{"title":"Cluster-Based Data Sharing for Web 3.0 in Intelligent Transportation Systems","authors":"Mohammed Alkhathami","doi":"10.13052/jwe1540-9589.2375","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2375","url":null,"abstract":"Intelligent transportation system (ITS) applications are dependent on secure and robust wireless data sharing among vehicles and roadside units (RSUs). Multiple types of data are shared among the ITS devices which include safety information, road services, web based information retrieval and task computation. Web 3.0 offers a decentralized, distributed and secure data sharing mechanism for ITSs. Allocation of wireless channel resources are critical to enable an efficient ITS system. In this paper, a novel data sharing technique for Web 3.0 based ITS is presented that relies on an intelligent clustering algorithm. In the first step, the proposed technique uses a K-means algorithm to find groups of vehicles with similar speeds. In the second step, each cluster is assigned an RSU which has the highest average data rate with all vehicles in the cluster. This is achieved by using a stable matching technique so that there is no contention and each cluster is assigned a separate RSU. The algorithm periodically updates the clusters and RSU allocation for web data sharing between vehicles and RSUs. Simulation results show that the proposed clustering-based data sharing technique improves sum-rate by 20% and reduces network delay by 23%.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"1025-1040"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10815633","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Data Alignment Method for Network Packet Capture Based on DBSCAN","authors":"Jiarui Lu;Qinggang Su","doi":"10.13052/jwe1540-9589.2374","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2374","url":null,"abstract":"This paper investigates the issues of packet alignment and consistency among PLC devices based on industrial network environments, aiming to ensure the integrity and accuracy of packets from sender to receiver. To achieve this goal, we propose an anomaly detection method that combines the DBSCAN clustering algorithm with the 3-sigma principle to identify and handle abnormal packets that may occur during transmission. By comparing the data between the sending and receiving ends, and analyzing based on timestamps and data content, we validate the alignment of packets in the network environment. Experimental results demonstrate that the proposed method effectively detects and corrects packet loss or delay jitter, thereby enhancing the reliability of communication between PLC devices and the consistency of data transmission. The scheme presented in this paper enables quicker and more precise identification of packet loss and delays, adapting well to various network load conditions. Further experimental analysis indicates that this method excels in reducing both false positive and false negative rates, and it exhibits good scalability, making it applicable to data alignment and consistency verification in other industrial automation scenarios. Ultimately, this novel solution provides stability and accuracy for data transmission among devices in a network environment.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"1003-1023"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10815714","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Advancing Educational Management with the ATT-MR-WL Intelligent Question-Answering Model","authors":"Ying Ba","doi":"10.13052/jwe1540-9589.2373","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2373","url":null,"abstract":"Higher education plays a critical role in cultivating talent, preserving culture, and promoting social progress. However, current challenges, such as inefficient information dissemination and low problem-solving efficiency among students, highlight the need for intelligent question-answering systems. These systems, leveraging artificial intelligence and natural language processing technologies, enable rapid and accurate responses to student queries, thereby providing intelligent support for higher education management. This study introduces the ATT-MR-WL model, a generative AI system integrating Mask R-CNN and Word2Vec+LSTM to enhance intelligent question-answering functionality. The model, customized to handle both text and visual data, is evaluated using the established VQA v2.0 dataset and a specially developed EM dataset reflecting university management scenarios. The ATT-MR-WL model demonstrates a 3% accuracy improvement over traditional methods and enhances its ability to handle multimodal queries. This research provides important insights for enhancing the efficiency and quality of higher education management and advancing the process of educational informatization.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"973-1002"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10815715","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Examining the Empirical Relationship Between Quality of Service (QoS) and Trust Mechanisms of Cloud Services","authors":"Pooja Goyal;Sukhvinder Singh Deora","doi":"10.13052/jwe1540-9589.2372","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2372","url":null,"abstract":"Service selection has emerged as a prominent challenge due to the flourishing demand for computing services and the dynamic nature of its resources. The increasing demand for cloud services makes it challenging to choose a provider offering equal services and facilities at costs that match those of competing providers. Apart from educating customers in the process of choosing cloud services, trust mechanisms include user reviews, reputation systems, and certifications assist to boost consumers' confidence in cloud services. The