首页 > 最新文献

Journal of Internet Services and Information Security最新文献

英文 中文
Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions 用于银行金融交易欺诈检测的集成 SVM-FFNN
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.002
Udayakumar Dr.R., Dr.P. Bharath Kumar Chowdary, Devi Dr.T., Sugumar Dr.R.
Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation utilizing labeled financial transaction data, the integrated SVM-FFNN model shows promise in detecting fraud with increased accuracy and precision. This research contributes to the development of innovative techniques for enhancing financial fraud detection systems.
检测金融交易中的欺诈行为对于保证金融系统的完整性和安全性至关重要。本文提出了一种结合支持向量机(SVM)和前馈神经网络(FFNN)的欺诈行为检测方法。所提出的方法利用支持向量机和FFNN的优势来区分类别,并分别捕获复杂的模式和关系。支持向量机模型作为特征提取器,为FFNN提供高级表示作为输入。通过利用标记金融交易数据的详尽评估,集成的SVM-FFNN模型在检测欺诈方面具有更高的准确性和精度。这项研究有助于创新技术的发展,以加强金融欺诈检测系统。
{"title":"Integrated SVM-FFNN for Fraud Detection in Banking Financial Transactions","authors":"Udayakumar Dr.R., Dr.P. Bharath Kumar Chowdary, Devi Dr.T., Sugumar Dr.R.","doi":"10.58346/jisis.2023.i4.002","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.002","url":null,"abstract":"Detecting fraud in financial transactions is crucial for guaranteeing the integrity and security of financial systems. This paper presents an integrated approach for detecting fraudulent activities that incorporates Support Vector Machines (SVM) and Feedforward Neural Networks (FFNN). The proposed methodology utilizes the strengths of SVM and FFNN to distinguish between classes and capture complex patterns and relationships, respectively. The SVM model functions as a feature extractor, supplying the FFNN with high-level representations as inputs. Through an exhaustive evaluation utilizing labeled financial transaction data, the integrated SVM-FFNN model shows promise in detecting fraud with increased accuracy and precision. This research contributes to the development of innovative techniques for enhancing financial fraud detection systems.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"86 21","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient Transit Network Design, Frequency Adjustment, and Fleet Calculation Using Genetic Algorithms 利用遗传算法进行高效公交网络设计、频率调整和车队计算
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.003
Miguel Jiménez-Carrión, Gustavo A. Flores-Fernandez, Alejandro B. Jiménez-Panta
The main objective of this study was to implement a computational prototype in two stages: the first stage primarily focused on generating efficient routes based on an evolutionary algorithm. In other words, the complex computational problem was solved in the first stage. The second stage then shifted its focus towards determining the fleet size and frequencies using an allocation algorithm. This approach was designed to address the complex combinatorial search problem within a public transportation network. In the first stage, the prototype utilizes the metaheuristic known as Genetic Algorithms (GA). Within the GA operators, an innovative method called "aggregated crossover" is employed, with an additional mutation procedure that maintains feasible descendants. In the second stage, an allocation algorithm is used, taking into account the routes generated in the first stage. The results demonstrate that in the first stage, the GA metaheuristic consistently delivers highly efficient routes in each run, confirming that the combinatorial complexity of the problem is effectively resolved in this initial phase. These results were validated on Mandl's Swiss Road network, showing superior solutions compared to those presented in previous studies. Notably, the execution time for this process is only 35 minutes.
