2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)最新文献

筛选
英文 中文
Session 06 会话06
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/miucc55081.2022.9781708
{"title":"Session 06","authors":"","doi":"10.1109/miucc55081.2022.9781708","DOIUrl":"https://doi.org/10.1109/miucc55081.2022.9781708","url":null,"abstract":"","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"30 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121012092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using Blockchain Technology in MANETs Security 在MANETs安全中使用区块链技术
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781696
Ahmed Said Abdel-Sattar, Marianne A. Azer
{"title":"Using Blockchain Technology in MANETs Security","authors":"Ahmed Said Abdel-Sattar, Marianne A. Azer","doi":"10.1109/MIUCC55081.2022.9781696","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781696","url":null,"abstract":"Many systems have recently begun to examine blockchain qualities in order to create cooperation enforcement methods. This paper provides a complete and extensive evaluation of work on multi-hop MANETs with blockchain-based trust control between nodes. We contextualize the snag of security in MANETs resulting from the lack of trust between the participating nodes. We present the blockchain concepts and discuss the limitation of the current blockchain in MANETs. We review the promising proposed ideas in the state-of-the-art based on research papers. Finally, we discuss and summarize strategies and challenges for further research.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132584865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Blank page] (空白页)
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/miucc55081.2022.9781719
{"title":"[Blank page]","authors":"","doi":"10.1109/miucc55081.2022.9781719","DOIUrl":"https://doi.org/10.1109/miucc55081.2022.9781719","url":null,"abstract":"","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133889752","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Egyart_classify: an approach to classify outpainted Egyptian monuments images using GAN and ResNet egyart_classified:一种使用GAN和ResNet对未涂漆的埃及纪念碑图像进行分类的方法
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781780
Karim Yasser, Amr Mohamed Salama, Ahmed Amr, Loay Eldin Yehia, Samira Refaat, F. H. Ismail
{"title":"Egyart_classify: an approach to classify outpainted Egyptian monuments images using GAN and ResNet","authors":"Karim Yasser, Amr Mohamed Salama, Ahmed Amr, Loay Eldin Yehia, Samira Refaat, F. H. Ismail","doi":"10.1109/MIUCC55081.2022.9781780","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781780","url":null,"abstract":"Since Egypt is the cradle of civilizations, it contains many monuments and historical places. Tourist guides need the help of machine learning techniques to aid foreigners in getting to know Egypt's great history. This paper introduces a system to recognize monuments and provides a detailed description. A significant challenge is tackled in this paper, which is recognizing cropped monuments. When a tourist captures a monument image in real life, it may be occluded by an object. The human brain fills in the blanks and completes the image automatically. Our main contribution is to use generative adversarial deep learning techniques (GAN) to outpaint the cropped image. The outpainted image is then fed into state of art classifier RESNET to classify the monument and show a detailed explanation of its remarkable history. We trained the system with a dataset collected by the team of authors. After 1000 epochs of training, the Adversarial Loss of training GAN is 0.28344184 and the validation loss is 0.30181705. The performance measures of the RESNET classifier in testing are 97.0% for accuracy, 97.1% for precision, 97.0% for recall, and 97.0% for F1-measure.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115774451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An approach to enhance KNN based on data clustering using K-medoid 基于k -媒质聚类的KNN增强方法
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781724
Abdel-Fatah Karam, AbdelMoneim Helmy, Ammar Mohammed
{"title":"An approach to enhance KNN based on data clustering using K-medoid","authors":"Abdel-Fatah Karam, AbdelMoneim Helmy, Ammar Mohammed","doi":"10.1109/MIUCC55081.2022.9781724","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781724","url":null,"abstract":"K-nearest-neighbor (KNN) is one of the state-of-the-art machine learning algorithms used for classification and regression tasks. In addition to being simple to understand, KNN is also versatile, spanning various applications. Despite its simplicity, it is considered a lazy classifier that does not generate a trained model but stores or memorizes training examples instead. Consequently, the prediction process using KNN becomes costly in resources and time, especially when the dataset becomes large. Also, there is no general way to choose the best distance metric during the prediction. This paper proposes a new algorithm called K-nearest Medoid KNN (KMKNN) which improves the performance of KNN in terms of prediction performance and time efficiency without a major effect on its result accuracy. The core idea of the proposed KMKNN is to cluster the dataset before the prediction to limit the distance measures to those data instances that belong to the nearest cluster of the new data. KMKNN when compared to the traditional KNN and other similar extended versions of KNN, achieves a noticeable improvement on 15 benchmark datasets. The importance of this work is primarily in large datasets or when the distance measure used is computationally expensive, which is common in the computer vision and pattern recognition domains.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123726155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
DevSecOps: A Security Model for Infrastructure as Code Over the Cloud DevSecOps:云上作为代码的基础设施的安全模型
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781709
Amr Ibrahim, A. Yousef, Walaa Medhat
