International Journal of Computer Science & Network Security
International Journal of Computer Science & Network Security (IJCSNS)
- Monthly
- /
- 1738-7906(pISSN)
Volume 23 Issue 4
-
Abdulmonem Ahmed;Aybaba Hancrliogullari;Ali Riza Tosun 1
Morphological analysis is a branch of natural language processing, is now a rapidly growing field. The fundamental tenet of morphological analysis is that it can establish the roots or stems of words and enable comparison to the original term. Arabic is a highly inflected and derivational language and it has a strong structure. Each root or stem can have a large number of affixes attached to it due to the non-concatenative nature of Arabic morphology, increasing the number of possible inflected words that can be created. Accurate verb recognition and extraction are necessary nearly all issues in well-known study topics include Web Search, Information Retrieval, Machine Translation, Question Answering and so forth. in this work we have designed and implemented an algorithm to detect and recognize Arbic Verbs from Arabic text.The suggested technique was created with "Python" and the "pyqt5" visual package, allowing for quick modification and easy addition of new patterns. We employed 17 alternative patterns to represent all verbs in terms of singular, plural, masculine, and feminine pronouns as well as past, present, and imperative verb tenses. All of the verbs that matched these patterns were used when a verb has a root, and the outcomes were reliable. The approach is able to recognize all verbs with the same structure without requiring any alterations to the code or design. The verbs that are not recognized by our method have no antecedents in the Arabic roots. According to our work, the strategy can rapidly and precisely identify verbs with roots, but it cannot be used to identify verbs that are not in the Arabic language. We advise employing a hybrid approach that combines many principles as a result. -
The current study aimed to identify the level of tolerance and the level of marital happiness and the relationship between tolerance and marital happiness among married teachers in Irbid. In addition, to identify the differences in tolerance and marital happiness according to some demographic variables among married teachers in Irbid. The study sample consisted of (121) married teachers were randomly selected from the study community. For study purposes, the researcher used the tolerance scale for Shuqair and the marital happiness scale for Hedberg translated to Arabic by Alharekey. Findings showed that there were statistical correlations between tolerance and marital happiness among married teachers. The results showed no statistically significant differences between the married teachers' average scores in the degree of tolerance and marital happiness according to the gender, age, the gap between couples, and years of married.
-
Ayesheh Ahrari Khalaf;Aisha Hassan Abdalla Hashim;Akeem Olowolayemo;Rashidah Funke Olanrewaju 15
One of the objectives and aspirations of scientists and engineers ever since the development of computers has been to interact naturally with machines. Hence features of artificial intelligence (AI) like natural language processing and natural language generation were developed. The field of AI that is thought to be expanding the fastest is interactive conversational systems. Numerous businesses have created various Virtual Personal Assistants (VPAs) using these technologies, including Apple's Siri, Amazon's Alexa, and Google Assistant, among others. Even though many chatbots have been introduced through the years to diagnose or treat psychological disorders, we are yet to have a user-friendly chatbot available. A smart generative cognitive behavioral therapy with spoken dialogue systems support was then developed using a model Persona Perception (P2) bot with Generative Pre-trained Transformer-2 (GPT-2). The model was then implemented using modern technologies in VPAs like voice recognition, Natural Language Understanding (NLU), and text-to-speech. This system is a magnificent device to help with voice-based systems because it can have therapeutic discussions with the users utilizing text and vocal interactive user experience. -
Sultan Algarni;Khalid Almarhabi;Ahmed M. Alghamdi;Asem Alradadi 25
Fog computing diversifies cloud computing by using edge devices to provide computing, data storage, communication, management, and control services. As it has a decentralised infrastructure that is capable of amalgamating with cloud computing as well as providing real-time data analysis, it is an emerging method of using multidisciplinary domains for a variety of applications; such as the IoT, Big Data, and smart cities. This present study provides an overview of the security and privacy concerns of fog computing. It also examines its fundamentals and architecture as well as the current trends, challenges, and potential methods of overcoming issues in fog computing. -
Blackboard provides a collaborative environment for teaching in terms of assessment and communication and can improve learning outcomes. To evaluate the Blackboard use of faculty members at Umm Al-Qura University, data were collected from two channels: statistical reports issued by the university and an online questionnaire. The questionnaire survey respondents were 187 faculty members from all colleges in the university. The findings show that most faculty members did not use Blackboard before the pandemic; therefore, the sudden conversion to the use of Blackboard required intensive training courses. In addition, accompanying Blackboard use with other applications such as WebEx is preferable, especially for administrative tasks such as departmental board meetings and seminars.
