卫生保健系统基础设施的发展,反映了无线传感器网络的最新进展。对能耗影响最大的因素是任务调度。本文将降低能耗作为雾环境中的一项重要挑战进行了研究。在此基础上,提出了一种求解任务调度问题的算法,并测量了最大完工时间(MK)和成本参数。在此基础上,提出了一种新的人工神经网络深度模型。提出的神经网络模型首次能够预测出MK、能量和成本参数与虚拟机长度之间的关系。结果表明,所提出的模型能够以较高的精度预测所需的所有参数。
{"title":"A Deep Learning Model for Energy-Aware Task Scheduling Algorithm Based on Learning Automata for Fog Computing","authors":"Reza Ebrahim Pourian, Mehdi Fartash, Javad Akbari Torkestani","doi":"10.1093/comjnl/bxac192","DOIUrl":"https://doi.org/10.1093/comjnl/bxac192","url":null,"abstract":"Abstract This paper presents an artificial intelligence deep learning model for an energy-aware task scheduling algorithm based on learning automata (LA) in the Fog Computing (FC) Applications. FC is a distributed computing model that serves as an intermediate layer between the cloud and Internet of Things (IoT) to improve the quality of service. The IoT is the closest model to the wireless sensor network (WSN). One of its important applications is to create a global approach to health care system infrastructure development that reflects recent advances in WSN. The most influential factor in energy consumption is task scheduling. In this paper, the issue of reducing energy consumption is investigated as an important challenge in the fog environment. Also, an algorithm is presented to solve the task scheduling problem based on LA and measure the makespan (MK) and cost parameters. Then, a new artificial neural network deep model is proposed, based on the presented LA task scheduling fog computing algorithm. The proposed neural model can predict the relation among MK, energy and cost parameters versus VM length for the first time. The proposed model results show that all of the desired parameters can be predicted with high precision.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136266660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hitting Times of Random Walks on Edge Corona Product Graphs 边电晕积图上随机行走的命中次数
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-01-09 DOI: 10.1093/comjnl/bxac189
Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan
Abstract Graph products have been extensively applied to model complex networks with striking properties observed in real-world complex systems. In this paper, we study the hitting times for random walks on a class of graphs generated iteratively by edge corona product. We first derive recursive solutions to the eigenvalues and eigenvectors of the normalized adjacency matrix associated with the graphs. Based on these results, we further obtain interesting quantities about hitting times of random walks, providing iterative formulas for two-node hitting time, as well as closed-form expressions for the Kemeny’s constant defined as a weighted average of hitting times over all node pairs, as well as the arithmetic mean of hitting times of all pairs of nodes.
图产品已被广泛应用于复杂网络的建模,在现实世界的复杂系统中观察到惊人的性质。本文研究了一类由边缘电晕积迭代生成的图的随机行走命中时间。我们首先推导出与图相关的归一化邻接矩阵的特征值和特征向量的递归解。基于这些结果,我们进一步得到了关于随机行走命中次数的有趣量,提供了双节点命中时间的迭代公式,以及定义为所有节点对命中次数加权平均值的Kemeny常数的封闭表达式,以及所有节点对命中次数的算术平均值。
{"title":"Hitting Times of Random Walks on Edge Corona Product Graphs","authors":"Mingzhe Zhu, Wanyue Xu, Wei Li, Zhongzhi Zhang, Haibin Kan","doi":"10.1093/comjnl/bxac189","DOIUrl":"https://doi.org/10.1093/comjnl/bxac189","url":null,"abstract":"Abstract Graph products have been extensively applied to model complex networks with striking properties observed in real-world complex systems. In this paper, we study the hitting times for random walks on a class of graphs generated iteratively by edge corona product. We first derive recursive solutions to the eigenvalues and eigenvectors of the normalized adjacency matrix associated with the graphs. Based on these results, we further obtain interesting quantities about hitting times of random walks, providing iterative formulas for two-node hitting time, as well as closed-form expressions for the Kemeny’s constant defined as a weighted average of hitting times over all node pairs, as well as the arithmetic mean of hitting times of all pairs of nodes.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135014476","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT Data Quality Issues and Potential Solutions: A Literature Review 物联网数据质量问题和潜在解决方案:文献综述
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab183
Taha Mansouri;Mohammad Reza Sadeghi Moghadam;Fatemeh Monshizadeh;Ahad Zareravasan
In the Internet of Things (IoT), data gathered from dozens of devices are the base for creating business value and developing new products and services. If data are of poor quality, decisions are likely to be non-sense. Data quality is crucial to gain business value of the IoT initiatives. This paper presents a systematic literature review regarding IoT data quality from 2000 to 2020. We analyzed 58 articles to identify IoT data quality dimensions and issues and their categorizations. According to this analysis, we offer a classification of IoT data characterizations using the focus group method and clarify the link between dimensions and issues in each category. Manifesting a link between dimensions and issues in each category is incumbent, while this critical affair in extant categorizations is ignored. We also examine data security as an important data quality issue and suggest potential solutions to overcome IoT's security issues. The finding of this study proposes a new research discipline for additional examination for researchers and practitioners in determining data quality in the context of IoT.
