首页 > 最新文献

2022 24th International Multitopic Conference (INMIC)最新文献

英文 中文
Energy Efficiency Issues in Android Application: A Literature Review Android应用中的能源效率问题:文献综述
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972939
Obaid Ullah, Muhammad Hanan, Maryam Abdul Ghafoor
In today's digital world, almost every person owns a smartphone device. Due to more emphasis on the functional aspect of an application, programmers often follow such practices that consume a lot of energy. Hence, the purpose of this literature review is to find such issues that can cause more energy consumption in the android applications along with finding their solutions from the literature. The literature review also includes year-wise and venue-wise paper distribution. Out of our initial 145 papers, we discarded 4 papers based on a duplicate study, then 100 papers were discarded on the title and abstract-based screening while 22 papers were discarded based on inclusion/exclusion and quality assurance criteria. A final of 19 studies were considered for this study and were read thoroughly. Our results reveal that bad programming practice was the most discussed issue (26%) while tool-related problems and patterns were the least discussed issues in the literature (15.7%). Tool-based solutions are discussed mostly (36.84%) while refactoring technique and applying other techniques are discussed least (10.5%) in the literature. The work is helpful for the researchers and developers as they can learn from this about the energy consumption reasons and their solutions.
在当今的数字世界里,几乎每个人都拥有一部智能手机。由于更加强调应用程序的功能方面,程序员经常遵循这种消耗大量精力的实践。因此,这篇文献综述的目的是找到这样的问题,可以导致更多的能源消耗在android应用程序以及从文献中找到他们的解决方案。文献综述还包括按年度和按地点分配的论文。在最初的145篇论文中,我们根据重复研究丢弃了4篇论文,然后根据标题和摘要筛选丢弃了100篇论文,根据纳入/排除和质量保证标准丢弃了22篇论文。本研究最终考虑了19项研究,并进行了全面阅读。我们的结果显示,糟糕的编程实践是讨论最多的问题(26%),而与工具相关的问题和模式是文献中讨论最少的问题(15.7%)。基于工具的解决方案被讨论最多(36.84%),而重构技术和应用其他技术在文献中被讨论最少(10.5%)。这项工作对研究人员和开发人员有帮助,他们可以从中了解能源消耗的原因和解决方案。
{"title":"Energy Efficiency Issues in Android Application: A Literature Review","authors":"Obaid Ullah, Muhammad Hanan, Maryam Abdul Ghafoor","doi":"10.1109/INMIC56986.2022.9972939","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972939","url":null,"abstract":"In today's digital world, almost every person owns a smartphone device. Due to more emphasis on the functional aspect of an application, programmers often follow such practices that consume a lot of energy. Hence, the purpose of this literature review is to find such issues that can cause more energy consumption in the android applications along with finding their solutions from the literature. The literature review also includes year-wise and venue-wise paper distribution. Out of our initial 145 papers, we discarded 4 papers based on a duplicate study, then 100 papers were discarded on the title and abstract-based screening while 22 papers were discarded based on inclusion/exclusion and quality assurance criteria. A final of 19 studies were considered for this study and were read thoroughly. Our results reveal that bad programming practice was the most discussed issue (26%) while tool-related problems and patterns were the least discussed issues in the literature (15.7%). Tool-based solutions are discussed mostly (36.84%) while refactoring technique and applying other techniques are discussed least (10.5%) in the literature. The work is helpful for the researchers and developers as they can learn from this about the energy consumption reasons and their solutions.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Device Interoperability for Industrial IoT using Model-Driven Architecture 使用模型驱动架构的工业物联网设备互操作性
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972976
Anam Amjad, F. Azam, Muhammad Waseem Anwar
Industrial Internet of Things (IIoT) is an emerging domain, converting common objects into connecting objects with ubiquitous internet access to automate industry. Due to different vendors, supporting different infrastructures, a set of communication protocols such as Zigbee, 6LowPAN, Wireless Fidelity (Wi-Fi), Hyper Text Transfer Protocol (HTTP), etc. are introduced for IIoT. Thus, a closed ecosystem for smart devices is created. Particularly, when two or more industrial IoT applications are developed using different application-layer protocols such as Constrained Application Protocol (CoAP), Advanced Message Queuing Protocol (AMQP), or MQ Telemetry Transport (MQTT), devices are called heterogeneous devices and interoperability becomes a major challenge. In the existing literature, device-level interoperability using different application-layer protocols is enhanced with the help of intermediators at the network layer which includes servers, brokers, or gateways/adapters to route communication. However, these intermediators lead to several other issues such as dependency on network layer components, load balancing, single point of failure, and scalability. Therefore, the interoperability issue needs to be addressed at the application layer using a device intermediator instead of utilizing network layer components. For this purpose, Model Driven Engineering (MDE) is selected because less attention is paid to IIoT interoperable solutions development using MDE. To bridge this gap, a Model Driven Architecture (MDA) based approach is proposed that reduces the processing time and effort to develop these IIoT interoperable systems. For this purpose, (i) a metamodel, (ii) a UML profile, and (iii) transformation rules are developed to make heterogenous application-layer protocols interoperable using devices as intermediator. The initial feasibility of the proposed solution is demonstrated through a real-world case study i.e., a smart city. Results show that a complete solution for interoperability at the application layer for industrial IoT is provided using MDA. It will help the practitioners to automate industry 4.0 using model-driven based system development.
