Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10099600
Ahmed Abdulridha, Israa Bader Al-Mashhadani, Shaimaa Mudhafar Hashim, Kaiser A. Reshak
Sustainable energy relies on energy management through smart devices. Traditional electrical networks are gradually integrating advanced technology and smart grid features. The interference between different communication methods and IoT is one of these features. For smart grid implementation, the focus is on the growth of the smart metering industry. This paper compares two implemented wired and wireless smart meter systems based on different communication methods. The wired micro smart grid is based on KQ-330 power line communication, and the wireless micro smart grid is based on Bluetooth, ZigBee and GSM communication methods. A Comparison is held with performance features, such as bit error rate, latency and bandwidth. It was found that the amount of transmitted data significantly affects the time to transmit and receive data. The results show that the present study is needed for the test cases to improve the metrics sought application for the advanced future industrial system by anticipating system features.
{"title":"Performance Comparison of an implemented Wired and Wireless Micro Smart Grid","authors":"Ahmed Abdulridha, Israa Bader Al-Mashhadani, Shaimaa Mudhafar Hashim, Kaiser A. Reshak","doi":"10.1109/DeSE58274.2023.10099600","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099600","url":null,"abstract":"Sustainable energy relies on energy management through smart devices. Traditional electrical networks are gradually integrating advanced technology and smart grid features. The interference between different communication methods and IoT is one of these features. For smart grid implementation, the focus is on the growth of the smart metering industry. This paper compares two implemented wired and wireless smart meter systems based on different communication methods. The wired micro smart grid is based on KQ-330 power line communication, and the wireless micro smart grid is based on Bluetooth, ZigBee and GSM communication methods. A Comparison is held with performance features, such as bit error rate, latency and bandwidth. It was found that the amount of transmitted data significantly affects the time to transmit and receive data. The results show that the present study is needed for the test cases to improve the metrics sought application for the advanced future industrial system by anticipating system features.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125454151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10100180
M. Alsumaidaie, K. Alheeti, Abdul-Kareem A. Al-Aloosy
With a surge in the usage of systems that largely depend on networking and programming, the need for cybersecurity has grown as well. Cyberattacks are a rising threat to companies and people. The Distributed Denial of Service (DDoS) attack is one of the destructive hacks that have swiftly acquired appeal among hackers. In this work, a security system is proposed to prevent DDoS. In other words, it has the ability to protect external and internal communication systems from attacks. The primary contribution of this work is to acquire the best accuracy based on time series. Multiple machine learning algorithms are applied and compared between them. The Random Forest accuracy is 100% and the XGBoost was 91% using the same data set.
{"title":"Intelligent Detection System for a Distributed Denial-of - Service (DDoS) Attack Based on Time Series","authors":"M. Alsumaidaie, K. Alheeti, Abdul-Kareem A. Al-Aloosy","doi":"10.1109/DeSE58274.2023.10100180","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100180","url":null,"abstract":"With a surge in the usage of systems that largely depend on networking and programming, the need for cybersecurity has grown as well. Cyberattacks are a rising threat to companies and people. The Distributed Denial of Service (DDoS) attack is one of the destructive hacks that have swiftly acquired appeal among hackers. In this work, a security system is proposed to prevent DDoS. In other words, it has the ability to protect external and internal communication systems from attacks. The primary contribution of this work is to acquire the best accuracy based on time series. Multiple machine learning algorithms are applied and compared between them. The Random Forest accuracy is 100% and the XGBoost was 91% using the same data set.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133480350","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10100118
Muhammad Ehsan Rana, Lin Yanyu, Vazeerudeen Abdul Hameed, K. B. Nowshath
This study elaborated on the importance of fitness in the contemporary environment, put forward the problems in traditional fitness, and conducted a series of discussions according to the questions. It conducted an in-depth analysis of fitness data utilising appropriate data analysis techniques to explore the relationship between different fitness data. Moreover, this study explores the processes and tools needed for analysis and explains the difficulties and resistance that may be encountered in future research. The literature section provides a detailed discussion on muscle gain and weight loss in fitness, the elaboration of big data frameworks, and machine learning methods that may be applied in this field. However, the regression models were only conducted on calorie burning for weight loss due to the lack of suitable muscle data. The optimal Mean Absolute Error and coefficient of determination were obtained as 8.307 and 0.967. The final section also concludes the process and results of this study and puts forward the shortcomings and the direction for future improvement.
