International Journal of Computing最新文献

筛选
英文 中文
Analysis of COVID-19 and its Impact on Alzheimer’s Patient using Machine Learning Techniques 利用机器学习技术分析COVID-19及其对阿尔茨海默病患者的影响
International Journal of Computing Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2782
R. Sivakani, M. Syed Masood
{"title":"Analysis of COVID-19 and its Impact on Alzheimer’s Patient using Machine Learning Techniques","authors":"R. Sivakani, M. Syed Masood","doi":"10.47839/ijc.21.4.2782","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2782","url":null,"abstract":"In this world, there is fast growth in technology, as technology growth is there the human also move fast based on the growth in technology. New diseases also growing fast in the world.  In this paper, a semi-supervised approach has been proposed for the classification of the COVID-19 and a study has been done to analyze the impact of the covid on Alzheimer’s disease patients. Coronavirus disease is a respiratory infection disease and Alzheimer’s disease is a brain disease. From the literature, it has been analyzed that, because of the coronavirus the immunity system will be affected in humans and there is a chance to affect the brain also. Classification and clustering have been done on the coronavirus dataset and validated using a 10-fold validation process. The classifiers applied are Naïve Bayes and Random Forest; the results obtained are 99.88% and 100% accuracy. Also, the clustering has been applied and 2 clusters are generated for grouping the classes. Then a study has been done for predicting the impact of the coronavirus on Alzheimer’s patients.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85474904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Many Known Quantum Algorithms Are Optimal: Symmetry-Based Proofs 许多已知的量子算法是最优的:基于对称的证明
International Journal of Computing Pub Date : 2022-12-31 DOI: 10.47839/ijc.21.4.2776
V. Kreinovich, Oscar Galindo, O. Kosheleva
{"title":"Many Known Quantum Algorithms Are Optimal: Symmetry-Based Proofs","authors":"V. Kreinovich, Oscar Galindo, O. Kosheleva","doi":"10.47839/ijc.21.4.2776","DOIUrl":"https://doi.org/10.47839/ijc.21.4.2776","url":null,"abstract":"Many quantum algorithms have been proposed which are drastically more efficient that the best of the non-quantum algorithms for solving the same problems. A natural question is: are these quantum algorithms already optimal – in some reasonable sense – or they can be further improved? In this paper, we review recent results showing that many known quantum algorithms are actually optimal. Several of these results are based on appropriate invariances (symmetries). Specifically, we show that the following algorithms are optimal: Grover’s algorithm for fast search in an unsorted array, teleportation algorithm – which is important for parallel quantum computations, and quantum annealing optimization algorithm. This covers many algorithms related to quantum computing. We also mention that algorithms for quantum communication and Deutsch-Josza algorithm – for fast checking whether a bit affect computation results – are optimal. In all these cases, optimality is shown not just for one specific optimality criterion, but for all possible optimality criteria that satisfy the natural invariance requirement.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72403686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic 基于强化学习和模糊逻辑的软件定义网络流量感知路由
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2687
Shohreh Jaafari, M. Nassiri, Reza Mohammadi
{"title":"Traffic-aware Routing with Software-defined Networks Using Reinforcement Learning and Fuzzy Logic","authors":"Shohreh Jaafari, M. Nassiri, Reza Mohammadi","doi":"10.47839/ijc.21.3.2687","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2687","url":null,"abstract":"In recent years, the idea of software-defined networks (SDNs) has been proposed for better network management. This architecture has succeeded in optimizing network management functions and increased the ability to synchronize network equipment. Currently, one of the major issues in this architecture is the routing of packets flowing in the network. The main aim in the routing of packets is to increase the quality of services. Enhancement of the quality and productivity of these networks will increase user satisfaction. To this end, the present study proposes a mechanism for selecting the best route from among several existing routes to direct a flow on such a network. The proposed method examines the network parameters including bandwidth, delay, and packet loss on each link of the route by using artificial intelligence algorithms and changes the parameters reducing network productivity by means of fuzzy logic. Our evaluations show that the proposed method can select routes with high productivity and increase the quality of services on the network. Receiving feedback and modifying the fuzzy membership functions related to each mentioned criterion can maintain the effect of these parameters on an acceptable level after which all transmissions tend towards the optimum. Given the use of reinforcement learning methods which underpin some of the routing methods in SDNs, the proposed idea may gradually contribute to the provision of optimized services on the network.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81883431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network 无人机作为无线网络信息安全威胁的来源
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2695
Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko
