期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Secure and Efficient Signature Scheme for IoT in Healthcare 被引量:1
1
作者 Latika Kakkar Deepali Gupta +5 位作者 Sarvesh Tanwar Sapna Saxena khalid alsubhi Divya Anand Irene Delgado Noya Nitin Goyal 《Computers, Materials & Continua》 SCIE EI 2022年第12期6151-6168,共18页
To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing la... To provide faster access to the treatment of patients,healthcare system can be integrated with Internet of Things to provide prior and timely health services to the patient.There is a huge limitation in the sensing layer as the IoT devices here have low computational power,limited storage and less battery life.So,this huge amount of data needs to be stored on the cloud.The information and the data sensed by these devices is made accessible on the internet from where medical staff,doctors,relatives and family members can access this information.This helps in improving the treatment as well as getting faster medical assistance,tracking of routine activities and health focus of elderly people on frequent basis.However,the data transmission from IoT devices to the cloud faces many security challenges and is vulnerable to different security and privacy threats during the transmission path.The purpose of this research is to design a Certificateless Secured Signature Scheme that will provide a magnificent amount of security during the transmission of data.Certificateless signature,that removes the intricate certificate management and key escrow problem,is one of the practical methods to provide data integrity and identity authentication for the IoT.Experimental result shows that the proposed scheme performs better than the existing certificateless signature schemes in terms of computational cost,encryption and decryption time.This scheme is the best combination of high security and cost efficiency and is further suitable for the resource constrained IoT environment. 展开更多
关键词 CSSS digital signature ECC IOT security SIGNCRYPTION smart healthcare system
下载PDF
Intelligent Approach for Clustering Mutations’ Nature of COVID-19 Genome
2
作者 Ankur Dumka Parag Verma +5 位作者 Rajesh Singh Anuj Bhardwaj khalid alsubhi Divya Anand Irene Delgado Noya Silvia Aparicio Obregon 《Computers, Materials & Continua》 SCIE EI 2022年第9期4453-4466,共14页
In December 2019,a group of people in Wuhan city of Hubei province of China were found to be affected by an infection called dark etiology pneumonia.The outbreak of this pneumonia infection was declared a deadly disea... In December 2019,a group of people in Wuhan city of Hubei province of China were found to be affected by an infection called dark etiology pneumonia.The outbreak of this pneumonia infection was declared a deadly disease by the China Center for Disease Control and Prevention on January 9,2020,named Novel Coronavirus 2019(nCoV-2019).This nCoV-2019 is now known as COVID-19.There is a big list of infections of this coronavirus which is present in the form of a big family.This virus can cause several diseases that usually develop with a serious problem.According to the World Health Organization(WHO),2019-nCoV has been placed as the modern generation of Severe Acute Respiratory Syndrome(SARS)and Middle East Respiratory Syndrome(MERS)coronaviruses,so COVID-19 can repeatedly change its internal genome structure to extend its existence.Understanding and accurately predicting the mutational properties of the genome structure of COVID-19 can form a good leadership role in preventing and fighting against coronavirus.In this research paper,an analytical approach has been presented which is based on the k-means cluster technique of machine learning to find the clusters over the mutational properties of the COVID-19 viruses’complete genome.This method would be able to act as a promising tool to monitor and track pathogenic infections in their stable and local genetics/hereditary varieties.This paper identifies five main clusters of mutations with k=5 as best in most cases in the coronavirus that could help scientists and researchers develop disease control vaccines for the transformation of coronaviruses. 展开更多
关键词 nCoV-2019 SARS-CoV-2 COVID-19 genome structure ETIOLOGY COVID-19 mutations COVID-19 genomes
下载PDF
Stress Detector Supported Galvanic Skin Response System with IoT and LabVIEW GUI
3
作者 Rajesh Singh Anita Gehlot +5 位作者 Ritika Saxena khalid alsubhi Divya Anand Irene Delgado Noya Shaik Vaseem Akram Sushabhan Choudhury 《Computers, Materials & Continua》 SCIE EI 2023年第1期1217-1233,共17页
