Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10044079
Mohamed M. G. Farag, Amr E. Hilal, Samy El-Tawab
The fourth industrial revolution has given rise to large-scale data-driven models like smart cities and Intelligent transportation. Within these models, applications like smart parking have been growing rapidly in research and industry. However, different scenarios and environments (e.g., shopping areas, residential places, and business complexes) can require special handling due to the various factors impacting people’s schedules and behavior. In this paper, we provide an initial investigation of traffic assignment based on parking prediction for a mid-size university environment where parking is concentrated in three parking garages around the campus. Our initial investigation includes results for parking prediction using a statistical method and plans for an augmenting study using variations of Neural Networks. On top of the parking prediction layer, we propose an application layer that directs and fuses the model predictions to produce the parking options provided to the application user. The presented investigation can help the university administration in their consideration of building additional garages.
{"title":"Parking Occupancy Prediction and Traffic Assignment in a University Environment","authors":"Mohamed M. G. Farag, Amr E. Hilal, Samy El-Tawab","doi":"10.1109/JAC-ECC56395.2022.10044079","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044079","url":null,"abstract":"The fourth industrial revolution has given rise to large-scale data-driven models like smart cities and Intelligent transportation. Within these models, applications like smart parking have been growing rapidly in research and industry. However, different scenarios and environments (e.g., shopping areas, residential places, and business complexes) can require special handling due to the various factors impacting people’s schedules and behavior. In this paper, we provide an initial investigation of traffic assignment based on parking prediction for a mid-size university environment where parking is concentrated in three parking garages around the campus. Our initial investigation includes results for parking prediction using a statistical method and plans for an augmenting study using variations of Neural Networks. On top of the parking prediction layer, we propose an application layer that directs and fuses the model predictions to produce the parking options provided to the application user. The presented investigation can help the university administration in their consideration of building additional garages.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130339130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10043911
Mohamed Tharwat Waheed, Ahmed K. F. Khattab, Y. Fahmy
Predicting the coverage of the base stations in mobile networks is a critical task for mobile operators to identify the geographical area covered by the cellular base stations. It also enables the network operators to discover the coverage gaps and optimally choose the locations for new base stations. Existing prediction models use ray tracing techniques that are computationally expensive and depend on three-dimensional maps, which are costly and need to be regularly updated. This paper proposes an efficient and highly accurate multi-modal channel model prediction algorithm using numerical features and satellite images with semantic segmentation (SS) to extract the environmental characteristics. Experimental measurements were gathered and combined with two-dimensional satellite maps from a real LTE network in the Cairo region for an accurate evaluation. Using the proposed architecture with SS and introducing new numerical features, we achieved a mean absolute error (MAE) of 1.57 dB and 2.21 root-mean-square error (RMSE) with a 23.7% enhancement over the state-of-theart techniques and a 61.04% reduction in system complexity in terms of the number of trainable parameters.
{"title":"Highly Accurate Multi-Modal LTE Channel Prediction via Semantic Segmentation of Satellite Images","authors":"Mohamed Tharwat Waheed, Ahmed K. F. Khattab, Y. Fahmy","doi":"10.1109/JAC-ECC56395.2022.10043911","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043911","url":null,"abstract":"Predicting the coverage of the base stations in mobile networks is a critical task for mobile operators to identify the geographical area covered by the cellular base stations. It also enables the network operators to discover the coverage gaps and optimally choose the locations for new base stations. Existing prediction models use ray tracing techniques that are computationally expensive and depend on three-dimensional maps, which are costly and need to be regularly updated. This paper proposes an efficient and highly accurate multi-modal channel model prediction algorithm using numerical features and satellite images with semantic segmentation (SS) to extract the environmental characteristics. Experimental measurements were gathered and combined with two-dimensional satellite maps from a real LTE network in the Cairo region for an accurate evaluation. Using the proposed architecture with SS and introducing new numerical features, we achieved a mean absolute error (MAE) of 1.57 dB and 2.21 root-mean-square error (RMSE) with a 23.7% enhancement over the state-of-theart techniques and a 61.04% reduction in system complexity in terms of the number of trainable parameters.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129770590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10043897
M. Nomeir, B. Mokhtar
Improving computer networks performance is a tremendous need in our life for meeting ever-changing quality of service (QoS) requirements of interesting applications. We are searching continuously on how to increase the performance of computer networks. One of the most important factors that aid in determining network performance is the available and accessible network information. In this paper, we deal with this problem in an information theoretic framework. Our approach is different than most recent papers in this field, where we use predefined measures that normally work on any computer network and we apply it to a general network model. We examine these measures on a specific model that is more comprehensive and more applicable than previous models discussed in other papers. Also, one of the important reasons in our extended study is to investigate the shortcomings in adopting these measures and how they appear in the results. We discuss briefly how to enhance these measures to be compatible with real networks and to give more precise and efficient results. Our analytical study of the developed model shows that obtained results can be used to guide future network designs since our model can be easily manipulated to get many real network models.
