The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accide...The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.展开更多
In situations when the precise position of a machine is unknown,localization becomes crucial.This research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine ...In situations when the precise position of a machine is unknown,localization becomes crucial.This research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-based technique.In order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology,this study proposed an optimized machine learning(ML)based algorithm.Received signal strength indicator(RSSI)data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout building.The noise factor is also taken into account,and the signal-to-noise ratio(SNR)value is recorded for every RSSI measurement.This study concludes the examination of reference point accuracy with the modified KNN method(MKNN).MKNN was created to more precisely anticipate the position of the reference point.The findings showed that MKNN outperformed other algorithms in terms of accuracy and complexity.展开更多
Software-defined networking(SDN)plays a critical role in transforming networking from traditional to intelligent networking.The increasing demand for services from cloud users has increased the load on the network.An ...Software-defined networking(SDN)plays a critical role in transforming networking from traditional to intelligent networking.The increasing demand for services from cloud users has increased the load on the network.An efficient system must handle various loads and increasing needs representing the relationships and dependence of businesses on automated measurement systems and guarantee the quality of service(QoS).Themultiple paths from source to destination give a scope to select an optimal path by maintaining an equilibrium of load using some best algorithms.Moreover,the requests need to be transferred to reliable network elements.To address SDN’s current and future challenges,there is a need to know how artificial intelligence(AI)optimization techniques can efficiently balance the load.This study aims to explore two artificial intelligence optimization techniques,namely Ant Colony Optimization(ACO)and Particle Swarm Optimization(PSO),used for load balancing in SDN.Further,we identified that a modification to the existing optimization technique could improve the performance by using a reliable link and node to form the path to reach the target node and improve load balancing.Finally,we propose a conceptual framework for SDN futurology by evaluating node and link reliability,which can balance the load efficiently and improve QoS in SDN.展开更多
Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, en...Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption.展开更多
This paper discusses on the detection of outliers by hybridizing Rough_Outlier Algorithm with Negative Association Rules. An optimization algorithm named Binary Particle Swarm Optimization is used to improve the compu...This paper discusses on the detection of outliers by hybridizing Rough_Outlier Algorithm with Negative Association Rules. An optimization algorithm named Binary Particle Swarm Optimization is used to improve the computation of Non_Reduct in order to detect outliers.By using Binary PSO algorithm, the rules generated from Rough_Outliers algorithm is optimized, giving significant outliers object detected. The detection ofoutliers process is then enhanced by hybridizing it with Negative Association Rules. Frequent and Infrequent item sets from outlier rules are generated. Results show that the hybrid Rough_Negative algorithm is able to uncover meaningful knowledge of outliers from the frequent and infrequent item sets. These knowledge can then be used by experts in their field of domain for better decision making.展开更多
基金This paper is financed by the European Union-NextGenerationEU,through the National Recovery and Resilience Plan of the Republic of Bulgaria,Project No.BG-RRP-2.004-0001-C01.
文摘The high performance of IoT technology in transportation networks has led to the increasing adoption of Internet of Vehicles(IoV)technology.The functional advantages of IoV include online communication services,accident prevention,cost reduction,and enhanced traffic regularity.Despite these benefits,IoV technology is susceptible to cyber-attacks,which can exploit vulnerabilities in the vehicle network,leading to perturbations,disturbances,non-recognition of traffic signs,accidents,and vehicle immobilization.This paper reviews the state-of-the-art achievements and developments in applying Deep Transfer Learning(DTL)models for Intrusion Detection Systems in the Internet of Vehicles(IDS-IoV)based on anomaly detection.IDS-IoV leverages anomaly detection through machine learning and DTL techniques to mitigate the risks posed by cyber-attacks.These systems can autonomously create specific models based on network data to differentiate between regular traffic and cyber-attacks.Among these techniques,transfer learning models are particularly promising due to their efficacy with tagged data,reduced training time,lower memory usage,and decreased computational complexity.We evaluate DTL models against criteria including the ability to transfer knowledge,detection rate,accurate analysis of complex data,and stability.This review highlights the significant progress made in the field,showcasing how DTL models enhance the performance and reliability of IDS-IoV systems.By examining recent advancements,we provide insights into how DTL can effectively address cyber-attack challenges in IoV environments,ensuring safer and more efficient transportation networks.
