首页 > 最新文献

2022 24th International Multitopic Conference (INMIC)最新文献

英文 中文
Identifying and Profiling User Interest over time using Social Data 使用社交数据识别和分析用户兴趣
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972955
Iqra Ali, M. Naeem
With immense population growth in recent years, social data is growing at a rapid pace, which in turn can prove to be a rich source of hidden information. This work focuses on identifying user interest in electronic products, especially smartphones, using social data. This will help electronic businesses in the personalized marketing of their products. From the literature, most of the existing approaches attempted to identify user interest based on their ratings. In our understanding, the contents of reviews are equally important in identifying people's interests. Therefore, in this paper, we proposed a framework that identifies user interests based on their reviews and their ratings. Moreover, it performs an analysis of the aforementioned reviews, and profiles user interest. To achieve this, we used website data, written in the Roman Urdu language. To the best of our knowledge, very limited research has been carried out on the Roman Urdu dataset, as it is considered a low-resource language. Concerning our methodology, we first performed topic modeling using Latent Dirichlet Allocation (LDA), Bidirectional Encoder Representations from Transformers (BERT), and a hybrid of both. Based on the identified topics, we performed user interest profiling based on the probabilities of each model/brand using the Top2Vec model. We compared our results of topic modeling using reviews and reviews plus ratings. For topic modeling, we measure coherence score which we observe 52% for the hybrid approach while 47% and 45% for “BERT” and “LDA” respectively. Finally, For topic modeling, we perform human-based validation by comparing human-identified topics with the ones identified by our model.
随着近年来人口的巨大增长,社会数据正在快速增长,这反过来又可以证明是一个丰富的隐藏信息来源。这项工作的重点是利用社交数据识别用户对电子产品,尤其是智能手机的兴趣。这将有助于电子企业对其产品进行个性化营销。从文献来看,大多数现有的方法都试图根据用户的评分来确定用户的兴趣。在我们的理解中,评论的内容对于确定人们的兴趣同样重要。因此,在本文中,我们提出了一个基于用户评论和评分来识别用户兴趣的框架。此外,它还对前面提到的评论进行分析,并对用户的兴趣进行分析。为了做到这一点,我们使用了用罗马乌尔都语写的网站数据。据我们所知,对罗马乌尔都语数据集进行了非常有限的研究,因为它被认为是一种低资源语言。关于我们的方法,我们首先使用潜在狄利克雷分配(LDA),变形金刚的双向编码器表示(BERT)以及两者的混合进行主题建模。基于识别的主题,我们使用Top2Vec模型基于每个模型/品牌的概率执行用户兴趣分析。我们使用评论和评论加评级来比较主题建模的结果。对于主题建模,我们测量了一致性得分,我们观察到混合方法的一致性得分为52%,而“BERT”和“LDA”的一致性得分分别为47%和45%。最后,对于主题建模,我们通过将人类识别的主题与我们的模型识别的主题进行比较来执行基于人类的验证。
{"title":"Identifying and Profiling User Interest over time using Social Data","authors":"Iqra Ali, M. Naeem","doi":"10.1109/INMIC56986.2022.9972955","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972955","url":null,"abstract":"With immense population growth in recent years, social data is growing at a rapid pace, which in turn can prove to be a rich source of hidden information. This work focuses on identifying user interest in electronic products, especially smartphones, using social data. This will help electronic businesses in the personalized marketing of their products. From the literature, most of the existing approaches attempted to identify user interest based on their ratings. In our understanding, the contents of reviews are equally important in identifying people's interests. Therefore, in this paper, we proposed a framework that identifies user interests based on their reviews and their ratings. Moreover, it performs an analysis of the aforementioned reviews, and profiles user interest. To achieve this, we used website data, written in the Roman Urdu language. To the best of our knowledge, very limited research has been carried out on the Roman Urdu dataset, as it is considered a low-resource language. Concerning our methodology, we first performed topic modeling using Latent Dirichlet Allocation (LDA), Bidirectional Encoder Representations from Transformers (BERT), and a hybrid of both. Based on the identified topics, we performed user interest profiling based on the probabilities of each model/brand using the Top2Vec model. We compared our results of topic modeling using reviews and reviews plus ratings. For topic modeling, we measure coherence score which we observe 52% for the hybrid approach while 47% and 45% for “BERT” and “LDA” respectively. Finally, For topic modeling, we perform human-based validation by comparing human-identified topics with the ones identified by our model.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131279492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluating the Impact of Gamified Quranic Learning Mobile Apps for Children 评估游戏化古兰经学习移动应用程序对儿童的影响
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972936
Mahnoor Aftab, Noreen Jamil
The use of technology is increasing day by day as it is helping in daily life issues in lesser time. The children these days prefer using technology more than any other medium of learning. Many researchers have incorporated gamification in educational application to enhance the value of such applications and to attract students to use the application which in turn enhance their learning performance. This research focuses on the children learning Qaida applications which involve gamification so that children can have more attraction and interest in learning the most important Islamic religious book Quran. The comparison of different gaming elements in m- learning applications is done and included in a prototype of Gamified Quran. The prototype has been tested by an experiment and the output of learning performance has been measured with the help of multiple tests and it turned out to have positive impact on learning performance of the children.