本研究的主要目标是分两个阶段实现一个计算原型:第一阶段主要侧重于基于进化算法生成高效路线。换句话说,在第一阶段解决了复杂的计算问题。然后,第二阶段将重点转向使用分配算法确定机队规模和频率。该方法旨在解决公共交通网络中复杂的组合搜索问题。在第一阶段,原型利用被称为遗传算法(GA)的元启发式。在遗传算子中,采用了一种称为“聚合交叉”的创新方法,并使用了一个额外的突变过程来保持可行的后代。在第二阶段,考虑第一阶段产生的路由,使用分配算法。结果表明,在第一阶段,GA元启发式算法在每次运行中始终如一地提供高效的路径,证实了在该初始阶段有效地解决了问题的组合复杂性。这些结果在Mandl的瑞士道路网络上得到了验证,与之前的研究相比,显示出更好的解决方案。值得注意的是,此流程的执行时间仅为35分钟。
{"title":"Efficient Transit Network Design, Frequency Adjustment, and Fleet Calculation Using Genetic Algorithms","authors":"Miguel Jiménez-Carrión, Gustavo A. Flores-Fernandez, Alejandro B. Jiménez-Panta","doi":"10.58346/jisis.2023.i4.003","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.003","url":null,"abstract":"The main objective of this study was to implement a computational prototype in two stages: the first stage primarily focused on generating efficient routes based on an evolutionary algorithm. In other words, the complex computational problem was solved in the first stage. The second stage then shifted its focus towards determining the fleet size and frequencies using an allocation algorithm. This approach was designed to address the complex combinatorial search problem within a public transportation network. In the first stage, the prototype utilizes the metaheuristic known as Genetic Algorithms (GA). Within the GA operators, an innovative method called \"aggregated crossover\" is employed, with an additional mutation procedure that maintains feasible descendants. In the second stage, an allocation algorithm is used, taking into account the routes generated in the first stage. The results demonstrate that in the first stage, the GA metaheuristic consistently delivers highly efficient routes in each run, confirming that the combinatorial complexity of the problem is effectively resolved in this initial phase. These results were validated on Mandl's Swiss Road network, showing superior solutions compared to those presented in previous studies. Notably, the execution time for this process is only 35 minutes.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"115 33","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the Convergence of Design, Security, and Human Dynamics in Social Networks in India 探索印度社交网络中设计、安全和人文动态的融合
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.004
SenthilKumar Ilango, Ravichandran Dr.K.
This Exploration dives into the complex exchange between social networks, zeroing in on their design, security measures, and the impact of human factors. As social networks keep on molding present day correspondence and connection, understanding their elements turns out to be progressively pivotal. The examination investigates the architecture and user-focused design rules that improve user experiences, encourage community associations, and empower self-expression. All the while, the review tends to the squeezing security challenges presented by these platforms, dissecting risks like identity theft and misinformation dispersal, and proposing techniques for powerful encryption and data protection. Moreover, the review digs into the domain of human behavior and brain research, clarifying how individual inspirations, cognitive biases, and social standards add to content creation, sharing, and commitment inside social networks. The bits of knowledge acquired give a complete perspective on what user activities mean for network elements and the development of online networks. By exploring these aspects, the review expects to illuminate platform developers and policymakers, offering important direction on upgrading design, carrying out powerful security measures, and figuring out user behavior. Eventually, this examination adds to an all-encompassing comprehension of social networks, introducing a diverse investigation of design, security, and human factors. The discoveries guide the advancement of more user-centric, secure, and socially significant social organization platforms that line up with user inclinations and contribute decidedly to the digital landscape.
这个探索深入到复杂的社会网络之间的交换,集中在他们的设计,安全措施,以及人为因素的影响。随着社交网络不断塑造当今的通信和联系,了解其要素变得越来越关键。该考试调查了架构和以用户为中心的设计规则,这些规则可以改善用户体验,鼓励社区联系,并赋予自我表达的权力。一直以来,审查都倾向于这些平台带来的严峻安全挑战,剖析身份盗窃和错误信息传播等风险,并提出强大的加密和数据保护技术。此外,本文还深入探讨了人类行为和大脑研究领域,阐明了个人灵感、认知偏见和社会标准如何影响社交网络中的内容创造、分享和承诺。所获得的知识提供了一个完整的视角,说明用户活动对网络元素和在线网络的发展意味着什么。通过对这些方面的探讨,本综述希望对平台开发者和决策者有所启发,为升级设计、实施强有力的安全措施、了解用户行为提供重要方向。最后,这种检查增加了对社会网络的全面理解,引入了对设计、安全性和人为因素的各种调查。这些发现引导了更多以用户为中心的、安全的、具有社会意义的社会组织平台的发展,这些平台符合用户的倾向,并对数字景观做出了决定性的贡献。
{"title":"Exploring the Convergence of Design, Security, and Human Dynamics in Social Networks in India","authors":"SenthilKumar Ilango, Ravichandran Dr.K.","doi":"10.58346/jisis.2023.i4.004","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.004","url":null,"abstract":"This Exploration dives into the complex exchange between social networks, zeroing in on their design, security measures, and the impact of human factors. As social networks keep on molding present day correspondence and connection, understanding their elements turns out to be progressively pivotal. The examination investigates the architecture and user-focused design rules that improve user experiences, encourage community associations, and empower self-expression. All the while, the review tends to the squeezing security challenges presented by these platforms, dissecting risks like identity theft and misinformation dispersal, and proposing techniques for powerful encryption and data