Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.37033
Hiba A. Abu-Alsaad
Due to the increased number of cars, outdoor parking is one of the critical problems. Moreover, the management of the parking system is also considered a difficult task. Humans, on the other hand, were acclimated to efficiently parking their automobiles by providing them with the precise location of parking in advance of their arrival. As a result of human inefficiency, it was unsuccessful and ultimately increased the compliance cost. As a result of the development of the notion of the Internet of Things. A lot of systems were installed regarding smart parking systems that are decreasing the cost but also contain a huge impact on the reduction of emissions from cars. While it is possible to integrate Internet of Things (IoT) devices into automobiles, such an approach will necessitates the deployment of additional infrastructure, which will raise the cost, and also it is not feasible within current infrastructure configurations. Then there's the fact that CCTV technology is widely available and also small enough to fit into any parking area without being noticeable. In this paper, Convolution Neural Network (CNN) based smart parking system is designed and implemented. The CNN is used to detect vacant and occupied parking spaces through CCTV cameras and provide feedback to the passengers. Furthermore, the proposed approach is using CNR and PKLot datasets for ensuring the effectiveness of the model. This was developed to solve the issues of time, cost, and accuracy with the existing systems. As a result, the proposed model provides excellent results in terms of accuracy. Moreover, it is cost-effective and saves time.
{"title":"CNN-Based Smart Parking System","authors":"Hiba A. Abu-Alsaad","doi":"10.3991/ijim.v17i11.37033","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37033","url":null,"abstract":"Due to the increased number of cars, outdoor parking is one of the critical problems. Moreover, the management of the parking system is also considered a difficult task. Humans, on the other hand, were acclimated to efficiently parking their automobiles by providing them with the precise location of parking in advance of their arrival. As a result of human inefficiency, it was unsuccessful and ultimately increased the compliance cost. As a result of the development of the notion of the Internet of Things. A lot of systems were installed regarding smart parking systems that are decreasing the cost but also contain a huge impact on the reduction of emissions from cars. While it is possible to integrate Internet of Things (IoT) devices into automobiles, such an approach will necessitates the deployment of additional infrastructure, which will raise the cost, and also it is not feasible within current infrastructure configurations. Then there's the fact that CCTV technology is widely available and also small enough to fit into any parking area without being noticeable. In this paper, Convolution Neural Network (CNN) based smart parking system is designed and implemented. The CNN is used to detect vacant and occupied parking spaces through CCTV cameras and provide feedback to the passengers. Furthermore, the proposed approach is using CNR and PKLot datasets for ensuring the effectiveness of the model. This was developed to solve the issues of time, cost, and accuracy with the existing systems. As a result, the proposed model provides excellent results in terms of accuracy. Moreover, it is cost-effective and saves time.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85928910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.36277
Suzan Husein, Darun Mudhafar, Saravana Balaji B
this paper proposed an architecture that is SenSquare, it is capable to carry various data sources which is coming through an open IOT program and throng sensor campaign, as well as displaying an integrated access for the utilizers. The goals of smart cities are to progress the quality of citizen in life through leveraging details on process of the urban scales that removed by diverse data source gathered at city broad deployment. In this paper checking the whole surfaces of a compound system, traversing through problems of various quality, this paper contract with the diverse data ranking, the Mobile Crowd sensing (MCS) administration to data ecological, acting information and integration, the services of IOT installation and redeployments. This study explained the suggested resolutions in cooperation with a functions and current ways to sitting unlock defies. Eventually, it pretends the ability of the SenSquare by jointly the desktop client and mobile.
