39 research outputs found

    UAV Based 5G Network: A Practical Survey Study

    Full text link
    Unmanned aerial vehicles (UAVs) are anticipated to significantly contribute to the development of new wireless networks that could handle high-speed transmissions and enable wireless broadcasts. When compared to communications that rely on permanent infrastructure, UAVs offer a number of advantages, including flexible deployment, dependable line-of-sight (LoS) connection links, and more design degrees of freedom because of controlled mobility. Unmanned aerial vehicles (UAVs) combined with 5G networks and Internet of Things (IoT) components have the potential to completely transform a variety of industries. UAVs may transfer massive volumes of data in real-time by utilizing the low latency and high-speed abilities of 5G networks, opening up a variety of applications like remote sensing, precision farming, and disaster response. This study of UAV communication with regard to 5G/B5G WLANs is presented in this research. The three UAV-assisted MEC network scenarios also include the specifics for the allocation of resources and optimization. We also concentrate on the case where a UAV does task computation in addition to serving as a MEC server to examine wind farm turbines. This paper covers the key implementation difficulties of UAV-assisted MEC, such as optimum UAV deployment, wind models, and coupled trajectory-computation performance optimization, in order to promote widespread implementations of UAV-assisted MEC in practice. The primary problem for 5G and beyond 5G (B5G) is delivering broadband access to various device kinds. Prior to discussing associated research issues faced by the developing integrated network design, we first provide a brief overview of the background information as well as the networks that integrate space, aviation, and land

    5G Network Management, Orchestration, and Architecture: A Practical Study of the MonB5G project

    Full text link
    The cellular device explosion in the past few decades has created many different opportunities for development for future generations. The 5G network offers a greater speed in the transmissions, a lower latency, and therefore greater capacity for remote execution. The benefits of AI for 5G network slicing orchestration and management will be discussed in this survey paper. We will study these topics in light of the EU-funded MonB5G project that works towards providing zero-touch management and orchestration in the support of network slicing at massive scales for 5G LTE and beyond

    A Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems

    Get PDF
    The Cypher Physical Power Systems (CPPS) became vital targets for intruders because of the large volume of high speed heterogeneous data provided from the Wide Area Measurement Systems (WAMS). The Nonnested Generalized Exemplars (NNGE) algorithm is one of the most accurate classification techniques that can work with such data of CPPS. However, NNGE algorithm tends to produce rules that test a large number of input features. This poses some problems for the large volume data and hinders the scalability of any detection system. In this paper, we introduce VHDRA, a Vertical and Horizontal Data Reduction Approach, to improve the classification accuracy and speed of the NNGE algorithm and reduce the computational resource consumption. VHDRA provides the following functionalities: (1) it vertically reduces the dataset features by selecting the most significant features and by reducing the NNGE's hyperrectangles. (2) It horizontally reduces the size of data while preserving original key events and patterns within the datasets using an approach called STEM, State Tracking and Extraction Method. The experiments show that the overall performance of VHDRA using both the vertical and the horizontal reduction reduces the NNGE hyperrectangles by 29.06%, 37.34%, and 26.76% and improves the accuracy of the NNGE by 8.57%, 4.19%, and 3.78% using the Multi-, Binary, and Triple class datasets, respectively.This work was made possible by NPRP Grant # NPRP9-005-1-002 from the Qatar National Research Fund (a member of Qatar Foundation).Scopu

    Penilaian tingkat kesehatan pada perusahaan perbankan syariah menggunakan metode RGEC: Studi pada Bank Mandiri Syariah, Bank Muamalat Indonesia dan Bank BNI Syariah

