首页 > 最新文献

Journal of Advanced Computer Science and Technology最新文献

英文 中文
Evaluating the performance of machine learning algorithms for network intrusion detection systems in the internet of things infrastructure 评估物联网基础设施中网络入侵检测系统的机器学习算法的性能
Pub Date : 2020-09-19 DOI: 10.14419/JACST.V9I1.30992
Y. Banadaki
As numerous Internet-of-Things (IoT) devices are deploying on a daily basis, network intrusion detection systems (NIDS) are among the most critical tools to ensure the protection and security of networks against malicious cyberattacks. This paper employs four machine learning algorithms: XGBoost, random forest, decision tree, and gradient boosting, and evaluates their performance in NIDS, considering the accuracy, precision, recall, and F-score. The comparative analysis conducted using the CICIDS2017 dataset reveals that the XGBoost performs better than the other algorithms reaching the predicted accuracy of 99.6% in detecting cyberattacks. XGBoost-based attack detectors also have the largest weighted metrics of F1-score, precision, and recall. The paper also studies the effect of class imbalance and the size of the normal and attack classes. The small numbers of some attacks in training datasets mislead the classifier to bias towards the majority classes resulting in a bottleneck to improving macro recall and macro F1 score. The results assist the network engineers in choosing the most effective machine learning-based NIDS to ensure network security for today’s growing IoT network traffic.
随着每天部署的物联网(IoT)设备越来越多,网络入侵检测系统(NIDS)是确保网络免受恶意网络攻击的保护和安全的最关键工具之一。本文采用了XGBoost、随机森林、决策树和梯度增强四种机器学习算法,并从正确率、精密度、召回率和F-score等方面评估了它们在NIDS中的性能。使用CICIDS2017数据集进行的对比分析表明,XGBoost在检测网络攻击方面的表现优于其他算法,预测准确率达到99.6%。基于xgboost的攻击检测器还具有最大的f1得分、精度和召回率加权指标。本文还研究了班级不平衡的影响以及正常班级和攻击班级的规模。训练数据集中某些攻击的数量较少,会误导分类器偏向多数类,从而导致提高宏观召回率和宏观F1分数的瓶颈。研究结果有助于网络工程师选择最有效的基于机器学习的NIDS,以确保当今不断增长的物联网网络流量的网络安全。
{"title":"Evaluating the performance of machine learning algorithms for network intrusion detection systems in the internet of things infrastructure","authors":"Y. Banadaki","doi":"10.14419/JACST.V9I1.30992","DOIUrl":"https://doi.org/10.14419/JACST.V9I1.30992","url":null,"abstract":"As numerous Internet-of-Things (IoT) devices are deploying on a daily basis, network intrusion detection systems (NIDS) are among the most critical tools to ensure the protection and security of networks against malicious cyberattacks. This paper employs four machine learning algorithms: XGBoost, random forest, decision tree, and gradient boosting, and evaluates their performance in NIDS, considering the accuracy, precision, recall, and F-score. The comparative analysis conducted using the CICIDS2017 dataset reveals that the XGBoost performs better than the other algorithms reaching the predicted accuracy of 99.6% in detecting cyberattacks. XGBoost-based attack detectors also have the largest weighted metrics of F1-score, precision, and recall. The paper also studies the effect of class imbalance and the size of the normal and attack classes. The small numbers of some attacks in training datasets mislead the classifier to bias towards the majority classes resulting in a bottleneck to improving macro recall and macro F1 score. The results assist the network engineers in choosing the most effective machine learning-based NIDS to ensure network security for today’s growing IoT network traffic.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125880855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Geometric Approach to Optimal Path Problem with Uncertain Arc Lengths 不确定弧长最优路径问题的几何方法
Pub Date : 2020-07-25 DOI: 10.14419/JACST.V9I1.30674
A. Hasan-Zadeh
In this paper, the problem of finding the shortest paths, one of the most important problems in science and technology has been geometrically studied. Shortest path algorithm has been generalized to the shortest cycles in each homotopy class on a surface with arbitrary topology, using the universal covering space notion in the algebraic topology. Then, a general algorithm has been presented to compute the shortest cycles (geometrically rather than combinatorial) in each homotopy class. The algorithm can handle surface meshes with the desired topology, with or without boundary. It also provides a fundamental framework for other algorithms based on universal coverage space due to the capacity and flexibility of the framework.
