213 research outputs found

    Securing Text Messages Using Graph Theory and Steganography

    Get PDF
    تامين البيانات يعتبر كعنصر مهم في انظمة لاتصالات وتناقل البيانات. ويكمن دوره الرئيسي في الحفاظ على المعلومات الحساسة بأمان وبشكل متكامل من المرسل إلى المتلقي ، وهناك نوعان من مبادئ الامنية هما التشفير وإخفاء المعلومات ، الأول يعمل على تغيير مظهر المعلومات ويغير من هيئتها في حين أن الثاني يخفيها من الدخلاء. النظام المصمم يقترح طريقة جديدة للتشفير باستخدام خصائص نظرية البيانات ؛ يعطي مفتاحًا تم إنشاؤه بتحويل كلمة السر الى مخطط (graph) من نوع متكامل  complete  ثم نستخرج مصفوفة التجاور adjacency matrix  للمخطط ونستخدمها كمفتاح نهائي لتشفير النص  وذلك باستخدام عملية الضرب (ضرب المصفوفات) للحصول على النص المشفر بعدها يتم استخدام طريقة البت الاقل اهمية Least Significant Bit LSB   لإخفاء الرسالة المشفرة في صورة ملونة في المكون الاخضر G من مكوناتها. وكذلك تم توظيف معادلة تحليل PSNR والتي اثبتت كفاءة النظام في اخفاء الرسالة باقل تشويش ممكن بحوالي (97-85)  dB لصورة الغلاف قبل وبعد عملية الاخفاء و MSE تتراوح بين  (4.537e-05 -5.27546e-04) و  SSIM=1.0.       Data security is an important component of data communication and transmission systems. Its main role is to keep sensitive information safe and integrated from the sender to the receiver. The proposed system aims to secure text messages through two security principles encryption and steganography. The system produced a novel method for encryption using graph theory properties; it formed a graph from a password to generate an encryption key as a weight matrix of that graph and invested the Least Significant Bit (LSB) method for hiding the encrypted message in a colored image within a green component. Practical experiments of (perceptibility, capacity, and robustness) were calculated using similarity measures like PSNR, MSE, and SSIM. These measures had proved the efficiency of the system for image quality and hiding messages with PSNR ratio more than 85 dB, MSE ranged (4.537e-05  to 5.27546e-04) and SSIM=1.0 for using a cover file with size ranged from 256×300 to 1200×760 pixels and message ranged from 16 to 300 characters.

    Interactions between financial and environmental networks in OECD countries

    Get PDF
    We analyse a multiplex of networks between OECD countries during the decade 2002-2010, which consists of five financial layers, given by foreign direct investment, equity securities, short-term, long-term and total debt securities, and five environmental layers, given by emissions of N O x, P M 10 SO 2, CO 2 equivalent and the water footprint associated with international trade. We present a new measure of cross-layer correlations between flows in different layers based on reciprocity. For the assessment of results, we implement a null model for this measure based on the exponential random graph theory. We find that short-term financial flows are more correlated with environmental flows than long-term investments. Moreover, the correlations between reverse financial and environmental flows (i.e. flows of different layers going in opposite directions) are generally stronger than correlations between synergic flows (flows going in the same direction). This suggests a trade-off between financial and environmental layers, where, more financialised countries display higher correlations between outgoing financial flows and incoming environmental flows from lower financialised countries, which could have important policy implications. Five countries are identified as hubs in this finance-environment multiplex: The United States, France, Germany, Belgium-Luxembourg and the United Kingdom.Comment: Supplementary Information provide

