首页 > 最新文献

JOURNAL OF INTERCONNECTION NETWORKS最新文献

英文 中文
Tight Toughness, Isolated Toughness and Binding Number Bounds for the [1,n]-Factors and the {K2,Ci≥4}-Factors [1,n]-因子和{K2,Ci≥4}-因子的紧密韧性、孤立韧性和结合数界限
IF 0.7 Q4 Computer Science Pub Date : 2023-06-21 DOI: 10.1142/s021926592350010x
Xiao Xu, Zhuoma Gao, Lei Meng, Qin Tong
Let [Formula: see text] be an integer. The [Formula: see text]-factor of a graph [Formula: see text] is a spanning subgraph [Formula: see text] if [Formula: see text] for all [Formula: see text], and the [Formula: see text]-factor is a subgraph whose each component is either [Formula: see text] or [Formula: see text]. In this paper, we give the lower bounds with regard to tight toughness, isolated toughness and binding number to guarantee the existence of the [Formula: see text]-factors and [Formula: see text]-factors for a graph.
设[公式:见文本]为整数。如果所有的[公式:见文本]都是[公式:见文本],则图[公式:见文本]的[公式:见文本]因子是一个生成子图[公式:见文本],而[公式:见文本]因子是一个子图,其每个组件要么是[公式:见文本],要么是[公式:见文本]。本文给出了图的紧韧性、孤立韧性和结合数的下界,以保证图的[公式:见文]因子和[公式:见文]因子的存在。
{"title":"Tight Toughness, Isolated Toughness and Binding Number Bounds for the [1,n]-Factors and the {K2,Ci≥4}-Factors","authors":"Xiao Xu, Zhuoma Gao, Lei Meng, Qin Tong","doi":"10.1142/s021926592350010x","DOIUrl":"https://doi.org/10.1142/s021926592350010x","url":null,"abstract":"Let [Formula: see text] be an integer. The [Formula: see text]-factor of a graph [Formula: see text] is a spanning subgraph [Formula: see text] if [Formula: see text] for all [Formula: see text], and the [Formula: see text]-factor is a subgraph whose each component is either [Formula: see text] or [Formula: see text]. In this paper, we give the lower bounds with regard to tight toughness, isolated toughness and binding number to guarantee the existence of the [Formula: see text]-factors and [Formula: see text]-factors for a graph.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80472320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework 使用新颖高效的基于深度学习的取证框架来保护云应用程序
IF 0.7 Q4 Computer Science Pub Date : 2023-06-21 DOI: 10.1142/s0219265923500081
Sheena Mohammed, Sridevi Rangu
Privacy and security are the most concerning topics while using cloud-based applications. Malware detection in cloud applications is important in identifying application malware activity. So, a novel Goat-based Recurrent Forensic Mechanism (GbRFM) is used to detect the attack and provide the attack type in cloud-based applications. At first, the dataset is pre-processed in the hidden phase, and the errorless features are extracted. The proposed model also trains the output of the hidden layer to identify and classify the malware. The wild goat algorithm enhances the identification rate by accurately detecting the attack. Using the NSL-KDD data, the preset research was verified, and the outcomes were evaluated. The performance assessment indicates that the developed model gained a 99.26% accuracy rate for the NSL-KDD dataset. Moreover, to validate the efficiency of the proposed model, the outcomes are compared with other techniques. The comparison analysis proved that the proposed model attained better results.
