期刊文献+
共找到815篇文章
< 1 2 41 >
每页显示 20 50 100
IoT Task Offloading in Edge Computing Using Non-Cooperative Game Theory for Healthcare Systems
1
作者 Dinesh Mavaluru Chettupally Anil Carie +4 位作者 Ahmed I.Alutaibi Satish Anamalamudi Bayapa Reddy Narapureddy Murali Krishna Enduri Md Ezaz Ahmed 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第5期1487-1503,共17页
In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises e... In this paper,we present a comprehensive system model for Industrial Internet of Things(IIoT)networks empowered by Non-Orthogonal Multiple Access(NOMA)and Mobile Edge Computing(MEC)technologies.The network comprises essential components such as base stations,edge servers,and numerous IIoT devices characterized by limited energy and computing capacities.The central challenge addressed is the optimization of resource allocation and task distribution while adhering to stringent queueing delay constraints and minimizing overall energy consumption.The system operates in discrete time slots and employs a quasi-static approach,with a specific focus on the complexities of task partitioning and the management of constrained resources within the IIoT context.This study makes valuable contributions to the field by enhancing the understanding of resourceefficient management and task allocation,particularly relevant in real-time industrial applications.Experimental results indicate that our proposed algorithmsignificantly outperforms existing approaches,reducing queue backlog by 45.32% and 17.25% compared to SMRA and ACRA while achieving a 27.31% and 74.12% improvement in Qn O.Moreover,the algorithmeffectively balances complexity and network performance,as demonstratedwhen reducing the number of devices in each group(Ng)from 200 to 50,resulting in a 97.21% reduction in complexity with only a 7.35% increase in energy consumption.This research offers a practical solution for optimizing IIoT networks in real-time industrial settings. 展开更多
关键词 Internet of Things edge computing OFFLOADING NOMA
下载PDF
A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices
2
作者 Sunil Kumar Dilip Kumar +3 位作者 Ramraj Dangi Gaurav Choudhary Nicola Dragoni Ilsun You 《Computers, Materials & Continua》 SCIE EI 2024年第1期31-63,共33页
The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There ... The widespread and growing interest in the Internet of Things(IoT)may be attributed to its usefulness in many different fields.Physical settings are probed for data,which is then transferred via linked networks.There are several hurdles to overcome when putting IoT into practice,from managing server infrastructure to coordinating the use of tiny sensors.When it comes to deploying IoT,everyone agrees that security is the biggest issue.This is due to the fact that a large number of IoT devices exist in the physicalworld and thatmany of themhave constrained resources such as electricity,memory,processing power,and square footage.This research intends to analyse resource-constrained IoT devices,including RFID tags,sensors,and smart cards,and the issues involved with protecting them in such restricted circumstances.Using lightweight cryptography,the information sent between these gadgets may be secured.In order to provide a holistic picture,this research evaluates and contrasts well-known algorithms based on their implementation cost,hardware/software efficiency,and attack resistance features.We also emphasised how essential lightweight encryption is for striking a good cost-to-performance-to-security ratio. 展开更多
关键词 IOT a sensor device LIGHTWEIGHT CRYPTOGRAPHY block cipher smart card security and privacy
下载PDF
ThyroidNet:A Deep Learning Network for Localization and Classification of Thyroid Nodules
3
作者 Lu Chen Huaqiang Chen +6 位作者 Zhikai Pan Sheng Xu Guangsheng Lai Shuwen Chen Shuihua Wang Xiaodong Gu Yudong Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第4期361-382,共22页
Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on... Aim:This study aims to establish an artificial intelligence model,ThyroidNet,to diagnose thyroid nodules using deep learning techniques accurately.Methods:A novel method,ThyroidNet,is introduced and evaluated based on deep learning for the localization and classification of thyroid nodules.First,we propose the multitask TransUnet,which combines the TransUnet encoder and decoder with multitask learning.Second,we propose the DualLoss function,tailored to the thyroid nodule localization and classification tasks.It balances the learning of the localization and classification tasks to help improve the model’s generalization ability.Third,we introduce