期刊文献+
共找到19篇文章
< 1 >
每页显示 20 50 100
Sentiment Analysis with Tweets Behaviour in Twitter Streaming API 被引量:1
1
作者 Kuldeep Chouhan Mukesh Yadav +4 位作者 Ranjeet Kumar Rout Kshira Sagar Sahoo nz jhanjhi Mehedi Masud Sultan Aljahdali 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1113-1128,共16页
Twitter is a radiant platform with a quick and effective technique to analyze users’perceptions of activities on social media.Many researchers and industry experts show their attention to Twitter sentiment analysis t... Twitter is a radiant platform with a quick and effective technique to analyze users’perceptions of activities on social media.Many researchers and industry experts show their attention to Twitter sentiment analysis to recognize the stakeholder group.The sentiment analysis needs an advanced level of approaches including adoption to encompass data sentiment analysis and various machine learning tools.An assessment of sentiment analysis in multiple fields that affect their elevations among the people in real-time by using Naive Bayes and Support Vector Machine(SVM).This paper focused on analysing the distinguished sentiment techniques in tweets behaviour datasets for various spheres such as healthcare,behaviour estimation,etc.In addition,the results in this work explore and validate the statistical machine learning classifiers that provide the accuracy percentages attained in terms of positive,negative and neutral tweets.In this work,we obligated Twitter Application Programming Interface(API)account and programmed in python for sentiment analysis approach for the computational measure of user’s perceptions that extract a massive number of tweets and provide market value to the Twitter account proprietor.To distinguish the results in terms of the performance evaluation,an error analysis investigates the features of various stakeholders comprising social media analytics researchers,Natural Language Processing(NLP)developers,engineering managers and experts involved to have a decision-making approach. 展开更多
关键词 Machine learning Naive Bayes natural language processing sentiment analysis social media analytics support vector machine Twitter application programming interface
下载PDF
Improved Video Steganography with Dual Cover Medium,DNA and Complex Frames 被引量:1
2
作者 Asma Sajjad Humaira Ashraf +3 位作者 nz jhanjhi Mamoona Humayun Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3881-3898,共18页
The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive... The most valuable resource on the planet is no longer oil,but data.The transmission of this data securely over the internet is another challenge that comes with its ever-increasing value.In order to transmit sensitive information securely,researchers are combining robust cryptography and steganographic approaches.The objective of this research is to introduce a more secure method of video steganography by using Deoxyribonucleic acid(DNA)for embedding encrypted data and an intelligent frame selection algorithm to improve video imperceptibility.In the previous approach,DNA was used only for frame selection.If this DNA is compromised,then our frames with the hidden and unencrypted data will be exposed.Moreover the frame selected in this way were random frames,and no consideration was made to the contents of frames.Hiding data in this way introduces visible artifacts in video.In the proposed approach rather than using DNA for frame selection we have created a fakeDNA out of our data and then embedded it in a video file on intelligently selected frames called the complex frames.Using chaotic maps and linear congruential generators,a unique pixel set is selected each time only from the identified complex frames,and encrypted data is embedded in these random locations.Experimental results demonstrate that the proposed technique shows minimum degradation of the stenographic video hence reducing the very first chances of visual surveillance.Further,the selection of complex frames for embedding and creation of a fake DNA as proposed in this research have higher peak signal-to-noise ratio(PSNR)and reduced mean squared error(MSE)values that indicate improved results.The proposed methodology has been implemented in Matlab. 展开更多
关键词 Video steganography data encryption DNA embedding frame selection
下载PDF
A Secure Multi-factor Authentication Protocol for Healthcare Services Using Cloud-based SDN
3
作者 Sugandhi Midha Sahil Verma +4 位作者 Kavita Mohit Mittal nz jhanjhi Mehedi Masud Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2023年第2期3711-3726,共16页
Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured... Cloud-based SDN(Software Defined Network)integration offers new kinds of agility,flexibility,automation,and speed in the network.Enterprises and Cloud providers both leverage the benefits as networks can be configured and optimized based on the application requirement.The integration of cloud and SDN paradigms has played an indispensable role in improving ubiquitous health care services.It has improved the real-time monitoring of patients by medical practitioners.Patients’data get stored at the central server on the cloud from where it is available to medical practitioners in no time.The centralisation of data on the server makes it more vulnerable to malicious attacks and causes a major threat to patients’privacy.In recent days,several schemes have been proposed to ensure the safety of patients’data.But most of the techniques still lack the practical implementation and safety of data.In this paper,a secure multi-factor authentication protocol using a hash function has been proposed.BAN(Body Area Network)logic has been used to formally analyse the proposed scheme and ensure that no unauthenticated user can steal sensitivepatient information.Security Protocol Animator(SPAN)–Automated Validation of Internet Security Protocols and Applications(AVISPA)tool has been used for simulation.The results prove that the proposed scheme ensures secure access to the database in terms of spoofing and identification.Performance comparisons of the proposed scheme with other related historical schemes regarding time complexity,computation cost which accounts to only 423 ms in proposed,and security parameters such as identification and spoofing prove its efficiency. 展开更多
关键词 Multi-factor AUTHENTICATION hash function BAN logic SPANAVISPA
下载PDF
Energy Efficient Unequal Fault Tolerance Clustering Approach
4
作者 Sowjanya Ramisetty Divya Anand +4 位作者 Kavita Sahil Verma nz jhanjhi Mehedi Masud Mohammed Baz 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期1971-1983,共13页
For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but faul... For achieving Energy-Efficiency in wireless sensor networks(WSNs),different schemes have been proposed which focuses only on reducing the energy consumption.A shortest path determines for the Base Station(BS),but fault tolerance and energy balancing gives equal importance for improving the network lifetime.For saving energy in WSNs,clustering is considered as one of the effective methods for Wireless Sensor Networks.Because of the excessive overload,more energy consumed by cluster heads(CHs)in a cluster based WSN to receive and aggregate the information from member sensor nodes and it leads to failure.For increasing the WSNs’lifetime,the CHs selection has played a key role in energy consumption for sensor nodes.An Energy Efficient Unequal Fault Tolerant Clustering Approach(EEUFTC)is proposed for reducing the energy utilization through the intelligent methods like Particle Swarm Optimization(PSO).In this approach,an optimal Master Cluster Head(MCH)-Master data Aggregator(MDA),selection method is proposed which uses the fitness values and they evaluate based on the PSO for two optimal nodes in each cluster to act as Master Data Aggregator(MDA),and Master Cluster Head.The data from the cluster members collected by the chosen MCH exclusively and the MDA is used for collected data reception from MCH transmits to the BS.Thus,the MCH overhead reduces.During the heavy communication of data,overhead controls using the scheduling of Energy-Efficient Time Division Multiple Access(EE-TDMA).To describe the proposed method superiority based on various performance metrics,simulation and results are compared to the existing methods. 展开更多
关键词 ENERGY-EFFICIENCY unequal fault tolerant clustering approach particle swarm optimization master data aggregator energy efficient time division multiple access optimal nodes
下载PDF
Deep Learning Based Sentiment Analysis of COVID-19 Tweets via Resampling and Label Analysis
5
作者 Mamoona Humayun Danish Javed +2 位作者 nz jhanjhi Maram Fahaad Almufareh Saleh Naif Almuayqil 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期575-591,共17页
Twitter has emerged as a platform that produces new data every day through its users which can be utilized for various purposes.People express their unique ideas and views onmultiple topics thus providing vast knowled... Twitter has emerged as a platform that produces new data every day through its users which can be utilized for various purposes.People express their unique ideas and views onmultiple topics thus providing vast knowledge.Sentiment analysis is critical from the corporate and political perspectives as it can impact decision-making.Since the proliferation of COVID-19,it has become an important challenge to detect the sentiment of COVID-19-related tweets so that people’s opinions can be tracked.The purpose of this research is to detect the sentiment of people regarding this problem with limited data as it can be challenging considering the various textual characteristics that must be analyzed.Hence,this research presents a deep learning-based model that utilizes the positives of