首页 > 最新文献

Int. Arab J. Inf. Technol.最新文献

英文 中文
IoT security using AES encryption technology based ESP32 platform 物联网安全采用基于AES加密技术的ESP32平台
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/8
M. Al-Mashhadani, M. Shujaa
The Internet of Things (IoT) is one of the most important modern technologies that have attracted the most interesting areas of life, whether industrial, academic, or other, in recent years. The main goal is to integrate the physical world with the digital world through a seamless ecosystem, and this constitutes a new era for the Internet. This technology provides high commercial value to enterprises as it provides many opportunities in many applications such as energy, health, and other sectors. However, this technology suffers from many security problems, as it is considered the biggest challenge due to its complex environment and the limited resources of its devices. There is a lot of research to find successful security solutions in IoT, in this research, a proposed solution to secure IoT systems using Advanced Encryption Standard (AES) technology is achieved. Some sensors were linked as an example of the Internet of Things. The data is received by the card created and developed by Espressif Systems (ESP32) module, where its encrypted then sends to the internet site through an authorized person to be received from anywhere, and it is also possible to receive it via a published IP which is announced within the internal network of the ESP32 device module. The decryption part is proposed at last to find out the true values of the sensors. The proposed approach shows good secured and balanced results at the end
物联网(IoT)是最重要的现代技术之一,近年来吸引了最有趣的生活领域,无论是工业,学术还是其他领域。主要目标是通过无缝的生态系统将物理世界与数字世界融为一体,这构成了互联网的新时代。该技术为企业提供了很高的商业价值,因为它在能源、卫生和其他领域等许多应用中提供了许多机会。然而,由于其复杂的环境和有限的设备资源,该技术被认为是最大的挑战,因此存在许多安全问题。有很多研究在物联网中找到成功的安全解决方案,在本研究中,提出了使用高级加密标准(AES)技术保护物联网系统的解决方案。一些传感器被连接起来作为物联网的一个例子。由Espressif Systems (ESP32)模块创建和开发的卡片接收数据,然后通过授权人员将其加密发送到网站,以便从任何地方接收,也可以通过ESP32设备模块内部网络中公布的已发布IP接收数据。最后提出了解密部分,以找出传感器的真实值。结果表明,该方法具有良好的安全性和均衡性
{"title":"IoT security using AES encryption technology based ESP32 platform","authors":"M. Al-Mashhadani, M. Shujaa","doi":"10.34028/iajit/19/2/8","DOIUrl":"https://doi.org/10.34028/iajit/19/2/8","url":null,"abstract":"The Internet of Things (IoT) is one of the most important modern technologies that have attracted the most interesting areas of life, whether industrial, academic, or other, in recent years. The main goal is to integrate the physical world with the digital world through a seamless ecosystem, and this constitutes a new era for the Internet. This technology provides high commercial value to enterprises as it provides many opportunities in many applications such as energy, health, and other sectors. However, this technology suffers from many security problems, as it is considered the biggest challenge due to its complex environment and the limited resources of its devices. There is a lot of research to find successful security solutions in IoT, in this research, a proposed solution to secure IoT systems using Advanced Encryption Standard (AES) technology is achieved. Some sensors were linked as an example of the Internet of Things. The data is received by the card created and developed by Espressif Systems (ESP32) module, where its encrypted then sends to the internet site through an authorized person to be received from anywhere, and it is also possible to receive it via a published IP which is announced within the internal network of the ESP32 device module. The decryption part is proposed at last to find out the true values of the sensors. The proposed approach shows good secured and balanced results at the end","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"70 1","pages":"214-223"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86268238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Multi-Lingual Language Variety Identification using Conventional Deep Learning and Transfer Learning Approaches 使用传统深度学习和迁移学习方法的多语种语言多样性识别
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/5/1
Sameeah Noreen Hameed, M. Ashraf, Yanan Qiao
Language variety identification tends to identify lexical and semantic variations in different varieties of a single language. Language variety identification helps build the linguistic profile of an author from written text which can be used for cyber forensics and marketing purposes. Investigating previous efforts for language variety identification, we hardly find any study that experiments with transfer learning approaches and/or performs a thorough comparison of different deep learning approaches on a range of benchmark datasets. So, to bridge this gap, we propose transfer learning approaches for language variety identification tasks and perform an extensive comparison of them with deep learning approaches on multiple varieties of four widely spoken languages, i.e., Arabic, English, Portuguese, and Spanish. This research has treated this task as a binary classification problem (Portuguese) and multi-class classification problem (Arabic, English, and Spanish). We applied two transfer learning Bidirectional Encoder Representations from Transformers (BERT), Universal Language Model Fine-tuning (ULMFiT), three deep learning-Convolutional Neural Networks (CNN), Bidirectional Long Short Term Memory (Bi-LSTM), Gated Recurrent Units (GRU), and an ensemble approach for identifying different varieties. A thorough comparison between the approaches suggests that the transfer learning based ULMFiT model outperforms all other approaches and produces the best accuracy results for binary and multi-class language variety identification tasks.