strategies for augmenting the data.Finally,we submit a novel deep learning model,ThyroidNet,to accurately detect thyroid nodules.Results:ThyroidNet was evaluated on private datasets and was comparable to other existing methods,including U-Net and TransUnet.Experimental results show that ThyroidNet outperformed these methods in localizing and classifying thyroid nodules.It achieved improved accuracy of 3.9%and 1.5%,respectively.Conclusion:ThyroidNet significantly improves the clinical diagnosis of thyroid nodules and supports medical image analysis tasks.Future research directions include optimization of the model structure,expansion of the dataset size,reduction of computational complexity and memory requirements,and exploration of additional applications of ThyroidNet in medical image analysis. 展开更多
关键词 ThyroidNet deep learning TransUnet multitask learning medical image analysis
下载PDF
The Experience and Impact of a Fitbit-Based Physical Activity and Sleep Hygiene Intervention for Older Adults Experiencing Cognitive Decline
4
作者 Kate Walker Chris Griffiths +3 位作者 Jen Yates Louise Birkett-Swan Farah Hina Chee Siang Ang 《Advances in Aging Research》 CAS 2024年第3期41-59,共19页
Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment s... Objectives: This study aimed to understand the experience and impact of a physical activity and sleep wrist-worn tracker (Fitbit)-based healthy lifestyle intervention for older patients attending a memory assessment service, who are experiencing cognitive impairment but do not receive a dementia diagnosis. Methods: A qualitative design was employed. Semi-structured interviews were conducted with a purposeful sample of thirteen participants recruited from a memory assessment service. Thematic analysis, that was data driven and inductive, was undertaken to analyse the data. Results: Two global themes were developed. “Understanding exercise and sleep as part of my lifestyle” was made up of themes representing how participants viewed exercise and sleep as part of their lifestyles in terms of acknowledging the positive impacts and the barriers to exercise and sleep. The second global theme “Understanding my experience of the healthy lifestyle intervention” was made up of themes that identified the positive impact of the intervention regarding improving health and wellbeing, enabling validation of proactive behaviours and motivation to engage in healthy lifestyle behaviours, so promoting positive behaviour change. Conclusion: Patients experiencing age-related cognitive impairment, applied and benefited from a healthy lifestyle Fitbit-based intervention to facilitate and promote physical activity, better sleep hygiene and healthy lifestyles. 展开更多
关键词 Cognitive Impairment Healthy Lifestyle Intervention Fitbit Health and Wellbeing Behaviour Change
下载PDF
A Framework for Driver DrowsinessMonitoring Using a Convolutional Neural Network and the Internet of Things
5
作者 Muhamad Irsan Rosilah Hassan +3 位作者 Anwar Hassan Ibrahim Mohamad Khatim Hasan Meng Chun Lam Wan Mohd Hirwani Wan Hussain 《Intelligent Automation & Soft Computing》 2024年第2期157-174,共18页
One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the dri... One of the major causes of road accidents is sleepy drivers.Such accidents typically result in fatalities and financial losses and disadvantage other road users.Numerous studies have been conducted to identify the driver’s sleepiness and integrate it into a warning system.Most studies have examined how the mouth and eyelids move.However,this limits the system’s ability to identify drowsiness traits.Therefore,this study designed an Accident Detection Framework(RPK)that could be used to reduce road accidents due to sleepiness and detect the location of accidents.The drowsiness detectionmodel used three facial parameters:Yawning,closed eyes(blinking),and an upright head position.This model used a Convolutional Neural Network(CNN)consisting of two phases.The initial phase involves video processing and facial landmark coordinate detection.The second phase involves developing the extraction of frame-based features using normalization methods.All these phases used OpenCV and TensorFlow.The dataset contained 5017 images with 874 open eyes images,850 closed eyes images,723 open-mouth images,725 closed-mouth images,761 sleepy-head images,and 1084 non-sleepy head images.The dataset of 5017 images was divided into the training set with 4505 images and the testing set with 512 images,with a ratio of 90:10.The results showed that the RPK design could detect sleepiness by using deep learning techniques with high accuracy on all three parameters;namely 98%for eye blinking,96%for mouth yawning,and 97%for head movement.Overall,the test results have provided an overview of how the developed RPK prototype can accurately identify drowsy drivers.These findings will have a significant impact on the improvement of road users’safety and mobility. 展开更多
