service component
Recently Published Documents


TOTAL DOCUMENTS

176
(FIVE YEARS 21)

H-INDEX

13
(FIVE YEARS 0)

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Ming Chen ◽  
Junqiang Cheng ◽  
Guanghua Ma ◽  
Liang Tian ◽  
Xiaohong Li ◽  
...  

Due to the lack of domain and interface knowledge, it is difficult for users to create suitable service processes according to their needs. Thus, the paper puts forward a new service composition recommendation method. The method is composed of two steps: the first step is service component recommendation based on recurrent neural network (RNN). When a user selects a service component, the RNN algorithm is exploited to recommend other matched services to the user, aiding the completion of a service composition. The second step is service composition recommendation based on Naive Bayes. When the user completes a service composition, considering the diversity of user interests, the Bayesian classifier is used to model their interests, and other service compositions that satisfy the user interests are recommended to the user. Experiments show that the proposed method can accurately recommend relevant service components and service compositions to users.


2021 ◽  
Vol 4 (2(112)) ◽  
pp. 6-17
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Dmitriy Barannik ◽  
Sergii Shulgin ◽  
Valeriy Barannik ◽  
...  

Along with the widespread use of digital images, an urgent scientific and applied issue arose regarding the need to reduce the volume of video information provided it is confidential and reliable. To resolve this issue, cryptocompression coding methods could be used. However, there is no method that summarizes all processing steps. This paper reports the development of a conceptual method for the cryptocompression coding of images on a differentiated basis without loss of information quality. It involves a three-stage technology for the generation of cryptocompression codograms. The first two cascades provide for the generation of code structures for information components while ensuring their confidentiality and key elements as a service component. On the third cascade of processing, it is proposed to manage the confidentiality of the service component. The code values for the information components of nondeterministic length are derived out on the basis of a non-deterministic number of elements of the source video data in a reduced dynamic range. The generation of service data is proposed to be organized in blocks of initial images with a dimension of 16×16 elements. The method ensures a decrease in the volume of source images during the generation of cryptocompression codograms, by 1.14–1.58 times (12–37 %), depending on the degree of their saturation. This is 12.7‒23.4 % better than TIFF technology and is 9.6‒17.9 % better than PNG technology. The volume of the service component of cryptocompression codograms is 1.563 % of the volume of the source video data or no more than 2.5 % of the total code stream. That reduces the amount of data for encryption by up to 40 times compared to TIFF and PNG technologies. The devised method does not introduce errors into the data in the coding process and refers to methods without loss of information quality.


2021 ◽  
Vol 2005 (1) ◽  
pp. 012022
Author(s):  
Li WenQinq ◽  
Xu Chenguan ◽  
Rao Yao ◽  
Zhu Liangliang ◽  
Yi Yongxian

2021 ◽  
Vol 3 (9(111)) ◽  
pp. 103-115
Author(s):  
Vladimir Barannik ◽  
Serhii Sidchenko ◽  
Natalia Barannik ◽  
Valeriy Barannik

The demand for image confidentiality is constantly growing. At the same time, ensuring the confidentiality of video information must be organized subject to ensuring its reliability with a given time delay in processing and transmission. Methods of cryptocompression representation of images can be used to solve this problem. They are designed to simultaneously provide compression and protection of video information. The service component is used as the key of the cryptocompression transformation. However, it has a significant volume. It is 25 % of the original video data volume. A method for coding systems of service components in a differentiated basis on the second cascade of cryptocompression representation of images has been developed. The method is based on the developed scheme of data linearization from three-dimensional coordinates of representation in a two-dimensional matrix into a one-dimensional coordinate for one-to-one representation of this element in a vector. Linearization is organized horizontally line by line. On the basis of the developed method, a non-deterministic number of code values of information components is formed. They have non-deterministic lengths and are formed on a non-deterministic number of elements. The uncertainty of positioning of cryptocompression codograms in the general code stream is provided, which virtually eliminates the possibility of their unauthorized decryption. The method provides a reduction in the volume of the service component of the cryptocompression codogram. The service data volume is 6.25 % of the original video data volume. The method provides an additional reduction in the volume of cryptocompression representation of images without loss of information quality relative to the original video data on average from 1.08 to 1.54 times, depending on the degree of their saturation


Author(s):  
Володимир Вікторович Бараннік ◽  
Сергій Олександрович Сідченко ◽  
Наталія Вячеславівна Бараннік ◽  
Андрій Михайлович Хіменко

The demand for video privacy is constantly increasing. Simultaneously, it is necessary to solve an urgent scientific and applied problem, which consists in increasing the confidentiality of video information under conditions of a given time delay for its processing and delivery, while ensuring its reliability. The crypto compression transformations can be used to solve it. A service component is used as a conversion key, which is directly formed in the conversion process and contains information about the identified structural characteristics of the video data. Therefore, such information requires confidentiality. The existing methods of cryptography are designed to process a universal data stream and do not consider the structure and features of service components. It leads to the formation of redundant data, the use of an excessive number of operations, and an increase in processing time in the process of protecting service information using universal cryptography methods. Therefore, the article aims to develop a method for masking service data compression to ensure their confidentiality, considering the peculiarities of their formation by crypto compression methods. In modes with controlled loss of information quality, the elements of the service component are formed in a reduced dynamic range. Their length is 7 bits. To ensure the confidentiality of such elements, it is necessary to develop a method for masking overhead compression in video compression systems. On the one hand, overhead blocks should not contain redundant information. On the other hand, they must be formed from bit positions from different elements of the service components. On the other hand, they should be formed from bit positions from different elements of the service components. For that, it is proposed to organize the assembly of the elements of the service components. It is organized by combining 7-bit elements of service components into 8-bit complete sequences. Encryption blocks are formed from 8-bit sequences. The assembly of service components ensures the mixing of service data and reducing their quantity. To violate the structure of the representation of service components, it is proposed to additionally organize the permutation of 8-bit completed sequences. It provides a significant dispersion of the bit positions of the 7-bit overhead elements and the destruction of the correlation between the overhead elements. The correlation coefficients of the original and reconstructed images using encrypted service components are in the region of 0. The number of changing pixels is above the theoretical threshold value of 99.5341%.


2021 ◽  
Vol 2 (3) ◽  
pp. 277-284
Author(s):  
Indri Indri ◽  
Usman Abu Bakar ◽  
Abdul Matin bin Salman

This paper finds and explains the side of the discussion of religion in government regulation no. 111/2014. The results show that there is no vacancy in the discussion of religion in this regulation. One of the functions of guidance and counseling services is understanding, which is to help counselees have a better understanding of themselves and their environment (education, work, culture, and religious norms). In its application, guidance and counseling services in educational units as a whole are packaged into four service components, one of which is the basic service component, where the main objective is an effort to help counselees have awareness (understanding) of themselves and their environment (education, work, social culture, and religion). While the concept of communication guidance and counseling services that religion is a fixed(intended)and services that are not fixed (unintended), which subsequently gave birth to concepts counseling humanism.


2021 ◽  
Vol 14 (2) ◽  
pp. 201
Author(s):  
Yuan Ho ◽  
Kui Liu ◽  
Yaqiang Wang ◽  
Hongping Shu ◽  
Xiao Yang ◽  
...  
Keyword(s):  

2021 ◽  
Vol 14 (2) ◽  
pp. 201
Author(s):  
Xiao Yang ◽  
Hong Xu ◽  
Hongping Shu ◽  
Yaqiang Wang ◽  
Kui Liu ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document