protection. Moreover, the review digs into the domain of human behavior and brain research, clarifying how individual inspirations, cognitive biases, and social standards add to content creation, sharing, and commitment inside social networks. The bits of knowledge acquired give a complete perspective on what user activities mean for network elements and the development of online networks. By exploring these aspects, the review expects to illuminate platform developers and policymakers, offering important direction on upgrading design, carrying out powerful security measures, and figuring out user behavior. Eventually, this examination adds to an all-encompassing comprehension of social networks, introducing a diverse investigation of design, security, and human factors. The discoveries guide the advancement of more user-centric, secure, and socially significant social organization platforms that line up with user inclinations and contribute decidedly to the digital landscape.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"29 12","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606456","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Raspberry Pi in Forensic Computer Crimes 树莓派在计算机犯罪取证中的作用
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.005
B. Fakiha
This study examined the use of Raspberry Pi for forensic analysis and its potential for providing computer protection. It investigates its capability to identify suspicious patterns on USB drives and its compatibility with certain software. Furthermore, it examines the ability of the Raspberry Pi to generate reports and send email notifications upon detection of any malicious files such as worms, Trojans, and spyware. Additionally, it investigates Raspberry Pi's ability to move potentially malicious files to a secure trash folder for sanitization. The experiment was designed using an experimental method. The findings suggest that the Raspberry Pi can provide computer protection through automatic report generation and email notifications for malicious file detection. As a result, this study provides evidence that Raspberry Pi can effectively provide digital forensics services. Its quick file search capabilities make it a powerful tool that can help organizations gather crucial digital evidence that may otherwise remain undetected.
本研究考察了树莓派用于法医分析及其提供计算机保护的潜力。它调查其能力,以识别可疑模式的USB驱动器和它的兼容性与某些软件。此外,它还检查了树莓派在检测到任何恶意文件(如蠕虫、特洛伊木马和间谍软件)时生成报告和发送电子邮件通知的能力。此外,它还调查了树莓派将潜在恶意文件移动到安全垃圾文件夹进行清理的能力。本实验采用实验法设计。研究结果表明,树莓派可以通过自动报告生成和恶意文件检测的电子邮件通知提供计算机保护。因此,本研究提供了树莓派可以有效地提供数字取证服务的证据。它的快速文件搜索功能使其成为一个强大的工具,可以帮助组织收集重要的数字证据,否则可能不会被发现。
{"title":"The Role of Raspberry Pi in Forensic Computer Crimes","authors":"B. Fakiha","doi":"10.58346/jisis.2023.i4.005","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.005","url":null,"abstract":"This study examined the use of Raspberry Pi for forensic analysis and its potential for providing computer protection. It investigates its capability to identify suspicious patterns on USB drives and its compatibility with certain software. Furthermore, it examines the ability of the Raspberry Pi to generate reports and send email notifications upon detection of any malicious files such as worms, Trojans, and spyware. Additionally, it investigates Raspberry Pi's ability to move potentially malicious files to a secure trash folder for sanitization. The experiment was designed using an experimental method. The findings suggest that the Raspberry Pi can provide computer protection through automatic report generation and email notifications for malicious file detection. As a result, this study provides evidence that Raspberry Pi can effectively provide digital forensics services. Its quick file search capabilities make it a powerful tool that can help organizations gather crucial digital evidence that may otherwise remain undetected.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"31 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ECC based Authentication Approach for Secure Communication in IoT Application 物联网应用中基于 ECC 的安全通信认证方法
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.006
S. T. Revathi, Gayathri A., Sathya A., Santhiya M.
Internet of Things (IoT) is an advanced applied science in recent years that enables communication among humans and smart components or among Internet-based components. Besides, IoT provides affiliation of physical and virtual elements that are fully controlled by different kinds of hardware, software, and interaction advancements. Though numerous methods of IoT offer many advantages to our day-to-day routine, it also possesses huge security weaknesses. The traditional methods are vulnerable to a huge range of attacks. Hence, establishing safe and effective security alternatives for the IoT environment remains as a main challenge and the major risk in this security solution is to transfer significant information in a secure manner. To address such limitations, an effective authentication approach named CHEK-based authentication methodology is devised for secure communication in IoT. The proposed authentication scheme consists of four steps and the authentication approach is developed by considering various security operations like hashing, encryption, secret key pairs, passwords, and so on. Moreover, the CHEK-based authentication scheme provides promising solution with minimum computational cost of 16.541 and minimum memory usage of 72.3MB.
