首页 > 最新文献

International Journal of System Assurance Engineering and Management最新文献

英文 中文
A review of wire and arc additive manufacturing using different property characterization, challenges and future trends 使用不同特性表征的线材和电弧增材制造、挑战和未来趋势综述
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-29 DOI: 10.1007/s13198-024-02472-y
Jyothi Padmaja Koduru, T. Vijay Kumar, Kedar Mallik Mantrala

Because of the reasonability of economically generating large-scale metal equipment with a very large rate of deposition, important development has been conducted in the learning of the “wire arc additive manufacturing (WAAM)” approach also the mechanical and microstructure features of the fabricated elements. The WAAM has emerged highly so the large range of the materials has accompanied the operation and its development fighting. It has enhanced as a very significant mechanism for the large metal equipment in various manufacturing organizations. Because of its arc-assisted deposition, high process cycle time, process stability, defect monitoring, and management are severe for the WAAM device to be employed in the organization. High improvements have been performed in the development of the process, control system, comprehensive operation monitoring, material evaluation, path slicing, and programming but still, it demands the improvement. Therefore, this article aims to give a detailed review of the WAAM systems to facilitate an easy and quick understanding of the current status and future prospects of WAAM. The stage-wise implementation of WAAM, usage of metals and alloys, process parameter effects, and methodologies used for improving the quality of WAAM components are discussed. The usage of hardware systems and technological parameters used for understanding the physical mechanism are also described in this research work. In addition, the monitoring systems such as acoustic sensing, optical inspection, thermal sensing, electrical sensing, and multi-sensor sensing are analyzed and the property characterization techniques also be evaluated in this study. On the other hand, the additive as well as the subtractive technologies and the artificial intelligence techniques utilized for improving the manufacturing level are discussed. Finally, the possible future research directions are provided for making further developments in WAAM by the researchers.

由于大型金属设备的经济性和高沉积率的合理性,在学习 "线弧快速成型制造(WAAM)"方法以及制造元素的机械和微观结构特征方面取得了重要发展。线弧快速成型(WAAM)技术的出现,使得大量材料的使用和发展都与之相伴。它已成为各种制造组织中大型金属设备的重要机制。由于其电弧辅助沉积,高工艺周期时间、工艺稳定性、缺陷监控和管理对 WAAM 设备在企业中的应用至关重要。虽然在工艺开发、控制系统、综合运行监控、材料评估、路径切片和编程等方面都有了很大改进,但仍需不断完善。因此,本文旨在对 WAAM 系统进行详细综述,以方便读者快速了解 WAAM 的现状和未来前景。文章讨论了 WAAM 的分阶段实施、金属和合金的使用、工艺参数的影响以及用于提高 WAAM 组件质量的方法。本研究还介绍了用于了解物理机制的硬件系统和技术参数的使用情况。此外,本研究还分析了声学传感、光学检测、热传感、电传感和多传感器传感等监测系统,并对性能表征技术进行了评估。另一方面,还讨论了为提高制造水平而采用的加法和减法技术以及人工智能技术。最后,研究人员为进一步开发 WAAM 提供了可能的未来研究方向。
{"title":"A review of wire and arc additive manufacturing using different property characterization, challenges and future trends","authors":"Jyothi Padmaja Koduru, T. Vijay Kumar, Kedar Mallik Mantrala","doi":"10.1007/s13198-024-02472-y","DOIUrl":"https://doi.org/10.1007/s13198-024-02472-y","url":null,"abstract":"<p>Because of the reasonability of economically generating large-scale metal equipment with a very large rate of deposition, important development has been conducted in the learning of the “wire arc additive manufacturing (WAAM)” approach also the mechanical and microstructure features of the fabricated elements. The WAAM has emerged highly so the large range of the materials has accompanied the operation and its development fighting. It has enhanced as a very significant mechanism for the large metal equipment in various manufacturing organizations. Because of its arc-assisted deposition, high process cycle time, process stability, defect monitoring, and management are severe for the WAAM device to be employed in the organization. High improvements have been performed in the development of the process, control system, comprehensive operation monitoring, material evaluation, path slicing, and programming but still, it demands the improvement. Therefore, this article aims to give a detailed review of the WAAM systems to facilitate an easy and quick understanding of the current status and future prospects of WAAM. The stage-wise implementation of WAAM, usage of metals and alloys, process parameter effects, and methodologies used for improving the quality of WAAM components are discussed. The usage of hardware systems and technological parameters used for understanding the physical mechanism are also described in this research work. In addition, the monitoring systems such as acoustic sensing, optical inspection, thermal sensing, electrical sensing, and multi-sensor sensing are analyzed and the property characterization techniques also be evaluated in this study. On the other hand, the additive as well as the subtractive technologies and the artificial intelligence techniques utilized for improving the manufacturing level are discussed. Finally, the possible future research directions are provided for making further developments in WAAM by the researchers.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142225047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
VADER-RF: a novel scheme for protecting user privacy on android devices VADER-RF:在安卓设备上保护用户隐私的新方案
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-28 DOI: 10.1007/s13198-024-02461-1
Manish Verma, Parma Nand