关键词 Drowsy drivers convolutional neural network OPENCV MICROPROCESSOR face detection
下载PDF
New Approaches to the Prognosis and Diagnosis of Breast Cancer Using Fuzzy Expert Systems
6
作者 Elias Ayinbila Apasiya Abdul-Mumin Salifu Peter Awon-Natemi Agbedemnab 《Journal of Computer and Communications》 2024年第5期151-169,共19页
Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from li... Breast cancer remains a significant global health challenge, necessitating effective early detection and prognosis to enhance patient outcomes. Current diagnostic methods, including mammography and MRI, suffer from limitations such as uncertainty and imprecise data, leading to late-stage diagnoses. To address this, various expert systems have been developed, but many rely on type-1 fuzzy logic and lack mobile-based applications for data collection and feedback to healthcare practitioners. This research investigates the development of an Enhanced Mobile-based Fuzzy Expert system (EMFES) for breast cancer pre-growth prognosis. The study explores the use of type-2 fuzzy logic to enhance accuracy and model uncertainty effectively. Additionally, it evaluates the advantages of employing the python programming language over java for implementation and considers specific risk factors for data collection. The research aims to dynamically generate fuzzy rules, adapting to evolving breast cancer research and patient data. Key research questions focus on the comparative effectiveness of type-2 fuzzy logic, the handling of uncertainty and imprecise data, the integration of mobile-based features, the choice of programming language, and the creation of dynamic fuzzy rules. Furthermore, the study examines the differences between the Mamdani Inference System and the Sugeno Fuzzy Inference method and explores challenges and opportunities in deploying the EMFES on mobile devices. The research identifies a critical gap in existing breast cancer diagnostic systems, emphasizing the need for a comprehensive, mobile-enabled, and adaptable solution by developing an EMFES that leverages Type-2 fuzzy logic, the Sugeno Inference Algorithm, Python Programming, and dynamic fuzzy rule generation. This study seeks to enhance early breast cancer detection and ultimately reduce breast cancer-related mortality. 展开更多
关键词 EMFES Breast Cancer Type-2 Fl Soft Computing Membership Functions Fuzzy Set Fuzzy Rules Risk Factors.
下载PDF
A Survey of Convolutional Neural Network in Breast Cancer 被引量:1
7
作者 Ziquan Zhu Shui-Hua Wang Yu-Dong Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第9期2127-2172,共46页
Problems:For people all over the world,cancer is one of the most feared diseases.Cancer is one of the major obstacles to improving life expectancy in countries around the world and one of the biggest causes of death b... Problems:For people all over the world,cancer is one of the most feared diseases.Cancer is one of the major obstacles to improving life expectancy in countries around the world and one of the biggest causes of death before the age of 70 in 112 countries.Among all kinds of cancers,breast cancer is the most common cancer for women.The data showed that female breast cancer had become one of themost common cancers.Aims:A large number of clinical trials have proved that if breast cancer is diagnosed at an early stage,it could give patients more treatment options and improve the treatment effect and survival ability.Based on this situation,there are many diagnostic methods for breast cancer,such as computer-aided diagnosis(CAD).Methods:We complete a comprehensive review of the diagnosis of breast cancer based on the convolutional neural network(CNN)after reviewing a sea of recent papers.Firstly,we introduce several different imaging modalities.The structure of CNN is given in the second part.After that,we introduce some public breast cancer data sets.Then,we divide the diagnosis of breast cancer into three different tasks:1.classification;2.detection;3.segmentation.Conclusion:Although this diagnosis with CNN has achieved great success,there are still some limitations.(i)There are too few good data sets.A good public breast cancer dataset needs to involve many aspects,such as professional medical knowledge,privacy issues,financial issues,dataset size,and so on.(ii)When the data set is too large,the CNN-based model needs a sea of computation and time to complete the diagnosis.(iii)It is easy to cause overfitting when using small data sets. 展开更多
