scispace - formally typeset
Search or ask a question

Showing papers in "International Journal of Electrical and Computer Engineering in 2020"


Journal ArticleDOI
TL;DR: Social influence, perceived enjoyment, self-efficacy, perceived usefulness, and perceived ease of use are the strongest and most important predictors in the intention of and students towards E-learning systems.
Abstract: E-learning has gained recognition and fame in delivering and distributing educational resources, and the same has become possible with the occurrence of Internet and Web technologies. The research seeks to determine the factors that influence students' acceptance of E-learning and to find out the way these factors determine the students' intention to employ E-learning. A theoretical framework was developed based on the technology acceptance model (TAM). To obtain information from the 270 university students who utilized the E-learning system, a questionnaire was formulated. The results revealed that “social influence, perceived enjoyment, self-efficacy, perceived usefulness, and perceived ease of use” are the strongest and most important predictors in the intention of and students towards E-learning systems. The outcomes offer practical implications for practitioners, lawmakers, and developers in effective E-learning systems implementation to improve ongoing interests and activities of university students in a virtual E-learning atmosphere, valuable recommendations for E-learning practices are given by the research findings, and these may turn out to be as guidelines for the efficient design of E-learning systems.

65 citations


Journal ArticleDOI
TL;DR: The design and implementation of an automated smart hydroponics system using internet of things and a bot has been introduced to control the supply chain and for notification purposes to achieve the aim of the entire system implemented.
Abstract: This paper presents a design and implementation of an automated smart hydroponics system using internet of things. The challenges to be solved with this system are the increasing food demand in the world, the need of market of new sustainable method of farming using the Internet of Things. The design was implemented using NodeMcu, Node Red, MQTT and sensors that were chosen during component selection based on required parameters and sending it to the cloud to monitor and be processed. Investigation on previous works done and a review of Internet of Things and Hydroponic systems were done. First the prototype was constructed, programmed and tested, as well as sensors data between two different environments were taken and monitored on cloud-based web page with mobile application. Moreover, a bot has been introduced to control the supply chain and for notification purposes. The system improved its performance and allows it to successfully achieve the aim of the entire system implemented. There are some limitations which can be improved as future work such as including data science with the usage of the artificial intelligence to further improve the crops and get better outcome. Lastly to design end user platform to ease user interaction by using attractive design with no technical configuration involved.

37 citations


Journal ArticleDOI
TL;DR: A novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique to asymmetric one (public key) and increase its security and efficiency and resist the hackers.
Abstract: Data exchange has been rapidly increased recently by increasing the use of mobile networks. Sharing information (text, image, audio and video) over unsecured mobile network channels is liable for attacking and stealing. Encryption techniques are the most suitable methods to protect information from hackers. Hill cipher algorithm is one of symmetric techniques, it has a simple structure and fast computations, but weak security because sender and receiver need to use and share the same private key within a non-secure channel. Therefore, a novel hybrid encryption approach between elliptic curve cryptosystem and hill cipher (ECCHC) is proposed in this paper to convert Hill Cipher from symmetric technique (private key) to asymmetric one (public key) and increase its security and efficiency and resist the hackers. Thus, no need to share the secret key between sender and receiver and both can generate it from the private and public keys. Therefore, the proposed approach presents a new contribution by its ability to encrypt every character in the 128 ASCII table by using its ASCII value direct without needing to assign a numerical value for each character. The main advantages of the proposed method are represented in the computation simplicity, security efficiency and faster computation.

