首页 > 最新文献

Int. J. Commun. Networks Inf. Secur.最新文献

英文 中文
Cognitive Computing for Multimodal Sentiment Sensing and Emotion Recognition Fusion Based on Machine Learning Techniques Implemented by Computer Interface System 基于机器学习技术的多模态情感感知和情感识别融合的认知计算
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5462
Dr. Arun Kumar Marandi, G. Jethava, A. Rajesh, Sachin Gupta, Shrddha Sagar, Sonia Sharma
A multiple slot fractal antenna design has been determined communication efficiency and its multi-function activities.  High-speed small communication devices have been required for future smart chip applications, so that researchers have been employed new and creative antenna design. Antennas are key part in communication systems, those are used to improve communication parameters like gain, efficiency, and bandwidth. Consistently, modern antennas design with high bandwidth and gain balancing is very difficult, therefore an adaptive antenna array chip design is required. In this research work a coaxial fed antenna with fractal geometry design has been implemented for Wi-Fi and Radio altimeter application. The fractal geometry has been taken with multiple numbers of slots in the radiating structure for uncertain applications. The coaxial feeding location has been selected based on the good impedance matching condition (50 Ohms). The overall dimension mentioned for antenna are approximately 50X50X1.6 mm on FR4 substrate and performance characteristic analysis is performed with change in substrate material presented in this work. Dual-band resonant frequency is being emitted by the antenna with resonance at 3.1 and 4.3 GHz for FR4 substrate material and change in the resonant bands is obtained with change in substrate. The proposed Antenna is prototyped on Anritsu VNA tool and presented the comparative analysis like VSWR 12%, reflection coefficient 9.4%,3D-Gain 6.2% and surface current 9.3% had been improved.
多槽分形天线设计确定了天线的通信效率和多功能活动。未来的智能芯片应用需要高速小型通信设备,因此研究人员已经采用了新的和创造性的天线设计。天线是通信系统的关键部件,用于提高通信参数,如增益、效率和带宽。由于现代天线的高带宽和增益平衡设计非常困难,因此需要一种自适应天线阵列芯片的设计。本研究实现了一种分形几何设计的同轴馈电天线,用于Wi-Fi和无线电高度计。在不确定应用中,采用了辐射结构中多槽的分形几何。根据良好的阻抗匹配条件(50欧姆)选择了同轴馈电位置。上述天线在FR4基板上的整体尺寸约为50X50X1.6 mm,本文对基板材料的变化进行了性能特性分析。天线发射双频谐振频率,FR4衬底材料谐振在3.1 GHz和4.3 GHz,谐振频带随衬底变化而变化。该天线在安立VNA工具上进行了样机设计,并进行了对比分析,结果表明该天线的驻波比提高了12%,反射系数提高了9.4%,3d增益提高了6.2%,表面电流提高了9.3%。
{"title":"Cognitive Computing for Multimodal Sentiment Sensing and Emotion Recognition Fusion Based on Machine Learning Techniques Implemented by Computer Interface System","authors":"Dr. Arun Kumar Marandi, G. Jethava, A. Rajesh, Sachin Gupta, Shrddha Sagar, Sonia Sharma","doi":"10.17762/ijcnis.v14i2.5462","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5462","url":null,"abstract":"A multiple slot fractal antenna design has been determined communication efficiency and its multi-function activities.  High-speed small communication devices have been required for future smart chip applications, so that researchers have been employed new and creative antenna design. Antennas are key part in communication systems, those are used to improve communication parameters like gain, efficiency, and bandwidth. Consistently, modern antennas design with high bandwidth and gain balancing is very difficult, therefore an adaptive antenna array chip design is required. In this research work a coaxial fed antenna with fractal geometry design has been implemented for Wi-Fi and Radio altimeter application. The fractal geometry has been taken with multiple numbers of slots in the radiating structure for uncertain applications. The coaxial feeding location has been selected based on the good impedance matching condition (50 Ohms). The overall dimension mentioned for antenna are approximately 50X50X1.6 mm on FR4 substrate and performance characteristic analysis is performed with change in substrate material presented in this work. Dual-band resonant frequency is being emitted by the antenna with resonance at 3.1 and 4.3 GHz for FR4 substrate material and change in the resonant bands is obtained with change in substrate. The proposed Antenna is prototyped on Anritsu VNA tool and presented the comparative analysis like VSWR 12%, reflection coefficient 9.4%,3D-Gain 6.2% and surface current 9.3% had been improved.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115789065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of Computer Network Security Storage System Based on Cloud Computing Environment 基于云计算环境的计算机网络安全存储系统分析
