首页 > 最新文献

International Journal of Advanced Trends in Computer Science and Engineering最新文献

英文 中文
Network Source Identification Mechanism for IoT Devices Using Machine Learning Techniques 使用机器学习技术的物联网设备网络源识别机制
Pub Date : 2023-12-07 DOI: 10.30534/ijatcse/2023/021262023
The rapid progress and evolution of the Internet of Things (IoT) have led to a significant increase in the occurrence of security gaps. Pinpointing the source of network traffic coming from IoT devices can be challenging, but doing so can reduce security risks. This study proposes a network traffic source identification mechanism that leverages machine learning (ML) techniques to accurately determine the source of network traffic. The study utilizes a diverse dataset obtained from a purpose-built IoT/IIoT testbed and employs feature extraction, model development, and evaluation techniques. By utilizing network traffic features, a range of classifiers, including LGBMClassifier (LGBM), CatBoostClassifier (CB), RandomForestClassifier (RF), ExtraTreesClassifier (ET), KneighborsClassifier (KNN), and DecisionTreeClassifier (DT), were trained and evaluated. The results demonstrate exceptional performance across the classifiers, with high accuracy, precision, recall, and F1 scores achieved in identifying the source of network traffic. Among the classifier models, LGBM achieved the best accuracy value of 0.99999857, precision value of 0.99999859, and F1 score of 0.999998803, with CB achieving the best recall of 0.999997875. Some of these results are novel, and others performed better than existing systems. The findings of this study contribute to source identification, ensure the accountability of IoT network users, and provide insights into developing better defenses against security threats in the IoT domain
物联网(IoT)的快速发展和演变导致安全漏洞的发生显著增加。准确定位来自物联网设备的网络流量来源可能具有挑战性,但这样做可以降低安全风险。本研究提出了一种利用机器学习(ML)技术准确确定网络流量来源的网络流量源识别机制。该研究利用了从专用物联网/工业物联网测试平台获得的多种数据集,并采用了特征提取、模型开发和评估技术。利用网络流量特征,训练和评估了LGBMClassifier (LGBM)、CatBoostClassifier (CB)、RandomForestClassifier (RF)、ExtraTreesClassifier (ET)、KneighborsClassifier (KNN)和decisiontreecclassifier (DT)等一系列分类器。结果显示了不同分类器的卓越性能,在识别网络流量来源方面具有很高的准确性、精密度、召回率和F1分数。在分类器模型中,LGBM的准确率值为0.99999857,精密度值为0.99999859,F1得分为0.999998803,CB的召回率为0.999997875。其中一些结果是新颖的,而另一些则比现有的系统表现得更好。本研究的结果有助于识别来源,确保物联网网络用户的问责制,并为开发更好的防御物联网领域的安全威胁提供见解
{"title":"Network Source Identification Mechanism for IoT Devices Using Machine Learning Techniques","authors":"","doi":"10.30534/ijatcse/2023/021262023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/021262023","url":null,"abstract":"The rapid progress and evolution of the Internet of Things (IoT) have led to a significant increase in the occurrence of security gaps. Pinpointing the source of network traffic coming from IoT devices can be challenging, but doing so can reduce security risks. This study proposes a network traffic source identification mechanism that leverages machine learning (ML) techniques to accurately determine the source of network traffic. The study utilizes a diverse dataset obtained from a purpose-built IoT/IIoT testbed and employs feature extraction, model development, and evaluation techniques. By utilizing network traffic features, a range of classifiers, including LGBMClassifier (LGBM), CatBoostClassifier (CB), RandomForestClassifier (RF), ExtraTreesClassifier (ET), KneighborsClassifier (KNN), and DecisionTreeClassifier (DT), were trained and evaluated. The results demonstrate exceptional performance across the classifiers, with high accuracy, precision, recall, and F1 scores achieved in identifying the source of network traffic. Among the classifier models, LGBM achieved the best accuracy value of 0.99999857, precision value of 0.99999859, and F1 score of 0.999998803, with CB achieving the best recall of 0.999997875. Some of these results are novel, and others performed better than existing systems. The findings of this study contribute to source identification, ensure the accountability of IoT network users, and provide insights into developing better defenses against security threats in the IoT domain","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"54 50","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138593206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Hybrid Intrusion Detection Model to Alleviate Denial of Service and Distributed Denial of Service Attacks in Internet of Things 缓解物联网中拒绝服务和分布式拒绝服务攻击的混合入侵检测模型
