Journal of Network and Computer Applications最新文献

筛选
英文 中文
Anomalous state detection in radio access networks: A proof-of-concept 无线接入网络中的异常状态检测:概念验证
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-26 DOI: 10.1016/j.jnca.2024.103979
Michael Frey , Thomas Evans , Angela Folz , Mary Gregg , Jeanne Quimby , Jacob D. Rezac
{"title":"Anomalous state detection in radio access networks: A proof-of-concept","authors":"Michael Frey ,&nbsp;Thomas Evans ,&nbsp;Angela Folz ,&nbsp;Mary Gregg ,&nbsp;Jeanne Quimby ,&nbsp;Jacob D. Rezac","doi":"10.1016/j.jnca.2024.103979","DOIUrl":"10.1016/j.jnca.2024.103979","url":null,"abstract":"<div><p>Modern radio access networks (RANs) are both highly complex and potentially vulnerable to unauthorized security setting changes. A RAN is studied in a proof-of-concept experiment to demonstrate that an unauthorized network state is detectable at layers in the RAN architecture away from the source of the state setting. Specifically, encryption state is set at the packet data convergence protocol (PDCP) layer in the Long-Term Evolution (LTE) network model and an anomalous cipher-<span><math><mi>OFF</mi></math></span> state is shown to be detectable at the physical layer. Three tranches of experimental data totaling 1,987 runs and each involving 285 measurands were collected and used to construct and demonstrate single-feature, multi-feature, and multi-run encryption state detectors. These detectors show a range of performances with the single-feature detector based on reference signal received quality achieving near-0% false alarms and near-100% true detections. Multi-run averaging detectors show similar low-error performance, even just based on marginally effective detector features. The detectors’ performances are studied across the three tranches of experimental data and found by multiple complementary measures to be generalizable provided the testbed protocol is carefully controlled. Essential to these results was an automated, comprehensively instrumented experiment testbed in which measurands were treated as distributions.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103979"},"PeriodicalIF":7.7,"publicationDate":"2024-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141846654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A low-storage synchronization framework for blockchain systems 区块链系统的低存储同步框架
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-25 DOI: 10.1016/j.jnca.2024.103977
Yi-Xiang Wang , Yu-Ling Hsueh
{"title":"A low-storage synchronization framework for blockchain systems","authors":"Yi-Xiang Wang ,&nbsp;Yu-Ling Hsueh","doi":"10.1016/j.jnca.2024.103977","DOIUrl":"10.1016/j.jnca.2024.103977","url":null,"abstract":"<div><p>The advent of blockchain technology has brought major changes to traditional centralized storage. Therefore, various fields have begun to study the application and development of blockchain. However, blockchain technology has a serious shortcoming of data bloating. The reason is that blockchain technology achieves decentralization by storing complete blockchain data at each node, incurring a significant amount of blockchain data. Therefore, each node must spend significant amount of storage space and initialization synchronization time. To solve the above problems, in this research, we propose a secure and agile synchronization framework for low storage blockchains. First, we design a K-extreme segment algorithm, which reduces the synchronization time by returning only the first and last <span><math><mi>k</mi></math></span> blocks of each block segment at once to the local storage. Next, we decentrally store the block data of the blockchain by IPFS and establish a backup mechanism by IPFS-cluster. Finally, due to use of distributed storage, the nodes must request un-stored block data from IPFS, causing an increase in the throughput of the blockchain network. To avoid network congestion, we propose the working set algorithm to improve the hit ratio of the local storage and reduce the number of requests to decrease throughput. In summary, our experiments demonstrate that the ratio of full nodes to low storage nodes is significantly lower for nodes with higher storage limits compared to those with lower storage limits. In other words, a higher storage limit results in more low storage nodes which can be permitted to ensure that the blockchain network is robust and reliable. Therefore, our proposed framework can provide reliable low storage nodes for the blockchain. The node can reduce the local storage pressure and can still maintain the full functionality of blockchains.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103977"},"PeriodicalIF":7.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141838713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A lightweight SEL for attack detection in IoT/IIoT networks 用于物联网/物联网网络攻击检测的轻量级 SEL
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-25 DOI: 10.1016/j.jnca.2024.103980
Sulyman Age Abdulkareem , Chuan Heng Foh , François Carrez , Klaus Moessner