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5463
Daxa Vekariya, M. Kannan, Sachin Gupta, P. Muthusamy, Rohini Mahajan, Arvind Kumar Pandey
A fundamental component of cloud computers from a business perspective is that users are allowed to use any desire and pay with a product that desire. Its cloud services were accessible anytime and anywhere consumers needed them. As a result, consumers are free to purchase whatever IT services they want, and they don't have to worry about how easy things can be managed. The remote server is used in a new information storage computing architecture that is considered an Internet generation. Ensuring security, material at resource providers' sites is a challenge that must be addressed in cloud technology. Thus, rather than reliance on a single provider for knowledge storing, this research implies developing construction for protection of knowledge stockpiling with a variation of operations, in which knowledge is scrambled and divided into numerous cipher frames and distributed across a large number of provider places. This support was applied to provide greater security, scalability, or reliability that was suggested according to the new structure. This paper, presented an encoded model for the cloud environment to improve security. The proposed model comprises the parity metadata for the database management provision to the provider. In the developed encoder chunks parity is not stored within the single resources with the provision of the available information chunks. The constructed security architecture in the RAID layer increases the dependability of the data with the deployment of the RAID 10 deployment. The developed RAID-based encoder chunks exhibit improved efficiency for the higher uptime at a minimal cost.
从商业角度来看,云计算的一个基本组成部分是允许用户使用任何想要的产品并为其付费。消费者可以随时随地使用它的云服务。因此,消费者可以自由地购买他们想要的任何IT服务,他们不必担心如何轻松地管理事物。远程服务器被用于一种新的信息存储计算体系结构,这种体系结构被认为是Internet的一代。确保资源提供商站点上的材料的安全性是云技术必须解决的一个挑战。因此,与其依赖于单一的知识存储提供者,本研究意味着开发具有多种操作的知识存储保护结构,其中知识被打乱并分成许多密码帧并分布在大量的提供者位置。应用这种支持是为了提供根据新结构建议的更高的安全性、可伸缩性或可靠性。本文提出了一种用于云环境的编码模型,以提高安全性。所建议的模型包括向提供者提供数据库管理的奇偶校验元数据。在所开发的编码器中,块奇偶校验不存储在提供可用信息块的单个资源中。RAID层构建的安全架构,通过RAID 10的部署,增加了数据的可靠性。开发的基于raid的编码器块以最小的成本提高了正常运行时间的效率。
{"title":"Analysis of Computer Network Security Storage System Based on Cloud Computing Environment","authors":"Daxa Vekariya, M. Kannan, Sachin Gupta, P. Muthusamy, Rohini Mahajan, Arvind Kumar Pandey","doi":"10.17762/ijcnis.v14i2.5463","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5463","url":null,"abstract":"A fundamental component of cloud computers from a business perspective is that users are allowed to use any desire and pay with a product that desire. Its cloud services were accessible anytime and anywhere consumers needed them. As a result, consumers are free to purchase whatever IT services they want, and they don't have to worry about how easy things can be managed. The remote server is used in a new information storage computing architecture that is considered an Internet generation. Ensuring security, material at resource providers' sites is a challenge that must be addressed in cloud technology. Thus, rather than reliance on a single provider for knowledge storing, this research implies developing construction for protection of knowledge stockpiling with a variation of operations, in which knowledge is scrambled and divided into numerous cipher frames and distributed across a large number of provider places. This support was applied to provide greater security, scalability, or reliability that was suggested according to the new structure. This paper, presented an encoded model for the cloud environment to improve security. The proposed model comprises the parity metadata for the database management provision to the provider. In the developed encoder chunks parity is not stored within the single resources with the provision of the available information chunks. The constructed security architecture in the RAID layer increases the dependability of the data with the deployment of the RAID 10 deployment. The developed RAID-based encoder chunks exhibit improved efficiency for the higher uptime at a minimal cost.