2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)最新文献

筛选
英文 中文
An Optimized Approach for Efficient-Power and Low-Latency Fog Environment Based on the PSO Algorithm 基于粒子群算法的高效低时延雾环境优化方法
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773443
Ishraq Madhi Jabour, Hilal Abbood Al-Libawy
{"title":"An Optimized Approach for Efficient-Power and Low-Latency Fog Environment Based on the PSO Algorithm","authors":"Ishraq Madhi Jabour, Hilal Abbood Al-Libawy","doi":"10.1109/IT-ELA52201.2021.9773443","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773443","url":null,"abstract":"Fog Computing is an architecture that provides computing, storage, control and networking capacities for realizing Internet of Thing applications. Fog computing enhances the QoS Applications sensitive to delay, enable them to use fog computing's low latency instead of the large cloud latency. Tasks in different IoT applications should be correctly dispersed through fog nodes, improving service quality and reaction time. Many research papers have been published to investigate either latency or power consumption improvement. However, this new research area still further research. This article work seeks to examine how IoT services are placed and processing data in a Fog system with low latency and low power consumption in optimal way. The meta heuristics Particle Swarm Optimization (PSO) algorithm is suggested for the proposed approach to manage network resources (latency and power consumption). For testing purposes, the well-known “iFogSim” simulator is used to setup an experiment and to build a case study network in fog layer based on virtual reality EEG game. The simulation results for the suggested experiment show that the PSO algorithm has better performance than competitive approaches such as First Come First Serve (FCFS) and Greedy Knapsack -based Scheduling (GKS) algorithms. The simulated results that we get when applying PSO optimizer in power and latency outperforms other algorithms. The result of latency is (in FCFS =1.39ms, in GKS =1.23ms, in PSO=1.12ms) and the results of power consumption is (in FCFS =1.63mj, in GKS =1.13mj, in PSO=1.09mj).","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116592787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Current Trends of DDoS Detection in SDN Environment SDN环境下DDoS检测的发展趋势
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773744
Mohammed Ibrahim Kareem, M. Jasim
{"title":"The Current Trends of DDoS Detection in SDN Environment","authors":"Mohammed Ibrahim Kareem, M. Jasim","doi":"10.1109/IT-ELA52201.2021.9773744","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773744","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks are one of the dangerous threats to networks, as they are easily operated and difficult to detect, so they frequently occur, and this field of research is fertile to find efficient ways to detect and deal with this type of attacks. Software Defined Networking (SDN) which represents one of the most elegant technologies to make network management and configuration easy by increasing network programmability. SDN is characterized by their centralized management and control, so it becomes more attractive to DDoS attacks to affect the whole network. This research presents a survey on security trends on SDN environment and investigate the most known methods for detecting a DDoS attack from different sources and analyze them to highlight the way to the interested researchers in the field.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130593650","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Text Encryption Approach Using DNA Computation and Hyperchaotic System 基于DNA计算和超混沌系统的文本加密方法
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773674
Siham OleiwiTuama, S. A. Kadum, Zahraa A. Hussein
{"title":"Text Encryption Approach Using DNA Computation and Hyperchaotic System","authors":"Siham OleiwiTuama, S. A. Kadum, Zahraa A. Hussein","doi":"10.1109/IT-ELA52201.2021.9773674","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773674","url":null,"abstract":"“Security” has formed into a critical concern in the digital data storage and transfer via communication that is not secure channels, which can be addressed by employing trusted encryption methods. Because of its remarkable superior qualities, such as simplicity, high security, and speed faster, chaos-based encryption algorithms are becoming more prominent. Furthermore, employing DNA in cryptography opens a new area due to three factors: storage capacity, computation power, and parallelism. “This paper for text encryption, a hyperchaotic sequence and a DNA sequence are used together. The intensity levels of an input text are translated to a serial binary digit stream, and the hyperchaotic sequence scrambles this bitstream globally. To achieve a robust encryption performance, DNA operations are done between the hyperchaotic sequence and the DNA sequence. The findings of the experiment show that the encryption algorithm outperforms state-of-the-art approaches in terms of quality, security, and robustness. resistant to brute force attacks. and has a bigger key space.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131719459","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
