首页 > 最新文献

自主智能(英文)最新文献

英文 中文
Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions 为第一类和第二类交易设计和实现使用增强椭圆曲线加密的安全文件传输协议
Pub Date : 2023-09-06 DOI: 10.32629/jai.v6i3.740
S. Sasi, Srividya Bharadwaj Venkata Subbu, Premkumar Manoharan, L. Abualigah
This research study introduces an ID-based identity authentication protocol that utilizes the enhanced elliptic curve digital signature algorithm, a cryptographic method developed on elliptic curve cryptography. The protocol enhances the Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), a pioneering protocol explicitly defined for distant space communications. This study employs both dependable and uncertain modes of the CFDP protocol. To make more secure data transactions, two key security risks are effectively mitigated in this research as a result of applying the proposed enhanced elliptic curve cryptography algorithm (ECC) over the ternary galois field. First, it thwarts the impersonation of a harmful entity during a passive attack. Second, it prevents masquerade attacks, further reinforcing the security of space data transmission. This ID-based authentication protocol, therefore, offers a significant advancement in protecting far-space communications, optimizing the integrity of data exchanged across vast distances.
本文介绍了一种基于id的身份认证协议,该协议利用了在椭圆曲线密码学基础上发展起来的增强型椭圆曲线数字签名算法。该协议增强了空间数据系统咨询委员会(CCSDS)文件交付协议(CFDP), CFDP是明确定义用于远程空间通信的先驱协议。本研究采用了CFDP协议的可靠模式和不确定模式。为了提高数据交易的安全性,本研究将提出的增强型椭圆曲线加密算法(ECC)应用于三元伽罗瓦域,有效降低了两个关键的安全风险。首先,它在被动攻击期间阻止有害实体的冒充。二是防止伪装攻击,进一步加强空间数据传输的安全性。因此,这种基于id的认证协议在保护远空间通信方面取得了重大进展,优化了远距离交换数据的完整性。
{"title":"Design and implementation of secured file delivery protocol using enhanced elliptic curve cryptography for class I and class II transactions","authors":"S. Sasi, Srividya Bharadwaj Venkata Subbu, Premkumar Manoharan, L. Abualigah","doi":"10.32629/jai.v6i3.740","DOIUrl":"https://doi.org/10.32629/jai.v6i3.740","url":null,"abstract":"This research study introduces an ID-based identity authentication protocol that utilizes the enhanced elliptic curve digital signature algorithm, a cryptographic method developed on elliptic curve cryptography. The protocol enhances the Consultative Committee for Space Data Systems (CCSDS) File Delivery Protocol (CFDP), a pioneering protocol explicitly defined for distant space communications. This study employs both dependable and uncertain modes of the CFDP protocol. To make more secure data transactions, two key security risks are effectively mitigated in this research as a result of applying the proposed enhanced elliptic curve cryptography algorithm (ECC) over the ternary galois field. First, it thwarts the impersonation of a harmful entity during a passive attack. Second, it prevents masquerade attacks, further reinforcing the security of space data transmission. This ID-based authentication protocol, therefore, offers a significant advancement in protecting far-space communications, optimizing the integrity of data exchanged across vast distances.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46548002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conditioning and monitoring of grinding wheels: A state-of-the-art review 砂轮的调节和监测:最新进展
Pub Date : 2023-09-06 DOI: 10.32629/jai.v6i3.622
Shrinath M. Patil-Mangore, Niranjan L. Shegokar, Nand Jee Kanu
Grinding wheel condition monitoring is an important step towards the prediction of grinding wheel faulty conditions. It is beneficial to define techniques to minimize the wear of the grinding wheels and finally enhance the life of the grinding wheels. Grinding wheel condition monitoring is done by two techniques such as (i) direct and (ii) indirect. Direct monitoring employs optical sensors and computer vision techniques, and indirect monitoring is done by signal analysis such as acoustic emission (AE), vibration, cutting force, etc. Methods implemented for grinding wheel monitoring in the published research papers are reviewed. The review is compiled in five sections: (a) process parameters measurement, (b) data acquisition systems, (c) signal analysis techniques, (d) feature extraction, and (e) classification methods. In today’s era of Industry 4.0, a large amount of manufacturing data is generated in the industry. So, conventional machine learning techniques are insufficient to analyze real-time conditioning monitoring of the grinding wheels. However, deep learning techniques such as artificial neural network (ANN), convolutional neural network (CNN) have shown prediction accuracy above 99%.
