{"title":"Deep learning-based software for detecting population density of Antarctic birds","authors":"S. Uğuz","doi":"10.56415/csjm.v31.11","DOIUrl":"https://doi.org/10.56415/csjm.v31.11","url":null,"abstract":"Monitoring populations of bird species living in Antarctica with current technologies is critical to the future of habitats on the continent. Studies of bird species living in Antarctica are limited due to climate, challenging geographic conditions, and transportation and logistical constraints. The goal of this study is to develop Deep Learning-based software to determine the population densities of Antarctic penguins and endangered albatrosses. Images of penguins and albatrosses obtained from internet sources were labeled using the segmentation technique. For this purpose, 4144 labeled data were trained with five different convolutional neural network architectures TOOD, YOLOv3, YOLOF, Mask R-CNN, and Sparse R-CNN. The performance of the obtained models was measured using the average precision (AP) metric. The experimental results show that the TOOD-ResNet50 model with 0.73 {$AP^{50}$} detects the Antarctic birds adequately compared to the other models. At the end of the study, a software was developed to detect penguins and albatrosses in real time","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115362368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correcting Instruction Expression Logic Errors with GenExp: A Genetic Programming Solution","authors":"M. Bekkouche","doi":"10.56415/csjm.v31.12","DOIUrl":"https://doi.org/10.56415/csjm.v31.12","url":null,"abstract":"Correcting logical errors in a program is not simple even with the availability of an error locating tool. In this article, we introduce GenExp, a genetic programming approach to automate the task of repairing instruction expressions from logical errors. correction{Starting} from an error location specified by the programmer, we search for a replacement instruction that passes all test cases. Specifically, we generate expressions that will substitute the selected instruction expression until correction{we} obtain one that correction{corrects} the input program. correction{The search space is exponentially large, making exhaustive methods inefficient.} correction{Therefore, we utilize a genetic programming meta-heuristic that organizes the search process into stages, with each stage producing a group of individuals.} The results showed that our approach can find at least one plausible patch for almost all cases considered in experiments and outperforms a notable state-of-the-art error repair approach correction{like} ASTOR. Although our tool is slower than ASTOR, it correction{provides} greater precision in detecting plausible repairs, making it a suitable option for users who prioritize accuracy over speed.","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130966946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comprehensive Performance Study of Hashing Functions","authors":"G. Sridevi, M. Ramakrishna, DV Ashoka","doi":"10.56415/csjm.v31.10","DOIUrl":"https://doi.org/10.56415/csjm.v31.10","url":null,"abstract":"Most literature on hashing functions speaks in terms of hashing functions being either ‘good’ or ‘bad’. In this paper, we demonstrate how a hashing function that gives good results for one key set, performs badly for another. We also demonstrate that, for a single key set, we can find hashing functions that hash the keys with varying performances ranging from perfect to worst distributions. We present a study on the effect of changing the prime number ‘$p$’ on the performance of a hashing function from $H_1$ Class of Universal Hashing Functions. This paper then explores a way to characterize hashing functions by studying their performance over all subsets of a chosen Universe. We compare the performance of some popular hashing functions based on the average search performance and the number of perfect and worst-case distributions over different key sets chosen from a Universe. The experimental results show that the division-remainder method provides the best distribution for most key sets of the Universe when compared to other hashing functions including functions from $H_1$ Class of Universal Hashing Functions.","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129355629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Titchiev Inga, Caftanatov Olesea, Iamandi Veronica, Talambuta Dan, Daniela Caganovschi
{"title":"An approach to Augmented Reality Classification and an example of its usage for application development with VAK learning styles Markers","authors":"Titchiev Inga, Caftanatov Olesea, Iamandi Veronica, Talambuta Dan, Daniela Caganovschi","doi":"10.56415/csjm.v31.13","DOIUrl":"https://doi.org/10.56415/csjm.v31.13","url":null,"abstract":"Augmented reality (AR) encompasses both technology and the experience it provides, making it applicable in real-world contexts. The field of education is particularly suited for utilizing AR techniques as a novel means of engaging with students. Various classifications of AR techniques exist, each offering remarkable potential for educational purposes. This paper presents an approach to classifying augmented reality based on the characteristics of different techniques. Additionally, we demonstrate the application of a specific type of AR technology in the development of an educational application. Furthermore, we emphasize the importance of designing augmented learning scenarios that align with the VAK learning styles, aiming to deliver personalized and immersive learning experiences. The integration of AR and VAK learning styles shows the potential for creating educational tools that are both engaging and effective.%footnote{ This work was supported by Intelligent Information systems for solving ill structured problems, knowledge and Big Data processing project Ref. Nr. 20.80009.5007.22}","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131800254","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Boucherit, Messaoud Abbas, Mohammed Lamine Lamouri, Osman Hasan