关键词 Breast cancer convolutional neural network deep learning REVIEW image modalities
下载PDF
Strengths,weaknesses,opportunities,and threats(SWOT)analysis of supercapacitors:A review 被引量:3
8
作者 Pragati A.Shinde Qaisar Abbas +3 位作者 Nilesh R.Chodankar Katsuhiko Ariga Mohammad Ali Abdelkareem Abdul Ghani Olabi 《Journal of Energy Chemistry》 SCIE EI CAS CSCD 2023年第4期611-638,共28页
The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environment... The development of clean and sustainable energy sources has received widespread interest in the past few decades due to the rolling energy demands while extenuating the rising tiers of greenhouse gases and environmental pollution.Due to their intermittent nature,these green and sustainable sources require appropriate energy storage systems.Amongst different energy storage technologies,electrochemical energy storage devices,particularly supercapacitors(SCs),have fascinated global attention for their utilization in electric vehicles,power supports,portable electronics,and many others application requiring electric energy devices for their operation.Thus,the growth of SCs in the commercial market has squeezed requirements,and further developments are obligatory for their effective industrialization.In the meantime,SCs also face technical complications and contests for their introduction in industrial settings because of their low energy density and high Levelized cost.The present study combines core strengths,weaknesses,opportunities,and threats(SWOT)analysis of SCs with new perspectives and recent ideas.The challenges and the future progressive prospects of SCs are also presented in detail.This review will afford consistent direction and new superhighways for the further development of SCs as standalone and complementary energy storage systems. 展开更多
关键词 SUPERCAPACITORS Energy storage Strengths OPPORTUNITIES
下载PDF
Intelligent Traffic Scheduling for Mobile Edge Computing in IoT via Deep Learning 被引量:1
9
作者 Shaoxuan Yun Ying Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第3期1815-1835,共21页
Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing i... Nowadays,with the widespread application of the Internet of Things(IoT),mobile devices are renovating our lives.The data generated by mobile devices has reached a massive level.The traditional centralized processing is not suitable for processing the data due to limited computing power and transmission load.Mobile Edge Computing(MEC)has been proposed to solve these problems.Because of limited computation ability and battery capacity,tasks can be executed in the MEC server.However,how to schedule those tasks becomes a challenge,and is the main topic of this piece.In this paper,we design an efficient intelligent algorithm to jointly optimize energy cost and computing resource allocation in MEC.In view of the advantages of deep learning,we propose a Deep Learning-Based Traffic Scheduling Approach(DLTSA).We translate the scheduling problem into a classification problem.Evaluation demonstrates that our DLTSA approach can reduce energy cost and have better performance compared to traditional scheduling algorithms. 展开更多
关键词 Mobile Edge Computing(MEC) traffic scheduling deep learning Internet of Things(IoT)
下载PDF
Experimental investigation and flow analysis of clear-water scour around pier and abutment in proximity 被引量:1
10
作者 Mohammad Saeed Fakhimjoo Abdollah Ardeshir +1 位作者 Kourosh Behzadian Hojat Karami 《Water Science and Engineering》 EI CAS CSCD 2023年第1期94-105,共12页
Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the ... Local scour around bridge piers and abutments is one of the most significant causes of bridge failure.Despite a plethora of studies on scour around individual bridge piers or abutments,few studies have focused on the joint impact of a pier and an abutment in proximity to one another on scour.This study conducted laboratory experiments and flow analyses to examine the interaction of piers and abutments and their effect on clear-water scour.The experiments were conducted in a rectangular laboratory flume.They included 18 main tests(with a combination of different types of piers and abutments)and five control tests(with individual piers or abutments).Three pier types(a rectangular pier with a rounded edge,a group of three cylindrical piers,and a single cylindrical pier)and two abutment types(a wingewall abutment and a semicircular abutment)were used.An acoustic Doppler velocimeter was used to measure the three-dimensional flow velocity for analyses of streamline,velocity magnitude,vertical velocity,and bed shear stress.The results showed that the velocity near the pier and abutment increased by up to 80%.The maximum scour depth around the abutment increased by up to 19%.In contrast,the maximum scour depth around the pier increased significantly by up to l71%.The presence of the pier in the vicinity of the abutment led to an increase in the scour hole volume by up to 87%relative to the case with a solitary abutment.Empirical equations were also derived to accurately estimate the maximum scour depth at the pier adjacent to the abutment. 展开更多