{"title":"Improved Traditional Fitness Model by Applying Big Data Analysis","authors":"Muhammad Ehsan Rana, Lin Yanyu, Vazeerudeen Abdul Hameed, K. B. Nowshath","doi":"10.1109/DeSE58274.2023.10100118","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100118","url":null,"abstract":"This study elaborated on the importance of fitness in the contemporary environment, put forward the problems in traditional fitness, and conducted a series of discussions according to the questions. It conducted an in-depth analysis of fitness data utilising appropriate data analysis techniques to explore the relationship between different fitness data. Moreover, this study explores the processes and tools needed for analysis and explains the difficulties and resistance that may be encountered in future research. The literature section provides a detailed discussion on muscle gain and weight loss in fitness, the elaboration of big data frameworks, and machine learning methods that may be applied in this field. However, the regression models were only conducted on calorie burning for weight loss due to the lack of suitable muscle data. The optimal Mean Absolute Error and coefficient of determination were obtained as 8.307 and 0.967. The final section also concludes the process and results of this study and puts forward the shortcomings and the direction for future improvement.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131676456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10100065
A. Badr, L. Chaari, S. Ayed
Blockchain is emerging as one of the most promising and resourceful security technologies for cloud infrastructures. In a distributed database system, blockchain is used to store, read, and validate transactions. It can improve security, trustworthiness, and privacy by using an unchallengeable, shared distributed ledger on cloud nodes. Cloud-based healthcare systems (CHS) are vulnerable to various threats and attacks such as identity theft, medical fraud, insurance fraud, and alteration of critical patient data. Secure retrieval, access, and storage of data on CHS are necessary to protect critical medical data. Accordingly, the integrated cloud and BlockChain (ICBC) architecture emerge as a potential solution for shaping the next era of a healthcare system while providing efficient, secure, and effective patient care. In this context, this paper presents an in-depth exploration of advanced approaches to securing cloud-based healthcare data management systems using blockchain technologies. It provides a taxonomy and highlights the benefits and limitations of the approaches examined.
{"title":"Investigation on the Integrated Cloud and BlockChain (ICBC)Technologies to Secure Healthcare Data Management Systems","authors":"A. Badr, L. Chaari, S. Ayed","doi":"10.1109/DeSE58274.2023.10100065","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100065","url":null,"abstract":"Blockchain is emerging as one of the most promising and resourceful security technologies for cloud infrastructures. In a distributed database system, blockchain is used to store, read, and validate transactions. It can improve security, trustworthiness, and privacy by using an unchallengeable, shared distributed ledger on cloud nodes. Cloud-based healthcare systems (CHS) are vulnerable to various threats and attacks such as identity theft, medical fraud, insurance fraud, and alteration of critical patient data. Secure retrieval, access, and storage of data on CHS are necessary to protect critical medical data. Accordingly, the integrated cloud and BlockChain (ICBC) architecture emerge as a potential solution for shaping the next era of a healthcare system while providing efficient, secure, and effective patient care. In this context, this paper presents an in-depth exploration of advanced approaches to securing cloud-based healthcare data management systems using blockchain technologies. It provides a taxonomy and highlights the benefits and limitations of the approaches examined.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130927348","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10100157
Ng Wei Shen Jackson, Jullisha Sasikumar, Wong Yok Hung, Osama Rasheed Khan, Vivian Ng Zhi Hui, Sahar Al-Sudani, Huaqun Guo, Zhiyuan Zhang, Zhengkui Wang
COVID-19's impacts have spread widely in all directions such as economy, people's lifestyles and well-being. Though existing studies have highlighted such an impact, it remains unclear how the current COVID-19 situation has affected the retrenchment, vaccination and global happiness. In this paper, we present an automated tool enables the public to view various insight. In particular, we integrate and analyze the data from various data sources and show how the COVID19 has impacted Singapore and globally. We employ the regression models to identify the correlation between Human Development Index, Stringency Index, Gross Domestic Product per Capita, Total Deaths from COVID-19, and Total Cases of COVID-19; the rate of vaccination and vaccine hesitancy; and the factors to positively correlate to the global happiness. The insight provided adds values to better fight against the COVID-19 pandemic and future global crisis.
