Stephen Mujeye, J. Qaddour, Sameeh Ullah, Susan Calderon, R. Rhykerd, Charles Edamala, F. Kidwaro
{"title":"A Proposal on How to Use Blockchain to Secure Communications in 5G Ecosystem","authors":"Stephen Mujeye, J. Qaddour, Sameeh Ullah, Susan Calderon, R. Rhykerd, Charles Edamala, F. Kidwaro","doi":"10.18178/ijfcc.2023.12.1.597","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.1.597","url":null,"abstract":"5G provides businesses with high-speed Internet access, faster bandwidth, and low latency. The use of IoT and 5G-enabled sensors provides new opportunities within networks. There are several use cases of 5G with IoT health care, agriculture, remote learning, logistics, manufacturing, government, and retail. However, some security and privacy problems must be addressed within the 5G ecosystem. There is a need to secure user and device associations and data integrity as 5G is becoming more and more popular. In this research-in-progress, we seek to solve security and privacy problems in 5G by applying Blockchain technology to secure 5G connections. The research will consist of an interdisciplinary team of researchers from Illinois State University (ISU) and non-academic-industry partners. During the study, we build a prototype that solves problems in agriculture and healthcare. A private 5G network is installed at ISU. Moisture sensors and IoT devices are installed at the university farm to monitor soil moisture. Tracking soil moisture helps to conserve water. Additionally, we also work with a local clinic and provide underserved patients with chronic illnesses with sensors and IoT devices that help them track and monitor their chronic conditions. The patients will have monitors that track blood pressure and blood sugar. The IoT devices and sensors send collected data to a database accessible by healthcare professionals at the clinic. This helps the patients receive care that helps them manage their conditions better. Blockchain will be applied during the proposed study to secure communications between the sensors at the university farm and the private 5G network. Blockchain is also be applied to secure communications between the patients and healthcare providers at the clinic. The collected results are analyzed to see if there is a significant difference in suspicious activities in agriculture and healthcare communications. The results have a broader impact, including helping underserved community members to receive good care in managing their chronic conditions. The results also help secure other use cases of 5G with IoT devices.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CMATA: Cyber Trafficking Monitoring and Tracking Prototype","authors":"Risty Acerado","doi":"10.18178/ijfcc.2023.12.1.598","DOIUrl":"https://doi.org/10.18178/ijfcc.2023.12.1.598","url":null,"abstract":"With the evolution of the Internet, trafficking has broader and borderless operations targeting virtual spaces where individuals of different ages can be subjected to cyber trafficking. Despite the government's efforts to combat cyber trafficking, the growing number of cases is alarming. One apparent reason is that traffickers keep advancing their technical strategies, so it becomes more challenging for law enforcement to investigate complex and transnational organized crime. Thus, this paper presents the development of a cyber monitoring and trafficking web application integrated with a web scraper that identifies websites with a high probability of being used in cyber trafficking activities. The web scraper was written using Beautiful Soup. With the result of the sensitivity analysis conducted in the study, beautiful soup was determined to be the most suitable tool for developing web scraping algorithms based on performance, portability, and accuracy compared with the Scrapy and Selenium tools. Upon the initial testing of the developed prototyped in tracking and monitoring suspected cyber traffickers, it was able to scrape 45 potential trafficking websites. The initial testing result shows that this kind of application integrated with a scraper to identify cyber traffickers with a visualization dashboard can help law enforcement officers identify, track, and monitor online traffickers easily and quickly.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ariel Kamoyedji, N. Funabiki, Hein Htet, M. Kuribayashi
{"title":"A Proposal of Job-Worker Assignment Algorithm Considering CPU Core Utilization for User-PC Computing System","authors":"Ariel Kamoyedji, N. Funabiki, Hein Htet, M. Kuribayashi","doi":"10.18178/ijfcc.2022.11.2.586","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.2.586","url":null,"abstract":"As a low-cost high-performance master-worker-model-based computing platform for group members, we have studied the User-PC computing system (UPC). The UPC master assigns queuing jobs from users to UPC workers that use idling computing resources of members’ personal computers (PCs). In this paper, we propose a job-worker assignment algorithm to minimize the makespan, considering the number of job threads and the number of CPU cores. For evaluation of the algorithm, we conducted experiments running 72 jobs on the UPC system with six workers that have various numbers of threads and CPU cores. The schedules by the algorithm could significantly reduce the makespan compared to other algorithms.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christoph Fischer, Dennis Krummacker, Maximilian Berndt, Hans D. Schotten