在使用基于云的应用程序时,隐私和安全是最受关注的话题。云应用程序中的恶意软件检测对于识别应用程序恶意软件活动非常重要。为此,本文提出了一种基于山羊的循环取证机制(GbRFM)来检测攻击并提供基于云的应用中的攻击类型。首先在隐藏阶段对数据集进行预处理,提取无差错特征;该模型还训练隐藏层的输出来识别和分类恶意软件。野山羊算法通过准确检测攻击,提高了识别率。利用NSL-KDD数据对前期研究进行验证,并对结果进行评价。性能评估表明,该模型对NSL-KDD数据集的准确率达到了99.26%。此外,为了验证该模型的有效性,将结果与其他技术进行了比较。对比分析表明,该模型取得了较好的效果。
{"title":"To Secure the Cloud Application Using a Novel Efficient Deep Learning-Based Forensic Framework","authors":"Sheena Mohammed, Sridevi Rangu","doi":"10.1142/s0219265923500081","DOIUrl":"https://doi.org/10.1142/s0219265923500081","url":null,"abstract":"Privacy and security are the most concerning topics while using cloud-based applications. Malware detection in cloud applications is important in identifying application malware activity. So, a novel Goat-based Recurrent Forensic Mechanism (GbRFM) is used to detect the attack and provide the attack type in cloud-based applications. At first, the dataset is pre-processed in the hidden phase, and the errorless features are extracted. The proposed model also trains the output of the hidden layer to identify and classify the malware. The wild goat algorithm enhances the identification rate by accurately detecting the attack. Using the NSL-KDD data, the preset research was verified, and the outcomes were evaluated. The performance assessment indicates that the developed model gained a 99.26% accuracy rate for the NSL-KDD dataset. Moreover, to validate the efficiency of the proposed model, the outcomes are compared with other techniques. The comparison analysis proved that the proposed model attained better results.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89833021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nordhaus–Gaddum-Type Results for the k-Independent Number of Graphs 图的k独立数的nordhaus - gaddum型结果
IF 0.7 Q4 Computer Science Pub Date : 2023-06-10 DOI: 10.1142/s021926592350007x
Zhao Wang, Hongfang Liu, Yuhu Liu
The concept of [Formula: see text]-independent set, introduced by Fink and Jacobson in 1986, is a natural generalization of classical independence set. A k-independent set is a set of vertices whose induced subgraph has maximum degree at most [Formula: see text]. The k-independence number of [Formula: see text], denoted by [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-independent set of [Formula: see text]. As a natural counterpart of the [Formula: see text]-independence number, we introduced the concept of [Formula: see text]-edge-independence number. An edge set [Formula: see text] in [Formula: see text] is called k-edge-independent if the maximum degree of the subgraph induced by the edges in [Formula: see text] is less or equal to [Formula: see text]. The k-edge-independence number, denoted [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-edge-independent set. In this paper, we study the Nordhaus–Gaddum-type results for the parameter [Formula: see text] and [Formula: see text]. We obtain sharp upper and lower bounds of [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] for a graph [Formula: see text] of order [Formula: see text]. Some graph classes attaining these bounds are also given.
Fink和Jacobson于1986年提出的[公式:见文]独立集的概念是对经典独立集的自然推广。k无关集是指诱导子图最多具有最大度的顶点集合[公式:见文]。[公式:见文]的k独立数,用[公式:见文]表示,定义为[公式:见文]的[公式:见文]的[公式:见文]独立集合的最大基数。作为[公式:见文]-独立数的自然对应,我们引入了[公式:见文]-边缘独立数的概念。如果由[公式:见文]中的边引起的子图的最大程度小于或等于[公式:见文],则称为[公式:见文]中的边集[公式:见文]中的边集[k-edge-independent]。k-边无关数,记为[公式:见文],定义为[公式:见文]-边无关集的最大基数。本文研究了参数[公式:见文]和[公式:见文]的nordhaus - gaddum型结果。对于有序的[公式:见文]图[公式:见文],我们得到了[公式:见文],[公式:见文],[公式:见文],[公式:见文],[公式:见文],[公式:见文]的清晰的上界和下界。并给出了达到这些边界的一些图类。
{"title":"Nordhaus–Gaddum-Type Results for the k-Independent Number of Graphs","authors":"Zhao Wang, Hongfang Liu, Yuhu Liu","doi":"10.1142/s021926592350007x","DOIUrl":"https://doi.org/10.1142/s021926592350007x","url":null,"abstract":"The concept of [Formula: see text]-independent set, introduced by Fink and Jacobson in 1986, is a natural generalization of classical independence set. A k-independent set is a set of vertices whose induced subgraph has maximum degree at most [Formula: see text]. The k-independence number of [Formula: see text], denoted by [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-independent set of [Formula: see text]. As a natural counterpart of the [Formula: see text]-independence number, we introduced the concept of [Formula: see text]-edge-independence number. An edge set [Formula: see text] in [Formula: see text] is called k-edge-independent if the maximum degree of the subgraph induced by the edges in [Formula: see text] is less or equal to [Formula: see text]. The k-edge-independence number, denoted [Formula: see text], is defined as the maximum cardinality of a [Formula: see text]-edge-independent set. In this paper, we study the Nordhaus–Gaddum-type results for the parameter [Formula: see text] and [Formula: see text]. We obtain sharp upper and lower bounds of [Formula: see text], [Formula: see text], [Formula: see text] and [Formula: see text] for a graph [Formula: see text] of order [Formula: see text]. Some graph classes attaining these bounds are also given.