Journal of Computer Science and Cybernetics最新文献

筛选
英文 中文
RECURSIVE JOIN PROCESSING IN BIG DATA ENVIRONMENT 大数据环境下的递归连接处理
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15889
Anh-Cang Phan, Thanh-Ngoan Trieu, Thuong-Cang Phan
{"title":"RECURSIVE JOIN PROCESSING IN BIG DATA ENVIRONMENT","authors":"Anh-Cang Phan, Thanh-Ngoan Trieu, Thuong-Cang Phan","doi":"10.15625/1813-9663/37/2/15889","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15889","url":null,"abstract":"In the era of information explosion, Big data is receiving increased attention as having important implications for growth, profitability, and survival of modern organizations. However, it also offers many challenges in the way data is processed and queried over time. A join operation is one of the most common operations appearing in many data queries. Specially, a recursive join is a join type used to query hierarchical data but it is more extremely complex and costly. The evaluation of the recursive join in MapReduce includes some iterations of two tasks of a join task and an incremental computation task. Those tasks are significantly expensive and reduce the performance of queries in large datasets because they generate plenty of intermediate data transmitting over the network. In this study, we thus propose a simple but efficient approach for Big recursive joins based on reducing by half the number of the required iterations in the Spark environment. This improvement leads to significantly reducing the number of the required tasks as well as the amount of the intermediate data generated and transferred over the network. Our experimental results show that an improved recursive join is more efficient and faster than a traditional one on large-scale datasets.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"6 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85852181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
POST-QUANTUM BLIND SIGNATURE PROTOCOL ON NON-COMMUTATIVE ALGEBRAS 非交换代数上的后量子盲签名协议
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/16023
Minh N.H, Moldovyan D.N, et al.
{"title":"POST-QUANTUM BLIND SIGNATURE PROTOCOL ON NON-COMMUTATIVE ALGEBRAS","authors":"Minh N.H, Moldovyan D.N, et al.","doi":"10.15625/1813-9663/37/4/16023","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/16023","url":null,"abstract":"A method for constructing a blind signature scheme based on a hidden discrete logarithm problem defined in finite non-commutative associative algebras is proposed. Blind signature protocols are constructed using four-dimensional and six-dimensional algebras defined over a ground finite field GF(p) and containing a global two-sided unit as an algebraic support. The basic properties of the used algebra, which determine the choice of protocol parameters, are described.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"81 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78269959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MODELING AMINO ACID SUBSTITUTIONS FOR WHOLE GENOMES 模拟全基因组的氨基酸取代
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/15937
L. Vinh
{"title":"MODELING AMINO ACID SUBSTITUTIONS FOR WHOLE GENOMES","authors":"L. Vinh","doi":"10.15625/1813-9663/37/4/15937","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/15937","url":null,"abstract":"Modeling amino acid substitution process is a core task in bioinformatics. New advanced sequencing technologies have generated huge datasets including whole genomes from various species. Estimating amino acid substitution models from whole genome datasets provides us unprecedented opportunities to accurately investigate relationships among species. In this paper, we review state-of-the-art computational methods to estimate amino acid substitution models from large datasets. We also describe a comprehensive pipeline to practically estimate amino acid models from whole genome datasets. Finally, we apply amino acid substitution models to build phylogenomic trees from bird and plant genome datasets. We compare our newly reconstructed phylogenomic trees and published ones and discuss new findings.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"264 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78406678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
USING COMBINATORIAL MAPS FOR ALGORITHMS ON GRAPHS 在图上使用组合映射的算法
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/3/16253
R. Cori
{"title":"USING COMBINATORIAL MAPS FOR ALGORITHMS ON GRAPHS","authors":"R. Cori","doi":"10.15625/1813-9663/37/3/16253","DOIUrl":"https://doi.org/10.15625/1813-9663/37/3/16253","url":null,"abstract":"The aim of this paper is to come back to a data structure representation of graph by permutations. This originated in the years 1960-1970 by contributions due to J. Edmonds [7], A. Jacques [11], W. Tutte [22] in order to consider the embedding of a graph in a surface as a combinatorial object. Some algebraic developments where suggested in [4] and [12]. It was also used for implementation in different situation, like planarity testing by H. de Fraysseix and P. Rosenstiehl [6], computer vision by G. Damiand  and A. Dupas [5] or formal proofs by G. Gonthier [9].","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"99 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81382485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ONE-MINIUM-ONLY BASIC-SET TRELLIS MIN-MAX DECODER ARCHITECTURE FOR NONBINARY LDPC CODE 非二进制LDPC码的单最小-唯一基本集网格最小-最大解码器结构
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15917