service measurement index (SMI) offers a disciplined framework combining both functional and non-functional quality of service indicators concurrently, therefore easing decision-making. The main emphasis of the research is on the fundamental elements influencing the choice of cloud services in the present environment, the identification of extra characteristics of cloud services transcending SMI, and the identification of the most suitable approach for some services. By means of the measurement of customer enjoyment and experience, QoS traits provide some insight on the impact of trust mechanisms on service acceptance. Comparisons of SMI and QoS measurements before and after trust mechanism deployment provide insightful analysis. Empirical research guides these comparisons. This study aims to clarify the interactions among QoS, trust mechanisms, and cloud service adoption as well as highlight the implications these elements have for customers and service providers. Furthermore, presented in this paper is an algorithm using a comprehensive method to trust estimation in order to ascertain the degree of confidence worthiness of certain people.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 7","pages":"913-971"},"PeriodicalIF":0.7,"publicationDate":"2024-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142890177","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Implementation of Sports Science and Technology Integration Infrastructure: A Case Study of Speed Skating Utilizing Web and Mobile Applications, and Information Visualization Technologies","authors":"Minkyu Kim;Soojung Park","doi":"10.13052/jwe1540-9589.2367","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2367","url":null,"abstract":"In the field of sports, there is an active discussion on and an attempt to apply technologies that integrate sports with cutting-edge science and technology for the purpose of enhancing athletic performance. In line with this trend, South Korea is supporting research on the fusion of sports and science technology at an interdepartmental level. For the improvement of performance in elite sports, it is important to consider the athlete's skills, the coach's information analysis, the scientification of equipment, and the environmental optimization. Accordingly, this study aims to propose web and mobile app technologies to establish an integrated infrastructure of sports science and technology for the three factors of athletes, equipment, and environment to improve the performance of speed skating. Furthermore, it aims to make policy recommendations to activate this integration. The application of such technologies and policy recommendations can be transferred and organically integrated into other sports, including track and field, which are time-based competitions. Additionally, it is expected that this approach will lead to the formation of new theories that consider the emotional aspects occurring in sports situations.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"849-868"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747172","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research on Quantum Key, Distribution Key and Post-Quantum Cryptography Key Applied Protocols for Data Science and Web Security","authors":"Kyu-Seok Shim;Boseon Kim;Wonhyuk Lee","doi":"10.13052/jwe1540-9589.2365","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2365","url":null,"abstract":"Currently, data security is one of the most concerning research topics. The traditional RSA encryption system has become vulnerable to quantum algorithms such as Grover and Shor, leading to the development of new security systems for the quantum. As a result, quantum cryptography is gaining importance as a key element of future communication security. This study focuses on quantum key distribution protocols for data quantum encryption, aiming to achieve quantum robustness in all stages of quantum cryptography communication processes. Quantum cryptography communication requires robust quantum encryption not only between end-nodes but also between all components. Therefore, this study demonstrates the process of end-to-end data quantum encryption and proves the overall quantum robustness in this process.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"813-830"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747171","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594991","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enhancing Security in Low-Power Wide-Area (LPWA) IoT Environments: The Role of HSM, Tamper-Proof Technology, and Quantum Cryptography","authors":"Hyung-Sub Han;Tae-hyuk Choi;Jong-Seong Yoon","doi":"10.13052/jwe1540-9589.2363","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2363","url":null,"abstract":"Low-power wide-area (LPWA) networks are integral to expanding Internet of Things (IoT) applications, offering extensive coverage with low power consumption. However, these networks face significant security challenges due to their widespread deployment and inherent constraints. In order to provide secure services in an LPWA IoT environment, important information stored in IoT devices (encryption keys, device unique numbers, etc.) must be safely protected from external hacking or theft by physical access, and it is necessary to develop tamper-proof technology to enhance physical security. Meanwhile, with so many ruggedized IoT devices processing and transmitting sensitive information, security systems are essential to protect the integrity and privacy of IoT data. This paper explores the critical role of hardware security modules (HSMs), tamper-proof technology, and quantum cryptography in enhancing the physical, network, and data security of LPWA IoT environments. We propose operational strategies for HSMs, tamper-proof technology in ruggedized LPWA IoT settings, and a quantum key distribution (QKD)-based IPsec solution for robust network and data security.