在物联网(IoT)中,从数十台设备收集的数据是创造商业价值和开发新产品和服务的基础。如果数据质量很差,那么决策很可能是没有意义的。数据质量对于获得物联网计划的商业价值至关重要。本文介绍了2000年至2020年关于物联网数据质量的系统文献综述。我们分析了58篇文章,以确定物联网数据质量的维度和问题及其分类。根据这一分析,我们使用焦点小组方法对物联网数据特征进行了分类,并澄清了每个类别中维度和问题之间的联系。在每个类别中表现维度和问题之间的联系是义不容辞的,而在现存的分类中,这一关键问题被忽视了。我们还将数据安全作为一个重要的数据质量问题进行了研究,并提出了克服物联网安全问题的潜在解决方案。这项研究的发现为研究人员和从业者在物联网背景下确定数据质量提供了一个新的研究学科。
{"title":"IoT Data Quality Issues and Potential Solutions: A Literature Review","authors":"Taha Mansouri;Mohammad Reza Sadeghi Moghadam;Fatemeh Monshizadeh;Ahad Zareravasan","doi":"10.1093/comjnl/bxab183","DOIUrl":"https://doi.org/10.1093/comjnl/bxab183","url":null,"abstract":"In the Internet of Things (IoT), data gathered from dozens of devices are the base for creating business value and developing new products and services. If data are of poor quality, decisions are likely to be non-sense. Data quality is crucial to gain business value of the IoT initiatives. This paper presents a systematic literature review regarding IoT data quality from 2000 to 2020. We analyzed 58 articles to identify IoT data quality dimensions and issues and their categorizations. According to this analysis, we offer a classification of IoT data characterizations using the focus group method and clarify the link between dimensions and issues in each category. Manifesting a link between dimensions and issues in each category is incumbent, while this critical affair in extant categorizations is ignored. We also examine data security as an important data quality issue and suggest potential solutions to overcome IoT's security issues. The finding of this study proposes a new research discipline for additional examination for researchers and practitioners in determining data quality in the context of IoT.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"615-625"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet 可重用组模糊提取器和组共享比特币钱包
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab185
Jie Ma;Bin Qi;Kewei Lv
In this paper, we propose a novel cryptographic primitive named reusable group fuzzy extractor (RGFE) allowing any member of a group to extract and reproduce random strings from a fuzzy and non-uniform source of high entropy (called fingerprint). Any group member can anonymously generate a random string for the group using his fingerprint and can be traced when needed, whereas other members can reproduce the string using their own fingerprints. Moreover, a fingerprint can be repeatedly used to generate multiple random strings. Basing on RGFE, we present group-shared Bitcoin wallet, which can be used by a group of users to receive or spend coins via biometrics in a traceable way.
