{"title":"Classification of Traffic in 5G Internet of Things Networks: A New Framework","authors":"Sarmad Fouad Naji Al-Jawashee, Mesut Cevik","doi":"10.1109/ICAIoT57170.2022.10121821","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121821","url":null,"abstract":"The organization formed by the connection established between computers, typically by cable, for the purpose of communicating and transmitting data is known as a network. A computer network is a collection of interconnected computers that allow for the sharing of resources including data, programs, and files. When people think of computer networks, they think of the Internet. In this paper, we proposed the usage of a new technique for the categorization of computer network traffic that is based on deep sparse autoencoders and k-nearest-neighbor (KNN) that has been optimized with Grid Search. The autoencoders took the input data and extracted high-level characteristics from it, then connected those features to the KNN. The KNN was used to divide the characteristics into three distinct kinds of assaults (normal and abnormal). In comparison to other investigations, the proposed approach demonstrated an accuracy of 98.23% in its results.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131072044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sabah Salam Khaduair Al Zirjawi, Hawraa Jaafar Murad Kashkool, A. Ibrahim, Mona Idan Ali Al
{"title":"Machine Learning Algorithms for URLs Classification","authors":"Sabah Salam Khaduair Al Zirjawi, Hawraa Jaafar Murad Kashkool, A. Ibrahim, Mona Idan Ali Al","doi":"10.1109/ICAIoT57170.2022.10121843","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121843","url":null,"abstract":"Phishing is a technique used to collect sensitive data from a user (password or credit card information) for future misuse by posing as a trustworthy source. It often takes advantage of the user’s gullibility in ways that the user will not detect at first look, and in the worst-case scenario, the attacker maintains the user’s data without the user’s awareness. Typically, the URL is the first and simplest piece of information we know about a website. As a result, it is logical to design algorithms for distinguishing harmful from benign URLs. Additionally, accessing and downloading the website’s material may be time-consuming and involves the danger of downloading potentially hazardous information. Machine Learning techniques are used to train a model on a collection of URLs specified as a set of characteristics and then predict and categorize the URLs as benign or dangerous. This technology enables us to identify and avoid possibly dangerous URLs shortly.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691472","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid
{"title":"Data Diode for Cyber-security: A Review","authors":"Ismail Ahmed Almaazmi, Mohammed Saeed Al Shehhi, Omar Alkhoori, Salem Jumah Al Shehhi, Yasir Hamid","doi":"10.1109/ICAIoT57170.2022.10121887","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121887","url":null,"abstract":"The rapid growth in network usage and availability has exposed this field to denser and more sophisticated attacks. Sensitive and critical data has been transported over those network nodes and devices, which made them an attack vector to be exploited to gain information or data. To uphold the advantages of the networked systems some data need to be sent out over the highly secure channel. Previous technologies like Firewalls and ACLs being used to pass the data from a highly secure logical area to a lower logical area due to their software nature are proving to be fighting a losing battle with the attackers. Therefore, in the recent past physical security device Aka. Data Diodes which are secure by design and have no documented evidence of flow being reversed are gaining more attention. Unlike software, parameters can tamper, and that leads it to be implemented for those situations in which data need to be secured and protected, while still ensuring full separation between the outside world and the inside world, as data diode can be ranged depending on their complexity from EVL 1 up to EVL 3 in terms of their security strength. In this paper, we provide a comprehensive review of the recent research efforts spared for the data-diodes ranging from their manufacturing to their applications. Furthermore, the paper presents a comparison of data-diodes from options offered by reputed vendors, highlighting the strengths and weekness of each of them.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"144 4","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120854767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Development of CAN and OBD-II Supported Experimental Setup for Vehicle ECU Data Acquisition","authors":"Süleyman Çeven, A. Albayrak, R. Bayir","doi":"10.1109/ICAIoT57170.2022.10121880","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121880","url":null,"abstract":"Today, CAN Bus protocol is widely used in various technological fields such as industrial, medical or automotive. Data is provided from ECUs and diagnostic codes through the OBD-II system, which is a standard in vehicles. The aim of this study is to develop an experimental setup to analyze driver driving skills based on vehicle data obtained over CAN Bus protocol with an open-source software. In this study, an experimental setup with a PiCAN 2 module and an LCD touch screen compatible with Raspberry Pi 3 Model B+ has been developed. Thanks to the developed experimental setup, it is connected to the vehicle ECU via an OBD-II connector to obtain real-time ECU data of the vehicle. This article presents validation tests to determine the design and construction phases of the system and its functionality as a data logger. Python programming language CAN software library was used on the experimental setup.