Xingxu Fan , Xiaomei Yu , Xue Li , Fengru Ge , Yanjie Zhao
{"title":"LMGA: Lightweight multi-graph augmentation networks for safe medication recommendation","authors":"Xingxu Fan , Xiaomei Yu , Xue Li , Fengru Ge , Yanjie Zhao","doi":"10.1016/j.jksuci.2024.102245","DOIUrl":"10.1016/j.jksuci.2024.102245","url":null,"abstract":"<div><div>The rapid accumulation of large-scale electronic health records (EHRs) has witnessed the prosperity of intelligent medicine, such as medication recommendation (MR). However, most studies either fail to fully capture the structural correlation and temporal dependence among various medical records, or disregard the computational efficiency of the MR models. To fill this gap, we put forward a <strong>L</strong>ightweight <strong>M</strong>edication recommendation method which integrates bidirectional gate recurrent units (BiGRUs) with light graph convolutional networks (LGCNs) based on the multiple <strong>G</strong>raph <strong>A</strong>ugmentation networks (LMGA). Specifically, BiGRUs are deployed to encode longitudinal visit histories and generate patient representations from a holistic perspective. Additionally, a memory network is constructed to extract local personalized features in the patients’ historical EHRs, and LGCNs are deployed to learn both drug co-occurrence and antagonistic relationships for integral drug representations with reduced computational resource requirements. Moreover, a drug molecular graph is leveraged to capture structural information and control potential DDIs in predicted medication combinations. Incorporating the representations of patients and medications, a lightweight and safe medication recommendation is available to promote prediction performance with reduced computational resource consumption. Finally, we conduct a series of experiments to evaluate the proposed LMGA on two publicly available datasets, and the experimental results demonstrate the superior performance of LMGA in MR tasks compared with the state-of-the-art baseline models.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102245"},"PeriodicalIF":5.2,"publicationDate":"2024-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Weijie Wang , Wenhui Chen , Qinhon Lei , Zhe Li , Huihuang Zhao
{"title":"ACTF: An efficient lossless compression algorithm for time series floating point data","authors":"Weijie Wang , Wenhui Chen , Qinhon Lei , Zhe Li , Huihuang Zhao","doi":"10.1016/j.jksuci.2024.102246","DOIUrl":"10.1016/j.jksuci.2024.102246","url":null,"abstract":"<div><div>The volume of time series data across various fields is steadily increasing. However, this unprocessed massive data challenges transmission efficiency, computational arithmetic, and storage capacity. Therefore, the compression of time series data is essential for improving transmission, computation, and storage. Currently, improving time series floating-point coding rules is the primary method for enhancing compression algorithms efficiency and ratio. This paper presents an efficient lossless compression algorithm for time series floating point data, designed based on existing compression algorithms. We employ three optimization strategies data preprocessing, coding category expansion, and feature refinement representation to enhance the compression ratio and efficiency of compressing time-series floating-point numbers. Through experimental comparisons and validations, we demonstrate that our algorithm outperforms Chimp, Chimp<sub>128</sub>, Gorilla, and other compression algorithms across multiple datasets. The experimental results on 30 datasets show that our algorithm improves the compression ratio of time series algorithms by an average of 12.25% and compression and decompression efficiencies by an average of 27.21%. Notably, it achieves a 24.06% compression ratio improvement on the IOT1 dataset and a 42.96% compression and decompression efficiency improvement on the IOT4 dataset.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102246"},"PeriodicalIF":5.2,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705934","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The multi-objective task assignment scheme for software crowdsourcing platforms involving new workers","authors":"Minglan Fu, Zhijie Zhang, ZouXi Wang, Debao Chen","doi":"10.1016/j.jksuci.2024.102237","DOIUrl":"10.1016/j.jksuci.2024.102237","url":null,"abstract":"<div><div>Software crowdsourcing has become a cornerstone of the Internet economy because of its unique capacity for selecting optimal workers to complete specific tasks. However, new workers face limited task opportunities compared to experienced workers, which negatively impacts their motivation and decreases overall activity on crowdsourcing platforms. This reduced activity can harm platform reputation. To encourage the active participation of new workers, this study introduces a novel method to identify and match worker–task preferences. Our approach categorizes preferred tasks based on golden tasks, historical data, and worker interests. We then present the Multi-Objective Worker–Task Recommendation (MOWTR) algorithm, built upon the Non-Dominated Sorting Genetic Algorithm II (NSGA-II). The MOWTR algorithm allocates tasks by considering worker preferences, salaries, and capabilities, aiming to optimize collective team performance while minimizing team costs, especially for new workers. New crossover and two-stage mutation operators are incorporated to increase algorithm efficiency. Experimental evaluations on four real and synthetic datasets demonstrate that MOWTR outperforms four advanced baseline methods, confirming its effectiveness.