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132750775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV 利用IDSAODV和反向AODV改进黑洞攻击检测AODV的性能
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5483
M. Al-Shabi
The so-called Black Hole Attack is among the most perilous and widespread security attacks in MANET nets, researchers have been tasked with developing strategies to detect it. Two of these methods are the Intrusion Detection System AODV (IDSAODV) as well as the Extended AODV. The present paper attempts to investigate the impact of a Black Hole Attack on the functionality of the network in the existence of single or more attackers. It also evaluates the Extended AODV and IDSAODV in a net in order to see how effectively they could detect and mitigate the attack. For the aim of evaluating its performance, the researchers utilized Throughput, Normalized Routing Load (NRL), and Packet Delivery Ratio (PDR). The comprehensive simulation results show that the IDSAODV application decreased the effect of the attacks. However, it raised the rate of packet delivery to sixty eight percent at the identical time. Reverse AODV, on the other hand, provided superior outcomes, with a PDR of 100%, but also resulted in an exceedingly higher NRL than the IDSAODV. Likewise, the simulation findings demonstrated that the attacking node's position tormented the IDSAODV's functionality.
所谓的黑洞攻击是MANET网络中最危险和最广泛的安全攻击之一,研究人员的任务是开发检测它的策略。其中两种方法是入侵检测系统AODV (IDSAODV)和扩展AODV。本文试图研究黑洞攻击对存在单个或多个攻击者的网络功能的影响。它还评估了网络中的扩展AODV和IDSAODV,以了解它们如何有效地检测和减轻攻击。为了评估其性能,研究人员使用了吞吐量、标准化路由负载(NRL)和分组传输比(PDR)。综合仿真结果表明,IDSAODV的应用降低了攻击的影响。然而,与此同时,它将数据包的投递率提高到了68%。另一方面,反向AODV提供了更好的结果,PDR为100%,但也导致NRL高于IDSAODV。同样,模拟结果表明,攻击节点的位置折磨了IDSAODV的功能。
{"title":"Performance Ameliorations of AODV by Black Hole Attack Detection Utilizing IDSAODV as Well as Reverse AODV","authors":"M. Al-Shabi","doi":"10.17762/ijcnis.v14i2.5483","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5483","url":null,"abstract":"The so-called Black Hole Attack is among the most perilous and widespread security attacks in MANET nets, researchers have been tasked with developing strategies to detect it. Two of these methods are the Intrusion Detection System AODV (IDSAODV) as well as the Extended AODV. The present paper attempts to investigate the impact of a Black Hole Attack on the functionality of the network in the existence of single or more attackers. It also evaluates the Extended AODV and IDSAODV in a net in order to see how effectively they could detect and mitigate the attack. For the aim of evaluating its performance, the researchers utilized Throughput, Normalized Routing Load (NRL), and Packet Delivery Ratio (PDR). The comprehensive simulation results show that the IDSAODV application decreased the effect of the attacks. However, it raised the rate of packet delivery to sixty eight percent at the identical time. Reverse AODV, on the other hand, provided superior outcomes, with a PDR of 100%, but also resulted in an exceedingly higher NRL than the IDSAODV. Likewise, the simulation findings demonstrated that the attacking node's position tormented the IDSAODV's functionality.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128438472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Survey on Congestion Control Protocols for CoAP CoAP拥塞控制协议综述
Pub Date : 2022-08-31 DOI: 10.17762/ijcnis.v14i2.5484
Sneha R. Deshmukh, V. Raisinghani
The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.