{"title":"A lightweight SEL for attack detection in IoT/IIoT networks","authors":"Sulyman Age Abdulkareem ,&nbsp;Chuan Heng Foh ,&nbsp;François Carrez ,&nbsp;Klaus Moessner","doi":"10.1016/j.jnca.2024.103980","DOIUrl":"10.1016/j.jnca.2024.103980","url":null,"abstract":"<div><p>Intrusion detection systems (IDSs) that continuously monitor data flow and take swift action when attacks are identified safeguard networks. Conventional IDS exhibit limitations, such as reduced detection rates and increased computational complexity, attributed to the redundancy and substantial correlation of network data. Ensemble learning (EL) is effective for detecting network attacks. Nonetheless, network traffic data and memory space requirements are typically significant. Therefore, deploying the EL approach on Internet-of-Things (IoT) devices with limited memory is challenging. In this paper, we use feature importance (FI), a filter-based feature selection technique for feature dimensionality reduction, to reduce the feature dimensions of an IoT/IIoT network traffic dataset. We also employ lightweight stacking ensemble learning (SEL) to appropriately identify network traffic records and analyse the reduced features after applying FI to the dataset. Extensive experiments use the Edge-IIoTset dataset containing IoT and IIoT network records. We show that FI reduces the storage space needed to store comprehensive network traffic data by 86.9%, leading to a significant decrease in training and testing time. Regarding accuracy, precision, recall, training and test time, our classifier that utilised the eight best dataset features recorded 87.37%, 90.65%, 77.73%, 80.88%, 16.18 s and 0.10 s for its overall performance. Despite the reduced features, our proposed SEL classifier shows insignificant accuracy compromise. Finally, we pioneered the explanation of SEL by using a decision tree to analyse its performance gain against single learners.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103980"},"PeriodicalIF":7.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001577/pdfft?md5=7cbe8f7f7873a91af312d783143ed134&pid=1-s2.0-S1084804524001577-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141838946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bandwidth delay product based modified Veno for high-speed networks: BDP-Veno 基于改进型 Veno 的高速网络带宽延迟积:BDP-Veno
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-25 DOI: 10.1016/j.jnca.2024.103983
Subhra Priyadarshini Biswal, Sanjeev Patel
{"title":"A bandwidth delay product based modified Veno for high-speed networks: BDP-Veno","authors":"Subhra Priyadarshini Biswal,&nbsp;Sanjeev Patel","doi":"10.1016/j.jnca.2024.103983","DOIUrl":"10.1016/j.jnca.2024.103983","url":null,"abstract":"<div><p>In recent years, we have seen a significant enhancement in the performance of standard Transmission Control Protocol (TCP) congestion control algorithms. The number of packet drops and high round-trip time (RTT) are indications of network congestion. Many congestion control mechanisms have been proposed to overcome the challenge of achieving increased throughput and reduced latency. We have reviewed many TCP congestion control algorithms which are discussed in the literature. The limitation of the existing work is a trade-off between throughput, loss ratio, and delay. It is not possible for any algorithm to outperform the existing algorithm in terms of all the performance measures. We attempt to achieve the best performance while our proposed algorithm competes with CUBIC and Bottleneck Bandwidth and Round-trip propagation time (BBR). According to the observed results in the literature, TCP Veno dominates among other existing algorithms. We have proposed a bandwidth-delay product (BDP) based TCP (BDP-Veno) congestion control algorithm by modifying Veno to incorporate the information of BDP of the bottleneck. The proposed algorithm is implemented using ns-2. Moreover, we have analyzed the performances of standard TCP congestion control algorithms by considering different network scenarios. Our proposed algorithm performs better compared to other existing TCP congestion control schemes such as Reno, Newreno, BIC, CUBIC, Vegas, Veno, and Compound TCP in terms of average throughput in most of the scenarios. In Scenario 1, our proposed algorithm enhances the throughput with respect to Veno by 57%. Further, we have also compared the throughput with BBR using ns3 where we receive comparable throughput with BBR.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103983"},"PeriodicalIF":7.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141845470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks CIBORG:面向单跳物联网网络的基于CIrcuit和ORiented图论的排列路由协议
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-25 DOI: 10.1016/j.jnca.2024.103986
Alain Bertrand Bomgni , Garrik Brel Jagho Mdemaya , Miguel Landry Foko Sindjoung , Mthulisi Velempini , Celine Cabrelle Tchuenko Djoko , Jean Frederic Myoupo