技术的使用日益增加,因为它在更短的时间内帮助解决日常生活问题。现在的孩子们更喜欢使用技术而不是其他任何学习媒介。许多研究者将游戏化融入到教育应用中,以提高这些应用的价值,吸引学生使用这些应用,从而提高他们的学习成绩。本研究的重点是儿童学习涉及游戏化的基地组织应用程序,使儿童对学习最重要的伊斯兰宗教书籍《古兰经》更有吸引力和兴趣。对移动学习应用中不同的游戏元素进行了比较,并将其包含在游戏化古兰经的原型中。通过实验对原型进行了测试,并通过多次测试对学习成绩的输出进行了测量,结果表明对儿童的学习成绩有积极的影响。
{"title":"Evaluating the Impact of Gamified Quranic Learning Mobile Apps for Children","authors":"Mahnoor Aftab, Noreen Jamil","doi":"10.1109/INMIC56986.2022.9972936","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972936","url":null,"abstract":"The use of technology is increasing day by day as it is helping in daily life issues in lesser time. The children these days prefer using technology more than any other medium of learning. Many researchers have incorporated gamification in educational application to enhance the value of such applications and to attract students to use the application which in turn enhance their learning performance. This research focuses on the children learning Qaida applications which involve gamification so that children can have more attraction and interest in learning the most important Islamic religious book Quran. The comparison of different gaming elements in m- learning applications is done and included in a prototype of Gamified Quran. The prototype has been tested by an experiment and the output of learning performance has been measured with the help of multiple tests and it turned out to have positive impact on learning performance of the children.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132969080","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recognition of Faces Wearing Masks Using Skip Connection Based Dense Units Augmented With Self Restrained Triplet Loss 基于跳跃连接的自约束三重损失增强密集单元的口罩人脸识别
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972912
M. A. Nawshad, Zuhair Zafar, M. Fraz
Facial recognition-based systems are the most efficient and cost-effective of all the contactless biometric verification systems available. But, in the COVID-19 scenario, the performance of available facial recognition systems has been affected badly due to the presence of masks on people's faces. Various studies have reported the degradation of the performance of facial recognition systems due to masks. Therefore, there is a need for improvement in the performance of currently available facial recognition algorithms. In this research, we propose using Skip Connection based Dense Unit (SCDU) trained with Self Restrained Triplet Loss, to handle the embeddings produced by existing facial recognition algorithms for masked images. The SCDU is trained to make facial embeddings for unmasked and masked images of the same identity similar, as well as, embeddings for unmasked and masked images of different identities dissimilar. We have evaluated our results on the LFW dataset with synthetic masks as well as the real-world masked face recognition dataset, i.e., MFR2 and achieved improvement in verification performance in terms of Equal Error Rate, False Match Rate, False Non-Match Rate, and Fisher discriminant ratio.
