Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and ...Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.展开更多
The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have ...The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have non-stationary characteristics that make the understanding of trend and seasonality difficult.The applicability of the popular deep neural networks(DNNs)as function approximators for non-stationary TSF is studied.The following DNN models are evaluated:Multi-layer Perceptron(MLP),Convolutional Neural Network(CNN),and RNN with Long Short-Term Memory(LSTM-RNN)and RNN with Gated-Recurrent Unit(GRU-RNN).These DNN methods have been evaluated over 10 popular Indian financial stocks data.Further,the performance evaluation of these DNNs has been carried out in multiple independent runs for two settings of forecasting:(1)single-step forecasting,and(2)multi-step forecasting.These DNN methods show convincing performance for single-step forecasting(one-day ahead forecast).For the multi-step forecasting(multiple days ahead forecast),the methods for different forecast periods are evaluated.The performance of these methods demonstrates that long forecast periods have an adverse effect on performance.展开更多
The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with sho...The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment.展开更多
Clinical methods are used for diagnosing COVID-19 infected patients,but reports posit that,several people who were initially tested positive of COVID-19,and who had some underlying diseases,turned out having negative ...Clinical methods are used for diagnosing COVID-19 infected patients,but reports posit that,several people who were initially tested positive of COVID-19,and who had some underlying diseases,turned out having negative results after further tests.Therefore,the performance of clinical methods is not always guaranteed.Moreover,chest X-ray image data of COVID-19 infected patients are mostly used in the computational models for COVID-19 diagnosis,while the use of common symptoms,such as fever,cough,fatigue,muscle aches,headache,etc.in computational models is not yet reported.In this study,we employed seven classification algorithms to empirically test and verify their efficacy when applied to diagnose COVID-19 using the aforementioned symptoms.We experimented with Logistic Regression(LR),Support Vector Machine(SVM),Naïve Byes(NB),Decision Tree(DT),Multilayer Perceptron(MLP),Fuzzy Cognitive Map(FCM)and Deep Neural Network(DNN)algorithms.The techniques were subjected to random undersampling and oversampling.Our results showed that with class imbalance,MLP and DNN outperform others.However,without class imbalance,MLP,FCM and DNN outperform others with the use of random undersampling,but DNN has the best performance by utilizing random oversampling.This study identified MLP,FCM and DNN as better classifiers over LR,NB,DT and SVM,so that healthcare software system developers can adopt them to develop intelligence-based expert systems which both medical personnel and patients can use for differential diagnosis of COVID-19 based on the aforementioned symptoms.However,the test of performance must not be limited to the traditional performance metrics.展开更多
In this paper we describe how the test design can be done by using the Combinatorial Testing approach for internet of things operating systems. Contiki operating system is taken as a case study but we discuss what can...In this paper we describe how the test design can be done by using the Combinatorial Testing approach for internet of things operating systems. Contiki operating system is taken as a case study but we discuss what can be the approach for RIOT and Tiny OS operating systems. We discuss how the combinatorial coverage measurement can be gathered in addition to the traditional metrics code coverage. The test design generated by using Advanced Combinatorial Testing for Software is analyzed for Contiki operating system. We elaborate the code coverage gathering technique for Contiki simulator which happens to be in Java. We explain the usage of Combinatorial Coverage Measurement tool. Although we have explained the test design methodology for internet of things operating systems, the approach explained can be followed for other open source software.展开更多
Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible t...Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.展开更多
With the increasing integration of technology in modern workplaces, concerns have emerged regarding the addictive nature of technology and its potential consequences on employee productivity. This research aims to inv...With the increasing integration of technology in modern workplaces, concerns have emerged regarding the addictive nature of technology and its potential consequences on employee productivity. This research aims to investigate the impact of technological addiction on workplace productivity within the public sector of Zimbabwe. The study employed a mixed-methods approach, combining surveys, interviews, and a case study analysis, to examine the prevalence and effects of technological addiction in affecting productivity in the public sector of Zimbabwe. The findings indicate that excessive use of social media, and other digital distractions is a growing concern in the public sector, leading to decreased focus, missed deadlines, and strained teamwork. Factors such as unrestricted internet access, lack of clear usage policies, and inadequate self-regulation contribute to the problem The research outcomes also highlight the need for awareness and interventions to address social media addiction in the workplace, promote healthier technology use, and uphold productivity and employee well-being.展开更多
Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities f...Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.展开更多