物联网(IoT)是指通过互联网相互连接的具有独特身份的事物。拥塞管理是网络中最具挑战性的任务之一。约束应用协议(CoAP)是为物联网网络设计的低占用协议,由IETF定义。在物联网网络中,CoAP节点的网络和电池资源有限。CoAP标准具有指数回退拥塞控制机制。这种回退机制可能并不适合所有物联网应用。每个物联网应用程序的特征都是不同的。此外,由于高丢包率的链路和报文传输错误而导致的不必要的重传、报文冲突等事件可能会导致网络拥塞。为CoAP定义了各种拥塞处理算法,以丰富物联网应用的性能。本文对物联网网络中使用的拥塞控制机制的演变进行了全面的调查。我们将这些协议分为基于rto的、队列监视的和基于速率的。我们回顾了CoAP网络的拥塞避免协议,并讨论了未来工作的方向。
{"title":"A Survey on Congestion Control Protocols for CoAP","authors":"Sneha R. Deshmukh, V. Raisinghani","doi":"10.17762/ijcnis.v14i2.5484","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i2.5484","url":null,"abstract":"The Internet of things (IoT) comprises things interconnected through the internet with unique identities. Congestion management is one of the most challenging tasks in networks. The Constrained Application Protocol (CoAP) is a low-footprint protocol designed for IoT networks and has been defined by IETF. In IoT networks, CoAP nodes have limited network and battery resources. The CoAP standard has an exponential backoff congestion control mechanism. This backoff mechanism may not be adequate for all IoT applications. The characteristics of each IoT application would be different. Further, the events such as unnecessary retransmissions and packet collision caused due to links with high losses and packet transmission errors may lead to network congestion. Various congestion handling algorithms for CoAP have been defined to enrich the performance of IoT applications. Our paper presents a comprehensive survey on the evolution of the congestion control mechanism used in IoT networks. We have classified the protocols into RTO-based, queue-monitoring, and rate-based. We review congestion avoidance protocols for CoAP networks and discuss directions for future work.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114473802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies 开发模拟智能仪器来测量用户对网络安全策略的行为
Pub Date : 2022-04-16 DOI: 10.17762/ijcnis.v13i1.4923
K. Alissa, Bashar A. Aldeeb, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, M. Alsmadi
Institutions struggle to protect themselves from threats and cybercrime. Therefore, they devote much attention to improving information security infrastructures. Users’ behaviors were explored via a traditional questionnaire research instrument in a data collocate process. The questionnaire explores users’ behaviors theoretically, so the respondents’ answers to the questionnaire are insufficiently reliable, and the responses might not reflect actual behavior based on the human bias when facing theoretical problems. This study aims to solve unreliable responses to the questionnaire by developing a simulated intelligent instrument to measure users’ behaviors toward cybersecurity policies in an experimental study using gamification.
机构努力保护自己免受威胁和网络犯罪的侵害。因此,他们非常重视改善信息安全基础设施。在数据整理过程中,采用传统的问卷调查方法对用户行为进行了研究。问卷对用户行为的探究是理论性的,因此被调查者对问卷的回答不够可靠,在面对理论问题时,由于人的偏见,回答可能无法反映实际行为。本研究的目的是通过开发模拟智能仪器来测量用户对网络安全政策的行为,在一项使用游戏化的实验研究中解决不可靠的问卷回答。
{"title":"Developing a simulated intelligent instrument to measure user behavior toward cybersecurity policies","authors":"K. Alissa, Bashar A. Aldeeb, H. A. Alshehri, S. A. Dahdouh, B. M. Alsubaie, Afnan M. Alghamdi, M. Alsmadi","doi":"10.17762/ijcnis.v13i1.4923","DOIUrl":"https://doi.org/10.17762/ijcnis.v13i1.4923","url":null,"abstract":"Institutions struggle to protect themselves from threats and cybercrime. Therefore, they devote much attention to improving information security infrastructures. Users’ behaviors were explored via a traditional questionnaire research instrument in a data collocate process. The questionnaire explores users’ behaviors theoretically, so the respondents’ answers to the questionnaire are insufficiently reliable, and the responses might not reflect actual behavior based on the human bias when facing theoretical problems. This study aims to solve unreliable responses to the questionnaire by developing a simulated intelligent instrument to measure users’ behaviors toward cybersecurity policies in an experimental study using gamification.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128907606","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM Technology and the MIMO Spatial Multiplexing 基于快速跳频ofdm技术和MIMO空间复用的鲁棒车载通信
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5216
Q. Hamarsheh, O. Daoud, M. Al-Akaidi, A. Damati, Mohammed J. Baniyounis