工业物联网(IIoT)是一个新兴的领域,它将普通物体转化为具有无处不在的互联网接入的连接物体,以实现工业自动化。由于不同的供应商,支持不同的基础设施,为工业物联网引入了一套通信协议,如Zigbee、6LowPAN、无线保真(Wi-Fi)、超文本传输协议(HTTP)等。这样,智能设备就形成了一个封闭的生态系统。特别是,当使用不同的应用层协议(如约束应用协议(CoAP)、高级消息队列协议(AMQP)或MQ遥测传输(MQTT)等开发两个或多个工业物联网应用程序时,设备被称为异构设备,互操作性成为一个主要挑战。在现有文献中,使用不同应用层协议的设备级互操作性在网络层的中介(包括服务器、代理或路由通信的网关/适配器)的帮助下得到增强。但是,这些中介会导致其他几个问题,例如对网络层组件的依赖、负载平衡、单点故障和可伸缩性。因此,互操作性问题需要在应用层使用设备中间体而不是利用网络层组件来解决。为此,选择了模型驱动工程(MDE),因为使用MDE开发工业物联网互操作解决方案的关注较少。为了弥补这一差距,提出了一种基于模型驱动架构(MDA)的方法,该方法减少了开发这些工业物联网互操作系统的处理时间和工作量。为了这个目的,(i)元模型,(ii) UML概要文件,以及(iii)转换规则被开发出来,使异质应用层协议可以使用设备作为中介进行互操作。提出的解决方案的初步可行性是通过一个现实世界的案例研究,即一个智慧城市来证明的。结果表明,利用MDA提供了一个完整的工业物联网应用层互操作性解决方案。它将帮助实践者使用基于模型驱动的系统开发实现工业4.0的自动化。
{"title":"Device Interoperability for Industrial IoT using Model-Driven Architecture","authors":"Anam Amjad, F. Azam, Muhammad Waseem Anwar","doi":"10.1109/INMIC56986.2022.9972976","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972976","url":null,"abstract":"Industrial Internet of Things (IIoT) is an emerging domain, converting common objects into connecting objects with ubiquitous internet access to automate industry. Due to different vendors, supporting different infrastructures, a set of communication protocols such as Zigbee, 6LowPAN, Wireless Fidelity (Wi-Fi), Hyper Text Transfer Protocol (HTTP), etc. are introduced for IIoT. Thus, a closed ecosystem for smart devices is created. Particularly, when two or more industrial IoT applications are developed using different application-layer protocols such as Constrained Application Protocol (CoAP), Advanced Message Queuing Protocol (AMQP), or MQ Telemetry Transport (MQTT), devices are called heterogeneous devices and interoperability becomes a major challenge. In the existing literature, device-level interoperability using different application-layer protocols is enhanced with the help of intermediators at the network layer which includes servers, brokers, or gateways/adapters to route communication. However, these intermediators lead to several other issues such as dependency on network layer components, load balancing, single point of failure, and scalability. Therefore, the interoperability issue needs to be addressed at the application layer using a device intermediator instead of utilizing network layer components. For this purpose, Model Driven Engineering (MDE) is selected because less attention is paid to IIoT interoperable solutions development using MDE. To bridge this gap, a Model Driven Architecture (MDA) based approach is proposed that reduces the processing time and effort to develop these IIoT interoperable systems. For this purpose, (i) a metamodel, (ii) a UML profile, and (iii) transformation rules are developed to make heterogenous application-layer protocols interoperable using devices as intermediator. The initial feasibility of the proposed solution is demonstrated through a real-world case study i.e., a smart city. Results show that a complete solution for interoperability at the application layer for industrial IoT is provided using MDA. It will help the practitioners to automate industry 4.0 using model-driven based system development.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116441996","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Robust Algorithm for Candidate Pruning and Feature Weight Generation in E-Recruitment System 电子招聘系统中一种鲁棒的候选人剪枝和特征权值生成算法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972934
Saeed Ur Rehman Bhatti, Shujaat Hussain, Kifayat-Ullah Khan