Pub Date : 2023-12-07 DOI: 10.30534/ijatcse/2023/031262023
The Internet of Things (IoT) refers to a network of interconnected smart devices. The growth of IoT devices has increased the vulnerability of the network to attacks, such as Denial of Service (DoS) and Distributed Denial of Service (DDoS). Denial-of-Service (DoS) attacks are malicious activities aimed at rendering a computer network, system, or online service unavailable to legitimate users. This research addresses the growing vulnerability of IoT networks to DoS/DDoS attacks by developing a hybrid intrusion detection model to detect these attacks. The model integrates Kalman Filter (KF) with Artificial Neural Network (KF-ANN), Random Forest (KF-RF), Support Vector Machine (KF-SVM) and K-Nearest Neighbor (KF-KNN) machine learning models. The Kalman filter is an efficient tool for estimating the state of a system especially in the midst of uncertainty. Kalman filter was used to estimate the state of the system while the machine learning models were used to make predictions based on the estimated state to detect attacks in IoT. The model was tested using the DoS/DDoS Message Queueing Telemetry Protocol (MQTT) IoT dataset. Results shows Receiver Operative Curve Area Under the Curve (ROC-AUC) of 0.99% for KF-ANN and KF-RF, 0.98% and 0.97% for KF-KNN and KF-SVM. Detection accuracy of approximately 0.96%, 0.94% and 93% for KF-RF and KF-ANN, KF-KNN and KF-SVM respectively
物联网(IoT)是指由相互连接的智能设备组成的网络。物联网设备的增长增加了网络对攻击的脆弱性,例如拒绝服务(DoS)和分布式拒绝服务(DDoS)。拒绝服务(DoS)攻击是一种恶意活动,其目的是使计算机网络、系统或在线服务对合法用户不可用。本研究通过开发一种混合入侵检测模型来检测这些攻击,解决了物联网网络对DoS/DDoS攻击日益增长的脆弱性。该模型将卡尔曼滤波(KF)与人工神经网络(KF- ann)、随机森林(KF- rf)、支持向量机(KF- svm)和k -最近邻(KF- knn)机器学习模型相结合。卡尔曼滤波是估计系统状态的有效工具,特别是在不确定的情况下。利用卡尔曼滤波估计系统状态,利用机器学习模型根据估计状态进行预测,检测物联网中的攻击。该模型使用DoS/DDoS消息队列遥测协议(MQTT)物联网数据集进行测试。结果表明:KF-ANN和KF-RF的ROC-AUC分别为0.99%和0.98%,KF-KNN和KF-SVM的ROC-AUC分别为0.97%。KF-RF和KF-ANN、KF-KNN和KF-SVM的检测准确率分别约为0.96%、0.94%和93%
{"title":"A Hybrid Intrusion Detection Model to Alleviate Denial of Service and Distributed Denial of Service Attacks in Internet of Things","authors":"","doi":"10.30534/ijatcse/2023/031262023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/031262023","url":null,"abstract":"The Internet of Things (IoT) refers to a network of interconnected smart devices. The growth of IoT devices has increased the vulnerability of the network to attacks, such as Denial of Service (DoS) and Distributed Denial of Service (DDoS). Denial-of-Service (DoS) attacks are malicious activities aimed at rendering a computer network, system, or online service unavailable to legitimate users. This research addresses the growing vulnerability of IoT networks to DoS/DDoS attacks by developing a hybrid intrusion detection model to detect these attacks. The model integrates Kalman Filter (KF) with Artificial Neural Network (KF-ANN), Random Forest (KF-RF), Support Vector Machine (KF-SVM) and K-Nearest Neighbor (KF-KNN) machine learning models. The Kalman filter is an efficient tool for estimating the state of a system especially in the midst of uncertainty. Kalman filter was used to estimate the state of the system while the machine learning models were used to make predictions based on the estimated state to detect attacks in IoT. The model was tested using the DoS/DDoS Message Queueing Telemetry Protocol (MQTT) IoT dataset. Results shows Receiver Operative Curve Area Under the Curve (ROC-AUC) of 0.99% for KF-ANN and KF-RF, 0.98% and 0.97% for KF-KNN and KF-SVM. Detection accuracy of approximately 0.96%, 0.94% and 93% for KF-RF and KF-ANN, KF-KNN and KF-SVM respectively","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"31 20","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594410","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Prototype of Smart Plastic Bottle Recycle Machine Using IoT 利用物联网的智能塑料瓶回收机原型
Pub Date : 2023-12-07 DOI: 10.30534/ijatcse/2023/011262023
