JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

筛选
英文 中文
Construction of heterogeneous medical knowledge graph from electronic health records 基于电子病历的异构医学知识图谱构建
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068604
R. Mythili, N. Parthiban, V. Kavitha
{"title":"Construction of heterogeneous medical knowledge graph from electronic health records","authors":"R. Mythili, N. Parthiban, V. Kavitha","doi":"10.1080/09720529.2022.2068604","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068604","url":null,"abstract":"Abstract Knowledge graph (KG) is a knowledge organization that enables the users to quickly and accurately query the information required. It is stored in the form of triples. It finds its application in various fields of enterprises, academics, medical etc. In this paper, Medical Knowledge Graph is constructed from Electronic Health Records (EHR) that maps the relationships between the entities of patients, disease and drugs. The heterogeneous graph is constructed using different entities derived from distinct datasets and the information is extracted in the form of queries among the wide between the quantity demand and the wide variety of variables. The steps for construction of Medical Knowledge Graph are data collection, Named entity recognition, entity normalization, entity ranking, and Graph Neural Networks. The hybrid approach of Bi-directional Long Short-Term Memory Multi-Head Attention Conditional Random Field (BILSTM-MULATT-CRF) is used for Named Entity Recognition and the result of Precision 91.4%, Recall 90.15% and F1 score 90.77% is obtained.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"921 - 930"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41844829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A pragmatic approach to recover access time of Apriori algorithm by applying intersection on CSS for redefining FIS through matrix implementation in textual data 一种在CSS上应用交集恢复Apriori算法访问时间的实用方法通过文本数据中的矩阵实现重新定义FIS
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068601
N. Verma, Vaishali Singh
{"title":"A pragmatic approach to recover access time of Apriori algorithm by applying intersection on CSS for redefining FIS through matrix implementation in textual data","authors":"N. Verma, Vaishali Singh","doi":"10.1080/09720529.2022.2068601","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068601","url":null,"abstract":"Abstract Nowadays data analytics OLAP (online Analytical Processing) is mostly accepted domain of current researchers and the concept of data mining serves better for the same. There are so many data mining methodologies defined for data analytics. Mining Association rule is widely used in data mining methods for data categorization. Apriori Algorithm is popular method for defining n-element. Frequent item set form k number of huge transactional data set online transaction processing (OLTP) using Association Mining rule (AMR). In this paper, researchers executed original Apriori on transactional data set containing 35039 number of transactions, divided into three data sets DS-1 to DS-3 with 20039, 12000, 5000 number of transactions with variable length with minimum support of 30%, 60% and 80% respectively. Researchers carried out experimental work and compared results of Apriori Algorithm with our proposed algorithm (enhanced version of Apriori algorithm) on the same perimeter and state improvement with 11%, 30% and 27% of Rate of Improvements in DS-1 to Ds-3 respectively for 30% minimum support. Our proposed algorithm is working far much better then Apriori algorithm at each parameter which was included to conclude the results.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"871 - 878"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47604949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices 物联网取证:在丢弃、回收或转售的物联网设备上可以找到什么样的个人数据
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072422
S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud
{"title":"IoT forensics: What kind of personal data can be found on discarded, recycled, or re-sold IoT devices","authors":"S. Gowri, R. Surendran, J. Jabez, Senduru Srinivasulud","doi":"10.1080/09720529.2022.2072422","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072422","url":null,"abstract":"Abstract With the advancement in science and technology, the demand for electronic Internet of Things (IoT) devices has increased to store and process digital data. With the advancement in IoT technology, we are more reliant on IoT devices to perform our regular tasks. IoT Forensics deals with the investigation of IoT devices such as smartphones, tablets, smart watches, or any device which is connected to the Internet. The data on these devices can still be retrieved via IoT forensics even if they are destroyed, resold, or misplaced. Before discarding any IoT device, we must consider how to secure the data stored on them. We are then going to discuss the several types of personal data that could be retrieved from discarded IoT devices. Finally, we are going to discuss the protection measures for the safe disposal of IoT devices.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"999 - 1008"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44549047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Companion bot with voice and facial emotion detection with PID based computer vision 基于PID的计算机视觉语音和面部情绪检测伴侣机器人
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075069
C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar
{"title":"Companion bot with voice and facial emotion detection with PID based computer vision","authors":"C. Thyagarajan, D. Chithra, J. William Andrews, P. Rama Subramanian, S. Balaji, P. Sathishkumar","doi":"10.1080/09720529.2022.2075069","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075069","url":null,"abstract":"Abstract We live in a world where technology embraces us and makes our lives easier. With increasing technological advances we feel the need for smart robotic assistants/companions to reduce the manual efforts taken by humans in day-to-day tasks and providing the necessary knowledge. In this paper, we develop a smart self companion robot that runs using human voice commands using some standard way of speech and this voice is converted into standard text form which is, in turn, converted into instructions and is fed to the robot, which further performs the necessary actions. The companion is fully automated with the capability of movement based on object tracking and voice response based on facial expression. The three main modules of this work are facial detection, emotion detection, and voice recognition. The bot is a wireless vehicle that will move along the human, interact with them depending on his/their emotions.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"903 - 911"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43003283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An analysis of SPARQL usage for information retrieval in heterogeneous domains through various tools 通过各种工具分析SPARQL在异构域中用于信息检索的用法
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072428
Rupal Gupta, S. K. Malik
{"title":"An analysis of SPARQL usage for information retrieval in heterogeneous domains through various tools","authors":"Rupal Gupta, S. K. Malik","doi":"10.1080/09720529.2022.2072428","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072428","url":null,"abstract":"Abstract SPARQL is a Query Language and a protocol popularly used in web semantics for the information retrieval. It is standard language declared by World Wide Web Consortium for resource description framework. Due to the exponential popularity of semantic web, bigdata, cloud computing, graph databases and linked open data, SPARQL Queries are playing a vital role in the stated domain for managing data with different aspects. This paper summarizes SPARQL usage in various domains touching the latest emerging technologies in computer science and various other fields. A brief analysis has been done of various tools on which SPARQL protocol can be executed for different purposes and it has been analyzed that using such protocols will generate tremendous results in different application areas towards integration of semantic web with different technologies like cloud computing, Linked Open Data (LOD) , Graph Databases and others.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1031 - 1040"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42211854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies 一种使用图像处理和区块链技术的高效隐私保护用户身份验证方案
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075089
Anees Ara, Avinash Sharma, D. Yadav
{"title":"An efficient privacy-preserving user authentication scheme using image processing and blockchain technologies","authors":"Anees Ara, Avinash Sharma, D. Yadav","doi":"10.1080/09720529.2022.2075089","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075089","url":null,"abstract":"Abstract User authentication is a measurement challenge for handheld devices and online accounts such as bank accounts, social media accounts etc. because illegal access results in money loss and user privacy. Individual devices, online financial services, and intelligent spaces are three significant areas of concern for customer authentication procedures. Three ways have been identified for authentication factors: i) knowledge-factor, ii) Inherence factor, and iii) possession-factor. This study investigates two-way user authentication through image processing. CNN, RCNN, and Deepface are deep learning algorithms used for image recognition. We used imagechain for image storage and Blockchain for personal information storage (mobile number) to secure the database. The database is stored on an Ethereum-based blockchain. After determining whether the image is fake or real, match the webcam image with the imagechain; if both images match, the one-time password is given to the user’s cellphone number for login access. For image processing, Opencv is employed, and the Python library is used to execute machine and deep learning algorithms for user authentication. Test the proposed model on the 10 to 100 users for authentication. Accuracy of this experiment is 75.35, 76.33, 98.18 and cosine similarities of images are much better between images, but in case of fake image identification it achieved 97.35 % accuracy.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1137 - 1155"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47696173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
High level browser security in cloud computing services from cross site scripting attacks 云计算服务中的高级浏览器安全性免受跨站点脚本攻击
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072434
M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal
{"title":"High level browser security in cloud computing services from cross site scripting attacks","authors":"M. Malik, Mohit Kumar, Vinay Kumar, A. Gautam, Shikha Verma, Sarvesh Kumar, Dinesh Goyal","doi":"10.1080/09720529.2022.2072434","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072434","url":null,"abstract":"Abstract Getting the public cloud is truly hard for associations. Therefore, IT divisions are searching for a cloud-passed on a security plan that gives satisfactory end-customer security. An attacker can send malicious script to web browser in form of JavaScript, Script, Flash or any other type of code. When such type code executes in the browser, cookies redirects it to attacker location. These types of attacks are known as XSS (Cross Site Script) attacks. Cloud security is a discipline of organization wellbeing focused on getting appropriate processing structures. This consolidates securing data private and across the online-based establishments, applications, and stages. Further requests of client with encrypted cookies are sent to web proxy where web proxy decrypts these requests and forward to the web server. Browser information base store the encoded treat which won’t be valuable for the assailant in the event that it takes to utilizing cross-site prearranging assault.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1073 - 1081"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49448424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