36 citations


Journal ArticleDOI
TL;DR: DL systems begin to crush not solely classical ways, but additionally, human benchmarks in numerous tasks like image classification, action detection, natural language processing, signal process, and linguistic communication process.
Abstract: Artificial intelligence (AI) is additionally serving to a brand new breed of corporations disrupt industries from restorative examination to horticulture. Computers can’t nevertheless replace humans, however, they will work superbly taking care of the everyday tangle of our lives. The era is reconstructing big business and has been on the rise in recent years which has grounded with the success of deep learning (DL). Cyber-security, Auto and health industry are three industries innovating with AI and DL technologies and also Banking, retail, finance, robotics, manufacturing. The healthcare industry is one of the earliest adopters of AI and DL. DL accomplishing exceptional dimensions levels of accurateness to the point where DL algorithms can outperform humans at classifying videos & images. The major drivers that caused the breakthrough of deep neural networks are the provision of giant amounts of coaching information, powerful machine infrastructure, and advances in academia. DL is heavily employed in each academe to review intelligence and within the trade-in building intelligent systems to help humans in varied tasks. Thereby DL systems begin to crush not solely classical ways, but additionally, human benchmarks in numerous tasks like image classification, action detection, natural language processing, signal process, and linguistic communication process.

34 citations


Journal ArticleDOI
TL;DR: Big data analytics for smart energy operations, applications, impact, measurement and control, and challenges are presented in this paper.
Abstract: This paper presents a detailed analysis of big data and machine learning (ML) in the electrical power and energy sector. Big data analytics for smart energy operations, applications, impact, measurement and control, and challenges are presented in this paper. Big data and machine learning approaches need to be applied after analyzing the power system problem carefully. Determining the match between the strengths of big data and machine learning for solving the power system problem is of utmost important. They can be of great help to plan and operate the traditional grid/smart grid (SG). The basics of big data and machine learning are described in detailed manner along with their applications in various fields such as electrical power and energy, health care and life sciences, government, telecommunications, web and digital media, retailers, finance, e-commerce and customer service, etc. Finally, the challenges and opportunities of big data and machine learning are presented in this paper.

33 citations


Journal ArticleDOI
TL;DR: The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.
Abstract: In steganography, secret data are invisible in cover media, such as text, audio, video and image. Hence, attackers have no knowledge of the original message contained in the media or which algorithm is used to embed or extract such message. Image steganography is a branch of steganography in which secret data are hidden in host images. In this study, image steganography using least significant bit and secret map techniques is performed by applying 3D chaotic maps, namely, 3D Chebyshev and 3D logistic maps, to obtain high security. This technique is based on the concept of performing random insertion and selecting a pixel from a host image. The proposed algorithm is comprehensively evaluated on the basis of different criteria, such as correlation coefficient, information entropy, homogeneity, contrast, image, histogram, key sensitivity, hiding capacity, quality index, mean square error (MSE), peak signal-to-noise ratio (PSNR) and image fidelity. Results show that the proposed algorithm satisfies all the aforementioned criteria and is superior to other previous methods. Hence, it is efficient in hiding secret data and preserving the good visual quality of stego images. The proposed algorithm is resistant to different attacks, such as differential and statistical attacks, and yields good results in terms of key sensitivity, hiding capacity, quality index, MSE, PSNR and image fidelity.

32 citations


Journal ArticleDOI
TL;DR: This paper proposes a MFO Algorithm combined with a neighborhood search method for feature selection problems, and shows good performance when compared with the original MFO algorithm and with state-of-the-art approaches.
Abstract: Feature selection methods are used to select a subset of features from data, therefore only the useful information can be mined from the samples to get better accuracy and improves the computational efficiency of the learning model. Moth-flam Optimization (MFO) algorithm is a population-based approach, that simulates the behavior of real moth in nature, one drawback of the MFO algorithm is that the solutions move toward the best solution, and it easily can be stuck in local optima as we investigated in this paper, therefore, we proposed a MFO Algorithm combined with a neighborhood search method for feature selection problems, in order to avoid the MFO algorithm getting trapped in a local optima, and helps in avoiding the premature convergence, the neighborhood search method is applied after a predefined number of unimproved iterations (the number of tries fail to improve the current solution). As a result, the proposed algorithm shows good performance when compared with the original MFO algorithm and with state-of-the-art approaches.