The growing concern over plastic pollution and its adverse impact on the environment has prompted the development of innovative solutions to address the issue effectively. Improper disposal of plastic bottles leads to environmental pollution. This paper presents the design and implementation of a prototype of smart plastic bottle recycle machine, integrating the Internet of Things (IoT). The Arduino board is used to control the machine. The smart plastic bottle recycling machine incorporates the ESP8266 and a Wi-Fi enabled system-on-chip (SoC) module used to develop IoT embedded applications. The utilization of IoT technology enables seamless real-time data transmission, allowing for efficient communication with the central system and simpliying remote monitoring and management processes. The IoT-enabled sensors and cameras capture information about the plastic bottles, such as their material, size, and condition. Thus, it makes recycling easy and satisfying, which motivates people to get involved in recycling activities. Moreover, implementing a point system that rewards individuals for their recycling efforts not only serves as an extra motivation for users, but also encourages them to actively participate in the preservation of the environment. Therefore, this prototype demonstrates the potential to foster sustainable recycling practices, which is a promising first step towards a future that prioritizes environmental consciousness
人们对塑料污染及其对环境的不利影响的日益关注促使人们开发出创新的解决方案来有效地解决这一问题。塑料瓶处理不当导致环境污染。本文介绍了一种集成物联网(IoT)的智能塑料瓶回收机样机的设计与实现。Arduino板用于控制机器。智能塑料瓶回收机集成了ESP8266和支持Wi-Fi的片上系统(SoC)模块,用于开发物联网嵌入式应用。利用物联网技术,实现无缝实时数据传输,实现与中央系统的高效通信,简化远程监控和管理流程。物联网传感器和摄像头可以捕捉塑料瓶的材料、尺寸和状况等信息。因此,它使回收变得容易和令人满意,这激励人们参与回收活动。此外,实施积分制度,奖励个人的回收工作,不仅是对用户的额外激励,也鼓励他们积极参与保护环境。因此,这个原型展示了促进可持续回收实践的潜力,这是朝着优先考虑环境意识的未来迈出的有希望的第一步
{"title":"A Prototype of Smart Plastic Bottle Recycle Machine Using IoT","authors":"","doi":"10.30534/ijatcse/2023/011262023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/011262023","url":null,"abstract":"The growing concern over plastic pollution and its adverse impact on the environment has prompted the development of innovative solutions to address the issue effectively. Improper disposal of plastic bottles leads to environmental pollution. This paper presents the design and implementation of a prototype of smart plastic bottle recycle machine, integrating the Internet of Things (IoT). The Arduino board is used to control the machine. The smart plastic bottle recycling machine incorporates the ESP8266 and a Wi-Fi enabled system-on-chip (SoC) module used to develop IoT embedded applications. The utilization of IoT technology enables seamless real-time data transmission, allowing for efficient communication with the central system and simpliying remote monitoring and management processes. The IoT-enabled sensors and cameras capture information about the plastic bottles, such as their material, size, and condition. Thus, it makes recycling easy and satisfying, which motivates people to get involved in recycling activities. Moreover, implementing a point system that rewards individuals for their recycling efforts not only serves as an extra motivation for users, but also encourages them to actively participate in the preservation of the environment. Therefore, this prototype demonstrates the potential to foster sustainable recycling practices, which is a promising first step towards a future that prioritizes environmental consciousness","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"5 11","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138591295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing Subcontractor Work through ISO 31000 Risk Assessment Method 通过ISO 31000风险评估方法优化分包商的工作
Pub Date : 2023-10-15 DOI: 10.30534/ijatcse/2023/061252023
Every project has its own risks associated with it. The more complex the project, the higher risks embedded within the project. Whenever the risk is not identified and mitigated properly, it will disrupt the project implementation. The article takes case study of a state-owned energy company, XYZ, that build electricity transmission system around Indonesia area. The transmission project requires various expertise that involves using multiple contractors with their subcontractors. Using the chain of contractors/subcontractors is a common thing in transmission project, so the project owner should ensure all risks within the chain should be properly managed. The article proposes the use of ISO 31000 risk assessment method to identify and mitigate all possible risks that may disrupt the project. The use of ISO 31000 method enables to lower the risk of project achievements from 79.74% success rates to more than 90%. The outcome of the article is expected to be used as a reference for project owner of transmission projects in Indonesia to manage the risks associated with the use of chain contractors and subcontractors.
