首页 > 最新文献

Concurrency and Computation-Practice & Experience最新文献

英文 中文
The quality evaluation system of ideological and political classroom teaching in universities based on GA-BP algorithm 基于GA-BP算法的高校思想政治课堂教学质量评价体系研究
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-23 DOI: 10.1002/cpe.8228
Guohua Jing

The advancement of teaching quality is an indispensable section of the reform and growth of universities, and ideological and political education has critical impact on ideological education. The quality of classroom education can provide data support for efficient development, and has crucial influence on achieving scientific, reasonable, and accurate evaluation of ideological and political teaching performance. Thus, a performance assessment system for ideological and political education in universities with genetic algorithm optimized neural network algorithm is put forward. First, based on existing teaching evaluation indicators and combined with actual situations, a targeted teaching quality evaluation system is proposed. Then, based on BP, an adaptive genetic algorithm is proposed for improvement, and the output results are improved using entropy method. The results indicated that the proposed model could reach its optimal state after 81 iterations in this study. In the fitting test, it reached 0.971. In actual testing, the average error was only 2.68, which was much bigger than the other three algorithms. Its accuracy was 2%–3.2% higher than that of the best existing algorithms. These results indicated that the method put forward in this study had better practical significance, lower error, more accurate evaluation results, and offered scientific data support for the education reform work of universities, which can better accelerate the development and construction of universities.

摘 要 提高教学质量是高校改革和发展不可或缺的环节,而思想政治教育对意识形态教育有着至关重要的影响。课堂教学质量能够为高校的高效发展提供数据支持,对实现思想政治教学绩效评价的科学性、合理性和准确性具有至关重要的影响。因此,提出了遗传算法优化神经网络算法的高校思想政治教育绩效评价体系。首先,在现有教学评价指标的基础上,结合实际情况,提出有针对性的教学质量评价体系。然后,基于 BP,提出自适应遗传算法进行改进,并利用熵法对输出结果进行改进。结果表明,本研究提出的模型经过 81 次迭代后达到了最优状态。在拟合测试中,它达到了 0.971。在实际测试中,平均误差仅为 2.68,远大于其他三种算法。其准确率比现有最佳算法高出 2%-3.2%。这些结果表明,本研究提出的方法具有较好的实际意义,误差较小,评价结果较为准确,为高校的教育改革工作提供了科学的数据支持,能更好地加快高校的发展与建设。
{"title":"The quality evaluation system of ideological and political classroom teaching in universities based on GA-BP algorithm","authors":"Guohua Jing","doi":"10.1002/cpe.8228","DOIUrl":"10.1002/cpe.8228","url":null,"abstract":"<div>\u0000 \u0000 <p>The advancement of teaching quality is an indispensable section of the reform and growth of universities, and ideological and political education has critical impact on ideological education. The quality of classroom education can provide data support for efficient development, and has crucial influence on achieving scientific, reasonable, and accurate evaluation of ideological and political teaching performance. Thus, a performance assessment system for ideological and political education in universities with genetic algorithm optimized neural network algorithm is put forward. First, based on existing teaching evaluation indicators and combined with actual situations, a targeted teaching quality evaluation system is proposed. Then, based on BP, an adaptive genetic algorithm is proposed for improvement, and the output results are improved using entropy method. The results indicated that the proposed model could reach its optimal state after 81 iterations in this study. In the fitting test, it reached 0.971. In actual testing, the average error was only 2.68, which was much bigger than the other three algorithms. Its accuracy was 2%–3.2% higher than that of the best existing algorithms. These results indicated that the method put forward in this study had better practical significance, lower error, more accurate evaluation results, and offered scientific data support for the education reform work of universities, which can better accelerate the development and construction of universities.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 23","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Label distribution feature selection based on neighborhood rough set 基于邻域粗糙集的标签分布特征选择
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-22 DOI: 10.1002/cpe.8236
Yilin Wu, Wenzhong Guo, Yaojin Lin

In label distribution learning (LDL), an instance is involved with many labels in different importance degrees, and the feature space of instances is accompanied with thousands of redundant and/or irrelevant features. Therefore, the main characteristic of feature selection in LDL is to evaluate the ability of each feature. Motivated by neighborhood rough set (NRS), which can be used to measure the dependency degree of feature via constructing neighborhood relations on feature space and label space, respectively, this article proposes a novel label distribution feature selection method. In this article, the neighborhood class of instance in label distribution space is defined, which is beneficial to recognize the logical class of target instance. Then, a new NRS model for LDL is proposed. Specially, the dependency degree of feature combining label weight is defined. Finally, a label distribution feature selection based on NRS is presented. Extensive experiments on 12 data sets show the effectiveness of the proposed algorithm.