{"title":"Towards a Comprehensive Model for the Study of Computer Networks Performance using Information Theory","authors":"M. Nomeir, B. Mokhtar","doi":"10.1109/JAC-ECC56395.2022.10043897","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043897","url":null,"abstract":"Improving computer networks performance is a tremendous need in our life for meeting ever-changing quality of service (QoS) requirements of interesting applications. We are searching continuously on how to increase the performance of computer networks. One of the most important factors that aid in determining network performance is the available and accessible network information. In this paper, we deal with this problem in an information theoretic framework. Our approach is different than most recent papers in this field, where we use predefined measures that normally work on any computer network and we apply it to a general network model. We examine these measures on a specific model that is more comprehensive and more applicable than previous models discussed in other papers. Also, one of the important reasons in our extended study is to investigate the shortcomings in adopting these measures and how they appear in the results. We discuss briefly how to enhance these measures to be compatible with real networks and to give more precise and efficient results. Our analytical study of the developed model shows that obtained results can be used to guide future network designs since our model can be easily manipulated to get many real network models.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129036180","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10044027
D. Tarek, T. Ismail
The management of energy consumption and payment transactions using a secure, decentralized energy system framework is essential in the water distribution network (WDN). The water energy market, in which energy may be transformed into a digital asset that is potentially monitored, trackable and tradable, might greatly benefit from the deployment of blockchain technology. This is because the blockchain has transaction privacy, decentralization, security, and immutability features. Furthermore, using blockchain smart contracts enables energy market management operations such as consumers, prosumers, and enterprises to register and track their utilization as well as to be aware of the financial transactions. In this paper, we optimize a secure peer-to-peer (P2P) Ethereum blockchain platform for water energy consumption and payment transactions among WDN reservoirs and customer nodes. Additionally, we developed a WDN energy trading and payment Ethereum smart contract to monitor autonomous pay-per-use payment and energy distribution on the decentralized P2P trade network.
{"title":"Integrating Smart Contracts with WDNs Framework for Energy Management and Secure Transactions","authors":"D. Tarek, T. Ismail","doi":"10.1109/JAC-ECC56395.2022.10044027","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044027","url":null,"abstract":"The management of energy consumption and payment transactions using a secure, decentralized energy system framework is essential in the water distribution network (WDN). The water energy market, in which energy may be transformed into a digital asset that is potentially monitored, trackable and tradable, might greatly benefit from the deployment of blockchain technology. This is because the blockchain has transaction privacy, decentralization, security, and immutability features. Furthermore, using blockchain smart contracts enables energy market management operations such as consumers, prosumers, and enterprises to register and track their utilization as well as to be aware of the financial transactions. In this paper, we optimize a secure peer-to-peer (P2P) Ethereum blockchain platform for water energy consumption and payment transactions among WDN reservoirs and customer nodes. Additionally, we developed a WDN energy trading and payment Ethereum smart contract to monitor autonomous pay-per-use payment and energy distribution on the decentralized P2P trade network.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116336702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10044030
M. Abo-Zahhad, M. Sayed, Ahmed H. Abd El‐Malek, Mayar Hossam, Nora Atef, Sarah Reda
At some point, kids start to grow and acquire more independence to explore the world independently. And while it is a natural stage of kids’ growth, parents usually feel restless during this stage, fearing that their children might face dangers in the absence of their supervision. This problem is the main motivation behind the system introduced in this paper. It is aimed to assist parents in maintaining the safety of their children by tracking the child’s relative location and monitoring the health status to ensure his/her wellbeing. It also follows up and supervises the daily activities and prevents any potential danger that can befall the child. The system consists of two main units. The first unit is implemented in form of a bracelet worn by the child, while a mobile application acts as the second unit on the parents’ side. In comparison to the prior introduced systems, this system is designed to be a comprehensive system that combines most of the features that exist in the introduced systems. It especially enhances the commercially introduced systems by inaugurating the feature of indoor tracking for people monitoring. The system is designed to boost performance by linking the children to their parents through the merit of IoT technologies. Results show that the system successfully detects falling as well as exceeding the safe distance and immediately notifies the parents upon occurrence. The medical parameters have been effectively, monitored with percentage errors ranging from 0.3% to 9%.