{"title":"DevSecOps: A Security Model for Infrastructure as Code Over the Cloud","authors":"Amr Ibrahim, A. Yousef, Walaa Medhat","doi":"10.1109/MIUCC55081.2022.9781709","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781709","url":null,"abstract":"DevSecOps includes security practice while applying DevOps. DevSecOps help secure the whole DevOps process. This paper aims to define a DevSecOps module to be used by the infrastructure team while applying infrastructure as code. The proposed module solves the problem of security by including security practice with the DevOps cycle to reach DevSecOps. The module was tested to measure time effi-ciency. A small survey was created to test other DevSecOps metrics and enhance future work.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126052987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Proposed Ensemble Voting Model for Fake News Detection 一种假新闻检测的集成投票模型
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781788
Sherry Girgis, Eslam Amer
{"title":"A Proposed Ensemble Voting Model for Fake News Detection","authors":"Sherry Girgis, Eslam Amer","doi":"10.1109/MIUCC55081.2022.9781788","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781788","url":null,"abstract":"Fake news or rumors are a phenomenon that significantly influences our social lives. Politicians in the political world usually rely on fake news as a powerful mechanism to change public opinion. Fake news spread through the media poses a real threat to the credibility of information, and the detection of fake news has attracted increased attention in recent years. Therefore, it becomes highly necessary to develop a method to identify fake news. This paper proposes a new ensemble voting model for detecting fake news in online text using a hybrid of machine learning and deep learning algorithms. Our ensemble model consists of three algorithms, namely, Convolution Neural Network (CNN) Gated Recurrent Unit (GRU) model of Recurrent Neural Network (RNN) and Random Forest. We relied on Natural language processing to extract statistical and representative features from the LIAR dataset. We experimented with the extracted features with our ensemble model. Experimental evaluation showed that our model achieves the best performance on the LIAR dataset with an accuracy of 0.410.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121306572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Smart Hydroponie System Using Fuzzy Logic Control 基于模糊逻辑控制的智能水盆系统
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781654
Badr Tarek Mohamed, Aml Mohamed Ahmed, A. A. Ahmed, Yasser Kamal Omar, Abdullah Medhat Makram, Khloud Khaled Fouad, Ayman Ahmed Soliman, Ahmed Mogahed Abo-Elmagd
{"title":"Smart Hydroponie System Using Fuzzy Logic Control","authors":"Badr Tarek Mohamed, Aml Mohamed Ahmed, A. A. Ahmed, Yasser Kamal Omar, Abdullah Medhat Makram, Khloud Khaled Fouad, Ayman Ahmed Soliman, Ahmed Mogahed Abo-Elmagd","doi":"10.1109/MIUCC55081.2022.9781654","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781654","url":null,"abstract":"Hydroponie plant plays a critical role in the agriculture field, which is put forward as a solution to combat climate change. The paper aims to provide automatic monitoring and controlling of hydroponic plants in the greenhouse via smartphones in real-time, to reduce the problems that appear in the greenhouse system and help the farmers in the agriculture process as they still do it manually. The paper will use the nutrient film technique (NFT), the nutrient solution is diluted with the water until getting the concentration for the cultivated plant, and then the excess solution is returned to the tank and watered the plant again. The proposed model will do activities such as measuring the temperature, humidity, and water level in the plant. The system design is based on fuzzy logic, the main objective of using fuzzy logic is to develop automated precise control of the fan and water pump. The proposed model hardware is an Arduino microcontroller, dHT11 sensor, PH sensor, LDR, esp8266 Wi-Fi module, MQ135, water level, fan with 5V, micro-DC water pump, and buzzer. The back end's main functions are to control actuators, provide real-time notifications of the sensor values, and user authentication. The test result of the proposed model is displaying the status of the plant and doing an action, such as controlling fan levels, water pump, and determining the amount of PH needed for the plant. The paper will be organized as the following: first, the background, then related work that is based on the same idea, a proposed model that includes hardware, backend, user interface, and the fuzzy logic system, the paper will end with results of practical work and the conclusion of the paper.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127127571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
[Blank page] (空白页)
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/miucc55081.2022.9781751
{"title":"[Blank page]","authors":"","doi":"10.1109/miucc55081.2022.9781751","DOIUrl":"https://doi.org/10.1109/miucc55081.2022.9781751","url":null,"abstract":"","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126348328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blackhole Attack effect on MANETs' Performance 黑洞攻击对manet性能的影响
2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC) Pub Date : 2022-05-08 DOI: 10.1109/MIUCC55081.2022.9781680
Mai Mostafa Gaber, Marianne A. Azer
{"title":"Blackhole Attack effect on MANETs' Performance","authors":"Mai Mostafa Gaber, Marianne A. Azer","doi":"10.1109/MIUCC55081.2022.9781680","DOIUrl":"https://doi.org/10.1109/MIUCC55081.2022.9781680","url":null,"abstract":"Mobile Ad hoc networks (MANETs) facilitate the communication of devices with a limited communication range. A MANET can be described as a decentralized network with a constantly changing topology. This makes it vulnerable to different attacks. The black hole is one of the most dangerous attacks in MANETs. This paper discusses the Blackhole attack in a random mobility environment and analyses its impact on MANETs using several parameters for single and multiple connections.","PeriodicalId":105666,"journal":{"name":"2022 2nd International Mobile, Intelligent, and Ubiquitous Computing Conference (MIUCC)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127520424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信