Stress is now a serious disease that exists due to changes in working life and food ecosystems around the world.In general,it is difficult for a person to know if they are under stress.According to previous research,t... Stress is now a serious disease that exists due to changes in working life and food ecosystems around the world.In general,it is difficult for a person to know if they are under stress.According to previous research,temperature,heart rate variability(HRV),humidity,and blood pressure are used to assess stress levels with the use of instruments.With the development of sensor technology and wireless connectivity,people around the world are adopting and using smart devices.In this study,a bio signal detection device with Internet of Things(IoT)capability with a galvanic skin reaction(GSR)sensor is proposed and built for real-time stress monitoring.The proposed device is based on an Arduino controller and Bluetooth communication.To evaluate the performance of the system,physical stress is created on 10 different participants with three distinct tasks namely reading,visualizing the timer clock,and watching videos.MATLAB analysis is performed for identifying the three different levels of stress and obtaining the threshold values as if the person GSR voltage i.e.,relaxed for<1.75 volts;Normal:between 1.75 and 1.44 volts and stressed:>1.44 volts.In addition,LabVIEW is used as a data acquisition system,and a Blueterm mobile application is also used to view the sensor reading received from the device through Bluetooth communication. 展开更多
关键词 GSR LABVIEW stress detection MATLAB IOT BLUETOOTH
下载PDF
Real Time Monitoring of Muscle Fatigue with IoT and Wearable Devices
4
作者 Anita Gehlot Rajesh Singh +5 位作者 Sweety Siwach Shaik Vaseem Akram khalid alsubhi Aman Singh Irene Delgado Noya Sushabhan Choudhury 《Computers, Materials & Continua》 SCIE EI 2022年第7期999-1015,共17页
Wearable monitoring devices are in demand in recent times for monitoring daily activities including exercise.Moreover,it is widely utilizing for preventing injuries of athletes during a practice session and in few cas... Wearable monitoring devices are in demand in recent times for monitoring daily activities including exercise.Moreover,it is widely utilizing for preventing injuries of athletes during a practice session and in few cases,it leads to muscle fatigue.At present,emerging technology like the internet of things(IoT)and sensors is empowering to monitor and visualize the physical data from any remote location through internet connectivity.In this study,an IoT-enabled wearable device is proposing for monitoring and identifying the muscle fatigue condition using a surface electromyogram(sEMG)sensor.Normally,the EMG signal is utilized to display muscle activity.Arduino controller,Wi-Fi module,and EMG sensor are utilized in developing the wearable device.The Time-frequency domain spectrum technique is employed for classifying the threemuscle fatigue conditions including meanRMS,mean frequency,etc.A real-time experiment is realized on six different individuals with developed wearable devices and the average RMS value assists to determine the average threshold of recorded data.The threshold level is analyzed by calculating the mean RMS value and concluded three fatigue conditions as>2V:Extensive);1–2V:Moderate,and<1V:relaxed.The warning alarm system was designed in LabVIEW with three color LEDs to indicate the different states of muscle fatigue.Moreover,the device is interfaced with the cloud through the internet provided with a Wi-Fi module embedded in wearable devices.The data available in the cloud server can be utilized for forecasting the frequency of an individual to muscle fatigue. 展开更多
关键词 LabVIEW muscle fatigue SEMG wearable sensor IOT cloud server
下载PDF
BotSward: Centrality Measures for Graph-Based Bot Detection Using Machine Learning
5
作者 Khlood Shinan khalid alsubhi M.Usman Ashraf 《Computers, Materials & Continua》 SCIE EI 2023年第1期693-714,共22页
The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based fea... The number of botnet malware attacks on Internet devices has grown at an equivalent rate to the number of Internet devices that are connected to the Internet.Bot detection using machine learning(ML)with flow-based features has been extensively studied in the literature.Existing flow-based detection methods involve significant computational overhead that does not completely capture network communication patterns that might reveal other features ofmalicious hosts.Recently,Graph-Based Bot Detection methods using ML have gained attention to overcome these limitations,as graphs provide a real representation of network communications.The purpose of this study is to build a botnet malware detection system utilizing centrality measures for graph-based botnet detection and ML.We propose BotSward,a graph-based bot detection system that is based on ML.We apply the efficient centrality measures,which are Closeness Centrality(CC),Degree Centrality(CC),and PageRank(PR),and compare them with others used in the state-of-the-art.The efficiency of the proposed method is verified on the available Czech Technical University 13 dataset(CTU-13).The CTU-13 dataset contains 13 real botnet traffic scenarios that are connected to a command-and-control(C&C)channel and that cause malicious actions such as phishing,distributed denial-of-service(DDoS)attacks,spam attacks,etc.BotSward is robust to zero-day attacks,suitable for large-scale datasets,and is intended to produce better accuracy than state-of-the-art techniques.The proposed BotSward solution achieved 99%accuracy in botnet attack detection with a false positive rate as low as 0.0001%. 展开更多