{"title":"Intelligent IoT-Based Tracking System for Constant Supervision of Health Status and Daily Activities of Children","authors":"M. Abo-Zahhad, M. Sayed, Ahmed H. Abd El‐Malek, Mayar Hossam, Nora Atef, Sarah Reda","doi":"10.1109/JAC-ECC56395.2022.10044030","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044030","url":null,"abstract":"At some point, kids start to grow and acquire more independence to explore the world independently. And while it is a natural stage of kids’ growth, parents usually feel restless during this stage, fearing that their children might face dangers in the absence of their supervision. This problem is the main motivation behind the system introduced in this paper. It is aimed to assist parents in maintaining the safety of their children by tracking the child’s relative location and monitoring the health status to ensure his/her wellbeing. It also follows up and supervises the daily activities and prevents any potential danger that can befall the child. The system consists of two main units. The first unit is implemented in form of a bracelet worn by the child, while a mobile application acts as the second unit on the parents’ side. In comparison to the prior introduced systems, this system is designed to be a comprehensive system that combines most of the features that exist in the introduced systems. It especially enhances the commercially introduced systems by inaugurating the feature of indoor tracking for people monitoring. The system is designed to boost performance by linking the children to their parents through the merit of IoT technologies. Results show that the system successfully detects falling as well as exceeding the safe distance and immediately notifies the parents upon occurrence. The medical parameters have been effectively, monitored with percentage errors ranging from 0.3% to 9%.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"638 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116085266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10043930
Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty
Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.
{"title":"Multi-Armed Bandit and Repeated Auction Approaches for User Admission and Channel Allocation in 5G HetNets","authors":"Boniface Uwizeyimana, Ahmed H. Abd El‐Malek, O. Muta, M. Abo-Zahhad, M. Elsabrouty","doi":"10.1109/JAC-ECC56395.2022.10043930","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043930","url":null,"abstract":"Heterogeneous network and cognitive radio technology were introduced as part of 5G architecture to improve spectrum utilization and user capacity. Admitting secondary users in the wireless network is a challenge in the deployment of 5G. This paper presents a learning algorithm based on the multi-armed bandit technique to intelligently associate secondary users to the secondary base stations available in the network. Availing spectrum to secondary base stations and their associated users is done through a repeated auction game. The multi-armed bandit algorithm applied to the problem of user association enables secondary users oblivious about the channel environment to achieve higher data rates through association with the adequate secondary base station. Simulation results show a noticeably superior performance of the proposed multi-armed bandit algorithm compared to the matching game and random selection.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127910852","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10043861
Sherif H.Elgohary, Ahmed Osama Ismail, Zeiad Ayman Mohamed, Ahmed Gamal Elmahdy, Omar Ayman Mohamed, Mostafa Ibraheem Basheer
Anemia is one of the most common health issues in third world countries. According to the World Health Organization (WHO), nearly a quarter of the human population suffers from anemia. The prevalence of anemia as indicated by hemoglobin was found among more than a third of preschool children in Egypt. Symptoms associated with anemia make them more at risk of illness and infection. With the world′s current situation due to the pandemic; it’s very difficult to get access to medical facilities since they could be vulnerable to any diseases, not to mention the high costs and dangers of invasive methods, which are the current standard. The paper aims to provide a remote, non-invasive standardized approach that enables a quick screening to detect hemoglobin levels using smartphones and AI techniques. The image of the eye is captured and the eye conjunctiva is automatically extracted from the image as a Region of Interest (ROI). The ROI is then processed and features are extracted from it to train a machine-learning algorithm to determine if the patient is anemic or not. The model was run over 200 subjects and reached an accuracy of 85%, precision of 86%, and recall of 81%.