IoT-Galvanized pandemic special E-Toilet for generation of sanitized environment 物联网镀锌流行病专用电子钱包,用于产生消毒环境
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2068607
Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González
{"title":"IoT-Galvanized pandemic special E-Toilet for generation of sanitized environment","authors":"Amit Kumar Gupta, Pushpa Gothwal, D. Goyal, C. Travieso-González","doi":"10.1080/09720529.2022.2068607","DOIUrl":"https://doi.org/10.1080/09720529.2022.2068607","url":null,"abstract":"Abstract The entire world is enmeshing the pandemic COVID-19, which affected the public health and it is spread all over the world. Every country’s authority is making more and more efforts towards maintaining the public health as well as mental health and are developing the vaccination to control the COVID-19. As COVID-19 is an infected disease for which a sanitized environment must be chosen at top most priority to prevent infection. Most of the countries are facing the problem of incrementing the infection rate of COVID due to griminess problems. Most healthcare industries are also working to create a sanitized environment with incorporation of the Internet of Things (IoT) which is resulting in the smart health care appliances for generating the sanitized environment. In this paper the researchers have developed an IoT- Galvanized Pandemic Special E-Toilet for generation of sanitized environment which resolves the issues of griminess problem. The proposed architecture has been comprising with three levels of working methodology as Occupancy Check, Auto Flush and Auto control of Appliances using Mobile Application. It is implemented using a raspberry pi board, Arduino Uno as a core unit of the system with interfacing the peripherals: IR sensor, Ultrasonic sensor and HC05 Bluetooth module, servo motor, Relay module, CFL lamp and LED. The proposed architecture has been simulated individually using single piece of sensor, then later assembled all the peripheral together and simulated. The proposed architecture can be used in field of education, industries, corporate offices, multiplexes, hospitals etc.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"943 - 954"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49267008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images 提高灰度图像尺寸确定性视觉密码方案的视觉质量
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2075087
Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma
{"title":"Improving the visual quality of a size deterministic visual cryptography scheme for Grayscale Images","authors":"Amit Kumar, Ashutosh Kumar, Girraj Khandelwal, Y. Bhardwaj, V. Sharma, G. Sharma","doi":"10.1080/09720529.2022.2075087","DOIUrl":"https://doi.org/10.1080/09720529.2022.2075087","url":null,"abstract":"Abstract To enhance the security choices in transmission of information over the web, various methods such as cryptography, steganography and digital watermarking have been developed. Visual cryptography has developed in the past decade as an entity that splits the information into two parts in order to complete integration. This system is also secured in a lesser quantity. In this paper a secret message multi-share method is used. In the proposed work input picture is divided into eight portions. The eight portions shares are encrypted before embedding the image in the patchwork image, photo sharing and the image retrieved is the same as the hidden starting image. Results show that the proposed method has optimized the optimal time by 8%, improved PSNR by 11% and lower overhead communication.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1113 - 1123"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42765127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Disease prediction model for secure patient data over cloud using machine learning 使用机器学习的云上安全患者数据的疾病预测模型
IF 1.4
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY Pub Date : 2022-05-19 DOI: 10.1080/09720529.2022.2072438
Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma
{"title":"Disease prediction model for secure patient data over cloud using machine learning","authors":"Dinesh Goyal, Ruchi Goyal, S. Bhargava, Priyanka Sharma","doi":"10.1080/09720529.2022.2072438","DOIUrl":"https://doi.org/10.1080/09720529.2022.2072438","url":null,"abstract":"Abstract Patient data at hospitals is non-sharable in current systems and cost of repeated medication is curse to the patients. Also medical treatment perspective changes at every hospital or doctor or diagnostic center. To resolve the issue of availability of medicinal past history of the patients & reduction in cost of treatment with decisive & secure availability of patient records, like prescriptions and lab reports, we implemented an ERP system over cloud in five hospitals. Based on data retrieved from the hospitals of registration (only to ensure privacy of patients) we implement data analytics using machine learning for the prediction of the disease of patients by tracking the record of medical history and also analyzed hospital and doctors information and performance. Our aim is to provide solution for less cost treatment and for regulation and monitoring of health care to Indian Medical Industry.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":"25 1","pages":"1183 - 1193"},"PeriodicalIF":1.4,"publicationDate":"2022-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41313484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信