Alese Boniface Kayode, Alowolodu Olufunso Dayo, A. Uthman
With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.
{"title":"A Review on Distribution Model for Mobile Agent-Based Information Leakage Prevention","authors":"Alese Boniface Kayode, Alowolodu Olufunso Dayo, A. Uthman","doi":"10.4236/CN.2021.132006","DOIUrl":"https://doi.org/10.4236/CN.2021.132006","url":null,"abstract":"With the continuous use of cloud and distributed computing, the threats associated with data and information technology (IT) in such an environment have also increased. Thus, data security and data leakage prevention have become important in a distributed environment. In this aspect, mobile agent-based systems are one of the latest mechanisms to identify and prevent the intrusion and leakage of the data across the network. Thus, to tackle one or more of the several challenges on Mobile Agent-Based Information Leakage Prevention, this paper aim at providing a comprehensive, detailed, and systematic study of the Distribution Model for Mobile Agent-Based Information Leakage Prevention. This paper involves the review of papers selected from the journals which are published in 2009 and 2019. The critical review is presented for the distributed mobile agent-based intrusion detection systems in terms of their design analysis, techniques, and shortcomings. Initially, eighty-five papers were identified, but a paper selection process reduced the number of papers to thirteen important reviews.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"11 1","pages":"68-78"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89808326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Nafisa Islam, W. Ali, Emmanuel S. Kolawole, John H. Fuller, Pamela H. Obiomon, J. Attia, S. Abood
In recent times, renewable energy production from renewable energy sources is an alternative way to fulfill the increased energy demands. However, the increasing energy demand rate places more pressure, leading to the termination of conventional energy resources. However, the cost of power generation from coal-fired plants is higher than the power generation’s price from renewable energy sources. This experiment is focused on cost optimization during power generation through pumped storage power plant and wind power plant. The entire modeling of cost optimization has been conducted in two parts. The mathematical modeling was done using MATLAB simulation while the hydro and wind power plant’s emulation was performed using SCADA (Supervisory control and data acquisition) designer implementation. The experiment was conducted using ranges of generated power from both power sources. The optimum combination of output power and cost from both generators is determined via MATLAB simulation within the assumed generated output power range. Secondly, the hydro-generator and wind generator’s emulation were executed individually through synchronizing the grid to determine each generator’s specification using SCADA designer, which provided the optimum power generation from both generators with the specific speed, aligning with results generated through MATLAB. Finally, the operational power cost (with no losses consideration) from MATLAB was compared with the local energy provider to determine the cost-efficiency. This experiment has provided the operational cost optimization of the hydro-wind combined power system with stable wind power generation using SCADA, which will ultimately assist in operations of large-scale power systems, remotely minimizing multi-area dynamic issues while maximizing the system efficiency.
