Open Computer Science最新文献

筛选
英文 中文
Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model 利用序列对序列模型和自适应SEIR模型预测和监测印度COVID-19的流行趋势
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0221
K. D. Gupta, R. Dwivedi, D. Sharma
{"title":"Predicting and monitoring COVID-19 epidemic trends in India using sequence-to-sequence model and an adaptive SEIR model","authors":"K. D. Gupta, R. Dwivedi, D. Sharma","doi":"10.1515/comp-2020-0221","DOIUrl":"https://doi.org/10.1515/comp-2020-0221","url":null,"abstract":"Abstract In the year 2019, during the month of December, the first case of SARS-CoV-2 was reported in China. As per reports, the virus started spreading from a wet market in the Wuhan City. The person infected with the virus is diagnosed with cough and fever, and in some rare occasions, the person suffers from breathing inabilities. The highly contagious nature of this corona virus disease (COVID-19) caused the rapid outbreak of the disease around the world. India contracted the disease from China and reported its first case on January 30, 2020, in Kerala. Despite several counter measures taken by Government, India like other countries could not restrict the outbreak of the epidemic. However, it is believed that the strict policies adopted by the Indian Government have slowed the rate of the epidemic to a certain extent. This article proposes an adaptive SEIR disease model and a sequence-to-sequence (Seq2Seq) learning model to predict the future trend of COVID-19 outbreak in India and analyze the performance of these models. Optimization of hyper parameters using RMSProp is done to obtain an efficient model with lower convergence time. This article focuses on evaluating the performance of deep learning networks and epidemiological models in predicting a pandemic outbreak.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"27 - 36"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43410520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework 从软件体系结构到分布式敏捷框架的需求管理(FFRM)灵活框架
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0239
Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun
{"title":"A flexible framework for requirement management (FFRM) from software architecture toward distributed agile framework","authors":"Rao Nadeem, R. Latif, Khalid Hussain, N. Jhanjhi, M. Humayun","doi":"10.1515/comp-2022-0239","DOIUrl":"https://doi.org/10.1515/comp-2022-0239","url":null,"abstract":"Abstract GSD is a Global software development environment where data are distributed to more than two sites. These sites may be located on national or continental borders. Every year it expands its development volume, which has become a trend for the software development business. Because of increasing demand, it has become a common type of business. The value of offshore software development has increased immensely. According to the recent predictions, one-quarter of US software-related business shifts offshore, including integration and management-related services. GSD helps explore resources from other countries, increasing knowledge and enhancing operational efficiency. Therefore, globalization has changed the development nature of software. Different organizations face several challenges, such as coordination and requirement ambiguity, during the change management process in GSD. Traceability accommodates these changes in forward and backward direction. However, it gives rise to several challenges like less client involvement because of its distributed nature and challenging to manage the requirement ambiguity due to increased cost. Therefore, the Flexible Framework for Requirement Management (FFRM) must handle the abovementioned issues.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"364 - 377"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46897474","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on the structure of smart medical industry based on the background of the internet of things 基于物联网背景下的智慧医疗产业结构研究
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0247
Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou
{"title":"Research on the structure of smart medical industry based on the background of the internet of things","authors":"Luhong Zhang, Kai Zhou, Weibin Zhao, Huiyan Zhou","doi":"10.1515/comp-2022-0247","DOIUrl":"https://doi.org/10.1515/comp-2022-0247","url":null,"abstract":"Abstract In view of the current development trend of the smart medical industry in the context of the internet of things, this study conducts an evolutionary game analysis on information technology providers, medical institutions, digital medical equipment providers, and medical regulatory agencies in the smart medical industry. This study also analyzes the stable state of the future development of the smart medical industry and performs simulation calculations through MATLAB software. The research results show that the overall development trend of the smart medical industry structure in the future is consistent with the development trend of each industry structure. Under the strategic background of the supervision of medical regulatory agencies, information technology providers and digital medical equipment providers, respectively, provide the smart medical industry with the latest information technology and digital medical equipment to ensure the technical support of the smart medical industry. The smart medical industry provides corresponding medical talents and medical equipment to ensure the demand for talents and equipment of the smart medical industry, so that the structure of the smart medical industry can continuously improve the level of smart medical technology in the future development and ultimately promote the overall development of the smart medical industry.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"289 - 299"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45569149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two hide-search games with rapid strategies for multiple parallel searches 两个具有快速策略的多重平行搜索的隐藏搜索游戏
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0243
P. Creasey