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significa...On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significance for the safe operation of power systems.Therefore,a YOLOv5 target detection method based on a deep convolution neural network is proposed.In this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the backbone.The structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection rate.At the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the image.Collect pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data set.The experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,respectively.At the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.展开更多
In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing t...In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks.In this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted WSN.The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and lifetime.The proposed model involves two stage processes namely clustering and routing.Firstly,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct clusters.Besides,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted WSN.The proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,etc.The proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 rounds.The performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime.展开更多
With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number ...With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also increases.In addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be sufficient.Thus,there is a need to augment them with intelligent network intrusion detection techniques.Some machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent times.However,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection methods.Deep learning solutions are lucrative options as they remove the necessity for feature selection.Therefore,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more heightened.This work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge servers.Vehicular data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this paper.The proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing works.By running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of the proposed scheme is compared with those of the existing studies.展开更多
:In recent years,video surveillance application played a significant role in our daily lives.Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence r...:In recent years,video surveillance application played a significant role in our daily lives.Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility.The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery,object detection,target killing,and surveillance.To remove fog and enhance visibility,a number of visibility enhancement algorithms and methods have been proposed in the past.However,these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer vision applications.The existing techniques do not perform well when images contain heavy fog,large white region and strong atmospheric light.This research work proposed a new framework to defog and dehaze the image in order to enhance the visibility of foggy and haze images.The proposed framework is based on a Conditional generative adversarial network(CGAN)with two networks;generator and discriminator,each having distinct properties.The generator network generates fog-free images from foggy images and discriminator network distinguishes between the restored image and the original fog-free image.Experiments are conducted on FRIDA dataset and haze images.To assess the performance of the proposed method on fog dataset,we use PSNR and SSIM,and for Haze dataset use e,r−,andσas performance metrics.Experimental results shows that the proposed method achieved higher values of PSNR and SSIM which is 18.23,0.823 and lower values produced by the compared method which are 13.94,0.791 and so on.Experimental results demonstrated that the proposed framework Has removed fog and enhanced the visibility of foggy and hazy images.展开更多
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog...There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.展开更多
A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physic...A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.展开更多
Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the brain.The re...Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the brain.The recorded signals from the brain are rich with useful information.The inference of this useful information is a challenging task.This paper aims to process the EEG signals for the recognition of human emotions specifically happiness,anger,fear,sadness,and surprise in response to audiovisual stimuli.The EEG signals are recorded by placing neurosky mindwave headset on the subject’s scalp,in response to audiovisual stimuli for the mentioned emotions.Using a bandpass filter with a bandwidth of 1-100 Hz,recorded raw EEG signals are preprocessed.The preprocessed signals then further analyzed and twelve selected features in different domains are extracted.The Random forest(RF)and multilayer perceptron(MLP)algorithms are then used for the classification of the emotions through extracted features.The proposed audiovisual stimuli based EEG emotion classification system shows an average classification accuracy of 80%and 88%usingMLP and RF classifiers respectively on hybrid features for experimental signals of different subjects.The proposed model outperforms in terms of cost and accuracy.展开更多
Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning...Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning(ML)has the ability of accessing user data and exploit it for improving the learning experience.The recently developed artificial intelligence(AI)and ML models helps to accomplish effective performance monitoring for LMS.Among the different processes involved in ML based LMS,feature selection and classification processesfind beneficial.In this motivation,this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring(GSO-MFWELM)technique for LMS.The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS.The pro-posed GSO-MFWELM technique involves GSO-based feature selection techni-que to select the optimal features.Besides,Weighted Extreme Learning Machine(WELM)model is applied for classification process whereas the parameters involved in WELM model are optimallyfine-tuned with the help of May-fly Optimization(MFO)algorithm.The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance.The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects.The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589.展开更多
Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all ...Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all of the healthcare disciplines, however research in this field is still in its early stage. Increasingly, decision makers and developers look forward to offer more sophisticated, much larger, and more complex HCTS to serve the desired outcome and improve the quality and safety of patient care. Due to the rapidly increasing usage of personal mobile devices and the need of executing HCTS applications in environments that have no previous network infrastructure available, Mobile Health Care Training-based System (MHCTS) is an expected future trend. In such systems, medical staff will share and collaborate in a 3D virtual environment through their mobile devices in an ad-hoc network (MANET) in order to accomplish specific missions’ typically surgical emergency room. Users are organized into various groups (Radiologists, Maternity departments, and General surgery etc...), and need to be managed by a multicast scheme to save network bandwidth and offer immersive sense. MHCTS is sensitive to networking issues, since interactive 3D graphics requires additional load due to the use of mobile devices. Therefore, we need to emphasize on the importance and the improvement of multicast techniques for the effectiveness of MHCTS and the management of collaborative group interaction. Research so far has devoted little attention to the network communication protocols design of such systems which is crucial to preserve the sense of immersion for participating users. In this paper, we investigate the effect of multicast routing protocol in advancing the field of Health care Training-based System to the benefit of patient’s safety, and health care professional. Also, we address the issue of selecting a multicast protocol to provide the best performance for a particular e-health system at any time. Previous work has demonstrated that multicast operates at least as efficiently as traditional MAODV. A comprehensive analysis about various ad-hoc multicast routing protocols is proposed. The selection key factors for the right protocol for MHCTS applications were safety and robustness. To the best of our knowledge, this work will be the first initiative involving systematic literature reviews to identify a research gate for the use of multicast protocol in health care simulation learning community.展开更多
Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making ...Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making process in patient treatment.Since manual diagnosis is a tedious and time consuming task,numerous automated models,using Artificial Intelligence(AI)techniques,have been presented so far.With this motivation,the current research work presents a novel Biomedical Data Classification using Cat and Mouse Based Optimizer with AI(BDC-CMBOAI)technique.The aim of the proposed BDC-CMBOAI technique is to determine the occurrence of diseases using biomedical data.Besides,the proposed BDC-CMBOAI technique involves the design of Cat and Mouse Optimizer-based Feature Selection(CMBO-FS)technique to derive a useful subset of features.In addition,Ridge Regression(RR)model is also utilized as a classifier to identify the existence of disease.The novelty of the current work is its designing of CMBO-FS model for data classification.Moreover,CMBO-FS technique is used to get rid of unwanted features and boosts the classification accuracy.The results of the experimental analysis accomplished by BDC-CMBOAI technique on benchmark medical dataset established the supremacy of the proposed technique under different evaluation measures.展开更多
Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidt...Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidth resources has driven modern businesses into cloud services. The cloud is considered cutting edge technology and it is solely relied on by many large technology, business, and media companies such as Netflix or Salesforce.com. However, in addition to the benefit at hand, security issues have been a long-term concern for cloud computing and are the main barriers of the widespread use of cloud computing. In this paper, we briefly describe some basic security concerns that are of particular interest to cloud technology. We investigate some of the basic cloud concepts and discuss cloud security issues. Amazon Web Services is used as a case study for discussing common cloud terminology. Data security, as well as some cloud specific attacks is introduced. The current state and the future progression of cloud computing is discussed.展开更多
E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth ...E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count.展开更多
文摘Interoperability constraints in health information systems pose significant challenges to the seamless exchange and utilization of health data, hindering effective healthcare delivery. This paper aims to evaluate and address these constraints to enhance healthcare delivery. The study examines the current state of interoperability in health information systems, identifies the key constraints, and explores their impact on healthcare outcomes. Various approaches and strategies for addressing interoperability constraints are discussed, including the adoption of standardized data formats, implementation of interoperability frameworks, and establishment of robust data governance mechanisms. Furthermore, the study highlights the importance of stakeholder collaboration, policy development, and technical advancements in achieving enhanced interoperability. The findings emphasize the need for a comprehensive evaluation of interoperability constraints and the implementation of targeted interventions to promote seamless data exchange, improve care coordination, and enhance patient outcomes in healthcare settings.