{"title":"A Machine Learning Method to Screen Anemia From Conjunctiva Images Taken by Smartphone.","authors":"Sherif H.Elgohary, Ahmed Osama Ismail, Zeiad Ayman Mohamed, Ahmed Gamal Elmahdy, Omar Ayman Mohamed, Mostafa Ibraheem Basheer","doi":"10.1109/JAC-ECC56395.2022.10043861","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043861","url":null,"abstract":"Anemia is one of the most common health issues in third world countries. According to the World Health Organization (WHO), nearly a quarter of the human population suffers from anemia. The prevalence of anemia as indicated by hemoglobin was found among more than a third of preschool children in Egypt. Symptoms associated with anemia make them more at risk of illness and infection. With the world′s current situation due to the pandemic; it’s very difficult to get access to medical facilities since they could be vulnerable to any diseases, not to mention the high costs and dangers of invasive methods, which are the current standard. The paper aims to provide a remote, non-invasive standardized approach that enables a quick screening to detect hemoglobin levels using smartphones and AI techniques. The image of the eye is captured and the eye conjunctiva is automatically extracted from the image as a Region of Interest (ROI). The ROI is then processed and features are extracted from it to train a machine-learning algorithm to determine if the patient is anemic or not. The model was run over 200 subjects and reached an accuracy of 85%, precision of 86%, and recall of 81%.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128337684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10043858
Donia Mohamed, Ahmed Magdy, Osama M. Elghandour, Ahmed Nasser
Introducing non-orthogonal multiple access (NOMA) to heterogeneous networks (HetNets) improves its spectral efficiency (SE) for the next generation of mobile communication networks. Critical technical challenges on resource allocation in NOMA HetNets due to the inter-user interference of NOMA and the cross-tier interference that occurs in HetNets. The goal of this work is to enhance the NOMA HetNets spectrum efficiency by jointly optimizing both resource block (RB) allocation over NOMA users (i.e., user pairing (UP)) and power allocation (PA) over HetNets base stations (BSs). The formulated problem considers users’ quality of services (QoS) and successive interference cancellation (SIC) constraint, which contribute to a non-convex optimization problem. A linear model-free based technique, data-driven (DD), is applied as an optimization tool to efficiently solve the original NP-hard problem for a near-optimum solution. Our results show that HetNets and NOMA aided with DD for joint UP and PA satisfy the high data rate required and improve the system performance compared to other conventional schemes.
{"title":"Data-Driven Based Algorithm for Joint HetNets Power Allocation and NOMA User Pairing","authors":"Donia Mohamed, Ahmed Magdy, Osama M. Elghandour, Ahmed Nasser","doi":"10.1109/JAC-ECC56395.2022.10043858","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10043858","url":null,"abstract":"Introducing non-orthogonal multiple access (NOMA) to heterogeneous networks (HetNets) improves its spectral efficiency (SE) for the next generation of mobile communication networks. Critical technical challenges on resource allocation in NOMA HetNets due to the inter-user interference of NOMA and the cross-tier interference that occurs in HetNets. The goal of this work is to enhance the NOMA HetNets spectrum efficiency by jointly optimizing both resource block (RB) allocation over NOMA users (i.e., user pairing (UP)) and power allocation (PA) over HetNets base stations (BSs). The formulated problem considers users’ quality of services (QoS) and successive interference cancellation (SIC) constraint, which contribute to a non-convex optimization problem. A linear model-free based technique, data-driven (DD), is applied as an optimization tool to efficiently solve the original NP-hard problem for a near-optimum solution. Our results show that HetNets and NOMA aided with DD for joint UP and PA satisfy the high data rate required and improve the system performance compared to other conventional schemes.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"557 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133661327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10044020
Perry Chimenge Longwani, Israel Mendonça, M. Aritsugi
Internet of Things (IoT) is a rapidly developing technology that has the potential to change how individuals and businesses interact. However, the actual realization of IoT technology has been hampered by numerous security and privacy concerns. Increased number of CPU clock cycles among the traditional error sensitive cryptographic algorithms is an increasing concern in IoT devices. As most IoT devices rely on batteries for power, new low power consumption algorithms are required. As a result, we have created an algorithm that uses an encipher key for more than one security concern with the goal of reducing power consumption while maintaining security. Using a synthetic dataset, this study compared the proposed algorithm’s results against a synthetic algorithm. It results in less CPU time, fewer clock cycles, and higher throughput than the synthetic algorithm. Furthermore, during the encryption process, our algorithm was able to establish an encipher key that was later used to maintain message integrity. In this study, we have addressed the question of multi-purpose and power consumption.
