期刊文献+
共找到59篇文章
< 1 2 3 >
每页显示 20 50 100
Cyber Resilience through Real-Time Threat Analysis in Information Security
1
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Information Security in the Cloud: Emerging Trends and Challenges
2
作者 Keerthana Chitreddy Andrew Mikhl Anthony +1 位作者 Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第5期69-80,共12页
This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering... This article explores the evolution of cloud computing, its advantages over traditional on-premises infrastructure, and its impact on information security. The study presents a comprehensive literature review covering various cloud infrastructure offerings and security models. Additionally, it deeply analyzes real-life case studies illustrating successful cloud migrations and highlights common information security threats in current cloud computing. The article concludes by offering recommendations to businesses to protect themselves from cloud data breaches and providing insights into selecting a suitable cloud services provider from an information security perspective. 展开更多
关键词 Cloud Computing Information Security Cloud Infrastructure Offerings Cloud Migration Security Measures Data Breaches Cloud Service Providers CYBERSECURITY Cloud Security Case Studies Cloud Threat Landscape Data Encryption COMPLIANCE Cloud Security Tools
下载PDF
Design and Analysis of a Network Traffic Analysis Tool: NetFlow Analyzer 被引量:1
3
作者 Rafia Islam Vishnu Vardhan Patamsetti +4 位作者 Aparna Gadhi Ragha Madhavi Gondu Chinna Manikanta Bandaru Sai Chaitanya Kesani Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第2期21-29,共9页
A network analyzer can often comprehend many protocols, which enables it to display talks taking place between hosts over a network. A network analyzer analyzes the device or network response and measures for the oper... A network analyzer can often comprehend many protocols, which enables it to display talks taking place between hosts over a network. A network analyzer analyzes the device or network response and measures for the operator to keep an eye on the network’s or object’s performance in an RF circuit. The purpose of the following research includes analyzing the capabilities of NetFlow analyzer to measure various parts, including filters, mixers, frequency sensitive networks, transistors, and other RF-based instruments. NetFlow Analyzer is a network traffic analyzer that measures the network parameters of electrical networks. Although there are other types of network parameter sets including Y, Z, & H-parameters, these instruments are typically employed to measure S-parameters since transmission & reflection of electrical networks are simple to calculate at high frequencies. These analyzers are widely employed to distinguish between two-port networks, including filters and amplifiers. By allowing the user to view the actual data that is sent over a network, packet by packet, a network analyzer informs you of what is happening there. Also, this research will contain the design model of NetFlow Analyzer that Measurements involving transmission and reflection use. Gain, insertion loss, and transmission coefficient are measured in transmission measurements, whereas return loss, reflection coefficient, impedance, and other variables are measured in reflection measurements. These analyzers’ operational frequencies vary from 1 Hz to 1.5 THz. These analyzers can also be used to examine stability in measurements of open loops, audio components, and ultrasonics. 展开更多
关键词 Network Analyzer INSTRUMENTS PARAMETER RF Circuit TRANSISTORS Traffic Analysis Bandwidth Measurement
下载PDF
Toward Developing a Syllabus-Oriented Computer-Based Question-Banks Software to Support Partially Computerized Exams
4
作者 Sulieman Bani-Ahmad 《Journal of Software Engineering and Applications》 2015年第5期252-268,共17页
Aims: This study aims at designing and implementing syllabus-oriented question-bank system that is capable of producing paper-based exams with multiple forms along with answer keys. The developed software tool is nam... Aims: This study aims at designing and implementing syllabus-oriented question-bank system that is capable of producing paper-based exams with multiple forms along with answer keys. The developed software tool is named Χ(Chi)-Pro Milestone and supports four types of questions, namely: Multiple-choice, True/False, Short-Answer and Free-Response Essay questions. The study is motivated by the fact that student number in schools and universities is continuously growing at high, non-linear, and uncontrolled rates. This growth, however, is not accompanied by an equivalent growth of educational resources (mainly: instructors, classrooms, and labs). A direct result of this situation is having relatively large number of students in each classroom. It is observed that providing and using online-examining systems could be intractable and expensive. As an alternative, paper-based exams can be used. One main issue is that manually produced paper-based exams are of