摘要在标签分布学习(LDL)中,一个实例会涉及许多重要程度不同的标签,而实例的特征空间则伴随着成千上万的冗余和/或无关特征。因此,LDL 中特征选择的主要特点是评估每个特征的能力。受邻域粗糙集(NRS)的启发,本文提出了一种新颖的标签分布特征选择方法。本文定义了实例在标签分布空间中的邻类,这有利于识别目标实例的逻辑类。然后,提出了一种新的 LDL NRS 模型。特别是,定义了特征结合标签权重的依赖程度。最后,提出了一种基于 NRS 的标签分布特征选择方法。在 12 个数据集上进行的大量实验表明了所提算法的有效性。
{"title":"Label distribution feature selection based on neighborhood rough set","authors":"Yilin Wu,&nbsp;Wenzhong Guo,&nbsp;Yaojin Lin","doi":"10.1002/cpe.8236","DOIUrl":"10.1002/cpe.8236","url":null,"abstract":"<div>\u0000 \u0000 <p>In label distribution learning (LDL), an instance is involved with many labels in different importance degrees, and the feature space of instances is accompanied with thousands of redundant and/or irrelevant features. Therefore, the main characteristic of feature selection in LDL is to evaluate the ability of each feature. Motivated by neighborhood rough set (NRS), which can be used to measure the dependency degree of feature via constructing neighborhood relations on feature space and label space, respectively, this article proposes a novel label distribution feature selection method. In this article, the neighborhood class of instance in label distribution space is defined, which is beneficial to recognize the logical class of target instance. Then, a new NRS model for LDL is proposed. Specially, the dependency degree of feature combining label weight is defined. Finally, a label distribution feature selection based on NRS is presented. Extensive experiments on 12 data sets show the effectiveness of the proposed algorithm.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 23","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141779634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing HPE Slingshot 11 support to Open MPI 将 HPE Slingshot 11 支持引入 Open MPI
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-18 DOI: 10.1002/cpe.8203
Amir Shehata, Thomas Naughton, David E. Bernholdt, Howard Pritchard

The Cray HPE Slingshot 11 network is used on the new exascale systems arriving at the U.S. Department of Energy (DoE) laboratories (e.g., Frontier, Aurora, Perlmutter). As such, the support of this network is an important capability to meet the needs of exascale applications. This article highlights recent work to develop supporting infrastructure to enable Open MPI to efficiently support these new platforms. A key component of this effort involves development of a new Open Fabrics Interface (OFI) provider, LinkX. We discuss the design and development of enhancements that take advantage of the new Slingshot 11 network and AMD GPUs. We include performance data from tests on the Frontier supercomputer using synthetic communication benchmarks, and the vendor provided MPI as a baseline for comparison. The tests demonstrate full functionality of Open MPI on the system and initial results show favorable performance when compared to the highly tuned vendor implementation.

摘要 Cray HPE Slingshot 11 网络用于美国能源部 (DoE) 实验室的新型超大规模系统(如 Frontier、Aurora 和 Perlmutter)。因此,对该网络的支持是满足超大规模应用需求的一项重要能力。本文重点介绍了为使 Open MPI 能够有效支持这些新平台而开发支持性基础设施的最新工作。这项工作的一个关键组成部分是开发新的开放 Fabrics 接口 (OFI) 提供商 LinkX。我们将讨论利用新的 Slingshot 11 网络和 AMD GPU 的增强功能的设计和开发。其中包括在 Frontier 超级计算机上使用合成通信基准测试的性能数据,以及供应商提供的 MPI 作为比较基准。测试证明了 Open MPI 在该系统上的全部功能,与经过高度调整的供应商实现相比,初步结果显示了良好的性能。
{"title":"Bringing HPE Slingshot 11 support to Open MPI","authors":"Amir Shehata,&nbsp;Thomas Naughton,&nbsp;David E. Bernholdt,&nbsp;Howard Pritchard","doi":"10.1002/cpe.8203","DOIUrl":"10.1002/cpe.8203","url":null,"abstract":"<div>\u0000 \u0000 <p>The Cray HPE Slingshot 11 network is used on the new exascale systems arriving at the U.S. Department of Energy (DoE) laboratories (e.g., <i>Frontier</i>, <i>Aurora</i>, <i>Perlmutter</i>). As such, the support of this network is an important capability to meet the needs of exascale applications. This article highlights recent work to develop supporting infrastructure to enable Open MPI to efficiently support these new platforms. A key component of this effort involves development of a new Open Fabrics Interface (OFI) provider, <i>LinkX</i>. We discuss the design and development of enhancements that take advantage of the new Slingshot 11 network and AMD GPUs. We include performance data from tests on the <i>Frontier</i> supercomputer using synthetic communication benchmarks, and the vendor provided MPI as a baseline for comparison. The tests demonstrate full functionality of Open MPI on the system and initial results show favorable performance when compared to the highly tuned vendor implementation.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving reading performance by file prefetching mechanism in distributed cache systems 通过分布式缓存系统中的文件预取机制提高读取性能
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-17 DOI: 10.1002/cpe.8215
Jing Gui, Yongbin Wang, Wuyue Shuai