近年来,利用可再生能源生产可再生能源是满足日益增长的能源需求的另一种方式。然而,不断增长的能源需求率带来了更大的压力,导致常规能源的终结。然而,燃煤电厂发电的成本高于可再生能源发电的价格。本实验主要研究抽水蓄能电站和风力电站在发电过程中的成本优化问题。整个成本优化建模分为两部分。数学建模采用MATLAB仿真,水电厂和风电场仿真采用SCADA (Supervisory control and data acquisition)设计器实现。实验是使用两种电源产生的功率范围进行的。在假设的输出功率范围内,通过MATLAB仿真确定了两种发电机的最佳输出功率和成本组合。其次,利用SCADA设计器通过同步电网确定各发电机的规格,分别对水轮发电机和风力发电机进行仿真,并与MATLAB生成的结果进行比对,给出了水轮发电机和风力发电机的最佳发电量和特定转速。最后,将MATLAB中的运行功率成本(不考虑损耗)与当地能源供应商进行比较,以确定成本效率。本实验利用SCADA技术为风力发电稳定的水风联合发电系统提供运行成本优化,最终辅助大型电力系统运行,远程最小化多区域动态问题,最大化系统效率。
{"title":"Cost Optimization Modeling of Renewable Energy Sources in Smart-Grid Using SCADA","authors":"Nafisa Islam, W. Ali, Emmanuel S. Kolawole, John H. Fuller, Pamela H. Obiomon, J. Attia, S. Abood","doi":"10.4236/CN.2021.132005","DOIUrl":"https://doi.org/10.4236/CN.2021.132005","url":null,"abstract":"In recent times, renewable energy production from renewable energy sources is an alternative way to fulfill the increased energy demands. However, the increasing energy demand rate places more pressure, leading to the termination of conventional energy resources. However, the cost of power generation from coal-fired plants is higher than the power generation’s price from renewable energy sources. This experiment is focused on cost optimization during power generation through pumped storage power plant and wind power plant. The entire modeling of cost optimization has been conducted in two parts. The mathematical modeling was done using MATLAB simulation while the hydro and wind power plant’s emulation was performed using SCADA (Supervisory control and data acquisition) designer implementation. The experiment was conducted using ranges of generated power from both power sources. The optimum combination of output power and cost from both generators is determined via MATLAB simulation within the assumed generated output power range. Secondly, the hydro-generator and wind generator’s emulation were executed individually through synchronizing the grid to determine each generator’s specification using SCADA designer, which provided the optimum power generation from both generators with the specific speed, aligning with results generated through MATLAB. Finally, the operational power cost (with no losses consideration) from MATLAB was compared with the local energy provider to determine the cost-efficiency. This experiment has provided the operational cost optimization of the hydro-wind combined power system with stable wind power generation using SCADA, which will ultimately assist in operations of large-scale power systems, remotely minimizing multi-area dynamic issues while maximizing the system efficiency.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"10 1","pages":"51-67"},"PeriodicalIF":0.0,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85938478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fontaine Rafamantanantsoa, Razafindramonja Clément Aubert, Rabetafika Louis Haja
Currently, the increasing network connectivity is becoming more and more complex and the integration of several services continues to appear. These approaches need a guarantee in terms of throughput, the performance of which they potentially impact. So, the basic aim of this research is to get the best MPLS network performance towards linux and FreeBSD operating systems. This is why in this report, we have worked on MPLS network performance, which will help to identify performance metrics. To evaluate the performance, we used those operating systems implementing the MPLS architecture in order to define the best performing between the two on this domain. For this, we used scapy to measure the response times by varying the size of the packets sent and validate the measurements with the MATLAB Simulink. After all experiments, we realized that FreeBSD operating system is more reliable than linux in MPLS network base.
{"title":"Analysis and Evaluation of MPLS Network Performance","authors":"Fontaine Rafamantanantsoa, Razafindramonja Clément Aubert, Rabetafika Louis Haja","doi":"10.4236/CN.2021.131003","DOIUrl":"https://doi.org/10.4236/CN.2021.131003","url":null,"abstract":"Currently, the increasing network connectivity is becoming more and more complex and the \u0000integration of several services continues to appear. These approaches need a \u0000guarantee in terms of throughput, the performance of which they potentially \u0000impact. So, the basic aim of this research is to get the best MPLS network \u0000performance towards linux and FreeBSD operating systems. This is why in this \u0000report, we have worked on MPLS network performance, which will help to identify \u0000performance metrics. To evaluate the performance, we used those operating \u0000systems implementing the MPLS architecture in order to define the best \u0000performing between the two on this domain. For this, we used scapy to measure \u0000the response times by varying the size of the packets sent and validate the \u0000measurements with the MATLAB Simulink. After all experiments, we realized that \u0000FreeBSD operating system is more reliable than linux in MPLS network base.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"9 1","pages":"25-35"},"PeriodicalIF":0.0,"publicationDate":"2021-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77956697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Healthcare monitoring and analysis of healthcare parameters is a reality to reduce costs and increase access to specialist and experts that holds the future for geriatric care in India. This paper proposes distinct methods towards the implementation of rural elder health information technologies (IT), which includes electronic medical records, clinical decision support, mobile medical applications, and software driven medical devices used in the diagnosis or treatment of disease for the older adult population in the villages of India. The purpose is online patient satisfaction at the microlevel (village panchayat) through methods accessible and affordable by establishing a common standard of operations at the village primary care units giving way to early disease detection and routine screening among the aged population avoiding institutionalization. The rural elder health IT framework is of great interest for all stakeholders in the field, as it benefits the investors and the consumers, adding to the technological infrastructure, thereby opening new avenues of research in health informatics, telemedicine and enhancing the scope of geriatric research, which in turn enhances the health-related quality of life for the rural older adults in the remote villages of the nation.
