Int. J. Interact. Mob. Technol.最新文献

筛选
英文 中文
CNN-Based Smart Parking System 基于cnn的智能停车系统
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.37033
Hiba A. Abu-Alsaad
{"title":"CNN-Based Smart Parking System","authors":"Hiba A. Abu-Alsaad","doi":"10.3991/ijim.v17i11.37033","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37033","url":null,"abstract":"Due to the increased number of cars, outdoor parking is one of the critical problems. Moreover, the management of the parking system is also considered a difficult task. Humans, on the other hand, were acclimated to efficiently parking their automobiles by providing them with the precise location of parking in advance of their arrival. As a result of human inefficiency, it was unsuccessful and ultimately increased the compliance cost. As a result of the development of the notion of the Internet of Things. A lot of systems were installed regarding smart parking systems that are decreasing the cost but also contain a huge impact on the reduction of emissions from cars. While it is possible to integrate Internet of Things (IoT) devices into automobiles, such an approach will necessitates the deployment of additional infrastructure, which will raise the cost, and also it is not feasible within current infrastructure configurations. Then there's the fact that CCTV technology is widely available and also small enough to fit into any parking area without being noticeable. In this paper, Convolution Neural Network (CNN) based smart parking system is designed and implemented. The CNN is used to detect vacant and occupied parking spaces through CCTV cameras and provide feedback to the passengers. Furthermore, the proposed approach is using CNR and PKLot datasets for ensuring the effectiveness of the model. This was developed to solve the issues of time, cost, and accuracy with the existing systems. As a result, the proposed model provides excellent results in terms of accuracy. Moreover, it is cost-effective and saves time.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"27 1","pages":"155-170"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85928910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Impact of a Collaborative IoT Framework for Smart Cities and Environmental Monitoring 协作物联网框架对智慧城市和环境监测的影响
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.36277
Suzan Husein, Darun Mudhafar, Saravana Balaji B
{"title":"The Impact of a Collaborative IoT Framework for Smart Cities and Environmental Monitoring","authors":"Suzan Husein, Darun Mudhafar, Saravana Balaji B","doi":"10.3991/ijim.v17i11.36277","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.36277","url":null,"abstract":"this paper proposed an architecture that is SenSquare, it is capable to carry various data sources which is coming through an open IOT program and throng sensor campaign, as well as displaying an integrated access for the utilizers. The goals of smart cities are to progress the quality of citizen in life through leveraging details on process of the urban scales that removed by diverse data source gathered at city broad deployment. In this paper checking the whole surfaces of a compound system, traversing through problems of various quality, this paper contract with the diverse data ranking, the Mobile Crowd sensing (MCS) administration to data ecological, acting information and integration, the services of IOT installation and redeployments. This study explained the suggested resolutions in cooperation with a functions and current ways to sitting unlock defies. Eventually, it pretends the ability of the SenSquare by jointly the desktop client and mobile.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"77 1","pages":"68-82"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86259780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Comparative Study for SDN Security Based on Machine Learning 基于机器学习的SDN安全比较研究
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39065
K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary
{"title":"A Comparative Study for SDN Security Based on Machine Learning","authors":"K. Alheeti, Abdulkareem Alzahrani, Maha Alamri, Aythem Khairi Kareem, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39065","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39065","url":null,"abstract":"In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"38 1","pages":"131-140"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80704038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Game-Based Learning and Gamification Technologies in the Preparation of Future Mathematics Teachers 游戏学习与游戏化技术在未来数学教师培养中的应用
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39227
P. Vankúš