关键词 ABUTMENT ADV Bridge scour Laboratory experiment Maximum scour depth PIER
下载PDF
Detection of Copy-Move Forgery in Digital Images Using Singular Value Decomposition 被引量:1
11
作者 Zaid Nidhal Khudhair Farhan Mohamed +2 位作者 Amjad Rehman Tanzila Saba Saeed Ali bahaj 《Computers, Materials & Continua》 SCIE EI 2023年第2期4135-4147,共13页
This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding... This paper presents an improved approach for detecting copy-move forgery based on singular value decomposition(SVD).It is a block-based method where the image is scanned from left to right and top to down by a sliding window with a determined size.At each step,the SVD is determined.First,the diagonal matrix’s maximum value(norm)is selected(representing the scaling factor for SVD and a fixed value for each set of matrix elements even when rotating thematrix or scaled).Then,the similar norms are grouped,and each leading group is separated into many subgroups(elements of each subgroup are neighbors)according to 8-adjacency(the subgroups for each leading group must be far from others by a specific distance).After that,a weight is assigned for each subgroup to classify the image as forgery or not.Finally,the F1 score of the proposed system is measured,reaching 99.1%.This approach is robust against rotation,scaling,noisy images,and illumination variation.It is compared with other similarmethods and presents very promised results. 展开更多
关键词 Forgery image forensic image processing region duplication SVD transformation technological development
下载PDF
A Lightweight Deep Autoencoder Scheme for Cyberattack Detection in the Internet of Things 被引量:1
12
作者 Maha Sabir Jawad Ahmad Daniyal Alghazzawi 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期57-72,共16页
The Internet of things(IoT)is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision.Despite several a... The Internet of things(IoT)is an emerging paradigm that integrates devices and services to collect real-time data from surroundings and process the information at a very high speed to make a decision.Despite several advantages,the resource-constrained and heterogeneous nature of IoT networks makes them a favorite target for cybercriminals.A single successful attempt of network intrusion can compromise the complete IoT network which can lead to unauthorized access to the valuable information of consumers and industries.To overcome the security challenges of IoT networks,this article proposes a lightweight deep autoencoder(DAE)based cyberattack detection framework.The proposed approach learns the normal and anomalous data patterns to identify the various types of network intrusions.The most significant feature of the proposed technique is its lower complexity which is attained by reducing the number of operations.To optimally train the proposed DAE,a range of hyperparameters was determined through extensive experiments that ensure higher attack detection accuracy.The efficacy of the suggested framework is evaluated via two standard and open-source datasets.The proposed DAE achieved the accuracies of 98.86%,and 98.26%for NSL-KDD,99.32%,and 98.79%for the UNSW-NB15 dataset in binary class and multi-class scenarios.The performance of the suggested attack detection framework is also compared with several state-of-the-art intrusion detection schemes.Experimental outcomes proved the promising performance of the proposed scheme for cyberattack detection in IoT networks. 展开更多
关键词 Autoencoder CYBERSECURITY deep learning intrusion detection IoT
下载PDF
Scalable Blockchain Technology for Tracking the Provenance of the Agri-Food
13
作者 B.Subashini D.Hemavathi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3339-3358,共20页