基于面部识别的系统是所有可用的非接触式生物识别验证系统中最有效和最具成本效益的。但是,在COVID-19的情况下,由于人们脸上戴着口罩,现有面部识别系统的性能受到了严重影响。各种研究都报道了面部识别系统性能的下降,因为面具。因此,目前可用的面部识别算法的性能需要改进。在这项研究中,我们提出使用基于跳跃连接的密集单元(SCDU)训练自我约束三重态损失,来处理现有人脸识别算法对被屏蔽图像产生的嵌入。对SCDU进行训练,使相同身份的未蒙面和被蒙面图像的人脸嵌入相似,以及不同身份的未蒙面和被蒙面图像的人脸嵌入不相似。我们在具有合成掩码的LFW数据集以及真实世界的掩码人脸识别数据集(即MFR2)上评估了我们的结果,并在等错误率、错误匹配率、错误非匹配率和Fisher判别率方面实现了验证性能的改进。
{"title":"Recognition of Faces Wearing Masks Using Skip Connection Based Dense Units Augmented With Self Restrained Triplet Loss","authors":"M. A. Nawshad, Zuhair Zafar, M. Fraz","doi":"10.1109/INMIC56986.2022.9972912","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972912","url":null,"abstract":"Facial recognition-based systems are the most efficient and cost-effective of all the contactless biometric verification systems available. But, in the COVID-19 scenario, the performance of available facial recognition systems has been affected badly due to the presence of masks on people's faces. Various studies have reported the degradation of the performance of facial recognition systems due to masks. Therefore, there is a need for improvement in the performance of currently available facial recognition algorithms. In this research, we propose using Skip Connection based Dense Unit (SCDU) trained with Self Restrained Triplet Loss, to handle the embeddings produced by existing facial recognition algorithms for masked images. The SCDU is trained to make facial embeddings for unmasked and masked images of the same identity similar, as well as, embeddings for unmasked and masked images of different identities dissimilar. We have evaluated our results on the LFW dataset with synthetic masks as well as the real-world masked face recognition dataset, i.e., MFR2 and achieved improvement in verification performance in terms of Equal Error Rate, False Match Rate, False Non-Match Rate, and Fisher discriminant ratio.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114613079","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Systematic Review on Fully Automated Online Exam Proctoring Approaches 对全自动在线考试监考方法的系统回顾
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972964
Taskeen Fatima, F. Azam, A. W. Muzaffar
In the past few decades E-learning in higher education is increased and played a vital role in pandemics like COVID-19. Particularly, online examinations are conducted on e-learning platforms which leads to many security and cheating issues. For this reason, numerous research is available proposed methodologies and techniques for seamless execution of online examination. However, it is hard to find any study that provides the latest systematic literature review of anti-cheat or cheating prediction techniques and the approaches in the literature. We have analyzed 2223 studies. However, after applying inclusion and exclusion criteria 23 studies relevant studies are finalized. The review revealed that there are three types of proctoring, fully live online, recorded & reviewed and fully automated. This study provides a comparative analysis of online examination techniques & tools performed on 23 studies from the last five years 2017 to 2021. Furthermore, in this time duration five leading cheating prevention features are identified.14 important techniques which are mostly used in this time duration are found in which best frequent approach used in literature is NLP and 10 data sets including both public and private are identified. Proceeding toward the proposed solution, a total of 20 tools for the anti-cheat examinations are found. Almost 23 leading existing tools were found in the literature. To narrow down the criteria for adoption factor is analyzed and studies of the online anti-cheat examination solution adoption in different countries are also investigated. Finally, the overall cost of the e-learning infrastructure, specifically the conduction of examinations is determined by comparing the key factors of the global adoption with major online exam features.
