29 research outputs found

    A Neural Network-Based Application to Identify Cubic Structures in Multi Component Crystalline Materials Using X-Ray Diffraction Data.

    Get PDF
    One of the crystalline materials structures is cubic. An experimental study has been done about developing a scheme to identify the cubic structure types in single or multi component materials. This scheme is using fingerprints created from the calculation of quadratic Miller indices ratios and matches it with the ratio of the sin20 values from the diffracted data of material obtained by X-Ray Diffraction (XRD) method. These manual matching processes are complicated and sometimes are tedious because the diffracted data are complex and may have more than one fingerprint inside. This paper proposes an application of multi-layered back-propagation neural network in matching the fingerprints with the diffracted data of crystalline material to quickly and correctly identify its cubic structure component types

    POSFinger: A New Fingerprint For Passive Remote Operating System Identification.

    Get PDF
    In this paper we propose a fingerprint for identifying remote operating system as a proof-of concept. Passive operating system detection is the art of detecting the operating system of other PC remotely without its knowledge

    Professional and Peer Social Support-Oriented mHealth App: A Platform for Adolescents with Depressive Symptomatology

    Get PDF
    Adolescent depression has been increasing worldwide and often there are no available platforms to support them. Being one of the largest age groups of smartphone users, we investigate and implement an extension framework for mobile health (mHealth) applications to alleviate depressive symptomatology and elevate psychological well-being in adolescents. In this paper, we discuss the design and development of incorporating and integrating social support provided by professionals and peers and its effective role in a mobile context

    High Performance Network Worm Detection Engine Using Memory Efficient Circular Buffer.

    Get PDF
    This paper presents the implementation of a memory efficient circular buffer to ensure a high performance network worm detection engine. A worm detection engine's primary function is to detect the existence of worms in a particular network

    Experimenting Diabetic Retinopathy Classification Using Retinal Images

    Get PDF
    Along with many complications, diabetic patients have a high chance to suffer from critical level vision loss and in worst case permanent blindness due to Diabetic Retinopathy (DR). Detecting DR in the early stages is a challenge, since it has no visual indication of this disease in its preliminary stage, thus becomes an important task to accomplish in the health sector. Currently, there have been many proposed DR classifier models but there is a lot of room to improve in terms of efficiency and accuracy. Despite having strong computational power, current deep learning algorithm is not able to gain the trust of the medical experts in classifying DR. In this work, we investigate the possibility of classifying DR using deep learning with Convolutional Neural Network (CNN). We implement preprocessing combined with InceptionV3 and VGG16 models. Experimental results show that InceptionV3 outperforms VGG16. InceptionV3 model achieves an average training accuracy of 73.5 % with a validation accuracy of 68.7%. VGG16 model achieves an average training accuracy of 66.4% with a validation accuracy of 63.13%. The highest training accuracy for InceptionV3 and VGG16 is 79% and 81.2%, respectively. Overall, we achieve an accuracy of 66.6% on 52 images from 3 different classes

    SDN-based detection and mitigation of DDoS attacks on smart homes

    Get PDF
    The adoption of the Internet of Things (IoT) has proliferated across various domains, where everyday objects like refrigerators and washing machines are now equipped with sensors and connected to the internet. Undeniably, the security of such devices, which were not primarily designed for internet connectivity, is of utmost importance but has been largely neglected. In this paper, we propose a framework for real-time DDoS attack detection and mitigation in SDN-enabled smart home networks. We capture network traffic during regular operations and during DDoS attacks. This captured traffic is used to train several machine learning (ML) models, including Support Vector Machine (SVM), Logistic Regression, Decision Trees, and K-Nearest Neighbors (KNN) algorithms. These trained models are executed as SDN controller applications and subsequently employed for real-time attack detection. While we utilize ML techniques to protect IoT devices, we propose the use of SNORT, a signature-based detection technique, to secure the SDN controller itself. Real-world experiments demonstrate that without SNORT, the SDN controller goes offline shortly after an attack, resulting in a 100% packet loss. Furthermore, we show that ML algorithms can efficiently classify traffic into benign and attack traffic, with the Decision Tree algorithm outperforming others with an accuracy of 99%

    An industrial IoT-based blockchain-enabled secure searchable encryption approach for healthcare systems using neural network

    Get PDF
    The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchainenabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system

    Ontology-based regression testing:a systematic literature review

    No full text
    Web systems evolve by adding new functionalities or modifying them to meet users’ requirements. Web systems require retesting to ensure that existing functionalities are according to users’ expectations. Retesting a web system is challenging due to high cost and time consumption. Existing ‘systematic literature review’ (SLR) studies do not comprehensively present the ontology-based regression testing approaches. Therefore, this study focuses on ontology-based regression testing approaches because ontologies have been a growing research solution in regression testing. Following this, a systematic search of studies was performed using the “Preferred Reporting Items for Systematic Reviews and Meta-Analyses” (PRISMA) guidelines. A total of 24 peer-reviewed studies covering ontologies (semantic and inference rules) and regression testing, published between 2007 and 2019, were selected. The results showed that mainly ontology-based regression testing approaches were published in 2011–2012 and 2019 because ontology got momentum in research in other fields of study during these years. Furthermore, seven challenges to ontology-driven regression testing approaches are reported in the selected studies. Cost and validation are the main challenges examined in the research studies. The scalability of regression testing approaches has been identified as a common problem for ontology-based and other benchmark regression testing approaches. This SLR presents that the safety of critical systems is a possible future research direction to prevent human life risks
    corecore