-
This study compares various transformation techniques for multifocus image fusion. Multi-focus image fusion is a procedure of merging multiple images captured at unalike focus distances to produce a single composite image with improved sharpness and clarity. In this research, the purpose is to compare different popular frequency domain approaches for multi-focus image fusion, such as Discrete Wavelet Transforms (DWT), Stationary Wavelet Transforms (SWT), DCT-based Laplacian Pyramid (DCT-LP), Discrete Cosine Harmonic Wavelet Transform (DC-HWT), and Dual-Tree Complex Wavelet Transform (DT-CWT). The objective is to increase the understanding of these transformation techniques and how they can be utilized in conjunction with one another. The analysis will evaluate the 10 most crucial parameters and highlight the unique features of each method. The results will help determine which transformation technique is the best for multi-focus image fusion applications. Based on the visual and statistical analysis, it is suggested that the DCT-LP is the most appropriate technique, but the results also provide valuable insights into choosing the right approach.
-
Nowadays, a blind man finds it very difficult to cross the roads. They should be very vigilant with every step they take. To resolve this problem, Convolutional Neural Networks(CNN) is a best method to analyse the data and automate the model without intervention of human being. In this work, a traffic signal recognition system is designed using CNN for the visually impaired. To provide a safe walking environment, a voice message is given according to light state and timer state at that instance. The developed model consists of two phases, in the first phase the CNN model is trained to classify different images captured from traffic signals. Common Objects in Context (COCO) labelled dataset is used, which includes images of different classes like traffic lights, bicycles, cars etc. The traffic light object will be detected using this labelled dataset with help of object detection model. The CNN model detects the color of the traffic light and timer displayed on the traffic image. In the second phase, from the detected color of the light and timer value a text message is generated and sent to the text-to-speech conversion model to make voice guidance for the blind person. The developed traffic light recognition model recognizes traffic light color and countdown timer displayed on the signal for safe signal crossing. The countdown timer displayed on the signal was not considered in existing models which is very useful. The proposed model has given accurate results in different scenarios when compared to other models.
