The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. This paper proposes a decentralized access control framework based on smart contracts with three parts: initialization, an access control protocol, and an inspection. Smart contracts are used in the proposed framework to store access control policies safely on the blockchain. The framework also penalizes users for attempting unauthorized access to the IoT resources. The smart contract was developed using Remix and deployed on the Ropsten Ethereum testnet. We analyze the performance of the smart contract-based access policies based on the gas consumption of blockchain transactions. Further, we analyze the system’s security, usability, scalability, and interoperability performance.
{"title":"Smart Contract-Based Access Control Framework for Internet of Things Devices","authors":"Md. Rahat Hasan, Ammar Alazab, Siddhartha Barman Joy, Mohammed Nasir Uddin, Md. Ashraf Uddin, Ansam Khraisat, Iqbal Gondal, Wahida Ferdose Urmi, Md. Alamin Talukder","doi":"10.3390/computers12110240","DOIUrl":"https://doi.org/10.3390/computers12110240","url":null,"abstract":"The Internet of Things (IoT) has recently attracted much interest from researchers due to its diverse IoT applications. However, IoT systems encounter additional security and privacy threats. Developing an efficient IoT system is challenging because of its sophisticated network topology. Effective access control is required to ensure user privacy in the Internet of Things. Traditional access control methods are inappropriate for IoT systems because most conventional access control approaches are designed for centralized systems. This paper proposes a decentralized access control framework based on smart contracts with three parts: initialization, an access control protocol, and an inspection. Smart contracts are used in the proposed framework to store access control policies safely on the blockchain. The framework also penalizes users for attempting unauthorized access to the IoT resources. The smart contract was developed using Remix and deployed on the Ropsten Ethereum testnet. We analyze the performance of the smart contract-based access policies based on the gas consumption of blockchain transactions. Further, we analyze the system’s security, usability, scalability, and interoperability performance.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"1 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-18DOI: 10.3390/computers12110239
Marcos Chacón-Castro, J. Buele, Ana Dulcelina López-Rueda, Janio Jadán-Guerrero
The formation of students is integral to education. Strengthening critical thinking and reasoning are essential for the professionals that today’s world needs. For this reason, the authors of this article applied Pólya’s methodology, an initiative based on observing students’ difficulties when facing mathematical problems. The present study is part of the qualitative and quantitative research paradigm and the action research methodology. In this study, the inquiry process was inductive, the sample is non-probabilistic, and the data interpretation strategy is descriptive. As a case study, six students were enrolled onto a differential equations course at the Universidad Autónoma de Bucaramanga. A didactic process was designed using information and communication technologies (ICTs) in five sequences that address first-order differential equation applications. As a result of the pedagogical intervention, problem-solving skills were strengthened. All this was based on asking the right questions, repeated reading, identifying and defining variables, mathematization, communication, and decomposing the problem into subproblems. This research study seeks to set a precedent in the Latin American region that will be the basis for future studies.
{"title":"Pólya’s Methodology for Strengthening Problem-Solving Skills in Differential Equations: A Case Study in Colombia","authors":"Marcos Chacón-Castro, J. Buele, Ana Dulcelina López-Rueda, Janio Jadán-Guerrero","doi":"10.3390/computers12110239","DOIUrl":"https://doi.org/10.3390/computers12110239","url":null,"abstract":"The formation of students is integral to education. Strengthening critical thinking and reasoning are essential for the professionals that today’s world needs. For this reason, the authors of this article applied Pólya’s methodology, an initiative based on observing students’ difficulties when facing mathematical problems. The present study is part of the qualitative and quantitative research paradigm and the action research methodology. In this study, the inquiry process was inductive, the sample is non-probabilistic, and the data interpretation strategy is descriptive. As a case study, six students were enrolled onto a differential equations course at the Universidad Autónoma de Bucaramanga. A didactic process was designed using information and communication technologies (ICTs) in five sequences that address first-order differential equation applications. As a result of the pedagogical intervention, problem-solving skills were strengthened. All this was based on asking the right questions, repeated reading, identifying and defining variables, mathematization, communication, and decomposing the problem into subproblems. This research study seeks to set a precedent in the Latin American region that will be the basis for future studies.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"164 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139260914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-16DOI: 10.3390/computers12110238
Rose Yemson, Sohag Kabir, D. Thakker, Savas Konur
With the increasing amount of data collected by IoT devices, detecting complex events in real-time has become a challenging task. To overcome this challenge, we propose the utilisation of semantic web technologies to create ontologies that structure background knowledge about the complex event-processing (CEP) framework in a way that machines can easily comprehend. Our ontology focuses on Indoor Air Quality (IAQ) data, asthma patients’ activities and symptoms, and how IAQ can be related to asthma symptoms and daily activities. Our goal is to detect complex events within the stream of events and accurately determine pollution levels and symptoms of asthma attacks based on daily activities. We conducted a thorough testing of our enhanced CEP framework with a real dataset, and the results indicate that it outperforms traditional CEP across various evaluation metrics such as accuracy, precision, recall, and F1-score.