T. Dinh, Huyen Pham Thi, Hung Dao Tuan, Nghia Pham Xuan
{"title":"ONE-MINIUM-ONLY BASIC-SET TRELLIS MIN-MAX DECODER ARCHITECTURE FOR NONBINARY LDPC CODE","authors":"T. Dinh, Huyen Pham Thi, Hung Dao Tuan, Nghia Pham Xuan","doi":"10.15625/1813-9663/37/2/15917","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15917","url":null,"abstract":"Nonbinary low-density-parity-check (NB-LDPC) code outperforms their binary counterpart in terms of error-correcting performance and error-floor property when the code length is moderate. However, the drawback of NB-LDPC decoders is high complexity and the complexity increases considerably when increasing the Galois-field order. In this paper, an One-Minimum-Only basic-set trellis min-max (OMO-BS-TMM) algorithm and the corresponding decoder architecture are proposed for NBLDPC codes to greatly reduce the complexity of the check node unit (CNU) as well as the whole decoder. In the proposed OMO-BS-TMM algorithm, only the first minimum values are used for generating the check node messages instead of using both the first and second minimum values, and the number of messages exchanged between the check node and the variable node is reduced in comparison with the previous works. Layered decoder architectures based on the proposed algorithm were implemented for the (837, 726) NB-LDPC code over GF(32) using 90-nm CMOS technology. The implementation results showed that the OMO-BS-TMM algorithm achieves the almost similar error-correcting performance, and a reduction of the complexity by 31.8% and 20.5% for the whole decoder, compared to previous works. Moreover, the proposed decoder achieves a higher throughput at 1.4 Gbps, compared with the other state-of-the-art NBLDPC decoders.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"62 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83692508","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FUZZY RELATIONAL DATABASE MODEL AND MANAGEMANT SYSTEM FOR IMPRECISE INFORMATION 模糊关系数据库模型及不精确信息管理系统
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/2/15346
Hoa Nguyen, Nguyen Vu Uyen Nhi, LeThuc Duy
{"title":"FUZZY RELATIONAL DATABASE MODEL AND MANAGEMANT SYSTEM FOR IMPRECISE INFORMATION","authors":"Hoa Nguyen, Nguyen Vu Uyen Nhi, LeThuc Duy","doi":"10.15625/1813-9663/37/2/15346","DOIUrl":"https://doi.org/10.15625/1813-9663/37/2/15346","url":null,"abstract":"This paper introduces a fuzzy relational database model (FRDB) and the management system for it. FRDB is built by extending the classical relational database model with the fuzzy membership degree of tuples in relations. The management system for FRDB with the querying language like SQL is built by using a classical open-source management system.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"50 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85287653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DUAL TRANSFORMER ENCODERS FOR SESSION-BASED RECOMMENDATION 基于会话推荐的双变压器编码器
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/15844
P. H. Anh, Ngo Xuan Bach, Tu Minh Phuong
{"title":"DUAL TRANSFORMER ENCODERS FOR SESSION-BASED RECOMMENDATION","authors":"P. H. Anh, Ngo Xuan Bach, Tu Minh Phuong","doi":"10.15625/1813-9663/37/4/15844","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/15844","url":null,"abstract":"When long-term user proles are not available, session-based recommendation methods are used to predict the user's next actions from anonymous sessions-based data. Recent advances in session-based recommendation highlight the necessity of modeling not only user sequential behaviors but also the user's main interest in a session, while avoiding the eect of unintended clicks causing interest drift of the user. In this work, we propose a Dual Transformer Encoder Recommendation model (DTER) as a solution to address this requirement. The idea is to combine the following recipes: (1) a Transformer-based model with dual encoders capable of modeling both sequential patterns and the main interest of the user in a session; (2) a new recommendation model that is designed for learning richer session contexts by conditioning on all permutations of the session prex. This approach provides a unied framework for leveraging the ability of the Transformer's self-attention mechanism in modeling session sequences while taking into account the user's main interest in the session. We empirically evaluate the proposed method on two benchmark datasets. The results show that DTER outperforms state-of-the-art session-based recommendation methods on common evaluation metrics.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75387011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE 开发物联网生态系统开发生命周期的方法-辅助物联网视角
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/3/16245
M. Paprzycki, M. Ganzha, K. Wasielewska, Piotr Lewandowski