{"title":"The Impact of the COVID-19 Pandemic on Retrenchment, Vaccinations, and Global Happiness","authors":"Ng Wei Shen Jackson, Jullisha Sasikumar, Wong Yok Hung, Osama Rasheed Khan, Vivian Ng Zhi Hui, Sahar Al-Sudani, Huaqun Guo, Zhiyuan Zhang, Zhengkui Wang","doi":"10.1109/DeSE58274.2023.10100157","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100157","url":null,"abstract":"COVID-19's impacts have spread widely in all directions such as economy, people's lifestyles and well-being. Though existing studies have highlighted such an impact, it remains unclear how the current COVID-19 situation has affected the retrenchment, vaccination and global happiness. In this paper, we present an automated tool enables the public to view various insight. In particular, we integrate and analyze the data from various data sources and show how the COVID19 has impacted Singapore and globally. We employ the regression models to identify the correlation between Human Development Index, Stringency Index, Gross Domestic Product per Capita, Total Deaths from COVID-19, and Total Cases of COVID-19; the rate of vaccination and vaccine hesitancy; and the factors to positively correlate to the global happiness. The insight provided adds values to better fight against the COVID-19 pandemic and future global crisis.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133608413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10100318
Mahmoud H. Farhan, Khalid Shaker, Sufyan T. Faraj Al-Janabi
In recent years, the problem of fake image diffusion is on the rise mainly on social networks because of the development of different tools for image editing. Copy-move forgery (CMF) is one of the image forgeries types used for manipulating the image content. In CMF, the region in an image is copied and placed in a different location in the same image. In this paper, an algorithm for CMF detection based on a Double Dual Convolutional Neural Network (D2CNN) is proposed. A novel concatenation of two Dual Convolutional Neural Networks (DCNN) is used, where each DCNN is composed of two CNN networks. A fully connected network (FCN) is taking the result of the D2CNN and hence classifying the input images into either original or forged. The features extracted from the two DCNN and fusion of these features (D2CNN) have achieved good results according to the following metrics: Accuracy, f1-score, precision, and recall. Two standard datasets namely MICC F-220 and MICC F-2000 have been used to evaluate the proposed approach. Experimental analysis shows that the proposed approach achieves accuracy higher than 98.48% on the MICC F-220 dataset and 97.83% on the MICC F-2000 dataset.