砂轮状态监测是预测砂轮故障状态的重要步骤。确定磨削工艺有助于减少砂轮的磨损,提高砂轮的使用寿命。砂轮状态监测主要通过(1)直接监测和(2)间接监测两种技术实现。直接监测采用光学传感器和计算机视觉技术,间接监测采用声发射(AE)、振动、切削力等信号分析。对已发表的砂轮监测方法进行了综述。该综述分为五个部分:(a)工艺参数测量,(b)数据采集系统,(c)信号分析技术,(d)特征提取,(e)分类方法。在工业4.0时代的今天,工业中产生了大量的制造数据。因此,传统的机器学习技术不足以分析砂轮的实时状态监测。然而,人工神经网络(ANN)、卷积神经网络(CNN)等深度学习技术已经显示出99%以上的预测准确率。
{"title":"Conditioning and monitoring of grinding wheels: A state-of-the-art review","authors":"Shrinath M. Patil-Mangore, Niranjan L. Shegokar, Nand Jee Kanu","doi":"10.32629/jai.v6i3.622","DOIUrl":"https://doi.org/10.32629/jai.v6i3.622","url":null,"abstract":"Grinding wheel condition monitoring is an important step towards the prediction of grinding wheel faulty conditions. It is beneficial to define techniques to minimize the wear of the grinding wheels and finally enhance the life of the grinding wheels. Grinding wheel condition monitoring is done by two techniques such as (i) direct and (ii) indirect. Direct monitoring employs optical sensors and computer vision techniques, and indirect monitoring is done by signal analysis such as acoustic emission (AE), vibration, cutting force, etc. Methods implemented for grinding wheel monitoring in the published research papers are reviewed. The review is compiled in five sections: (a) process parameters measurement, (b) data acquisition systems, (c) signal analysis techniques, (d) feature extraction, and (e) classification methods. In today’s era of Industry 4.0, a large amount of manufacturing data is generated in the industry. So, conventional machine learning techniques are insufficient to analyze real-time conditioning monitoring of the grinding wheels. However, deep learning techniques such as artificial neural network (ANN), convolutional neural network (CNN) have shown prediction accuracy above 99%.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44457232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved fuzzy c-means-raindrop optimizer for brain magnetic resonance image segmentation 一种用于脑磁共振图像分割的改进模糊c-均值-雨滴优化器
Pub Date : 2023-09-05 DOI: 10.32629/jai.v6i3.973
Bindu Puthentharayil Vikraman, Jabeena A. Afthab
The performance of healthcare systems, particularly regarding disease diagnosis and treatment planning, depends on the segmentation of medical images. Fuzzy c-means (FCM) is one of the most widely used clustering techniques for image segmentation due to its simplicity and effectiveness. FCM, on the other hand, has the disadvantages of being noise-sensitive, quickly settling on local optimal solutions, and being sensitive to initial values. This paper suggests a fuzzy c-means clustering improved with a nature-inspired raindrop optimizer for lesion extraction in brain magnetic resonance (MR) images to get around this constraint. In the preprocessing stage, the possible noises in a digital image, such as speckles, gaussian, etc., are eliminated by a hybrid filter—A combination of Gaussian, mean, and median filters. This paper presents a comparative analysis of FCM clustering and FCM-raindrop optimization (FCM-RO) approach. The algorithm performance is evaluated for images subjected to various possible noises that may affect an image during transmission and storage. The proposed FCM-RO approach is comparable to other methods now in use. The suggested system detects lesions with a partition coefficient of 0.9505 and a partition entropy of 0.0890. Brain MR images are analyzed using MATLAB software to find and extract malignancies. Image data retrieved from the public data source Kaggle are used to assess the system’s performance.