{"title":"A Lightweight Cryptographic Algorithm with a Multi-Purpose Encipher Key for IoT","authors":"Perry Chimenge Longwani, Israel Mendonça, M. Aritsugi","doi":"10.1109/JAC-ECC56395.2022.10044020","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044020","url":null,"abstract":"Internet of Things (IoT) is a rapidly developing technology that has the potential to change how individuals and businesses interact. However, the actual realization of IoT technology has been hampered by numerous security and privacy concerns. Increased number of CPU clock cycles among the traditional error sensitive cryptographic algorithms is an increasing concern in IoT devices. As most IoT devices rely on batteries for power, new low power consumption algorithms are required. As a result, we have created an algorithm that uses an encipher key for more than one security concern with the goal of reducing power consumption while maintaining security. Using a synthetic dataset, this study compared the proposed algorithm’s results against a synthetic algorithm. It results in less CPU time, fewer clock cycles, and higher throughput than the synthetic algorithm. Furthermore, during the encryption process, our algorithm was able to establish an encipher key that was later used to maintain message integrity. In this study, we have addressed the question of multi-purpose and power consumption.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134381926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-12-19DOI: 10.1109/JAC-ECC56395.2022.10044023
Amr Morad, M. Abougabal, Ayman Khalafallah
In the past few years, the tremendous expansion in the usage of computer programs has resulted in a large amount of data, called “Big Data.” This leads to new challenges for storage, processing, and privacy-preserving. Meanwhile, organizations tend to collect more data about customers for subsequent processing to extract knowledge, resulting in potential threats to their confidentiality. This raises significant questions regarding the security and privacy of data in NoSQL databases. In this paper, a privacy-preserving model for big data protection is proposed, which could be applied to various types of NoSQL databases. This model addresses the challenges of securing NoSQL databases including the lack of predefined schema, the existence of different NoSQL database categories, and the potential threats due to data processing. It also guarantees properties of conditional roles, purposes, tasks, policies, and possible insider threats. Verification and validation for the model using a use case are introduced to demonstrate how it ensures privacy-preserving in NoSQL databases.
{"title":"A Privacy-Preserving Model for Big Data","authors":"Amr Morad, M. Abougabal, Ayman Khalafallah","doi":"10.1109/JAC-ECC56395.2022.10044023","DOIUrl":"https://doi.org/10.1109/JAC-ECC56395.2022.10044023","url":null,"abstract":"In the past few years, the tremendous expansion in the usage of computer programs has resulted in a large amount of data, called “Big Data.” This leads to new challenges for storage, processing, and privacy-preserving. Meanwhile, organizations tend to collect more data about customers for subsequent processing to extract knowledge, resulting in potential threats to their confidentiality. This raises significant questions regarding the security and privacy of data in NoSQL databases. In this paper, a privacy-preserving model for big data protection is proposed, which could be applied to various types of NoSQL databases. This model addresses the challenges of securing NoSQL databases including the lack of predefined schema, the existence of different NoSQL database categories, and the potential threats due to data processing. It also guarantees properties of conditional roles, purposes, tasks, policies, and possible insider threats. Verification and validation for the model using a use case are introduced to demonstrate how it ensures privacy-preserving in NoSQL databases.","PeriodicalId":326002,"journal":{"name":"2022 10th International Japan-Africa Conference on Electronics, Communications, and Computations (JAC-ECC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127450040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}