Android protects user privacy through its permission system and explains permission usage in privacy disclosure. Privacy disclosure often fails to predict app behavior accurately and leading to potential exploitation by malicious applications. To address this, we propose the VADER-RF technique, which combines VADER sentiment analysis with Random Forest machine learning to correlate privacy disclosures with app behavior. Our model analyzes privacy disclosure documents using sentiment analysis, extracting permissions from AndroidManifest.xml file, and explore the data flow analysis of Java files. These features were evaluated on Naive Bayes, SVM, Decision Tree and Random Forest machine learning models. The Random Forest model demonstrated superior performance with the highest accuracy (81.6%), precision (85.3%) and recall (89.4%). Kendall's Tau correlation coefficient is 0.54, which indicates that our model is moderate to strongly effective at predicting whether an app is malicious based on the selected features. Sentiment analysis significantly enhanced all models’ performance, underscoring the effectiveness of integrating sentiment analysis with traditional feature sets for advanced malware detection.

安卓通过权限系统保护用户隐私,并在隐私披露中解释权限的使用。隐私披露往往不能准确预测应用程序的行为,从而导致恶意应用程序的潜在利用。针对这一问题,我们提出了 VADER-RF 技术,该技术将 VADER 情感分析与随机森林机器学习相结合,将隐私披露与应用程序行为关联起来。我们的模型利用情感分析来分析隐私披露文件,从 AndroidManifest.xml 文件中提取权限,并探索 Java 文件的数据流分析。在 Naive Bayes、SVM、决策树和随机森林机器学习模型上对这些特征进行了评估。随机森林模型表现优异,准确率(81.6%)、精确率(85.3%)和召回率(89.4%)最高。Kendall's Tau 相关系数为 0.54,这表明我们的模型在根据所选特征预测应用程序是否为恶意应用程序方面具有中度到高度的有效性。情感分析大大提高了所有模型的性能,突出表明了将情感分析与传统特征集整合用于高级恶意软件检测的有效性。
{"title":"VADER-RF: a novel scheme for protecting user privacy on android devices","authors":"Manish Verma, Parma Nand","doi":"10.1007/s13198-024-02461-1","DOIUrl":"https://doi.org/10.1007/s13198-024-02461-1","url":null,"abstract":"<p>Android protects user privacy through its permission system and explains permission usage in privacy disclosure. Privacy disclosure often fails to predict app behavior accurately and leading to potential exploitation by malicious applications. To address this, we propose the VADER-RF technique, which combines VADER sentiment analysis with Random Forest machine learning to correlate privacy disclosures with app behavior. Our model analyzes privacy disclosure documents using sentiment analysis, extracting permissions from AndroidManifest.xml file, and explore the data flow analysis of Java files. These features were evaluated on Naive Bayes, SVM, Decision Tree and Random Forest machine learning models. The Random Forest model demonstrated superior performance with the highest accuracy (81.6%), precision (85.3%) and recall (89.4%). Kendall's Tau correlation coefficient is 0.54, which indicates that our model is moderate to strongly effective at predicting whether an app is malicious based on the selected features. Sentiment analysis significantly enhanced all models’ performance, underscoring the effectiveness of integrating sentiment analysis with traditional feature sets for advanced malware detection.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imbalanced data preprocessing model for web service classification 用于网络服务分类的不平衡数据预处理模型
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-28 DOI: 10.1007/s13198-024-02485-7
Wasiur Rhmann, Amaan Ishrat

Web services are a novel method of web application development. They allow business to adapt to a new environment and change quickly according to customer needs. The client requires high-quality web services with minimal response time, more security, and high availability. With the increasing demand for web services, the introduction of web services rapidly in the business environment has influenced rapidly the web service quality. In the present work, a novel model for web service classification is proposed. Three metaheuristic techniques: Whale optimization algorithm, Simulated annealing algorithm, and Ant colony optimization are used to select the best subset of features. Web service-based imbalanced dataset is balanced using SMOTETomek (Synthetic minority oversampling + Tomek link). Ensemble Adaboost and Gradient boosting algorithms are used for the creation of a web service prediction model. The publicly available QWS dataset is used for experimental purposes. The results of the proposed models are compared with machine learning techniques. It was observed that the Ant colony algorithm performed best for relevant feature selection and the Ensemble Adaboost and Gradient boosting algorithm outperformed all other machine learning techniques for web service classification.

