11 research outputs found

    Machine learning-based anomaly detection in NFV: a comprehensive survey

    Get PDF
    Network function virtualization (NFV) is a rapidly growing technology that enables the virtualization of traditional network hardware components, offering benefits such as cost reduction, increased flexibility, and efficient resource utilization. Moreover, NFV plays a crucial role in sensor and IoT networks by ensuring optimal resource usage and effective network management. However, adopting NFV in these networks also brings security challenges that must promptly and effectively address. This survey paper focuses on exploring the security challenges associated with NFV. It proposes the utilization of anomaly detection techniques as a means to mitigate the potential risks of cyber attacks. The research evaluates the strengths and weaknesses of various machine learningbased algorithms for detecting network-based anomalies in NFV networks. By providing insights into the most efficient algorithm for timely and effective anomaly detection in NFV networks, this study aims to assist network administrators and security professionals in enhancing the security of NFV deployments, thus safeguarding the integrity and performance of sensors and IoT systems

    JQPro : Join query processing in a distributed system for big RDF data using the hash-merge join technique

    Get PDF
    In the last decade, the volume of semantic data has increased exponentially, with the number of Resource Description Framework (RDF) datasets exceeding trillions of triples in RDF repositories. Hence, the size of RDF datasets continues to grow. However, with the increasing number of RDF triples, complex multiple RDF queries are becoming a significant demand. Sometimes, such complex queries produce many common sub-expressions in a single query or over multiple queries running as a batch. In addition, it is also difficult to minimize the number of RDF queries and processing time for a large amount of related data in a typical distributed environment encounter. To address this complication, we introduce a join query processing model for big RDF data, called JQPro. By adopting a MapReduce framework in JQPro, we developed three new algorithms, which are hash-join, sort-merge, and enhanced MapReduce-join for join query processing of RDF data. Based on an experiment conducted, the result showed that the JQPro model outperformed the two popular algorithms, gStore and RDF-3X, with respect to the average execution time. Furthermore, the JQPro model was also tested against RDF-3X, RDFox, and PARJs using the LUBM benchmark. The result showed that the JQPro model had better performance in comparison with the other models. In conclusion, the findings showed that JQPro achieved improved performance with 87.77% in terms of execution time. Hence, in comparison with the selected models, JQPro performs better

    Attention-Based Ensemble Network for Effective Breast Cancer Classification over Benchmarks

    No full text
    Globally, breast cancer (BC) is considered a major cause of death among women. Therefore, researchers have used various machine and deep learning-based methods for its early and accurate detection using X-ray, MRI, and mammography image modalities. However, the machine learning model requires domain experts to select an optimal feature, obtains a limited accuracy, and has a high false positive rate due to handcrafting features extraction. The deep learning model overcomes these limitations, but these models require large amounts of training data and computation resources, and further improvement in the model performance is needed. To do this, we employ a novel framework called the Ensemble-based Channel and Spatial Attention Network (ECS-A-Net) to automatically classify infected regions within BC images. The proposed framework consists of two phases: in the first phase, we apply different augmentation techniques to enhance the size of the input data, while the second phase includes an ensemble technique that parallelly leverages modified SE-ResNet50 and InceptionV3 as a backbone for feature extraction, followed by Channel Attention (CA) and Spatial Attention (SA) modules in a series manner for more dominant feature selection. To further validate the ECS-A-Net, we conducted extensive experiments between several competitive state-of-the-art (SOTA) techniques over two benchmarks, including DDSM and MIAS, where the proposed model achieved 96.50% accuracy for the DDSM and 95.33% accuracy for the MIAS datasets. Additionally, the experimental results demonstrated that our network achieved a better performance using various evaluation indicators, including accuracy, sensitivity, and specificity among other methods

    Deep LSTM model for diabetes prediction with class balancing by SMOTE

    Get PDF
    Diabetes is an acute disease that happens when the pancreas cannot produce enough insulin. It can be fatal if undiagnosed and untreated. If diabetes is revealed early enough, it is possible, with adequate treatment, to live a healthy life. Recently, researchers have applied artificial intelligence techniques to the forecasting of diabetes. As a result, a new SMOTE-based deep LSTM system was developed to detect diabetes early. This strategy handles class imbalance in the diabetes dataset, and its prediction accuracy is measured. This article details investigations of CNN, CNN-LSTM, ConvLSTM, and deep 1D-convolutional neural network (DCNN) techniques and proposed a SMOTE-based deep LSTM method for diabetes prediction. Furthermore, the suggested model is analyzed towards machine-learning, and deep-learning approaches. The proposed model’s accuracy was measured against the diabetes dataset and the proposed method achieved the highest prediction accuracy of 99.64%. These results suggest that, based on classification accuracy, this method outperforms other methods. The recommendation is to use this classifier for diabetic patients’ clinical analysis