随着物联网设备收集的数据量不断增加,实时检测复杂事件已成为一项具有挑战性的任务。为了克服这一挑战,我们建议利用语义网技术创建本体,以机器可以轻松理解的方式构建复杂事件处理(CEP)框架的背景知识。我们的本体侧重于室内空气质量(IAQ)数据、哮喘患者的活动和症状,以及 IAQ 如何与哮喘症状和日常活动相关联。我们的目标是检测事件流中的复杂事件,并根据日常活动准确判断污染水平和哮喘发作症状。我们利用真实数据集对增强型 CEP 框架进行了全面测试,结果表明该框架在准确率、精确度、召回率和 F1 分数等各种评价指标上都优于传统 CEP。
{"title":"Ontology Development for Detecting Complex Events in Stream Processing: Use Case of Air Quality Monitoring","authors":"Rose Yemson, Sohag Kabir, D. Thakker, Savas Konur","doi":"10.3390/computers12110238","DOIUrl":"https://doi.org/10.3390/computers12110238","url":null,"abstract":"With the increasing amount of data collected by IoT devices, detecting complex events in real-time has become a challenging task. To overcome this challenge, we propose the utilisation of semantic web technologies to create ontologies that structure background knowledge about the complex event-processing (CEP) framework in a way that machines can easily comprehend. Our ontology focuses on Indoor Air Quality (IAQ) data, asthma patients’ activities and symptoms, and how IAQ can be related to asthma symptoms and daily activities. Our goal is to detect complex events within the stream of events and accurately determine pollution levels and symptoms of asthma attacks based on daily activities. We conducted a thorough testing of our enhanced CEP framework with a real dataset, and the results indicate that it outperforms traditional CEP across various evaluation metrics such as accuracy, precision, recall, and F1-score.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"8 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139267412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-16DOI: 10.3390/computers12110237
Bianca Cibu, Camelia Delcea, Adrian Domenteanu, Gabriel Dumitrescu
In this study, we undertake a comprehensive bibliometric analysis of the cybernetics research field. We compile a dataset of 4856 papers from the ISI Web of Science database spanning 1975–2022, employing keywords related to cybernetics. Our findings reveal an annual growth rate of 7.56% in cybernetics research over this period, indicating sustained scholarly interest. By examining the annual progression of scientific production, we have identified three distinct periods characterized by significant disruptions in yearly publication trends. These disruptions have been thoroughly investigated within the paper, utilizing a longitudinal analysis of thematic evolution. We also identify emerging research trends through keyword analysis. Furthermore, we investigate collaborative networks among authors, their institutional affiliations, and global representation to elucidate the dissemination of cybernetics research. Employing n-gram analysis, we uncover diverse applications of cybernetics in fields such as computer science, information science, social sciences, sustainable development, supply chain, knowledge management, system dynamics, and medicine. The study contributes to enhancing the understanding of the evolving cybernetics landscape. Moreover, the conducted analysis underscores the versatile applicability across various academic and practical domains associated with the cybernetics field.
