Vehicular ad hoc networks verification scheme based on bilinear pairings and networks reverse fuzzy extraction
Zaid Ameen Abduljabbar, Vincent Omollo Nyangaresi, Ahmed Ali Ahmed
et al.
Abstract Vehicular Ad-Hoc Networks (VANETs) have facilitated the massive exchange of real-time traffic and weather conditions, which have helped prevent collisions, reduce accidents, and road congestions. This can effectively enhance driving safety and efficiency in technology-driven transportation systems. However, the transmission of massive and sensitive information across public wireless communication channels exposes the transmitted data to a myriad of privacy as well as security threats. Although past researches has developed many vehicular ad-hoc networks security preservation schemes, several of them are inefficient or susceptible to attacks. This work, introduces an approach that leverages reverse fuzzy extraction, bilinear pairing, and Physically Unclonable Function (PUF) to design an efficient and anonymity-preserving authentication scheme. We conduct an elaborate formal security analysis to demonstrate that the derived session key is secure. The semantic security analyses also demonstrate its resilience against typical VANET attacks such as impersonations, denial of service, and de-synchronization, instilling confidence in its effectiveness. Moreover, our approach incurs the lowest computational overheads at relatively low communication costs. Specifically, our protocol attains a 66.696% reduction in computation costs, and a 70% increment in the supported security functionalities.
Research on Personalized Recommendation Algorithm Integrating Cross-Grained Sentiment and Rating Interaction Features
Bing Li, Jiangtao Dong, Xile Wang
et al.
To investigate the impact of cross-grained sentiments on user feature representation and address the issue of data sparsity, this paper proposes a Personalized Recommendation Algorithm Integrating Cross-Grained Sentiment and Rating Interaction Features (ICSR). The algorithm begins by employing a pre-trained BERT (Bidirectional Encoder Representations from Transformers) model and a Bi-GRU (Bidirectional Gated Recurrent Units) network to derive feature vectors from user and item reviews. Sentiment dictionaries and attention mechanisms are then applied to assign appropriate weights to the review features of users and items, respectively. To capture a richer set of sentiment features, a cross-grained sentiment feature fusion module is introduced. This module leverages an LDA (Latent Dirichlet Allocation) model and dependency syntactic analysis techniques to extract fine-grained sentiment features, while a word2vec pre-trained model and sentiment dictionaries are used to capture coarse-grained sentiment features. These features are then fused to form comprehensive cross-grained sentiment representations. Finally, rating interaction features are extracted using matrix factorization techniques, and all features are integrated and fed into a DeepFM model for rating prediction. Experimental results on Amazon datasets demonstrate that the proposed ICSR algorithm significantly outperforms baseline algorithms in terms of recommendation performance.
Electrical engineering. Electronics. Nuclear engineering
Explainable and perturbation-resilient model for cyber-threat detection in industrial control systems Networks
Urslla Uchechi Izuazu, Cosmas Ifeanyi Nwakanma, Dong-Seong Kim
et al.
Abstract Deep learning-based intrusion detection systems (DL-IDS) have proven effective in detecting cyber threats. However, their vulnerability to adversarial attacks and environmental noise, particularly in industrial settings, limits practical application. Current IDS models often assume ideal conditions, overlooking noise and adversarial manipulations, leading to degraded performance when deployed in real-world environments. Additionally, the black-box nature of DL model complicates decision-making, especially in industrial control systems (ICS) network, where understanding model behavior is crucial. This paper introduces the eXplainable Cyber-Threat Detection Framework (XC-TDF), a novel solution designed to overcome these challenges. XC-TDF enhances robustness against noise and adversarial attacks using regularization and adversarial training respectively, and also improves transparency through an eXplainable Artificial Intelligence (XAI) module. Simulation results demonstrate its effectiveness, showing resilience to perturbation by achieving commendable accuracy of 100% and 99.4% on the Wustl-IIoT2021 and Edge-IIoT datasets, respectively.
Computer engineering. Computer hardware, Computer software
SOQCS: A Stochastic Optical Quantum Circuit Simulator
Javier Osca, Jiri Vala
Stochastic Optical Quantum Circuit Simulator (SOQCS) is a C++ and Python library which offers a framework to define, simulate and study quantum linear optical circuits in presence of various imperfections typically encountered in experiments. Quantum circuits can be defined from basic components, including emitters, linear optical elements, delays and detectors. The imperfections come from partial distinguishability of photons, lossy propagation media, unbalanced beamsplitters and non-ideal emitters and detectors for example. SOQCS also provides various simulator cores and tools to analyze the output. Furthermore, the configuration of detectors also includes postselection. SOQCS is developed using a modular approach in which different modules are applied in an automated easy to use manner. Furthermore, the modular approach allows for further extensions of the SOQCS capabilities in future.
