Journal of King Saud University-Computer and Information Sciences最新文献

筛选
英文 中文
TortoiseBFT: An asynchronous consensus algorithm for IoT system TortoiseBFT:物联网系统的异步共识算法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102104
Yang Liu , Jianhao Fu , Miaomiao Zhang , Shidong Shi , Jingwen Chen , Song Peng , Yaoqi Wang
{"title":"TortoiseBFT: An asynchronous consensus algorithm for IoT system","authors":"Yang Liu ,&nbsp;Jianhao Fu ,&nbsp;Miaomiao Zhang ,&nbsp;Shidong Shi ,&nbsp;Jingwen Chen ,&nbsp;Song Peng ,&nbsp;Yaoqi Wang","doi":"10.1016/j.jksuci.2024.102104","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102104","url":null,"abstract":"<div><p>Traditional partial synchronous Byzantine fault tolerant (BFT) protocols are confronted with new challenges when applied to large-scale networks like IoT systems, which bring about rigorous demand for the liveness and consensus efficiency of BFT protocols in asynchronous network environments. HoneyBadgerBFT is the first practical asynchronous BFT protocol, which employs a reliable broadcast protocol (RBC) to broadcast transactions and an asynchronous binary agreement protocol (ABA) to determine whether transactions should be committed. DumboBFT is a follow-up proposal that requires fewer instances of ABA and achieves higher throughput than HoneyBadgerBFT, but it does not optimize the communication overhead of HoneyBadgerBFT.</p><p>In this paper, we propose TortoiseBFT, a high-performance asynchronous BFT protocol with three stages. We can significantly reduce communication overhead by determining the order of transactions first and requesting missing transactions after. Our two-phase transaction recovery mechanism enables nodes to recover missing transactions by seeking help from <span><math><mrow><mn>2</mn><mi>f</mi><mo>+</mo><mn>1</mn></mrow></math></span> nodes. To improve the overall throughput of the system, we lower the verification overhead of threshold signatures in HoneyBadgerBFT, DumboBFT, and DispersedLedger from <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup></mrow></mfenced></mrow></math></span> to <span><math><mrow><mi>O</mi><mfenced><mrow><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></mrow></mfenced></mrow></math></span>. We develop a node reputation model that selects producers with stable network conditions, which helps to reduce the number of random lotteries. Experimental results show that TortoiseBFT improves system throughput, reduces transaction delays, and minimizes communication overhead compared to HoneyBadgerBFT, DumboBFT, and DispersedLedger.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102104"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001939/pdfft?md5=b62b8656b909e9140f73f1274436f4cf&pid=1-s2.0-S1319157824001939-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients CoD-DSSE:实用高效的动态可搜索对称加密与轻量级客户端
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102106
Ze Zhu, Wanshan Xu, Junfeng Xu
{"title":"CoD-DSSE: A practical efficient dynamic searchable symmetric encryption with lightweight clients","authors":"Ze Zhu,&nbsp;Wanshan Xu,&nbsp;Junfeng Xu","doi":"10.1016/j.jksuci.2024.102106","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102106","url":null,"abstract":"<div><p>Dynamic searchable symmetric encryption(DSSE) combines dynamic update with searchable encryption, allowing users to not only achieve keyword retrieval, but also dynamically update encrypted data stored on semi-trusted cloud server, effectively protecting user’s privacy. However, the majority of existing DSSE schemes exhibit inefficiencies in practical applications because of their complex structure. In addition, to store the status of keywords, the storage requirements of the client increase proportionally with the number of keyword/document pairs. Therefore, the client storage will be overwhelmed when confronted with a substantial increase in the volume of keyword/document pairs. To solve these issues, we propose a practical efficient dynamic searchable symmetric encryption scheme with lightweight clients—CoD-DSSE. A novel index structure similar to a chest of drawers is proposed in CoD-DSSE, which allows users to efficiently search all document indexes through XOR operations and keeps the keyword status on the server to lightweight clients. Furthermore, we use a random number generator to construct new search tokens for forward security and achieve backward security by using a Bloom filter to store the deleted document index, which can significantly reduce communication costs. The experimental and security analyses show that CoD-DSSE is efficient and secure in practice.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102106"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001952/pdfft?md5=6ad7ea6cdc4037881ef06012ec4ce876&pid=1-s2.0-S1319157824001952-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141542361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An accurate transformer-based model for transition-based dependency parsing of free word order languages 基于转换器的自由词序语言转换依赖解析模型