在本研究中,我们对控制论研究领域进行了全面的文献计量分析。我们从 ISI Web of Science 数据库中收集了 1975-2022 年间的 4856 篇论文,并使用了与控制论相关的关键词。我们的研究结果表明,在此期间,控制论研究的年增长率为 7.56%,表明学术界对控制论的兴趣持续不减。通过研究科学成果的年增长率,我们发现有三个不同时期的年出版趋势出现了明显的中断。本文通过对主题演变的纵向分析,对这些中断进行了深入研究。我们还通过关键词分析确定了新出现的研究趋势。此外,我们还调查了作者之间的合作网络、他们的机构隶属关系和全球代表性,以阐明控制论研究的传播情况。通过 n-gram 分析,我们发现了控制论在计算机科学、信息科学、社会科学、可持续发展、供应链、知识管理、系统动力学和医学等领域的各种应用。这项研究有助于加深对不断发展的控制论领域的了解。此外,所进行的分析强调了控制论在与控制论相关的各个学术和实践领域的广泛适用性。
{"title":"Mapping the Evolution of Cybernetics: A Bibliometric Perspective","authors":"Bianca Cibu, Camelia Delcea, Adrian Domenteanu, Gabriel Dumitrescu","doi":"10.3390/computers12110237","DOIUrl":"https://doi.org/10.3390/computers12110237","url":null,"abstract":"In this study, we undertake a comprehensive bibliometric analysis of the cybernetics research field. We compile a dataset of 4856 papers from the ISI Web of Science database spanning 1975–2022, employing keywords related to cybernetics. Our findings reveal an annual growth rate of 7.56% in cybernetics research over this period, indicating sustained scholarly interest. By examining the annual progression of scientific production, we have identified three distinct periods characterized by significant disruptions in yearly publication trends. These disruptions have been thoroughly investigated within the paper, utilizing a longitudinal analysis of thematic evolution. We also identify emerging research trends through keyword analysis. Furthermore, we investigate collaborative networks among authors, their institutional affiliations, and global representation to elucidate the dissemination of cybernetics research. Employing n-gram analysis, we uncover diverse applications of cybernetics in fields such as computer science, information science, social sciences, sustainable development, supply chain, knowledge management, system dynamics, and medicine. The study contributes to enhancing the understanding of the evolving cybernetics landscape. Moreover, the conducted analysis underscores the versatile applicability across various academic and practical domains associated with the cybernetics field.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"6 2","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139269207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-15DOI: 10.3390/computers12110236
Jessica Rodrigues Esteves, Jorge C. S. Cardoso, B. Gonçalves
The growing popularity of immersive virtual reality (iVR) technologies has opened up new possibilities for learning English. In the literature, it is possible to find several studies focused on the design, development, and evaluation of immersive virtual reality applications. However, there are no studies that systematize design recommendations for immersive virtual reality applications for English learning. To fill this gap, we present a systematic review that aims to identify design recommendations for immersive virtual reality English learning applications. We searched the ACM Digital Library, ERIC, IEEE Xplore, Scopus, and Web of Science (1 January 2010 to April 2023) and found that 24 out of 847 articles met the inclusion criteria. We identified 18 categories of design considerations related to design and learning and a design process used to create iVR applications. We also identified existing trends related to universities, publications, devices, human senses, and development platforms. Finally, we addressed study limitations and future directions for designing iVR applications for English learning.
{"title":"Design Recommendations for Immersive Virtual Reality Application for English Learning: A Systematic Review","authors":"Jessica Rodrigues Esteves, Jorge C. S. Cardoso, B. Gonçalves","doi":"10.3390/computers12110236","DOIUrl":"https://doi.org/10.3390/computers12110236","url":null,"abstract":"The growing popularity of immersive virtual reality (iVR) technologies has opened up new possibilities for learning English. In the literature, it is possible to find several studies focused on the design, development, and evaluation of immersive virtual reality applications. However, there are no studies that systematize design recommendations for immersive virtual reality applications for English learning. To fill this gap, we present a systematic review that aims to identify design recommendations for immersive virtual reality English learning applications. We searched the ACM Digital Library, ERIC, IEEE Xplore, Scopus, and Web of Science (1 January 2010 to April 2023) and found that 24 out of 847 articles met the inclusion criteria. We identified 18 categories of design considerations related to design and learning and a design process used to create iVR applications. We also identified existing trends related to universities, publications, devices, human senses, and development platforms. Finally, we addressed study limitations and future directions for designing iVR applications for English learning.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"63 12","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139274948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-15DOI: 10.3390/computers12110235
Khaled Abdulghaffar, N. Elmrabit, Mehdi Yousefi
Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives. This paper presents a novel framework designed to automate the operation of multiple Web Application Vulnerability Scanners (WAVS) within a single platform. The framework generates a combined vulnerabilities report using two algorithms: an automation algorithm and a novel combination algorithm that produces comprehensive lists of detected vulnerabilities. The framework leverages the capabilities of two web vulnerability scanners, Arachni and OWASP ZAP. The study begins with an extensive review of the existing scientific literature, focusing on open-source WAVS and exploring the OWASP 2021 guidelines. Following this, the framework development phase addresses the challenge of varying results obtained from different WAVS. This framework’s core objective is to combine the results of multiple WAVS into a consolidated vulnerability report, ultimately improving detection rates and overall security. The study demonstrates that the combined outcomes produced by the proposed framework exhibit greater accuracy compared to individual scanning results obtained from Arachni and OWASP ZAP. In summary, the study reveals that the Union List outperforms individual scanners, particularly regarding recall and F-measure. Consequently, adopting multiple vulnerability scanners is recommended as an effective strategy to bolster vulnerability detection in web applications.
