2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)最新文献

筛选
英文 中文
Design and Implementation of New Collision Resistant Fast Hash Function Family for IoT Healthcare Blockchain Ledger 物联网医疗区块链分类账新型抗碰撞快速哈希函数族的设计与实现
Ahmed Ali Fayez, Ammar Ibrahim El Sayed, Emad S. Othman, Emad A. Elsamahy, Bassam W. Aboshosha
{"title":"Design and Implementation of New Collision Resistant Fast Hash Function Family for IoT Healthcare Blockchain Ledger","authors":"Ahmed Ali Fayez, Ammar Ibrahim El Sayed, Emad S. Othman, Emad A. Elsamahy, Bassam W. Aboshosha","doi":"10.1109/3ICT56508.2022.9990894","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990894","url":null,"abstract":"Health care is one of the many fields where blockchain technology is being put to use in new and creative ways. When it comes to the medical industry, blockchain technology is being utilised to store and share patient data across healthcare organisations. It is possible to discover severe errors in the medical field using blockchain technology, which may even be potentially lethal. As a result, medical data interchange may become more efficient, secure, and transparent. Medical facilities may acquire insight and improve their analysis of patient data with the help of this technology. Using blockchain technology, we show how IoT devices in the healthcare industry might be more secure.The development of a novel hash function is based on the Unpredictability principle. Given that the IoT has constrained resources and power, we employed an S-box of AES-256 with an XOR operator. We also created a collision-proof, lightweight, and fast hash function. The outcomes of the suggested hash functions are as follows: (256, 384, and 512).","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124881689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Prediction of Cyber-attacks and Criminality Using Machine Learning Algorithms 使用机器学习算法预测网络攻击和犯罪
A. Swaminathan, Balamurali Ramakrishnan, K. M, S. R
{"title":"Prediction of Cyber-attacks and Criminality Using Machine Learning Algorithms","authors":"A. Swaminathan, Balamurali Ramakrishnan, K. M, S. R","doi":"10.1109/3ICT56508.2022.9990652","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990652","url":null,"abstract":"Cyber-attacks are quickly becoming one of the world's most serious problems. This crisis can be avoided by using real-time data to identify an attack and its perpetrator. The information can be obtained from the implementations of individuals who were subjected to cyber-attacks in forensic units. The information includes the criminal activity, the perpetrator's gender, impairment, and attack methods. This work use supervise Machine Learning (ML) methods to investigate cybercrime in four distinct models and predict the effects of the defined traits just on identification of the threat technique and the perpetrator. In our system, utilized three machine learning methods and predicted that their precision ratios would be close. In this paper, investigate digital misdoings in three distinct models using ML techniques, and forecast the impact of the characterized attributes on the spot of the electronic assault tactic and the perpetrator. In this investigation, will use three ML algorithms, Logistic Regression, Random Forest, and K-Nearest Neighbor (KNN) and compare their efficacy in two different models before concluding with the model that has the best survivability for every type of information index. Machine learning allows cyber security systems to assess and learn from patterns in order to detect and prevent terrorist acts and adapting to different behavior. It can assist cyber security teams in being more proactive in terms of preventing threats as well as reacting to malicious activities in real time.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123202275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Effective Galaxy Classification Using Fractal Analysis and Neural Network 基于分形分析和神经网络的有效星系分类
Priyanka S. Radhamani, M. S. Sharif, W. Elmedany