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102107
Fatima Tuz Zuhra , Khalid Saleem , Surayya Naz
{"title":"An accurate transformer-based model for transition-based dependency parsing of free word order languages","authors":"Fatima Tuz Zuhra ,&nbsp;Khalid Saleem ,&nbsp;Surayya Naz","doi":"10.1016/j.jksuci.2024.102107","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102107","url":null,"abstract":"<div><p>Transformer models are the state-of-the-art in Natural Language Processing (NLP) and the core of the Large Language Models (LLMs). We propose a transformer-based model for transition-based dependency parsing of free word order languages. We have performed experiments on five treebanks from the Universal Dependencies (UD) dataset version 2.12. Our experiments show that a transformer model, trained with the dynamic word embeddings performs better than a multilayer perceptron trained on the state-of-the-art static word embeddings even if the dynamic word embeddings have a vocabulary size ten times smaller than the static word embeddings. The results show that the transformer trained on dynamic word embeddings achieves an unlabeled attachment score (UAS) of 84.17% for Urdu language which is <span><math><mrow><mo>≈</mo><mn>3</mn><mo>.</mo><mn>6</mn><mtext>%</mtext></mrow></math></span> and <span><math><mrow><mo>≈</mo><mn>1</mn><mo>.</mo><mn>9</mn><mtext>%</mtext></mrow></math></span> higher than the UAS scores of 80.56857% and 82.26859% achieved by the multilayer perceptron (MLP) using two static state-of-the-art word embeddings. The proposed approach is investigated for Arabic, Persian and Uyghur languages, in addition to Urdu, for UAS scores and the results suggest that the proposed solution outperform the MLP-based approaches.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102107"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001964/pdfft?md5=9f26f8ea4918de323a897e760f616273&pid=1-s2.0-S1319157824001964-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey 实现心脏护理人工智能框架的可解释性:全面调查
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102096
Sreeja M.U. , Abin Oommen Philip , Supriya M.H.
{"title":"Towards explainability in artificial intelligence frameworks for heartcare: A comprehensive survey","authors":"Sreeja M.U. ,&nbsp;Abin Oommen Philip ,&nbsp;Supriya M.H.","doi":"10.1016/j.jksuci.2024.102096","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102096","url":null,"abstract":"<div><p>Artificial Intelligence is extensively applied in heartcare to analyze patient data, detect anomalies, and provide personalized treatment recommendations, ultimately improving diagnosis and patient outcomes. In a field where accountability is indispensable, the prime reason why medical practitioners are still reluctant to utilize AI models, is the reliability of these models. However, explainable AI (XAI) was a game changing discovery where the so-called back boxes can be interpreted using Explainability algorithms. The proposed conceptual model reviews the existing recent researches for AI in heartcare that have found success in the past few years. The various techniques explored range from clinical history analysis, medical imaging to the nonlinear dynamic theory of chaos to metabolomics with specific focus on machine learning, deep learning and Explainability. The model also comprehensively surveys the different modalities of datasets used in heart disease prediction focusing on how results differ based on the different datasets along with the publicly available datasets for experimentation. The review will be an eye opener for medical researchers to quickly identify the current progress and to identify the most reliable data and AI algorithm that is appropriate for a particular technology for heartcare along with the Explainability algorithm suitable for the specific task.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102096"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S131915782400185X/pdfft?md5=389a533241a27435252f80bcbd075d37&pid=1-s2.0-S131915782400185X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ORD-WM: A two-stage loop closure detection algorithm for dense scenes ORD-WM:高密度场景的两阶段闭环检测算法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102115
Chengze Wang , Wei Zhou , Gang Wang
