Jordanian Journal of Computers and Information Technology最新文献

筛选
英文 中文
A HYPER-SURFACE-BASED MODELING AND CORRECTION OF BIAS FIELD IN MR IMAGES 基于超表面的Mr图像偏置场建模与校正
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1617051919
Daouia Azzouz, S. Mazouzi
{"title":"A HYPER-SURFACE-BASED MODELING AND CORRECTION OF BIAS FIELD IN MR IMAGES","authors":"Daouia Azzouz, S. Mazouzi","doi":"10.5455/jjcit.71-1617051919","DOIUrl":"https://doi.org/10.5455/jjcit.71-1617051919","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"35 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70819954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Decreasing the RA Collision Impact for Massive NB-IoT in 5G Wireless Networks 降低5G无线网络中大规模NB-IoT的RA碰撞影响
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1620292048
Bilal Doori, Ahmed Zurfi
{"title":"Decreasing the RA Collision Impact for Massive NB-IoT in 5G Wireless Networks","authors":"Bilal Doori, Ahmed Zurfi","doi":"10.5455/jjcit.71-1620292048","DOIUrl":"https://doi.org/10.5455/jjcit.71-1620292048","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Intrusion Detection Systems Using Supervised Machine Learning Classification and Dimensionality Reduction Techniques: A Systematic Review 使用监督机器学习分类和降维技术的网络入侵检测系统:系统综述
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1629527707
Zein Ashi, Laila Aburashed, M. Qudah, A. Qusef
{"title":"Network Intrusion Detection Systems Using Supervised Machine Learning Classification and Dimensionality Reduction Techniques: A Systematic Review","authors":"Zein Ashi, Laila Aburashed, M. Qudah, A. Qusef","doi":"10.5455/jjcit.71-1629527707","DOIUrl":"https://doi.org/10.5455/jjcit.71-1629527707","url":null,"abstract":"Protecting the confidentiality, integrity and availability of cyberspace and network (NW) assets has become an increasing concern. The rapid increase in the Internet size and the presence of new computing systems (like Cloud) are creating great incentives for intruders. Therefore, security engineers have to develop new technologies to match growing threats to NWs. New and advanced technologies have emerged to create more efficient intrusion detection systems using machine learning (ML) and dimensionality reduction techniques, to help security engineers bolster more effective NW Intrusion Detection Systems (NIDSs). This systematic review provides a comprehensive review of the most recent NIDS using the supervised ML classification and dimensionality reduction techniques, it shows how the used ML classifiers, dimensionality reduction techniques and evaluating metrics have improved NIDS construction. The key point of this study is to provide up-to-date knowledge for new interested researchers.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WORKFLOW SCHEDULING ACCORDING TO DATA DEPENDENCIES IN COMPUTATIONAL CLOUDS 计算云中基于数据依赖的工作流调度
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1626545510
Batoul Khazaie, Hamid Saadatfar
{"title":"WORKFLOW SCHEDULING ACCORDING TO DATA DEPENDENCIES IN COMPUTATIONAL CLOUDS","authors":"Batoul Khazaie, Hamid Saadatfar","doi":"10.5455/jjcit.71-1626545510","DOIUrl":"https://doi.org/10.5455/jjcit.71-1626545510","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE 提高军事自我保护软件的安全性
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1620148110
C. Gonzalez
{"title":"INCREASING SECURITY IN MILITARY SELF-PROTECTED SOFTWARE","authors":"C. Gonzalez","doi":"10.5455/jjcit.71-1620148110","DOIUrl":"https://doi.org/10.5455/jjcit.71-1620148110","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820000","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
BRAIN-INSPIRED SPIKING NEURAL NETWORKS FOR WI-FI BASED HUMAN ACTIVITY RECOGNITION 基于wi-fi的人类活动识别的大脑激发的脉冲神经网络
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1629096728
Y. Tan, Yan Wong, S. Radzi
{"title":"BRAIN-INSPIRED SPIKING NEURAL NETWORKS FOR WI-FI BASED HUMAN ACTIVITY RECOGNITION","authors":"Y. Tan, Yan Wong, S. Radzi","doi":"10.5455/jjcit.71-1629096728","DOIUrl":"https://doi.org/10.5455/jjcit.71-1629096728","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"14 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks 一种基于移动代理的无线传感器网络天坑攻击对抗方法
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1632893264
Hadi Khosravi, Mohammad Ghasemigol
{"title":"A Mobile Agent-Based Method to Counter Sinkhole Attacks in Wireless Sensor Networks","authors":"Hadi Khosravi, Mohammad Ghasemigol","doi":"10.5455/jjcit.71-1632893264","DOIUrl":"https://doi.org/10.5455/jjcit.71-1632893264","url":null,"abstract":"Wireless sensor networks (WSNs) are an applied technology widely used in various areas. According to the WSN limitations, they usually face many types of attacks. The sinkhole attack is the most popular and dangerous attack in the routing of WSNs. There are many approaches to counter sinkhole attacks in the literature. The mobile agent methods generate better results in facing sinkhole attacks and overcoming the WSN limitations. In this paper, we present a new mobile agent-based method that applies the trust value of each sensor to detect and prevent sinkhole attacks. We compute the trust values to inform the sensor nodes about their neighbors' reputations. As shown in the experiments, the proposed method generates better results in packet loss ratio. It also fixes the security flaws of previous works and reduces the agents' overhead in the network compared to previous methods.","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
INTRODUCING A NEW ROUTING ALGORITHM ForWIRELESS NETWORKS ON CHIP USINGREINFORCEMENT LEARNING 介绍了一种基于强化学习的芯片无线网络路由算法
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1618577670
Zohreh Harati, E. Tahanian, A. Tajary, Mansoor Fateh
{"title":"INTRODUCING A NEW ROUTING ALGORITHM For\u0000WIRELESS NETWORKS ON CHIP USING\u0000REINFORCEMENT LEARNING","authors":"Zohreh Harati, E. Tahanian, A. Tajary, Mansoor Fateh","doi":"10.5455/jjcit.71-1618577670","DOIUrl":"https://doi.org/10.5455/jjcit.71-1618577670","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70819963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
UNCONSTRAINED EAR RECOGNITION USING TRANSFORMERS 使用变压器的无约束耳识别
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1627981530
Marwin B. Alejo
{"title":"UNCONSTRAINED EAR RECOGNITION USING TRANSFORMERS","authors":"Marwin B. Alejo","doi":"10.5455/jjcit.71-1627981530","DOIUrl":"https://doi.org/10.5455/jjcit.71-1627981530","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TWO-WAY METRIC LEARNING WITH MAJORITY AND MINORITY SUBSETS FOR CLASSIFICATION OF LARGE EXTREMELY IMBALANCED FACE DATASET 基于多数子集和少数子集的双向度量学习用于大型极度不平衡人脸数据集的分类
IF 1.2
Jordanian Journal of Computers and Information Technology Pub Date : 2021-01-01 DOI: 10.5455/jjcit.71-1626417940
A. Kaushik, Seba Susan
{"title":"TWO-WAY METRIC LEARNING WITH MAJORITY AND MINORITY SUBSETS FOR CLASSIFICATION OF LARGE EXTREMELY IMBALANCED FACE DATASET","authors":"A. Kaushik, Seba Susan","doi":"10.5455/jjcit.71-1626417940","DOIUrl":"https://doi.org/10.5455/jjcit.71-1626417940","url":null,"abstract":"","PeriodicalId":36757,"journal":{"name":"Jordanian Journal of Computers and Information Technology","volume":"1 1","pages":""},"PeriodicalIF":1.2,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70820853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信