文摘The problem of automatic and accurate forecasting of time-series data has always been an interesting challenge for the machine learning and forecasting community.A majority of the real-world time-series problems have non-stationary characteristics that make the understanding of trend and seasonality difficult.The applicability of the popular deep neural networks(DNNs)as function approximators for non-stationary TSF is studied.The following DNN models are evaluated:Multi-layer Perceptron(MLP),Convolutional Neural Network(CNN),and RNN with Long Short-Term Memory(LSTM-RNN)and RNN with Gated-Recurrent Unit(GRU-RNN).These DNN methods have been evaluated over 10 popular Indian financial stocks data.Further,the performance evaluation of these DNNs has been carried out in multiple independent runs for two settings of forecasting:(1)single-step forecasting,and(2)multi-step forecasting.These DNN methods show convincing performance for single-step forecasting(one-day ahead forecast).For the multi-step forecasting(multiple days ahead forecast),the methods for different forecast periods are evaluated.The performance of these methods demonstrates that long forecast periods have an adverse effect on performance.
文摘The main objective of this research is to provide a solution for online exam systems by using face recognition to authenticate learners for attending an online exam. More importantly, the system continuously (with short time intervals), checks for learner identity during the whole exam period to ensure that the learner who started the exam is the same one who continued until the end and prevent the possibility of cheating by looking at adjacent PC or reading from an external paper. The system will issue an early warning to the learners if suspicious behavior has been noticed by the system. The proposed system has been presented to eight e-learning instructors and experts in addition to 32 students to gather feedback and to study the impact and the benefit of such system in e-learning environment.
文摘Clinical methods are used for diagnosing COVID-19 infected patients,but reports posit that,several people who were initially tested positive of COVID-19,and who had some underlying diseases,turned out having negative results after further tests.Therefore,the performance of clinical methods is not always guaranteed.Moreover,chest X-ray image data of COVID-19 infected patients are mostly used in the computational models for COVID-19 diagnosis,while the use of common symptoms,such as fever,cough,fatigue,muscle aches,headache,etc.in computational models is not yet reported.In this study,we employed seven classification algorithms to empirically test and verify their efficacy when applied to diagnose COVID-19 using the aforementioned symptoms.We experimented with Logistic Regression(LR),Support Vector Machine(SVM),Naïve Byes(NB),Decision Tree(DT),Multilayer Perceptron(MLP),Fuzzy Cognitive Map(FCM)and Deep Neural Network(DNN)algorithms.The techniques were subjected to random undersampling and oversampling.Our results showed that with class imbalance,MLP and DNN outperform others.However,without class imbalance,MLP,FCM and DNN outperform others with the use of random undersampling,but DNN has the best performance by utilizing random oversampling.This study identified MLP,FCM and DNN as better classifiers over LR,NB,DT and SVM,so that healthcare software system developers can adopt them to develop intelligence-based expert systems which both medical personnel and patients can use for differential diagnosis of COVID-19 based on the aforementioned symptoms.However,the test of performance must not be limited to the traditional performance metrics.
文摘In this paper we describe how the test design can be done by using the Combinatorial Testing approach for internet of things operating systems. Contiki operating system is taken as a case study but we discuss what can be the approach for RIOT and Tiny OS operating systems. We discuss how the combinatorial coverage measurement can be gathered in addition to the traditional metrics code coverage. The test design generated by using Advanced Combinatorial Testing for Software is analyzed for Contiki operating system. We elaborate the code coverage gathering technique for Contiki simulator which happens to be in Java. We explain the usage of Combinatorial Coverage Measurement tool. Although we have explained the test design methodology for internet of things operating systems, the approach explained can be followed for other open source software.
文摘Internet of Health Things(IoHT)is a subset of Internet of Things(IoT)technology that includes interconnected medical devices and sensors used in medical and healthcare information systems.However,IoHT is susceptible to cybersecurity threats due to its reliance on low-power biomedical devices and the use of open wireless channels for communication.In this article,we intend to address this shortcoming,and as a result,we propose a new scheme called,the certificateless anonymous authentication(CAA)scheme.The proposed scheme is based on hyperelliptic curve cryptography(HECC),an enhanced variant of elliptic curve cryptography(ECC)that employs a smaller key size of 80 bits as compared to 160 bits.The proposed scheme is secure against various attacks in both formal and informal security analyses.The formal study makes use of the Real-or-Random(ROR)model.A thorough comparative study of the proposed scheme is conducted for the security and efficiency of the proposed scheme with the relevant existing schemes.The results demonstrate that the proposed scheme not only ensures high security for health-related data but also increases efficiency.The proposed scheme’s computation cost is 2.88 ms,and the communication cost is 1440 bits,which shows its better efficiency compared to its counterpart schemes.