语言变体识别倾向于识别单一语言中不同变体的词汇和语义变化。语言多样性识别有助于从书面文本中建立作者的语言概况,可用于网络取证和营销目的。在调查之前的语言多样性识别工作时,我们几乎没有发现任何使用迁移学习方法进行实验和/或在一系列基准数据集上对不同深度学习方法进行彻底比较的研究。因此,为了弥合这一差距,我们提出了语言多样性识别任务的迁移学习方法,并将其与深度学习方法在四种广泛使用的语言(即阿拉伯语、英语、葡萄牙语和西班牙语)的多种变体上进行了广泛的比较。本研究将该任务视为二元分类问题(葡萄牙语)和多类分类问题(阿拉伯语、英语和西班牙语)。我们应用了两种迁移学习双向编码器表示(BERT)、通用语言模型微调(ULMFiT)、三种深度学习卷积神经网络(CNN)、双向长短期记忆(Bi-LSTM)、门控循环单元(GRU)和一种集成方法来识别不同的变体。两种方法之间的全面比较表明,基于迁移学习的ULMFiT模型优于所有其他方法,并在二元和多类语言多样性识别任务中产生最佳的准确性结果。
{"title":"Multi-Lingual Language Variety Identification using Conventional Deep Learning and Transfer Learning Approaches","authors":"Sameeah Noreen Hameed, M. Ashraf, Yanan Qiao","doi":"10.34028/iajit/19/5/1","DOIUrl":"https://doi.org/10.34028/iajit/19/5/1","url":null,"abstract":"Language variety identification tends to identify lexical and semantic variations in different varieties of a single language. Language variety identification helps build the linguistic profile of an author from written text which can be used for cyber forensics and marketing purposes. Investigating previous efforts for language variety identification, we hardly find any study that experiments with transfer learning approaches and/or performs a thorough comparison of different deep learning approaches on a range of benchmark datasets. So, to bridge this gap, we propose transfer learning approaches for language variety identification tasks and perform an extensive comparison of them with deep learning approaches on multiple varieties of four widely spoken languages, i.e., Arabic, English, Portuguese, and Spanish. This research has treated this task as a binary classification problem (Portuguese) and multi-class classification problem (Arabic, English, and Spanish). We applied two transfer learning Bidirectional Encoder Representations from Transformers (BERT), Universal Language Model Fine-tuning (ULMFiT), three deep learning-Convolutional Neural Networks (CNN), Bidirectional Long Short Term Memory (Bi-LSTM), Gated Recurrent Units (GRU), and an ensemble approach for identifying different varieties. A thorough comparison between the approaches suggests that the transfer learning based ULMFiT model outperforms all other approaches and produces the best accuracy results for binary and multi-class language variety identification tasks.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"13 1","pages":"705-712"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82771506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Driving signature analysis for auto-theft recovery 驾驶签名分析汽车盗窃恢复
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3A/1
Adrian Bosire, Damian Muindi Maingi
{"title":"Driving signature analysis for auto-theft recovery","authors":"Adrian Bosire, Damian Muindi Maingi","doi":"10.34028/iajit/19/3A/1","DOIUrl":"https://doi.org/10.34028/iajit/19/3A/1","url":null,"abstract":"","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"15 4 1","pages":"413-421"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90133897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Simplified Alternate Approach to Estimate Software Size of Startups 估算初创公司软件规模的一种简化替代方法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/4/12
C. Sridharan, S. Parthasarathy
This paper proposes an alternate approach to startups to estimate the size of software product to be built by them using the Software Product Points (SPP). Dataset from 20 software projects of a startup company in India was used to validate the proposed approach and learn lessons out of it. The estimated software product points and the project efforts were found to have a strong positive correlation, thereby indicating the suitability of the proposed approach for its utility by the managers of future software projects of startups. We also briefly outline the implications for project managers of startups and scope for future research.