医疗保健系统的性能,特别是在疾病诊断和治疗计划方面,取决于医学图像的分割。模糊c均值(FCM)是图像分割中应用最广泛的聚类技术之一,具有简单有效的特点。另一方面,FCM具有噪声敏感、快速确定局部最优解以及对初始值敏感的缺点。本文提出了一种模糊c-均值聚类方法,该方法利用自然启发的雨滴优化器进行改进,用于脑磁共振(MR)图像中的损伤提取,以绕过这一约束。在预处理阶段,数字图像中可能的噪声,如散斑、高斯等,通过混合滤波器消除——高斯滤波器、均值滤波器和中值滤波器的组合。本文对FCM聚类和FCM-RO方法进行了比较分析。针对在传输和存储期间受到可能影响图像的各种可能噪声的图像来评估算法性能。所提出的FCM-RO方法与目前使用的其他方法相当。所建议的系统以0.9505的分配系数和0.0890的分配熵来检测病变。使用MATLAB软件对脑MR图像进行分析,以发现和提取恶性肿瘤。从公共数据源Kaggle检索的图像数据用于评估系统的性能。
{"title":"An improved fuzzy c-means-raindrop optimizer for brain magnetic resonance image segmentation","authors":"Bindu Puthentharayil Vikraman, Jabeena A. Afthab","doi":"10.32629/jai.v6i3.973","DOIUrl":"https://doi.org/10.32629/jai.v6i3.973","url":null,"abstract":"The performance of healthcare systems, particularly regarding disease diagnosis and treatment planning, depends on the segmentation of medical images. Fuzzy c-means (FCM) is one of the most widely used clustering techniques for image segmentation due to its simplicity and effectiveness. FCM, on the other hand, has the disadvantages of being noise-sensitive, quickly settling on local optimal solutions, and being sensitive to initial values. This paper suggests a fuzzy c-means clustering improved with a nature-inspired raindrop optimizer for lesion extraction in brain magnetic resonance (MR) images to get around this constraint. In the preprocessing stage, the possible noises in a digital image, such as speckles, gaussian, etc., are eliminated by a hybrid filter—A combination of Gaussian, mean, and median filters. This paper presents a comparative analysis of FCM clustering and FCM-raindrop optimization (FCM-RO) approach. The algorithm performance is evaluated for images subjected to various possible noises that may affect an image during transmission and storage. The proposed FCM-RO approach is comparable to other methods now in use. The suggested system detects lesions with a partition coefficient of 0.9505 and a partition entropy of 0.0890. Brain MR images are analyzed using MATLAB software to find and extract malignancies. Image data retrieved from the public data source Kaggle are used to assess the system’s performance.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45048357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data 基于密文-策略属性加密与代理重加密相结合的云数据密钥管理和访问控制
Pub Date : 2023-09-04 DOI: 10.32629/jai.v6i3.748
R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad
In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.
在各种云计算模型中,需要保护数据,以安全的方式访问这些数据非常重要。在加密和解密中用于保护这些数据的加密密钥必须管理这些密钥,以便通过在任何无线和云环境等公共网络中公开这些密钥来保护这些密钥。采用基于密文策略属性的加密(CP-ABE),为云数据加密提供有效的数据治理和密钥管理。本文详细阐述了基于密文-策略属性的加密与代理再加密相结合的工作(CP-ABE-PRE)。理想情况下,应该对加密的数据进行转换,以便可以使用新密钥解锁,而不需要中间的解密步骤(该步骤将允许云提供商读取明文)——这个过程称为数据重新加密。使用所提出的技术可以减少从资源受限设备连接到云的用户的计算和通信负担。实验结果表明,基于文本策略属性的密文加密算法与现有的CP-ABE算法相比,在加解密次数上都取得了较好的效果。此外,CP-ABE还为云数据提供了重要的分发和管理选项。具有代理再加密的CP-ABE似乎非常高效,证明了云数据用户的可验证性和公平性,同时也解决了撤销问题和抗勾结模型。
{"title":"Key management and access control based on combination of cipher text-policy attribute-based encryption with Proxy Re-Encryption for cloud data","authors":"R. M. Naik, H. M. T. Gadiyar, M. B. Kumar, B. K. Jeevitha, G. S. Thyagaraju, U. J. Ujwal, K. Arjun, S. M. Manasa, S. Avinash, J. A. Kumar, T. K. Sowmya, K. P. Uma, A. R. Ramaprasad","doi":"10.32629/jai.v6i3.748","DOIUrl":"https://doi.org/10.32629/jai.v6i3.748","url":null,"abstract":"In various cloud computing models, the data need to be protected and to access these data in secure manner is important. The cryptographic key which is used to secure these data using both in the encryption as well as in decryption it is mandatory to manage these keys to secure these keys by disclosing in public networks such as any wireless and cloud environment. Utilizing Ciphertext Policy Attribute-based Encryption (CP-ABE), which provides effective data governance and key management, for cloud data encryption. The work based on the combination of Cipher Text-Policy Attribute based Encryption and Proxy Re-Encryption is elaborated in the article (CP-ABE-PRE). The encrypted data should ideally be transformed such that it may be unlocked with new keys, without an intermediate decryption step that would allow the cloud provider to read the plaintext this process is known as data re-encryption. The computational and communication burden on users connecting to the cloud from resource constrained devices can be reduced using the proposed technique. The experimental results show for Cipher Text-Policy Attribute-Based Encryption are compared to the current algorithm (CP-ABE) demonstrate good results in encryption and decryption times. Additionally, the CP-ABE offers crucial distribution and administration options for cloud data. CP-ABE with Proxy Re-Encryption does appear to be highly efficient which proves verifiability and fairness for cloud data users to which also address revocation problem as well as collusion resistant model.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43099718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel scientific design of hybrid opposition based—Chaotic little golden-mantled flying fox, White-winged chough search optimization algorithm for real power loss reduction and voltage stability expansion 科学设计基于混沌小金毛狐、白翅白鸦搜索的混合对抗优化算法,降低实际功率损耗,扩大电压稳定性
