{"title":"Spatial Epidemiological Analysis of Early COVID-19 in the Municipality of Los Baños, Laguna, Philippines using K-means Clustering","authors":"Jonardo R. Asor","doi":"10.18178/ijfcc.2023.12.3.604","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.3.604","url":null,"abstract":"—This paper aims to analyze the spread of COVID-19 in the municipality of Los Baños, Laguna in the Philippines through the use of clustering algorithms. The record of the COVID-19 cases in Los Baños from March 2020 up-to March 2021 was used as dataset which includes susceptible, probable, confirmed, recovered and death cases. Following the clustering technique in data mining, a model was created to further analyzed the patterns of COVID-19. Three famous clustering algorithms were used in this study namely; K-means, K-medoids and mean shift. Furthermore, GeoPandas was used in this study for spatial analysis using cluster data while evaluation metrics for clustering such as Dunn index and Euclidean distance dendrogram were used to inspect clustering capability. Through the use of Dunn index, the study had identified K-Means as an efficient clustering method for COVID-19 cases. Hence, shown in this paper that barangay Tuntungin Putho, Mayondon, San Antonio, and Batong Malake formed a relationship.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117130123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jae Hwan Cha, Kyung Sik Kim, Chul Su Kim, Hwi Jin Kwon
{"title":"Development of Educational Content Based on Augmented Reality for Light Maintenance of Railway Vehicle","authors":"Jae Hwan Cha, Kyung Sik Kim, Chul Su Kim, Hwi Jin Kwon","doi":"10.18178/ijfcc.2023.12.3.603","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.3.603","url":null,"abstract":"—Railway vehicle maintenance is performed in a work environment that requires high adaptability and expertise. Therefore, it is very important to systematically educate maintenance operators. However, maintenance education has been inefficiently conducted using booklet-type resources. Maintenance training should be conducted efficiently by visualizing the maintenance process in three-dimensional by applying the augmented reality (AR) technique. In this study, AR-based educational content was designed for a block brake device that induces an accurate position stop during train operation. To prove the effectiveness of the content, user experience evaluation was conducted through a survey consisting of 8 questions.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116707375","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Time-and-Energy Consumption Offloading for Mobile Devices in Mobile Cloud Computing","authors":"A. Bui, Van-Viet Nguyen, Ninh-Thuan Truong","doi":"10.18178/ijfcc.2023.12.3.605","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.3.605","url":null,"abstract":"—Concurrent processing of sophisticated tasks on mobile devices could consume a lot of energy and processing time because of their limited resources. In order to offload mobile devices, some tasks are uploaded to the cloud server for execution. However, it is very difficult to choose which tasks to upload to the cloud because it needs to ensure two requirements: Optimizing energy costs and optimizing execution time costs. In this paper, we introduce a method to offload mobile devices when it processes multiple tasks concurrently. By applying the proposed energy automata from previous studies, our method allows for the identification of factors influencing the energy consumption and execution time of tasks, while also proposing an objective function and algorithms to make the offloading decision. When we applied the proposed method to an actual image processing application to process 1000 photos on a mobile device, it could save a maximum of 24.1% of energy, 37.6% of processing time, and an average of 18% of energy, 21% of processing time compared to non-offloading.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130423380","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Critical Review of Software Defined Networks Enabled Vehicular Ad Hoc Network","authors":"Moawiah El-Dalahmeh, Adi El-Dalahmeh, U. Adeel","doi":"10.18178/ijfcc.2023.12.3.606","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.3.606","url":null,"abstract":"—Software-Defined Networking (SDN) enabled Vehicular Ad-hoc Networks (VANETs) are a new paradigm for vehicular communication that leverages the benefits of SDN to improve the efficiency, reliability, and security of VANETs. In an SDN-based VANET, the traditional centralized control plane architecture is replaced by a SDN controller that manages the network's routing decisions. The controller has a global view of the network topology and can dynamically adjust the routing paths based on changing traffic conditions, environmental factors. While SDN enabled VANETs offer many benefits, there are also several challenges. Security is a critical concern in SDN enabled VANET architectures must address such as authentication, access control, and data privacy. Therefore, the researcher presents authentication approach to solve the challenges. However, the authentication framework still has challenges in privacy, security, cost. Therefore, in this paper we summarize the existing authentication scheme to determine the limitation and the future direction.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128521469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability of Price Prediction Rule for High-Frequency Trading","authors":"K. Yoshida, Shigeki Kohda","doi":"10.18178/ijfcc.2023.12.2.599","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.2.599","url":null,"abstract":"When using the data mining method for stock trading, it is essential to confirm the future stability of the rule found by the data mining method. Even if a rule can explain past data, in situations where the model behind the data changes, there is a risk of loss if an investment is made based on the rule learned using past data. In this study, we analyzed the mechanism behind the high-frequency trading prediction rule proposed in past research and demonstrated its stability. By demonstrating stability, this paper shows that investment using the rule can continue to be the basis for low-risk investment methods in the future","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Attack Behavior Approach in Slow HTTP DoS Detection","authors":"Tran Cong Manh, Nguyen Huu Hung","doi":"10.18178/ijfcc.2023.12.2.602","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.2.602","url":null,"abstract":"Slow HTTP Denial of Service attack (DoS) is unpretentious but impressive effect in knocking down the opponent. The principle of the attack is quite simple however its detection is complicated. A criminal can open lots of connections to the server by initiating HTTP requests and keep them opening. There are many detections analysis and studies, however at slow DoS attack is still threatening and dangerous. In this paper, TCP/IP packet analyzed, and behavior based to detect Slow HTTP DoS attack is proposed.