本文提出了另一种方法,让初创公司使用软件产品点(SPP)来估计他们要构建的软件产品的规模。使用来自印度一家初创公司20个软件项目的数据集来验证所提出的方法并从中吸取教训。估计的软件产品点和项目努力被发现有很强的正相关关系,从而表明所提出的方法对初创公司未来软件项目经理的实用性的适用性。我们还简要概述了对初创公司项目经理的影响以及未来研究的范围。
{"title":"A Simplified Alternate Approach to Estimate Software Size of Startups","authors":"C. Sridharan, S. Parthasarathy","doi":"10.34028/iajit/19/4/12","DOIUrl":"https://doi.org/10.34028/iajit/19/4/12","url":null,"abstract":"This paper proposes an alternate approach to startups to estimate the size of software product to be built by them using the Software Product Points (SPP). Dataset from 20 software projects of a startup company in India was used to validate the proposed approach and learn lessons out of it. The estimated software product points and the project efforts were found to have a strong positive correlation, thereby indicating the suitability of the proposed approach for its utility by the managers of future software projects of startups. We also briefly outline the implications for project managers of startups and scope for future research.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"27 1","pages":"674-680"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83323111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database XAPP:基于sax的XML文档与关系数据库之间映射方法的实现
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/4/2
Yetunde Akinwumi, J. Ayeni, S. Arekete, M. Odim, A. Ogunde, B. Oguntunde
Extensible Markup Language (XML) is the standard medium for data exchange among businesses over the Internet, hence the need for effective management. However, since XML was not designed for storage and retrieval, its management has become an open research area in the database community. Existing mapping techniques for XML-to-relational database adopt either the structural mapping or the model mapping. Though numerous mapping approaches have been developed, mapping and reconstruction time had been problematic, especially when the document size is large and can hardly fit into main memory. In this research, an application codenamed XAPP, a new lightweight application that adopts a novel model mapping approach was developed using Simple API for XML (SAX) parser. XAPP accepts a document with or without Document Type Definition (DTD). It implements two algorithms: one maps XML data to a relational database and improves mapping time, and the other reconstructs an XML document from a relational database to improve reconstruction time and minimise memory usage. The performance of XAPP was analysed and compared with the Document Object Model (DOM) algorithm. XAPP proves to perform significantly better than the DOM-based algorithm in terms of mapping and reconstruction time, and memory efficiency. The correctness of XAPP was also verified.