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115242904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The study on the effects of the height of the core’s window on the leakage reactance of transformers using finite element analysis","authors":"Kamran Dawood, Semih Tursun, Ismet Kaymaz","doi":"10.1109/ICAIoT57170.2022.10121891","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121891","url":null,"abstract":"The short-circuit transformer’s behaviour can be easily predicted from its leakage reactance. The relationship between the height of the core window and leakage reactance of the transformers according to almost all of the analytical methods is assumed to be constant under different heights of the core window. This approach is not significantly accurate during severe cases such as those has small differences between the core height and winding height. Finite element analysis is computer software which can help manufacturers and engineers to speed up the process of optimising electrical machines. In this work, a finite element method is used to see the effect of the window height on the leakage reactance of the transformer under the different heights of the window of the core. The three-dimensional methods are used to evaluate the leakage reactance of the transformer for different heights of the core window. The results show that the transformer’s leakage reactance widely varies during the change in the height of the core window for the same geometry of the windings and electrical parameters of the transformer. Hence using analytical methods could result in inaccurate results. Moreover, considering the same ratio between the window height and windings height is no longer valid for all of the transformers.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Machine Tool Condition Monitoring System: A Review on Feasible Solution","authors":"N. M. Anas, M. Yusof, Mohamad Zarin Abdul Aziz","doi":"10.1109/ICAIoT57170.2022.10121847","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121847","url":null,"abstract":"The technique of assessing certain machine tool characteristics and recording any noteworthy changes that might portend an imminent failure is known as tools condition monitoring (TCM). It is broadly classified into offline and online condition monitoring. Offline condition monitoring is often utilized for less critical or semi-critical assets when routine scanning is enough to determine the tools' present status. Online condition monitoring, on the other hand, refers to the continuous assessment of the tools by wirelessly connecting machine-mounted sensors to integrated software to deliver real-time alerts for things like vibration analysis, acoustic emissions, ultrasound, and infrared thermography. TCM aims to optimize Small Medium Enterprise (SME) manufacturing operation, often characterized by high-mixed low-volume production scales, specifically on reducing parts defect by detecting malfunction of the computerized numerical control (CNC) machine tools at an early stage. Tool breakage or worn-out tools lead to product yield problems and unscheduled downtimes.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130252164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Impact of the COVID-19 Pandemic on Global Economic Growth: An Analytical Study","authors":"Mohammed Yousif Oudah Al-Muttar","doi":"10.1109/ICAIoT57170.2022.10121845","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121845","url":null,"abstract":"The COVID-19 pandemic originated in China and quickly spread to practically every country on the planet. Because there is no cure for the virus, countries are taking steps to prevent it from spreading. Many sectors, particularly the service sector, have seen significant reductions in activities, if not a full halt, due to these policies aimed at restricting human interaction. As a result, I will statistically assess the pandemic that has a significant impact on economic growth rates in both developing as well as developed countries. Without a doubt, the economy’s consequences will be determined by how long the pandemic lasts and when it returns to normal economic activity. The impacts of the COVID-19 pandemic on global economic growth are assessed in this paper.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121252878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hardware Design and Integration of Low-cost Edge AI Smart Power Management and Home Automation","authors":"B. Benadda, Adil Benabdellah","doi":"10.1109/ICAIoT57170.2022.10121892","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121892","url":null,"abstract":"The Internet of Things (IoT) is an unprecedented creation. Electronic objects are now able to interact, share, respond and adapt to their environment on a much larger basis. The actual spread of these modern means of connectivity and solutions with high data volume exchange is affecting our ways of life. Accommodation is becoming an intelligent living space, not only suited to the people’s circumstances and desires, but also to systems constraints to make daily life simpler, and cheaper, increase possibilities and achieve a higher level of services and luxury. This paper addresses hardware design and integration of smart home automation power consumption. Acting as an IoT, Artificial Intelligence (AI) solution and deep learning analysis, open the way for smart electricity usage based on power grid measurements, and user facility interactions. Electrical usage monitoring in hotel rooms, universities, and institutions are examples of use cases.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115204644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving emotion detection through artificial intelligence from EEG brainwave signals","authors":"Zaeem Ahmed, S. Shahid","doi":"10.1109/ICAIoT57170.2022.10121827","DOIUrl":"https://doi.org/10.1109/ICAIoT57170.2022.10121827","url":null,"abstract":"The detection of human mental states has applications in a variety of fields, including healthcare, robotics, neurology, etc. Fundamental human emotion can be identified by facial expressions or bodily movements, but when we need to evaluate the emotions specifically and more precisely. Electroencephalogram (EEG) neuroimaging and other techniques are still in the early stages of detecting a range of emotions shown by individuals. With this brain wave analysis, we will be able to comprehend a respondent’s true feelings, even if they are trying to hide them. The purpose of this study was to use EEG brain wave signals for the detection of emotions and to classify them into three mental states relax, neutral, and concentrating with the help of different artificial intelligence models. The publicly available dataset of the Muse headband was used which was comprised of EEG brainwave signals from four EEG sensors (AF7, AF8, TP9, TP10). As evaluators, we used machine learning models such as Nave Bayes, Bayes Net, J48, Random Tree, and Random Forest, as well as feature selection methods: OneR, information gain, correlation, and symmetrical uncertainty. The overall accuracy of Random Forest was better (95.07%) as compared to other models.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115394305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2022 ICAIoT Obituary","authors":"","doi":"10.1109/icaiot57170.2022.10121873","DOIUrl":"https://doi.org/10.1109/icaiot57170.2022.10121873","url":null,"abstract":"","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116496136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}