本文从几何角度研究了最短路径问题,这是科学技术中最重要的问题之一。利用代数拓扑中的普适覆盖空间概念,将最短路径算法推广到任意拓扑曲面上各同伦类的最短环。然后,给出了计算每个同伦类中最短周期(几何而不是组合)的一般算法。该算法可以处理具有理想拓扑结构的曲面网格,无论是否有边界。由于该框架的容量和灵活性,它也为其他基于普遍覆盖空间的算法提供了一个基本框架。
{"title":"Geometric Approach to Optimal Path Problem with Uncertain Arc Lengths","authors":"A. Hasan-Zadeh","doi":"10.14419/JACST.V9I1.30674","DOIUrl":"https://doi.org/10.14419/JACST.V9I1.30674","url":null,"abstract":"In this paper, the problem of finding the shortest paths, one of the most important problems in science and technology has been geometrically studied. Shortest path algorithm has been generalized to the shortest cycles in each homotopy class on a surface with arbitrary topology, using the universal covering space notion in the algebraic topology. Then, a general algorithm has been presented to compute the shortest cycles (geometrically rather than combinatorial) in each homotopy class. The algorithm can handle surface meshes with the desired topology, with or without boundary. It also provides a fundamental framework for other algorithms based on universal coverage space due to the capacity and flexibility of the framework.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"334 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131474071","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Statistical adjustment of the parameters of multi-objective optimization problems with design expert method 用设计专家法进行多目标优化问题参数的统计调整
Pub Date : 2020-06-14 DOI: 10.14419/JACST.V9I1.30656
A. Hasan-Zadeh
Optimization methods in which one single criterion is considered cannot provide a comprehensive solution to various decisionmaking algorithms because they cannot consider the interchange of conflicting goals that sometimes conflict with one another. Multi-objective opti-mization is a suitable solution to this obstacle. Given the importance of multi-objective optimization problems in engineering and technology, adjusting the parameters of these types of problems will, in addition to the decision-making accuracy, facilitate the analysis of the results and makes it more applicable. For this purpose, multi-objective optimization using experimental design methods has been developed which can solve these problems by considering different objectives simultaneously. Mathematical modelling for the setting of the parameters of the considered problem with all the statistical details related to their prediction and optimization have been studied.
考虑单一准则的优化方法不能为各种决策算法提供全面的解决方案,因为它们不能考虑有时相互冲突的冲突目标的交换。多目标优化是解决这一问题的合适方法。考虑到多目标优化问题在工程技术中的重要性,调整这类问题的参数除了可以提高决策的准确性外,还可以促进结果的分析,使其更具适用性。为此,采用实验设计方法的多目标优化可以同时考虑不同的目标来解决这些问题。研究了所考虑问题的参数设置的数学模型,以及与预测和优化有关的所有统计细节。
{"title":"Statistical adjustment of the parameters of multi-objective optimization problems with design expert method","authors":"A. Hasan-Zadeh","doi":"10.14419/JACST.V9I1.30656","DOIUrl":"https://doi.org/10.14419/JACST.V9I1.30656","url":null,"abstract":"Optimization methods in which one single criterion is considered cannot provide a comprehensive solution to various decisionmaking algorithms because they cannot consider the interchange of conflicting goals that sometimes conflict with one another. Multi-objective opti-mization is a suitable solution to this obstacle. Given the importance of multi-objective optimization problems in engineering and technology, adjusting the parameters of these types of problems will, in addition to the decision-making accuracy, facilitate the analysis of the results and makes it more applicable. For this purpose, multi-objective optimization using experimental design methods has been developed which can solve these problems by considering different objectives simultaneously. Mathematical modelling for the setting of the parameters of the considered problem with all the statistical details related to their prediction and optimization have been studied.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130521873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circular Gabor wavelet algorithm for fingerprint liveness detection 圆形Gabor小波算法用于指纹活性检测
Pub Date : 2020-01-11 DOI: 10.14419/JACST.V9I1.29908
O. Onifade, Paul Akinde, F. Isinkaye
Biometrics usage is growing daily and fingerprint-based recognition system is among the most effective and popular methods of personality identification. The conventional fingerprint sensor functions on total internal reflectance (TIR), which is a method that captures the external features of the finger that is presented to it. Hence, this opens it up to spoof attacks. Liveness detection is an anti-spoofing approach that has the potentials to identify physiological features in fingerprints. It has been demonstrated that spoof fingerprint made of gelatin, gummy and play-doh can easily deceive sensor. Therefore, the security of such sensor is not guaranteed. Here, we established a secure and robust fake-spoof fingerprint identification algorithm using Circular Gabor Wavelet for texture segmentation of the captured images. The samples were exposed to feature extraction processing using circular Gabor wavelet algorithm developed for texture segmentations. The result was evaluated using FAR which measures if a user presented is accepted under a false claimed identity. The FAR result was 0.03125 with an accuracy of 99.968% which showed distinct difference between live and spoof fingerprint.