-
Marco P. Mwaimu;Mike Majham;Ronoh Kennedy;Kisangiri Michael;Ramadhani Sinde 55
In recent years, the Television White Space (TVWS) has attracted the interest of many researchers due to its propagation characteristics obtainable between 470MHz and 790MHz spectrum bands. The plenty of unused channels in the TV spectrum allows the secondary users (SUs) to use the channels for broadband services especially in rural areas. However, when the number of SUs increases in the TVWS wireless network the aggregate interference also increases. Aggregate interferences are the combined harmful interferences that can include both co-channel and adjacent interferences. The aggregate interference on the side of Primary Users (PUs) has been extensively scrutinized. Therefore, resource allocation (power and spectrum) is crucial when designing the TVWS network to avoid interferences from Secondary Users (SUs) to PUs and among SUs themselves. This paper proposes a model to improve the resource allocation for reducing the aggregate interface among SUs for broadband services in rural areas. The proposed model uses joint power and spectrum hybrid Firefly algorithm (FA), Genetic algorithm (GA), and Particle Swarm Optimization algorithm (PSO) which is considered the Co-channel interference (CCI) and Adjacent Channel Interference (ACI). The algorithm is integrated with the admission control algorithm so that; there is a possibility to remove some of the SUs in the TVWS network whenever the SINR threshold for SUs and PU are not met. We considered the infeasible system whereby all SUs and PU may not be supported simultaneously. Therefore, we proposed a joint spectrum and power allocation with an admission control algorithm whose better complexity and performance than the ones which have been proposed in the existing algorithms in the literature. The performance of the proposed algorithm is compared using the metrics such as sum throughput, PU SINR, algorithm running time and SU SINR less than threshold and the results show that the PSOFAGA with ELGR admission control algorithm has best performance compared to GA, PSO, FA, and FAGAPSO algorithms. -
With the global rise of digital data, the uncontrolled quantity of data is susceptible to cyber warfare or cyber attacks. Therefore, it is necessary to improve cyber security systems. This research studies the behavior of malicious acts and uses Higuchi Fractal Dimension (HFD), which is a non-linear mathematical method to examine the intricacy of the behavior of these malicious acts and anomalies within the cyber physical system. The HFD algorithm was tested successfully using synthetic time series network data and validated on real-time network data, producing accurate results. It was found that the highest fractal dimension value was computed from the DoS attack time series data. Furthermore, the difference in the HFD values between the DoS attack data and the normal traffic data was the highest. The malicious network data and the non-malicious network data were successfully classified using the Receiver Operating Characteristics (ROC) method in conjunction with a scaling stationary index that helps to boost the ROC technique in classifying normal and malicious traffic. Hence, the suggested methodology may be utilized to rapidly detect the existence of abnormalities in traffic with the aim of further using other methods of cyber-attack detection.
-
Social studies show that the number of separated families have lately increased due to different reasons. Despite the causes for family rift, many problems are resulted which affected the children physically and psychologically. This effect may cause them fail in their life especially at school. This paper focuses on the negative reaction of the parents' separation with other factors from the computer science prospective. Since the artificial intelligent field is the most common widespread in computer science, a predictive model is built to predict if a specific child whose parents separated, may complete the school successfully or fail to continue his education. This will be done using Decision Tree that have proved their effectiveness on the predication applications. As an experiment, a sample of individuals is randomly chosen and applied on our prediction model. As a result, this model shows that the separation may cause the child success at school if other factors are satisfied; the intelligent of the guardian, the relation between the parents after the separation, his age at the separation time, etc.
-
Elsayed Radwan;Basem Y. Alkazemi;Ahmed I. Sharaf 85
Image halftoning is a technique for varying grayscale images into two-tone binary images. Unfortunately, the static representation of an image-half toning, wherever each pixel intensity is combined by its local neighbors only, causes missing subjective problem. Also, the existing noise causes an instability criterion. In this paper an image half-toning is represented as a dynamical system for recognizing the global representation. Also, noise is reduced based on a probabilistic model. Since image half-toning is considered as 2-D matrix with a full connected pass, this structure is recognized by the dynamical system of Cellular Neural Networks (CNNs) which is defined by its template. Bayesian Rough Sets is used in exploiting the ideal CNNs construction that synthesis its dynamic. Also, Bayesian rough sets contribute to enhance the quality of the halftone image by removing noise and discovering the effective parameters in the CNNs template. The novelty of this method lies in finding a probabilistic based technique to discover the term of CNNs template and define new learning rules for CNNs internal work. A numerical experiment is conducted on image half-toning corrupted by Gaussian noise. -