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102237"},"PeriodicalIF":5.2,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Correlation analysis of multifractal stock price fluctuations based on partition function","authors":"Huan Wang, Wei Song","doi":"10.1016/j.jksuci.2024.102233","DOIUrl":"10.1016/j.jksuci.2024.102233","url":null,"abstract":"<div><div>Studying the correlation analysis of stock price fluctuations helps to understand market dynamics better and improve the scientific nature of investment decisions and risk management capabilities. Most existing methods use multifractals to explore the correlation between different economic entities. However, the study of multifractals fails to fully consider the weight of each entity’s impact on the market, resulting in an inaccurate description of the overall market dynamics. To address this problem, this paper creatively proposes a weighted multifractal analysis method (WMA). The correlation analysis of government regulation, market supply and demand, and stock price index is performed using the data of A-share listed companies in Shenzhen and Shanghai as samples. First, we consider the amplitude fluctuation information the signal carries and weigh the partition function according to the proportion of variance in the segment for different amplitude changes. Secondly, we derive the theoretical analytical form of the classical multifractal model (SMA) of the scaling indicator under WMA. Finally, through numerical simulation experiments, it is confirmed that WMA is equally effective as SMA. In addition, the re-fractal correlation analysis of real financial time series also confirms that WMA can effectively utilize the amplitude fluctuation information in the series and outperforms the classical SMA method in distinguishing different signals.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102233"},"PeriodicalIF":5.2,"publicationDate":"2024-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdulbasit A. Darem , Tareq M. Alkhaldi , Asma A. Alhashmi , Wahida Mansouri , Abed Saif Ahmed Alghawli , Tawfik Al-Hadhrami
{"title":"Optimizing resource allocation for enhanced urban connectivity in LEO-UAV-RIS networks","authors":"Abdulbasit A. Darem , Tareq M. Alkhaldi , Asma A. Alhashmi , Wahida Mansouri , Abed Saif Ahmed Alghawli , Tawfik Al-Hadhrami","doi":"10.1016/j.jksuci.2024.102238","DOIUrl":"10.1016/j.jksuci.2024.102238","url":null,"abstract":"<div><div>Sixth-generation (6G) communication advancements target massive connectivity, ultra-reliable low-latency communication (URLLC), and high data rates, essential for IoT applications. Yet, in natural disasters, particularly in dense urban areas, 6G quality of service (QoS) can falter when terrestrial networks—such as base stations—become unavailable, unstable, or strained by high user density and dynamic environments. Additionally, high-rise buildings in smart cities contribute to signal blockages. To ensure reliable, high-quality connectivity, integrating low-Earth Orbit (LEO) satellites, unmanned aerial vehicles (UAVs), and reconfigurable intelligent surfaces (RIS) into a multilayer (ML) network offers a solution: LEO satellites provide broad coverage, UAVs reduce congestion with flexible positioning, and RIS enhances signal quality. Despite these benefits, this integration brings challenges in resource allocation, requiring path loss models that account for both line-of-sight (LOS) and non-line-of-sight (NLOS) links. To address these, a joint optimization problem is formulated focusing on resource distribution fairness. Given its complexity, a framework is proposed to decouple the problem into subproblems using the block coordinate descent (BCD) method. These subproblems include UAV placement optimization, user association, subcarrier allocation via orthogonal frequency division multiple access (OFDMA), power allocation, and RIS phase shift control. OFDMA efficiently manages shared resources and mitigates interference. This iterative approach optimizes each subproblem, ensuring convergence to a locally optimal solution. Additionally, we propose a low-complexity solution for RIS phase shift control, proving its feasibility and efficiency mathematically. The numerical results demonstrate that the proposed scheme achieves up to 43.5% higher sum rates and 80% lower outage probabilities compared to the schemes without RIS. The low complexity solution for RIS optimization achieves performance within 1.8% of the SDP approach in terms of the sum rate. This model significantly improves network performance and reliability, achieving a 16.3% higher sum rate and a 44.4% reduction in outage probability compared to joint optimization of SAT-UAV resources. These findings highlight the robustness and efficiency of the ML network model, making it ideal for next-generation communication systems in high-density urban environments.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102238"},"PeriodicalIF":5.2,"publicationDate":"2024-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar
{"title":"Visually meaningful image encryption for secure and authenticated data transmission using chaotic maps","authors":"Deep Singh , Sandeep Kumar , Chaman Verma , Zoltán Illés , Neerendra Kumar","doi":"10.1016/j.jksuci.2024.102235","DOIUrl":"10.1016/j.jksuci.2024.102235","url":null,"abstract":"<div><div>Image ciphering techniques usually transform a given plain image data into a cipher image data resembling noise, serving as an indicator of the presence of secret image data. However, the transmission of such noise-like images could draw attention, thereby attracting the attackers and may face several possible attacks. This paper presents an approach for generating a visually meaningful image encryption (VMIE) scheme that combines three layers of security protection: encryption, digital signature, and steganography. The present scheme is dedicated to achieving a balanced performance in robustness, security and operational efficiency. First, the original image is partially encrypted by using the RSA cryptosystem and modified Hénon map (MHM). In the second stage, a digital signature is generated for the partially encrypted image by employing a hash function and the RSA cryptosystem. The obtained digital signature is appended to the partially encrypted image produced after implementing the zigzag confusion in the above partially encrypted image. Further, to achieve better confusion and diffusion, the partially encrypted image containing a digital signature undergoes through the application of 3D Arnold cat map (<span><math><mrow><mi>A</mi><msub><mrow><mi>R</mi></mrow><mrow><mi>n</mi><mi>o</mi></mrow></msub></mrow></math></span> times), to produce the secret encrypted image <span><math><mrow><mo>(</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>r</mi><mn>5</mn></mrow></msub><mo>)</mo></mrow></math></span>. To ensure the security and robustness of the proposed technique against various classical attacks, the hash value obtained from the SHA-256 hash function and carrier images is utilized to generate the initial conditions <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>10</mn></mrow></msub></mrow></math></span> and <span><math><mrow><mi>M</mi><msub><mrow><mi>h</mi></mrow><mrow><mn>20</mn></mrow></msub></mrow></math></span> for modified Hénon map, and initial position <span><math><mrow><msub><mrow><mi>Z</mi></mrow><mrow><mi>i</mi><mi>p</mi></mrow></msub><mo>=</mo><mrow><mo>(</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>r</mi><mi>o</mi><mi>w</mi></mrow></msub><mo>,</mo><msub><mrow><mi>z</mi></mrow><mrow><mi>c</mi><mi>o</mi><mi>l</mi></mrow></msub><mo>)</mo></mrow></mrow></math></span> for zigzag confusion. In the proposed algorithm, the digital signature is utilized for both purposes to verify the sender’s authenticity and to enhance the encryption quality. The carrier image undergoes lifting wavelet transformation, and its high-frequency components are utilized in the embedding process through a permuted pattern of MHM, resulting in a visually meaningful encrypted image. The proposed scheme achieves efficient visual encryption with minimal distortion and ensures lossless image quality upon decryption (infinite PSNR), balancing high level of security along with a good computational efficiency.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102235"},"PeriodicalIF":5.2,"publicationDate":"2024-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jie Meng , Yingqi Lu , Wangjiao He , Xiangsuo Fan , Gechen Zhou , Hongjian Wei
{"title":"Leukocyte segmentation based on DenseREU-Net","authors":"Jie Meng , Yingqi Lu , Wangjiao He , Xiangsuo Fan , Gechen Zhou , Hongjian Wei","doi":"10.1016/j.jksuci.2024.102236","DOIUrl":"10.1016/j.jksuci.2024.102236","url":null,"abstract":"<div><div>The detection of white blood cells provides important information in cellular research regarding infections, inflammation, immune function, and blood pathologies. Effective segmentation of WBCs in blood microscopic images not only aids pathologists in making more accurate diagnoses and early detections but is also crucial for identifying the types of lesions. Due to significant differences among various types of pathological WBCs and the complexities associated with cellular imaging and staining techniques, accurately recognizing and segmenting these different types of WBCs remains challenging. To address these challenges, this paper proposes a WBC segmentation technique based on DenseREU-Net, which enhances feature exchange and reuse by employing Dense Blocks and residual units. Additionally, it introduces mixed pooling and skip multi-scale fusion modules to improve the recognition and segmentation accuracy of different types of pathological WBCs. This study was validated on two datasets provided by DML-LZWH (Liuzhou Workers’ Hospital Medical Laboratory). Experimental results indicate that on the multi-class dataset, DenseREU-Net achieves an average IoU of 73.05% and a Dice coefficient of 80.25%. For the binary classification blind sample dataset, the average IoU and Dice coefficient are 83.98% and 90.41%, respectively. In both datasets, the proposed model significantly outperforms other advanced medical image segmentation algorithms. Overall, DenseREU-Net effectively analyzes blood microscopic images and accurately recognizes and segments different types of WBCs, providing robust support for the diagnosis of blood-related diseases.