{"title":"ORD-WM: A two-stage loop closure detection algorithm for dense scenes","authors":"Chengze Wang ,&nbsp;Wei Zhou ,&nbsp;Gang Wang","doi":"10.1016/j.jksuci.2024.102115","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102115","url":null,"abstract":"<div><p>Loop closure detection is a crucial technique supporting localization and navigation in autonomous vehicles. Existing research focuses on feature extraction in global scenes while neglecting considerations for local dense environments. In such local scenes, there are a large number of buildings, vehicles, and traffic signs, characterized by abundant objects, dense distribution, and interlaced near and far. The current methods only employ a single strategy for constructing descriptors, which fails to provide a detailed representation of the feature distribution in dense scenes, leading to inadequate discrimination of descriptors. Therefore, this paper proposes a multi-information point cloud descriptor to address the aforementioned issues. This descriptor integrates three types of environmental features: object density, region density, and distance, enhancing the recognition capability in local dense scenes. Additionally, we incorporated wavelet transforms and invariant moments from the image domain, designing wavelet invariant moments with rotation and translation invariance. This approach resolves the issue of point cloud mismatch caused by LiDAR viewpoint variations. In the experimental part, We collected data from dense scenes and conducted targeted experiments, demonstrating that our method achieves excellent loop closure detection performance in these scenes. Finally, the method is applied to a complete SLAM system, achieving accurate mapping.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102115"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002040/pdfft?md5=46360415eb85c7c1fd6d73aa79f22586&pid=1-s2.0-S1319157824002040-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141595577","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application 0-1knapsack问题的二元元启发式算法:性能分析、混合变体和实际应用
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102093
Mohamed Abdel-Basset , Reda Mohamed , Safaa Saber , Ibrahim M. Hezam , Karam M. Sallam , Ibrahim A. Hameed
{"title":"Binary metaheuristic algorithms for 0–1 knapsack problems: Performance analysis, hybrid variants, and real-world application","authors":"Mohamed Abdel-Basset ,&nbsp;Reda Mohamed ,&nbsp;Safaa Saber ,&nbsp;Ibrahim M. Hezam ,&nbsp;Karam M. Sallam ,&nbsp;Ibrahim A. Hameed","doi":"10.1016/j.jksuci.2024.102093","DOIUrl":"10.1016/j.jksuci.2024.102093","url":null,"abstract":"<div><p>This paper examines the performance of three binary metaheuristic algorithms when applied to two distinct knapsack problems (0–1 knapsack problems (KP01) and multidimensional knapsack problems (MKP)). These binary algorithms are based on the classical mantis search algorithm (MSA), the classical quadratic interpolation optimization (QIO) method, and the well-known differential evolution (DE). Because these algorithms were designed for continuous optimization problems, they could not be used directly to solve binary knapsack problems. As a result, the V-shaped and S-shaped transfer functions are used to propose binary variants of these algorithms, such as binary differential evolution (BDE), binary quadratic interpolation optimization (BQIO), and binary mantis search algorithm (BMSA). These binary variants are evaluated using various high-dimensional KP01 examples and compared to several classical metaheuristic techniques to determine their efficacy. To enhance the performance of those binary algorithms, they are combined with repair operator 2 (RO2) to offer better hybrid variants, namely HMSA, HQIO, and HDE. Those hybrid algorithms are evaluated using several medium- and large-scale KP01 and MKP instances, as well as compared to other hybrid algorithms, to demonstrate their effectiveness. This comparison is conducted using three performance metrics: average fitness value, Friedman mean rank, and computational cost. The experimental findings demonstrate that HQIO is a strong alternative for solving KP01 and MKP. In addition, the proposed algorithms are applied to the Merkle-Hellman Knapsack Cryptosystem and the resource allocation problem in adaptive multimedia systems (AMS) to illustrate their effectiveness when applied to optimize those real applications. The experimental findings illustrate that the proposed HQIO is a strong alternative for handling various knapsack-based applications.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102093"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001824/pdfft?md5=eecc477cb95abd1cca413bd63da31783&pid=1-s2.0-S1319157824001824-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141403813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A reference architecture for quantum computing as a service 量子计算即服务的参考架构
