Int. J. Distributed Syst. Technol.最新文献

筛选
英文 中文
Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm 基于DWT-SVD和萤火虫算法优化的EEG数据安全水印
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307902
A. Gupta, Chinmay Chakraborty, B. Gupta
{"title":"Watermarking of EEG Data to Provide Security Based on DWT-SVD and Optimized by Firefly Algorithm","authors":"A. Gupta, Chinmay Chakraborty, B. Gupta","doi":"10.4018/ijdst.307902","DOIUrl":"https://doi.org/10.4018/ijdst.307902","url":null,"abstract":"A watermark embedding into digital media or signal is called digital watermarking for the purpose of enhancing security from copyright encroachment. In this paper, an optimized and advanced watermarking technique has been proposed, which is based on singular value decomposition (SVD) in the discrete wavelet transform (DWT) domain using the firefly algorithm (FA). In this, a watermark logo is embedded into electroencephalogram (EEG) data. To optimize the scaling factor, robustness and imperceptibility have been considered. Further, the performance of the proposed algorithm is also analyzed against various attacks. The results show the adequacy of the proposed algorithm and indicate a higher value of NCC of 0.95 as robustness and PSNR 51.83 as imperceptibility in contrast with the related existing method.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131130462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authorization Model for Securing Cloud SaaS Services (Netflix) 保护云SaaS服务的授权模型(Netflix)
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307903
Tanveer Ahmad, R. Pandey, Mohammad Faisal
{"title":"Authorization Model for Securing Cloud SaaS Services (Netflix)","authors":"Tanveer Ahmad, R. Pandey, Mohammad Faisal","doi":"10.4018/ijdst.307903","DOIUrl":"https://doi.org/10.4018/ijdst.307903","url":null,"abstract":"At the enterprise level, cloud software as a service (SaaS) is in high demand. As software as a service (SaaS) can be easily provided in a multitenant way, its execution assessment, information inactivity, and authorization are critical issues related to the cloud supplier at the time of providing administrations to sellers. Netflix is a mixed media supplier that gives online streaming from a library of movies and TV arrangement. Netflix services are exclusively based on cloud SaaS. The highlight of the study is to analyze the finest hones over secure cloud environment in authorization perspective based on behavioral biometrics. A conceptual authorization is displayed in this paper to secure cloud services, especially SaaS, when unauthorized access is supported by legitimate users. The use case is taken as Netflix.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"338 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123398150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems 基于社会物联网系统的协同主机安全防御系统边缘计算
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307956
Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li
{"title":"Edge Computing on Cooperative Host Security Defense System Based on Social IoT Systems","authors":"Linjiang Xie, Feilu Hang, W. Guo, Zhenhong Zhang, Hanruo Li","doi":"10.4018/ijdst.307956","DOIUrl":"https://doi.org/10.4018/ijdst.307956","url":null,"abstract":"Information security theory has its roots in the field of information systems. It is composed completely of ideas relating to information and the variety of systems on which it can be found. Information security phenomena are examined in this article to determine how and why they arise. While conducting the study for this paper, the objective was to understand better the connection between information security concepts and how companies use such concepts. This research proposes a cooperative host security defense system based on information security theory (CHSDS-IST). This proposed solution detects false data from unsecure communication by cooperative defense mechanism with information security theory. The simulation analysis finds the efficiency and reliability of the proposed scheme in internet attack prevention and detection over existing approaches. The outcome of the article is based on maximum path count, average installation time ratio is 85.6%, risk on attack path ratio is 79.03%, and comparison test results ratio is 80.4%.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128785969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Granular Approach to Secure the Privacy of Electronic Health Records Through Blockchain Technology 通过区块链技术保护电子健康记录隐私的细粒度方法
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307899
Megha Jain, D. Pandey, Kewal Krishan Sharma