在本文中,我们提出了一种新的密码原语,称为可重用群模糊提取器(RGFE),允许群中的任何成员从模糊和非均匀的高熵源(称为指纹)中提取和再现随机串。任何群组成员都可以使用自己的指纹为群组匿名生成随机字符串,并可以在需要时进行跟踪,而其他成员可以使用他们自己的指纹复制字符串。此外,可以重复使用指纹来生成多个随机字符串。基于RGFE,我们提出了一个群组共享比特币钱包,该钱包可以由一组用户通过生物识别技术以可追踪的方式接收或消费硬币。
{"title":"Reusable Group Fuzzy Extractor and Group-Shared Bitcoin Wallet","authors":"Jie Ma;Bin Qi;Kewei Lv","doi":"10.1093/comjnl/bxab185","DOIUrl":"https://doi.org/10.1093/comjnl/bxab185","url":null,"abstract":"In this paper, we propose a novel cryptographic primitive named reusable group fuzzy extractor (RGFE) allowing any member of a group to extract and reproduce random strings from a fuzzy and non-uniform source of high entropy (called fingerprint). Any group member can anonymously generate a random string for the group using his fingerprint and can be traced when needed, whereas other members can reproduce the string using their own fingerprints. Moreover, a fingerprint can be repeatedly used to generate multiple random strings. Basing on RGFE, we present group-shared Bitcoin wallet, which can be used by a group of users to receive or spend coins via biometrics in a traceable way.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"643-661"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification 基于粒子骑士互信息和树突状松鼠搜索的人工免疫分类器脑肿瘤分类
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab194
Rahul Ramesh Chakre;Dipak V Patil
Magnetic Resonance Images (MRI) is an imperative imaging modality employed in the medical diagnosis tool for detecting brain tumors. However, the major obstacle in MR images classification is the semantic gap between low-level visual information obtained by MRI machines and high-level information alleged by the clinician. Hence, this research article introduces a novel technique, namely Dendritic-Squirrel Search Algorithm-based Artificial immune classifier (Dendritic-SSA-AIC) using MRI for brain tumor classification. Initially the pre-processing is performed followed by segmentation is devised using sparse fuzzy-c-means (Sparse FCM) is employed for segmentation to extract statistical and texture features. Furthermore, the Particle Rider mutual information (PRMI) is employed for feature selection, which is devised by integrating Particle swarm optimization, Rider optimization algorithm and mutual information. AIC is employed to classify the brain tumor, in which the Dendritic-SSA algorithm designed by combining dendritic cell algorithm and Squirrel search algorithm (SSA). The proposed PRMI-Dendritic-SSA-AIC provides superior performance with maximal accuracy of 97.789%, sensitivity of 97.577% and specificity of 98%.
磁共振成像(MRI)是医学诊断工具中必不可少的一种成像方式,用于检测脑肿瘤。然而,MRI图像分类的主要障碍是MRI机器获得的低水平视觉信息与临床医生声称的高水平信息之间的语义差距。为此,本文介绍了一种基于树突状松鼠搜索算法的人工免疫分类器(Dendritic-SSA-AIC)的MRI脑肿瘤分类技术。首先进行预处理,然后采用稀疏模糊均值(sparse FCM)进行分割,提取统计特征和纹理特征。在此基础上,将粒子群算法、Rider优化算法和互信息相结合,设计了基于粒子骑手互信息的特征选择方法。采用AIC对脑肿瘤进行分类,其中树突状细胞算法与松鼠搜索算法(Squirrel search algorithm, SSA)相结合设计了树突状-SSA算法。所提出的PRMI-Dendritic-SSA-AIC具有优异的性能,最高准确率为97.789%,灵敏度为97.577%,特异性为98%。
{"title":"Particle Rider Mutual Information and Dendritic-Squirrel Search Algorithm With Artificial Immune Classifier for Brain Tumor Classification","authors":"Rahul Ramesh Chakre;Dipak V Patil","doi":"10.1093/comjnl/bxab194","DOIUrl":"https://doi.org/10.1093/comjnl/bxab194","url":null,"abstract":"Magnetic Resonance Images (MRI) is an imperative imaging modality employed in the medical diagnosis tool for detecting brain tumors. However, the major obstacle in MR images classification is the semantic gap between low-level visual information obtained by MRI machines and high-level information alleged by the clinician. Hence, this research article introduces a novel technique, namely Dendritic-Squirrel Search Algorithm-based Artificial immune classifier (Dendritic-SSA-AIC) using MRI for brain tumor classification. Initially the pre-processing is performed followed by segmentation is devised