文摘With the increasing integration of technology in modern workplaces, concerns have emerged regarding the addictive nature of technology and its potential consequences on employee productivity. This research aims to investigate the impact of technological addiction on workplace productivity within the public sector of Zimbabwe. The study employed a mixed-methods approach, combining surveys, interviews, and a case study analysis, to examine the prevalence and effects of technological addiction in affecting productivity in the public sector of Zimbabwe. The findings indicate that excessive use of social media, and other digital distractions is a growing concern in the public sector, leading to decreased focus, missed deadlines, and strained teamwork. Factors such as unrestricted internet access, lack of clear usage policies, and inadequate self-regulation contribute to the problem The research outcomes also highlight the need for awareness and interventions to address social media addiction in the workplace, promote healthier technology use, and uphold productivity and employee well-being.
文摘Internet of Things(IoT)refers to the infrastructures that connect smart devices to the Internet,operating autonomously.This connectivitymakes it possible to harvest vast quantities of data,creating new opportunities for the emergence of unprecedented knowledge.To ensure IoT securit,various approaches have been implemented,such as authentication,encoding,as well as devices to guarantee data integrity and availability.Among these approaches,Intrusion Detection Systems(IDS)is an actual security solution,whose performance can be enhanced by integrating various algorithms,including Machine Learning(ML)and Deep Learning(DL),enabling proactive and accurate detection of threats.This study proposes to optimize the performance of network IDS using an ensemble learning method based on a voting classification algorithm.By combining the strengths of three powerful algorithms,Random Forest(RF),K-Nearest Neighbors(KNN),and Support Vector Machine(SVM)to detect both normal behavior and different categories of attack.Our analysis focuses primarily on the NSL-KDD dataset,while also integrating the recent Edge-IIoT dataset,tailored to industrial IoT environments.Experimental results show significant enhancements on the Edge-IIoT and NSL-KDD datasets,reaching accuracy levels between 72%to 99%,with precision between 87%and 99%,while recall values and F1-scores are also between 72%and 99%,for both normal and attack detection.Despite the promising results of this study,it suffers from certain limitations,notably the use of specific datasets and the lack of evaluations in a variety of environments.Future work could include applying this model to various datasets and evaluating more advanced ensemble strategies,with the aim of further enhancing the effectiveness of IDS.
基金Funding project:Key Project of Science and Technology Research in Colleges andUniversities of Hebei Province.Project name:MillimeterWave Radar-Based Anti-Omission Early Warning System for School Bus Personnel.Grant Number:ZD2020318,funded to author Tang XL.Sponser:Hebei Provincial Department of Education,URL:http://jyt.hebei.gov.cn/Science and Technology Research Youth Fund Project of Hebei Province Universities.Project name:Research on Defect Detection and Engineering Vehicle Tracking System for Transmission Line Scenario.Grant Number:QN2023185,funded toW.JC,member of the mentor team.Sponser:Hebei Provincial Department of Education,URL:http://jyt.hebei.gov.cn/.
文摘On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line faults.Detecting these faults is of great significance for the safe operation of power systems.Therefore,a YOLOv5 target detection method based on a deep convolution neural network is proposed.In this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the backbone.The structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection rate.At the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the image.Collect pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data set.The experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,respectively.At the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.
文摘In current days,the domain of Internet of Things(IoT)and Wireless Sensor Networks(WSN)are combined for enhancing the sensor related data transmission in the forthcoming networking applications.Clustering and routing techniques are treated as the effective methods highly used to attain reduced energy consumption and lengthen the lifetime of the WSN assisted IoT networks.In this view,this paper presents an Ensemble of Metaheuristic Optimization based QoS aware Clustering with Multihop Routing(EMOQoSCMR)Protocol for IoT assisted WSN.The proposed EMO-QoSCMR protocol aims to achieve QoS parameters such as energy,throughput,delay,and lifetime.The proposed model involves two stage processes namely clustering and routing.Firstly,the EMO-QoSCMR protocol involves crossentropy rain optimization algorithm based clustering(CEROAC)technique to select an optimal set of cluster heads(CHs)and construct clusters.Besides,oppositional chaos game optimization based routing(OCGOR)technique is employed for the optimal set of routes in the IoT assisted WSN.The proposed model derives a fitness function based on the parameters involved in the IoT nodes such as residual energy,distance to sink node,etc.The proposed EMOQoSCMR technique has resulted to an enhanced NAN of 64 nodes whereas the LEACH,PSO-ECHS,E-OEERP,and iCSHS methods have resulted in a lesser NAN of 2,10,42,and 51 rounds.The performance of the presented protocol has been evaluated interms of energy efficiency and network lifetime.
