Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601269
Olusoji B. Akinrinade, Pius Adewale Owolawi, Chunling Tu, T. Mapayi
Application of automated image analysis techniques for the detection, diagnosis and management melanoma continues to be an active research area globally. Although a lot of progress has been made on the study of different automated methods of melanoma segmentation, there is still need for further improvement. This paper presents a study on the use of graph-cuts technique for the segmentation of melanoma in clinical images over four different color spaces. The four color spaces considered in this study are RGB, HSV, HSI and HSL. Experimental results show that the use of graph-cuts technique over all the four color spaces are very promising as the average accuracy rate of 96.98%, average sensitivity rate of 89.68%, average specificity rate of 98.96%, average precision rate of 96.34% and average f-score rate of 93,51% are achieved.
{"title":"Graph-Cuts Technique For Melanoma Segmentation Over Different Color Spaces","authors":"Olusoji B. Akinrinade, Pius Adewale Owolawi, Chunling Tu, T. Mapayi","doi":"10.1109/ICONIC.2018.8601269","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601269","url":null,"abstract":"Application of automated image analysis techniques for the detection, diagnosis and management melanoma continues to be an active research area globally. Although a lot of progress has been made on the study of different automated methods of melanoma segmentation, there is still need for further improvement. This paper presents a study on the use of graph-cuts technique for the segmentation of melanoma in clinical images over four different color spaces. The four color spaces considered in this study are RGB, HSV, HSI and HSL. Experimental results show that the use of graph-cuts technique over all the four color spaces are very promising as the average accuracy rate of 96.98%, average sensitivity rate of 89.68%, average specificity rate of 98.96%, average precision rate of 96.34% and average f-score rate of 93,51% are achieved.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"304 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117055891","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/iconic.2018.8601299
{"title":"ICONIC 2018 TOC","authors":"","doi":"10.1109/iconic.2018.8601299","DOIUrl":"https://doi.org/10.1109/iconic.2018.8601299","url":null,"abstract":"","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121067267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601247
Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun
The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.
{"title":"Evaluating the Effects of Hardware Configurations on Bro under DDoS Attacks","authors":"Welcome Luthuli, O. Oki, Paul Tarwireyi, M. Adigun","doi":"10.1109/ICONIC.2018.8601247","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601247","url":null,"abstract":"The exponential growth of network traffic and the growing sophistication of network attacks call for faster, efficient and scalable intrusion detection systems (IDS) that will be able to quickly look into the traffic and timeously produce alerts when malicious traffic has been detected. Snort has been the de-facto standard of IDS for so many years but has been ineffective under heavy loads. In both multi-core and single core hardware configuration snort shows no improvement in detection capability of Transmission Control Protocol (TCP) flooding Distributed Denial of Service (DDoS) attack. This has led to the development of alternative IDS which try to address the limitations of Snort. Bro is a flexible script-driven intrusion detection system, which provides a ‘worker’ based architecture to utilize multiple processors. The aim of this paper is to evaluate Bro in terms of performance and packet handling against TCP flooding DDoS attacks under different hardware configurations. To achieve this aim, Bro was installed on different hardware configurations. Tests were conducted to assess its performance under each configuration. Packet loss, Throughput and resource utilization metrics were measured. The results show that utilizing better hardware increases resources availability hence gives the system better performance.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121340298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601090
T. Mosetlhe, Y. Hamam, Shengzhi Du, Y. Alayli
High computational requirements are commonly associated with the hydraulic simulation of large-scale water distribution. The convergence of the cumbersome iterative procedures involved has been a well-debated issue for the past decades. The large-scale and non-linear properties pose a great hindrance towards the development of online applications for water distribution network (WDN) analysis and pressure control thereof. Consequently, there has been a great interest in the deployment of model-free techniques to mimic the rather computationally expensive non-linear hydraulic simulations. As the hydraulic simulation based research is still being conducted, the advantages of model-free techniques make them more suitable alternatives. Artificial neural networks (ANN) is one of the most successful model-free methods for WDN analysis and management. In this paper, a literature synopsis of existing applications of model-free approaches in water distribution is presented. The technical advantages of applying such technique in a large-scale non-linear network are brought up in this paper.
