2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)最新文献
Luthfiah Azizah, P. Khotimah, Andria Arisal, A. Rozie, D. Munandar, D. Riswantini, Ekasari Nugraheni, W. Suwarningsih, D. Kurniasari
{"title":"The Investigation into Deep Learning Classifiers Towards Imbalanced Text Data","authors":"Luthfiah Azizah, P. Khotimah, Andria Arisal, A. Rozie, D. Munandar, D. Riswantini, Ekasari Nugraheni, W. Suwarningsih, D. Kurniasari","doi":"10.1109/NISS55057.2022.10085611","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085611","url":null,"abstract":"Class imbalance is an important classification problem where failure to identify events can be hazardous due to failure of solution preparation or opportune handling. Minorities are mostly more consequential in such cases. It is necessary to know a reliable classifier for imbalanced classes. This study examines several conventional machine learning and deep learning methods to compare the performance of each method on dataset with imbalanced classes. We use COVID-19 online news titles to simulate different class imbalance ratios. The results of our study demonstrate the superiority of the CNN with embedding layer method on a news titles dataset of 16,844 data points towards imbalance ratios of 37%, 30%, 20%, 10%, and 1%. However, CNN with embedding layer showed a noticeable performance degradation at an imbalance ratio of 1%.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125282365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abdurrakhman Prasetyadi, M. Rezaldi, H. Saputra, B. Nugroho, Cahyo Trianggoro
{"title":"Conceptual Design of Charging Stations for Autonomous Vehicle","authors":"Abdurrakhman Prasetyadi, M. Rezaldi, H. Saputra, B. Nugroho, Cahyo Trianggoro","doi":"10.1109/NISS55057.2022.10085028","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085028","url":null,"abstract":"Autonomous vehicle charging stations (AVCS) are fully automated charging systems controlled by robots. Our Study in attempt to introduces the conceptual design of a charging station for an AV to the convenience and efficiency of automated operation, enabling vehicles to charge themselves, thereby increasing their autonomy. This study proposed the scientometric-based product design approach. We performed design background seeking by scientometric and descriptive analysis in the first stage. As expected, in the previous designs, the motion of robotic arms is limited due to the spherical range of motion, and therefore it causes the arms could not reach constantly depending on the height of the arm. We propose a design plan containing something new and different from previous designs in the second stage. The concept design that we propose includes an energy source for the charging station that uses renewable energy from a solar cell device, which is designed using a hybrid system, which can be connected off-grid or on-grid. Then, the installation of the charging connector from the dispenser to the vehicle is carried out autonomously through the Robotic arm joints, which have a five-degree of freedom (5-DOF) design to make it more flexible.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127801582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic methods for eHealth cloud applications using Iot based 5G: Comparison study","authors":"Rayyam Manal, Mazri Tomader","doi":"10.1109/NISS55057.2022.10085683","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085683","url":null,"abstract":"Considered as one of 5G’s most effective technologies, the internet of things became more interesting by touching and expanding into more fields, while mobile users are steadily increasing to adopt and benefit those services. Therefore, eHealth is one of the important services which plays a sensitive role in the quality of humans’ lives. The wearable sensor devices are charged to gather various health parameters and transmit them to doctors for remote patient monitoring. This has attracted attention for ensuring secure communication and data transfer in eHealth applications. Therefore, we have chosen four performant cryptographic schemes to compare between them according to different metrics mainly: security analysis and cost performances. In order to find the suitable cryptographic protocol for eHealth cloud applications using Iot based 5G.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"3 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114120829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Streamlining Security Relevance Analysis According to ISO 21434","authors":"Christine Jakobs, Billy Naumann, Matthias Werner, Karsten Schmidt, Jörn Eichler, Holger Heskamp","doi":"10.1109/NISS55057.2022.10085633","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085633","url":null,"abstract":"ISO 21434, as the cybersecurity standard for automotive systems, was released not long ago. Nevertheless, the automotive industry needed to adhere to the standard since its draft release due to long development times. Therefore, most automotive companies accomplished the first development cycle according to ISO 21434. The biggest problem still is the efficiency of the cybersecurity process. In order to enable a continuous, traceable, and efficient cybersecurity process, each step needs to be evaluated and integrated into a common framework. As a first step, we analyze ISO 21434s concept of security relevance evaluation (SRE). We evaluate the suggested method of ISO 21434 and extend it to the notion of criticality. The initial criticality rating allows prioritization of the subsequent security process and accomplishment of the assessment requirement in ISO 21434. Additionally, we propose the idea of clustered SREs to raise efficiency.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126361188","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. R. Saleh, Y. Kartika, Zaenal Akbar, A. Krisnadhi, L. Manik
{"title":"OntoBiodiv: Reconnecting Biodiversity Data with Specimens","authors":"D. R. Saleh, Y. Kartika, Zaenal Akbar, A. Krisnadhi, L. Manik","doi":"10.1109/NISS55057.2022.10085505","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085505","url":null,"abstract":"Biodiversity data can be produced from preserved specimens where multiple pieces of information (e.g., taxonomic identification) will be extracted from biological samples or materials. Another approach, observation-based, collects data digitally without actual biological samples or materials. The latter approach has produced much more data compared to the first one. However, with recent technological developments, the tangible samples or materials preserved by the first approach have become gold mines because they opened more opportunities for scientific discovery. For example, a new method for genomic investigation can be performed on specimens collected a decade ago. However, this new investigation will only be possible with preserved specimens. Therefore, it is necessary to shift the focus of biodiversity data collection to the specimens-oriented. Unfortunately, most of the current biodiversity data standards cover specimens minimally. This work proposes a schema to extend an existing biodiversity data standard (i.e., Darwin Core) where specimens are the core. The extension covers a variety of data properties of specimens, including the generalization of multiple kinds of information that can be obtained by extracting from specimens. Comparing the coverage ratio and matching scores with the existing one reveals the superiority of the proposed schema. The evaluation results show that the proposed schema covers up to 80% higher and has the utmost exact match scores for specimen-based biodiversity data. This work initiates our effort to reconnect biodiversity data to specimens.