Você está na página 1de 6

TECHNOLOGICAL INSTITUTE OF THE PHILIPPINES

QUEZON CITY
CTI003/ ITE503-CURRENT TRENDS AND ISSUES IN COMPUTING

Journal Synthesis
PRELIM
Student Name: JESSA MAE L. ABELARDE
Program: (BSIT)
Mr. Gerald Cayabyab
Section: IT33FB1
Adviser

Prelim Topics/Area of Research:

1. Cloud Computing
a. A Review on Contemporary Security Issues of Cloud Computing
2. Computer Vision/ Recognition
a. A new method based on computer vision for non-intrusive orange peel sorting
3. Expert Systems
a. Intelligent Agent based Expert System for Blended Learning Evaluation
4. Human Computer Interaction
a. Design of Human-Computer Interaction Control System Based on Hand-Gesture Recognition

5. Computer Security
a. Computer network security and defense technology research

Journal Synthesis:

The study entitled A Review on Contemporary Algorithm handles encrypted data and performs
Security Issues of Cloud Computing by Tejashri A. auditing without decrypting data. The algorithm performs
Pati (2017) Quantities of innovations are coming in the auditing over encrypted data. As data is not decrypted by
distributed computing condition, these give Internet-based auditors during auditing process, the proposed algorithm
administration and utilization of PC framework. Putting becomes more secure than an existing algorithm. Third
away data into the distributed storage offers assistance to party auditing process removes auditing overhead of data
clients since they don't need to think about the issues of owner.
equipment issues. Subsequently, clients are at the Security is the prime requirement because of the
enthusiasm of the cloud specialist organizations for the increasing usage of the internet. With the fast progression
accessibility and respectability of their information. From of remote data storage information security is becoming
one perspective, despite the fact that the cloud much more important in data storage and transmission.
administrations are significantly more capable and solid Security is needed for preserving the integrity,
than individualized computing gadgets and wide scope of confidentiality, availability of the information system
both inward and outside dangers for information resources. The cloud supplier gives a processing stage,
trustworthiness still exist Distributed computing offers instruments, and improvement condition with the goal
client to get to all applications from anyplace on the that the clients can fabricate, test, and send electronic
planet, liberating you from the confines of the desktop and applications. The client can't oversee or control the cloud
making it simpler for assemble individuals in various foundation yet can control the conveyed applications and
areas to work together. Cloud specialist organizations application facilitating condition configurations.
have joined to manufacture cloud conditions and give
administrations to the client. The cloud supplier gives the client handling offices,
storerooms, systems, and other central registering assets
The real problem with the paper presents a review of that the client can convey and run the arbitrary
the current security issues in cloud computing programming, which can incorporate working
environments like lack of control of data, lack of trust and frameworks and applications. The buyer may not be
multi-tenancy. Ensuring cloud data integrity is to be the required to oversee or control this cloud foundation,
big issue. To overcome unauthorized access to data users however, can control the capacity, working frameworks,
by Cloud Service Provider, integrity verification is done sent applications, and specific systems administration
through Trusted Third Party Auditor. The proposed parts. In cloud storage service, remote verification of data
integrity is a critical issue. The concept of public audit Qianqian Su, Zhangjie Fu, and Rong Hao. "Enabling
solves the remote verification of data integrity and public auditing for shared data in cloud storage supporting
extends to verify the shared data. Public auditing identity privacy and traceability." Journal of Systems and
requirements contain function, security, and performance Software 113 (2016): 130-139.
from the many relevant kinds of literature. From The study entitled A new method based on
comparison table, one can clearly understand the computer vision for non-intrusive orange peel sorting
advantages and disadvantages of each approach. Public by Juan Ignacio Arribas. (2017). Orange peel is used for
auditing schemes need to check data privacy, ensure data making jam and oil. For this purpose, orange samples
privacy, provide easy Retrievability and prevent from an with high peel thickness are best. In order to predict peel
unauthenticated user. thickness in orange fruit, we present a system based the
REFERENCES image features, comprising: area, eccentricity, perimeter,
length/area, a blue value, green value, red value, wide,
[1] Sookhak, Mehdi, Abdullah Gani, Muhammad contrast, texture, wide/area, wide/length, roughness, and
Khurram Khan, and Rajkumar Buyya. "Dynamic length.
remote data auditing for securing big data storage in cloud
computing." Information Sciences 380 (2017): 101-116. Orange peel is used to make jam and oil. Orange peel
can be thick or thin. Thus, oranges with higher peel