Pub Date : 2023-09-04 DOI: 10.32629/jai.v6i3.680
L. Kanagasabai
In this paper hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is applied to solve the loss dwindling problem. Key objective of the paper is real power loss reduction, voltage deviation minimization and voltage stability expansion. Proposed little golden-mantled flying fox algorithm is designed based on the deeds of the little golden-mantled flying fox. Maximum classes have single progenies at a period afterwards of prenatal period. This little procreative production means that when populace forfeiture their figures are deliberate to ricochet. In White-winged chough search optimization algorithm magnifying the encumbrance element in a definite assortment will pointedly enlarge the exploration region. In a coiled exploration, the position of any White-winged chough can differ in numerous scopes to cover the exploration region, predominantly in the projected problem. Hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is accomplished by integrating the actions of little golden-mantled flying fox and White-winged chough. Through the hybridization of both algorithms exploration and exploitation has been balanced throughout the procedure. Proposed hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is corroborated in IEEE 30 and 57 systems. From the simulation results it has been observed that real power loss reduction, voltage deviation minimization and voltage stability expansion has been achieved.
本文采用基于混合对抗的混沌小金毛狐算法和白翅鸦搜索优化算法(HLFWC)来解决损失减小问题。本文的主要目标是降低实际功率损耗、减小电压偏差和扩大电压稳定性。基于小金毛飞狐的行为,设计了小金毛飞狐算法。大多数班级在产前期之后的一段时间内只有一个后代。这种小的生产性生产意味着,当民众没收他们的数字是故意反弹。在白翅鸟搜索优化算法中,在确定的分类中,增大妨碍元素,可以有针对性地扩大搜索区域。在盘绕勘探中,任何白翅鸦的位置可以在覆盖勘探区域的许多范围内变化,主要是在预测问题中。基于混合对抗的混沌小金毛狐算法和白翅白嘴鸦搜索优化算法(HLFWC)是将小金毛狐和白翅白嘴鸦的行动结合起来实现的。通过两种算法的杂交,探索和开发在整个过程中得到了平衡。在IEEE 30和57系统中验证了基于混沌小金毛狐算法和白翅鸦搜索优化算法(HLFWC)的混合对抗。仿真结果表明,该方法降低了实际功率损耗,减小了电压偏差,扩大了电压稳定性。
{"title":"Novel scientific design of hybrid opposition based—Chaotic little golden-mantled flying fox, White-winged chough search optimization algorithm for real power loss reduction and voltage stability expansion","authors":"L. Kanagasabai","doi":"10.32629/jai.v6i3.680","DOIUrl":"https://doi.org/10.32629/jai.v6i3.680","url":null,"abstract":"In this paper hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is applied to solve the loss dwindling problem. Key objective of the paper is real power loss reduction, voltage deviation minimization and voltage stability expansion. Proposed little golden-mantled flying fox algorithm is designed based on the deeds of the little golden-mantled flying fox. Maximum classes have single progenies at a period afterwards of prenatal period. This little procreative production means that when populace forfeiture their figures are deliberate to ricochet. In White-winged chough search optimization algorithm magnifying the encumbrance element in a definite assortment will pointedly enlarge the exploration region. In a coiled exploration, the position of any White-winged chough can differ in numerous scopes to cover the exploration region, predominantly in the projected problem. Hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is accomplished by integrating the actions of little golden-mantled flying fox and White-winged chough. Through the hybridization of both algorithms exploration and exploitation has been balanced throughout the procedure. Proposed hybrid opposition based—Chaotic little golden-mantled flying fox algorithm and White-winged chough search optimization algorithm (HLFWC) is corroborated in IEEE 30 and 57 systems. From the simulation results it has been observed that real power loss reduction, voltage deviation minimization and voltage stability expansion has been achieved.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43442184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blowfish based encryption model in real cloud environment 真实云环境中基于Blowfish的加密模型
Pub Date : 2023-09-04 DOI: 10.32629/jai.v6i3.695
R. Walia, P. Garg, Manish Kumar
The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.