Lama AlNabulsi;Sireen AlGhamdi;Ghala AlMuhawis;Ghada AlSaif;Fouz AlKhaldi;Maryam AlDossary;Hussian AlAttas;Abdullah AlMuhaideb 95
The emergence of Internet of Things (IoT) into our daily lives has grown rapidly. It's been integrated to our homes, cars, and cities, increasing the intelligence of devices involved in communications. Enormous amount of data is exchanged over smart devices through the internet, which raises security concerns in regards of privacy evasion. This paper is focused on the forensics and intrusion detection on one of the most common protocols in IoT environments, especially smart home environments, which is the Message Queuing Telemetry Transport (MQTT) protocol. The paper covers general IoT infrastructure, MQTT protocol and attacks conducted on it, and multiple network forensics frameworks in smart homes. Furthermore, a machine learning model is developed and tested to detect several types of attacks in an IoT network. A forensics tool (MQTTracker) is proposed to contribute to the investigation of MQTT protocol in order to provide a safer technological future in the warmth of people's homes. The MQTT-IOT-IDS2020 dataset is used to train the machine learning model. In addition, different attack detection algorithms are compared to ensure the suitable algorithm is chosen to perform accurate classification of attacks within MQTT traffic. -
Financial inclusion is the safe and timely access of formal financial services to people at affordable costs. Various barriers of legacy financial system hinder the involvement of all segments of populations in the financial sector. The journey from financial exclusion to financial inclusion has to be achieved with the implementation of technological breakthroughs. Covid-19 has also raised the need for technology in all sectors of the economy. This research paper introduces the concept of intelligent financial inclusion which is the provision of financial services to people with the help of intelligent systems. This intelligent system will take the concepts from the human mind, cognitive sciences, and artificial intelligence tools and techniques. For achieving the optimal level of financial inclusion, economies must shift their financial sector from traditional means to intelligent financial systems. In this way, intelligent financial inclusion will achieve the target of involving all people in the financial sector.
-
Knowledge Based Authentication is the most well-known technique for user authentication in a computer security framework. Most frameworks utilize a straightforward PIN (Personal Identification Number) or psssword as an data authenticator. Since password based authenticators typically will be software based, they are inclined to different attacks and weaknesses, from both human and software.Some of the attacks are talked about in this paper.
-
Sentiment categorization technique be commonly isolated interested in threes significant classifications name Machine Learning Procedure (ML), Lexicon Based Method (LB) also finally, the Hybrid Method. In Machine Learning Methods (ML) utilizes phonetic highlights with apply notable ML algorithm. In this paper, in classification and identification be complete base under in optimizations technique called sequential minimal optimization with Random Forest algorithm (SMORF) for expanding the exhibition and proficiency of sentiment classification framework. The three existing classification algorithms are compared with proposed SMORF algorithm. Imitation result within experiential structure is Precisions (P), recalls (R), F-measures (F) and accuracy metric. The proposed sequential minimal optimization with Random Forest (SMORF) provides the great accuracy.
-
Active queue management (AQM) is a leading congestion control system, which can keep smaller queuing delay, less packet loss with better network utilization and throughput by intentionally dropping the packets at the intermediate hubs in TCP/IP (transmission control protocol/Internet protocol) networks. To accelerate the responsiveness of AQM framework, proportional-integral-differential (PID) controllers are utilized. In spite of its simplicity, it can effectively take care of a range of complex problems; however it is a lot complicated to track down optimal PID parameters with conventional procedures. A few new strategies have been grown as of late to adjust the PID controller parameters. Therefore, in this paper, we have developed a Squirrel search based PID controller to dynamically find its controller gain parameters for AQM. The controller gain parameters are decided based on minimizing the integrated-absolute error (IAE) in order to ensure less packet loss, high link utilization and a stable queue length in favor of TCP networks.
-
The field of digital forensics requires good theoretical and practical knowledge, so practitioners should have an in-depth understanding and knowledge of both theory and practical as they need to take decisions which impacts human lives. With the demand and advancements in the realm of digital forensics, many universities around the globe are offering digital forensics programs, but there is a huge gap between the skills acquired by the student's and the market needs. This research work explores the problems faced by digital forensics programs, and provides solution to overcome the gap between the skills acquired by the student's and the market needs using Activity led learning pedagogy for digital forensics programs.