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90752123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Nordhaus–Gaddum-Type Results for the Strong Equitable Vertex k-Arboricity of Graphs 图的强公平顶点k-拟性的nordhaus - gaddum型结果
IF 0.7 Q4 Computer Science Pub Date : 2023-05-31 DOI: 10.1142/s0219265923500068
Zhiwei Guo
For a graph [Formula: see text] and positive integers [Formula: see text], [Formula: see text], a [Formula: see text]-tree-vertex coloring of [Formula: see text] refers to a [Formula: see text]-vertex coloring of [Formula: see text] satisfying every component of each induced subgraph generated by every set of vertices with the same color forms a tree with maximum degree not larger than [Formula: see text], and it is called equitable if the difference between the cardinalities of every pair of sets of vertices with the same color is at most [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of [Formula: see text], denoted by [Formula: see text], is defined as the least positive integer [Formula: see text] satisfying [Formula: see text], which admits an equitable [Formula: see text]-tree-vertex coloring for each integer [Formula: see text] with [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of a graph is very useful in graph theory applications such as load balance in parallel memory systems, constructing timetables and scheduling. In this paper, we present the tight upper and lower bounds on [Formula: see text] for an arbitrary graph [Formula: see text] with [Formula: see text] vertices and a given integer [Formula: see text] with [Formula: see text], and we characterize the extremal graphs [Formula: see text] with [Formula: see text], [Formula: see text], [Formula: see text], respectively. Based on the above extremal results, we further obtain the Nordhaus–Gaddum-type results for [Formula: see text] of graphs [Formula: see text] with [Formula: see text] vertices for a given integer [Formula: see text] with [Formula: see text].
对于图[公式:见文]和正整数[公式:见文]、[公式:见文],[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[公式:见文]的[顶点着色]满足由每一组相同颜色的顶点所生成的每一个诱导子图的每一个分量形成一棵最大度不大于[公式:如果每一对相同颜色的顶点集合的基数之差不超过[公式:见文本],则称为公平。强公平顶点[公式:见文]-[公式:见文]的树性,用[公式:见文]表示,定义为满足[公式:见文]的最小正整数[公式:见文],它允许每个整数[公式:见文]具有[公式:见文]的公平[公式:见文]-树顶点着色。图的强均衡顶点(公式:见文本)-树性在图论应用中非常有用,例如并行存储系统的负载平衡,构造时间表和调度。本文给出了具有[公式:见文]顶点的任意图[公式:见文]和具有[公式:见文]的给定整数[公式:见文]的紧上界和下界,并分别用[公式:见文]、[公式:见文]、[公式:见文]对极值图[公式:见文]进行了表征。在上述极值结果的基础上,我们进一步得到了给定整数[公式:见文]的顶点[公式:见文]与[公式:见文]的图[公式:见文]的[公式:见文]的[公式:见文]的[诺德豪斯-加德姆型结果。
{"title":"Nordhaus–Gaddum-Type Results for the Strong Equitable Vertex k-Arboricity of Graphs","authors":"Zhiwei Guo","doi":"10.1142/s0219265923500068","DOIUrl":"https://doi.org/10.1142/s0219265923500068","url":null,"abstract":"For a graph [Formula: see text] and positive integers [Formula: see text], [Formula: see text], a [Formula: see text]-tree-vertex coloring of [Formula: see text] refers to a [Formula: see text]-vertex coloring of [Formula: see text] satisfying every component of each induced subgraph generated by every set of vertices with the same color forms a tree with maximum degree not larger than [Formula: see text], and it is called equitable if the difference between the cardinalities of every pair of sets of vertices with the same color is at most [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of [Formula: see text], denoted by [Formula: see text], is defined as the least positive integer [Formula: see text] satisfying [Formula: see text], which admits an equitable [Formula: see text]-tree-vertex coloring for each integer [Formula: see text] with [Formula: see text]. The strong equitable vertex [Formula: see text]-arboricity of a graph is very useful in graph theory applications such as load balance in parallel memory systems, constructing timetables and scheduling. In this paper, we present the tight upper and lower bounds on [Formula: see text] for an arbitrary graph [Formula: see text] with [Formula: see text] vertices and a given integer [Formula: see text] with [Formula: see text], and we characterize the extremal graphs [Formula: see text] with [Formula: see text], [Formula: see text], [Formula: see text], respectively. Based on the above extremal results, we further obtain the Nordhaus–Gaddum-type results for [Formula: see text] of graphs [Formula: see text] with [Formula: see text] vertices for a given integer [Formula: see text] with [Formula: see text].","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74424181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 23 (2023) 作者索引第23卷(2023)
IF 0.7 Q4 Computer Science Pub Date : 2023-05-29 DOI: 10.1142/s0219265923990013
{"title":"Author Index Volume 23 (2023)","authors":"","doi":"10.1142/s0219265923990013","DOIUrl":"https://doi.org/10.1142/s0219265923990013","url":null,"abstract":"","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78759893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Big Data Analytics for Human Behavior Recognition in Wireless Sensor Network Based on Transfer Learning 基于迁移学习的无线传感器网络中人类行为识别的移动大数据分析
IF 0.7 Q4 Computer Science Pub Date : 2023-01-05 DOI: 10.1142/s0219265922420038
Zhexiong Cui, J. Ren
Big data analysis of human behavior can provide the basis and support for the application of various scenarios. Using sensors for human behavior analysis is an effective means of identification method, which is very valuable for research. To address the problems of low recognition accuracy, low recognition efficiency of traditional human behavior recognition (HBR) algorithms in complex scenes, in this paper, we propose an HBR algorithm for Mobile Big data analytics in wireless sensor network using improved transfer learning. First, different wireless sensors are fused to obtain human behavior mobile big data, and then by analyzing the importance of human behavior features (HBF), the dynamic change parameters of HBF extraction threshold are calculated. Second, combined with the dynamic change parameters of threshold, the HBF of complex scenes are extracted. Finally, the best classification function of human behavior in complex scenes is obtained by using the classification function of HBF in complex scenes. Human behavior in complex scenes is classified according to the HBF in the feature set. The HBR algorithm is designed by using the improved transfer learning network to realize the recognition of human behavior in complex scenes. The results show that the proposed algorithm can accurately recognize up to 22 HBF points, and can control the HBR time within 2 s. The human behavior false recognition rate of miscellaneous scenes is less than 10%. The recognition speed is above 10/s, and the recall rate can reach more than 98%, which improves the HBR ability of complex scenes.
人类行为的大数据分析可以为各种场景的应用提供依据和支撑。利用传感器进行人体行为分析是一种有效的识别手段,具有十分重要的研究价值。针对传统人类行为识别(HBR)算法在复杂场景下识别精度低、识别效率低等问题,提出了一种基于改进迁移学习的无线传感器网络移动大数据分析HBR算法。首先融合不同的无线传感器获取人体行为移动大数据,然后通过分析人体行为特征(HBF)的重要性,计算HBF提取阈值的动态变化参数。其次,结合阈值的动态变化参数,提取复杂场景的HBF;最后,利用复杂场景中HBF的分类函数,得到复杂场景中人类行为的最佳分类函数。根据特征集中的HBF对复杂场景中的人类行为进行分类。利用改进的迁移学习网络设计了HBR算法,实现了复杂场景下人类行为的识别。结果表明,该算法可以准确识别多达22个HBF点,并将HBR时间控制在2 s以内。人类行为对杂项场景的错误识别率小于10%。识别速度在10/s以上,召回率可达98%以上,提高了复杂场景的HBR能力。
{"title":"Mobile Big Data Analytics for Human Behavior Recognition in Wireless Sensor Network Based on Transfer Learning","authors":"Zhexiong Cui, J. Ren","doi":"10.1142/s0219265922420038","DOIUrl":"https://doi.org/10.1142/s0219265922420038","url":null,"abstract":"Big data analysis of human behavior can provide the basis and support for the application of various scenarios. Using sensors for human behavior analysis is an effective means of identification method, which is very valuable for research. To address the problems of low recognition accuracy, low recognition efficiency of traditional human behavior recognition (HBR) algorithms in complex scenes, in this paper, we propose an HBR algorithm for Mobile Big data analytics in wireless sensor network using improved transfer learning. First, different wireless sensors are fused to obtain human behavior mobile big data, and then by analyzing the importance of human behavior features (HBF), the dynamic change parameters of HBF extraction threshold are calculated. Second, combined with the dynamic change parameters of threshold, the HBF of complex scenes are extracted. Finally, the best classification function of