    Enhanced centroid-based energy-efficient clustering routing protocol for serverless based wireless sensor networks

    No full text
    Serverless computing is a new concept as cloud computing, which dynamically manages the networks and is applied in Serverless Wireless Sensor Networks (SWSN) to help the networks. These networks are becoming famous for monitoring various physical and environmental factors. Serverless computing also facilitates the networks by offering an extensive range of applications. Different applications have been designed for monitoring purposes where the sensor nodes sense the data and transmit it to the base station through single or multi-hop routing. However, existing routing protocols cannot manage the sensor nodes’ energy issues because of the complex routing processes and depleted their power before their time. Because of these limitations, the nodes close to BS continuously rely on the network for data forwarding. As a result, these nodes cause energy consumption and lead to a useless state. This paper proposes a serverless architecture and designs an Enhanced Centroid-based Energy Efficient Clustering (ECEEC) protocol for SWSN networks. The proposed serverless architecture provides automated scalability, cost-effective services, and stateless execution. In addition, the proposed protocol offers the cluster head selection and its rotation to maximize the energy efficiency in the network. Furthermore, gateway nodes are chosen in every cluster to overcome the load on the cluster head. Simulation results indicated the excellent performance of the proposed protocol as compared to the existing routing protocols concerning network lifetime and energy consumption. The proposed protocol shows better reliability with nodes failing at 650 rounds compared to 600 rounds, especially with 5 % and 10 % Cluster Heads. The proposed protocol exhibits superior energy efficiency consumption of SNs under varying CH percentages, indicating the protocol’s consistent performance across different scenarios

    Imperative Role of Digital Twin in the Management of Hospitality Services

    Get PDF
    Digital twin implementation enables more effective terms of evaluation and planning, and also effective utilization of resources with a flood of knowledge to improve the real-time services. The hospitality industry settings utilize digital twin technologies to introduce new ideas with sensor, actuators, AR/VR improve production, and improve customer services. Currently, the hospitality industry is focused to create a fast, virtual world space where customers can get a real world of hospitality. The technologically digital twin of a vast inn office can be implemented to create both discrete and continuous event recreations in order to precisely conceptualize the events that occur in distinct frameworks. Based on the above facts, the adoption of the digital twin in the hospitality industry has gained significant attention. With this motivation, the study aims to investigate the significance and application of the digital twins in the hospitality industry for establishing innovative and digital infrastructure. In addition to this, the study discusses different elements that are significant for the digital twin. Finally, the article summarizes and recommends vital recommendation in the adoption of digital twin in hospitality industry

    The CSFs from the Perspective of Users in Achieving ERP System Implementation and Post-Implementation Success: A Case of Saudi Arabian Food Industry

    No full text
    Enterprise resource planning (ERP) systems have a major impact on the functioning of organizations and the development of business strategy. However, one of the main reasons that cause failure in ERP implementations to achieve the expected benefits is that the system is not fully accepted by end users. User rejection of the system is the second reason after time and budget overrun, while the fourth barrier to ERP post-implementation. Most studies have focused on ERP adoption and installation while neglecting post-implementation evaluation, which omits insights into the priority of ERP systems and CSFs from the stance of ERP users. Therefore, this study identified factors that led to user acceptance of the use of ERP systems at both implementation and post-implementation stages (after installation). In addition, this study assessed the interrelationship between the factors and the most influential factors toward user acceptance. A survey was conducted among pioneers of the food industry in Saudi Arabia, which included 144 ERP system users from assembly and manufacturing, accounts, human resources, warehouse, and sales departments. The descriptive-analytical approach was deployed in this study. As a result, project management, top management support, and user training had significant impacts on the efficacy of ERP system implementation. On the contrary, support for technological changes in new software and hardware, managing changes in systems, procedures, and work steps already in place within the organization, as well as user interfaces and custom code, displayed a direct impact on user acceptance of ERP systems post-implementation. This study is the first research that provides a rating of CSFs from the perspective of its users in Saudi Arabia. It also enables decision makers of food industries to better assess the project risks, implement risk-mitigation methods, create appropriate intervention techniques to discover the strengths and limitations of the ERP users, and value the “best of fit” solutions over “best practice” solutions when determining the most appropriate option for food industries