{"title":"Unmanned Aerial Vehicles as a Source of Information Security Threats of Wireless Network","authors":"Serhii Voitenko, Volodymyr Druzhynin, Hanna Martyniuk, Tetiana Meleshko","doi":"10.47839/ijc.21.3.2695","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2695","url":null,"abstract":"This work deals with the identification of threats to wireless networks when considering an attacker from unmanned aerial vehicles. An analysis of heterogeneous networks built on 4 G technology, as objects of UAV attack, is performed. It is determined that the main problem of protecting wireless systems is the lack of protection of radio communication channels and the vulnerability of the base and subscriber station equipment. A model of the UAV as an intruder in the information security of wireless networks is built. The classification of various types of UAVs by targets and weapons of attack, methods of use and the ability to violate the criteria of protection of the information and telecommunication system is presented. A threat model that assesses the level of risks and losses in different types of attacks performed by different types of UAVs is built. It is expedient to use the received models as the basic ones when building a model of threats to a certain corporate network of the organization, developing ways and security means, estimating and controlling 4 G network protection against UAV.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76694142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification 基于涂抹、小波和块位图修正的混合数字图像水印技术
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2685
Hayder G. A. Altameemi, Ahmed A. Alani, A. Asmael, M. Al‐Obaidi
{"title":"A Competent Hybrid Digital Image Watermarking Technique Based on Daubechies Wavelet and Block Bitmap Modification","authors":"Hayder G. A. Altameemi, Ahmed A. Alani, A. Asmael, M. Al‐Obaidi","doi":"10.47839/ijc.21.3.2685","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2685","url":null,"abstract":"Over many years, in order to provide powerful techniques for protecting digital copyrights, digital watermarking techniques have been developed. This research focuses on proposing an efficient blind hybrid digital image watermarking technique based on the transformation of Daubechies wavelet (DW) and Block Bitmap modification (BBM). DW represents an effective multi-determination frequency domain for including the watermarks. The BBM is used to afford an enhanced capability of embedding and minimize distortion. Two layers of security have been added to the proposed technique for protecting digital images from theft by using the logistic chaotic mapping to select the position of the blocks for the embedding process and Lorenz chaotic mapping for scrambling the watermark image. In the experiments, high values of peak signal to noise ratio (PSNR) and structural similarity index (SSIM) are obtained, and all the obtained results illustrate that the presented technique is highly imperceptible, secure, and robust.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89331285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining 基于数据挖掘的连续过程控制系统报警模式识别
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2689
Chetana Belavadi, V. Sardar, S. Chaudhari
{"title":"Alarm Pattern Recognition in Continuous Process Control Systems using Data Mining","authors":"Chetana Belavadi, V. Sardar, S. Chaudhari","doi":"10.47839/ijc.21.3.2689","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2689","url":null,"abstract":"An alarm management system with the Human Machine Interface in a process control system is used to alert an operator of any abnormal situation, so that corrective action can be taken to ensure safety and productivity of the plant and quality of the product. An alarm system reporting many alarms even during the normal state of the plant is due to chattering alarms, duplicated alarms, intermittent equipment problems and certain alarms configured in the system which may not have any importance. In such a situation the operator may miss certain critical alarms leading to undesirable outcomes. So, to have an optimum alarm system, the unwanted alarms have to be identified and eliminated. In this paper, we propose an offline method to identify repetitive, frequent sequences or patterns using PrefixSpan and Bi-Directional Extension algorithms. With the identified sequences or patterns, plant operation experts can improve the effectiveness of the alarm system through alarm rationalization so that this will help the operator in making the plant more safe, reliable and productive. The main objectives of this work are the following: (i) to use a definitive method to represent alarm data in an alarm log which is Temporal data as Itemsets without a need for complex mathematical, statistical or visual methods; (ii) to use data mining algorithms for identifying Frequent sequences which can be implemented on a normal computing resource such as Personal computer; (iii) to apply the method to the complete alarm data available no matter how big they are; (iv) to study and establish that the chosen method is possible to be applied to larger sized datasets.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80594793","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks 一种新的增强的大规模容错移动自组网路由协议
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2688
H. Al-Asadi, Huda A. Ahmed, Abdul-Hadi Al-Hassani, N. A. Ahmad Hambali