{"title":"Double Dual Convolutional Neural Network (D2CNN) for Copy-Move Forgery Detection","authors":"Mahmoud H. Farhan, Khalid Shaker, Sufyan T. Faraj Al-Janabi","doi":"10.1109/DeSE58274.2023.10100318","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10100318","url":null,"abstract":"In recent years, the problem of fake image diffusion is on the rise mainly on social networks because of the development of different tools for image editing. Copy-move forgery (CMF) is one of the image forgeries types used for manipulating the image content. In CMF, the region in an image is copied and placed in a different location in the same image. In this paper, an algorithm for CMF detection based on a Double Dual Convolutional Neural Network (D2CNN) is proposed. A novel concatenation of two Dual Convolutional Neural Networks (DCNN) is used, where each DCNN is composed of two CNN networks. A fully connected network (FCN) is taking the result of the D2CNN and hence classifying the input images into either original or forged. The features extracted from the two DCNN and fusion of these features (D2CNN) have achieved good results according to the following metrics: Accuracy, f1-score, precision, and recall. Two standard datasets namely MICC F-220 and MICC F-2000 have been used to evaluate the proposed approach. Experimental analysis shows that the proposed approach achieves accuracy higher than 98.48% on the MICC F-220 dataset and 97.83% on the MICC F-2000 dataset.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126630314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10099877
I. Makarova, G. Mavlyautdinova, V. Mavrin, P. Buyvol, A. Alatrany, J. Mustafina
The strategy of spatial development of the country for the period up to 2024, based on the infrastructure of a specific type of transport, provides for the connection of the territories of settlements with modern communications; phased reconstruction and modernization; personnel, technical and technological support for interaction and digital transformation of the Russian transport complex. The development of the Russian Arctic is a priority area, since it has a significant natural resource, socio-economic and transport potential, which must be maximized, taking into account all the features of this region. It is important to develop the northern territories in such a way that the transport infrastructure of the Arctic meets the requirements in the field of comfort and safety of the human environment. This can be achieved through the use of vehicles of increased environmental friendliness and energy efficiency. In the study we analyse the possibility of converting shift buses used to deliver personnel involved in the development of fields in the Arctic zone to gas motor fuel using simulation models.
{"title":"Improvement of the Personnel Delivery System in the Mining Complex using Simulation Models","authors":"I. Makarova, G. Mavlyautdinova, V. Mavrin, P. Buyvol, A. Alatrany, J. Mustafina","doi":"10.1109/DeSE58274.2023.10099877","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099877","url":null,"abstract":"The strategy of spatial development of the country for the period up to 2024, based on the infrastructure of a specific type of transport, provides for the connection of the territories of settlements with modern communications; phased reconstruction and modernization; personnel, technical and technological support for interaction and digital transformation of the Russian transport complex. The development of the Russian Arctic is a priority area, since it has a significant natural resource, socio-economic and transport potential, which must be maximized, taking into account all the features of this region. It is important to develop the northern territories in such a way that the transport infrastructure of the Arctic meets the requirements in the field of comfort and safety of the human environment. This can be achieved through the use of vehicles of increased environmental friendliness and energy efficiency. In the study we analyse the possibility of converting shift buses used to deliver personnel involved in the development of fields in the Arctic zone to gas motor fuel using simulation models.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114782483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10099775
Eugene Tye Wee Chin, Intan Farahana Binti Kamsin, S. Amin, Nur Khairunnisha Binti Zainal
Privacy and security of sensitive health information represents a significant issue within electronic health (e-Health). With breakthroughs in security and privacy in recent decades, the application of cloud technologies on health services have progressed forward. The aim of this research paper is to introduce an appropriate access control model for use in e-Health. To determine the requirements of a modern access control method, research was carried out on numerous scholarly articles sourced from the Google Scholar search engine. A survey which utilized sampling techniques will also be done to affirm the validity of the research. The target audience of the survey are large to medium scale healthcare providers. Qualitative data will be gathered as it better describes the different types of data obtained. As a result, the paper proposed a combination of Role-based Access Control and Attribute-based Access Control which utilizes zero-knowledge SNARK to ensure privacy of patients. Recommendations for future research include experimentation with other encryption algorithms in the proposed system, assessment on the use of different zero-knowledge proof methods for better efficiency and scalability, as well as modern access control methods that embrace expansions and simple authorization.