可扩展标记语言(XML)是企业间通过Internet进行数据交换的标准媒介,因此需要有效的管理。然而,由于XML不是为存储和检索而设计的,因此它的管理已经成为数据库社区的一个开放研究领域。现有的xml到关系数据库的映射技术要么采用结构映射,要么采用模型映射。虽然已经开发了许多映射方法,但映射和重建时间一直存在问题,特别是当文档大小很大且难以装入主存储器时。在本研究中,使用简单API for XML (SAX)解析器开发了一个代号为XAPP的新型轻量级应用程序,它采用了一种新颖的模型映射方法。XAPP接受带有或不带有文档类型定义(DTD)的文档。它实现了两种算法:一种算法将XML数据映射到关系数据库,从而缩短了映射时间;另一种算法从关系数据库重构XML文档,从而缩短了重构时间,最大限度地减少了内存使用。分析了XAPP算法的性能,并与文档对象模型(DOM)算法进行了比较。事实证明,XAPP在映射和重建时间以及内存效率方面明显优于基于dom的算法。验证了XAPP的正确性。
{"title":"XAPP: An Implementation of SAX-Based Method for Mapping XML Document to and from a Relational Database","authors":"Yetunde Akinwumi, J. Ayeni, S. Arekete, M. Odim, A. Ogunde, B. Oguntunde","doi":"10.34028/iajit/19/4/2","DOIUrl":"https://doi.org/10.34028/iajit/19/4/2","url":null,"abstract":"Extensible Markup Language (XML) is the standard medium for data exchange among businesses over the Internet, hence the need for effective management. However, since XML was not designed for storage and retrieval, its management has become an open research area in the database community. Existing mapping techniques for XML-to-relational database adopt either the structural mapping or the model mapping. Though numerous mapping approaches have been developed, mapping and reconstruction time had been problematic, especially when the document size is large and can hardly fit into main memory. In this research, an application codenamed XAPP, a new lightweight application that adopts a novel model mapping approach was developed using Simple API for XML (SAX) parser. XAPP accepts a document with or without Document Type Definition (DTD). It implements two algorithms: one maps XML data to a relational database and improves mapping time, and the other reconstructs an XML document from a relational database to improve reconstruction time and minimise memory usage. The performance of XAPP was analysed and compared with the Document Object Model (DOM) algorithm. XAPP proves to perform significantly better than the DOM-based algorithm in terms of mapping and reconstruction time, and memory efficiency. The correctness of XAPP was also verified.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"39 1","pages":"582-588"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90512641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data MiNB:少数派敏感Naïve非平衡数据多类分类的贝叶斯算法
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/4/5
Pratik A. Barot, H. Jethva
The unbalanced nature of data makes it tough to achieve the desire performance goal for classification algorithms. The sub-optimal prediction system isn't a viable solution due to the high misclassification cost of minority events. Thus accurate imbalanced data classification could be a path changer for prediction in domains like medical diagnosis, judiciary, and disaster management systems. To date, most of the existing studies of imbalanced data are for the binary class dataset and supported by data sampling techniques that suffer from loss of information and over-fitting. In this paper, we present the modified naïve Bayesian algorithm for unbalanced data classification that eliminates the requirement of data level sampling. We compared our proposed model with the data sampling technique and cost-sensitive techniques. We use minority sensitive TP Rate, class-specific misclassification rate, and overall performance parameters such as accuracy, f-measure and G-mean. The result shows that our proposed algorithm shows a more optimal result for unbalanced data classification. Results shows reduction in misclassification rate and improve predictive performance for the minority class.
数据的不平衡特性使得分类算法很难达到理想的性能目标。由于少数事件的错误分类成本高,次优预测系统不是一个可行的解决方案。因此,准确的不平衡数据分类可能会改变医疗诊断、司法和灾害管理系统等领域的预测路径。到目前为止,大多数对不平衡数据的研究都是针对二值类数据集的,并且通过数据采样技术来支持,这些技术存在信息丢失和过拟合的问题。本文提出了一种改进的naïve贝叶斯算法用于非平衡数据分类,该算法消除了对数据级采样的要求。我们将所提出的模型与数据抽样技术和成本敏感技术进行了比较。我们使用少数敏感的TP率、特定类别的误分类率和总体性能参数,如准确性、f-measure和G-mean。结果表明,本文提出的算法对不平衡数据的分类具有较好的效果。结果表明,少数类别的错误分类率降低,预测性能提高。
{"title":"MiNB: Minority Sensitive Naïve Bayesian Algorithm for Multi-Class Classification of Unbalanced Data","authors":"Pratik A. Barot, H. Jethva","doi":"10.34028/iajit/19/4/5","DOIUrl":"https://doi.org/10.34028/iajit/19/4/5","url":null,"abstract":"The unbalanced nature of data makes it tough to achieve the desire performance goal for classification algorithms. The sub-optimal prediction system isn't a viable solution due to the high misclassification cost of minority events. Thus accurate imbalanced data classification could be a path changer for prediction in domains like medical diagnosis, judiciary, and disaster management systems. To date, most of the existing studies of imbalanced data are for the binary class dataset and supported by data sampling techniques that suffer from loss of information and over-fitting. In this paper, we present the modified naïve Bayesian algorithm for unbalanced data classification that eliminates the requirement of data level sampling. We compared our proposed model with the data sampling technique and cost-sensitive techniques. We use minority sensitive TP Rate, class-specific misclassification rate, and overall performance parameters such as accuracy, f-measure and G-mean. The result shows that our proposed algorithm shows a more optimal result for unbalanced data classification. Results shows reduction in misclassification rate and improve predictive performance for the minority class.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"47 1","pages":"609-616"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74736240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Energy heterogeneity analysis of heterogeneous clustering protocols 异构聚类协议的能量异质性分析
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/1/6
Shahzad Hassan, M. Ahmad.