Vehicle-to-Vehicle communication is one of the more emerging technologies in the 21st century from either the comfortable transportation or safer transportation point of view. Vehicle-to-Vehicle communication has one crucial factor, which is the huge information to be shared among vehicles, such as the position, the road data. In such situation, the accurate information sharing process is the most important factor in order to make the vehicles operating in the most feasible way. This work proposes a more robust vehicle communication system to make the existing vehicle transportation system more efficient. In this paper, we propose a fast frequency hopping orthogonal frequency division multiplexing to mitigate the Doppler spread effect on our previously published clustering benchmark.  This benchmark contains both of a clustering weighting factor based stage and a multiparallel processing stage. This is in addition to modify the PHY layer of the existing IEEE 802.11p standard in order to impose Multiple Input Multiple Output for higher throughput purposes.The results show a noticeable stability compared to our previously published work. Furthermore, the results are almost exceeds the achieved results from the Lower-ID Distributed Clustering Algorithm (DCA) from both of the speed and communication range.
从舒适交通和安全交通的角度来看,车对车通信是21世纪新兴的技术之一。车对车通信有一个关键因素,那就是车辆之间要共享的大量信息,如位置、道路数据等。在这种情况下,为了使车辆以最可行的方式运行,准确的信息共享过程是最重要的因素。本文提出了一种鲁棒性更强的车辆通信系统,以提高现有车辆运输系统的效率。在本文中,我们提出了一种快速跳频正交频分复用来减轻我们之前发表的聚类基准的多普勒扩散效应。该基准测试包含基于聚类加权因子的阶段和多并行处理阶段。这是为了修改现有IEEE 802.11p标准的物理层,以便实施多输入多输出以实现更高的吞吐量。与我们之前发表的工作相比,结果显示出明显的稳定性。此外,该算法在速度和通信范围上都几乎超过了低id分布式聚类算法(DCA)。
{"title":"Robust Vehicular Communications Using the Fast-Frequency-Hopping-OFDM Technology and the MIMO Spatial Multiplexing","authors":"Q. Hamarsheh, O. Daoud, M. Al-Akaidi, A. Damati, Mohammed J. Baniyounis","doi":"10.17762/ijcnis.v14i1.5216","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5216","url":null,"abstract":"Vehicle-to-Vehicle communication is one of the more emerging technologies in the 21st century from either the comfortable transportation or safer transportation point of view. Vehicle-to-Vehicle communication has one crucial factor, which is the huge information to be shared among vehicles, such as the position, the road data. In such situation, the accurate information sharing process is the most important factor in order to make the vehicles operating in the most feasible way. This work proposes a more robust vehicle communication system to make the existing vehicle transportation system more efficient. In this paper, we propose a fast frequency hopping orthogonal frequency division multiplexing to mitigate the Doppler spread effect on our previously published clustering benchmark.  This benchmark contains both of a clustering weighting factor based stage and a multiparallel processing stage. This is in addition to modify the PHY layer of the existing IEEE 802.11p standard in order to impose Multiple Input Multiple Output for higher throughput purposes.The results show a noticeable stability compared to our previously published work. Furthermore, the results are almost exceeds the achieved results from the Lower-ID Distributed Clustering Algorithm (DCA) from both of the speed and communication range.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126930941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network 基于生成对抗网络的大规模超分辨率改进残差密集网络
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5221
Inad A. Aljarrah, Eman M. Alshare
Recent single image super resolution (SISR) studies were conducted extensively on small upscaling factors such as x2 and x4 on remote sensing images, while less work was conducted on large factors such as the factor x8 and x16. Owing to the high performance of the generative adversarial networks (GANs), in this paper, two GAN’s frameworks are implemented to study the SISR on the residual remote sensing image with large magnification under x8 scale factor, which is still lacking acceptable results. This work proposes a modified version of the residual dense network (RDN) and then it been implemented within GAN framework which named RDGAN. The second GAN framework has been built based on the densely sampled super resolution network (DSSR) and we named DSGAN. The used loss function for the training employs the adversarial, mean squared error (MSE) and the perceptual loss derived from the VGG19 model. We optimize the training by using Adam for number of epochs then switching to the SGD optimizer. We validate the frameworks on the proposed dataset of this work and other three remote sensing datasets: the UC Merced, WHU-RS19 and RSSCN7. To validate the frameworks, we use the following image quality assessment metrics: the PSNR and the SSIM on the RGB and the Y channel and the MSE. The RDGAN evaluation values on the proposed dataset were 26.02, 0.704, and 257.70 for PSNR, SSIM and the MSE, respectively, and the DSGAN evaluation on the same dataset yielded 26.13, 0.708 and 251.89 for the PSNR, the SSIM, and the MSE.