{"title":"Game-Based Learning and Gamification Technologies in the Preparation of Future Mathematics Teachers","authors":"P. Vankúš","doi":"10.3991/ijim.v17i11.39227","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39227","url":null,"abstract":"Our paper advocates the preparation of future mathematics teachers for the use of game-based learning and gamification technologies. For this purpose, we created a university course that is dedicated to familiarizing the students with basic concepts of game-based learning and gamification and to conveying direct experience with their use. We support the concept and activities in this course by the positive results of the research on the opinions of 115 students. We hope that the positive results and our description of the course will be an inspiration for the broader incorporation of game-based learning and gamification technologies into the training of future mathematics teachers. Limitations of our research are the research sample, we investigated students’ reactions only at the author’s home university. Therefore, in the future, the research could be done with a broader sample and studying more in detail the students’ beliefs related to game-based learning and gamification before and after the course to get a better view of their development.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"35 1","pages":"53-67"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75128848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Intrusion Detection System Based on SVM 基于SVM的云入侵检测系统
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39063
K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary
{"title":"Cloud Intrusion Detection System Based on SVM","authors":"K. Alheeti, Ali Azawii Abdul lateef, Abdulkareem Alzahrani, Azhar Imran, Duaa Al-Dosary","doi":"10.3991/ijim.v17i11.39063","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39063","url":null,"abstract":"The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"501 1","pages":"101-114"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85645152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET) 车载自组网(VANET)中DDOS防护的混合安全方法
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.38907
Tuka Kareem Jebur
{"title":"Proposed Hybrid Secured Method to Protect Against DDOS in n Vehicular Adhoc Network (VANET)","authors":"Tuka Kareem Jebur","doi":"10.3991/ijim.v17i11.38907","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38907","url":null,"abstract":"Security and safety are critical concerns in Vehicular Adhoc Networks.  vulnerable to Distributed Denial of Service (DDoS) attacks, which occur when multiple vehicles carry out various tasks. This cause disrupts the normal functioning of legitimate routes. In this work, the Hybrid PSO-BAT Optimization Algorithm (HBPSO) Algorithm based on modified chaos -cellular neural network (Chaos - CNN) approaches has been proposed to overcome DDoS attacks. The suggest approaches consists of three-part which are hybrid optimization search algorithm to enhance the route from source to destination, chaos theory module is used to detect the abnormal nodes, then on Modified Chaotic CNN (MCCN) employed to prevent a malicious node from sending data to the destination by determining node that consumer more resource, packets lose or the victim could reset the path between the attacker and itself. CICIDS dataset has been used to test and evaluate the performance of the proposed approach based on the criteria of accuracy, packet loss, and jitter.  The Chaos - CNN approached results to outperform similar models of the related work and the approach protects the VANETs with high accuracy of 0.8736, specificity of 0.9959, TPR of 0.9561, and FPR of 0.78, Detection rate 0.9561.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"12 1","pages":"141-154"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90785700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile E-Portfolios on Google Sites: A Tool for Enhancing Project-Based Learning 谷歌网站上的移动电子作品集:一个增强基于项目的学习的工具
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.39673
Thi Kim Anh Tran, Truong Nguyen Ngoc
{"title":"Mobile E-Portfolios on Google Sites: A Tool for Enhancing Project-Based Learning","authors":"Thi Kim Anh Tran, Truong Nguyen Ngoc","doi":"10.3991/ijim.v17i11.39673","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.39673","url":null,"abstract":"Project-based learning is a student-centered approach to learning that emphasizes hands-on experiences, collaboration, and real-world problem-solving. The process of evaluating students' learning outcomes in a learning project, however, faces numerous challenges. This study investigates the potential of mobile e-portfolios on the Google Sites platform as a means of enhancing project-based learning in the field of physics education. The study utilized a quasi-experimental design with two groups: an experimental group and a control group. The data collected from the pre-test and post-test were analyzed using a t-test to determine the significance of the difference in the mean scores between the experimental group and the control group. The questionnaire data were analyzed using descriptive statistics to identify patterns and trends in student feedback. The results show that the use of mobile e-portfolios on the Google Sites platform significantly enhanced student interest and learning outcomes. After the pedagogical experiment, the experimental group's test scores (7.92) were higher than the control group's (5.22). According to the findings of the survey questionnaire given to the experimental group, the majority of students indicated that using mobile e-portfolios boosted their involvement and motivation to learning, as well as their ability to plan and present their project work. In conclusion, the findings of this study suggest that mobile e-portfolios on Google Sites can be an effective tool for enhancing project-based learning.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"54 1","pages":"15-33"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88812623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
"Bring-Your-Own-Device" (BYOD) and Productivity: Instrument Development and Validation “自带设备”(BYOD)和生产力:仪器开发和验证