using sparse fuzzy-c-means (Sparse FCM) is employed for segmentation to extract statistical and texture features. Furthermore, the Particle Rider mutual information (PRMI) is employed for feature selection, which is devised by integrating Particle swarm optimization, Rider optimization algorithm and mutual information. AIC is employed to classify the brain tumor, in which the Dendritic-SSA algorithm designed by combining dendritic cell algorithm and Squirrel search algorithm (SSA). The proposed PRMI-Dendritic-SSA-AIC provides superior performance with maximal accuracy of 97.789%, sensitivity of 97.577% and specificity of 98%.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"743-762"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Class Liver Cancer Diseases Classification Using CT Images 基于CT图像的肝癌多类型分类
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab162
A Krishan;D Mittal
Liver cancer is the fourth common cancer in the world and the third leading reason of cancer mortality. The conventional methods for detecting liver cancer are blood tests, biopsy and image tests. In this paper, we propose an automated computer-aided diagnosis technique for the classification of multi-class liver cancer i.e. primary, hepatocellular carcinoma, and secondary, metastases using computed tomography (CT) images. The proposed algorithm is a two-step process: enhancement of CT images using contrast limited adaptive histogram equalization algorithm and extraction of features for the detection and the classification of the different classes of the tumor. The overall achieved accuracy, sensitivity and specificity with the proposed method for the classification of multi-class tumors are 97%, 94.3% and 100% with experiment 1 and 84% all of them with experiment 2, respectively. By automatic feature selection scheme accuracy is deviated maximum by 10.5% from the overall and the ratio features accuracy decreases linearly by 5.5% with 20 to 5 selected features. The proposed methodology can help to assist radiologists in liver cancer diagnosis.
肝癌是世界上第四大常见癌症,也是导致癌症死亡的第三大原因。检测肝癌的常规方法是血液检查、活检和影像学检查。在本文中,我们提出了一种自动计算机辅助诊断技术,用于使用计算机断层扫描(CT)图像对多类型肝癌进行分类,即原发性,肝细胞癌和继发性,转移性肝癌。该算法分为两步:利用对比度有限的自适应直方图均衡化算法对CT图像进行增强,提取特征,对不同类型的肿瘤进行检测和分类。该方法对多类型肿瘤进行分类的总体准确率为97%,灵敏度为94.3%,特异性为100%,实验1为84%。当选择20 ~ 5个特征时,自动特征选择方案的准确率与总体偏差最大达10.5%,比例特征选择方案的准确率线性下降5.5%。所提出的方法可以帮助放射科医生在肝癌的诊断。
{"title":"Multi-Class Liver Cancer Diseases Classification Using CT Images","authors":"A Krishan;D Mittal","doi":"10.1093/comjnl/bxab162","DOIUrl":"https://doi.org/10.1093/comjnl/bxab162","url":null,"abstract":"Liver cancer is the fourth common cancer in the world and the third leading reason of cancer mortality. The conventional methods for detecting liver cancer are blood tests, biopsy and image tests. In this paper, we propose an automated computer-aided diagnosis technique for the classification of multi-class liver cancer i.e. primary, hepatocellular carcinoma, and secondary, metastases using computed tomography (CT) images. The proposed algorithm is a two-step process: enhancement of CT images using contrast limited adaptive histogram equalization algorithm and extraction of features for the detection and the classification of the different classes of the tumor. The overall achieved accuracy, sensitivity and specificity with the proposed method for the classification of multi-class tumors are 97%, 94.3% and 100% with experiment 1 and 84% all of them with experiment 2, respectively. By automatic feature selection scheme accuracy is deviated maximum by 10.5% from the overall and the ratio features accuracy decreases linearly by 5.5% with 20 to 5 selected features. The proposed methodology can help to assist radiologists in liver cancer diagnosis.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"525-539"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49946838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