low quality because of some human factors such as instability and relatively narrow range of topics [1]. Further, it is observed that instructors usually need to spend a lot of time and energy in composing paper-based exams with multiple forms. Therefore, the use of computers for automatic production of paper-based exams from question banks is becoming more and more important. Methodology: The design and evaluation of X-Pro Milestone are done by considering a basic set of design principles that are based on a list of identified Functional and Non-Functional Requirements. Deriving those requirements is made possible by developing X-Pro Milestone using the Iterative and Incremental model from software engineering domain. Results: We demonstrate that X-Pro Milestone has a number of excellent characteristics compared to the exam-preparation and question banks tools available in market. Some of these characteristics are: ease of use and operation, user-friendly interface and good usability, high security and protection of the question bank-items, high stability, and reliability. Further, X-Pro Milestone makes initiating, maintaining and archiving Question-Banks and produced exams possible. Putting X-Pro Milestone into real use has showed that X-Pro Milestone is easy to be learned and effectively used. We demonstrate that X-Pro Milestone is a cost-effective alternative to online examining systems with more and richer features and with low infrastructure requirements. 展开更多
关键词 Exam Preparation Tools Syllabus-Oriented QUESTION Banks PARTIALLY COMPUTERIZED Exams Iterative and Incremental SOFTWARE Development Model X-Pro Milestone
下载PDF
Information Assurance Technique for Mitigation of Data Breaches in the Human Service Sector
5
作者 Chevroen Washington Phillip Yarbrough +3 位作者 Shavon Parker Rafia Islam Vishnu Vardhan Patamsetti Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2022年第2期15-30,共16页
This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to... This research paper analyzes data breaches in the human service sector. The hypothesis for the solution to this problem is that there will be a significant reduction in data breaches in the human service sector due to an increase in information assurance. The hypothesis is tested using data from the United States Department of Health and Human Services data breach notification repository during January 2018-December 2020. Our result shows that without the increased mitigation of information assurance, data breaches in the human service sector will continue to increase. 展开更多
关键词 Information Assurance Ransomware Data Breach HACKER HIPPA PHISHING Department of Health and Human Services
下载PDF
The Future of Cloud Computing: Benefits and Challenges
6
作者 Rafia Islam Vardhan Patamsetti +4 位作者 Aparna Gadhi Ragha Madhavi Gondu Chinna Manikanta Bandaru Sai Chaitanya Kesani Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第4期53-65,共13页
The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing an... The purpose of this paper is to provide a better knowledge of the cloud computing as well as to suggest relevant research paths in this growing field. Also, we will go through the future benefits of cloud computing and the upcoming possible challenges we will have. Intext Cloud, performance, cloud computing, architecture, scale-up, and big data are all terms used in this context. Cloud computing offers a wide range of architectural configurations, including the number of processors, memory, and nodes. Cloud computing has already changed the way we store, process, and access data, and it is expected to continue to have a significant impact on the future of information technology. Cloud computing enables organizations to scale their IT resources up or down quickly and easily, without the need for costly hardware upgrades. This can help organizations to respond more quickly to changing business needs and market conditions. By moving IT resources to the cloud, organizations can reduce their IT infrastructure costs and improve their operational efficiency. Cloud computing also allows organizations to pay only for the resources they use, rather than investing in expensive hardware and software licenses. Cloud providers invest heavily in security and compliance measures, which can help to protect organizations from cyber threats and ensure regulatory compliance. Cloud computing provides a scalable platform for AI and machine learning applications, enabling organizations to build and deploy these technologies more easily and cost-effectively. A task, an application, and its input can take up to 20 times longer or cost 10 times more than optimal. Cloud products’ ready adaptability has resulted in a paradigm change. Previously, an application was optimized for a specific cluster;however, in the cloud, the architectural configuration is tuned for the workload. The evolution of cloud computing from the era of mainframes and dumb terminals has been significant, but there are still many advancements to come. As we look towards the future, IT