{"title":"Future Integrated Mobile Communication Systems — An Outlook towards 6G","authors":"Christoph Fischer, Dennis Krummacker, Maximilian Berndt, Hans D. Schotten","doi":"10.18178/ijfcc.2022.11.2.584","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.2.584","url":null,"abstract":"6G will come with a multitude of new features that will improve communication. These features will be strongly driven by Artificial Intelligence that is processing communication data and derive information. One feature that is already well discussed in the Research World is Joint Communication and Sensing. This says that along with the pure information transport the electromagnetic waves will be used to derive more information from the environment, which might be positioning information or perception of barriers. All these information will internally be used to then optimize the 6G Network with e.g., high precision beam forming or movement prediction for User Equipment. Be-side these internal optimizations, there will also be a multitude of external applications that can benefit from these information. By processing these information, external applications are capable of deriving further relevant information that can be used to integrate new management capabilities. This paper gives an outlook on the multitude of possibilities to exploit these information for various use cases, to make 6G not just another mobile communication standard but to enable an integration level for a communication technology that can be the unique selling point for 6G","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115319207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sujan Chandra Roy, N. Funabiki, Kwenga Ismael Munene, Md. Mahbubur Rahman, M. Kuribayashi
{"title":"An Extension of Active Access-Point Configuration Algorithm to IEEE 802.11n and 11ac Dual Interfaces in Wireless Local-Area Network","authors":"Sujan Chandra Roy, N. Funabiki, Kwenga Ismael Munene, Md. Mahbubur Rahman, M. Kuribayashi","doi":"10.18178/ijfcc.2022.11.2.583","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.2.583","url":null,"abstract":"Nowadays, wireless local-area networks (WLANs) have been densely deployed in a lot of fields by different providers around the world due to license-free features. To improve the network performance under such environments, we have studied the active AP configuration algorithm of optimizing the active access points (APs) along with host associations and channel assignments. Unfortunately, it limits the APs adopting one network interface of the IEEE 802.11n protocol working at 2.4GHz. Recently, the 11ac protocol at 5GHz has also become common, which allows the dual interfaces using different frequencies to increase the transmission capacity of an AP. In this paper, we extend the AP configuration algorithm to consider dual interfaces of 11n and 11ac at the APs in WLAN. In addition to selecting the active APs, their assigned channels, and associated hosts, the network interface is assigned to each host. The two throughput estimation models are adopted to consider the throughput differences of the two protocols. For evaluating the proposal, we compare the number of active APs and throughput performances against the conventional case using one interface through simulations using the WIMNET simulator and throughput measurements using the testbed system that adopts Raspberry Pi 4B for APs. The results confirm that the proposal can reduce the number of active APs while increasing the total throughput.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123691189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposal for Knowledge Community Application Using Bluetooth Low Energy","authors":"Nanami Kuwahara, T. Fujimoto","doi":"10.18178/ijfcc.2022.11.2.587","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.2.587","url":null,"abstract":"In this research, we use Bluetooth Low Energy technology to connect virtual and real spaces by enabling people to share knowledge over a short distance. Nowadays, people have various methods to collect information, such as search engines and Social Networking Services (SNSs). In addition, knowledge-sharing sites such as Yahoo! Chiebukuro and Quora are also used. Knowledge sharing services often take the form of ‘bulletin boards’ on the Internet. Bulletin board type services are highly convenient, but have problems of low reliability and limited connection with reality. One reason is considered to be the fact that these services are unique to the Internet. Therefore, this paper examines new knowledge sharing method that links virtual space and real space. We design a knowledge community system that enhances the reliability of information by clearly providing the connection with reality for users.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125813548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interpretability of Deep Learning","authors":"Z. Huang, Fan Li, Zhanliang Wang, Zhiyuan Wang","doi":"10.18178/ijfcc.2022.11.2.585","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.2.585","url":null,"abstract":"Deep Learning achieves surprising performance in many real-world tasks. However, on a black-box approach, computational techniques have been applied without a strong critical understanding of their properties. In this paper, we review the current methodologies and techniques about improving the interpretability of Deep Learning from different research directions. Some works are based on analysis of the learning process, some lay more emphasis on interpreted network architecture, and others intend to design self-interpretable Deep Learning models. This article analyzes the popular and advanced works in these fields and provides a future look for Deep Learning researchers.