首页 > 最新文献

Jordanian Journal of Computers and Information Technology最新文献

英文 中文
A HYPER-SURFACE-BASED MODELING AND CORRECTION OF BIAS FIELD IN MR IMAGES 基于超表面的Mr图像偏置场建模与校正
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1617051919
Daouia Azzouz, S. Mazouzi
{"title":"A HYPER-SURFACE-BASED MODELING AND CORRECTION OF BIAS FIELD IN MR IMAGES","authors":"Daouia Azzouz, S. Mazouzi","doi":"10.5455/jjcit.71-1617051919","DOIUrl":"https://doi.org/10.5455/jjcit.71-1617051919","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"35 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70819954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decreasing the RA Collision Impact for Massive NB-IoT in 5G Wireless Networks 降低5G无线网络中大规模NB-IoT的RA碰撞影响
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1620292048
Bilal Doori, Ahmed Zurfi
{"title":"Decreasing the RA Collision Impact for Massive NB-IoT in 5G Wireless Networks","authors":"Bilal Doori, Ahmed Zurfi","doi":"10.5455/jjcit.71-1620292048","DOIUrl":"https://doi.org/10.5455/jjcit.71-1620292048","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection Systems Using Supervised Machine Learning Classification and Dimensionality Reduction Techniques: A Systematic Review 使用监督机器学习分类和降维技术的网络入侵检测系统:系统综述
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1629527707
Zein Ashi, Laila Aburashed, M. Qudah, A. Qusef
Protecting the confidentiality, integrity and availability of cyberspace and network (NW) assets has become an increasing concern. The rapid increase in the Internet size and the presence of new computing systems (like Cloud) are creating great incentives for intruders. Therefore, security engineers have to develop new technologies to match growing threats to NWs. New and advanced technologies have emerged to create more efficient intrusion detection systems using machine learning (ML) and dimensionality reduction techniques, to help security engineers bolster more effective NW Intrusion Detection Systems (NIDSs). This systematic review provides a comprehensive review of the most recent NIDS using the supervised ML classification and dimensionality reduction techniques, it shows how the used ML classifiers, dimensionality reduction techniques and evaluating metrics have improved NIDS construction. The key point of this study is to provide up-to-date knowledge for new interested researchers.
保护网络空间和网络(NW)资产的机密性、完整性和可用性已成为人们日益关注的问题。互联网规模的快速增长和新计算系统(如云)的出现为入侵者创造了巨大的动机。因此,安全工程师必须开发新技术来应对日益增长的核武器威胁。使用机器学习(ML)和降维技术创建更高效的入侵检测系统的新技术和先进技术已经出现,以帮助安全工程师支持更有效的西北入侵检测系统(nids)。本系统综述全面回顾了最近使用监督机器学习分类和降维技术的NIDS,展示了使用的机器学习分类器、降维技术和评估指标如何改进了NIDS的构建。本研究的重点是为新的感兴趣的研究者提供最新的知识。
{"title":"Network Intrusion Detection Systems Using Supervised Machine Learning Classification and Dimensionality Reduction Techniques: A Systematic Review","authors":"Zein Ashi, Laila Aburashed, M. Qudah, A. Qusef","doi":"10.5455/jjcit.71-1629527707","DOIUrl":"https://doi.org/10.5455/jjcit.71-1629527707","url":null,"abstract":"Protecting the confidentiality, integrity and availability of cyberspace and network (NW) assets has become an increasing concern. The rapid increase in the Internet size and the presence of new computing systems (like Cloud) are creating great incentives for intruders. Therefore, security engineers have to develop new technologies to match growing threats to NWs. New and advanced technologies have emerged to create more efficient intrusion detection systems using machine learning (ML) and dimensionality reduction techniques, to help security engineers bolster more effective NW Intrusion Detection Systems (NIDSs). This systematic review provides a comprehensive review of the most recent NIDS using the supervised ML classification and dimensionality reduction techniques, it shows how the used ML classifiers, dimensionality reduction techniques and evaluating metrics have improved NIDS construction. The key point of this study is to provide up-to-date knowledge for new interested researchers.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WORKFLOW SCHEDULING ACCORDING TO DATA DEPENDENCIES IN COMPUTATIONAL CLOUDS 计算云中基于数据依赖的工作流调度
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1626545510
Batoul Khazaie, Hamid Saadatfar
{"title":"WORKFLOW SCHEDULING ACCORDING TO DATA DEPENDENCIES IN COMPUTATIONAL CLOUDS","authors":"Batoul Khazaie, Hamid Saadatfar","doi":"10.5455/jjcit.71-1626545510","DOIUrl":"https://doi.org/10.5455/jjcit.71-1626545510","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE 提高军事自我保护软件的安全性
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1620148110
C. Gonzalez
{"title":"INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE","authors":"C. Gonzalez","doi":"10.5455/jjcit.71-1620148110","DOIUrl":"https://doi.org/10.5455/jjcit.71-1620148110","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BRAIN-INSPIRED SPIKING NEURAL NETWORKS FOR WI-FI BASED HUMAN ACTIVITY RECOGNITION 基于wi-fi的人类活动识别的大脑激发的脉冲神经网络
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1629096728
Y. Tan, Yan Wong, S. Radzi
{"title":"BRAIN-INSPIRED SPIKING NEURAL NETWORKS FOR WI-FI BASED HUMAN ACTIVITY RECOGNITION","authors":"Y. Tan, Yan Wong, S. Radzi","doi":"10.5455/jjcit.71-1629096728","DOIUrl":"https://doi.org/10.5455/jjcit.71-1629096728","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"14 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks 一种基于移动代理的无线传感器网络天坑攻击对抗方法
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1632893264
Hadi Khosravi, Mohammad Ghasemigol
Wireless sensor networks (WSNs) are an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole attack is the most popular and dangerous attack in the routing of WSNs. There are many approaches to counter sinkhole attacks in the literature. The mobile agent methods generate better results in facing sinkhole attacks and overcoming the WSN limitations. In this paper, we present a new mobile agent-based method that applies the trust value of each sensor to detect and prevent sinkhole attacks. We compute the trust values to inform the sensor nodes about their neighbors' reputations. As shown in the experiments, the proposed method generates better results in packet loss ratio. It also fixes the security flaws of previous works and reduces the agents' overhead in the network compared to previous methods.