互联网的引入使安全成为人们最担心的问题。安全性的前面允许在创建安全工具方面提高知识。互联网的建立方式可能引发了对安全保护的一些担忧。许多企业使用防火墙和加密技术来保护自己的网络安全。企业可以设计一个“内联网”,在连接到互联网时免受潜在风险的影响。为了提高安全性,需要更好的加密技术来保持数据的完整性。为了更好地加密,必须考虑一些问题的解释,包括密钥大小、块大小和编码率。传输到下级存储策略(如硬盘或SD卡)的文档必须加密,以提供安全性并防止不必要的访问。如果密钥与文档一起保存在辅助存储器中,则解密它非常简单。在对文件夹进行编码或解码时,最好使用操作员密码创建加密密钥,而不是将密钥与文档放在一起。
{"title":"Blowfish based encryption model in real cloud environment","authors":"R. Walia, P. Garg, Manish Kumar","doi":"10.32629/jai.v6i3.695","DOIUrl":"https://doi.org/10.32629/jai.v6i3.695","url":null,"abstract":"The introduction of the internet has made security a top anxiety. And the preceding of security permits for improved knowledge in the creation of security tools. Several concerns about safekeeping might have arisen just from the way the internet was set up. Many businesses use firewalls and encryption techniques to protect themselves online. Businesses can design an “intranet” that is protected from potential risks while being linked to the internet. For increased security, better encryption techniques are needed to retain data integrity. For better encryption, it is essential to consider into explanation a few of issues, including key size, chunk size, and encoding ratio. Documents transferred to subordinate storage strategies (such as Hard disk or SD card) must be encrypted to provide security and prevent unwanted access. If a key is kept on secondary storage with the document, it is quite simple to decrypt it. It is desirable to create encryption keys from operator passwords when encoding or decoding the folder rather than keeping the key together with the document.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44211167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A precise coronary artery disease prediction using Boosted C5.0 decision tree model 基于boosting C5.0决策树模型的冠状动脉疾病精确预测
Pub Date : 2023-09-01 DOI: 10.32629/jai.v6i3.628
Surjeet Dalal, U. Lilhore, Sarita Simaiya, Vivek Jaglan, Anand Mohan, Sachin Ahuja, Akshat Agrawal, Martin Margala, Prasun Chakrabarti
In coronary artery disease, plaque builds up in the arteries that carry oxygen-rich blood to the heart. Having plaque in the arteries can constrict or impede blood flow, leading to a heart attack. Shortness of breath and soreness in the chest are common symptoms. Lifestyle modifications, medication, and potentially surgery are all options for treatment. In coronary artery disease, plaque builds up in the arteries that carry oxygen-rich blood to the heart. Having plaque in the arteries can constrict or impede blood flow, leading to a heart attack. Shortness of breath and soreness in the chest are common symptoms. Lifestyle modifications, medication, and potentially surgery are all options for treatment. This paper presents a Hybrid Boosted C5.0 model to predict coronary artery disease more precisely. A Hybrid Boosted C5.0 model is formed by combining the C5.0 decision tree and boosting methods. Boosting is a supervised machine learning method that leverages numerous inadequate models to construct a more robust and powerful model. The proposed model and some well-known existing machine learning models, i.e., decision tree, AdaBoost, and random forest, were implemented using an online coronary artery disease dataset of 6611 patients and compared based on various performance measuring parameters. Experimental analysis shows that the proposed model achieved an accuracy of 91.62% at training and 81.33% at the testing phase. The AUC value achieved in the training and testing phase is 0.957 and 0.88, respectively. The Gini value achieved in the training and testing phase is 0.914 and 0.759, respectively, far better than the proposed method.