9-level Symmetrical Cascaded Switched-Diode with Artificial Bee Colony Optimizer 9电平对称级联开关二极管与人工蜂群优化器
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773722
M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, Sayf A. Majeed
{"title":"9-level Symmetrical Cascaded Switched-Diode with Artificial Bee Colony Optimizer","authors":"M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, Sayf A. Majeed","doi":"10.1109/IT-ELA52201.2021.9773722","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773722","url":null,"abstract":"Multilevel inverters (MLIs) are power electronic circuits that is used to replace traditional two-level inverters. MLIs allow for more flexible control of the dv/dt and di/dt ratios, as well as a greater number of output levels in voltage and current in staircase waveforms. The design of a traditional multilevel inverter, on the other hand, necessitates additional power switches and has limitations in a broad variety of applications. In this paper, the new approach known as Symmetrical Cascaded Switched-Diode (SCSD) is used to form a nine-level output voltage with fewer switches and its aim to remove low-order harmonics like the 3rd, 5th, and 7th. The switching angles were determined using the Artificial Bee Colony (ABC) Optimizer method and non-linear equations obtained from the Fourier series of the output voltage and current waveform. The suggested circuit was tested with two modulation indices, modelled using PSIM software, and assessed by experimentation. THD for modulation index 0.62 is around 7.09 percent for simulation and 7.7 percent for experimental results, while modulation index 0.84 produces 4.08 percent for simulation and 4.5 percent for experimental results.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128008879","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile Wireless Network Security - Status, Challenges and Future Trends 移动无线网络安全——现状、挑战和未来趋势
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773648
S. Sadkhan
{"title":"Mobile Wireless Network Security - Status, Challenges and Future Trends","authors":"S. Sadkhan","doi":"10.1109/IT-ELA52201.2021.9773648","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773648","url":null,"abstract":"Through the development in technology, there is an increasing demand for wireless networks based on IEEE 802.11 protocol that provides a promising coverage area, WiMAX and WiMobile provide a promising future for its mobility, flexibility, and increasing demand to access services from anywhere. Today, cellular technology is developing rapidly, however, when using this technology with special features, The future vulnerabilities can be considered as one of the most important challenges that face the protect. Many methods can be used to solve problems such as encryption, information hiding, hybrid crypto and steganography methods and others. Digital signatures and modern key switching techniques are used in wireless networks for many areas.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128068116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of Symmetrical and Asymmetrical Multilevel Inverter using GWO Algorithm 用GWO算法分析对称与非对称多电平逆变器
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773394
M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, A. Darghaoth
{"title":"Analysis of Symmetrical and Asymmetrical Multilevel Inverter using GWO Algorithm","authors":"M. Z. Aihsan, M. I. Fahmi, M. Saifizi, W. Mustafa, H. F. Liew, A. Alkhayyat, A. Darghaoth","doi":"10.1109/IT-ELA52201.2021.9773394","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773394","url":null,"abstract":"This article presents a single-phase multilevel inverter with reduced switches technique to generate 9-level output voltage waveform during symmetric operation and 17-level output voltage waveform during asymmetric operation. The generation of firing angles for each power switches are tuned by using the Grey Wolf Optimization technique. The purpose of this study is to investigate the capability of the propose multilevel circuit on handling the different voltage injection to form the symmetrical and asymmetrical operation in a real hardware implementation. The proposed topology only used 10 units of power switches to from 17-level output voltage waveform compared to the conventional multilevel topology which requires 32 units of power switches. The reduction of power switches has significantly reduced the converter size as well as the power consumption for the controller and driver circuit. The feasibility of the proposed technique has been validated using MATLAB/Simulink software and through experimental results. The results will be focused on the harmonic performance and the amount of THD for asymmetrical is much lower compared to the symmetrical configuration.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115629232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Learning Classifier System for Detection of Service-Level Agreement Violations in Business Process 业务流程中服务水平协议违规检测的学习分类器系统
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773515