Globalization, enhanced networking, and contemporary communication systems have resulted in a substantial increase in the number of resumes created. Processing this massive chunk manually is time-consuming. Multiple Criteria Decision Making (MCDM) techniques, such as “Analytic Hierarchy Process” (AHP), “The Technique for Order of Preference by Similarity to Ideal Solution” (TOPSIS), “VlseKriterijumska Optimizacija I Kompromisno Resenje” (VIKOR), and their state-of-the-art optimized variants, SlashRank, consider multiple factors and then rank the results accordingly to streamline the process. These algorithms primarily focus on reducing computational complexity, however, they ignore automated feature importance since they require manual features weights as an explicit input. In the end, this leads to a biased result and a decentralized method of hiring candidates. Our research addresses the human intervention observed in previously identified techniques and proposes a technique that automates candidate pruning, manual feature priority input, and generates new feature importance based on user feedback. Our approach can be decomposed into automated candidate pruning for the highest priority feature, candidate selection feedback, and trend-based feature weight generation to replicate actual recruitment feature priority fluctuations. Our algorithm demonstrates promising results in minimizing human biases and generating a dynamic trend of feature importance over time.
全球化、增强的网络和现代通信系统导致了简历数量的大幅增加。手动处理这个庞大的块非常耗时。多标准决策(MCDM)技术,如“层次分析法”(AHP),“理想解决方案相似性偏好排序技术”(TOPSIS),“VlseKriterijumska Optimizacija I Kompromisno Resenje”(VIKOR),以及它们最先进的优化变体SlashRank,考虑多个因素,然后相应地对结果进行排序,以简化过程。这些算法主要关注于降低计算复杂性,然而,它们忽略了自动特征的重要性,因为它们需要手动特征权重作为显式输入。最终,这会导致一个有偏见的结果和一个分散的招聘候选人的方法。我们的研究解决了在先前确定的技术中观察到的人为干预问题,并提出了一种技术,该技术可以自动修剪候选特征,手动输入特征优先级,并根据用户反馈生成新的特征重要性。我们的方法可以分解为最高优先级特征的自动候选修剪,候选人选择反馈和基于趋势的特征权重生成,以复制实际招聘特征优先级波动。我们的算法在最小化人类偏见和生成特征重要性随时间的动态趋势方面显示了有希望的结果。
{"title":"A Robust Algorithm for Candidate Pruning and Feature Weight Generation in E-Recruitment System","authors":"Saeed Ur Rehman Bhatti, Shujaat Hussain, Kifayat-Ullah Khan","doi":"10.1109/INMIC56986.2022.9972934","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972934","url":null,"abstract":"Globalization, enhanced networking, and contemporary communication systems have resulted in a substantial increase in the number of resumes created. Processing this massive chunk manually is time-consuming. Multiple Criteria Decision Making (MCDM) techniques, such as “Analytic Hierarchy Process” (AHP), “The Technique for Order of Preference by Similarity to Ideal Solution” (TOPSIS), “VlseKriterijumska Optimizacija I Kompromisno Resenje” (VIKOR), and their state-of-the-art optimized variants, SlashRank, consider multiple factors and then rank the results accordingly to streamline the process. These algorithms primarily focus on reducing computational complexity, however, they ignore automated feature importance since they require manual features weights as an explicit input. In the end, this leads to a biased result and a decentralized method of hiring candidates. Our research addresses the human intervention observed in previously identified techniques and proposes a technique that automates candidate pruning, manual feature priority input, and generates new feature importance based on user feedback. Our approach can be decomposed into automated candidate pruning for the highest priority feature, candidate selection feedback, and trend-based feature weight generation to replicate actual recruitment feature priority fluctuations. Our algorithm demonstrates promising results in minimizing human biases and generating a dynamic trend of feature importance over time.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121778571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Packet Concatenation Mechanisms for Low Power Devices in Industrial Internet of Things 工业物联网中低功耗器件的分组连接机制评估
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972988
S. Siddiqui, A. Khan