PBFL: Communication-Efficient Federated Learning via Parameter Predicting 基于参数预测的高效沟通联邦学习
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab184
Kaiju Li;Chunhua Xiao
Federated learning (FL) is an emerging privacy-preserving technology for machine learning, which enables end devices to cooperatively train a global model without uploading their local sensitive data. Because of limited network bandwidth and considerable communication overhead, communication efficiency has become an essential bottleneck for FL. Existing solutions attempt to improve this situation by reducing communication rounds while usually come with more computation resource consumption or model accuracy deterioration. In this paper, we propose a parameter Prediction-Based DL (PBFL). In which an extended Kalman filter-based prediction algorithm, a practical prediction error threshold setting mechanism and an effective global model updating strategy are included. Instead of collecting all updates from participants, PBFL takes advantage of predicting values to aggregate the model, which substantially reduces required communication rounds while guaranteeing model accuracy. Inspired by the idea of prediction, each participant checks whether its prediction value is out of the tolerance threshold limits and only uploads local updates that have an inaccurate prediction value. In this way, no additional local computational resources are required. Experimental results on both multilayer perceptrons and convolutional neural networks show that PBFL outperforms the state-of-the-art methods and improves the communication efficiency by >66% with 1% higher model accuracy.
联合学习(FL)是一种新兴的机器学习隐私保护技术,它使终端设备能够在不上传本地敏感数据的情况下协同训练全局模型。由于有限的网络带宽和可观的通信开销,通信效率已成为FL的一个重要瓶颈。现有的解决方案试图通过减少通信轮次来改善这种情况,但通常会带来更多的计算资源消耗或模型精度下降。在本文中,我们提出了一种基于参数预测的DL(PBFL)。其中包括基于扩展卡尔曼滤波器的预测算法、实用的预测误差阈值设置机制和有效的全局模型更新策略。PBFL没有从参与者那里收集所有更新,而是利用预测值来聚合模型,这大大减少了所需的通信轮次,同时保证了模型的准确性。受预测思想的启发,每个参与者都会检查其预测值是否超出容差阈值限制,并且只上传预测值不准确的本地更新。通过这种方式,不需要额外的本地计算资源。在多层感知器和卷积神经网络上的实验结果表明,PBFL优于最先进的方法,通信效率提高了66%以上,模型精度提高了1%。
{"title":"PBFL: Communication-Efficient Federated Learning via Parameter Predicting","authors":"Kaiju Li;Chunhua Xiao","doi":"10.1093/comjnl/bxab184","DOIUrl":"https://doi.org/10.1093/comjnl/bxab184","url":null,"abstract":"Federated learning (FL) is an emerging privacy-preserving technology for machine learning, which enables end devices to cooperatively train a global model without uploading their local sensitive data. Because of limited network bandwidth and considerable communication overhead, communication efficiency has become an essential bottleneck for FL. Existing solutions attempt to improve this situation by reducing communication rounds while usually come with more computation resource consumption or model accuracy deterioration. In this paper, we propose a parameter Prediction-Based DL (PBFL). In which an extended Kalman filter-based prediction algorithm, a practical prediction error threshold setting mechanism and an effective global model updating strategy are included. Instead of collecting all updates from participants, PBFL takes advantage of predicting values to aggregate the model, which substantially reduces required communication rounds while guaranteeing model accuracy. Inspired by the idea of prediction, each participant checks whether its prediction value is out of the tolerance threshold limits and only uploads local updates that have an inaccurate prediction value. In this way, no additional local computational resources are required. Experimental results on both multilayer perceptrons and convolutional neural networks show that PBFL outperforms the state-of-the-art methods and improves the communication efficiency by >66% with 1% higher model accuracy.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"626-642"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm 基于雾的物联网资源推荐的混合算法