32 citations


Journal ArticleDOI
TL;DR: In this paper, the authors developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system and found that subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility are the vital predictors behind the intention of students for using Elearning systems.
Abstract: The objective of the study is to find out the factors which affect the acceptance of E-learning among students and how the students’ purpose of using E-learning is determined by these factors. The research was based on the Technology Acceptance Model (TAM). The researcher developed a questionnaire to gather data from a sample of 366 university students who actively used the E-learning system. According to the results of the study, subjective norms, perceived usefulness, perceived ease of use, enjoyment, and accessibility” are the vital predictors behind the intention of students for using E-learning systems. This indicates that extended TAM is applicable in the UAE. The results show that policymakers and education developers should take E-learning system seriously since it can be opted not just as a technological solution but also as a learning platform for students belonging to a distant area. The results present practical implications for education developers, policymakers and practitioners in devising useful plans to implement E-learning systems.

30 citations


Journal ArticleDOI
TL;DR: The issues faced in implementing a secure IoV architecture are discussed and the various challenges in implementing security and privacy in IoV are examined by reviewing past papers along with pointing out research gaps and possible future work and putting forth on inferences relating to each paper.
Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.

30 citations


Journal ArticleDOI
TL;DR: This paper proposes a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system and demonstrates that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.
Abstract: The Internet of Things (IoT) is becoming an integral part of our daily life including health, environment, homes, military, etc. The enormous growth of IoT in recent years has attracted hackers to take advantage of their computation and communication capabilities to perform different types of attacks. The major concern is that IoT devices have several vulnerabilities that can be easily exploited to form IoT botnets consisting of millions of IoT devices and posing significant threats to Internet security. In this context, DDoS attacks originating from IoT botnets is a major problem in today’s Internet that requires immediate attention. In this paper, we propose a Security Information and Event Management-based IoT botnet DDoS attack detection and mitigation system. This system detects and blocks DDoS attack traffic from compromised IoT devices by monitoring specific packet types including TCP SYN, ICMP and DNS packets originating from these devices. We discuss a prototype implementation of the proposed system and we demonstrate that SIEM based solutions can be configured to accurately identify and block malicious traffic originating from compromised IoT devices.

28 citations


Journal ArticleDOI
TL;DR: This paper encapsulates based the on performance comparisions on the behavior of MPP under uniform and nonuniform operating conditions and selects the optimum duty cycle for industrially accepted MPPT techniques with their algorithm.
Abstract: Solar energy is a clean renewable energy and it is available around 89,000 TW on the earth surface. To get maximum power from a solar PV system with minimum power transfer loss is one of the main design objectives of an energy transferring network. Power electronic devices perform a very important character for an efficient PV power tracking system control and either incorporates to transfer the generated power to the ac/dc grid or battery storage system. In this case the duty of the power electronics devices used in PV system is to track maximum power point under different operating conditions of environment, so that power tracking efficiency of solar PV system can be improved. This paper encapsulates based the on performance comparisions on the behavior of MPP under uniform and nonuniform operating conditions and selects the optimum duty cycle for industrially accepted MPPT techniques with their algorithm.

Journal ArticleDOI
TL;DR: The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.
Abstract: Obesity is a global epidemic, often considered an impending disaster for the world’s population. Healthcare organizations and professionals repeatedly emphasize the negative impacts on obesity in the development of cardiovascular diseases, hypertension and diabetes. The continuous monitoring of physiological parameters; namely SpO2, blood pressure, body temperature and pulse rate are imperative for obese adult patients. IoT is a dynamic field, used extensively in all fields: agriculture, automobile, manufacturing and retail industry primarily for automated remote real-time monitoring. This paper focuses on the implementation of IoT in the healthcare industry for monitoring and evaluating health conditions of obese adults, along with emphasis on the importance of medical data storage. Furthermore, a device is developed with a novel design and system, which not only allows real-time monitoring but also the storage of medical records for multiple patients simultaneously. The device facilitates measurements of these parameters using an Arduino environment and then transmits the data onto an IoT dashboard using a Wi-fi module for remote monitoring for healthcare professionals. The main aim is to provide a suitable device recommended by doctors for patients suffering from obesity, such that doctors can examine patient’s health trends over a period from the stored data for monitoring any changes that could be a symptom of an underlying unnoticed health condition.