Review of Public Opinion Dynamics Models
LIU Shuxian, XU Huan, WANG Wei, DENG Le
Social network provides a medium for information dissemination,leading to the rapid development of public opinion.Controlling the development direction of public opinion is one of the core issues of public opinion dynamics.However,the public opinion dynamics model mainly studies the way of updating the opinions of the subject so as to deduce the law of public opinion evolution.This paper classifies the current public opinion dynamics models,analyzes their advantages and disadvantages,and their applications in different fields,and summarizes the future research direction of public opinion dynamics.It is helpful to understand the law of the evolution of public opinion,so as to provide better guidance for the government and other institutions to control the direction of public opinion.
Computer software, Technology (General)
Existence of Solutions: Investigating Fredholm Integral Equations via a Fixed-Point Theorem
Faruk Özger, Merve Temizer Ersoy, Zeynep Ödemiş Özger
Integral equations, which are defined as “the equation containing an unknown function under the integral sign”, have many applications of real-world problems. The second type of Fredholm integral equations is generally used in radiation transfer theory, kinetic theory of gases, and neutron transfer theory. A special case of these equations, known as the quadratic Chandrasekhar integral equation, given by <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>x</mi><mrow><mo>(</mo><mi>s</mi><mo>)</mo></mrow><mo>=</mo><mn>1</mn><mo>+</mo><mi>λ</mi><mi>x</mi><mrow><mo>(</mo><mi>s</mi><mo>)</mo></mrow><msubsup><mo>∫</mo><mrow><mn>0</mn></mrow><mn>1</mn></msubsup><mfrac><mi>s</mi><mrow><mi>t</mi><mo>+</mo><mi>s</mi></mrow></mfrac><mi>x</mi><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow><mi>d</mi><mi>t</mi><mo>,</mo></mrow></semantics></math></inline-formula> can be very often encountered in many applications, where <i>x</i> is the function to be determined, <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi>λ</mi></semantics></math></inline-formula> is a parameter, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>t</mi><mo>,</mo><mi>s</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></mrow></semantics></math></inline-formula>. In this paper, using a fixed-point theorem, the existence conditions for the solution of Fredholm integral equations of the form <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>χ</mi><mrow><mo>(</mo><mi>l</mi><mo>)</mo></mrow><mo>=</mo><mi>ϱ</mi><mrow><mo>(</mo><mi>l</mi><mo>)</mo></mrow><mo>+</mo><mi>χ</mi><mrow><mo>(</mo><mi>l</mi><mo>)</mo></mrow><msubsup><mo>∫</mo><mrow><mi>p</mi></mrow><mi>q</mi></msubsup><mi>k</mi><mrow><mo>(</mo><mi>l</mi><mo>,</mo><mi>z</mi><mo>)</mo></mrow><mrow><mo>(</mo><mi>V</mi><mi>χ</mi><mo>)</mo></mrow><mrow><mo>(</mo><mi>z</mi><mo>)</mo></mrow><mi>d</mi><mi>z</mi></mrow></semantics></math></inline-formula> are investigated in the space <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><msub><mi>C</mi><mi>ω</mi></msub><mfenced separators="" open="[" close="]"><mi>p</mi><mo>,</mo><mi>q</mi></mfenced><mo>,</mo></mrow></semantics></math></inline-formula> where <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mi>χ</mi></semantics></math></inline-formula> is the unknown function to be determined, <i>V</i> is a given operator, and <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mi>ϱ</mi><mo>,</mo><mspace width="3.33333pt"></mspace><mspace width="3.33333pt"></mspace><mi>k</mi></mrow></semantics></math></inline-formula> are two given functions. Moreover, certain important applications demonstrating the applicability of the existence theorem presented in this paper are provided.
Implementation of Synology NAS-Based Storage System Type DS220+ at LSP-SV IPB
Widodo Bayu, Dewi Renanti Medhanita, Indriasari Sofiyanti
et al.