物联网(Internet of Things, IoT)是近年来发展起来的一门先进的应用科学,它能够实现人与智能组件之间或基于互联网的组件之间的通信。此外,物联网提供了物理和虚拟元素的从属关系,这些元素完全由不同类型的硬件,软件和交互进步控制。尽管物联网的许多方法为我们的日常工作提供了许多优势,但它也具有巨大的安全弱点。传统的方法容易受到各种各样的攻击。因此,为物联网环境建立安全有效的安全替代方案仍然是一项主要挑战,这种安全解决方案的主要风险是以安全的方式传输重要信息。为了解决这些限制,设计了一种有效的身份验证方法,称为基于check的身份验证方法,用于物联网中的安全通信。提出的身份验证方案由四个步骤组成,并且通过考虑各种安全操作(如散列、加密、秘密密钥对、密码等)来开发身份验证方法。此外,基于check的认证方案以最小的计算成本(16.541)和最小的内存使用(72.3MB)提供了有前途的解决方案。
{"title":"ECC based Authentication Approach for Secure Communication in IoT Application","authors":"S. T. Revathi, Gayathri A., Sathya A., Santhiya M.","doi":"10.58346/jisis.2023.i4.006","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.006","url":null,"abstract":"Internet of Things (IoT) is an advanced applied science in recent years that enables communication among humans and smart components or among Internet-based components. Besides, IoT provides affiliation of physical and virtual elements that are fully controlled by different kinds of hardware, software, and interaction advancements. Though numerous methods of IoT offer many advantages to our day-to-day routine, it also possesses huge security weaknesses. The traditional methods are vulnerable to a huge range of attacks. Hence, establishing safe and effective security alternatives for the IoT environment remains as a main challenge and the major risk in this security solution is to transfer significant information in a secure manner. To address such limitations, an effective authentication approach named CHEK-based authentication methodology is devised for secure communication in IoT. The proposed authentication scheme consists of four steps and the authentication approach is developed by considering various security operations like hashing, encryption, secret key pairs, passwords, and so on. Moreover, the CHEK-based authentication scheme provides promising solution with minimum computational cost of 16.541 and minimum memory usage of 72.3MB.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"42 9","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606751","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intelligent Farming based on Uncertainty Expert System with Butterfly Optimization Algorithm for Crop Recommendation 基于不确定性专家系统的智能农业与用于作物推荐的蝴蝶优化算法
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.011
Veerasamy K., E.J. Thomson Fredrik
Meeting the current population's food demands has become challenging, given the rising population, frequent climate fluctuations, and limited resources. Smart farming, also known as precision agriculture, has emerged as an advanced approach to tackle modern challenges in crop production. At the heart of this cutting-edge technology is machine learning, serving as the driving force behind its implementation. Though, there are many algorithms are available in crop prediction process, the problem of predicting vague information is still a challenging issue. Unfortunately, existing algorithms mostly avoids the complicated instances in crop recommendation dataset by not handling them effectively, due to imbalance class distribution. Hence in this research work to conduct an intelligent farming, two different uncertain theories are adopted to handle the issue of vagueness in appropriate recommendation of crop by considering soil fertility and climatic condition. The proposed is developed based on uncertainty expert system with both neutrosophicalparaconsistent inference model. The neutrosophic inference model is integrated with the paraconsistent logic to overcome the problem of uncertainty in prediction of appropriate crop by representing the factors in terms of certainty degree and contradiction degree. The rule generated by paraconsistent model is validated to improve the accuracy of crop prediction by fusing the knowledge of butterfly optimization algorithm. The nectar searching behavior of the butterflies are used for searching potential rules as a validation process. With the pruned rules generated by uncertainty expert model, the suitable crop is predicted more accurately compared to the other existing prediction models.