Journal ArticleDOI
TL;DR: Comprehensive survey on different strategies used to predict disease is conferred in this paper and holds the potential to improve decision making and individualize care.
Abstract: Over recent years, multiple disease risk prediction models have been developed. These models use various patient characteristics to estimate the probability of outcomes over a certain period of time and hold the potential to improve decision making and individualize care. Discovering hidden patterns and interactions from medical databases with growing evaluation of the disease prediction model has become crucial. It needs many trials in traditional clinical findings that could complicate disease prediction. Comprehensive survey on different strategies used to predict disease is conferred in this paper. Applying these techniques to healthcare data, has improvement of risk prediction models to find out the patients who would get benefit from disease management programs to reduce hospital readmission and healthcare cost, but the results of these endeavours have been shifted.

Journal ArticleDOI
TL;DR: A systematic review of the latest research in the field of the classification of Arabic texts using neural networks to provide some findings regarding how deep learning models can be used to improve text classification research in Arabic language.
Abstract: Classifying or categorizing texts is the process by which documents are classified into groups by subject, title, author, etc. This paper undertakes a systematic review of the latest research in the field of the classification of Arabic texts. Several machine learning techniques can be used for text classification, but we have focused only on the recent trend of neural network algorithms. In this paper, the concept of classifying texts and classification processes are reviewed. Deep learning techniques in classification and its type are discussed in this paper as well. Neural networks of various types, namely, RNN, CNN, FFNN, and LSTM, are identified as the subject of study. Through systematic study, 12 research papers related to the field of the classification of Arabic texts using neural networks are obtained: for each paper the methodology for each type of neural network and the accuracy ration for each type is determined. The evaluation criteria used in the algorithms of different neural network types and how they play a large role in the highly accurate classification of Arabic texts are discussed. Our results provide some findings regarding how deep learning models can be used to improve text classification research in Arabic language.

Journal ArticleDOI
TL;DR: This research aims to identify fake users' behavior, and proposes supervised machine learning models to classify authentic and fake users, and descriptive statistics results reveal noticeable differences between fake and authentic users.
Abstract: On Instagram, the number of followers is a common success indicator. Hence, followers selling services become a huge part of the market. Influencers become bombarded with fake followers and this causes a business owner to pay more than they should for a brand endorsement. Identifying fake followers becomes important to determine the authenticity of an influencer. This research aims to identify fake users' behavior, and proposes supervised machine learning models to classify authentic and fake users. The dataset contains fake users bought from various sources, and authentic users. There are 17 features used, based on these sources: 6 metadata, 3 media info, 2 engagement, 2 media tags, 4 media similarity. Five machine learning algorithms will be tested. Three different approaches of classification are proposed, i.e. classification to 2-classes and 4-classes, and classification with metadata. Random forest algorithm produces the highest accuracy for the 2-classes (authentic, fake) and 4-classes (authentic, active fake user, inactive fake user, spammer) classification, with accuracy up to 91.76%. The result also shows that the five metadata variables, i.e. number of posts, followers, biography length, following, and link availability are the biggest predictors for the users class. Additionally, descriptive statistics results reveal noticeable differences between fake and authentic users.

Journal ArticleDOI
TL;DR: A distributed solution based on blockchain technology for trusted Health Information Exchange (HIE), in addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations.
Abstract: Current trend in health-care industry is to shift its data on the cloud, to increase availability of Electronic Health Records (EHR) e.g. Patient’s medical history in real time, which will allow sharing of EHR with ease. However, this conventional cloud-based data sharing environment has data security and privacy issues. This paper proposes a distributed solution based on blockchain technology for trusted Health Information Exchange (HIE). In addition to exchange of EHR between patient and doctor, the proposed system is also used in other aspects of healthcare such as improving the insurance claim and making data available for research organizations. Medical data is very sensitive, in both social as well as legal aspects, so permissioned block-chain such as Hyperledger Fabric is used to retain the necessary privacy required in the proposed system. As, this is highly permissioned network where the owner of the network i.e. patient holds all the access rights, so in case of emergency situations the proposed system has a Backup Access System which will allow healthcare professionals to access partial EHR and this backup access is provided by using wearable IOT device.