[2] Kim, Daeyeong, Hyunsoo Kwon, Changhee thickness potentially have more oil and jam inside. But
Hahn, and Junbeom Hur. "Privacy-preserving public how can one anticipate orange peel thickness non-
auditing for educational multimedia data in cloud intrusively? Peel fruit grading provides information about
computing." Multimedia Tools and Applications 75, no. its peel thickness. The use of machine vision techniques
21 (2016): 1307713091. for the examination of vegetables and fruits has increased
during the last decade. Nowadays, many producers
[3] Ateniese, Giuseppe, Roberto Di Pietro, Luigi V. around the world apply grading machines capable of pre-
Mancini, and Gene Tsudik. "Scalable and efficient grading fruits by mass, color, and size.
provable data possession." In Proceedings of the 4th
international conference on Security and privacy in A novel identification solution based on the hybrid of
communication networks, p. 9. ACM, 2008. particle swarm optimization (PSO), genetic algorithm
(GA) and artificial neural network (ANN) is proposed. In
[4] Shimbre, Nivedita, and Priya Deshpande. addition, principal component analysis (PCA) has been
"Enhancing Distributed Data Storage Security for Cloud applied to reduce the number of dimensions, optimization
Computing Using TPA and AES Algorithm." In technique has been applied to determine the optimal
Computing Communication Control and Automation setting for parameters of PSO, GA, and ANN. The
(ICCUBEA), 2015 International Conference on, pp. 35- optimal level of factors was: Number of Neuron in the
39. IEEE, 2015. first layer=7, Number of Neuron in the second layer=2,
Maximum Iteration=400, Crossover probability=0.7,
[5] Cao, Ning, Cong Wang, Ming Li, Kui Ren, and Mutation probability=0.1, and Swarm (Population)
Wenjing Lou. "Privacy-preserving multi-keyword ranked Size=200. Results for prediction of orange peel thickness
search over encrypted cloud data." IEEE Transactions on based on levels that are achieved by Taguchi method were
parallel and distributed systems 25, no. 1 (2014): 222233. evaluated by five performance measures: the coefficient
of determination ( 2 R ), mean squared error (MSE),
[6] Lordemann, David, Daniel Robinson, and Paul mean absolute error (MAE), sum square error (SSE), and
Scheibe. "Method and system for establishing an audit root mean square error (RMSE), reaching values of
trail to protect objects distributed over a network." U.S. 0.8571, 0.0123, 0.0924, 1.392, and 0.1109, respectively.
Patent Application 09/952,696, filed September 14, 2001.
The result of the proposed Hybrid PSO-GA-ANN
[7] Yang, Kan, and Xiaohua Jia. "An efficient and system parameters tuning Taguchi method was used in
secure dynamic auditing protocol for data storage in cloud order to statistically calibrate the parameters in the
computing." IEEE transactions on parallel and distributed algorithm. We implement these experiments under
systems 24, no. 9 (2013): 1717-1726. MatLab (ver. R2014a) and run on a PC with 2.27GHz
Intel(R) Core(TM) i3 CPU and 4 GB of RAM memory.
[8] Li, Ling, Lin Xu, Jing Li, and Changchun Zhang. Considered an orthogonal array with six factors and three
"Study on the third-party audit in cloud storage service." levels in Taguchi method is 27 L. The orthogonal array
In Cloud and Service Computing (CSC), 2011 27L and results of the experiment as the mean square
International Conference on, pp. 220-227. IEEE, 2011. errors (MSE) are presented in Table II. The relative
percentage deviation (RPD) is used as a common
[9] Yu, Yong, Lei Niu, Guomin Yang, Yi Mu, and performance measure to parameter setting; 100 sol sol sol
Willy Susilo. "On the security of auditing mechanisms for Algorithm Min RPD Min u (3)
secure cloud storage." Future Generation Computer
Systems, 30 (2014): 127-132. Where sol Algorithm results for a given algorithm and
sol Min is the minimum result for all experiments, [9].
[10] Yang, Guangyang, Jia Yu, Wenting Shen, Results for each level are shown in Fig. 8 and 9. Fig.9
shows the mean S/N ratio for each level of the factors. System for Blended Learning Evaluation by Maria
The optimal level of factors A, B, C, D, E, and F become Viorela Muntean (2017). Nowadays there are a great
3, 1, 2, 1, 1, and 3 respectively, being Number of Neuron number of applications based on expert systems
in first layer(A)=7, Number of Neuron in second implementing the expertise of a human academic
layer(B)=2, Maximum Iteration(C)=400, Crossover evaluator. Many of them refer to the self-evaluation of
probability(D)=0.7, Mutation probability(E)=0.1, and students` academic performance. The actual research
Swarm (Population) Size(F)=200. targets the evaluation of academic courses from the
blended learning point of view. In this work, we present
REFERENCES the design and implementation of an Intelligent Agent-
based Expert System that uses a set of rules in order to
[1] A. Adelkhani, B. Beheshti, S. Minaei, P. Javadikia, decide if a course respects or not the blended learning
and M. GhasemiVarnamkhasti, "Taste characterization of strategies from students' perspective. A conclusion that the
orange using image processing combined with ANFIS," proposed application is suitable for course quality
Measurement, vol. 46, pp. 3573±3580, 2013. evaluation is finally made.