random minority oversampling combined with class label analysis to achieve the best results for sentiment analysis.This research specifically focuses on utilizing class label analysis to deal with the multiclass problem by combining the class labels with a similar overall sentiment.This can be particularly helpful when dealing with smaller datasets.Furthermore,our proposed model integrates various preprocessing steps with random minority oversampling and various deep learning algorithms including standard deep learning and bi-directional deep learning algorithms.This research explores several algorithms and their impact on sentiment analysis tasks and concludes that bidirectional neural networks do not provide any advantage over standard neural networks as standard Neural Networks provide slightly better results than their bidirectional counterparts.The experimental results validate that our model offers excellent results with a validation accuracy of 92.5%and an F1 measure of 0.92. 展开更多
关键词 Bi-directional deep learning RESAMPLING random minority oversampling sentiment analysis class label analysis
下载PDF
A Pattern Classification Model for Vowel Data Using Fuzzy Nearest Neighbor
6
作者 Monika Khandelwal Ranjeet Kumar Rout +4 位作者 Saiyed Umer Kshira Sagar Sahoo nz jhanjhi Mohammad Shorfuzzaman Mehedi Masud 《Intelligent Automation & Soft Computing》 SCIE 2023年第3期3587-3598,共12页
Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. ... Classification of the patterns is a crucial structure of research and applications. Using fuzzy set theory, classifying the patterns has become of great interest because of its ability to understand the parameters. One of the problemsobserved in the fuzzification of an unknown pattern is that importance is givenonly to the known patterns but not to their features. In contrast, features of thepatterns play an essential role when their respective patterns overlap. In this paper,an optimal fuzzy nearest neighbor model has been introduced in which a fuzzifi-cation process has been carried out for the unknown pattern using k nearest neighbor. With the help of the fuzzification process, the membership matrix has beenformed. In this membership matrix, fuzzification has been carried out of the features of the unknown pattern. Classification results are verified on a completelyllabelled Telugu vowel data set, and the accuracy is compared with the differentmodels and the fuzzy k nearest neighbor algorithm. The proposed model gives84.86% accuracy on 50% training data set and 89.35% accuracy on 80% trainingdata set. The proposed classifier learns well enough with a small amount of training data, resulting in an efficient and faster approach. 展开更多
关键词 Nearest neighbors fuzzy classification patterns recognition reasoning rule membership matrix
下载PDF
Load Balancing Algorithm for Migrating Switches in Software-Dened Vehicular Networks 被引量:4
7
作者 Himanshi Babbar Shalli Rani +3 位作者 Mehedi Masud Sahil Verma Divya Anand nz jhanjhi 《Computers, Materials & Continua》 SCIE EI 2021年第4期1301-1316,共16页
In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered... In Software-Dened Networks(SDN),the divergence of the control interface from the data plane provides a unique platform to develop a programmable and exible network.A single controller,due to heavy load trafc triggered by different intelligent devices can not handle due to it’s restricted capability.To manage this,it is necessary to implement multiple controllers on the control plane to achieve quality network performance and robustness.The ow of data through the multiple controllers also varies,resulting in an unequal distribution of load between different controllers.One major drawback of the multiple controllers is their constant conguration of the mapping of the switch-controller,quickly allowing unequal distribution of load between controllers.To overcome this drawback,Software-Dened Vehicular Networking(SDVN)has evolved as a congurable and scalable network,that has quickly achieved attraction in wireless communications from research groups,businesses,and industries administration.In this paper,we have proposed a load balancing algorithm based on latency for multiple SDN controllers.It acknowledges the evolving characteristics of real-time latency vs.controller loads.By choosing the required latency and resolving multiple overloads simultaneously,our proposed algorithm solves the loadbalancing problems with multiple overloaded controllers in the SDN control plane.In addition to the migration,our algorithm has improved 25%latency as compared to the existing algorithms. 展开更多
关键词 Software-dened networking load balancing multiple controllers ryu controller mininet
下载PDF
Energy Optimised Security against Wormhole Attack in IoT-Based Wireless Sensor Networks 被引量:2
8