Journal ArticleDOI
TL;DR: The arm robot manipulator discussed in this study is a pick and place robot to move the harvested tomatoes to a packing system and the best design for this robot is four links with robust flexibility in x, y, and z-coordinates axis.
Abstract: The arm robot manipulator is suitable for substituting humans working in tomato plantation to ensure tomatoes are handled efficiently. The best design for this robot is four links with robust flexibility in x, y, and z-coordinates axis. Inverse kinematics and fuzzy logic controller (FLC) application are for precise and smooth motion. Inverse kinematics designs the most efficient position and motion of the arm robot by adjusting mechanical parameters. The FLC utilizes data input from the sensors to set the right position and motion of the end-effector. The predicted parameters are compared with experimental results to show the effectiveness of the proposed design and method. The position errors (in x, y, and z-axis) are 0.1%, 0.1%, and 0.04%. The rotation errors of each robot links (θ1, θ2, and θ3) are 0%, 0.7% and 0.3%. The FLC provides the suitable angle of the servo motor (θ4) responsible in gripper motion, and the experimental results correspond to FLC’s rules-based as the input to the gripper motion system. This setup is essential to avoid excessive force or miss-placed position that can damage tomatoes. The arm robot manipulator discussed in this study is a pick and place robot to move the harvested tomatoes to a packing system.

Journal ArticleDOI
TL;DR: A new idea for Network Intrusion Detection System (NIDS) based on Long Short-TermMemory (LSTM) to recognize menaces and to obtain a long-term memory on them in order to stop the new attacks that are like the existing ones, and at the sametime, to have a single mean to block intrusions.
Abstract: The security of the network has become a primary concern for organizations. Attackers use different means to disrupt services or steal information, these various attacks push to think of a new way to block them all in one manner. In addition, these intrusions can change and penetrate the devices of security. To solve these issues, we suggest, in this paper, a new idea for Network Intrusion Detection System (NIDS) based on Long Short-TermMemory (LSTM) to recognize menaces and to obtain a long-term memory on them, inorder to stop the new attacks that are like the existing ones, and at the sametime, to have a single mean to block intrusions. According to the results of the experiments of detections that we have carried out, the Accuracy reaches upto 99.98 % and 99.93 % for respectively the classification of two classes and several classes, Also the False Positive Rate (FPR) reaches up to only 0,068 % and 0,023 % for respectively the classification of two classes and several classes, which proves that the proposed model is very effective, it has a great ability to memorize and differentiate between normal traffic and attack traffic and its identification is more accurate than other Machine Learning classifiers.

Journal ArticleDOI
TL;DR: This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.
Abstract: Vehicular ad-hoc network (VANET), identified as a mobile ad hoc network MANETs with several added constraints. Basically, in VANETs, the network is established on the fly based on the availability of vehicles on roads and supporting infrastructures along the roads, such as base stations. Vehicles and road-side infrastructures are required to provide communication facilities, particularly when enough vehicles are not available on the roads for effective communication. VANETs are crucial for providing a wide range of safety and non-safety applications to road users. However, the specific fundamental problem in VANET is the challenge of creating effective communication between two fast-moving vehicles. Therefore, message routing is an issue for many safety and non-safety of VANETs applications. The challenge in designing a robust but reliable message dissemination technique is primarily due to the stringent QoS requirements of the VANETs safety applications. This paper investigated various methods and conducted literature on an idea to develop a model for efficient and reliable message dissemination routing techniques in VANET.

Journal ArticleDOI
TL;DR: Various challenges of smart grid development including interoperability, network communications, demand response, energy storage and distribution grid management are presented.
Abstract: The development smart grids have made the power systems planning and operation more efficient by the application of renewable energy resources, electric vehicles, two-way communication, self-healing, consumer engagement, distribution intelligence, etc. The objective of this paper is to present a detailed comprehensive review of challenges, issues and opportunities for the development of smart grid. Smart grids are transforming the traditional way of meeting the electricity demand and providing the way towards an environmentally friendly, reliable and resilient power grid. This paper presents various challenges of smart grid development including interoperability, network communications, demand response, energy storage and distribution grid management. This paper also reviews various issues associated with the development of smart grid. Local, regional, national and global opportunities for the development of smart grid are also reported in this paper.