Packet concatenation at Media Access Control (MAC) layer has a profound impact for the performance of low power devices in the Internet of Things (IoT), often termed as Wireless Sensor Networks (WSNs). Due to the recent development of enormous packet concatenation schemes, it has become crucial to compare them in order to identify the best method which could fit a specific application scenario for WSN. This paper compares the dynamic duty-cycling based packet concatenation MAC, ADP-MAC (Adaptive and Dynamic Duty-cycle MAC) with concurrent transmission-based MAC primitive PiP (Packet-in-Packet). Simulations have been conducted to compare the single hop performance of 2 schemes based on their Packet delivery Ratio. The detailed implementation for the two protocols has been used for conducting simulation over Avrora emulator. It has been found that ADP-MAC outperforms PiP due to achieving better synchronization between source and sink nodes
媒体访问控制(MAC)层的数据包连接对物联网(IoT)中低功耗设备的性能有着深远的影响,通常被称为无线传感器网络(wsn)。由于近年来大量数据包连接方案的发展,为了确定适合无线传感器网络特定应用场景的最佳方法,对它们进行比较变得至关重要。本文比较了基于动态占空比的分组连接MAC、ADP-MAC(自适应动态占空比MAC)和基于并发传输的原始包中包MAC (packet -in- packet)。通过仿真比较了两种方案的单跳传输性能。在Avrora仿真器上对这两个协议的详细实现进行了仿真。研究发现,由于在源节点和汇聚节点之间实现了更好的同步,ADP-MAC优于PiP
{"title":"Evaluation of Packet Concatenation Mechanisms for Low Power Devices in Industrial Internet of Things","authors":"S. Siddiqui, A. Khan","doi":"10.1109/INMIC56986.2022.9972988","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972988","url":null,"abstract":"Packet concatenation at Media Access Control (MAC) layer has a profound impact for the performance of low power devices in the Internet of Things (IoT), often termed as Wireless Sensor Networks (WSNs). Due to the recent development of enormous packet concatenation schemes, it has become crucial to compare them in order to identify the best method which could fit a specific application scenario for WSN. This paper compares the dynamic duty-cycling based packet concatenation MAC, ADP-MAC (Adaptive and Dynamic Duty-cycle MAC) with concurrent transmission-based MAC primitive PiP (Packet-in-Packet). Simulations have been conducted to compare the single hop performance of 2 schemes based on their Packet delivery Ratio. The detailed implementation for the two protocols has been used for conducting simulation over Avrora emulator. It has been found that ADP-MAC outperforms PiP due to achieving better synchronization between source and sink nodes","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructiveness-Based Product Review Scoring Using Machine Learning 使用机器学习的基于建设性的产品评论评分
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972932
Muhammad Nauman Asif, Muhammad Arshad Islam
To make the internet a more productive environment, it is vital to promote constructiveness in online discussion forums. Customers are regularly offered the chance to share their thoughts and experiences with a product on online marketplaces. Generally, online products have fewer constructive reviews, and some of them are unrelated to the product. Existing approaches focus on textual features to classify a product's constructiveness and ignore semantic and contextual information about the reviews. The directed graph model has been utilized in this study to represent information about the product. Also, the node and graph level features like average in-degree, out-degree, and clustering coefficients are used to model constructiveness in product evaluation to encourage the most informative reviews. Graph embedding techniques are used to depict each node as a vector into low-dimensional space and preserve the structure and properties of the graph as well. The topic modeling approach has been used to contextualize the reviews with the appropriate product. Additionally, we employed logistic regression, random forest, Gaussian naive Bayes, support vector machine (SVM), and Gradient Boosting Machine models trained on Amazon product reviews and constructive news corpus for constructiveness. These ML models outperform the baseline approach, achieving a 90% F1-Score.
