{"title":"An Optimized Approach for Efficient-Power and Low-Latency Fog Environment Based on the PSO Algorithm","authors":"Ishraq Madhi Jabour, Hilal Abbood Al-Libawy","doi":"10.1109/IT-ELA52201.2021.9773443","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773443","url":null,"abstract":"Fog Computing is an architecture that provides computing, storage, control and networking capacities for realizing Internet of Thing applications. Fog computing enhances the QoS Applications sensitive to delay, enable them to use fog computing's low latency instead of the large cloud latency. Tasks in different IoT applications should be correctly dispersed through fog nodes, improving service quality and reaction time. Many research papers have been published to investigate either latency or power consumption improvement. However, this new research area still further research. This article work seeks to examine how IoT services are placed and processing data in a Fog system with low latency and low power consumption in optimal way. The meta heuristics Particle Swarm Optimization (PSO) algorithm is suggested for the proposed approach to manage network resources (latency and power consumption). For testing purposes, the well-known “iFogSim” simulator is used to setup an experiment and to build a case study network in fog layer based on virtual reality EEG game. The simulation results for the suggested experiment show that the PSO algorithm has better performance than competitive approaches such as First Come First Serve (FCFS) and Greedy Knapsack -based Scheduling (GKS) algorithms. The simulated results that we get when applying PSO optimizer in power and latency outperforms other algorithms. The result of latency is (in FCFS =1.39ms, in GKS =1.23ms, in PSO=1.12ms) and the results of power consumption is (in FCFS =1.63mj, in GKS =1.13mj, in PSO=1.09mj).","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Current Trends of DDoS Detection in SDN Environment","authors":"Mohammed Ibrahim Kareem, M. Jasim","doi":"10.1109/IT-ELA52201.2021.9773744","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773744","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are one of the dangerous threats to networks, as they are easily operated and difficult to detect, so they frequently occur, and this field of research is fertile to find efficient ways to detect and deal with this type of attacks. Software Defined Networking (SDN) which represents one of the most elegant technologies to make network management and configuration easy by increasing network programmability. SDN is characterized by their centralized management and control, so it becomes more attractive to DDoS attacks to affect the whole network. This research presents a survey on security trends on SDN environment and investigate the most known methods for detecting a DDoS attack from different sources and analyze them to highlight the way to the interested researchers in the field.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Text Encryption Approach Using DNA Computation and Hyperchaotic System","authors":"Siham OleiwiTuama, S. A. Kadum, Zahraa A. Hussein","doi":"10.1109/IT-ELA52201.2021.9773674","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773674","url":null,"abstract":"“Security” has formed into a critical concern in the digital data storage and transfer via communication that is not secure channels, which can be addressed by employing trusted encryption methods. Because of its remarkable superior qualities, such as simplicity, high security, and speed faster, chaos-based encryption algorithms are becoming more prominent. Furthermore, employing DNA in cryptography opens a new area due to three factors: storage capacity, computation power, and parallelism. “This paper for text encryption, a hyperchaotic sequence and a DNA sequence are used together. The intensity levels of an input text are translated to a serial binary digit stream, and the hyperchaotic sequence scrambles this bitstream globally. To achieve a robust encryption performance, DNA operations are done between the hyperchaotic sequence and the DNA sequence. The findings of the experiment show that the encryption algorithm outperforms state-of-the-art approaches in terms of quality, security, and robustness. resistant to brute force attacks. and has a bigger key space.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131719459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, Sayf A. Majeed
{"title":"9-level Symmetrical Cascaded Switched-Diode with Artificial Bee Colony Optimizer","authors":"M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, Sayf A. Majeed","doi":"10.1109/IT-ELA52201.2021.9773722","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773722","url":null,"abstract":"Multilevel inverters (MLIs) are power electronic circuits that is used to replace traditional two-level inverters. MLIs allow for more flexible control of the dv/dt and di/dt ratios, as well as a greater number of output levels in voltage and current in staircase waveforms. The design of a traditional multilevel inverter, on the other hand, necessitates additional power switches and has limitations in a broad variety of applications. In this paper, the new approach known as Symmetrical Cascaded Switched-Diode (SCSD) is used to form a nine-level output voltage with fewer switches and its aim to remove low-order harmonics like the 3rd, 5th, and 7th. The switching angles were determined using the Artificial Bee Colony (ABC) Optimizer method and non-linear equations obtained from the Fourier series of the output voltage and current waveform. The suggested circuit was tested with two modulation indices, modelled using PSIM software, and assessed by experimentation. THD for modulation index 0.62 is around 7.09 percent for simulation and 7.7 percent for experimental results, while modulation index 0.84 produces 4.08 percent for simulation and 4.5 percent for experimental results.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mobile Wireless Network Security - Status, Challenges and Future Trends","authors":"S. Sadkhan","doi":"10.1109/IT-ELA52201.2021.9773648","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773648","url":null,"abstract":"Through the development in technology, there is an increasing demand for wireless networks based on IEEE 802.11 protocol that provides a promising coverage area, WiMAX and WiMobile provide a promising future for its mobility, flexibility, and increasing demand to access services from anywhere. Today, cellular technology is developing rapidly, however, when using this technology with special features, The future vulnerabilities can be considered as one of the most important challenges that face the protect. Many methods can be used to solve problems such as encryption, information hiding, hybrid crypto and steganography methods and others. Digital signatures and modern key switching techniques are used in wireless networks for many areas.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, A. Darghaoth