In Wireless Sensor Networks the nodes have restricted battery power and the exhaustion of battery depends on various issues. In recent developments, various clustering protocols have been proposed to diminish the energy depletion of the node and prolong the network lifespan by reducing power consumption. However, each protocol is inappropriate for heterogeneous wireless sensor networks. The efficiency of heterogeneous wireless sensor networks declines as changing the node heterogeneity. This paper reviews cluster head selection criteria of various clustering protocols for heterogeneous wireless sensor networks in terms of node heterogeneity and compares the performance of these protocols on several parameters like clustering technique, cluster head selection criteria, nodes lifetime, energy efficiency under two-level and three-level heterogeneous wireless sensor networks protocols Stable Election Protocol (SEP), Zonal-Stable Election Protocol (ZSEP), Distributed Energy-Efficient Clustering (DEEC), A Direct Transmission And Residual Energy Based Stable Election Protocol (DTRE-SEP), Developed Distributed Energy-Efficient Clustering (DDEEC), Zone-Based Heterogeneous Clustering Protocol (ZBHCP), Enhanced Distributed Energy Efficient Clustering (EDEEC), Threshold Distributed Energy Efficient Clustering (TDEEC), Enhanced Stable Election Protocol (SEP-E), and Threshold Stable Election Protocol (TSEP). The comparison has shown that the TDEEC has very effective results over other over two-level and three-level heterogeneous wireless sensor networks protocols and has extended the unstable region significantly. From simulations, it can also be proved that adding node heterogeneity can significantly increase the network life.
在无线传感器网络中,节点的电池电量受到限制,电池的耗尽取决于各种问题。在最近的发展中,提出了各种聚类协议,以减少节点的能量消耗,并通过降低功耗来延长网络的寿命。然而,每种协议都不适合异构无线传感器网络。异构无线传感器网络的效率随着节点异构性的改变而下降。本文从节点异构的角度综述了异构无线传感器网络中各种聚类协议的簇头选择标准,并在两级和三级异构无线传感器网络协议下,比较了这些协议在聚类技术、簇头选择标准、节点寿命、能效等参数上的性能。分布式节能聚类(DEEC)、基于直接传输和剩余能量的稳定选举协议(dtrep - sep)、分布式节能聚类(DDEEC)、基于区域的异构聚类协议(ZBHCP)、增强型分布式节能聚类(EDEEC)、阈值分布式节能聚类(TDEEC)、增强型稳定选举协议(SEP-E)和阈值稳定选举协议(TSEP)。对比结果表明,TDEEC协议与其他两级和三级以上异构无线传感器网络协议相比,具有非常有效的效果,并且显著地扩展了不稳定区域。仿真结果也证明了增加节点异构性可以显著提高网络寿命。
{"title":"Energy heterogeneity analysis of heterogeneous clustering protocols","authors":"Shahzad Hassan, M. Ahmad.","doi":"10.34028/iajit/19/1/6","DOIUrl":"https://doi.org/10.34028/iajit/19/1/6","url":null,"abstract":"In Wireless Sensor Networks the nodes have restricted battery power and the exhaustion of battery depends on various issues. In recent developments, various clustering protocols have been proposed to diminish the energy depletion of the node and prolong the network lifespan by reducing power consumption. However, each protocol is inappropriate for heterogeneous wireless sensor networks. The efficiency of heterogeneous wireless sensor networks declines as changing the node heterogeneity. This paper reviews cluster head selection criteria of various clustering protocols for heterogeneous wireless sensor networks in terms of node heterogeneity and compares the performance of these protocols on several parameters like clustering technique, cluster head selection criteria, nodes lifetime, energy efficiency under two-level and three-level heterogeneous wireless sensor networks protocols Stable Election Protocol (SEP), Zonal-Stable Election Protocol (ZSEP), Distributed Energy-Efficient Clustering (DEEC), A Direct Transmission And Residual Energy Based Stable Election Protocol (DTRE-SEP), Developed Distributed Energy-Efficient Clustering (DDEEC), Zone-Based Heterogeneous Clustering Protocol (ZBHCP), Enhanced Distributed Energy Efficient Clustering (EDEEC), Threshold Distributed Energy Efficient Clustering (TDEEC), Enhanced Stable Election Protocol (SEP-E), and Threshold Stable Election Protocol (TSEP). The comparison has shown that the TDEEC has very effective results over other over two-level and three-level heterogeneous wireless sensor networks protocols and has extended the unstable region significantly. From simulations, it can also be proved that adding node heterogeneity can significantly increase the network life.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"31 1","pages":"45-54"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73954679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Automotive embedded systems-model based approach review 基于模型的汽车嵌入式系统方法综述