每个项目都有自己的风险。项目越复杂,项目中嵌入的风险就越高。只要风险没有被正确地识别和减轻,它就会破坏项目的实施。本文以某国有能源公司XYZ为例,该公司在印尼周边地区建设输电系统。输电项目需要多种专业知识,包括使用多个承包商及其分包商。使用承包商/分包商链是输电工程中常见的事情,因此项目业主应确保对链内的所有风险进行妥善管理。本文建议使用ISO 31000风险评估方法来识别和减轻可能破坏项目的所有可能风险。使用ISO 31000方法可以将项目成功的风险从79.74%降低到90%以上。本文的研究结果有望作为印尼输电项目业主管理使用连锁承包商和分包商相关风险的参考。
{"title":"Optimizing Subcontractor Work through ISO 31000 Risk Assessment Method","authors":"","doi":"10.30534/ijatcse/2023/061252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/061252023","url":null,"abstract":"Every project has its own risks associated with it. The more complex the project, the higher risks embedded within the project. Whenever the risk is not identified and mitigated properly, it will disrupt the project implementation. The article takes case study of a state-owned energy company, XYZ, that build electricity transmission system around Indonesia area. The transmission project requires various expertise that involves using multiple contractors with their subcontractors. Using the chain of contractors/subcontractors is a common thing in transmission project, so the project owner should ensure all risks within the chain should be properly managed. The article proposes the use of ISO 31000 risk assessment method to identify and mitigate all possible risks that may disrupt the project. The use of ISO 31000 method enables to lower the risk of project achievements from 79.74% success rates to more than 90%. The outcome of the article is expected to be used as a reference for project owner of transmission projects in Indonesia to manage the risks associated with the use of chain contractors and subcontractors.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"56 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135766044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predictive Modeling for Enhancing Academic Performance in Nigerian Polytechnic Education 提高尼日利亚理工教育学习成绩的预测模型
Pub Date : 2023-10-08 DOI: 10.30534/ijatcse/2023/041252023
This study presents a machine learning-based approach to enhance the classification and optimization of students’ academic performance within Nigeria’s polytechnic education system. The polytechnic system is pivotal in providing technical and vocational education, but challenges persist in nurturing students’ academic achievement. This article explores the complexities influencing academic performance and proposes strategies for improvement using machine learning algorithms. The research utilizes linear and support vector regression models to predict students’ cumulative grade point averages (CGPA). A dataset from Akwa Ibom State Polytechnic, Ikot Osurua, comprising total courses, credit units, department, and previous grade point average (GPA), is employed for model development and evaluation. Both models achieve similar predictive performance, but linear regression slightly outperforms support vector regression. The results highlight the significant role of variables like total courses, the type of academic department, and previous GPA in predicting CGPA. This study offers a valuable tool for assessing and improving students’ academic performance in Nigeria’s polytechnic education system, with potential for broader applications in higher education. Further research involves expanding the dataset and considering additional factors beyond result records to enhance the model’s robustness and applicability.