{"title":"A Granular Approach to Secure the Privacy of Electronic Health Records Through Blockchain Technology","authors":"Megha Jain, D. Pandey, Kewal Krishan Sharma","doi":"10.4018/ijdst.307899","DOIUrl":"https://doi.org/10.4018/ijdst.307899","url":null,"abstract":"The method of storing data in traditional Electronic Health Records (EHRs) becomes even more obsolete when it has to undertake data from more than one institution. This problem is bigger than it seems as, most of the times the patients' medical data is scattered among various Healthcare Centers. Also, these multiple and inconsistent health records are almost never reviewed which further makes them unreliable. All this can be achieved by implementing the Blockchain Technology into the traditional Electronic Health Records. We propose a blockchain technology based Electronic Health Record portal for patients, doctors, and other users to provide temper proof, secure, and efficient access to health records while maintaining the privacy of patient’s health records. The aim of this paper is to deal with the various needs of patients, doctors, and third parties, as well as to see how the system could resolve privacy and security issues in the healthcare industry.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"2023 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115819229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Design of an Assistant Decision Support System for Sports Training Based on Association Rules 基于关联规则的运动训练辅助决策支持系统设计
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307959
Zhiliang Zeng, Qianqiu Jiang
{"title":"Design of an Assistant Decision Support System for Sports Training Based on Association Rules","authors":"Zhiliang Zeng, Qianqiu Jiang","doi":"10.4018/ijdst.307959","DOIUrl":"https://doi.org/10.4018/ijdst.307959","url":null,"abstract":"In order to quantitatively evaluate the effect of sports training, it is necessary to track the dynamic characteristics of sports by using sports training aided decision support system. When the existing sports training assistant decision support system extracts the features of decision association rules, some redundant features will appear when establishing the global association rules, which increases the amount and difficulty of data calculation and affects the effect of assistant decision support. On this basis, the data fusion of assistant decision support information is carried out, and the optimal assistant decision support scheme is obtained according to the fusion results. The experimental results show that the design system is superior to the existing auxiliary decision-making system in motion recognition rate, motion result accuracy rate, and decision-making accuracy rate, which can provide users with auxiliary decision-making support for sports training and has good practical application effect.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115695436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Description and Implementation of Accounting Digital Rights Management Based on Semantics 基于语义的会计数字权限管理的描述与实现
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.308002
Wei Wang
{"title":"Description and Implementation of Accounting Digital Rights Management Based on Semantics","authors":"Wei Wang","doi":"10.4018/ijdst.308002","DOIUrl":"https://doi.org/10.4018/ijdst.308002","url":null,"abstract":"Aiming at the problem of security risk of accounting secret information outflow to illegal users due to the introduction of XBRL GL(eXtensible Business Repo Rting Lang Uage for Global Ledg er) technology in accounting information release, a semantic-based accounting digtal rights management description language (ADRM L) is proposed. This method is based on the introduction of digital rights mechanism, this paper describes the rights and obligations of different accounting information publishers and users,ADRML language to facilitate the safe use of semantic segments (accounting elements) defined by the semantic network, in the following, the algorithm of ADRM L parser will be further studied and optimized to improve the parsing efficiency.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"152 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132373190","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Collaborative Edge Computing Advances in Children's Behavior Observation for Social Internet of Things Systems in Preschool Education 协同边缘计算在学前教育社会物联网系统儿童行为观察中的进展
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307952
Danqing Liu, Luqun Liu
{"title":"Collaborative Edge Computing Advances in Children's Behavior Observation for Social Internet of Things Systems in Preschool Education","authors":"Danqing Liu, Luqun Liu","doi":"10.4018/ijdst.307952","DOIUrl":"https://doi.org/10.4018/ijdst.307952","url":null,"abstract":"Teachers who observe and analyze children's conduct can learn more about children and the reasons for their behavior. Promoting the fusion of adult and preschool vision through discussion is a basic competency of preschool teachers.Social Internet of Things (SIoT) uses recent advances in collaborativeand social relationships among SIoT users to take advantage of the network's strengths while posing new challenges.With the help of the theory of development, behavioral cues, and individual circumstances, a thorough and holistic