Concurrency and Computation: Practice and Experience最新文献

筛选
英文 中文
Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication 改进的混沌- RSA -基于混合密码系统的图像加密和身份验证
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-16 DOI: 10.1002/cpe.7187
M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa
{"title":"Improved chaos‐RSA‐based hybrid cryptosystem for image encryption and authentication","authors":"M. Gafsi, Rim Amdouni, Mohamed Ali Hajjaji, J. Malek, A. Mtibaa","doi":"10.1002/cpe.7187","DOIUrl":"https://doi.org/10.1002/cpe.7187","url":null,"abstract":"This article puts forward a fast chaos‐RSA‐based hybrid cryptosystem to secure and authenticate secret images. The SHA‐512 is used to generate a 512‐bit initial key. The RSA system is used to encrypt the initial secret key and signature generation for both the sender and image authentication. In fact, a powerful block‐cipher algorithm is developed to encrypt and decrypt images with a high level of security. At this stage, a strong PRNG based on four chaotic systems is propounded to generate high‐quality keys. Therefore, an improved architecture is suggested. It performs confusion and diffusion of images with low computational complexity. In the final step, the encrypted secret key, signature, and encrypted image are combined together in order to obtain an encrypted signed image. The block‐cipher algorithm is evaluated in‐depth for several ordinary and medical images with different types, content, and size. The obtained simulation results demonstrate that the system enables high‐level security. The entropy has achieved a value of 7.9998 which is the most important feature of randomness. A comparative study against numerous recent encryption algorithms demonstrates that the proposed algorithm provides good results.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89035601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
B‐SCORE – A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment B‐SCORE -一种基于区块链的混合混沌签名,用于物联网环境中的医学图像加密
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-15 DOI: 10.1002/cpe.7115
N. R, Ponsy R. K. Sathia Bhama
{"title":"B‐SCORE – A blockchain based hybrid chaotic signatures for medical image encryption in an IoT environment","authors":"N. R, Ponsy R. K. Sathia Bhama","doi":"10.1002/cpe.7115","DOIUrl":"https://doi.org/10.1002/cpe.7115","url":null,"abstract":"Internet of things (IoT) has evolved exponentially in the recent years and its applications are also being explored in the medical field. Due to this, the volume of medical images transmitted has increased multifold. Usage of IoT networks for medical image transmission has significantly reduced the time needed for clinical diagnosis and thereby increasing treatment efficiency. However at present, IoT networks are open to various security threats, which may affect the sensitive and private information that are present in patient's medical image datasets. Existing studies reveal the need of improvisation for secured medical data transmission over IoT networks. In the context to IoT security issues, this research paper proposes blockchain architecture integrated with chaotic encrypted medical image transmission to ensure the high security in medical image transmission. The proposed system incorporates tri‐layered architecture such as Image Aware Segmentation (IAS), hybrid chaotic encryption scheme and finally blockchain environment. The extensive experimentation has been carried out in which the performance parameters such as entropy, NACI and UACI (Number of Pixel Change Ratio and Unified Average Changed Intensity) were calculated and analyzed. It is found that the proposed architecture has NPCR as 99.65%, UACI as 33.95% and entropy ideally close to 8. Encryption results show that the proposed architecture exhibited more randomness, which can defend the IoT security threats.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91134093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multi‐objective moth swarm based sailfish model for optimal routing in wireless sensor network 基于多目标飞蛾群的无线传感器网络最优路由旗鱼模型
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-14 DOI: 10.1002/cpe.7125
M. Gunasekar, Gobalakrishnan Natesan, D. Samiayya