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3A/5
A. Shaout, Shanmukha Pattela
: The evolution of transforming from an electrical mechanical engineering discipline to a combination of software and electrical/mechanical engineering establishes software as a crucial technology. The current complex automotive system is the product of growth of embedded software. As a result, automotive industry focuses on a new trend Model based development rather than traditional method where software is handwritten in Assembly code or C language. This paper presents a review of the use of Model based Development to accelerate development process of embedded control systems and technologies. The paper also presents a review of the tools used to support Model-Based Development (MBD) from functional requirements to automated testing and Model based testing process
从电气机械工程学科到软件与电气/机械工程相结合的演变确立了软件作为一项关键技术的地位。当前复杂的汽车系统是嵌入式软件发展的产物。因此,汽车行业关注的是一种基于模型的开发新趋势,而不是传统的用汇编代码或C语言手写软件的方法。本文综述了基于模型的开发技术在加速嵌入式控制系统和技术开发过程中的应用。本文还回顾了用于支持基于模型的开发(MBD)的工具,从功能需求到自动化测试和基于模型的测试过程
{"title":"Automotive embedded systems-model based approach review","authors":"A. Shaout, Shanmukha Pattela","doi":"10.34028/iajit/19/3A/5","DOIUrl":"https://doi.org/10.34028/iajit/19/3A/5","url":null,"abstract":": The evolution of transforming from an electrical mechanical engineering discipline to a combination of software and electrical/mechanical engineering establishes software as a crucial technology. The current complex automotive system is the product of growth of embedded software. As a result, automotive industry focuses on a new trend Model based development rather than traditional method where software is handwritten in Assembly code or C language. This paper presents a review of the use of Model based Development to accelerate development process of embedded control systems and technologies. The paper also presents a review of the tools used to support Model-Based Development (MBD) from functional requirements to automated testing and Model based testing process","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"19 1","pages":"456-462"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82081281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stacknet based decision fusion classifier for network intrusion detection 基于Stacknet的网络入侵检测决策融合分类器
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/3A/8
Isaac Kofi Nti, Owusu Narko-Boateng, Adebayo Felix Adekoya, Arjun Remadevi Somanathan
: Network intrusion is a subject of great concern to a variety of stakeholders. Decision fusion (ensemble) models that combine several base learners have been widely used to enhance detection rate of unauthorised network intrusion. However, the design of such an optimal decision fusion classifier is a challenging and open problem. The Matthews Correlation Coefficient (MCC) is an effective measure for detecting associations between variables in many fields; however, very few studies have applied it in selecting weak learners to the best of the authors’ knowledge. In this paper, we propose a decision fusion model with correlation-based MCC weak learner selection technique to augment the classification performance of the decision fusion model under a StackNet strategy. Specifically, the proposed model sought to improve the association between the prediction accuracy and diversity of base classifiers. We compare our proposed model with five other ensemble models, a deep neural model and two stand-alone state-of-the-art classifiers commonly used in network intrusion detection based on accuracy, the Area Under Curve (AUC), recall, precision, F1-score and Kappa evaluation metrics. The experimental results using benchmark dataset KDDcup99 from Kaggle shows that the proposed model has a identified unauthorised network traffic at 99.8% accuracy, Extreme Gradient Boosting (Xgboost) (97.61%), Catboost (97.49%), Light Gradient Boosting Machine (LightGBM) (98.3%), Multilayer Perceptron (MLP) (97.7%), Random Forest (RF) (97.97%), Extra Trees Classifier (ET) (95.82%), Different decision ( DT) (96.95%) and , K-Nearest Neighbor (KNN) (95.56), indicating that it is a more efficient and better intrusion detection system. models and proposed decision fusion model.