{"title":"Artificial Neural Networks in Water Distribution Systems: A Literature Synopsis","authors":"T. Mosetlhe, Y. Hamam, Shengzhi Du, Y. Alayli","doi":"10.1109/ICONIC.2018.8601090","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601090","url":null,"abstract":"High computational requirements are commonly associated with the hydraulic simulation of large-scale water distribution. The convergence of the cumbersome iterative procedures involved has been a well-debated issue for the past decades. The large-scale and non-linear properties pose a great hindrance towards the development of online applications for water distribution network (WDN) analysis and pressure control thereof. Consequently, there has been a great interest in the deployment of model-free techniques to mimic the rather computationally expensive non-linear hydraulic simulations. As the hydraulic simulation based research is still being conducted, the advantages of model-free techniques make them more suitable alternatives. Artificial neural networks (ANN) is one of the most successful model-free methods for WDN analysis and management. In this paper, a literature synopsis of existing applications of model-free approaches in water distribution is presented. The technical advantages of applying such technique in a large-scale non-linear network are brought up in this paper.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115024389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601287
Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa
The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.
{"title":"An Access Control Framework for Protecting Personal Electronic Health Records","authors":"Ambrose Atuheire Izaara, Richard Ssembatya, Fred Kaggwa","doi":"10.1109/ICONIC.2018.8601287","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601287","url":null,"abstract":"The increasing expansion of wireless systems and the extensive popularity and usage of mobile devices such as mobile phones and wireless tablets represents a great opportunity to use mobile devices as widespread health data access tools. Unfortunately, some problems impeding the general acceptance of mhealth such as privacy protection, limitation of wireless networks and handheld devices are still common. Challenges such as unreliable data repositories and limited connection speeds in resource limited environments are also evident. The inadequate capabilities of hand-held devices and wireless systems make these Public Key Cryptography based frameworks unsuitable for mobile networks. Moreover, these protocols were designed to preserve customary flow of health data, which is vulnerable to attack and increase the user’s risk. This research drew its foundations from literature and theoretical review and used qualitative approaches. In this paper, the researchers build on existing concepts of Medical Information Systems and use of Symmetric Key Infrastructure to design a framework for secure access to personal electronic health records. The framework provides identity protection for a patient from all forms of unathorised data access. The framework not only reduces the computational operations between the engaging parties, but also achieves privacy protection for the user. Validation results from ICT experts demonstrate that the designed framework is applicable for secure access to personal medical health records in resource limited settings.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601214
E. Malatji, Billy Chabangu
Due to the low power factor of an electrical system there is a high demand of reactive power from the transformers which results in overloading of the transformers. Traditionally, this problem is solved by adding a capacitor in parallel with the load in order to correct the power factor. In this paper a new innovative method which utilizes the solar plant at night when it is idling or during the day when it is not producing real power. During these times a solar plant is used as a source of reactive power, the inverters used in solar plants are capable of being used as a source of reactive power. The case study used to test this innovative method is a food processing plant with multiple transformers. The results show that it is possible to use a solar plant for power factor correction and hence relieve the transformers from overloading issues.
{"title":"Innovative Method for Power Factor Correction using a Solar Plant as a Source of Reactive Power","authors":"E. Malatji, Billy Chabangu","doi":"10.1109/ICONIC.2018.8601214","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601214","url":null,"abstract":"Due to the low power factor of an electrical system there is a high demand of reactive power from the transformers which results in overloading of the transformers. Traditionally, this problem is solved by adding a capacitor in parallel with the load in order to correct the power factor. In this paper a new innovative method which utilizes the solar plant at night when it is idling or during the day when it is not producing real power. During these times a solar plant is used as a source of reactive power, the inverters used in solar plants are capable of being used as a source of reactive power. The case study used to test this innovative method is a food processing plant with multiple transformers. The results show that it is possible to use a solar plant for power factor correction and hence relieve the transformers from overloading issues.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"377 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116610694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601281
Claude Nawej, Shengzhi Du
We categorized VPN’s impact in to two different aspects; The affecting aspect, and the affected aspect. The affecting aspect of the impact encompasses factors such as security, algorithms, hardware, and software. Whereas the affected aspect is of the likes of network performance. While VPNs have managed to integrate security, one of the affecting aspect of the impact on one hand, on the other hand, VPNs should be regarded as a potential threat to network performance. In this study, for affordability purpose, we choose to use NS-2 simulated test-bed to shed light on the VPN’s performance impact in a network. Considering the most common network performance metrics, throughput and delay; we assessed these performance metrics by means of average and percentage changes theories. The findings emphasize quantitative impact on the TCP/IP throughput than on its counterpart UDP/IP. We finally developed an analytical equation to model this VPN’s performance impact.