{"title":"CIBORG: CIrcuit-Based and ORiented Graph theory permutation routing protocol for single-hop IoT networks","authors":"Alain Bertrand Bomgni ,&nbsp;Garrik Brel Jagho Mdemaya ,&nbsp;Miguel Landry Foko Sindjoung ,&nbsp;Mthulisi Velempini ,&nbsp;Celine Cabrelle Tchuenko Djoko ,&nbsp;Jean Frederic Myoupo","doi":"10.1016/j.jnca.2024.103986","DOIUrl":"10.1016/j.jnca.2024.103986","url":null,"abstract":"<div><p>The Internet of Things (IoT) has emerged as a promising paradigm which facilitates the seamless integration of physical devices and digital systems, thereby transforming multiple sectors such as healthcare, transportation, and urban planning. This paradigm is also known as ad-hoc networks. IoT is characterized by several pieces of equipment called objects. These objects have different and limited capacities such as battery, memory, and computing power. These limited capabilities make it difficult to design routing protocols for IoT networks because of the high number of objects in a network. In IoT, objects often have data which does not belong to them and which should be sent to other objects, then leading to a problem known as permutation routing problems. The solution to that problem is found when each object receives its items. In this paper, we propose a new approach to addressing the permutation routing problem in single-hop IoT networks. To this end, we start by representing an IoT network as an oriented graph, and then, based on a reservation channel protocol, we first define a permutation routing protocol for an IoT in a single channel. Secondly, we generalize the previous protocol to make it work in multiple channels. Routing is done using graph theory approaches. The obtained results show that the wake-up times and activities of IoT objects are greatly reduced, thus optimizing network lifetime. This is an effective solution for the permutation routing problem in IoT networks. The proposed approach considerably reduces energy consumption and computation time. It saves 5.2 to 32.04% residual energy depending on the number of items and channels used. Low energy and low computational cost demonstrate that the performance of circuit-based and oriented graph theory is better than the state-of-the-art protocol and therefore is a better candidate for the resolution of the permutation routing problem in single-hop environment.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103986"},"PeriodicalIF":7.7,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S1084804524001632/pdfft?md5=ca1303a2b5ed2851b156c60360791ed3&pid=1-s2.0-S1084804524001632-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141851865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
HRMF-DRP: A next-generation solution for overcoming provisioning challenges in cloud environments HRMF-DRP:克服云环境中供应挑战的新一代解决方案
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-24 DOI: 10.1016/j.jnca.2024.103982
Devi D, Godfrey Winster S
{"title":"HRMF-DRP: A next-generation solution for overcoming provisioning challenges in cloud environments","authors":"Devi D,&nbsp;Godfrey Winster S","doi":"10.1016/j.jnca.2024.103982","DOIUrl":"10.1016/j.jnca.2024.103982","url":null,"abstract":"<div><p>The cloud computing infrastructure is a distributed environment and the existing research works have some provisioning problems such as suboptimal resource utilization and high execution time. The Heterogeneity Resource Management Framework for Dynamic Resource Provisioning (HRMF-DRP) is proposed for focusing on task scheduling and workload management. This framework incorporates advanced algorithms for dataset preprocessing, task clustering, workload prediction, and dynamic resource provisioning. For data preprocessing, the real-world workload traces were captured from the Planet Lab dataset that are taken as input for the preprocessing stage. The data preprocessing is responsible for ensuring data quality and reliability by using different models like missing data handling, outlier detection and removal as well as standardization and normalization. In this paper, the tasks are grouped into clusters by utilizing Density-Based Spatial Clustering of Applications with Noise (DBSCAN) model and this model categorizes the data points into border points, core points and noise points based on their density. The temporal dependencies are captured for the workload prediction by using Long Short-Term Memory (LSTM) neural network model. A Gaussian Mixture Model (GMM) model is responsible for estimating the number of Virtual machines (VMs) present in the workload prediction process. The Self-Adaptive Genetic Algorithm (SAGA) is implemented for task mapping that adjusts the parameters to change workload patterns for contributing adaptability and robustness. The different experimental evaluations are conducted based on the task completion time, workload balance index, resource utilization efficiency and workload prediction accuracy. The proposed model achieved the workload prediction accuracy of 98.5%, cost of $89.6, execution time of 125ms, Task Completion Time (TCT) of 40ms, Workload Balance Index (WBI) of 0.96 and Resource Utilization Efficiency (RUE) of 0.93. The quantitative results collectively position HRMF-DRP as a practical and efficient solution, promising advancements in dynamic resource provisioning for cloud computing, particularly within the Infrastructure as a Service (IaaS) cloud model.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103982"},"PeriodicalIF":7.7,"publicationDate":"2024-07-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141769014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain applications in UAV industry: Review, opportunities, and challenges 无人机行业的区块链应用:回顾、机遇和挑战