网络服务是一种新颖的网络应用程序开发方法。网络服务使企业能够适应新的环境,并根据客户需求迅速做出改变。客户需要响应时间最短、安全性更高、可用性更强的高质量网络服务。随着网络服务需求的不断增加,网络服务在商业环境中的快速引入也迅速影响了网络服务质量。本研究提出了一种新的网络服务分类模型。三种元启发式技术:鲸鱼优化算法、模拟退火算法和蚁群优化被用来选择最佳特征子集。使用 SMOTETomek(合成少数超采样 + Tomek 链接)平衡基于网络服务的不平衡数据集。使用集合 Adaboost 和梯度提升算法创建网络服务预测模型。实验使用了公开的 QWS 数据集。所提模型的结果与机器学习技术进行了比较。结果表明,蚁群算法在相关特征选择方面表现最佳,而在网络服务分类方面,Ensemble Adaboost 和 Gradient boosting 算法的表现优于所有其他机器学习技术。
{"title":"Imbalanced data preprocessing model for web service classification","authors":"Wasiur Rhmann, Amaan Ishrat","doi":"10.1007/s13198-024-02485-7","DOIUrl":"https://doi.org/10.1007/s13198-024-02485-7","url":null,"abstract":"<p>Web services are a novel method of web application development. They allow business to adapt to a new environment and change quickly according to customer needs. The client requires high-quality web services with minimal response time, more security, and high availability. With the increasing demand for web services, the introduction of web services rapidly in the business environment has influenced rapidly the web service quality. In the present work, a novel model for web service classification is proposed. Three metaheuristic techniques: Whale optimization algorithm, Simulated annealing algorithm, and Ant colony optimization are used to select the best subset of features. Web service-based imbalanced dataset is balanced using SMOTETomek (Synthetic minority oversampling + Tomek link). Ensemble Adaboost and Gradient boosting algorithms are used for the creation of a web service prediction model. The publicly available QWS dataset is used for experimental purposes. The results of the proposed models are compared with machine learning techniques. It was observed that the Ant colony algorithm performed best for relevant feature selection and the Ensemble Adaboost and Gradient boosting algorithm outperformed all other machine learning techniques for web service classification.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing the security of botnet attacks detection using parallel gradient descent optimized four layered network (PGDOFLN) 利用并行梯度下降优化四层网络(PGDOFLN)提高僵尸网络攻击检测的安全性
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-27 DOI: 10.1007/s13198-024-02464-y
M. Uma Maheswari, K. Perumal

Internet of Things (IoT) gadget proliferation has resulted in unprecedented connectedness as well as simplicity, but it has raised serious security concerns. Botnet attacks can threaten the security, integrity and accessibility of critical data and services and IoT networks are susceptible to them. To increase the security to identify botnet attacks in IoT networks, this study suggests a model based on a Parallel Gradient Descent Optimized Four Layered Network (PGDOFLN).We gathered the CICIDS2017 dataset from Kaggle, which is used to train and assess the proposed model. Using a robust scalar to handle missing values allows for the normalization of data, the t-distributed stochastic neighbor embedding (t-SNE) technique is utilized for extracting the feature and the LASSO method is used for feature selection. This study on attack detection is based on PGDOFLN and uses a Python program. The simulated results showed that the suggested method outperforms existing methods with an accuracy (0.95), recall (0.95), precision (1.00), and f1 score (0.97). This study supports continuing attempts to protect IoT networks and safeguard private information, vital infrastructure, and sensitive data.

物联网(IoT)小工具的激增带来了前所未有的连接性和简便性,但也引发了严重的安全问题。僵尸网络攻击会威胁到关键数据和服务的安全性、完整性和可访问性,物联网网络很容易受到僵尸网络攻击的影响。为了提高识别物联网网络中僵尸网络攻击的安全性,本研究提出了一种基于并行梯度下降优化四层网络(PGDOFLN)的模型。我们从 Kaggle 收集了 CICIDS2017 数据集,用于训练和评估所提出的模型。我们从 Kaggle 收集了 CICIDS2017 数据集,并使用该数据集对所提出的模型进行了训练和评估。使用鲁棒标量处理缺失值可实现数据的归一化,使用 t 分布随机邻域嵌入(t-SNE)技术提取特征,并使用 LASSO 方法进行特征选择。该攻击检测研究基于 PGDOFLN,并使用 Python 程序。模拟结果表明,建议的方法在准确率(0.95)、召回率(0.95)、精确度(1.00)和 f1 分数(0.97)方面均优于现有方法。这项研究为保护物联网网络、保护私人信息、重要基础设施和敏感数据的持续尝试提供了支持。
{"title":"Enhancing the security of botnet attacks detection using parallel gradient descent optimized four layered network (PGDOFLN)","authors":"M. Uma Maheswari, K. Perumal","doi":"10.1007/s13198-024-02464-y","DOIUrl":"https://doi.org/10.1007/s13198-024-02464-y","url":null,"abstract":"<p>Internet of Things (IoT) gadget proliferation has resulted in unprecedented connectedness as well as simplicity, but it has raised serious security concerns. Botnet attacks can threaten the security, integrity and accessibility of critical data and services and IoT networks are susceptible to them. To increase the security to identify botnet attacks in IoT networks, this study suggests a model based on a Parallel Gradient Descent Optimized Four Layered Network (PGDOFLN).We gathered the CICIDS2017 dataset from Kaggle, which is used to train and assess the proposed model. Using a robust scalar to handle missing values allows for the normalization of data, the t-distributed stochastic neighbor embedding (t-SNE) technique is utilized for extracting the feature and the LASSO method is used for feature selection. This study on attack detection is based on PGDOFLN and uses a Python program. The simulated results showed that the suggested method outperforms existing methods with an accuracy (0.95), recall (0.95), precision (1.00), and f1 score (0.97). This study supports continuing attempts to protect IoT networks and safeguard private information, vital infrastructure, and sensitive data.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient classification of remote sensing images using DF-DNLSTM: a deep feature densenet bidirectional long short term memory model 使用 DF-DNLSTM:深度特征双向长短期记忆模型对遥感图像进行高效分类
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-25 DOI: 10.1007/s13198-024-02466-w
Monika Kumari, Ajay Kaul