{"title":"The Impact of a Collaborative IoT Framework for Smart Cities and Environmental Monitoring","authors":"Suzan Husein, Darun Mudhafar, Saravana Balaji B","doi":"10.3991/ijim.v17i11.36277","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.36277","url":null,"abstract":"this paper proposed an architecture that is SenSquare, it is capable to carry various data sources which is coming through an open IOT program and throng sensor campaign, as well as displaying an integrated access for the utilizers. The goals of smart cities are to progress the quality of citizen in life through leveraging details on process of the urban scales that removed by diverse data source gathered at city broad deployment. In this paper checking the whole surfaces of a compound system, traversing through problems of various quality, this paper contract with the diverse data ranking, the Mobile Crowd sensing (MCS) administration to data ecological, acting information and integration, the services of IOT installation and redeployments. This study explained the suggested resolutions in cooperation with a functions and current ways to sitting unlock defies. Eventually, it pretends the ability of the SenSquare by jointly the desktop client and mobile.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86259780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.39065
K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary
In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies.
{"title":"A Comparative Study for SDN Security Based on Machine Learning","authors":"K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39065","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39065","url":null,"abstract":"In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.39227
P. Vankúš
Our paper advocates the preparation of future mathematics teachers for the use of game-based learning and gamification technologies. For this purpose, we created a university course that is dedicated to familiarizing the students with basic concepts of game-based learning and gamification and to conveying direct experience with their use. We support the concept and activities in this course by the positive results of the research on the opinions of 115 students. We hope that the positive results and our description of the course will be an inspiration for the broader incorporation of game-based learning and gamification technologies into the training of future mathematics teachers. Limitations of our research are the research sample, we investigated students’ reactions only at the author’s home university. Therefore, in the future, the research could be done with a broader sample and studying more in detail the students’ beliefs related to game-based learning and gamification before and after the course to get a better view of their development.
{"title":"Game-Based Learning and Gamification Technologies in the Preparation of Future Mathematics Teachers","authors":"P. Vankúš","doi":"10.3991/ijim.v17i11.39227","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39227","url":null,"abstract":"Our paper advocates the preparation of future mathematics teachers for the use of game-based learning and gamification technologies. For this purpose, we created a university course that is dedicated to familiarizing the students with basic concepts of game-based learning and gamification and to conveying direct experience with their use. We support the concept and activities in this course by the positive results of the research on the opinions of 115 students. We hope that the positive results and our description of the course will be an inspiration for the broader incorporation of game-based learning and gamification technologies into the training of future mathematics teachers. Limitations of our research are the research sample, we investigated students’ reactions only at the author’s home university. Therefore, in the future, the research could be done with a broader sample and studying more in detail the students’ beliefs related to game-based learning and gamification before and after the course to get a better view of their development.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75128848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.39063
K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary
The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy.
{"title":"Cloud Intrusion Detection System Based on SVM","authors":"K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39063","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39063","url":null,"abstract":"The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.38907
Tuka Kareem Jebur
Security and safety are critical concerns in Vehicular Adhoc Networks. vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate routes. In this work, the Hybrid PSO-BAT Optimization Algorithm (HBPSO) Algorithm based on modified chaos -cellular neural network (Chaos - CNN) approaches has been proposed to overcome DDoS attacks. The suggest approaches consists of three-part which are hybrid optimization search algorithm to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then on Modified Chaotic CNN (MCCN) employed to prevent a malicious node from sending data to the destination by determining node that consumer more resource, packets lose or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The Chaos - CNN approached results to outperform similar models of the related work and the approach protects the VANETs with high accuracy of 0.8736, specificity of 0.9959, TPR of 0.9561, and FPR of 0.78, Detection rate 0.9561.