在过去的几十年里,高等教育中的电子学习得到了发展,并在COVID-19等大流行病中发挥了至关重要的作用。特别是,在线考试是在电子学习平台上进行的,这导致了许多安全和作弊问题。出于这个原因,大量的研究提出了无缝执行在线考试的方法和技术。然而,很难找到任何研究提供最新的系统文献综述反作弊或作弊预测技术和方法在文献中。我们分析了2223项研究。然而,在应用纳入和排除标准后,有23项研究完成了相关研究。审查显示,监考有三种类型,即完全在线直播、记录和审查以及全自动监考。本研究对过去五年(2017年至2021年)23项研究中的在线考试技术和工具进行了比较分析。此外,在这段时间内,五个主要的作弊预防功能被确定。在这段时间内,发现了14种主要使用的重要技术,其中文献中最常用的方法是NLP,并确定了包括公共和私人在内的10个数据集。根据提出的解决方案,共发现了20个反作弊考试工具。在文献中发现了近23种领先的现有工具。为了缩小采用因素的标准,分析了不同国家在线反作弊考试方案采用的研究情况。最后,通过比较全球采用的关键因素与主要在线考试特征,确定电子学习基础设施的总体成本,特别是考试的进行。
{"title":"A Systematic Review on Fully Automated Online Exam Proctoring Approaches","authors":"Taskeen Fatima, F. Azam, A. W. Muzaffar","doi":"10.1109/INMIC56986.2022.9972964","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972964","url":null,"abstract":"In the past few decades E-learning in higher education is increased and played a vital role in pandemics like COVID-19. Particularly, online examinations are conducted on e-learning platforms which leads to many security and cheating issues. For this reason, numerous research is available proposed methodologies and techniques for seamless execution of online examination. However, it is hard to find any study that provides the latest systematic literature review of anti-cheat or cheating prediction techniques and the approaches in the literature. We have analyzed 2223 studies. However, after applying inclusion and exclusion criteria 23 studies relevant studies are finalized. The review revealed that there are three types of proctoring, fully live online, recorded & reviewed and fully automated. This study provides a comparative analysis of online examination techniques & tools performed on 23 studies from the last five years 2017 to 2021. Furthermore, in this time duration five leading cheating prevention features are identified.14 important techniques which are mostly used in this time duration are found in which best frequent approach used in literature is NLP and 10 data sets including both public and private are identified. Proceeding toward the proposed solution, a total of 20 tools for the anti-cheat examinations are found. Almost 23 leading existing tools were found in the literature. To narrow down the criteria for adoption factor is analyzed and studies of the online anti-cheat examination solution adoption in different countries are also investigated. Finally, the overall cost of the e-learning infrastructure, specifically the conduction of examinations is determined by comparing the key factors of the global adoption with major online exam features.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-Organ Plant Classification Using Deep Learning 基于深度学习的多器官植物分类
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972979
Asfand Yar Ali, L. Fahad
The variability in the shape and appearance of the same plant organs and similarity between organs of different plants results in fewer inter-class and high intra-class variations making organ-based plant classification a challenging problem. Classification of plants using a single organ may not be able to deal with these challenges. Thus the use of multiple organs can be more effective in improving the classification performance by learning different aspects of the same class. Existing approaches mainly focus on generic features of plants while ignoring features related to multiple organs. In the proposed approach, Convolutional Neural Network (CNN) is used to exploit the information of multiple organs instead of a single organ for the classification of plants. Moreover, the representation of minority classes is increased through DC GAN. The comparison of the proposed approach with the existing approaches on the publicly available PlantCLEF dataset shows its better performance in the accurate classification of plants.
由于同一植物器官形状和外观的差异以及不同植物器官之间的相似性,导致类间差异较小,而类内差异较大,这使得基于器官的植物分类成为一个具有挑战性的问题。使用单一器官的植物分类可能无法应对这些挑战。因此,通过学习同一类的不同方面,使用多个器官可以更有效地提高分类性能。现有的方法主要关注植物的属类特征,而忽略了与多器官相关的特征。该方法利用卷积神经网络(Convolutional Neural Network, CNN)来利用多个器官的信息而不是单个器官的信息来对植物进行分类。此外,通过直流GAN增加了少数族裔的代表性。将该方法与现有方法在公开的PlantCLEF数据集上的比较表明,该方法在植物的准确分类方面具有更好的性能。
{"title":"Multi-Organ Plant Classification Using Deep Learning","authors":"Asfand Yar Ali, L. Fahad","doi":"10.1109/INMIC56986.2022.9972979","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972979","url":null,"abstract":"The variability in the shape and appearance of the same plant organs and similarity between organs of different plants results in fewer inter-class and high intra-class variations making organ-based plant classification a challenging problem. Classification of plants using a single organ may not be able to deal with these challenges. Thus the use of multiple organs can be more effective in improving the classification performance by learning different aspects of the same class. Existing approaches mainly focus on generic features of plants while ignoring features related to multiple organs. In the proposed approach, Convolutional Neural Network (CNN) is used to exploit the information of multiple organs instead of a single organ for the classification of plants. Moreover, the representation of minority classes is increased through DC GAN. The comparison of the proposed approach with the existing approaches on the publicly available PlantCLEF dataset shows its better performance in the accurate classification of plants.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116768776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Plants Disease Classification using Deep Learning 基于深度学习的植物病害分类
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972966
Abdul Rehman, L. Fahad
Early detection of plant disease is useful in reducing its rapid spread; however similar visual appearances of different plant diseases make it a challenging problem. In the proposed approach, we improve the performance of plant disease detection by learning the fine differences in the visual appearances of these different diseases. We used pre-processing, data augmentation, and deep learning for the classification of different categories of diseases in plants. The representation of minority classes with fewer images is improved using DC-GAN. Different CNN based deep learning techniques are applied for classification. The performance comparison of the proposed approach with existing approaches on a publicly available plant village dataset shows its superior performance with an accuracy of 97.2% and an F1 score of 0.97 for incorrect predictions of different plant diseases.