{"title":"Two hide-search games with rapid strategies for multiple parallel searches","authors":"P. Creasey","doi":"10.1515/comp-2022-0243","DOIUrl":"https://doi.org/10.1515/comp-2022-0243","url":null,"abstract":"Abstract Making a rapid unpredictable decision from N N choices of unequal value is a common control task. When the cost of predictability can be modelled as a penalty hidden under a single option by an intelligent adversary, then an optimal strategy can be found efficiently in O ( N log N ) Oleft(Nlog N) steps using an approach described by Sakaguchi for a zero-sum hide-search game. In this work, we extend this to two games with multiple parallel predictions, either coordinated or drawn independently from the optimal distribution, both of which can be solved with the same scaling. An open-source code is provided online at https://github.com/pec27/rams.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"171 - 180"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43648659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SIKM – a smart cryptographic key management framework 一个智能加密密钥管理框架
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0167
Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar
{"title":"SIKM – a smart cryptographic key management framework","authors":"Saman Shojae Chaeikar, A. Ahmadi, Sasan Karamizadeh, Nakisa Shoja Chaeikar","doi":"10.1515/comp-2020-0167","DOIUrl":"https://doi.org/10.1515/comp-2020-0167","url":null,"abstract":"Abstract For a secure data transmission in symmetric cryptography, data are encrypted and decrypted using an identical key. The process of creating, distributing, storing, deploying, and finally revoking the symmetric keys is called key management. Many key management schemes are devised that each one is suitable for a specific range of applications. However, these schemes have some common drawbacks like the hardness of key generation and distribution, key storage, attacks, and traffic load. In this article, a key management framework is proposed, which is attack resistant and transforms the current customary key management workflow to enhance security and reduce weaknesses. The main features of the proposed framework are eliminating key storage, smart attack resistant feature, reducing multiple-times key distribution to just one-time interpreter distribution, and having short key intervals – minutely, hourly, and daily. Moreover, the key revocation process happens automatically and with no revocation call.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"17 - 26"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43788922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Privacy protection methods of location services in big data 大数据环境下定位服务的隐私保护方法
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0250
Wenfeng Liu, Juanjuan Wu, Zhong Xi
{"title":"Privacy protection methods of location services in big data","authors":"Wenfeng Liu, Juanjuan Wu, Zhong Xi","doi":"10.1515/comp-2022-0250","DOIUrl":"https://doi.org/10.1515/comp-2022-0250","url":null,"abstract":"Abstract The rapid development of mobile communication technology not only brings convenience and fun to our life, but also brings a series of problems such as privacy disclosure. Therefore, it is very necessary to study the privacy protection method based on location service to strengthen the security of location privacy. The purpose of this work is to improve the security of location privacy and prevent the disclosure of user privacy by studying the characteristics of location services and privacy protection methods. This article first describes the characteristics of the important location privacy protection law, and then studies the structural characteristics and operation process of the location privacy protection law. This work evaluates the advantages and disadvantages of different methods, and finally compares the performance of several privacy protection algorithms through experimental analysis. Through the research of hiding space method, two-level cache method based on user grid, differential privacy protection method and experimental analysis of the algorithm, an effective privacy protection algorithm can be obtained. It can better protect the location privacy of users. For example, dual-active in the hidden space algorithm has the best privacy protection performance. Compared with other algorithms, the success rate of generating hidden space is increased by more than 10%, and the time of generating hidden space is shortened by about a quarter. The algorithm It has certain practical value and significance for use in the privacy protection of users.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"389 - 402"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48821902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective integrated machine learning approach for detecting diabetic retinopathy 一种检测糖尿病视网膜病变的有效集成机器学习方法
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2020-0222
Penikalapati Pragathi, Agastyaraju Nagaraja Rao
{"title":"An effective integrated machine learning approach for detecting diabetic retinopathy","authors":"Penikalapati Pragathi, Agastyaraju Nagaraja Rao","doi":"10.1515/comp-2020-0222","DOIUrl":"https://doi.org/10.1515/comp-2020-0222","url":null,"abstract":"Abstract Millions of people across the world are suffering from diabetic retinopathy. This disease majorly affects the retina of the eye, and if not identified priorly causes permanent blindness. Hence, detecting diabetic retinopathy at an early stage is very important to safeguard people from blindness. Several machine learning (ML) algorithms are implemented on the dataset of diabetic retinopathy available in the UCI ML repository to detect the symptoms of diabetic retinopathy. But, most of those algorithms are implemented individually. Hence, this article proposes an effective integrated ML approach that uses the support vector machine (SVM), principal component analysis (PCA), and moth-flame optimization techniques. Initially, the ML algorithms decision tree (DT), SVM, random forest (RF), and Naïve Bayes (NB) are applied to the diabetic retinopathy dataset. Among these, the SVM algorithm is outperformed with an average of 76.96% performance. Later, all the aforementioned ML algorithms are implemented by integrating the PCA technique to reduce the dimensions of the dataset. After integrating PCA, it is noticed that the performance of the algorithms NB, RF, and SVM is reduced dramatically; on the contrary, the performance of DT is increased. To improve the performance of ML algorithms, the moth-flame optimization technique is integrated with SVM and PCA. This proposed approach is outperformed with an average of 85.61% performance among all the other considered ML algorithms, and the classification of class labels is achieved correctly.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"83 - 91"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43846044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A new watermarking scheme for digital videos using DCT 一种新的基于DCT的数字视频水印方案