As the digital world evolves, safeguarding digital assets becomes crucial for organizations, particularly educational institutions. LSP SV-IPB, as a vocational certification body, manages student data, academic records, and other valuable information. Therefore, it is essential to implement an effective protection strategy. The research aims to develop and implement digital asset protection strategies at the LSP SV-IPB. The protection focuses on data storage management so that passive data is properly stored as the main backup and transactional data runs efficiently. The Synology Network Attached Storage (NAS) was proposed as the development model. NAS has proven efficient in managing data and providing reliable backups. Through NAS, passive data can be properly archived and protected, while transactional data can be accessed and processed at optimal speed. Hence, literature studies, software analysis, and experiments on the network environment were conducted. Model development was conducted using the design and implementation of NAS infrastructure at the LSP SV-IPB. Data collection covered the effective and efficient use of NAS in maintaining data integrity and mitigating the risk of losing important information. The results of this study are expected to contribute to the development of an efficient and reliable digital asset protection strategy within the LSP SV-IPB environment.
Research on recognizing required items based on opencv and machine learning
Ma Qingyun, Huang Xubin
Starting from the background of the outbreak of New Coronavirus, in order to realize the function of automatically identifying the required items by machine, the support vector machine algorithm in the neural network and the traditional computer vision algorithm opencv were used. The software developed by pycharm and python programming language was used to compile automatically a software to identify whether the required items were filled out. And on the basis of completing the software, it is connected to the embedded device high-speed clapper. It is applied to Fuzhou Customs to help the customs staff review the health form and declaration card of inbound and outbound passengers, which not only saves the time of staff and passengers, but also contributes to the prevention and control of epidemic situation to a certain extent.
Group-Strategy-Proof Virtual Traffic Light under V2V Environment
SONG Wei, ZHAO Huifen, CAI Wenqin, ZHOU Wanqiang
The Virtual Traffic Light (VTL) in a Vehicle-to-Vehicle (V2V) environment can negotiate the right-of-way allocation through the information directly exchanged between vehicles.When the equipment obtains relevant information, the vehicle can strategically provide information to obtain the priority right of way.To apply to a scene where unmeasurable factors affect the right of way, a virtual traffic light with group strategy protection characteristics is proposed.By abstracting the real information provided by vehicles into a cost allocation and cooperative game, a group strategy protection auction mechanism is designed, and the Shapley value is used to calculate the cost allocation of each vehicle as the payment of vehicles.On this basis, the green light signal is established according to the real evaluation value in the auction results, and the green light signal generated by multiple auctions is integrated through the signal merging algorithm to produce a reasonable right-of-way allocation.The experimental results show that the virtual traffic light has the characteristics of group strategy protection, which can prevent vehicles from forming an alliance of false information to obtain benefits and can also prevent vehicles from obtaining the right-of-way priority through false information.Compared with the virtual traffic light with a fixed threshold of the number of green lights, the virtual traffic lights protected by the group strategy show some improvement in the overall average driving time and the average driving time of high-value vehicles.
Computer engineering. Computer hardware, Computer software
Survey of Hybrid Cloud Workflow Scheduling
LIU Peng, LIU Bo, ZHOU Na-qin, PENG Xin-yi, LIN Wei-wei
In the context of data explosion,traditional cloud computing is faced with the dilemma of insufficient local cloud resources and high expansion cost.However,the newly emerging hybrid cloud combining resource-rich public cloud and data-sensitive private cloud has become a research hotspot and application direction at present.As an attractive paradigm,workflow has been increasing in data scale and computing scale.Therefore,workflow scheduling is a key issue in the direction of hybrid cloud research.For this reason,this paper first makes an in-depth investigation and analysis of workflow scheduling technology in hybrid cloud environment,and then classifies and compares workflow scheduling in hybrid cloud environment:for deadline,for cost,for energy-efficient and for multi-objective constraints.On this basis,the future research directions of workflow scheduling in hybrid cloud environment are analyzed and summarized:workflow scheduling based on Serverless platform,workflow scheduling based on edge server network collaboration,cloud native workflow scheduling based on Argo integration,and workflow scheduling based on fog computing fusion.
Computer software, Technology (General)
<i>In-House</i> Innovative “Diamond Shaped” 3D Printed Microfluidic Devices for Lysozyme-Loaded Liposomes
Federica Sommonte, Edward Weaver, Essyrose Mathew
et al.