在冠状动脉疾病中,将富含氧气的血液输送到心脏的动脉中会形成斑块。动脉中有斑块会收缩或阻碍血液流动,导致心脏病发作。呼吸急促和胸部酸痛是常见的症状。生活方式的改变、药物治疗和潜在的手术都是治疗的选择。在冠状动脉疾病中,将富含氧气的血液输送到心脏的动脉中会形成斑块。动脉中有斑块会收缩或阻碍血液流动,导致心脏病发作。呼吸急促和胸部酸痛是常见的症状。生活方式的改变、药物治疗和潜在的手术都是治疗的选择。本文提出了一个混合Boosted C5.0模型来更准确地预测冠状动脉疾病。将C5.0决策树与boosting方法相结合,建立了混合boosting C5.0模型。Boosting是一种有监督的机器学习方法,它利用许多不充分的模型来构建一个更健壮、更强大的模型。使用6611名患者的在线冠状动脉疾病数据集实现了所提出的模型和一些已知的现有机器学习模型,即决策树、AdaBoost和随机森林,并基于各种性能测量参数进行了比较。实验分析表明,该模型在训练阶段和测试阶段的准确率分别为91.62%和81.33%。在训练和测试阶段获得的AUC值分别为0.957和0.88。在训练和测试阶段获得的基尼系数分别为0.914和0.759,远好于所提出的方法。
{"title":"A precise coronary artery disease prediction using Boosted C5.0 decision tree model","authors":"Surjeet Dalal, U. Lilhore, Sarita Simaiya, Vivek Jaglan, Anand Mohan, Sachin Ahuja, Akshat Agrawal, Martin Margala, Prasun Chakrabarti","doi":"10.32629/jai.v6i3.628","DOIUrl":"https://doi.org/10.32629/jai.v6i3.628","url":null,"abstract":"In coronary artery disease, plaque builds up in the arteries that carry oxygen-rich blood to the heart. Having plaque in the arteries can constrict or impede blood flow, leading to a heart attack. Shortness of breath and soreness in the chest are common symptoms. Lifestyle modifications, medication, and potentially surgery are all options for treatment. In coronary artery disease, plaque builds up in the arteries that carry oxygen-rich blood to the heart. Having plaque in the arteries can constrict or impede blood flow, leading to a heart attack. Shortness of breath and soreness in the chest are common symptoms. Lifestyle modifications, medication, and potentially surgery are all options for treatment. This paper presents a Hybrid Boosted C5.0 model to predict coronary artery disease more precisely. A Hybrid Boosted C5.0 model is formed by combining the C5.0 decision tree and boosting methods. Boosting is a supervised machine learning method that leverages numerous inadequate models to construct a more robust and powerful model. The proposed model and some well-known existing machine learning models, i.e., decision tree, AdaBoost, and random forest, were implemented using an online coronary artery disease dataset of 6611 patients and compared based on various performance measuring parameters. Experimental analysis shows that the proposed model achieved an accuracy of 91.62% at training and 81.33% at the testing phase. The AUC value achieved in the training and testing phase is 0.957 and 0.88, respectively. The Gini value achieved in the training and testing phase is 0.914 and 0.759, respectively, far better than the proposed method.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47264440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Prediction of customer review’s helpfulness based on sentences encoding using CNN-BiGRU model 基于CNN BiGRU模型的句子编码预测客户评论的有用性
Pub Date : 2023-08-30 DOI: 10.32629/jai.v6i3.699
Suryanarayan Sharma, Laxman Singh, Rajdev Tiwari
The infrastructure of smart cities is intended to save citizens’ time and effort. After COVID-19, one of such available infrastructure is electronic shopping. Online consumer reviews have a big influence on the electronic retail market. A lot of customers save time by deciding which products to buy online by evaluating the products’ quality based on user reviews. The goal of this study is to forecast if reviews based on reviews representation mining will be helpful while making online purchases. Predicting helpfulness is used in this suggested study to determine the usefulness of a review in relation to glove vector encoding of reviews text. Using an encoding-based convolution neural network and a bidirectional gated recurrent unit, the authors of this study constructed a classification model. The suggested model outperformed these baseline models and other state-of-the-art techniques in terms of classification outcomes, reaching the greatest accuracy of 95.81%. We also assessed the effectiveness of our models using the criteria of accuracy, precision, and recall. The outcomes presented in this study indicate how the proposed model has a significant influence on enhancing the producers’ or service providers’ businesses.