Scene classification in remote sensing is challenging due to high inter-class similarity and low intra-class similarity. Numerous techniques have been introduced, but accurately classifying scenes remains arduous. To address this challenge, To address this, we propose a hybrid framework, DF-DNLSTM, integrating DenseNet-121 for feature extraction and BiLSTM for sequential modeling, enhancing accuracy and contextual understanding. Second, a Conditional Generative Adversarial Network (CGAN) is employed for data augmentation, improving training data quantity and quality. Finally, the study introduces SwarmHawk, a hybrid optimization algorithm that combines particle swarm optimization (PSO) and Harris hawk optimization (HHO). SwarmHawk ensures the selection of informative features while concurrently eliminating duplicates and redundancies. It also reduces computational time to 4863 s. The proposed DF-DNLSTM model is rigorously assessed on three public datasets-UCM, AID, and NWPU. Results demonstrate its superior efficacy, achieving 99.87% accuracy on UCM, equivalent accuracy on NWPU, and sustaining 98.57% accuracy on AID. This study establishes DF-DNLSTM’s effectiveness, highlighting its potential contributions to advancing remote sensing scene classification.

由于类间相似性高而类内相似性低,遥感中的场景分类具有挑战性。虽然已经引入了许多技术,但要对场景进行精确分类仍然十分困难。为了应对这一挑战,我们提出了一种混合框架 DF-DNLSTM,它整合了用于特征提取的 DenseNet-121 和用于序列建模的 BiLSTM,从而提高了准确性和上下文理解能力。其次,采用条件生成对抗网络(CGAN)进行数据扩增,提高了训练数据的数量和质量。最后,研究引入了一种混合优化算法 SwarmHawk,它结合了粒子群优化(PSO)和哈里斯鹰优化(HHO)。SwarmHawk 确保选择信息丰富的特征,同时消除重复和冗余。我们在三个公共数据集--UCM、AID 和 NWPU 上对所提出的 DF-DNLSTM 模型进行了严格评估。结果表明,该模型具有卓越的功效,在 UCM 上达到了 99.87% 的准确率,在 NWPU 上达到了同等准确率,在 AID 上保持了 98.57% 的准确率。这项研究证实了 DF-DNLSTM 的有效性,并强调了它在推进遥感场景分类方面的潜在贡献。
{"title":"Efficient classification of remote sensing images using DF-DNLSTM: a deep feature densenet bidirectional long short term memory model","authors":"Monika Kumari, Ajay Kaul","doi":"10.1007/s13198-024-02466-w","DOIUrl":"https://doi.org/10.1007/s13198-024-02466-w","url":null,"abstract":"<p>Scene classification in remote sensing is challenging due to high inter-class similarity and low intra-class similarity. Numerous techniques have been introduced, but accurately classifying scenes remains arduous. To address this challenge, To address this, we propose a hybrid framework, DF-DNLSTM, integrating DenseNet-121 for feature extraction and BiLSTM for sequential modeling, enhancing accuracy and contextual understanding. Second, a Conditional Generative Adversarial Network (CGAN) is employed for data augmentation, improving training data quantity and quality. Finally, the study introduces SwarmHawk, a hybrid optimization algorithm that combines particle swarm optimization (PSO) and Harris hawk optimization (HHO). SwarmHawk ensures the selection of informative features while concurrently eliminating duplicates and redundancies. It also reduces computational time to 4863 s. The proposed DF-DNLSTM model is rigorously assessed on three public datasets-UCM, AID, and NWPU. Results demonstrate its superior efficacy, achieving 99.87% accuracy on UCM, equivalent accuracy on NWPU, and sustaining 98.57% accuracy on AID. This study establishes DF-DNLSTM’s effectiveness, highlighting its potential contributions to advancing remote sensing scene classification.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing university network management and security: a real-time monitoring, visualization & cyber attack detection approach using Paessler PRTG and Sophos Firewall 加强大学网络管理和安全:使用 Paessler PRTG 和 Sophos 防火墙的实时监控、可视化和网络攻击检测方法
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-25 DOI: 10.1007/s13198-024-02448-y
Afrah Fathima, G. Shree Devi