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0238
A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa
{"title":"A new watermarking scheme for digital videos using DCT","authors":"A. Al-Gindy, Aya AlChikh Omar, Omar Mashal, Y. Shaker, E. Alhogaraty, S. Moussa","doi":"10.1515/comp-2022-0238","DOIUrl":"https://doi.org/10.1515/comp-2022-0238","url":null,"abstract":"Abstract With the advent of high-speed broadband Internet access, the need to protect digital videos is highly recommended. The main objective of this study is to propose an adaptive algorithm for watermarked digital videos in the frequency domain based on discrete cosine transform (DCT). The watermark signature image is embedded into the whole frame of the video. The green channel of the RGB frame is selected for the embedding process using the DCT algorithm as it shows the recommended quality of the watermarked frames. The experiment results indicate that the proposed algorithm shows robustness and high quality of the watermarked videos by testing various strength values ∆ for different videos. It offers resistance against different types of attacks.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"248 - 259"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48068680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on the random walk classification algorithm of polyant colony 多蚁群随机行走分类算法研究
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0248
Wenhai Qiu
{"title":"Study on the random walk classification algorithm of polyant colony","authors":"Wenhai Qiu","doi":"10.1515/comp-2022-0248","DOIUrl":"https://doi.org/10.1515/comp-2022-0248","url":null,"abstract":"Abstract With the sustained and healthy development of economy, saving energy and reducing consumption and improving energy utilization rate is a major task that enterprises need to solve. With the complex and large-scale chemical process, the heat exchange network has become complex and diverse. For more and more complex and large-scale industrial heat exchange networks, there are many different kinds of heat exchangers, the flow is complex, so the heat exchange network presents a high degree of complexity, a node status change; its disturbance transfer will influence the stability of other nodes associated with it, because of the system coupling, thus affecting the controllability and reliability of the whole heat exchanger network. Process optimization design of heat exchange network is one of the main methods of energy saving in the industrial field. As a typical simulated evolutionary algorithm in swarm intelligence algorithm, ant colony algorithm combined with random walk classification algorithm, this article proposes an optimized heat transfer network based on multi-ant colony random walk classification algorithm. The heat exchanger was abstracted as a node, and the heat exchanger pipeline was abstracted as a side. According to the maximum geometric multiplicity of the eigenvalue of the adjacency matrix and the linear correlation row vector of the matrix, and combining the importance of the edge of the heat exchange network with the controllable range of the driving edge, the optimal control driving edge of the heat exchange network is identified. The results show that compared with the traditional heat exchanger, the size of the enhanced heat transfer equipment and the influence of pressure drop change. Compared with the results of the size of the heat exchanger strengthening heat transfer equipment and the stepwise optimization of the heat exchange network in this study, the cost of public engineering is reduced by 5.98% and the total cost is reduced by 8.83%.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"378 - 388"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42849563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sign language identification and recognition: A comparative study 手语识别与识别的比较研究
IF 1.5
Open Computer Science Pub Date : 2022-01-01 DOI: 10.1515/comp-2022-0240
Ahmed A. Sultan, Walied Makram, Mohammed Kayed, Abdelmaged Amin Ali
{"title":"Sign language identification and recognition: A comparative study","authors":"Ahmed A. Sultan, Walied Makram, Mohammed Kayed, Abdelmaged Amin Ali","doi":"10.1515/comp-2022-0240","DOIUrl":"https://doi.org/10.1515/comp-2022-0240","url":null,"abstract":"Abstract Sign Language (SL) is the main language for handicapped and disabled people. Each country has its own SL that is different from other countries. Each sign in a language is represented with variant hand gestures, body movements, and facial expressions. Researchers in this field aim to remove any obstacles that prevent the communication with deaf people by replacing all device-based techniques with vision-based techniques using Artificial Intelligence (AI) and Deep Learning. This article highlights two main SL processing tasks: Sign Language Recognition (SLR) and Sign Language Identification (SLID). The latter task is targeted to identify the signer language, while the former is aimed to translate the signer conversation into tokens (signs). The article addresses the most common datasets used in the literature for the two tasks (static and dynamic datasets that are collected from different corpora) with different contents including numerical, alphabets, words, and sentences from different SLs. It also discusses the devices required to build these datasets, as well as the different preprocessing steps applied before training and testing. The article compares the different approaches and techniques applied on these datasets. It discusses both the vision-based and the data-gloves-based approaches, aiming to analyze and focus on main methods used in vision-based approaches such as hybrid methods and deep learning algorithms. Furthermore, the article presents a graphical depiction and a tabular representation of various SLR approaches.","PeriodicalId":43014,"journal":{"name":"Open Computer Science","volume":"12 1","pages":"191 - 210"},"PeriodicalIF":1.5,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44728764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信