作者 Hafsa Shahid Humaira Ashraf +3 位作者 Hafsa Javed Mamoona Humayun nz jhanjhi Mohammed A.AlZain 《Computers, Materials & Continua》 SCIE EI 2021年第8期1967-1981,共15页
An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most o... An IoT-based wireless sensor network(WSN)comprises many small sensors to collect the data and share it with the central repositories.These sensors are battery-driven and resource-restrained devices that consume most of the energy in sensing or collecting the data and transmitting it.During data sharing,security is an important concern in such networks as they are prone to many threats,of which the deadliest is the wormhole attack.These attacks are launched without acquiring the vital information of the network and they highly compromise the communication,security,and performance of the network.In the IoT-based network environment,its mitigation becomes more challenging because of the low resource availability in the sensing devices.We have performed an extensive literature study of the existing techniques against the wormhole attack and categorised them according to their methodology.The analysis of literature has motivated our research.In this paper,we developed the ESWI technique for detecting the wormhole attack while improving the performance and security.This algorithm has been designed to be simple and less complicated to avoid the overheads and the drainage of energy in its operation.The simulation results of our technique show competitive results for the detection rate and packet delivery ratio.It also gives an increased throughput,a decreased end-to-end delay,and a much-reduced consumption of energy. 展开更多
关键词 IOT Internet of Things ENERGY WORMHOLE WSN wireless sensor networks
下载PDF
Role of Fuzzy Approach towards Fault Detection for Distributed Components 被引量:2
9
作者 Yaser Hafeez Sadia Ali +3 位作者 nz jhanjhi Mamoona Humayun Anand Nayyar Mehedi Masud 《Computers, Materials & Continua》 SCIE EI 2021年第5期1979-1996,共18页
Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment.Among other communication,teamwork,and coordinati... Component-based software development is rapidly introducing numerous new paradigms and possibilities to deliver highly customized software in a distributed environment.Among other communication,teamwork,and coordination problems in global software development,the detection of faults is seen as the key challenge.Thus,there is a need to ensure the reliability of component-based applications requirements.Distributed device detection faults applied to tracked components from various sources and failed to keep track of all the large number of components from different locations.In this study,we propose an approach for fault detection from componentbased systems requirements using the fuzzy logic approach and historical information during acceptance testing.This approach identified error-prone components selection for test case extraction and for prioritization of test cases to validate components in acceptance testing.For the evaluation,we used empirical study,and results depicted that the proposed approach significantly outperforms in component selection and acceptance testing.The comparison to the conventional procedures,i.e.,requirement criteria,and communication coverage criteria without irrelevancy and redundancy successfully outperform other procedures.Consequently,the F-measures of the proposed approach define the accurate selection of components,and faults identification increases in components using the proposed approach were higher(i.e.,more than 80 percent)than requirement criteria,and code coverage criteria procedures(i.e.,less than 80 percent),respectively.Similarly,the rate of fault detection in the proposed approach increases,i.e.,92.80 compared to existing methods i.e.,less than 80 percent.The proposed approach will provide a comprehensive guideline and roadmap for practitioners and researchers. 展开更多
关键词 Component-based software SELECTION acceptance testing fault detection
下载PDF
A Monte Carlo Based COVID-19 Detection Framework for Smart Healthcare 被引量:1
10
作者 Tallat Jabeen Ishrat Jabeen +4 位作者 Humaira Ashraf nz jhanjhi Mamoona Humayun Mehedi Masud Sultan Aljahdali 《Computers, Materials & Continua》 SCIE EI 2022年第2期2365-2380,共16页
