{"title":"File encryption based on the process of comparing locations and values between images and a text file","authors":"Mohammed Sekhi, M. Ilyas","doi":"10.1109/ICAIoT57170.2022.10121829","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121829","url":null,"abstract":"Information security is one of the most important things in the science of security, and data and information encryption are essential parts of it. In this paper, we will talk about a new type of encryption called Using Images to Encrypt Text file (UIFTF). The basis of its work depends on two images, where this algorithm will compare the text with the first image in bytes, then it takes the location of the byte that is similar to the message text, and after that the same location in the second image, we will take its value and it will be the text Our encoder. We will also mention the types of encryption and some of the algorithms used in them to be a comparison with our work and what are the differences between them.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129903502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yalagala Sivanjaneyulu, M. Manikandan, Srinivas Boppu
{"title":"CNN Based PPG Signal Quality Assessment Using Raw PPG Signal for Energy-Efficient PPG Analysis Devices in Internet of Medical Things","authors":"Yalagala Sivanjaneyulu, M. Manikandan, Srinivas Boppu","doi":"10.1109/ICAIoT57170.2022.10121884","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121884","url":null,"abstract":"For the internet of medical things (IoMT) enabled long-term health monitoring and disease prediction applications, there is a demand for an automatic photoplethysmogram (PPG) signal quality assessment (SQA) for reducing false alarms and energy consumption. This paper presents a PPG-SQA method by using raw PPG signal and convolutional neural network (CNN) with optimal parameters. The main focus of this paper is to find an optimal number of filters (16, 32, 64) and number of layers (2 and 4 layers) with rectified linear unit (ReLU) activation function and to study robustness of trained CNN models by using unseen PPG datasets and different kinds of noise sources, which are not addressed in the past studies on the CNN-based PPG-SQA methods. Evaluation results showed that the 4 layer CNN-based method had the higher accuracy of 99.58% for noise-free PPG (NF-PPG) versus wrist-cup noisy PPG signal database (MA-DB01), 99.99% for NF versus random noises added PPG (RN-PPG) signals, and 75.80% for NF-PPG versus acceleration corrupted PPG signals (MA-DB02). For the unknown dataset, the 4-layer CNN model had the higher accuracy of 96.71% for NF-PPG versus MA-DB01 and 99.04% for NF versus RN-PPG, and the 2-layer CNN model had the higher accuracy of 76.16% for NF-PPG versus MA-DB02 PPG segments. Results demonstrate that the CNN-based PPG-SQA method with optimal parameters is not only improve the accuracy but can also reduce the computational load as compared with other existing methods.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132391715","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intrusion Detection In Water Distribution Systems Using Machine Learning Techniques","authors":"N. Mabunda, Daniel T. Ramotsoela, A. Abu-Mahfouz","doi":"10.1109/ICAIoT57170.2022.10121852","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121852","url":null,"abstract":"Water distribution systems/networks (WDS/WDN) use complex pipe networks to distribute water from reservoirs, tanks and rivers to consumers. Over the years, the water industry has deployed SCADA (Supervisory Control and Data Acquisition) systems into WDNs so that there is a uniform water balance and so that the demands of a fast-growing world population are met optimally. These SCADA systems use standard protocols, hardware and software and thus are targeted due to their propensity to connect to institutional networks and the internet. Accurate and timeous detection of these attacks is necessary to protect critical infrastructure. Recently, Machine learning (ML) models have been initiated so that these cyber-attacks can be detected. These models can be categorized as Regression and prediction-based models, Classification-based models and Min-max based models. This paper will serve to cover the research gap in intrusion detection using machine learning, specifically in water distribution networks. This paper will aid in understanding which machine learning techniques are best suited for water distribution applications.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Challenges in Open Government Data Implementation: A Systematic Literature Review","authors":"Siti Mahfudzah Ashahril, A. Isa, N. Anwar","doi":"10.1109/ICAIoT57170.2022.10121839","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121839","url":null,"abstract":"Many obstacles must be considered when implementing Open Government Data (OGD), which is widely known as one of the open data initiatives by governments around the world. A systematic literature review has been done to recognize and identify challenges that may come along the way such as data privacy, protection & security, low data quality, and inaccuracy of data. 93 articles have been identified and grouped into two categories which are individual level and organizational level. As a result, only 18.28% out of 93 papers, or 17 publications, were ultimately chosen as being appropriate for the analysis step. This literature review’s objective is sought to identify the challenges encountered by individuals or organizations that have implemented OGD.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128667667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabah Salam Khudhair, H. Khleaf, Alaa Hamid Mohammed
{"title":"Estimation of Direction of Arrival for Antenna Array Based on ESPRIT and Multiple Signal Classification Algorithms","authors":"Sabah Salam Khudhair, H. Khleaf, Alaa Hamid Mohammed","doi":"10.1109/ICAIoT57170.2022.10121877","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121877","url":null,"abstract":"Antenna array plays a great role in many fields such as direction finding, radar, and mobile communication. The manipulation of signals induced by antenna elements using Direction of Arrival (DOA) estimation techniques will provide accurate location information of the radiating sources. Many methods were used to estimate DOA; however, we chose the best for high angular resolution subspace such as Multiple Signal Classification (MUSIC) and Estimation of Signal Parameters via Rational Invariance Techniques (ESPRIT) algorithms. Both algorithms have been developed and their DOA estimation performance numerically evaluated using MATLAB with array parameters including the number of snapshots, Signal-to-Noise ratio (SNR), number of array elements, and array element spacing have also been evaluated and compared. The simulation compares the performance between both algorithms at DOAs of 20° and 60°. The result shows that the MUSIC algorithm obtained better estimation accuracy at both DOAs compared to the ESPRIT algorithm by 12.78 dB and 7.78 dB respectively using 100 array elements.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133507321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Zahraa A. Jaaz, Inteasar Yaseen Khudhair, H. Mehdy, Jamal Fadhil Tawfeq, Ade Ghani, M. S. Alhamdany