为了使互联网成为一个更富有成效的环境,促进网上论坛的建设性是至关重要的。客户定期有机会在在线市场上分享他们对产品的想法和体验。一般来说,在线产品很少有建设性的评论,其中一些评论与产品无关。现有的方法侧重于文本特征来对产品的建设性进行分类,而忽略了关于评论的语义和上下文信息。本研究使用有向图模型来表示产品的信息。此外,节点和图形级别的特征,如平均入度,出度和聚类系数,用于模拟产品评估中的建设性,以鼓励最具信息量的评论。图嵌入技术用于将每个节点作为向量描绘到低维空间中,并保留图的结构和属性。主题建模方法用于将评论与适当的产品联系起来。此外,我们还使用了逻辑回归、随机森林、高斯朴素贝叶斯、支持向量机(SVM)和梯度增强机模型,这些模型是在亚马逊产品评论和建设性新闻语料库上训练的。这些ML模型优于基线方法,达到90%的F1-Score。
{"title":"Constructiveness-Based Product Review Scoring Using Machine Learning","authors":"Muhammad Nauman Asif, Muhammad Arshad Islam","doi":"10.1109/INMIC56986.2022.9972932","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972932","url":null,"abstract":"To make the internet a more productive environment, it is vital to promote constructiveness in online discussion forums. Customers are regularly offered the chance to share their thoughts and experiences with a product on online marketplaces. Generally, online products have fewer constructive reviews, and some of them are unrelated to the product. Existing approaches focus on textual features to classify a product's constructiveness and ignore semantic and contextual information about the reviews. The directed graph model has been utilized in this study to represent information about the product. Also, the node and graph level features like average in-degree, out-degree, and clustering coefficients are used to model constructiveness in product evaluation to encourage the most informative reviews. Graph embedding techniques are used to depict each node as a vector into low-dimensional space and preserve the structure and properties of the graph as well. The topic modeling approach has been used to contextualize the reviews with the appropriate product. Additionally, we employed logistic regression, random forest, Gaussian naive Bayes, support vector machine (SVM), and Gradient Boosting Machine models trained on Amazon product reviews and constructive news corpus for constructiveness. These ML models outperform the baseline approach, achieving a 90% F1-Score.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128170314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Fuzzy Approach to Trust Management in Fog Computing 雾计算中的模糊信任管理方法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972942
Masooma Muhammad Nabi, M. A. Shah
The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.
物联网(IoT)技术已经彻底改变了世界,任何东西都可以智能连接和访问。物联网利用云计算来处理和存储大量数据。在某种程度上,雾计算的概念已经出现在云和物联网设备之间,以解决延迟问题。当雾节点交换数据以完成特定任务时,存在许多安全和隐私风险。例如,将数据卸载到恶意雾节点可能导致非法收集或修改用户的私有数据。在本文中,我们依靠信任来检测和分离坏雾节点。我们使用Mamdani模糊方法,并考虑具有许多雾服务器的医院场景。目的是识别恶意雾节点。延迟和距离等指标用于评估每个雾服务器的可信度。本研究的主要贡献在于确定模糊逻辑配置如何改变雾节点的信任值。实验结果表明,该方法能够在给定场景下检测出坏雾装置并建立其可信度。
{"title":"A Fuzzy Approach to Trust Management in Fog Computing","authors":"Masooma Muhammad Nabi, M. A. Shah","doi":"10.1109/INMIC56986.2022.9972942","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972942","url":null,"abstract":"The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Dual-band Chiral Metasurface with Linear Asymmetric Transmission and Orthogonal Polarization Conversion over a wide Incidence Angle for Ku-band and 5G Applications 宽入射角线性不对称传输和正交偏振转换的双波段手性超表面用于ku波段和5G应用
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972882
Aisha Bibi, Muhammad Ismail Khan, Imdad Khan
A bilayer, ultrathin, dual-band chiral metasurface is designed and analyzed in this paper with linear polarization conversion and asymmetric transmission for Ku-band and 5G communications. The polarization conversion efficiency of the first band (11.8-13.5 GHz) is ultra-high having a value 0.95 at 12GHz and that of the second band (26.2-26.7 GHz) is 0.9 at 25.6 GHz. The proposed structure also exhibits linear polarization asymmetric transmission in both bands with asymmetric parameters above 90% and above 80% for the first and second bands, respectively. The structure is ultrathin with respect to lowest resonating frequency of 12 GHz having thickness of 0.032λ0. Moreover, the structure is also angularly stable upto 60° for first band and upto 30° for second band, making the structure robust for practical applications. Due to scalability of the design, the proposed structure finds wide range of applications, covering a large spectrum from microwave to 5G bands.