COVID-19 is a novel coronavirus disease that has been declared as a global pandemic in 2019.It affects the whole world through personto-person communication.This virus spreads by the droplets of coughs and sneezing,wh... COVID-19 is a novel coronavirus disease that has been declared as a global pandemic in 2019.It affects the whole world through personto-person communication.This virus spreads by the droplets of coughs and sneezing,which are quickly falling over the surface.Therefore,anyone can get easily affected by breathing in the vicinity of the COVID-19 patient.Currently,vaccine for the disease is under clinical investigation in different pharmaceutical companies.Until now,multiple medical companies have delivered health monitoring kits.However,a wireless body area network(WBAN)is a healthcare system that consists of nano sensors used to detect the real-time health condition of the patient.The proposed approach delineates is to fill a gap between recent technology trends and healthcare structure.If COVID-19 affected patient is monitored through WBAN sensors and network,a physician or a doctor can guide the patient at the right timewith the correct possible decision.This scenario helps the community to maintain social distancing and avoids an unpleasant environment for hospitalized patients Herein,a Monte Carlo algorithm guided protocol is developed to probe a secured cipher output.Security cipher helps to avoid wireless network issues like packet loss,network attacks,network interference,and routing problems.Monte Carlo based covid-19 detection technique gives 90%better results in terms of time complexity,performance,and efficiency.Results indicate that Monte Carlo based covid-19 detection technique with edge computing idea is robust in terms of time complexity,performance,and efficiency and thus,is advocated as a significant application for lessening hospital expenses. 展开更多
关键词 COVID-19 CORONAVIRUS CRYPTOGRAPHY Monte Carlo algorithm edge computing
下载PDF
TBDDoSA-MD:Trust-Based DDoS Misbehave Detection Approach in Software-defined Vehicular Network(SDVN) 被引量:1
11
作者 Rajendra Prasad Nayak Srinivas Sethi +4 位作者 Sourav Kumar Bhoi Kshira Sagar Sahoo nz jhanjhi Thamer A.Tabbakh Zahrah A.Almusaylim 《Computers, Materials & Continua》 SCIE EI 2021年第12期3513-3529,共17页
Reliable vehicles are essential in vehicular networks for effective communication.Since vehicles in the network are dynamic,even a short span of misbehavior by a vehicle can disrupt the whole network which may lead to... Reliable vehicles are essential in vehicular networks for effective communication.Since vehicles in the network are dynamic,even a short span of misbehavior by a vehicle can disrupt the whole network which may lead to catastrophic consequences.In this paper,a Trust-Based Distributed DoS Misbehave Detection Approach(TBDDoSA-MD)is proposed to secure the Software-Defined Vehicular Network(SDVN).A malicious vehicle in this network performs DDoS misbehavior by attacking other vehicles in its neighborhood.It uses the jamming technique by sending unnecessary signals in the network,as a result,the network performance degrades.Attacked vehicles in that network will no longer meet the service requests from other vehicles.Therefore,in this paper,we proposed an approach to detect the DDoS misbehavior by using the trust values of the vehicles.Trust values are calculated based on direct trust and recommendations(indirect trust).These trust values help to decide whether a vehicle is legitimate or malicious.We simply discard the messages from malicious vehicles whereas the authenticity of the messages from legitimate vehicles is checked further before taking any action based on those messages.The performance of TBDDoSA-MD is evaluated in the Veins hybrid simulator,which uses OMNeT++and Simulation of Urban Mobility(SUMO).We compared the performance of TBDDoSA-MD with the recently proposed Trust-Based Framework(TBF)scheme using the following performance parameters such as detection accuracy,packet delivery ratio,detection time,and energy consumption.Simulation results show that the proposed work has a high detection accuracy of more than 90%while keeping the detection time as low as 30 s. 展开更多
关键词 Software-defined vehicular network TRUST evaluator node denial of service misbehavior
下载PDF
Cyber Security and Privacy Issues in Industrial Internet of Things 被引量:1
12
作者 nz jhanjhi Mamoona Humayun Saleh NAlmuayqil 《Computer Systems Science & Engineering》 SCIE EI 2021年第6期361-380,共20页
The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.Howev... The emergence of industry 4.0 stems from research that has received a great deal of attention in the last few decades.Consequently,there has been a huge paradigm shift in the manufacturing and production sectors.However,this poses a challenge for cybersecurity and highlights the need to address the possible threats targeting(various pillars of)industry 4.0.However,before providing a concrete solution certain aspect need to be researched,for instance,cybersecurity threats and privacy issues in the industry.To fill this gap,this paper discusses potential solutions to cybersecurity targeting this industry and highlights the consequences of possible attacks and countermeasures(in detail).In particular,the focus of the paper is on investigating the possible cyber-attacks targeting 4 layers of IIoT that is one of the key pillars of Industry 4.0.Based on a detailed review of existing literature,in this study,we have identified possible cyber threats,their consequences,and countermeasures.Further,we have provided a comprehensive framework based on an analysis of cybersecurity and privacy challenges.The suggested framework provides for a deeper understanding of the current state of cybersecurity and sets out directions for future research and applications. 展开更多