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-23 DOI: 10.1016/j.jnca.2024.103932
Diana Hawashin , Mohamed Nemer , Senay A. Gebreab , Khaled Salah , Raja Jayaraman , Muhammad Khurram Khan , Ernesto Damiani
{"title":"Blockchain applications in UAV industry: Review, opportunities, and challenges","authors":"Diana Hawashin ,&nbsp;Mohamed Nemer ,&nbsp;Senay A. Gebreab ,&nbsp;Khaled Salah ,&nbsp;Raja Jayaraman ,&nbsp;Muhammad Khurram Khan ,&nbsp;Ernesto Damiani","doi":"10.1016/j.jnca.2024.103932","DOIUrl":"10.1016/j.jnca.2024.103932","url":null,"abstract":"<div><p>In recent years, the application of blockchain technology in the Unmanned Aerial Vehicle (UAV) industry has shown promise in making a substantial impact on various aspects of the field. Blockchain can provide key solutions to several challenges related to security, data integrity, and operational efficiency within UAV systems. In this paper, we conduct an in-depth investigation of the transformative role of blockchain in the UAV industry. Through a comprehensive literature review, we examine the potential impact and applications of blockchain technology in this field, with a particular focus on its capacity to address challenges across the manufacturing, planning, and operational phases of UAV systems. We explore how blockchain implementation within UAV networks enhances secure data traceability within supply chain processes and facilitates more efficient flight operations management. Our findings reveal that blockchain technology significantly improves data traceability and operational efficiency in UAV systems, offering robust solutions to challenges related to trust, transparency, data integrity, and access control within UAV networks, thereby enhancing overall system reliability and performance. Furthermore, we highlight some of the future potential opportunities and use cases for blockchain in the UAV industry, including real-time data management and decentralized verification mechanisms. We discuss the primary challenges obstructing the widespread adoption of blockchain in this industry and also propose some future research directions.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103932"},"PeriodicalIF":7.7,"publicationDate":"2024-07-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141769013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploiting web content semantic features to detect web robots from weblogs 利用网络内容语义特征从网络日志中检测网络机器人
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-22 DOI: 10.1016/j.jnca.2024.103975
Rikhi Ram Jagat, Dilip Singh Sisodia, Pradeep Singh
{"title":"Exploiting web content semantic features to detect web robots from weblogs","authors":"Rikhi Ram Jagat,&nbsp;Dilip Singh Sisodia,&nbsp;Pradeep Singh","doi":"10.1016/j.jnca.2024.103975","DOIUrl":"10.1016/j.jnca.2024.103975","url":null,"abstract":"<div><p>Nowadays, web robots are predominantly used for auto-accessing web content, sharing almost one-third of the total web traffic and often posing threats to various web applications’ security, privacy, and performance. Detecting these robots is essential, and both online and offline methods are employed. One popular offline method is the use of weblog feature-based automated learning. However, this method alone cannot accurately identify web robots that continuously evolve and camouflage. Web content features combined with weblog features are used to detect such robots based on the assumption that human users exhibit specific interests while robots randomly navigate web pages. State-of-the-art web content-based feature methods lack the ability to generate coherent topics, which can confound the performance of classification models. Therefore, we propose a new content semantic feature extraction method that uses the LDA2Vec topic model, combining the strengths of LDA and the Word2Vec model to produce more semantically coherent topics by exploiting website content for a web session. To effectively detect web robots, web resource content semantic features are combined with log-based features in the proposed web robot detection approach. The proposed approach is evaluated in an e-commerce website access logs and content data. The F-score, balanced accuracy, G-mean, and Jaccard similarity are used for performance measures, and the coherence score metric is used to determine the number of topics for a session. Experimental results demonstrate that a combination of weblogs and content semantic features is effective in web robot detection.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103975"},"PeriodicalIF":7.7,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141769015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake CGSNet:用于高原湖泊遥感的交叉一致性指导半监督语义分割网络