Distributed cache systems are utilized to enhance I/O performance between computing applications and storage systems. However, the traditional file access predictors employed in these cache systems are only suitable for workloads with simple file access patterns, rendering them inadequate for the complex access patterns found in big data computing scenarios. In this article, we propose a file access predictor (DFAP) based on WaveNet, which has exhibited promising results in file access tasks when compared to other baseline models. Cache systems are often constrained by limited cache space due to cost, cluster size, and other factors. In big data scenarios, cached data and prefetched data often compete for limited space. To address this issue, we introduce a cache prefetching algorithm (CBAP) for cache systems, which is based on cost-benefit analysis to improve cache utilization. Furthermore, we implement a novel file prefetching framework on Alluxio, which accelerates computing jobs by up to 18%.

摘要分布式缓存系统可用于提高计算应用和存储系统之间的 I/O 性能。然而,这些缓存系统中使用的传统文件访问预测器只适用于文件访问模式简单的工作负载,无法满足大数据计算场景中复杂的访问模式。在本文中,我们提出了一种基于 WaveNet 的文件访问预测器(DFAP),与其他基线模型相比,该预测器在文件访问任务中表现出了良好的效果。由于成本、集群规模等因素,缓存系统往往受到有限缓存空间的限制。在大数据场景中,缓存数据和预取数据经常会争夺有限的空间。为解决这一问题,我们为缓存系统引入了基于成本效益分析的缓存预取算法(CBAP),以提高缓存利用率。此外,我们还在 Alluxio 上实现了一种新颖的文件预取框架,可将计算作业的速度提高 18%。
{"title":"Improving reading performance by file prefetching mechanism in distributed cache systems","authors":"Jing Gui,&nbsp;Yongbin Wang,&nbsp;Wuyue Shuai","doi":"10.1002/cpe.8215","DOIUrl":"10.1002/cpe.8215","url":null,"abstract":"<div>\u0000 \u0000 <p>Distributed cache systems are utilized to enhance I/O performance between computing applications and storage systems. However, the traditional file access predictors employed in these cache systems are only suitable for workloads with simple file access patterns, rendering them inadequate for the complex access patterns found in big data computing scenarios. In this article, we propose a file access predictor (DFAP) based on WaveNet, which has exhibited promising results in file access tasks when compared to other baseline models. Cache systems are often constrained by limited cache space due to cost, cluster size, and other factors. In big data scenarios, cached data and prefetched data often compete for limited space. To address this issue, we introduce a cache prefetching algorithm (CBAP) for cache systems, which is based on cost-benefit analysis to improve cache utilization. Furthermore, we implement a novel file prefetching framework on Alluxio, which accelerates computing jobs by up to 18%.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743573","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The application of IGA in urban landscape design optimization IGA 在城市景观设计优化中的应用
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-16 DOI: 10.1002/cpe.8227
Linyu Liu, Raziah Ahmad, Suriati Ahmad, Xuejie Wang

The foundation of urban landscape design optimization is the precise evaluation of the effectiveness. To address the issues of strong subjectivity, low efficiency, and poor accuracy in urban landscape design evaluation methods, an intelligent evaluation method combining improved genetic algorithm and error backpropagation neural network is proposed. First, based on Maslow's demand theory and questionnaire survey results, it selects indicators to construct an evaluation index system for urban landscape design. Second, in response to the performance defects of the error backpropagation neural network model, the moth flame algorithm is used to optimize it. Then, in response to the defect that the optimization effect of the moth flame algorithm is not ideal enough, a multiple strategy including improved genetic algorithm is adopted to optimize it. Finally, an urban landscape design evaluation model is constructed based on improved error backpropagation neural network. The experimental results show that the fitting coefficient of the model is 0.9523, with a minimum deviation of less than 1%. The above results indicate that the proposed model can effectively improve the accuracy and efficiency of urban landscape design evaluation, providing data support for urban landscape design optimization. The research on the intelligent development of urban landscape design is of reference significance and has to some extent promoted the development of urban landscape design.