由于人口不断增长,气候波动频繁,资源有限,满足当前人口的粮食需求已成为一项挑战。智能农业,也被称为精准农业,已经成为解决现代作物生产挑战的一种先进方法。这项尖端技术的核心是机器学习,是其实施背后的驱动力。虽然在作物预测过程中有许多算法可用,但模糊信息的预测问题仍然是一个具有挑战性的问题。遗憾的是,由于类分布不平衡,现有算法大多无法有效处理作物推荐数据集中的复杂实例。因此,在进行智能农业的研究工作中,采用了两种不同的不确定性理论来处理考虑土壤肥力和气候条件的作物适宜推荐的模糊性问题。该方法是在不确定性专家系统的基础上发展起来的,具有中性粒细胞和副一致性推理模型。将中性推理模型与副一致逻辑相结合,用确定性程度和矛盾程度来表示因素,克服了适宜作物预测的不确定性问题。通过融合蝴蝶优化算法的知识,验证了由副一致模型生成的规则,提高了作物预测的精度。利用蝴蝶的寻蜜行为来搜索潜在规则作为验证过程。利用不确定性专家模型生成的修剪规则,比现有的预测模型更准确地预测出合适的作物。
{"title":"Intelligent Farming based on Uncertainty Expert System with Butterfly Optimization Algorithm for Crop Recommendation","authors":"Veerasamy K., E.J. Thomson Fredrik","doi":"10.58346/jisis.2023.i4.011","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.011","url":null,"abstract":"Meeting the current population's food demands has become challenging, given the rising population, frequent climate fluctuations, and limited resources. Smart farming, also known as precision agriculture, has emerged as an advanced approach to tackle modern challenges in crop production. At the heart of this cutting-edge technology is machine learning, serving as the driving force behind its implementation. Though, there are many algorithms are available in crop prediction process, the problem of predicting vague information is still a challenging issue. Unfortunately, existing algorithms mostly avoids the complicated instances in crop recommendation dataset by not handling them effectively, due to imbalance class distribution. Hence in this research work to conduct an intelligent farming, two different uncertain theories are adopted to handle the issue of vagueness in appropriate recommendation of crop by considering soil fertility and climatic condition. The proposed is developed based on uncertainty expert system with both neutrosophicalparaconsistent inference model. The neutrosophic inference model is integrated with the paraconsistent logic to overcome the problem of uncertainty in prediction of appropriate crop by representing the factors in terms of certainty degree and contradiction degree. The rule generated by paraconsistent model is validated to improve the accuracy of crop prediction by fusing the knowledge of butterfly optimization algorithm. The nectar searching behavior of the butterflies are used for searching potential rules as a validation process. With the pruned rules generated by uncertainty expert model, the suitable crop is predicted more accurately compared to the other existing prediction models.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"14 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Digital Video Broadcasting T2 Lite Performance Evaluation Based on Rotated Constellation Rates 基于旋转星座率的数字视频广播 T2 Lite 性能评估
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.009
Abeer A. Kadhim, Samir J. Mohammed, Qais Al-Gayem
DVB-T2 offers the best levels of efficiency, reliability, and flexibility of any digital terrestrial broadcast technology now available. It provides the most up-to-date coding and modulation techniques to make the valuable terrestrial spectrum extremely effectively usable for many types of transmission. The mobile configuration of DVBT2 also known as T2-Lite, employs a constrained set of possible modes that are suited for movable transmission and reduce the demands placed on the receiver. This study compares the T2-Lite system's performance before and after using constellation rotation and cyclic Quadrature (Q) delay methods among different types of constellations, coding rates, and fading channels. Results show a significant improvement in T2-Lite system performance while using a rotating constellation in a bad fading environment. Moreover, the utilization of this technique enhances DVB-T2 Lite gain. All simulation of system components and channels were carried out in MATLAB R2021a software.
DVB-T2提供了目前可用的任何数字地面广播技术的最佳效率、可靠性和灵活性。它提供了最新的编码和调制技术,使宝贵的地面频谱非常有效地用于多种类型的传输。DVBT2的移动配置也称为T2-Lite,采用了一组适用于移动传输的受限模式,并减少了对接收器的要求。本研究比较了在不同星座类型、编码速率和衰落信道下,采用星座旋转和循环正交(Q)延迟方法前后T2-Lite系统的性能。结果表明,在恶劣的衰落环境下,使用旋转星座可以显著提高T2-Lite系统的性能。此外,该技术的使用提高了DVB-T2的寿命增益。所有系统部件和通道的仿真均在MATLAB R2021a软件中进行。
{"title":"Digital Video Broadcasting T2 Lite Performance Evaluation Based on Rotated Constellation Rates","authors":"Abeer A. Kadhim, Samir J. Mohammed, Qais Al-Gayem","doi":"10.58346/jisis.2023.i4.009","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.009","url":null,"abstract":"DVB-T2 offers the best levels of efficiency, reliability, and flexibility of any digital terrestrial broadcast technology now available. It provides the most up-to-date coding and modulation techniques to make the valuable terrestrial spectrum extremely effectively usable for many types of transmission. The mobile configuration of DVBT2 also known as T2-Lite, employs a constrained set of possible modes that are suited for movable transmission and reduce the demands placed on the receiver. This study compares the T2-Lite system's performance before and after using constellation rotation and cyclic Quadrature (Q) delay methods among different types of constellations, coding rates, and fading channels. Results show a significant improvement in T2-Lite system performance while using a rotating constellation in a bad fading environment. Moreover, the utilization of this technique enhances DVB-T2 Lite gain. All simulation of system components and channels were carried out in MATLAB R2021a software.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"9 7","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138606819","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification Deep Fraud Net:用于网络安全和金融欺诈检测与分类的深度学习方法
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.010
Udayakumar R., Joshi A., Boomiga S.S., Sugumar R.
Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To tackle these obstacles, the present study introduces Deep Fraud Net, a framework that utilizes deep learning to detect and classify instances of financial fraud and cyber security threats. The Deep Fraud Net system model entails the utilization of a deep neural network to acquire intricate patterns and characteristics from extensive datasets through training. The framework integrates noise reduction methods to enhance the precision of fraud detection and improve the quality of input data. The Deep Fraud Net method attains a precision of 98.85%, accuracy of 93.35%, sensitivity of 99.05%, specificity of 93.16%, false positive rate of 7.34%, and true positive rate of 89.58%. The findings suggest that Deep Fraud Net can effectively detect and categorize instances of fraudulent behavior with a reduced occurrence of misclassifications. The method exhibits potential implications for diverse domains that prioritize robust security and fraud detection, including but not limited to banking, e-commerce, and online transactions.
鉴于对数字系统的日益依赖和金融欺诈事件的升级,实施有效的网络安全协议和欺诈检测方法势在必行。威胁的动态性经常挑战传统方法,需要采用更复杂的策略。个人依赖于预先建立的法规或解决问题的过程,这在识别新的和复杂的欺诈趋势方面具有局限性。传统技术需要帮助处理噪声数据以及假阳性和真阳性带来的大量费用。为了解决这些障碍,本研究引入了深度欺诈网络,这是一个利用深度学习来检测和分类金融欺诈和网络安全威胁实例的框架。深度欺诈网络系统模型需要利用深度神经网络,通过训练从大量数据集中获取复杂的模式和特征。该框架集成了降噪方法,以提高欺诈检测的精度,提高输入数据的质量。Deep Fraud Net方法的准确率为98.85%,准确率为93.35%,灵敏度为99.05%,特异性为93.16%,假阳性率为7.34%,真阳性率为89.58%。研究结果表明,深度欺诈网络可以有效地检测和分类欺诈行为的实例,减少错误分类的发生。该方法显示了对优先考虑健壮安全性和欺诈检测的不同领域的潜在影响,包括但不限于银行、电子商务和在线交易。
{"title":"Deep Fraud Net: A Deep Learning Approach for Cyber Security and Financial Fraud Detection and Classification","authors":"Udayakumar R., Joshi A., Boomiga S.S., Sugumar R.","doi":"10.58346/jisis.2023.i4.010","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.010","url":null,"abstract":"Given the growing dependence on digital systems and the escalation of financial fraud occurrences, it is imperative to implement efficient cyber security protocols and fraud detection methodologies. The threat's dynamic nature often challenges conventional methods, necessitating the adoption of more sophisticated strategies. Individuals depend on pre-established regulations or problem-solving processes, which possess constraints in identifying novel and intricate fraudulent trends. Conventional techniques need help handling noise data and the substantial expenses incurred by false positives and true positives. To tackle these obstacles, the present study introduces Deep Fraud Net, a framework that utilizes deep learning to detect and classify instances of financial fraud and cyber security threats. The Deep Fraud Net system model entails the utilization of a deep neural network to acquire intricate patterns and characteristics from extensive datasets through training. The framework integrates noise reduction methods to enhance the precision of fraud detection and improve the quality of input data. The Deep Fraud Net method attains a precision of 98.85%, accuracy of 93.35%, sensitivity of 99.05%, specificity of 93.16%, false positive rate of 7.34%, and true positive rate of 89.58%. The findings suggest that Deep Fraud Net can effectively detect and categorize instances of fraudulent behavior with a reduced occurrence of misclassifications. The method exhibits potential implications for diverse domains that prioritize robust security and fraud detection, including but not limited to banking, e-commerce, and online transactions.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"112 47","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607495","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MIAS: An IoT based Multiphase Identity Authentication Server for Enabling Secure Communication MIAS:基于物联网的多相身份验证服务器,实现安全通信
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.008
Aswathy R.H., Srithar S., K. R. Dayana, Padmavathi Padmavathi, Suresh P.