关键词 Industrial Internet of things(IIoT) CYBERSECURITY industry 4.0 cyber-attacks
下载PDF
Security Threat and Vulnerability Assessment and Measurement in Secure Software Development
13
作者 Mamoona Humayun nz jhanjhi +1 位作者 Maram Fahhad Almufareh Muhammad Ibrahim Khalil 《Computers, Materials & Continua》 SCIE EI 2022年第6期5039-5059,共21页
Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).T... Security is critical to the success of software,particularly in today’s fast-paced,technology-driven environment.It ensures that data,code,and services maintain their CIA(Confidentiality,Integrity,and Availability).This is only possible if security is taken into account at all stages of the SDLC(Software Development Life Cycle).Various approaches to software quality have been developed,such as CMMI(Capabilitymaturitymodel integration).However,there exists no explicit solution for incorporating security into all phases of SDLC.One of the major causes of pervasive vulnerabilities is a failure to prioritize security.Even the most proactive companies use the“patch and penetrate”strategy,inwhich security is accessed once the job is completed.Increased cost,time overrun,not integrating testing and input in SDLC,usage of third-party tools and components,and lack of knowledge are all reasons for not paying attention to the security angle during the SDLC,despite the fact that secure software development is essential for business continuity and survival in today’s ICT world.There is a need to implement best practices in SDLC to address security at all levels.To fill this gap,we have provided a detailed overview of secure software development practices while taking care of project costs and deadlines.We proposed a secure SDLC framework based on the identified practices,which integrates the best security practices in various SDLC phases.A mathematical model is used to validate the proposed framework.A case study and findings show that the proposed system aids in the integration of security best practices into the overall SDLC,resulting in more secure applications. 展开更多
关键词 SECURITY secure software development software development life cycle(SDLC) CONFIDENTIALITY INTEGRITY AVAILABILITY
下载PDF
A Compact Rhombus Shaped Antenna with Extended Stubs for Ultra-Wideband Applications
14
作者 Syed Misbah un Noor Muhammad Amir Khan +3 位作者 Shahid Khan nz jhanjhi Mamoona Humayun Hesham A.Alhumyan 《Computers, Materials & Continua》 SCIE EI 2022年第11期2637-2650,共14页
Ultra-wideband(UWB)is highly preferred for short distance communication.As a result of this significance,this project targets the design of a compact UWB antennas.This paper describes a printed UWB rhombusshaped anten... Ultra-wideband(UWB)is highly preferred for short distance communication.As a result of this significance,this project targets the design of a compact UWB antennas.This paper describes a printed UWB rhombusshaped antenna with a partial ground plane.To achieve wideband response,two stubs and a notch are incorporated at both sides of the rhombus design and ground plane respectively.To excite the antenna,a simple microstrip feed line is employed.The suggested antenna is built on a 1.6 mm thick FR4 substrate.The proposed design is very compact with overall electrical size of 0.18λ×0.25λ(14×18 mm2).The rhombus shaped antenna covers frequency ranging from 3.5 to 11 GHz with 7.5 GHz impedance bandwidth.The proposed design simulated and measured bandwidths are 83.33%and 80%,respectively.Radiation pattern in terms of E-field and H-field are discussed at 4,5.5 and 10 GHz respectively.The proposed design has 65%radiation efficiency and 1.5 dBi peak gain.The proposed design is simulated in CST(Computer Simulation Technology)simulator and the simulated design is fabricated for the measured results.The simulated and measured findings are in close resemblance.The obtained results confirm the application of the proposed design for the ultra-wide band applications. 展开更多
关键词 ULTRA-WIDEBAND impedance bandwidth radiation pattern CST electrical size
下载PDF
A Vicenary Analysis of SARS-CoV-2 Genomes
15
作者 Sk Sarif Hassan Ranjeet Kumar Rout +4 位作者 Kshira Sagar Sahoo nz jhanjhi Saiyed Umer Thamer A.Tabbakh Zahrah A.Almusaylim 《Computers, Materials & Continua》 SCIE EI 2021年第12期3477-3493,共17页