{"title":"The Elder Health Information Technology Framework for Geriatric Care in Rural India: A Policy Initiative","authors":"Keya Sen, S. Ingman","doi":"10.4236/CN.2021.131002","DOIUrl":"https://doi.org/10.4236/CN.2021.131002","url":null,"abstract":"Healthcare monitoring and analysis of healthcare parameters is a reality to reduce costs and increase access to specialist and experts that holds the future for geriatric care in India. This paper proposes distinct methods towards the implementation of rural elder health information technologies (IT), which includes electronic medical records, clinical decision support, mobile medical applications, and software driven medical devices used in the diagnosis or treatment of disease for the older adult population in the villages of India. The purpose is online patient satisfaction at the microlevel (village panchayat) through methods accessible and affordable by establishing a common standard of operations at the village primary care units giving way to early disease detection and routine screening among the aged population avoiding institutionalization. The rural elder health IT framework is of great interest for all stakeholders in the field, as it benefits the investors and the consumers, adding to the technological infrastructure, thereby opening new avenues of research in health informatics, telemedicine and enhancing the scope of geriatric research, which in turn enhances the health-related quality of life for the rural older adults in the remote villages of the nation.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"78 1","pages":"12-24"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76297249","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Networking is one of the major areas in which technology is running. Networking plays a vital role in communications for the past few decades. Nodes are the important connections in the network. One of the main parameters considered in the node is power. Power is limited for the nodes in MANET, which is used for some operations where the node energy is not exhausted. Power obligations always affect the systems which ultimately affects the connectivity in the network. Mobility and congestion of nodes are also affected by power problems which simultaneously have some effects like link failures, packet losses which lead some problems in QoS performance of the protocol. This research combines BEMRT (Balanced and Energy Efficient Multipath Routing) with Robust Transmission in MANET. This combination will help the network to survive the problems discussed above which depend on the route discovery mechanism FF-AOMDV. The proposed algorithm will increase the connectivity from end to end and also minimizes the errors at all. Neighbor node selection method is considered with efficient energy which generates multiple paths from source to destination. A stable path is found by the node with effective load balancing. The mechanism is simulated and the protocol FF-AOMDV is compared with AOMDV and AOMRLM with con-cerning PDR (packet delivery ratios), routing overhead, delay, energy consumption, network lifetime, and throughput.
{"title":"Enhancing MANET by Balanced and Energy Efficient Multipath Routing with Robust Transmission Mechanism with Using FF-AOMDV","authors":"N. Alotaibi, E. I. Assiri","doi":"10.4236/cn.2021.134010","DOIUrl":"https://doi.org/10.4236/cn.2021.134010","url":null,"abstract":"Networking is one of the major areas in which technology is running. Networking plays a vital role in communications for the past few decades. Nodes are the important connections in the network. One of the main parameters considered in the node is power. Power is limited for the nodes in MANET, which is used for some operations where the node energy is not exhausted. Power obligations always affect the systems which ultimately affects the connectivity in the network. Mobility and congestion of nodes are also affected by power problems which simultaneously have some effects like link failures, packet losses which lead some problems in QoS performance of the protocol. This research combines BEMRT (Balanced and Energy Efficient Multipath Routing) with Robust Transmission in MANET. This combination will help the network to survive the problems discussed above which depend on the route discovery mechanism FF-AOMDV. The proposed algorithm will increase the connectivity from end to end and also minimizes the errors at all. Neighbor node selection method is considered with efficient energy which generates multiple paths from source to destination. A stable path is found by the node with effective load balancing. The mechanism is simulated and the protocol FF-AOMDV is compared with AOMDV and AOMRLM with con-cerning PDR (packet delivery ratios), routing overhead, delay, energy consumption, network lifetime, and throughput.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"40 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75986522","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Remy Maxime Mbala, J. Nlong, Jean Robert Kala Kamdjoug
The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the auto-matic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. Howev-er, as buffer size decreases, the packet delivery decreases proportionally.