{"title":"PN2Maude: An automatic tool to generate Maude specification for Petri net models","authors":"A. Boucherit, Messaoud Abbas, Mohammed Lamine Lamouri, Osman Hasan","doi":"10.56415/csjm.v31.14","DOIUrl":"https://doi.org/10.56415/csjm.v31.14","url":null,"abstract":"Currently, Model-Driven Engineering (MDE) plays a key role in the software development process as it aims to handle their increasing complexity and focuses on the automatic generation of code and/or specifications from system models. This paper presents a very useful tool for the automatic generation of Maude specifications from both Petri net PNML (Petri Net Markup Language) descriptions or incidence matrices. At the end of this paper, a simple but complete Petri net example will be presented to demonstrate the usefulness of the developed tool.","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121262210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying key players in a network of child exploitation websites using Principal Component Analysis","authors":"F. Movahedi, Richard Frank","doi":"10.56415/csjm.v31.08","DOIUrl":"https://doi.org/10.56415/csjm.v31.08","url":null,"abstract":"One of the main objectives of this study is to help prioritize targets for law enforcement by analyzing online websites hosting child exploitation material and finding key players within. Key players are defined as websites that display a combination of high connectivity and a lot of hardcore material and would provide the most disruption in a network if they were to be removed. In this study, various strategies based on Principal Component Analysis are presented to identify those nodes that act as the key players in an online child exploitation network. For evaluating the results of these strategies, we consider the results of various attack strategies. The measures for evaluation are the density, clustering coefficient, average path length, diameter, and the number of connected components in the resulting network. The results show that the strategies proposed are more successful at reducing all of the outcome measures than existing strategies.","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125316689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Total Italian domatic number of graphs","authors":"S. M. Sheikholeslami, L. Volkmann","doi":"10.56415/csjm.v31.09","DOIUrl":"https://doi.org/10.56415/csjm.v31.09","url":null,"abstract":"Let $G$ be a graph with vertex set $V(G)$. An textit{Italian dominating function} (IDF) on a graph $G$ is a function $f:V(G)longrightarrow {0,1,2}$ such that every vertex $v$ with $f(v)=0$ is adjacent to a vertex $u$ with $f(u)=2$ or to two vertices $w$ and $z$ with $f(w)=f(z)=1$. An IDF $f$ is called a textit{total Italian dominating function} if every vertex $v$ with $f(v)ge 1$ is adjacent to a vertex $u$ with $f(u)ge 1$. A set ${f_1,f_2,ldots,f_d}$ of distinct total Italian dominating functions on $G$ with the property that $sum_{i=1}^df_i(v)le 2$ for each vertex $vin V(G)$, is called a textit{total Italian dominating family} (of functions) on $G$. The maximum number of functions in a total Italian dominating family on $G$ is the textit{total Italian domatic number} of $G$, denoted by $d_{tI}(G)$. In this paper, we initiate the study of the total Italian domatic number and present different sharp bounds on $d_{tI}(G)$. In addition, we determine this parameter for some classes of graphs.","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131104581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Bandwidth Allocation Algorithm for Makespan Optimization in a Fog-Cloud Environment: Monitoring Application","authors":"Bentabet Dougani, Abdeslem Dennai","doi":"10.56415/csjm.v31.03","DOIUrl":"https://doi.org/10.56415/csjm.v31.03","url":null,"abstract":"Fog computing technology has emerged to handle a large amount of data generated by the Internet of Things (IoT) terminals and cope with latency-sensitive application requests by allocating computation and storage resources at the edge of the Internet. In many IoT applications, the data acquisition procedures must apply the Directed Acyclic Graph (DAG) to get real-time results. The principal goal of DAG scheduling is to reduce total completion time without breaking priority constraints by properly allocating tasks to processors and arranging task execution sequencing. In this paper, we propose a bandwidth-aware workflow allocation (BW-AWA) that schedules tasks by priority to the resource and optimizes the total execution time (Makespan) in the entire computing system. The task allocation process needs to consider the dependency between tasks. The proposed approach is tested with a monitoring application case study, and the results are compared to well-known approaches to demonstrate its effectiveness in optimizing the Makespan.\u0000","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129279079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prostate Cancer Classifier based on Three-Dimensional Magnetic Resonance Imaging and Convolutional Neural Networks","authors":"Ana-Maria Minda, Adrian C. Albu","doi":"10.56415/csjm.v31.02","DOIUrl":"https://doi.org/10.56415/csjm.v31.02","url":null,"abstract":"The main reason for this research is the worldwide existence of a large number of prostate cancers. This article underlines how necessary medical imaging is, in association with artificial intelligence, in early detection of this medical condition. The diagnosis of a patient with prostate cancer is conventionally made based on multiple biopsies, histopathologic tests and other procedures that are time consuming and directly dependent on the experience level of the radiologist. The deep learning algorithms reduce the investigation time and could help medical staff. This work proposes a binary classification algorithm which uses convolutional neural networks to predict whether a 3D MRI scan contains a malignant lesion or not. The provided result can be a starting point in the diagnosis phase. The investigation, however, should be finalized by a human expert.\u0000","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"21 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131588676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Secret Image Sharing Based on Logistic-Chebyshev Chaotic Map and Chinese Remainder Theorem","authors":"Asmaa Hilmi, Soufiane Mezroui, A. Oualkadi","doi":"10.56415/csjm.v31.05","DOIUrl":"https://doi.org/10.56415/csjm.v31.05","url":null,"abstract":"Visual Cryptography, Logistic-Chebyshev map, Chinese Remainder Theorem, share.lves breaking up a secret image into $n$ secured components known as shares. The secret image is recovered with utmost secrecy when all of these shares are lined up and piled together. A (3, 3)-secret image sharing scheme (SIS) is provided in this paper by fusing the Chinese Remainder Theorem (CRT) and the Logistic-Chebyshev map (LC). Sharing a confidential image created with CRT has various benefits, including lossless recovery, the lack of further encryption, and minimal recovery calculation overhead. Firstly, we build a chaotic sequence using an LC map. The secret value pixel for the secret image is permuted in order to fend off differential attackers. To encrypt the scrambled image, we apply our CRT technique to create three shares. Finally, the security analysis of our (3, 3)-SIS scheme is demonstrated and confirmed by some simulation results.\u0000","PeriodicalId":262087,"journal":{"name":"Comput. Sci. J. Moldova","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114923034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}