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"787-800"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747167","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal Path Calculation for Multi-Ring Based Packet-Optical Transport Networks","authors":"Hyuncheol Kim","doi":"10.13052/jwe1540-9589.2364","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2364","url":null,"abstract":"Multi-domain optical transport networks are inherently non-interoperable and require integrated orchestration and path provisioning mechanisms at the network-wide level. Moreover, ensuring the network's survivability is a critical issue. While the MPLS-TP (multi-protocol label switching-transport profile) defines various protection and recovery mechanisms as standards, it does not address methods for calculating and selecting protection and recovery paths. Therefore, an algorithm is needed to calculate and set up paths to ensure quick protection and recovery across the entire integrated network, minimizing conflicts in protection and recovery at the packet optical integrated network level. In this paper, we proposed an algorithm that calculates and sets a path that enables rapid protection and recovery in an MPLS-TP network composed of a multi-ring-mesh topology. To this end, this study proposes the concept of a transparent node (T-node) for calculating link-disjoint SPF (shortest path first) in a multi-ring network with dual or more rings. A T-node is a node in a ring with more than a dual ring and indicates that the node has been used once in route calculation. Therefore, during path calculation, a T-node can be used as a source node and an intermediate node but not as a destination node.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"801-812"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Functional Requirements and Inspection Items for AI System Change Management and Model Improvement on the Web Platform","authors":"Dongsoo Moon;Seongjin Ahn","doi":"10.13052/jwe1540-9589.2366","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2366","url":null,"abstract":"The rapid adoption of artificial intelligence (AI) on the web platform across multiple sectors has highlighted not only its inherent technical hurdles, such as unpredictability and lack of transparency, but also significant societal concerns. These include the misuse of AI technology, invasions of privacy, discrimination fueled by biased data, and infringements of copyright. Such challenges jeopardize the sustainable growth of AI and risk the erosion of societal trust, industry adoption and financial investment. This analysis explores the AI system's lifecycle, emphasizing the essential continuous monitoring and the need for creating trustworthy AI technologies. It advocates for an ethically oriented development process to mitigate adverse effects and support sustainable progress. The dynamic and unpredictable nature of AI, compounded by variable data inputs and evolving distributions, requires consistent model updates and retraining to preserve the integrity of services. Addressing the ethical aspects, this paper outlines specific guidelines and evaluation criteria for AI development, proposing an adaptable feed-back loop for model improvement. This method aims to detect and rectify performance declines through prompt retraining, thereby cultivating robust, ethically sound AI systems. Such systems are expected to maintain performance while ensuring user trust and adhering to data science and web technology standards. Ultimately, the study seeks to balance AI's technological advancements with societal ethics and values, ensuring its role as a positive, reliable force across different industries. This balance is crucial for harmonizing innovation with the ethical use of data and science, thereby facilitating a future where AI contributes significantly and responsibly to societal well-being.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"831-848"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747166","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142595007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study on Estimating Theme Park Attendance Using the AdaBoost Algorithm Based on Weather Information from the Korea Meteorological Administration Web","authors":"Jinkook Kim;Soohyun Kim","doi":"10.13052/jwe1540-9589.2368","DOIUrl":"https://doi.org/10.13052/jwe1540-9589.2368","url":null,"abstract":"The purpose of this study is to propose an efficient machine learning model based on five years of data for Seoul Grand Park in Republic of Korea, depending on the weather and day characteristics, and to increase its effectiveness as a strategic foundation for national theme park management and marketing. To this end, the AdaBoost model, which reflects the characteristics of the weather and the day of the week, was recently compared with the actual number of visitors and the predicted number of visitors to analyze the accuracy. The analysis showed 30 days of abnormal cases, and the overall annual distribution was found to show similar patterns. Abnormal cases required details of wind speed, average relative humidity, and fine dust concentration for weather information, and it was derived that more accurate predictions would be possible considering variables such as group visitors, new events, and unofficial holidays.","PeriodicalId":49952,"journal":{"name":"Journal of Web Engineering","volume":"23 6","pages":"869-884"},"PeriodicalIF":0.7,"publicationDate":"2024-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10747165","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142594957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}