{"title":"A Framework for Multi-Hop Ad-Hoc Networking over Wi-Fi Direct with Android Smart Devices","authors":"Remy Maxime Mbala, J. Nlong, Jean Robert Kala Kamdjoug","doi":"10.4236/cn.2021.134011","DOIUrl":"https://doi.org/10.4236/cn.2021.134011","url":null,"abstract":"The wide diffusion of mobile devices that natively support ad hoc communication technologies has led to several protocols for enabling and optimizing Mobile Ad Hoc Networks (MANETs). Nevertheless, the actual utilization of MANETs in real life seems limited due to the lack of protocols for the auto-matic creation and evolution of ad hoc networks. Recently, a novel P2P protocol named Wi-Fi Direct has been proposed and standardized by the Wi-Fi Alliance to facilitate nearby devices’ interconnection. Wi-Fi Direct provides high-performance direct communication among devices, includes different energy management mechanisms, and is now available in most Android mobile devices. However, the current implementation of Wi-Fi Direct on Android has several limitations, making the Wi-Fi Direct network only be a one-hop ad-hoc network. This paper aims to develop a new framework for multi-hop ad hoc networking using Wi-Fi Direct in Android smart devices. The framework includes a connection establishment protocol and a group management protocol. Simulations validate the proposed framework on the OMNeT++ simulator. We analyzed the framework by varying transmission range, number of hops, and buffer size. The results indicate that the framework provides an eventual 100% packet delivery for different transmission ranges and hop count values. The buffer size has enough space for all packets. Howev-er, as buffer size decreases, the packet delivery decreases proportionally.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72523621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this article, a physics aware deep learning model is introduced for multiphase flow problems. The deep learning model is shown to be capable of capturing complex physics phenomena such as saturation front, which is even challenging for numerical solvers due to the instability. We display the preciseness of the solution domain delivered by deep learning models and the low cost of deploying this model for complex physics problems, showing the versatile character of this method and bringing it to new areas. This will require more allocation points and more careful design of the deep learning model architectures and residual neural network can be a potential candidate.