本研究提出了一种基于机器学习的方法,以增强尼日利亚理工教育系统中学生学业成绩的分类和优化。理工学院系统是提供技术和职业教育的关键,但在培养学生的学术成就方面仍然存在挑战。本文探讨了影响学习成绩的复杂性,并提出了使用机器学习算法进行改进的策略。本研究利用线性和支持向量回归模型预测学生的累积平均绩点(CGPA)。模型开发和评估采用了来自Ikot Osurua的Akwa Ibom州立理工学院的数据集,包括总课程、学分单位、部门和以前的平均绩点(GPA)。两种模型都实现了类似的预测性能,但线性回归略优于支持向量回归。结果强调了总课程、院系类型和以前的GPA等变量在预测CGPA方面的重要作用。这项研究为评估和提高尼日利亚理工教育系统学生的学习成绩提供了一个有价值的工具,在高等教育中有更广泛的应用潜力。进一步的研究包括扩展数据集和考虑结果记录之外的其他因素,以增强模型的鲁棒性和适用性。
{"title":"Predictive Modeling for Enhancing Academic Performance in Nigerian Polytechnic Education","authors":"","doi":"10.30534/ijatcse/2023/041252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/041252023","url":null,"abstract":"This study presents a machine learning-based approach to enhance the classification and optimization of students’ academic performance within Nigeria’s polytechnic education system. The polytechnic system is pivotal in providing technical and vocational education, but challenges persist in nurturing students’ academic achievement. This article explores the complexities influencing academic performance and proposes strategies for improvement using machine learning algorithms. The research utilizes linear and support vector regression models to predict students’ cumulative grade point averages (CGPA). A dataset from Akwa Ibom State Polytechnic, Ikot Osurua, comprising total courses, credit units, department, and previous grade point average (GPA), is employed for model development and evaluation. Both models achieve similar predictive performance, but linear regression slightly outperforms support vector regression. The results highlight the significant role of variables like total courses, the type of academic department, and previous GPA in predicting CGPA. This study offers a valuable tool for assessing and improving students’ academic performance in Nigeria’s polytechnic education system, with potential for broader applications in higher education. Further research involves expanding the dataset and considering additional factors beyond result records to enhance the model’s robustness and applicability.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135198253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Clustering of Feature Vectors and Recognition of Bodo Phoneme Using MLP Technique 基于MLP技术的Bodo音素特征向量聚类与识别
Pub Date : 2023-10-08 DOI: 10.30534/ijatcse/2023/051252023
The process through which a computer can identify spoken words is termed as speech recognition. After analysis and finding of features of the speech sound, one can go towards the recognition of the speech. The extraction of feature vector is known as the feature extraction process or the front-end process. This front-end process is considered as the 1st stage of speech recognition. Pattern matching process is the 2nd stage or final stage of speech recognition where actual search is carried out to decode the spoken utterances by matching the sequence of feature vectors against the acoustic and language models stored in the recognizer. To reduce this problem, clustering technique is used. Clustering makes it possible to look at properties of whole clusters instead of individual objects - a simplification that might be useful when handling large volume of data. Clustering is nothing but the assignment of a set of observations into subsets so that the observations in the same cluster are similar in some sense.
计算机识别语音的过程被称为语音识别。通过对语音特征的分析和发现,就可以走向语音的识别。特征向量的提取称为特征提取过程或前端过程。这个前端过程被认为是语音识别的第一阶段。模式匹配过程是语音识别的第二阶段或最后阶段,其中通过将特征向量序列与存储在识别器中的声学和语言模型进行匹配来进行实际搜索以解码语音。为了减少这个问题,使用了聚类技术。集群使得查看整个集群的属性而不是单个对象成为可能——这种简化在处理大量数据时可能很有用。聚类只不过是将一组观测值分配到子集中,以便同一簇中的观测值在某种意义上是相似的。
{"title":"Clustering of Feature Vectors and Recognition of Bodo Phoneme Using MLP Technique","authors":"","doi":"10.30534/ijatcse/2023/051252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/051252023","url":null,"abstract":"The process through which a computer can identify spoken words is termed as speech recognition. After analysis and finding of features of the speech sound, one can go towards the recognition of the speech. The extraction of feature vector is known as the feature extraction process or the front-end process. This front-end process is considered as the 1st stage of speech recognition. Pattern matching process is the 2nd stage or final stage of speech recognition where actual search is carried out to decode the spoken utterances by matching the sequence of feature vectors against the acoustic and language models stored in the recognizer. To reduce this problem, clustering technique is used. Clustering makes it possible to look at properties of whole clusters instead of individual objects - a simplification that might be useful when handling large volume of data. Clustering is nothing but the assignment of a set of observations into subsets so that the observations in the same cluster are similar in some sense.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135197843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting Curriculum Designers in Developing Balanced Outcome-based Programs using Knowledge Graphs 支持课程设计者使用知识图谱开发平衡的基于结果的程序
Pub Date : 2023-10-08 DOI: 10.30534/ijatcse/2023/021252023