{"title":"Virtual Private Network’s Impact on Network Performance","authors":"Claude Nawej, Shengzhi Du","doi":"10.1109/ICONIC.2018.8601281","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601281","url":null,"abstract":"We categorized VPN’s impact in to two different aspects; The affecting aspect, and the affected aspect. The affecting aspect of the impact encompasses factors such as security, algorithms, hardware, and software. Whereas the affected aspect is of the likes of network performance. While VPNs have managed to integrate security, one of the affecting aspect of the impact on one hand, on the other hand, VPNs should be regarded as a potential threat to network performance. In this study, for affordability purpose, we choose to use NS-2 simulated test-bed to shed light on the VPN’s performance impact in a network. Considering the most common network performance metrics, throughput and delay; we assessed these performance metrics by means of average and percentage changes theories. The findings emphasize quantitative impact on the TCP/IP throughput than on its counterpart UDP/IP. We finally developed an analytical equation to model this VPN’s performance impact.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601211
Olivier Oheka, Chunling Tu
An increase in demand for traffic monitoring of densely populated areas has been the subject of many discussions concerning the security on the road. Cameras and other sensors are used to monitor, identify and manage potential incidents that can occur. Therefore, there is a need for computer vision system and algorithms to detect and track vehicles, which will facilitate the management of traffic and driving assistance. In this paper, a vehicle detection and tracking system is proposed using an efficient background cancelation technique and Haar-like features with a modified Adaboost algorithm in a cascade configuration for maximum accuracy and robustness. The proposed system is implemented on a passenger car with a camera mounted at the rear to detect vehicles behind it. Video data are collected and processed in real-time and the performance of the system is verified experimentally.
{"title":"Real-time Multiple Vehicle Detection using a Rear Camera Mounted on a Vehicle","authors":"Olivier Oheka, Chunling Tu","doi":"10.1109/ICONIC.2018.8601211","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601211","url":null,"abstract":"An increase in demand for traffic monitoring of densely populated areas has been the subject of many discussions concerning the security on the road. Cameras and other sensors are used to monitor, identify and manage potential incidents that can occur. Therefore, there is a need for computer vision system and algorithms to detect and track vehicles, which will facilitate the management of traffic and driving assistance. In this paper, a vehicle detection and tracking system is proposed using an efficient background cancelation technique and Haar-like features with a modified Adaboost algorithm in a cascade configuration for maximum accuracy and robustness. The proposed system is implemented on a passenger car with a camera mounted at the rear to detect vehicles behind it. Video data are collected and processed in real-time and the performance of the system is verified experimentally.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117176511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601252
E. Rao, T. Ramanjaneyulu, K. J. Kumar
Finite Impulse Response (FIR) filters, microprocessors and digital signal processors are the core system of multipliers. The Multiplier and Accumulator Unit (MAC) is the predominant block in a Digital Signal Processing (DSP) system. The objective of MAC is implementation of signal processing with high performance but multiplier most of the time occupies much area and become power consuming circuits. In this paper, a Modified Russian Peasant Multiplier (MRPM) using Hancarlson adder (HA) has been proposed. According to Russian Rules, a Divide and conquer technique is used in the multiplication process. But, in the perspective of digital design, only shifters and adders are used in the Russian Peasant Multiplier (RPM) to produce a Partial Product Generation (PPG). In this paper, we present an approach towards the reduction of delay in existing RPM by using HA, in the partial product reduction stage and proposed RPM with HA at Partial Product Addition (PPA). The proposed design is also compared to the RPM with Ripple Carry Adder (RCA), Carry Selector Adder (CSA) and 8-2 Adder Compressors (AC) in terms of propagation delay. The proposed design enhances speed of the system by 80.4% compared to the RPM using RCA, 81.7% compared to RPM using CSA and 77.5% compare to RPM with 8:2 adder compressors (AC’s). The total operation is coded with Verilog Hardware Description language (HDL) using Model-Sim 6.3C, synthesized by using the Xilinx Integrated Software Environment (ISE) 14.7 design tool.