Coronaviruses are responsible for various diseases ranging from the common cold to severe infections like the Middle East syndromes and the severe acute respiratory syndrome.However,a new coronavirus strain known as C... Coronaviruses are responsible for various diseases ranging from the common cold to severe infections like the Middle East syndromes and the severe acute respiratory syndrome.However,a new coronavirus strain known as COVID-19 developed into a pandemic resulting in an ongoing global public health crisis.Therefore,there is a need to understand the genomic transformations that occur within this family of viruses in order to limit disease spread and develop new therapeutic targets.The nucleotide sequences of SARS-CoV-2 are consist of several bases.These bases can be classified into purines and pyrimidines according to their chemical composition.Purines include adenine(A)and guanine(G),while pyrimidines include cytosine(C)and tyrosine(T).There is a need to understand the spatial distribution of these bases on the nucleotide sequence to facilitate the development of antivirals(including neutralizing antibodies)and epitomes necessary for vaccine development.This study aimed to evaluate all the purine and pyrimidine associations within the SARS-CoV-2 genome sequence by measuring mathematical parameters including;Shannon entropy,Hurst exponent,and the nucleotide guanine-cytosine content.The Shannon entropy is used to identify closely associated sequences.Whereas Hurst exponent is used to identifying the auto-correlation of purine-pyrimidine bases even if their organization differs.Different frequency patterns can be used to determine the distribution of all four proteins and the density of each base.The GC-content is used to understand the stability of the DNA.The relevant genome sequences were extracted from the National Center for Biotechnology Information(NCBI)virus database.Furthermore,the phylogenetic properties of the COVID-19 virus were characterized to compare the closeness of the COVID-19 virus with other coronaviruses by evaluating the purine and pyrimidine distribution. 展开更多
关键词 Fractal dimension shannon entropy hurst exponent GCcontent SARS-CoV-2
下载PDF
IoT Wireless Intrusion Detection and Network Traffic Analysis
16
作者 Vasaki Ponnusamy Aun Yichiet +2 位作者 nz jhanjhi Mamoona humayun MaramFahhad Almufareh 《Computer Systems Science & Engineering》 SCIE EI 2022年第3期865-879,共15页
Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router.Almost every Internet of Things(IoT)devices such as smartphones,drones,and cameras use wirel... Enhancement in wireless networks had given users the ability to use the Internet without a physical connection to the router.Almost every Internet of Things(IoT)devices such as smartphones,drones,and cameras use wireless technology(Infrared,Bluetooth,IrDA,IEEE 802.11,etc.)to establish multiple interdevice connections simultaneously.With the flexibility of the wireless network,one can set up numerous ad-hoc networks on-demand,connecting hundreds to thousands of users,increasing productivity and profitability significantly.However,the number of network attacks in wireless networks that exploit such flexibilities in setting and tearing down networks has become very alarming.Perpetrators can launch attacks since there is no first line of defense in an ad hoc network setup besides the standard IEEE802.11 WPA2 authentication.One feasible countermeasure is to deploy intrusion detection systems at the edge of these ad hoc networks(Network-based IDS)or at the node level(Host-based IDS).The challenge here is that there is no readily available benchmark data available for IoT network traffic.Creating this benchmark data is very tedious as IoT can work on multiple platforms and networks,and crafting and labelling such dataset is very labor-intensive.This research aims to study the characteristics of existing datasets available such as KDD-Cup and NSL-KDD,and their suitability for wireless IDS implementation.We hypothesize that network features are parametrically different depending on the types of network and assigning weight dynamically to these features can potentially improve the subsequent threat classifications.This paper analyses packet and flow features for the data packet captured on a wireless network rather than a wired network.Combining domain heuristcs and early classification results,the paper had identified 19 header fields exclusive to wireless network that contain high information gain to be used as ML features in Wireless IDS. 展开更多
关键词 IOT machine learning traffic features IDS KDD-CUP NSL-KDD
下载PDF
Organizational Data Breach:Building Conscious Care Behavior in Incident Response
17
作者 Adlyn Adam Teoh Norjihan Binti Abdul Ghani +3 位作者 Muneer Ahmad nz jhanjhi Mohammed A.Alzain Mehedi Masud 《Computer Systems Science & Engineering》 SCIE EI 2022年第2期505-515,共11页
Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas o... Organizational and end user data breaches are highly implicated by the role of information security conscious care behavior in respective incident responses.This research study draws upon the literature in the areas of information security,incident response,theory of planned behaviour,and protection motivation theory to expand and empirically validate a modified framework of information security conscious care behaviour formation.The applicability of the theoretical framework is shown through a case study labelled as a cyber-attack of unprecedented scale and sophistication in Singapore’s history to-date,the 2018 SingHealth data breach.The single in-depth case study observed information security awareness,policy,experience,attitude,subjective norms,perceived behavioral control,threat appraisal and self-efficacy as emerging prominently in the framework’s applicability in incident handling.The data analysis did not support threat severity relationship with conscious care behaviour.The findings from the above-mentioned observations are presented as possible key drivers in the shaping information security conscious care behaviour in real-world cyber incident management. 展开更多
关键词 End user computing organizational behavior incident response data breach computer emergency response team cyber-attack
下载PDF
An Effective Online Collaborative Training in Developing Listening Comprehension Skills
18
作者 Shakeel Ahmed Munazza Ambreen +3 位作者 Muneer Ahmad Abdulellah A.Alaboudi Roobaea Alroobaea nz jhanjhi 《Computer Systems Science & Engineering》 SCIE EI 2021年第8期131-140,共10页
The COVID-19 outbreak severely affected formal face-to-face classroom teaching and learning.ICT-based online education and training can be a useful measure during the pandemic.In the Pakistani educational context,the ... The COVID-19 outbreak severely affected formal face-to-face classroom teaching and learning.ICT-based online education and training can be a useful measure during the pandemic.In the Pakistani educational context,the use of ICT-based online training is generally sporadic and often unavailable,especially for developing English-language instructors’listening comprehension skills.The major factors affecting availability include insufficient IT resources and infrastructure,a lack of proper online training for speech and listening,instructors with inadequate academic backgrounds,and an unfavorable environment for ICT-based training for listening comprehension.This study evaluated the effectiveness of ICT-based training for developing secondary-level English-language instructors’listening comprehension skills.To this end,collaborative online training was undertaken using random sampling.Specifically,60 private-school instructors in Chakwal District,Pakistan,were randomly selected to receive online-listening training sessions using English dialogs.The experimental group achieved significant scores in the posttest analysis.Specifically,there were substantial improvements in the participants’listening skills via online training.Given the unavailability of face-to-face learning during COVID-19,this study recommends using ICT-based online training to enhance listening comprehension skills.Education policymakers should revise curricula based on online teaching methods and modules. 展开更多
关键词 COVID-19 online training remote teaching computers in education listening comprehension English language
下载PDF
Exploring Students Engagement Towards the Learning Management System (LMS) Using Learning Analytics
19
作者 Shahrul Nizam Ismail Suraya Hamid +2 位作者 Muneer Ahmad A.Alaboudi nz jhanjhi 《Computer Systems Science & Engineering》 SCIE EI 2021年第4期73-87,共15页
Learning analytics is a rapidly evolving research discipline that uses theinsights generated from data analysis to support learners as well as optimize boththe learning process and environment. This paper studied stud... Learning analytics is a rapidly evolving research discipline that uses theinsights generated from data analysis to support learners as well as optimize boththe learning process and environment. This paper studied students’ engagementlevel of the Learning Management System (LMS) via a learning analytics tool,student’s approach in managing their studies and possible learning analytic methods to analyze student data. Moreover, extensive systematic literature review(SLR) was employed for the selection, sorting and exclusion of articles fromdiverse renowned sources. The findings show that most of the engagement inLMS are driven by educators. Additionally, we have discussed the factors inLMS, causes of low engagement and ways of increasing engagement factorsvia the Learning Analytics approach. Nevertheless, apart from recognizing theLearning Analytics approach as being a successful method and technique for analyzing the LMS data, this research further highlighted the possibility of mergingthe learning analytics technique with the LMS engagement in every institution asbeing a direction for future research. 展开更多
关键词 Learning analytics student engagement learning management system systematic literature review
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部