-
Sami S. Albouq;Adnan Ani Sen;Nabile Almoshfi;Mohammad Bin Sedeq;Nour Bahbouth 139
These days, protecting location privacy has become essential and really challenging, especially protecting it from smart applications and services that rely on Location-Based Services (LBS). As the technology and the services that are based on it are developed, the capability and the experience of the attackers are increased. Therefore, the traditional protection ways cannot be enough and are unable to fully ensure and preserve privacy. Previously, a hybrid approach to privacy has been introduced. It used an obfuscation technique, called Double-Obfuscation Approach (DOA), to improve the privacy level. However, this approach has some weaknesses. The most important ones are the fog nodes that have been overloaded due to the number of communications. It is also unable to prevent the Tracking and Identification attacks in the Mix-Zone technique. For these reasons, this paper introduces a developed and enhanced approach, called Multi-Obfuscation Approach (MOA that mainly depends on the communication between neighboring fog nodes to overcome the drawbacks of the previous approach. As a result, this will increase the resistance to new kinds of attacks and enhance processing. Meanwhile, this approach will increase the level of the users' privacy and their locations protection. To do so, a big enough memory is needed on the users' sides, which already is available these days on their devices. The simulation and the comparison prove that the new approach (MOA) exceeds the DOA in many Standards for privacy protection approaches. -
In areas where water is scarce, water management is critical. This has an impact on agriculture, as a significant amount of water is used for that purpose. Electronic measurement equipment are essential for regulating and storing soil data. As a result, research has been conducted to manage water usage in the irrigation process. Many equipment for managing soil fertility systems are extremely expensive, making this type of system unaffordable for small farmers. These soil fertility control systems are simple to implement because to recent improvements in IoT technology. The goal of this project is to develop a new methodology for smart irrigation systems. The parameters required to maintain water amount and quality, soil properties, and weather conditions are determined by this IoT-based Smart irrigation System. The system also assists in sending warning signals to the consumer when an error occurs in determining the percentage of moisture in the soil specified for the crop, as well as an alert message when the fertility of the soil changes, since many workers, particularly in big projects, find it extremely difficult to check the soil on a daily basis and operate agricultural devices such as sprinkler and soil fertilizing devices.
-
Oksana Dzhus;Oleksii Lystopad;Iryna Mardarova;Tetyana Kozak;Tetiana Zavgorodnia 151
The main purpose of the article is to analyze the practice of overcoming during distance learning of students-future teachers of a preschool education institution. The key aspects of practical activities to counter a stressful situation during distance learning of students-future teachers of a preschool education institution are identified. The research methodology includes a number of methods designed to analyze the practice of coping with stress during distance learning of students. The results of the study include the definition of the main elements of practical activities to counteract stress and stressful situations of different scales in the distance learning of students-future teachers of a preschool education institution. Further research requires the analysis of international experience in dealing with a stressful situation during distance learning of students. -
IEEE 802.15.4e-TSCH is recognized as a wireless industrial sensor network standard used in IoT systems. To ensure both power savings and reliable communications, the TSCH standard uses techniques including channel hopping and bandwidth reserve. In TSCH mode, scheduling is crucial because it allows sensor nodes to select when data should be delivered or received. Because a wide range of applications may necessitate energy economy and transmission dependability, we present a distributed approach that uses a cluster tree topology to forecast scheduling requirements for the following slotframe, concentrating on the Poisson model. The proposed Optimized Minimal Scheduling Function (OMSF) is interested in the details of the scheduling time intervals, something that was not supported by the Minimal Scheduling Function (MSF) proposed by the 6TSCH group. Our contribution helps to deduce the number of cells needed in the following slotframe by reducing the number of negotiation operations between the pairs of nodes in each cluster to settle on a schedule. As a result, the cluster tree network's error rate, traffic load, latency, and queue size have all decreased.