基金The work of Vinay Chamola and F.Richard Yu was supported in part by the SICI SICRG Grant through the Project Artificial Intelligence Enabled Security Provisioning and Vehicular Vision Innovations for Autonomous Vehicles,and in part by the Government of Canada's National Crime Prevention Strategy and Natural Sciences and Engineering Research Council of Canada(NSERC)CREATE Program for Building Trust in Connected and Autonomous Vehicles(TrustCAV).
文摘With the rise of the Internet of Vehicles(IoV)and the number of connected vehicles increasing on the roads,Cooperative Intelligent Transportation Systems(C-ITSs)have become an important area of research.As the number of Vehicle to Vehicle(V2V)and Vehicle to Interface(V2I)communication links increases,the amount of data received and processed in the network also increases.In addition,networking interfaces need to be made more secure for which existing cryptography-based security schemes may not be sufficient.Thus,there is a need to augment them with intelligent network intrusion detection techniques.Some machine learning-based intrusion detection and anomaly detection techniques for vehicular networks have been proposed in recent times.However,given the expected large network size,there is a necessity for extensive data processing for use in such anomaly detection methods.Deep learning solutions are lucrative options as they remove the necessity for feature selection.Therefore,with the amount of vehicular network traffic increasing at an unprecedented rate in the C-ITS scenario,the need for deep learning-based techniques is all the more heightened.This work presents three deep learning-based misbehavior classification schemes for intrusion detection in IoV networks using Long Short Term Memory(LSTM)and Convolutional Neural Networks(CNNs).The proposed Deep Learning Classification Engines(DCLE)comprise of single or multi-step classification done by deep learning models that are deployed on the vehicular edge servers.Vehicular data received by the Road Side Units(RSUs)is pre-processed and forwarded to the edge server for classifications following the three classification schemes proposed in this paper.The proposed classifiers identify 18 different vehicular behavior types,the F1-scores ranging from 95.58%to 96.75%,much higher than the existing works.By running the classifiers on testbeds emulating edge servers,the prediction performance and prediction time comparison of the proposed scheme is compared with those of the existing studies.
基金We deeply acknowledge Taif University for Supporting and funding this study through Taif University Researchers Supporting Project number(TURSP-2020/115),Taif University,Taif,Saudi Arabia.
文摘:In recent years,video surveillance application played a significant role in our daily lives.Images taken during foggy and haze weather conditions for video surveillance application lose their authenticity and hence reduces the visibility.The reason behind visibility enhancement of foggy and haze images is to help numerous computer and machine vision applications such as satellite imagery,object detection,target killing,and surveillance.To remove fog and enhance visibility,a number of visibility enhancement algorithms and methods have been proposed in the past.However,these techniques suffer from several limitations that place strong obstacles to the real world outdoor computer vision applications.The existing techniques do not perform well when images contain heavy fog,large white region and strong atmospheric light.This research work proposed a new framework to defog and dehaze the image in order to enhance the visibility of foggy and haze images.The proposed framework is based on a Conditional generative adversarial network(CGAN)with two networks;generator and discriminator,each having distinct properties.The generator network generates fog-free images from foggy images and discriminator network distinguishes between the restored image and the original fog-free image.Experiments are conducted on FRIDA dataset and haze images.To assess the performance of the proposed method on fog dataset,we use PSNR and SSIM,and for Haze dataset use e,r−,andσas performance metrics.Experimental results shows that the proposed method achieved higher values of PSNR and SSIM which is 18.23,0.823 and lower values produced by the compared method which are 13.94,0.791 and so on.Experimental results demonstrated that the proposed framework Has removed fog and enhanced the visibility of foggy and hazy images.
基金This research was supported by the Researchers supporting program(TUMAProject-2021-27)Almaarefa University,Riyadh,Saudi Arabia.