智慧城市的基础设施旨在节省市民的时间和精力。新冠肺炎之后,电子购物就是其中一个可用的基础设施。在线消费者评论对电子零售市场有很大的影响。许多客户通过根据用户评价来评估产品质量,从而决定在网上购买哪些产品,从而节省了时间。本研究的目的是预测基于评论表示挖掘的评论在进行在线购买时是否有帮助。在这项建议的研究中,预测有用性用于确定评论与评论文本的手套矢量编码相关的有用性。利用基于编码的卷积神经网络和双向门控递归单元,构建了一个分类模型。在分类结果方面,建议的模型优于这些基线模型和其他最先进的技术,达到了95.81%的最大准确率。我们还使用准确度、精密度和召回标准评估了模型的有效性。本研究的结果表明,所提出的模型如何对加强生产者或服务提供商的业务产生重大影响。
{"title":"Prediction of customer review’s helpfulness based on sentences encoding using CNN-BiGRU model","authors":"Suryanarayan Sharma, Laxman Singh, Rajdev Tiwari","doi":"10.32629/jai.v6i3.699","DOIUrl":"https://doi.org/10.32629/jai.v6i3.699","url":null,"abstract":"The infrastructure of smart cities is intended to save citizens’ time and effort. After COVID-19, one of such available infrastructure is electronic shopping. Online consumer reviews have a big influence on the electronic retail market. A lot of customers save time by deciding which products to buy online by evaluating the products’ quality based on user reviews. The goal of this study is to forecast if reviews based on reviews representation mining will be helpful while making online purchases. Predicting helpfulness is used in this suggested study to determine the usefulness of a review in relation to glove vector encoding of reviews text. Using an encoding-based convolution neural network and a bidirectional gated recurrent unit, the authors of this study constructed a classification model. The suggested model outperformed these baseline models and other state-of-the-art techniques in terms of classification outcomes, reaching the greatest accuracy of 95.81%. We also assessed the effectiveness of our models using the criteria of accuracy, precision, and recall. The outcomes presented in this study indicate how the proposed model has a significant influence on enhancing the producers’ or service providers’ businesses.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48651486","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved firefly algorithm for the rank generation to optimize the route discovery process in IoV 改进的firefly秩生成算法优化IoV中的路由发现过程
Pub Date : 2023-08-28 DOI: 10.32629/jai.v6i3.705
Sumit Kumar, Jaspreet Singh
Vehicular ad hoc networks (VANET) have been the attention gainer for the last couple of years due to increasing number of vehicles on the road. Incorporation of VANET with Internet of Things (IoT) has created large number possibilities in terms of power efficiency and secure transmission. The article focuses on the ad-hoc on-demand distance vector (AODV) protocol and its applications in route discovery in VANETs. In this work, the swarm intelligence (SI) inspired modified firefly algorithm has been employed for rank generation of the nodes. It is concluded that the use of IoT devices and advanced routing protocols with SI algorithms can lead to efficient and low-latency route discovery in VANETs using quality of service (QoS) parameters. The experimental analysis shown that the proposed technique has been outperformed the other existing technique in terms of QoS parameters and provides the optimal route discovery mechanism with high throughput and minimum latency.