{"title":"A Novel and Enhanced Routing Protocol for Large Scale Disruption Tolerant Mobile Ad hoc Networks","authors":"H. Al-Asadi, Huda A. Ahmed, Abdul-Hadi Al-Hassani, N. A. Ahmad Hambali","doi":"10.47839/ijc.21.3.2688","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2688","url":null,"abstract":"Because of the lack of fixed infrastructures, the existence of open media and diverse network topologies, internetworking networks and mobile ad hoc networks (MANET’s), the design of MANET protocols is complicated. In this paper, we propose an evolutionary trust mechanism imitating cognitive processes that uses sensitive information to avoid routing. Moreover, we propose an Enhanced Self-organizing Cooperation and Trust based (ESCT) Protocol, where the mobile nodes share self-reliance and interpret information from a cognitive point of view. Each node develops its information dynamically to eradicate malicious entities. The most attractive attribute of the proposed ESCT protocol, even if domestic attackers know how it operates, is to prevent infringements. In this paper, the efficiency of the proposed ESCT protocol is assessed for different routing disturbances and varying number of attackers. The results of a simulation show that, the proposed ESCT protocol supports diverse network platforms and provides an efficient routing method for MANET routers. The proposed ESCT protocol displays increased throughput, reduction in end-to-end delay and increase in packet delivery ratio when compared to the peers that were taken for comparison.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86073648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
High Speed Approximate Carry Speculative Adder in Error Tolerance Applications 高速近似进位推测加法器在容错中的应用
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2696
Ajay Kumar Gottem, Arunmetha Sundaramoorthy, Aravindhan Alagarsamy
{"title":"High Speed Approximate Carry Speculative Adder in Error Tolerance Applications","authors":"Ajay Kumar Gottem, Arunmetha Sundaramoorthy, Aravindhan Alagarsamy","doi":"10.47839/ijc.21.3.2696","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2696","url":null,"abstract":"Approximate adders were proposed as feasible solution in error-tolerant applications to provide a proper trade-off with accuracy over other circuit-based metrics like energy, area, and delay. State of art of approximate adders are shown in this work to improve the operational features significantly. To acquire a most benefits of approximation, in this paper approximation at lower echelons is presented. Two speculative adders are proposed, one with approximate adder cell and other with Parallel prefix Adder cell. Gate level implementation of proposed model are designed and implemented. The cost functions are compared against various FPGA standard architectures. Results of proposed approach indicate an average of 46% improvement in Area Delay Product (ADP) and compared with existing approximate adders.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88685650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities 温室设施温湿度状态的智能场景协同控制
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2686
Dmytro Polishchyk, V. Lysenko, Serhii Osadchiy, N. Zaiets
{"title":"Intellectual Scenario-synergetic Control of the Humidity and Temperature Regime of the Greenhouse Facilities","authors":"Dmytro Polishchyk, V. Lysenko, Serhii Osadchiy, N. Zaiets","doi":"10.47839/ijc.21.3.2686","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2686","url":null,"abstract":"The article substantiates the management of the humidity and temperature regime of greenhouse complexes on the basis of a scenario-synergetic approach. The scenarios for controlling the temperature and humidity conditions in the greenhouse using the approach of fuzzy neural networks are formed. The structure of an automated control system for technological processes is developed, which provides automated collection and processing of information for the implementation of control actions in order to improve the efficiency of the greenhouse complex on the basis of a scenario-synergetic approach. The corresponding fuzzy neural networks are synthesized for a synergistic assessment of the interaction of technological parameters. Estimation of the root-mean-square error in the synthesis of fuzzy neural networks confirms the possibility of their use for the synergistic formation of scenarios for controlling the temperature and humidity regime in greenhouses to reveal the presence of a synergistic effect. Production rules for scenario management of temperature and humidity conditions are formed. It is shown that the use of fuzzy neural networks for the formation of scenarios for controlling the humidity and temperature regime provides the possibility of obtaining the appropriate scenarios for making managerial decisions and their prompt correction.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72728543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions 使用云功能集成Google大查询和Elasticsearch的云Pub/Sub架构
International Journal of Computing Pub Date : 2022-09-30 DOI: 10.47839/ijc.21.3.2694
Sergio Laureano Gutiérrez, Yasiel Pérez Vera
{"title":"A Cloud Pub/Sub Architecture to Integrate Google Big Query with Elasticsearch using Cloud Functions","authors":"Sergio Laureano Gutiérrez, Yasiel Pérez Vera","doi":"10.47839/ijc.21.3.2694","DOIUrl":"https://doi.org/10.47839/ijc.21.3.2694","url":null,"abstract":"In recent years, the need for analytics on large volumes of data has become increasingly important. It turns out to be extremely useful in making strategic decisions about different applications. In this way, appropriate mechanisms must be designed to carry out data processing and integration with different platforms to take advantage of their best features. In this work, an architecture that works on cloud services is shown to migrate data stored in Big Query to an analytics engine such as Elasticsearch and take advantage of its potential in query, insert and display operations. This is accomplished through the use of Cloud Functions and Pub / Sub. The integration of these platforms through the proposed architecture showed 100% effectiveness when transferring data to another, maintaining an insertion rate of 4,138.30 documents per second, demonstrating its robustness, efficiency, and versatility when performing a data migration. This pretends to establish an architecture solution when it comes about handling a large amount of data as in the real world.","PeriodicalId":37669,"journal":{"name":"International Journal of Computing","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81636795","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信