Network traffic monitoring and visualization are essential for university network management and security. This research study uses the Paessler’s PRTG Network Monitoring Tool and Sophos Firewall to monitor and visualize a Campus network traffic in real time. The proposed system gives university network administrators complete access into traffic patterns, security concerns, and performance metrics for efficient network administration and improved security. The research begins with university network issues, including rising bandwidth demand, diversified traffic, and changing security threats. The paper then discusses the PRTG Tool, a popular network-monitoring tool with strong scalability, and Sophos Firewall, a sophisticated network security solution. The integration of the two tools underpins the proposed real-time monitoring system. It also describes the system design, which uses PRTG Network Monitor sensors strategically distributed throughout the network infrastructure to collect real-time network traffic statistics. These sensors collect traffic data using SNMP and flow technologies such as NetFlow or sFlow. The monitoring system and Sophos Firewall enable real-time threat detection and prevention to improve security. The research paper also discusses the data visualization features of the PRTG Network Monitor. It shows how graphs, charts, and dashboards help network managers understand traffic patterns and spot anomalies and make informed network optimization and security decisions. The paper also discusses a case study of a university network using the proposed approach. The results show that real-time monitoring and visualization can improve network administration and security. This paper presents a real-time network traffic monitoring and visualization solution for university networks.

网络流量监控和可视化对大学网络管理和安全至关重要。本研究使用 Paessler 的 PRTG 网络监控工具和 Sophos 防火墙对校园网络流量进行实时监控和可视化。建议的系统可让大学网络管理员全面了解流量模式、安全问题和性能指标,从而提高网络管理效率和安全性。研究从大学网络问题入手,包括不断增长的带宽需求、多样化的流量和不断变化的安全威胁。然后,论文讨论了 PRTG 工具和 Sophos 防火墙,前者是一种流行的网络监控工具,具有很强的可扩展性,后者是一种先进的网络安全解决方案。这两个工具的集成是所建议的实时监控系统的基础。报告还介绍了系统设计,该系统使用战略性地分布在整个网络基础设施中的 PRTG 网络监控传感器来收集实时网络流量统计数据。这些传感器使用 SNMP 和 NetFlow 或 sFlow 等流量技术收集流量数据。监控系统和 Sophos 防火墙可实现实时威胁检测和预防,从而提高安全性。研究论文还讨论了 PRTG 网络监控器的数据可视化功能。它展示了图形、图表和仪表板如何帮助网络管理员了解流量模式、发现异常并做出明智的网络优化和安全决策。论文还讨论了一个使用所建议方法的大学网络案例研究。结果表明,实时监控和可视化可改善网络管理和安全性。本文介绍了针对大学网络的实时网络流量监控和可视化解决方案。
{"title":"Enhancing university network management and security: a real-time monitoring, visualization & cyber attack detection approach using Paessler PRTG and Sophos Firewall","authors":"Afrah Fathima, G. Shree Devi","doi":"10.1007/s13198-024-02448-y","DOIUrl":"https://doi.org/10.1007/s13198-024-02448-y","url":null,"abstract":"<p>Network traffic monitoring and visualization are essential for university network management and security. This research study uses the Paessler’s PRTG Network Monitoring Tool and Sophos Firewall to monitor and visualize a Campus network traffic in real time. The proposed system gives university network administrators complete access into traffic patterns, security concerns, and performance metrics for efficient network administration and improved security. The research begins with university network issues, including rising bandwidth demand, diversified traffic, and changing security threats. The paper then discusses the PRTG Tool, a popular network-monitoring tool with strong scalability, and Sophos Firewall, a sophisticated network security solution. The integration of the two tools underpins the proposed real-time monitoring system. It also describes the system design, which uses PRTG Network Monitor sensors strategically distributed throughout the network infrastructure to collect real-time network traffic statistics. These sensors collect traffic data using SNMP and flow technologies such as NetFlow or sFlow. The monitoring system and Sophos Firewall enable real-time threat detection and prevention to improve security. The research paper also discusses the data visualization features of the PRTG Network Monitor. It shows how graphs, charts, and dashboards help network managers understand traffic patterns and spot anomalies and make informed network optimization and security decisions. The paper also discusses a case study of a university network using the proposed approach. The results show that real-time monitoring and visualization can improve network administration and security. This paper presents a real-time network traffic monitoring and visualization solution for university networks.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparative approach on crop detection using machine learning and deep learning techniques 使用机器学习和深度学习技术进行作物检测的比较方法
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-23 DOI: 10.1007/s13198-024-02483-9
V. Nithya, M. S. Josephine, V. Jeyabalaraja