{"title":"An Effective Galaxy Classification Using Fractal Analysis and Neural Network","authors":"Priyanka S. Radhamani, M. S. Sharif, W. Elmedany","doi":"10.1109/3ICT56508.2022.9990776","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990776","url":null,"abstract":"Astronomy is always in a quest of revealing the mysteries of our Universe. There is a vast amount of astronomical data collected and this information comes from stars, galaxies and other celestial objects. While exploring this type of astronomical data, we can identify some complex self-similar patterns. Such self-similar patterns are shown in our own galaxy and are called fractals. This research work has been developed for finding such self-similarity that can be measured from galaxy clusters and this feature can be learned through a suitable neural network. This research work gives an insight about calculating the fractal dimension of galaxy images using a box counting algorithm and training the images using LeNet - 5. The box counting fractal dimension is a specified range of values for each particular class of galaxy. By using the fractal dimension as a primary feature of different classes of galaxy and with the help of LeNet-5 network model classifying the galaxy images into ten specified classes according to its morphological properties. The model produced an accuracy of 74% when implemented with the baseline algorithm. When implemented with LeNet- 5 it produced an accuracy of 96%. The precision recall and f1-Score value of the LeNet-5 model was also calculated. The precision recall and f1-Score value for class 1, class 2, class 4 and class 6 were higher than those of the other classes.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126823021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application of Industrialised Building System in the Field of Construction toward Sustainability: Future Routes and a Theoretical Mapping 工业化建筑体系在可持续建筑领域的应用:未来路线和理论映射
A. M. Alawag, W. Alaloul, M. S. Liew, Ammar AL-Ashmori, A. Alqadami, Syed Ammad
{"title":"Application of Industrialised Building System in the Field of Construction toward Sustainability: Future Routes and a Theoretical Mapping","authors":"A. M. Alawag, W. Alaloul, M. S. Liew, Ammar AL-Ashmori, A. Alqadami, Syed Ammad","doi":"10.1109/3ICT56508.2022.9990879","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990879","url":null,"abstract":"Industrialized Building System (IBS) is a construction system in which components are factory-made in a measured atmosphere (on or off-site), placed, conveyed, and collected on site with minimal additional site activities, according to the Construction Industry Development Board Malaysia (CIDB). The application of IBS in construction projects could significantly improve site performance in terms of protection, quality, charge efficiency, production, sustainability and waste reduction. In the construction industry, sustainability has become increasingly essential. Meanwhile, due to the extremely difficult constraints that stakeholders encounter in adopting new technology and a scarcity of experienced labour, the degree of IBS implementation in Malaysia remains low. According to several studies, typical IBS is gradually being pushed to the background. However, no systematic study applying bibliometric examination of IBS studies to more investigate relevant study in this field was uncovered. This study offers an outline of the IBS current studies gathered from \"Web of Science\" database. To visualise the material included in the study scope, VOSviewer was combined with bibliometric analytic techniques. As a conclusion, six clusters were discovered that focused on these primary theme segments: IBS approach, prefabrication, construction, innovation, sustainability, and management. Based on the current gap, this paper makes recommendations for future IBS research. Assisting the IBS research community with research and development.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117103182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An IoT-based Condition-Boosting Solution for the Oil Upstream Industry 面向石油上游行业的物联网状态提升解决方案
Hussain K. Mohammad, Mohammed H. AlEad, A. A. Abdullah, Abdullah A. H. Hussain, A. Mohammad, W. Farag
{"title":"An IoT-based Condition-Boosting Solution for the Oil Upstream Industry","authors":"Hussain K. Mohammad, Mohammed H. AlEad, A. A. Abdullah, Abdullah A. H. Hussain, A. Mohammad, W. Farag","doi":"10.1109/3ICT56508.2022.9990887","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990887","url":null,"abstract":"In this paper, a smart solution is proposed to enhance the performance and monitor the condition of the Upstream Oil equipment. The upstream equipment includes the Electrical Submersible Pumps (ESPs) and Horizontal Surface Pumps (HSPs). Interruption of the operation of oil-extraction pumps due to failures results in lower production with negative economic consequences. Therefore, the main objective of the developed system is to boost efficiency and mitigate the failures of the production system. The design is using an Internet of Things (IoT) framework which mainly incorporates wireless sensors and explanatory visual dashboards. The idea is to provide the oil-production-site manager/officer