    Development of an Image Encryption Algorithm using Latin Square Matrix and Logistics Map

    Get PDF
    The goal of this study was to develop a robust image cryptographic scheme based on Latin Square Matrix and Logistics Map, capable of effectively securing sensitive data. Logistics mapping is a comparatively strong chaos system which enciphers with an unpredictability that significantly reduces the chance of deciphering. Additionally, the Latin square matrix stands out for its uniform histogram distribution, thereby bolstering its encryption's potency. The consequent integration of these algorithms in this study was therefore grounded in the scientific rationale of establishing a strong and resilient cypher technique. The study provides a new chaos-based method and extends the application of the probabilistic approach to the domain of symmetric key image encryption. Permutation and substitution approaches of image encryption were deployed to address the issue of images volume and differing sizes. The issue of misplaced pixel positions in the image was also adequately addressed, making it an effective method for image encryption. The hybrid technique was simulated on image data and evaluated to gauge its performance. Results showed that the algorithm was able to securely protect image data and the private information associated with them, while also making it very difficult for unauthorized users to decrypt the information. The average encryption time of 184(ÎĽs) on seven (7) images showed that it could to be deployed for real-time systems. The proposed method obtained an average entropy of 7.9398 with key space of 1.17x1077 and an average avalanche effect (%) of 49.9823 confirming the security and resilience of the developed method

    Improving Efficiency of Large RFID Networks Using a Clustered Method: A Comparative Analysis

    No full text
    Radio Frequency Identification (RFID) is primarily used to resolve the problems of taking care of the majority of nodes perceived and tracking tags related to the items. Utilizing contactless radio frequency identification data can be communicated distantly using electromagnetic fields. In this paper, the comparison and analysis made between the Clustered RFID with existing protocols Ad hoc On-demand Multicast Distance Vector Secure Adjacent Position Trust Verification (AOMDV_SAPTV) and Optimal Distance-Based Clustering (ODBC) protocols based on the network attributes of accuracy, vulnerability and success rate, delay and throughput while handling the huge nodes of communication. In the RFID Network, the clustering mechanism was implemented to enhance the performance of the network when scaling nodes. Multicast routing was used to handle the large number of nodes involved in the transmission of particular network communication. While scaling up the network, existing methods may be compromised with their efficiency. However, the Clustered RFID method will give better performance without compromising efficiency. Here, Clustered RFID gives 93% performance, AOMDV_SAPTV can achieve 79%, and ODBC can reach 85% of performance. Clustered RFID gives 14% better performance than AOMDV_SAPTV and 8% better performance than ODBC for handling a huge range of nodes

    The CSFs from the Perspective of Users in Achieving ERP System Implementation and Post-Implementation Success: A Case of Saudi Arabian Food Industry

    No full text
    Enterprise resource planning (ERP) systems have a major impact on the functioning of organizations and the development of business strategy. However, one of the main reasons that cause failure in ERP implementations to achieve the expected benefits is that the system is not fully accepted by end users. User rejection of the system is the second reason after time and budget overrun, while the fourth barrier to ERP post-implementation. Most studies have focused on ERP adoption and installation while neglecting post-implementation evaluation, which omits insights into the priority of ERP systems and CSFs from the stance of ERP users. Therefore, this study identified factors that led to user acceptance of the use of ERP systems at both implementation and post-implementation stages (after installation). In addition, this study assessed the interrelationship between the factors and the most influential factors toward user acceptance. A survey was conducted among pioneers of the food industry in Saudi Arabia, which included 144 ERP system users from assembly and manufacturing, accounts, human resources, warehouse, and sales departments. The descriptive-analytical approach was deployed in this study. As a result, project management, top management support, and user training had significant impacts on the efficacy of ERP system implementation. On the contrary, support for technological changes in new software and hardware, managing changes in systems, procedures, and work steps already in place within the organization, as well as user interfaces and custom code, displayed a direct impact on user acceptance of ERP systems post-implementation. This study is the first research that provides a rating of CSFs from the perspective of its users in Saudi Arabia. It also enables decision makers of food industries to better assess the project risks, implement risk-mitigation methods, create appropriate intervention techniques to discover the strengths and limitations of the ERP users, and value the “best of fit” solutions over “best practice” solutions when determining the most appropriate option for food industries
    corecore