摘要 城市景观设计优化的基础是效果的精确评价。针对城市景观设计评价方法主观性强、效率低、准确性差等问题,提出了一种改进遗传算法与误差反向传播神经网络相结合的智能评价方法。首先,基于马斯洛需求理论和问卷调查结果,选取指标构建城市景观设计评价指标体系。其次,针对误差反向传播神经网络模型的性能缺陷,采用蛾焰算法对其进行优化。然后,针对蛾焰算法优化效果不够理想的缺陷,采用改进遗传算法等多种策略对其进行优化。最后,基于改进误差反向传播神经网络构建了城市景观设计评价模型。实验结果表明,模型的拟合系数为 0.9523,最小偏差小于 1%。以上结果表明,所提出的模型能有效提高城市景观设计评价的准确性和效率,为城市景观设计优化提供数据支持。城市景观设计智能化发展研究具有借鉴意义,在一定程度上推动了城市景观设计的发展。
{"title":"The application of IGA in urban landscape design optimization","authors":"Linyu Liu,&nbsp;Raziah Ahmad,&nbsp;Suriati Ahmad,&nbsp;Xuejie Wang","doi":"10.1002/cpe.8227","DOIUrl":"10.1002/cpe.8227","url":null,"abstract":"<div>\u0000 \u0000 <p>The foundation of urban landscape design optimization is the precise evaluation of the effectiveness. To address the issues of strong subjectivity, low efficiency, and poor accuracy in urban landscape design evaluation methods, an intelligent evaluation method combining improved genetic algorithm and error backpropagation neural network is proposed. First, based on Maslow's demand theory and questionnaire survey results, it selects indicators to construct an evaluation index system for urban landscape design. Second, in response to the performance defects of the error backpropagation neural network model, the moth flame algorithm is used to optimize it. Then, in response to the defect that the optimization effect of the moth flame algorithm is not ideal enough, a multiple strategy including improved genetic algorithm is adopted to optimize it. Finally, an urban landscape design evaluation model is constructed based on improved error backpropagation neural network. The experimental results show that the fitting coefficient of the model is 0.9523, with a minimum deviation of less than 1%. The above results indicate that the proposed model can effectively improve the accuracy and efficiency of urban landscape design evaluation, providing data support for urban landscape design optimization. The research on the intelligent development of urban landscape design is of reference significance and has to some extent promoted the development of urban landscape design.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141743572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network traffic classification based- masked language regression model using CNN 基于网络流量分类--使用 CNN 的屏蔽语言回归模型
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-15 DOI: 10.1002/cpe.8223
Steffi P. L., W. R. Sam Emmanuel, P. Arockia Jansi Rani

Network traffic classification task has become increasingly challenging. The objective behind this classification is to effectively handle bandwidth, prioritize certain types of traffic, enhance application performance, and more. In recent times, there has been a surge in exploring deep learning approaches for network traffic categorization. However, these models demand substantial volumes of training data. Additionally, many classification methods necessitate manual feature extraction, a process that is not only time-consuming but also laborious. Addressing the challenge of identifying optimal features to enhance classification accuracy, this work introduces a deep learning model designed for effective classification of network traffic. The model comprises the following key stages: (a) The dataset involves TCP flows captured from running different network stress and web crawling tools, (b) Pre-processing for removal of anomalies and noises using Label Encoder and OneHotEncoder, (c) The utilization of K-BERT for feature extraction aims to retrieve local spatial–temporal features, (d) feature selection using linear regression model (LASSO) and finally, and (e) The classification of network traffic involves neural network. The model serves to enhance the precision and efficiency of the classification mission. Through comprehensive experimental analysis, it was observed that the Masked Language-based Regression model surpassed other referenced models, achieving an exceptional accuracy of 0.97.

