Computer Software and Media Applications最新文献

筛选
英文 中文
Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation Ftdho Zfnet:基于区块链的分数塔斯马尼亚魔鬼哈里斯优化深度学习,使用攻击检测和缓解功能
Computer Software and Media Applications Pub Date : 2024-06-04 DOI: 10.24294/csma.v7i1.5224
S. S. Barani, R. Durga
{"title":"Ftdho Zfnet: Block chain based Fractional Tasmanian Devil Harris optimization enabled deep learning using attack detection and mitigation","authors":"S. S. Barani, R. Durga","doi":"10.24294/csma.v7i1.5224","DOIUrl":"https://doi.org/10.24294/csma.v7i1.5224","url":null,"abstract":"Block chain technology is regarded for enhancing the characteristics of security because of decentralized design, safe distributed storage, and privacy. However, in recent times the present situation of block chain technology has experienced some crisis that may delay the quick acceptance and utilization in real-time applications. To conquer this subdues, a blockchain based system for attack detection and mitigation with Deep Learning (DL) named Fractional Tasmanian Devil Harris Optimization_Zeiler and Fergus network (FTDHO_ZFNet) is introduced. In this investigation, the entities utilized are owner, block chain, server, trusted authority and user. Here, authentication phase is done by means of Ethereum block chain by Key Exchange module and privacy preserved data sharing and communication is also done. Then, recorded log file creation is executed by the below mentioned stages. At first, a log file is generated with the basis of communication to record the events. After wards, the features are extracted by BoT-IoT database. Then, feature fusion is done by overlap coefficient utilizing Deep Q-Network (DQN). Moreover, data augmentation (DA) is doneusing bootstrapping method. At last, attack detection is observed by ZFNet tuned by FTDHO. Here, FTDHO is unified by Fractional Tasmanian Devil Optimization (FTDO) and Harris Hawks Optimization (HHO). Additionally, FTDO is integrated by Fractional Calculus (FC) concept and Tasmanian devil optimization (TDO). Furthermore, attack mitigation is performed. The performance measures applied for FTDHO_ZFNet are accuracy, and True Negative rate (TNR), observed supreme values with 92.9%, 93.8% and 92.9%.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"9 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141266923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of shadow detection and removal scheme in real-time still images 实时静态图像中阴影检测和去除方案的设计与分析
Computer Software and Media Applications Pub Date : 2024-03-18 DOI: 10.24294/csma.v6i1.4303
Sameer Ali, Muhammad Adeel Karim, Junaid Akhtar, Tanveer Ahmed Khan, Sikander Khan Mandokhail, Ubaid Rehman Shaikh, Naveed Ahmed Buriro, Basit Ali Arain
{"title":"Design and analysis of shadow detection and removal scheme in real-time still images","authors":"Sameer Ali, Muhammad Adeel Karim, Junaid Akhtar, Tanveer Ahmed Khan, Sikander Khan Mandokhail, Ubaid Rehman Shaikh, Naveed Ahmed Buriro, Basit Ali Arain","doi":"10.24294/csma.v6i1.4303","DOIUrl":"https://doi.org/10.24294/csma.v6i1.4303","url":null,"abstract":"This research’s main objective is to study and evaluate the detection and removal of undesired shadows from still images since these shadows might mask important information caused by light sources and other obstructions. A variety of methods for detecting and eliminating shadows as well as object tracking approaches based on movement estimation and identification are investigated. This includes shadow removal methods like background subtraction, which are intended to improve obstacle recognition of the source item and increase the accuracy of shadow removal from objects. When new items enter the frame, they are first distinguished from the background using a reference frame. The tracking procedure is made more difficult by the merging of the shadow with the foreground object. The approach highlights the difficulties in object detection owing to frequent occurrences of obstacles by using morphological procedures for shadow identification and removal. The proposed approach uses feature extraction is also discussed, highlighting its importance in image processing research and the use of suggested methods to get over obstacles in image sequences. The proposed method for shadow identification and removal offers a novel approach to improve image processing when dealing with still images. The purpose of this technique is to better detect and remove shadows from images, which will increase the precision of object tracking and detection. Depending on the type of images being processed, the process begins with initializing a background model, which is based on a static image background.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"240 5","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140233698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Software security: Threats, solutions and challenges 软件安全:威胁、解决方案和挑战