{"title":"Multi‐objective moth swarm based sailfish model for optimal routing in wireless sensor network","authors":"M. Gunasekar, Gobalakrishnan Natesan, D. Samiayya","doi":"10.1002/cpe.7125","DOIUrl":"https://doi.org/10.1002/cpe.7125","url":null,"abstract":"In recent years, the WSN are emerging swiftly since it finds applications in various domains including weather monitoring, attack detection, industrial monitoring, monitoring of submarine organisms, patient monitoring as well as the monitoring of ecological disorders. But WSN is also influenced by various other factors like network lifetime and energy consumption. It is necessary to provide an energy effective protocol to conquer certain troubles that includes packet delivery ratio, network lifetime, residual energy as well as effective routing in WSN. Therefore, this article aims to propose a novel protocol to enhance the energy efficiency of the network thereby providing an optimal routing path. This can be achieved by selecting an optimal cluster head that maintains communication between the base station and the sensor node. In this article, a novel multi‐objective moth swarm based sailfish (MOMS‐SF) technique is employed in selecting an optimal cluster head. The proposed MOMS‐SF technique enhances the network lifetime and minimizes the energy consumption of the network. Finally, the evaluation results are conducted to determine the network performances of the proposed MOMS‐SF approach. Also, a comparative analysis is carried out and the graphical analyzes for various parameters are made for various approaches to determine the effectiveness of the proposed system.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88219804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An arbitrable multi‐replica data auditing scheme based on smart contracts 基于智能合约的可仲裁多副本数据审计方案
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-13 DOI: 10.1002/cpe.7164
Junfeng Tian, Qian Yang
{"title":"An arbitrable multi‐replica data auditing scheme based on smart contracts","authors":"Junfeng Tian, Qian Yang","doi":"10.1002/cpe.7164","DOIUrl":"https://doi.org/10.1002/cpe.7164","url":null,"abstract":"In order to improve the availability and persistence of data, lightweight cloud users want to store multiple‐replicas of the original file on the server with less local computing and storage overhead. Meanwhile, to ensure the integrity of the remote storage data, some schemes have been designed to allow public verification. However, most existing schemes only focus on malicious cloud service providers and ignore the possibility that dishonest users cheat for profit. This article implements an arbitrable data auditing scheme under multi‐replica storage. The scheme adopts a new arbitration mechanism under multi‐replica storage, makes use of the non‐tampering characteristics of smart contracts, carries out reliable verification through miners, and realizes the timely detection and punishment of any fraudulent entity. In addition, the scheme also designs a multi‐replica storage model based on the B* tree, realizes the batch verification of replica blocks, enables the fraud behavior of malicious users to be identified after data update, and improves the space utilization efficiency. The article also gives detailed security proof of the proposed scheme. The evaluation result shows our scheme not only realizes a more practical and fairer audit scheme but also has lower computational overhead than current state‐of‐the‐art multi‐replica arbitrable schemes.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88450474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel trust recommendation model in online social networks using soft computing methods 基于软计算方法的在线社交网络信任推荐模型
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-13 DOI: 10.1002/cpe.7153
N. Sirisala, Anitha Yarava, Y. P. Reddy, Veeresh Poola
{"title":"A novel trust recommendation model in online social networks using soft computing methods","authors":"N. Sirisala, Anitha Yarava, Y. P. Reddy, Veeresh Poola","doi":"10.1002/cpe.7153","DOIUrl":"https://doi.org/10.1002/cpe.7153","url":null,"abstract":"Social network (OSN) is an emerging platform through which people can connect with their friends, relatives, and other like‐minded people. On the other hand, users' personal information might be misused because of other users' biased and malicious behavior. Establishing a trusted environment in social networks is one of the current research problems. Some of the research papers proposed to trust computational methods, but still, there is a lack of methods to handle biased recommendations and loss of trust accuracy towards the target user. In this article, to address these open issues, “a novel trust recommendation model in online social networks using soft computing methods (TRMSC)” is proposed for the Twitter social networks. Here direct and indirect trust is computed for known and unknown users, respectively. The direct trust of a user is computed using clustering methods based on his social activities (posts, retweets received, mentions received, listed count, and follower count) with other users. In the computation of indirect trust, the impact of biased recommendations is suppressed using the Dempster Shafer theory(DST) method, and loss of trust is minimized using trust transitive matrices. The performance of the proposed method is analyzed theoretically and experimentally. Time and space complexities are measured using asymptotic notations. In experimental results, TRMSC is evaluated for different network sizes and for target users at different distances (2 to 4‐hops), where it could perform better than existing methods.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76319845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The analysis of cross‐correlation between Istanbul Stock Exchange and major stock markets and indices: An empirical analysis using Random Matrix Theory 伊斯坦布尔证券交易所与主要股票市场和指数的相互关系分析:基于随机矩阵理论的实证分析