网络流量分类任务变得越来越具有挑战性。这种分类的目的是有效地处理带宽、优先处理某些类型的流量、提高应用性能等。近来,探索网络流量分类深度学习方法的热潮不断涌现。然而,这些模型需要大量的训练数据。此外,许多分类方法需要手动提取特征,这一过程不仅耗时,而且费力。为了应对识别最佳特征以提高分类准确性的挑战,这项工作引入了一种深度学习模型,旨在对网络流量进行有效分类。该模型包括以下关键阶段:(a)数据集涉及从运行不同网络压力和网络爬行工具中捕获的 TCP 流量;(b)使用标签编码器和 OneHotEncoder 进行预处理,以去除异常和噪音;(c)使用 K-BERT 进行特征提取,以检索局部时空特征;(d)使用线性回归模型(LASSO)进行特征选择;最后,(e)使用神经网络对网络流量进行分类。该模型可提高分类任务的精度和效率。通过综合实验分析发现,基于掩码语言的回归模型超越了其他参考模型,达到了 0.97 的超高准确率。
{"title":"Network traffic classification based- masked language regression model using CNN","authors":"Steffi P. L.,&nbsp;W. R. Sam Emmanuel,&nbsp;P. Arockia Jansi Rani","doi":"10.1002/cpe.8223","DOIUrl":"10.1002/cpe.8223","url":null,"abstract":"<div>\u0000 \u0000 <p>Network traffic classification task has become increasingly challenging. The objective behind this classification is to effectively handle bandwidth, prioritize certain types of traffic, enhance application performance, and more. In recent times, there has been a surge in exploring deep learning approaches for network traffic categorization. However, these models demand substantial volumes of training data. Additionally, many classification methods necessitate manual feature extraction, a process that is not only time-consuming but also laborious. Addressing the challenge of identifying optimal features to enhance classification accuracy, this work introduces a deep learning model designed for effective classification of network traffic. The model comprises the following key stages: (a) The dataset involves TCP flows captured from running different network stress and web crawling tools, (b) Pre-processing for removal of anomalies and noises using Label Encoder and OneHotEncoder, (c) The utilization of K-BERT for feature extraction aims to retrieve local spatial–temporal features, (d) feature selection using linear regression model (LASSO) and finally, and (e) The classification of network traffic involves neural network. The model serves to enhance the precision and efficiency of the classification mission. Through comprehensive experimental analysis, it was observed that the Masked Language-based Regression model surpassed other referenced models, achieving an exceptional accuracy of 0.97.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141647743","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain based secret key management for trusted platform module standard in reconfigurable platform 基于区块链的密钥管理,用于可重构平台中的可信平台模块标准
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-12 DOI: 10.1002/cpe.8225
Rourab Paul, Nimisha Ghosh, Amrutanshu Panigrahi, Amlan Chakrabarti, Prasant Mohapatra

The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data, make it more important to keep secret keys safe and secure. A few major issues of secret keys, like incorrect use of keys, inappropriate storage of keys, inadequate protection of keys, insecure movement of keys, lack of audit logging, insider threats and nondestruction of keys can compromise the whole security system severely. In this work, we propose a field programmable gate array (FPGA)-based trusted platform module (TPM) framework for operating system companies and OS users, utilizing blockchain to address NIST-recommended secret key management issues. The security processor used in OS user machines is partitioned into three areas such that processor area, confidential area, and crypto area. The isolated secret key memory in confidential area, along with a private blockchain (BC) can log the life cycle of secret keys of TPM standard. We have also implemented a special custom bus interconnect, which receives custom crypto instructions from Processing Element (PE). During the execution of crypto instructions, the architecture ensures that secret keys are present in confidential area and crypto area but never in the processor area. The movements of secret keys between confidential area, and crypto area are recorded cryptographically after the proper authentication process controlled by the proposed hardware-based private BC framework. To the best of our knowledge, this work is the first attempt to implement a blockchain-based framework between OS company and OS users to address NIST recommended secret key management issues of TPM standard hardware environment. The additional cost of resource usage and timing complexity we spent to implement the proposed idea is nominal. The proposed architecture is implemented with Xilinx Vivado$$ Vivado $$ EDA tool using Artix7$$ Artixkern0.3em 7 $$ FPGA board.

