The Internet of Thing IoT paradigm has emerged in numerous domains and it has achieved an exponential progress.Nevertheless,alongside this advancement,IoT networks are facing an ever-increasing rate of security risks ...The Internet of Thing IoT paradigm has emerged in numerous domains and it has achieved an exponential progress.Nevertheless,alongside this advancement,IoT networks are facing an ever-increasing rate of security risks because of the continuous and rapid changes in network environments.In order to overcome these security challenges,the fog system has delivered a powerful environment that provides additional resources for a more improved data security.However,because of the emerging of various breaches,several attacks are ceaselessly emerging in IoT and Fog environment.Consequently,the new emerging applications in IoT-Fog environment still require novel,distributed,and intelligent security models,controls,and decisions.In addition,the ever-evolving hacking techniques and methods and the expanded risks surfaces have demonstrated the importance of attacks detection systems.This proves that even advanced solutions face difficulties in discovering and recognizing these small variations of attacks.In fact,to address the above problems,Artificial Intelligence(AI)methods could be applied on the millions of terabytes of collected information to enhance and optimize the processes of IoT and fog systems.In this respect,this research is designed to adopt a new security scheme supported by an advanced machine learning algorithm to ensure an intelligent distributed attacks detection and a monitoring process that detects malicious attacks and updates threats signature databases in IoTFog environments.We evaluated the performance of our distributed approach with the application of certain machine learningmechanisms.The experiments show that the proposed scheme,applied with the Random Forest(RF)is more efficient and provides better accuracy(99.50%),better scalability,and lower false alert rates.In this regard,the distribution character of our method brings about faster detection and better learning.展开更多
With global energy demand predicted to rise as the world population increases, there is a serious challenge to ensure energy security and also to reduce CO2 emissions. Atmo- spheric CO2 levels will reach about 800 ppm...With global energy demand predicted to rise as the world population increases, there is a serious challenge to ensure energy security and also to reduce CO2 emissions. Atmo- spheric CO2 levels will reach about 800 ppm by 2100 resulting in about 4 ℃ rise in the earth surface temperature if no action is taken (CO2 Earth 2017). At the 21st Con- ference of Parties (COP21) to the United Nations Frame- work Convention on Climate Change (UNFCCC) held in Paris, France from 30th November to 12th December 2015, 195 nations historically agreed to "combat climate change and unleash actions and investment towards a low carbon, resilient and sustainable future" with the aim to ensure global temperature rise is kept well below 2℃ (UNFCCC 2015). To achieve this aim, a portfolio of technologies have been proposed, one of which is carbon capture, utilization and storage (CCUS) (Dixon 2016).展开更多
This paper presented a background of the extent of the ICT, IT, and EC-B2B in Jordan. It was mentioned that the development of the ICT in Jordan brings benefits to the enterprises and their TPs. In this paper the EC-B...This paper presented a background of the extent of the ICT, IT, and EC-B2B in Jordan. It was mentioned that the development of the ICT in Jordan brings benefits to the enterprises and their TPs. In this paper the EC-B2B systems’ readiness in Jordan is defined as the degree of preparation of a nation or community to participate in and benefits from ICT development. The government in Jordan has taken forceful measures towards adoption IT and IS applications and Internet awareness. In 2010, it was reported from the DOS in Jordanthat the percentage of individual Internet usage did not exceed 4.7 percent of the population inJordan[1]. This paper highlighted through subsections on the benefits and risks faced EC-B2B system adoption in Jordan. Based on the recent studies and reports in Jordan, the EC-B2B system adoption was mainly adopted by large enterprises in the supply chain rather than by SMEs. The study concluded that the main two barriers of ICT development and adoption inJordanare organizational readiness including lack of new education methods, and lack of information and knowledge.展开更多
This paper reviewed and explored the current extent of the Internet Electronic Data Interchange systems adoption in Jordan particularly in the SME sector. Also the paper presented the benefits of IEDI adoption and sho...This paper reviewed and explored the current extent of the Internet Electronic Data Interchange systems adoption in Jordan particularly in the SME sector. Also the paper presented the benefits of IEDI adoption and showed the main obstacles facing the SME in Jordan to adopt. This paper used the descriptive and theoretical analysis approaches for collecting and analysis the historical and archived data. The literature showed that Jordan, as a developing country, has achieved forward steps in introducing the Internet to the different sectors of life. The adoption of the electronic tools in business became a governmental target in recent years to make it possible for SMEs to be able to continue to achieve success in their business [1]. Most of Jordanian SMEs have little or no competitive pressure to use I-EDI systems, since most suppliers, customers and other competitors do not seem to promote I-EDI systems. The study concluded that SMEs in Jordan could grow and become larger companies, and supporting national economy. Thus it is very important to develop and grow Jordanian SMEs by doing more research.展开更多