{"title":"Physics-Aware Deep Learning on Multiphase Flow Problems","authors":"Zipeng Lin","doi":"10.4236/cn.2021.131001","DOIUrl":"https://doi.org/10.4236/cn.2021.131001","url":null,"abstract":"In this article, a physics aware deep learning model is introduced for multiphase flow problems. The deep learning model is shown to be capable of capturing complex physics phenomena such as saturation front, which is even challenging for numerical solvers due to the instability. We display the preciseness of the solution domain delivered by deep learning models and the low cost of deploying this model for complex physics problems, showing the versatile character of this method and bringing it to new areas. This will require more allocation points and more careful design of the deep learning model architectures and residual neural network can be a potential candidate.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"3 1","pages":"1-11"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88859157","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fontaine Rafamantanantsoa, Rabetafika Louis Haja, Randrianomenjanahary Lala Ferdinand
In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the security of the entire system and raises many performance issues related to code security. The safety of information systems becomes essential. This is why the performance linked to security codes is of importance essential in the security systems of all companies. Indeed, as contribution, to carry out measurements, it appropriates tools that are the JMH tool (Java Microbenchmark Harness) and the PHP Benchmark script tool which include unsecure java and PHP codes and secured against SQL (Structured Query Language) injection, XSS (Cross Site Scripting) i.e., using prepared requests, stored procedures, validation of input from white lists, reinforcement of minimum privilege, when sending requests from the last ones to MySQL databases and Postgresql. We recover the times of response to his requests. From java codes and PHP (Hypertext Preprocessor) secure, we also retrieve the response time for requests to databases MySQL and PostgresqL data. We then obtain the curves and interpretations comparing performance related to security and non-security of codes. The goal is to analyze and evaluate the performance comparing secure Java and PHP code against unsecure java and PHP code using MySQL and Postgresql databases. In Section 1, we presented the performance of the code Java and PHP. The configuration of the experiments and the experimental results are discussed in Sections 2 and 3, respectively. Use of suitable tool which is the JMH tool and the PHP Benchmark script tool, we have developed in Java 1.8 and PHP 7.4 secure and non-secure codes that send the queries to the MySQL or Postgresql database to carry out the measurements which led to the conclusion that the insecure PHP and Java codes are faster in terms of response time compared to the PHP and Java secure codes as the number of tables linked to the query increases because the blocking times of SQL injection and XSS preventions linked to its secure codes are increasing.
{"title":"Analysis and Evaluation of Performance Related to Java and PHP Security Codes","authors":"Fontaine Rafamantanantsoa, Rabetafika Louis Haja, Randrianomenjanahary Lala Ferdinand","doi":"10.4236/CN.2021.131004","DOIUrl":"https://doi.org/10.4236/CN.2021.131004","url":null,"abstract":"In recent years, Internet exposure of applications continuously engenders new forms threats that can endanger the security of the entire system and raises many performance issues related to code security. The safety of information systems becomes essential. This is why the performance linked to security codes is of importance essential in the security systems of all companies. Indeed, as contribution, to carry out measurements, it appropriates tools that are the JMH tool (Java Microbenchmark Harness) and the PHP Benchmark script tool which include unsecure java and PHP codes and secured against SQL (Structured Query Language) injection, XSS (Cross Site Scripting) i.e., using prepared requests, stored procedures, validation of input from white lists, reinforcement of minimum privilege, when sending requests from the last ones to MySQL databases and Postgresql. We recover the times of response to his requests. From java codes and PHP (Hypertext Preprocessor) secure, we also retrieve the response time for requests to databases MySQL and PostgresqL data. We then obtain the curves and interpretations comparing performance related to security and non-security of codes. The goal is to analyze and evaluate the performance comparing secure Java and PHP code against unsecure java and PHP code using MySQL and Postgresql databases. In Section 1, we presented the performance of the code Java and PHP. The configuration of the experiments and the experimental results are discussed in Sections 2 and 3, respectively. Use of suitable tool which is the JMH tool and the PHP Benchmark script tool, we have developed in Java 1.8 and PHP 7.4 secure and non-secure codes that send the queries to the MySQL or Postgresql database to carry out the measurements which led to the conclusion that the insecure PHP and Java codes are faster in terms of response time compared to the PHP and Java secure codes as the number of tables linked to the query increases because the blocking times of SQL injection and XSS preventions linked to its secure codes are increasing.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"37 1","pages":"36-49"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84487428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Building an automatic seizure onset prediction model based on multi-channel electroencephalography (EEG) signals has been a hot topic in computer science and neuroscience field for a long time. In this research, we collect EEG data from different epilepsy patients and EEG devices and reconstruct and combine the EEG signals using an innovative electric field encephalography (EFEG) method, which establishes a virtual electric field vector, enabling extraction of electric field components and increasing detection accuracy compared to the conventional method. We extract a number of important features from the reconstructed signals and pass them through an ensemble model based on support vector machine (SVM), Random Forest (RF), and deep neural network (DNN) classifiers. By applying this EFEG channel combination method, we can achieve the highest detection accuracy at 87% which is 6% to 17% higher than the conventional channel averaging combination method. Meanwhile, to reduce the potential overfitting problem caused by DNN models on a small dataset and limited training patient, we ensemble the DNN model with two “weaker” classifiers to ensure the best performance in model transferring for different patients. Based on these methods, we can achieve the highest detection accuracy at 82% on a new patient using a different EEG device. Thus, we believe our method has good potential to be applied on different commercial and clinical devices.