文摘There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm.
基金supported by the Researchers Supporting Program(TUMA-Project-2021-27)Almaarefa University,Riyadh,Saudi ArabiaTaif University Researchers Supporting Project number(TURSP-2020/161),Taif University,Taif,Saudi Arabia。
文摘A cyber physical energy system(CPES)involves a combination of pro-cessing,network,and physical processes.The smart grid plays a vital role in the CPES model where information technology(IT)can be related to the physical system.At the same time,the machine learning(ML)modelsfind useful for the smart grids integrated into the CPES for effective decision making.Also,the smart grids using ML and deep learning(DL)models are anticipated to lessen the requirement of placing many power plants for electricity utilization.In this aspect,this study designs optimal multi-head attention based bidirectional long short term memory(OMHA-MBLSTM)technique for smart grid stability predic-tion in CPES.The proposed OMHA-MBLSTM technique involves three subpro-cesses such as pre-processing,prediction,and hyperparameter optimization.The OMHA-MBLSTM technique employs min-max normalization as a pre-proces-sing step.Besides,the MBLSTM model is applied for the prediction of stability level of the smart grids in CPES.At the same time,the moth swarm algorithm(MHA)is utilized for optimally modifying the hyperparameters involved in the MBLSTM model.To ensure the enhanced outcomes of the OMHA-MBLSTM technique,a series of simulations were carried out and the results are inspected under several aspects.The experimental results pointed out the better outcomes of the OMHA-MBLSTM technique over the recent models.
基金Authors would like to acknowledge the support of the Deputy for Research and Innovation-Ministry of Education,Kingdom of Saudi Arabia for this research through a Grant(NU/IFC/ENT/01/014)under the institutional Funding Committee at Najran University,Kingdom of Saudi Arabia.
文摘Electroencephalogram(EEG)is a medical imaging technology that can measure the electrical activity of the scalp produced by the brain,measured and recorded chronologically the surface of the scalp from the brain.The recorded signals from the brain are rich with useful information.The inference of this useful information is a challenging task.This paper aims to process the EEG signals for the recognition of human emotions specifically happiness,anger,fear,sadness,and surprise in response to audiovisual stimuli.The EEG signals are recorded by placing neurosky mindwave headset on the subject’s scalp,in response to audiovisual stimuli for the mentioned emotions.Using a bandpass filter with a bandwidth of 1-100 Hz,recorded raw EEG signals are preprocessed.The preprocessed signals then further analyzed and twelve selected features in different domains are extracted.The Random forest(RF)and multilayer perceptron(MLP)algorithms are then used for the classification of the emotions through extracted features.The proposed audiovisual stimuli based EEG emotion classification system shows an average classification accuracy of 80%and 88%usingMLP and RF classifiers respectively on hybrid features for experimental signals of different subjects.The proposed model outperforms in terms of cost and accuracy.
基金supported by the Researchers Supporting Program(TUMA-Project2021-27)Almaarefa University,RiyadhSaudi Arabia.Taif University Researchers Supporting Project number(TURSP-2020/161)Taif University,Taif,Saudi Arabia.
文摘Learning Management System(LMS)is an application software that is used in automation,delivery,administration,tracking,and reporting of courses and programs in educational sector.The LMS which exploits machine learning(ML)has the ability of accessing user data and exploit it for improving the learning experience.The recently developed artificial intelligence(AI)and ML models helps to accomplish effective performance monitoring for LMS.Among the different processes involved in ML based LMS,feature selection and classification processesfind beneficial.In this motivation,this study introduces Glowworm-based Feature Selection with Machine Learning Enabled Performance Monitoring(GSO-MFWELM)technique for LMS.The key objective of the proposed GSO-MFWELM technique is to effectually monitor the performance in LMS.The pro-posed GSO-MFWELM technique involves GSO-based feature selection techni-que to select the optimal features.Besides,Weighted Extreme Learning Machine(WELM)model is applied for classification process whereas the parameters involved in WELM model are optimallyfine-tuned with the help of May-fly Optimization(MFO)algorithm.The design of GSO and MFO techniques result in reduced computation complexity and improved classification performance.The presented GSO-MFWELM technique was validated for its performance against benchmark dataset and the results were inspected under several aspects.The simulation results established the supremacy of GSO-MFWELM technique over recent approaches with the maximum classification accuracy of 0.9589.