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102236"},"PeriodicalIF":5.2,"publicationDate":"2024-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anomaly detection in sensor data via encoding time series into images","authors":"Jidong Ma (继东) , Hairu Wang (王海茹)","doi":"10.1016/j.jksuci.2024.102232","DOIUrl":"10.1016/j.jksuci.2024.102232","url":null,"abstract":"<div><div>Detecting anomalies in multivariate time series data is crucial for maintaining the optimal functionality of control system equipment. While existing research has made significant strides in this area, the increasing complexity of industrial environments poses challenges in accurately capturing the interactions between variables. Therefore, this paper introduces an innovative anomaly detection approach that extends one-dimensional time series into two-dimensions to capture the spatial correlations within the data. Unlike traditional approaches, we utilize the Gramian Angular Field to encode the correlations between different sensors at specific time points into images, enabling precise learning of spatial information across multiple variables. Subsequently, we construct an adversarial generative model to accurately identify anomalies at the pixel level, facilitating precise localization of abnormal points. We evaluate our method using five open-source datasets from various fields. Our method outperforms state-of-the-art anomaly detection techniques across all datasets, showcasing its superior performance. Particularly, our method achieves a 11.5% increase in F1 score on the high-dimensional WADI dataset compared to the baseline method. Additionally, we conduct thorough effectiveness analysis, parameter impact experiments, significant statistical analysis, and burden analysis, confirming the efficacy of our approach in capturing both the temporal dynamics and spatial relationships inherent in multivariate time series data.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102232"},"PeriodicalIF":5.2,"publicationDate":"2024-11-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142705876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zhu Chen, Fan Li, Yueqin Diao, Wanlong Zhao, Puyin Fan
{"title":"Knowledge-embedded multi-layer collaborative adaptive fusion network: Addressing challenges in foggy conditions and complex imaging","authors":"Zhu Chen, Fan Li, Yueqin Diao, Wanlong Zhao, Puyin Fan","doi":"10.1016/j.jksuci.2024.102230","DOIUrl":"10.1016/j.jksuci.2024.102230","url":null,"abstract":"<div><div>Infrared and visible image fusion aims at generating high-quality images that serve both human and machine visual perception under extreme imaging conditions. However, current fusion methods primarily rely on datasets comprising infrared and visible images captured under clear weather conditions. When applied to real-world scenarios, image fusion tasks inevitably encounter challenges posed by adverse weather conditions such as heavy fog, resulting in difficulties in obtaining effective information and inferior visual perception. To address these challenges, this paper proposes a Mean Teacher-based Self-supervised Image Restoration and multimodal Image Fusion joint learning network (SIRIFN), which enhances the robustness of the fusion network in adverse weather conditions by employing deep supervision from a guiding network to the learning network. Furthermore, to enhance the network’s information extraction and integration capabilities, our Multi-level Feature Collaborative adaptive Reconstruction Network (MFCRNet) is introduced, which adopts a multi-branch, multi-scale design, with differentiated processing strategies for different features. This approach preserves rich texture information while maintaining semantic consistency from the source images. Extensive experiments demonstrate that SIRIFN outperforms current state-of-the-art algorithms in both visual quality and quantitative evaluation. Specifically, the joint implementation of image restoration and multimodal fusion provides more effective information for visual tasks under extreme weather conditions, thereby facilitating downstream visual tasks.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102230"},"PeriodicalIF":5.2,"publicationDate":"2024-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanxuan Wei , Mingsen Du , Teng Li , Xiangwei Zheng , Cun Ji
{"title":"Feature-fused residual network for time series classification","authors":"Yanxuan Wei , Mingsen Du , Teng Li , Xiangwei Zheng , Cun Ji","doi":"10.1016/j.jksuci.2024.102227","DOIUrl":"10.1016/j.jksuci.2024.102227","url":null,"abstract":"<div><div>In various fields such as healthcare and transportation, accurately classifying time series data can provide important support for decision-making. To further improve the accuracy of time series classification, we propose a Feature-fused Residual Network based on Multi-scale Signed Recurrence Plot (MSRP-FFRN). This method transforms one-dimensional time series into two-dimensional images, representing the temporal correlation of time series in a two-dimensional space and revealing hidden details within the data. To enhance these details further, we extract multi-scale features by setting receptive fields of different sizes and using adaptive network depths, which improves image quality. To evaluate the performance of this method, we conducted experiments on 43 UCR datasets and compared it with nine state-of-the-art baseline methods. The experimental results show that MSRP-FFRN ranks first on critical difference diagram, achieving the highest accuracy on 18 datasets with an average accuracy of 89.9%, making it the best-performing method overall. Additionally, the effectiveness of this method is further validated through metrics such as Precision, Recall, and F1 score. Results from ablation experiments also highlight the efficacy of the improvements made by MSRP-FFRN.</div></div>","PeriodicalId":48547,"journal":{"name":"Journal of King Saud University-Computer and Information Sciences","volume":"36 10","pages":"Article 102227"},"PeriodicalIF":5.2,"publicationDate":"2024-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142657771","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}