网络入侵是许多利益相关者非常关注的问题。决策融合(集成)模型是一种结合多个基础学习器的决策融合模型,它被广泛用于提高对未经授权的网络入侵的检出率。然而,这种最优决策融合分类器的设计是一个具有挑战性和开放性的问题。马修斯相关系数(MCC)是许多领域中检测变量之间关联的有效测度。然而,据作者所知,很少有研究将其应用于选择弱学习者。为了提高决策融合模型在StackNet策略下的分类性能,本文提出了一种基于关联的MCC弱学习者选择技术的决策融合模型。具体来说,该模型旨在提高基分类器的预测精度和多样性之间的关系。我们将我们提出的模型与其他五个集成模型、一个深度神经模型和两个独立的最先进的分类器进行比较,这些分类器通常用于基于准确性、曲线下面积(AUC)、召回率、精度、f1分数和Kappa评估指标的网络入侵检测。使用Kaggle的基准数据集KDDcup99的实验结果表明,所提出的模型识别未经授权的网络流量的准确率为99.8%,极端梯度增强(Xgboost) (97.61%), Catboost(97.49%),光梯度增强机(LightGBM)(98.3%),多层感知器(MLP)(97.7%),随机森林(RF)(97.97%),额外树分类器(ET)(95.82%),不同决策(DT)(96.95%)和k -最近邻(KNN)(95.56)。表明它是一种效率更高、性能更好的入侵检测系统。模型和提出的决策融合模型。
{"title":"Stacknet based decision fusion classifier for network intrusion detection","authors":"Isaac Kofi Nti, Owusu Narko-Boateng, Adebayo Felix Adekoya, Arjun Remadevi Somanathan","doi":"10.34028/iajit/19/3A/8","DOIUrl":"https://doi.org/10.34028/iajit/19/3A/8","url":null,"abstract":": Network intrusion is a subject of great concern to a variety of stakeholders. Decision fusion (ensemble) models that combine several base learners have been widely used to enhance detection rate of unauthorised network intrusion. However, the design of such an optimal decision fusion classifier is a challenging and open problem. The Matthews Correlation Coefficient (MCC) is an effective measure for detecting associations between variables in many fields; however, very few studies have applied it in selecting weak learners to the best of the authors’ knowledge. In this paper, we propose a decision fusion model with correlation-based MCC weak learner selection technique to augment the classification performance of the decision fusion model under a StackNet strategy. Specifically, the proposed model sought to improve the association between the prediction accuracy and diversity of base classifiers. We compare our proposed model with five other ensemble models, a deep neural model and two stand-alone state-of-the-art classifiers commonly used in network intrusion detection based on accuracy, the Area Under Curve (AUC), recall, precision, F1-score and Kappa evaluation metrics. The experimental results using benchmark dataset KDDcup99 from Kaggle shows that the proposed model has a identified unauthorised network traffic at 99.8% accuracy, Extreme Gradient Boosting (Xgboost) (97.61%), Catboost (97.49%), Light Gradient Boosting Machine (LightGBM) (98.3%), Multilayer Perceptron (MLP) (97.7%), Random Forest (RF) (97.97%), Extra Trees Classifier (ET) (95.82%), Different decision ( DT) (96.95%) and , K-Nearest Neighbor (KNN) (95.56), indicating that it is a more efficient and better intrusion detection system. models and proposed decision fusion model.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"514 1","pages":"478-490"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79463284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Applying deep convolutional neural network (DCNN) algorithm in the cloud autonomous vehicles traffic model 深度卷积神经网络(DCNN)算法在云自动驾驶汽车交通模型中的应用
Pub Date : 2022-01-01 DOI: 10.34028/iajit/19/2/5
Dhaya Ramakrishnan, K. Radhakrishnan