{"title":"Hybrid Zero-knowledge Access Control System in e-Health","authors":"Eugene Tye Wee Chin, Intan Farahana Binti Kamsin, S. Amin, Nur Khairunnisha Binti Zainal","doi":"10.1109/DeSE58274.2023.10099775","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099775","url":null,"abstract":"Privacy and security of sensitive health information represents a significant issue within electronic health (e-Health). With breakthroughs in security and privacy in recent decades, the application of cloud technologies on health services have progressed forward. The aim of this research paper is to introduce an appropriate access control model for use in e-Health. To determine the requirements of a modern access control method, research was carried out on numerous scholarly articles sourced from the Google Scholar search engine. A survey which utilized sampling techniques will also be done to affirm the validity of the research. The target audience of the survey are large to medium scale healthcare providers. Qualitative data will be gathered as it better describes the different types of data obtained. As a result, the paper proposed a combination of Role-based Access Control and Attribute-based Access Control which utilizes zero-knowledge SNARK to ensure privacy of patients. Recommendations for future research include experimentation with other encryption algorithms in the proposed system, assessment on the use of different zero-knowledge proof methods for better efficiency and scalability, as well as modern access control methods that embrace expansions and simple authorization.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129450224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10099981
S. W. Nourildean, Mustafa Dhia Hassib, Y. A. Mohammed
Future Internet, described as an “Internet of Things,” is planned to be a global network of connected items, each with a unique address, based on industry-standard protocol. It is an important growing technology for environmental monitoring and future enterprises. IoT could be described as linking commonplace objects to the Internet, such as smart phones, actuators and sensors to enable new communication forms between objects themselves as well as between objects and people. Internet of Things (IoT) and wireless sensor networks (WSN) can be used to perform smart home technologies. This research presented Ad hoc routing protocols in IoT -based WSN in smart home system using Riverbed Modeler simulation platform. The simulation of WSN based on Mesh topology-ZigBee (IEEE 802.15.4) standard. Different applications such as Data Access, File transfer, Peer - to peer File sharing, Voice and Video, Mobile Messaging were applied in different number of scenarios of IoT based Wireless Sensor Network with three routing protocols (AODV, OLSR and GRP hybrid routing protocol) were taken in this study. In different modeled scenarios of this study, the sensing nodes (sensors) sense the environmental condition and send the collected data to the WSN controller which it is represented by ZigBee coordinator. The controller sent the sensor's data to the WiFi which act a gateway, so that this data could be monitored and controlled by the user via the Internet. The research outcomes showed that ad hoc routing protocol played an important role to improve the network's performance in terms of QoS parameters (delay, throughput and data dropped) due to the network deficiency which occurs because of interference between WSN and WiFi since they utilize free frequency band 2.4GHz. in this study, AODV investigated better improvement on the throughput and delay network performance with acceptable improvement in data dropped.
{"title":"AD-Hoc Routing Protocols in WSN-WiFi based IoT in Smart Home","authors":"S. W. Nourildean, Mustafa Dhia Hassib, Y. A. Mohammed","doi":"10.1109/DeSE58274.2023.10099981","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099981","url":null,"abstract":"Future Internet, described as an “Internet of Things,” is planned to be a global network of connected items, each with a unique address, based on industry-standard protocol. It is an important growing technology for environmental monitoring and future enterprises. IoT could be described as linking commonplace objects to the Internet, such as smart phones, actuators and sensors to enable new communication forms between objects themselves as well as between objects and people. Internet of Things (IoT) and wireless sensor networks (WSN) can be used to perform smart home technologies. This research presented Ad hoc routing protocols in IoT -based WSN in smart home system using Riverbed Modeler simulation platform. The simulation