{"title":"Enhancing Web Application Security through Automated Penetration Testing with Multiple Vulnerability Scanners","authors":"Khaled Abdulghaffar, N. Elmrabit, Mehdi Yousefi","doi":"10.3390/computers12110235","DOIUrl":"https://doi.org/10.3390/computers12110235","url":null,"abstract":"Penetration testers have increasingly adopted multiple penetration testing scanners to ensure the robustness of web applications. However, a notable limitation of many scanning techniques is their susceptibility to producing false positives. This paper presents a novel framework designed to automate the operation of multiple Web Application Vulnerability Scanners (WAVS) within a single platform. The framework generates a combined vulnerabilities report using two algorithms: an automation algorithm and a novel combination algorithm that produces comprehensive lists of detected vulnerabilities. The framework leverages the capabilities of two web vulnerability scanners, Arachni and OWASP ZAP. The study begins with an extensive review of the existing scientific literature, focusing on open-source WAVS and exploring the OWASP 2021 guidelines. Following this, the framework development phase addresses the challenge of varying results obtained from different WAVS. This framework’s core objective is to combine the results of multiple WAVS into a consolidated vulnerability report, ultimately improving detection rates and overall security. The study demonstrates that the combined outcomes produced by the proposed framework exhibit greater accuracy compared to individual scanning results obtained from Arachni and OWASP ZAP. In summary, the study reveals that the Union List outperforms individual scanners, particularly regarding recall and F-measure. Consequently, adopting multiple vulnerability scanners is recommended as an effective strategy to bolster vulnerability detection in web applications.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"IA-19 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139270976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.3390/computers12110234
Miklós Vincze, B. Molnár, Miklós Kozlovszky
Today, the use of digital medicine is becoming more and more common in medicine. With the use of digital medicine, health data can be shared, processed, and visualized using computer algorithms. One of the problems currently facing digital medicine is the rapid transmission of large amounts of data and their appropriate visualization, even in 3D. Advances in technology offer the possibility to use new image processing, networking, and visualization solutions for the evaluation of medical samples. Because of the resolution of the samples, it is not uncommon that it takes a long time for them to be analyzed, processed, and shared. This is no different for 3D visualization. In order to be able to display digitalized medical samples in 3D at high resolution, a computer with computing power that is not necessarily available to doctors and researchers is needed. COVID-19 has shown that everyday work must continue even when there is a physical distance between the participants. Real-time network streaming can provide a solution to this, by creating a 3D environment that can be shared between doctors/researchers in which the sample being examined can be visualized. In order for this 3D environment to be available to everyone, it must also be usable on devices that do not have high computing capacity. Our goal was to design a general-purpose solution that would allow users to visualize large amounts of medical imaging data in 3D, regardless of the computational capacity of the device they are using. With the solution presented in this paper, our goal was to create a 3D environment for physicians and researchers to collaboratively evaluate 3D medical samples in an interdisciplinary way.