Nanotechnology applications have emerged as one of the most actively researched areas in recent years. As a result, substantial study into nanoparticulate lipidic systems and liposomes (LPs) has been conducted. Regardless of the advantages, various challenges involving traditional manufacturing processes have hampered their expansion. Here, the combination of microfluidic technology (MF) and 3D printing (3DP) digital light processing (DLP) was fruitfully investigated in the creation of novel, previously unexplored “diamond shaped” devices suitable for the production of LPs carrying lysozyme as model drug. Computer-aided design (CAD) software was used designing several MF devices with significantly multiple and diverse geometries. These were printed using a high-performance DLP 3DP, resulting in extremely high-resolution chips that were tested to optimize the experimental condition of MF-based LPs. Monodisperse narrow-sized lysozyme-loaded PEGylated LPs were produced using in-house devices. The developed formulations succumbed to stability tests to determine their consistency, and then an encapsulation efficacy (EE) study was performed, yielding good findings. The in vitro release study indicated that lysozyme-loaded LPs could release up to 93% of the encapsulated cargo within 72 h. Therefore, the proficiency of the association between MF and 3DP was demonstrated, revealing a potential growing synergy.
Pharmacy and materia medica
Face hallucination based on cluster consistent dictionary learning
Minqi Li, Xiangjian He, Kin‐Man Lam
et al.
Abstract Face hallucination is a super‐resolution technique specially designed to reconstruct high‐resolution faces from low‐resolution faces. Most state‐of‐the‐art algorithms leverage position‐patch prior knowledge of human faces to better super‐resolve face images. However, most of them assume the training face dataset is sufficiently large, well cropped or aligned. This paper, proposes a novel example‐based face hallucination method, based on cluster consistent dictionary learning with the assumption that human faces have similar facial structures. In this method, the paired face image patches are firstly labelled as face areas including eyes, nose, mouth and other parts, as well as non‐face areas without requiring the training face images cropped and aligned. Then, the training patches are clustered according their labels and textures. The cluster consistent dictionary is learned to represent the low‐resolution patches and the high‐resolution patches. Finally, the high‐resolution patches of the input low‐resolution face image can be efficiently generated by using the adjusted anchored neighbourhood regression. As utilizing the labelled facial parts prior knowledge, the proposed method represents more details in the reconstruction. Experimental results demonstrate that the authors' algorithm outperforms many state‐of‐the‐art techniques for face hallucination under different datasets.
Photography, Computer software
Scalable and High-Fidelity Quantum Random Access Memory in Spin-Photon Networks
K. C. Chen, W. Dai, C. Errando-Herranz
et al.
A quantum random access memory (qRAM) is considered an essential computing unit to enable polynomial speedups in quantum information processing. Proposed implementations include the use of neutral atoms and superconducting circuits to construct a binary tree but these systems still require demonstrations of the elementary components. Here, we propose a photonic-integrated-circuit (PIC) architecture integrated with solid-state memories as a viable platform for constructing a qRAM. We also present an alternative scheme based on quantum teleportation and extend it to the context of quantum networks. Both implementations realize the two key qRAM operations, (1) quantum state transfer and (2) quantum routing, with already demonstrated components: electro-optic modulators, a Mach-Zehnder interferometer (MZI) network, and nanocavities coupled to artificial atoms for spin-based memory writing and retrieval. Our approaches furthermore benefit from built-in error detection based on photon heralding. Detailed theoretical analysis of the qRAM efficiency and query fidelity shows that our proposal presents viable near-term designs for a general qRAM.
Physics, Computer software
Reliability Model Based Dynamic Multi-Level Trust Analysis
Li Zhang, Bin Zhang, Anqing Liu
et al.
Trust assessment is of great significance to related issues such as privacy protection and rumor transmission in online social networks. At present, there are mainly two types of trust models: discrete type and continuous, type. Little work has been done on considering distrust and trust at the same time, especially on the propagation mechanism of distrust. To this end, this paper proposes a multilevel trust model and a corresponding trust evaluation method based on a reliability model called multivalued decision diagrams (MDDs). The proposed trust model combines characteristics of both discrete and continuous trust and considers the dynamic changing mechanism of the multilevel trust. The propagation of distrust and conflicts of opinions are also handled. Experimental results show that the proposed method outperforms other existing methods.
Technology, Engineering (General). Civil engineering (General)
Préserver ses données de recherche
James Baker
Cette leçon donne des pistes aux historiens et aux historiennes pour documenter, structurer et pérenniser leurs données de recherche.
History (General), Computer software
SHIFAYAAB – Centralized Platform for Vaccination Program
Khizar Hayat, Mobeen Nazar, Taimoor Khalid
et al.