    Get PDF
    INDONESIA: Melalui Bank Indonesia pada tahun 2011 Pemerintah telah menetapkan bahwa bank wajib melakukan penilaian tingkat kesehatan bank secara individual dengan menggunakan metode RGEC. Penelitian ini bertujuan untuk mengetahui tingkat kesehatan dari Bank Mandiri Syariah, Bank Muamalat Indonesia dan Bank BNI Syariah. Metode penelitian yang digunakan adalah kuantitatif. Pengukuran kinerja keuangan dilakukan menggunakan metode RGEC. Pengambilan sampel pada penelitian ini menggunakan menggunakan purposive sampling sehingga didapatkan 3 bank umum syariah yang sesuai dengan kriteria penelitian. Penelitian ini menggunakan metode kuantitatif non statistik deskriptif, dan data yang digunakan dalam penelitian ini adalah data sekunder yang diperoleh melalui laporan keuangan masing-masing bank. Berdasarkan hasil pengukuran kinerja keuangan yang ditinjau dari aspek RGEC pada periode 2018-2019 yang meliputi NPF, FDR, ROA, NOM. CAR dan GCG dapat diperoleh kesimpulan bahwa kinerja ketiga bank dinilai baik, namun Bank Muamalat Indonesia mendapat predikat kurang baik dalam rasio ROA pada tahun 2018-2019, sedangkan Bank BNI Syariah dan Bank Mandiri Syariah mendapat predikat yang baik dalam semua rasio. ENGLISH: Through Bank Indonesia in 2011, the Government has determined that banks are required to assess the health of individual banks by using RGEC Method. This study aims to determine the health level of Bank Syariah Mandiri, Bank Muamalat Indonesia and Bank BNI Syariah. The research method used is quantitative. The Assessment of financial performance is carried out using the RGEC method. The sampling in this study using purposive sampling method to obtain three Islamic banks following the criteria. This study used a quantitative non-descriptive statistics method, and the data used in this research is secondary data obtained through the financial statements of each bank. Based on the results of the assessment of financial performance in terms of aspects RGEC in the 2018-2019 period covering NPF, FDR, ROA, NOM. CAR and GCG can be concluded that the performances of the three banks are considered good, but the Bank Muamalat Indonesia received the title less well in ROA in the 2018 and 2019 period, while Bank BNI Syariah and Bank Mandiri Syariah received the title well in all ratios. ARABIC: من خلال بنك اندونيسيا في سنة ٢٠١١، وقد نص على الحكومة أن يطلب من البنوك لتقييم سلامة البنوك بشكل فردي باستخدام أسلوب ملف خطر و الحوكمة الشّركة الجيدة و أرباح و عاصمة. يهدف هذا البحث إلى تحديد مستوى الصحة بنك مانديري الشرعية و بنك معاملات أندونيسيا وبنك نيجارا اندونيسيا الشريعة. منهج البحث المستخدم هو الكمي. يتم قياس الأداء المالي باستخدام أسلوب ملف خطر و الحوكمة الشّركة الجيدة و أرباح و عاصمة. أخذ العينات في هذا البحث باستخدام أخذ العينات هادفة من أجل الحصول على ٣ بنوك التجارية الإسلامية التي تطابق معايير البحث. يستخدم هذا البحث الأساليب الوصفية الكمية غير الإحصائية. والبيانات المستخدمة في هذه الدراسة البيانات الثانوية التي تم الحصول عليها من خلال البيانات المالية لكل بنك. بناءً على نتائج قياس الأداء المالي من حيث أسلوب ملف خطر و الحوكمة الشّركة الجيدة و أرباح و عاصمة من سنة ٢٠١٨-٢٠١٩. والتي تشمل التمويل المتعثر، ونسبة التمويل إلى الدين، والعائد على الأصول، وصافي هامش التشغيل، ونسبة كفاية رأس المال، والحوكمة الجيدة للشركات، يمكن الاستنتاج أن أداء البنوك الثلاثة يعتبر جيدًا، ومع ذلك، تلقى بنك معاملات اندونيسيا المسند سيئة في العائد على الموجودات نسبة من سنة ٢٠١٨-٢٠١٩، في حين حصل بنك نيجارا اندونيسيا الشريعة و بنك مانديري الشريعة المسند جيد في جميع النسب

    Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach

    Full text link
    Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes. Our study of major adversarial attack models shows that they all specifically target and exploit the neural networking structures in their designs. This understanding makes us develop a hypothesis that most classical machine learning models, such as Random Forest (RF), are immune to adversarial attack models because they do not rely on neural network design at all. Our experimental study of classical machine learning models against popular adversarial attacks supports this hypothesis. Based on this hypothesis, we propose a new adversarial-aware deep learning system by using a classical machine learning model as the secondary verification system to complement the primary deep learning model in image classification. Although the secondary classical machine learning model has less accurate output, it is only used for verification purposes, which does not impact the output accuracy of the primary deep learning model, and at the same time, can effectively detect an adversarial attack when a clear mismatch occurs. Our experiments based on CIFAR-100 dataset show that our proposed approach outperforms current state-of-the-art adversarial defense systems.Comment: 17 pages, 3 figure

    Intrusion detection and prevention of web service attacks for software as a service:Fuzzy association rules vs fuzzy associative patterns