{"title":"Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET)","authors":"Tuka Kareem Jebur","doi":"10.3991/ijim.v17i11.38907","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38907","url":null,"abstract":"Security and safety are critical concerns in Vehicular Adhoc Networks. vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate routes. In this work, the Hybrid PSO-BAT Optimization Algorithm (HBPSO) Algorithm based on modified chaos -cellular neural network (Chaos - CNN) approaches has been proposed to overcome DDoS attacks. The suggest approaches consists of three-part which are hybrid optimization search algorithm to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then on Modified Chaotic CNN (MCCN) employed to prevent a malicious node from sending data to the destination by determining node that consumer more resource, packets lose or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter. The Chaos - CNN approached results to outperform similar models of the related work and the approach protects the VANETs with high accuracy of 0.8736, specificity of 0.9959, TPR of 0.9561, and FPR of 0.78, Detection rate 0.9561.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90785700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.39673
Thi Kim Anh Tran, Truong Nguyen Ngoc
Project-based learning is a student-centered approach to learning that emphasizes hands-on experiences, collaboration, and real-world problem-solving. The process of evaluating students' learning outcomes in a learning project, however, faces numerous challenges. This study investigates the potential of mobile e-portfolios on the Google Sites platform as a means of enhancing project-based learning in the field of physics education. The study utilized a quasi-experimental design with two groups: an experimental group and a control group. The data collected from the pre-test and post-test were analyzed using a t-test to determine the significance of the difference in the mean scores between the experimental group and the control group. The questionnaire data were analyzed using descriptive statistics to identify patterns and trends in student feedback. The results show that the use of mobile e-portfolios on the Google Sites platform significantly enhanced student interest and learning outcomes. After the pedagogical experiment, the experimental group's test scores (7.92) were higher than the control group's (5.22). According to the findings of the survey questionnaire given to the experimental group, the majority of students indicated that using mobile e-portfolios boosted their involvement and motivation to learning, as well as their ability to plan and present their project work. In conclusion, the findings of this study suggest that mobile e-portfolios on Google Sites can be an effective tool for enhancing project-based learning.
{"title":"Mobile E-Portfolios on Google Sites: A Tool for Enhancing Project-Based Learning","authors":"Thi Kim Anh Tran, Truong Nguyen Ngoc","doi":"10.3991/ijim.v17i11.39673","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39673","url":null,"abstract":"Project-based learning is a student-centered approach to learning that emphasizes hands-on experiences, collaboration, and real-world problem-solving. The process of evaluating students' learning outcomes in a learning project, however, faces numerous challenges. This study investigates the potential of mobile e-portfolios on the Google Sites platform as a means of enhancing project-based learning in the field of physics education. The study utilized a quasi-experimental design with two groups: an experimental group and a control group. The data collected from the pre-test and post-test were analyzed using a t-test to determine the significance of the difference in the mean scores between the experimental group and the control group. The questionnaire data were analyzed using descriptive statistics to identify patterns and trends in student feedback. The results show that the use of mobile e-portfolios on the Google Sites platform significantly enhanced student interest and learning outcomes. After the pedagogical experiment, the experimental group's test scores (7.92) were higher than the control group's (5.22). According to the findings of the survey questionnaire given to the experimental group, the majority of students indicated that using mobile e-portfolios boosted their involvement and motivation to learning, as well as their ability to plan and present their project work. In conclusion, the findings of this study suggest that mobile e-portfolios on Google Sites can be an effective tool for enhancing project-based learning.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88812623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.38139
Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin
Bring-Your-Own-Device (BYOD) is a phenomenon whereby an employee brings their own computing devices to work with them and use them in addition to or instead of company-supplied devices. BYOD helps organization to cut cost and improve the utilization of organizational resources. However, the impacts and phenomenon of BYOD is still unknown and scarcely discuss within the body of knowledge; warrant for further exploration of the topic. Therefore, the purpose of this paper is to develop and validate an instrument to measure BYOD and its productivity. The research went through various empirical stages. Based on other studies, a list of predictors and dependent variables was adopted. Based on the variables that have been identified, a pilot instrument was created in the second step. Third, an expert review process was used to validate the instrument. The face validity and reliability investigation of possible respondents was completed. As a result, a reliable instrument with six variables and thirty items was created to measures BYOD and productivity in the context of universities students in Malaysia.