植物病害的早期发现有助于减少其迅速蔓延;然而,不同植物病害相似的视觉表现使其成为一个具有挑战性的问题。在提出的方法中,我们通过学习这些不同病害的视觉外观的细微差异来提高植物病害检测的性能。我们使用预处理、数据增强和深度学习对植物不同类别的疾病进行分类。使用DC-GAN改进了图像较少的少数类的表示。不同的基于CNN的深度学习技术被应用于分类。在公开的植物村数据集上,将所提出的方法与现有方法的性能进行了比较,结果表明,该方法的准确性为97.2%,对不同植物病害的错误预测F1得分为0.97。
{"title":"Plants Disease Classification using Deep Learning","authors":"Abdul Rehman, L. Fahad","doi":"10.1109/INMIC56986.2022.9972966","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972966","url":null,"abstract":"Early detection of plant disease is useful in reducing its rapid spread; however similar visual appearances of different plant diseases make it a challenging problem. In the proposed approach, we improve the performance of plant disease detection by learning the fine differences in the visual appearances of these different diseases. We used pre-processing, data augmentation, and deep learning for the classification of different categories of diseases in plants. The representation of minority classes with fewer images is improved using DC-GAN. Different CNN based deep learning techniques are applied for classification. The performance comparison of the proposed approach with existing approaches on a publicly available plant village dataset shows its superior performance with an accuracy of 97.2% and an F1 score of 0.97 for incorrect predictions of different plant diseases.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126560664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds 云环境下DDoS攻击检测与防御机制综述
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972962
Muhammad Tehaam, Sahar Ahmad, Hassan Shahid, Muhammad Suleman Saboor, Ayesha Aziz, K. Munir
Cloud provides access to shared pool of resources like storage, networking, and processing. Distributed denial of service attacks are dangerous for Cloud services because they mainly target the availability of resources. It is important to detect and prevent a DDoS attack for the continuity of Cloud services. In this review, we analyze the different mechanisms of detection and prevention of the DDoS attacks in Clouds. We identify the major DDoS attacks in Clouds and compare the frequently-used strategies to detect, prevent, and mitigate those attacks that will help the future researchers in this area.
云提供了对存储、网络和处理等共享资源池的访问。分布式拒绝服务攻击对云服务来说是危险的,因为它们主要针对资源的可用性。检测和防止DDoS攻击对于云服务的连续性非常重要。在这篇综述中,我们分析了在云中检测和预防DDoS攻击的不同机制。我们确定了云中的主要DDoS攻击,并比较了检测、预防和减轻这些攻击的常用策略,这将有助于该领域未来的研究人员。
{"title":"A Review of DDoS Attack Detection and Prevention Mechanisms in Clouds","authors":"Muhammad Tehaam, Sahar Ahmad, Hassan Shahid, Muhammad Suleman Saboor, Ayesha Aziz, K. Munir","doi":"10.1109/INMIC56986.2022.9972962","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972962","url":null,"abstract":"Cloud provides access to shared pool of resources like storage, networking, and processing. Distributed denial of service attacks are dangerous for Cloud services because they mainly target the availability of resources. It is important to detect and prevent a DDoS attack for the continuity of Cloud services. In this review, we analyze the different mechanisms of detection and prevention of the DDoS attacks in Clouds. We identify the major DDoS attacks in Clouds and compare the frequently-used strategies to detect, prevent, and mitigate those attacks that will help the future researchers in this area.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133455432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Energy Efficiency Issues in Android Application: A Literature Review Android应用中的能源效率问题:文献综述
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972939
Obaid Ullah, Muhammad Hanan, Maryam Abdul Ghafoor
In today's digital world, almost every person owns a smartphone device. Due to more emphasis on the functional aspect of an application, programmers often follow such practices that consume a lot of energy. Hence, the purpose of this literature review is to find such issues that can cause more energy consumption in the android applications along with finding their solutions from the literature. The literature review also includes year-wise and venue-wise paper distribution. Out of our initial 145 papers, we discarded 4 papers based on a duplicate study, then 100 papers were discarded on the title and abstract-based screening while 22 papers were discarded based on inclusion/exclusion and quality assurance criteria. A final of 19 studies were considered for this study and were read thoroughly. Our results reveal that bad programming practice was the most discussed issue (26%) while tool-related problems and patterns were the least discussed issues in the literature (15.7%). Tool-based solutions are discussed mostly (36.84%) while refactoring technique and applying other techniques are discussed least (10.5%) in the literature. The work is helpful for the researchers and developers as they can learn from this about the energy consumption reasons and their solutions.