目前的单幅超分辨率(SISR)研究主要集中在遥感影像上x2、x4等小尺度因子上,而对x8、x16等大尺度因子的研究较少。由于生成式对抗网络(GAN)的高性能,本文采用两种GAN框架对x8比例因子下大放大残差遥感图像的SISR进行了研究,但仍缺乏可接受的结果。本文提出了一种改进版本的残差密集网络(RDN),并在GAN框架内实现,命名为RDGAN。第二种GAN框架是基于密集采样超分辨率网络(DSSR)构建的,我们将其命名为DSGAN。用于训练的损失函数采用了来自VGG19模型的对抗、均方误差(MSE)和感知损失。我们通过使用Adam来优化训练,然后切换到SGD优化器。我们在本文提出的数据集和其他三个遥感数据集(UC Merced, WHU-RS19和RSSCN7)上验证了框架。为了验证框架,我们使用以下图像质量评估指标:RGB和Y通道上的PSNR和SSIM以及MSE。在该数据集上,PSNR、SSIM和MSE的RDGAN评价值分别为26.02、0.704和257.70;在同一数据集上,DSGAN评价的PSNR、SSIM和MSE分别为26.13、0.708和251.89。
{"title":"Improved Residual Dense Network for Large Scale Super-Resolution via Generative Adversarial Network","authors":"Inad A. Aljarrah, Eman M. Alshare","doi":"10.17762/ijcnis.v14i1.5221","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5221","url":null,"abstract":"Recent single image super resolution (SISR) studies were conducted extensively on small upscaling factors such as x2 and x4 on remote sensing images, while less work was conducted on large factors such as the factor x8 and x16. Owing to the high performance of the generative adversarial networks (GANs), in this paper, two GAN’s frameworks are implemented to study the SISR on the residual remote sensing image with large magnification under x8 scale factor, which is still lacking acceptable results. This work proposes a modified version of the residual dense network (RDN) and then it been implemented within GAN framework which named RDGAN. The second GAN framework has been built based on the densely sampled super resolution network (DSSR) and we named DSGAN. The used loss function for the training employs the adversarial, mean squared error (MSE) and the perceptual loss derived from the VGG19 model. We optimize the training by using Adam for number of epochs then switching to the SGD optimizer. We validate the frameworks on the proposed dataset of this work and other three remote sensing datasets: the UC Merced, WHU-RS19 and RSSCN7. To validate the frameworks, we use the following image quality assessment metrics: the PSNR and the SSIM on the RGB and the Y channel and the MSE. The RDGAN evaluation values on the proposed dataset were 26.02, 0.704, and 257.70 for PSNR, SSIM and the MSE, respectively, and the DSGAN evaluation on the same dataset yielded 26.13, 0.708 and 251.89 for the PSNR, the SSIM, and the MSE.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122106749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Investigating the effect of High Altitude Platform Positioning on Latency and Coverage of 4G Cellular Systems 研究高空平台定位对4G蜂窝系统延迟和覆盖的影响
Pub Date : 2022-04-15 DOI: 10.54039/ijcnis.v14i1.5161
Sani Makusidi Suleiman, D. S. Shuaibu, S. A. Babale
Wireless communication technologies are rapidly being adopted and developed by countries all over the world as a strategy for sustaining a digital economy. This has proven very useful for economic recovery from the crises brought about by the COVID-19 pandemic of the year 2020. The latency and coverage area of a wireless network are two major areas that are always seeking improvement. The High Altitude Platform communication technology can provide improvement in speed and coverage area for 4G cellular systems. This work investigated the effect of positioning High Altitude Platforms on the latency and coverage of 4G cellular Systems. A quantitative approach was used in the methodology of this paper. A HAP model showing a single platform flying in a circular trajectory over Base Transceiver Stations BTSs and serving as a relay mobile station was presented. A detailed simulation algorithm for the HAP and results for the simulation were given. Results showed that using the HAP as a relay mobile station in a network can give a latency reduction of up to 58.9%.  Also, the altitude of the HAP directly affects the angle of reception which was found to improve the coverage.