Internet of Things (IoT) provides an imminent floor to exchange information and enhance communication technology using embedded devices that are too sophisticated daily and deployed in diverse fields of life. The colossal volume of sensors employed within IoT application leads to disperse an enormous amount of data in the open air. The rudimentary facet of IoT enabled technologies having the pitfall, security. It is a practical problem in terms of networking, application and communication. Since the resource constraint feature of IoT enabled technology, both security and efficiency can be balanced. The effective algorithm builds over Elliptic Curve Cryptography (ECC) provides an effective solution due to its small key size. The sensor node in this scheme is incorporated with TPM to protect the system in crucial IoT applications. In this proposed work, a three-way authentication factor with key agreement protocol proposed with consecutive phases such as registration, login, authentication, and access control. The security assessment of the proposed scheme with diverse attacks are elaborated and the computation overhead compared with related schemes.
物联网(IoT)为使用日常过于复杂且部署在各种生活领域的嵌入式设备交换信息和增强通信技术提供了一个迫在眉睫的平台。物联网应用中使用的大量传感器导致大量数据分散在户外。物联网支持技术的基本方面具有陷阱,安全性。它在网络、应用和通信方面都是一个实际问题。由于物联网技术的资源约束特性,可以平衡安全性和效率。建立在椭圆曲线加密(ECC)之上的有效算法,由于其密钥大小较小,提供了一种有效的解决方案。该方案中的传感器节点与TPM相结合,在关键的物联网应用中保护系统。在此工作中,提出了一个具有密钥协议协议的三方身份验证因素,该认证协议具有注册、登录、身份验证和访问控制等连续阶段。阐述了该方案在各种攻击情况下的安全性评估,并与相关方案进行了计算开销比较。
{"title":"MIAS: An IoT based Multiphase Identity Authentication Server for Enabling Secure Communication","authors":"Aswathy R.H., Srithar S., K. R. Dayana, Padmavathi Padmavathi, Suresh P.","doi":"10.58346/jisis.2023.i4.008","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.008","url":null,"abstract":"Internet of Things (IoT) provides an imminent floor to exchange information and enhance communication technology using embedded devices that are too sophisticated daily and deployed in diverse fields of life. The colossal volume of sensors employed within IoT application leads to disperse an enormous amount of data in the open air. The rudimentary facet of IoT enabled technologies having the pitfall, security. It is a practical problem in terms of networking, application and communication. Since the resource constraint feature of IoT enabled technology, both security and efficiency can be balanced. The effective algorithm builds over Elliptic Curve Cryptography (ECC) provides an effective solution due to its small key size. The sensor node in this scheme is incorporated with TPM to protect the system in crucial IoT applications. In this proposed work, a three-way authentication factor with key agreement protocol proposed with consecutive phases such as registration, login, authentication, and access control. The security assessment of the proposed scheme with diverse attacks are elaborated and the computation overhead compared with related schemes.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"13 4","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Design for Increasing the Capacity Fourfold in NB-IoT Systems using A Modified Symbol Time Compression Approach 使用修改后的符号时间压缩方法将 NB-IoT 系统容量提高四倍的设计
Q2 Computer Science Pub Date : 2023-12-02 DOI: 10.58346/jisis.2023.i4.012
A. Mohammed, Hassan Mostafa, Abd El-Hady. A. Ammar
One of the most significant obstacles facing the Internet of Things (IoT) is how to offer support for communication to an expanding number of linked items. Narrow-band Internet of Things (NB-IoT), which is currently an aspect of fifth-generation (5G), is a new narrow-band wireless communication technology that has evolved in recent years to address this issue. To save power, NB-IoT currently exploits modulation schemes that are characterized by low order to deliver low data rate. However, as the number of applications dependent on data rate increases, NB-IoT needs to use data rate improvement technologies that do not consume additional power. This paper proposes a design for quadrupling the total number of linked items in the NB-IoT system using a symbol time compression methodology. A modified symbol time compression (MSTC) approach is specifically suggested, which could preserve 75% of the bandwidth (BW) by reducing the symbol time to a quarter (25%). This study suggests a design that uses the MSTC method four times in orthogonal frequency division multiplexing (4-MSTC-OFDM) to take advantage of the unused bandwidth and has the capability to deliver a quadruple quantity of information in comparison to the standard OFDM system. Simulations show that the suggested design (4-MSTC-OFDM) lowers the signal-to-noise ratio (SNR) by 3.9 dB (at BER = 10-6) and 4.4 dB (at BER = 10-4) compared to the OFDM system with 16-QAM (16-QAM-OFDM) when sending the same amount of data over the Rayleigh fading channel and additive white Gaussian noise channel (AWGN). Moreover, the results of simulations indicate that the proposed design possesses an identical BER as the conventional OFDM technique, implying that using the suggested method does not degrade the BER.