human behavior in complex scenes is obtained by using the classification function of HBF in complex scenes. Human behavior in complex scenes is classified according to the HBF in the feature set. The HBR algorithm is designed by using the improved transfer learning network to realize the recognition of human behavior in complex scenes. The results show that the proposed algorithm can accurately recognize up to 22 HBF points, and can control the HBR time within 2 s. The human behavior false recognition rate of miscellaneous scenes is less than 10%. The recognition speed is above 10/s, and the recall rate can reach more than 98%, which improves the HBR ability of complex scenes.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2023-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73336443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Scale Segmentation Method of Remote Sensing Big Data Image Using Deep Learning 基于深度学习的遥感大数据图像多尺度分割方法
IF 0.7 Q4 Computer Science Pub Date : 2022-12-31 DOI: 10.1142/s021926592242004x
Huiping Li
Remote sensing image (RSI) segmentation is an effective method to interpret remote sensing information and an important means of remote sensing data information processing. Traditional RSI segmentation methods have some problems such as poor segmentation accuracy and low similarity difference measurement. Therefore, we propose a multi-scale segmentation (MSS) method for remote sensing big data image. First, the segmentation scale of RSI is divided, and the quantitative value of histogram band is used to calculate the similarity index between different objects; Second, the parameters in the same spot are improved based on the maximum area method to determine the shape factor of RSI; Finally, the object closure model is established to clarify the region conversion cost, and the RSI is dynamically segmented based on Multi-scale convolutional neural networks; The MSS algorithm of RSI is designed, and the MSS method of RSI is obtained. The results show that the maximum similarity difference measure of the proposed method is 0.648, and the similarity difference measure always remains the largest. The maximum recall of RSI is 0.954, and the highest recall is 0.988, indicating that the RSI segmentation accuracy of the proposed method is good.
遥感图像分割是遥感信息解译的一种有效方法,是遥感数据信息处理的重要手段。传统的RSI分割方法存在分割精度差、相似性差度量低等问题。为此,我们提出了一种遥感大数据图像的多尺度分割(MSS)方法。首先对RSI分割尺度进行划分,利用直方图频带的定量值计算不同对象之间的相似度指数;其次,基于最大面积法对同一点的参数进行改进,确定RSI形状因子;最后,建立目标闭合模型,明确区域转换代价,并基于多尺度卷积神经网络对RSI进行动态分割;设计了RSI的MSS算法,得到了RSI的MSS方法。结果表明,该方法的最大相似差测度为0.648,相似差测度始终保持最大。RSI的最大召回率为0.954,最高召回率为0.988,表明本文方法的RSI分割准确率较好。
{"title":"Multi-Scale Segmentation Method of Remote Sensing Big Data Image Using Deep Learning","authors":"Huiping Li","doi":"10.1142/s021926592242004x","DOIUrl":"https://doi.org/10.1142/s021926592242004x","url":null,"abstract":"Remote sensing image (RSI) segmentation is an effective method to interpret remote sensing information and an important means of remote sensing data information processing. Traditional RSI segmentation methods have some problems such as poor segmentation accuracy and low similarity difference measurement. Therefore, we propose a multi-scale segmentation (MSS) method for remote sensing big data image. First, the segmentation scale of RSI is divided, and the quantitative value of histogram band is used to calculate the similarity index between different objects; Second, the parameters in the same spot are improved based on the maximum area method to determine the shape factor of RSI; Finally, the object closure model is established to clarify the region conversion cost, and the RSI is dynamically segmented based on Multi-scale convolutional neural networks; The MSS algorithm of RSI is designed, and the MSS method of RSI is obtained. The results show that the maximum similarity difference measure of the proposed method is 0.648, and the similarity difference measure always remains the largest. The maximum recall of RSI is 0.954, and the highest recall is 0.988, indicating that the RSI segmentation accuracy of the proposed method is good.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79319980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network 基于无线传感器网络的入侵者检测节能模型
IF 0.7 Q4 Computer Science Pub Date : 2022-12-19 DOI: 10.1142/s0219265921490025
Ashok Kumar Rai, A. K. Daniel
A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network’s confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters.