Due to an increase in agricultural mislabeling and careless handling of non-perishable foods in recent years,consumers have been calling for the food sector to be more transparent.Due to information dispersion between... Due to an increase in agricultural mislabeling and careless handling of non-perishable foods in recent years,consumers have been calling for the food sector to be more transparent.Due to information dispersion between divisions and the propensity to record inaccurate data,current traceability solutions typically fail to provide reliable farm-to-fork histories of products.The threemost enticing characteristics of blockchain technology are openness,integrity,and traceability,which make it a potentially crucial tool for guaranteeing the integrity and correctness of data.In this paper,we suggest a permissioned blockchain system run by organizations,such as regulatory bodies,to promote the origin-tracking of shelf-stable agricultural products.We propose a four-tiered architecture,parallel side chains,Zero-Knowledge Proofs(ZKPs),and Interplanetary File Systems(IPFS).These ensure that information about where an item came from is shared,those commercial competitors cannot get to it,those big storage problems are handled,and the system can be scaled to handle many transactions at once.The solution maintains the confidentiality of all transaction flows when provenance data is queried utilizing smart contracts and a consumer-grade reliance rate.Extensive simulation testing using Ethereum Rinkeby and Polygon demonstrates reduced execution time,latency,and throughput overheads. 展开更多
关键词 Blockchain IPFS sidechain supply chain management TRACEABILITY
下载PDF
Identifying Severity of COVID-19 Medical Images by Categorizing Using HSDC Model
14
作者 K.Ravishankar C.Jothikumar 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期613-635,共23页
Since COVID-19 infections are increasing all over the world,there is a need for developing solutions for its early and accurate diagnosis is a must.Detectionmethods for COVID-19 include screeningmethods like Chest X-r... Since COVID-19 infections are increasing all over the world,there is a need for developing solutions for its early and accurate diagnosis is a must.Detectionmethods for COVID-19 include screeningmethods like Chest X-rays and Computed Tomography(CT)scans.More work must be done on preprocessing the datasets,such as eliminating the diaphragm portions,enhancing the image intensity,and minimizing noise.In addition to the detection of COVID-19,the severity of the infection needs to be estimated.The HSDC model is proposed to solve these problems,which will detect and classify the severity of COVID-19 from X-ray and CT-scan images.For CT-scan images,the histogram threshold of the input image is adaptively determined using the ICH Swarm Optimization Segmentation(ICHSeg)algorithm.Based on the Statistical and Shape-based feature vectors(FVs),the extracted regions are classified using a Hybrid model for CT images(HSDCCT)algorithm.When the infections are detected,it’s classified as Normal,Moderate,and Severe.A fused FHI is formed for X-ray images by extracting the features of Histogram-oriented gradient(HOG)and Image profile(IP).The FHI features of X-ray images are classified using Hybrid Support Vector Machine(SVM)and Deep Convolutional Neural Network(DCNN)HSDCX algorithm into COVID-19 or else Pneumonia,or Normal.Experimental results have shown that the accuracy of the HSDC model attains the highest of 94.6 for CT-scan images and 95.6 for X-ray images when compared to SVM and DCNN.This study thus significantly helps medical professionals and doctors diagnose COVID-19 infections quickly,which is the most needed in current years. 展开更多
关键词 CT-SCAN convolution neural network(CNN) deep CNN(HSDC) hybrid support vector machine(SVM) improved chicken swarmoptimization(ICHO) COVID-19 and image profile(IP)
下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
15
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
下载PDF
Code Reviewer Intelligent Prediction in Open Source Industrial Software Project
16
作者 Zhifang Liao Bolin Zhang +2 位作者 Xuechun Huang Song Yu Yan Zhang 《Computer Modeling in Engineering & Sciences》 SCIE EI 2023年第10期687-704,共18页