{"title":"Real-Time Network Video Data Streaming in Digital Medicine","authors":"Miklós Vincze, B. Molnár, Miklós Kozlovszky","doi":"10.3390/computers12110234","DOIUrl":"https://doi.org/10.3390/computers12110234","url":null,"abstract":"Today, the use of digital medicine is becoming more and more common in medicine. With the use of digital medicine, health data can be shared, processed, and visualized using computer algorithms. One of the problems currently facing digital medicine is the rapid transmission of large amounts of data and their appropriate visualization, even in 3D. Advances in technology offer the possibility to use new image processing, networking, and visualization solutions for the evaluation of medical samples. Because of the resolution of the samples, it is not uncommon that it takes a long time for them to be analyzed, processed, and shared. This is no different for 3D visualization. In order to be able to display digitalized medical samples in 3D at high resolution, a computer with computing power that is not necessarily available to doctors and researchers is needed. COVID-19 has shown that everyday work must continue even when there is a physical distance between the participants. Real-time network streaming can provide a solution to this, by creating a 3D environment that can be shared between doctors/researchers in which the sample being examined can be visualized. In order for this 3D environment to be available to everyone, it must also be usable on devices that do not have high computing capacity. Our goal was to design a general-purpose solution that would allow users to visualize large amounts of medical imaging data in 3D, regardless of the computational capacity of the device they are using. With the solution presented in this paper, our goal was to create a 3D environment for physicians and researchers to collaboratively evaluate 3D medical samples in an interdisciplinary way.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"6 4","pages":""},"PeriodicalIF":2.8,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139276755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.3390/computers12110233
Fayez Gebali, Mohamed K. Elhadad
Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. The multifaceted protocols proposed herein encompass comprehensive security considerations, ranging from authentication and anonymity to the imperative aspects of the proof of presence, freshness, and ephemeral session key exchanges. This paper provides a systematic and comprehensive framework for enhancing security in VANs, which is of paramount importance in the context of modern smart transportation systems. The contributions of this work are multifarious and can be summarized as follows: (1) Presenting an innovative and robust approach to secure key generation based on PUFs, ensuring the dynamic nature of the authentication. (2) Defining trust metrics reliant on PUFs to ascertain the authenticity and integrity of proximate vehicles. (3) Using the proposed framework to enable seamless transitions between different communication protocols, such as the migration from 5G/6G to Wi-Fi, by introducing the concept of multimodal authentication, which accommodates a wide spectrum of vehicle capabilities. Furthermore, upholding privacy through the encryption and concealment of PUF responses safeguards the identity of vehicles during communication.
{"title":"PUFGuard: Vehicle-to-Everything Authentication Protocol for Secure Multihop Mobile Communication","authors":"Fayez Gebali, Mohamed K. Elhadad","doi":"10.3390/computers12110233","DOIUrl":"https://doi.org/10.3390/computers12110233","url":null,"abstract":"Vehicle area networks (VANs) encompass a spectrum of communication modes, including point-to-point visible light communication, 5G/6G cellular wireless communication, and Wi-Fi ad hoc multihop communication. The main focus of this paper is the introduction and application of physically unclonable functions (PUFs) as a pivotal element in secure key generation, authentication processes, and trust metric definition for neighboring vehicles. The multifaceted protocols proposed herein encompass comprehensive security considerations, ranging from authentication and anonymity to the imperative aspects of the proof of presence, freshness, and ephemeral session key exchanges. This paper provides a systematic and comprehensive framework for enhancing security in VANs, which is of paramount importance in the context of modern smart transportation systems. The contributions of this work are multifarious and can be summarized as follows: (1) Presenting an innovative and robust approach to secure key generation based on PUFs, ensuring the dynamic nature of the authentication. (2) Defining trust metrics reliant on PUFs to ascertain the authenticity and integrity of proximate vehicles. (3) Using the proposed framework to enable seamless transitions between different communication protocols, such as the migration from 5G/6G to Wi-Fi, by introducing the concept of multimodal authentication, which accommodates a wide spectrum of vehicle capabilities. Furthermore, upholding privacy through the encryption and concealment of PUF responses safeguards the identity of vehicles during communication.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"28 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134900669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.3390/computers12110231
Deborah Olaniyan, Roseline Oluwaseun Ogundokun, Olorunfemi Paul Bernard, Julius Olaniyan, Rytis Maskeliūnas, Hakeem Babalola Akande
Sarcasm and irony represent intricate linguistic forms in social media communication, demanding nuanced comprehension of context and tone. In this study, we propose an advanced natural language processing methodology utilizing long short-term memory with an attention mechanism (LSTM-AM) to achieve an impressive accuracy of 99.86% in detecting and interpreting sarcasm and irony within social media text. Our approach involves innovating novel deep learning models adept at capturing subtle cues, contextual dependencies, and sentiment shifts inherent in sarcastic or ironic statements. Furthermore, we explore the potential of transfer learning from extensive language models and integrating multimodal information, such as emojis and images, to heighten the precision of sarcasm and irony detection. Rigorous evaluation against benchmark datasets and real-world social media content showcases the efficacy of our proposed models. The outcomes of this research hold paramount significance, offering a substantial advancement in comprehending intricate language nuances in digital communication. These findings carry profound implications for sentiment analysis, opinion mining, and an enhanced understanding of social media dynamics.