Connected and Automated Vehicles (CAVs) is an inspiring technology that has an immense prospect in minimizing road upsets and accidents, improving quality of life, and progressing the effectiveness of transportation systems. Owing to the advancements in the intelligent transportation system, CAV plays a vital role that can keeping life lively. CAV also offers to use to transportation care in producing societies protected more reasonable. The challenge over CAV applications is a new-fangled to enhance safety and efficiency. Cloud autonomous vehicles rely on a whole range of machine learning and data mining techniques to process all the sensor data. Supervised, Unsupervised, and even reinforcement learning are also being used in the process of creating cloud autonomous vehicles with the aim of error-free ones. At first, specialized algorithms have not been used directly in the cloud autonomous vehicles which need to be trained with various traffic environments. The creation of a traffic model environment to test the cloud autonomous vehicles is the prime motto of this paper. The deep Convolutional Neural Network (CNN) has been proposed under the traffic model to drive in a heavy traffic condition to evaluate the algorithm. This paper aims to research an insightful school of thought in the current challenges being faced in CAVs and the solutions by applying CNN. From the simulation results of the traffic model that has traffic and highway parameters, the CNN algorithm has come up with a 71.8% of error-free prediction.
联网和自动驾驶汽车(cav)是一项鼓舞人心的技术,在减少道路混乱和事故、提高生活质量和提高交通系统效率方面具有巨大的前景。由于智能交通系统的发展,自动驾驶汽车在保持生活活力方面发挥着至关重要的作用。CAV还为生产社会中使用运输护理提供了更合理的保护。CAV应用面临的挑战是如何提高安全性和效率。云自动驾驶汽车依赖于一系列机器学习和数据挖掘技术来处理所有传感器数据。监督学习、无监督学习甚至强化学习也被用于创建无错误的云自动驾驶汽车的过程中。首先,专门的算法并没有直接用于云自动驾驶汽车,因为云自动驾驶汽车需要经过各种交通环境的训练。创建一个交通模型环境来测试云自动驾驶汽车是本文的主要宗旨。在交通模型下提出了深度卷积神经网络(CNN),在繁忙的交通条件下驾驶来评估算法。本文旨在研究当前自动驾驶汽车面临的挑战以及应用CNN的解决方案。从具有交通和公路参数的交通模型的仿真结果来看,CNN算法的预测准确率达到了71.8%。
{"title":"Applying deep convolutional neural network (DCNN) algorithm in the cloud autonomous vehicles traffic model","authors":"Dhaya Ramakrishnan, K. Radhakrishnan","doi":"10.34028/iajit/19/2/5","DOIUrl":"https://doi.org/10.34028/iajit/19/2/5","url":null,"abstract":"Connected and Automated Vehicles (CAVs) is an inspiring technology that has an immense prospect in minimizing road upsets and accidents, improving quality of life, and progressing the effectiveness of transportation systems. Owing to the advancements in the intelligent transportation system, CAV plays a vital role that can keeping life lively. CAV also offers to use to transportation care in producing societies protected more reasonable. The challenge over CAV applications is a new-fangled to enhance safety and efficiency. Cloud autonomous vehicles rely on a whole range of machine learning and data mining techniques to process all the sensor data. Supervised, Unsupervised, and even reinforcement learning are also being used in the process of creating cloud autonomous vehicles with the aim of error-free ones. At first, specialized algorithms have not been used directly in the cloud autonomous vehicles which need to be trained with various traffic environments. The creation of a traffic model environment to test the cloud autonomous vehicles is the prime motto of this paper. The deep Convolutional Neural Network (CNN) has been proposed under the traffic model to drive in a heavy traffic condition to evaluate the algorithm. This paper aims to research an insightful school of thought in the current challenges being faced in CAVs and the solutions by applying CNN. From the simulation results of the traffic model that has traffic and highway parameters, the CNN algorithm has come up with a 71.8% of error-free prediction.","PeriodicalId":13624,"journal":{"name":"Int. Arab J. Inf. Technol.","volume":"11 1","pages":"186-194"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81691250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Int. Arab J. Inf. Technol.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1