在当今的数字世界里,几乎每个人都拥有一部智能手机。由于更加强调应用程序的功能方面,程序员经常遵循这种消耗大量精力的实践。因此,这篇文献综述的目的是找到这样的问题,可以导致更多的能源消耗在android应用程序以及从文献中找到他们的解决方案。文献综述还包括按年度和按地点分配的论文。在最初的145篇论文中,我们根据重复研究丢弃了4篇论文,然后根据标题和摘要筛选丢弃了100篇论文,根据纳入/排除和质量保证标准丢弃了22篇论文。本研究最终考虑了19项研究,并进行了全面阅读。我们的结果显示,糟糕的编程实践是讨论最多的问题(26%),而与工具相关的问题和模式是文献中讨论最少的问题(15.7%)。基于工具的解决方案被讨论最多(36.84%),而重构技术和应用其他技术在文献中被讨论最少(10.5%)。这项工作对研究人员和开发人员有帮助,他们可以从中了解能源消耗的原因和解决方案。
{"title":"Energy Efficiency Issues in Android Application: A Literature Review","authors":"Obaid Ullah, Muhammad Hanan, Maryam Abdul Ghafoor","doi":"10.1109/INMIC56986.2022.9972939","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972939","url":null,"abstract":"In today's digital world, almost every person owns a smartphone device. Due to more emphasis on the functional aspect of an application, programmers often follow such practices that consume a lot of energy. Hence, the purpose of this literature review is to find such issues that can cause more energy consumption in the android applications along with finding their solutions from the literature. The literature review also includes year-wise and venue-wise paper distribution. Out of our initial 145 papers, we discarded 4 papers based on a duplicate study, then 100 papers were discarded on the title and abstract-based screening while 22 papers were discarded based on inclusion/exclusion and quality assurance criteria. A final of 19 studies were considered for this study and were read thoroughly. Our results reveal that bad programming practice was the most discussed issue (26%) while tool-related problems and patterns were the least discussed issues in the literature (15.7%). Tool-based solutions are discussed mostly (36.84%) while refactoring technique and applying other techniques are discussed least (10.5%) in the literature. The work is helpful for the researchers and developers as they can learn from this about the energy consumption reasons and their solutions.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129834647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evaluation of Packet Concatenation Mechanisms for Low Power Devices in Industrial Internet of Things 工业物联网中低功耗器件的分组连接机制评估
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972988
S. Siddiqui, A. Khan
Packet concatenation at Media Access Control (MAC) layer has a profound impact for the performance of low power devices in the Internet of Things (IoT), often termed as Wireless Sensor Networks (WSNs). Due to the recent development of enormous packet concatenation schemes, it has become crucial to compare them in order to identify the best method which could fit a specific application scenario for WSN. This paper compares the dynamic duty-cycling based packet concatenation MAC, ADP-MAC (Adaptive and Dynamic Duty-cycle MAC) with concurrent transmission-based MAC primitive PiP (Packet-in-Packet). Simulations have been conducted to compare the single hop performance of 2 schemes based on their Packet delivery Ratio. The detailed implementation for the two protocols has been used for conducting simulation over Avrora emulator. It has been found that ADP-MAC outperforms PiP due to achieving better synchronization between source and sink nodes
媒体访问控制(MAC)层的数据包连接对物联网(IoT)中低功耗设备的性能有着深远的影响,通常被称为无线传感器网络(wsn)。由于近年来大量数据包连接方案的发展,为了确定适合无线传感器网络特定应用场景的最佳方法,对它们进行比较变得至关重要。本文比较了基于动态占空比的分组连接MAC、ADP-MAC(自适应动态占空比MAC)和基于并发传输的原始包中包MAC (packet -in- packet)。通过仿真比较了两种方案的单跳传输性能。在Avrora仿真器上对这两个协议的详细实现进行了仿真。研究发现,由于在源节点和汇聚节点之间实现了更好的同步,ADP-MAC优于PiP