    Get PDF
    Cloud computing inherits all the systems, networks as well asWeb Services’ security vulnerabilities, in particular for software as a service (SaaS), where business applications or services are provided over the Cloud as Web Service (WS). Hence, WS-based applications must be protected against loss of integrity, confidentiality and availability when they are deployed over to the Cloud environment. Many existing IDP systems address only attacks mostly occurring at PaaS and IaaS. In this paper, we present our fuzzy association rule-based (FAR) and fuzzy associative pattern-based (FAP) intrusion detection and prevention (IDP) systems in defending against WS attacks at the SaaS level. Our experimental results have validated the capabilities of these two IDP systems in terms of detection of known attacks and prediction of newvariant attacks with accuracy close to 100%. For each transaction transacted over the Cloud platform, detection, prevention or prediction is carried out in less than five seconds. For load and volume testing on the SaaS where the system is under stress (at a work load of 5000 concurrent users submitting normal, suspicious and malicious transactions over a time interval of 300 seconds), the FAR IDP system provides close to 95% service availability to normal transactions. Future work involves determining more quality attributes besides service availability, such as latency, throughput and accountability for a more trustworthy SaaS

    RANCANG BANGUN APLIKASI E-VOTING BERBASIS WEB PADA PEMILIHAN KETUA DAN WAKIL KETUA OSIS DI SMK IBNU KHOLDUN AL HASYIMI

    No full text
    Proses pemilihan Ketua dan Wakil Ketua Osis di SMK Ibnu Kholdun Al Hasyimi masih bersifat konvensional, proses ini terlalu banyak dana yang harus dikeluarkan dan juga banyak siswa/siswi yang tidak bisa menyumbangkan hak suaranya dikarenakan sakit atau tidak bisa hadir karena alasan sesuatu hal. Seiring perkembangan teknologi yang canggih di zaman yang modern ini peneliti ingin mengimplementasikan pemilihan umum yang berbasis website atau yang disebut dengan e-voting. Penelitian ini bertujuan untuk merancang aplikasi e-voting bebasis web dan menguji kelayakan produk aplikasi e-voting dalam pemilihan ketua dan wakil ketua OSIS. Aplikasi E-voting yang berbasis PHP MYSQL yang dikembangkan menggunakan metode Prototype dapat mempermudah pemilihan, mengurangi pemanipulasian data, mengurangi pemilihan 2 kali dan serta mempercepat perhitungan dan pelaporan. Berdasarkan dari hasil pengujian black box testing yaitu fungsi-fungsi yang ada dalam sistem e-voting setelah di uji coba yaitu menyatakan berhasil sehingga dapat diimplementasikan kedalam pemilihan Ketua dan Wakil Ketua OSIS di SMK Ibnu Kholdun Al Hasyimi dan berdasarkan uji kelayakan yang dilakukann oleh 7 orang pemilih/user, tingkat kelayakan sistem e-voting berbasis web sebesar 84,17 % artinya sangat layak digunakan pada pemilihan Ketua dan Wakil Ketua OSIS di SMK Ibnu Kholdun Al Hasyim

    Multi-Layer Attack Graph Analysis in the 5G Edge Network Using a Dynamic Hexagonal Fuzzy Method

    No full text
    Overall, 5G networks are expected to become the backbone of many critical IT applications. With 5G, new tech advancements and innovation are expected; 5G currently operates on software-defined networking. This enables 5G to implement network slicing to meet the unique requirements of every application. As a result, 5G is more flexible and scalable than 4G LTE and previous generations. To avoid the growing risks of hacking, 5G cybersecurity needs some significant improvements. Some security concerns involve the network itself, while others focus on the devices connected to 5G. Both aspects present a risk to consumers, governments, and businesses alike. There is currently no real-time vulnerability assessment framework that specifically addresses 5G Edge networks, with regard to their real-time scalability and dynamic nature. This paper studies the vulnerability assessment in the 5G networks and develops an optimized dynamic method that integrates the Technique for Order of Preference by Similarity to Ideal Solution (TOPSIS) with the hexagonal fuzzy numbers to accurately analyze the vulnerabilities in 5G networks. The proposed method considers both the vulnerability and 5G network dynamic factors such as latency and accessibility to find the potential attack graph paths where the attack might propagate in the network and quantifies the attack cost and security level of the network. We test and validate the proposed method using our 5G testbed and we compare the optimized method to the classical TOPSIS and the known vulnerability scanner tool, Nessus
    corecore