摘要日益复杂的网络攻击、高级计算系统中的漏洞以及对加密技术保护数字数据的日益依赖,使得密钥的安全和保密变得更加重要。密钥的几个主要问题,如密钥使用不当、密钥存储不当、密钥保护不足、密钥移动不安全、缺乏审计记录、内部威胁和密钥未销毁等,都会严重破坏整个安全系统。在这项工作中,我们为操作系统公司和操作系统用户提出了一个基于现场可编程门阵列(FPGA)的可信平台模块(TPM)框架,利用区块链来解决 NIST 推荐的密钥管理问题。操作系统用户机器使用的安全处理器分为三个区域,如处理器区、保密区和加密区。保密区中的隔离秘钥存储器与私有区块链(BC)一起,可以记录 TPM 标准秘钥的生命周期。我们还实现了一个特殊的自定义总线互连,用于接收来自处理元件(PE)的自定义加密指令。在执行加密指令期间,该架构可确保秘钥存在于保密区和加密区,但绝不会存在于处理器区。密钥在保密区和加密区之间的移动,在经过由建议的基于硬件的私有 BC 框架控制的适当验证过程后,会以加密方式记录下来。据我们所知,这项工作是首次尝试在操作系统公司和操作系统用户之间实施基于区块链的框架,以解决 TPM 标准硬件环境中 NIST 推荐的秘钥管理问题。我们为实现所提出的想法而花费的额外资源使用成本和时序复杂性微不足道。我们使用 Xilinx EDA 工具和 FPGA 板实现了所提出的架构。
{"title":"Blockchain based secret key management for trusted platform module standard in reconfigurable platform","authors":"Rourab Paul,&nbsp;Nimisha Ghosh,&nbsp;Amrutanshu Panigrahi,&nbsp;Amlan Chakrabarti,&nbsp;Prasant Mohapatra","doi":"10.1002/cpe.8225","DOIUrl":"10.1002/cpe.8225","url":null,"abstract":"<div>\u0000 \u0000 <p>The growing sophistication of cyber attacks, vulnerabilities in high computing systems and increasing dependency on cryptography to protect our digital data, make it more important to keep secret keys safe and secure. A few major issues of secret keys, like incorrect use of keys, inappropriate storage of keys, inadequate protection of keys, insecure movement of keys, lack of audit logging, insider threats and nondestruction of keys can compromise the whole security system severely. In this work, we propose a field programmable gate array (FPGA)-based trusted platform module (TPM) framework for operating system companies and OS users, utilizing blockchain to address NIST-recommended secret key management issues. The security processor used in OS user machines is partitioned into three areas such that <i>processor area</i>, <i>confidential area</i>, and <i>crypto area</i>. The isolated secret key memory in <i>confidential area</i>, along with a private blockchain (BC) can log the life cycle of secret keys of TPM standard. We have also implemented a special custom bus interconnect, which receives custom crypto instructions from Processing Element (PE). During the execution of crypto instructions, the architecture ensures that secret keys are present in <i>confidential area</i> and <i>crypto area</i> but never in the <i>processor area</i>. The movements of secret keys between <i>confidential area</i>, and <i>crypto area</i> are recorded cryptographically after the proper authentication process controlled by the proposed hardware-based private BC framework. To the best of our knowledge, this work is the first attempt to implement a blockchain-based framework between OS company and OS users to address NIST recommended secret key management issues of TPM standard hardware environment. The additional cost of resource usage and timing complexity we spent to implement the proposed idea is nominal. The proposed architecture is implemented with Xilinx <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>V</mi>\u0000 <mi>i</mi>\u0000 <mi>v</mi>\u0000 <mi>a</mi>\u0000 <mi>d</mi>\u0000 <mi>o</mi>\u0000 </mrow>\u0000 <annotation>$$ Vivado $$</annotation>\u0000 </semantics></math> EDA tool using <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>A</mi>\u0000 <mi>r</mi>\u0000 <mi>t</mi>\u0000 <mi>i</mi>\u0000 <mi>x</mi>\u0000 <mspace></mspace>\u0000 <mn>7</mn>\u0000 </mrow>\u0000 <annotation>$$ Artixkern0.3em 7 $$</annotation>\u0000 </semantics></math> FPGA board.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610171","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-population artificial bee colony algorithm for many-objective cascade reservoir scheduling 多目标级联水库调度的多群体人工蜂群算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-11 DOI: 10.1002/cpe.8221
Shuai Wang, Hui Wang, Futao Liao, Zichen Wei, Min Hu

Artificial bee colony (ABC) is a popular intelligent algorithm that is widely applied to many optimization problems. However, it is challenging for ABC to solve many-objective optimization problems (MaOPs). To tackle this issue, this article proposes a many-objective ABC based on multi-population (called MMaOABC) for MaOPs. In MMaOABC, the population is divided into multiple sub-populations, and each sub-population optimizes one objective. Three search strategies are constructed based on multiple sub-populations to improve convergence and diversity. In the employed bee stage, some excellent solutions in multiple sub-populations are used to guide the convergence. In the onlooker bee stage, new selection probabilities based on diversity metrics are designed to enhance the diversity. Dimensional learning is introduced in the scout bee stage to avoid falling into local minimum. In addition, environmental selection and external archives are utilized for communications among sub-populations. To validate the performance of MMaOABC, two benchmark sets (DTLZ and MaF) with 3, 5, 8, and 15 objectives are tested. Computational results show that MMaOABC is competitive when compared with seven other many-objective evolutionary algorithms (MaOEAs). Finally, MMaOABC is applied to many-objective cascade reservoir scheduling. Simulation results show that MMaOABC still obtains promising performance.