Agriculture is an expanding area of study. Crop prediction in agriculture is highly dependent on soil and environmental factors, such as rainfall, humidity, and temperature. Previously, farmers had the authority to select the crop to be farmed, oversee its development, and ascertain the optimal harvest time. The farming community is facing challenges in sustaining its practices due to the swift alterations in climatic conditions. Therefore, machine learning algorithms have replaced traditional methods in predicting agricultural productivity in recent years. To guarantee optimal precision through a specific machine learning approach. Authors extend their approach not limited to Machine Learning but also with Deep Learning Techniques. We use machine and deep learning algorithms to predict crop outcomes accurately. In this proposed model, we utilise machine learning algorithms such as Naive Bayes, decision tree, and KNN. It is worth noting that the decision tree algorithm demonstrates superior performance compared to the other algorithms, achieving an accuracy rate of 83%. In order to enhance the precision, we have suggested implementing a deep learning technique, specifically a convolutional neural network, to identify the crops. Achieving an accuracy of 93.54% was made possible by implementing this advanced deep-learning model.

农业是一个不断扩展的研究领域。农业中的作物预测在很大程度上取决于土壤和环境因素,如降雨量、湿度和温度。以前,农民有权选择要耕种的作物、监督其生长发育并确定最佳收获时间。由于气候条件的急剧变化,农业社区在维持耕作方面正面临着挑战。因此,近年来机器学习算法取代了传统的农业生产力预测方法。通过特定的机器学习方法来保证最佳精度。作者将他们的方法不仅限于机器学习,还扩展到了深度学习技术。我们使用机器学习和深度学习算法来准确预测作物结果。在这个建议的模型中,我们使用了机器学习算法,如 Naive Bayes、决策树和 KNN。值得注意的是,与其他算法相比,决策树算法表现出更优越的性能,准确率达到 83%。为了提高准确率,我们建议采用深度学习技术,特别是卷积神经网络来识别农作物。通过采用这种先进的深度学习模型,准确率达到了 93.54%。
{"title":"Comparative approach on crop detection using machine learning and deep learning techniques","authors":"V. Nithya, M. S. Josephine, V. Jeyabalaraja","doi":"10.1007/s13198-024-02483-9","DOIUrl":"https://doi.org/10.1007/s13198-024-02483-9","url":null,"abstract":"<p>Agriculture is an expanding area of study. Crop prediction in agriculture is highly dependent on soil and environmental factors, such as rainfall, humidity, and temperature. Previously, farmers had the authority to select the crop to be farmed, oversee its development, and ascertain the optimal harvest time. The farming community is facing challenges in sustaining its practices due to the swift alterations in climatic conditions. Therefore, machine learning algorithms have replaced traditional methods in predicting agricultural productivity in recent years. To guarantee optimal precision through a specific machine learning approach. Authors extend their approach not limited to Machine Learning but also with Deep Learning Techniques. We use machine and deep learning algorithms to predict crop outcomes accurately. In this proposed model, we utilise machine learning algorithms such as Naive Bayes, decision tree, and KNN. It is worth noting that the decision tree algorithm demonstrates superior performance compared to the other algorithms, achieving an accuracy rate of 83%. In order to enhance the precision, we have suggested implementing a deep learning technique, specifically a convolutional neural network, to identify the crops. Achieving an accuracy of 93.54% was made possible by implementing this advanced deep-learning model.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194406","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal forecasting by converting stochastic behaviour into a stable pattern in electric grid 通过将电网中的随机行为转化为稳定模式进行时间预测
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-22 DOI: 10.1007/s13198-024-02454-0
Akram Qashou, Sufian Yousef, Firas Hazzaa, Kahtan Aziz

The malfunction variables of power stations are related to the areas of weather, physical structure, control, and load behavior. To predict temporal power failure is difficult due to their unpredictable characteristics. As high accuracy is normally required, the estimation of failures of short-term temporal prediction is highly difficult. This study presents a method for converting stochastic behavior into a stable pattern, which can subsequently be used in a short-term estimator. For this conversion, K-means clustering is employed, followed by long-short-term memory and gated recurrent unit algorithms are used to perform the short-term estimation. The environment, the operation, and the generated signal factors are all simulated using mathematical models. Weather parameters and load samples have been collected as part of a dataset. Monte-Carlo simulation using MATLAB programming has been used to conduct experimental estimation of failures. The estimated failures of the experiment are then compared with the actual system temporal failures and found to be in good match. Therefore, to address the gap in knowledge for any future power grid estimated failures, the achieved results in this paper form good basis for a testbed to estimate any grid future failures.