基金The research will be funded by the Multimedia University,Department of Information Technology,Persiaran Multimedia,63100,Cyberjaya,Selangor,Malaysia.
文摘In situations when the precise position of a machine is unknown,localization becomes crucial.This research focuses on improving the position prediction accuracy over long-range(LoRa)network using an optimized machine learning-based technique.In order to increase the prediction accuracy of the reference point position on the data collected using the fingerprinting method over LoRa technology,this study proposed an optimized machine learning(ML)based algorithm.Received signal strength indicator(RSSI)data from the sensors at different positions was first gathered via an experiment through the LoRa network in a multistory round layout building.The noise factor is also taken into account,and the signal-to-noise ratio(SNR)value is recorded for every RSSI measurement.This study concludes the examination of reference point accuracy with the modified KNN method(MKNN).MKNN was created to more precisely anticipate the position of the reference point.The findings showed that MKNN outperformed other algorithms in terms of accuracy and complexity.
基金The authors received Excellent Graduate Assistant funding from Universiti Kuala Lumpur for this study.
文摘Software-defined networking(SDN)plays a critical role in transforming networking from traditional to intelligent networking.The increasing demand for services from cloud users has increased the load on the network.An efficient system must handle various loads and increasing needs representing the relationships and dependence of businesses on automated measurement systems and guarantee the quality of service(QoS).Themultiple paths from source to destination give a scope to select an optimal path by maintaining an equilibrium of load using some best algorithms.Moreover,the requests need to be transferred to reliable network elements.To address SDN’s current and future challenges,there is a need to know how artificial intelligence(AI)optimization techniques can efficiently balance the load.This study aims to explore two artificial intelligence optimization techniques,namely Ant Colony Optimization(ACO)and Particle Swarm Optimization(PSO),used for load balancing in SDN.Further,we identified that a modification to the existing optimization technique could improve the performance by using a reliable link and node to form the path to reach the target node and improve load balancing.Finally,we propose a conceptual framework for SDN futurology by evaluating node and link reliability,which can balance the load efficiently and improve QoS in SDN.
文摘Governments are implementing E-Government systems to match the other services due to the rapid worldwide development. Therefore, public sectors interact with many individuals;utilizing this technology lowers costs, enhances services, boosts efficiency, and saves time. The Government of Saudi Arabia has had various obstacles in serving its populace. Poor service delivery and excessive Government operating costs resulted from this manual service delivery. As a result, the Government launched the E-Government systems, which provide services more quickly. As a result, the report covered Saudi Arabia’s efforts to adopt E-Government, its difficulties, and its objectives to advance the 2030 vision. This study examined the adoption of E-Government systems using the Unified Theory of Acceptance and Use of Technology (UTAUT) in Saudi Arabia. A sample size of 200 was estimated using the Convenience approach and received 58% of the response from employees and end-users of the E-Government systems. Data were analyzed using MS-Excel and SMART PLS for testing the hypothesis and applying the Partial Least Square approach. The results of the hypothesis testing reveal several meaningful relationships, including relative benefits, compatibility, security, management support, performance expectations, perceived Usefulness of E-Government, ease of use by reducing uncertainty to E-Government, and IT infrastructure by reducing language on E-Government adoption.
文摘This paper discusses on the detection of outliers by hybridizing Rough_Outlier Algorithm with Negative Association Rules. An optimization algorithm named Binary Particle Swarm Optimization is used to improve the computation of Non_Reduct in order to detect outliers.By using Binary PSO algorithm, the rules generated from Rough_Outliers algorithm is optimized, giving significant outliers object detected. The detection ofoutliers process is then enhanced by hybridizing it with Negative Association Rules. Frequent and Infrequent item sets from outlier rules are generated. Results show that the hybrid Rough_Negative algorithm is able to uncover meaningful knowledge of outliers from the frequent and infrequent item sets. These knowledge can then be used by experts in their field of domain for better decision making.