The architecture of the Ouargla Ksar has long been recognized as an example of adaptation to harsh climate in the deep desert of AlgeHao Over the last few decades, it has undergone some changes in its initial urban st...The architecture of the Ouargla Ksar has long been recognized as an example of adaptation to harsh climate in the deep desert of AlgeHao Over the last few decades, it has undergone some changes in its initial urban structure, due to accelerated and uncontrolled modern urbanization, that had negative implications and devaluation of its thermal characteristics. This article tries to understand the bioclimatic concept of adaptation of this Ksar and assess to what extent its morphological transformation has impacted its microclimatic conditions. This assessment is made through a comparative study between two different areas: one untransformed and the other transformed. A referential weather station situated in the suburbs was also exploited for consolidation of comparison. The investigation was undertaken using site measurements and observations.展开更多
文摘The Internet of Thing IoT paradigm has emerged in numerous domains and it has achieved an exponential progress.Nevertheless,alongside this advancement,IoT networks are facing an ever-increasing rate of security risks because of the continuous and rapid changes in network environments.In order to overcome these security challenges,the fog system has delivered a powerful environment that provides additional resources for a more improved data security.However,because of the emerging of various breaches,several attacks are ceaselessly emerging in IoT and Fog environment.Consequently,the new emerging applications in IoT-Fog environment still require novel,distributed,and intelligent security models,controls,and decisions.In addition,the ever-evolving hacking techniques and methods and the expanded risks surfaces have demonstrated the importance of attacks detection systems.This proves that even advanced solutions face difficulties in discovering and recognizing these small variations of attacks.In fact,to address the above problems,Artificial Intelligence(AI)methods could be applied on the millions of terabytes of collected information to enhance and optimize the processes of IoT and fog systems.In this respect,this research is designed to adopt a new security scheme supported by an advanced machine learning algorithm to ensure an intelligent distributed attacks detection and a monitoring process that detects malicious attacks and updates threats signature databases in IoTFog environments.We evaluated the performance of our distributed approach with the application of certain machine learningmechanisms.The experiments show that the proposed scheme,applied with the Random Forest(RF)is more efficient and provides better accuracy(99.50%),better scalability,and lower false alert rates.In this regard,the distribution character of our method brings about faster detection and better learning.
文摘With global energy demand predicted to rise as the world population increases, there is a serious challenge to ensure energy security and also to reduce CO2 emissions. Atmo- spheric CO2 levels will reach about 800 ppm by 2100 resulting in about 4 ℃ rise in the earth surface temperature if no action is taken (CO2 Earth 2017). At the 21st Con- ference of Parties (COP21) to the United Nations Frame- work Convention on Climate Change (UNFCCC) held in Paris, France from 30th November to 12th December 2015, 195 nations historically agreed to "combat climate change and unleash actions and investment towards a low carbon, resilient and sustainable future" with the aim to ensure global temperature rise is kept well below 2℃ (UNFCCC 2015). To achieve this aim, a portfolio of technologies have been proposed, one of which is carbon capture, utilization and storage (CCUS) (Dixon 2016).
文摘This paper presented a background of the extent of the ICT, IT, and EC-B2B in Jordan. It was mentioned that the development of the ICT in Jordan brings benefits to the enterprises and their TPs. In this paper the EC-B2B systems’ readiness in Jordan is defined as the degree of preparation of a nation or community to participate in and benefits from ICT development. The government in Jordan has taken forceful measures towards adoption IT and IS applications and Internet awareness. In 2010, it was reported from the DOS in Jordanthat the percentage of individual Internet usage did not exceed 4.7 percent of the population inJordan[1]. This paper highlighted through subsections on the benefits and risks faced EC-B2B system adoption in Jordan. Based on the recent studies and reports in Jordan, the EC-B2B system adoption was mainly adopted by large enterprises in the supply chain rather than by SMEs. The study concluded that the main two barriers of ICT development and adoption inJordanare organizational readiness including lack of new education methods, and lack of information and knowledge.
文摘This paper reviewed and explored the current extent of the Internet Electronic Data Interchange systems adoption in Jordan particularly in the SME sector. Also the paper presented the benefits of IEDI adoption and showed the main obstacles facing the SME in Jordan to adopt. This paper used the descriptive and theoretical analysis approaches for collecting and analysis the historical and archived data. The literature showed that Jordan, as a developing country, has achieved forward steps in introducing the Internet to the different sectors of life. The adoption of the electronic tools in business became a governmental target in recent years to make it possible for SMEs to be able to continue to achieve success in their business [1]. Most of Jordanian SMEs have little or no competitive pressure to use I-EDI systems, since most suppliers, customers and other competitors do not seem to promote I-EDI systems. The study concluded that SMEs in Jordan could grow and become larger companies, and supporting national economy. Thus it is very important to develop and grow Jordanian SMEs by doing more research.
文摘The architecture of the Ouargla Ksar has long been recognized as an example of adaptation to harsh climate in the deep desert of AlgeHao Over the last few decades, it has undergone some changes in its initial urban structure, due to accelerated and uncontrolled modern urbanization, that had negative implications and devaluation of its thermal characteristics. This article tries to understand the bioclimatic concept of adaptation of this Ksar and assess to what extent its morphological transformation has impacted its microclimatic conditions. This assessment is made through a comparative study between two different areas: one untransformed and the other transformed. A referential weather station situated in the suburbs was also exploited for consolidation of comparison. The investigation was undertaken using site measurements and observations.