with the ability to monitor the operation of upstream oil equipment of all oil wells under his authority at his fingertips using a web portal or through his smart mobile phone. The site manager can then take correct, prompt, and proactive decisions to overcome any foreseen problems in production continuity. The proposed solution incorporates several intelligent algorithms and sophisticated techniques to continually check the health of the upstream system and report its effectiveness as well as to detect potential malfunctions and abnormal situations. Several test scenarios are developed to evaluate the proposed solution that has been implemented as an upstream oil-extraction prototype. The testing results show that failures that can occur can be predicted ahead of their occurrence.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124641955","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Railway Condition Monitoring and Fault Detection Based on YOLOv4 基于YOLOv4的铁路状态监测与故障检测
Merve Yilmazer, M. Karakose
{"title":"Railway Condition Monitoring and Fault Detection Based on YOLOv4","authors":"Merve Yilmazer, M. Karakose","doi":"10.1109/3ICT56508.2022.9990640","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990640","url":null,"abstract":"Regular maintenance of the line is critical for safety in railway transportation, which constitutes an important part of the transportation system. Due to the high error rate of manual fault detection methods, non-contact fault detection methods have been developed. Railway switch state and level crossing faults are frequently encountered in the occurrence of train accidents. A new method based on YOLOv4 has been proposed for condition monitoring and fault detection in these rail sections. The YOLOv4 deep neural network was trained using four class label datasets consisting of real railway visual data. Model evaluated using test data. Performance evaluation was made using evaluation metrics. Experimental results showed that the model could detect correctly with 96.8% accuracy.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114862676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Cybersecurity Architecture to Mitigate Shamoon Attacks 减少Shamoon攻击的网络安全架构
Theyab Alrubaie, W. Elmedany, N. Ababneh, S. Zeadally, K. Curran
{"title":"A Cybersecurity Architecture to Mitigate Shamoon Attacks","authors":"Theyab Alrubaie, W. Elmedany, N. Ababneh, S. Zeadally, K. Curran","doi":"10.1109/3ICT56508.2022.9990865","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990865","url":null,"abstract":"Shamoon attacks are one of the most recent Advanced Persistent Threat (APT) attacks that is being used against several organizations in the energy sector in Saudi Arabia. It is a very destructive malware that corrupts files on the targeted computer and overwrites the Master Boot Record (MBR) to render a computer unusable. In this paper, we propose an enhanced cybersecurity architecture that helps in the effort of halting the chain of attack at any stage and mitigate Shamoon attacks. Before that, we analyze the historical, tactical, and technical aspects of the Shamoon attacks. Our analysis explores the various methods of attack and the different stages through which the attackers achieve their penetration to the targeted organization network. By conducting such analysis, we reveal the weaknesses of the cybersecurity architecture that were exploited by the attackers.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Two-Dimensional Uncertainty Analysis for Cp and Cpk Process Capability Indices Cp和Cpk工艺能力指标的二维不确定性分析
S. Yalçın, I. Kaya
{"title":"Two-Dimensional Uncertainty Analysis for Cp and Cpk Process Capability Indices","authors":"S. Yalçın, I. Kaya","doi":"10.1109/3ICT56508.2022.9990896","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990896","url":null,"abstract":"Process capability analysis (PCA) is an efficient statistical technique for calculating of process’ ability to meet predetermined specification limits (SLs) that defined by customer, engineers or designers. Measurements and evaluations for PCA may be vague, incomplete or inaccurate in the real-case problems. In that cases, the process capability should be successfully measured by using fuzzy set extensions to model uncertainties of the process. One of fuzzy set extensions named Pythagorean fuzzy Sets (PFSs) that also contains the non-membership function can be employed as an effective tool to model uncertainty better than traditional fuzzy sets (TFSs). In this paper, a novel approach based on PFSs is suggested to increase flexibility and sensitivity of the PCA and to successfully