It is essential for universities to accredit their programs to be recognized locally and globally and to maintain the quality and credibility of educational programs. For programs to become accredited, they must meet predefined quality standards for the intended accreditation institution. These quality standards are applied to program courses, and each course covers some requirements from the accreditation requirements, such as Student and Course Learning Outcomes, based on their specific accreditation commission. As programs and courses are added frequently at university programs, information about accreditation mapped to each course syllabus and program description is becoming more complicated. It must be maintained automatically since program accreditation must be renewed on a regular basis to guarantee the program's quality. In addition, supporting Curriculum Designers in finding gaps and imbalances in the proposed programs and courses is becoming necessary to alleviate the management of accreditation related tasks. In this paper, we propose a knowledge graph-based system that supports the development of balanced educational programs and helps detecting gaps and redundancies within the same university programs. The system provides an attractive graphical user interface that visualizes the curriculum components and accreditation requirements as interactive graphs. The system has been implemented using the graph database Neo4j and the results are analyzed using the Cypher query language
大学必须对其课程进行认证,使其在本地和全球得到认可,并保持教育课程的质量和可信度。对于获得认证的课程,它们必须符合预定认证机构的预定义质量标准。这些质量标准适用于项目课程,每门课程都涵盖了认证要求中的一些要求,例如基于其特定认证委员会的学生和课程学习成果。随着大学项目和课程的频繁增加,每个课程大纲和项目描述上的认证信息变得越来越复杂。它必须自动保持,因为项目认证必须定期更新,以保证项目的质量。此外,支持课程设计师发现拟议项目和课程中的差距和不平衡,对于减轻认证相关任务的管理变得非常必要。在本文中,我们提出了一个基于知识图的系统,该系统支持平衡教育计划的发展,并有助于发现同一大学计划中的差距和冗余。该系统提供了一个有吸引力的图形用户界面,将课程组成部分和认证要求可视化为交互式图形。系统使用图形数据库Neo4j实现,并使用Cypher查询语言对结果进行分析
{"title":"Supporting Curriculum Designers in Developing Balanced Outcome-based Programs using Knowledge Graphs","authors":"","doi":"10.30534/ijatcse/2023/021252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/021252023","url":null,"abstract":"It is essential for universities to accredit their programs to be recognized locally and globally and to maintain the quality and credibility of educational programs. For programs to become accredited, they must meet predefined quality standards for the intended accreditation institution. These quality standards are applied to program courses, and each course covers some requirements from the accreditation requirements, such as Student and Course Learning Outcomes, based on their specific accreditation commission. As programs and courses are added frequently at university programs, information about accreditation mapped to each course syllabus and program description is becoming more complicated. It must be maintained automatically since program accreditation must be renewed on a regular basis to guarantee the program's quality. In addition, supporting Curriculum Designers in finding gaps and imbalances in the proposed programs and courses is becoming necessary to alleviate the management of accreditation related tasks. In this paper, we propose a knowledge graph-based system that supports the development of balanced educational programs and helps detecting gaps and redundancies within the same university programs. The system provides an attractive graphical user interface that visualizes the curriculum components and accreditation requirements as interactive graphs. The system has been implemented using the graph database Neo4j and the results are analyzed using the Cypher query language","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135198094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Botnet Threat Intelligence in IoT-Edge 物联网边缘中的僵尸网络威胁情报
Pub Date : 2023-10-08 DOI: 10.30534/ijatcse/2023/011252023
Recently, deep learning has gotten progressively popular in the domain of security. However, Traditional machine learning models are not capable to discover zero-day botnet attacks with extraordinary privacy. For this purpose, researchers have utilized deep learning based computational framework for Botnet which can detect zero-day attacks, achieve data privacy and improve training time using machine learning techniques for the IoT-edge devices. However, it combines and integrates various models and contexts. As a result, the objective of this research was to incorporate the deep learning model which controls different operation of IoT devices and reduce the training time. In deep learning, there are numerous components that aspect the false positive rate of every detected attack type. These elements are F1 score, false-positive rate, and training time; reduce the time of detection, and Accuracy. Bashlite and Mirai are two examples of zero-day botnet attacks that pose a threat to IoT edge devices. The majority of cyber-attacks are executed by malware-infected devices that are remotely controlled by attackers. This malware is often referred to as a bot or botnet, and it enables attackers to control the device and perform malicious actions, such as spamming, stealing sensitive information, and launching DDoS attacks. The model was formulated in Python libraries and subsequently tested on real life data to assess whether the integrated model performs better than its counterparts. The outcomes show that the proposed model performs in a way that is better than existing models i.e. DDL, CDL and LDL as Botnet Attacks Intelligence (BAI) the purposed deep learning model.