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-20 DOI: 10.1016/j.jnca.2024.103974
Guangchen Chen , Benjie Shi , Yinhui Zhang, Zifen He, Pengcheng Zhang
{"title":"CGSNet: Cross-consistency guiding semi-supervised semantic segmentation network for remote sensing of plateau lake","authors":"Guangchen Chen ,&nbsp;Benjie Shi ,&nbsp;Yinhui Zhang,&nbsp;Zifen He,&nbsp;Pengcheng Zhang","doi":"10.1016/j.jnca.2024.103974","DOIUrl":"10.1016/j.jnca.2024.103974","url":null,"abstract":"<div><p>Analyzing the geographical information for the Plateau Lake region with remote sensing images (RSI) is an emerging technology to monitor the changes of the ecological environment. To alleviate the requirement of abundant labels for supervised RSI segmentation, the Cross-consistency Guiding Semi-supervised Learning (SSL) Semantic Segmentation Network is proposed, and it can perform high-quality multi-category semantic segmentation for complex remote sensing scenes with limited quantity of labeled images. Firstly, based on the SSL semantic segmentation framework, through the cross-consistency method training a teacher model with less annotated images and plentiful unannotated images, then generating higher-quality pseudo labels to guide the learning process of the student model. Secondly, dense conditional random field and mask hole repair are used to patch and fill the flaw areas of pseudo-labels based on the pixel features of position, color, and texture, further improving the granularity and reliability of the student model training dataset. Additionally, to improve the accuracy of the model, we designed a strong data augmentation (SDA) method based on a stochastic cascaded strategy, which connects multiple augmentation techniques in random order and probability cascade to generate new training samples. It mimics a variety of image transformations and noise conditions that occur in the real world to enhance the robustness in complex scenarios. To validate the effectiveness of CGSNet in complex remote sensing scenes, extended experiments are conducted on the self-built plateau lake RSI dataset and two public multi-category RSI datasets. The experiment results demonstrate that, compared with other state-of-the-art SSL methods, the proposed CGSNet achieves the highest 77.47% mIoU and 87.06% F1 scores with a limited quantity of annotated data.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"230 ","pages":"Article 103974"},"PeriodicalIF":7.7,"publicationDate":"2024-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141840326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Skin lesion classification using modified deep and multi-directional invariant handcrafted features 利用改进的深度和多向不变手工特征进行皮肤病变分类
IF 7.7 2区 计算机科学
Journal of Network and Computer Applications Pub Date : 2024-07-14 DOI: 10.1016/j.jnca.2024.103949
Jitesh Pradhan , Ashish Singh , Abhinav Kumar , Muhammad Khurram Khan
{"title":"Skin lesion classification using modified deep and multi-directional invariant handcrafted features","authors":"Jitesh Pradhan ,&nbsp;Ashish Singh ,&nbsp;Abhinav Kumar ,&nbsp;Muhammad Khurram Khan","doi":"10.1016/j.jnca.2024.103949","DOIUrl":"10.1016/j.jnca.2024.103949","url":null,"abstract":"<div><p>Skin lesions encompass various skin conditions, including cancerous growths resulting from uncontrolled proliferation of skin cells. Globally, this disease affects a significant portion of the population, with millions of fatalities recorded. Over the past three decades, there has been a concerning escalation in diagnosed cases of skin cancer. Early detection is crucial for effective treatment, as late diagnosis significantly heightens mortality risk. Existing research often focuses on either handcrafted or deep features, neglecting the diverse textural and structural properties inherent in skin lesion images. Additionally, reliance on a single optimizer in CNN-based schemes poses efficiency challenges. To tackle these issues, this paper presents two novel approaches for classifying skin lesions in dermoscopic images to assess cancer severity. The first approach enhances classification accuracy by leveraging a modified VGG-16 network and employing both RMSProp and Adam optimizers. The second approach introduces a Hybrid CNN Model, integrating deep features from the modified VGG-16 network with handcrafted color and multi-directional texture features. Color features are extracted using a non-uniform cumulative probability-based histogram method, while texture features are derived from a 45<span><math><msup><mrow></mrow><mrow><mo>∘</mo></mrow></msup></math></span> rotated complex wavelet filter-based dual-tree complex wavelet transform. The amalgamated features facilitate accurate prediction of skin lesion classes. Evaluation on ISIC 2017 skin cancer classification challenge images demonstrates significant performance enhancements over existing techniques.</p></div>","PeriodicalId":54784,"journal":{"name":"Journal of Network and Computer Applications","volume":"231 ","pages":"Article 103949"},"PeriodicalIF":7.7,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141689712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信