无线传感器网络(WSN)可用于各种目的,包括区域监控、医疗保健、智能城市和国防。在这些应用程序中出现了许多复杂的问题,包括能源效率、覆盖范围和入侵者检测。在各种无线传感器网络应用中,入侵检测一直是一个重要的障碍。它会导致数据融合,危及网络的机密性、寿命和覆盖范围。针对入侵检测提出了各种算法,其中每个节点作为代理,或者部署一些监控节点进行入侵检测。该协议通过从簇头(CH)向所有节点发送一个已知比特来检测入侵者。法律节点必须向CH承认其身份,以使其有效;否则,如果CH从节点收到错误的确认或根本没有收到确认,则它是入侵者。提出的协议有助于保护传感器数据免受未经授权的访问,并通过其他合法节点的身份检测入侵者的位置。仿真结果表明,该协议对不同参数下的入侵者具有较好的识别效果。
{"title":"Energy-Efficient Model for Intruder Detection Using Wireless Sensor Network","authors":"Ashok Kumar Rai, A. K. Daniel","doi":"10.1142/s0219265921490025","DOIUrl":"https://doi.org/10.1142/s0219265921490025","url":null,"abstract":"A wireless sensor network (WSN) can be used for various purposes, including area monitoring, health care, smart cities, and defence. Numerous complex issues arise in these applications, including energy efficiency, coverage, and intruder detection. Intruder detection is a significant obstacle in various wireless sensor network applications. It causes data fusion that jeopardizes the network’s confidentiality, lifespan, and coverage. Various algorithm has been proposed for intruder detection where each node act as an agent, or some monitoring nodes are deployed for intruder detection. The proposed protocol detects intruders by transmitting a known bit from the Cluster Head (CH) to all nodes. The legal nodes must acknowledge their identification to the CH in order to be valid; otherwise, if the CH receives an incorrect acknowledgement from a node or receives no acknowledgement at all, it is an intruder. The proposed protocol assists in protecting sensor data from unauthorized access and detecting the intruder with its location through the identity of other legal nodes. The simulation results show that the proposed protocol delivers better results for identifying intruders for various parameters.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80413299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data-Driven Information Management Method of Power Supply Chains Using Mobile Cloud Computing 基于移动云计算的电力供应链数据驱动信息管理方法
IF 0.7 Q4 Computer Science Pub Date : 2022-11-21 DOI: 10.1142/s0219265922420026
Ma Jingze, Zhan Guoye, Yang Fan, Chen Xingpei
Based on the spring, spring MVC and MyBatis structures of the cloud platform SSM framework, an information management platform for power grid material supply chain is built. The data layer uses a variety of sensors to collect power grid material supply chain information, and the information is fed back to the data storage layer after being integrated by the logical reorganization function of the persistence layer. The data storage layer uses the multi-sensor supply chain information fusion method based on paste progress to fuse the information and store it in the database. The business logic layer calls the information in the database and uses the improved k-means clustering algorithm to detect the abnormal supply chain data information. After calculation and data control by the control layer, the data management results are displayed through the presentation layer. The experimental results show that the absolute error of data fusion is very low. It can effectively cluster data information and distinguish outlier anomaly information at the same time, and the effect of information management is good.