文摘Nowadays, Health Care Training-based System (HCTS) is a vital component in the education and training of health care in 3D Virtual Environment (VE). The practice of HCTS continues to grow at rapid pace throughout all of the healthcare disciplines, however research in this field is still in its early stage. Increasingly, decision makers and developers look forward to offer more sophisticated, much larger, and more complex HCTS to serve the desired outcome and improve the quality and safety of patient care. Due to the rapidly increasing usage of personal mobile devices and the need of executing HCTS applications in environments that have no previous network infrastructure available, Mobile Health Care Training-based System (MHCTS) is an expected future trend. In such systems, medical staff will share and collaborate in a 3D virtual environment through their mobile devices in an ad-hoc network (MANET) in order to accomplish specific missions’ typically surgical emergency room. Users are organized into various groups (Radiologists, Maternity departments, and General surgery etc...), and need to be managed by a multicast scheme to save network bandwidth and offer immersive sense. MHCTS is sensitive to networking issues, since interactive 3D graphics requires additional load due to the use of mobile devices. Therefore, we need to emphasize on the importance and the improvement of multicast techniques for the effectiveness of MHCTS and the management of collaborative group interaction. Research so far has devoted little attention to the network communication protocols design of such systems which is crucial to preserve the sense of immersion for participating users. In this paper, we investigate the effect of multicast routing protocol in advancing the field of Health care Training-based System to the benefit of patient’s safety, and health care professional. Also, we address the issue of selecting a multicast protocol to provide the best performance for a particular e-health system at any time. Previous work has demonstrated that multicast operates at least as efficiently as traditional MAODV. A comprehensive analysis about various ad-hoc multicast routing protocols is proposed. The selection key factors for the right protocol for MHCTS applications were safety and robustness. To the best of our knowledge, this work will be the first initiative involving systematic literature reviews to identify a research gate for the use of multicast protocol in health care simulation learning community.
基金Princess Nourah bint Abdulrahman University Researchers Supporting Project number(PNURSP2022R203)Princess Nourah bint Abdulrahman University,Riyadh,Saudi ArabiaThe authors would like to thank the Deanship of Scientific Research at Umm Al-Qura University for supporting this work by Grant Code:22UQU4340237DSR03.
文摘Biomedical data classification has become a hot research topic in recent years,thanks to the latest technological advancements made in healthcare.Biome-dical data is usually examined by physicians for decision making process in patient treatment.Since manual diagnosis is a tedious and time consuming task,numerous automated models,using Artificial Intelligence(AI)techniques,have been presented so far.With this motivation,the current research work presents a novel Biomedical Data Classification using Cat and Mouse Based Optimizer with AI(BDC-CMBOAI)technique.The aim of the proposed BDC-CMBOAI technique is to determine the occurrence of diseases using biomedical data.Besides,the proposed BDC-CMBOAI technique involves the design of Cat and Mouse Optimizer-based Feature Selection(CMBO-FS)technique to derive a useful subset of features.In addition,Ridge Regression(RR)model is also utilized as a classifier to identify the existence of disease.The novelty of the current work is its designing of CMBO-FS model for data classification.Moreover,CMBO-FS technique is used to get rid of unwanted features and boosts the classification accuracy.The results of the experimental analysis accomplished by BDC-CMBOAI technique on benchmark medical dataset established the supremacy of the proposed technique under different evaluation measures.
文摘Recent advances have witnessed the success and popularity of cloud computing, which represents a new business model and computing paradigm. The feature of on-demand provisioning of computational, storage, and bandwidth resources has driven modern businesses into cloud services. The cloud is considered cutting edge technology and it is solely relied on by many large technology, business, and media companies such as Netflix or Salesforce.com. However, in addition to the benefit at hand, security issues have been a long-term concern for cloud computing and are the main barriers of the widespread use of cloud computing. In this paper, we briefly describe some basic security concerns that are of particular interest to cloud technology. We investigate some of the basic cloud concepts and discuss cloud security issues. Amazon Web Services is used as a case study for discussing common cloud terminology. Data security, as well as some cloud specific attacks is introduced. The current state and the future progression of cloud computing is discussed.
文摘E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count.