由于道路上车辆数量的增加,车辆自组织网络(VANET)在过去几年中一直受到关注。VANET与物联网(IoT)的结合在功率效率和安全传输方面创造了大量可能性。本文重点研究了自组织按需距离矢量(AODV)协议及其在VANETs路由发现中的应用。在这项工作中,采用群体智能(SI)启发的改进萤火虫算法来生成节点的秩。结论是,使用物联网设备和带有SI算法的高级路由协议可以在使用服务质量(QoS)参数的vanet中实现高效和低延迟的路由发现。实验分析表明,该技术在QoS参数方面优于其他现有技术,提供了高吞吐量和最小延迟的最优路由发现机制。
{"title":"An improved firefly algorithm for the rank generation to optimize the route discovery process in IoV","authors":"Sumit Kumar, Jaspreet Singh","doi":"10.32629/jai.v6i3.705","DOIUrl":"https://doi.org/10.32629/jai.v6i3.705","url":null,"abstract":"Vehicular ad hoc networks (VANET) have been the attention gainer for the last couple of years due to increasing number of vehicles on the road. Incorporation of VANET with Internet of Things (IoT) has created large number possibilities in terms of power efficiency and secure transmission. The article focuses on the ad-hoc on-demand distance vector (AODV) protocol and its applications in route discovery in VANETs. In this work, the swarm intelligence (SI) inspired modified firefly algorithm has been employed for rank generation of the nodes. It is concluded that the use of IoT devices and advanced routing protocols with SI algorithms can lead to efficient and low-latency route discovery in VANETs using quality of service (QoS) parameters. The experimental analysis shown that the proposed technique has been outperformed the other existing technique in terms of QoS parameters and provides the optimal route discovery mechanism with high throughput and minimum latency.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46272267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cross-domain synergy: Leveraging image processing techniques for enhanced sound classification through spectrogram analysis using CNNs 跨域协同:利用图像处理技术,通过使用cnn的频谱图分析来增强声音分类
Pub Date : 2023-08-28 DOI: 10.32629/jai.v6i3.678
Valentina Franzoni
In this paper, the innovative approach to sound classification by exploiting the potential of image processing techniques applied to spectrogram representations of audio signals is reviewed. This study shows the effectiveness of incorporating well-established image processing methodologies, such as filtering, segmentation, and pattern recognition, to enhance the feature extraction and classification performance of audio signals when transformed into spectrograms. An overview is provided of the mathematical methods shared by both image and spectrogram-based audio processing, focusing on the commonalities between the two domains in terms of the underlying principles, techniques, and algorithms. The proposed methodology leverages in particular the power of convolutional neural networks (CNNs) to extract and classify time-frequency features from spectrograms, capitalizing on the advantages of their hierarchical feature learning and robustness to translation and scale variations. Other deep-learning networks and advanced techniques are suggested during the analysis. We discuss the benefits and limitations of transforming audio signals into spectrograms, including human interpretability, compatibility with image processing techniques, and flexibility in time-frequency resolution. By bridging the gap between image processing and audio processing, spectrogram-based audio deep learning gives a deeper perspective on sound classification, offering fundamental insights that serve as a foundation for interdisciplinary research and applications in both domains.
本文综述了利用图像处理技术对音频信号的频谱表示的潜力来进行声音分类的创新方法。本研究表明,结合成熟的图像处理方法,如滤波、分割和模式识别,在转换为频谱图时提高音频信号的特征提取和分类性能是有效的。概述了基于图像和基于频谱图的音频处理所共享的数学方法,重点介绍了这两个领域在基本原理、技术和算法方面的共性。所提出的方法特别利用卷积神经网络(cnn)从频谱图中提取和分类时频特征的能力,利用其分层特征学习和对平移和尺度变化的鲁棒性的优势。在分析过程中提出了其他深度学习网络和先进技术。我们讨论了将音频信号转换为频谱图的好处和局限性,包括人类的可解释性,与图像处理技术的兼容性以及时频分辨率的灵活性。通过弥合图像处理和音频处理之间的差距,基于频谱图的音频深度学习为声音分类提供了更深入的视角,为这两个领域的跨学科研究和应用奠定了基础。
{"title":"Cross-domain synergy: Leveraging image processing techniques for enhanced sound classification through spectrogram analysis using CNNs","authors":"Valentina Franzoni","doi":"10.32629/jai.v6i3.678","DOIUrl":"https://doi.org/10.32629/jai.v6i3.678","url":null,"abstract":"In this paper, the innovative approach to sound classification by exploiting the potential of image processing techniques applied to spectrogram representations of audio signals is reviewed. This study shows the effectiveness of incorporating well-established image processing methodologies, such as filtering, segmentation, and pattern recognition, to enhance the feature extraction and classification performance of audio signals when transformed into spectrograms. An overview is provided of the mathematical methods shared by both image and spectrogram-based audio processing, focusing on the commonalities between the two domains in terms of the underlying principles, techniques, and algorithms. The proposed methodology leverages in particular the power of convolutional neural networks (CNNs) to extract and classify time-frequency features from spectrograms, capitalizing on the advantages of their hierarchical feature learning and robustness to translation and scale variations. Other deep-learning networks and advanced techniques are suggested during the analysis. We discuss the benefits and limitations of transforming audio signals into spectrograms, including human interpretability, compatibility with image processing techniques, and flexibility in time-frequency resolution. By bridging the gap between image processing and audio processing, spectrogram-based audio deep learning gives a deeper perspective on sound classification, offering fundamental insights that serve as a foundation for interdisciplinary research and applications in both domains.","PeriodicalId":70721,"journal":{"name":"自主智能(英文)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"69961260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
自主智能(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1