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.38139
Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin
{"title":"\"Bring-Your-Own-Device\" (BYOD) and Productivity: Instrument Development and Validation","authors":"Amira Idayu Mohd Shukry, M. Rosman, Nik Nur Izzati Nik Rosli, Noor Rahmawati Alias, N. Razlan, N. Alimin","doi":"10.3991/ijim.v17i11.38139","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.38139","url":null,"abstract":"Bring-Your-Own-Device (BYOD) is a phenomenon whereby an employee brings their own computing devices to work with them and use them in addition to or instead of company-supplied devices. BYOD helps organization to cut cost and improve the utilization of organizational resources. However, the impacts and phenomenon of BYOD is still unknown and scarcely discuss within the body of knowledge; warrant for further exploration of the topic. Therefore, the purpose of this paper is to develop and validate an instrument to measure BYOD and its productivity. The research went through various empirical stages. Based on other studies, a list of predictors and dependent variables was adopted. Based on the variables that have been identified, a pilot instrument was created in the second step. Third, an expert review process was used to validate the instrument. The face validity and reliability investigation of possible respondents was completed. As a result, a reliable instrument with six variables and thirty items was created to measures BYOD and productivity in the context of universities students in Malaysia.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"110 3 1","pages":"83-100"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89752516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Secure Recommender System Model for Service Placement in Wireless Networks 无线网络中服务放置的安全推荐系统模型
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.37369
Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj
{"title":"A Secure Recommender System Model for Service Placement in Wireless Networks","authors":"Luan Gashi, A. Luma, Halil Snopçe, Ylber Januzaj","doi":"10.3991/ijim.v17i11.37369","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.37369","url":null,"abstract":"Edge or fog computing are being used to reduce latency between end devices and traditional cloud computing. The latest developments that have improved the hardware aspects of wireless sensors and mobile networks, gave the opportunity for other enhancements if such technologies are integrated between them. Regarding this enhanced heterogeneous environment, the approach of placing services needs to reconsider the security aspects. We have developed a baseline method of a solution which fulfills the cybersecurity requirements converging with the proposed multi-tier integrated model, that enhances the K-means algorithm with added processing steps supplying the criteria of the CIA triad.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"35 1","pages":"115-130"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80552511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises 移动和基于网络的保安巡逻、监控和报告系统,以维持楼宇的安全环境
Int. J. Interact. Mob. Technol. Pub Date : 2023-06-07 DOI: 10.3991/ijim.v17i11.35483
V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar
{"title":"Mobile and Web-Based Security Guard Patrolling, Monitoring and Reporting System to Maintain Safe and Secure Environment at Premises","authors":"V. R. Gannapathy, Vigneswaran Narayanamurthy, S. Subramaniam, A. F. T. Ibrahim, Ida Syafiza M. Isa, S. Rajkumar","doi":"10.3991/ijim.v17i11.35483","DOIUrl":"https://doi.org/10.3991/ijim.v17i11.35483","url":null,"abstract":"The guard tour system helps companies and organizations to monitor their security activities such as protecting people, buildings, assets, or equipment. According to the existing system, the patrolling at each checkpoint is being executed by using RFID-based digital data loggers that records and save all patrolling entries internally. The data will be transferred manually by the guard once the patrolling is completed. In some cases, when there is a problem with the device, the system unable to retrieve the patrolling data that has been already stored in the device. In addition, the current system also not be able to track the guard’s movement, patrolling information, and incidents in real-time basis. The developed Security Guard Patrolling, Monitoring and Reporting (eSmartGuard) system is able incorporates many unique and intelligent technologies such as NFC, GPS and IoT to records and save the patrolling data automatically on the cloud/server in real-time basis. An important value-added feature of the system is real-time incidents notification that able to notify any risk of the guards instantly to the in-charged security officer. Furthermore, through the eSmartGuard, the patrolling information such as time, date, GPS coordinate, guard ID can be monitored and retrieved remotely via proposed Mobile Apps and Web at a convenient time. The eSmartGuard patrolling system is proposed to improve the safety of the people and assets by assisting the security guards to perform their patrolling duty efficiently.","PeriodicalId":13648,"journal":{"name":"Int. J. Interact. Mob. Technol.","volume":"6 1","pages":"4-14"},"PeriodicalIF":0.0,"publicationDate":"2023-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73147570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信