leaders and the companies they serve will face increasingly complex challenges in order to stay competitive in a constantly evolving cloud computing landscape. Additionally, it will be crucial to remain compliant with existing regulations as well as new regulations that may emerge in the future. It is safe to say that the next decade of cloud computing will be just as dramatic as the last where many internet services are becoming cloud-based, and huge enterprises will struggle to fund physical infrastructure. Cloud computing is significantly used in business innovation and because of its agility and adaptability, cloud technology enables new ways of working, operating, and running a business. The service enables users to access files and applications stored in the cloud from anywhere, removing the requirement for users to be always physically close to actual hardware. Cloud computing makes the connection available from anywhere because they are kept on a network of hosted computers that carry data over the internet. Cloud computing has shown to be advantageous to both consumers and corporations. To be more specific, the cloud has altered our way of life. Overall, cloud computing is likely to continue to play a significant role in the future of IT, enabling organizations to become more agile, efficient, and innovative in the face of rapid technological change. This is likely to drive further innovation in AI and machine learning in the coming years. 展开更多
关键词 Cloud Computing Computing Service Private Clouds Public Clouds Hybrid Clouds Multi-Clouds
下载PDF
Impact of Remote Learning on Student Performance and Grade: A Virtual World of Education in the COVID-19 Era
7
作者 Rafia Islam Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期115-129,共15页
The COVID-19 pandemic has had a profound influence on education around the world, with schools and institutions shifting to remote learning to safeguard the safety of students and faculty. Concerns have been expressed... The COVID-19 pandemic has had a profound influence on education around the world, with schools and institutions shifting to remote learning to safeguard the safety of students and faculty. Concerns have been expressed about the impact of virtual learning on student performance and grades. The purpose of this study is to investigate the impact of remote learning on student performance and grades, as well as to investigate the obstacles and benefits of this new educational paradigm. The study will examine current literature on the subject, analyze data from surveys and interviews with students and educators, and investigate potential solutions to improve student performance and participation in virtual classrooms. The study’s findings will provide insights into the effectiveness of remote learning and inform ideas to improve student learning and achievement in an educational virtual world. The purpose of this article is to investigate the influence of remote learning on both students and educational institutions. The project will examine existing literature on the subject and collect data from students, instructors, and administrators through questionnaires and interviews. The paper will look at the challenges and opportunities that remote learning presents, such as the effect on student involvement, motivation, and academic achievement, as well as changes in teaching styles and technology. The outcomes of this study will provide insights into the effectiveness of remote learning and will affect future decisions about the usage of virtual learning environments in education. The research will also investigate potential solutions to improve the quality of remote education and handle any issues that occur. 展开更多
关键词 Remote Learning Student Performance Virtual World Covid-19 GRADE Student Learning
下载PDF
The Confidentiality of Coding Video Games with Cheat Code and Bots for Cheating in a Virtual World
8
作者 Samantha Gorton Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2023年第6期105-114,共10页
Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual gam... Video games have been around for several decades and have had many advancements from the original start of video games. Video games started as virtual games that were advertised towards children, and these virtual games created a virtual reality of a variety of genres. These genres included sports games, such as tennis, football, baseball, war games, fantasy, puzzles, etc. The start of these games was derived from a sports genre and now has a popularity in multiplayer-online-shooting games. The purpose of this paper is to investigate different types of tools available for cheating in virtual world making players have undue advantage over other players in a competition. With the advancement in technology, these video games have become more expanded in the development aspects of gaming. Video game developers have created long lines of codes to create a new look of video games. As video games have progressed, the coding, bugs, bots, and errors of video games have changed throughout the years. The coding of video games has branched out from the original video games, which have given many benefits to this virtual world, while simultaneously creating more problems such as bots. Analysis of tools available for cheating in a game has disadvantaged normal gamer in a fair contest. 展开更多