Journal ArticleDOI
TL;DR: The challenges and opportunities for the incorporation of IoT and blockchain in power systems, particularly in the distribution level and residential section, are addressed and the role of IoT in smart buildings and smart homes is concisely discussed.
Abstract: Nowadays, unlike depleting fossil fuel resources, the integration of different types of renewable energy, as distributed generation sources, into power systems is accelerated and the technological development in this area is evolving at a frantic pace. Thus, inappropriate use of them will be irrecoverably detrimental. The power industry will reach a turning point in the pervasiveness of these infinite energy sources by three factors. Climate changes due to greenhouse gas accumulation in the atmosphere; increased demand for energy consumption all over the world, especially after the genesis of Bitcoin and base cryptocurrencies; and establishing a comprehensive perspective for the future of renewable energy. The increase in the pervasiveness of renewable energy sources in small-scale brings up new challenges for the power system operators to manage an abundant number of small-scale generation sources, called microsources. The current structure of banking systems is unable to handle such massive and high-frequency transactions. Thus the incorporation of cryptocurrencies is inevitable. In addition, by utilization of IoT-enabled devices, a large body of data will be produced must be securely transferred, stored, processed, and managed in order to boost the observability, controllability, and the level of autonomy of the smart power systems. Then the appropriate controlling measures must be performed through control signals in order to serve the loads in a stable, uninterruptible, reliable, and secure way. The data acquires from IoT devices must be analyzed using artificial intelligence methods such as big data techniques, data mining, machine learning, etc. with a scant delay or almost real-time. These measures are the controversial issues of modern power systems, which are yet a matter of debate. This study delves into the aforementioned challenges and opportunities, and the corresponding solutions for the incorporation of IoT and blockchain in power systems, particularly in the distribution level and residential section, are addressed. In the last section, the role of IoT in smart buildings and smart homes, especially for energy hubs schemes and the management of residential electric vehicle supply equipment is concisely discussed.

Journal ArticleDOI
TL;DR: Researchers in the region can research propagation models performance, energy efficiency of the scheme and MAC layer as well as the channel access challenges for the region by reviewing empirical evidence of the use-cases of LoRa in rural landscapes, metrics and the relevant validation schemes.
Abstract: LoRa is a communication scheme that is part of the low power wide are network (LPWAN) technology using ISM bands. It has seen extensive documentation and use in research and industry due to its long coverage ranges of up-to 20Km or more with less than 14dB transmit power. Moreover, some applications report theoretical battery lives of upto 10years for field deployed modules utilising the scheme in WSN applications. Additionally, the scheme is very resilient to losses from noise, as well bursts of interference through its FEC. Our objective is to systematically review the empirical evidence of the use-cases of LoRa in rural landscapes, metrics and the relevant validation schemes. In addition the research is evaluated based on (i) mathematical function of the scheme (bandwidth use, spreading factor, symbol rate, chip rate and nominal bit rate) (ii) use-cases (iii) test-beds, metrics of evaluation and (iv) validation methods. A systematic literature review of published, refereed primary studies on LoRa applications was conducted. Using articles from 2010-2019. We identified 21 relevant primary studies. These reported a range of different assessments of LoRa. 10 out of 21 reported on novel use cases. As an actionable conclusion, the authors conclude that more work is needed in terms of field testing, as no articles could be found on performance/deployment in Botswana or South Africa despite the existence of LoRa networks in both countries. Thus researchers in the region can research propagation models performance, energy efficiency of the scheme and MAC layer as well as the channel access challenges for the region.