基于云平台SSM框架的spring、spring MVC和MyBatis结构,构建了电网物资供应链信息管理平台。数据层利用多种传感器采集电网物资供应链信息,通过持久层的逻辑重组功能进行整合后反馈给数据存储层。数据存储层采用基于粘贴进度的多传感器供应链信息融合方法,将信息融合存储在数据库中。业务逻辑层调用数据库中的信息,使用改进的k-means聚类算法检测异常的供应链数据信息。经过控制层的计算和数据控制,数据管理结果通过表示层显示出来。实验结果表明,数据融合的绝对误差很低。该方法既能有效地聚类数据信息,又能区分离群异常信息,信息管理效果好。
{"title":"Data-Driven Information Management Method of Power Supply Chains Using Mobile Cloud Computing","authors":"Ma Jingze, Zhan Guoye, Yang Fan, Chen Xingpei","doi":"10.1142/s0219265922420026","DOIUrl":"https://doi.org/10.1142/s0219265922420026","url":null,"abstract":"Based on the spring, spring MVC and MyBatis structures of the cloud platform SSM framework, an information management platform for power grid material supply chain is built. The data layer uses a variety of sensors to collect power grid material supply chain information, and the information is fed back to the data storage layer after being integrated by the logical reorganization function of the persistence layer. The data storage layer uses the multi-sensor supply chain information fusion method based on paste progress to fuse the information and store it in the database. The business logic layer calls the information in the database and uses the improved k-means clustering algorithm to detect the abnormal supply chain data information. After calculation and data control by the control layer, the data management results are displayed through the presentation layer. The experimental results show that the absolute error of data fusion is very low. It can effectively cluster data information and distinguish outlier anomaly information at the same time, and the effect of information management is good.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72393174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective 基于信任的智能设备互联网识别与认证许可区块链网络:电子商务展望
IF 0.7 Q4 Computer Science Pub Date : 2022-10-13 DOI: 10.1142/s0219265922430010
E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh
The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.
物联网指的是我们周围数十亿台连接到无线互联网的设备。这些物联网设备是内存受限的设备,可以在没有人工帮助的情况下通过网络收集和传输数据。最近,物联网在零售商业中实现,从识别服务向购后参与服务转变。零售商业中的物联网示例包括智能冰箱、智能扬声器、智能洗衣机、智能汽车以及使用RFID标签的杂货自动再购买。尽管有所上升,但减缓快速适应的一个重大不便是这些设备的“安全性”,容易受到各种攻击。其中一种攻击是针对离线或在线敏感数据的分布式拒绝服务(DDoS)攻击。因此,需要一种轻量级的加密机制来建立物联网设备之间的安全通信。本文提出了使用许可的区块链网络来保护物联网设备之间通信的解决方案。具体来说,在这项工作中,我们提出了一种使用椭圆曲线加密(ECC)协议识别和认证智能设备的机制。这项提议的工作使用许可的区块链基础设施,作为信任的来源,帮助使用ECC密码系统的身份验证过程。此外,轻量级的物理不可克隆功能(PUF)技术也用于安全存储设备的密钥。使用这种技术,私钥不需要存储在任何地方,而是在需要私钥时从可信区域动态生成。
{"title":"Trust-Based Permissioned Blockchain Network for Identification and Authentication of Internet of Smart Devices: An E-Commerce Prospective","authors":"E. Babu, Ilaiah Kavati, Ramalingaswamy Cheruku, Soumyabrata Nayak, Uttam Ghosh","doi":"10.1142/s0219265922430010","DOIUrl":"https://doi.org/10.1142/s0219265922430010","url":null,"abstract":"The Internet of Things refers to billions of devices around us connected to the wireless internet. These IoT devices are memory-constrained devices that can collect and transfer data over the network without human assistance. Recently, IoT is materialized in retail commerce, transforming from recognition service to post-purchase engagement service. IoT examples in retail commerce are smart refrigerators, smart speakers, smart washing machines, smart automobiles, and automatic re-purchase of groceries using RFID tags. Despite the rise, one of the significant inconveniences slowing rapid adaption is the “security” of these devices, which are vulnerable to various attacks. One such attack is Distributed Denial-of-Service (DDoS) attacks targeting offline or online sensitive data. Hence, a lightweight cryptographic mechanism needs to establish secure communication among IoT devices. This paper presents the solution to secure communication among IoT devices using a permissioned blockchain network. Specifically, in this work, we proposed a mechanism for identifying and authenticating the smart devices using the Elliptic-curve cryptography (ECC) protocol. This proposed work uses permissioned blockchain infrastructure, which acts as a source of trust that aids the authentication process using ECC cryptosystem. In addition, lightweight Physical Unclonable Function (PUF) technology is also used to securely store the device’s keys. Using this technology, the private keys need not be stored anywhere, but it is generated on the fly from the trusted zone whenever the private key is required.","PeriodicalId":53990,"journal":{"name":"JOURNAL OF INTERCONNECTION NETWORKS","volume":null,"pages":null},"PeriodicalIF":0.7,"publicationDate":"2022-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73697485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
JOURNAL OF INTERCONNECTION NETWORKS
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1