作为维持数字经济的一项战略,无线通信技术正在被世界各国迅速采用和发展。事实证明,这对从2020年COVID-19大流行带来的危机中复苏的经济非常有用。无线网络的延迟和覆盖面积是两个一直在寻求改进的主要领域。高空平台通信技术可以为4G蜂窝系统提供速度和覆盖范围的改进。本研究研究了定位高空平台对4G蜂窝系统延迟和覆盖的影响。本文的研究方法采用了定量方法。提出了一个单一平台在基站bts上以圆形轨迹飞行并作为中继移动站的HAP模型。给出了该系统的详细仿真算法和仿真结果。结果表明,在网络中使用HAP作为中继移动站可以将延迟降低58.9%。同时,HAP的高度直接影响接收角度,从而提高覆盖范围。
{"title":"Investigating the effect of High Altitude Platform Positioning on Latency and Coverage of 4G Cellular Systems","authors":"Sani Makusidi Suleiman, D. S. Shuaibu, S. A. Babale","doi":"10.54039/ijcnis.v14i1.5161","DOIUrl":"https://doi.org/10.54039/ijcnis.v14i1.5161","url":null,"abstract":"Wireless communication technologies are rapidly being adopted and developed by countries all over the world as a strategy for sustaining a digital economy. This has proven very useful for economic recovery from the crises brought about by the COVID-19 pandemic of the year 2020. The latency and coverage area of a wireless network are two major areas that are always seeking improvement. The High Altitude Platform communication technology can provide improvement in speed and coverage area for 4G cellular systems. This work investigated the effect of positioning High Altitude Platforms on the latency and coverage of 4G cellular Systems. A quantitative approach was used in the methodology of this paper. A HAP model showing a single platform flying in a circular trajectory over Base Transceiver Stations BTSs and serving as a relay mobile station was presented. A detailed simulation algorithm for the HAP and results for the simulation were given. Results showed that using the HAP as a relay mobile station in a network can give a latency reduction of up to 58.9%.  Also, the altitude of the HAP directly affects the angle of reception which was found to improve the coverage.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130455112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning 利用机器学习评估Eclipse bug的优先级和严重性预测
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5266
M. Shatnawi, Batool Alazzam
The reliability and quality of software programs remains to be an important and challenging aspect of software design. Software developers and system operators spend huge time on assessing and overcoming expected and unexpected errors that might affect the users’ experience negatively. One of the major concerns in developing software problems is the bug reports, which contains the severity and priority of these defects. For a long time, this task was performed manually with huge effort and time consumptions by system operators. Therefore, in this paper, we present a novel automatic assessment tool using Machine Learning algorithms, for assessing bugs’ reports based on several features such as hardware, product, assignee, OS, component, target milestone, votes, and versions.  The aim is to build a tool that automatically classifies software bugs according to the severity and priority of the bugs and makes predictions based on the most representative features and bug report text. To perform this task, we used the Multi-Nominal Naive Bayes, Random Forests Classifier, Bagging, Ada Boosting, SVC, KNN, and Linear SVM Classifiers and Natural Language Processing techniques to analyze the Eclipse dataset. The approach shows promising results for software bugs’ detection and prediction.