    DCM: D Number Extended Cognitive Map. Application on Location Selection in SCM

    Get PDF
    Offshore outsourcing is a widely used management technique for performing business functions with the aim of reducing labor and transportation costs. The selection of locations has a significant influence on the supply chain’s resilience and qualities, but the influence of multiple external factors on the supply chain’s performance in local places in a complex and uncertain environment has not been examined. In this study, we investigated the influence of external factors in a highly uncertain and complicated situation in which relationships between external factors and supply chain resilience are complicated. Furthermore, we proposed a novel model to select locations from a comprehensive perspective. Specifically, the fuzzy cognitive map (FCM) is utilized to simulate the dynamic influence process where the adjacency is aggregated by D numbers. The weights of different resilience capabilities are considered from the perspective of maximizing benefits by using the decision-making trial and evaluation laboratory-analytic network processes (DEMATEL-ANP) model. By comparing the distance to the ideal solutions, we selected the best alternative location. Our results differ from the general case, which reveals that the weights of different capabilities influence selections

    Graph-embedding Enhanced Attention Adversarial Autoencoder

    Get PDF
    When dealing with the graph data in real problems, only part of the nodes in the graph are labeled and the rest are not. A core problem is how to use this information to extend the labeling so that all nodes are assigned a label (or labels). Intuitively we can learn the patterns (or extract some representations) from those labeled nodes and then apply the patterns to determine the membership for those unknown nodes. A majority of previous related studies focus on extracting the local information representations and may suffer from lack of additional constraints which are necessary for improving the robustness of representation. In this work, we presented Graph- embedding enhanced attention Adversarial Autoencoder Networks (Great AAN), a new scalable generalized framework for graph-structured data representation learning and node classification. In our framework, we firstly introduce the attention layers and provide insights on the self-attention mechanism with multi-heads. Moreover, the shortest path length between nodes is incorporated into the self-attention mechanism to enhance the embedding of the node’s structural spatial information. Then a generative adversarial autoencoder is proposed to encode both global and local information and enhance the robustness of the embedded data distribution. Due to the scalability of our approach, it has efficient and various applications, including node classification, a recommendation system, and graph link prediction. We applied this Great AAN on multiple datasets (including PPI, Cora, Citeseer, Pubmed and Alipay) from social science and biomedical science. The experimental results demonstrated that our new framework significantly outperforms several popular methods

    MGADN: A Multi-task Graph Anomaly Detection Network for Multivariate Time Series

    Full text link
    Anomaly detection of time series, especially multivariate time series(time series with multiple sensors), has been focused on for several years. Though existing method has achieved great progress, there are several challenging problems to be solved. Firstly, existing method including neural network only concentrate on the relationship in terms of timestamp. To be exact, they only want to know how does the data in the past influence which in the future. However, one sensor sometimes intervenes in other sensor such as the speed of wind may cause decrease of temperature. Secondly, there exist two categories of model for time series anomaly detection: prediction model and reconstruction model. Prediction model is adept at learning timely representation while short of capability when faced with sparse anomaly. Conversely, reconstruction model is opposite. Therefore, how can we efficiently get the relationship both in terms of both timestamp and sensors becomes our main topic. Our approach uses GAT, which is originated from graph neural network, to obtain connection between sensors. And LSTM is used to obtain relationships timely. Our approach is also designed to be double headed to calculate both prediction loss and reconstruction loss via VAE(Variational Auto-Encoder). In order to take advantage of two sorts of model, multi-task optimization algorithm is used in this model

    Understanding Risk Perception Using Fuzzy Cognitive Maps

    Get PDF
    When making decision that can have far-researching effects, such as governmental policies or decisions on new technologies, decision-makers use their understanding of the risks that are associated with their choices to guide their decisions. Measuring how people perceive risks can be helpful for understanding and possibly improving the decision-making process. Building on a review of existing methods for investigating risk perceptions, this paper suggests Fuzzy Cognitive Maps (FCM) as a method for investigating differences in risk perception among stakeholders and stakeholder groups. The approach is illustrated with an example of wildfire risk perceptions. Results suggest that FCM can contribute to risk perception studies and provide means to improve Communications between different stakeholder groups and their involvement in the decision-making process. © 2016 Portland International Conference on Management of Engineering and Technology, Inc
    corecore