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-13 DOI: 10.1002/cpe.7113
B. Tastan, Hatice Imamoglu
{"title":"The analysis of cross‐correlation between Istanbul Stock Exchange and major stock markets and indices: An empirical analysis using Random Matrix Theory","authors":"B. Tastan, Hatice Imamoglu","doi":"10.1002/cpe.7113","DOIUrl":"https://doi.org/10.1002/cpe.7113","url":null,"abstract":"This study attempts to investigate the cross‐correlation between stocks listed under the XU100 index of Borsa Istanbul with several ratios and indices of the stock markets worldwide by using the Random Matrix Theory approach through a correlation matrix. In addition, Eigenvector Analysis, Network Analysis, Dimension Reduction will be carried out to investigate cross‐correlation between markets. It was found that XU100, which is an index that includes 100 stocks highest in volume, has a distinguishing behavior compared to other indices and rates in terms of eigenvalue and related eigenvector structures. Furthermore, mean‐value portfolio analysis showed that the empirical correlation matrix underestimates the portfolio risks than the correlation matrix obtained by filtering the noise. Coronavirus pandemic also affected Borsa Istanbul by breaking periodic behavior of volatility and correlation cycle.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73728155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Identification of the types of disease for tomato plants using a modified gray wolf optimization optimized MobileNetV2 convolutional neural network architecture driven computer vision framework 利用改进的灰狼优化的MobileNetV2卷积神经网络架构驱动的计算机视觉框架对番茄植株病害类型进行识别
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-13 DOI: 10.1002/cpe.7161
G. Mukherjee, Arpitam Chatterjee, B. Tudu
{"title":"Identification of the types of disease for tomato plants using a modified gray wolf optimization optimized MobileNetV2 convolutional neural network architecture driven computer vision framework","authors":"G. Mukherjee, Arpitam Chatterjee, B. Tudu","doi":"10.1002/cpe.7161","DOIUrl":"https://doi.org/10.1002/cpe.7161","url":null,"abstract":"Tomato is a widely consumed fruit across the world due to its high nutritional values. Leaf diseases in tomato are very common which incurs huge damages but early detection of leaf diseases can help in avoiding that. The existing practices for detecting different diseases by the human experts are costly, time consuming and subjective in nature. Computer vision plays important role toward early detection of tomato leaf detection. However, implementation of computationally less expensive model and improvement of detection performance is still open. This article reports a computer vision based system to classify seven different categories of diseases, namely, bacterial spot, early blight, late blight, leaf mold, septoria leaf spot, spider mites, and target spots using optimized MobileNetV2 architecture. A modified gray wolf optimization approach has been adopted for optimization of MobileNetV2 hyperparameters for improved performance. The model has been validated using standard internal and external validation methods and found to provide the classification accuracy in the tune of 98%. The results reflect the promising potential of the presented framework for early detection of tomato leaf diseases which can help to avoid substantial agricultural loss.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"22 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72914402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
PECCO: A profit and cost‐oriented computation offloading scheme in edge‐cloud environment with improved Moth‐flame optimization PECCO:一种基于改进蛾焰优化的边缘云环境下以利润和成本为导向的计算卸载方案
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-12 DOI: 10.1002/cpe.7163
Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu
{"title":"PECCO: A profit and cost‐oriented computation offloading scheme in edge‐cloud environment with improved Moth‐flame optimization","authors":"Jiashu Wu, Hao Dai, Yang Wang, Shigen Shen, Chengzhong Xu","doi":"10.1002/cpe.7163","DOIUrl":"https://doi.org/10.1002/cpe.7163","url":null,"abstract":"With the fast growing quantity of data generated by smart devices and the exponential surge of processing demand in the Internet of Things (IoT) era, the resource‐rich cloud centers have been utilized to tackle these challenges. To relieve the burden on cloud centers, edge‐cloud computation offloading becomes a promising solution since shortening the proximity between the data source and the computation by offloading computation tasks from the cloud to edge devices can improve performance and quality of service. Several optimization models of edge‐cloud computation offloading have been proposed that take computation costs and heterogeneous communication costs into account. However, several important factors are not jointly considered, such as heterogeneities of tasks, load balancing among nodes and the profit yielded by computation tasks, which lead to the profit and cost‐oriented computation offloading optimization model PECCO proposed in this article. Considering that the model is hard in nature and the optimization objective is not differentiable, we propose an improved Moth‐flame optimizer PECCO‐MFI which addresses some deficiencies of the original Moth‐flame optimizer and integrate it under the edge‐cloud environment. Comprehensive experiments are conducted to verify the superior performance of the proposed method when optimizing the proposed task offloading model under the edge‐cloud environment.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"4 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74528232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An efficient framework for the similarity prediction with query recommendation in E‐learning system 基于查询推荐的E - learning相似度预测框架
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-10 DOI: 10.1002/cpe.7145
Vedavathi Nagendra Prasad, Anil Kumar Kureekatil Muthappa
{"title":"An efficient framework for the similarity prediction with query recommendation in E‐learning system","authors":"Vedavathi Nagendra Prasad, Anil Kumar Kureekatil Muthappa","doi":"10.1002/cpe.7145","DOIUrl":"https://doi.org/10.1002/cpe.7145","url":null,"abstract":"A novel model of data similarity estimation and clustering method is proposed in this article to retrieve the relevant data with the best matching in big data processing. An advanced model of graph distance pattern (GDP) method with lexical subgroup (LS) system is used to estimate the similarity between the query data and the entire database. With the help of neural network, the relevancy of feature attributes in the database are predicted and matching index is sorted to provide the recommended data for given query data. This was achieved by using the correlated sim‐neural network (CSNN). This is an enhanced model of neural network technology to find the relevancy based on the correlation factor of feature set. The training process of CSNN classifier is carried by estimating the correlation factor of the attributes of dataset. These are forms as the clusters and paged with proper indexing based on the LS parameter of similarity metric. The results obtained by the proposed system for recall, precision, accuracy, error rate, F‐measure, kappa coefficient, specificity, and MCC are 0.98, 0.98, 0.97, 0.03, 0.99, 0.991, 0.986, and 0.984, respectively.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"17 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89036034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Malware detection method based on image analysis and generative adversarial networks 基于图像分析和生成对抗网络的恶意软件检测方法
Concurrency and Computation: Practice and Experience Pub Date : 2022-07-08 DOI: 10.1002/cpe.7170
Yanhua Liu, Jiaqi Li, Baoxu Liu, Xiaoling Gao, Ximeng Liu
{"title":"Malware detection method based on image analysis and generative adversarial networks","authors":"Yanhua Liu, Jiaqi Li, Baoxu Liu, Xiaoling Gao, Ximeng Liu","doi":"10.1002/cpe.7170","DOIUrl":"https://doi.org/10.1002/cpe.7170","url":null,"abstract":"Malware detection is indispensable to cybersecurity. However, with the advent of new malware variants and scenarios with few and imbalanced samples, malware detection for various complex scenarios has been a very challenging problem. In this article, we propose a malware detection method based on image analysis and generative adversarial networks, named MadInG, which can improve the accuracy of malware detection for insufficient samples, sample imbalance, and new variants scenarios. Specifically, we first generate fixed‐size grayscale images of malware to reduce the workload of feature engineering or the involvement of domain expert knowledge on malware detection. Then we introduce auxiliary classifier generative adversarial networks into malware detection to enhance the generalization ability of the detector. Finally, we construct a variety of malware scenarios and compare our proposed method with existing popular detection methods. Extensive experimental results demonstrate that our method achieves high accuracy and well balance in malware detection for different scenarios, especially, the detection rate of malware variants reaches 99.5%.","PeriodicalId":10584,"journal":{"name":"Concurrency and Computation: Practice and Experience","volume":"42 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77254322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信