Computer Software and Media Applications Pub Date : 2024-02-21 DOI: 10.24294/csma.v6i1.3769
Himani Mittal
{"title":"Software security: Threats, solutions and challenges","authors":"Himani Mittal","doi":"10.24294/csma.v6i1.3769","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3769","url":null,"abstract":"Software security is of great concern as computers have entered almost all walks of life and people at large have become dependent on technology for not only entertainment and communication but for performing tasks involving money and a lot of stake. Software security not only involves securing the software but also user data and communication media. This paper states the several types of security threats that exist since the time networking has evolved, namely, malware, Trojans, viruses, denial of service attacks, and many more. This paper reviews several measures to address these threats. It includes logging, anti-malware, network security methods, and encryption methods. It has been identified that a lot of work has been done to deal with security threats, and it is not only limited to the protection of software but also extends to the protection of data and networks. The existing methods make extensive use of artificial intelligence, and it is identified that there is a need to develop a model that is able to identify known as well as unknown threats. There is a huge scope for research in this area.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"10 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140442335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Integrate between information systems engineering and software engineering theories for successful quality engineering measurement of software: Valid instrument pre-results 整合信息系统工程和软件工程理论,成功进行软件质量工程测量:有效仪器的预结果
Computer Software and Media Applications Pub Date : 2024-02-21 DOI: 10.24294/csma.v6i1.3382
Amani Ali Ibrahim Almetwaly, I. Fadhel
{"title":"Integrate between information systems engineering and software engineering theories for successful quality engineering measurement of software: Valid instrument pre-results","authors":"Amani Ali Ibrahim Almetwaly, I. Fadhel","doi":"10.24294/csma.v6i1.3382","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3382","url":null,"abstract":"An extensive number of instruments and systems assessment tools are weak and not good enough in the appraisal of systems’ quality engineer success measurement. Thus, the comprehension of systems’ success is very serious. One of the purposes of this research topic is to develop a successful, novel, validated instrument for measuring system quality success based on the integration between theories of information systems (Seddon and DeLone & McLean) and software engineering theory (ISO 25010). To ensure the quality of the instrument before use, eight academic experts have validated. The reason for expanding the number of experts to eight is to accurately build and evaluate the instrument because this instrument is the first one erring. After expert validation done successfully, researchers started the process of instrument pre-test. Pre-test verification and validation results done by test the instrument of 74 users. The results of the statistical testing were perfect. The Composite reliability proposed value is 0.7, The average variance extracted value is 0.5. Cronbach’s alpha is higher than 0.7. The value of Spearman’s reliable rhea is >0.6. Results approved that this instrument is strong and perfect to be used as a valid tool for system success measurement.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140444204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in software engineering using AI 利用人工智能推进软件工程
Computer Software and Media Applications Pub Date : 2024-02-01 DOI: 10.24294/csma.v6i1.3906
Hazem W. Marar
{"title":"Advancements in software engineering using AI","authors":"Hazem W. Marar","doi":"10.24294/csma.v6i1.3906","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3906","url":null,"abstract":"The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"162 ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139822969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancements in software engineering using AI 利用人工智能推进软件工程
Computer Software and Media Applications Pub Date : 2024-02-01 DOI: 10.24294/csma.v6i1.3906
Hazem W. Marar