生物识别技术的使用日益增长,指纹识别系统是最有效和最流行的人格识别方法之一。传统的指纹传感器的功能是全内反射(TIR),这是一种捕捉手指外部特征的方法。因此,这使它容易受到欺骗攻击。活体检测是一种反欺骗方法,具有识别指纹生理特征的潜力。实验证明,用明胶、软糖和橡皮泥制成的假指纹可以很容易地欺骗传感器。因此,这种传感器的安全性得不到保证。本文利用圆形Gabor小波对采集到的指纹图像进行纹理分割,建立了一种安全、鲁棒的伪欺骗指纹识别算法。使用用于纹理分割的圆形Gabor小波算法对样本进行特征提取处理。使用FAR对结果进行评估,该方法衡量用户是否在虚假身份下被接受。FAR结果为0.03125,准确率为99.968%,显示了真实指纹和伪造指纹的显著差异。
{"title":"Circular Gabor wavelet algorithm for fingerprint liveness detection","authors":"O. Onifade, Paul Akinde, F. Isinkaye","doi":"10.14419/JACST.V9I1.29908","DOIUrl":"https://doi.org/10.14419/JACST.V9I1.29908","url":null,"abstract":"Biometrics usage is growing daily and fingerprint-based recognition system is among the most effective and popular methods of personality identification. The conventional fingerprint sensor functions on total internal reflectance (TIR), which is a method that captures the external features of the finger that is presented to it. Hence, this opens it up to spoof attacks. Liveness detection is an anti-spoofing approach that has the potentials to identify physiological features in fingerprints. It has been demonstrated that spoof fingerprint made of gelatin, gummy and play-doh can easily deceive sensor. Therefore, the security of such sensor is not guaranteed. Here, we established a secure and robust fake-spoof fingerprint identification algorithm using Circular Gabor Wavelet for texture segmentation of the captured images. The samples were exposed to feature extraction processing using circular Gabor wavelet algorithm developed for texture segmentations. The result was evaluated using FAR which measures if a user presented is accepted under a false claimed identity. The FAR result was 0.03125 with an accuracy of 99.968% which showed distinct difference between live and spoof fingerprint.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117209662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Numerical analysis of transcritical carbon dioxide compression cycle: a case study 跨临界二氧化碳压缩循环的数值分析:一个案例研究
Pub Date : 2018-02-13 DOI: 10.14419/JACST.V7I1.8827
M. Keshtkar
This study deals with thermodynamic investigation of a refrigeration compression cycle with carbon dioxide refrigerant and two stage compression. In this paper, the effect of intercooler in the two-stage compression system at different pressures of gas cooler is investigated. In addition, the performance of one stage compression cycle and two-stage compression cycle are compared and eventually, the performance of system is investigated under the influence of the change of variables such as gas cooler pressure, isentropic efficiency of the compressors, the intercooling rate between the two stages of compression, the refrigerant gas cooler outlet temperature is examined. Due to evaporation temperature in the evaporator   10 C  and refrigeration capacity (kW) results show that the coefficient of performance in the two-stage compression with intercooler is increased compared to the single-stage compression cycle.