本文设计并分析了一种用于ku波段和5G通信的双层超薄双频手性超表面,该超表面具有线性极化转换和非对称传输。第一频段(11.8-13.5 GHz)的极化转换效率超高,在12GHz时为0.95,第二频段(26.2-26.7 GHz)在25.6 GHz时为0.9。该结构在两波段均表现出线偏振不对称透射,第一波段和第二波段的不对称参数分别大于90%和80%。该结构是超薄的,相对于最低谐振频率为12 GHz,厚度为0.032λ0。此外,该结构的角度稳定,第一波段为60°,第二波段为30°,使结构在实际应用中具有鲁棒性。由于设计的可扩展性,所提出的结构具有广泛的应用范围,涵盖了从微波到5G频段的大频谱。
{"title":"Dual-band Chiral Metasurface with Linear Asymmetric Transmission and Orthogonal Polarization Conversion over a wide Incidence Angle for Ku-band and 5G Applications","authors":"Aisha Bibi, Muhammad Ismail Khan, Imdad Khan","doi":"10.1109/INMIC56986.2022.9972882","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972882","url":null,"abstract":"A bilayer, ultrathin, dual-band chiral metasurface is designed and analyzed in this paper with linear polarization conversion and asymmetric transmission for Ku-band and 5G communications. The polarization conversion efficiency of the first band (11.8-13.5 GHz) is ultra-high having a value 0.95 at 12GHz and that of the second band (26.2-26.7 GHz) is 0.9 at 25.6 GHz. The proposed structure also exhibits linear polarization asymmetric transmission in both bands with asymmetric parameters above 90% and above 80% for the first and second bands, respectively. The structure is ultrathin with respect to lowest resonating frequency of 12 GHz having thickness of 0.032λ0. Moreover, the structure is also angularly stable upto 60° for first band and upto 30° for second band, making the structure robust for practical applications. Due to scalability of the design, the proposed structure finds wide range of applications, covering a large spectrum from microwave to 5G bands.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"90 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133523235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Fault-Prediction Mechanism for Improving Yield in Industry 5.0 工业5.0中提高良率的有效故障预测机制
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972980
Fariha Maqbool, Haroon Mahmood, Hasan Ali Khattak
Industrial sectors are constantly under pressure to produce higher-quality goods while maximizing yield. Machine maintenance is a critical component of manufacturing, accounting for a significant portion of total production costs. Corrective, preventive, and conditional maintenance strategies only make a negligible contribution to cost and downtime reduction. With the fifth industrial revolution, industrialists can now use sensors and cyber-physical systems to perform predictive maintenance on manufacturing operations. This strategy eliminates unnecessary maintenance and minimizes downtime by continuously collecting and analyzing data to predict time to failure. Numerous approaches to fault prediction have been proposed for predictive maintenance, but most of them are prohibitively expensive due to the massive number of features in manufacturing machines. The purpose of this work is to develop a technique for reliably predicting machine problems with the fewest possible features. To select features, we used SVR-based Recursive Feature Elimination (SVR-RFE) and Random Forest Regressor (RFR), while to predict, we used Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our experiments on the 2018 PHM Challenge Dataset demonstrate that the proposed strategy outperforms prior approaches and reduces the mean absolute percentage error (SMAPE).