{"title":"Utilizing an Attention-Based LSTM Model for Detecting Sarcasm and Irony in Social Media","authors":"Deborah Olaniyan, Roseline Oluwaseun Ogundokun, Olorunfemi Paul Bernard, Julius Olaniyan, Rytis Maskeliūnas, Hakeem Babalola Akande","doi":"10.3390/computers12110231","DOIUrl":"https://doi.org/10.3390/computers12110231","url":null,"abstract":"Sarcasm and irony represent intricate linguistic forms in social media communication, demanding nuanced comprehension of context and tone. In this study, we propose an advanced natural language processing methodology utilizing long short-term memory with an attention mechanism (LSTM-AM) to achieve an impressive accuracy of 99.86% in detecting and interpreting sarcasm and irony within social media text. Our approach involves innovating novel deep learning models adept at capturing subtle cues, contextual dependencies, and sentiment shifts inherent in sarcastic or ironic statements. Furthermore, we explore the potential of transfer learning from extensive language models and integrating multimodal information, such as emojis and images, to heighten the precision of sarcasm and irony detection. Rigorous evaluation against benchmark datasets and real-world social media content showcases the efficacy of our proposed models. The outcomes of this research hold paramount significance, offering a substantial advancement in comprehending intricate language nuances in digital communication. These findings carry profound implications for sentiment analysis, opinion mining, and an enhanced understanding of social media dynamics.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"5 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134953873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-14DOI: 10.3390/computers12110232
Zafer Duzen, Mirela Riveni, Mehmet S. Aktas
The rapid dissemination of misinformation on social networks, particularly during public health crises like the COVID-19 pandemic, has become a significant concern. This study investigates the spread of misinformation on social network data using social network analysis (SNA) metrics, and more generally by using well known network science metrics. Moreover, we propose a process design that utilizes social network data from Twitter, to analyze the involvement of non-trusted accounts in spreading misinformation supported by a proof-of-concept prototype. The proposed prototype includes modules for data collection, data preprocessing, network creation, centrality calculation, community detection, and misinformation spreading analysis. We conducted an experimental study on a COVID-19-related Twitter dataset using the modules. The results demonstrate the effectiveness of our approach and process steps, and provides valuable insight into the application of network science metrics on social network data for analysing various influence-parameters in misinformation spreading.
{"title":"Analyzing the Spread of Misinformation on Social Networks: A Process and Software Architecture for Detection and Analysis","authors":"Zafer Duzen, Mirela Riveni, Mehmet S. Aktas","doi":"10.3390/computers12110232","DOIUrl":"https://doi.org/10.3390/computers12110232","url":null,"abstract":"The rapid dissemination of misinformation on social networks, particularly during public health crises like the COVID-19 pandemic, has become a significant concern. This study investigates the spread of misinformation on social network data using social network analysis (SNA) metrics, and more generally by using well known network science metrics. Moreover, we propose a process design that utilizes social network data from Twitter, to analyze the involvement of non-trusted accounts in spreading misinformation supported by a proof-of-concept prototype. The proposed prototype includes modules for data collection, data preprocessing, network creation, centrality calculation, community detection, and misinformation spreading analysis. We conducted an experimental study on a COVID-19-related Twitter dataset using the modules. The results demonstrate the effectiveness of our approach and process steps, and provides valuable insight into the application of network science metrics on social network data for analysing various influence-parameters in misinformation spreading.","PeriodicalId":46292,"journal":{"name":"Computers","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134900674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}