关键词 Video Games CONFIDENTIALITY Virtual World Cheat Code Bots PROGRAMMING
下载PDF
Software Metric Analysis of Open-Source Business Software
9
作者 Charles W. Butler 《Journal of Software Engineering and Applications》 2023年第5期144-153,共10页
Over the past decade, open-source software use has grown. Today, many companies including Google, Microsoft, Meta, RedHat, MongoDB, and Apache are major participants of open-source contributions. With the increased us... Over the past decade, open-source software use has grown. Today, many companies including Google, Microsoft, Meta, RedHat, MongoDB, and Apache are major participants of open-source contributions. With the increased use of open-source software or integration of open-source software into custom-developed software, the quality of this software component increases in importance. This study examined a sample of open-source applications from GitHub. Static software analytics were conducted, and each application was classified for its risk level. In the analyzed applications, it was found that 90% of the applications were classified as low risk or moderate low risk indicating a high level of quality for open-source applications. 展开更多
关键词 Open-Source Software Software Quality Software Risks Cyclomatic Complexity Essential Complexity Module Design Complexity Design Complexity Integration Complexity Local Data Complexity Public Global Data Complexity Parameter Data Complexity Risk Score Risk Classification
下载PDF
A Deep Learning Approach to Industrial Corrosion Detection
10
作者 Mehwash Farooqui Atta Rahman +7 位作者 Latifa Alsuliman Zainab Alsaif Fatimah Albaik Cadi Alshammari Razan Sharaf Sunday Olatunji Sara Waslallah Althubaiti Hina Gull 《Computers, Materials & Continua》 SCIE EI 2024年第11期2587-2605,共19页
The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection methods.While recent st... The proposed study focuses on the critical issue of corrosion,which leads to significant economic losses and safety risks worldwide.A key area of emphasis is the accuracy of corrosion detection methods.While recent studies have made progress,a common challenge is the low accuracy of existing detection models.These models often struggle to reliably identify corrosion tendencies,which are crucial for minimizing industrial risks and optimizing resource use.The proposed study introduces an innovative approach that significantly improves the accuracy of corrosion detection using a convolutional neural network(CNN),as well as two pretrained models,namely YOLOv8 and EfficientNetB0.By leveraging advanced technologies and methodologies,we have achieved high accuracies in identifying and managing the hazards associated with corrosion across various industrial settings.This advancement not only supports the overarching goals of enhancing safety and efficiency,but also sets a new benchmark for future research in the field.The results demonstrate a significant improvement in the ability to detect and mitigate corrosion-related concerns,providing a more accurate and comprehensive solution for industries facing these challenges.Both CNN and EfficientNetB0 exhibited 100%accuracy,precision,recall,and F1-score,followed by YOLOv8 with respective metrics of 95%,100%,90%,and 94.74%.Our approach outperformed state-of-the-art with similar datasets and methodologies. 展开更多
关键词 Deep learning YOLOv8 EfficientNetB0 CNN corrosion detection Industry 4.0 SUSTAINABILITY
下载PDF
A Reputation-Based AODV Protocol for Blackhole and Malfunction Nodes Detection and Avoidance
11
作者 Qussai M.Yaseen Monther Aldwairi Ahmad Manasrah 《Computers, Materials & Continua》 SCIE EI 2024年第8期1867-1888,共22页
Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applic... Enhancing the security of Wireless Sensor Networks(WSNs)improves the usability of their applications.Therefore,finding solutions to various attacks,such as the blackhole attack,is crucial for the success of WSN applications.This paper proposes an enhanced version of the AODV(Ad Hoc On-Demand Distance Vector)protocol capable of detecting blackholes and malfunctioning benign nodes in WSNs,thereby avoiding them when delivering packets.The proposed version employs a network-based reputation system to select the best and most secure path to a destination.To achieve this goal,the proposed version utilizes the Watchdogs/Pathrater mechanisms in AODV to gather and broadcast reputations to all network nodes to build the network-based reputation system.To minimize the network overhead of the proposed approach,the paper uses reputation aggregator nodes only for forwarding reputation tables.Moreover,to reduce the overhead of updating reputation tables,the paper proposes three mechanisms,which are the prompt broadcast,the regular