本文对含二氧化碳制冷剂和两级压缩的制冷压缩循环进行了热力学研究。本文研究了在不同气体冷却器压力下,中间冷却器在两级压缩系统中的作用。此外,还对一级压缩循环和二级压缩循环的性能进行了比较,最后考察了气冷器压力、压缩机等熵效率、两级压缩间的中间冷却速率、制冷剂气冷器出口温度等变量变化对系统性能的影响。由于蒸发器的蒸发温度10℃,制冷量(kW),结果表明,与单级压缩循环相比,带中间冷却器的两级压缩循环的性能系数有所提高。
{"title":"Numerical analysis of transcritical carbon dioxide compression cycle: a case study","authors":"M. Keshtkar","doi":"10.14419/JACST.V7I1.8827","DOIUrl":"https://doi.org/10.14419/JACST.V7I1.8827","url":null,"abstract":"This study deals with thermodynamic investigation of a refrigeration compression cycle with carbon dioxide refrigerant and two stage compression. In this paper, the effect of intercooler in the two-stage compression system at different pressures of gas cooler is investigated. In addition, the performance of one stage compression cycle and two-stage compression cycle are compared and eventually, the performance of system is investigated under the influence of the change of variables such as gas cooler pressure, isentropic efficiency of the compressors, the intercooling rate between the two stages of compression, the refrigerant gas cooler outlet temperature is examined. Due to evaporation temperature in the evaporator   10 C  and refrigeration capacity (kW) results show that the coefficient of performance in the two-stage compression with intercooler is increased compared to the single-stage compression cycle.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132773619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Usability meets security: a database case study 可用性满足安全性:一个数据库案例研究
Pub Date : 2017-11-24 DOI: 10.14419/JACST.V6I2.8425
Yong Wang, B. Rawal
Abstract In this paper, we review security and usability scenarios. We propose security enhancements without losing usability and apply a new approach to popular application systems. Specifically, we analyze database security for access control, auditing, authentication, encryption, integrity control, backups, separation of environment, and secure configuration. Finally, we present our recommendations for system security and usability that work together.
在本文中,我们回顾了安全性和可用性场景。我们在不丧失可用性的情况下提出安全性增强建议,并将一种新方法应用于流行的应用程序系统。具体来说,我们将分析数据库的安全性,包括访问控制、审计、身份验证、加密、完整性控制、备份、环境分离和安全配置。最后,我们提出了系统安全性和可用性协同工作的建议。
{"title":"Usability meets security: a database case study","authors":"Yong Wang, B. Rawal","doi":"10.14419/JACST.V6I2.8425","DOIUrl":"https://doi.org/10.14419/JACST.V6I2.8425","url":null,"abstract":"Abstract In this paper, we review security and usability scenarios. We propose security enhancements without losing usability and apply a new approach to popular application systems. Specifically, we analyze database security for access control, auditing, authentication, encryption, integrity control, backups, separation of environment, and secure configuration. Finally, we present our recommendations for system security and usability that work together.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128456273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A heuristic to predict the optimal pattern-growth direction for the pattern growth-based sequential pattern mining approach 基于模式生长的序列模式挖掘方法中最优模式生长方向的启发式预测
Pub Date : 2017-06-04 DOI: 10.14419/jacst.v6i2.7011
Kenmogne Edith Belise, Nkambou Roger, Tadmon Calvin, E. Nguifo
Sequential pattern mining is an efficient technique for discovering recurring structures or patterns from very large datasets, with a very large field of applications. It aims at extracting a set of attributes, shared across time among a large number of objects in a given database. Previous studies have developed two major classes of sequential pattern mining methods, namely, the candidate generation-and-test approach based on either vertical or horizontal data formats represented respectively by GSP and SPADE, and the pattern-growth approach represented by FreeSpan, PrefixSpan and their further extensions. The performances of these algorithms depend on how patterns grow. Because of this, we introduce a heuristic to predict the optimal pattern-growth direction, i.e. the pattern-growth direction leading to the best performance in terms of runtime and memory usage. Then, we perform a number of experimentations on both real-life and synthetic datasets to test the heuristic. The performance analysis of these experimentations show that the heuristic prediction is reliable in general.