-
K.A.Surya Rajeswar;Pon Ramalingam;Sudalaimuthu.T 166
The Stock price analysis is an increasing concern in a financial time series. The purpose of the study is to analyze the price parameters of date, high, low, and news feed about the stock exchange price. Long short term memory (LSTM) is a cutting-edge technology used for predicting the data based on time series. LSTM performs well in executing large sequence of data. This paper presents the Long Short Term Memory Model has used to analyze the stock price ranges of 10 days and 20 days by exponential moving average. The proposed approach gives better performance using technical indicators of stock price with an accuracy of 82.6% and cross entropy of 71%. -
Mohsin Shaikha;Irfan Tunio;Baqir Zardari;Abdul Aziz;Ahmed Ali;Muhammad Abrar Khan 172
When the mobile device moves from the coverage of one access point to the radio coverage of another access point it needs to maintain its connection with the current access point before it successfully discovers the new access point, this process is known as handoff. During handoff the acceptable delay a voice over IP application can bear is of 50ms whereas the delay on medium access control layer is high enough that goes up to 350-500ms. This research provides a suitable methodology on medium access control layer of the IEEE 802.11 network. The medium access control layer comprises of three phases, namely discovery, reauthentication and re-association. The discovery phase on medium access control layer takes up to 90% of the total handoff latency. The objective is to effectively reduce the delay for discovery phase to ensure a seamless handoff. The research proposes a scheme that reduces the handoff latency effectively by scanning channels prior to the actual handoff process starts and scans only the neighboring access points. Further, the proposed scheme enables the mobile device to scan first the channel on which it is currently operating so that the mobile device has to perform minimum number of channel switches. The results show that the mobile device finds out the new potential access point prior to the handoff execution hence the delay during discovery of a new access point is minimized effectively. -
Tariq Rafiq;Zafar Iqbal;Tahreem Saeed;Yawar Abbas Abid;Muneeb Tariq;Urooj Majeed;Akasha 179
For the future prosperity of any society, the sound growth of children is essential. Autism Spectrum Disorder (ASD) is a neurobehavioral disorder which has an impact on social interaction of autistic child and has an undesirable effect on his learning, speaking, and responding skills. These children have over or under sensitivity issues of touching, smelling, and hearing. Its symptoms usually appear in the child of 4- to 11-year-old but parents did not pay attention to it and could not detect it at early stages. The process to diagnose in recent time is clinical sessions that are very time consuming and expensive. To complement the conventional method, machine learning techniques are being used. In this way, it improves the required time and precision for diagnosis. We have applied TFLite model on image based dataset to predict the autism based on facial features of child. Afterwards, various machine learning techniques were trained that includes Logistic Regression, KNN, Gaussian Naïve Bayes, Random Forest and Multi-Layer Perceptron using Autism Spectrum Quotient (AQ) dataset to improve the accuracy of the ASD detection. On image based dataset, TFLite model shows 80% accuracy and based on AQ dataset, we have achieved 100% accuracy from Logistic Regression and MLP models. -
Today's world is experiencing rapid technological advancement like never before. The ever-changing technology space has overwhelmed citizens with a substantial load of information, which has made it difficult for them to keep up with the technology awareness. This review paper is written to provide information about the Internet of Things in a way that technical along with nontechnical individuals can understand the definition, historical evolution, components, and scope of IoT technology. Relevant literature published between January 2009 and February 2023 was included in this paper. The applications of the Internet of Things in healthcare have been a special focus of this paper as IoT has massive potential in this field and healthcare professionals often face significant issues in keeping their technology knowledge up to date. Moreover, some of the most common issues associated with IoT introduction in healthcare are also discussed in the paper along with some suitable recommendations. Although, IoT can significantly transform our lives and can introduce convenience and efficiency, particularly in the healthcare sector. However, its adoption in healthcare is still a major task due to various challenges presented by the health workforce. Thus, in-depth empirical research is suggested to assist the IoT technology transition.