interpretation can be made of children's behavior.There is a brief introduction to the concepts of collaborative edge computing and data storage in addition to examples of various socially-minded solutions; for long last, a list of research obstacles is provided. When measured numerically, the ECBO has a positive impact on student accomplishment (97.9%), developmental progress (95.3%), interpersonal interaction (94.6%), parental participation (98.5%), and attention ratio (98%).","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"238 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133456931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computer Network Vulnerability Detection and Semantic Data Analysis Optimization Based on Artificial Intelligence 基于人工智能的计算机网络漏洞检测与语义数据分析优化
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.308000
Huiyan Li, Xinhua Xiao
{"title":"Computer Network Vulnerability Detection and Semantic Data Analysis Optimization Based on Artificial Intelligence","authors":"Huiyan Li, Xinhua Xiao","doi":"10.4018/ijdst.308000","DOIUrl":"https://doi.org/10.4018/ijdst.308000","url":null,"abstract":"In order to solve the network security vulnerabilities in the process of network information interaction, which affect the integrity and confidentiality of data. The computer network vulnerability detection and semantic data analysis optimization based on artificial intelligence are proposed, and the results show that the final accuracy of the test set is improved to 88.5%, but the false positive rate is as high as 18%. Based on the direct classification model, the code under test is compared with the vulnerability template, the model fuses the two direct classification models and reduces the false positive rate to less than 5% under the condition that the accuracy is basically the same.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116155481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Deep Learning Techniques in Fruit Disease Detection 深度学习技术在水果病害检测中的研究进展
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.307901
Somya Goel, Kavita Pandey
{"title":"A Survey on Deep Learning Techniques in Fruit Disease Detection","authors":"Somya Goel, Kavita Pandey","doi":"10.4018/ijdst.307901","DOIUrl":"https://doi.org/10.4018/ijdst.307901","url":null,"abstract":"The improvement in computer vision techniques made the implementation of various agriculture related problems easy. One such problem is fruit disease detection. There has been enormous research on different fruits like the apple, mango, olive, kiwi, orange, passion fruit, and others using deep learning techniques. This article summarizes the major contributions of this field over past few years. As per the authors' knowledge, there is no survey paper specifically on fruit disease detection using deep learning techniques. The technical analysis of deep learning techniques to predict diseases in fruits have been done in this article. The study also presents a comparative study of image acquisition, image pre-processing, and segmentation techniques along with the deep learning models used. The study concluded the fact that the best fit deep learning model can be different depending on the computation power of the system and the data used. Directions of future research have also been discussed in the article.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116320660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Application of the Internet of Things Service Platform Based on Semantic Network 基于语义网络的物联网服务平台研究与应用
Int. J. Distributed Syst. Technol. Pub Date : 2022-07-12 DOI: 10.4018/ijdst.308004
Min Ren
{"title":"Research and Application of the Internet of Things Service Platform Based on Semantic Network","authors":"Min Ren","doi":"10.4018/ijdst.308004","DOIUrl":"https://doi.org/10.4018/ijdst.308004","url":null,"abstract":"In order to study the Internet of Things service platform based on semantic Network, a service-oriented clustering labeling method is proposed, firstly, a semantic Web service similarity computing method is proposed to solve the shortcomings of the existing methods. This method describes the designed semantic Web service annotation clustering algorithm based on AP algorithm. The distance matrix and related parameters of the algorithm are calculated and assigned according to the results of similarity calculation. The correctness of preference parameter selection will be compared and verified in the service discovery system. The greater the value of damping coefficient, the more iterations, and the slower the convergence rate. However, when the value of damping coefficient is 0.7, the number of iterations is moderate and the convergence rate is the best, which proves that this method has a better effect on service function matching.","PeriodicalId":118536,"journal":{"name":"Int. J. Distributed Syst. Technol.","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129864628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信