broadcast,and the light broadcast approaches.The proposed enhanced version has been designed to perform effectively in dynamic environments such as mobile WSNs where nodes,including blackholes,move continuously,which is considered a challenge for other protocols.Using the proposed enhanced protocol,a node evaluates the security of different routes to a destination and can select the most secure routing path.The paper provides an algorithm that explains the proposed protocol in detail and demonstrates a case study that shows the operations of calculating and updating reputation values when nodes move across different zones.Furthermore,the paper discusses the proposed approach’s overhead analysis to prove the proposed enhancement’s correctness and applicability. 展开更多
关键词 AODV blackhole malfunction nodes pathrater reputation system wireless sensor networks(WSNs) watchdogs
下载PDF
AMachine Learning Approach to Cyberbullying Detection in Arabic Tweets
12
作者 Dhiaa Musleh Atta Rahman +8 位作者 Mohammed Abbas Alkherallah Menhal Kamel Al-Bohassan Mustafa Mohammed Alawami Hayder Ali Alsebaa Jawad Ali Alnemer Ghazi Fayez Al-Mutairi May Issa Aldossary Dalal A.Aldowaihi Fahd Alhaidari 《Computers, Materials & Continua》 SCIE EI 2024年第7期1033-1054,共22页
With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,l... With the rapid growth of internet usage,a new situation has been created that enables practicing bullying.Cyberbullying has increased over the past decade,and it has the same adverse effects as face-to-face bullying,like anger,sadness,anxiety,and fear.With the anonymity people get on the internet,they tend to bemore aggressive and express their emotions freely without considering the effects,which can be a reason for the increase in cyberbullying and it is the main motive behind the current study.This study presents a thorough background of cyberbullying and the techniques used to collect,preprocess,and analyze the datasets.Moreover,a comprehensive review of the literature has been conducted to figure out research gaps and effective techniques and practices in cyberbullying detection in various languages,and it was deduced that there is significant room for improvement in the Arabic language.As a result,the current study focuses on the investigation of shortlisted machine learning algorithms in natural language processing(NLP)for the classification of Arabic datasets duly collected from Twitter(also known as X).In this regard,support vector machine(SVM),Naive Bayes(NB),Random Forest(RF),Logistic regression(LR),Bootstrap aggregating(Bagging),Gradient Boosting(GBoost),Light Gradient Boosting Machine(LightGBM),Adaptive Boosting(AdaBoost),and eXtreme Gradient Boosting(XGBoost)were shortlisted and investigated due to their effectiveness in the similar problems.Finally,the scheme was evaluated by well-known performance measures like accuracy,precision,Recall,and F1-score.Consequently,XGBoost exhibited the best performance with 89.95%accuracy,which is promising compared to the state-of-the-art. 展开更多
关键词 Supervised machine learning ensemble learning CYBERBULLYING Arabic tweets NLP
下载PDF
A Game-Theoretic Approach to Safe Crowd Evacuation in Emergencies
13
作者 Maria Gul Imran Ali Khan +9 位作者 Gohar Zaman Atta Rahman Jamaluddin Mir Sardar Asad Ali Biabani May IssaAldossary Mustafa Youldash Ashraf Saadeldeen Maqsood Mahmud Asiya Abdus Salam Dania Alkhulaifi 《Computers, Materials & Continua》 SCIE EI 2024年第4期1631-1657,共27页
Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoret... Obstacle removal in crowd evacuation is critical to safety and the evacuation system efficiency. Recently, manyresearchers proposed game theoreticmodels to avoid and remove obstacles for crowd evacuation. Game theoreticalmodels aim to study and analyze the strategic behaviors of individuals within a crowd and their interactionsduring the evacuation. Game theoretical models have some limitations in the context of crowd evacuation. Thesemodels consider a group of individuals as homogeneous objects with the same goals, involve complex mathematicalformulation, and cannot model real-world scenarios such as panic, environmental information, crowds that movedynamically, etc. The proposed work presents a game theoretic model integrating an agent-based model to removethe obstacles from exits. The proposed model considered the parameters named: (1) obstacle size, length, andwidth, (2) removal time, (3) evacuation time, (4) crowd density, (5) obstacle identification, and (6) route selection.The proposed work conducts various experiments considering different conditions, such as obstacle types, obstacleremoval, and several obstacles. Evaluation results show the proposed model’s effectiveness compared with existingliterature in reducing the overall evacuation time, cell selection, and obstacle removal. The study is potentially usefulfor public safety situations such as emergency evacuations during disasters and calamities. 展开更多
关键词 Safe crowd evacuation public safety EMERGENCY transition probability COOPERATION
下载PDF