关键词 Network security botnet detection graph-based features machine learning measure centrality
下载PDF
Local-Tetra-Patterns for Face Recognition Encoded on Spatial Pyramid Matching
6
作者 Khuram Nawaz Khayam Zahid Mehmood +4 位作者 Hassan Nazeer Chaudhry Muhammad Usman Ashraf Usman Tariq Mohammed Nawaf Altouri khalid alsubhi 《Computers, Materials & Continua》 SCIE EI 2022年第3期5039-5058,共20页
Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems... Face recognition is a big challenge in the research field with a lot of problems like misalignment,illumination changes,pose variations,occlusion,and expressions.Providing a single solution to solve all these problems at a time is a challenging task.We have put some effort to provide a solution to solving all these issues by introducing a face recognition model based on local tetra patterns and spatial pyramid matching.The technique is based on a procedure where the input image is passed through an algorithm that extracts local features by using spatial pyramid matching andmax-pooling.Finally,the input image is recognized using a robust kernel representation method using extracted features.The qualitative and quantitative analysis of the proposed method is carried on benchmark image datasets.Experimental results showed that the proposed method performs better in terms of standard performance evaluation parameters as compared to state-of-the-art methods on AR,ORL,LFW,and FERET face recognition datasets. 展开更多
关键词 Face recognition local tetra patterns spatial pyramid matching robust kernel representation max-pooling
下载PDF
Triple Key Security Algorithm Against Single Key Attack on Multiple Rounds
7
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 Syed Ashraf Ali Muhammad Usman Ashraf khalid alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第9期6061-6077,共17页
In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext ot... In cipher algorithms,the encryption and decryption are based on the same key.There are some limitations in cipher algorithms,for example in polyalphabetic substitution cipher the key size must be equal to plaintext otherwise it will be repeated and if the key is known then encryption becomes useless.This paper aims to improve the said limitations by designing of Triple key security algorithm(TKS)in which the key is modified on polyalphabetic substitution cipher to maintain the size of the key and plaintext.Each plaintext character is substituted by an alternative message.The mode of substitution is transformed cyclically which depends on the current position of the modified communication.Three keys are used in the encryption and decryption process on 8 or 16 rounds with the Exclusively-OR(XOR)of the 1st key.This study also identifies a single-key attack on multiple rounds block cipher in mobile communications and applied the proposed technique to prevent the attack.By utilization of the TKS algorithm,the decryption is illustrated,and security is analyzed in detail with mathematical examples. 展开更多
关键词 Encryption DECRYPTION CIPHER symmetric key cryptography single key attack
下载PDF
Ontological Model for Cohesive Smart Health Services Management
8
作者 Muhammad Raza Naqvi Muhammad Waseem Iqbal +3 位作者 Syed Khuram Shahzad M.Usman Ashraf khalid alsubhi Hani Moaiteq Aljahdali 《Computers, Materials & Continua》 SCIE EI 2023年第2期3679-3695,共17页
Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of society.The massive increase in the usage of he... Health care has become an essential social-economic concern for all stakeholders(e.g.,patients,doctors,hospitals etc.),health needs,private care and the elderly class of society.The massive increase in the usage of health care Internet of things(IoT)applications has great technological evolvement in human life.There are various smart health care services like remote patient monitoring,diagnostic,disease-specific remote treatments and telemedicine.These applications are available in a split fashion and provide solutions for variant diseases,medical resources and remote service management.The main objective of this research is to provide a management platform where all these services work as a single unit to facilitate the users.The ontological model of integrated healthcare services is proposed by getting requirements from various existing healthcare services.There were 26 smart health care services and 26 smart health care services to classify the knowledge-based ontological model.The proposed ontological model is derived from different classes,relationships,and constraints to integrate health care services.This model is developed using Protégébased on each interrelated/correlated health care service having different values.Semantic querying SPARQL protocol and RDF query language(SPARQL)were used for knowledge acquisition.The Pellet Reasoner is used to check the validity and relations coherency of the proposed ontology model.Comparative to other smart health care services integration systems,the proposed ontological model provides more cohesiveness. 展开更多