软件程序的可靠性和质量仍然是软件设计的一个重要和具有挑战性的方面。软件开发人员和系统操作员花费大量时间来评估和克服可能对用户体验产生负面影响的预期和意外错误。开发软件问题的主要关注点之一是bug报告,它包含了这些缺陷的严重程度和优先级。长期以来,这项任务都是由系统操作员手工完成的,耗费了大量的精力和时间。因此,在本文中,我们提出了一种使用机器学习算法的新型自动评估工具,用于基于硬件,产品,分配人员,操作系统,组件,目标里程碑,投票和版本等几个特征来评估错误报告。其目的是构建一个工具,根据错误的严重性和优先级自动对软件错误进行分类,并根据最具代表性的特征和错误报告文本进行预测。为了完成这项任务,我们使用了多标称朴素贝叶斯、随机森林分类器、Bagging、Ada Boosting、SVC、KNN和线性支持向量机分类器以及自然语言处理技术来分析Eclipse数据集。该方法在软件缺陷的检测和预测方面显示出良好的效果。
{"title":"An Assessment of Eclipse Bugs' Priority and Severity Prediction Using Machine Learning","authors":"M. Shatnawi, Batool Alazzam","doi":"10.17762/ijcnis.v14i1.5266","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5266","url":null,"abstract":"The reliability and quality of software programs remains to be an important and challenging aspect of software design. Software developers and system operators spend huge time on assessing and overcoming expected and unexpected errors that might affect the users’ experience negatively. One of the major concerns in developing software problems is the bug reports, which contains the severity and priority of these defects. For a long time, this task was performed manually with huge effort and time consumptions by system operators. Therefore, in this paper, we present a novel automatic assessment tool using Machine Learning algorithms, for assessing bugs’ reports based on several features such as hardware, product, assignee, OS, component, target milestone, votes, and versions.  The aim is to build a tool that automatically classifies software bugs according to the severity and priority of the bugs and makes predictions based on the most representative features and bug report text. To perform this task, we used the Multi-Nominal Naive Bayes, Random Forests Classifier, Bagging, Ada Boosting, SVC, KNN, and Linear SVM Classifiers and Natural Language Processing techniques to analyze the Eclipse dataset. The approach shows promising results for software bugs’ detection and prediction.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128422679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish 加密算法的性能评估:DES、3DES、Blowfish、Twofish和Threefish
Pub Date : 2022-04-15 DOI: 10.17762/ijcnis.v14i1.5262
H. Alabdulrazzaq, M. Alenezi
With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.
随着互联网的发展,许多个人和组织开始使用它来存储和发送个人或商业信息。其中一些信息是高度机密的,这反过来又提出了数据隐私和机密性的问题。互联网的重大进步也帮助入侵者在未经授权的情况下获取机密信息。信息安全是保护数据免受非法访问的艺术,同时确保数据的完整性、可用性和机密性。信息安全是通过加密和解密算法来实现的。加密通过将机密信息转换为不可读的形式来隐藏机密信息,而从不可读或加密的形式检索数据的相反过程称为解密。目前存在许多加密算法,选择使用哪一种算法取决于几个因素和措施。本文比较了DES、3DES、Blowfish、Twofish和Threefish五种不同的对称分组密码算法的加密速度。模拟是使用不同文本文件大小的Python完成的。结果表明,Blowfish优于测试的其他算法。
{"title":"Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish","authors":"H. Alabdulrazzaq, M. Alenezi","doi":"10.17762/ijcnis.v14i1.5262","DOIUrl":"https://doi.org/10.17762/ijcnis.v14i1.5262","url":null,"abstract":"With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.","PeriodicalId":232613,"journal":{"name":"Int. J. Commun. Networks Inf. Secur.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-04-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Int. J. Commun. Networks Inf. Secur.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1