The AI Paradox: Mapping the Unintended Disruptions in IT and Beyond
14
作者 Aparna Gadhi Chinna Manikanta Bandaru Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第7期105-112,共8页
In the realm of Artificial Intelligence (AI), there exists a complex landscape where promises of efficiency and innovation clash with unforeseen disruptions across Information Technology (IT) and broader societal real... In the realm of Artificial Intelligence (AI), there exists a complex landscape where promises of efficiency and innovation clash with unforeseen disruptions across Information Technology (IT) and broader societal realms. This paper sets out on a journey to explore the intricate paradoxes inherent in AI, focusing on the unintended consequences that ripple through IT and beyond. Through a thorough examination of literature and analysis of related works, this study aims to shed light on the complexities surrounding the AI paradox. It delves into how this paradox appears in various domains, such as algorithmic biases, job displacement, ethical dilemmas, and privacy concerns. By mapping out these unintended disruptions, this research seeks to offer a nuanced understanding of the challenges brought forth by AI-driven transformations. Ultimately, its goal is to pave the way for the responsible development and deployment of AI, fostering a harmonious integration of technological progress with societal values and priorities. 展开更多
关键词 Artificial Intelligence AI Paradox Unintended Disruptions Information Technology Ethical Dilemmas Privacy Concerns Job Displacement Algorithmic Biases
下载PDF
Decision Making in Internet of Vehicles Using Pervasive Trusted Computing Scheme 被引量:1
15
作者 Geetanjali Rathee Razi Iqbal Adel Khelifi 《Computers, Materials & Continua》 SCIE EI 2021年第8期2755-2769,共15页
Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications ... Pervasive schemes are the significant techniques that allow intelligent communication among the devices without any human intervention.Recently Internet of Vehicles(IoVs)has been introduced as one of the applications of pervasive computing that addresses the road safety challenges.Vehicles participating within the IoV are embedded with a wide range of sensors which operate in a real time environment to improve the road safety issues.Various mechanisms have been proposed which allow automatic actions based on uncertainty of sensory and managed data.Due to the lack of existing transportation integration schemes,IoV has not been completely explored by business organizations.In order to tackle this problem,we have proposed a novel trusted mechanism in IoV during communication,sensing,and record storing.Our proposed method uses trust based analysis and subjective logic functions with the aim of creating a trust environment for vehicles to communicate.In addition,the subjective logic function is integrated with multi-attribute SAW scheme to improve the decision metrics of authenticating nodes.The trust analysis depends on a variety of metrics to ensure an accurate identification of legitimate vehicles embedded with IoT devices ecosystem.The proposed scheme is determined and verified rigorously through various IoT devices and decision making metrics against a baseline solution.The simulation results show that the proposed scheme leads to 88%improvement in terms of better identification of legitimate nodes,road accidents and message alteration records during data transmission among vehicles as compared to the baseline approach. 展开更多
关键词 Pervasive computing vehicular networks SECURITY TRUST decision schemes trusted internet of vehicles big data
下载PDF
Using an Adaptive Neuro-Fuzzy Inference System (AnFis) Algorithm for Automatic Diagnosis of Skin Cancer 被引量:1
16
作者 Suhail M. Odeh 《通讯和计算机(中英文版)》 2011年第9期751-755,共5页
关键词 自适应神经模糊推理系统 ANFIS模型 自动诊断 皮肤癌 算法 诊断系统 分类方法 最小二乘法
下载PDF
An Automated Approach for Software Fault Detection and Recovery 被引量:2
17
作者 Amjad A. Hudaib Hussam N. Fakhouri 《Communications and Network》 2016年第3期158-169,共12页
Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This pape... Autonomic software recovery enables software to automatically detect and recover software faults. This feature makes the software to run more efficiently, actively, and reduces the maintenance time and cost. This paper proposes an automated approach for Software Fault Detection and Recovery (SFDR). The SFDR detects the cases if a fault occurs with software components such as component deletion, replacement or modification, and recovers the component to enable the software to continue its intended operation. The SFDR is analyzed and implemented in parallel as a standalone software at the design phase of the target software. The practical applicability of the proposed approach has been tested by implementing an application demonstrating the performance and effectiveness of the SFDR. The experimental results and the comparisons with other works show the effectiveness of the proposed approach. 展开更多
关键词 Software Engineering Autonomic Software Systems Automatic Recovery Automatic Diagnosis Auto Restore