{"title":"Transfer-Learning for Automated Seizure Detection Based on Electric Field Encephalography Reconstructed Signal","authors":"Gefei Zhu","doi":"10.4236/cn.2020.124009","DOIUrl":"https://doi.org/10.4236/cn.2020.124009","url":null,"abstract":"Building an automatic seizure onset prediction model based on \u0000multi-channel electroencephalography (EEG) signals has been a hot topic in computer science and \u0000neuroscience field for a long time. In this research, we collect EEG data from \u0000different epilepsy patients and EEG devices and reconstruct and combine the EEG \u0000signals using an innovative electric field encephalography (EFEG) method, which \u0000establishes a virtual electric field vector, enabling extraction of electric \u0000field components and increasing detection accuracy compared to the conventional \u0000method. We extract a number of important features from the reconstructed \u0000signals and pass them through an ensemble model based on support vector machine \u0000(SVM), Random Forest (RF), and deep neural network (DNN) classifiers. By \u0000applying this EFEG channel combination method, we can achieve the highest detection accuracy \u0000at 87% which is 6% to 17% higher than the conventional channel averaging combination method. Meanwhile, to reduce \u0000the potential overfitting problem caused by DNN models on a small dataset and \u0000limited training patient, we ensemble the DNN model with two “weaker” \u0000classifiers to ensure the best performance in model transferring for different patients. Based on \u0000these methods, we can achieve the highest detection accuracy at 82% on a new patient using a different EEG \u0000device. Thus, we believe our method has good potential to be applied on \u0000different commercial and clinical devices.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"5 1","pages":"174-198"},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82422310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
IoT applications are promising for future daily activities; therefore, the number of IoT connected devices is expected to reach billions in the coming few years. However, IoT has different application frameworks. Furthermore, IoT applications require higher security standards. In this work, an IoT application framework is presented with a security embedded structure using the integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The performance analysis of the model is presented. Comparing the model with existing models and different design structures shows that the model presented in this work is promising for a functioning IoT design model with security. The security in the model is a built-in feature in its structure. The model is built on recommended frameworks; therefore, it is ready for integration with other web standards for data sharing, which will help in making IoT applications integrated from different developing parties.
{"title":"A Hybrid IoT Security Model of MQTT and UMA","authors":"Khalid S. Aloufi, Omar H. Alhazmi","doi":"10.4236/cn.2020.124008","DOIUrl":"https://doi.org/10.4236/cn.2020.124008","url":null,"abstract":"IoT applications are promising for future daily activities; therefore, the number \u0000of IoT connected devices is expected to reach billions in the coming few years. \u0000However, IoT has different application frameworks. Furthermore, IoT \u0000applications require higher security standards. In this work, an IoT \u0000application framework is presented with a security embedded structure using the \u0000integration between message queue telemetry transport (MQTT) and user-managed access (UMA). The \u0000performance analysis of the model is presented. Comparing the model with existing \u0000models and different design structures shows that the model presented in this \u0000work is promising for a functioning IoT design model with security. The \u0000security in the model is a built-in feature in its structure. The model is \u0000built on recommended frameworks; therefore, it is ready for integration with \u0000other web standards for data sharing, which will help in making IoT applications integrated from different \u0000developing parties.","PeriodicalId":91826,"journal":{"name":"... IEEE Conference on Communications and Network Security. IEEE Conference on Communications and Network Security","volume":"277 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2020-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75202174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}