Currently, open-source software is gradually being integrated into industrial software, while industry protocolsin industrial software are also gradually transferred to open-source community development. Industrial pr... Currently, open-source software is gradually being integrated into industrial software, while industry protocolsin industrial software are also gradually transferred to open-source community development. Industrial protocolstandardization organizations are confronted with fragmented and numerous code PR (Pull Request) and informalproposals, and differentworkflowswill lead to increased operating costs. The open-source community maintenanceteam needs software that is more intelligent to guide the identification and classification of these issues. To solvethe above problems, this paper proposes a PR review prediction model based on multi-dimensional features. Weextract 43 features of PR and divide them into five dimensions: contributor, reviewer, software project, PR, andsocial network of developers. The model integrates the above five-dimensional features, and a prediction model isbuilt based on a Random Forest Classifier to predict the review results of PR. On the other hand, to improve thequality of rejected PRs, we focus on problems raised in the review process and review comments of similar PRs.Wepropose a PR revision recommendation model based on the PR review knowledge graph. Entity information andrelationships between entities are extracted from text and code information of PRs, historical review comments,and related issues. PR revisions will be recommended to code contributors by graph-based similarity calculation.The experimental results illustrate that the above twomodels are effective and robust in PR review result predictionand PR revision recommendation. 展开更多
关键词 Open source software pull request random forest knowledge graph
下载PDF
Topic Modelling and Sentimental Analysis of Students’Reviews
17
作者 Omer S.Alkhnbashi Rasheed Mohammad Nassr 《Computers, Materials & Continua》 SCIE EI 2023年第3期6835-6848,共14页
Globally,educational institutions have reported a dramatic shift to online learning in an effort to contain the COVID-19 pandemic.The fundamental concern has been the continuance of education.As a result,several novel... Globally,educational institutions have reported a dramatic shift to online learning in an effort to contain the COVID-19 pandemic.The fundamental concern has been the continuance of education.As a result,several novel solutions have been developed to address technical and pedagogical issues.However,these were not the only difficulties that students faced.The implemented solutions involved the operation of the educational process with less regard for students’changing circumstances,which obliged them to study from home.Students should be asked to provide a full list of their concerns.As a result,student reflections,including those from Saudi Arabia,have been analysed to identify obstacles encountered during the COVID-19 pandemic.However,most of the analyses relied on closed-ended questions,which limited student involvement.To delve into students’responses,this study used open-ended questions,a qualitative method(content analysis),a quantitative method(topic modelling),and a sentimental analysis.This study also looked at students’emotional states during and after the COVID-19 pandemic.In terms of determining trends in students’input,the results showed that quantitative and qualitative methods produced similar outcomes.Students had unfavourable sentiments about studying during COVID-19 and positive sentiments about the face-to-face study.Furthermore,topic modelling has revealed that the majority of difficulties are more related to the environment(home)and social life.Students were less accepting of online learning.As a result,it is possible to conclude that face-to-face study still attracts students and provides benefits that online study cannot,such as social interaction and effective eye-to-eye communication. 展开更多
关键词 Topic modelling sentimental analysis COVID-19 students’input
下载PDF
BIoMT:A Blockchain-Enabled Healthcare Architecture for Information Security in the Internet of Medical Things
18
作者 Sahar Badri Sana Ullah Jan +2 位作者 Daniyal Alghazzawi Sahar Aldhaheri d Nikolaos Pitropakis 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3667-3684,共18页
Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things(IoMT).The existing cloud-based,centralized IoMT architecture... Rapid technological advancement has enabled modern healthcare systems to provide more sophisticated and real-time services on the Internet of Medical Things(IoMT).The existing cloud-based,centralized IoMT architectures are vulnerable to multiple security and privacy problems.The blockchain-enabled IoMT is an emerging paradigm that can ensure the security and trustworthiness of medical data sharing in the IoMT networks.This article presents a private and easily expandable blockchain-based framework for the IoMT.The proposed framework contains several participants,including private blockchain,hospitalmanagement systems,cloud service providers,doctors,and patients.Data security is ensured by incorporating an attributebased encryption scheme.Furthermore,an IoT-friendly consensus algorithm is deployed to ensure fast block validation and high scalability in the IoMT network.The proposed framework can perform multiple healthcare-related services in a secure and trustworthy manner.The performance of blockchain read/write operations is evaluated in terms of transaction throughput and latency.Experimental outcomes indicate that the proposed scheme achieved an average throughput of 857 TPS and 151 TPS for read and write operations.The average latency is 61 ms and 16 ms for read and write operations,respectively. 展开更多