下载PDF
A Survey about Self-Healing Systems (Desktop and Web Application) 被引量:1
18
作者 Amjad A. Hudaib Hussam N. Fakhouri +1 位作者 Fatima Eid Al Adwan Sandi N. Fakhouri 《Communications and Network》 2017年第1期71-88,共18页
The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost ... The complexity of computer architectures, software, web applications, and its large spread worldwide using the internet and the rapid increase in the number of users in companion with the increase of maintenance cost are all factors guided many researchers to develop software, web applications and systems that have the ability of self-healing. The aim of the self healing software feature is to fast recover the application and keep it running and available for 24/7 as optimal as possible. This survey provides an overview of self-healing software and system that is especially useful in all of those situations in which the involvement of humans is costly and hard to recover and needs to be automated with self healing. There are different aspects which will make us understand the different benefits of these self-healing systems. Finally, the approaches, techniques, mechanisms and individual characteristics of self healing are classified in different tables and then summarized. 展开更多
关键词 COMPUTER Architecture SELF-HEALING Systems SELF-HEALING PRINCIPLES Software SELF-HEALING Web-Self-Healing
下载PDF
Emerging Trends of Outsourcing Business to Cloud Computing Services: A Perspective Study
19
作者 Amjad Hudaib Mohammad Alnabhan +3 位作者 Osama Harfoushi Ruba Obiedat Omar Adwan Waed Adham 《Communications and Network》 2014年第1期1-8,共8页
Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity in which most or all of its commercial roles are o... Developments in service oriented architecture (SOA) have taken us near to the once fictional dream of forming and running an online business, such commercial activity in which most or all of its commercial roles are outsourced to online services. The novel concept of cloud computing gives a understanding of SOA in which Information Technology assets are provided as services that are extra flexible, inexpensive and striking to commercial activities. In this paper, we concisely study developments in concept of cloud computing, and debate the advantages of using cloud services for commercial activities and trade-offs that they have to consider. Further we presented a layered architecture for online business, and then we presented a conceptual architecture for complete online business working atmosphere. Moreover, we discuss the prospects and research experiments that are ahead of us in realizing the technical components of this conceptual architecture. We conclude by giving the outlook and impact of cloud services on both large and small businesses. 展开更多
关键词 CLOUD BUSINESS CLOUD Services CLOUD Computing Traditional SOFTWARE Developing SOFTWARE Engineering Life Cycle Service Oriented Architecture
下载PDF
Proxy Server Experiment and Network Security with Changing Nature of the Web
20
作者 Olatunde Abiona Adeniran Oluwaranti +4 位作者 Ayodeji Oluwatope Surura Bello Clement Onime Mistura Sanni Lawrence Kehinde 《International Journal of Communications, Network and System Sciences》 2014年第12期519-528,共10页
The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of thei... The total reliance on internet connectivity and World Wide Web (WWW) based services is forcing many organizations to look for alternative solutions for providing adequate access and response time to the demand of their ever increasing users. A typical solution is to increase the bandwidth;this can be achieved with additional cost, but this solution does not scale nor decrease users perceived response time. Another concern is the security of their network. An alternative scalable solution is to deploy a proxy server to provide adequate access and improve response time as well as provide some level of security for clients using the network. While some studies have reported performance increase due to the use of proxy servers, one study has reported performance decrease due to proxy server. We then conducted a six-month proxy server experiment. During this period, we collected access logs from three different proxy servers and analyzed these logs with Webalizer a web server log file analysis program. After a few years, in September 2010, we collected log files from another proxy server, analyzed the logs using Webalizer and compared our results. The result of the analysis showed that the hit rate of the proxy servers ranged between 21% - 39% and over 70% of web pages were dynamic. Furthermore clients accessing the internet through a proxy server are more secured. We then conclude that although the nature of the web is changing, the proxy server is still capable of improving performance by decreasing response time perceived by web clients and improved network security. 展开更多
关键词 PROXY Server Network Security HIT Ratio Webalizer PROXY LOG Analysis
下载PDF
上一页 1 2 3 下一页 到第
使用帮助 返回顶部