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102094
Aakash Ahmad , Ahmed B. Altamimi , Jamal Aqib
{"title":"A reference architecture for quantum computing as a service","authors":"Aakash Ahmad ,&nbsp;Ahmed B. Altamimi ,&nbsp;Jamal Aqib","doi":"10.1016/j.jksuci.2024.102094","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102094","url":null,"abstract":"<div><p>Quantum computers (QCs) aim to disrupt the status-quo of computing – replacing traditional systems and platforms that are driven by digital circuits and modular software – with hardware and software that operate on the principle of quantum mechanics. QCs that rely on quantum mechanics can exploit quantum circuits (i.e., quantum bits for manipulating quantum gates) to achieve ‘quantum computational supremacy’ over traditional, i.e., digital computing systems. Currently, the issues that impede mass-scale adoption of quantum systems are rooted in the fact that building, maintaining, and/or programming QCs is a complex and radically distinct engineering paradigm when compared to the challenges of classical computing and software engineering. Quantum service orientation is seen as a solution that synergises the research on service computing and quantum software engineering (QSE) to allow developers and users to build and utilise quantum software services based on pay-per-shot utility computing model. The pay-per-shot model represents a single execution of instruction on quantum processing unit and it allows vendors (e.g., Amazon Braket) to offer their QC platforms, simulators, and software services to end-users. This research contributes by (i) developing a reference architecture for enabling Quantum Computing as a Service (QCaaS), (ii) implementing microservices with the quantum-classic split pattern as an architectural use-case, and (iii) evaluating the architecture based on practitioners’ feedback. The proposed reference architecture follows a layered software pattern to support the three phases of service lifecycle namely <em>development</em>, <em>deployment</em>, and <em>split</em> of quantum software services. In the QSE context, the research focuses on unifying architectural methods and service-orientation patterns to promote reuse knowledge and best practices to tackle emerging and futuristic challenges of architecting QCaaS.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102094"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824001836/pdfft?md5=c91ee63f1f40c76da5b6c5eb51b9b263&pid=1-s2.0-S1319157824001836-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141479283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database 基于操作员迭代感知图数据库执行计划的新型查询执行时间预测方法
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102125
Zhenzhen He , Jiong Yu , Tiquan Gu
{"title":"A novel query execution time prediction approach based on operator iterate-aware of the execution plan on the graph database","authors":"Zhenzhen He ,&nbsp;Jiong Yu ,&nbsp;Tiquan Gu","doi":"10.1016/j.jksuci.2024.102125","DOIUrl":"10.1016/j.jksuci.2024.102125","url":null,"abstract":"<div><p>Query execution time prediction is essential for database query optimization tasks, such as query scheduling, progress monitoring, and resource allocation. In the query execution time prediction tasks, the query plan is often used as the modeling object of a prediction model. Although the learning-based prediction models have been proposed to capture plan features, there are two limitations need to be considered more. First, the parent–child dependencies between plan operators can be captured, but the operator’s branch independence cannot be distinguished. Second, each operator’s output row is its following operator input, but the data iterate transfer operations between operators are ignored. In this study, we propose a graph query execution time prediction model containing a plan module, a query module, a plan-query module, and a prediction module to improve prediction effectiveness. Specifically, the plan module is used to capture the data iterate transfer operations and distinguish independent of branch operators; the query module is used to learn features of query terms that have an influence on the composition of operators; the plan-query interaction module is used to learn the logical correlations of plan and query. The experiment on datasets proves the effectiveness of the operator iterate-aware and query-plan interaction method in our proposed graph query execution prediction model.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102125"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002143/pdfft?md5=ad7d539faf5eff6c98349863ba86037c&pid=1-s2.0-S1319157824002143-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced enterprise-student matching with meta-path based graph neural network 利用基于元路径的图神经网络增强企业与学生的匹配度