{"title":"Analysis of Symmetrical and Asymmetrical Multilevel Inverter using GWO Algorithm","authors":"M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, A. Darghaoth","doi":"10.1109/IT-ELA52201.2021.9773394","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773394","url":null,"abstract":"This article presents a single-phase multilevel inverter with reduced switches technique to generate 9-level output voltage waveform during symmetric operation and 17-level output voltage waveform during asymmetric operation. The generation of firing angles for each power switches are tuned by using the Grey Wolf Optimization technique. The purpose of this study is to investigate the capability of the propose multilevel circuit on handling the different voltage injection to form the symmetrical and asymmetrical operation in a real hardware implementation. The proposed topology only used 10 units of power switches to from 17-level output voltage waveform compared to the conventional multilevel topology which requires 32 units of power switches. The reduction of power switches has significantly reduced the converter size as well as the power consumption for the controller and driver circuit. The feasibility of the proposed technique has been validated using MATLAB/Simulink software and through experimental results. The results will be focused on the harmonic performance and the amount of THD for asymmetrical is much lower compared to the symmetrical configuration.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Learning Classifier System for Detection of Service-Level Agreement Violations in Business Process","authors":"Hawraa Abdulameer Subeh, Ahmed Al-Ajeli","doi":"10.1109/IT-ELA52201.2021.9773515","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773515","url":null,"abstract":"A service-Level Agreement (SLA) is a contract made between service providers and customers. This contract includes some constraints whose aim is to maintain a certain level of quality of service. A violation of such SLA constraints can be seen as a fault which means the failure of service guarantee. Since events in the system being analyzed are partially observable, this raises the most interesting case to address this problem. In this paper, a machine learning technique based on Learning Classifier System (LCS) to detect such violations is proposed. Thus, Anticipatory Classifier System (ACS) - a form of the LCS to deal with the case of partial observation is used. A typical example in a telecommunication company is used as a case study to generate the dataset utilized to train the model. The experimental results show a promising performance with an accuracy of 99%. In addition, the resulting model can give a timely decision whether a violation has occurred or not.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Novel Block Cipher: Surrounding Elements Technique using Symmetric Key","authors":"Baqer M. Merzah","doi":"10.1109/IT-ELA52201.2021.9773639","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773639","url":null,"abstract":"In recent years, technology advanced rapidly. Therefore, ensuring the security of information transmitted over the Internet is necessary. To increase data security and confidentiality, different encryption algorithms were developed. In this study, to enhance security, a new symmetric key encryption algorithm is proposed by generating key blocks based on random numbers sent from a sender to a receiver. For encryption, the XOR operation is performed on the surrounding elements of the plaintext block with the key block and on the middle elements of the plaintext block with the new elements generated after the previous XOR operation. The proposed encryption technique was evaluated and the results show the efficiency of the proposed technology in generating keys. The proposed technique tested on different data sizes and results obtained that show the effectiveness and efficiency in the time of encryption and decryption.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Arabic light-based stemming: a comparative study among ligh10 stemmer, P-stemmer, and Conditional light stemmer","authors":"Sabria Mohammed Hussien, Hazim J. Aburagheef","doi":"10.1109/IT-ELA52201.2021.9773743","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773743","url":null,"abstract":"Arabic stemming is a key stage in natural language processing's preprocessing (NLP). It takes affixes out of words. It improves text classification (TC) as well as information retrieval (IR). Light-based stemming and root-based stemming are the two types of stem. When compared to root-based stemming, light-based stemming consumes more energy. Only suffixes and prefixes are removed from the words. The light10 stemmer, the p-stemmer, and conditional light stemming (CondLight) are three well-known methods of light stemming. Prefixes and suffixes are removed by Light10 stemmers under a few conditions. Only prefixes are removed by the P-stemmer, while the CondLight stemmer is the same as the Light10 stemmer but with eight conditions. We measured the extent of improvement in Arabic TC by evaluating the stemmers. Three classifiers employ the Support Vector Machine (SVM), the k-nearest neighbor algorithm (KNN), Nave Bays (NB), and statistical similarity measurement. With stemming, the outcome indicates a small improvement (about 2 percent improvement).","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Splicing DNA Model for Unknown Stream Cipher Cryptanalysis","authors":"B. S. Yaseen","doi":"10.1109/IT-ELA52201.2021.9773767","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773767","url":null,"abstract":"The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}