物联网(IoT)面临的最大障碍之一是如何为越来越多的连接项目提供通信支持。窄带物联网(NB-IoT)是近年来为解决这一问题而发展起来的一种新的窄带无线通信技术,目前是第五代(5G)的一个方面。为了节省功耗,NB-IoT目前利用低阶调制方案来提供低数据速率。然而,随着依赖数据速率的应用数量的增加,NB-IoT需要使用不消耗额外功率的数据速率改进技术。本文提出了一种使用符号时间压缩方法将NB-IoT系统中链接项目总数增加四倍的设计。特别提出了一种改进的符号时间压缩(MSTC)方法,通过将符号时间减少到四分之一(25%),可以保留75%的带宽(BW)。本研究提出了一种在正交频分复用(4-MSTC-OFDM)中使用四次MSTC方法的设计,以利用未使用的带宽,并且与标准OFDM系统相比,能够提供四倍的信息量。仿真结果表明,与采用16-QAM (16-QAM-OFDM)的OFDM系统相比,在瑞利衰落信道和加性高斯白噪声信道(AWGN)上发送相同数量的数据时,该设计(4-MSTC-OFDM)的信噪比(SNR)分别降低3.9 dB (BER = 10-6)和4.4 dB (BER = 10-4)。此外,仿真结果表明,该设计具有与传统OFDM技术相同的误码率,这意味着使用该方法不会降低误码率。
{"title":"A Design for Increasing the Capacity Fourfold in NB-IoT Systems using A Modified Symbol Time Compression Approach","authors":"A. Mohammed, Hassan Mostafa, Abd El-Hady. A. Ammar","doi":"10.58346/jisis.2023.i4.012","DOIUrl":"https://doi.org/10.58346/jisis.2023.i4.012","url":null,"abstract":"One of the most significant obstacles facing the Internet of Things (IoT) is how to offer support for communication to an expanding number of linked items. Narrow-band Internet of Things (NB-IoT), which is currently an aspect of fifth-generation (5G), is a new narrow-band wireless communication technology that has evolved in recent years to address this issue. To save power, NB-IoT currently exploits modulation schemes that are characterized by low order to deliver low data rate. However, as the number of applications dependent on data rate increases, NB-IoT needs to use data rate improvement technologies that do not consume additional power. This paper proposes a design for quadrupling the total number of linked items in the NB-IoT system using a symbol time compression methodology. A modified symbol time compression (MSTC) approach is specifically suggested, which could preserve 75% of the bandwidth (BW) by reducing the symbol time to a quarter (25%). This study suggests a design that uses the MSTC method four times in orthogonal frequency division multiplexing (4-MSTC-OFDM) to take advantage of the unused bandwidth and has the capability to deliver a quadruple quantity of information in comparison to the standard OFDM system. Simulations show that the suggested design (4-MSTC-OFDM) lowers the signal-to-noise ratio (SNR) by 3.9 dB (at BER = 10-6) and 4.4 dB (at BER = 10-4) compared to the OFDM system with 16-QAM (16-QAM-OFDM) when sending the same amount of data over the Rayleigh fading channel and additive white Gaussian noise channel (AWGN). Moreover, the results of simulations indicate that the proposed design possesses an identical BER as the conventional OFDM technique, implying that using the suggested method does not degrade the BER.","PeriodicalId":36718,"journal":{"name":"Journal of Internet Services and Information Security","volume":"121 46","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138607073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Internet Services and Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1