{"title":"DEVSECOPS METHODOLOGY FOR NG-IOT ECOSYSTEM DEVELOPMENT LIFECYCLE – ASSIST-IOT PERSPECTIVE","authors":"M. Paprzycki, M. Ganzha, K. Wasielewska, Piotr Lewandowski","doi":"10.15625/1813-9663/37/3/16245","DOIUrl":"https://doi.org/10.15625/1813-9663/37/3/16245","url":null,"abstract":"Current software projects require continuous integration during their whole lifetime. In this context, different approaches regarding introduction of DevOps and DevSecOps strategies have been proposed in the literature. While DevOps proposes an agile methodology for the development and instantiation of software platforms with minimal impact in any kind of operations environment, this contribution proposes the introduction of DevOps methodology for Next Generation IoT deployments. Moreover, novelty of the proposed approach lies in leveraging DevSecOps in different stages and layers of the architecture. In particular, the present work describes the different DevSecOps methodology tasks, and how the security is included on pre-design activities such as planning, creation or adaptation, the design and implementation, as well as on post-implementation activities such as detection, response. Without proper consideration of security and privacy best practices identified in this article, the continuous delivery of services using DevOps methodologies may create risks and introduce different vulnerabilities for Next Generation IoT deployments.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72645002","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES 高级加密协议中的隐私:原型示例
Journal of Computer Science and Cybernetics Pub Date : 2021-01-01 DOI: 10.15625/1813-9663/37/4/16104
Phan Dương Hiệu, M. Yung
{"title":"PRIVACY IN ADVANCED CRYPTOGRAPHIC PROTOCOLS: PROTOTYPICAL EXAMPLES","authors":"Phan Dương Hiệu, M. Yung","doi":"10.15625/1813-9663/37/4/16104","DOIUrl":"https://doi.org/10.15625/1813-9663/37/4/16104","url":null,"abstract":"Cryptography is the fundamental cornerstone of cybersecurity employed for achieving data confidentiality, integrity, and authenticity. However, when cryptographic protocols are deployed for emerging applications such as cloud services or big data, the demand for security grows beyond these basic requirements. Data nowadays are being extensively stored in the cloud, users also need to trust the cloud servers/authorities that run powerful applications. Collecting user data, combined with powerful machine learning tools, can come with a huge risk of mass surveillance or undesirable data-driven strategies for making profits rather than for serving the user. Privacy, therefore, becomes more and more important, and new techniques should be developed to protect personal information and to reduce trust requirements on the authorities or the Big Tech providers. In a general sense, privacy is ``the right to be left alone'' and privacy protection allows individuals to have control over how their personal information is collected and used. In this survey, we discuss the privacy protection methods of various cryptographic protocols, in particular we review: - Privacy in electronic voting systems. This may be, perhaps, the most important real-world application where privacy plays a fundamental role. %classical authentication with group, ring signatures, anonymous credentials. - Private computation. This may be the widest domain in the new era of modern technologies with cloud computing and big data, where users delegate the storage of their data and the computation to the cloud. In such a situation, ``how can we preserve privacy?'' is one of the most important questions in cryptography nowadays. - Privacy in contact tracing. This is a typical example of a concrete study on a contemporary scenario where one should deal with the unexpected social problem but needs not pay the cost of weakening the privacy of users. Finally, we will discuss some notions which aim at reinforcing privacy by masking the type of protocol that we execute, we call it the covert cryptographic primitives and protocols.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78574252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SOME NEW RESULTS ON AUTOMATIC IDENTIFICATION OF VIETNAMESE FOLK SONGS CHEO AND QUANHO 越南民歌cheo和quanho自动识别的一些新结果
Journal of Computer Science and Cybernetics Pub Date : 2020-12-14 DOI: 10.15625/1813-9663/36/4/14424
Chu Ba Thanh, Trinh Van Loan, N. Quang
{"title":"SOME NEW RESULTS ON AUTOMATIC IDENTIFICATION OF VIETNAMESE FOLK SONGS CHEO AND QUANHO","authors":"Chu Ba Thanh, Trinh Van Loan, N. Quang","doi":"10.15625/1813-9663/36/4/14424","DOIUrl":"https://doi.org/10.15625/1813-9663/36/4/14424","url":null,"abstract":"Vietnamese folk songs are very rich in genre and content. Identifying Vietnamese folk tunes will contribute to the storage and search for information about these tunes automatically. The paper will present an overview of the classification of music genres that have been performed in Vietnam and abroad. For two types of very popular folk songs of Vietnam such as Cheo and Quanho, the paper describes the dataset and Gaussian Mixture Model (GMM) to perform the experiments on identifying some of these folk songs. The GMM used for experiment with 4 sets of parameters containing Mel Frequency Cepstral Coefficients (MFCC), energy, the first and the second derivatives of MFCC and energy, tempo, intensity, and fundamental frequency. The results showed that the parameters added to the MFCCs contributed significantly to the improvement of the identification accuracy with the appropriate values of Gaussian component number M. Our experiments also showed that, on average, the length of the excerpts was only 29.63% of the whole song for Cheo and 38.1% of the whole song for Quanho, the identification rate was only 3.1% and 2.33% less than the whole song for Cheo and Quanho, respectively. The identification of Cheo and Quanho was also tested with i-vectors.","PeriodicalId":15444,"journal":{"name":"Journal of Computer Science and Cybernetics","volume":"23 1","pages":"325-345"},"PeriodicalIF":0.0,"publicationDate":"2020-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82032152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信