[2] J. Blasco, N. Aleixos, and E. Molto, "Machine As concerning quality management in higher
Vision System for Automatic Quality Grading of Fruit," education, there are a lot of studies regarding relationships
Biosystems Engineering, vol. 85 (4), pp. 415atio, 2003. between students' knowledge level and learning methods
and strategies. Most of them target evaluation of students
[3] F.H. Fan, Q. Ma, J. Ge, Q.Y. Peng, W.W. Riley, in order to improve learning processes.
and S.Z. Tang, "Prediction of texture characteristics from
extrusion food surface images using a computer vision A multi-agent system and a competency-based
system and artificial neural networks," Journal Food ontology are proposed in order to identify the student's
Engineering, vol. 118, pp. 426±43, 2013. doubts and to direct them to the community members of a
Virtual Learning Environment. These members are
[4] G.A. Leiva-Valenzuela, R. Lu, and J.M. Aguilera, selected according to their profile in order to find the
"Prediction of firmness and the soluble solids content of persons that have the best skills and competencies to give
blueberries using hyperspectral reflectance imaging," the suitable answers. Use intelligent agents as e-assistants
Journal Food Eng., vol. 115, pp. 91±98, 2013. making the e-learning process to suit the need of the user
and to identify the user level of knowledge and the
[5] S. Liu, L. Xu, D. Li, Q. Li, Y. Jiang, H. Tai, and learning style.
L. Zeng, "Prediction of dissolved oxygen content in river
crab culture based on least squares support vector The result of the proposed multi-agent system that
regression optimized byimproved particle swarm evaluates courses in order to decide if contain or not
optimization," Computer and Electronics in Agriculture, blended learning strategies. The evaluation is performed
vol. 95, pp. 82±91, 2013. by a StudentAgent and the decisions and computations are
made by an ExpertSystemAgent. The last one contains a
6] J.S. Shin, W.S. Lee, and R. Ehsani, "Postharvest rule-based expert system that averages the scores given by
citrus mass and size estimation using a logistic students for all considered course components. This agent
classification model and a watershed algorithm," also decides if a course is a blended learning course by
Biosystems Engineering, vol. 113, pp.42-53, 2012. computing a final score and by comparing the obtained
result with a globally defined value. In the end,
[7] R. C. Gonzalez, R.E. Woods, S.L, and Eddins, StudentAgent will be notified regarding the course
Digital Image Processing Using MatLab. Prentice Hall, decision and the validity of the system and the viability of
2004. the solution are proved.
[8] S. K. Gauri, "Optimization of multi-response
dynamic systems using principal component analysis REFERENCES
PCA-based utility theory approach," International Journal
of Industrial Engineering, vol. 5, pp. 101-114, 2014. [1] Kotova, E. E., "Intellectual data analysis in the
educational process", IEEE International Conference on
[9] E. Shokrollahpour, M. Zandieh, B. Dorri, "A novel Soft Computing and Measurements (SCM), 2017 XX, 24-
imperialist competitive algorithm for bi-criteria 26 May 2017, Saint Petersburg, Russia, 2017.