顺序模式挖掘是一种从非常大的数据集中发现循环结构或模式的有效技术,具有非常大的应用领域。它旨在提取一组属性,这些属性在给定数据库中的大量对象之间随时间共享。以往的研究发展了两大类顺序模式挖掘方法,即基于垂直或水平数据格式的候选生成和测试方法,分别以GSP和SPADE为代表;以及以FreeSpan、PrefixSpan及其进一步扩展为代表的模式生长方法。这些算法的性能取决于模式的增长方式。因此,我们引入了一个启发式方法来预测最佳模式增长方向,即在运行时和内存使用方面导致最佳性能的模式增长方向。然后,我们在现实生活和合成数据集上进行了一些实验来测试启发式。这些实验的性能分析表明,启发式预测总体上是可靠的。
{"title":"A heuristic to predict the optimal pattern-growth direction for the pattern growth-based sequential pattern mining approach","authors":"Kenmogne Edith Belise, Nkambou Roger, Tadmon Calvin, E. Nguifo","doi":"10.14419/jacst.v6i2.7011","DOIUrl":"https://doi.org/10.14419/jacst.v6i2.7011","url":null,"abstract":"Sequential pattern mining is an efficient technique for discovering recurring structures or patterns from very large datasets, with a very large field of applications. It aims at extracting a set of attributes, shared across time among a large number of objects in a given database. Previous studies have developed two major classes of sequential pattern mining methods, namely, the candidate generation-and-test approach based on either vertical or horizontal data formats represented respectively by GSP and SPADE, and the pattern-growth approach represented by FreeSpan, PrefixSpan and their further extensions. The performances of these algorithms depend on how patterns grow. Because of this, we introduce a heuristic to predict the optimal pattern-growth direction, i.e. the pattern-growth direction leading to the best performance in terms of runtime and memory usage. Then, we perform a number of experimentations on both real-life and synthetic datasets to test the heuristic. The performance analysis of these experimentations show that the heuristic prediction is reliable in general.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114713181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhancing formal specification and verification of e-commerce protocol 加强电子商务协议的正式规范和验证
Pub Date : 2017-02-26 DOI: 10.14419/JACST.V6I1.6713
H. Al-Refai, K. Batiha
Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, since there are areas, which require further study such as: E-payment phase in SET protocol. E-payment phase is vast and complex phase it has long series of steps. The behavior of environment is assumed by the phase and is restricted to the rules built by their proposed protocol. This paper will follow Ph-Spi calculus for formalizing and analyzing enhanced payment phase of SET protocol by reducing the number of transactions with many additional operators. A new agent controller will be formally modeled, which we can rely upon to make automated decisions during interaction with a dynamic protocol environment. So, this agent controller is used to terminate the transaction process in any case of fraud or attack. This paper is conjunction between our previous works of E-payment phase in SET protocol and other works in Ph-Spi calculus in purpose of analyzing and proving the main security properties: authentication and privacy to evaluate the efficiency of the enhanced security of electronic payment phase for SET protocol (E-SET) using Ph-Spi calculus.