摘要 人工蜂群(ABC)是一种流行的智能算法,被广泛应用于许多优化问题。然而,要解决多目标优化问题(MaOPs)对人工蜂群来说是一个挑战。为了解决这个问题,本文提出了一种基于多群体的多目标 ABC(称为 MMaOABC)来解决 MaOPs。在 MMaOABC 中,种群被分为多个子种群,每个子种群优化一个目标。为了提高收敛性和多样性,基于多个子群构建了三种搜索策略。在受雇蜜蜂阶段,利用多个子群中的一些优秀解来引导收敛。在观察蜂阶段,设计了基于多样性指标的新选择概率,以提高多样性。在侦察蜂阶段引入了维度学习,以避免陷入局部最小值。此外,还利用环境选择和外部档案进行子群之间的交流。为了验证 MMaOABC 的性能,测试了两个基准集(DTLZ 和 MaF),目标分别为 3、5、8 和 15。计算结果表明,与其他七种多目标进化算法(MaOEAs)相比,MMaOABC具有很强的竞争力。最后,MMaOABC 被应用于多目标级联水库调度。仿真结果表明,MMaOABC仍然获得了可喜的性能。
{"title":"Multi-population artificial bee colony algorithm for many-objective cascade reservoir scheduling","authors":"Shuai Wang,&nbsp;Hui Wang,&nbsp;Futao Liao,&nbsp;Zichen Wei,&nbsp;Min Hu","doi":"10.1002/cpe.8221","DOIUrl":"10.1002/cpe.8221","url":null,"abstract":"<div>\u0000 \u0000 <p>Artificial bee colony (ABC) is a popular intelligent algorithm that is widely applied to many optimization problems. However, it is challenging for ABC to solve many-objective optimization problems (MaOPs). To tackle this issue, this article proposes a many-objective ABC based on multi-population (called MMaOABC) for MaOPs. In MMaOABC, the population is divided into multiple sub-populations, and each sub-population optimizes one objective. Three search strategies are constructed based on multiple sub-populations to improve convergence and diversity. In the employed bee stage, some excellent solutions in multiple sub-populations are used to guide the convergence. In the onlooker bee stage, new selection probabilities based on diversity metrics are designed to enhance the diversity. Dimensional learning is introduced in the scout bee stage to avoid falling into local minimum. In addition, environmental selection and external archives are utilized for communications among sub-populations. To validate the performance of MMaOABC, two benchmark sets (DTLZ and MaF) with 3, 5, 8, and 15 objectives are tested. Computational results show that MMaOABC is competitive when compared with seven other many-objective evolutionary algorithms (MaOEAs). Finally, MMaOABC is applied to many-objective cascade reservoir scheduling. Simulation results show that MMaOABC still obtains promising performance.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MBB-YOLO: A comprehensively improved lightweight algorithm for crowded object detection MBB-YOLO:全面改进的拥挤物体检测轻量级算法
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-10 DOI: 10.1002/cpe.8219
Junguo Liao, Haonan Tian

Object detection in crowded scenes involves various difficulties, such as small objects, occluded objects, and insufficient features. Existing models for crowded object detection often focus on only one detection difficulty, and they are too large to be applied in practice. To address the diverse challenges of object detection in crowded scenes, we construct a lightweight crowded object detector called MBB-YOLO, which contains several modules for comprehensive improvement. To improve the network's ability to extract fine-grained features, we use SPD-Conv and the proposed MS-Conv to replace the strided convolution in the network. An bi-branch multi-scale convolution attention (BMCA) module is proposed to aggregate multi-scale contextual information. We also propose boundary-NMS to better identify proposal boxes from different objects, which reduces suppression errors caused by object occlusion. MBB-YOLO achieves 87.6% AP and an inference speed of 78.8 FPS on the CrowdHuman dataset, which surpasses other mainstream lightweight object detectors.