model the uncertainties. For this aim, two of frequently used process capability indices (PCIs) Cp and Cpk, are analyzed based on PFSs. Then, the Pythagorean fuzzy process capability indices (PFPCIs) have been derivate respectively for the indices ${tilde C_p}$ and ${tilde C_{pk}}$ and the mathematical backgrounds of these indices have been developed for the first time in the literature. Additionally, the proposed indices ${tilde C_p}$ and ${tilde C_{pk}}$ have been applied to a real case problem from manufacturing industry. The obtained PCIs based on PFSs provide some additional flexibility and information about the process since they better modeled process uncertainty. Moreover, it is demonstrated that the proposed PFCPIs can be effectively applied on process to manage PCA.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127971749","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Use of UML Diagrams to Enhance Dynamic Feature Location Techniques 使用UML图来增强动态特征定位技术
F. Buzaid, F. Albalooshi, W. Elmedany
{"title":"The Use of UML Diagrams to Enhance Dynamic Feature Location Techniques","authors":"F. Buzaid, F. Albalooshi, W. Elmedany","doi":"10.1109/3ICT56508.2022.9990768","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990768","url":null,"abstract":"Unified Modeling Language (UML) is an efficient technique that can be implemented to model and visualize an object-oriented system that suffers from lack or poor documentation. UML diagrams enhance the developers’ understanding the software system to apply software maintenance, software evaluation, or Dynamic Feature Location Techniques (DFLTs). The construction of UML diagrams is based on dynamic or static analysis. Dynamic analysis refers to collecting data when the system executes to generate execution traces, while static analysis refers to collecting the data from the source code. This paper implements UML diagrams in both directions, dynamic and static analysis, to enhance the software programmers applying DFLTs. A use case scenario diagram is used to specify the inputs of the DFLTs based on static analysis. In contrast, class diagrams and object diagrams are used to locate the required software artifacts of source code to construct the exercised feature based on dynamic analysis. Each created use case scenario generates an execution trace. The collected execution trace is analyzed to build class and object diagrams. The implemented case study illustrates the process of the proposed approach and shows that using UML diagrams increases the accuracy of applying DFLTs.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134088806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance analysis of PRIME Technology based on QPSK and 16/64-QAM of power line communication 基于QPSK和16/64-QAM电力线通信的PRIME技术性能分析
Shaimaa Mudhafar Hashim, I. B. Al-Mashhadani
{"title":"Performance analysis of PRIME Technology based on QPSK and 16/64-QAM of power line communication","authors":"Shaimaa Mudhafar Hashim, I. B. Al-Mashhadani","doi":"10.1109/3ICT56508.2022.9990848","DOIUrl":"https://doi.org/10.1109/3ICT56508.2022.9990848","url":null,"abstract":"Data transmission over power lines as a medium for information transmission over a traditional grid system is a relatively new area of telecommunication. This study investigates one of the power line communications (PLC)technologies categorized within a physical layer PRIME (Power line Intelligent Metering Evolution) tested in MATLAB. The performance of PRIME data is modulated using QPSK (Quadratic Phase Shift Keying), and 16/64 QAM (Quadratic Amplitude Modulation) with additive white gaussian noise (AWGN)based on which of these modulations is the best performance system based on the bit error rate (BER)and signal to noise ratio Eb/N0 (dB). The results reveal that the performance of the proposed approach generated a superior signal quality model when using 64-QAM compared with that of 16-QAM and QPSK, where the BER is 0.0198, the Eb/N0 is 0 dB in QPSK modulation, whereas it is 2.4 dB when using 16-QAM modulation, and 6.1 dB when using 64-QAM modulation. Then tested many cases for comparison of the BER is 0.01 and Eb/N0 when using just QPSK modulation is 4.2 dB without any channel coder, using QPSK modulation with a convolutional encoder is 4.93 dB, and using QPSK modulation with Reed-Solomon coding (RS coding) is 5.3 dB. It was proved that the tested case of QPSK with RS coding has the best signal quality compared to other cases.","PeriodicalId":361876,"journal":{"name":"2022 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131620262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信