为了提高SET协议的性能,人们做了大量的工作,特别是在电子支付阶段。本文深入分析了近年来有关支付阶段的研究工作;研究发现,这一主题需要相当大的改进,因为有一些领域需要进一步研究,例如:SET协议中的电子支付阶段。电子支付阶段是一个庞大而复杂的阶段,它有很长的一系列步骤。环境的行为是由阶段假设的,并且被限制在由他们提出的协议所建立的规则中。本文将遵循Ph-Spi演算,通过减少与许多额外运营商的交易数量来形式化和分析SET协议的增强支付阶段。一个新的代理控制器将被正式建模,我们可以依靠它在与动态协议环境交互期间做出自动决策。因此,该代理控制器用于在任何欺诈或攻击的情况下终止事务处理。本文结合前人在SET协议中电子支付阶段的研究成果和其他在Ph-Spi演算中的研究成果,分析和证明了SET协议中主要的安全特性:认证和隐私,以评价利用Ph-Spi演算增强SET协议(E-SET)电子支付阶段安全性的有效性。
{"title":"Enhancing formal specification and verification of e-commerce protocol","authors":"H. Al-Refai, K. Batiha","doi":"10.14419/JACST.V6I1.6713","DOIUrl":"https://doi.org/10.14419/JACST.V6I1.6713","url":null,"abstract":"Lots of work have been attempted to enhance the SET protocol performance special attention is on E-payment phase. This paper thoroughly analyzes recent works on payment phase; it has been found that this subject requires considerable enhancements, since there are areas, which require further study such as: E-payment phase in SET protocol. E-payment phase is vast and complex phase it has long series of steps. The behavior of environment is assumed by the phase and is restricted to the rules built by their proposed protocol. This paper will follow Ph-Spi calculus for formalizing and analyzing enhanced payment phase of SET protocol by reducing the number of transactions with many additional operators. A new agent controller will be formally modeled, which we can rely upon to make automated decisions during interaction with a dynamic protocol environment. So, this agent controller is used to terminate the transaction process in any case of fraud or attack. This paper is conjunction between our previous works of E-payment phase in SET protocol and other works in Ph-Spi calculus in purpose of analyzing and proving the main security properties: authentication and privacy to evaluate the efficiency of the enhanced security of electronic payment phase for SET protocol (E-SET) using Ph-Spi calculus.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133389483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The magic of internet protocol 互联网协议的魔力
Pub Date : 2017-02-08 DOI: 10.14419/JACST.V6I1.6714
K. Batiha
As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are insufficient to meet this new necessity. A fresh out of the box new Protocol is expected to satisfy the developing interest. IPv6 is the best response to the above issues. We should have an early on study on IPv6 convention. IPv6 convention offers verity of advantages that incorporates a more extensive location region and upgraded choices and changes that are not beforehand be found in the IPv4. IPv6 in contrast with IPv4 have a wide address range, simple documentations for representation of a location, enhanced administrations and alternatives, upgraded header, propelled highlights, new choices and bolster, auto setup highlight, new convention bolster, Network Security, Virus and Worms Security, Support for different Operating frameworks and stage including Microsoft windows, Linux and MAC.
随着网络和内部网的不断发展,如何适应更多的用户和设备的问题也随之出现。随后,必须要求一个位置范围,以满足匆忙的要求。遗憾的是,IPv4地址区域和备选方案不足以满足这种新的需求。一个全新的新议定书有望满足发展中的兴趣。IPv6是对上述问题的最佳回应。我们应该尽早对IPv6协议进行研究。IPv6协议提供了实实在在的优势,包括更广泛的位置区域和升级的选择和变化,而这些在IPv4中是没有的。与IPv4相比,IPv6具有广泛的地址范围,表示位置的简单文档,增强的管理和替代方案,升级的标头,推进的亮点,新的选择和支持,自动设置亮点,新的约定支持,网络安全,病毒和蠕虫安全,支持不同的操作框架和阶段,包括微软windows, Linux和MAC。
{"title":"The magic of internet protocol","authors":"K. Batiha","doi":"10.14419/JACST.V6I1.6714","DOIUrl":"https://doi.org/10.14419/JACST.V6I1.6714","url":null,"abstract":"As the developing use of web and intranet keep on expanding colossally, the issue to suit more clients and gadgets has been risen. Subsequently, a location range must be required to oblige the hurry. Sadly, IPv4 address region and alternatives are insufficient to meet this new necessity. A fresh out of the box new Protocol is expected to satisfy the developing interest. IPv6 is the best response to the above issues. We should have an early on study on IPv6 convention. IPv6 convention offers verity of advantages that incorporates a more extensive location region and upgraded choices and changes that are not beforehand be found in the IPv4. IPv6 in contrast with IPv4 have a wide address range, simple documentations for representation of a location, enhanced administrations and alternatives, upgraded header, propelled highlights, new choices and bolster, auto setup highlight, new convention bolster, Network Security, Virus and Worms Security, Support for different Operating frameworks and stage including Microsoft windows, Linux and MAC.