scheduling of the assembly flow-shop problem," Int. [2] Kotova, E. E., "Application of intelligent agents
Journal Production Research, vol. 49, pp. 3087±3103, to control the process of blended learning in an
2011. educational environment", 2016 IEEE V Forum Strategic
Partnership of Universities and Enterprises of Hi-Tech
[10] S. Sabzi, P. Javadikia, H. Rabbani, and A. Branches (Science. Education. Innovations), 16-18
Adelkhani, "Mass modeling of Thompson orange with November 2016, St. Petersburg, Russia, 2016.
ANFIS and SPSS methods for using in machine vision," [3] Bremgartner, V., de Magalhães Netto, J. F.,
Measurement, vol. 46, pp. 3333±3341, 2013. "Improving collaborative learning by personalization in
Virtual Learning Environments using agents and
The study entitled Intelligent Agent-based Expert competency-based ontology", 2012 Frontiers in Education
Conference (FIE), 3-6 October 2012, Seattle, WA, USA, Interaction system based on gesture recognition, which
2012. built a gesture template by collecting and normalized the
[4] Mahdi, H., Attia, S., S., "MASCE: A Multi-Agent operator's gesture data. In order to make the gesture
System for Collaborative E-Learning", IEEE/ACS template classified accurately, this paper proposes an
International Conference on Computer Systems and improved PSO-SVM classification algorithm. Overcome
Applications 2008 (AICCSA 2008), 31 March-4 April the traditional PSO algorithm was easy to fall into the
2008, Doha, Qatar, 2008. local optimal problem. Through the Human-Computer
[5] Iantovics, B., Enăchescu, C., "Intelligent Complex Interaction system, the correct recognition and matching
Evolutionary Agent‐Based Systems", AIP Conference gesture data were used to control the sampling robot in
Proceedings, Volume 1117, 116, 2009, BICS 2008: real- time. It could be seen from the experimental results
Proceedings of the 1st International Conference on Bio‐ that the improved PSO-SVM classification algorithm to
Inspired Computational Methods Used for Solving the correct rate of recognition had been significantly
Difficult Problems: Development of Intelligent and improved, made the whole set of Human-Computer
Complex Systems, 5–7 November 2008, Tg. Mures Interaction system in the sampling robot real-time control
(Romania), 2008. more convenient and efficient, thus it reduced the number
[6] Kadar, M. Muntean, M., "Intelligent and of misuses effectively and improved the control accuracy.
Collaborative Multi-Agent System to Generate
Automated Negotiation for Sustainable Enterprise
Interoperability", Agent and Multi-Agent Systems:
Technologies and Applications, Series: Advances in
Intelligent Systems and Computing, vol. 296, Springer
International Publishing, pp. 213-222, 2014.
[7] Caire, G., JADE Protocols,
http://jade.tilab.com/documentation/examples/protocols/
[8] Bellifemine, F., Caire, G., Rimassa, G., Poggi, A.,
Bergenti, F., Trucco, T., Gotta, D., Cortese, E., Quarta, F.,
Vitaglione, G., JAVA Agent DEvelopment Framework,
http://jade.tilab.com/
[9] Friedman-Hill, E., JESS, the Rule Engine for the
Java Platform, Forgy, C., L., Rete algorithm,
https://herzberg.ca.sandia.gov/