Journal ArticleDOI
TL;DR: This work is proposing a hybrid methodology for phishing detection incorporating feature extraction and classification of the mails using SVM, and alongside the chose features, the PNN characterizes the spam mails from the genuine mails with more exactness and accuracy.
Abstract: Phishing attacks are one of the slanting cyber-attacks that apply socially engineered messages that are imparted to individuals from expert hackers going for tricking clients to uncover their delicate data, the most mainstream correspondence channel to those messages is through clients' emails. Phishing has turned into a generous danger for web clients and a noteworthy reason for money related misfortunes. Therefore, different arrangements have been created to handle this issue. Deceitful emails, also called phishing emails, utilize a scope of impact strategies to convince people to react, for example, promising a fiscal reward or summoning a feeling of criticalness. Regardless of far reaching alerts and intends to instruct clients to distinguish phishing sends, these are as yet a pervasive practice and a worthwhile business. The creators accept that influence, as a style of human correspondence intended to impact others, has a focal job in fruitful advanced tricks. Cyber criminals have ceaselessly propelling their techniques for assault. The current strategies to recognize the presence of such malevolent projects and to keep them from executing are static, dynamic and hybrid analysis. In this work we are proposing a hybrid methodology for phishing detection incorporating feature extraction and classification of the mails using SVM. At last, alongside the chose features, the PNN characterizes the spam mails from the genuine mails with more exactness and accuracy.

Journal ArticleDOI
TL;DR: This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs and uses the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups.
Abstract: The recent advances in communication and mobile technologies made it easier to access and share information for most people worldwide. Among the most powerful information spreading platforms are the Online Social Networks (OSN)s that allow Internet-connected users to share different information such as instant messages, tweets, photos, and videos. Adding to that many governmental and private institutions use the OSNs such as Twitter for official announcements. Consequently, there is a tremendous need to provide the required level of security for OSN users. However, there are many challenges due to the different protocols and variety of mobile apps used to access OSNs. Therefore, traditional security techniques fail to provide the needed security and privacy, and more intelligence is required. Computational intelligence adds high-speed computation, fault tolerance, adaptability, and error resilience when used to ensure security in OSN apps. This research provides a comprehensive related work survey and investigates the application of artificial neural networks for intrusion detection systems and spam filtering for OSNs. In addition, we use the concept of social graphs and weighted cliques in the detection of suspicious behavior of certain online groups and to prevent further planned actions such as cyber/terrorist attacks before they happen.

Journal ArticleDOI
TL;DR: The proposed model is used to test water samples using sensor fusion technique such as TDS and Turbidity, and then uploading data online to ThingSpeak platform to monitor and analyze, and notifies authorities when there are water quality parameters out of a predefined set of normal values.
Abstract: Diseases associated with bad water have largely reported cases annually leading to deaths, therefore the water quality monitoring become necessary to provide safe water. Traditional monitoring includes manual gathering of samples from different points on the distributed site, and then testing in laboratory. This procedure has proven that it is ineffective because it is laborious, lag time and lacks online results to enhance proactive response to water pollution. Emergence of the Internet of Things (IoT) and step towards the smart life poses the successful using of IoT. This paper presents a water quality monitoring using IoT based ThingSpeak platform that provides analytic tools and visualization using MATLAB programming. The proposed model is used to test water samples using sensor fusion technique such as TDS and Turbidity, and then uploading data online to ThingSpeak platform to monitor and analyze. The system notifies authorities when there are water quality parameters out of a predefined set of normal values. A warning will be notified to user by IFTTT protocol.

Journal ArticleDOI
TL;DR: This study shows that 3D model construction can greatly ease the task of the radiologist which enhances the working experience and leads eventually to more accurate and easy diagnosis process.
Abstract: This paper studies the problem of clinical MRI analysis in the field of lumbar intervertebral disk herniation diagnosis. It discusses the possibility of assisting radiologists in reading the patients MRI images by constructing a 3D model for the region of interest using simple computer vision methods. We use axial MRI slices of the lumbar area. The proposed framework works with a very small number of MRI slices and goes through three main stages. Namely, the region of interest extraction and enhancement, inter-slice interpolation, and 3D model construction. We use the Marching Cubes algorithm to construct the 3D model of the the region of interest. The validation of our 3D models is based on a radiologist’s analysis of the models. We tested the proposed 3D model construction on 83 cases and We have a 95% accuracy according to the radiologist evaluation. This study shows that 3D model construction can greatly ease the task of the radiologist which enhances the working experience. This leads eventually to more accurate and easy diagnosis process.