{"title":"Advanced Multiplier Design and Implementation using Hancarlson Adder","authors":"E. Rao, T. Ramanjaneyulu, K. J. Kumar","doi":"10.1109/ICONIC.2018.8601252","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601252","url":null,"abstract":"Finite Impulse Response (FIR) filters, microprocessors and digital signal processors are the core system of multipliers. The Multiplier and Accumulator Unit (MAC) is the predominant block in a Digital Signal Processing (DSP) system. The objective of MAC is implementation of signal processing with high performance but multiplier most of the time occupies much area and become power consuming circuits. In this paper, a Modified Russian Peasant Multiplier (MRPM) using Hancarlson adder (HA) has been proposed. According to Russian Rules, a Divide and conquer technique is used in the multiplication process. But, in the perspective of digital design, only shifters and adders are used in the Russian Peasant Multiplier (RPM) to produce a Partial Product Generation (PPG). In this paper, we present an approach towards the reduction of delay in existing RPM by using HA, in the partial product reduction stage and proposed RPM with HA at Partial Product Addition (PPA). The proposed design is also compared to the RPM with Ripple Carry Adder (RCA), Carry Selector Adder (CSA) and 8-2 Adder Compressors (AC) in terms of propagation delay. The proposed design enhances speed of the system by 80.4% compared to the RPM using RCA, 81.7% compared to RPM using CSA and 77.5% compare to RPM with 8:2 adder compressors (AC’s). The total operation is coded with Verilog Hardware Description language (HDL) using Model-Sim 6.3C, synthesized by using the Xilinx Integrated Software Environment (ISE) 14.7 design tool.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICONIC.2018.8601095
A. T. Akinola, M. Adigun
Ad-hoc Mobile Cloud (AMC) came up as a result of the need to alleviate the inadvertent and incessant connectivity challenges that are experienced in Mobile Cloud computing (MCC). Thus, mobile devices teamed up in groups to share their resources among one another which are majorly Web Services, Storage and Computing resources. However, potential participants in AMC often feel a level of insecurity as they envisaged loss of control over various personal and confidential data in their mobile devices which can occur in the course of sharing of resources. Therefore, AMC as a service provisioning paradigm for mobile device users has a need for an implementation of a trust management system to serve as a protection and guarantee of confidence for intended AMC participants. This study proposed a Multi-Criteria Trust Management system (MCTM) architecture for AMC to protect the interest of various participating mobile devices. This system provides an avenue to identify trustworthy mobile devices to whom they can carry out resource sharing and as well alert or notify them of any malicious act that could have happened. We carried out a simple evaluation procedure with a number of incorrect service matches in the course of responding to a query as well as comparing the level of precision attained by the proposed architecture with already existing research. The proposed system proves to give a maximum confidence to mobile users to show high interest in participating in the AMC system.
{"title":"A Multi-Criteria Model for Users Trust Management in Ad-hoc Mobile Cloud Computing","authors":"A. T. Akinola, M. Adigun","doi":"10.1109/ICONIC.2018.8601095","DOIUrl":"https://doi.org/10.1109/ICONIC.2018.8601095","url":null,"abstract":"Ad-hoc Mobile Cloud (AMC) came up as a result of the need to alleviate the inadvertent and incessant connectivity challenges that are experienced in Mobile Cloud computing (MCC). Thus, mobile devices teamed up in groups to share their resources among one another which are majorly Web Services, Storage and Computing resources. However, potential participants in AMC often feel a level of insecurity as they envisaged loss of control over various personal and confidential data in their mobile devices which can occur in the course of sharing of resources. Therefore, AMC as a service provisioning paradigm for mobile device users has a need for an implementation of a trust management system to serve as a protection and guarantee of confidence for intended AMC participants. This study proposed a Multi-Criteria Trust Management system (MCTM) architecture for AMC to protect the interest of various participating mobile devices. This system provides an avenue to identify trustworthy mobile devices to whom they can carry out resource sharing and as well alert or notify them of any malicious act that could have happened. We carried out a simple evaluation procedure with a number of incorrect service matches in the course of responding to a query as well as comparing the level of precision attained by the proposed architecture with already existing research. The proposed system proves to give a maximum confidence to mobile users to show high interest in participating in the AMC system.","PeriodicalId":277315,"journal":{"name":"2018 International Conference on Intelligent and Innovative Computing Applications (ICONIC)","volume":"138 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}