{"title":"Evaluation of Packet Concatenation Mechanisms for Low Power Devices in Industrial Internet of Things","authors":"S. Siddiqui, A. Khan","doi":"10.1109/INMIC56986.2022.9972988","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972988","url":null,"abstract":"Packet concatenation at Media Access Control (MAC) layer has a profound impact for the performance of low power devices in the Internet of Things (IoT), often termed as Wireless Sensor Networks (WSNs). Due to the recent development of enormous packet concatenation schemes, it has become crucial to compare them in order to identify the best method which could fit a specific application scenario for WSN. This paper compares the dynamic duty-cycling based packet concatenation MAC, ADP-MAC (Adaptive and Dynamic Duty-cycle MAC) with concurrent transmission-based MAC primitive PiP (Packet-in-Packet). Simulations have been conducted to compare the single hop performance of 2 schemes based on their Packet delivery Ratio. The detailed implementation for the two protocols has been used for conducting simulation over Avrora emulator. It has been found that ADP-MAC outperforms PiP due to achieving better synchronization between source and sink nodes","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124299424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Fuzzy Approach to Trust Management in Fog Computing 雾计算中的模糊信任管理方法
Pub Date : 2022-10-21 DOI: 10.1109/INMIC56986.2022.9972942
Masooma Muhammad Nabi, M. A. Shah
The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.
物联网(IoT)技术已经彻底改变了世界,任何东西都可以智能连接和访问。物联网利用云计算来处理和存储大量数据。在某种程度上,雾计算的概念已经出现在云和物联网设备之间,以解决延迟问题。当雾节点交换数据以完成特定任务时,存在许多安全和隐私风险。例如,将数据卸载到恶意雾节点可能导致非法收集或修改用户的私有数据。在本文中,我们依靠信任来检测和分离坏雾节点。我们使用Mamdani模糊方法,并考虑具有许多雾服务器的医院场景。目的是识别恶意雾节点。延迟和距离等指标用于评估每个雾服务器的可信度。本研究的主要贡献在于确定模糊逻辑配置如何改变雾节点的信任值。实验结果表明,该方法能够在给定场景下检测出坏雾装置并建立其可信度。
{"title":"A Fuzzy Approach to Trust Management in Fog Computing","authors":"Masooma Muhammad Nabi, M. A. Shah","doi":"10.1109/INMIC56986.2022.9972942","DOIUrl":"https://doi.org/10.1109/INMIC56986.2022.9972942","url":null,"abstract":"The Internet of Things (IoT) technology has revolutionized the world where anything is smartly connected and is accessible. The IoT makes use of cloud computing for processing and storing huge amounts of data. In some way, the concept of fog computing has emerged between cloud and IoT devices to address the issue of latency. When a fog node exchanges data for completing a particular task, there are many security and privacy risks. For example, offloading data to a rogue fog node might result in an illegal gathering or modification of users' private data. In this paper, we rely on trust to detect and detach bad fog nodes. We use a Mamdani fuzzy method and we consider a hospital scenario with many fog servers. The aim is to identify the malicious fog node. Metrics such as latency and distance are used in evaluating the trustworthiness of each fog server. The main contribution of this study is identifying how fuzzy logic configuration could alter the trust value of fog nodes. The experimental results show that our method detects the bad fog device and establishes its trustworthiness in the given scenario.","PeriodicalId":404424,"journal":{"name":"2022 24th International Multitopic Conference (INMIC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131023225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2022 24th International Multitopic Conference (INMIC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1