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"198 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116674394","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Cooperative Detection of DDoS Attacks Based on CNN-BiLSTM in SDN","authors":"Hongwei Zhou","doi":"10.18178/ijfcc.2023.12.2.600","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.2.600","url":null,"abstract":"In view of the problem that detecting DDoS attack traffic in traditional SDN depends on the controller continuously collecting traffic and running the detection model, resulting in excessive controller overhead, low detection efficiency, increased traffic forwarding delay, and easy to cause \"single point of failure\", a cooperative detection method of DDoS attack in SDN based on information entropy and deep learning is proposed, which divides part of the detection task into the data plane for detection based on information entropy and uses the improved CNN-BiLSTM model to detect DDoS attack traffic on control plane. The experimental results show that, compared with the SVC-RF method in recent years, the accuracy of the proposed CNN-BiLSTM model is increased by 0.74%, the detection rate is increased by 1.42%, and the false alarm rate is reduced by 1.5%. Compared with the BiLSTM model, the accuracy is increased by 0.75%, the detection rate is increased by 0.64%, and the false alarm rate is reduced by 1.14%. Compared with the RF method, the accuracy is increased by 2.34%, the detection rate is increased by 3.88%, and the false alarm rate is reduced by 4%. Compared with the traditional single point detection method which only depends on the controller, the proposed switch-controller cooperative detection method reduces the CPU occupancy of the controller by about 12% and the detection time by about 13 seconds.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136027403","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Fatemeh Safari, Izabela Savic, H. Kunze, Jason B. Ernst, Daniel Gillis
{"title":"The Diverse Technology of MANETs: A Survey of Applications and Challenges","authors":"Fatemeh Safari, Izabela Savic, H. Kunze, Jason B. Ernst, Daniel Gillis","doi":"10.18178/ijfcc.2023.12.2.601","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.2.601","url":null,"abstract":"In recent years, mobile ad hoc networks (MANETs) have shown much potential in providing wireless network solutions for a variety of situations. MANETs are made up of a variety of devices (both mobile and internet of things (IoT)) which form a wireless network that provides wireless network functionality and cloud services and can be used to provide wireless services to devices in areas where fixed infrastructure is not accessible. Although it is not necessary for a node to be connected to fixed wireless or cellular infrastructure for the network, even a single node connected to infrastructure opens up a wide range of new research opportunities and applications. Due to the variety of compatible devices, MANETs are the perfect technology for a wide variety of scenarios, such as: military, search and rescue operations, and more. Our contribution is a complete survey of the applications of MANETs, which to our knowledge has not been previously documented. This survey will discuss the industries MANETs are used in (e.g. education, smart city, etc.), the benefits and services they can provide users, and will also explore the challenges this technology still experiences","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124903335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of In-Vehicle Ethernet Information Fault Detection Based on IEEE 802.1Qci","authors":"Yue Wang, Yu-Jing Wu, Yihu Xu, Yixian Xu","doi":"10.18178/ijfcc.2023.12.1.595","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.1.595","url":null,"abstract":"With features such as the high data transfer rate of 1G/bps and strong compatibility, in-vehicle Ethernet can become the backbone network of next-generation in-vehicle bus network systems. Currently, in-vehicle Ethernet is mainly used in audio and video entertainment systems, to further improve the network security performance of in-vehicle Ethernet, the information security of the data layer and physical layer in the in-vehicle bus network system must be ensured. Based on the characteristics of in-vehicle Ethernet data frame structure, this paper introduces IEEE 802.1 Qci protocol, proposes an information fault detection method through data shifting, detection, and policing, and verifies it by simulation with OMNET++ simulation system. The experimental results show that the accuracy rate of in-vehicle Ethernet data during transmission can reach 99.61%, which further improves the network security performance of in-vehicle Ethernet.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115447460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Unreliability of Network Simulation Results FROM Mininet and iPerf","authors":"Benjamin Hardin, D. Comer, Adib Rastegarnia","doi":"10.18178/ijfcc.2023.12.1.596","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.1.596","url":null,"abstract":"The networking research community and industry both use the Mininet network simulator to assess new network architectures and predict how new designs will perform. Mininet employs an emulation approach that uses concurrent processes running in a single computer instead of physical hardware. A user specifies a network consisting of network switches, routers, and host computers that have network interface connections and links connecting all the pieces. Mininet creates software artifacts to represent each of the network devices and allows application programs to send packets across the resulting network. Researchers often use the iPerf application to measure network performance. Many research papers report results from Mininet and iPerf and use the results to validate new designs for Software-Defined Networks (SDNs). However, there has been little investigation into the scenarios where these emulations can perform different than intended. The goal of this paper is to understand the edge cases of these emulation methods and understand the severity of these scenarios. This paper reports surprising anomalies in the results of Mininet and iPerf. We show that the choice of apparently valid configuration options can make the reported throughput completely invalid. Our initial discoveries focused on a complex simulation of a data center network. However, we were able to show that Mininet produces completely invalid results for a basic case: network traffic traveling across a single emulated link between two switches with no other network traffic. The paper makes recommendations for ways to configure Mininet to avoid some of the anomalies.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129518269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}