摘要拥挤场景中的物体检测涉及各种困难,如小物体、遮挡物体和特征不足等。现有的拥挤物体检测模型往往只关注一个检测难点,而且模型过于庞大,难以在实践中应用。为了解决拥挤场景中物体检测所面临的各种挑战,我们构建了一种名为 MBB-YOLO 的轻量级拥挤物体检测器,它包含多个模块,可进行全面改进。为了提高网络提取细粒度特征的能力,我们使用 SPD-Conv 和建议的 MS-Conv 来替代网络中的步进卷积。我们还提出了双分支多尺度卷积注意(BMCA)模块,以聚合多尺度上下文信息。我们还提出了边界注意(boundary-NMS),以更好地识别来自不同对象的提议框,从而减少对象遮挡造成的抑制误差。MBB-YOLO 在 CrowdHuman 数据集上实现了 87.6% 的 AP 和 78.8 FPS 的推理速度,超越了其他主流轻量级物体检测器。
{"title":"MBB-YOLO: A comprehensively improved lightweight algorithm for crowded object detection","authors":"Junguo Liao,&nbsp;Haonan Tian","doi":"10.1002/cpe.8219","DOIUrl":"10.1002/cpe.8219","url":null,"abstract":"<div>\u0000 \u0000 <p>Object detection in crowded scenes involves various difficulties, such as small objects, occluded objects, and insufficient features. Existing models for crowded object detection often focus on only one detection difficulty, and they are too large to be applied in practice. To address the diverse challenges of object detection in crowded scenes, we construct a lightweight crowded object detector called MBB-YOLO, which contains several modules for comprehensive improvement. To improve the network's ability to extract fine-grained features, we use SPD-Conv and the proposed MS-Conv to replace the strided convolution in the network. An bi-branch multi-scale convolution attention (BMCA) module is proposed to aggregate multi-scale contextual information. We also propose boundary-NMS to better identify proposal boxes from different objects, which reduces suppression errors caused by object occlusion. MBB-YOLO achieves 87.6% AP and an inference speed of 78.8 FPS on the CrowdHuman dataset, which surpasses other mainstream lightweight object detectors.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Leveraging generative adversarial networks for enhanced cryptographic key generation 利用生成式对抗网络增强密码密钥生成能力
IF 1.5 4区 计算机科学 Q3 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-07-10 DOI: 10.1002/cpe.8226
Purushottam Singh, Prashant Pranav, Shamama Anwar, Sandip Dutta

In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.

摘要在这项研究中,我们提出了一种利用生成对抗网络(GAN)生成密钥的创新方法,并通过默克尔树验证进行了增强,这标志着加密安全领域的重大进步。我们的方法成功生成了 6272 位的大型密钥,并使用 Dieharder 和 NIST 测试套件对随机性和可靠性进行了严格测试。这种开创性的方法将前沿的机器学习技术与传统的密码验证技术和谐地结合在一起,为数据加密和安全设定了新的标准。我们的研究结果不仅证明了 GANs 在生成高度安全的加密密钥方面的功效,而且还强调了默克尔树验证在确保这些密钥完整性方面的有效性。在我们的方法中集成默克尔树提供了一种有效验证大型生成密钥集真实性的方法。这项研究对未来的安全通信有着广泛的影响,为日益依赖数字安全的世界提供了一个强大的解决方案。机器学习与密码学原理的结合为研究和开发开辟了新途径,有望在数字威胁不断演变的时代加强安全措施。这项工作为密码学领域做出了重大贡献,为应对数字数据保护的挑战提供了新颖的视角和强大的解决方案。
{"title":"Leveraging generative adversarial networks for enhanced cryptographic key generation","authors":"Purushottam Singh,&nbsp;Prashant Pranav,&nbsp;Shamama Anwar,&nbsp;Sandip Dutta","doi":"10.1002/cpe.8226","DOIUrl":"10.1002/cpe.8226","url":null,"abstract":"<div>\u0000 \u0000 <p>In this research, we present an innovative cryptographic key generation method utilizing a Generative Adversarial Network (GAN), enhanced by Merkel tree verification, marking a significant advancement in cryptographic security. Our approach successfully generates a large 6272-bit key, rigorously tested for randomness and reliability using the Dieharder and NIST test suites. This groundbreaking method harmoniously blends cutting-edge machine learning techniques with traditional cryptographic verification, setting a new standard in data encryption and security. Our findings not only demonstrate the efficacy of GANs in producing highly secure cryptographic keys but also highlight the effectiveness of Merkel tree verification in ensuring the integrity of these keys. The integration of merkel tree in our method provides a means to efficiently verify the authenticity of the large generated key sets. This research has broad implications for the future of secure communications, providing a robust solution in a world increasingly reliant on digital security. The integration of machine learning and cryptographic principles opens up new avenues for research and development, promising to bolster security measures in an era where digital threats are constantly evolving. This work contributes significantly to the field of cryptography, offering a novel perspective and robust solutions to the challenges of digital data protection.</p>\u0000 </div>","PeriodicalId":55214,"journal":{"name":"Concurrency and Computation-Practice & Experience","volume":"36 22","pages":""},"PeriodicalIF":1.5,"publicationDate":"2024-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141610174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Concurrency and Computation-Practice & Experience
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1