{"title":"Advancements in software engineering using AI","authors":"Hazem W. Marar","doi":"10.24294/csma.v6i1.3906","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3906","url":null,"abstract":"The integration of Artificial Intelligence (AI) into the space of software engineering marks a transformative period that reshapes traditional development processes and propels the industry into a new era of innovation. This exploration delves into the multifaceted impact of AI, from its roots in early symbolic AI to the contemporary dominance of machine learning and deep learning. AI’s applications span various domains, but its significance in software engineering lies in its ability to enhance efficiency, improve software quality, and introduce novel approaches to problem-solving. From automating routine tasks to streamlining complex development workflows, AI acts as a virtual collaborator, allowing human developers to focus on higher-order thinking and creativity. This study introduces the application of AI in software engineering. reverse-engineering, and development environments. Moreover, ethical considerations, challenges, and future trends, including explainable AI, reinforcement learning, and human-AI collaboration, are presented.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"13 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139883012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An optimized secure dual authentication for VANETs 针对 VANET 的优化安全双重认证
Computer Software and Media Applications Pub Date : 2024-01-26 DOI: 10.24294/csma.v6i1.3061
Deepalakshmi Kandeepan, R. Durga
{"title":"An optimized secure dual authentication for VANETs","authors":"Deepalakshmi Kandeepan, R. Durga","doi":"10.24294/csma.v6i1.3061","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3061","url":null,"abstract":"“Vehicular Ad-hoc Network (VANET)” has emerged as a hotbed of research and development. This technology has been utilized to improve vehicle and road safety by transmitting information about traffic congestion and road conditions during emergencies in order to soothe drivers and passengers. However, such environments are more vulnerable to security risks. Thus, the primary challenge in such an environment is to provide authentication services while maintaining user confidentiality. To that end, a trustworthy authority (TA) is established, which offers services to users as well as authentication of communications transmitted between trusted authorities and VANET nodes. A trusted authority (TA) is established using VANETs to supply clients with a range of online premium services. As a result, preserving the confidentiality and authenticity of messages conducted between the TA and VANET nodes is crucial. Our proposed method minimizes recognition latency by up to 85% when compared to On-site Driver ID, and decreases authentication latency by up to 94%, respectively.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"78 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139593663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
PDHSMICK: A partial key-based secure EHRs with distributed cloud for healthcare systems applying MI-CRYSTALS-Kyber PDHSMICK:应用 MI-CRYSTALS-Kyber,基于部分密钥的医疗保健系统分布式云安全电子病历
Computer Software and Media Applications Pub Date : 2023-12-15 DOI: 10.24294/csma.v6i1.3062
Prathima Subramanian, R. Durga
{"title":"PDHSMICK: A partial key-based secure EHRs with distributed cloud for healthcare systems applying MI-CRYSTALS-Kyber","authors":"Prathima Subramanian, R. Durga","doi":"10.24294/csma.v6i1.3062","DOIUrl":"https://doi.org/10.24294/csma.v6i1.3062","url":null,"abstract":"Healthcare, which raises several challenges regarding security and privacy, is the largest sector of society dealing with patients’ health data. Numerous approaches have been developed regarding healthcare; however, these approaches lead to high response time and leakage of transaction privacy. Thus, this work proposes PDHSMICK, a partial key-based secure EHRs with distributed cloud for Healthcare Systems applying Mimetic Interpolation-based CRYSTALS-Kyber (MI-CRYSTAL-Kyber). Primarily, the patient and doctor register with the system. After that, the patient logs in and books an appointment with the doctor. Then, consultation is done, and their details are sent to the Third-Party Auditor (TPA), where they store the information in the log file. Afterwards, the patient verifies the log file and then uploads the information to the concerned Cloud Server (CS). During uploading, the files are split, and the attributes from the files and Distributed Cloud Server (DCS) are extracted. Then, by utilizing Interpolation-based Pearson Correlation Coefficient (I-PCC), a particular DCS is selected. After that, for authorization purposes, a hash code and digital signature are generated by utilizing Exponential based Extensible Output Functions (EX-EOF) and Double Mod-Digital Signature Algorithm (DM-DSA). Concurrently, the files are encrypted by employing MI-CRYSTAL-Kyber techniques. Lastly, the doctor logs on to the system, and hash code and digital signature verification are performed. The system allows the doctor to download the data if the verification matches. Also, the experimental assessment was validated, which shows the proposed technique’s efficacy.","PeriodicalId":505445,"journal":{"name":"Computer Software and Media Applications","volume":"1 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139178846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信