发电站的故障变量与天气、物理结构、控制和负荷行为等方面有关。由于其不可预测的特性,预测时间性电力故障非常困难。由于通常要求高精度,短期时间预测的故障估计非常困难。本研究提出了一种将随机行为转换为稳定模式的方法,这种模式随后可用于短期估算。在这种转换中,采用了 K 均值聚类,然后使用长短期记忆和门控递归单元算法来进行短期估算。环境、运行和生成的信号因素都是通过数学模型模拟的。天气参数和负荷样本已作为数据集的一部分收集起来。使用 MATLAB 编程进行蒙特卡洛模拟,对故障进行实验估算。然后将实验估计的故障与实际的系统时间故障进行比较,发现两者非常吻合。因此,为了填补未来电网故障估计方面的知识空白,本文所取得的成果为电网未来故障估计试验台奠定了良好的基础。
{"title":"Temporal forecasting by converting stochastic behaviour into a stable pattern in electric grid","authors":"Akram Qashou, Sufian Yousef, Firas Hazzaa, Kahtan Aziz","doi":"10.1007/s13198-024-02454-0","DOIUrl":"https://doi.org/10.1007/s13198-024-02454-0","url":null,"abstract":"<p>The malfunction variables of power stations are related to the areas of weather, physical structure, control, and load behavior. To predict temporal power failure is difficult due to their unpredictable characteristics. As high accuracy is normally required, the estimation of failures of short-term temporal prediction is highly difficult. This study presents a method for converting stochastic behavior into a stable pattern, which can subsequently be used in a short-term estimator. For this conversion, K-means clustering is employed, followed by long-short-term memory and gated recurrent unit algorithms are used to perform the short-term estimation. The environment, the operation, and the generated signal factors are all simulated using mathematical models. Weather parameters and load samples have been collected as part of a dataset. Monte-Carlo simulation using MATLAB programming has been used to conduct experimental estimation of failures. The estimated failures of the experiment are then compared with the actual system temporal failures and found to be in good match. Therefore, to address the gap in knowledge for any future power grid estimated failures, the achieved results in this paper form good basis for a testbed to estimate any grid future failures.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain data asset management technology based on a two-way transaction algorithm 基于双向交易算法的区块链数据资产管理技术
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-20 DOI: 10.1007/s13198-024-02474-w
Pengju Xia

Blockchain data asset transaction technology has advantages such as decentralization and data that cannot be tampered with, which can expand the application field of blockchain technology. However, the consensus algorithm widely used in the current blockchain system with the low consensus efficiency makes the development of blockchain technology significantly restricted. Regarding the above-mentioned problems, this research proposes an improved two-way transaction algorithm based on the theory of practical Byzantine fault-tolerant algorithm. The consensus protocol of the algorithm is improved when there is no Byzantine node. The purpose is to reduce the traffic generated during consensus so that the algorithm can be kept in the best state, and ensure that the algorithm can execute the consensus protocol in any period. The experimental results showed that the proposed two-way transaction algorithm had shorter transaction delay and lower traffic than the traditional Byzantine fault-tolerant algorithm. The former had the highest stability value of 0.98 at low, medium and high bandwidth, which was much higher than that the latter's 0.90. Applying the designed bidirectional trading algorithm to the blockchain data asset trading system, it is found that the number of blocks generated by the trading system was about 50 per second, the delay was about 8 s, and the success rate was 100%. In each node, the memory consumption of the peer node was about 128 M and the CPU consumption was about 48%. It can be seen that the transaction model proposed in this study can not only meet the usage needs, but also optimize the system security.