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"335 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116463817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Blockchain: A Security Solution for the IoT?","authors":"N. Udoh","doi":"10.18178/ijfcc.2022.11.1.580","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.1.580","url":null,"abstract":"Whenever there are strong statements from people that the Internet of Things (“IoT”) causes more evil than good, I wonder if the individuals that belong to such school of thought are inadvertently dismissing the opportunity to continuously extend the capability of an intelligent platform that arguably solves some of the world's greatest problems, made possible using billions of integrated smart devices connectivity. It is my view that the IoT like every other great invention can generally be used for both good and bad reasons, however, careful consideration regarding it implementation and use needs to be put in place. Technological advancements have reached a point where almost everything is wired up or connected wirelessly to the internet and the IoT has created opportunities for people to leverage on the benefits that comes with the interconnectivity of smart devices to collect data and make intelligent decisions. As evident in recent technological innovations, the advent of the IoT has led to significant progress in the field of science and technology. Today, the world has seen the widespread adoption of IP-based networking, breakthroughs in artificial intelligence, development of robotics capability, and the growth of cloud computing. These technological developments and many others are bringing about significant revolutionary changes, suggesting the IoT is as transformative as the industrial revolution. As appealing as these advancements may seem, there are many questions challenging the overall security and privacy aspects of the IoT. This challenge is amplified by other considerations such as the rapid spread of similar IoT devices, the ability of some devices to automatically connect to other devices, and the possibility of deploying these devices in unsecure environments. Even though many security considerations have been put in place to guard against malicious activities targeted against the proper use of the IoT, reoccurring high-profile incidents where a single IoT device has been used to infiltrate attacks to larger network persists. Addressing the security concerns in an IoT environment could be made more effective by the implementation of a security model that has capabilities to negate any central attack to a larger IoT network even when a single point of entry is compromised. Although not without its own challenges, blockchain seems to have this capability, and has arguably drawn attention as the next generation technology that suits the end-to-end security requirements within an IoT environment.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123692783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Louis Philippe B. Facun, Maria Jeseca C. Baculo, Marlon F. Libao, Ceazar M. Eisma, Christian B. Fredeluces, Rigzor A. Garlejo, Raymart S. Idio
{"title":"Object Detection Frameworks fo Real-Time, Scale-Invariant Face Mask Detection","authors":"Louis Philippe B. Facun, Maria Jeseca C. Baculo, Marlon F. Libao, Ceazar M. Eisma, Christian B. Fredeluces, Rigzor A. Garlejo, Raymart S. Idio","doi":"10.18178/ijfcc.2022.11.1.582","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.1.582","url":null,"abstract":"As the world experiences a pandemic caused by the spread of COVID-19, following health protocols like the proper wearing of face masks is essential to help prevent the spread of the virus as stressed by the World Health Organization (WHO). In the Philippines, manual monitoring of these measures may not be as efficient when handling large crowds. The authors were able to generate a real-time, scale-invariant face mask recognition model that also handles occlusions. It was trained using images from the wild to simulate real-world conditions. Existing state-of-the-art object detection frameworks such as MobileNet, RetinaNet, and YOLOv4 were implemented to detect and localize the proper use of face masks in public. To evaluate the performance of the models, the mAP, inference time, and precision curve were used. The performance of the model has resulted to as high as .94 mAP with an inference time of 73 ms.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114161784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimisations on AWS Elastic Cache (Redis) Usage","authors":"Rahul Banerjee","doi":"10.18178/ijfcc.2022.11.1.581","DOIUrl":"https://doi.org/10.18178/ijfcc.2022.11.1.581","url":null,"abstract":"AWS elastic cache (Redis) is one the most popular mechanism for cloud developers to achieve both excellent caching as well as persistency of data. As part of our recent project of building personalised ad decision system, we needed to support stringent performance requirement of 125000 requests per second and 95% of requests must be served under 250ms. We used Elastic cache (Redis) for both caching and persistency and found number of optimisation techniques which helped us to achieve the performance requirement. These techniques we used ensured that cost for Elastic cache (and the whole project) is much lower than initial estimate. The techniques involved choosing appropriate CPU instances for Elastic cache, using right cache structure and whole host of changes on Redis client side to make this end-to-end system high performance, and cost effective.","PeriodicalId":377748,"journal":{"name":"International Journal of Future Computer and Communication","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122712295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}