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127187686","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effect of subcooling and superheating on performance of a cascade refrigeration system with considering thermo- economic analysis and multi-objective optimization 考虑热经济分析和多目标优化的过冷和过热对叶栅制冷系统性能的影响
Pub Date : 2016-07-19 DOI: 10.14419/JACST.V5I2.6217
M. Keshtkar
In present work, effect of degrees of subcooling and superheating based on thermoeconomic optimization is investigated in two stage-cascade refrigeration system (TS-CRS). At the first step, by using R717 and R744 as refrigerants, a thermoeconomic analysis is applied to TS-CRS. Based on results of the first section and using the genetic algorithm (GA) optimizer implemented in MATLAB, the optimum operative conditions of a specific TS-CRS is determined. Finally, based on the Pareto frontier obtained from the GA optimization, a decision-making strategy is then used to determine a final solution by TOPSIS method. Two single-objective optimization strategies (SOS), i.e. exergetic optimization and cost optimization, are applied on TS-CRS. The aim of the first strategy is to maximize the exergetic efficiency and the aim of the second strategy is minimizing the total annual cost of the system. The case study results show that, compared to the base design, the use of SOS for maximizing of exergetic efficiency can be increases the exergetic efficiency 94.5%. In addition, the use of the second SOS can decrease the total system cost by 11%. Using MOS compared to base design, exergetic efficiency and the total system cost can be increase by 99.1% and 28.6% respectively.
本文研究了基于热经济优化的两级复叠制冷系统过冷度和过热度对系统性能的影响。首先,采用R717和R744作为制冷剂,对TS-CRS进行热经济分析。基于第一部分的结果,利用MATLAB实现的遗传算法优化器,确定了特定TS-CRS的最佳工作条件。最后,基于遗传算法优化得到的Pareto边界,采用TOPSIS方法确定决策策略的最终解。在TS-CRS中应用了两种单目标优化策略,即耗能优化和成本优化。第一个策略的目标是最大限度地提高能源效率,第二个策略的目标是最大限度地减少系统的年度总成本。实例研究结果表明,与基础设计相比,采用SOS系统实现用能效率最大化可使用能效率提高94.5%。此外,第二SOS的使用可以使系统总成本降低11%。与基本设计相比,MOS的火用效率和系统总成本分别提高了99.1%和28.6%。
{"title":"Effect of subcooling and superheating on performance of a cascade refrigeration system with considering thermo- economic analysis and multi-objective optimization","authors":"M. Keshtkar","doi":"10.14419/JACST.V5I2.6217","DOIUrl":"https://doi.org/10.14419/JACST.V5I2.6217","url":null,"abstract":"In present work, effect of degrees of subcooling and superheating based on thermoeconomic optimization is investigated in two stage-cascade refrigeration system (TS-CRS). At the first step, by using R717 and R744 as refrigerants, a thermoeconomic analysis is applied to TS-CRS. Based on results of the first section and using the genetic algorithm (GA) optimizer implemented in MATLAB, the optimum operative conditions of a specific TS-CRS is determined. Finally, based on the Pareto frontier obtained from the GA optimization, a decision-making strategy is then used to determine a final solution by TOPSIS method. Two single-objective optimization strategies (SOS), i.e. exergetic optimization and cost optimization, are applied on TS-CRS. The aim of the first strategy is to maximize the exergetic efficiency and the aim of the second strategy is minimizing the total annual cost of the system. The case study results show that, compared to the base design, the use of SOS for maximizing of exergetic efficiency can be increases the exergetic efficiency 94.5%. In addition, the use of the second SOS can decrease the total system cost by 11%. Using MOS compared to base design, exergetic efficiency and the total system cost can be increase by 99.1% and 28.6% respectively.","PeriodicalId":445404,"journal":{"name":"Journal of Advanced Computer Science and Technology","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128096518","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
期刊
Journal of Advanced Computer Science and Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1