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2021-10-01 DOI: 10.1093/comjnl/bxab189
Zhiwang Xu;Huibin Qin;Shengying Yang;Seyedeh Maryam Arefzadeh
Internet of things (IoT) is an architecture of connected physical objects; these objects can communicate with each other and transmit and receive data. Also, fog-based IoT is a distributed platform that provides reliable access to virtualized resources based on various technologies such as high-performance computing and service-oriented design. A fog recommender system is an intelligent engine that suggests suitable services for fog users with less answer time and more accuracy. With the rapid growth of files and information sharing, fog recommender systems’ importance is also increased. Besides, the resource management problem appears challenging in fog-based IoT because of the fog's unpredictable and highly variable environment. However, many current methods suffer from the low accuracy of fog recommendations. Due to this problem's Non-deterministic Polynomial-time (NP)-hard nature, a new approach is presented for resource recommendation in the fog-based IoT using a hybrid optimization algorithm. To simulate the suggested method, the CloudSim simulation environment is used. The experimental results show that the accuracy is optimized by about 1–8% compared with the Cooperative Filtering method utilizing Smoothing and Fusing and Artificial Bee Colony algorithm. The outcomes of the present paper are notable for scholars, and they supply insights into subsequent study domains in this field.
物联网(IoT)是一种连接物理对象的体系结构;这些对象可以相互通信并发送和接收数据。此外,基于雾的物联网是一个分布式平台,基于高性能计算和面向服务的设计等各种技术,提供对虚拟化资源的可靠访问。雾推荐系统是一种智能引擎,它以更少的回答时间和更高的准确性为雾用户提供合适的服务。随着文件和信息共享的快速增长,雾推荐系统的重要性也在增加。此外,由于雾的不可预测和高度可变的环境,资源管理问题在基于雾的物联网中显得具有挑战性。然而,目前的许多方法都存在雾推荐精度低的问题。由于该问题的非确定性多项式时间(NP)-难性质,提出了一种新的基于雾的物联网资源推荐方法,该方法使用混合优化算法。为了模拟建议的方法,使用了CloudSim模拟环境。实验结果表明,与利用平滑融合和人工蜂群算法的协同滤波方法相比,精度优化了约1–8%。本文的成果值得学者们注意,并为该领域的后续研究领域提供了见解。
{"title":"A New Approach for Resource Recommendation in the Fog-Based IoT Using a Hybrid Algorithm","authors":"Zhiwang Xu;Huibin Qin;Shengying Yang;Seyedeh Maryam Arefzadeh","doi":"10.1093/comjnl/bxab189","DOIUrl":"https://doi.org/10.1093/comjnl/bxab189","url":null,"abstract":"Internet of things (IoT) is an architecture of connected physical objects; these objects can communicate with each other and transmit and receive data. Also, fog-based IoT is a distributed platform that provides reliable access to virtualized resources based on various technologies such as high-performance computing and service-oriented design. A fog recommender system is an intelligent engine that suggests suitable services for fog users with less answer time and more accuracy. With the rapid growth of files and information sharing, fog recommender systems’ importance is also increased. Besides, the resource management problem appears challenging in fog-based IoT because of the fog's unpredictable and highly variable environment. However, many current methods suffer from the low accuracy of fog recommendations. Due to this problem's Non-deterministic Polynomial-time (NP)-hard nature, a new approach is presented for resource recommendation in the fog-based IoT using a hybrid optimization algorithm. To simulate the suggested method, the CloudSim simulation environment is used. The experimental results show that the accuracy is optimized by about 1–8% compared with the Cooperative Filtering method utilizing Smoothing and Fusing and Artificial Bee Colony algorithm. The outcomes of the present paper are notable for scholars, and they supply insights into subsequent study domains in this field.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 3","pages":"692-710"},"PeriodicalIF":1.4,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49977707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1