Vaccinations are very essential for the prevention of harmful diseases. However, the implementation rate of vaccination varies in different parts of the world. Many countries struggle to achieve the maximum immunization ratio due to their vaccination practices and methodologies. However, the authors have developed a solution to strengthen the vaccination procedure. SHIFAYAAB, Proposed Methodology in this paper provides a centralized platform for different healthcare organizations and hospitals, working on various vaccination programs. The idea is to collectively provide a centralized database for the vaccination programs by integrating the platform with the healthcare organizations and hospitals, to enhance and improve the vaccination procedure for the workers as well as the public. SHIFAYAAB proposes automation of the vaccination procedure by replacing the old school vaccine schedule card-reports with autonomous system[1]generated microplans. It will assemble the vaccination records and provide a user-friendly platform for the vaccinators to carry out the vaccination process. It will also provide children parents a platform to keep track of their vaccination progress by monitoring their microplan along with regular notification reminders from the platform.
Information technology, Computer software
COMPUTER-BASED ECG SIGNAL ANALYSIS AND MONITORING SYSTEM
Hadeel Kassim Al-Jobouri, Nasser N. Khamiss Al-Ani
This paper deals with the design and implementation of an ECG system. The proposed system gives a new concept of ECG signal manipulation, storing, and editing. It consists mainly of hardware circuits and the related software. The hardware includes the circuits of ECG signals capturing, and system interfaces. The software is written using Visual Basic languages, to perform the task of identification of the ECG signal. The main advantage of the system is to provide a reported ECG recording on a personal computer, so that it can be stored and processed at any time as required. This system was tested for different ECG signals, some of them are abnormal and the other is normal, and the results show that the system has a good quality of diagnosis identification.
Chemical engineering, Engineering (General). Civil engineering (General)
A Novel Depression Rehabilitation Game Framework Using VR Based on Neurofeedback
CAI Hanshu,WANG Ziyang,ZHANG Yanhao,CHEN Yunfei,HU Bi
At present,depression is treated with antidepressant drugs and assisted with psychotherapy and physical therapy,and these expensive and time-consuming treatment methods often end prematurely and result in a prolonged course without effective symptom relief.Therefore,based on the neurofeedback therapy,a novel depression rehabilitation method using a Virtual-Reality(VR) game framework is proposed.In this VR game framework,an innovative three-electrode Electroencephalography (EEG) collector is used to record patients’ EEG data.The data are processed and converted into feedback features,and the feedback will be displayed to patients in real time through a VR headset.Patients can adjust their psychological activity based on the feedback,and relieve their physiological dysfunction effectively.The framework also provides a data storage module,which may offer therapists ways to assess patients’ rehabilitation results in a long term,as well as provide possibility to continue towards better algorithm of feedback features with data-mining.The prototype system is tested in the framework,and the experimental results prove the effectiveness of the framework in depression rehabilitation.
Computer engineering. Computer hardware, Computer software
A Secure, Intelligent, and Smart-Sensing Approach for Industrial System Automation and Transmission over Unsecured Wireless Networks
Aamir Shahzad, Malrey Lee, Neal Naixue Xiong
et al.
In Industrial systems, Supervisory control and data acquisition (SCADA) system, the pseudo-transport layer of the distributed network protocol (DNP3) performs the functions of the transport layer and network layer of the open systems interconnection (OSI) model. This study used a simulation design of water pumping system, in-which the network nodes are directly and wirelessly connected with sensors, and are monitored by the main controller, as part of the wireless SCADA system. This study also intends to focus on the security issues inherent in the pseudo-transport layer of the DNP3 protocol. During disassembly and reassembling processes, the pseudo-transport layer keeps track of the bytes sequence. However, no mechanism is available that can verify the message or maintain the integrity of the bytes in the bytes received/transmitted from/to the data link layer or in the send/respond from the main controller/sensors. To properly and sequentially keep track of the bytes, a mechanism is required that can perform verification while bytes are received/transmitted from/to the lower layer of the DNP3 protocol or the send/respond to/from field sensors. For security and byte verification purposes, a mechanism needs to be proposed for the pseudo-transport layer, by employing cryptography algorithm. A dynamic choice security buffer (SB) is designed and employed during the security development. To achieve the desired goals of the proposed study, a pseudo-transport layer stack model is designed using the DNP3 protocol open library and the security is deployed and tested, without changing the original design.
Cooperation in the development of free software projects
Byron Cuesta Quintero, Jorge Andrick Parra Valencia
This article presents a set of elements for cooperation pertinent to free software projects and cooperation theories, based on recognizing how geographically distributed developers in the world find the motivation to create a community around free software and develop successful software. Success cases were also studied worldwide to show how the participants, through computer-mediated communication, resolve individual and group rationality conflicts using scenarios of trust and reciprocity on the use of common resources that allow cooperation for development and maintenance. of free software.
Engineering (General). Civil engineering (General)