{"title":"Real-Time Distributed Service De-Identification And Internet Problem Mitigation","authors":"Zahraa A. Jaaz, Inteasar Yaseen Khudhair, H. Mehdy, Jamal Fadhil Tawfeq, Ade Ghani, M. S. Alhamdany","doi":"10.1109/ICAIoT57170.2022.10121835","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121835","url":null,"abstract":"Distributed denial-of-service (DDoS) attacks are increasing in size, and complexity, and becoming more frequent where volumetric or high-rate attacks are the most prevalent type of DDoS penetrations. Cyber-attack and breaches against the networks of the Internet of Things (IoT) have dire consequences for the data and services that are used in the applications and devices while at the same time increasing the security challenges for its departments due to the increased resources required. A DDoS attack is an endeavor aimed at making a network, online service, or a whole organization unavailable by bombarding to saturate its traffic from multiple sources. The software-defined paradigm has been utilized as an effective mitigation technique for DDoS in IoT. Most researchers and experts have embraced this technique; therefore, in this study, we will present the conventional framework of software-defined detection and mitigation techniques for IoT. Furthermore, we will advance an algorithm for detecting and alleviating DDoS attacks that can be easily interfaced with software-defined frameworks (SD-IOT) for IoT. This algorithm will be based on neural networks for the packet in and out traffic while monitoring for DDoS attacks. The technique was successfully tested and revealed 89.047% accuracy for identifying actual DDoS attack datasets.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124792387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Mohammed Riyadh Abdulmajeed Al-Tekreeti, Mesut Cevik
{"title":"Photovoltaic System Power Management and Control in Case of Electric Vehicle Load","authors":"Mohammed Riyadh Abdulmajeed Al-Tekreeti, Mesut Cevik","doi":"10.1109/ICAIoT57170.2022.10121825","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121825","url":null,"abstract":"Electric cars are one of the applications that have become widespread, so the issue of charging these cars is one of the important applications, providing charging stations along the road is very important. In some areas, it is not possible to provide electric energy along the road, so it is common to rely on solar energy systems to provide the necessary capacity to charge electric car batteries. In this research, a solar cell system designed to charge electric car batteries was proposed, and it can also supply other loads with energy in addition to its original work. The proposed system can work with a control system that chooses the appropriate method of work according to the state of the load, as it can work with the maximum power point tracking system MPPT or the voltage stability system. Two MPPT algorithms (P&O and IC) are used in the system simulation. The proposed system was simulated using MATLAB/Simulink program. The simulation results show that the system has a high performance in all operating cases.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881964","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ICAIoT 2022 Conference Organizers","authors":"","doi":"10.1109/icaiot57170.2022.10121895","DOIUrl":"https://doi.org/10.1109/icaiot57170.2022.10121895","url":null,"abstract":"","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130392419","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Investigating the Performance of LoRa Communication for Nominal LoRa and Interleaved Chirp Spreading LoRa","authors":"Zaid Jameel Radhi Kamoona, Muhammad Ilyas","doi":"10.1109/ICAIoT57170.2022.10121818","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121818","url":null,"abstract":"The latest communication technology in Low Power Wide Area Networks (LPWAN) is LoRa. It prioritizes long-range transmission with a high detecting sensitivity and can operate efficiently below noise interference or noise floor. LoRa employs chirp spread spectrum modulation with six spreading factors; the rate of these chirps varies based on the value of the spreading factors. Increasing the spreading factor extends the range of LoRa communications at the cost of a decrease in the data transmission rate. Interleaved chirp spreading LoRa (ICS-LoRa) is a novel multi-dimensional space that attempts to improve the LoRa network”s transmission rate. In this paper, we propose a system with two transmitters and receivers, one for Nominal LoRa and one for ICS-LoRa, that may encode the same symbols through Nominal LoRa and ICS-LoRa and utilize this system to investigate and demonstrate that ICS-LoRa receives the same symbols as Nominal LoRa. In our simulation, we employ three distinct sets of symbols with various spreading factors. At the receiver side, Our symbols detect well for both Nominal LoRa and ICS-LoRa, and we observe that the FFT amplitude decreases by about 50% when ICS-LoRa modulation is used.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"50 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127577753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Modified Whale Optimization Algorithm for Solving Traveling Salesman Problem","authors":"A. Saleh, Mesut Cevik","doi":"10.1109/ICAIoT57170.2022.10121860","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121860","url":null,"abstract":"The main problem of the network is that the wrong designs and incorrect connection lead to major problems such as cost impact problems and network efficiency, the most famous being Fiber Optical network problems that still considered a problem for various types of networking. Travel Salesmen’s Problem (TSP) is one of the most traditional methods for solving this type of problem, depending today on optimization. Modified algorithms may be regarded as one of the most resourceful and effective ways to solve animal-based TSP problems. Whale Optimization Algorithm (WOA) and Genetic Algorithm (GA) focuses this paper on TSPLIB-type issues. This work showed a greatly promising performance with Whale Optimization Algorithm and was better than the genetic algorithm.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"56 17","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131604041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}