Hawraa Abdulameer Subeh, Ahmed Al-Ajeli
{"title":"A Learning Classifier System for Detection of Service-Level Agreement Violations in Business Process","authors":"Hawraa Abdulameer Subeh, Ahmed Al-Ajeli","doi":"10.1109/IT-ELA52201.2021.9773515","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773515","url":null,"abstract":"A service-Level Agreement (SLA) is a contract made between service providers and customers. This contract includes some constraints whose aim is to maintain a certain level of quality of service. A violation of such SLA constraints can be seen as a fault which means the failure of service guarantee. Since events in the system being analyzed are partially observable, this raises the most interesting case to address this problem. In this paper, a machine learning technique based on Learning Classifier System (LCS) to detect such violations is proposed. Thus, Anticipatory Classifier System (ACS) - a form of the LCS to deal with the case of partial observation is used. A typical example in a telecommunication company is used as a case study to generate the dataset utilized to train the model. The experimental results show a promising performance with an accuracy of 99%. In addition, the resulting model can give a timely decision whether a violation has occurred or not.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116972397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel Block Cipher: Surrounding Elements Technique using Symmetric Key 新型分组密码:对称密钥包围元技术
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773639
Baqer M. Merzah
{"title":"Novel Block Cipher: Surrounding Elements Technique using Symmetric Key","authors":"Baqer M. Merzah","doi":"10.1109/IT-ELA52201.2021.9773639","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773639","url":null,"abstract":"In recent years, technology advanced rapidly. Therefore, ensuring the security of information transmitted over the Internet is necessary. To increase data security and confidentiality, different encryption algorithms were developed. In this study, to enhance security, a new symmetric key encryption algorithm is proposed by generating key blocks based on random numbers sent from a sender to a receiver. For encryption, the XOR operation is performed on the surrounding elements of the plaintext block with the key block and on the middle elements of the plaintext block with the new elements generated after the previous XOR operation. The proposed encryption technique was evaluated and the results show the efficiency of the proposed technology in generating keys. The proposed technique tested on different data sizes and results obtained that show the effectiveness and efficiency in the time of encryption and decryption.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"89 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126222582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arabic light-based stemming: a comparative study among ligh10 stemmer, P-stemmer, and Conditional light stemmer 阿拉伯语光基词干:光茎、p茎和条件光茎的比较研究
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773743
Sabria Mohammed Hussien, Hazim J. Aburagheef
{"title":"Arabic light-based stemming: a comparative study among ligh10 stemmer, P-stemmer, and Conditional light stemmer","authors":"Sabria Mohammed Hussien, Hazim J. Aburagheef","doi":"10.1109/IT-ELA52201.2021.9773743","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773743","url":null,"abstract":"Arabic stemming is a key stage in natural language processing's preprocessing (NLP). It takes affixes out of words. It improves text classification (TC) as well as information retrieval (IR). Light-based stemming and root-based stemming are the two types of stem. When compared to root-based stemming, light-based stemming consumes more energy. Only suffixes and prefixes are removed from the words. The light10 stemmer, the p-stemmer, and conditional light stemming (CondLight) are three well-known methods of light stemming. Prefixes and suffixes are removed by Light10 stemmers under a few conditions. Only prefixes are removed by the P-stemmer, while the CondLight stemmer is the same as the Light10 stemmer but with eight conditions. We measured the extent of improvement in Arabic TC by evaluating the stemmers. Three classifiers employ the Support Vector Machine (SVM), the k-nearest neighbor algorithm (KNN), Nave Bays (NB), and statistical similarity measurement. With stemming, the outcome indicates a small improvement (about 2 percent improvement).","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129408988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Splicing DNA Model for Unknown Stream Cipher Cryptanalysis 未知流密码分析的剪接DNA模型
2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA) Pub Date : 2021-12-28 DOI: 10.1109/IT-ELA52201.2021.9773767
B. S. Yaseen
{"title":"Splicing DNA Model for Unknown Stream Cipher Cryptanalysis","authors":"B. S. Yaseen","doi":"10.1109/IT-ELA52201.2021.9773767","DOIUrl":"https://doi.org/10.1109/IT-ELA52201.2021.9773767","url":null,"abstract":"The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114604399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信