of WSN based on Mesh topology-ZigBee (IEEE 802.15.4) standard. Different applications such as Data Access, File transfer, Peer - to peer File sharing, Voice and Video, Mobile Messaging were applied in different number of scenarios of IoT based Wireless Sensor Network with three routing protocols (AODV, OLSR and GRP hybrid routing protocol) were taken in this study. In different modeled scenarios of this study, the sensing nodes (sensors) sense the environmental condition and send the collected data to the WSN controller which it is represented by ZigBee coordinator. The controller sent the sensor's data to the WiFi which act a gateway, so that this data could be monitored and controlled by the user via the Internet. The research outcomes showed that ad hoc routing protocol played an important role to improve the network's performance in terms of QoS parameters (delay, throughput and data dropped) due to the network deficiency which occurs because of interference between WSN and WiFi since they utilize free frequency band 2.4GHz. in this study, AODV investigated better improvement on the throughput and delay network performance with acceptable improvement in data dropped.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122459890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-09DOI: 10.1109/DeSE58274.2023.10099609
Aicha Idriss Hentati, L. Chaari, Lobna Krichen, A. Alanezi
During this last decade, Unmanned Aerial Vehicles (UAVs) are being useful in complex missions and critical scenarios in particular for hostile areas supervision. The integration between Space-Air-Ground Networks (SAGIN) is gaining more attention especially with the future generation of cellular networks (6G). In this context, mainly, we focus on the integration between aerial and terrestrial networks. The aerial network corresponds to the use of the multi-UAVs network, called Flying Ad Hoc Networks (FANETs), and the terrestrial networks correspond to the use of the Ground Control Station (GCS), Wireless Sensor Network (WSN), Internet of Things (IoT), cellular networks and cloud computing. Moreover, we propose a novel architecture named Multi-UAVs-based SDN, IoT, and Cloud Architecture (MUSICA), in which we use Software Defined Network (SDN) controller to manage the integration between terrestrial and aerial networks and we deploy cloud storage and computing resources. The detailed functional components of the proposed MUSICA architecture and the data flow between its different components are discussed and the benefits of MUSICA for scalable land supervision are pinpointed.
在过去的十年中,无人驾驶飞行器(uav)在复杂任务和关键场景中非常有用,特别是在敌对地区的监督中。随着下一代蜂窝网络(6G)的发展,空间-空地网络(SAGIN)的集成越来越受到人们的关注。在此背景下,我们主要关注空中和地面网络的融合。空中网络对应于多无人机网络的使用,称为飞行自组织网络(fanet),地面网络对应于地面控制站(GCS)、无线传感器网络(WSN)、物联网(IoT)、蜂窝网络和云计算的使用。此外,我们提出了一种名为multi - uav -based SDN, IoT, and Cloud architecture (MUSICA)的新架构,其中我们使用软件定义网络(SDN)控制器来管理地面和空中网络之间的集成,并部署云存储和计算资源。讨论了所提出的MUSICA架构的详细功能组件及其不同组件之间的数据流,并指出了MUSICA对可扩展土地监管的好处。
{"title":"Multi-UAVs-based SDN, IoT, and Cloud Architecture for Hostile Areas Supervision","authors":"Aicha Idriss Hentati, L. Chaari, Lobna Krichen, A. Alanezi","doi":"10.1109/DeSE58274.2023.10099609","DOIUrl":"https://doi.org/10.1109/DeSE58274.2023.10099609","url":null,"abstract":"During this last decade, Unmanned Aerial Vehicles (UAVs) are being useful in complex missions and critical scenarios in particular for hostile areas supervision. The integration between Space-Air-Ground Networks (SAGIN) is gaining more attention especially with the future generation of cellular networks (6G). In this context, mainly, we focus on the integration between aerial and terrestrial networks. The aerial network corresponds to the use of the multi-UAVs network, called Flying Ad Hoc Networks (FANETs), and the terrestrial networks correspond to the use of the Ground Control Station (GCS), Wireless Sensor Network (WSN), Internet of Things (IoT), cellular networks and cloud computing. Moreover, we propose a novel architecture named Multi-UAVs-based SDN, IoT, and Cloud Architecture (MUSICA), in which we use Software Defined Network (SDN) controller to manage the integration between terrestrial and aerial networks and we deploy cloud storage and computing resources. The detailed functional components of the proposed MUSICA architecture and the data flow between its different components are discussed and the benefits of MUSICA for scalable land supervision are pinpointed.","PeriodicalId":346847,"journal":{"name":"2023 15th International Conference on Developments in eSystems Engineering (DeSE)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117313129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}