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128690163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scalable Mobile Computing: From Cloud Computing to Mobile Edge Computing","authors":"Baghiani Radouane, Guezouli Lyamine, Korichi Ahmed, Barka Kamel","doi":"10.1109/NISS55057.2022.10085600","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085600","url":null,"abstract":"In recent years, cloud computing has emerged as a major change in the world of technology, whereby computing workloads are transferred first from local data centers located within companies and organizations to large cloud centers. On the horizon, a new wave of change forces the transition from cloud computing to edge computing, which is located at the borders of networks so that computation is close to the source of the processed data. This is to improve the performance and reliability of applications and services, and reduce the cost of their operation by optimizing the distance of the traveled data. In a mobile environment, we have to ask for the best technology to handle such an environment, whether it be cloud computing or edge computing. This survey will go over several papers varying from cloud computing to mobile edge computing to understand the researchers’ focus. We will see that mobility is a simple phenomenon that will help the emergence of new technologies.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122374572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"GNSS positioning improvement based on Satellite Selection","authors":"Elouahabi Mohammed, A. Hicham","doi":"10.1109/NISS55057.2022.10085087","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085087","url":null,"abstract":"Containers terminal is a high-level automation environment, within a crucial component is fleet management, however, due to the abundance of containers and machines in this area, truck’s GNSS receivers suffer from phenomena like multipath and NLOS, as a result, the errors of positioning service became higher than the requirement of this type of industry. To avoid NLOS and multipath we propose in this paper, a heuristic based on satellite selection which consists of masking GNSS signals coming from satellites having less than 30-degree elevation, thus we calculate positioning using only satellites with 30 to 90-degree elevation. The results of our research demonstrates that the suggested approach is significantly better than the conventional method in this specific area, and we validate this solution with other calculations.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126258823","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards an SDN/NFV based Network Infrastructure for Hospital Information Systems and Healthcare Services","authors":"Hicham Boudlal, Mohammed Serrhini, A. Tahiri","doi":"10.1109/NISS55057.2022.10085476","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085476","url":null,"abstract":"Today’s hospitals have become extremely dependent on technology to providing valuable patient services. From collecting as well as administering data of patients to delivering advanced therapies. The network infrastructure of the hospital is charged to provide various solution that are mission critical to address the increasing demands of healthcare services. Software Defined Networking and Network Functions Virtualization will improve infrastructure agility, making it easier to design, deliver and use networking services in a dynamic and scalable environment. Combining SDN and NFV provides significant benefits throughout the infrastructure network. Additionally, external parties are able to use infrastructure services in order to establish new service offerings. The infrastructure services are opened for many parties like developers of applications and service vendors. In this article, we first highlight some of the issues in the hospital information system (HIS) and healthcare services which network infrastructure will eventually confront. Then, concepts of SDN as well as NFV are presented. In addition, description of the benefits that SDN and NFV have for HIS and healthcare services. Finally, a new multi-layer architecture based on SDN and NFV is proposed and how this architecture can deal with the existing challenges of HIS and healthcare services.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130100247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ikram Hamdaoui, Mohamed El Fissaoui, K. Makkaoui, Z. E. Allali
{"title":"An intelligent traffic monitoring approach based on Hadoop ecosystem","authors":"Ikram Hamdaoui, Mohamed El Fissaoui, K. Makkaoui, Z. E. Allali","doi":"10.1109/NISS55057.2022.10085663","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085663","url":null,"abstract":"Nowadays, smart cities (SCs) use technologies and different types of data collected to improve the lifestyles of their citizens. Indeed, connected smart vehicles are technologies used for an SC’s intelligent traffic monitoring systems (ITMSs). However, most proposed monitoring approaches do not consider realtime monitoring. This paper presents real-time data processing for an intelligent traffic monitoring dashboard using the Hadoop ecosystem dashboard components. Many data are available due to our proposed monitoring approach, such as the total number of vehicles on different routes and data on trucks within a radius (10KM) of a specific point given. Based on our generated data, we can make real-time decisions to improve circulation and optimize traffic flow.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117319782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Topology of Correlation-Based Minimal Spanning Trees in Euronext Paris","authors":"Fadwa Bouhlal, Chaymae El Ouraini, M. B. Sedra","doi":"10.1109/NISS55057.2022.10085643","DOIUrl":"https://doi.org/10.1109/NISS55057.2022.10085643","url":null,"abstract":"The study of the static and dynamic evolution of correlations between different stocks, using the analysis of their correlation matrix properties, plays a vital role in portfolio optimization and risk assessment. The purpose of the study is to examine, based on the concept of ultrametricity, the properties of the French stock market (Euronext Paris) topology in a year-long moving window using the minimum spanning tree (MST) for the period 2006–2013. Each node represents a listed company in the SBF120, and their distance is a function of the correlation matrix element. The findings suggest that although there is a remarkable clustering and coherence in Euronext Paris, reflecting valuable economic insights, companies holding the most significant market capitalization are positioned in the surroundings of the central vertex in the MST.","PeriodicalId":138637,"journal":{"name":"2022 5th International Conference on Networking, Information Systems and Security: Envisage Intelligent Systems in 5g//6G-based Interconnected Digital Worlds (NISS)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123799123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}