最近,深度学习在安全领域越来越受欢迎。然而,传统的机器学习模型无法发现具有非凡隐私的零日僵尸网络攻击。为此,研究人员利用基于深度学习的僵尸网络计算框架,可以检测零日攻击,实现数据隐私,并使用机器学习技术为物联网边缘设备缩短训练时间。然而,它结合并集成了各种模型和上下文。因此,本研究的目的是结合深度学习模型,控制物联网设备的不同操作,减少训练时间。在深度学习中,有许多组件可以衡量每种检测到的攻击类型的误报率。这些因素是F1分数、假阳性率和训练时间;减少检测时间,提高准确性。Bashlite和Mirai是两个对物联网边缘设备构成威胁的零日僵尸网络攻击的例子。大多数网络攻击是由攻击者远程控制的受恶意软件感染的设备执行的。这种恶意软件通常被称为机器人或僵尸网络,它使攻击者能够控制设备并执行恶意操作,例如发送垃圾邮件、窃取敏感信息和发起DDoS攻击。该模型是在Python库中制定的,随后在实际数据上进行了测试,以评估集成模型是否比同类模型表现得更好。结果表明,所提模型的性能优于现有模型,即DDL、CDL和LDL作为僵尸网络攻击智能(BAI)的目的深度学习模型。
{"title":"Botnet Threat Intelligence in IoT-Edge","authors":"","doi":"10.30534/ijatcse/2023/011252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/011252023","url":null,"abstract":"Recently, deep learning has gotten progressively popular in the domain of security. However, Traditional machine learning models are not capable to discover zero-day botnet attacks with extraordinary privacy. For this purpose, researchers have utilized deep learning based computational framework for Botnet which can detect zero-day attacks, achieve data privacy and improve training time using machine learning techniques for the IoT-edge devices. However, it combines and integrates various models and contexts. As a result, the objective of this research was to incorporate the deep learning model which controls different operation of IoT devices and reduce the training time. In deep learning, there are numerous components that aspect the false positive rate of every detected attack type. These elements are F1 score, false-positive rate, and training time; reduce the time of detection, and Accuracy. Bashlite and Mirai are two examples of zero-day botnet attacks that pose a threat to IoT edge devices. The majority of cyber-attacks are executed by malware-infected devices that are remotely controlled by attackers. This malware is often referred to as a bot or botnet, and it enables attackers to control the device and perform malicious actions, such as spamming, stealing sensitive information, and launching DDoS attacks. The model was formulated in Python libraries and subsequently tested on real life data to assess whether the integrated model performs better than its counterparts. The outcomes show that the proposed model performs in a way that is better than existing models i.e. DDL, CDL and LDL as Botnet Attacks Intelligence (BAI) the purposed deep learning model.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135198255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Magic of Environmental Detection and Future Prediction by Satellite 卫星环境探测与未来预测的魔力
Pub Date : 2023-10-08 DOI: 10.30534/ijatcse/2023/031252023
Climate change is one of the important issues that face the world in this technological era. We have used data collected from the publicly available GISTEMP data, the Global Surface Temperature Change data distributed by the National Aeronautics and Space Administration Goddard Institute for Space Studies (NASA-GISS). The data consisted of the mean surface temperature change with respect to baseline climatology corresponding to the period 1951-1980. The data covers the time period of 1961-2019. We studied the change in temperature in the countries like Greenland and India using the regression models. All the regression graphs were plotted in the Spyder software using python. From the regression models we observed the significant rise in temperature in these countries caused due to global warming. These models will help us to predict the change in temperature in future
气候变化是当今科技时代世界面临的重要问题之一。我们使用了从公开可用的GISTEMP数据中收集的数据,即由美国国家航空航天局戈达德空间研究所(NASA-GISS)分发的全球表面温度变化数据。资料包括1951-1980年期间相对于基线气候学的平均地表温度变化。数据涵盖了1961-2019年的时间段。我们使用回归模型研究了格陵兰岛和印度等国家的温度变化。所有回归图均使用python在Spyder软件中绘制。从回归模型中我们观察到,由于全球变暖,这些国家的气温显著上升。这些模型将帮助我们预测未来温度的变化