Journal ArticleDOI
TL;DR: This study aims to discuss the exposure of malicious URLs as a binary classification problem using machine learning through an AdaBoost algorithm.
Abstract: Malicious Uniform Resource Locator (URL) is a frequent and severe menace to cybersecurity. Malicious URLs are used to extract unsolicited information and trick inexperienced end users as a sufferer of scams and create losses of billions of money each year. It is crucial to identify and appropriately respond to such URLs. Usually, this discovery is made by the practice and use of blacklists in the cyber world. However, blacklists cannot be exhaustive, and cannot recognize zero-day malicious URLs. So to increase the observation of malicious URL indicators, machine learning procedures should be incorporated. This study aims to discuss the exposure of malicious URLs as a binary classification problem using machine learning through an AdaBoost algorithm.

Journal ArticleDOI
TL;DR: This paper investigated the SVM performance based on value of gamma parameter with used kernels, and studied the impact of gamma value on (SVM) efficiency classifier using different kernels on various datasets descriptions.
Abstract: Currently, the support vector machine (SVM) regarded as one of supervised machine learning algorithm that provides analysis of data for classification and regression. This technique is implemented in many fields such as bioinformatics, face recognition, text and hypertext categorization, generalized predictive control and many other different areas. The performance of SVM is affected by some parameters, which are used in the training phase, and the settings of parameters can have a profound impact on the resulting engine’s implementation. This paper investigated the SVM performance based on value of gamma parameter with used kernels. It studied the impact of gamma value on (SVM) efficiency classifier using different kernels on various datasets descriptions. SVM classifier has been implemented by using Python. The kernel functions that have been investigated are polynomials, radial based function (RBF) and sigmoid. UC irvine machine learning repository is the source of all the used datasets. Generally, the results show uneven effect on the classification accuracy of three kernels on used datasets. The changing of the gamma value taking on consideration the used dataset influences polynomial and sigmoid kernels. While the performance of RBF kernel function is more stable with different values of gamma as its accuracy is slightly changed.

Journal ArticleDOI
TL;DR: The novelty of the paper is that the low-rate DDoS-attacks detection involves not only the network features, inherent to the botnets, but also network traffic self-similarity analysis, which is defined with the use of Hurst coefficient.
Abstract: An article presents the approach for the botnets’ low-rate a DDoS-attacks detection based on the botnet’s behavior in the network. Detection process involves the analysis of the network traffic, generated by the botnets’ low-rate DDoS attack. Proposed technique is the part of botnets detection system – BotGRABBER system. The novelty of the paper is that the low-rate DDoS-attacks detection involves not only the network features, inherent to the botnets, but also network traffic self-similarity analysis, which is defined with the use of Hurst coefficient. Detection process consists of the knowledge formation based on the features that may indicate low-rate DDoS attack performed by a botnet; network monitoring, which analyzes information obtained from the network and making conclusion about possible DDoS attack in the network; and the appliance of the security scenario for the corporate area network’s infrastructure in the situation of low-rate attacks.

Journal ArticleDOI
TL;DR: In this article, the authors proposed a model based on Delone & McLean IS success model by considering the research context and applied the modeling of structural equations via PLS regression to evaluate the model within the context of public sector in the UAE.
Abstract: Governments attempt to use all forms of information technologies including Internet and mobile computing to be able to transform relationships with citizens. However, there is a clear gap between the indicator of the impact of technology innovation output and government’s vision in UAE (United Arab Emirates). In this regard, investigating the relationship between service quality, user satisfaction, and performance impact may help the government to mark its current progress and milestone achievement. This research proposed a model based on Delone & McLean IS success model by considering the research context. The modeling of structural equations via PLS (Partial least squares) regression was applied to evaluate the model within the context of public sector in the UAE. The data was collected from a sample of 147 employees in public organizations using a questionnaire. Results demonstrated that the quality of service has a significant effect on user satisfaction. In addition, quality of service and user satisfaction positively influences the staff performance. The outcome of this research helps to enhance the understanding of the impact of smart government applications.