关键词 ONTOLOGY internet of things smart health services integration
下载PDF
Optimization of Interactive Videos Empowered the Experience of Learning Management System
9
作者 Muhammad Akram Muhammad Waseem Iqbal +3 位作者 M.Usman Ashraf Erssa Arif khalid alsubhi Hani Moaiteq Aljahdali 《Computer Systems Science & Engineering》 SCIE EI 2023年第7期1021-1038,共18页
The Learning management system(LMS)is now being used for uploading educational content in both distance and blended setups.LMS platform has two types of users:the educators who upload the content,and the students who ... The Learning management system(LMS)is now being used for uploading educational content in both distance and blended setups.LMS platform has two types of users:the educators who upload the content,and the students who have to access the content.The students,usually rely on text notes or books and video tutorials while their exams are conducted with formal methods.Formal assessments and examination criteria are ineffective with restricted learning space which makes the student tend only to read the educational contents and videos instead of interactive mode.The aim is to design an interactive LMS and examination video-based interface to cater the issues of educators and students.It is designed according to Human-computer interaction(HCI)principles to make the interactive User interface(UI)through User experience(UX).The interactive lectures in the form of annotated videos increase user engagement and improve the self-study context of users involved in LMS.The interface design defines how the design will interact with users and how the interface exchanges information.The findings show that interactive videos for LMS allow the users to have a more personalized learning experience by engaging in the educational content.The result shows a highly personalized learning experience due to the interactive video and quiz within the video. 展开更多
关键词 User interface user experience learning management system linear nonlinear video interactive video visual design
下载PDF
MEACC: an energy-efficient framework for smart devices using cloud computing systems 被引量:1
10
作者 khalid alsubhi Zuhaib IMTIAZ +2 位作者 Ayesha RAANA MUsman ASHRAF Babur HAYAT 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2020年第6期917-930,共14页
Rapidly increasing capacities,decreasing costs,and improvements in computational power,storage,and communication technologies have led to the development of many applications that carry increasingly large amounts of ... Rapidly increasing capacities,decreasing costs,and improvements in computational power,storage,and communication technologies have led to the development of many applications that carry increasingly large amounts of traffic on the global networking infrastructure.Smart devices lead to emerging technologies and play a vital role in rapid evolution.Smart devices have become a primary 24/7 need in today’s information technology world and include a wide range of supporting processing-intensive applications.Extensive use of many applications on smart devices results in increasing complexity of mobile software applications and consumption of resources at a massive level,including smart device battery power,processor,and RAM,and hinders their normal operation.Appropriate resource utilization and energy efficiency are fundamental considerations for smart devices because limited resources are sporadic and make it more difficult for users to complete their tasks.In this study we propose the model of mobile energy augmentation using cloud computing(MEACC),a new framework to address the challenges of massive power consumption and inefficient resource utilization in smart devices.MEACC efficiently filters the applications to be executed on a smart device or offloaded to the cloud.Moreover,MEACC efficiently calculates the total execution cost on both the mobile and cloud sides including communication costs for any application to be offloaded.In addition,resources are monitored before making the decision to offload the application.MEACC is a promising model for load balancing and power consumption reduction in emerging mobile computing environments. 展开更多
关键词 OFFLOADING Smart devices Cloud computing Mobile computing Power consumption
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部