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102116
Fu Li , Guangsheng Ma , Feier Chen , Qiuyun Lyu , Zhen Wang , Jian Zhang
{"title":"Enhanced enterprise-student matching with meta-path based graph neural network","authors":"Fu Li ,&nbsp;Guangsheng Ma ,&nbsp;Feier Chen ,&nbsp;Qiuyun Lyu ,&nbsp;Zhen Wang ,&nbsp;Jian Zhang","doi":"10.1016/j.jksuci.2024.102116","DOIUrl":"10.1016/j.jksuci.2024.102116","url":null,"abstract":"<div><p>Job-seeking is always an inescapable challenge for graduates. It may take a lot of time to find satisfying jobs due to the information gap between students who need satisfying offers and enterprises which ask for proper candidates. Although campus recruiting and job advertisements on the Internet could provide partial information, it is still not enough to help students and enterprises know each other and effectively match a graduate with a job. To narrow the information gap, we propose to recommend jobs for graduates based on historical employment data. Specifically, we construct a heterogeneous information network to characterize the relations between <em>students</em>, <em>enterprises</em> and <em>industries</em>. And then, we propose a meta-path based graph neural network, namely GraphRecruit, to further learn both latent student and enterprise portrait representations. The designed meta-paths connect students with their preferred enterprises and industries from different aspects. Also, we apply genetic algorithm optimization for meta-path selection according to application scenarios to enhance recommendation suitability and accuracy. To show the effectiveness of GraphRecruit, we collect five-year employment data and conduct extensive experiments comparing GraphRecruit with 4 classical baselines. The results demonstrate the superior performance of the proposed method.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102116"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002052/pdfft?md5=b92e9095dd2f3d188041171d9ee66fb2&pid=1-s2.0-S1319157824002052-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141639173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing 基于密钥策略的属性线性同态签名方案,适用于移动人群感应
IF 5.2 2区 计算机科学
Journal of King Saud University-Computer and Information Sciences Pub Date : 2024-07-01 DOI: 10.1016/j.jksuci.2024.102114
Yuan Tian , Tanping Zhou , Xuan Zhou, Weidong Zhong, Xiaoyuan Yang
{"title":"Attribute-based linear homomorphic signature scheme based on key policy for mobile crowdsensing","authors":"Yuan Tian ,&nbsp;Tanping Zhou ,&nbsp;Xuan Zhou,&nbsp;Weidong Zhong,&nbsp;Xiaoyuan Yang","doi":"10.1016/j.jksuci.2024.102114","DOIUrl":"https://doi.org/10.1016/j.jksuci.2024.102114","url":null,"abstract":"<div><p>Compared with traditional wireless sensor networks, mobile crowdsensing networks have advantages of low cost, easy maintenance, and high scalability, which will play a role in city-level data sensing scenarios in the future. So far, linear homomorphic signatures based on Public Key Instruction,identity, as well as certificateless, have been proposed in wireless sensor networks to resist the data contamination. However, these signature schemes cannot perform finer-grained signature verification, and these signature schemes do not realize the separation of users’ sensitive information from their data. To solve the above problems, we design an attribute-based linear homomorphic signature scheme for large-scale wireless network built with mobile smart devices. First, we give the definition of the attribute-based linear homomorphic signature scheme based on key policy (KP-ABLHS). Second, we construct KP-ABLHS by incorporating attribute-based signature and linear homomorphic coding signature scheme. Finally, we prove our protocol is secure in random oracle model (ROM) and use Python pairing-based cryptography library (pypbc) to implement the scheme. The experimental results show that our scheme is as efficient as Li et al.’s scheme and has the advantage of signing the set of attributes, while the efficiency of our scheme is significantly better than that of scheme Boneh et al.’s scheme.</p></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 6","pages":"Article 102114"},"PeriodicalIF":5.2,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1319157824002039/pdfft?md5=5422bf34152eb0c9ba54efd3a750f137&pid=1-s2.0-S1319157824002039-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141540368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信