工业部门不断面临生产更高质量产品的压力,同时最大限度地提高产量。机器维护是制造业的一个重要组成部分,占总生产成本的很大一部分。纠正性、预防性和有条件维护策略对减少成本和停机时间的贡献微不足道。随着第五次工业革命,实业家现在可以使用传感器和网络物理系统对制造操作进行预测性维护。该策略通过不断收集和分析数据来预测故障发生时间,从而消除了不必要的维护,并最大限度地减少了停机时间。已经提出了许多用于预测性维护的故障预测方法,但由于制造机器中的大量特征,大多数方法都过于昂贵。这项工作的目的是开发一种技术,以最少的可能特征可靠地预测机器问题。在特征选择上,我们使用了基于svr的递归特征消除(SVR-RFE)和随机森林回归(RFR),而在预测上,我们使用了长短期记忆(LSTM)和卷积神经网络(CNN)。我们在2018年PHM挑战数据集上的实验表明,所提出的策略优于先前的方法,并降低了平均绝对百分比误差(SMAPE)。
{"title":"An Efficient Fault-Prediction Mechanism for Improving Yield in Industry 5.0","authors":"Fariha Maqbool, Haroon Mahmood, Hasan Ali Khattak","doi":"10.1109/INMIC56986.2022.9972980","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972980","url":null,"abstract":"Industrial sectors are constantly under pressure to produce higher-quality goods while maximizing yield. Machine maintenance is a critical component of manufacturing, accounting for a significant portion of total production costs. Corrective, preventive, and conditional maintenance strategies only make a negligible contribution to cost and downtime reduction. With the fifth industrial revolution, industrialists can now use sensors and cyber-physical systems to perform predictive maintenance on manufacturing operations. This strategy eliminates unnecessary maintenance and minimizes downtime by continuously collecting and analyzing data to predict time to failure. Numerous approaches to fault prediction have been proposed for predictive maintenance, but most of them are prohibitively expensive due to the massive number of features in manufacturing machines. The purpose of this work is to develop a technique for reliably predicting machine problems with the fewest possible features. To select features, we used SVR-based Recursive Feature Elimination (SVR-RFE) and Random Forest Regressor (RFR), while to predict, we used Long Short-Term Memory (LSTM) and Convolutional Neural Network (CNN). Our experiments on the 2018 PHM Challenge Dataset demonstrate that the proposed strategy outperforms prior approaches and reduces the mean absolute percentage error (SMAPE).","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128786242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Robust Architecture for Aggregation of Heterogeneous Data for Threat Intelligence Platforms 一种面向威胁情报平台的异构数据聚合鲁棒架构
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972973
Afzal Yasmeen, Asim Muhammad, Khan Kifayat Ullah
With increased dependency on computers, the threat of cyber-attacks becomes more prevalent. Cyber threat intelligence gathers reports from previous threats and helps to identify potential future attacks. The challenge for threat intelligence is overloaded threat feeds from various sources with structural heterogeneity. Currently, most of the sources share same type of data in heterogeneous format with different identifiers. In this paper, an architecture has been proposed for data aggregation from heterogeneous sources. The architecture is based on a three tier model that maps the heterogeneous sources' feeds into the target Threat Intelligence Platform (TIP). In this model, each layer has its own set of tasks and works in a step-by-step pattern, the output of one layer is input to the next layer. The working of this model is entirely dependent on the XML broker for dynamic mapping of sources. The objective is to have a unified system that can transform data from heterogeneous sources into a unified form that can assist the TIP in further statistics generation for analysis. This architecture has been implemented over six heterogeneous sources and performed data aggregation.