关键词 Blockchain CYBERSECURITY IoT IoMT smart healthcare
下载PDF
Investigation of Android Malware with Machine Learning Classifiers using Enhanced PCA Algorithm
19
作者 V.Joseph Raymond R.Jeberson Retna Raj 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2147-2163,共17页
Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source na... Android devices are popularly available in the commercial market at different price levels for various levels of customers.The Android stack is more vulnerable compared to other platforms because of its open-source nature.There are many android malware detection techniques available to exploit the source code andfind associated components during execution time.To obtain a better result we create a hybrid technique merging static and dynamic processes.In this paper,in thefirst part,we have proposed a technique to check for correlation between features and classify using a supervised learning approach to avoid Mul-ticollinearity problem is one of the drawbacks in the existing system.In the proposed work,a novel PCA(Principal Component Analysis)based feature reduction technique is implemented with conditional dependency features by gathering the functionalities of the application which adds novelty for the given approach.The Android Sensitive Permission is one major key point to be considered while detecting malware.We select vulnerable columns based on features like sensitive permissions,application program interface calls,services requested through the kernel,and the relationship between the variables henceforth build the model using machine learning classifiers and identify whether the given application is malicious or benign.Thefinal goal of this paper is to check benchmarking datasets collected from various repositories like virus share,Github,and the Canadian Institute of cyber security,compare with models ensuring zero-day exploits can be monitored and detected with better accuracy rate. 展开更多
关键词 Zero-day exploit hybrid analysis principal component analysis supervised learning smart cities
下载PDF
Depth Map Prediction of Occluded Objects Using Structure Tensor with Gain Regularization
20
作者 H.Shalma P.Selvaraj 《Intelligent Automation & Soft Computing》 SCIE 2023年第7期1145-1161,共17页
The creation of the 3D rendering model involves the prediction of an accurate depth map for the input images.A proposed approach of a modified semi-global block matching algorithm with variable window size and the gra... The creation of the 3D rendering model involves the prediction of an accurate depth map for the input images.A proposed approach of a modified semi-global block matching algorithm with variable window size and the gradient assessment of objects predicts the depth map.3D modeling and view synthesis algorithms could effectively handle the obtained disparity maps.This work uses the consistency check method to find an accurate depth map for identifying occluded pixels.The prediction of the disparity map by semi-global block matching has used the benchmark dataset of Middlebury stereo for evaluation.The improved depth map quality within a reasonable process-ing time outperforms the other existing depth map prediction algorithms.The experimental results have shown that the proposed depth map predictioncould identify the inter-object boundaryeven with the presence ofocclusion with less detection error and runtime.We observed that the Middlebury stereo dataset has very few images with occluded objects,which made the attainment of gain cumbersome.Considering this gain,we have created our dataset with occlu-sion using the structured lighting technique.The proposed regularization term as an optimization process in the graph cut algorithm handles occlusion for different smoothing coefficients.The experimented results demonstrated that our dataset had outperformed the Tsukuba dataset regarding the percentage of occluded pixels. 展开更多
关键词 Depth maps occlusion detection RECONSTRUCTION refined disparity map
下载PDF
上一页 1 2 41 下一页 到第
使用帮助 返回顶部