{"title":"The Magic of Environmental Detection and Future Prediction by Satellite","authors":"","doi":"10.30534/ijatcse/2023/031252023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/031252023","url":null,"abstract":"Climate change is one of the important issues that face the world in this technological era. We have used data collected from the publicly available GISTEMP data, the Global Surface Temperature Change data distributed by the National Aeronautics and Space Administration Goddard Institute for Space Studies (NASA-GISS). The data consisted of the mean surface temperature change with respect to baseline climatology corresponding to the period 1951-1980. The data covers the time period of 1961-2019. We studied the change in temperature in the countries like Greenland and India using the regression models. All the regression graphs were plotted in the Spyder software using python. From the regression models we observed the significant rise in temperature in these countries caused due to global warming. These models will help us to predict the change in temperature in future","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135197839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair Rewards in Federated Learning: A Novel Approach with Adjusted OR-TMC Shapley Value Approximation Algorithm 联邦学习中的公平奖励:基于调整OR-TMC Shapley值近似算法的新方法
Pub Date : 2023-08-10 DOI: 10.30534/ijatcse/2023/081242023
Federated Learning (FL), a new private and secure Machine Learning (ML) approach, faces a big difficulty when it comes to sharing profits with data producers. Shapley Values (SV) have been proposed as a fair incentive system to remedy this, but it is challenging to determine the SV with accuracy. Therefore, SV calculation is problematic since the number of necessary federated models rises exponentially with the number of data sources. As a result, an effective approximation approach is required. The One Round Model Reconstruction (OR) and Truncated Monte Carlo Shapley (TMC) approaches for SV approximation in FL are being improved and combined in this study. The proposed approach, Adjusted OR-TMC, combines TMC principles with OR and achieves a comparable level of accuracy over a shorter period. Because of this, Adjusted OR-TMC is the perfect OR replacement. The performance outcomes and underlying causes are covered in the study.
联邦学习(FL)是一种新的私有和安全的机器学习(ML)方法,在与数据生产者分享利润时面临着很大的困难。沙普利值(Shapley Values, SV)被提议作为一种公平的激励机制来弥补这一缺陷,但要准确地确定SV是一项挑战。因此,SV计算是有问题的,因为必要的联邦模型的数量随着数据源的数量呈指数增长。因此,需要一种有效的近似方法。本研究对单轮模型重构(One Round Model Reconstruction, OR)和截断蒙特卡罗沙普利(Truncated Monte Carlo Shapley, TMC)方法进行了改进和结合。所提出的方法,调整OR-TMC,将TMC原则与OR相结合,并在较短的时间内达到相当的准确性水平。正因为如此,调整后的OR- tmc是完美的OR替代品。该研究涵盖了绩效结果和潜在原因。
{"title":"Fair Rewards in Federated Learning: A Novel Approach with Adjusted OR-TMC Shapley Value Approximation Algorithm","authors":"","doi":"10.30534/ijatcse/2023/081242023","DOIUrl":"https://doi.org/10.30534/ijatcse/2023/081242023","url":null,"abstract":"Federated Learning (FL), a new private and secure Machine Learning (ML) approach, faces a big difficulty when it comes to sharing profits with data producers. Shapley Values (SV) have been proposed as a fair incentive system to remedy this, but it is challenging to determine the SV with accuracy. Therefore, SV calculation is problematic since the number of necessary federated models rises exponentially with the number of data sources. As a result, an effective approximation approach is required. The One Round Model Reconstruction (OR) and Truncated Monte Carlo Shapley (TMC) approaches for SV approximation in FL are being improved and combined in this study. The proposed approach, Adjusted OR-TMC, combines TMC principles with OR and achieves a comparable level of accuracy over a shorter period. Because of this, Adjusted OR-TMC is the perfect OR replacement. The performance outcomes and underlying causes are covered in the study.","PeriodicalId":129636,"journal":{"name":"International Journal of Advanced Trends in Computer Science and Engineering","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-08-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126856794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Advanced Trends in Computer Science and Engineering
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1