The study entitled Design of Human-Computer


Interaction Control System Based on Hand-Gesture
Recognition by Wang Zhi-heng, Cao Jiang-tao (2017).
A gesture recognition based Human-Computer Interaction
control system is developed via LabVIEW in this paper.
Furthermore, to solve the existing problems of lower
precision and poor real-time ability in gesture recognition
algorithm, an improved PSO-SVM classification
algorithm for hand-gesture recognition is proposed.

The existing problems of lower precision and poor


real-time ability in gesture recognition algorithm. There REFERENCES
are some problems just like the complex and unknown
space operating environment when studying the sample of [1] Zheng Wei, Xu Hou Ze, Zhong Min, Liu Cheng
the extraterrestrial planet surface. Shu, Yuan Mei Juan. Progress in international lunar
exploration programs[J]. Progress In Geophysics, 2012,
To solve the existing problems improved PSO-SVM 27(6): 2296-2307
classification algorithm for hand-gesture recognition is [2] Sima Hangren. The Popularity of Mars
proposed. Firstly, the gesture sample data is collected by Exploration -- a glance at the famous Mars probe[J].
using five bending sensors of the data glove, then, in order Space Exploration, 2009, (4):45-47
to improve the recognized precision, the data collected is
preprocessed and the optimize the SVM kernel parameter [3] Sun Hongtao. Research on the Bionic Peck
value is found by using the improved PSO algorithm. Institutions and Structures Based on Woodpecker[D].
Finally, the recognized hand-gesture is divided into Shenyang: Northeastern University, 2015:16-17.
numbered 1-11 control status values, and sent to the
sample robot controller by wireless transmission module [4] K. Kumar, A. Jain, R. K. Aggarwal. A Hindi
and achieving the realization of sampling robot motion speech recognition system for connected words using
control. The simulation results illustrate the effectiveness HTK[J]. Int. J. Computational Systems Engineering,
of designed method on 2012, 1(1):25-32.
This paper designed a Human-Computer [5] Gao Longqin, Wang Aimin, Huang Weiyi, Dai
Jinqiao. Interactive Model of Human Hand Based on 18- [3] Li-Xiaobin; Li-Shuzhen.Threats to the computer
Sensor Data-Glove[J]. Chinese Journal Of Sensors and network and security [J]. Coal technology.(07)2011.
Actuators, 2007, 20(3):523-527
[4] Liu-Kaifeng. Application of computer network
[6] Liu Jinguo, Luo Yifan, Ju Zhaojie. An Interactive security and defense measures study [J]. Journal of
Astronaut-Robot System with Gesture Control[J]. electronic technology and software engineering. (08)2014.
Computational intelligence and neuroscience, 2016:1-11.
[5] Zhang-Ruping. Computer network security
The study entitled Computer network security and technology research [J]. China chain. (06)2014 .
defense technology research by Wang QingˈChen
Hongju (2015). The computer network in work and life [6] Zheng-Wei; Lv-Ke. Development status and
bring convenience for people at the same time, also future development trend of network security technology
inevitable has brought some safe hidden trouble. To bring [J]. Journal of network security technology and
the positive role of the efficient use of computer network, application. (01)2015 .
you need to effectively safeguard the security of computer
network information. This article mainly analyzes the
present situation of computer network security problems,
analyzes the main source of computer security threats, and
puts forward some effective network security defense
technology, to maximize the guarantee the safety of
computer network information to provide a reliable
guarantee.

Computer network security, can cause extensive


damage is a computer virus, a virus attack is highly
contagious, also has high concealment, its destructive
potential is worthy of attention. Once the computer is
virus invasion, will affect the normal operation of the
system, but in the case of the failure to remove it is
possible to make the computer system collapse, leading to
loss of data, and caused an estimated losses.

To solve the problems or errors need to use the


firewall is a computer of a fence, it can effectively protect
the computer and network security. The following figure 1
is a firewall structure diagram. On the physical and
logical, a firewall is an analyzer, to analyze the
information from the Internet is damaging or threatening;
Also can effectively limit on the network traffic, and will
not need separation and isolation of information.

The result of Firewall can effectively prepare


computer dynamic information between internal network
and external Internet monitoring, effectively ensure the
security of computer information. Security vulnerability
defense is according to different application software and
adopted a defense technology, there are two main ways.
First, is the operating system and application software
installed, download the official patches, for timely update
and maintenance; The second is to give full play to the
role of the tools and professional tools, according to
different network connection port scanning, to ensure the
safety of computer network system.

REFERENCES

[1] Xiao-Qun. Computer network security and


maintenance is analyzed [J]. Silicon Valley.(12) 2011.
[2] Xu-Xiaochen; Tang-Shumei. Network information
processing and security of computer application [J].
Silicon Valley. (13) 2011.

Você também pode gostar