无线传感器网络(WSNs)是一种广泛应用于各个领域的技术。由于无线传感器网络的局限性,它们通常面临多种类型的攻击。天坑攻击是无线传感器网络路由中最常见、最危险的攻击方式。文献中有许多对付天坑攻击的方法。移动代理方法在面对天坑攻击和克服无线传感器网络的局限性方面取得了较好的效果。本文提出了一种新的基于移动代理的方法,利用每个传感器的信任值来检测和预防天坑攻击。我们计算信任值来告知传感器节点它们邻居的信誉。实验表明,该方法在丢包率方面取得了较好的效果。它还修复了以前工作的安全漏洞,并且与以前的方法相比减少了代理在网络中的开销。
{"title":"A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks","authors":"Hadi Khosravi, Mohammad Ghasemigol","doi":"10.5455/jjcit.71-1632893264","DOIUrl":"https://doi.org/10.5455/jjcit.71-1632893264","url":null,"abstract":"Wireless sensor networks (WSNs) are an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole attack is the most popular and dangerous attack in the routing of WSNs. There are many approaches to counter sinkhole attacks in the literature. The mobile agent methods generate better results in facing sinkhole attacks and overcoming the WSN limitations. In this paper, we present a new mobile agent-based method that applies the trust value of each sensor to detect and prevent sinkhole attacks. We compute the trust values to inform the sensor nodes about their neighbors' reputations. As shown in the experiments, the proposed method generates better results in packet loss ratio. It also fixes the security flaws of previous works and reduces the agents' overhead in the network compared to previous methods.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTRODUCING A NEW ROUTING ALGORITHM ForWIRELESS NETWORKS ON CHIP USINGREINFORCEMENT LEARNING 介绍了一种基于强化学习的芯片无线网络路由算法
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1618577670
Zohreh Harati, E. Tahanian, A. Tajary, Mansoor Fateh
{"title":"INTRODUCING A NEW ROUTING ALGORITHM For\u0000WIRELESS NETWORKS ON CHIP USING\u0000REINFORCEMENT LEARNING","authors":"Zohreh Harati, E. Tahanian, A. Tajary, Mansoor Fateh","doi":"10.5455/jjcit.71-1618577670","DOIUrl":"https://doi.org/10.5455/jjcit.71-1618577670","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70819963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UNCONSTRAINED EAR RECOGNITION USING TRANSFORMERS 使用变压器的无约束耳识别
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1627981530
Marwin B. Alejo
{"title":"UNCONSTRAINED EAR RECOGNITION USING TRANSFORMERS","authors":"Marwin B. Alejo","doi":"10.5455/jjcit.71-1627981530","DOIUrl":"https://doi.org/10.5455/jjcit.71-1627981530","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TWO-WAY METRIC LEARNING WITH MAJORITY AND MINORITY SUBSETS FOR CLASSIFICATION OF LARGE EXTREMELY IMBALANCED FACE DATASET 基于多数子集和少数子集的双向度量学习用于大型极度不平衡人脸数据集的分类
IF 1.2 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1626417940
A. Kaushik, Seba Susan
{"title":"TWO-WAY METRIC LEARNING WITH MAJORITY AND MINORITY SUBSETS FOR CLASSIFICATION OF LARGE EXTREMELY IMBALANCED FACE DATASET","authors":"A. Kaushik, Seba Susan","doi":"10.5455/jjcit.71-1626417940","DOIUrl":"https://doi.org/10.5455/jjcit.71-1626417940","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Jordanian Journal of Computers and Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1