随着人们对计算机依赖程度的提高,网络攻击的威胁变得更加普遍。网络威胁情报收集以往威胁的报告,并帮助识别潜在的未来攻击。威胁情报面临的挑战是来自各种来源且结构异构的威胁信息过载。目前,大多数数据源以不同标识符的异构格式共享同一类型的数据。本文提出了一种异构数据源数据聚合的体系结构。该体系结构基于三层模型,该模型将异构源的馈送映射到目标威胁情报平台(TIP)。在这个模型中,每一层都有自己的一组任务,并以循序渐进的模式工作,一层的输出输入到下一层。该模型的工作完全依赖于源动态映射的XML代理。目标是拥有一个统一的系统,可以将来自异构源的数据转换为统一的形式,从而帮助TIP进一步生成用于分析的统计数据。该体系结构已经在六个异构源上实现,并执行了数据聚合。
{"title":"A Robust Architecture for Aggregation of Heterogeneous Data for Threat Intelligence Platforms","authors":"Afzal Yasmeen, Asim Muhammad, Khan Kifayat Ullah","doi":"10.1109/INMIC56986.2022.9972973","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972973","url":null,"abstract":"With increased dependency on computers, the threat of cyber-attacks becomes more prevalent. Cyber threat intelligence gathers reports from previous threats and helps to identify potential future attacks. The challenge for threat intelligence is overloaded threat feeds from various sources with structural heterogeneity. Currently, most of the sources share same type of data in heterogeneous format with different identifiers. In this paper, an architecture has been proposed for data aggregation from heterogeneous sources. The architecture is based on a three tier model that maps the heterogeneous sources' feeds into the target Threat Intelligence Platform (TIP). In this model, each layer has its own set of tasks and works in a step-by-step pattern, the output of one layer is input to the next layer. The working of this model is entirely dependent on the XML broker for dynamic mapping of sources. The objective is to have a unified system that can transform data from heterogeneous sources into a unified form that can assist the TIP in further statistics generation for analysis. This architecture has been implemented over six heterogeneous sources and performed data aggregation.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129832914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering 基于跨步威胁建模和逆向工程的物联网固件强度分析集成方法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972941
Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah
Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.
物联网(IoT)市场呈指数级增长,自动化智能解决方案正在通过创新技术彻底改变各种领域。物联网系统中最关键和最重要的部分是其安全性,无论如何都不能忽视。物联网设备的安全标准还不够成熟,无法提供万无一失的安全性,制造商在设备中加入隐身功能还有很长的路要走。物联网系统中最脆弱的组件是控制设备所有功能的固件。如果被攻击者破坏,物联网设备的固件可以被证明是获取足够信息以消灭物联网设备的关键攻击面。在本文中,我们提出了一种双重策略来批判性地分析物联网固件的安全性。我们将首先使用STRIDE威胁模型来识别攻击者可能利用来发起攻击的安全参数。然后,我们将使用逆向工程来检查和评估基于确定的安全参数在最新和最常用的物联网设备中使用的各种固件的安全性。然后,相同的参数可以导出安全物联网固件的安全期望。所提出的方法为全面分析物联网系统的安全性提供了强大的策略。我们的实验结果表明,超过50%的固件暴露了可用于发动攻击的关键信息。我们相信,我们的研究结果也将有助于为开发安全和有弹性的固件提供建议。
{"title":"An Ensemble Approach for IoT Firmware Strength Analysis using STRIDE Threat Modeling and Reverse Engineering","authors":"Muhammad Shaharyar Yaqub, Haroon Mahmood, Ibrahim Nadir, G. Shah","doi":"10.1109/INMIC56986.2022.9972941","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972941","url":null,"abstract":"Internet of Things (IoT) market is growing exponentially and automated smart solutions are revolutionizing a diverse range of areas with innovative technologies. The most critical and vital part of an IoT system that cannot be overlooked at any cost is its security. The security standards for IoT devices are not mature enough to provide foolproof security and there is still a long journey for manufacturers to incorporate stealth in devices. The most vulnerable component of an IoT system is the firmware which controls all the functionality of the device. If subverted by an attacker, the firmware of the IoT device can prove to be a critical attack surface for obtaining enough information to annihilate an IoT device. In this paper, we propose a twofold strategy to critically analyze the security of an IoT firmware. We will first use the STRIDE threat model to identify the security parameters that attackers could exploit to launch attacks. We will then use reverse engineering to examine and evaluate the security of a wide range of firmware being used in the latest and most commonly used IoT devices based on the identified security parameters. The same parameters can then derive security expectations for a secure IoT firmware. The proposed approach provides a powerful strategy to comprehensively analyze an IoT system's security. Our experimental results show that more than 50 percent of the firmware are exposing critical information that can be used to launch attacks. We believe that our findings will also help establish recommendations for developing secure and resilient firmware.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2007 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128587246","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 24th International Multitopic Conference (INMIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1