区块链数据资产交易技术具有去中心化、数据不可篡改等优势,可以拓展区块链技术的应用领域。然而,当前区块链系统中广泛使用的共识算法,共识效率较低,使得区块链技术的发展受到很大限制。针对上述问题,本研究基于实用拜占庭容错算法理论,提出了一种改进的双向交易算法。在不存在拜占庭节点的情况下,改进了算法的共识协议。目的是减少共识过程中产生的流量,使算法保持在最佳状态,保证算法在任何时期都能执行共识协议。实验结果表明,与传统的拜占庭容错算法相比,提出的双向事务算法具有更短的事务延迟和更低的流量。前者在低、中、高带宽下的稳定性值最高,达到 0.98,远高于后者的 0.90。将所设计的双向交易算法应用于区块链数据资产交易系统,发现交易系统每秒产生的区块数量约为 50 个,延迟约为 8 秒,成功率为 100%。在每个节点中,对等节点的内存消耗约为 128 M,CPU 消耗约为 48%。由此可见,本研究提出的交易模型不仅能满足使用需求,还能优化系统安全性。
{"title":"Blockchain data asset management technology based on a two-way transaction algorithm","authors":"Pengju Xia","doi":"10.1007/s13198-024-02474-w","DOIUrl":"https://doi.org/10.1007/s13198-024-02474-w","url":null,"abstract":"<p>Blockchain data asset transaction technology has advantages such as decentralization and data that cannot be tampered with, which can expand the application field of blockchain technology. However, the consensus algorithm widely used in the current blockchain system with the low consensus efficiency makes the development of blockchain technology significantly restricted. Regarding the above-mentioned problems, this research proposes an improved two-way transaction algorithm based on the theory of practical Byzantine fault-tolerant algorithm. The consensus protocol of the algorithm is improved when there is no Byzantine node. The purpose is to reduce the traffic generated during consensus so that the algorithm can be kept in the best state, and ensure that the algorithm can execute the consensus protocol in any period. The experimental results showed that the proposed two-way transaction algorithm had shorter transaction delay and lower traffic than the traditional Byzantine fault-tolerant algorithm. The former had the highest stability value of 0.98 at low, medium and high bandwidth, which was much higher than that the latter's 0.90. Applying the designed bidirectional trading algorithm to the blockchain data asset trading system, it is found that the number of blocks generated by the trading system was about 50 per second, the delay was about 8 s, and the success rate was 100%. In each node, the memory consumption of the peer node was about 128 M and the CPU consumption was about 48%. It can be seen that the transaction model proposed in this study can not only meet the usage needs, but also optimize the system security.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142224889","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effective fault localization using probabilistic and grouping approach 利用概率和分组方法进行有效的故障定位
IF 2 Q2 ENGINEERING, MULTIDISCIPLINARY Pub Date : 2024-08-18 DOI: 10.1007/s13198-024-02479-5
Saksham Sahai Srivastava, Arpita Dutta, Rajib Mall

Fault localization (FL) is the key activity while debugging a program. Any improvement to this activity leads to significant improvement in total software development cost. In the paper, we present a conditional probability statistics based fault localization technique that derives the association between statement coverage information and test case execution result. This association with the failed test case result shows the fault containing probability of that specific statement. Subsequently, we use a grouping method to refine the obtained statement ranking sequence for better fault localization. We named our proposed FL technique as CGFL, it is an abbreviation of Conditional probability and Grouping based Fault Localization. We evaluated the effectiveness of the proposed method over eleven open-source data sets from Defects4j and SIR repositories. Our obtained results show that on average, the proposed CGFL method is 24.56% more effective than contemporary FL techniques namely D(^*), Tarantula, Ochiai, Crosstab, BPNN, RBFNN, DNN, and CNN.

故障定位(FL)是调试程序的关键活动。对这项工作的任何改进都会显著提高软件开发的总成本。在本文中,我们提出了一种基于条件概率统计的故障定位技术,该技术可以推导出语句覆盖信息与测试用例执行结果之间的关联。这种与失败测试用例结果之间的关联显示了特定语句包含故障的概率。随后,我们使用分组方法对获得的语句排序序列进行细化,以更好地进行故障定位。我们将所提出的故障定位技术命名为 CGFL,它是基于条件概率和分组的故障定位技术的缩写。我们在 Defects4j 和 SIR 存储库中的 11 个开源数据集上评估了所提方法的有效性。结果表明,与 D(^*), Tarantula, Ochiai, Crosstab, BPNN, RBFNN, DNN 和 CNN 等当代故障定位技术相比,所提出的 CGFL 方法平均有效率高出 24.56%。
{"title":"Effective fault localization using probabilistic and grouping approach","authors":"Saksham Sahai Srivastava, Arpita Dutta, Rajib Mall","doi":"10.1007/s13198-024-02479-5","DOIUrl":"https://doi.org/10.1007/s13198-024-02479-5","url":null,"abstract":"<p>Fault localization (FL) is the key activity while debugging a program. Any improvement to this activity leads to significant improvement in total software development cost. In the paper, we present a conditional probability statistics based fault localization technique that derives the association between statement coverage information and test case execution result. This association with the failed test case result shows the fault containing probability of that specific statement. Subsequently, we use a grouping method to refine the obtained statement ranking sequence for better fault localization. We named our proposed FL technique as CGFL, it is an abbreviation of Conditional probability and Grouping based Fault Localization. We evaluated the effectiveness of the proposed method over eleven open-source data sets from Defects4j and SIR repositories. Our obtained results show that on average, the proposed CGFL method is 24.56% more effective than contemporary FL techniques namely D<span>(^*)</span>, Tarantula, Ochiai, Crosstab, BPNN, RBFNN, DNN, and CNN.</p>","PeriodicalId":14463,"journal":{"name":"International Journal of System Assurance Engineering and Management","volume":null,"pages":null},"PeriodicalIF":2.0,"publicationDate":"2024-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142194371","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of System Assurance Engineering and Management
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1