BYOD (bring - your - own device)是一种现象,员工带着自己的计算设备上班,并在公司提供的设备之外使用它们。BYOD有助于组织降低成本,提高组织资源的利用率。然而,BYOD的影响和现象仍然是未知的,在知识体系内几乎没有讨论;有理由进一步探讨这个问题。因此,本文的目的是开发和验证一种测量BYOD及其生产力的仪器。研究经历了不同的实证阶段。在其他研究的基础上,采用了一系列预测因子和因变量。根据已确定的变量,在第二步中创建了一个试点仪器。第三,采用专家评审流程对仪器进行验证。完成了可能被调查者的面效度和信度调查。因此,一个具有六个变量和30个项目的可靠工具被创建来衡量马来西亚大学生的BYOD和生产力。
{"title":"\"Bring-Your-Own-Device\" (BYOD) and Productivity: Instrument Development and Validation","authors":"Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin","doi":"10.3991/ijim.v17i11.38139","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38139","url":null,"abstract":"Bring-Your-Own-Device (BYOD) is a phenomenon whereby an employee brings their own computing devices to work with them and use them in addition to or instead of company-supplied devices. BYOD helps organization to cut cost and improve the utilization of organizational resources. However, the impacts and phenomenon of BYOD is still unknown and scarcely discuss within the body of knowledge; warrant for further exploration of the topic. Therefore, the purpose of this paper is to develop and validate an instrument to measure BYOD and its productivity. The research went through various empirical stages. Based on other studies, a list of predictors and dependent variables was adopted. Based on the variables that have been identified, a pilot instrument was created in the second step. Third, an expert review process was used to validate the instrument. The face validity and reliability investigation of possible respondents was completed. As a result, a reliable instrument with six variables and thirty items was created to measures BYOD and productivity in the context of universities students in Malaysia.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89752516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.37369
Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj
Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.
{"title":"A Secure Recommender System Model for Service Placement in Wireless Networks","authors":"Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj","doi":"10.3991/ijim.v17i11.37369","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37369","url":null,"abstract":"Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80552511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-07DOI: 10.3991/ijim.v17i11.35483
V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar
The guard tour system helps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment. According to the existing system, the patrolling at each checkpoint is being executed by using RFID-based digital data loggers that records and save all patrolling entries internally. The data will be transferred manually by the guard once the patrolling is completed. In some cases, when there is a problem with the device, the system unable to retrieve the patrolling data that has been already stored in the device. In addition, the current system also not be able to track the guard’s movement, patrolling information, and incidents in real-time basis. The developed Security Guard Patrolling, Monitoring and Reporting (eSmartGuard) system is able incorporates many unique and intelligent technologies such as NFC, GPS and IoT to records and save the patrolling data automatically on the cloud/server in real-time basis. An important value-added feature of the system is real-time incidents notification that able to notify any risk of the guards instantly to the in-charged security officer. Furthermore, through the eSmartGuard, the patrolling information such as time, date, GPS coordinate, guard ID can be monitored and retrieved remotely via proposed Mobile Apps and Web at a convenient time. The eSmartGuard patrolling system is proposed to improve the safety of the people and assets by assisting the security guards to perform their patrolling duty efficiently.
{"title":"Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises","authors":"V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar","doi":"10.3991/ijim.v17i11.35483","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.35483","url":null,"abstract":"The guard tour system helps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment. According to the existing system, the patrolling at each checkpoint is being executed by using RFID-based digital data loggers that records and save all patrolling entries internally. The data will be transferred manually by the guard once the patrolling is completed. In some cases, when there is a problem with the device, the system unable to retrieve the patrolling data that has been already stored in the device. In addition, the current system also not be able to track the guard’s movement, patrolling information, and incidents in real-time basis. The developed Security Guard Patrolling, Monitoring and Reporting (eSmartGuard) system is able incorporates many unique and intelligent technologies such as NFC, GPS and IoT to records and save the patrolling data automatically on the cloud/server in real-time basis. An important value-added feature of the system is real-time incidents notification that able to notify any risk of the guards instantly to the in-charged security officer. Furthermore, through the eSmartGuard, the patrolling information such as time, date, GPS coordinate, guard ID can be monitored and retrieved remotely via proposed Mobile Apps and Web at a convenient time. The eSmartGuard patrolling system is proposed to improve the safety of the people and assets by assisting the security guards to perform their patrolling duty efficiently.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73147570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}